Friday, December 27, 2019

The Seperation of Powers and the American Constitution Essay

The Seperation of Powers and the American Constitution When the founding fathers wrote the Constitution they came up with a revolutionary idea which is known as the seperation of powers. This incorperated a system which protected the principles on which the constitution was based, such as avoiding tyranny and forming a more perfect union. The way the seperation of powers work is known as vertical and horizontal. The vertical seperation of powers has three different branches, the Federal government, the state governments and the much smaller local governments. The local governments consist of a mayor, councils and county courts, these would ytake care of things such as legislation on parking†¦show more content†¦There are powers though that can not be taken away from any of these three branches meaning all have been limited. To prevent the federal, state or maybe even local governments taking control of the country, the power sharing is broken down further. All three of the above braches have another three branches, these are the executive, legislature and the judiciary. All three use a system known as Checks and Balances, this allows one of the the branches to be watched over and checked on by the other two branches . This works well as the Supreme Courtprotects the constitution by ruling on whether or not a bill is constitutional or unconstitutional. There are downsides to the Checks and Balances as was seen in 1995 during the Appropreations Crisis when government shut down for two weeks as Congress and the, then, President Clinton could not agree over the Appropreations Bill. There is also the Line Item Veto which came from the Appropreations Crisis, this allowed the Presidentto veto sentences or paragraphsthat he did not like, this was ruled unconstitutional by the Supreme Court even though it mad e for more effective government. A further seperation of power is with in theShow MoreRelatedThe Constitution Of The United States1593 Words   |  7 PagesINTRODUCTION The Constitution of the United States was signed on the 17th of September in 1787. The delegates who signed the document were the delegates to the Constitutional Convention in Philadelphia. The Convention was presided over by George Washington. It was the Constitution of the United States that established the national government and certain basic fundamental laws apart from guaranteeing some basic rights to the citizens of the United States. The first Constitution of the United StatesRead MoreJohn Locke s State Of Nature993 Words   |  4 PagesJohn Locke 1.John Locke describes the state of nature in multiple ways. He claims that the state of nature has a law of nature to govern it. Then he goes on by saying no one man comes by power over another. He describes it as a state of equality . 2.People left the state of nature and joined a political society by establishing a government because security of personal property was not provided in the state of nature. Although the state of nature is considered to be free, it falls short to issuesRead MoreThe System Of Checks And Balances Essay1446 Words   |  6 PagesI Topic Sentence The flow of power in the system of checks and balances was created to protect the principles of democracy and sovereignty in the United States, But Even though there is a separation of powers, its clear to argue that the executive branch(President) is the most important branch and there are flaws in the system of checks and balances. II Signifigance of the Topic The system of checks and balances is an significant part of the Constitution because With checks and balances, each ofRead MoreImpact of the Gulf War, September 11th, and the War in Iraq on the U.S. Constitution1083 Words   |  5 Pages The Constitution of the United States is the supreme law of the United States of America. It was completed on September, 1787, with its adoption by the Constitutional Convention in Philadelphia, Pennsylvania, and was later ratified by special conventions in each of the original thirteen states. It created a more unified and defined government in place of what was then a group of free and independent states operating under the Articles of Confederation. During its historyRead MorePresidential Use of Force Essay1258 Words   |  6 PagesPresidential Use of Force When the framers of the Constitution constructed the executive branch of government, they envisioned a president with certain limited powers. Having delegated to the president a specific type of authority, the framers would probably be surprised to see that they had actually created a rather dynamic officer. The presidency is continually changing over time. That is, the power of the president has been both increased and decreased a various stages in history. OpportunitesRead MoreThe British Of The French And Indian War1247 Words   |  5 Pagesto themselves as the United States of America. Yet, the Quartering Act was really where all of the anger and frustration stemmed from. You see, it was events like the Quartering Act are to blame for the seperation. It’s also what led them to create their own government through the U.S. Constitution (1787). This document would forever shield the U.S. citizens from violation of their rights. In the Declaration of Independence, the official cutting of the ties with Britain, there is a whole paragraphRead MoreReviewing The Various Branches Of The United States Government1602 Words   |  7 Pagesfunctions of the three branches that make up the federal government. The federal government consists of millions of people working together and insuring that the United States is run in an effective manor thus protecting the rights of every American citizen. American citizens must rely on local, state, and federal elected officials along with many members of various public organizations to insure that our Constitutional rights are not being infringed upon and that America remains a free country. ExecutiveRead MoreW. E. Duboiss Niagara Movement1193 Words   |  5 Pagesneed for racial equality in America. DuBois’ purpose is to call white Americans to action, as well as highlight the effects of the African American’s white superiors excluding them from simple, constitutionally given, liberties. He adopts an authoritative tone in order to establish a feeling of guilt for the white people who determine the rights given to African-Americans. W.E.B DuBois convinces his audience that African-Americans should become equal on a social, economical and political level, throughRead MoreWashington s Farewell Address Analysis1375 Words   |  6 Pageswritten in September of 1796. This was George Washington’s Address of retirement to privacy from two terms acting president of the United States. â€Å"In his last major address, President Washington offered an emphatic warning against tinkering with the Constitution in a way that might impair the energy of the system. ‘Experience’ was the true test of whether the new system would work, and it should be left to ‘time and habit’ to determine whether or not fundamental alterations in the future would be wiseRead MoreEssay Human Nature And The Declaration Of Independence1629 Words   |  7 Pagesfirst place. The Declaration of Independence states in order for the individuals to secure their unalienable (that is God given) rights of life, liberty and the pursuit of happiness, quot;Governments are instituted among men, deriving their just powers from the consent of the governed.quot; nbsp;nbsp;nbsp;nbsp;nbsp;Of Commonwealth could only be related to the thinking of the founding fathers in a most basic way to their ideals. Thomas Hobbes also seems to be a syllogistic thinker like

Thursday, December 19, 2019

Essay about Drug Abuse - 895 Words

Drug Abuse An estimated 10.4 million Americans aged 12 and over have used methamphetamine at least once in their lifetime. What exactly is methamphetamine? Also named crank, speed, crystal or ice, it is a white, odorless powder that dissolves with water or alcohol. Methamphetamine addiction is one of the most difficult addictions to get treated. Methamphetamine first started in Germany around 1887. During World War 2 this drug was used to keep the men going. In the 1950s and 60’s this drug was given to people who wanted to lose weight. By the 70’s it became a cure for people who wanted to stay awake, loose weight, help with mild depression and to increase athletic performance. But by the mid-1980’s the Drug Enforcement Agency was†¦show more content†¦This occurs at the end of the binge, tweaking is the most dangerous stage because it is the most obvious to law enforcement and the people around the user. Crash is what happens next, during the crash all t he user wants is sleep. The crash can last up to 3 days. After the crash occurs the user will have a normal stage. The normal stage can last up to 14 days or be as little as 3. The last stage of methamphetamine is Withdraw during this stage all the user wants’ is more. Usually 30-90 days will pass until the user realizes he/she is in the withdraw stage. There are many effects as to what this drug can do to the body and the people around someone who is using. As you can imagine this drug will tear a family apart, and also tear the user’s body apart. Methamphetamine has long-term effects and short term effects. Some short-term effects include shutting down your brain’s sleep, hunger and thirst centers. Other effects include confusion, non-stop talking, anxiety, paranoia and aggressiveness. All though those side effects are treatable this drug just makes whoever is using want more, and by doing that a user will have long-term effects. Those effects include wanting more, cardiovascular problems that result in rapid heart rate, increased blood pressure, and irregular heart rate. Users will even eventually start seeing â€Å"Crank Bugs†. This is the feeling that a user gets when you have been doing meth for awhile, users feel as if there are bugs crawling under your skin.Show MoreRelatedDrug Of Drug And Drug Abuse1538 Words   |  7 PagesDrug Resistance Drug use has become an increasing problem among high schoolers and teenagers around the same age. Ever since the drug war of the 1900s, drugs have been a major problem in today’s society. â€Å"Use of drugs such as opium, morphine, and other byproducts were common in twentieth century America† (Dobkin, 1998). While most students in standard high school drug education know about the use of coca leaves in Coca-Cola and the opium trade in China, drug addiction during the century is muchRead MoreDrug Abuse1279 Words   |  6 PagesThe use of and abuse of illegal and prescription drugs are a health, social, and law enforcement problem that is affecting Americans across the country. Drug abuse is destroying the lives of many teens and adults and is also destroying families in the United States. The use of drugs is a major problem in the United States among all Americans, but drug addiction is the main cause for America s troubled teens today. Exactly what is a drug? A drug is any chemical that produces a therapeutic or non-therapeuticRead MoreDrug Abuse8640 Words   |  35 Pagesreport on ‘drug abuse’ has been made by our group to give an idea of the calamitous cause of using drugs in improper way. The report is intended to serve the purpose of providing the knowledge about drug abuse and to suggest ways to help limit drug abuse. An effort has been made on our part to include certain symptoms which indicate drug abuse. Also throughout the report, repetitive use of the drug abuse’ has been made to instate into the minds of the reader the cause of using drug abuse in an illicitRead MoreDrug Abuse And Addiction : Drugs977 Words   |  4 PagesDrug abuse/addiction Jeremy Graham May 11, 2015 Period, 5 Drug abuse and addiction Drug abuse/addiction is a major problem in Indiana that affects many individual. Several solutions such as rehab and drug classes have been tried. Yet, the best solution is taking drug classes. Many people do not understand why people become addicted to drugs or how drugs change the brain to foster compulsive drug abuse. They mistakenly view drug abuse and addiction as strictly a socialRead MoreDrug Abuse2895 Words   |  12 PagesDay against Drug Abuse and Illicit Trafficking every year. It is an exercise undertaken by the world community to sensitize the people in general and the youth in particular, to the menace of drugs. The picture is grim if the world statistics on the drugs scenario is taken into account. With a turnover of around $500 billions, it is the third largest business in the world, next to petroleum and arms trade. About 190 million people all over the world consume one drug or the other. Drug addiction causesRead MoreDrug Abuse and Prevention1510 Words   |  7 Pagesidea of prevention is to limit the availability of drugs (Hart Ksir, 2011, p. 400), but this is not essentially the best way. Addiction affects everyone. According to the National Inst itute on Drug Abuse (NIDA), substance abuse cost our nation â€Å"more than $484 billion dollars (The National Institute on Drug Abuse ).† So although you might not be directly impacted by drug abuse, as a whole your tax dollars are spent on fighting the war on drugs. Currently there are several different types of substanceRead MoreDrug Abuse On The Workplace Essay1704 Words   |  7 PagesDrug Abuse in the Workplace: The human resource topic I chose to write my research paper on is â€Å"Drug Abuse in the Workplace†. Drug abuse in the workplace is something very common that many of us will encounter at some point. Alcohol and drug abuse has a major effect on employee absence and lost productively that leaves a negative working environment. It is important a company addresses the right guidelines to keep a drug free workplace. Establishing a clear and fair substanceRead MoreDrug Abuse And Substance Abuse1658 Words   |  7 PagesThe National Institute on Drug Abuse (NIDA) defines drug abuse as, â€Å" It becomes drug abuse when people use illegal drugs or use legal drugs inappropriately.† This may include; the repeated uses of drugs to produce pleasure, alleviates stress, and/or alters or avoids reality. The perception of addiction and substance abuse has been widely known for many years, but the medical community has failed to accept and publicly this issue among it own members . Drug abuse by nurses is prevalent in today societyRead MoreInjectable Drug Abuse1488 Words   |  6 PagesMEMORANDUM INJECTABLE DRUG ABUSE: GROWING CHALLENGE IN NORTH-EASTERN PART OF INDIA FROM: AE28697 TO: Ministry of development of north east affairs, India RE: Scenario C-Health and harm reduction DATE: 19 October 2013 Introduction North-east (NE) India is connected to remaining part of India through a constricted passage known as Siliguri Corridor squeezed between Nepal and Bangladesh (Hussain, 2011). It comprises of seven sister states of Arunachal Pradesh, Assam, Manipur, Meghalaya, Mizoram, NagalandRead MorePrescription Drug Abuse And Prescription Drugs1487 Words   |  6 PagesPrescription Drug Abuse Prescription Drug Abuse has increased in an alarming rate over recent years! Prescription drug related deaths now outnumber those from heroin and cocaine combined. The abuse in prescription drugs in America goes back more than a hundred years ago. Prescription drug abuse is the use of a medication without a prescription, in a way other than prescribed, or for the experience or feelings elicited. Although prescription medications are intended to help individuals, they can

