Thursday, October 31, 2019

Financial Managment course project Research Paper

Financial Managment course project - Research Paper Example Discussion of the family riches would involve studying the personal, professional and the financial initiative that makes the family rich. Financial initiative Finance initiative represent a step taken by an individual by showing his willingness to remain strong in gaining market share while trumping the existing competition. The Rothschild family has taken a financial initiative to ensure that they remain economically afloat. One of the major financial initiative taken by the family is the maximizing their concentration in bank investment. Since the foundation by Amschel Rothschild the family has continued, sharpen their ways of bank investment because of the realization that it fetch them more money (Nasar, 2000, p.636). The concentration in banking activities has helped the family in developing better ways of increasing their wealth through their investment. For instance, the family have branches across the UK and US something that has helped in increasing their market share. Esta blishing branches in the richest zones around the world is enough financial initiative that would have acted as a pinnacle for the wealth of the family. The branches helped the family into reaching a wider market thereby raising their acquisition from the market. Another financial initiative witnessed by the family in the early 20th century is their involvement in other investment activities. After the realization that only one type of investment would not serve well, the family went flexible by exploring other investment activities. The family decided to expand their operations by investing in railway, coal, iron working, oil and metallurgical investments (Golden, 2012, p. 67). This change in the strategy assured the family of success since a failure in one activity would have been compensated by the success of another. It is true that diversification in the investment activities helped the family a bid deal especially after the Nazi seized their Austrian banking house. Without the investment in other acitivities, the family would have suffered some sort of downfall. The family has also included in their operation, the provision of government securities. Another financial initiative applied by the family is the expansion of its operation to include government securities and industrial companies. The two, government and industrial companies represent the pillar of any economy; hence, their inclusion means the family has also established themselves as a pillar in the economy. Inclusion of government as one of the clients represents one of the strongest financial initiative that a company can make. It is often difficult for the government to suffer downfalls hence a deal with them is an initiative towards staying rich as long as the government remains in position. The government is the last resort for any activity occurring in a country; hence, including them in investment means the family have strengthened their acquisition in the territory. Further, another fi nancial initiative is the inclusion of the bigger industrial companies in their investment activities. This also assures the family of a lasting wealth since the other big industrial companies would do anything within their effort to avoid downfall. The financial initiative taken by the family, in including the big names in their investment list, means that their downfall would mean the downfall of the global economy. It is difficult for the

Monday, October 28, 2019

We Cannot Live in It Can We Live Without It Essay Example for Free

We Cannot Live in It Can We Live Without It Essay Water is very important to us. Period. We will die without it, but unfortunately we also can not live with too much water. Our bodies are not designed to handle too much water. Our infrastructures also can not withhold massive amounts of water. Therefore we hope things like tsunamis, or hurricanes or typhoon or heavy snowfall or blizzard would not occur in an extreme manner. We all know our resources are depleting and I am going to encourage you to find ways to safe water. We have too much water this year, thats true. At the moment, despite of too many chaotic problems happening in the Arabian countries, other countries are trying to stay alive fighting with the environment. Australia has so much water, flood upon floors. Brazil as well, also flood. Many parts of Europe are having so much snow this winter, and even in US, many states are just struggling to keep their home premises snow-free. So why should we start to save water? and How? Good old days. In the good old days, people collect rain water. I remember my grandmothers garden had 3 huge vase like the picture on the right at the corner of the house where the pipes would hang out from the roof. When it rains the rainwater would flow down to these huge vase. Save money my grandmother replied whenever I ask her why she had those three huge vases in the garden. I dont have to use clean water to water plant. They dont need drinking water, rainwater is the best for them. Very natural, good for me and for them. When she washed the rice, she would not just throw away the rice water, she would pour it over her plants. Or when she washed fish or shrimps. she would do the same. Very nutritious for them. She would tell me. The good old days, people then would look at the resources around them and then think about how the resources can benefit humans and nature. Now, what happen between good old days and now? Water is an increasingly and precious topic of discussion worldwide. The irrational use and pollution from major sources (rivers and lakes) can cause a lack of fresh water very soon, if no action is taken. Soon there will be a lack of water for irrigation in many countries, especially in poor countries. The continent hardest hit by water shortages are: Central Asia, Africa and the Middle East. The need for fresh water increased about two times more than the world population. This was caused by high consumption of water for industrial and agricultural areas. Unfortunately, only 2.5% of Earths water is fresh water. The main causes of deterioration of rivers, lakes and oceans are pollution and contamination by pollutants and sewage. Humans have caused all this damage to nature, through the waste, sewage, industrial waste and mining without control. Aquifers (large underground reserves of fresh water) have already been explored. In South America, we have one of the largest aquifers in the world. Much of the water of this aquifer is located in the Brazilian underground. Studies of the World Water Commission and other international agencies show that billions of people on our planet are living without the bare minimum of health conditions. Millions of persons have no access to drinking water. Given these serious problems, several diseases such as diarrhea, hepatitis and many others are spread. Haiti According to the Center for Infectious Disease Control (CDC), based in Atlanta, United States, approximately 1.3 million Haitians are still living in relief camps after the January earthquake, hindering access to drinking water, health conditions and health care. The first cases of the disease, transmitted through contaminated water or food, were recorded at the river Arbonite, in the north. Cases of cholera have been identified in all ten regions of Haiti. About 1,100 people have died from the disease last month. In total at least 17 000 cases of the disease have been recorded. It is necessary that the public be informed that the disease is treatable. Cholera causes diarrhea and vomiting, leading to acute dehydration. The disease can kill quickly, but is easily treated with antibiotics and hydration. Simple measures can help us avoid the water-borne diseases: Bathe daily; Using the toilet; Wash hands thoroughly before and after using the toilet; Wash hands thoroughly before eating; Trim fingernails and keep them clean; Only drink water that has been filtered and / or boiled; Wash fruits and vegetables before eating them; It is estimated that 76% of Haitians live on less than $ 3 per day and 50% have less than $ 1 a day. A bar of soap costs in normal times, $ 0.50 in most markets and Haitians, for many families, washing hands turned a potentially fatal dilemma between using the little money to buy soap or buy food. The head of the NGO Doctors without Borders in Haiti, the Italian Stefano Zannini, in a tone of relief and frustration in an interview last Wednesday, said that the workload is stressful. It is not easy to work with the smell, the noise and pressure of so many patients. He said they are working 24 hours a day and they are overloaded. Zannini also says none of the measures to contain the epidemic is meant to doctors. They depend on washing hands; have clean water and be provided by suitable target to corpses and human feces.

Saturday, October 26, 2019

Students That Suffer With ADD Should NOT Be Placed In Specialized Class

Should Students that Suffer with ADD Be Placed in Specialized Classes? Many adults and caregivers do not know what Attention Deficit Disorder (ADD) is and therefore do not know how to properly care for those children. They believe that because their children have ADD, they will not be able to learn or succeed in a normal class with other normal students. The truth is that only 1 out of every 35 students with ADD need additional help outside of the classroom because they are not sufficiently learning in it(Cowan). Many teachers and parents believe that putting children with ADD in specialized classes will help them to overcome their problems and become more successful in the classroom, but instead it will slow down their learning process, slow down their social skill development, and it will also teach them that they can use ADD as an excuse in other areas in their life(Child Development Institute). Attention Deficit Disorder is a disorder that is growing daily. In the 1920's only one out of every eight children, since then that number steadily increasing by the year, now one in every three children suffers from ADD(Cowan). Attention Deficit Disorder is a condition that causes people to have problems learning, behaving and even getting along with others. People that are diagnosed with ADD usually struggle with one or more of these common symptoms. The first symptom is inattention, which is where they will have problems with focusing in on one thing at a time, or paying attention for any amount of time. People that are inattentive have serious problems with distractions. This can severely affect a student in a classroom. Every little thing that goes on in that classroom gets their attention, whether it is from a child talking, som... ...Parent and Teacher Ratings of ADHD Symptoms: Psychometric Properties in a Community-Based Sample" Journal of Critical Child Psychology. 1991, Vol. 20, No. 3, Pages 245-253 Kraus, Jeanne. Cory Stories: A Kid's Book about Living with ADHD. Washington D.C.: Magination Press. 2005 Lavoie, Richard. It's So Much Work to be Your Friend. New York: Touchstone. 2005 Miller, Steve Dr. and Dr, Bernard Valman. Children's Medical Guide. London: DK. 2002 Nadeau, Kathleen G, and Ellen B. Dixon. Learning to Slow Down and Pay Attention. Washington D.C.: Magination Press. 2005 Roseman, Bruce M.D., A Kid Just Like Me. New York: The Berkley Publishing Group. 2001. Rotner, Shelly and Sheila Kelly Ed.D. The A.D.D. Book for Kids. Connecticut: The Millbrook Press, Inc. 2000 Umansky, Warren, Ph.D., and Barbara Steinberg Smalley. AD/HD: Helping Your Child New York: Warner Books Inc. 2003

Thursday, October 24, 2019

Amazing Grace :: Amazing Grace Essays

Amazing Grace As part of the summer reading assignment this year, I read the book Amazing Grace by Jonathan Kozol.   In this documentary-style book, he told about the horrible yet completely realistic conditions of the most poor, rundown neighborhoods and districts in New York City.   Kozol wrote the book for the purpose of telling the stories of the children who lived in these parts of the city.   He dedicated his work to those children and it was his goal to inform readers that slums were in fact in existence and the children who resided there did not deserve to live in such a poverty-stricken area.   The question "Why should their childhood be different from others across the country?" arose often and needs to be examined by all.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In some ways the stories, accounts and tales of these inner city children were shocking.   I was aware that slums existed, but knew nothing of how they functioned, what living conditions were really like, or how the people there managed to live.   But in no way was I aware that such conditions existed in America, the so called "Land of Opportunity."   It seems it was just the opposite in these ghettos.   There was very little, if any for the people living here.   No chance whatsoever of employment outside the ghetto, or being accepted outside it.   It was their home, they were not supposed to leave it, and when they did they were eyed with hate by other people who did not want to be in their presence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   I was also mortified by the extremely high amounts of child deaths in this particular ghetto.   It seemed terrible that so many young children were getting killed, whether it be an accidental death in an elevator shaft, and mistaken shootings, or because of the extremely unhealthy conditions they were living in and the poor treatments that were available at area hospitals.   I cannot even imagine myself in those conditions or anyone for the matter.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The stories of people’s bravery in the face of so much adversity affected me the most.   I am amazed by the people who live in these terrible conditions day after day year after year yet still have the drive to go on and encourage others that things will be better and that one day everything will be all right.

