Featured Post

The Operation Of The Smart System Construction Essay

The Operation Of The Smart System Construction Essay Kuala Lumpur is the capital of Malaysia and turns into a notable worldwide city with...

Wednesday, December 25, 2019

Class and Race in Faulkners The Mansion Essay - 2602 Words

Class and Race in Faulkners The Mansion In The Mansion, the last of William Faulkers Snopes Trilogy, Flem Snopes is killed by his daughter Linda and his cousin Mink because he betrayed family and clan ties. Flem used his wife Eula for his success and finally drove her to suicide. He also took advantage of his daughter s love for him and tried to deprive her of her property. When Mink, detained on a charge of killing Jack Houston, desperately needed Flems help, the cousin didnt even appear. They took revenge on him for his betrayal. The story, though, as Cleanth Brooks pointed out (Brooks 227-28), can also be read as of a class struggle: a capitalist Flem is killed by a communist Linda and a poor white, a member of the†¦show more content†¦Hits all right he thought Hitll go this time.... (702-3) What was the motive, then, of the Houston killing, which we seem to be strongly asked to refer to when we examine the Flem case? The direct cause was trouble over Minks cow, but behind it there was a wide gulf between the rich and the poor, a class difference between the landed class and poor whites, which may have made Mink angry enough to kill Houston. He saw Houston as a durn surly sullen son of a bitch that didnt even know he was lucky: rich, not only rich enough to afford a wife to whine and nag and steal his pockets ragged of every dollar he made, but rich enough to do without a wife if he wanted: rich enough to be able to hire a woman to cook his victuals instead of having to marry her. Rich enough to hire another nigger to get up in his stead on the cold mornings and go out in the wet and damp to feed not only the beef cattle which he sold at the top fat prices because he could afford to hold them till then, but that blooded stallion too... (340). Each afternoon ... he would walk up the muddy road ... to watch Houstons pedigreed beef herd, his own sorry animal among them, move, not even hurrying, toward and into the barn which was warmer and tighter against the weather than the cabin he lived in, to be fed by the hired Negro who wore warmer clothing than any he and his family possessed, cursing into the steamy vapor of his own breathing,Show MoreRelatedA Rose For Emily Character Analysis1269 Words   |  6 Pages A Rose for Emily William Faulkner’s, A Rose for Emily, is an account from an eye witness’ perspective of the life and dilemma of a noble woman belonging to the bankrupt aristocratic family in the late nineteenth century. It’s a tale of a woman who due to her seclusion at the hands of her father and severe critique by the society turns into a mentally unstable person. The character of Emily is intriguing in its stubbornness of defying the changes around her. She is set in her ways and unwillingRead MoreReview Of Absalom, Absalom ! By William Faulkner1978 Words   |  8 Pagesbetter than his father and equal to the upper class. In a sense, he has a desire to be the son who has more than father and then be the the unsurpassed father himself. However, it is intriguing how Thomas expects his son to react to him, considering that he may hold the same mentality as his father. Nonetheless, this concept is out of reach since Thomas doesn’t place value his relationship with his father, therefore does the same with his children. Faulkner’s Thomas Sutpen is one who reject the pastRead MoreHistory of the Development of the Short Story.3660 Words   |  15 Pagesfiction such as Victor Hugo’s The Hunchback of Notre Dame and from Sherwood Anderson’s characters in Winesburg, Ohio (1919). These settings and characters are often echoed in Southern fiction, with Civil War-era mansions and characters who are physically or mentally grotesque. Faulkner’s stories often fall under this category, as they probe the deep recesses of the human psyche while experimenting with fictional forms. In one piece, â€Å"That Evening Sun† (1931), Faulkner traces a surface story about

Monday, December 16, 2019

Hamlet Corruption Essay - 1040 Words

In the play Hamlet, corruption, cruelty and uncertainty are portrayed. The idea that the human condition is corrupt and cruel shows that Hamlet has been hurt by something or someone in his past, and it gives an emphasis on his hurting. The thought of uncertainty is Hamlet’s point of view that we are uncertain of what life beholds thus that is why we as people never give up on life, we want to know what is next. Human nature makes the people want to know more, they want to know the future. First we shall start with the corruption portrayed in the play. Hamlet attempts separate his noble qualities, from the circumstance and treachery with which he has struggled, and in which he has been entangled. As a prince Hamlet cannot avoid ruling, but†¦show more content†¦The two try to spy on Hamlet, but Hamlet knows their reason for coming and plays with their minds as they do to him. After Hamlet kills Polonius they are told to take him to England so he can be executed for Polo nius’ murder, and they accept without thought for their friend, only to get what they want, money and fame. Ophelia, Hamlet’s girlfriend was the next to betray him. Her father told her that she may never speak to Hamlet again because he was making a bad impression on her. She did what she was told because she was afraid of her father, Polonius. When she went to tell Hamlet he was already depressed and the news sent him over the edge. He fumed about this and called Ophelia names over and over again to put her down for what she did. He tried to say he didn’t love her, but he always did and after she turned her back on him he had no one to turn to. I believe that Ophelia was the one that finally pushed Hamlet over to the edge into insanity and it ended up killing Ophelia’s whole family (Cooper, Alyssa). Finally we have come to the idea of uncertainty portrayed in Hamlet, the idea of wanting to know what is in store for us, as humans, next. Hamlet contemplates the certainty of an afterlife in Act III, Scene I: â€Å"To die, to sleep. To sleep, perchance to dream—ay, there’s the rub, for in that sleep of death what dreams may come when we have shuffled off this mortal coil, must give us pause.† This quote here is seen/heard during one of Hamlet’s soliloquys. ItShow MoreRelatedCorruption and Mortality in Hamlet Essay2087 Words   |  9 PagesCorruption and Mortality in Hamlet Hamlet is arguably one of the most complex characters in literature, and most certainly within Shakespeares realm. He can be both weak and admirable, and he defies the explanation of many readers I am sure. Death is a constant presence in HAMLET, right from the beginning of the play the themes of death and mortality set in with the death of King Hamlet. From then on, young Hamlet cannot stop questioning the meaning of life and more importantly, its eventualRead MoreEssay on Corruption of Christianity in Shakespeares, Hamlet664 Words   |  3 PagesIn the play Hamlet, the motif of suicide is used throughout the play to shine a light on the corruption of Christianity and the implications of suicide and the after-life and the effect it has on one’s relationship with God. It accomplishes this through the use of allusions and metaphors and the development of multiple characters relationships with God throughout the play as they go through the challenges and experiences that are p resent within Hamlet. In Hamlet, the act of suicide is a motif, howeverRead MoreEssay about The Corruption in William Shakespeares Hamlet891 Words   |  4 PagesThe Corruption in William Shakespeares Hamlet Central to the plot and the themes developed in Shakespeares Hamlet, are the varying elements of corruption which occur during the play. This is echoed in Marcellus famous comment of Something is rotten in the state of Denmark, when Hamlet is beckoned away by the Ghost (1.4.90). As the play continues and the story enfolds, it becomes apparent that there truly is something rotten in the state of Denmark, and rather that it is not justRead MoreThe Corruption of Denmark in William Shakespeares Hamlet Essay2181 Words   |  9 Pagesentirely free from corruption. Nevertheless, if corruption is strong enough, it can hinder the good governance and decay the fabric of society. It is an obstacle to sustainable development, and leaves little room for justice to prevail. Throughout the play, Hamlet, by William Shakespeare, a corrupting disease plagues Denmark and the people within it. The incestuous marriage between Gertrude and Claudius, in addition to murdering King Hamlet, is the main example of deceit, corruption and evil. ThroughoutRead MoreImages of Corruption and Deception in Act 1 of Hamlet Essay469 Words   |  2 PagesImages of Corruption and Deception in Act 1 of Hamlet In the play â€Å"Hamlet† corruption and deception are shown with the use of many images. This suggests that corruption and deception are central to the play. I am going to look at only the first act of the play to discuss the ways in which the images are used. Polonius is considered to be one of the main deceptive characters in â€Å"Hamlet†. Shortly after he is introduced, we learn that he plans to have someone spyRead MoreCorruption: The Good, The Bad and The Decayed Essay879 Words   |  4 Pagesoften convey corruption within a story. The use of this particular imagery allows one to make a connection between the natural world and the nature of people. Throughout Hamlet, a play, set in Denmark, which was written in the early seventeenth century by William Shakespeare, there are several instances where one sees decay depicting corruption. Though this play is filled with massive images of decaying nature, it is also filled with images of nature in its beautiful state. Because Hamlet portrays decayingRead MoreThe Death Of Hamlet By William Shakespeare1325 Words   |  6 Pagesbe seen in Hamlet, when King Hamlet dies in the beginning of the play. Hamlet, like any other Shakespearean tradgedy, contains a series betrayal and death. Hamlet seeks revenge when his deceased father’s ghost tells him that his uncle, Claudius, murdered him. Since Hamlet’s grief for his f ather was expressed more than any other character, the strong bond between Hamlet and his father is clearly seen. Along the way, death finds other characters and corruption follows. Throughout Hamlet, death becomesRead MoreImagery of Disease in Hamlet by William Shakespeare Essay1574 Words   |  7 PagesImagery of Disease in Hamlet by William Shakespeare The disease imagery in Hamlet serves to constantly remind the reader of the initial problem in the play: King Hamlets poisoning by his brother. After hearing his father graphically describe the murder, it is constantly on Hamlets mind. For this reason, many of the images that Hamlet creates in the play are connected with disease and poison. The literal poisoning becomes symbolic of the rest of the events of the play. Remember that poisoningRead MoreHamlet as So Much More Than a Traditional Revenge Tragedy Essay1713 Words   |  7 PagesHamlet as So Much More Than a Traditional Revenge Tragedy Although Shakespeare wrote Hamlet closely following the conventions of a traditional revenge tragedy, he goes far beyond this form in his development of Hamlets character. Shakespeares exploration of Hamlets complex thoughts and emotions is perhaps more the focus of the play rather than that of revenge, thus in Hamlet Shakespeare greatly develops and enhances the form of the traditional revenge tragedy. Read MoreFeminism in both Hamlet and Lady Oracle Essay1179 Words   |  5 PagesThe literary works, Hamlet and Lady Oracle, chart both the life’s course of their main characters and underline the protagonist’s trajectory in some decisive moments of their existence, when both of them, Hamlet and Joan Foster, need to take some decisions which may change their destinies. In this brief essay I will try to point out similarities and differences between these two stories taking into consideration a feminist approach. First and foremost I would like to mention what do I mean by