Wednesday, December 11, 2019

Legacy Technology Security Issues

Question: Discuss about theLegacy Technology Security Issues. Answer: Introduction Legacy technology in the context of computers connotes to such computer system, programming language or the software which has become outdated, redundant and obsolete but is still in use by people and organizations instead of getting the same updated to the latest version. A technologys legacy is not specifically decided by the age but may also be referred basis the lack of support from the technology merchant or a system that is no longer capable of meeting the entities requirements. Due to the lack of upgradation of the old systems with the latest edition, it poses certain security risks as well. Security is the biggest concern for all organizations because of which legacy systems should be upgraded on a continuous basis as old technology is more susceptible to being hacked because of ease for the hackers to get inside systems which are still running on the older versions of the operating systems. The same is so as the security upgradation has not been done to the level required. The said danger all the more enhances if the vendor does not provide latest versions on a timely basis. Cyber attackers are more inclined towards hacking the application layer of the systems. Software applications which were tested in the year 2013 found that more than ninety percent of it was hit by security issues. Furthermore if the software provider is not up to date then the organization is more vulnerable towards security risks. Thus it is easy for the hackers to enter into computer systems which are sill deploying the older versions of hardware and software applications (Goldstein, 2015). More so, the vendors are not interested in developing the upgrade versions of the older systems simply because the same will deter the newer applications from capturing the market. Although it s considered that terminals which are of no use now may seem to be more safe as compared to the modern applications since its usage is restricted by the application and is highly command driven but even though this closed system poses to be more secure but the same is not ultimate if the actual purpose is only defeated i.e. the organizations to cope up with the changing business environment. The old systems easily accept the inputs from various people without getting the same validated. Due to the same the developer of the codes write such codes which has the ability to interpret whatever the user enters (Laney et.al. 2004). However there may be situations wherein these developers may miss out something in the code string which would provide a path to the hackers to enter some undesirable values due to which the entire computer system may run down leading to a loss of considerable information. The legacy technological systems no longer serve the purpose of the organizations, especially those who work on a global platform. For them security is of much importance whether it is security against crashing down of the system or against the possible attackers and the hackers of the confidential information as it has great reputational value. The organizations who believe in restoring their legacy systems should make efforts to ensure that the modern security hooks are successfully applied to the older versions computers, but the same is not possible for all host applications due to reasons such as the vendor only stopped the product in totality or discontinued its operations. For example if a company has tailored its legacy version to a great extent then upgrading the same would call for tailoring the entire customisation again. If any patch is missed out then it becomes more difficult to roll out the next patch (Lehmann, 2015). The organizations are seen to suffer with regards security of their important information and data both internally and externally and the legacy systems are more vulnerable; to security infringes because of lack of coping up with the new and emerging security needs. Due to the same one of the most preferred ways for securing the data and information stored in the host computer is to develop a secure terminal emulation system which would primarily focus upon modernising the legacy host application and thus resolve the security issues. Legacy technology security issues are a matter of greater concern in this era of technological advancement due to varying causes. The cost involved in updating the older versions to which the vendor has not provided an upgrade is very high. Secondly protection of the information of the customers such as their credit card information for organizations who processes such data is of utmost importance (Weiss, 2012). Thus it is crucial for them to employ the vendor-supplied critical security patches but unfortunately all emulators do not support such patches i.e. PCI DSS requirements due to which working on the legacy systems poses security threats both to the customers and to the business houses as well. Furthermore, the legacy terminals are more susceptible to virus attacks. For example as per Microsoft, the older version of Windows XP is more exposed to virus attacks than the latest versions of Windows. Thus it is very clear from the above example that legacy is a problem both with regards the security and innovation. Switching over to Windows 7 may be a difficult task for the organizations that have a huge number of systems deployed (Zoufaly, 2002). Thus it is very clear that upgradation is the best option available to fight against the security threats posed by the legacy systems. But all the legacy systems do not offer the privilege of upgradation due to the upgraded path being blocked or the cost is too high. At the same time it is not possible to get away of the said system, in such a scenario other means have to be adopted so as to enable mitigation of risk. Such as sandboxing of a platform which is highly susceptible to risks via virtualisation. Thus makes the entire system isolated against the other systems of the firm. Oracle Virtual box is one such software which enables emulation of the Windows 95 or the XP with the legacy applications within a self contained window on the latest system which is more secure and less risky (Korolov, 2014). The said virtual system can be kept away from the accessibility of the outsiders or some specific insiders as well. Second method that can be used by the legacy technology to mitigate the security threats is creation of effective patches which can deal with the known weakness upstream of the risky application. Such as the legacy database products are more susceptible to the SQL Injection attacks wherein an enquiry which has been sent to the information block gets into the language rules of the application software and modifies important data which was otherwise kept confidential. In such a scenario the virtual patches play a very important role. The said patch comprises of certain rules in a firewall packet inspector or the server which scans and detects the SQL Injection Syntax and immediately takes action by jamming the application before it reaches the legacy product being aimed at (Campara, Mansourov, 2008). On a concluding note it is very evident that legacy systems pose high security threats and fighting the same is also complex. The older versions are more risky due to security lapses such as easy accessibility by the malware attackers, lack of vendor support due to which updates are unavailable, the older systems are less security threatscape as at that point of time security threats were not at such an advanced stage, the security patches are not available for all the older versions of the systems and most striking is the fact that some legacy products both software and hardware run only in a legacy environment which makes it more vulnerable to security threats as the organizations are by default forced to continue its usage for specific information. Although methods are being deployed to fight the same yet it is at a very nascent stage and needs further development. References: Campara, D., Mansourov, N., (2008), How to Tackle security issues in large existing/ legacy systems while maintaining development priorities. Technologies for Homeland Security. Goldstein, P., (2015), Legacy Federal IT Systems Are a Ticking Time Bomb of Risks, Available at https://www.fedtechmagazine.com/article/2015/12/legacy-federal-it-systems-are-ticking-time-bomb-risks (Accessed 17th October 2016) Korolov, M., (2014), Forgotten risks hide in legacy systems, Available at https://www.csoonline.com/article/2139382/data-protection/forgotten-risks-hide-in-legacy-systems.html (Accessed 17th October 2016) Laney, R.C., Linden, J.V.D., Thomas, P., (2004), Evolution of Aspects for Legacy System Security Concerns, Available at https://aosd.net/workshops/aosdsec/2004/AOSDSEC04_Janet_VanderLinden.pdf (Accessed 17th October 2016) Lehmann, A., (2015), The Challenges of Maintaining a Legacy system, Available at https://blogs.askcts.com/2015/04/07/the-challenges-of-an-internal-app-support-team/ (Accessed 17th October 2016) Weiss, A., (2012), The Hidden Security Risks of Legacy Software, Available at https://www.esecurityplanet.com/patches/the-hidden-security-risks-of-legacy-software.html (Accessed 17th October 2016) Zoufaly, F., (2002), Issues and Challenges Facing Legacy Systems, Available at https://www.developer.com/mgmt/article.php/1492531/Issues-and-Challenges-Facing-Legacy-Systems.htm (Accessed 17th October 2016)