Wednesday, October 23, 2019

Chapter 1 †Research in Business, Chapter 2 †Ethics in Business Research

CHAPTER 1 – RESEARCH IN BUSINESS Why Study Business Research? Business research provides information to guide business decisions. Business research plays an important role in an environment that emphasizes measurement. Return on investment (ROI) is the calculation of the financial return for all business expenditures and it is emphasized more now than ever before. Business research expenditures are increasingly scrutinized for their contribution to ROMI. Research Should Reduce Risk The primary purpose of research is to reduce the level of risk of a marketing decision.Business Research Defined A process of determining, acquiring, analyzing, synthesizing, and disseminating relevant business data, information, and insights to decision makers in ways that mobilize the organization to take appropriate business actions that, in turn, maximize business performance. What’s Changing in Business that Influences Research Several factors increase the relevance for studying business research. †¢Information overload. While the Internet and its search engines present extensive amounts of information, its quality and credibility must be continuously evaluated.The ubiquitous access to information has brought about the development of knowledge communities and the need for organizations to leverage this knowledge universe for innovation—or risk merely drowning in data. Stakeholders now have more information at their disposal and are more resistant to business stimuli. †¢Technological connectivity. Individuals, public sector organizations, and businesses are adapting to changes in work patterns (real-time and global), changes in the formation of relationships and communities, and the realization that geography is no longer a primary constraint. Shifting global centers of economic activity and competition.The rising economic power of Asia and demographic shifts within regions highlight the need for organizations to expand their knowledge of consumers, suppliers, talent pools, business models, and infrastructures with which they are less familiar. †¢Increasingly critical scrutiny of big business. The availability of information has made it possible for all a firm’s stakeholders to demand inclusion in company decision making, while at the same time elevating the level of societal suspicion. More government intervention. As public-sector activities increase in order to provide some minimal or enhanced level of social services, governments are becoming increasingly aggressive in protecting their various constituencies by posing restrictions on the use of managerial and business research tools. †¢Battle for analytical talent. Managers face progressively complex decisions, applying mathematical models to extract meaningful knowledge from volumes of data and using highly sophisticated software to run their organizations.The shift to knowledge-intensive industries puts greater demand on a scarcity of well-trained talent with advanced analytical skills. †¢Computing Power and Speed. Lower cost data collection, better visualization tools, more computational power, more and faster integration of data, and real-time access to knowledge are now manager expectations†¦not wistful visions of a distant future. †¢New Perspectives on Established Research Methodologies. Older tools and methodologies, once limited to exploratory research, are gaining wider acceptance in dealing with a wider range of managerial problems.Business Planning Drives Business Research An organization’s mission drives its business goals, strategies, and tactics and, consequently, its need for business decision support systems and business intelligence. Hierarchy of Business Decision Makers Visionaries, Standardized Decision Makers, Intuitive Decision Makers †¢In the bottom tier, most decisions are based on past experience or instinct. Decisions are also supported with secondary data searches. †¢In the mi ddle tier, some decisions are based on business research. †¢In the top tier, every decision is guided by business research.Firms develop proprietary methodologies and are innovative in their combination of methodologies. There is access to research data and findings throughout the organization. Research May Not Be Necessary Business research is only valuable when it helps management make better decisions. A study may be interesting, but if it does not help improve decision-making, its use should be questioned. Research could be appropriate for some problems, but insufficient resources may limit usefulness. Information Value Chain Computers and telecommunications lowered the costs of data collection. Data management is now possible and necessary given the quantity of raw data. †¢Models reflect the behavior of individuals, households, and industries. †¢A DSS integrates data management techniques, models, and analytical tools to support decision making. †¢Data must be more than timely and standardized; it must be meaningful. These are all characteristics of the information value chain. Characteristics of Good Research Clearly defined purpose, detailed research process, thoroughly planned design, high ethical standards, limitations addressed, adequate analysis, unambiguous presentation, conclusions justified, credentialsHow the Research Industry Works Some Organizations Use Internal Research Sources; Internal researchers are â€Å"in-house. † Some Organizations Use External Research Sources; External research suppliers can be further classified into business research firms, communication agencies, consultants, and trade associations. Business Research Firms Business research firms may be full-service or specialty-based. †¢Full-service firms conduct all phases of research from planning to insight development. They may offer custom projects tailored to a client’s needs and/or proprietary work. Proprietary methodologies are prog rams or techniques that are owned by a single firm. †¢Specialty firms establish expertise in one or a few research methodologies. They represent the largest number of research firms and tend to dominate the small research firms operated by a single research firm or a very small staff. †¢Syndicated data providers track the change of one or more measures over time, usually in a given industry. †¢Some research firms offer omnibus studies that combine one or a few questions from several business decision makers who need information from the same population.CHAPTER 2 – ETHICS IN BUSINESS RESEARCH Ethical Treatment of Participants Research must be designed so that a participant does not suffer physical harm, discomfort, pain, embarrassment, or loss of privacy. This slide lists the three guidelines researchers should follow to protect participants. When discussing benefits, the researcher should be careful not to overstate or understate the benefits. Informed consent means that the participant has given full consent to participation after receiving full disclosure of the procedures of the proposed study.Characteristics of Informed Consent Since 1966, all projects with federal funding are required to be reviewed by an Institutional Review Board (IRB). An IRB evaluates the risks and benefits of proposed research. The review requirement may be more relaxed for projects that are unlikely to be risky – such as marketing research projects. Many institutions require that all research – whether funded or unfunded by the federal government – be reviewed by a local IRB. The IRBs concentrate on two areas. First is the guarantee of obtaining complete, informed consent from participants.The second is the risk assessment and benefit analysis review. Complete informed consent has four characteristics and these are named in the slide. 1. The participant must be competent to give consent. 2. Consent must be voluntary, and free from coercion. 3. Participants must be adequately informed to make a decision. 4. Participants should know the possible risks or outcomes associated with the research. Ethical Responsibilities Special consideration is necessary when researching the behavior and attitudes of children.Besides providing informed consent, parents are often interviewed during the selection process to ensure that the child is mature enough and has the verbal and physical capabilities necessary. Deception Disguising non-research activities. Camouflaging true research objectives. Debriefing Explain any deception, Describe purpose, Share results, Provide follow-up. In situations where participants are intentionally or accidentally deceived, they should be debriefed once the research is complete. Debriefing describes the goals of the research, as well as the truth and reasons for any deception.Results are shared after the study is complete. Participants who require any medical or psychological follow-up attention will rece ive it during the debriefing process. Right to Privacy Right to refuse, prior permission to interview, limit time required. Data Mining Ethics The convenience of collecting data online has created new ethical issues. Data mining offers infinite possibilities for research abuse. The primary ethical data mining issues in cyberspace are privacy-related including consent to information collection and control of information dissemination.Legitimate data miners publicly post their information security policies. The EU countries have passed the European Commission’s data protection directive. Under the directive, commissioners can prosecute companies and block Web sites that fail to live up to its strict privacy standards. Confidentiality Sponsor nondisclosure, purpose nondisclosure, findings nondisclosure Ethics And The Sponsor Occasionally, researchers may be asked by sponsors to participate in unethical behavior. What can the researcher do to remain ethical? There are four sugges tions provided in the slide.The researcher can attempt to 1. ducate the sponsor to the purpose of the research, 2. explain the researcher’s role as a fact-finder, 3. explain how distorting the truth or breaking faith will lead to future problems, and 4. if the others fail, terminate the relationship. Effective Codes of Ethics Many organizations have codes of ethics. A code of ethics is an organization’s codified set of norms or standards of behavior that guide moral choices about research behavior. Effective codes are those that 1) are regulative, 2) protect the public interest and the interests of the profession served by the code, 3) are behavior-specific, and 4) are enforceable.