Sunday, December 8, 2019

Parenting Styles Essay Sample free essay sample

Option 1: Think of how Baumrind’s theoretical account for rearing manners might use to learning manner. Discuss how each of the four manners ( autocratic. permissive. negligent. and important ) might `look` in the schoolroom. Give illustrations from your ain experience or make scenarios to exemplify. Be certain to include illustrations of behaviours and interactions to back up your connexions. When parents have childs. the last thing they have on their head is a scenario of them and their future kids fighting with subject. More mature grownups may speak about something on raising and conveying up kids and in go throughing. show how each of their parents treated them particularly when they were turning up. But formal treatments on this issue seldom occur. Whenever people start to speak about spanking. it is predictably true that at most times a het statement will result. Baumrind’s theoretical account studied the three chief attacks that parents demonstrate at place as he observed chiefly among schoolchildren which subsequently were corroborated among their households: autocratic. permissive and important. The 4th though he was able to detect – the negligent type – was subsequently developed by another behavioural scientist. Authoritarian parents are really rigorous and demanding while the nurturing facet is missing besides ; the issue of control plays a big portion. Permissive parents are really loose and nurturing is really nil as good. The important parents have both control and nurturing at a balance. The effects of these in kids and in their public presentation in school are clearly manifested every bit good ( Horton-Parker. 1999 ) . Discipline is perceived today as a rough word. In first universe states like the United States. Torahs are in topographic point to minimise the incidence of child ill-treatment and maltreatment. There are narratives of filicide. neonaticide and infanticide hitting the headlines. and although rare. this sends a strong signal to behavioural scientists that the prevalence can non be underestimated. To train or non is possibly one of the troubles any parent or guardian possibly confronting in the context of US Torahs. The elaborateness of the affair is non because parents do non like to make it. In most instances. it is merely fielddifficultwork. Discipline is defined as the preparation to move in conformity with regulations ( Webster’s Dictionary ) or the â€Å"practice or methods of guaranting that people obey regulations by learning them to make so and prosecuting them if non ( Microsoft Encarta Premium Suite 2005 Dictionary ) . † In the context of the place. rearing duties denote child-rearing. which includes the â€Å"experiences. accomplishments. qualities and duties involved in being a parent and in instruction and lovingness for a kid. † A comprehensive survey onUnderstandingChildMaltreatmentandDisregard( 1993 )by theCommissiononBehavioralandSocialSciencesandEducationreveals that instances reported to societal services bureaus in 1990 alone had reached two million kids. Between 1979 and 1988. at that place reported around two 1000 ( 2. 000 ) kid deceases every twelvemonth from disregard and maltreatment ( www7. nationalacademies. org in McCain et Al 1993 survey ) . In 1990. Daro and McCurdy ( 1991 ) presented in their survey thereportedinstances of 160. 000 of those who had serious hurts ; that in one twelvemonth entirely ( www7. nationalacademies. org ) . For this ground. this state took strivings to forestall maltreatment and deceases by mandating how kids should be taken cared of. The State has â€Å"encroached† to a point on how parents ought to train and convey up kids. Literature is rich in the manner subject is to be applied. General regulations apply for all kids. These regulations include proper and sound communicating. This means that parents know what they want their kids should stay to and the bounds that are built-in. These regulations and all regulations should be communicated clearly. This besides implies certain sum of clip spent in detecting and looking into affairs that concern the kid and his/her universe. In child communicating. repeat is a must. and for parents who do non like to verbalise a batch. this is certain to necessitate some alterations in them. On the other manus. parents who are travel overboard and nag. this is rather a challenge for them every bit good. Discipline is non merely the application of bodily penalty or whatever signifier of penalty a parent may take. Communication. like keeping a household meeting. praising the kid or listening to them. and deciding their struggles are all portion of subject. As seasoned parents would state. no sum of penalty or support for that affair would be effectual if the parents had non invested clip. quality clip with their progeny. Another general regulation using to all phases is thegivingof congratulations when appropriate andwithholdingof privileges whenever kids disobey. The critical thing here is clocking. In instances such as noncompliance. parents should hold had clearly defined effects. This is what is meant bydifficultwork. Parents think in progress of what the kineticss within the household should be and non simply passively wait what will blossom in their household system. This impliesadulthoodin the pure sense of the word. Parents should analyze their kids at their assorted phases. If a parent has known his/her kid at the early phases. he/she should go on to make so in the following developmental phases. If possible. the parents should be able to undergo a parenting class to understand kids and striplings in all the countries of their lives as they grow up. Psychologists have devoted clip for researches to look into the critical times that parents should be cognizant of in every phase of the life span. For illustration. during the adolescence phase. parents must cognize many things that occur physiologically in their teens. Adolescents will do roseola determinations that may harm him/herself. Harmonizing to an account on Piaget’s formal operations phase. an person may see many possibilities in life. may be able to successfully manage crisis at most times. every bit good as analyze bing premises ( Papalia et al. . 2002 ) . Additionally. a research done by Flavell. references the accretion of experiences which may consequently act upon the determination devising procedures ( Papalia et al. . 2002. p. 427. in Flavell et Al. . 1999 ) . However. for striplings. decision-making capacity is more critical due to some of import considerations. This is accentuated based on recent encephalon researches. Adolescents make roseola determinations due to the intervention of emotions in their logical thinking procedure. Neurobiological experts suggest that the adolescents’ immature en cephalon development may really allow emotions blockade or â€Å"override reason† ( Papalia et al. . 2002. p. 428. in Baird. 1999 ) . This explains a batch why teens become really emotional inspite of the facts presented before them. If parents merely become painstaking during the early formation or cardinal phases ( birth to seven old ages old ) . they should go on to be at that place with their teens in the pubescence old ages and aid with the passage. Parental disregard is decidedly a signifier of parental maltreatment. It is defined as a neglect of the cardinal duties on the portion of parent. or parents. to supply for the child’s emotional. psychological. and physical development. When parents fail to supply an ambiance where a kid can experience loved. wanted. and sheltered within place environment. parental disregard is taking topographic point. If the parents are invariably physically unavailable. or physically present but inattentive to the child’s legitimate demands. they are basically abandoning their primary responsibility as defenders. Although non easy identified as physical assault. parental disregard is every bit serious and as damaging to a kid ( Hay. Tom. 1997 in Rodgers. 1994. p. 14 ) . Parental subject has been redefined today as anyone would hold wanted it defined to function their intents. It should be clearly demonstrated though that kids really will cognize what is just or non if and when. regulations were laid out really good to them. It besides helps if they know that their household has its ain civilization and that civilization should be respected by every member in the system. When parents take clip to do their kids experience appreciated. loved and nurtured. their demands met. the return will be big. The society will harvest the benefits every bit good. Children from parents who invest clip. attempt and resources to these most of import people in their lives will non be liabilities but assets to their ain coevals. From Pediatricians Christophersen and VanScoyoc ( World Wide Web. dbpeds. org/articles/detail. cfm? TextID=47 ) . they recommend the undermentioned brief. easy comprehendible and really helpful usher in transfusing subject on kids. Appropriately called asBehavior direction information for parents.these two physicians clarified that the best manner to acquire into most of children’s behaviour jobs is in the attitude of parents ; they should non merely be defensive in nature. Harmonizing to them. the mean parent attack rearing in â€Å"how do I stop† attack like believing for solutions when a misbehavior or misconduct has been done. Rather. parent must get down set uping wonts and developing their kids to get the ability to minimise the parents’ usage of penalties of any sort. Option 2: A adviser on pack behaviour one time told me. `We all belong to packs. ` What does this statement mean to you? Please bind your ideas to the stuff presented in Chapter 17 by comparing illustrations of ways that ordinary group associations differ from pack associations. A big part of all juvenile misdemeanors ( between two-thirds and three-fourthss ) are perpetrated by young persons who are members of certain packs ( Venkatesh. 1997 ) . Unlike in school and their household. these have no rigorous regulations to be followed except trueness to the group. It gives immature people esteem when they somehow experience they are the â€Å"rule† in themselves. This is the enticement of packs. It gives the promise of fulfilment to would be delinquents. Popularity. entree to the powerful figures on the streets. freedom to show one’s ego. every bit good as easy flow of money ( if the pack is besides involved in some illegal activities such as drug traffics. which is common in most packs ) are apparently within appreciation of anybody who merely have the backbones to make bold ( OJJDP. Mar. 2003 ) . Childs who are good taken attention of by their parents and are therefore adequately supervised are at less odds to be involved in condemnable activities. Surveies have proven that. A dysfunctional household. on the other manus. which is normally characterized by regular struggles. parental carelessness. hapless communicating because of soaking up to outside activities by parents. are ever assumed to be the genteelness land for delinquents ( Venkatesh. 1997 ) . Because household is the true genteelness land for accomplishment and true success. great importance is now being given for the wellbeing of this of import unit of the community. Children’s accomplishments and/or public presentation in school are straight influenced by their parents more than the school itself. The parents’ moral. emotional. and fiscal capacity are basic for children’s early preparation: e. g. the acquisition of educational resources depends so much on the parents’ finding to obtain them for the sweetening of their children’s instruction ( Wiig. 2001 ) . Mention: Rearing Manners: Nature of Gang: hypertext transfer protocol: // : World Wide Web. cato. org/testimony/ct- wc67. hypertext markup language.Accessed Dec. 2006. Service Needs.edited by R. Loeber and D. P. Farrington. Thousand Oaks. CA: Sage Publications. Inc. . pp. 323–338.

