Saturday, August 31, 2019

Becoming a scholar practitioner

Studying human motivation has been interesting and an adventure. Thinking about what motivates people to do the things that they do is the same as asking myself why I wake up each day to work, to go to school and to be with my family. The course on human motivation for me has become a process of self-awareness and growth.I have learned that motivation is more than just needs and drives, more than intrinsic and extrinsic, more than values and goals, but that it is a complex process that is more than the sum of its parts.Human behavior is governed by the integration of internal and external processes and in order to understand behavior, one must be able to comprehend how the internal and external processes influence the person. I now realize that to be able to understand, predict and change behavior, the most important thing to examine is what motivates and what does not motivate him/her. In the same breath, effecting change to help disadvantaged individuals take control of their lives means providing them with the motivation to do so.The ability to think and examine human motivation theories and apply it to real life situations is in effect one of the enduring traits of a scholar-practitioner. A scholar practitioner is a professional who is committed to both study and explore the field that he/she is involved with and to be able to bring that learning and knowledge to his/her practice of her profession (Beck, 1999).Thus, a scholar-practitioner in the field of clinical psychology would commit herself to research and evaluation of her profession as well as applying what she has learned to her clients which would be most beneficial for them. In the past, scholars were confined to the academe; they researched and gained esteem through their work, and the practitioners practiced and became popular through their clients.However, one begins to see that the scholar and practitioner could learn from each other and by combining research and practice, one becomes a more ef fective instrument of social change. Social change is a giant leap, but nonetheless it starts from the small steps of the scholar-practitioner, for the objective of the scholar practitioner is always for the benefit of the greater number of people, if by helping a small group of people become better persons, then this groups would be able to touch more people and in the process change is facilitated.This course has helped me appreciate the psychology of human motivation and that there are a number of ways to extend that knowledge to real life situations, so that the knowledge is put to good use and I also believe that effecting change without the appropriate knowledge and training is ineffective.I see now that if I want to pursue a life dedicated to the helping profession, I must be able to understand what matters and what motivates the person so I could be of more service to them. I can only become a scholar-practitioner if I continuously seek learning experiences and trainings tha t would keep me abreast of the developments in my field as well as dedicating myself to seek new knowledge and new understanding of human behavior through research.Moreover, I need to translate that knowledge into my practice and therefore be able to give my clients the help they need and empowering them to take control of their lives and become agents of change in their own way. Reference Beck, L. G. (1999). Metaphors of educational community: An analysis of the images that reflect and influence scholarship and practice. Educational Administration Quarterly, 35; 19, 13-45.