Tuesday, October 22, 2019

Night Essay

Night Essay Night Essay night is a tragic more about life in concentration camps to buy Holocaust survivor Elie Wiesel. throughout the course of the story is the overbearing this of loss. do his experiences in Nazi camps I lose faith and religion family and Humanity. ELISA loses faith in God he like many others in the concentration camps struggles for life physically and mentally. the heart of life causes him to stop believing religion. what shall I forget those moments which murdered my God and vice a lantern my dreams into dust"(pg32) what's the rate of survival head ceased for so many people eat with guy to just take him out of his misery. why should I bust his name the eternal Lord of the universe and the all powerful and terrible silence. page 31 silence is a troubled Ellie the most never shall I forget that nocturnal silence deprived me for all eternity the desire to live. Ellie struggles with faith is a major internal conflict he say sis the boy who won previously asked why you praise to God would an swer why did I pray why did I live why did I breeze religion was a huge part of his life. his belief seem to have been unconditional as if he couldn't live without his idea face in divine power button experience in the Holocaust head she can all of that. while in the camp a man asks where is God after young boys Hank total silence throughout the camp the existence of a higher being is for ever shot heard from alley who would let any of this harder happen he's confused as to what he did wrong and why did Germans would want him and his entire is dead or white God for the train him and let such a thing happen. I did not tonight I got sick sistance but I doubt is his absolute justice paid 42. the fact that he had made it through all of this gave him confidence and

Monday, October 21, 2019

World War II Bomber Command Dambuster Raids

World War II Bomber Command Dambuster Raids During the early days of World War II, the Royal Air Forces Bomber Command sought to strike at German dams in the Ruhr. Such an attack would damage water and electrical production, as well as inundate large areas of the region. Conflict Date Operation Chastise took place on May 17, 1943, and was part of World War II. Aircraft Commanders Wing Commander Guy Gibson19 aircraft Operation Chastise Overview Assessing the feasibility of the mission, it was found that multiple strikes with a high degree of accuracy would be necessary. As these would have to take place against heavy enemy resistance, Bomber Command dismissed the raids as unpractical. Pondering the mission, Barnes Wallis, an aircraft designer at Vickers, devised a different approach to breaching the dams. While first proposing the use of a 10-ton bomb, Wallis was forced to move on as no aircraft capable carrying such a payload existed. Theorizing that a small charge could break the dams if detonated below the water, he was initially thwarted by the presence of German anti-torpedo nets in the reservoirs. Pushing on with the concept, he began developing a unique, cylindrical bomb designed to skip along the surface of the water before sinking and exploding at the dams base. To accomplish this, the bomb, designated Upkeep, was spun backwards at 500 rpm before being dropped from low altitude. Striking the dam, the bombs spin would let it roll down the face before exploding underwater. Wallis idea was put forward to Bomber Command and after several conferences was accepted on February 26, 1943. While Wallis team worked to perfect the Upkeep bomb design, Bomber Command assigned the mission to 5 Group. For the mission, a new unit, 617 Squadron, was formed with Wing Commander Guy Gibson in command. Based at RAF Scampton, just northwest of Lincoln, Gibsons men were given uniquely modified Avro Lancaster Mk.III bombers. Dubbed the B Mark III Special (Type 464 Provisioning), 617s Lancasters had much of the armor and defensive armament removed to reduce weight. In addition, the bomb bay doors were taken off to allow the fitting of special crutches to hold and spin the Upkeep bomb. As the mission planning progressed, it was decided to strike the MÃ ¶hne, Eder, and Sorpe Dams. While Gibson relentlessly trained his crews in low-altitude, night flying, efforts were made to find solutions to two key technical problems. These were ensuring that the Upkeep bomb was released at a precise altitude and distance from the dam. For the first issue, two lights were mounted under each aircraft such that their beams would converge on the surface of the water then the bomber was at the correct altitude. To judge range, special aiming devices which utilized towers on each dam were built for 617s aircraft. With these problems solved, Gibsons men began test runs over reservoirs around England. Following their final testing, the Upkeep bombs were delivered on May 13, with the goal of Gibsons men conducting the mission four days later. Flying the Dambuster Mission Taking off in three groups after dark on May 17, Gibsons crews flew at around 100 feet to evade German radar. On the outbound flight, Gibsons Formation 1, consisting of nine Lancasters, lost an aircraft en route to the MÃ ¶hne when it was downed by high tension wires. Formation 2 lost all but one of its bombers as it flew towards Sorpe. The last group, Formation 3, served as a reserve force and diverted three aircraft to Sorpe to make up for losses. Arriving at MÃ ¶hne, Gibson led the attack in and successfully released his bomb. He was followed by Flight Lieutenant John Hopgood whose bomber was caught in the blast from its bomb and crashed. To support his pilots, Gibson circled back to draw German flak while the others attacked. Following a successful run by Flight Lieutenant Harold Martin, Squadron Leader Henry Young was able to breach the dam. With the MÃ ¶hne Dam broken, Gibson led the flight to Eder where his three remaining aircraft negotiated tricky terrain to score hits on the dam. The dam was finally opened by Pilot Officer Leslie Knight. While Formation 1 was achieving success, Formation 2 and its reinforcements continued to struggle. Unlike MÃ ¶hne and Eder, the Sorpe Dam was earthen rather than masonry. Due to increasing fog and as the dam was undefended, Flight Lieutenant Joseph McCarthy from Formation 2 was able to make ten runs before releasing his bomb. Scoring a hit, the bomb only damaged the crest of the dam. Two aircraft from Formation 3 attacked as well, but were unable to inflict substancial damage. The remaining two reserve aircraft were directed to secondary targets at Ennepe and Lister. While Ennepe was unsuccessfully attacked (this aircraft may have struck Bever Dam by mistake), Lister escaped unharmed as Pilot Officer Warner Ottley was downed en route. Two additional aircraft were lost during the return flight. Aftermath Operation Chastise cost 617 Squadron eight aircraft as well as 53 killed and 3 captured. The successful attacks on the MÃ ¶hne and Eder dams released 330 million tons of water into the western Ruhr, reducing water production by 75% and flooding large amounts of farmland. In addition, over 1,600 were killed though many of these were forced laborers from occupied countries and Soviet prisoners of war. While British planners were pleased with the results, they were not long lasting. By late June, German engineers had fully restored water production and hydroelectric power. Though the military benefit was fleeting, the success of the raids provided a boost to British morale and aided Prime Minister Winston Churchill in negotiations with the United States and Soviet Union. For his role in the mission, Gibson was awarded the Victoria Cross while the men of 617 Squadron received a combined five Distinguished Service Orders, ten Distinguished Flying Crosses and four bars, twelve Distinguished Flying Medals, and two Conspicuous Gallantry Medals. Selected Sources Dambusters.orgThe DambustersBBC: Barnes Wallis

Sunday, October 20, 2019

Plato’s argument Essay Example

Plato’s argument Essay Example Plato’s argument Essay Plato’s argument Essay I think Plato’s statement that what is holy and what is approved of by the Gods are non the same thing is converting. If we’ll take a deeper expression. being holy and being approved of have a large difference in footings of criterions and building. First. what is holy agencies something that is sacred or sanctified. In footings of criterions. the things that are considered sanctums are natural. Meaning. these are the things that have been blessed and considered sanctum because of godly intercessions. In footings of building. these are the things that are concrete. Meaning. these can non be crook or changed in any state of affairs that may happen. On the other manus. what are approved of by the Gods are things that are created on a instance to instance footing depending on different factors like the impression of justness. Compared to those that are holy. those that are approved by the Gods may be changed or modified. What is holy may or may non be approved by the Gods. while what is approved of by the Gods may or may non be considered sanctum. Discussion 4: Though there are the co-called white lies that are used so that people won’t be able to ache other people from the truth and protect their personal involvements. still a prevarication is a prevarication. For me. there are no peculiar incidents by which we can state that it is right to lie. As I’ve heard before. A lie merely produces a 1000 more prevarications. Truth injuries but prevarications are worst. Besides. it has been stated that stating a prevarication is a wickedness. May it be minimum. still. it is lying. Kant said that moral good must be based on ground. If a individual would state a prevarication for the ground of protecting his/her personal involvement. is the prevarication considered moral? Of class non. Because it was besides stated that Kant wants to utilize moral rules as a protection against people that would desire to act merely in their ain best involvements. for personal addition. or based merely on feelings. I think. the range of morality is manner excessively large because morality may besides depend on each civilization and belief that people possess. Discussion 5: Most state of affairss that we see on Television and even in existent life are scenarios of large childs strong-arming the smaller 1s in school. The large childs would hassle the smaller 1s to do them make their assignments. tests and even take money or bites from them. This can be a simple illustration of utilizing other individual simply as agencies. On the other manus. there are besides those who are sort who protect the smaller childs and assist them to maintain off from the toughs. This is a instance in which a individual is esteeming another individual as an end-in-him/herself. Mentioning to Kant’s text. The moral system of Kant depends excessively on the thought of our freedom. Kant describes being free as following our ain rational rules. alternatively of merely our desires . I think it is impossible to populate a life in which we do non utilize other people simply as agencies. This is because. there are no perfect individuals in the universe and when we sometimes use our freedom. we tend to take to make the things that would profit us instead than choose those that are wholly moral and rational. Not utilizing a individual in this universe is much excessively ideal. Discussion 6: I believe that people should make what is in their ain ego involvement every bit long as is morally right and does non oppose any regulations or jurisprudence regulating him/her. I don’t agree with Ethical Egoism. Indeed. there are things which we desire or want for ourselves. But. the first inquiry we should inquire is Do we truly necessitate what we want? because in the first topographic point. non everything we want is truly indispensable to us. A want is different from a need . Besides. what we ought to make is analyse the things we want. If we think these wants are justifiable and come-at-able but in a righteous manner. so possibly we can prosecute these. If I have the ring. I’ll think really carefully of what to make with it. Ideally. I would make what is rightful and just. Discussion 7: I don’t agree with Mill that the proper criterion of doing the universe a better topographic point is through felicity. Mill stated that actions are right in proportion as they tend to advance felicity ; wrong as they tend to bring forth the contrary of happiness†¦ the felicity of a group of persons taken as a whole is desirable for the group as a whole . Let’s say for illustration. we have a group of corrupt politicians. Their action to bring forth felicity is through corruptness and what is desirable for their group is stealing 1000000s of money from the people for their personal benefit. It supports the thought of Mill yet did they do the universe a better topographic point? No. hence. felicity is non the proper criterion of doing the universe a better topographic point.