Sunday, December 1, 2019

Product Liability Essays (1493 words) - Tort Law, Product Liability

Product Liability This weeks question concerns liability and moral responsibility in consumer products. As the question is multi-part, the answer will be likewise. To begin, the first question addresses who should be liable for the voluntary actions of others. Specifically, if substantial information concerning the hazards of a product or service has been offered to the consumer, who is to blame if someone is injured? Similar to most questions derived from this course, the answer is it depends. From a legal standpoint, the contract or arrangement must first be analyzed. If, for example, the activity is a high risk activity such as sky diving or feeding sharks on a scuba dive, then the legal concept of duty of care obviously plays a major role. Without sufficient training, education, and discussion of the inherent risks, potential problems, and possible results of mishaps, the seller is not fulfilling his or her duty warn the buyer of known risks or hazards. In this case, the seller would be legally required to warn the buyer that a failure to exercise reasonable care poses an unreasonable risk of harm (McCarty, 279). If the buyer has been properly apprised of the level of care necessary to avoid unreasonable risk, the buyer then assumes the risk, and subsequent liability, should tragedy occur. This is due to the Assumption of Risk liability defense that states that if the plaintiff knew, or should have known, of the risk inherent in a particular situation and voluntarily as sumes that risk, then the defendant is not liable for the plaintiffs injury even if the defendant was negligent. In this case, if the sky diving company requires 4 hours of classroom training before the first jump to thoroughly cover the risks of the activity and the prospective jumper voluntarily assumes the risks, then the skydiving company can not be held liable if the jumper breaks his leg on touchdown because he could not hear when the instructor calls for the flare upon touchdown. In an ethical light, this arrangement of reasonable liability division is in keeping with our understanding of moral rights in the economic sense. According to the negative right of freedom of consent, all parties should be free to make any arrangement to which both parties agree. It is a moral imperative in this free consenting agreement or contract that both parties fully disclose all pertinent aspects of the arrangement, in this case, the disclosing of the inherent risks involved with jumping out of an airplane (Velasquez, 330). Once both parties are satisfied with the conditions of the agreement, they are free to commit to the agreement via contract. The buyer has freely accepted the risk of the product, and the seller has fulfilled his obligation to provide enough information for the buyer to make an educated decision. The liability transfers from the seller to the buyer once both parties have freely and knowledgeably entered the contractual agreement. In this arrangement, the r ights of all parties have been preserved. Additionally, this arrangement fulfills the deontological requirements of an ethical contract. The seller has a moral duty to provide the safest product possible in relation to the nature of that product. The seller also has an obligation to disclose information about his or her product that could cause unreasonable harm if not carefully managed. Under the Due Care theory, the seller is required, as the more expert of the parties, to ensure that the buyer is fuller aware of the dangers. Finally, the seller has the duty to allow the buyer the opportunity to make an informed decision. Once the decision is made, the buyer has the duty to abide by the contractual agreement. As Velasquez states, the manufacturer is no longer morally negligent after having taken all reasonable steps to protect the consumer and to ensure that the consumer is informed of any irremovable risks that might still attend the use of the product (337). Therefore, the liability of injury transfers after the seller h as fulfilled his duties to the buyer. The second question addresses the issue of the role of government in the regulation of individual choice. Velasquez describes the impact of a government over regulating safety standards. Such government interference, as

Tuesday, November 26, 2019

Free Writing Exercise Frankenstein Essays

Free Writing Exercise Frankenstein Essays Free Writing Exercise Frankenstein Essay Free Writing Exercise Frankenstein Essay Essay Topic: Frankenstein Frankenstein is very commonly viewed as a horror story, but upon closer examination it is in fact much more. A standard horror story will have a villain or monster who is detested by both the characters in the novel and the readers of the novel. Although the wretch is both inhumanly hideous and monstrous in appearance, he demonstrates human like compassion and desire in which the reader cannot help but sympathize with. When the wretch has his first confrontation with Victor, he reveals much of his true nature.From his first encounter with humans, the wretch is only greeted with violence and fear.In his attempts to interact with humans in any way result in rejection and repulsion.He is noted to have said â€Å"Here then I retreated, and lay down, happy to have found a shelter, however miserable, from the inclemency of the season, and still more from the barbarity of man† (124).Here he remarks on the treatment he has received by man, that he is miserable because of it.From the wretch’s point of view, humans are the antagonist and he seeks nothing more than to have a relationship with them. This makes me wonder why the wretch does not respond to the humans with violence. The wretch has just been animated, so he has no prior knowledge to help him differentiate between â€Å"good† or â€Å"evil†.It is puzzling why his inherent reaction is not violent because he is exposed to violence before anything else. : These factors, along with others, drove the wretch to become violent towards Victor’s close friends and family.The wretch is commonly regarded as a monster, but could it be more reasonable to say that Victor is the true monster? What is a monster?According the Frankenstein a monster is a superficial concept based on appearance.Every human the wretch encounters either flees in fear or attacks the wretch because of his grotesque figure.When the wretch encounter’s William, his looks cause William to call him a mon

Friday, November 22, 2019

Definition of Instructional Words Used on Tests

Definition of Instructional Words Used on Tests Instructional words are very important, but they are often overlooked and misunderstood by students during exams and tests. It is important to know what is expected of you when you encounter words such as â€Å"analyze† or â€Å"discuss† on an exam. Valuable points can be earned or lost, depending on your understanding of instructional words shown here. Analyze: Take apart a concept or a process, and explain it step by step. You could encounter analysis questions in any discipline, from science to history. An analysis question is usually a long essay question.Comment: If a test question prompts you to comment on a fact or statement, you will need to explain the relevance of the fact or statement. For example, you could be prompted to comment on a particular amendment quoted in a government exam or comment on a passage that is quoted on a literature exam.Compare: Show likenesses and differences when you compare two events, theories, or processes.Contrast: Used for showing differences between two processes or theories, a contrast question could appear on a literature exam, a history exam, a science exam, and more.Define: Provide a definition of a key term you’ve covered in class. This is usually a short essay type of question.Demonstrate: If you are asked to demonstrate, you must provide proof of your answer by using an example . A demonstration could be a physical action, a visual illustration, or a written statement. Diagram: Demonstrate your answer by drawing a chart or other visual element to illustrate your points.Discuss: When a teacher instructs you to â€Å"discuss† a topic, he or she is trying to determine whether you understand both sides of an issue. You will need to demonstrate that you know the strengths and weaknesses of both sides. You should pretend that you are having a conversation with a friend and voicing both sides.Enumerate: Enumerating is providing a list in a particular order. When you enumerate a list of items, you may need to specify why items go in a particular order.Examine: If you are prompted to examine a topic, you will use your own judgment to explore (in writing) a topic and comment on significant elements, events, or acts. Provide your opinion and explain how or why you came to your conclusions.Explain: Provide an answer that gives a â€Å"why† response. Provide a complete overview of the problem and solution for a particular issue or process. This is a typical form of question used in science exams. Illustrate: If you are expected to illustrate a topic, you should use examples to show or explain a topic. Depending on the subject matter, you might use words, drawings, diagrams, or behavior to illustrate an answer.Interpret: Interpretation of a subject calls for the ability to read between the lines and draw conclusions. You will be expected to explain the meaning of an act, action, or passage in an interpretation.Justify: If you are asked to justify something, you will be expected to use examples or evidence to show why (in your opinion) it is correct. You must provide reasons for your conclusions and opinions.List: Lists are used in every discipline. In list questions, you must provide a series of answers. If you are expected to memorize a certain number of items for an exam, be sure to remember how many there are in total.  Outline: Provide an explanation with headings and subheadings. This is a common instruction word found on literature exams.Order: Provide a chronological or value-based answer by listing several items (terms or events) in the correct placement. You could be asked to place events in a certain order on a history exam, or you could be asked to put a scientific process in the correct order.   Prove: To prove an answer, you must use evidence (this could be numbers) or reasoning to solve a problem. Tests that require proof normally appear on science or math exams.Relate: Relate could mean a few different things on an exam: 1) You could be asked to show a relationship between two events or items by discussing their similarities, or 2) You could be required to provide a written account of something (as in literature).Review: If a test question prompts you to review a process or event, you should recall and repeat all the most important elements or facts that you learned about a specific topic in essay form.Trace: To trace an event or process, go over it in detail and explain it step by step. You could trace an event that occurred in history or you could trace a process in science.