Tuesday, December 3, 2019

NAVIGATING A SUCCESSFUL PROPOSAL PROCESS PART 3 OF 3 - The Writers For Hire

NAVIGATING A SUCCESSFUL PROPOSAL PROCESS: PART 3 OF 3 The Proposal Team Kick-Off Before your team meets, distribute the RFP to all members. Instruct them to read it from cover to cover and come to the meeting with questions. After all, you’re not the only one who should be preparing. 2. Choose the proposal management software If the proposal is extensive and/or requires many different hands, you’ll want to consider software to help you manage the process. Your company may already use a certain project management program. But be aware that there are software applications designed specifically for answering RFPs. Capterra, a website with the byline â€Å"The Smart Way to Find Business Software† has compiled a list called Top Proposal Management Software Products. It includes the names, reviews (when available), and links to the websites for 95 web-based and installed applications. The list offers the capability filter your choices and select and compare products. You will likely not have the time to weigh all these choices before your kickoff, but keep in mind that there are many tools available to help you. It would be well worth your time to research these options before an RFP crosses your desk if your company is considering bidding on any proposals in the future 3. Decide how the various sections and related documents will be reviewed Will you simply email drafts and versions to your team? If the proposal is small enough, this might be sufficient. But for complex projects, consider document management software such as SharePoint ® or a repository such as Google Docs where contributors can add and review content. Of the 95 proposal management software products listed on Capterra, 42 include a content repository and document management. 4. Go through the RFP again Make a list of every project deliverable. Outline the terms used in the RFP that may need clarification with your team. The RFP may have a glossary of terms, but there may be other jargon in the RFP that is unique to its issuer. 5. Create a spreadsheet that lists every deliverable in the RFP Even if you have RFP project management software, the experts we consulted still recommend a good old-fashioned master spreadsheet. A spreadsheet offers an at-a-glance overview of what you’ll need to produce and shows team members the status of each action item. Plus, even the most tech-averse on your team will usually be comfortable with spreadsheets. â€Å"Include columns where a name or names will be placed beside every deliverable,† says Carey Miller, a professional writer who has project managed dozens of RFPs. â€Å"Add column heads for project milestones, due dates, and reviewers for the initial drafts as well as reviewers for the final package.† Please feel free to use our spreadsheet template to get you started. Conducting the Kick-Off Meeting Your team members must be absolutely clear about their roles, deliverables, and deadlines when they leave the first meeting. It’s also critical that you cover certain rules of the game, so they’ll understand the company’s RFP process and some best practices in proposal writing. Cover the topics that follow for a successful meeting. 1. Address the team members' questions about the RFP When you circulated the RFP, you asked that team members come prepared with their questions about the RFP. Address those questions up front so that they’re not interfering with people’s concentration during the other meeting topics. 2. Assign team members their roles As each team member is assigned a role, clarify the responsibilities associated with that role. 3. Place a name or names in the column besides each deliverable Go over the spreadsheet, one deliverable at a time. Determine whether the Subject Matter Expert (SME) will write it or if someone else will write the section using information provided by the SME. Miller notes that the writer should be clear about the point person for information: â€Å"With an unusually complex proposal, there may be several point persons for various sections.† 4. Establish the reviewer for each section The reviewer’s name may appear in multiple rows, depending on how many deliverables are in a section and how many sections that reviewer is qualified to review. Hewitt stresses, â€Å"Designate reviewer(s) for the various sections and the reviewers for the packaged proposal. The drafts can be reviewed by multiple SMEs; the finished package should be reviewed by only a small set of key players.† 5. Establish a timeline In Winning Library Grants, A Game Plan, Herbert B. Landau writes, â€Å"To ensure that the deadline will be met, I start with the proposal delivery date and work backwards to the present.† \ Build in a pad in case something unexpected results in a project slowdown. Landau also suggests, â€Å"To allow for all contingencies, set the date to have the complete proposal, including all forms, the narrative, the budget, and all attachments, at least four days before the day the proposal must be submitted.† Include each of the following milestones in your timeline: The completion date for the initial draft of each section or part thereof (according to the list of deliverables) The completion date for the initial review by one or more SMEs The completion date for incorporating the requested changes into the initial draft The completion dates for any additional review cycles The required submission date for the budget numbers and any attachments The completion date of the draft of the packaged proposal The completion date of the package review The completion date for incorporating review revisions The completion date of the final proofreading (ideally set at four or more days before proposal delivery) Tip: Build in as much time as possible for the proposal writer to organize and format the information, write the executive summary and conclusion, ensure that everything in the RFP has been addressed, incorporate the required dollar amounts, and ensure that the proposal reads as though one person wrote it. If there is a particularly tight deadline for proposal submission, consider insisting on very tight deadlines for reviews. 6. Distribute and discuss your list of terms in the RFP and their definitions as they apply to the contract This will ensure that, in echoing the lingo of the RFP, the terms will be accurately and consistently applied by your team. 7. Explain how documents will be reviewed and progress tracked As the leader of this meeting you should have a clear idea from your pre-meeting planning as to how these processes will flow. 8. Discuss lessons learned Consider including a brief review of lessons learned by previous proposal teams. You may have conducted lessons-learned reviews following other proposals, but, depending on how long it’s been or whether there are members who didn’t participate on those teams, it may be helpful to review a few of them now. CONGRATULATIONS! You have successfully put the proposal process in motion. You have scrutinized and absorbed the RFP, captured the requirements, consulted various key players, anticipated and worked through potential roadblocks, made critical project management decisions, initiated a team, and put the team in motion.

Wednesday, November 27, 2019

Compare and contrast the Blessing by Imtiaz Dharker with Presents from my Aunts in Pakistan by Moniza Alvi Essay Example

Compare and contrast the Blessing by Imtiaz Dharker with Presents from my Aunts in Pakistan by Moniza Alvi Paper I am going to compare two poems from different cultures, one of which is Blessing by Imtiaz Dharker which is about people living in India with very little fresh water and the other poem Presents from my Aunts in Pakistan by Moniza Alvi, which is in relation to girls heritage living in the UK who receives clothes as presents from some relatives in Pakistan. Culture is a general term for huge range of ideas such as art, traditions, knowledge and belief that is shared b country, race or a group of people. The author of Presents form my . Moniza Alvi was born in Lahore, Pakistan in 1954. She moved to England when she was few months old. Since then she did not return to Pakistan until after the publication of Present form my aunt in Pakistan. She is the daughter of English mother and Pakistani father. Presents form my . is an autobiographical poem. The speaker in the poem who is of mixed race, describe the gifts of clothes and jewelry sent to her in England by her Pakistani relatives. She is drawn to the loveliness of these things, but feels awkward wearing them. She feels more comfortable in English clothes. The poet is torn between two cultures that she feels she belongs to neither. She likes the clothes but she is embarrassed with them her knowledge to the birth place, which she left as a baby, comes to her only through old photographs a nd newspapers reports. We will write a custom essay sample on Compare and contrast the Blessing by Imtiaz Dharker with Presents from my Aunts in Pakistan by Moniza Alvi specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Compare and contrast the Blessing by Imtiaz Dharker with Presents from my Aunts in Pakistan by Moniza Alvi specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Compare and contrast the Blessing by Imtiaz Dharker with Presents from my Aunts in Pakistan by Moniza Alvi specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In the similar way the author of the poem Blessing, Imtiaz Dharker was also born in Lahore, Pakistan in 1954. She grew up in Glasgow and now she lives in the outskirts of Mumbai, India known as Dharvi where she works as a film maker. Dharvi is an unofficial area where millions of migrants have gathered. Dharvi is place where there is shortage of water. The poem Blessing is set in Dharvi. It is about water, which is precious commodity to the local people of Dharvi. In the poem the water pie bursts and all the adults, old people rush out in the water to collect the precious commodity in any container they can get whilst the children play in the water. Presents form my . is with the intention of it is a long poem with seven stanzas. The poem is written in free verses and the lines are arranged loosely across the page this reflects the commotion of no fixed nationality. The first stanza is the longest because the port is describing her clothes from Pakistan. She is intrigues in the clothes. The port uses enjambment to speed the poem up. There are traces of alliteration throughout the poem. The effect that alliteration as on the poem is that it creates the tone within the poem. Costume clung The length of the lines emphasize like I longed On the other hand poem Blessing is a short poem with four stanzas. Similarly this poem is also written in free verse to create the same effect in some parts of the poem. She also uses enjambment and there is lack of caesuras which mimics the bursting of the pipe as well as the chaos. The effect that the caesura have on the poem is that they make the poem flow at a fast pace. In the poem Blessing the third stanza is the longest because there is more action going on. Enjambment is also used speed the poem just like the water. There isnt a great deal of alliteration in the poem blessing which affects the rhythm of the poem. Small splash In the poem Presents form my . The poet uses imagery in such a way to help us form a kind of mental picture of the thing that is being described or the idea that is being explored. Images work in a number of different ways, for example, the poet can literally describe something, as Moniza Alvi describes the clothes as Peacock blue. This is called literal image. However, Moniza Alvi uses more devices in order to make the description more vivid. This kind of imagery is called figurative. There are a few similes used in the poem such as glistening like an orange split open, here she uses the similes to emphasize the description of the clothes. In addition to this she also uses metaphor and personification was alien in the room. The effect that these devices have is that they help make an image in the readers head. Next there is aural imagery which is created through words which Moniza Alvi often makes use of images that is created through sounds. For example: onomatopoeia. The poet uses words like snapped. The poet here just tells us that how did it sound like when the glass bangle broke to make a aural image in the reader head and she uses onomatopoeia to create a sense of the sound. The rhythm of the poem is very smooth. In the same way the poet in the poem Blessing uses the same imagery device to make the similar effects. Imtiaz Dharker uses simile in the first line of the first stanza to create the effect of emphasizing how skin cracks when there is a lack of water and the pain that we go through when the The skin cracks like a pod. Other than that she uses metaphor The municipal pipe bursts, sliver crashes to the ground and personification voice of a kindly God. She use a metaphor to get the same effect of a simile but for a personification instead of saying water rashes to the ground she uses sliver because she is describing water as a big possession, money or currency. In other words water is like precious commodity to the local people of Dharvi. Imtiaz Dharker describes the water in religious terms as it is voice of God to them. The effect that this personification has on the poem is that the sense that the water is a living thing, therefore giving it a feeling of life. The poem Blessing is set in a hot country, where the people are poor and there is very little fresh water. When the pipe bursts and water shoots out, the people become excited and rush out to the pipe to collect water in anything they can find. The children meanwhile are delighted at the unexpected shower. The poet has sympathy with these people, understanding their plights and starting simply. There never is enough water She describes the effects, as skin cracks like a pod and shows how they dream of water and they can almost hear it. Imagine the drip of it. He understands how important water is to them, because she describes water in religious terms voice of a kindly God, while the people are like a congregation, in a way worshiping the water and what it represents in such a land. In, fact the water is seen as a fortune, silver and liquid sun. On the other hand Presents form my . is a much calmer poem it has internal rhymes such as saw Lahore which seems slow. It also seems to stretch out like girls life story. The poet uses the language of seclusion shaded and screened to describe how they are hidden quietly away. He poet actually ends with a vision of her excluded from society, of no fixed nationality. Her exclusion is symbolize by the fact she sees herself starring through fretworks and she focuses on the lowest individuals beggars and sweeper girls. By using such terms it seems she associates he rself with them. The rhythm of Presents form my . is reflected. In the poem Presents form my . the poet Moniza Alvi makes use of symbols of another culture to explore the idea. In Presents form my . The poet presents the idea of being caught between two cultures. She came to England as a baby and has grown in Englands cultures but looks back to her roots back in Pakistan, reflecting on her gifts that her aunts, still living in Pakistan, sent her as she was growing. All the gifts she gets are symbolic of the Pakistani culture but the poet remembers that I longed For denim and corduroy This symbolizes the western cultures grown up in. Ironically, even her aunt Requested cardigans from Marks and Spencers Though out the poem, symbols are used to reflect the poets feelings of being caught between two cultures and her feelings, ultimately of being of no fixed nationality. The girls in the poem Presents form my . discovers are identity through a series o reflections, images and senses when she considers the brightly colored alien clothes that she recalls her aunts sending from Pakistan; for example, the poets salwar kameez is peacock blue, the embossed slippers are gold and black and gift of candy stripped glass bangles draws blood when it snaps on her wrist. Blood introduces the idea of the poets roots and with it a chain of clothes- introduced memories that lead her to discover the Asian half of her identity. The poems style of narration has a sense of immediacy that is appropriate for the direct experience that is reflected in the poem. The poets use of free verse is also effective as the poems maze like lines help embody the poets meandering sense of self-discovery as she reflects on a series of objects that enables her to discover her roots. The narrator ornate present stimulates her imagination; she recalls through the glass circles of the clothes mirror works how she made the uncomfortable journey to England with her parents as a young child: an event that she would otherwise have been far too young to remember. Therefore both poems gives us a insight of their culture. I prefer the poem Blessing because when I read the poem it makes me feel sympathy for the people of Dharvi but the on the other hand it make me a bit relived that the people have got some water when the pipe bursts. The poet makes us thinks that sometimes things can be better. The way people fight for water shows how desperate they are; and though the children are happy when the water sings over them, we finis with small bones and know that soon their will be no water again. The poet sees their problem as her problem.