Saturday, October 19, 2019

Philosophy of Language Senior Course Paper Essay

Philosophy of Language Senior Course Paper - Essay Example When a mathematician is presented with the equation, 38 + 16, instinctively, the mathematician would respond by adding the two terms while computing for its sum. Thus, the mathematician would reply, claiming that the sum of 38 and 16 is equal to 54. Given this example, what does ‘+’ mean? Does the mathematician really know what was meant by ‘+’ in the equation? Does it pertain to the computational procedure for adding two values, or does it pertain to something else? How can one tell what the mathematician meant? This paper will attempt to formulate a sufficient theory of meaning with regards to the use of ‘+.’ In doing so, I will argue that an intensional framework must be taken into account as opposed to a purely extensional framework. From a general perspective, the issue revolves around the relation between two fundamental concepts, truth and meaning. Truth, from a logical point of view, has traditionally been thought of as extensional. So t he truth of a given expression is associated with it’s meaning in terms of logical structure, reference, and truth-value. This move of neglecting meaning in relation to that of the sense of a given expression is what this paper shall argue against by using ‘+’ as its test case throughout the paper. For herein, to say that 36 + 16 = 54 could mean two things: ‘36 plus 16,’ and ‘36 quus 16,’ with both referring to 54. It is in this regard that a theory of intensions must be taken into account. For, if a person is presented with an equation involving ‘+’, how can one know as to whether that person meant ‘+’ as plus or ‘+’ as quus? What makes the interlocutor assume what is being referred to by the use of ‘+’? Herein is where the problem of rule following comes into light, for if what we are after is semantics, then it seems paradoxical that we refer to general rules from which a class parti cipates in. Rule following applies in the level of syntax, for verifying what the individual knows privately is not required in such cases. Indeed, the problem with ‘+’, as explicated by Kripke is that ‘+’ is understood to represent a semantic rule rather than a syntactical rule, and a semantic rule following leads to several problems with regards to the meaning and truth of ‘+’ statements. Thus, Kripke argues that â€Å"it is possible to construct an unlimited range of related but non-equivalent semantic rules, incorporating the potential truth conditions C1, C2, †¦ Cn respectively, such that there are simply no facts at all about the speaker’s use of ‘+’ that determines which, if any, of these possible rules the speaker has actually adopted† (Wilson, 2006, p.155). Therefore, this points towards the problem of indeterminacy, since according to Kripke, discovering the truth conditions of the speaker’s use of + is not possible, since there is no specific semantic rule that underlies one’s use of ‘+’, regardless of its truth function. However, this creates a problem with regards to the use of ‘+’ in language, for if ‘+’ could mean several things at the same time and in the same respect, then that would lead to the ambiguity of ‘+’ which cannot be, for it is used in disciplines such as mathematics and logic. It is a common thing

Friday, October 18, 2019

Salary research paper Example | Topics and Well Written Essays - 500 words

Salary - Research Paper Example Moreover, it has a wide product portfolio because it offers electronics to almost all niches in the market (Al-Mubaraki, 2010). One of the weaknesses of the market is weak financial performance, high dependence on the mature market and not emergent markets. Also, the company has a high dependence on third parties and is faced by litigation. The opportunities that the company has included acquisition Amici and XMPie, growth in small and midsized consumer markets and exploitation of the color peripherals business (Al-Mubaraki, 2010). The Information Management Manager II is a job that earns $9,223.93 - $11,211.89 per month. The salary range applies throughout the County of Santa Clara in California. It is a full-time work under the department of the Valley Medical Centre. The job number is 13013644 in the Xerox Corporation. The manager should manage, coordinate and appraise the information systems found in Santa Clara Valley Health and Hospital System. The tasks typical to this management position include developing and implementing tactical plans for information and communication technology for departments. It also covers execution and maintenance of information services projects. The manager is also supposed to provide analytical support in the evaluation of the functionality of information service structures. He should also offer unending support. This means that the manager should be understood the principles, practices as they relate with networks and electronic equipment (Renard, 2007). Surveys selected include Bureau of Labor Statistics (BLS) Wage data and National Compensation Survey. Other sources of salary data are the Salary.com, an online salary research service called Salary Search. WorldatWork is another association that is made up of international human resource practitioners is renowned worldwide as an authority on compensation matters (Ioannis,

Housing Health and Safety Rating System Essay Example | Topics and Well Written Essays - 1250 words

Housing Health and Safety Rating System - Essay Example However, one must note that enforcements are made only after thorough inspection of the dwelling and not before the inspecting staff is 100% sure of the violence of any condition under HHRS. (Housing Health and Rating System: Operating Guide, pp.6-10) Upon receiving a complaint, inspecting staff is directed toward the property. This staff carries out a through inspecting and notes down everything in inspection checklist. References are then made to housing act of 2004, HHRS (Housing health and rating system) and associated guides and law books. It is then based on the judgment of inspection staff to propose to the government whether the property is safe or is unsafe for the tenants in the property. This proposal has to be made in the form of a report which contains: After all this has been specified, then the report further contains a brief description of the property. This description starts with the type of construction, age of the property and the size of the property. It then states how many floors do this property has and measurements of the walls how thick and tall the walls are. It also contains the number of windows and doors this property has. Then the report discusses the type of accommodation of the property. The covered area of each floors and types of rooms like kitchen, living area should be specified. ... It also contains the number of windows and doors this property has. Then the report discusses the type of accommodation of the property. The covered area of each floors and types of rooms like kitchen, living area should be specified. Then the same information is specified for the first floor and any other floor that the property has. Then, the report talks about the garden area of the property and how well it has been kept. Then based on the schedule of works and the finding of the research on the property, various recommendations are made. The new HHRS system is flexible and actions are not rigid but are very flexible and taken after determining the following factors: Whether the property is empty or occupied Number of people living in the property In the information of the assignment, dampness and mud growth fall under the category 1 of the hazard. The way to categories them in either 1st category or second doesn't only depend on the inspector's judgment but in recent area a formula has been developed to give weightage to each hazard and then depending on this weightage classifying them in either hazard of category 1 or 2. There can be only one action taken against one hazard and simultaneously many actions cannot be taken at once Suppose if the housing health department issues a prohibition notice to the owner about his breach of law. This may not necessarily tempt him into improving the condition of the problem because he's not been fined or any thing and there's not incentive for him to improve the condition unless the government fines him. Similarly if the government sent him improvement notice he may not do so unless he's been threatened or incentive is created for him. Similarly,

Thursday, October 17, 2019

Business law Essay Example | Topics and Well Written Essays - 500 words - 18

Business law - Essay Example The courts might have used the written law to make their judgments. Andersen was found guilty of obstruction of justice for destroying of potential evidence by shredding their documents which could have been used by Securities and Exchange Commission (SEC), the agency of the US Government With the primary responsibility for regulation of securities markets. Under US GAAP, the only acceptable method of financial reporting is consolidation of controlled entities .non consolidation can only occur under specific conditions Outside USA; consolidated financial reporting is called group accounting and is required when one entity owns more than half of the other entity and can dictate its operations. Consolidating financial reporting is complex and requires financial statements to be combined and reported as a single financial report. Enron failed to comply with this ethic Enron major crime was misrepresentation and misleading the general public about their financial position. Enron did not disclose its real financial figures. The major requirement in US financial reporting is disclosure of information. The disclosure requirement is based on the premise that markets are efficient. Enron traded on future contracts called derivatives because they derived their value from underlying assets. The market of the contracts reduces the volatility of prices by fixing a price at a future date. Example assume Enron have two option contracts matching the same amount of a commodity over the same period of time. One contract was to purchase the commodity while other contract was to sell the commodity. Enron looked on to the future on the assumption that contracts were exercised and there were net results. After evaluating all cost, the net income (loss) was estimated. The net income (loss) was discounted to its present value and recorded as loss. Earnings reported under the market to market were easy to manipulate because active markets for contracts dating

Personal reflection Essay Example | Topics and Well Written Essays - 2500 words

Personal reflection - Essay Example of group socialization are products of group rules and norms, where norms are more dynamic, hidden, and forceful than rules in influencing groupthink and conflict management. The paper proceeds to definitions of concepts. Group socialization refers to the social process and influences by which new members and old members become used to one another (Galanes, & Adams, 2006, p.153). The phases of group socialization are antecedent, anticipatory, encounter, assimilation, and exit phases. Groupthink refers to the quick way of group thinking mode, as members engage in concurrence or conformity which becomes dominant because of in-group cohesiveness that overrides the evaluation of alternative courses of action (Janis, 1972, p.158). Group rules are statements that guide members on how they may, or, should behave, which may be expressed in writing or informally, such as what happens for group norms (Galanes, & Adams, 2006, p.154). Group norms are unspoken formal rules that peer pressure implements and which affect the actions of group members (Galanes, & Adams, 2006, p.154). Norms also reflect cultural beliefs that are connected to what is considered as acceptab le or unacceptable behaviors (Galanes, & Adams, 2006, p.154). Conflict is defined as the manifested struggles among interdependent members that happen due to differences in perceptions of and implementation of goals and other sources of disagreements (Galanes, & Adams, 2006, p.305). From these definitions, group members, because of their interdependence and because they are human beings with individual and social differences, are bound by group goals, but can be divided by groupthink and conflict. The theory regarding the process of group socialization is criticized next. Group socialization starts with the antecedent phase, where members’ characteristics, listening styles, cultural differences, and feelings about group responsibilities shape throughput and output variables (Galanes, & Adams, 2006, p.154).

