Saturday, August 31, 2019

Fashion Theory

It's a Jungle Out There he based his design work on the Thomson gazelle, found in East Africa. The collection used many animal skins, and featured this brown fur Jacket with horns protruding from the shoulders. Macaque used this to symbolize the relationship between animals and humans. With this Jacket Macaque uses the horns as a signifier signifying power, freedom as well as survival Using this on female models signified power and strength thus giving them empowerment, which was one of his signifier.With usage of the fierce makeup techniques, the female form appears formidable and mighty. The symbolism of the horns used suggests power and the ability to defend them selves Just as the Gazelle's do with predators and when courting, while the leather symbolisms resilience. Macaque strategically places the horns on the shoulders of the Jacket, creating a broader silhouette on the female forming an androgynous profile. This then links to the stereotypical social structure, in which males dominate.The exaggerated shoulders appear to symbolism the limbs of the gazelle reinforcing the minimalists eaters within the design of the garment forming the beginning of the human- animal hybrid. Macaque believed that like a Gazelle, humans are doomed in life and are destined to die at the hands of their predators. Just like a gazelle will be hunted and destroyed, a human will be forgotten and lost if they do not fight for their survival is society and continue to be remarked and discerned. It is ironic that although animals are usually seen as a inferior existence in rank to humans, Macaque uses them to portray strength and power.Here the roles are reversed and unmans are relying on these beasts to represent their ennoblement signifying an exchange of power. Having said this, Macaque, with the animal symbolism, signified freedom. A freedom of expression and identity as an individual, as apposed to conforming. Suzan Hens Macaque however was not the only designer to used horns as imagery and symbols within his collection to represent society through fashion. South African born designer Suzan Haynes also used this symbolism in her newly opened store in Mellower Arch.Suzan admits to gathering her influences from her travels and exposure to the natural. Haynes replaced the heads of her mannequin's in her Mellower arch store with those of reindeer's. Her intention of this was to create a fantasy within her store. The signifier identified is a female form with a reindeer head thus creating the â€Å"hybrid†. This signifies the fantasy that Suzan intends to create. The female form is positioned in such a manner in which to present a ladylike heir of grace to the mannequin. This demure stance is Juxtaposed by the use of the reindeer head. This signifies raw animal instinct.The animal instinct in this context (Store setting) is erectly related to the carnal desire in relation to consumption. It signifies that consumers should be able to give into this desire for fashion as an animal would towards their instinct. This image emphasizes human restraint opposed to animal impulse. This correlates with Roland bathes semiotic theory that links to stories and myth. He argued that there is an agenda behind communication and that agenda is ideology. The idea that the myth is a misrepresentation and has to do with covering something up and what is really going on. Inanimate and animate models and animals

Friday, August 30, 2019

Begging in India Essay

Begging in India is a fashion, a compulsion, a profession, a privilege and a recreation. The number of beggars in India is much larger than in other countries. Our heads hang down in shame when we read description of this institution given by foreigners in a hateful manner. To the Westerners, India is a land of the mendicants and snake-charmers. Beggars are found in villages and towns, on roads, crossings and footpaths. But their favorite haunts are bathing Ghats, temples, religious or festival fairs, railway stations, trains and bus-stands. It is a big nuisance to be confronted by street beggars at all odd places. Like the God Almighty they seem to be omnipresent. You are waiting for a bus at the bus-stand or walking down a road with your friend, they appear from nowhere and start an endless volley of entreaties and blessings. They follow you close at your heels and keep pestering you till you give them some coins out of a sense of sheer disgust and helplessness. There are various types of beggars in India. The religious; beggars cluster round pilgrim centres and attract public attention by their wonderful feats. There are crippled and disabled beggars who remain lying on road-sides or at railway or river bridges arousing sympathy of the passers-by, making all kinds of pitiful gesture! ; There are beggars who are quite stout and able-bodied. Begging for them is not a necessity but a profession. They are idlers and rascals who are unwilling to earn their bread by hard work. They often operate in gangs and their leaders hold a bank balance that would be credit to an important business magnate. They are disguised as physically disabled or handicapped. They use as tools young women with new born babies or young children. Whenever they find an opportunity, they commit thefts and crimes, including kidnapping of children. At some places we come across modernized beggars dressed in suits. Such beggars lead a luxurious life in places of retirement. There are travelling beggars who are particularly seen in trains. The collect alms for orphanages, cow-shelters and widow-shelters, which exist only in their minds. Foreigners are their most privileged victims. Begging in India has developed into an art and a full-fledged profession. The practice of begging is the result of the poverty of the country and the deep-seated religious sentiments and superstitions of our country men. Unemployment, illiteracy, ignorance and ever-increasing population are other causes of begging. It cannot be denied that the distribution of wealth is not fair and the gulf between the rich and the poor is very wide. The rich and the well to-do accept extreme poverty and begging as a necessary feature of society. Religion seems to teach them that charity is the surest passport to heaven. Beggars, in themselves are problems and they create other social problems by kidnapping women and children; Sometimes, we begin to doubt the integrity of spiritually and morally high persons and ill treat them because pink clothes have become the common dress of beggars in India. Charity, in our country, enjoys religious sanctity. But it is conveniently forgotten that misplaced charity is good neither for the one who shows it nor for one to whom it is shown. It encourages idleness and in activity. It produces parasites and wastes a sizeable amount of human power. Laws should be legislated for abolishing begging and offenders should be severely dealt with. The government should be establish work-houses where able-bodied beggars should be kept and compelled to work. The people, in general, should be made conscious of the fact that beggars are the ‘greatest enemies of the country and there should be country wide agitations against beggars. The crippled and disabled beggars should be maintained by the State, The disabled and diseased beggars and orphaned children and destitute women deserve particular attention from the State. There should be asylums and training centres for such people. Here they should first be treated for their ailments and then trained in different kinds of handicrafts and cottage industries. The success of some of the schools for the blind, the deaf and the dumb shows the true solution of the problem. In place of individual charity, funds and donation should be raised on a large and organized scale for the relief of these unfortunate people. Indeed, beggary if so intricately women into our way of life that, no matter how corrupt and scheming it gets, it shall continue to claim attention. If not from the educated, from the illiterate and the superstitious. Tragedy stares at us round every corner. Begging is one of the worst social evils that denegrade India in the eyes of the world. The earlier it is eradicated, the better it would be in the interest of our nation.

Paul Watzlawick’s First Axiom Essay

Paul Watzlawick was an Austrian-born psychotherapist, psychoanalytic, sociologist and philosopher. He was best recognized for his venture in schizophrenia, as well as his communication theory regarding the five axioms. (Sack, Herald) His first axiom – â€Å"one cannot not communicate† – states that no matter how much a person tries not to communicate, there will some forms of communication going on. (Blanford, Roxanne) Watzlawick believed that every little behavior sends a message, regardless whether it’s intentional or otherwise. Therefore, all behavior has communicative value. When I first read about his theory, I honestly thought that it was unreasonable. Personally, I thought that sometimes unintentional actions do not mean that one is sending any form of communication. However, according to Kit Welchlin, a well-known public speaker, he states that â€Å"no matter what you say, or don’t say, people apply a meaning to it†. He gave an example of his observation on how the value of a co-worker from a marble factory was recognized by the messages that the manager sent through his actions. In addition, Eric Myers, founder and C. E. O. of Myers Business Diagnostics and Solutions LLC, said that people can make â€Å"judgment calls† to the non-verbal actions that the other is showing. â€Å"Words is only 7% of communication, body language 55%, and tone 38%†, Myers’ said at one of his talks. Another person who agreed to the theory is Dr. Amy Gaffney, an assistant professor from University of Kentucky. She believes that many people don’t always realize that anything that they do could â€Å"potentially be perceived as a form of communication†. She gave a simple example of how a student who’s nervously presenting in front would react to her â€Å"funny face† that she made because of the other noisy students behind her class. Besides the three influential speakers/researchers that I’ve mentioned above, there were also many other researchers whom have agreed at some point towards Watzlawick’s theory. So, I decided to conduct a personal experiment, with my brother as the subject of matter. I purposely picked him up late from his work place one day, and I observed his actions and behavior – which includes expressions, as he walked towards my car. I found out that although he did not mention that he was a bit irritated by my lateness, but his little fidgets and frowning of the eyebrows gave away. The findings of this experiment, combined with some additional researches, changed my perception towards Watzlawick’s theory. In short – I agree to Watzlawick’s First Axiom of â€Å"One Cannot Not Communicate†. Since every of our behavior may be perceived as a form of communication, there will be times where our behavior doesn’t actually convey the message that we want to convey. These are called â€Å"unintentional communication†. One very good example is when someone is deep in thought, and so happen the person’s eyes are facing your direction. You would start to wonder why the person is looking at you, but in actual fact, the person isn’t. A man who’s wearing a suit and drives a luxurious car doesn’t necessarily mean that he’s rich. But to the eyes of others, that person might be misperceived as rich. In a nutshell, Watzlawick’s theory of â€Å"One Cannot Not Communicate† is true, but to a certain extent, because not all behavior actually conveys the message that the person wants to convey.