Friday, August 30, 2019

Ddos Prevention Best Practices

To begin with, system hardening should be implemented on all University workstations, and especially the Web servers. This means turning off any unused services, closing all ports except those that are specifically needed for the operating roles of the servers, and ensuring that an anta;plus solution Is in place and regularly updated. Additionally, a strong patch management policy and procedure should be used to keep University computing assets up to date.This is to help prevent the exploitation of newly discovered vulnerabilities, and is part of the hardening process. All publicly available services, such as Web facing servers, DNS servers, and application servers, should be separated from private university resources. The separation should include enclosing the public servers in a DMZ. The DMZ should have firewalls in place on both sides of the network, to protect from external threats, and Internal ones. This separation also Isolates the servers from the rest of the network, in th e event one of them is compromised.Furthermore, PLANS should be implemented to break up broadcast domains, and IP subletting used to control outwork traffic, further isolating the public systems from the internal network devices. Also, A split DNS scheme that consists of an external DNS server separate from an Internal DNS server can help limit the Impact of DNS Dos style attacks. Network Address Translation (NAT) should remain in place, as it also has the effect of hiding the internal network from the Internet. Moreover, the blocking of IGMP or ping attempts should be blocked, at least externally, so that attempts to Identify systems from the Internet are reduced.As part of capacity planning, consideration should be made to plan for excess. This should help to absorb any Dodos attacks by having plenty of resources to maintain network operations. This Includes having more than adequate switch and router bandwidth, CAP]. And frame/packet processing ablest. Additional consideration sh ould be made to use different Internet Service Providers (ISP) for redundant connections. In the event of an attack, this has the benefit of having alternate paths to the Internet, providing redundancy and load sharing.When upgrading or replacing network equipment, anta-DoS capable devices should be carefully evaluated and selected. Intrusion Detection/Prevention Systems (DIPS) should be deployed, with the emphasis on prevention at the network perimeter. An inline device will be more effective placed behind the external facing firewall. The firewall is configured to allow only traffic that Is desired, blocking all other traffic, while the DIPS Is designed to block specific traffic and allow the rest. An DIPS device that uses both signature- 1 OFF positives, and therefore a better chance of detecting attacks.The DIPS device should be capable of sending alerts via email, SMS, and pager communication methods to Taft. The DIPS should also be configured to alter the firewall filtering ru les on the fly, in the event an attack is occurring. A period of fine tuning is necessary to reduce false positives, and ensure information is not lost due to miscommunication. Ingress and egress filtering needs to be implemented. This involves configuring the firewalls to block unreliable IP addresses as specified in RFC 1918, using Access Control Lists (Calls).This will help prevent IP address spoofing, and computing assets from being used to attack other organizations outside the University IP address pace. Egress filtering should only allow IP addresses to leave the University that fall within the range of allocated addresses. Log monitoring and review of all network and server devices should be performed regularly. In addition, IT staff should be alerted when suspicious activity or events are detected. For instance, repeated failed attempts to access a network device might indicate a password hacking attack. Performance baselines of essential network and server equipment needs to be documented.This will provide a metric of network utilization under normal operating conditions. Excessive use of resources above equipment baselines might indicate a Dodos attack. Also, establishing a performance baseline will aid in capacity planning and provide data for scalability and growth planning. A honesty with relaxed security should be installed. Its purpose is to draw hackers away from actual University computing assets by providing an easier target. It needs to be completely isolated from all other critical assets. The honesty should also be monitored, as data obtained from attacks can be used to shore up the rest of the network.An Incident Response Plan (RIP) needs to be drafted and provided to all University administrative staff. Potential items in the plan should include Points of Contacts (POCK), and handling procedures if an attack is suspected. In conjunction with the RIP, an Emergency Response Team (RET) comprised of senior network and information security p ersonnel, as well as members of the management team, should formalized. This team will be tasked with the responsibility as first responders to an attack. The RET should also have a Plan of Action (POP) more detailed than the RIP.Items in this Lana should include detailed network documentation, disaster recovery plans, any business continuity plans, ISP support numbers, etc. The combined effect of all of the measures previously described, will significantly lessen the impact of a Dodos attack. By no means is this document complete, and should be considered as a living document. As new threats emerge, additional or even different methods may be required to be put in place. Technology also improves over time, therefore a periodic review of the practices described should be conducted, and this document adjusted accordingly.