Greenways Garage Evaluation Report Essay Example | Topics and Well Written Essays - 1750 words

Greenways Garage Evaluation Report - Essay Example The word improvement deals with maximizing opportunities, increasing the production at a lower cost and creating more profit. In doing this kind of endeavor, one thing should be the outmost priority of the business enterprise, and that is to satisfy the needs of the customers because primarily, it is the reason of the existence of the business. "Quality thinking was initially based on users' charters (1991 'Citizens Charter' in the UK, 1992 'Charte des services publics' in France and in 1993 the Users' Charter in Belgium, later followed by a number of other countries). During the late 1980s and early 1990s, Total Quality Management focuses on products that are primarily catered for public consumption. Later on, a variation of quality models (EFQM, ISO) and the Common Assessment Framework (CAF) were made available for the benefit of public sector. Recently, new members of the EU have taken quality management aboard (.Bouckaert G,1993)1 In the United States, a number of companies use MBNQA or Malcolm Baldrige National Quality Award which is credited for the success of most companies in the aforementioned country along with the Baldrige approach. Furthermore, Vinod Singhal, Professor of Operations Management at Georgia Institute of Technology, reported to an audience of international quality improvement leaders in The Hague, Netherlands on 3 June 2003, it is a change strategy used by growing numbers of businesses around the globe because it works to improve results.2 Here in Europe, variety of measurements are used nowadays to ensure the productive performance of a certain enterprise which is beneficial to managers on how will they implement strategies for a competitive business process.2:2Quality and Quality assurance developments -This part discusses the four Models that are used in Europe, in quality and quality assurance developments One of which is the EFQM Excellence Model or the European Foundation for Quality Management, a non-profit membership foundation s the primary source for organizations in Europe looking to excel in their market and in their business with website available at http://www.efqm.org/3.The other methods include, the Benchmarking, a process that provides accurate measure of performance relative to a Council's peers, and has been shown to provide the motivation for management to seriously consider improvement processes, and ultimately reduce risk in the workplace (http://www.emrc.org.au/risk.asppg=133)4, There are three forms of benchmarking namely : internal, competitive and generic . "Internal benchmarking is deemed as comparisons between units within the institutions. Competitive and generic benchmarking refers to identifying best practices of other organizations. Competitive benchmarking involves comparisons with direct competitors, whereas generic benchmarking involves organisations that are not direct competitors but share similar organisational practices and procedures" (Doerfel and Ruben 2002, 6-7)5. A management system that

Wednesday, October 16, 2019

Qualifying Exam Theories Essay Example | Topics and Well Written Essays - 1750 words

Qualifying Exam Theories - Essay Example International organizations backed by World Bank have been advocating poverty alleviation through economic policies that are international in nature but have the potential to influence national policies (Introduction to international relations: Social constructivism, 2012, p 170). There is an emerging ‘global anti-poverty agenda’ that has changed the rules the way people, government and other public organizations are tackling poverty (Noel, 2006). There are several theories that have emerged to explain and tackle poverty; however, all theories seem to agree upon the issue of tackling the problem as inherent and arising in the social structure, which is also seen to be the best solution seems (Altatis, 2012). Liberalism postulates freedom of thought and expression and opposes conservative and authoritarian views. It is a doctrine aimed at helping the outward welfare of men and does not take into account the inner welfare. It is concerned with the outward conduct of men. This doctrine recognizes that inner welfare cannot come from outward, materialistic possession. However, it posits equality of material possessions based on division of labor and individual capability to labor and materialistic possession. Outer well being as advocated by liberalism and its proponents is very much needed for man as it gives every individual a chance and the right to equal opportunity. This theory is based on equality of men in line with the natural law and law of enlightenment and demands equality of political and civil rights to all men. It is based on the assumption that differences between men are artificial and that all men are created equal, and hence need to be given equal rights (Mises, 2012). With equality under law, each individual will have the right and freedom to work to his capacity to be able to attain social equality. Although private ownership is said to create differences in terms of material possession, liberalism with its stress on materialistic

Tuesday, October 15, 2019

Greenways Garage Evaluation Report Essay Example | Topics and Well Written Essays - 1750 words

Greenways Garage Evaluation Report - Essay Example The word improvement deals with maximizing opportunities, increasing the production at a lower cost and creating more profit. In doing this kind of endeavor, one thing should be the outmost priority of the business enterprise, and that is to satisfy the needs of the customers because primarily, it is the reason of the existence of the business. "Quality thinking was initially based on users' charters (1991 'Citizens Charter' in the UK, 1992 'Charte des services publics' in France and in 1993 the Users' Charter in Belgium, later followed by a number of other countries). During the late 1980s and early 1990s, Total Quality Management focuses on products that are primarily catered for public consumption. Later on, a variation of quality models (EFQM, ISO) and the Common Assessment Framework (CAF) were made available for the benefit of public sector. Recently, new members of the EU have taken quality management aboard (.Bouckaert G,1993)1 In the United States, a number of companies use MBNQA or Malcolm Baldrige National Quality Award which is credited for the success of most companies in the aforementioned country along with the Baldrige approach. Furthermore, Vinod Singhal, Professor of Operations Management at Georgia Institute of Technology, reported to an audience of international quality improvement leaders in The Hague, Netherlands on 3 June 2003, it is a change strategy used by growing numbers of businesses around the globe because it works to improve results.2 Here in Europe, variety of measurements are used nowadays to ensure the productive performance of a certain enterprise which is beneficial to managers on how will they implement strategies for a competitive business process.2:2Quality and Quality assurance developments -This part discusses the four Models that are used in Europe, in quality and quality assurance developments One of which is the EFQM Excellence Model or the European Foundation for Quality Management, a non-profit membership foundation s the primary source for organizations in Europe looking to excel in their market and in their business with website available at http://www.efqm.org/3.The other methods include, the Benchmarking, a process that provides accurate measure of performance relative to a Council's peers, and has been shown to provide the motivation for management to seriously consider improvement processes, and ultimately reduce risk in the workplace (http://www.emrc.org.au/risk.asppg=133)4, There are three forms of benchmarking namely : internal, competitive and generic . "Internal benchmarking is deemed as comparisons between units within the institutions. Competitive and generic benchmarking refers to identifying best practices of other organizations. Competitive benchmarking involves comparisons with direct competitors, whereas generic benchmarking involves organisations that are not direct competitors but share similar organisational practices and procedures" (Doerfel and Ruben 2002, 6-7)5. A management system that

Role of Political Parties in India Essay Example for Free

Role of Political Parties in India Essay As with any other democracy, political parties represent different sections among the Indian society and regions, and their core values play a major role in the politics of India. Both the executive branch and the legislative branch of the government are run by the representatives of the political parties who have been elected through the elections. Through the electoral process, the people of India choose which representative and which political party should run the government. Through the elections any party may gain simple majority in the lower house. Coalitions are formed by the political parties, in case no single party gains a simple majority in the lower house. Unless a party or a coalition have a majority in the lower house, a government cannot be formed by that party or the coalition. Indian state governments led by various political parties as of March 2009. India has a multi-party system, where there are a number of national as well as regional parties. A regional party may gain a majority and rule a particular state. If a party is represented in more than 4 states, it would be labelled a national party. Out of the 64 years of Indias independence, India has been ruled by the Indian National Congress (INC) for 51 of those years. The party enjoyed a parliamentary majority save for two brief periods during the 1970s and late 1980s. This rule was interrupted between 1977 to 1980, when the Janata Party coalition won the election owing to public discontent with the controversial state of emergencydeclared by the then Prime Minister Indira Gandhi. The Janata Dal won elections in 1989, but its government managed to hold on to power for only two years. Between 1996 and 1998, there was a period of political flux with the government being formed first by the nationalist Bharatiya Janata Party (BJP) followed by a left-leaning United Front coalition. In 1998, the BJP formed the National Democratic Alliance with smaller regional parties, and became the first non-INC and coalition government to complete a full five-year term. The 2004 Indian elections saw the INC winning the largest number of seats to form a government leading the United Progressive Alliance, and supported by left-parties and those opposed to the BJP. On 22 May 2004, Manmohan Singh was appointed the Prime Minister of India following the victory of the INC the left front in the 2004 Lok Sabha election. The UPA now rules India without the support of the left front. Previously, Atal Bihari Vajpayee had taken office in October 1999 after a general election in which a BJP-led coalition of 13 parties called the National Democratic Alliance emerged with a majority. Formation of coalition governments reflects the transition in Indian politics away from the national parties toward smaller, more narrowly based regional parties. Some regional parties, especially in South India, are deeply aligned to the ideologies of the region unlike the national parties and thus the relationship between the central government and the state government in various states has not always been free of rancor. Disparity between the ideologies of the political parties ruling the centre and the state leads to severely skewed allocation of resources between the states. Function of Opposition Party: The Opposition’s main role is to question the government of the day and hold them accountable to the public. The Opposition is equally responsible in upholding the best interests of the people of the country. They have to ensure that the Government does not take any steps , which might have negative implications on the people of the country. the role of the opposition in parliament is basically to check the excesses of the ruling or dominant party, and not to be totally antagonistic. There are actions of the ruling party which may be beneficial to the masses and oppositions are expected to support such things. In Parliament, Opposition Party should act firmly on behalf of common mass fighting for their common interest and grievances. They should raise immediate protest before a Bill passed, which is against the interest of common-men. Opposition legislators should always bear in mind that they are the representatives from each and every countryman fighting for justified demands and defending all unlawful and unfair practice.