Thursday, August 29, 2019

HENRIETTA LACKS Assignment Example | Topics and Well Written Essays - 250 words - 1

HENRIETTA LACKS - Assignment Example This created a debate in the science and research world on whether we are in control of what we are made of (Skloot, pp.1-3). The story of Henrietta Lacks brings up the question of consent and whether a patient should be told when his or her cells are put in use. During the 1950s, there was no law against these practices but now there are laws that have to be adhered to. The question of informed consent remains a major ethical issue in nursing practise. He-la cells have had an Impact in medicine and vaccination. They have been used to find a vaccine for polio and even in the study of diseases such as tuberculosis and many others that have in turn changed the medicine world (Skloot, pp.3-7). This story also serves as an inspiration to leave an impact on the nursing community. Henrietta died a long time ago, but her influence is still felt up to today. Through cultural knowledge scientists can study human tissue and develop a cure for diseases as soon as they occur. The centre for disease control engages in the practice of development of cell-based flu vaccines which has helped nurses to fight outbreaks all over the world such the swine flu outbreak. Nurses have used the study stem cell culture for therapeutic and research activities affect health leading growth of medicine as a branch of science (Nagy, Rossant, Nagy, Abramo, Newerly,

Wednesday, August 28, 2019

The Toyota Kluger Assignment Example | Topics and Well Written Essays - 750 words

The Toyota Kluger - Assignment Example This car caters for families needs primarily the children. Long drives have no fun particularly when the children get bored. This vehicle comprises of an inbuilt DVD player (Toyota) that provides the children with adequate entertainment. It is worth denoting that this vehicle boasts of style both inside and outside. It immensely appeals to those individuals searching for a superior quality finish on the family vehicle. It is imperative to state that the outer design of this vehicle appeals to all the members of the family. The rangy profile and chrome accents give this car a superb finish, making it ideal for traveling with style for either business or corporate use. Moreover, it constitutes of alloy wheels with stylish luscious looks (Toyota). This vehicle boasts of foldable seats that give further room for shopping items. However, this vehicle comprises of advanced inbuilt car technology (Toyota) that twists every family drive into a bona fide experience. The Bluetooth capability p ermits the individual to make calls safely through the audio system while still driving. It is imperative to say that this technology aids in delivering an improved and secure driving experience. Entry 2 Gifted hands, is a book by Ben Carson, a famous neurosurgeon (Phillips). It is imperative to say that he gained global recognition for his role in the initial successful severance of Siamese twins. The immensely multifaceted and fragile operation constituted of a surgical plan that Carson aided to initiate. It is worth denoting that Carson pioneered again in an odd procedure known as hemispherectomy (Phillips). This involves offering children with no hope a second chance to live through a courageous operation in which he plainly extracted some part of the brain. It is worth denoting that these breakthroughs are usual. It is imperative to say that he has been beating odds since childhood. He lacked motivation because a mother, who had a third grade education, raised him. He scored po orly in school, but his mother convinced him that he could achieve a lot so long as he was positive with life, and did not allow the current circumstances to prevent him from achieving his goal. However, a persistent belief in his capabilities, trust in God, and absolute determination catapulted him from failing grades to being the top in class. He holds twenty doctorates, possesses a variety of awards, and honors (Phillips). It is imperative to state that gifted hands, is an inspirational story of a person’s secret to success, challenged against disheartening odds, and prompted by an implausible mindset that dares to take risks. This book enables one to learn of surgeries that made history globally, and into the clandestine mind of a kindhearted physician who lives in order to help others (Phillips). Throughout the book, it all reveals a humility and quick wit style that makes this book unforgettable. It is worth denoting that he never fails in each chapter to mention someon e particularly God, to whom he owes gratitude. Entry 3 Hold my hand is a collaborative song done by Michael Jackson and Akon (Aiyanna). It is imperative to say that this song is largely autobiographical in nature as Michael describes his own personal life to the world around us, hoping that we would discover and comprehend the significance of holding an individual's hand and walking the world jointly instead of walking alone as he did. It ultimately resulted to his fate

Tuesday, August 27, 2019

Case study Assignment Example | Topics and Well Written Essays - 500 words - 3

Case study - Assignment Example Obedience is all about the tendency to obey authority figures. The subordinates may not question the instructions given by the superiors in the organization. The other term seen from the case study is related to AUTHORITY. This refers to the process of controlling the other people in the workplace so that their behaviour can conform to the expected standards. However, there has been a dramatic shift from the way power and authority used to be exercised in the organization compared to the current period. As depicted in the case of IBM, the theme of PERSUASION has significantly gained prominence in managing organizations during the contemporary period. This involves the process of trying to influence and convince the employees in the organization to share the same vision with you. If properly implemented, this strategy can help the employees to be productive in their efforts since they would be in a position to share the same vision with the manager. The other term is VISION which is concerned about the goals and objectives of the organization. The manager has a responsibility of sharing the vision of the organization with the workers so that their efforts can be directed towards the attainment of the desired goals. The other theme presented in the case is NEGOTIATION where the leaders ought to engage the employees when intending to make decisions or solve conflicts that may exist in the organization. People tend to disagree over certain issues and this practice is common in most cases. However, it only becomes detrimental to the organization if the conflict becomes dysfunctional. In order to resolve this kind of conflict, the theme of COLLABORATION should be taken into consideration. This theme deals with finding and solving problems in such a way that everyone benefits. It is more like a win-win situation In order to manage the organization

Monday, August 26, 2019

Osmosis And The Egg Lab Report Example | Topics and Well Written Essays - 1000 words

Osmosis And The Egg - Lab Report Example 7. The egg was placed in a clean beaker and covered with water, the amount of which was recorded. Following which the beaker was covered and it was left for a week. 8. After a week, the egg was removed from the beaker, dried, measured and weighed, and details about the appearance were noted. Finally, the amount of water that remained in the beaker was measured and recorded. Data table Measurements Baseline After vinegar After corn syrup After water Circumference (cm) 13 14.5 12.2 15.5 Mass (g) 51.5 71.89 51.6 78.5 Appearance Oval, smooth, soft Long, rubbery, more cracks Smaller, partly indented Bigger, like a rubber immersed in fluid Amount of vinegar (ml) 60.5 43 - - Amount of corn syrup (ml) 77 - 79 - Amount of water (ml) 67 - - 35 Change in liquid (ml) - -17.5 2 -32 Graph Figure 1: Starting circumference (in centimeters) of the egg and circumference following each of the experimental treatments. Figure 2: Starting mass (in grams) of the egg and the mass following each treatment. Q uestions 1. The circumference of the egg increased by 1.5cm after it was immersed in vinegar and left to stand for a week. The mass changed, increasing by around 20g. Overall, the size of the egg increased. The amount of vinegar in the jar decreased by 17.5ml. The changes were the result of osmosis. The gradient across the membrane of the egg made it such that molecules of vinegar were drawn into the egg, resulting in a lower concentration of vinegar molecules outside the egg and a higher concentration within the egg at the end of the week. The cracks in the shell of the egg were the result of an acidic reaction between the vinegar and the shell of the egg. The rubbery nature was due to the change in chemical composition of the egg, it had more liquid in it as a result of the... Water molecules will move in the direction of a high concentration of solute, and hence low water concentration until equilibrium is reached. Generally osmosis occurs across a cell membrane; however, this is not always the case. The outside solution can be grouped into one of three categories, isotonic, hypotonic and hypertonic. Isotonic is where the concentration of water is the same inside and exterior to the cell, and as a consequence water moves in both directions with no next change. A hypotonic solution has a higher concentration of water compared to the internal environment, and as a consequence water moves into the cell. Finally, a hypotonic solution has a lower concentration of water to the internal environment, so water moves out of the cell. The process of submerging the egg in liquid and leaving it for a week allowed the process of osmosis to take place. This is because the egg shell is semi permeable and is able to act in the same way that a cell membrane can in terms of allowing diffusion. Both water and vinegar were hypotonic compared to the interior of the egg and as a consequence immersing the egg in these liquids resulted in water being taken into the egg. This resulted in the egg appearing rubbery and gaining in size. In contrast, corn syrup was hypertonic compared to the interior of the egg so water moved out of the egg. As there was already an increased amount of water inside the egg it was this that was removed, resulting in the egg being similar in size to when the experiment began.

Sunday, August 25, 2019

Sport Training Essay Example | Topics and Well Written Essays - 3000 words

Sport Training - Essay Example However, when lactate production is excessive, it accumulates in the muscles and the blood. Meanwhile, if the glycogen stores of the muscles and blood decrease, the exercises slow down and when the aerobic procedures undertaken are not sufficient, the exercise can not be maintained (Astrand & Rodahl, 1987; Fox, Bowers, & Fos, 1988; Weineck, 1986). Lactat is accumulated in the organism after all kinds of muscle exercise having maximal and supramaximal workload. It can even be observed within ten minutes workload (Jacops et al, 1983). The measurements of lactate in the muscle and blood are being done to determine these processes. Lactate measurements during exercise yield information on the intensity of the workload and on its duration. The measurements carried out after the exercise yield information on the frequency of workload and on its scope, that is, on resting-recovery process (Bueno, 1990). Babij found that, after an exercise of 10 minutes where maximal oxygen consumption rate was 50%, there was no accumulation of venous blood, and that, after the same exercise where oxygen consumption rate was 76%, lactate of the venous blood increased up to 5 minutes and then started to decline (Babij et al, 1983). The number of infantile and juvenile competitions has significantly increased over the past two decades (Bar-Or O. 1996; Colantonio et al, 1997; Kemper, 1995; Matveev, 1996), which has favored world records to be broken by 14-year old athletes. One knows well metabolic and functional responses to exercises in adults, whether normal or with impairments (Del et al, 1985; Negrao et al, 1998) but there are many issues that are yet to be solved regarding physical training of children and adolescents (Bar-Or O, 1996). Aerobic fitness is instrumental for children and adolescents, not only for healthfulness8, but also for the practice of a number of sports (McArdle et al, 1996). Human capability of performing mid and long-duration exercises chiefly depends on aerobic metabolism. Thus, one of the main indices used to assess this condition is the maximum oxygen uptake (VO2max), known as aerobic power (Denadai BS, 1995; Kiss MAPDM, 2000). According to literature, in maximum exertion tests, swimmers (S) and water polo players (WP) typically present VO2max values close to 69.012 and 55.513 (ml.kg-1.min-1), respectively. In judo practitioners, it has been observed, from four consecutive Wingate test bouts for upper limbs that oxygen uptake (VO2) in the first bout was lower than that in the second, but there were no differences from the later in the third and fourth bouts, showing a tendency to stabilization. For swimming and water polo, when comparing two consecutive Wingate test bouts for upper (ARMS) and lower limbs (LEGS), and specific tests at the pool, there was good correlation only for ARMS (r = 0.85, p In spite of evidences about mean VO2max values at exercises in which aerobic metabolism prevail, it is interesting to observe its behavior in exercises in which anaerobic metabolism prevail. VO2max may be defined as the highest oxygen (O2) uptake accomplished by an individual breathing air at sea level (Astrand PO, 1952). This variable is one of the main items examined in endurance studies, in spite of the use of the expression oxygen peak uptake (VO2peak) to describe O2 uptake values from any