Saturday, November 23, 2019

Word Choice Born vs. Borne - Proofread My Papers Academic Blog

Word Choice Born vs. Borne - Proofread My Papers Academic Blog Word Choice: Born vs. Borne The words â€Å"born† and â€Å"borne† are spelled almost the same but differ in meaning. Getting these terms mixed up can therefore impact upon the clarity and accuracy of your written work. To help you avoid this kind of mistake, we’ve compiled a guide on how these terms should be used. Born (in the USA) When Bruce Springsteen sang that he was â€Å"born in a dead man’s town† he was using the word in its literal sense, meaning â€Å"existing as a result of birth.† This is why we say that someone born in a certain place was place-born (e.g., German-born, Canada-born, etc.): New Jersey-born soccer player Carli Loyd was instrumental in the USWNT’s World Cup victory. In a more figurative sense, we sometimes use â€Å"born† to mean â€Å"arising from/of†: Mary Shelley’s Frankenstein was born of a competition between Shelley and her companions to see who could write the best horror story. Furthermore, if someone has undergone a major change in their life we might say they have been â€Å"born again† (such as a â€Å"born again Christian†). Borne The word â€Å"borne† is the past participle of the verb â€Å"bear.† It therefore means â€Å"to have carried†: On Palm Sunday, Jesus entered Jerusalem borne on the back of a donkey. This is why we use adjectives like â€Å"waterborne† or â€Å"current-borne† when describing something carried by something else (e.g., â€Å"an airborne virus†). Another way in which we use this term is to indicate that someone has taken responsibility for something: The upgrade had been expensive, but the company had borne the brunt of the costs. The term â€Å"borne out,† meanwhile, means to corroborate or confirm something: The scientist’s hypothesis was not borne out by the experiments she conducted. Borne vs. Bore It’s worth noting that the verb â€Å"bear† has another past participle: bore. The difference between â€Å"borne† and â€Å"bore† is that the former is passive and the latter is active. So if we’re using the active voice, in which the subject of the sentence is actively bearing something, we use â€Å"bore†: The palm tree bore coconuts. But when using the passive voice the subject of the sentence is not doing anything, so we use â€Å"borne†: The coconuts were borne by the palm tree. It’s therefore important to remember the distinction between â€Å"bore† and â€Å"borne,† as well as the difference between â€Å"born† and â€Å"borne.†

Thursday, November 21, 2019

The Nature Of Leadership Case Study Example | Topics and Well Written Essays - 750 words

The Nature Of Leadership - Case Study Example Such a situation arises from the complex nature of leadership. The only common thread that can be found is that the nature of leadership involves an influencing process and the consequences of this influencing process (Antonakis, Cianciola & Sternberg, 2004). It is for this reason the leadership definition that works for me is focussed on the influential nature of leadership and its implications. Daft and Lane 2008, p.4, define leadership as â€Å"an influence relationship among leaders and followers who intend real changes and outcomes that reflect their shared purposes†. Expanding on the term influence is a key reason for my choice of this definition. The nature of influence here is that it is not passive but active, and it is multidirectional, and without the element of coercion. Furthermore, the influence is not merely from leaders to followers, but is reciprocal in that there are times when the influence flows from followers to leaders. Moving on to another key ingredient in this definition of the intention for real changes, it implies that leadership does not accept a status quo situation, but aims for creating change. This striving for change is based on the shared purposes of the leaders and followers and not on the desires of the leaders. In real terms this means that the created change is towards a desired future state or purpose (Daft & Lane, 2008). This definition also brings us to the important aspect of leadership in that it cannot be present in the absence of followers and that followers are an essential to leadership (Maxwell, 1993). 2. Without followers there are no leaders. What is known about followers? The first thought that comes to mind when we talk about followers is sheep following the shepherd, implying that followers merely follow a leader. This is not essentially true, for there are many in the flock of followers that assist the leader in the influence of leadership, and demonstrate capabilities to become leaders in the future (Yukl, 2006). This perception of followers indicates that followers are made up of different types of individuals. Followers may be classified into five types of followers. The first type we may take as the sheep and they look up to the leader for directing them in all that they do. The second type of followers consists of those that keep saying yes all the time to the leader, or accept leadership influence without any outward sign of opposition and devout their energies towards accomplishing the direction of the leadership influence. The third class of followers consist of individuals that we may term as alienated. These individuals are capable of independent thought and action. The problem here is that they also possess a lot of negative energy that works to the detriment of the group, as the leadership influence is unable to get to them and they make no positive contribution to the shared purpose of the group, rather they work against it. Leadership influence that can remove the negative energy from these followers can convert them to extremely useful members of the group and the leader. The next class of followers are the fence sitters or those that we may term as pragmatists. These followers refrain from accepting the influence of leaders, till such time they are sure that the trend is favourable and then jump on the bandwagon, in the manner that trees sway in the direction of the wind. It is not that they have any opposing views or are capable of contributing positively towards the shared purposes. Self-preservation is of primary importance, and hence the wait and see attitude on the impact of the change influence that emanates from the leader. The final classification of followers may be viewed as star followers. They possess the same vibrancy as the

Wednesday, November 20, 2019

Iphone Essay Example | Topics and Well Written Essays - 250 words

Iphone - Essay Example With the latest iphone, they have a personal assistant assigned in the phone that can do functions of the phone with the user voice control. It is durable and has a great physical design which is the reason many are attracted to buy it. The unique design of this product makes it a unisex phone – it looks equally attractive with all. To top it off, apple provides all its amazing services in one product: the ipod music player, amazing camera, and a phone that can have applications customized according to your needs (Amit, 2007). One of the biggest disadvantages that the phone has is affordability. For majority of the population, buying the phone directly from Apple becomes a problem, but they can buy it from telecommunication companies on contracts for a lower amount. Another issue is Apple’s reluctance to introduce Flash in its system, barring the use of this amazing facility in the phone. It does not have a detachable battery that becomes an inconvenience sometimes to the user and no slot for expanding memory if

Sunday, November 17, 2019

Energy Resources Essay Example for Free

Energy Resources Essay Trade – offs for the energy resources Large scale hydroelectric power This taps the abundant energy resource presented to humanity by Nature in the form of water streams flowing under potential energy gradient presented by natural topography. This energy resource is practically free, practically renewable and exploiting this form of energy hurts the environs to the minimal extent. We can term it as green energy. This form of energy is very advantageous of economic development in remote and hilly terrain, where it is not easy to transport other forms of energy. This has disadvantages and limitations too. Construction of large dam required for large hydroelectric power in many cases leads to rehabilitation of a large population. A large dam (water mass) may lead to unduly high pressure on the tectonic plates and cause earth quakes with disastrous consequences. Besides, such plants have to be constructed in remote and hilly terrains, which is not an easy task in itself. Operation of the plant is made difficult by the silt that comes with the flowing water during rainy season. Passive solar power This converts solar energy into useful form of energy say heat which can be utilized for room heating, water heating etc. This is renewable or non exhaustive form of energy. This is highly eco friendly or green form of energy. This is distributed form of energy in the sense that this is consumed where it is produced, therefore, issues pertaining to energy transportation is not at all there. The features for exploiting can be designed in a building during construction or even retrofitted afterwards. What we get is heat only, which is not very useful form of energy. This is highly localized and can not be transported. This is not useful during night. It is not so easy to incorporate features for exploiting this form of energy in an existing building. This is not at all useful for those regions devoid of ample sunlight. Active solar power This converts solar energy into electrical energy by using photovoltaic cells. This is also renewable or non – exhaustive form of energy. This is green or eco friendly form of energy. This can be stored using batteries. This is also highly distributed form of energy as an active solar panel can be made of each household. This is working even when sun is not there i.e. during night or cloudy hours as the electrical energy can be stored in batteries. The disadvantages are very low conversion efficiency of solar energy into electrical energy. Small scale of solar power plants; large scale plants are yet become a reality and therefore, limited applications. Besides, toxic materials are required for construction of photovoltaic cells required for active solar power. Wind Power This converts energy of naturally flowing air current or wind into electricity. This is also renewable or non – exhaustive form of energy. This is green or eco friendly as it causes no harm to nature. This is available on large and industrial as well as small domestic scales. This can be very useful for development of regions devoid of other energy resources. This energy resource is not easily predictable or controllable. This is prone to seasonal variation as wind pattern follows a seasonal variation. The wind turbine is noisy.