Thursday, November 21, 2019

Maya And Spaniards In Yucatan Essay Example | Topics and Well Written Essays - 1500 words

Maya And Spaniards In Yucatan - Essay Example Through the accounts furnished by the Spanish chronicles and other texts of historical importance that the Historians have predominantly tried to judge the invasion of an acclaimed and great civilization in pre-Columbian America. There is no denying the fact these historical accounts ensuing from the Spanish adventurers, churchmen, and booty hunters were somewhat biased in their approach towards the Mexican history (Henderson 45). These historical accounts present only the Spanish side of the story, without caring much about the Mayan perspective regarding the Spanish invaders (Henderson 45). Many times the historians never cared to bother that perhaps the conquered Mexicans may have set their own versions of the Spanish invasion of America. So a great part of the Mayan side of the story is known through the works compiled by Mexicans in their native language, which managed to survive the ravages of the Spanish Invasion. Though it is a fact that both the Spanish and Mexican accounts tell the same story, yet, these two sets of historical text tend to differ immensely in what they decide to convey and how they try to convey it. Though the modern historians of the European origins tend to outline varied cultural, moral and religious motivations that supported the Spanish invasion of the Native American civilizations, still even a cursory perusal of the Spanish invaders brings to fore the fact that the Spanish invasion was predominantly ruled and guided by economic and pecuniary motives (Patch 22). Many accounts of the Spanish encounters with the Mayan diplomatic missions strongly unravel the fact that the Spaniards tried to evaluate the gifts extended by the Mayans in a profit to loss context, without delving specifically on the artistic and cultural relevance of those gifts.

Tuesday, November 19, 2019

Important events Essay Example | Topics and Well Written Essays - 250 words

Important events - Essay Example This war started when the North Korean Communist army tried to cross the 38th parallel and invaded non-Communist South Korea in June 25, 1950. In 1953, both South and North Korea signed a peace treaty which essentially ended them still in a divided status as before the war. (AsianInfo, 2000) The Korean War has negative and positive effects. Both North and South Korea had much causality and property destruction but they both were stretched economically. The Korean War also legitimized the United Nations as well as brought more military power throughout the world. Korea [†¦] People perceive that the United States, though projected to be invincible, its pride and self-confidence has now succumbed to defeat. It is the longest and most debilitating war--the only war the United States ever lost. It is the sacrifice for liberty that counts (Sitikoff, 1999) This is an abortive invasion of Cuba directed by the U.S. Central Intelligence Agency and carried out by Cuban exiles. The invasion was intended to spark a rebellion that would topple Fidel Castro, whose communist regime was considered a threat to U.S. interests in the region. The rebellion never materialized, the invasion force was quickly defeated. The result was a huge propaganda victory for Castro and a severe embarrassment for the administration of U.S. president John F. Kennedy. Bay of Pigs (Berry,n.d) This just to shows that the U.S., one of the superpowers is not spared and is far from perfect. The Bay of Pigs was one of the most important political decisions in the history of the United States. Its effects are still being felt to today, especially in the Cuban communities of the United States. The decisions that were made by the highest offices of our government showed us that the United States. They constructed a plan that wasnt completely thought through and paid a major price -- global embarrassment. They

Sunday, November 17, 2019

Probate Code Essay Example for Free

Probate Code Essay There is significance in property being classified as probate or nonprobate property in terms of the need for probate, creditors’ claims and payment of federal estate and state estate and inheritance taxes is that. If property is classified as probate then that means that it is the decedent’s property that is subject to estate administration by the personal representative. It also means that the probate property is subject to creditors’ claims and federal and state death taxes. Nonprobate property is not subject to probate because it cannot be transferred by will or inheritance. The nonprobate property goes straight to the named beneficiary or to the surviving joint tenant(s) or partners. Nonprobate property is part of the decedent’s gross estate for federal and state death tax purposes; it is subject to federal and state estate taxes and state inheritance tax. 27. Joint tenancy is different from both tenancy in common and a tenancy by the entirety. Joint tenancy is different from tenancy in common because joint tenancy is the ownership of real or personal property by two or more persons with the right of survivorship; whereas, tenancy in common is the ownership of an undivided interest of real or personal property by two or more persons without the right of survivorship. In a tenancy in common, each person has the right to hold or occupy the whole property in common with the other co-tenants, and each is entitled to share in the profits derived from the property. Unlike a joint tenancy, when a tenancy in common dies, the decedent’s interest goes to an heir or as directed in a will. Joint tenancy is unlike tenancy by the entirety. Tenancy by the entirety is a form of joint tenancy with the right of survivorship available only to a husband and wife. It cannot be terminated by one joint tenant’s inter vivos conveyance of his or her interest. Neither one of the tenants by the entirety can transfer the property or sever the tenancy by the entirety without the consent of the other spouse. 28. There are four unities required for the creation of a joint tenancy. Those unities are: unity of interest, unity of title, unity of time, and unity of possession. For unity of interest to exist, each tenant must have an interest in the property identical with that of the other tenants; the interests must be of the same quantity and duration. For unity of title to exist, the tenancy must be created and the tenants must receive their title from a single source, e.g., the same will or deed. For unity of time to exist, joint tenant owners must receive or take their interests in the property together, i.e., at the same time. Finally, for unity of possession to occur, each joint tenant must own and hold the same undivided possession of the whole property held in joint tenancy. 29. An ancillary administration is necessary if at death the decedent-testator owns any real property in a state other than his domiciliary state, and any tangible personal property in another state. The purpose of ancillary administration is to dispose of and distribute that portion of the decedent’s estate located in a state other than the decedent’s domiciliary state. 30. Community property is all property, other than property received by gift, will, or inheritance, acquired by either spouse during marriage that is considered to belong to both spouses equal in the nine community property states and Alaska if community property is elected. Things that would not be community property includes property received by gift, will or inheritance that are acquired by either spouse during marriage, property individually owned by the husband or wife before their marriage, property that is currently separate property and is traded, replaced, or sold for other property and becomes â€Å"new† separate property, and lastly, social security, railroad retirement, and veteran’s benefits.

Thursday, November 14, 2019

Terry Tempest Williams Journey Into Self Spirituality Essay -- Litera

Terry Tempest Williams is a naturalist, a feminist, a writer who brings such power into everything she touches. Herself driven passion with her positive outlook and drive for change has brought so much goodness into this world. She has overcome many obstacles, including her own struggle within herself, but has last realized that the fight with nature is the same fight we have with ourselves, and ultimately accepting the outcome; whatever that may be unnatural, or natural, is the secret to life. Terry is a Mormon who grew up in Utah, loving nature and striving to keep it natural. She never understood why there were so many people that didn’t care. She found peace in serenity in a bird refuge. She came to the bird refuge many, many times. This was her sanctuary, where things made sense. The bird refuge in the Great Salt Lake is home to her, and her family before her. Her grandmother taught her so much of the ways of the lake, the animals, and how it was to be conserved. She often went back to her child memories where she spent most of her days there with the birds, just watching how they live their life in so much peace, unaware of all of the hurtful pieces of life outside of their home. â€Å"This is another paradox of mine, wanting to be a bird when I am human.† (Williams,R 266) There was one particular place that was her favorite; she would come to watch owls nest. They would nest in the same spot year after year. On one occasion she had come to see them, watching their heads pop up, and they were gone. A truck full of construction workers were making fun of her as they thought the owls were no big deal. She was polite, as a good Mormon girl should be, she smiled and stuck out her middle finger at them and walked awa... ...lear testing in the Nevada Desert, and again later, she has written many books of her own struggles in life along with her spirituality, she has abandoned that confinement of being a good Mormon girl to make changes in this world. Her faith is strong, she has adapted. â€Å"Finding beauty in a broken world is creating beauty in the world we find.† (Williams, B 385). Works Cited Riley, Jeannette E. "Finding One's Place in the "Family of Things":Terry Tempest Williams and a Geography of Self.." Womens Studies. 32.5 (2003): 585-602. Print. Williams, Terry T. Finding Beauty in a Broken World. 1st. New York: Pantheon Books, 2008. Williams, Terry T. Leap. Vintage, 2001. Williams, Terry Tempest. Refuge, An Unnatural History Of Family And Place. Vintage, 1991. Williams, Terry T."The Moment I Became a Feminist ." progressive. (2011): n. page. Print.