Saturday, August 24, 2019

Create a definition of a hero and emphasize the core values of Saint Essay

Create a definition of a hero and emphasize the core values of Saint Leos college excellence and integrity - Essay Example heridge Knight’s â€Å"Hard Returns to Prison from the Hospital for the Criminally Insane,† John Hope Franklin’s â€Å"The Train from Hate,† and Claude McKay’s â€Å"Outcast† are all racial Others, yet they exhibit integrity and determination by and by accepting what their blackness entails while strongly believing that they are not inferior to their white counterparts. They alter the definition of a hero as someone who is confident about their self-worth even though social injustice marginalizes them as the Others. In â€Å"The Language of African Literature,† Ngugi first discusses the colonial alienation children in Kenya experiences as a result of the superiority of English over Kikuyu. In other words, the colonial power implied in the English language is perpetuated through education. Thus, Ngugi explains that he decides to write only in Kikuyu so that all local people in Kenya would be able to understand his work. The subject matter of his work includes revolutionary ideas that challenge the authority, and the government sees it as a threat as Ngugi’s writing is highly popular at the grassroots level where people are unfamiliar with English. Ngugi’s act displays his pride towards his own culture, even though it is undermined by the colonial power. His insistence to speak and write in Kikuyu has resulted in imprisonment, yet he continues to promote a wider usage of the native language so that the colonial power would no longer be able to dominate the Kenyan people in ed ucation and in everyday life. As he wrote, â€Å"We African writers are bound by our calling to do for our language what Spenser, Milton, and Shakespeare did for English† (452). This statement challenges the status quo between the Kenyan and British culture and promotes pride in Ngugi and other Kenyan people for their original language. Ngugi’s willingness to accept his blackness and his persistence in challenging the colonial oppression through writing and action exhibit

Friday, August 23, 2019

Algebra Essay Example | Topics and Well Written Essays - 1000 words

Algebra - Essay Example From the graph above, it can be seen that the parabola is rotated 45 counter-clockwise from the orientation where the axis of symmetry is the x-axis. which is the equation of a parabola centered at the origin, with the x-axis as the axis of symmetry for the parabola. With 4p = 5/2, the focal point p = 5/(42 ) = 0.88 units from the vertex of the parabola. Since p is positive, the parabola opens in the positive x-direction. If B2 - 4AC > 0, the conic section equation describes a hyperbola or pair of intersecting lines. If B2 - 4AC = 0, the conic section equation describes a parabola, line, pair of parallel lines, or no graph. Rotated conic sections can also be classified by rotating the coordinate axes by an angle where cot 2 = (A - C )/ B, by using the rotation equations, and then completing the squares for x’ and y’ until the equation is in one of the following forms: Assignment: The dot product (often referred to as the inner product in a Linear Algebra text) is a useful tool in developing several important techniques of multivariable calculus. Your task is to give a detailed description of why the gradient points in the direction of the maximum increase of a function. You may restrict your essay to R3. Your essay should include: Given that a function f is differentiable at the point (x0, y0), a directional derivative Duf(x0, y0) of the function f at a point (x0, y0) in the direction of the unit vector u = is defined by The unit vector components are given by u1 = dx/ds and u2 = dy/ds, where s is the distance along a line given by points in the x-y plane directly below points in a curve C that lies within the surface z = f(x, y). For instance, at the beginning of the line, the point (x0, y0) lies in the x-y plane directly below the point Q0 lying in the curve C within the surface z = f(x, y). At a distance s (in the direction of u) along the line in the x-y plane, the point (x, y) is

Thursday, August 22, 2019

Social Networking Sites Essay Example | Topics and Well Written Essays - 1750 words - 1

Social Networking Sites - Essay Example Carrying out marketing campaigns using social networking sites generally entails the following: planning – building an SMM plan is vital. The business needs to take into consideration keyword research and brainstorm content ideas which would interest the ideal customers. Content – consistent with other e-marketing areas, content is essential when it comes to SMM. The business should ensure that it offers valuable information that the target audience would find interesting. The business should make a variety of content by implementing infographics, videos as well as images besides content that is text-based (Evans 2013, p. 22). Blog – it is noteworthy that blogging is an imperative SMM tool which allow the business to share various content and information with the readers. Using blogs, the business can also blog about its recent social media events, contests and efforts. Tracking business rivals – it is generally essential to keep an eye on the competition as they could offer valuable SMM insight such as where to get links that are industry-related. They can also provide important data for keyword research. If the business rivals are utilizing a particular SMM technique that appears to be working for them effectively, the business can also do the same thing, but do it much better (Qing 2012, p. 38). Consistent Brand Image – the use of social networking sites for marketing purposes allows the firm to project its brand image across several dissimilar platforms of social media. Whist every platform has its own distinctive voice and environment, the core identity of the business should remain consistent. Links – whilst employing social networking sites for the purposes of marketing depends mainly on the business sharing its own original and distinctive... According to this paper social networking sites are good in supporting business. The various platforms of social media such as Pinterest, LinkedIn, Twitter, YouTube, Google+ and Facebook allow the enterprise to promote its products to its followers, and in so doing increase sales volume. Additionally, by engaging and interacting with customers, these social networking sites are also employed by businesses to improve customer care by responding to the clients’ questions and addressing their concerns. Nonetheless, there are a number of potential threats of using these sites for business. These threats include: acting as a platform where people with ill-intentions can generate spiteful negative comments which may hurt the reputation of the business; human error resulting in leaked corporate data; staff members of the business could make inappropriate comments on the social media account of the business; and malware attacks from external sources. However, these threats could be av oided by ensuring that the staff members are educated regarding security threats, and carrying out a wide-ranging data and access control strategy. The paper shows that in general, the best technique for preventing the potential threats that come about as a result of a business using social networking sites is to ensure that the staff members are educated regarding security threats that are associated with social networking websites. The enterprise can also carry out a wide-ranging data and access control strategy so as to prevent loss of data.

Hamlet - historical and political context Essay Example for Free

Hamlet historical and political context Essay The political and religious upheavals before and after the death of Henry VIII had left their mark on the people of England. The King had done previous un-heard of things: He had divorced two wives and had had two executed. In the brief reigns which followed, persecution, first of the Catholics and then of Protestants, split family allegiances and brought very real danger of imprisonment, torture, even execution. Claimants for the thrown jockeyed for position. Queen Elizabeth I came to the throne in 1558 the first successor to her father, Henry Viii had been his young son Edward, ten years of age. As he was still very much under age, he had to rule through Regents. They persisted with the Protestant reforms instituted by his father after his break with the Roman Catholic. Edward died six years after coming to the throne. He was succeeded by his half-sister Mary (Tudor), who died childless after five years as Queen. She had tried to reinstate Roman Catholicism as the state religion. Elizabeth, Marys half sister, although not considered a legitimate heir to the throne, became Queen in 1558 and ruled for 45 years. Although she had been brought up as a Protestant she understood that in view of the recent religious upheaval some compromises some compromises had to be made. The country needed stability and a strong ruler. Her life had been in danger before she became Queen and there were the inevitable conspiracies to usurp her position. The tragic figurehead of one of these and the object of Elizabeths suspicion and jealousy for many years was Mary, Queen of Scots; Elizabeth at first kept her under arrest but eventually had her executed in 1587. Late in her reign, in 1601, the Earl of Essex, formerly her favorite, made his bid for power. He failed in his attempt to cause a popular up rising, was imprisoned and executed. It is not difficult to trace this atmosphere of suspicion and treachery in Hamlet, nor the reassuring promise to royalty contained in the suggestion at the end of the play that strong and humane rule will be reasserted. There were also serious threats from abroad. In 1588 Phillip II of Spain sent the Armada, a large fleet of ships, sailing up the Channel in an attempt to conquer England by force. Another foreign threat was marriage. Elizabeth constantly resisted attempts by her counselors to contract any politically advantageous marriage and she died unmarried, naming James, her Scottish cousin, already established for many years as King in Scotland, as her successor. Social and Context Elizabeth I built on the foundations laid by her father and grandfather until her power, the power of the Crown, was almost unquestioned. To help achieve the security which she and the country, needed it was important to encourage an articulate and educated aristocracy. Education and in particular classical scholarship assumed a fresh importance. In the grammar schools it is assumed that Shakespeare attended the Stratford Grammar school- Latin Language and literature were studied; prose and verse, composition, rhetoric, orations and declamations. Much was learnt by heart and in the upper school Greek was added. Shakespeares knowledge of the classical theatre, poetry and legend is evident throughout his whole body of work. How does this relate to Hamlet? The Players speech, which Hamlet has remembered, is part of the Dido and Aeneas story, the sack of Troy and the slaying of King Priam. Also, Hamlet and Horatio have been fellow-students at the University of Wittenberg. The others, to address the ghost, call upon Horatio. Hamlet clearly wanted to return to Wittenberg, to turn his back on the whole situation at the castle, and possibly to become a perpetual student and scholar until his father demands the revenge which he is unfitted to deliver. Exploration There was vitality; a fresh interest in foreign countries in the sixteenth century and exploration by sea had led to an increase in foreign trade. European foreign countries hardly seemed far away. Laertes lives very happily in Paris, away from his fathers influence. Hamlet is casually packed off by his uncle to a planned death in England. There was an extension of experience and an opening up to fresh influences, which included a new vocabulary of classical and foreign words. Printed books and pamphlets circulated more widely, so that information was more easily obtained. The Elizabethan age was establishing a feeling of national community and confidence. At the same time an increase in prosperity and a raising standard of living for many. This prosperity was also reflected in the newly built theatres and the audiences who flocked to entertainments of all kinds This is not to say that dissent and uneasiness did not exist. There will still disputes over religion and new ideas can be worrying as well as exciting. Persecution of religious minorities of the mainland caused a large influx of refugees from France and the Netherlands. It is also important to remember that some of the entertainments mentioned above were public executions. Bloodthirsty pastimes such as bull- and bear- baiting were popular. The streets were filthy and away from the main thoroughfares, in the poorer parts of the city, they resembled open sewers and rubbish dumps. The plague, spread by black rats, struck in 1592 when it ravaged the city for two years, and again in 1603, wiping out whole families and forcing those Londoners who could afford to do so to flee to the country. Theatres and all public places of entertainment were closed down. This student written piece of work is one of many that can be found in our AS and A Level Hamlet section.