Friday, November 15, 2019

Streak Plate And Viable Cell Count

Streak Plate And Viable Cell Count Aim and introduction should display insight into what the streak plate and viable cell count method are employed to achieve. They should also introduce MacConkey agar and how its selective and differential properties allow the characteristics of the test organism to be determined. Escherichia coli (E.coli) The aim of this experiment is to allow a certain bacterium to divide and multiply enabling us to view the bacteria in a single cell structure. E.coli is one bacterium that is good for such an experiment. E.coli can be said to be both bad and harmless, some E.coli bacteria have are highly toxic and can harm humans and animals. However, the majority of E.coli strains are relatively harmless with low toxicity. These harmless strains of E.coli are found naturally occurring in the human body, especially in areas such as the human intestines. Some E.coli can even benefit their hosts; they do this by producing specific vitamins. It is for reasons like the ones mentioned why E.coli is an appropriate bacteria to use for this experiment. Another reason is that E.coli bacterial cells have an average bacterial size of 2um; this can be seen under a light microscope. Other bacteria however may be even smaller and may require a larger microscope for viewing or even an electron microscope. Also the incubation period for E.coli to multiply and grow rapidly isnt very long and temperatures arent too high or too low. E.coli can be incubated overnight at 37oC and then stored at 4oC until its requirement. The technique use to manipulate and isolate the E. coli bacteria is known as the streak plate procedure. The technique was developed to allow bacteria to multiply and produce many colonies, during the incubation period, depending on the amount of bacteria present. Each colony will contain millions of bacteria cells derived from a single parent cell. (Talk in more detail about this procedure). We will be using this technique to allow the E. coli to multiply and divide splitting itself into colonies. The viable cell count, also known as viability count, is a method used to determine the number of living cells within a suspension, in this case E. coli. To obtain an understanding of how much E. coli cells are present in a sample this method must be put into action. (Expand) The MacConkey agar is specifically designed to allow gram negative bacteria to grow; its a recipe of many substances such as bile salts, sodium chloride proteose and many more. One of the properties of the MacConkey agar is its selective isolation and identification of bacteria; it is a medium that allows us to distinguish gram-negative bacteria. E. coli is a rod shaped gram negative bacteria, so using the MacConkey agar plate to multiply it would be appropriate, the agar will also cause the E. coli to change colour from pink to red, and this is an indication of gram negative bacteria present. A Nutrient agar is a growth medium used for the cultivation of bacteria, this specific agar remains solid even at high temperatures. The gram-stain technique was developed for viewing cells clearly under a microscope and to enable us to establish their structures. It is a very simple procedure of just adding 4 different substances accordingly, however one of these substances is toxic to humans therefore the procedure must be carried out in a fume hood. The gram stain method was introduced by It is important for scientists and medics to know the structure and function and identity of bacteria and viruses, it is for reasons like this why such experiments are carried out. Without such procedures so many bacteria and viruses wouldnt be known and could spread and become out of control. Methods: Explain why each procedure was done highlight key points state any deviation from protocol document any errors or difficulties you had with the technique Discuss the importance of aseptic technique and what steps could be taken to prevent contamination during manipulation of bacteria All methods were doing under aseptic conditions; the reason for this is to prevent contamination of the bacteria during its manipulation. Many errors could arise if aseptic conditions arent used, eventually resulting is wrote results. Streaking bacteria on MacConkey agar method: Prior to the experiment, an E. coli sample was made and given to during the practical. Risk assessment: Materials used: 10ml liquid culture of E. coli the bacteria sample to be use in this practical Sterile plastic loops used for transferring E.coli bacteria from one place to another uncontaminated. MacConkey agar plate used to allow E.coli bacteria to grow as it provides energy recourses and support Sharps bin for loops etc. these are used to keep the laboratory area as uncontaminated as possible and to make sure bacteria doesnt spread Marker pens and labels to label the plate Step 1: using a sterile plastic loop I touched a given sample of E. coli and streaked an inoculum onto a MacConkey agar plate in a specific pattern (see..). This plastic loop is then disposed of into the sharps bin. Step 2: using another sterile plastic loop, I created a run of parallel lines from the edge of the initial streaks Step 3: step 2 was repeated 2 more times with a new sterile loop used. Step 4: a final streak was made, creating a simple streak from the previous streaks into the centre of the plate. The picture below illustrates this. The MacConkey plate was then given to the technicians to incubate. It was important to dispose- on the plastic looks by placing them into the sharps bin because they are contaminated and if they touch any other surface it can lead to the spread of bacteria resulting in major contamination. Throughout this procedure plastic gloves and a lab-coat were worn, also to prevent contamination. Viable cell counts: Risk assessment Materials used: P1000 and P100 pipettes and tips used to transfer certain amounts of PBS etc. Three Nutrient agar plates 10ml sterile PBS buffer, used to maintain the pH Sterile plastic spreaders to spread the E.coli on the Nutrient agar plates Eight sterile bijoux bottles for dilutions To start the dilution, using a pipette I transferred 900 ul of diluents (PBS) in eight different sterile bijoux bottles. The PBS (phosphate buffered solution) solution is a commonly used buffer to maintain a pH; it is used in this practical because of its ability to aid biological research. After the PBS was placed into the labelled bottles, using a new sterile tip for the pipette I transferred 0.1ml of E.coli liquid culture sample (neat) into the first bottle (10-1). For the dilution to continue a new pipette tip was placed and 0.1ml of the 10-1 diluted E.coli was transferred to the 10-2 bottle, this process continued up till bottle 10-8. By doing so the E.coli will become more and more dilute within the different solutions, because less E.coli is being added each time. 10-5, 10-6 and 10-7 samples were then spread onto three different Nutrient agar plates using different sterile plastic spreaders so contamination wouldnt occur. This was done by placing 0.1ml of each dilution onto th e centre of the agar plate and then spreading it over with a sterile spreader. The agar plates were labelled and given to the technician for incubation. Gram Stain of bacteria from an isolated colony Risk assessment In order to stain the bacteria I selected an appropriate colony to stain, the colony must appear to be uncontaminated and its appearance must obviously look grown.. After this procedure is complete, the bacterial cells will be visible under a microscope. Materials needed: Bunsen burner used to heat-fix bacteria onto microscope slide Saline (PBS) emulsifier Light microscope to view bacterial cells Lens tissue to clean the lens Immersion oil for light microscope lens to allow better view at 100x magnification Stains for Gram stain method Before the bacteria can be modified to be viewed under the microscope clearly, the microscope glass slide must be cleaned to prevent contamination. After doing so a drop of sterile saline was placed onto the centre of the slide, the saline drop was placed because it can emulsify any bacterial colony that will be placed on top. To move some of the bacteria off the agar plate onto the slide, a sterile loop was used I touched the bacterial colony on the agar plate with the top of the loop and then spread the bacteria into the saline drop making it thin. Due to the moisture of the liquid I let the slide dry then used a Bunsen-burner to heat-fix the bacteria onto the slide by passing it through a few times then allowing it to cool. Heat-fixing was done so that during the staining the bacteria or wouldnt move or fall off. Once that was complete the slide was moved to a laboratory fume hood where the staining can take place, the follow 4 stage method was used: at first the bacteria sample on the slide was soaked in crystal violet for 30 seconds, after so it was rinsed with distilled water and drained. The second part is to soak the bacteria with gram iodine (mordant) for another 30 seconds then rinse with distilled water and drain it. Gram iodine is a toxic substance; it is for this particular reason why this part of the practical was carried out in a laboratory fume hood. Acetone decolouriser was then added for 10 second and the bacteria was again rinsed with distilled water and drained. The final part is to add Safranin, a counter stain, to the bacteria. It was placed on the bacteria for 30seconds and then the bacteria was further rinsed with distilled water, drained, blotted and allowed to dry. Substance Duration Further action Crystal violet (primary stain) 30 seconds Rinse with water drain Gram Iodine (Mordant) 30 seconds Rinse with water drain Acetone/alcohol (Decolouriser) 5-10 seconds Rinse with water drain Safranin (Counter stain) 30 seconds Rinse with water, drain, blot dry Stain was carried out in a laboratory fume hood due to the toxic gram iodine substance used. The transparent plastic shield of the fume hood was lowered so that only my hands were inside dealing with the chemical and biological substances. Gloves were worn during this procedure so that no stain would come into contact with the skin. When the slide was rinsed with water, it was rinsed gently with distilled water so that the bacteria are not shifted. After the staining was completed the sample can now be viewed under a light microscope and compared to other bacterial samples. The slide is placed on the stage with a drop of oil for immersion, the microscope is focused on 100x and the bacteria is viewed. Results: Should describe your findings in : prose/text, diagrams, tables and graphs which includes a description of growth characteristics and how successful your aseptic technique was MacConkey agar plate results: During the experiment there were no results to be noted as it was too early for anything to occur. After the agar plate containing the E.coli was incubated at 37oC and then stored at 4oC, its appearance was as expected. Colonies were separated, and as the streaks moved on less E.coli was present. The colonies were well distinctive and were round in their shape. The sample initially given was simply liquid, the result showed significant growth of this E.coli liquid into 3D structures. This indicates the growth of the bacteria in a fine way; the 3D structures appeared in a yellowing solid colour. Because the practical was conducted in aseptic techniques no contamination occurred. Aseptic techniques were successful in allowing me to produce accurate results. Viable cell counts My results: The colonies that appeared on the nutrient plate had a badge colour; visually they all appeared relatively same sized and volume. 10-5 10-6 10-7 10-8 TMTC 46 1 For the 10-7 the calculation for the number of bacteria in 1ml of the original culture is: (1107/0.1) x (X/1) [cross multiply] 0.1X = 1 x(1107) [divide by 0.1] Therefore X = 1.0108 For the 10-6 the calculation for the number of bacteria in 1ml of the original culture is: (46106/0.1) x (X/1) [cross multiply] 0.1X = 1 x(46106) [divide by 0.1] Therefore X = 4.6108 The number of bacteria present in 1ml of the 10-5 culture cannot be calculated as there was no value noted (TMTC). X= number of bacteria. The number of bacteria present in 1ml of 10-6 dilution is 4.6108 and in the 10-7 dilution culture is 1.0108. Class results: Pair number 10-5 10-6 10-7 10-8 1 TMTC 46 1 2 95 9 0 3 TMTC 52 9 4 TMTC 23 1 5 34 2 6 84 11 4 7 TMTC 24 18 8 2 2 26 9 102 6 0 10 19 3 3 11 TMTC 140 15 12 TMTC 57 9 13 61 12 0 14 8 6 1 15 195 51 4 16 55 27 3 17 TMTC 94 11 18 TMTC TMTC TMTC 19 TMTC TMTC TMTC 20 TMTC 113 18 Total 266 985 177 28 Average 66.5 57.9 9.8 7 Should describe your findings in : prose/text, diagrams, tables and graphs which includes a description of growth characteristics and how successful your aseptic technique was To determine the amount of bacteria within a culture a simple calculation must be done using my personal results for this experiment. There was no value for the 10-5 so this cannot be done. The result for 10-6 was 46, 46 x 10 = 460ml. To estimate the amount of E.coli present this is further multiplied by 106, therefore 460 x 106 = For the 10-7 result Æ’Â   7 x 10 = 10 Æ’Â   10 x 107 = However, I have selected some reasonable results from the table to calculate an average. Gram-stain of bacteria from an isolated colony: (view method number 3) Gram stains help us distinguish between microbial organisms, for example gram negative bacteria and gram positive bacteria. This method was developed to know the identity of bacteria present. (See procedure for The Gram Stain in the methods section). During step 5 of the Gram Strain Method above the following results were made when applying the four different substances: Substance Colour after stain Crystal violet (primary stain) Purple Gram Iodine (Mordant) Purple Acetone/alcohol (Decolouriser) Transparent (dye was washed off) Safranin (Counter stain) Reddish-pink The appearance of the E.coli bacteria under a microscope with 100x magnification was quite clear; it had a rod-like structure with a reddish-pink colour. The rods were all more or less the same size, however some were packed together and others were on their own. Discussion: Were the results the expected? Did the methods adopted achieve their aim? How the experiments could be improved. Include background information, critical evaluation of results Throughout all the experiments and procedures a lab-coat and gloves were worn to avoid skin contact with bacteria and harmful substances. Overall the aims were accomplished and the results were as predicted. MacConkey agar The colonies were expected to be in such a form, indicating that it was E.coli present and that it has rapidly multiplied into individual colonies. This further suggests that when E.coli is present under conditions where it could multiply, it multiplies by forming a round colony and expanding from there. However, some of the colonies were stuck together making it difficult to count the number of them present. What this means is that the growth of the bacteria was a success and the method adopted was accurate. The reason why some colonies were packed together may be the result of pressing too hard on the agar while streaking, with more streaking practice more accurate results can be obtained with colonies being on their own. The methods adopted for this practical achieved what was aimed for. After the incubation of the MacConkey agar plate the plate was stored for a week at a temperature of 4oC, this may have changed the appearance in colour and in shape of the formed colonies. Contam ination of the agar plate may have even occurred. An improvement to the experiment is to note down results straight after incubation is finished. Gram Stain results After analysing the microscope slide which contains the Gram Stained E.coli under the microscope its features were obvious. There were many average sized rods with a reddish-pink colour, some of these rods were packed together whist others were separated. Comparing this with another prepared sample of B.subtilis, the B.subtilis was a purple colour and has a longer and curved shape, like fine threads. However some again were packed together and others separated. The purple colour of the B.subtilis indicates that it is gram positive, and the pink colour of E.coli indicates its gram negative. When the Gram Stain method was applied to the B.subtilis it obviously stayed purple though out, with E.coli it will decolourise once the decolouriser is added. The gram stain method is highly effective and efficient when dealing with different bacteria; it helps identify them to a great extent. B.subtilis remains purple throughout the Gram Stain procedure, this itself can be an indication that it is a Gram positive bacteria. Bacterial cells have different types of cell walls, the gram negative and gram positive terms describe the nature of their structural differences. One of the important differences is that Gram positive bacteria have no outer membrane whereas Gram negative bacteria do, the purpose of this outer layer is to cover the peptidoglycan layer. When staining occurs the outer membrane of a gram positive bacterial cell wall becomes permanently stained as the strain can easily penetrate the thick peptidoglycan layer, so that if a decolouriser or distilled water is added the colour will remain purple. In the case of the gram negative bacterial cell wall the stain gets attached to the far outer membrane layer (lipopolysaccharide and protein), this layer decreases the penetration depth of the strain on the peptidoglycan, so the stain can be decolourised or removed. The diagrams below illustrate this. Gram positive: Æ’Â   Æ’Â   Æ’Â   Primary stain Mordant Decolourisation Counter-stain Note: colour remains the same throughout addition. Gram negative: Primary stain Mordant Decolourisation Counter-stain Note: colour changes Æ’Â   Æ’Â   Æ’Â   The aim of the Gram Stain method was confirm that the bacteria that was initially being dealt with was E.coli, after tests and results it confirmed that it was so the results were as expected and predicted. The methods used for this procedure were successful at achieving good results, however some can be altered. For example, the E.coli used for this experiment was used from experiment number one, not that that is a problem but when the E.coli was incubated over night and it had successfully multiplied it was stored at 4oC for quite a while (this experiment was carried out 1 week after the first one). This possible may have altered the activity of the E.coli and also its appearance. Many resources state that gram negative bacteria should have a pink colour after the counter-stain has been added and rinsed off. In this case the E.coli bacteria in this experiment had quite a dark pink colour which was really close to the colour red, this appearance of colour was visual both with the naked eye and under the microscope as individual bacterial cells. Viable cell counts As I predicted, the more dilute (10-8) solution will have less E.coli bacteria growing on its surface. As there were 20 different pairs doing the practical, and the dilutions were all done 20 times by different people, there is plenty room for error from contamination of inaccurate measurements. The 10-5 agar plates had many E.coli bacterial colonies growing on it, according to the results there was far too many bacteria that it was too many to count (TMTC). Gradually as the dilution increased the bacteria became less, 10-6 dilution had numbers ranging from 6-140. Obviously with such great difference within what is meant to be the same dilution there was some error/contamination present. The most obvious ones which had error are pair numbers 18 and 19 there was TMTC throughout (10-6, 10-7 and 10-8). What would be expected is that fewer bacteria should be present in the 10-8.