Monday, October 14, 2019

Comparison On Classification Techniques Using Weka Computer Science Essay

Comparison On Classification Techniques Using Weka Computer Science Essay Computers have brought tremendous improvement in technologies especially the speed of computer and reduced data storage cost which lead to create huge volumes of data. Data itself has no value, unless data changed to information to become useful. In past two decade the data mining was invented to generate knowledge from database. Presently bioinformatics field created many databases, accumulated in speed and numeric or character data is no longer restricted. Data Base Management Systems allows the integration of the various high dimensional multimedia data under the same umbrella in different areas of bioinformatics. WEKA includes several machine learning algorithms for data mining. Weka contains general purpose environment tools for data pre-processing, regression, classification, association rules, clustering, feature selection and visualization. Also, contains an extensive collection of data pre-processing methods and machine learning algorithms complemented by GUI for different machine learning techniques experimental comparison and data exploration on the same problem. Main features of WEKA is 49 data preprocessing tools, 76 classification/regression algorithms, 8 clustering algorithms, 3 algorithms for finding association rules, 15 attribute/subset evaluators plus 10 search algorithms for feature selection. Main objectives of WEKA are extracting useful information from data and enable to identify a suitable algorithm for generating an accurate predictive model from it. This paper presents short notes on data mining, basic principles of data mining techniques, comparison on classification techniques using WEKA, Data mining in bioinformatics, discussion on WEKA. Introduction Computers have brought tremendous improvement in technologies especially the speed of computer and data storage cost which lead to create huge volumes of data. Data itself has no value, unless data can be changed to information to become useful. In past two decade the data mining was invented to generate knowledge from database. Data Mining is the method of finding the patterns, associations or correlations among data to present in a useful format or useful information or knowledge[1]. The advancement of the healthcare database management systems creates a huge number of data bases. Creating knowledge discovery methodology and management of the large amounts of heterogeneous data has become a major priority of research. Data mining is still a good area of scientific study and remains a promising and rich field for research. Data mining making sense of large amounts of unsupervised data in some domain[2]. Data mining techniques Data mining techniques are both unsupervised and supervised. Unsupervised learning technique is not guided by variable or class label and does not create a model or hypothesis before analysis. Based on the results a model will be built. A common unsupervised technique is Clustering. In Supervised learning prior to the analysis a model will be built. To estimate the parameters of the model apply the algorithm to the data. The biomedical literatures focus on applications of supervised learning techniques. A common supervised techniques used in medical and clinical research is Classification, Statistical Regression and association rules. The learning techniques briefly described below as: Clustering Clustering is a dynamic field of research in data mining. Clustering is an unsupervised learning technique, is process of partitioning a set of data objects in a set of meaningful subclasses called clusters. It is revealing natural groupings in the data. A cluster include group of data objects similar to each other within the cluster but not similar in another cluster. The algorithms can be categorized into partitioning, hierarchical, density-based, and model-based methods. Clustering is also called unsupervised classification: no predefined classes. Association Rule Association rule in data mining is to find the relationships of items in a data base. A transaction t contains X, itemset in I, if X à  t. Where an itemset is a set of items. E.g., X = {milk, bread, cereal} is an itemset. An association rule is an implication of the form: X  ® Y, where X, Y ÃÅ' I, and X ÇY = Æ An association rules do not represent any sort of causality or correlation between the two item sets. X Þ Y does not mean X causes Y, so no Causality X Þ Y can be different from Y Þ X, unlike correlation Association rules assist in marketing, targeted advertising, floor planning, inventory control, churning management, homeland security, etc. Classification Classification is a supervised learning method. The classification goal is to predict the target class accurately for each case in the data. Classification is to develop accurate description for each class. Classification is a data mining function consists of assigning a class label of objects to a set of unclassified cases. Classification A Two-Step process show in figure 4. Data mining classification mechanisms such as Decision trees, K-Nearest Neighbor (KNN), Bayesian network, Neural networks, Fuzzy logic, Support vector machines, etc. Classification methods classified as follows: Decision tree: Decision trees are powerful classification algorithms. Popular decision tree algorithms include Quinlans ID3, C4.5, C5, and Breiman et al.s CART. As the name implies, this technique recursively separates observations in branches to construct a tree for the purpose of improving the prediction accuracy. Decision tree is widely used as it is easy to interpret and are restricted to functions that can be represented by rule If-then-else condition. Most decision tree classifiers perform classification in two phases: tree-growing (or building) and tree-pruning. The tree building is done in top-down manner. During this phase the tree is recursively partitioned till all the data items belong to the same class label. In the tree pruning phase the full grown tree is cut back to prevent over fitting and improve the accuracy of the tree in bottom up fashion. It is used to improve the prediction and classification accuracy of the algorithm by minimizing the over-fitting. Compared to other data mining techniques, it is widely applied in various areas since it is robust to data scales or distributions. Nearest-neighbor: K-Nearest Neighbor is one of the best known distance based algorithms, in the literature it has different version such as closest point, single link, complete link, K-Most Similar Neighbor etc. Nearest neighbors algorithm is considered as statistical learning algorithms and it is extremely simple to implement and leaves itself open to a wide variety of variations. Nearest-neighbor is a data mining technique that performs prediction by finding the prediction value of records (near neighbors) similar to the record to be predicted. The K-Nearest Neighbors algorithm is easy to understand. First the nearest-neighbor list is obtained; the test object is classified based on the majority class from the list. KNN has got a wide variety of applications in various fields such as Pattern recognition, Image databases, Internet marketing, Cluster analysis etc. Probabilistic (Bayesian Network) models: Bayesian networks are a powerful probabilistic representation, and their use for classification has received considerable attention. Bayesian algorithms predict the class depending on the probability of belonging to that class. A Bayesian network is a graphical model. This Bayesian Network consists of two components. First component is mainly a directed acyclic graph (DAG) in which the nodes in the graph are called the random variables and the edges between the nodes or random variables represents the probabilistic dependencies among the corresponding random variables. Second component is a set of parameters that describe the conditional probability of each variable given its parents. The conditional dependencies in the graph are estimated by statistical and computational methods. Thus the BN combine the properties of computer science and statistics. Probabilistic models Predict multiple hypotheses, weighted by their probabilities[3]. The Table 1 below gives the theoretical comparison on classification techniques. Data mining is used in surveillance, artificial intelligence, marketing, fraud detection, scientific discovery and now gaining a broad way in other fields also. Experimental Work Experimental comparison on classification techniques is done in WEKA. Here we have used labor database for all the three techniques, easy to differentiate their parameters on a single instance. This labor database has 17 attributes ( attributes like duration, wage-increase-first-year, wage-increase-second-year, wage-increase-third-year, cost-of-living-adjustment, working-hours, pension, standby-pay, shift-differential, education-allowance, statutory-holiday, vacation, longterm-disability-assistance, contribution-to-dental-plan, bereavement-assistance, contribution-to-health-plan, class) and 57 instances. Figure 5: WEKA 3.6.9 Explorer window Figure 5 shows the explorer window in WEKA tool with the labor dataset loaded; we can also analyze the data in the form of graph as shown above in visualization section with blue and red code. In WEKA, all data is considered as instances features (attributes) in the data. For easier analysis and evaluation the simulation results are partitioned into several sub items. First part, correctly and incorrectly classified instances will be partitioned in numeric and percentage value and subsequently Kappa statistic, mean absolute error and root mean squared error will be in numeric value only. Figure 6: Classifier Result This dataset is measured and analyzed with 10 folds cross validation under specified classifier as shown in figure 6. Here it computes all required parameters on given instances with the classifiers respective accuracy and prediction rate. Based on Table 2 we can clearly see that the highest accuracy is 89.4737 % for Bayesian, 82.4561 % for KNN and lowest is 73.6842 % for Decision tree. In fact by this experimental comparison we can say that Bayesian is best among three as it is more accurate and less time consuming. Table 2 : Simulation Result of each Algorithm DATA MINING IN BIONFORMATICS Bioinformatics and Data mining provide challenging and exciting research for computation. Bioinformatics is conceptualizing biology in terms of molecules and then applying informatics techniques to understand and organize the information associated with these molecules on a large scale. It is MIS for molecular biology information. It is the science of managing, mining, and interpreting information from biological sequences and structures. Advances such as genome-sequencing initiatives, microarrays, proteomics and functional and structural genomics have pushed the frontiers of human knowledge. Data mining and machine learning have been advancing with high-impact applications from marketing to science. Although researchers have spent much effort on data mining for bioinformatics, the two areas have largely been developing separately. In classification or regression the task is to predict the outcome associated with a particular individual given a feature vector describing that individu al; in clustering, individuals are grouped together because they share certain properties; and in feature selection the task is to select those features that are important in predicting the outcome for an individual. We believe that data mining will provide the necessary tools for better understanding of gene expression, drug design, and other emerging problems in genomics and proteomics. Propose novel data mining techniques for tasks such as Gene expression analysis, Searching and understanding of protein mass spectroscopy data, 3D structural and functional analysis and mining of DNA and protein sequences for structural and functional motifs, drug design, and understanding of the origins of life, and Text mining for biological knowledge discovery. In todays world large quantities of data is being accumulated and seeking knowledge from massive data is one of the most fundamental attribute of Data Mining. It consists of more than just collecting and managing data but to analyze and predict also. Data could be large in size in dimension. Also there is a huge gap from the stored data to the knowledge that could be construed from the data. Here comes the classification technique and its sub-mechanisms to arrange or place the data at its appropriate class for ease of identification and searching. Thus classification can be outlined as inevitable part of data mining and is gaining more popularity. WEKA data mining software WEKA is data mining software developed by the University of Waikato in New Zealand. Weka includes several machine learning algorithms for data mining tasks. The algorithms can either call from your own Java code or be applied directly to a dataset, since WEKA implements algorithms using the JAVA language. Weka contains general purpose environment tools for data pre-processing, regression, classification, association rules, clustering, feature selection and visualization. The Weka data mining suite in the bioinformatics arena it has been used for probe selection for gene expression arrays[14], automated protein annotation[7][9], experiments with automatic cancer diagnosis[10], plant genotype discrimination[13], classifying gene expression profiles[11], developing a computational model for frame-shifting sites[8] and extracting rules from them[12]. Most of the algorithms in Weka are described in[15]. WEKA includes algorithms for learning different types of models (e.g. decision trees, rule sets, linear discriminants), feature selection schemes (fast filtering as well as wrapper approaches) and pre-processing methods (e.g. discretization, arbitrary mathematical transformations and combinations of attributes). Weka makes it easy to compare different solution strategies based on the same evaluation method and identify the one that is most appropriate for the problem at hand. It is implemented in Java and runs on almost any computing platform. The Weka Explorer Explorer is the main interface in Weka, shown in figure 1. Open fileà ¢Ã¢â€š ¬Ã‚ ¦ load data in various formats ARFF, CSV, C4.5, and Library. WEKA Explorer has six (6) tabs, which can be used to perform a certain task. The tabs are shown in figure 2. Preprocess: Preprocessing tools in WEKA are called Filters. The Preprocess retrieves data from a file, SQL database or URL (For very large datasets sub sampling may be required since all the data were stored in main memory). Data can be preprocessed using one of Wekas preprocessing tools. The Preprocess tab shows a histogram with statistics of the currently selected attribute. Histograms for all attributes can be viewed simultaneously in a separate window. Some of the filters behave differently depending on whether a class attribute has been set or not. Filter box is used for setting up the required filter. WEKA contains filters for Discretization, normalization, resampling, attribute selection, attribute combination, Classify: Classify tools can be used to perform further analysis on preprocessed data. If the data demands a classification or regression problem, it can be processed in the Classify tab. Classify provides an interface to learning algorithms for classification and regression models (both are called classifiers in Weka), and evaluation tools for analyzing the outcome of the learning process. Classification model produced on the full trained data. WEKA consists of all major learning techniques for classification and regression: Bayesian classifiers, decision trees, rule sets, support vector machines, logistic and multi-layer perceptrons, linear regression, and nearest-neighbor methods. It also contains metalearners like bagging, stacking, boosting, and schemes that perform automatic parameter tuning using cross-validation, cost-sensitive classification, etc. Learning algorithms can be evaluated using cross-validation or a hold-out set, and Weka provides standard numeric performance mea sures (e.g. accuracy, root mean squared error), as well as graphical means for visualizing classifier performance (e.g. ROC curves and precision-recall curves). It is possible to visualize the predictions of a classification or regression model, enabling the identification of outliers, and to load and save models that have been generated. Cluster: WEKA contains clusterers for finding groups of instances in a datasets. Cluster tools gives access to Wekas clustering algorithms such as k-means, a heuristic incremental hierarchical clustering scheme and mixtures of normal distributions with diagonal co-variance matrices estimated using EM. Cluster assignments can be visualized and compared to actual clusters defined by one of the attributes in the data. Associate: Associate tools having generating association rules algorithms. It can be used to identify relationships between groups of attributes in the data. Select attributes: More interesting in the context of bioinformatics is the fifth tab, which offers methods for identifying those subsets of attributes that are predictive of another (target) attribute in the data. Weka contains several methods for searching through the space of attribute subsets, evaluation measures for attributes and attribute subsets. Search methods such as best-first search, genetic algorithms, forward selection, and a simple ranking of attributes. Evaluation measures include correlation- and entropy based criteria as well as the performance of a selected learning scheme (e.g. a decision tree learner) for a particular subset of attributes. Different search and evaluation methods can be combined, making the system very flexible. Visualize: Visualization tools shows a matrix of scatter plots for all pairs of attributes in the data. Practically visualization is very much useful which helps to determine learning problem difficulties. WEKA visualize single dimension (1D) for single attributes and two-dimension (2D) for pairs of attributes. It is to visualize the current relation in 2D plots. Any matrix element can be selected and enlarged in a separate window, where one can zoom in on subsets of the data and retrieve information about individual data points. A Jitter option to deal with nominal attributes for exposing obscured data points is also provided. interfaces to Weka All the learning techniques in Weka can be accessed from the simple command line (CLI), as part of shell scripts, or from within other Java programs using the Weka API. WEKA commands directly execute using CLI. Weka also contains an alternative graphical user interface, called Knowledge Flow, that can be used instead of the Explorer. Knowledge Flow is a drag-and-drop interface and supports incremental learning. It caters for a more process-oriented view of data mining, where individual learning components (represented by Java beans) can be connected graphically to create a flow of information. Finally, there is a third graphical user interface-the Experimenter-which is designed for experiments that compare the performance of (multiple) learning schemes on (multiple) datasets. Experiments can be distributed across multiple computers running remote experiment servers and conducting statistical tests between learning scheme. Conclusion Classification is one of the most popular techniques in data mining. In this paper we compared algorithms based on their accuracy, learning time and error rate. We observed that, there is a direct relationship between execution time in building the tree model and the volume of data records and also there is an indirect relationship between execution time in building the model and attribute size of the data sets. Through our experiment we conclude that Bayesian algorithms have good classification accuracy over above compared algorithms. To make bioinformatics lively research areas broaden to include new techniques.