Wednesday, August 21, 2019

Looking At Port Scanning Techniques Information Technology Essay

Looking At Port Scanning Techniques Information Technology Essay This article gives you an in-depth knowledge on some of the commonly used TCP port scanning techniques along with the pros and cons associated with each of the port scanning technique. Apart from the TCP based port scanning, it also briefly explains the different port scanning techniques available to scan the non TCP ports. Index Terms three-way handshake, open port scanning, stealth scanning, half open port scanning, Ident scanning, FTP bounce scanning, Decoy scanning, UDP scanning. In this paper firstly we will see an overview of port scanning, which includes what it is, why it is used, how it can be used and what are its effects. The second section explains in details about the various port scanning methods. This section includes detailed description on each of the port scanning methods based on TCP and some of the other port scanning methods, including the advantages and disadvantages of each of the methods. This section also contains information on the TCP connection establishment, which would be helpful to have a better understanding on the various port scanning techniques. Overview on Port Scanning Before start discussing about the actual topic port scanning, first lets see what a port is, how it is used and what its functions are. The Transmission Control Protocol and User Datagram protocol are used for communication over the internet. Each of this protocol contains 65536 ports (from 0 to 65535). Each port has an associated service running. The first 1024 ports are the reserved/privilege ports which runs the dedicated service defined by IANA (Internet Assigned Numbers Authority) (for example port 80 is reserved for HTTP service, port 21 for FTP, port 23 for telnet access and etc.) and these ports are known as well-known ports. The remaining are called registered ports (from 1024 to 49151) and dynamic and/or private ports (from 49152 to 65535). So, the applications in the computer use its specific port for communication with the server or with another computer. Now lets discuss about port scanning. Port scanning is a technique used to uncover the port details in a computer. Details like whether the port is open/listening or not, if it is open/listening which service is running on that port, etc can be obtained by scanning the ports. Port scanning is mainly used to find if there is any security risk involved in the computer and also to check for its weaknesses. Port scanning is done by sending messages to all the ports of the computer, and based on the response from each of the ports we can check whether the computer is prone to attacks. This technique is used by the network administrators to check for vulnerabilities in the network, like if a port is unused and it is open, then it should be closed immediately, because open ports will listen to the incoming messages which could me malicious. This could be a useful technique for the network administrators to secure their network. Also it would be good to port scan our own computers periodical ly, so that we will be able to find out what are the unwanted process and some of the malwares running in our own computer systems. Having said this, we should also be aware of the fact that, the port scanning methods will be known to the hackers too, who will try to break into the network/computer to steal the vital information. Using this technique the hackers will try to get a list of unused open/available ports. The hackers will then try to probe these ports for additional information and weakness. Using these results the hacker will try to exploit and will gain access to the computer. The operating system in the target computer will have the knowledge of logging the request that is used for port scanning activities. So the hacker will use an effective method to perform port scanning else the hacker can be easily identified. Port Scanning Methods The port scanning technique can be classified into three main types, they are Open scanning This type of scan opens a full TCP connection with the targeted host. Half-open scanning In this type of scan the client terminates the connection on receiving a response from the targeted host. Stealth scanning This type of scan prevents the connection request to the targeted host to be logged. All the above mentioned scanning types are used by a hacker to get the list of open or closed ports in the server. Among the three the open scanning technique gives accurate information about the state of the port, but it is easily detectable. Stealth scan technique can fool some of the basic Intrusion detection systems and some of the basic firewall rule sets. Before explaining in detail about each of the port scanning technique lets look into the steps involved in establishing a full TCP connection and the usage of each of the flags in the TCP message [Marco, Eddy, Germinal, Gabriela, 1999]. This is because most of the port scanning methods are based on the TCP connection and the functionalities of each of the flags bits in the TCP message. Following are the list of flags used in the TCP message and its functionalities. SYN This flag is used to initiate a TCP connection. FIN This flag specifies that the sender has finished sending the entire data. RST This flag is set to reset the connection. ACK This flag is set to acknowledge for the request. URG This flag is set to indicate that the urgent pointer is valid. PSH This flag is set to indicate that all the data should be pushed to receiver immediately without waiting for the additional information. The TCP connection establishment consists of three steps hence it called as three-way handshake. First the client will send a TCP message with SYN flag set with an initial sequence number to the targeted host. The second step is that, if the respective port in the target host is open then the target host will acknowledge the clients SYN by incrementing the clients initial sequence number by 1 and sends back to the client along with its own initial sequence number with the SYN message. Third step, the client on receiving the target hosts TCP message with SYN flag set it will send an ACK message and the target hosts initial sequence number incremented by 1 to the target host. This is how the TCP connection will be established between two hosts. Shown below is the pictorial representation of three-way handshake TCP connection. SYN, Clients ISN (initial seq. num) Client Target host SYN, Target hosts ISN (initial seq. num) Clients ISN + 1Client Target host ACK, Target hosts ISN + 1 Client Target host Having the basic knowledge of TCP connection and the functionalities of each of the flags in TCP message we will discuss in detail in each of the port scanning techniques. Open Scanning Technique: The open scanning technique will try to establish a full TCP connection with the target host. Based on the response from the target the client will decide whether the port in the target host is open or closed. This technique is slower when compared to other two techniques, since it involves in establishing a three way connection with the target. Also this technique is easily detectable and can be filtered easily. Described below is one of the open scanning methods. TCP connect scan method: The TCP connect scan method uses the connect() method in the operating system to establish a three-way connection between the target host [Dethy, 2001]. Client will send Æ’Â   SYN Server will respond with Æ’Â   SYN, ACK Client will respond with Æ’Â   ACK In the above three-way handshake the server responds with the SYN message which means that the listening port in the targeted host is in the open state. Client will send Æ’Â   SYN Server will respond with Æ’Â   RST, ACK Client will respond with Æ’Â   RST In this case, the server responds with the RST message to the request. This shows that the listening port in the targeted host in the closed state. By this way a list of open or closed ports in the targeted host can be obtained. The advantages of this scanning method are that it is fast, accurate and does not require extra user privileges. The disadvantages are this method is easily detectable and could be logged. Half Open Scanning Technique: In the half open scanning technique the client will terminate the connection even before the three-way handshake is completed. Two types of scanning methods come under the half open scanning technique. They are 1) SYN scanning and 2) IP ID header or dumb scanning. SYN scan method: This method is similar to the full connection/TCP connect scan method. The difference is that when the client receives a SYN message from the target host it will close the connection by sending a RST message to the target machine. This is because the SYN message from the target host is enough to know that its listening port is in open state. If a RST message is received from the target host then it means that the listening port in the target host is in closed state. Thus a three-way handshake is restricted in this type of scan method. The pictorial representation of which is shown below [Dethy, 2001]. Pictorial representation if the port is in open state, Client will send Æ’Â   SYN Target will respond with Æ’Â   SYN, ACK Client will respond with Æ’Â   RST Pictorial representation if the port is in closed state, Client will send Æ’Â   SYN Target will respond with Æ’Â   RST, ACK The advantages of this method are it is fast, accurate and it is less frequently logged when compared to open scan method. The main disadvantage is that for this type of scanning the sender or client needs to customise the IP packet which requires special user privileges, and this is the case for almost all of the operating systems. IP ID header or dumb scanning method: The basis of this scan method is similar to the SYN scan method but the difference is that IP ID header or dumb scanning method uses a third host to scan the target host, and based on the id value in the IP header field this scan method will decide whether the listening port in the targeted host is in open or closed state. The third host should be identified in such a way that it should send very little amount of traffic or preferably no traffic, hence this type of host is said to be silent or dumb host. It requires lots of effort to identify this type of host. In this scenario, there will three different host. One is the attacker host (A), second is the silent host (S) and third is the target host (T). First A will send consecutive ping packets to S, this is to analyse the id value in the IP header field. Each time the silent host will increment the id value by 1 in its response. An example of which is shown below, 60 bytes from AAA.BBB.CCC.DDD: seq=1 ttl=64 id=+1 win=0 time=96 ms 60 bytes from AAA.BBB.CCC.DDD: seq=2 ttl=64 id=+1 win=0 time=88 ms 60 bytes from AAA.BBB.CCC.DDD: seq=2 ttl=64 id=+1 win=0 time=88 ms Now using the source address of host S, host A will send a spoofed SYN message to the host T. The host T will respond to host S with either SYN message or the RST message based on the listening ports state. Now the host A will examine the ping responses from the host S to check the id value in the IP header. If the id value is more than 1 then it shows that the respective port in the host T is open, because only when the host S will respond back to host T and increments the id value. That is the host T would have responded to the host S with the SYN message for the spoofed SYN message from the host A. If the value of id is 1 then it indicates that the respective listening port in the host T is in closed state. Stealth scanning technique: The stealth scanning technique is a technique used to avoid the logging of port scan performing in a host and to break into the basic filters and firewalls implemented. This technique slows the scan due to which the ports are scanned over a long time period. Thus it restricts the target host to trigger an alert. In this section we will discuss about four types of stealth scanning techniques. FIN scan method: As the name implies this method uses the FIN flag in the TCP message to identify the list of open or close ports in the target host. That is the attacker will send a TCP message with FIN flag set to target host. Based on the response from the target the attacker will determine whether the listening port in the target is open or closed. If the listening port in the target is closed then it will reply back with the RST message. The negotiation is shown below, Attacker will send Æ’Â   FIN Target will respond with Æ’Â   RST If the listening port is open then the target will not send any response back. The negotiation is shown below, Attacker will send Æ’Â   FIN Target response Æ’Â   none The advantages of this method are it can bypass many intrusion detection systems and these scans are not logged. The disadvantage is that at times it can produce false results. NULL scanning method: The null scanning method will send a TCP message to the target without setting any of the six flags in the TCP message. Based on the response from the target the attacker will generate a list of open ports. If the response from the target is RST then the listening port in the target host is said to be in closed state, else if a there is no response from the target then the port is open. The advantages of this method are it can bypass many intrusion detection systems and these scans are not logged. The disadvantage is that at times it can produce false results and it can be used only in UNIX systems. XMAS scanning method: The implementation of XMAS method is exactly opposite to the NULL scanning method. That is, the Xmas scanning method will send a TCP message with all the six flags set. If the response from the target is RST then the listening port in the target host is said to be in closed state, else if a there is no response from the target then the port is open. The advantages and disadvantages of this method are same as that of the NULL scanning method. TCP fragmenting method: The TCP fragmenting itself is not a port scanning method; instead it is used to improve the other stealth port scanning methods like FIN, NULL, and XMAS [Marco, Eddy, Germinal, Gabriela, 1999]. This method splits the TCP header into smaller fragments such that it is not easily detected by the firewalls and other intrusion detection systems implemented. All the above discussed port scanning techniques are specific to the TCP ports. There are other port scanning techniques available for scanning non TCP ports, some of which are explained below. UDP scanning technique: The UDP scanning technique is used to get a list of available/open DUP ports in a target host. The method sends a UDP message to the target, and based on the response from the target the attacker will determine whether the port is open or closed. If the response from the target host is a UDP message then the port is open. If the response from the target is an ICMP port unreachable [Dethy, 2001] message then the port is closed. If the response is some other ICMP unreachable message then the port is filtered. If there is no response from the target host then the listening port is either open or filtered. The advantages are, it is used to scan non TCP ports and it is not restricted by TCP Intrusion detection system. Its disadvantages are it is easily detectable and requires root access. Ident scanning technique: The scanning methods that we have discussed so far is used to get a list of open/available ports, but the Ident scanning technique is used to get the information about the owner of the process running in those available/open ports. This method uses the insecure issue in the Identification protocol to uncover the owner details of the process running in the listening ports. This technique can be employed only when the target host is running the identd service in port 113. FTP bounce scanning technique: This technique uses an option in the FTP protocol to perform port scanning. That is, this method uses proxy ftp servers to communicate with the target host and to perform port scanning in each of its ports. For this the proxy functionality in the ftp server should be enabled. In this method, first the attacker establishes ftp connection with the proxy FTP server. Then using the port and list commands it tries to scan each of the ports in the target host. If the listening port is open then the server will send 150 and 226 response codes to the attacker, else if the port is closed the server will respond with the 425 reply code to the attacker. Decoy scanning technique: The decoy scanning technique sends several packets to the same port in the target host. All of these IP packets contain spoofed IP address except one of the packet. That is, one in a several packets holds the actual attackers IP address. Thus this method makes sure that at least one response from the target host is sent to the attacker. The advantages of this method are that it is extremely hard for the administrator to identify the exact scanner/attacker and the result obtained from this method is accurate. The disadvantage of this technique is that, since it sends several packets to the same port the flow of traffic will be high. Conclusion The different types of port scanning techniques are explained in detail along with their advantages and disadvantages. We have seen that most of the port scanning techniques are based on the TCP protocol, but other port scanning techniques are available to scan the non TCP ports. At present numerous software tools are available to perform an effective port scanning in the local host or the remote host to check for the existing vulnerabilities and ways to fix them. Some of the popular tools are SATAN and N-Map. Port scanning techniques are not only used by the attackers to break into the computer/network, it can also be used to check our own computers for vulnerabilities and to take preventive actions for those vulnerabilities.