Tuesday, November 12, 2019

Kudler Security Report

Kudler Fine Foods IT Security Report and Presentation Security Considerations CMGT/400 Kudler Fine Foods IT Security Report and Presentation Security Considerations According to Whitman and Mattord  (2010),  The ISO 27000 series is one of the most widely referenced security models.Referencing ISO/IEC 27002 (17799:2005), the major process steps include: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development, and maintenance, information security incident management, business continuity management, and compliance (Chapter 10, Security Management Models). 1.Risk assessment and treatment 2. Security policy: Focuses mainly on information security policy 3. Organization of information security: For both the internal organization and external parties 4. Asset management: Incl udes responsibility for assets and information classification 5. Human resources security: Ranges from controls prior to employment and during employment to termination or change of employment 6. Physical and environmental security: Includes secure areas and equipment security 7.Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring 8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking 9.Information systems acquisition, development, and maintenance: Includes security requirements of information systems, correct processing in applications, cryptographic controls, security of system files, security in development and support processes, and technical vulnerability management 10. Information security incident management: Addresses reporting information security events and weaknesses and management of information security incidents and improvements 11.Business continuity management: Information security aspects of business continuity management 12. Compliance: Includes compliance with legal requirements, compliance with security policies and standards, and technical compliance and information systems audit considerations The â€Å"SANS: SCORE† (2012) website provides a free audit checklist for organizations to verify if they comply with the ISO 27002. The following table represents the SANS audit checklist as it relates to Kudler Fine Food’s frequent buyer program. Security policy: Focuses mainly on information security policy | |Section |Audit Question |Security Consider ations |Security concern if |Mitigation | | | | |removed | | |Information security policy|Whether there exists an Information |A security policy is |Without a security policy |Define what needs to be | |document |security policy, which is approved by the |necessary to guide all |in place the restriction |protected in order to | | |management, published and communicated as |access or to block |of information would be |develop a security policy. | | |appropriate to all employees. |access to information. |lost.Uncontrolled access|The importance of the | | | | |will result in the loss of|information should | | |Whether the policy states management | |company information. |determine the severity of | | |commitment and sets out the organizational| | |the security. | | |approach to managing information security. | | | | |Review of Informational |Whether theInformation Security Policy is|The security policy |Without the review of |Each policy should be | |Security Policy |reviewed at planne d intervals, or if |should be reviewed as |security policies they |reviewed periodically to | | |significant changes occur to ensure its |business practices, |will most likely become |ensure its effectiveness. | | |continuing suitability, adequacy and |hardware, software, and |out dated and lose | | | |effectiveness. |the way in which |usefulness. Each policy owner will be | | | |information is shared | |responsible for the review | | |Whether the Information Security policy |change. |Without giving each |of the policy. | | |has an owner, who has approved management | |section of the policy an | | | |responsibility for development, review and|Each part of the policy |owner the policy will have|Each change will be brought| | |evaluation of the security policy. should have an owner who|no one responsible for its|before management before | | | |is responsible for |maintenance. |being brought into action. | | |Whether any defined Information Security |keeping it up to date. | | | | |Pol icy review procedures exist and do they| |A policy to review new | | | |include requirements for the management |A review procedure |policies or changes made | | | |review. should be in place, each|to current policies should| | | | |change made should be |be in place to discourage | | | |Whether the results of the management |reviewed by management. |unauthorized changes. | | | |review are | | | | | |taken into account. | | | | | |Whether management approval is obtained | | | | | |for the revised policy. | | | |Organization of Information Security | |Section |Audit Question |Security |Security concern if |Mitigation | | | |Considerations |removed | | |Management commitment to|Whether management demonstrates active support for |An active role |Without the active support|A definition of the role | |information security |security measures within the organization.This can be|by management |of management the security|management should play in | | |done via clear direction, demonstrated commitment, |is needed to |policy will lose its |the commitment to the | | |explicit assignment and acknowledgement of information|ensure the |effectiveness. |security policy should be | | |security responsibilities. |effectiveness | |stated in the security | | | |of the security| |policy. | | | |policy. | | |Information security |Whether information security activities are |Security |Information security |Ensure that the owner of | |coordination |coordinated by representatives from diverse parts of |activities need|activities need to be |each policy is responsible | | |the organization, with pertinent roles and |to be |organized by employees |for all activities | | |responsibilities. |coordinated by |with higher roles and |associated with the | | | |representatives|responsibilities. The |policies. | | |that carry |security policies protect | | | | |pertinent roles|the information and all | | | | |and |activities associated with| | | | |responsibilitie|the security policy should| | | | |s. |be made by responsible | | | | | |parties. | |Allocation of |Whether responsibilities for the protection of |The business |Without a clear set of |A clear set of instructions| |information security |individual assets, and for carrying out specific |will suffer a |rules governing the |will be provided to ensure | |responsibilities |security processes, were clearly identified and |great many |protection of individual |that each individual asset | | |defined. |losses due to |assets and security |and each security process | | | |unclear |processes the business |is clearly defined. | | |detentions of |will surely suffer a loss. | | | | |procedures. | | | |Authorization process |Whether management authorization process is defined |Authorization |Without the use of an |Any and all information | |for information |and implemented for any new information processing |processes need |authorization system a new|processing facilities need | |processing facilities |facility within the org anization. to be clearly |information processing |to be given ownership to a | | | |stated in the |facility would be left |member of management. This| | | |security |vulnerable for attack. |member needs to ensure the | | | |policy. Any | |security policy is | | | |new information| |followed.Using the proper| | | |processing | |authorization system is | | | |facility needs | |critical to securing the | | | |to have an | |information contained | | | |authorization | |within. | | | |process | | | | | |implemented. | | |Confidentiality |Whether the organization’s need for Confidentiality or|The NDA should |Without the use of an NDA |The NDA needs to be | |agreements |Non-Disclosure Agreement (NDA) for protection of |be clearly |the legal ramifications |reviewed periodically to | | |information is clearly defined and regularly reviewed. |defined. This |are greatly lessened. A |ensure that any changes in | | | |will help to |business needs to protect |the business are reflected | | |Does this address the requirement to protect the |ensure the |its data to the fullest |in it. | | |confidential information using legal enforceable terms|information is |extent of the law. | | | |not | | | | | |compromised. | | | |Contact with authorities|Whether there exists a procedure that describes when, |This is |The time it takes to act |A plan must be in place for| | |and by whom: relevant authorities such as Law |important to |in an emergency is crucial|different types of | | |enforcement, fire department etc. should be |the physical |to keeping employees and |emergencies involving any | | |contacted, and how the incident should be reported. |security of the|the business safe. A plan|outside authorities. This | | | |business and |must be in place to avoid |can help to prevent | | | |the employee |potential losses due to |injuries and harm done to | | | |within. |unforeseen events. |employees and the business. |Contact with special |Whether appropriate contacts with special interest |Contacts with |Allowing a third party |A policy needs to define | |interest groups |groups or other specialist security forums, and |third party |group access to any |the steps needed to apply | | |professional associations are maintained |groups need to |information can be a risk |for special interest groups| | | |be approved my |to the business. All |and how the relationship is| | | |management. third party associations |maintained. | | | | |should be approved in | | | | | |advance by management. | | |Independent review of |Whether the organization’s approach to managing |Security |The loss of strength to |To ensure the highest level| |information security |information security, and its implementation, is |management |the security of |of security a review should| |reviewed independently at planned intervals, or when |should be |information can occur |be implemented periodically| | |major changes to security implementation occur. |reviewed at |through time (small |and whenever a major change| | | |planned |changes) or when a major |takes place. | | | |intervals and |change has taken place. | | | | |when major | | | | | |changes occur. | | |Identification of risks |Whether risks to the organization’s information and |Allowing third |Allowing third parties |Strict rules and an access | |related to external |information processing facility, from a process |parties access |access to the business |policy must be implemented | |parties |involving external party access, is identified and |to the network |network and the contents |to allow a third party | | |appropriate control measures implemented before |poses serious |of the business systems |access to any information | | |granting access. |risks to the |poses a serious threat to |in the business. | | | |integrity of |the integrity of the | | | | |the |system. | | | |information. | | | |Addressing security when|Whether all identified security requirements are |Allowing |Allowing customers access |Access to information by | |dealing with customers |fulfilled before granting customer access to the |customers with |to information in the |customers should be stated | | |organization’s information or assets. |the access to |business system poses a |in the security policy. | | | |certain |threat. Customers should only be | | | |information can| |allowed access to minimal | | | |help to | |information, a separate | | | |increase | |website or informational | | | |customer base | |address. | | | |and customer | | | | | |awareness. | | |Addressing Security in |Whether the agreement with third parties, involving |All third party|Agreeing with a third |Any third party contract | |third party agreements |accessing, processing, communicating or managing the |agreements |party contract can hold |should be reviewed by the | | |organization’s information or information processing |should be |some legal ramifications. |legal department to ensure | | |facility, or introd ucing products or services to |reviewed before| |the contract agrees with | | |information processing facility, complies with all |implementation. | |all of the businesses | | |appropriate security requirements | | |security requirements. |Asset Management | | | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Inventory of Assets |Whether all assets are identified and an |The businesses assets |Without a clear definition|Each new asset will be | | |inventory or register is maintained with |need to be registered to|of assets the business |registered and assigned an | | |all the important assets. |ensure their safety. |could suffer a loss or |owner. | | | |theft of assets. | | |Ownership of Assets |Whether each asset identified has an |The security policy must|The business could suffer |Each new asset should have | | |owner, a defined and agreed-upon security |include clearly defined |a loss without giving the |an owner and restr ictions | | |classification, and access restrictions |parameters for |asset an owner and |to its access. | | |that are periodically reviewed. |registering assets. defining access | | | | | |restrictions. | | |Acceptable use of Assets |Whether regulations for acceptable use of |Legal issues and profits|Without regulations on the|Defineing all acceptable | | |information and assets associated with an |losses could occur from |use of assets the company |uses of business assets is | | |information processing facility were |the misuse of assets. |could suffer losses and |crucial. | | |identified, documented and implemented | |legal issues. | |Classification guidelines |Whether the information is classified in |Classification of |By classifying information|All information should be | | |terms of its value, legal requirements, |information is crucial |is can be easier to |classified in terms of its | | |sensitivity and criticality to the |to the business. This |determine who has access |va lue, legal requirements, | | |organization. |will determine who has |to it. |and sensitivity to ensure | | | |access to the | |it is only accessible to | | | |information. |authorized users. | |Information Labeling and |Whether an appropriate set of procedures |A set of organizational |Unorganized information |All information should be | |handling |are defined for information labeling and |parameters should be |can result in the loss of |organized within a set of | | |handling, in accordance with the |devised to create a |the information. |parameters defined in the | | |classification scheme adopted by the |classification scheme. | |classification scheme. | | |organization. | | | |Human Resources Security | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Roles and responsibilities |Whether employee security roles and |All personnel authorized|Unauthorized access of |All confidential | | |responsibilities, contractors and third |to access confidential |this information could |information should be | | |party users were defined and documented in|information needs to be |result in identity theft. |handled by authorized | | |accordance with the organization’s |identified by management| |personnel only. | |information security policy. |team. | | | | | | | | | | |Were the roles and responsibilities | | | | | |defined and clearly communicated to job | | | | | |candidates during the pre-employment | | | | |process | | | | |Screening |Whether background verification checks for|All applicants |If not performed, persons |All employees should be | | |all candidates for employment, |considered for |with a history of theft |free of any criminal | | |contractors, and third party users were |employment have to |could be hired. |history that may cause | | |carried out in accordance to the relevant |undergo a criminal | |concern to the company. | | |regulations. |background check prior | | | | | |to a job offer bei ng | | | | |Does the check include character |made. | | | |reference, confirmation of claimed | | | | | |academic and professional qualifications | | | | | |and independent identity checks | | | | |Terms and conditions of |Whether employee, contractors and third |Management must define |Unauthorized access of |To prevent confidential | |employment |party users are asked to sign |what information is |this information could be |information to be disclosed| | |confidentiality or non-disclosure |confidential in |used for personal use. |to unauthorized persons. | | |agreement as a part of their initial terms|accordance to existing | | | | |and conditions of the employment contract. |laws and company policy. | | | | | | | | | | |Whether this agreement overs the | | | | | |information security responsibility of the| | | | | |organization and the employee, third party| | | | | |users and contractors. | | | | |Management responsibilities|Whether the management requires employees,|Management must define |Unauthorized access could |To prevent confidential | | |contractors and third party users to apply|which users have to have|be used for personal gain. |information to be disclosed| | |security in accordance with the |this access. | |to unauthorized persons. | |established policies and procedures of the| | | | | |organization. | | | | |Information security |Whether all employees in the organization,|Management and Loss |Private information could |To educate all personal | |awareness, education and |and where relevant, contractors and third |Prevention must develop |be disclosed to |about privacy policy. | |training |party users, receive appropriate security |a training program and |unauthorized persons for | | | |awareness training and regular updates in |establish how often it |personal use. | | |organizational policies and procedures as |needs to be | | | | |it pertains to their job function. |administered. | | | |Disciplinary process |Whether there is a formal discipl inary |Management must |Private information could |To advise employees what | | |process for the employees who have |establish corrective |be disclosed to |recourse their actions will| | |committed a security breach. |action measures if there|unauthorized persons for |have. | | | |is a security breach. |personal use. | |Termination |Whether responsibilities for performing |Management must advise |If an employee was not |To define the procedures of| |responsibilities |employment termination, or change of |what actions will |properly terminated could |terminating employment. | | |employment, are clearly defined and |terminate employment and|result in a lawsuit. | | | |assigned |what procedures are | | | | | |involved in the | | | | | |termination process. | | |Return of assets |Whether there is a process in place that |Management must define |If not returned, certain |To ensure that all | | |ensures all employees, contractors and |what materials employees|company items could be |appro priate company | | |third party users surrender all of the |must return upon |used for personal use. |materials are returned. | | |organization’s assets in their possession |employment. | | | | |upon termination of their employment, | | | | | |contract or agreement. | | | |Removal of access rights |Whether access rights of all employees, |Management will define a|If not defined, it is |To prevent unauthorized | | |contractors and third party users, to |timeframe in which a |possible that a terminated|personnel from accessing | | |information and information processing |terminate employee |employee could still |company information. | | |facilities, will be removed upon |access is removed |access company | | | |termination of their employment, contract | |information. | | | |or agreement, or will be adjusted upon | | | | | |change. | | | |Physical and Environmental Security | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Physical security perimeter|Whether a physical border security | | | | | |facility has been implemented to protect | | | | | |the information processing service. | | | | | | | | | | | |Some examples of such security facilities | | | | | |are card control entry gates, walls, | | | | | |manned reception, etc. | | | |Physical entry controls |Whether entry controls are in place to |Physical access to |potential for security |server room should be | | |allow only authorized personnel into |system |breach through |locked with access | | |various areas within the organization. | |unauthorized access to |restricted to authorized | | | | |physical equipment. |personnel.Sophistication | | | | | |of restraint would be | | | | | |dependent upon importance | | | | | |of information and budget. | |Securing offices, rooms, |Whether the rooms, which have the | | | | |and facilities |information processing service, are locked| | | | | |or have lockable cabinets or safes. | | | |Protecting against external|Whether the physical protection against |corruption and/or loss |loss of critical data. |Data and system redundancy,| |and environmental threats |damage from fire, flood, earthquake, |of information due to | |off-site storage and/or | | |explosion, civil unrest and other forms of|environmental conditions| |multiple servers at | | |natural or man-made disaster should be | | |different locations. | | |designed and applied. | | | | | | | | | | |Whether there is any potential threat from| | | | | |neighboring premises. | | | | |Working in secure areas |Whether physical protection and guidelines| | | | | |for working in secure areas is designed | | | | | |and implemented. | | | | |Public access delivery and Whether the delivery, loading, and other | | | | |loading areas |areas where unauthorized persons may enter| | | | | |the premises are controlled, and | | | | | |information processing facilities are | | | | | |isolated, to avoid unauthorized access | | | | |Equipment sittin g |Whether the equipment is protected to | | | | |protection |reduce the risks from environmental | | | | | |threats and hazards, and opportunities for| | | | | |unauthorized access | | | | |Supporting utilities |Whether the equipment is protected from | | | | | |power failures and other disruptions | | | | | |caused by failures in supporting | | | | | |utilities. | | | | | | | | | | |Whether permanence of power supplies, such| | | | | |as a multiple feed, an Uninterruptible | | | | | |Power Supply (ups), a backup generator, | | | | | |etc. are being utilized. | | | | |Cabling security |Whether the power and telecommunications | | | | | |cable, carrying data or supporting | | | | | |information services, is protected from | | | | | |interception or damage. | | | | | | | | | | |Whether there are any additional security | | | | | |controls in place for sensitive or | | | | | |critical information. | | | | |Equipment Maintenance |Whether the equipment is correctly | | | | | |maintained to ensure its continued | | | | | |availability and integrity. | | | | | | | | | | |Whether the equipment is maintained, as | | | | | |per the supplier’s recommended service | | | | | |intervals and specifications. | | | | | | | | | | | |Whether the maintenance is carried out | | | | | |only by authorized personnel. | | | | | | | | | | |Whether logs are maintained with all | | | | | |suspected or actual faults and all | | | | | |preventive and corrective measures. | | | | | | | | | | | |Whether appropriate controls are | | | | | |implemented while sending equipment off | | | | | |premises. | | | | | | | | | | |Are the equipment covered by insurance and| | | | | |the insurance requirements satisfied | | | | |Securing of equipment |Whether risks were assessed with regards |off-site data storage |off-site data may be |proper security measures in| |off-premises |to any equipment usage outside an |centers provide a level |compromised or otherwise |place to ensure integrity | | |o rganization’s premises, and mitigation |of redundancy to |corrupted due to |of data. | | |controls implemented. maintain integrity in |insufficient security | | | | |the event of a local |measures | | | |Whether the usage of an information |breach | | | | |processing facility outside the | | | | | |organization has been authorized by the | | | | | |management. | | | |Secure disposal or re-use |Whether all equipment, containing storage | | | | |of equipment |media, is checked to ensure that any | | | | | |sensitive information or licensed software| | | | | |is physically destroyed, or securely | | | | | |over-written, prior to disposal or reuse. | | | | |Removal of property |Whether any controls are in place so that | | | | | |equipment, information and software is not| | | | | |taken off-site without prior | | | | | |authorization. | | | |Communications and Operations Management | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |rem oved | | |Documented Operation |Whether the operating procedure is |Management should set |Without direction, |To establish how the | |Procedures |documented, maintained and available to |guideline about how each|employees would not know |company is to operate on a | | |all users who need it. |function should operate |what to do throughout the |daily basis. | | | |in the company. |day. | | |Whether such procedures are treated as | | | | | |formal documents, and therefore any | | | | | |changes made need management | | | | | |authorization. | | | | |Change Management |Whether all changes to information | | | | | |processing facilities and systems are | | | | | |controlled. | | | |Segregation of duties |Whether duties and areas of responsibility|Management is |No one would be |To establish accountability| | |are separated, in order to reduce |responsible for |responsible for ensuring |for task performed in each | | |opportunities for unauthorized |assigning area of |tasks are complete d. |area. | | |modification or misuse of information, or |responsibility. | | | | |services. | | | |Separation of development, |Whether the development and testing |Management needs to |Incorrect information |To prevent incorrect | |test, and operational |facilities are isolated from operational |establish a separate |could cause a delay in |information is not given to| |facilities |facilities. For example, development and |network. |production or development. |incorrect personnel. | | |production software should be run on | | | | | |different computers.Where necessary, | | | | | |development and production networks should| | | | | |be kept separate from each other. | | | | |Service delivery |Whether measures are taken to ensure that |Define what measures are|Goods and services will |To ensure that service | | |the security controls, service definitions|needed and establish who|not be done in a timely |level is established and | | |and delivery levels, included in the third|to monit or. |manner. |maintained. | |party service delivery agreement, are | | | | | |implemented, operated and maintained by a | | | | | |third party | | | | |Monitoring and review of |Whether the services, reports and records |Define what measures are|Goods and services will |To ensure that service | |third party services |provided by third party are regularly |needed and establish who|not be done in a timely |level is established and | | |monitored and reviewed. |to monitor. |manner. |maintained. | | | | | | | |Whether audits are conducted on the above | | | | | |third party services, reports and records,| | | | | |on regular interval. | | | | |Managing changes to third |Whether changes to provision of services, |Define what measures are|Goods and services will |To ensure that service | |party services |including maintaining and improving |needed and establish who|not be done in a timely |level is established and | | |existing information security policies, |to monitor. |manner. |maintai ned. | | |procedures and controls, are managed. | | | | | | | | | | |Does this take into account criticality of| | | | | |business systems, processes involved and | | | | | |re-assessment of risks | | | | |Capacity management |Whether the capacity demands are monitored|Management must decide |Systems will not be able |To establish who will | | |and projections of future capacity |if a third party will be|to process information |monitor computer systems. | | |requirements are made, to ensure that |needed to assist with |needed in a timely manner. | | | |adequate processing power and storage are |their IT needs. | | | | |available. | | | | | | | | | | |Example: Monitoring hard disk space, RAM | | | | | |and CPU on critical servers. | | | | |System acceptance |Whether system acceptance criteria are |Management must decide |Systems will not be able |To establish who will | | |established for new information systems, |if a third party will be|to process information |monitor computer syst ems. | | |upgrades and new versions. |needed to assist with |needed in a timely manner. | | | | |their IT needs. | | | |Whether suitable tests were carried out | | | | | |prior to acceptance | | | | |Controls against malicious |Whether detection, prevention and recovery|IT personnel must ensure|Unauthorized access could |Establish measures to | |code |controls, to protect against malicious |proper measures are in |lead to system shut down. |protect from virus and | | |code and appropriate user awareness |place. | |malware. | | |procedures, were developed and | | | | | |implemented. | | | | |Controls against mobile |Whether only authorized mobile code is | | | | |code |used. | | | | | | | | | | |Whether the configuration ensures that | | | | | |authorized mobile code operates according | | | | | |to security policy. | | | | | | | | | | | |Whether execution of unauthorized mobile | | | | | |code is prevented. | | | | | | | | | | |(Mobile code is software code that | | | | | |transfers from one computer to another | | | | | |computer and then executes automatically. | | | | | |It performs a specific function with | | | | | |little or no user intervention. Mobile | | | | | |code is associated with a number of | | | | | |middleware services. | | | | |Information backup |Whether back-ups of information and |IT personnel will ensure|If not properly manage |To establish back up and | | |software is taken and tested regularly in |that system is properly |could result in loss of |recover of data procedures. | | |accordance with the agreed backup policy. |working. |data. | | | | | | | | | |Whether all essential information and | | | | | |software can be recovered following a | | | | | |disaster or media failure. | | | |Network Controls |Whether the network is adequately managed |IT personnel must ensure|Unauthorized access could |Establish measures to | | |and controlled, to protect from threats, |proper measures are in |lead to system shut down. |protect from virus and | | |and to maintain security for the systems |place. | |malware. | | |and applications using the network, | | | | | |including the information in transit. | | | | | | | | | | |Whether controls were implemented to | | | | | |ensure the security of the information in | | | | | |networks, and the protection of the | | | | | |connected services from threats, such as | | | | | |unauthorized access. | | | |Security of network |Whether security features, service levels |IT/Third party will |The company may not be |To establish what security | |services |and management requirements, of all |advise management the |aware of what is needed to|features of needed to | | |network services, are identified and |necessary requirements |secure the network and the|maintain the network. | | |included in any network services |needed for the network. |system is broken into | | | |agreement. | |compromising information. | | | | | | | | |Whether the ability of the network service|