Sunday, October 13, 2019

Biology Revisited :: essays research papers

Concepts and Methods in BiologyBiology RevisitedA. What is life?1. Experience and education refine our questions and our answers.2. Consider the meaning of "alive."3. This book is biology revisited. It will provide:a. Deeper understanding.b. A more organized level of understanding.B. To biologists, life reflects its ancient molecular origins and its degree of organization. Life is:1. A way of capturing and using energy and materials.2. A way of sensing and responding to specific changes in the environment.3. A capacity to reproduce, grow, and develop.4. Capable of evolving.I. DNA, Energy, and LifeA. Nothing Lives Without DNAl. Living and nonliving matter are composed of the same particles, operating according to laws governing energy.a. Deoxyribonucleic acid, or DNA, is the special molecule that sets the living world apart from the nonliving.b. DNA carries the hereditary instructions for assembly of proteins.2. Each organism is part of a reproductive continuum that extends back through countless generations.a. Each organism arises through reproduction in which DNA instructions are transmitted from parents to offspring.b. DNA also guides development of a fertilized egg into a multicelled organism.B. Nothing Lives Without Energy1. Energy, the capacity to do work, is transferred throughout the universe.2. Metabolism refers to the cell’s capacity to extract and convert energy from its surroundings and use energy to maintain itself, grow, and reproduce.a. Plants acquire energy from sunlight and transfer some of the energy into ATP.b. Underlying the assembling and tearing down of biological structures are energy transfers.3. Organisms can sense changes in the environment and make controlled responses to them.a. Receptors detect specific information about the environment.b. Special cells receive stimuli and make appropriate responses.c. Homeostasis is the maintenance of a tolerable internal environment.II. Energy and Life’s OrganizationA. Levels of Biological Organization1. The cell, composed of "biological molecules," is the basic unit of life.4. Multicelled organisms have increasingly complex levels of organization that result in tissues >>> organs >>> organ systems >>> organisms >>> populations >>> communities >>> ecosystems >>> biosphere. B. Interdependencies Among Organisms1. Energy flows from the sun.a. Plants (producers) trap this energy by photosynthesis.b. Animals (consumers) feed on the stored energy in plants, using aerobic respiration.c. Bacteria and fungi (decomposers) break down the biological molecules of other organisms in order to recycle raw materials.2. All organisms are part of webs that depend on one another for energy and raw materials.III. If So Much Unity, Why So Many Species?A. All organisms are made of the same materials and function according to the same laws of energy.

Saturday, October 12, 2019

The Symbol of Blood in William Shakespeares Macbeth Essay -- William

The Symbol of Blood in William Shakespeare's Macbeth Blood represents life, death and often injury. It is an essential part of life, and without blood, we could not live. In Macbeth, Shakespeare uses the symbol of blood to represent treachery, murder and death. The word "blood", or different forms of it, appear numerous times throughout the play. Interestingly, the symbol of blood changes throughout the play, corresponding to the atmosphere and mood changes in the characters and the play. First, blood is a reference of honor, and this occurs when Duncan sees the injured sergeant and says, "What bloody man is that?"(1.2.1). This is symbolic of the brave fighter who been injured in a valiant battle for Scotland. The sergeant goes on to describe the courageous actions of Macbeth and says, "With his brandished steel, which smoked with bloody execution . . . [Macbeth] unseamed [Macdonwald] from the nave to th? chops"(1.2.20&23). This refers to Macbeth?s braveness in confronting and executing Macdonwald in battle, using his sword that is covered in the blood of the enemy. ...

Friday, October 11, 2019

Presidental Debate

October 22, 2012, was the 2012 final presidential debate. President Obama and Governor Mitt Rooney spoke about the issues in the middle East and how Iran is in the process of creating a nuclear bomb in the next four Years and how would they protect our national security . The gentleman asking the Questions is Bob Schaefer (an old time news anchor for CNN) In the meanwhile, President Obama is stating his facts about he middle east and is trying to pursue The American people that if he stays in office that he will try to make changes And make sure America stays safe.And Rooney is trying to debate against what The president is saying. The republican and democratic party are both strongly Supporting their candidates in this Presidential race by constantly reminding The American people to vote and to listen to the debate and for non-deciding Voters to listen also so they can know who they are going to vote for. The debate Was held at Lynn University in Abstractor, Florida.I believe that i t was held here To show the students that their voice and vote is very important in this race Because it is our future. And to make more people aware of the debate. The debate Took place because the middle Is such a huge Issue in America' media and since The voting for the new president Is coming up very shortly, they must bring Attention to the problems America Is facing with other countries, and this may Help people to make a smart choice on who to vote on the run our country.