Tuesday, August 20, 2019

Effectiveness of Assertiveness Training

Effectiveness of Assertiveness Training CHAPTER – IV DATA ANALYSIS AND INTERPRETATION This chapter deals with analysis and interpretation of data to study the effectiveness of assertiveness training programme on the level of self esteem among adolescents at selected school. The result findings have been tabulated and interpreted according to plan for data analysis. The data collected from 60 samples were grouped and analyzed using descriptive and inferential statistics. The results are presented under the following. ORGANIZATION OF DATA Section A: Distribution of demographic variables of adolescents Section B: Distribution of subjects according to level of self esteem among adolescents  before and after training programme. Section C: Comparison of effectiveness of assertive training programme on the level of  Self esteem among adolescents in experimental group and wait listed control  group. Section D: Association between the level of self esteem among adolescents with selected  demographic variables. SECTION A Table No 1: Distribution of subjects according to their demographic variables (N=60) S.No Demographic variables Experimental group Wait listed Control group Frequency % Frequency % 1. Age a .11-13 yrs b. 13-15yrs c. 15-17yrs 12 17 1 40 56.7 3.3 10 19 1 33.3 63.3 3.3 2. Sex a. Male b. Female 10 20 33.3 66.7 14 16 46.7 53.3 3. Religion a. Hindu b. Christian c. Muslim 19 8 3 63.3 26.7 10 15 8 7 50 26.7 23.3 4. Residency a. Urban b. Rural 19 11 63.3 36.7 20 10 66.7 33.3 5. Type of family a. Nuclear b. Joint 23 7 76.7 23.3 20 10 66.7 33.3 6. Father’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 3 8 9 10 10 26.7 30 33.3 4 10 8 8 13.3 33.3 26.7 26.7 7. Mother’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 6 9 9 6 20 30 30 20 9 10 6 5 30 33.3 20 16.7 8. Father’s occupation a. Government sector b. Private sector c. Business d. coolie 5 7 15 3 16.7 23.3 50 10 3 10 14 3 10 33.3 46.7 10 9. Mother’s occupation a. Government sector b. Private sector c. Business d. Housewife 3 10 1 16 10 33.3 3.3 53.3 3 15 1 11 10 50 3.3 36.7 10. Annual Income a. 50000-100000 b. 100000-200000 c. 200000 above 6 13 11 20 43.3 36.7 8 15 7 26.7 50 23.3 Table 1 : Shows that frequency and percentage distribution of demographic variables of experimental and wait listed control group with respect to age, sex, religion, residency, type of family, father’s education, father’s occupation, mother’s education, mother’s occupation and annual income. Regarding Age, majority of the subjects in Experimental Group 17 (56.7 %) in Wait listed Control Group 19 (63.3%) were in the age group of 13-15 years. Regarding Sex, majority of the subjects in Experimental Group 20 (66.7 %) in Wait Listed Control Group 16 (53.3%) were females. Regarding Religion, majority of the subjects in Experimental Group 19 (63.3 %) in Wait Listed Control Group 15 (50%) were Hindus. Regarding Residency, majority of the subjects in Experimental Group 19 (63.3%) in Wait Listed Control Group 18 (60%) were from urban area. Regarding Type of Family, majority of the subjects in Experimental Group 23 (76.7 %) in Wait Listed Control Group 20 (66.7%) were from nuclear family. Regarding Father’s Education, majority of the subjects in Experimental Group 10 (33.3 %) were graduates in Wait Listed Control Group 10 (33.3%) were Primary  education level. Regarding Mother’s Education, majority of the subjects in Experimental Group 9 (30 %) were Higher Secondary level in Wait Listed Control Group 10 (33.3%) were Primary education level. Regarding Father’s Occupation, majority of the subjects in Experimental Group 15 (50 %) in Wait Listed Control Group 14(46.7%) were business men. Regarding Mother’s Occupation, majority of the subjects in Experimental Group 16 (53.3 %) were housewives in Wait Listed Control Group 15(50%) were working in private sector. Regarding Annual Income of the family, majority of the subjects in Experimental Group 13 (43.3 %) in Wait Listed Control Group 15 (50%) were ranged from Rs.100000-200000. FIG:3 –Distribution of subjects according to their age in both experimental  and wait listed control group FIG:4 – Distribution of subjects according to their Sex in both experimental and wait listed control group FIG:5 – Distribution of subjects according to their Religion among experimental and wait listed control group FIG:6 –Distribution of subjects in Residency among experimental and wait  listed control group FIG:7 –Distribution of subjects in type of family among experimental and  wait listed control group FIG:8 –Distribution of subjects in father’s education among experimental  and wait listed control group FIG:9 –Distribution of subjects in mother’s education among experimental  and wait listed control group FIG:10 –Distribution of subjects in father’s occupation among experimental and wait  listed control group FIG:11 –Distribution of subjects in mother’s occupation among experimental  and wait listed control group FIG:12 –Distribution of subjects in annual income of the family among experimental  and wait listed control group SECTION B Table 2: Distribution of subjects according to their level of self esteem before and after Assertiveness training among adolescents. (N=60) S.No Level of self esteem Group Range of score Mean SD High SE Low SE 60-80 80-100 20-40 40-60 1. Before assertiveness training Experimental group 52.06 7.6 Wait listed control group 53.96 3.9 2. After assertiveness training Experimental group (post1) 79.8 5.7 Experimental group (post 2) 74.83 9.03 Wait listed Control group 55.13 3.86 Table 2 shows that distribution of subjects according to the level of self esteem before and after assertiveness training among adolescents. In that, mean value of level of self esteem before assertiveness training in experimental group was 52.06 in control group it was 53.96 and also the mean value of level of self esteem after assertiveness training in experimental group post test 1 and post test 2 was 79.8 74.83 , and in control group it was 55.13 FIG 15: Distribution of subjects according to their level of self esteem before and after assertiveness training among adolescents. SECTION C Table 3 : Comparison of mean pre test value of level of self esteem among adolescents in Experimental Group and Wait Listed Control Group. (N=60) S.NO Level of self esteem Group Mean SD ‘t’ value 1. Pre test Experimental group 52.06 7.6 1.213 (NS) Wait listed Control group 53.96 3.9 NS –Not significant Table 3 describes that obtained independent ‘t’ value for the mean difference in pre test level of self esteem between experimental and control group is 1.213 and it is not statistically significant at 0.05 level, hence there is no significant difference exist between level of self esteem among experimental and control group and also shows that both the groups were homogenous before giving assertiveness training. FIG:16- Comparison of mean pre test value of level of self esteem among adolescents in Experimental Group and Wait Listed Control Group Table 4 : Comparison of mean post test value of level of self esteem among adolescents in Experimental Group and Control Group.(N=60) S.NO Level of self esteem Group Mean SD ‘t’ value 1. Post test 1 Experimental group 79.8 5.68 19.640** Wait listed Control group 55.13 3.86 2. Post test 2 Experimental group 74.83 9.03 10.982** Wait listed Control group 55.13 3.86 ** Significant at .001 level Table 4 describes that obtained independent ‘t’ value for the mean difference in post test 1 and post test 2 level of self esteem between experimental and control group is 19.640 10.982 and it is statistically significant at 0.05 level, hence there is significant difference exist between post test 1 and post test 2 level of self esteem among experimental and control group after receiving assertiveness training. FIG:17 Comparison of mean post test value of level of self esteem in both groups Table 5 : Comparison of mean Pre and Post test level of self esteem among adolescents in Experimental Group (N=30) S.NO Group Test Mean SD ‘t’ value 1. Experimental group Pre test Post test 1 52.06 79.8 7.6 5.68 16.181** Pre test Post test 2 52.06 74.83 7.6 9.03 10.694** ** Significant at 0.001 level Table 5 depicts that obtained paired ‘t’ value for the mean difference in Pre, Post test1 Post test 2 level of self esteem in Experimental group is 16.181 10.694 and it is statistically significant at 0.05 level, hence there is significant difference exist between pre and post test level of self esteem among Experimental group after receiving assertiveness training. FIG:18 Comparison of mean Pre and Post test level of self esteem among adolescents in Experimental Group Table 6 : Comparison of mean Pre and Post test level of self esteem among adolescents in Wait listed Control Group. (N=30) S.NO Group Test Mean SD ‘t’ value 1. Wait listed Control group Pre test Post test 53.96 55.13 3.9 3.86 1.125 (NS) Table 6 depicts that obtained paired ‘t’ value for the mean difference in Pre and Post test level of self esteem in Control group is 1.125 and it is not statistically significant at 0.05 level, hence there is no significant difference exist between pre and post test level of self esteem among adolescents in Wait Listed Control group. FIG:19- Comparison of mean Pre and Post test level of self esteem among adolescents in Wait Listed Control Group Table 7 : Comparison of mean post test value of level of self esteem in different period of time among adolescents in Experimental Group (N=30) S.NO Group Test MEAN SD T value P value 1. Experimental Group Post Test1 Post Test2 79.8 74.83 5.6 9.03 2.43 0.021* ** Significant at .01 level Table 7 revealed that obtained paired ‘t’ value for the mean difference in post test value of level of self esteem in different period of time (immediate, one month after) among adolescents in Experimental Group is 2.43 and it is statistically significant at 0.05 level, hence there is significant improvement in level of self esteem among adolescents in different period of time ( immediate, one month after) in experimental group. FIG: 20 Comparison of mean post test value of level of self esteem in different period of time among adolescents in Experimental Group SECTION D: Table no: 8- Association between post-test level of self esteem among adolescents with demographic variables in Experimental Group Wait listed control group (N=60) S.NO Demographic variables Experimental group Wait listed control group Frequency P value Frequency P value 1. Age a .11-13 yrs b. 13-15yrs c. 15-17yrs 12 17 1 0.263 (NS) 10 19 1 0.668 (NS) 2. Sex a. Male b. Female 10 20 0.595 (NS) 14 16 0.314 (NS) 3. Religion a. Hindu b. Muslim c. Christian 19 8 3 0.395 (NS) 15 8 7 0.064 (NS) 4. Residency a. Urban b. Rural 19 11 0.172 (NS) 20 10 0.514 (NS) 5. Type of family a. Nuclear b. Joint 23 7 0.260 (NS) 20 10 0.374 (NS) 6. Father’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 3 8 9 10 0.388 (NS) 4 10 8 8 0.17 (NS) 7. Mother’s education a. Illiterate b. Primary c. Higher secondary d. Graduate 6 9 9 6 0.512 (NS) 9 10 6 5 0.632 (NS) 8. Father’s occupation a. Government sector b. Private sector c. Business d. coolie 5 7 15 3 0.406 (NS) 3 10 14 3 0.415 (NS) 9. Mother’s occupation a. Government sector b. Private sector c. Business d. Housewife 3 10 1 16 0.12 (NS) 3 15 1 11 0.334 (NS) 10. Annual Income a. 50000-100000 b. 100000-200000 c. 200000 above 6 13 11 0.075 (NS) 8 15 7 0.527 (NS) * Significant at 0.01 level NS – Not significant Table 8 reveals that the calculated chi square test value for level of self esteem with demographic variables such as age, sex, religion, residency, type of family, father’s education, father’s occupation and annual income in experimental group. It also shows that there is no significant association exist between the level of self esteem with demographic variables such as age, sex, religion, residency, type of family, father’s education, father’s occupation, annual income and academic performance in wait listed control group.