Saturday, November 9, 2019

Galileo Galilei Essay

Galileo Galilei is an Italian astronomer, physicist, philosopher, and mathematician. He ranks with Archimedes, Newton, and Einstein as one of the greatest scientists of all time. His discoveries, made with the crudest of equipment, were brilliant examples of scientific deduction. Galileo’s studies of natural laws laid the groundwork for the experimental scientists who followed him. Galileo was born at Pisa, the son of a musician who planned a medical career for him. He began studying medicine at the University of Pisa. According to legend, Galileo made his first major discovery at this time. He is said to have used his pulse to time the swinging of a suspended lamp in a cathedral; he found that, no matter how far the lamp swung, the timing has always the same (Drake, 2002). In later life Galileo established the fact that a free-swinging object, or pendulum, moves in uniform time intervals. Pendulum clocks are a common application of this principle. Thesis Statement: This paper scrutinizes the life and contributions of Galileo Galilei. II. Discussion Galileo constructed the first telescope used for astronomical observations; the observations he made supported Copernicus’ theory that the sun is the center of the solar system. In physics, Galileo discovered the principles of motion followed by swinging pendulums, falling bodies, and flying projectiles. Galileo used his heartbeat to time the period of a pendulum. He realized that a pendulum could be used as a standard of time for a clock (Rose 2004). Pendulum clocks are still sold today, more than three hundred years after their invention. Moreover, changing from the study of medicine to that mathematics and natural science, Galileo conducted experiments on gravity that brought him to public attention. In 1589, he became a lecturer on mathematics at the University of Pisa, and began his studies of falling bodies. According to legend, as mentioned earlier, he dropped objects from the Leaning Tower of Pisa to prove his theory that bodies fall at the same speed and with the same acceleration regardless of their weight and size. He also demonstrated that projectiles follow a parabolic path. These discoveries were contrary to the teachings of the ancient Greek scientist and philosopher Aristotle, many of whose ideas had for centuries been accepted without question. Galileo aroused such opposition that in 1951 he was forced to resign from the university (Rose 2004). The next year Galileo obtained a professorship in mathematics at the University of Padua, where he remained for 18 years. This was a period of successful research, acclaim, and prosperity for Galileo. In 1609, Galileo received news of the invention, in Flanders, of a device that made a distant objects appear larger. He immediately set out to build such a device for himself. The final result was a 32-power refracting telescope, with which he made series of major discoveries (Poupard 2005). He found by observation that the moon shone only from reflected light; that the Milky Way was formed of a multitude of stars; and that the planet Jupiter was circled by several moons. His discoveries caused great excitement among astronomers; he was besieged with orders for telescopes. In 1610, Galileo left Padua for Florence to become official mathematician and philosopher to Grand Duke Cosimo II de’ Medici. By the end of the year his telescopic discoveries included the rings of Saturn, the phases of Venus, and sun spots. His observations clearly confirmed the theory of the Polish astronomer Copernicus that the earth and planets revolved around the sun. The church, however, had accepted as conforming the Bible the earlier idea of the planets and sun revolving around the stationary earth. When Galileo visited Rome in 1611 he was given a welcome by Church officials befitting one of the greatest astronomers of all time, as he was then acknowledged to be. This gave him the courage to announce his support of the Copernican theory of the solar system. Controversy flared. Although warned by the Church to avoid religious interpretation of his theory, Galileo attempted to prove it by quoting the Bible. He was told by the Church in 1616 to abandon the Copernican theory because it contradicted the Bible. In 1632, however, he published Dialogue on the Two Chief Systems of the World, in which he revived his argument in favor of the Copernican system. Galileo was then summoned to appear before the Inquisition and forced to renounce the view that the earth moves around the sun (Poupard, 2005). Although sentenced to imprisonment, he was permitted to retire to his home, where he continued his studies. III. Conclusion As a conclusion, Galileo Galilei made great contributions to our society through his invention and discoveries. His works are highly acclaimed and made significant impact in the fields of mathematics, physics, astronomy, and in sciences. Reference: Drake, Stillman (2003). Cause, Experiment, and Science: a Galilean Dialogue (University of Chicago) Poupard, Paul (2005. Galileo at work: Toward a Resolution of 350 Years of Debate, 1633-1983 (Duquesne University). Rose, Sidney (2004). Galileo and the Magic Numbers (Little, Brown).

Thursday, November 7, 2019

Segregation essays

Segregation essays In the past, many groups of people have been seen down on and are even hurt by another group that believes that they are supreme. In the United States of America, the African American group has been seen down on by the white group. There was segregation between these two groups for many years. There were many problems of poverty and discrimination faced upon the Black Americans. Booker T. Washington and W.E.B. Du Bois show there different strategies for dealing with these problems. The Black Americans had many problems in the United States after they were freed. One of these problems was the education for them. Many whites felt that schools should be separated by race or color. The percentage of Black Americans enrolled in schools in the late nineteenth century was about thirty percent. The percentage of White Americans enrolled in schools was about fifty-five percent (Document A). These people were between the ages of five to nineteen years old. This shows the segregation of the two races in schools that were meant for everyone and anyone that is an American. As the years went on more and more Black Americans were able to go to school and get an education. By the 1920s, about fifty percent of the Black Americans were enrolled in schools. Segregation was not just in schools but in the communities as well. The Black American was considered dirty and disgusting to the whites. They were unable to drink from the same water fountain as the whites (Document J). Even on the bus, the Black American has to stand and allow the whites to sit. Furthermore, they had to stay in the back of the bus. There were many signs that stated whether things are for colored people or not. Another problem that the Black Americans faced was literacy in America (Document B). In the 1890s, sixty percent of the Black Americans were illiterate over the age of nine. The whites used this as an advantage fo...