Thursday, October 10, 2019

Dangers of the Internet

Many people view the internet as an ultimate resource for anything they desire. The people who say that the internet is a brilliant invention for the best have reasons backing up their idea. For example, Sherry Turkle writes about such ideas explaining how the internet is an excellent tool for the better in her essay, â€Å"Can You Hear Me Now? † Turkle believes strongly that the invention of the internet is an innovation for the better and emphasizes to her readers how important it is in everyone’s lives nowadays. On the other hand, some believe exactly the opposite of Turkle’s invalid inquisition that the internet is a tool that is most definitely not for the greater good. The internet is a major promoter of violence and bad habits, it allows abusers to reach people that do not want to be reached and it opens many of us up to identity theft and malware viruses. The internet is an extremely risky device that many of the common users take for granted due to the lack of knowledge of its dangers. With the great power that the internet provides comes great responsibility that its users must also provide. Just like many other things, there are people who lack such responsibility and use the internet with bad intentions. Influencing Violence The first point of discussion pertaining to the harmfulness of the World Wide Web is that it is a great promoter of violence and bad habits. Users are free to roam to any type of website they please, whether it is a game site, social networking site, forum site and etcetera. The internet has no restrictions as to what people put on websites and web pages. Much like violence in video games, the internet can influence violence towards its users as well. Michele L. Ybarra speaks about the amount that children are influenced by the violent website on the internet today in her essay â€Å"Linkages Between Internet and Other Media Violence With Seriously Violent Behavior by Youth,† which was published in the â€Å"Official Journal Of The American Academy Of Pediatrics. † The internet is a host to many violent games and violent based websites alike. About 97% of the youth ages 12-18 are using online communications and have online access (Ybarra 929). With this many kids on the internet they can browse and view hate pages which discriminate against people or they can come across violent related web pages as well (Ybarra 930). With this increased exposure to these websites, causes an increase in violent behavior among our youth. Ybarra and her team conducted a study of 10-15 year old children and the effects of the different sources of violent media on their real habits. The results showed substantial results of increased violent behavior among the group that was associated with the violent media (Ybarra 933). Results reported that the violent behaviors included shooting or stabbing, aggravated assault, robbery and sexual assault (Ybarra 933). Among the many types of media that was studied such as: music, video games, television and the internet, the type of media that was the most influential was the internet (Ybarra 933). Ybarra goes to show her readers that most of all websites used included killing, fighting and shooting which in correlation contributed to the stimulus of the children’s anger level, having delinquent friends, and substance use such as drugs and alcohol (933). The monitoring of what our children view on the internet is crucial towards their health and well being, without monitoring our children are prone to be influenced by immoral and violence behaviors. Reaching Those Who do Not Want to be Reached Another harmful risk that the internet so willfully provides is the dangers of domestic violence and child predators. The internet allows predators and violent domestic partners to access people and children on a wide scale with the click of a mouse. The various social networking sites that the internet provides is practically like a database for people to access whoever they want. Although children and the victims of domestic violence do not want to be reached by predators and violent spouses, it is easy for these terrible people to reach them without their own consent. As I myself say, the internet is â€Å"Stalking made easy. † In her article, â€Å"Friend Request or Foe,† Laurie L. Baughman persuades her audience of the dangers and risks pertaining to internet stalking, mainly pertaining to domestic violence. Baughman is a senior attorney at the Pennsylvania Coalition Against Domestic Violence, thus giving her the right to speak about the topic. Facebook itself has over 400 million active viewers, and it considered the most popular online social networking sight for adults and children alike (Baughman 933). Baughman also points out that Facebook users in total upload approximately three billion photos every month and the average user spends about 55 minutes a day on the site (934-935). With such astronomical numbers like these, this introduces a whole new type of stalking based violence that was once again introduced by the internet. To start, pertaining to the issue of domestic violence, which is the major topic that Baughman discusses in her essay. She feels that it is an extremely dangerous asset that the internet has brought upon society. Baughman asserts in her essay â€Å"†¦Internet users who are victims of domestic violence may be vulnerable to further abuse or may experience harassment or stalking through these social networking mediums† (935). This quote offers a brief summary of the topic that Baughman is most concerned about in her essay, which will be addressed below. Domestic violence is defined as abusive behavior in a relationship to gain or maintain power, all of which can be done by actions or threats (Baughman 936). To show how much of a problem domestic violence has become; Baughman uses the quote â€Å"An estimated 1. million women are victims of physical assault each year† (936). With the amount of people attached to the internet today, many domestic assaults root from internet stalking. These social networking website were people post pictures and information about themselves has become a source of vulnerability of victims of domestic violence (Baughman 940). For example, many of us post pictures and personal information on Facebook, but what many do not know is that there can be bad people that we do not want seeing this information looking at it as well. Many of you may be familiar with the quote from Spiderman â€Å"With great power comes great responsibility,† this is much like the quote from Baughman’s essay when she states â€Å"Using technology is like a super power: you can use it for bad and you can use it for good† (940). This quote from Baughman’s piece stresses her concern of how much power comes from the internet and how people can use this power by means of harming other people. With this power that the internet has given to anybody who uses it, comes people who use it by means of stalking. The term cyber-stalking came directly from the invention of the internet and it is defined as behavior that constitutes â€Å"computer† based harassment (Baughman 940-941). Such stalkers do things such as: monitoring other people’s email, sending email threats or insults, disrupting email communication, using others email identity and using the internet to get personal information (Baughman 941). Although many may see all of these as an invasion of privacy, with the power the internet has given us, most of them are very simple to do and done quite often. In her essay Baughman shows her readers how cyber-stalking often leads to physical staking (941). With the small amount of difficulty that cyber-stalking is, often an abusive partner uses it to maintain power and control over their victim (Baughman 941). All of the above ways discussed, pertaining cyber-stalking can allow an abuser to access their victim through the internet, even if the victim has set up an internet protection, which will be discussed in the next topic (Baughman 941). Baughman uses an example of such harassment through emails in her essay; she tells us a story of how an abusive husband sent 1,500 pages of threatening emails to his ex-wife even when she had a restraining order placed on him (944). To sum up Baughman’s essay, due to social networking sights allowing individuals to freely post photos, comments, and other personal information, the internet acts as a personal information super-highway that is easily reached by abusers (965). A simple search of a persons name can bring up very personal information that abusers can easily access (Baughman 965). In sum, social networking sights and the internet are tools for communication, blogging, picture sharing and now vengeance by abusers. Roam at your own risk (Baughman 953). Nobody, including domestic partner are safe when on the internet. The next point of discussion relating to how abusers can access people who do not want to be reached is the issue of child predators on the internet. The author L. Alvin Malesky, Jr. , PhD in the Department of Psychology writes his essay â€Å"Predatory Online Behavior: Modus Operandi of Convicted Sex Offender in Identifying Potential Victims and Contacting Minors Over the Internet,† in correlation to this topic. Most sex offenders know their victims before even meeting it them, they become acquainted through the internet (Malesky 24). As discussed previously in Baughman’s essay, this task of becoming acquainted with anyone you want is relatively easy with the amount of social networking websites today. Predators tend to disguise themselves as another teenager and lie about their identity, the internet provides them with ideal cover that can fool even the smartest of children (Malesky 24). In his essay Malesky affirms â€Å"Chat rooms were the most frequently used component of the Internet to identify and contact potential victims† (26). When a child that talks about sex in anyway on the internet, it is found appealing by pedophiles and is often the reason why pedophiles go after a specific child (Malesky 27). This warning given by Malesky shows her readers how every little thing you say, post or do on the internet can be viewed by these disturbing people and can possibly make you their next target. These sex offenders patrol the virtual world in hopes to find a victim and eventually meet with them in person. People are free to surf the web, the type of people that lean towards an attraction to children are also free to do as they please. The internet give minors vulnerability to people who wish to do them harms (Malesky 30). In conclusion to his topic Malesky tells warns his readers that children should not post anything sexual on the internet or talk to people you do not know, you never know who may be looking or listening (Malesky 30)! Children are put in harms way while online, thus in sum urging how unsafe the internet really is. Cyber-Crime Lastly, the internet itself has brought forth a new type of crime everywhere in the world. The term cyber-crime refers to crime that takes place from a computer through the internet. These cyber-criminals can steal your identity, take your personal information and even give your computer a virus without ever leaving their computer desk. The root cause of this new crime is directly due to the invention of the internet. As was previously stated, the internet is a tool that requires responsibility. Criminals take no such responsibility when performing illegal cyber-crime related acts. Nobody is safe when they are on the internet with the growing amount of yber-criminals today. Kit Burden discusses the issue of the increasing problem of cyber-criminals in her essay, â€Å"Internet crime; Cyber Crime – A new breed of criminal? † which was published in â€Å"Science Direct† (College Edition). Burden starts out her essay by showing her readers that 43% of Americans recognize cyber-crime as a problem (2). These types of crime have been introduced to the world thanks to the invention of the World Wide Web. The first example of a cyber criminal I would like to point out is the increasingly more and more common hacker. Hackers use technology to gain unauthorized access to private computer systems, which is mostly for the purpose of retrieving confidential information such as credit card number and internet passwords (Burden 3). If the hacker has used a computer for functions with intent of retrieving other peoples information and date, this is considered illegal based off the Computer Misuse Act in 1990 (Burden 4). A hacker can obtain the most confidential of information on your computer, for example they can take your credit card information and use it as their own. Hackers may also go onto company website and alter what their information reads for terms such as of political leads and malicious intent such as cyber terrorism (Burden 4). Secondly, with the increasing threat of hackers, there is also an increasing threat of credit card fraud. These two go hand in hand with each other because hackers much of the time aim to receive others credit card information illegally by hacking. Burden points out that there is an estimated four billion dollars lost to credit card fraud each year and fifty percent of that money lost comes from online credit card fraud/hacking (9). Burden also points out how vastly internet related commerce is growing, therefore so will the amount of money lost to credit card fraud due to the increasing dangers posed by hackers (9). Along with credit card information, we must not forget that hackers can steal information such as accounts that you have set up online, which can hold your payment information and use them as well, the same goes for your email account. Lastly, on top of all that hackers can install malicious software onto your personal computer without you knowing. Viruses are embedded within files which you may think to be real; however they can be completely the opposite and trick you into downloading a virus. Most of the time, if one clicks on the virus itself it will download without you even noticing. Viruses can do whatever the maker of the virus wants them too. Viruses such as a key logger are planted on a computer and it will show the hacker who made the viruses every key you input into the computer. For example, if you type in your credit card information, the hacker will now be able to view it. The famous ‘Love Bug’ virus was released two years ago and single handedly completely shut down and paralyzed over 100 million computers (Burden 5). Because viruses can be spread to many users at a very fast pace and often can not be erased, they are looked down upon by the government and are taken extreme legal action against (Burden 6). Conclusion In conclusion, one has learned a great amount about the internet and the harm that it can bring. The internet puts a great amount of power into the hands of anyone who decides to use it, a power that should not be tampered with and often is by its abusers. Many reasons validate the inquisition that the internet is not a resource for the greater good but it is a tool that can and frequently is used for promoting violence and bad habits, allowing abusers to reach people that do not want to be reached and lastly, it opens many of us up to identity theft and malware viruses. We must all think twice about using the internet and if we do hopefully now we will take extra precautions especially when giving the power to roam the web to our children. The internet is an extremely dangerous place and we must not forget, nobody is safe when they are on the internet!