Monday, August 19, 2019

Othello: Moral and Immoral Aspects of the Play Essay -- GCSE Coursewor

Othello: Moral and Immoral Aspects of the Play  Ã‚        Ã‚  Ã‚   Certain aspects of the moral dimension of the Shakespearean tragedy Othello are obvious to the audience, for example, the identity of the most immoral character. Other aspects are not so noticeable. Let us in this essay consider in depth this dimension of the drama.    Francis Ferguson in â€Å"Two Worldviews Echo Each Other† describes the deception of Iago: how he paints as evil a guiltless association between Cassio and Desdemona:    The main conflict of the play is a strange one, for Othello cannot see his opponent until too late. But the audience sees with extraordinary clarity. In Act II Iago tricks Cassio into disgracing himself, and then takes advantage of the guileless affection between Cassio and Desdemona to create, for Othello, the appearance of evil. He explains this scheme to the audience, with mounting pleasure, as it develops; and by Act III he is ready to snare Othello himself. . . .(133)    The moral and immoral dimension of Othello, especially the latter, is enhanced simply by its location in Italy. Louis B. Wright and Virginia A. LaMar in â€Å"The Engaging Qualities of Othello† comment on how the exotic setting of this play satisfied the Elizabethan dramatist’s dream of portraying evil:    Elizabethan dramatists were fond of portraying characters of consummate evil, and if they could lay the scenes in Italy, all the better, because the literature and legend of the day were filled with stories of the wickedness of Italy. [. . .] Venice especially had a glamor and an interest beyond the normal. Every returning traveler had a tall tale to tell about the beauty and complaisance of Venetian women, the passion, jealousy, and quick anger o... ...reenhaven Press, 1996. Reprint from Shakespeare: The Pattern in His Carpet. N.p.: n.p., 1970.    Jorgensen, Paul A. William Shakespeare: The Tragedies. Boston: Twayne Publishers, 1985.    Pitt, Angela. â€Å"Women in Shakespeare’s Tragedies.† Readings on The Tragedies. Ed. Clarice Swisher. San Diego: Greenhaven Press, 1996. Reprint from Shakespeare’s Women. N.p.: n.p., 1981.    Shakespeare, William. Othello. In The Electric Shakespeare. Princeton University. 1996. http://www.eiu.edu/~multilit/studyabroad/othello/othello_all.html No line nos.    Wright, Louis B. and Virginia A. LaMar. â€Å"The Engaging Qualities of Othello.† Readings on The Tragedies. Ed. Clarice Swisher. San Diego: Greenhaven Press, 1996. Reprint from Introduction to The Tragedy of Othello, the Moor of Venice by William Shakespeare. N. p.: Simon and Schuster, Inc., 1957.      

Sunday, August 18, 2019

Fast PLants :: essays research papers

How Tall can Your Fast Plant Grow? Procedure: During the fast plant life cycle many things were taken into account. The plants all started out as a seed. Data was collected every Tuesday and Thursday after class. The kind of quantitative data that was collected was the height of each plant on the days that we would go in and check them. The qualitative data that was collected was our drawings of the plants. We were able to add details to the pictures. The purpose of this experiment was to be able to view the complete life cycle of an organism. All of the plants that we used in the experiments were F2’s . Analysis: The germination took place within the first 3 days of planting the seeds. It was noticed that in the time frame of the 3rd and 5th day the cotyledons became visible. The first true leaves made their appearance right around the 10th day. The days surrounding the 13th day lead to flower buds actually forming and showing up. The plants were starting to get flimsy so on day 17 we added stakes to support the young plants. Our first flowers started to bloom around the 27th day. They were yellow and petite. Pollination took place a day later. We cut the wings and heads off of the bee and glued it to a toothpick. We then gently brushed the bee over the flowers to help the pollination procedure. After all of the pollination was done, seed pods started to develop 30 days after the initial planting. The plants stayed healthy for a couple more days after this. It was around day 36 that the plants started drying up and dying. It was time for the plants to be harvested for their seeds th ey had produced. While working with our plant it was exciting to look around and see how other plants were coming along. I like to think that our plants were in the top percentile of successful plants. They grew up fast and tall while others seem to take a while to get the same height. Weekly growth seemed to be exceptional. It seemed like every Tuesday that I came in to check my plants they had grown so much over the weekend. Some occasions the plants would grow as much as 4 centimeters just over the weekend. Of the four plants that we had remaining at the end of the experiment, two were hairy.

Saturday, August 17, 2019

Advantages of Medical Isolation and Quarantine Essay

Advantages of Medical Isolation and Quarantine Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to many health experts, medical isolation and quarantine does very little in curbing the spread of contagious diseases (Kliff). Although isolation and quarantine tend to have some similarities, they are very different. According to studies, whereas isolation involves the seclusion of people infected with contagious diseases, quarantine is the seclusion of people who are not sick but have been exposed to a contagious disease (â€Å"Diffen†). Although isolation and quarantine are different, they have one main objective, which is to prevent further spreading of contagious diseases in a society. Isolation and quarantine comes alongside a number of advantages. For instance, in addition to minimizing the spread of contagious diseases, placing people under medical isolation and quarantine also assists in neutralizing deadly diseases such as Ebola. By providing a detailed analysis of both isolation and quarantine, the study intend s to provide an argument on their advantages. Neutralizing Contagious Diseases   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Placing people under medical isolation or quarantine is quite beneficial to any society. This is because through medical isolation and quarantine, a nation is able to neutralize any contagious disease, hence, preventing it from becoming spreading any further. When sick people have been placed under medical isolation, chances of further spreading of the disease are minimized compared to if they were treated in public places. In order to make the isolation process successful, it is vital that these patients be secluded from the public. According to Stambaugh (5), the quarantine process is normally conducted in five phases. For instance, after the decision to quarantine has been reached, the next phase is to locate a quarantine area and ensuring that the quarantine process is maintained. Locating a quarantine area normally depends on the number of people that require quarantine.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   After successfully maintaining the quarantine, the next phases are demobilization and recovery (Stambaugh 5). Apart from hospitals, isolation can also be done in special healthcare facilities or in the patient’s homes. The case is however different for quarantine, this is because, unlike in isolation, people exposed to contagious diseases are placed in quarantines, which can either be located in designated emergency facilities as well as specialized hospitals. This is normally in a move to prevent these people from making any contacts with the public until the incubation period of the diseases elapses. Proper Medical Attention   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Placing people under medical isolation and quarantine also enables medical practitioners to offer appropriate medical attention to patients. The recent Ebola outbreak in West Africa is one example of how medical isolation and quarantine can minimize further spreading of the disease. If it were not for medical isolation and quarantine processes, the disease would have spread throughout Africa as well as other continents. According to Resnikoff, all the people who tested positive for the Ebola virus were placed under isolation, which was in a move to offer them proper medical attention in addition to minimizing further spreading of the disease.The large number of deaths reported due to the Ebola outbreak prompted many nations to set up quarantine facilities in order to attend to all citizens coming from the Ebola stricken nations.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Citizens coming from Ebola stricken nations were normally placed in quarantine for a period of twenty-one days, which is usually the incubation period of the Ebola virus. It was only after the twenty-one days that citizens were allowed to see their families, that is if they had tested negative for the Ebola virus. If they tested positive for the virus, they were then moved from quarantine to isolation where they were to were to under special treatment and monitoring. Minimizing of Medical Expenses   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Apart from neutralizing the disease as well as offering proper medical attention, another advantage of medical isolation and quarantine is that it minimizes excessive medical expenditures (â€Å"NCSL†). When there is an outbreak of a contagious disease, many people are likely to be infected. This implies that a nation is likely to spend a lot of money on purchasing medication drugs as well as hiring international medical practitioners to aid in controlling the disease. In order to avoid these expenses, it is normally essential that nations embrace the medical isolation as well as quarantine programs in a move to minimize their expenses. According to my opinion, the main reason why West Africa was greatly affected by the Ebola outbreak was because they were not quick in establishing isolation and quarantine centers, hence, allowing the disease to spread rapidly. Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Medical isolation is the process where sick people are secluded from the public in a move to prevent further spreading of a disease. Although quarantine is similar to isolation, people secluded through quarantine are not sick but were exposed to a contagious disease. Medical isolation and quarantine have a number of advantages to a society. For instance, through isolation and quarantine, a nation is in a position to curb the spreading of a contagious disease. Apart from curbing the spread of diseases, when people are placed under medical isolation and quarantine, this enables medical practitioners to offer proper medication since it will be easy to monitor any changes once they occur. Additionally, medical isolation and quarantine also reduce medical expenses of a nation. This is because once a disease has been neutralized in the isolation and quarantine centers, a nation will only spend little amount of money to treat the infected. References Diffen.Isolationvs.Quarantine.2014.Web2015. Kliff, Sarah. â€Å"3 reasons public health experts think Ebola quarantines are a  terrible  idea.† VOX. 2014. Web. 2015. < http://www.vox.com/2014/10/28/7079147/three-reasons-public-health-experts-think-ebola-quarantines-are-a> NCSL. State Quarantine and Isolation Statutes. 2014. Web. 2015. http://www.ncsl.org/research/health/state-quarantine-and-isolation-statutes.aspx Resnikoff, Ned. â€Å"Ebola quarantine policy sparks controversy in medical community.† MSNBC. 2014. Web. 2015. < http://www.msnbc.com/msnbc/doctors-question-ebola-quarantine-policy> Stambaugh, Hollis. Quarantine Facilities for Arriving Air Travelers: Identification of Planning Needs and Costs. 2008. Print. Source document