Tuesday, November 12, 2019

Normative and Descriptive Approaches

Decision making can be very difficult when both choices are very appealing. We are faced with many decisions daily and have to make sure we choose the right one. Ethics play a major role in decision making. It allows moral philosophy to play its part. It gives you the freedom to choose right from wrong. In this paper you will be introduced to normal and descriptive ethics. You will be given a definition, a contrast, how the approaches may impact the criminal justice professional, how the approaches are similar and vary, and which approach you feel is best and why. Normative ethics is the branch of philosophical ethics that investigates the set of questions that arise when we think about the question â€Å"how ought one act, morally speaking? † Normative ethics can be divided into the sub-disciplines of moral theory and applied ethics. In recent years the boundaries between these sub-disciplines have increasingly been dissolving as moral theorists become more interested in appl ied problems and applied ethics is becoming more profoundly philosophically informed. Normative ethics is distinct from meta-ethics because it examines standards for the rightness and wrongness of actions, while meta-ethics studies the meaning of moral language and the metaphysics of moral facts. † (Wikipedia. org) This approach is similar to how religious people view their God. They say that God gives the individual the choice to choose what’s right and wrong. Christians also believe that Adam and Eve utilized the power of what’s right and wrong. They were given the descriptive approach by God and they chose otherwise. For any act, there are three things that might be thought to be morally interesting: first, there is the agent, the person performing the act; second, there is the act itself; third, there are the consequences of the act. There are three types of normative ethical theory–virtue, deontological, and consequentiality, each emphasizing one of these elements. †(moralphilosophy. info) â€Å"Descriptive ethics, also known as comparative ethics, is the study of people's beliefs about morality. Descriptive ethics is a form of empirical research into the attitudes of individuals or groups of people. Those working on descriptive ethics aim to uncover people's beliefs about such things as values, which actions are right and wrong, and which characteristics of moral agents are virtuous. Research into descriptive ethics may also investigate people's ethical ideals or what actions societies condemn or punish in law or politics. Because descriptive ethics involves empirical investigation, it is a field that is usually investigated by those working in the fields of evolutionary biology, psychology, sociology or anthropology. Information that comes from descriptive ethics is, however, also used in philosophical arguments. Normative ethics is also distinct from descriptive ethics, as the latter is an empirical investigation of people’s moral beliefs. To put it another way, descriptive ethics would be concerned with determining what proportion of people believe that killing is always wrong, while normative ethics is concerned with whether it is correct to hold such a belief. Hence, normative ethics is sometimes said to be prescriptive, rather than descriptive. However, on certain versions of the meta-ethical view called moral realism, moral facts are both descriptive and prescriptive at the same time. † (Wikipedia. org) â€Å"Descriptive ethics deal with what the population actually believes to be right and wrong, and holds up as ideals or condemns or punishes in law or politics, as contrasted to normative ethics which deals with what the population should believe to be right and wrong, and such concepts as sin and evil. Society is usually balancing the two in some way, and sociology and social psychology are often concerned with the balance, and more clinical assessments and instruments to determine ethical attitudes. † (knowledgerush. com) A criminal justice professional has morals they must abide by to make the right decision. They must know what’s right and wrong, and know how to distinguish the two. Normative ethics impacts criminal justice professionals by allow them to show the criminal to see that what they have done is wrong. It also allows the criminal justice professional to coach the criminal on the consequences of their actions and ways to prevent another offense. Descriptive ethics impacts criminal justice professionals by allowing them to do the norm against the population. They are trying to establish criminal justice when the population may see that all criminals should be punished. I feel that the normative approach to ethics is the best approach. This approach allows one to make his own decision and not follow what everyone is saying. Everyone should be able to make his or her own decision whether it is right or wrong. If you make the right decision, then you reap good things, and if you make the wrong decisions, you reap bad things. The approaches are similar because they stress the value of what’s right and wrong. It shows that a decision have to be made whether it’s right or wrong. They vary because one allows the individual to make the decision of right and wrong, and the other allows the population to dictate what’s right or wrong not giving the individual to make the ethical decision. References http://en.wikipedia.org/wiki/Normative_ethics http://en.wikipedia.org/wiki/Descriptive_ethics