Tuesday, November 5, 2019

9 recursos para hacer frente a la deportacin

9 recursos para hacer frente a la deportacin Todos los extranjeros, incluidos los residentes permanentes legales, pueden ser deportados por mà ºltiples causas. Cuando un inmigrante est en un proceso de deportacià ³n, o se ha dictado en su contra una orden de salida de Estados Unidos, tiene a su alcance una serie de recursos frente a la deportacià ³n que puede utilizar. Deber elegir entre los mismos segà ºn las caracterà ­sticas especà ­ficas de su caso y de su situacià ³n. 9 recursos frente a la deportacià ³n de inmigrantes 1. Salida voluntaria: es una modalidad de alivio discrecional de la deportacià ³n. Es decir, una corte en audiencia o las autoridades migratorias tienen libertad para decidir si la conceden. Permite que un extranjero abandone EEUU sin el estigma de la deportacià ³n. Pero su gran ventaja es que permite al inmigrante, una vez que se encuentre de regreso en su paà ­s, solicitar una visa para regresar a EEUU, que podr ser concedida o denegada, segà ºn las circunstancias de cada caso. 2. Cancelacià ³n de la deportacià ³n (conocida como relief of removal en inglà ©s) es otro recurso frente a la deportacià ³n de inmigrantes. Los requisitos para solicitarla varà ­an segà ºn el caso: si se es un residente legal permanente, si no se es, o si es una và ­ctima de violencia domà ©stica. En ningà ºn caso la persona que solicite la cancelacià ³n de la deportacià ³n puede haber sido condenada anteriormente por haber cometido una felonà ­a o delito agravado. 3. Asilo: puede ser un recurso frente a la deportacià ³n. Se puede conceder a las personas que acrediten que no pueden regresar a su paà ­s porque allà ­ han sido perseguidos o teman por motivos fundados que puedan serlo por razà ³n de su opinià ³n polà ­tica, raza, religià ³n, nacionalidad o pertenecer a un determinado grupo social. Entre los requisitos mà ­nimos para que el asilo se conceda se encuentran el haberlo solicitado en el plazo de un aà ±o a contar desde la fecha de entrada en EEUU, no haber sido condenado por una felonà ­a o delito agravado y no ser un riesgo para la seguridad nacional. No debe confundirse el asilo con el aplazamiento de la expulsià ³n (withholding of removal, en inglà ©s), que es una proteccià ³n temporal. Para que se conceda el inmigrante debe demostrar durante el proceso de deportacià ³n que, si regresa a su paà ­s, existe una probabilidad de que ser torturado que es mayor a la de que no lo ser. Si consigue probarlo, el aplazamiento de la expulsià ³n deber necesariamente ser otorgado. 4. Ajuste de estatus: es un proceso por el que un extranjero adquiere la condicià ³n de residente permanente legal. En el caso de una deportacià ³n, durante el proceso el inmigrante puede solicitar al juez que ajuste su estatus, siempre y cuando el interesado cumpla una serie de requisitos. Salvo excepciones muy concretas, no se concede el ajuste de estatus a personas contra las que con anterioridad se dictà ³ una orden de deportacià ³n. 5. Mocià ³n para reabrir un caso: se presenta ante un juez de inmigracià ³n cuando el inmigrante tenga acceso a una nueva prueba que sea importante y que no tuviera a su disposicià ³n durante la audiencia de deportacià ³n. Deber presentarse en los 90 dà ­as siguientes a la orden final de deportacià ³n. Esta mocià ³n no suspende la ejecucià ³n de la deportacià ³n, que sigue su curso, a menos que la corte o el DHS acuerde un aplazamiento de la deportacià ³n. 6. Mocià ³n para revisar un caso de deportacià ³n: se presenta ante el Tribunal de Apelaciones de Inmigracià ³n, informacià ³n en inglà ©s (BIA, por sus siglas en inglà ©s). Su objetivo es que se revise el caso argumentando que ha habido un error en la aplicacià ³n de la ley o en los hechos. Deber presentarse esta en los 30 dà ­as siguientes al dictamen firme de la orden de deportacià ³n. Al igual que ocurre con la mocià ³n para reabrir el caso, aquà ­ tampoco se suspende el proceso ordinario de ejecucià ³n de la deportacià ³n a menos que una corte o el DHS ordene un aplazamiento de la misma. 7. Aplazamiento de la deportacià ³n (conocido como stay of removal en inglà ©s): es una suspensià ³n temporal de la ejecucià ³n de una orden de deportacià ³n. Es automticamente concedida en los casos de apelacià ³n, pero discrecional en otros supuestos. 8. Apelacià ³n administrativa: una vez que un juez de inmigracià ³n ha dictado una orden de deportacià ³n, el afectado puede recurrir la decisià ³n ante el BIA. Asimismo, si el Departamento de Seguridad Interna (DHS, por sus sigles en inglà ©s) no est de acuerdo con la decisià ³n del juez de inmigracià ³n, tambià ©n puede apelar. La decisià ³n del BIA en vinculante, es decir, debe ser obedecida tanto por el juez de inmigracià ³n que fallà ³ en primera instancia como por el DHS y el inmigrante. En dicha decisià ³n se puede confirmar la decisià ³n judicial original o cambiarla, es decir, puede dejar sin efecto la orden de deportacià ³n. En casos muy extraordinarios, el Procurador General de Estados Unidos puede alterar una decisià ³n del BIA. 9. Apelacià ³n judicial. En casos muy especiales se permite que un inmigrante apele la decisià ³n del Tribunal de Apelaciones de Inmigracià ³n (BIA) ante una corte federal. Todas las formas de alivio discrecional que corresponde al inmigrante probar que reà ºne los requisitos legales para que se le conceda el alivio y que se lo merece. La Corte tiene libertad para decidir si lo concede o no. En el caso de salida voluntaria no es necesaria la audiencia en Corte, ya que puede ser acordada por las autoridades migratorias. Consejos Si mientras dura la espera para presentarse en Corte si se produce un cambio de domicilio a otro estado, es posible solicitar un cambio de corte. Las revisiones de los procesos de deportacià ³n que se estn llevando a cabo en casos muy concretos y por decisià ³n de las autoridades migratorias suponen la no deportacià ³n del inmigrante beneficiado, pero a diferencia de recursos de alivio como el ajuste de estatus o el asilo, en esos casos el inmigrante no gana el derecho a una residencia permanente. En otras palabras, no va a ser deportado pero tampoco es legalizado. El presidente Obama autorizà ³ dos pequeà ±os alivios. Uno para Dreamers que cumplen con los requerimientos para solicitar la Accià ³n Diferida. El otro para familiares de militares mediante la parole in place. Beneficios y perdones Los inmigrantes con peticiones antiguas aprobadas pero que no finalizaron los trmites podrà ­an estar protegidos por la norma 245(i). Si se cree que se tiene derecho a este beneficio, consultar con un abogado. Si se produce una deportacià ³n, en algunos casos es posible pedir el perdà ³n I-212  y, posiblemente, otro perdà ³n al mismo tiempo para no tener que cumplir fuera de Estados Unidos todos los aà ±os del castigo. NOTA Este artà ­culo es meramente informativo. No es asesorà ­a legal.

Sunday, November 3, 2019

Small business management (find attachment) Assignment

Small business management (find attachment) - Assignment Example For reason that it needs to monitor the customers’ marketing response to prove that indeed Mobile Plus Group Ltd., is a viable business endeavor. This feedback on how the market responds shall be used to evaluate the efficacy of the marketing effort and business structure that will cater to customer needs. Through feedback control, it will be able to identify which part of the business went according to plan or fell short of expectation and be able to apply remedial measures when required. II. Relevance of Selected Method of Control. Employing an effective control mechanism in Mobile Plus Group Ltd. will assure us that the performance of the business will go as planned. Through it, we will be able to measure actual performance and will also be able to apply corrective measures to ensure that the â€Å"business’s objectives and plans are being carried out† (Dixon, 2003). In determining the method of control to be employed, it is important to determine the objectiv e of a business at a given time. And to elect appropriate modality of control given the circumstances which in this case is the Feedback Control as the business is still in its introductory phase that needs to urgently capture enough market share to prove itself as a viable business entity. A. ... This will be aided by an effective Management Information System that will provide us with concrete data to analyze. Control will also be performed by soliciting written feedback from the customers through feedback form available in our outlet. C. How Control will be Effective The efficacy of monitoring actual sales versus target sales will give us an indication of the efficacy of our marketing drive and to validate our hypothesis about the market. If market performance fell short of expectation, we will be able to apply remedial measure to steer actual performance in the direction of planned performance. By soliciting the feedback of our customers, we will be able to determine which part of the business is doing well or fell short of expectation. As it is the vision of the company to leverage itself from the competition through customer service that is second to none, we will be able to determine if indeed our frontliner’s performance is in line with this vision and make nece ssary correction or retraining if actual performance fell short when compared to expectation. III. Risk Involved While there is a huge potential for our celphones having an 80 % market for them, we are not however without competition. This competition poses a risk to the business as customers have other alternatives to purchase their need for a handheld mobile device. There is also a direct competition with our products, meaning there are also other businesses selling the same product such as ours and priced competitively and could even be lower. Also, there is also a risk that the market may not respond to our marketing drive of providing them a celphone with two working SIM cards with a TV and game functionality. While this added functionality may provide them with convenience and