Friday, August 16, 2019

Forest Life Changes the Characters in As you like it, do you agree? Essay

In Shakespeare’s As you like it, we find the characters attempting to escape the court. What they specifically are escaping from are the ‘briars’ of the ‘working day world’. The imagery of briar bushes specifically enacts a form of entanglement; that the world of the court is entrapping and the people in it are reflected as such. What is ‘comely envenoms him that bears it’, highlighting a reverse polarisation of morality, that what is good is a hindrance in the world of the court. This is paralleled by what Touchstone (who represents the court as a jester, whom were always in the service of the court) says; ‘The sweetest nut hath the sourest rind’. Indeed, the usurper is viewed as the rightful ruler of the court whereas the rightful ruler is branded an outlaw. So the characters escape to the forest in order to cleanse themselves of ‘th’infected world’ (Playing upon the previous mention of ‘envenoms’ as a form of physical affliction that requires cathartic release). One can argue that the characters do respond to the forest, and their characters change as such. One particularly significant example is how Shakespeare constructs the forest as a place of alternative knowledge; Duke Senior finds that the ‘winds are his councillors’ and that the ‘trees shall be my (his) books’, that they find ‘sermons in stones’. This highlights the homiletic edification that occurs when one engages with nature, and indeed, this is paralleled by the discourse expressed between Rosalind and Celia in Act I, where they comment on how fortune (A product of the court) and nature (Of the forest) are at odds with one another; ‘Fortune reigns in gifts of the world/not in the lineaments of natu re’. The escapism of the forest is further expressed when the gentlemen become ‘merry men’ and ‘brothers in exile’ highlighting how they are able to ‘fleet time as they did in the golden age’, with the ‘merry men’ alluding exclusively to the notion of ‘Robin hood’, who represents an active rebellion against the court, suggesting an underlying romanticisation of what it is to be an outlaw. Indeed, defying social norms appears to be what the forest epitomises, and as such, Rosalind even changes all perception of her by becoming ‘Ganymede’, she essentially dresses up to become someone different. Finally, we find the two main ‘villains’ of the story; Duke Frederick and Oliver have a very quick change of heart from the forest, which in both cases turn out to be spectacular examples of Deus Ex Machina, both being equally contrived but portrayed as legitimately woven into the story. So in that sense, the forest is a healing force. However, there is an argument for the opposite; that the forest is exactly the same as the court and no significant change occurs. One of the biggest examples of this lies in the speech of Lord 1 regarding the murder of a deer. The deer are portrayed as ‘native burghers’ in their own ‘desert city’, who retreat ‘from the hunters aim’ into a ‘sequestered’ ‘languish’. Jaques remarks then about how the foresters are the ‘mere usurpers’ who ‘kill them up/in their assign’d and native dwelling place’. This is particularly significant because a parallel is drawn between the deer and the foresters, the deer is escaping usurpation in much the same way the foresters are, this is further enhanced by the fact that the deer has a ‘leathern coat’, a deliberate wording by Shakespeare to highlight the parallels it has with its human usurpers. This usurpation is shown elsewhere in the book, R osalind who buys the shepherds ‘passion’ (Livelihood) because it is ‘much upon her fashion’, suggesting a transitory or arbitrary desire, devoid of consideration for the fact that the shepherd derives his survival from his flock. Indeed, she wishes to ‘waste her time’ here, rather than use it for any meaningful purpose. Other aspects of the court are also filtered into the forest to enact a distinct lack of change. The notion of the ‘merry men’ and ‘brothers in exile’ is immediately undermined by the fact that the duke is referred to as ‘your grace’, implying that the hierarchy of society is still in place, despite their attempts to gloss over it. Indeed, the very nature of them dressing up as foresters when they are in fact ‘gentlemen’ enacts the nature of the ‘painted pomp’ that is alluded to when referring to the court. The word ‘pompous’ implies a level of self-importance and unnecessary grandiose, which is ever present in the forest; ‘to blow on whom I please’ (IE, to do as I wish). Conventionally in the pastoral, the return to ‘reality’ (In this instance, the court) is forced due to the ephemeral nature of Arcadia. However, at the end of the play here, we find that the characters easily cast off their ‘disguises’ as if they had never left, willingly returning to the court, signifying that there must have been little difference between the two worlds, and emphasising the fact that the court has been a constant throughout the play. One of the most famous quotes of the play, ‘All the world is a stage’ is particularly significant here also. Throughout the story, the ‘motley coat’ (Emblematic of the fool) has been alluded to, and it represents the ‘players’ and by extension, the audience as a whole. If we are all ‘players’ as in a play, with ‘their exists and entrances/and many parts’, then we are all fundamentally acting like the foresters all the time, we all are part of the same outcome. Indeed, at the very end, we all are ‘sans teeth, sans taste, sans everything’, emphasising the fact we all end up subjected to time and age, no better for our experiences in life. This is particularly ironic of course, because earlier on in the story, the forest is described as having ‘no clock’, but it is infact time that undoes all as expressed in this passage, enacting the futility of escape and the absence of any change in outcome fro m action. Finally, we have the ephemeral nature of the escape for the audience. As alluded to in the preceding paragraph, the audience are ‘players’ and actors in the play to, but do they change? At the very end, within the epilogue, Rosalind breaks the fourth wall, essentially undermining the experience of the play, returning the audience from the ‘forest’ (The imaginative space of the play) to the ‘court’ (Reality). She directly remarks upon the fact that it is a play, that it is a constructed narration and further commends it to be watched by the friends of the audience (Cementing the notion of ‘realism’ in the fact that the play is a commercial enterprise at heart, not a creative escape).

Beauty by Jane Martin Essay

We live in a country where television and advertisement is designed to entice people into always wanting more than what they already have. This enticement is achieved by feeding into the human desire for happiness. Advertisers create persuasive campaigns that inundate the public with images of societies narrow interpretation of success and beauty. These images are then presented as a precondition to the happiness that human beings are searching for. When a person’s reality does not match this narrow image, the message sent through television and advertisements is that in order to be content people need to find a way to acquire it. As a result we live in a society where people are continuously longing for a happiness that can only be achieved through things that are fleeting and external, which creates feelings of discontentment In the satirical one-act play â€Å"Beauty† by Jane Martin the two sole characters are Bethany and Carla. Their behavior demonstrates the affects of discontentment caused by the media. Despite the fact that both of these women are reasonably successful, they each want the things that they do no have that are present in each other. Carla is beautiful and wants to be smart and Bethany is smart and wants to be beautiful. Under normal circumstances the longing to have what someone else has, is usual either eventually abandoned or translates into negative emotions that are never acted on. However, due to the benefit of theatrics, these yearning become achievable because Bethany arrives at Carla’s house armed with â€Å"†¦a goddamn genie and one more wish!† (1108) The play is a microcosm of the discontentment in our society. This discontent is exhibited most effectively through Bethany’s character since she was the one more willing take exaggerated measures to obtain what she wanted. Although, Carla similarly voiced some discontentment with her life, she was not willing to exchange her reality for someone else’s. When we segregate each character and situation for examination, we are able to see how Martin purposefully crafts a story to effectively leave the audience thinking about the impact of discontentment in society. Carla is a symbol of the allure and illusion of beauty. She is a model the sociocultural standard of feminine beauty in society, however nothing about her is as it appears. Although she is a model, she is struggling. She is beautiful but her looks were altered by cosmetic surgery. Men were attracted to her but the  quality of the men is questionable. The fact that she is not smart is to deliberately create the stereotype of the dumb model. The media’s use of such unrealistic models like Carla and it makes it difficult for females to achieve any level of contentment with their physical appearance. Carla is the false god the media f orces women to compare themselves against. Her beauty is unattainable as it is the result of drastic measures. Yet, even if other women decide to go through those drastic measures they soon learn, like Carla, that it does not ultimately bring them happiness. When you examine Carla and Bethany’s relationship, you can further see the emptiness in Carla’s life. She describes Bethany as being one of the only female friends that she has. Reading the dialogue, even beyond the obvious points, there is so much about the friendship that is flawed. Bethany is not even aware that it is Carla’s birthday and when made aware she only half-heartedly acknowledges it before she continues on with her conversation/purpose for being there. Bethany also shows no regard for the fact that Carla and is on the phone regardless of how many times Carla asks her to be quiet. When Carla does finish her telephone the two carry on separate monologues and their conversation only finds connection when Carla realizes that she is the topic. Carla even acknowledges that Bethany does not like her most of the time. Which forces the reader to question the extent to which Carla understands relationships like friendship. Interestingly, Martin chose to have Carla be somewhat modest and even somewhat self-deprecating regarding her attitude of toward herself and complimentary toward her less attractive friend. This choice is interesting in that we generally think of the beautiful girl in stories as being the morally corrupt one. In popular culture the most beautiful girl is generally depicted as the villain. Yet, Martin breaks from this traditional trajectory. On the other hand, Bethany is an almost villainous character. She is negative, admittedly jealous, self-absorbed, and single-minded in her motivations for things that are fleeting and superficial that she believes beauty gives. She is a successful accountant, a published author, and pretty. However, these things are not enough for her. It could be said that her attitude is an indictment on the fact that women forced to view themselves in terms of their looks. Carla is allowed in many ways to be more human than Bethany is because she no longer has to strive for better  looks. An additional evaluation can also be done of the genie, which is symbolic of the world of advertising. He is a larger than life colorful character that represents the glamour and glitz of the advertising world. The offering of wishes represents the promises of advertisings. The fact that he is â€Å"see-through† (1106) is symbolic of the illusion and deception of advertisement. The whole concept of advertising is comparable to a mirage, which is a natural occurring optical illusion, yet even with the scientific explanation it is still an abstract experience that is a combination of desire and imagination. Advertising is just that, a mirage, a natural occurring illusion that comes into agreement with our desires and imagination. According to the Media Center for Literacy, â€Å"advertising is the most powerful education tool in American† which explains why women are conditioned to view themselves this prism. Bethany was the type of person the advertisement agencies target. She was unhappy with herself, as well as someone willing to go to any length or pay any price to obtain the perfect image. The media works hard at creating a society that view themselves negatively and then they prey on the victims. Ultimately, Martin uses his play to force the audience to question ideas of beauty, happiness, and what it means to live a good life. The characters, Bethany and Carla, present us with different elements of society. Each yearns for something outside of themselves. However, the desire for beauty trumps the desire for other traits like intelligence and personal success to the extent that someone is willing to give up everything for it. WORKS CITED Kilbourne, Jean. Beauty†¦and the Beast of Advertising. 21 December 2012 . Martin, Jane. â€Å"Beauty† Literature and the Writing Process. Ed. Susan X. Day, RobertFunk, and Elizabeth McMahan. Upper Saddle River: Pearson, 2007. Print.