Sunday, November 10, 2019

Story About Myself

It was a struck twelve at midnight on 20th April 1994, one loving couple of husband and wife had been taken to the hospital by the ambulance, because the they will have their second son from their marriage. It was rainig cat and dog. When they arrived at the emergency section case, a gorgeous 9 month pregnant woman were taken out from the ambulance and was rushed to the labour room by the nurse. When the clock 4. 08 in the morning, one cute and adorable baby boy with 3. 45kg weight was born to the world. After one week get home from the hospital, my parents took 6 days to find a suitable name for me and at last they found a suitable and interesting name to me, the name that they gives to me is Muhamad Afifuddin bin Mat Husin. On year 2011, at 3rd January I registeread as a form 5 student after 1 at one of the school in Kompleks Sekolah-sekolah Wakaf Mek Zainab, Kota Bharu, Kelantan it was SMK Putera and also known as Kelantan Sport School. It was my first day at school as a senior student. On these year I will face a national examination known as Sijil Pelajaran Malaysia ( SPM ) examination that will decide my life in the future after I finished my study at school. First and foremost, I would like to tell about my family background . In my family I have 3 siblings 2 boys and 1 girl, include me. The first one is my brother, his name is Muhamad Akmal he was born on 15th July 1991 at Sungai Petani Hospital, Kedah. He know studied at Tun Hussein Onn University of Malaysia ( UTHM ), Johor on 4th January 2011 he registered at the university and start his second semester. The second one is me Muhamad Afifuddin I was born 20th April 1994 at Baling Hospital, Kedah. On 20th April also the date of birth of our prophet Muhammad s. a. w. The last one is my sister Nur Nadiah she was born on 16th March 1998. She was studied at Maahad Muhammadi Perempuan, Kota Bharu, Kelantan. On 3rd January 2011 she registered as Form 1 student at there. I also have 2 loving parents that take care all of my siblings, my fathers name is Mat Husin bin Lebai Mat he was born on 19th December 1957. he works as health care assistant at Klinik Kesihatan Badang. My mothers name is Zainon binti Mamat, she was born on 10th June 1960 and she work as a community nurse at Klinik Desa Kijang. The next things that I want tell is about my characteristics. First one is I’m was a friendly person, I like to make new friend at every place that I visit. I’m also not choosing when I make new friend, now I have a lot of friend and some of them are from different races like Thai,Indian, Christian and Chinese people. Some of my friend I met at school, taekwondo training centre and taekwondo tournament, all of them also a friendly person. The second one is, I’m also a helpful person I like to help all people especially people in trouble. When I’m at school I always help my friend that have problem in study and problem in other thing, I also like to help the teachers when they need a help from me. If we help other people that have problem and in trouble they will help us when we need their help. The last one about my characteristics is I’m also an active person. At school I join Fire Cadet I participate all the event that have been held by the Fire Cadet and school. Join the Fire Cadet was the one of the co-curiculum at school. I also active in taekwondo, I partipate in all the tournament that have been held. In tournament win and lost was the custom in a tournament, if we lost we must redouble our efforts to win in the other tournament and if we win we must maintain winning in every tournament and always increase our performance. In addition, I’m also have many hobbies that gave many benefits to me. My first hobby is playing football, I’ll play football at 5. 0pm everyday at my village near Kelantan’s River. I’ll play football with my friend, we play football for our health sometimes we held a tournament among us and the winner will get present. When we held a tournament like that we can increase our stamina, sporting spirit and join our friendship. My other hobbies is playing cyber games, I’ll play cyber games once a week on Saturday because when school season I’ll focus on my study. When the school holidays coming I’ll play cyber games every day but I also spend my time on my study. Sometimes I play the cyber games at the cyber games and sometimes I’ll play the cyber games at my house, normally I always play at my house. I play those cyber games with my cyber friends that comes from the entire world, I’ll also get many friend when I play those cyber games. I like visit interesting and historic place like Melaka, Pulau Langkawi, Terengganu and other place, that’s also one of my hobbies, when I visits those place I’ll know information about it like history of those place. On the other hands, I have many favourites things likes favourites food, drinks, colour and sport. First is about my favourite food, I like to eat maggie tom yam because I like spicy food, I also like nasi lemak because some state in Malaysia have their own nasi lemak. In state of kedah their nasi lemak is spicy because all people that lives at the north likes spicy food. My last favourite food is char kuey teow original made from Penang their char kuey teow was so delicious. Next, my favourite drinks is orange juice because orange juice has many vitamin C that’s helps in absorb iron. I also like â€Å" teh tarik † because it can prevent iron in the body. My favourite colour is blue, black, orange and white and I always ensure that things that I bought have at least one of those colour. The last of my favourite is sport, my favourite sports is rugby and football in those sports they play as one team and the must have collaboration among the team members if they want to win in every tournament they played. The team also should have a head of an efficient and caring of his team mate. I also like taekwondo because in this game we must have agility of the body and quickly make the right decisions when we sparring in the ring. Last but not least, my ambition or career when I finished my studied at university. I want to be a professional photographer because I likes to takes picture people, scenery and animal, I hope I can have my own photo studio world-class that have all equipment for photoshoot session . I likes these profession when I saw a programs in television that show a professional photographer snap a picture of people, animal and others, their artwork were respected by everyone in the world and some of them celebrities comes up for grabs because of their beautiful artwork. All of them become success person in his life and his profession. Their life full of wealth and luxury but that not the points I like these profession, I like these profession because I want to show my artwork to the whole world and I want they respected and revered it. I also want to be the first Malaysian professional photographer that show to the world that Malaysian people also can be a famous people the world and success in their profession and life.

Friday, November 8, 2019

comparing print and electronic essays

comparing print and electronic essays There are two types of media, the print and the electronic. The print media informs society through newspapers, magazines, and books. Electronic media publicly broadcasts news through radio, television, and recently computers. Both medias informs us on day-to-day events whether the news is local or worldwide but they have their differences. Through media our opinions are influenced and we become socialized. Even though print media seems to be factual and thorough enough, some still feel more partial to the nightly news on television. Hearing the stories is personally easier for society to understand and at the same time remains a reliable source. Because of its visuals, the television is especially powerful in transmitting realism (Graber, 189). Electronic media gives facial expressions and other images that the print media declines in. For example, actually watching the candidates interact with other people on television makes us feel as though we are able to get to know them better and understand their meaning of their decision that they are trying to get across to the American people. The electronic media gives an emotional impact on viewers by showing updated news in action. Journalists receive information during crisis minute by minute allowing them to quickly revise and deliver news to the public. However, the print media would have to wait until the next copy was printed for everyone to get the most recent news. By doing this, the newspapers leave a gap of information that electronic media has the capability to fill. Television shows people what has happened and what they are about to see. Since the journalists seem to put more thought into what they put on paper than what they would say on television, print media tends to more factual and analysis oriented. The print media goes in depth with their coverage where electronic media is straight- forward and only highlights the main topics. The n...

Wednesday, November 6, 2019

tigers essays

tigers essays In Riau, a conservation forest, Sumatran tigers have killed three illegal loggers, including several others over the past week. The first reported attack took place on May 7 in the 150,000-acre Senepis Tiger Conservation Area, which is located near the coastal town of Dumai. For a while now, heavy logging has taken place in Riau, leaving the forest severely destroyed to make way for palm oil plantations. Due to the deforestation, the habitat of tigers has been intruded, forcing them to flee and search for food in the nearby villages or to attack loggers. Police say that Tulus, one of the victims, had been so savagely attacked that only his severed head was left intact when police found his remains. The attack took place on Thursday, when six other loggers, including Tulus, went into the forest to cut down trees. The same tiger that attacked Tulus also seriously wounded two other loggers, and killed two others outside of the conservation area. Even though the loggers were illegally cutting down trees and endangering the Sumatran tigers, I do not believe they deserved to be attacked as severely as they were. The tigers on the other hand, have a right to be overprotective and desperately in need of food. Its like a robber coming into your house and taking all your food. Would you really just let him do that? As a result, it is the loggers fault that they got attacked. First off, they were cutting down trees in a Tiger Conservation Area, hint there are tigers there. Second, they destroyed the tigers habitat and left them to search for food in other places. Third, they were illegally cutting down trees. Maybe the loggers did not deserve to die, but I think the a tiger bite or two would have taught them a thing or two about invading and destroying someones home. ...

Sunday, November 3, 2019

Christine Essay Example | Topics and Well Written Essays - 1250 words

Christine - Essay Example in women or cars and that is perhaps the reason why King used a feminine personification for the car to make Arnie’s relationship with it look like a love triangle, that is, if Leigh is added in the picture. Using a male personification for the car could not have as compelling as when it was given a female name. In the following paragraphs, it will be made clear that if Christopher took the character of Christine, the story would not have been impressive or effective for King’s objectives in the novel. In addition, the standard perception of men in relation to cars, the stereotypical female lover who is possessive, jealous, cunning, devious and their unconventional characteristic of being a hero will be discussed to further explain why Christopher cannot be as an effective character as Christine. Arnie is the bullied type of character in his school and hometown. He is described in the novel as â€Å"pizza-face† with his pimples often oozing and he had only one friend, Dennis. This means, he was the type of guy who surely is still a virgin when his age mates changed girlfriends a number of times already. With such physical characteristics, King’s story would not be believable if Arnie suddenly turns into an extreme character, dating the most beautiful girl in school. Therefore, the author uses an obsession to an old car that Arnie thinks he could turn into a beauty, as the reason for Arnie’s transformation. When Arnie bought the car, there have been changes in his character which only girls can have an influence on in boys, or at least that is how parents often see it. He turned from the â€Å"yes sir/yes ma’am† boy he had been for seventeen years to a â€Å"man† who fights for the things he believes in. Yes, he turned into a man just like when a boy does when he gets his first sexual experience. Although Arnie’s relationship with the car is not sexual at all, the fact that it is named Christine, a female name, it is made to look like he just had his

Friday, November 1, 2019

Perfect competition, monopolistic competition, oligopoly and monopoly Assignment

Perfect competition, monopolistic competition, oligopoly and monopoly - Assignment Example Such market structure reduces output in order to drive up prices and hence increase profits (Tragakes, 2012). Such a firm, therefore, produces less than the socially responsible level of output and manufactures at greater costs than competitive firms. Oligopoly is an industry that has only a few firms that can collude to decrease costs and drive up profits just like monopoly. However, such firms may end up cheating against each other due to strong incentives to cheat on such collusive agreements. Finally, monop0listic competition is an industry that contains many competing firms. The firms sell a similar or identical but at least somewhat different product. The products are highly differentiated in terms of features and prices (OConnor, 2004). The paper discusses the features or characteristics of the dour basic market structures. It then explains the key differences and similarities between the markets in terms of output and price determination. Further, the paper explains whether the allocative and productivity efficiencies can be achieved in the monopoly and perfect competition. The market has numerous sellers and buyers who buy, this reduces the bargaining power that buyers and sellers have, for instance if a seller of Milk tries to increase its profits by increasing the price of milk, the buyers in the market shifts to other milk sellers. The sellers are simply price takers and not price makers. The products sold in such a market are almost the same or identical as other. The products are indistinguishable from each other because they are perfect substitutes for each other. The products are perfectly similar in quantity, quality, size and shape. Commodities like corn, oil and wheat are examples of homogenous products (Kurtz & Boone, 2011). Buyers and sellers are totally free to enter and leave the market. There is no restriction imposed on the entry and exit of buyers and sellers. The firms get normal

Wednesday, October 30, 2019

Transformational Change Management Plan Essay Example | Topics and Well Written Essays - 1250 words