Thursday, August 15, 2019

The Importance and Application of Principles of Management in the Present Day Context

The aim of all good modern organizations is to reconcile the organizational purpose (whether this be profit for shareholders, or cost-effective services delivery, in the case of public services) with the needs and feelings of people (staff, customers, suppliers, local communities, stakeholders, etc) with proper consideration for the planet – the world we live in (in terms of sustainability, environment, wildlife, natural resources, our heritage, ‘fair trade', other cultures and societies, etc) and at all times acting with probity – encompassing love, integrity, compassion, honesty, and truth.Probity enables the other potentially conflicting aims to be harmonized so that the mix is sustainable, ethical and successful. [pic] Traditional inward-looking management and leadership skills (which historically considered only the purpose – typically profit – and the methods for achieving it) are no longer sufficient for sustainable organizational success. Org anizations have a far wider agenda today. Management Management is the process of reaching organizational goals by working with people and other resources.Or knowing what you want people to do, and then getting them to do it the best way. Managers must concentrate on reaching organizational goals, and they should use their resources to accomplish those goals. For many years the management process has been divided into principles, sometimes called functions. Some sources will state that there are five principles and others will say there are four. Here we will use four: planning, organizing, influencing, and controlling. Some people use decision making as a fifth principle, but we will use decision making as part of the planning process.Also, some use leading instead of influencing, but we like the term influencing better. Management is a continuing process, and managers are always involved in some way with these principles. These principles are designed to help managers accomplish o rganizational objectives, and good managers will use them. These principles are not isolated but are interwoven throughout the manager’s thoughts and actions. Managers must combine and coordinate these principles and must maximize their value to achieve their goals.Managers strive to be effective and efficient and these principles help them. These management principles are universal and applicable to all types of businesses and organizations The basic ideas regarding scientific management developed. They include the following: †¢ Developing new standard methods for doing each job †¢ Selecting, training, and developing workers instead of allowing them to choose their own tasks and train themselves †¢ Developing a spirit of cooperation between workers and management to ensure that work is carried out in accordance with devised procedures Dividing work between workers and management in almost equal shares, with each group taking over the work for which it is best fitted Principles of Management The principles of management derive their significance from their utility. They provide useful insights to managerial behavior and influence managerial practices. Managers may apply these principles to fulfill their tasks and responsibilities. Principles guide managers in taking and implementing decisions. It may be appreciated that everything worthwhile is governed by an underlying principle.The quest of the management theorists has been and should be to unearth the underlying principles with a view to using these under repetitive circumstances as a matter of management habit. [pic] The significance of principles of management can be discussed in terms of the following points: †¢ Providing managers with useful insights into reality: The principles of management provide the managers with useful insights into real world situations. Adherence to these principles will add to their knowledge, ability and understanding of managerial situations and cir cumstances.It will also enable managers to learn from past mistakes and conserve time by solving recurring problems quickly. As such management principles increase managerial efficiency. For example, a manager can leave routine decision-making to his subordinates and deal with exceptional situations which require her/his expertise by following the principles of delegation. †¢ Optimum utilization of resources and effective administration: Resources both human and material available with the company are limited. They have to be put to optimum use.By optimum use we mean that the resources should be put to use in such a manner that they should give maximum benefit with minimum cost. Principles equip the managers to foresee the cause and effect relationships of their decisions and actions. As such the wastages associated with a trial-and-error approach can be overcome. Principles of management limit the boundary of managerial discretion so that their decisions may be free from perso nal prejudices and biases †¢ Scientific decisions: Decisions must be based on facts, thoughtful and justifiable in terms of the intended purposes.They must be timely, realistic and subject to measurement and evaluation. Management principles help in thoughtful decision-making. They emphasize logic rather than blind faith. Management decisions taken on the basis of principles are free from bias and prejudice. They are based on the objective assessment of the situation. †¢ Meeting changing environment requirements: Although the principles are in the nature of general guidelines but they are modified and as such help managers to meet changing requirements of the environment.You have already studied that management principles are flexible to adapt to dynamic business environment. For example, management principles emphasize division of work and specialization. In modern times this principle has been extended to the entire business whereby companies are specializing in their co re competency and divesting non-core businesses. In this context, one may cite the decision of Hindustan Lever Limited in divesting non-core businesses of chemicals and seeds. Some companies are outsourcing their non-core activities like share-transfer management and advertising to outside agencies.So much so, that even core processes such as R&D, manufacturing and marketing are being outsourced today. †¢ Fulfilling social responsibility: The increased awareness of the public, forces businesses especially limited companies to fulfill their social responsibilities. Management theory and management principles have also evolved in response to these demands. Moreover, the interpretation of the principles also assumes newer and contemporary meanings with the change in time. So, if one were to talk of ‘equity’ today, it does not apply to wages alone.Value to the customer, care for the environment, and dealings with business associates would all come under the purview of this principle. †¢ Management training, education and research: Principles of management are at the core of management theory. As such these are used as a basis for management training, education and research. You must be aware that entrance to management institutes is preceded by management aptitude tests. Do you think that these tests could have been developed without an understanding of management principles and how they may be applied in different situations?These principles provide basic groundwork for the development of management as a discipline. Principles of Scientific Management In the earlier days of the Industrial Revolution, in the absence of an established theory of factory organization, factory owners or managers relied on personal judgment in attending to the problems they confronted in the course of managing their work. This is what is referred to as ‘rule of thumb’. Managing factories by rule of thumb enabled them to handle the situations as they arose but suffered from the limitation of a trial and error approach.For their experiences to be emulated, it was important to know what works and why does it work. For this, there was a need to follow an approach that was based on the method of science- Defining a problem, developing alternative solutions, anticipating consequences, measuring progress and drawing conclusions The Main principles of management applied today are: †¢ Division of Work: Work is divided into small tasks/jobs. A trained specialist who is competent is required to perform each job. Thus, division of work leads to specialization. Specialization produces more and better work with the same effort. Authority and responsibility: Authority is the right to give orders and the power to exact obedience. A manager has official authority because of her position, as well as personal authority based on individual personality, intelligence, and experience. Authority creates responsibility. †¢ Discipline: Discipl ine is the obedience to organizational rules and employment agreement which are necessary for the working of the organization. According to Fayol, discipline requires good superiors at all levels, clear and fair agreements and judicious application of penalties. Unity of Command: An employee should receive orders from only one superior. †¢ Unity of Direction: Organizational activities must have one central authority and one plan of action. †¢ Subordination of Individual Interest to General Interest: The interests of one employee or group of employees are subordinate to the interests and goals of the organization. †¢ Remuneration of personnel: Salaries – the price of services rendered by employees – should be fair and provide satisfaction both to the employee and employer. Centralization and Decentralization: The concentration of decision-making authority is called centralization whereas its dispersal among more than one person is known as decentralizatio n. The objective of centralization is the best utilization of personnel. The degree of centralization varies according to the dynamics of each organization. †¢ Scalar Chain: An organization consists of superiors and subordinates. The formal lines of authority from highest to lowest ranks are known as scalar chain. †¢ Order: Organizational order for materials and personnel is essential.The right materials and the right employees are necessary for each organizational function and activity. †¢ Equity: In organizations, equity is a combination of kindliness and justice. Both equity and equality of treatment should be considered when dealing with employees. †¢ Stability of tenure of personnel: To attain the maximum productivity of personnel, a stable work force is needed. †¢ Initiative: Thinking out a plan and ensuring its success is an extremely strong motivator. Zeal, energy, and initiative are desired at all levels of the organizational ladder. Esprit de corps : Teamwork is fundamentally important to an organization. Work teams and extensive face-to-face verbal communication encourages teamwork. Change management is a basic skill in which most leaders and managers need to be competent. When leaders or managers are planning to manage change, there are five key principles that need to be kept in mind: †¢ Different people react differently to change †¢ Everyone has fundamental needs that have to be met †¢ Change often involves a loss, and people go through the â€Å"loss curve† †¢ Expectations need to be managed realistically †¢ Fears have to be dealt withHow to apply the above principles when managing change: †¢ Give people choices to make, and be honest about the possible consequences of those choices. †¢ Where it is possible to do so, give individuals opportunity to express their concerns and provide reassurances – also to help assuage potential fears. †¢ Give people information â€⠀œ be open and honest about the facts, but don't give overoptimistic speculation. †¢ For large groups, produce a communication strategy that ensures information is disseminated efficiently and comprehensively to everyone (don't let the grapevine take over). Keep observing good management practice, such as making time for informal discussion and feedback (even though the pressure might seem that it is reasonable to let such things slip – during difficult change such practices are even more important). †¢ Give people time, to express their views, and support their decision making, providing coaching, counseling or information as appropriate, to help them through the loss curve. †¢ Where the change involves a loss, identifies what will or might replace that loss – loss is easier to cope with if there is something to replace it. This will help assuage potential fears.