Transformational Change Management Plan - Essay Example Apple is an American tech giant and a multinational corporation whose headquarters is in Cupertino in California, USA. Apple is in the business of designing, developing and selling computer software, consumer electronics, personal computers and online services. So as to save time and cut costs, Apple normally outsources thousands of its manufacturing jobs to such countries as China, Mongolia, Taiwan and Korea. Thus the manufacturing of high-tech products such as iPhone has steadily moved to Asia from the US over the past decades. Thus, Apple, considered, a market leader in the smartphone industry in regard to manufacturing, is totally dependent on outsourcing/offshoring manufacturing, especially in China-a relatively low cost nation (Moyer, 2012). Apple’s stakeholders welcomed the move since the company tremendously reduced its manufacturing time and cost, two very critical elements in the lifeline of any company. Thus, in 2007, when Apple’s founder Steve Jobs needed a glass screen for the iPhone barely a few weeks before its launch, suppliers in America claimed it was not possible. Nevertheless, a factory in China, built a dormitory even before any contract was signed so that its workers could start a 12-hour shift. After the sealing of the deal, 8,000 employees were woken from sleep, provided with tea and biscuit and began fixing glass screens into the iPhone so as to produce ten thousand iPhones on a daily basis. That is how a Chinese factory helped save the situation by revamping manufacturing of the iPhone barely weeks before it appeared on shelves. Eventually, Apple had redesigned the screen of the iPhone at the last minute, resulting in an overhaul of the assembly line. New Screens started arriving at the factory near midnight. Apple executives were impressed by the flexibility and speed which no American factory could match. Thus,

Monday, October 28, 2019

Race and Gender Schemas Essay Example for Free

Race and Gender Schemas Essay A person’s gender schema affects how they treat all other people regardless of age, race, or social position; because we assume that everyone fits into one of two categories: male or female. There are other cultures that do not have a binary gender schema, and allow people to occupy a â€Å"third position† combining traits that Americans would see as male or female. It is unfortunate that gender schemas are so restrictive and create expectations and judgments about people’s authentic selves that can damage the psyche (Valian, 208). As a way to navigate the social world, gender schemas can be important, but like schemas for race and social class, they can reinforce hierarchies that restrict a large part of the population. Below, I will talk about my own gender schema, how I view the gender schema of my society, and how it could be changed to better As media becomes an ever more powerful force in shaping the worlds perception of itself, an individuals struggle to maintain a unique identity and self-understanding apart from media influence becomes increasingly difficult. Damaging to the idea of the self are the racial, gendered, and class-based stereotypes (always artificial and frequently physically, fiscally, and emotionally unattainable), which are broadly perpetuated and, because of their persistence, are apparently not broadly questioned. The prevalence and power of gender (especially female) stereotypes in the media are addressed in this p My own gender schema has changed radically from when I was younger. I can remember asking my mother â€Å"is that a boy or a girl? about a person whom my mother identified as a woman, but who had a very square, angular face with large eyes. Later, I learned to incorporate larger scale features (curvy hips or breasts; large shoulder-to-waist ratio) into my schema. Although I was raised as a girl and have always looked female (if not always perfectly feminine), I don’t always â€Å"act like a girl† – I am somewhat aggressive when playing sports, I’m not shy about asking questions, and I’m sometimes stoic about my emotions. This reflects my gender schema for males: â€Å"typical men† are aggressive in sports, readily ask questions, and do not express emotions. By contrast, â€Å"typical females† in my gender schema are concerned with their appearance, are not aggressive on the playing field, tend to be shy if they ask questions, usually assume that they are not in a position of authority, and express their emotions freely. My schematic representation of male and female physical features has relaxed slightly since childhood; plenty of the women I was with in high school were more angular than curvy. Even though I grew up in a fairly enlightened part of the world, men and women still used nonconformity to gender stereotypes/schemas to insult each other across group lines (women insulting men for being too female-like; men insulting women for being too male-like). Also, I was more cautious of people who did not fit my gender schema, because these schemas predict behavioral and cognitive tendencies, however unreliably. Although our society has changed significantly even in the past 30 years, gender schemas themselves are still very restrictive. It may be the case that fathers have increased their contribution to childrearing time so little because the gender schema for males still dictates that a man spend the best hours of his day at his job (TenenbaumLeaper, 616). Women are expected to conform to people’s gender schemas by liking children and being caring, sympathetic people – all qualities of good mothers. However, it is never clear that every woman you meet wants to be, or is even capable of being, a mother. Many people still retain a gender schema that does not allow for women in positions of power in the workplace. The industrialized nations’ gender schemas â€Å"support a sexist society by propagating an ideology of an innate and entirely pervasive, sex determined social structure† (Devor, 147). This is as bad for men as it is for women. For every woman passed over for promotion at work because their boss’s gender schema classifies them as a â€Å"mothering type,† unsuited for the fast-paced world of their chosen industry, there is probably a man in a high-pressure job that would like to ask for paternity leave, but doesn’t want to be belittled by â€Å"the guys. From my perspective as a woman, and as someone who has felt pressure to conform to a feminine gender schema, it seems like women get a worse deal if everyone uses the male/female gender schema in which typically-feminine behavior includes letting other people have their way, assuming you are not in a position of authority, and paying more attention to your appearance than your skill set. For gender schemas to change in society at large, gender schemas must change for children. The best way to do this is by exposing children to gender-atypical men and women in an accepting way, expanding children’s gender schemas and symbolically making it acceptable for men and women to be as â€Å"masculine† or â€Å"feminine† as they feel like. Another way to take the claws out of the American gender schema would be to legitimize between-gender roles, either by working towards acceptance of transgendered and transsexual populations or by studying the gender schemas of other cultures as a way to shift our own prejudices about what constitutes â€Å"maleness† and â€Å"femaleness. Shifting our gender schemas will allow people’s inherent strengths and weaknesses, rather than their adherence to stereotypes, to be the most important determinant of how we treat others. Heightened public awareness of both the existence of and potential damage caused by these stereotypes is essential if they are to be eliminated. Frequently, though, they are d ifficult to combat and even to identify because of the ways in which they are presented. Overwhelming amounts of time and energy are devoted to uplifting a small, specially selected portion of the population as models of physical perfection. These individuals are, predominantly, television and movie celebrities, fashion models, and sports figures. The glamorous ways in which these occupations are portrayed by the media are seemingly impossible to separate from the physical appearance of the people who hold them. The glamour that surrounds the media presentation of the lives and careers of these individuals extends, not surprisingly, to the clothes that they wear and the way that they look. In fact, so much attention is given to celebrity appearances that entire television programs are devoted to little else but visual exploitation of celebrity clothing and their tangible products of their latest fad workouts. The media presentation of the celebrity body has a single unifying thread, regardless of the specific job title of a given celebrity. Celebrity bodies are desired, both subjectively and objectively. The media, without question, shapes this public response. It can be argued (and has been, on many occasions) that, because the media portrays celebrities bodies as attractive, desirable, and good, they become national symbols of these characteristics. Conversely, bodies that do not meet this lofty goal frequently are, consciously or unconsciously, regarded as bad or ugly. Consider the most recent (and extremely popular) advertising tack used by Subway, the national fast food sandwich chain. Jared, the protagonist of the recent slew of television commercials, allegedly lost hundreds of pounds while on a diet consisting primarily of the chains fare. Jareds before pictures show him considerably larger than his current size, but they also show him alone, with no friends or family. In stark contrast, however, his after action shots consistently show him not only thinner, but also constantly in the presence of a beautiful woman, presumably his significant other. The advertising message is clear: fat=bad, ugly, unhappy and alone, thin=happy and with attractive partner. Through these commercials, Jared has assumed celebrity status, solely on the basis that his body has changed to approximate more closely the current standard of attractiveness. Sadly, though, there is a severe disconnect between the male and female body types lauded in the media and those of the public at large. A shockingly small minority of the population has the genetic dispensation to match with what the media purports to be attractive. For women, desirable physical characteristics (as they are portrayed in the media) include being thin, long-legged, slim-hipped, and large-breasted. The media-portrayed desirable physical characteristics for men include being muscular and possessing a full head of hair. Some characteristics are portrayed as desirable in both sexes, such as being tall, fit, athletic, young, and light-skinned. In the gap between what is implicitly beautiful in the eyes of the media and the physical reality of the popular majority flourishes a market of self-improvement products and services, ranging from hair dye and makeup to tanning salons, dieting, and plastic surgery. It seems as though nearly everyone, at some point in his or her life attempts to alter him- or herself in a physical way, in order to conform more closely to the marketed norm of attractiveness and desirability. Television, magazines, and newspapers are filled with advertisements promoting self-loathing, while offering miracle, body-altering cures. The body that does not conform to a sexy, sleek stereotype becomes a thing to be hated, improved upon, and generally tortured into submission. A portion of the damage caused by such a mentality is quantifiable, though observation of the huge profits accumulated yearly by various diet programs and plastic surgeons. The harm of this presentation of the human body can also be seen in our current societal epidemic of disordered eating, including anorexia, bulimia, over-exercising, excessive dieting, and over-anxiety over food. While the population subset living with and recovering from disordered eating is still predominately composed of women, the number of men with disordered and dangerous eating habits is on the rise. In addition to physical damage, intangible psychological harm results from body image problems to which the media contributes daily. When men and women are faced with the implication that their bodies, if they fail to conform to an impossibly stringent set of standards, are unattractive, unhealthy, and unlovable, they begin to lose confidence in themselves. The perception that a single, narrow range of body types is acceptable and healthy for men and women is not only in error, but contributes to widespread social discontent. Instead of celebrating the diversity and beauty of the human form, the media stifles our desire to feel comfortable with ourselves in an attempt to fool us into supporting a billion dollar self improvement market, from which the media garners tremendous financial benefits. In addition to (and perhaps more devastating than) the physical and emotional damage caused by the current media-driven obsession with achieving an arbitrary physical perfection, our society faces losing serious social perspective. As it is currently used in the media, the body is stripped of its uniqueness and forced into frustratingly narrow constraints: good/bad and attractive/unattractive. Little or no public attention is given to the countless other factors around which a persons identity is structured: kindness, generosity, honesty, friendliness, work ethics, personal motivation, intelligence, and spirituality. By focusing too intensely on the physical, our society risks losing sight of the fuller sense of what people are, and what makes us truly beautiful. My LAP is going to talk about a personal experience that I have encountered with a family member. I have a brother who fits the schemas that we have spoke about in class. I feel that my brother has been dealing with identity issues for a long time since his childhood. How do you deal with being something that you don’t feel you are? Being in this class has me see that everything is not black and white. Schemas are just a stereo type and everyone that may be something does not always seem to be the case. Sometimes there are many reasons that people feel that they are a part of a schema it can be caught up in how people act. Many things on TV make people want to try things like being attracted to the same sex. But sometimes it can be what is going on in your environment. Sometimes I feel that I am a part of a schema I am one of the only black females at my job that is around wide variety of Reform Jews and to me I feel sometimes that I am not suppose to be there but I hold my head up high and keep my enthusiasm very high. So schemas are every day and it just does not have to be about sexuality.