Thursday, August 29, 2019

Choosing the Correct Daycare

Tyree’s Child Care 2 John and Sue have been seeking a new child care facility for their eight week old baby, Tyree. Unfortunately, they have been unable to come to a decision between two of the best centers. The high point of Center A is that there are many teachers and they are always speaking to and cuddling the infants. The high point of Center B is not only is it safe and clean like Center A, it is less expensive, as well. However, upon professional evaluation of the two centers, Center A was chosen for baby Tyree.The center meets the state licensing requirements, has a nice atmosphere, is safe, clean and has plenty of amiable staff members. A safe environment and trusted caretakers are factors in building resilience in children (Bukatko, 2008). Resilience is the ability to bounce back from adversity or trauma and most children are highly resilient because they generally feel safe and protected (Bukatko, 2008). The center feels like a safe place for Tyree, with plenty of safe people to cuddle her. Center A was the more expensive of the two because it has tunnels for crawling and extra play areas.Although this was not a factor for Tyree immediately as she is only 8 weeks old and is unable to crawl at this stage in her development, babies grow quickly and those areas will come in handy soon. Important to Tyree’s development, is the interaction with the many child care teachers that the center employs. The teachers enjoy talking to the babies during feeding times and diaper changes. They also are always available to hold and cuddle the babies and do so often. Tyree is in the first stage of Erickson’s stages of psychosocial development called Trust verses Mistrust (Bukatko, 2008).During this stage, a baby must find consistency and reliability in their caretakers so that they can develop a sense of hope and trust (Bukatko, 2008). This is a very important first stage that lasts for the first year. A failure to establish connections during th is stage could lead to trust and abandonment issues in adulthood. Luckily for Tyree, at this center, that will not be an issue. The center has many brightly colored objects and pictures. Bright colored toys and pictures stimulate a baby’s senses and help their brain’s develop.Cognitive development is imperative and Tyree is in the sensorimotor stage (Bukatko, 2008). She is responding to bright objects around her and soon enough, she will be grasping for those objects. The center also has safe, low shelves. This is important because as Tyree develops and her motor skills advance, she will begin to scoot and then crawl. Safety is extremely important when babies get mobile so it is important for shelves that contain toys Tyree will be interested in to be low and sturdy because during the sensorimotor stage she will have hand and eye coordination to grab whatever she wants (Bukatko, 2008).Tyree also could start using that same shelf to pull herself to stand. Finally, as Ty ree’s motor skills develop further, she will become more visually and physically coordinated (Bukatko, 2008). The sorting and stacking toys will challenge Tyree mentally and help her learn new skills. She will begin to interact with her peers and begin to learn what is socially acceptable as she makes friendships and enters Erickson’s second stage (Bukatko, 2008).Tyree’s Child Care 3 Tyree will then continue on her path of continuous development, reaching milestones, stage after stage. Tyree’s Child Care 4 Bukatko, D. (2008). Child and Adolescent Development. A Chronological Approach. Mason, OH: Cengage Learning.

Constitution and Systems of the State Essay Example | Topics and Well Written Essays - 1000 words

Constitution and Systems of the State - Essay Example The main components of the government of Oregon as outlined in its constitution are the legislature whose duty is to make the laws of the state; the judiciary whose role is to make sure that justice is carried out in the state and that it implements the laws, which have been passed by the legislature. Finally, there is the executive headed by the governor who is elected by the people of the state for a term of four years, and who oversees the administration of the state on a day-to-day basis. The constitution further outlines the distribution of powers within the state with all three arms of government being considered to be equal and each serving as a check over the other two (Cama, 2012). The role of each is well defined and one would find very little reason for any branch of the government to infringe on the roles of the other. There are many services provided by the state that are authorized by the state constitution and these services serve as one of the rights of the people of Oregon. The state constitution specifies that the state government shall provide services, which are required by the people of the state, but which they cannot provide for themselves. Some of these services may be basic such as mandatory education for all children in the state, to more complex services such as the state providing legal representation for those people who cannot afford a lawyer in court. The constitution of the state has been put in place to protect the rights and privileges as well as to ensure that all the people within the state are treated equally (Staff, 2008). This is the reason why it specifies that the state shall provide those services that one would otherwise not be able to afford. For example, when a person is in need of legal representation but cannot afford to have a lawyer. The state is under the obli gation to provide a lawyer for the defendant in a case so that his or her trial is carried out justly and without any

Wednesday, August 28, 2019

Construction Law Assignment Example | Topics and Well Written Essays - 2500 words - 2

Construction Law - Assignment Example Construction contract comprises of both revenue and cost. The revenues are the total amount received by the contractor and incentive payment. The revenue can increase or decrease depending on the nature of the contract. Cost escalation clause increase the total contract revenue while penalties imposed on the contractor by the client reduces the total revenue. The contract costs are divided into two: direct cost to the contract and general cost. The client takes care of the total cost. Contractors should use the Contract JCT SBC (Q) 2011 so as comply with the conditions of employees and the housing regulation in United Kingdom. Before beginning any job on the site, the contractor must be aware with the safety and healthy procedures of workers. It is the responsibility of the contractor to provide safe and healthy working to workers at thesite. All the individuals visiting the site should be protected from injuries at thesite. It is advisable that the contractor take an insurance policy for all workers to compensate for damages suffered. Healthy and safety officer is allowed to visit the site to monitor safety and health standards of the workers (Allensworth, 2009). The JCT SBC (Q) 2011 requires that contractors use materials which are less harmful to the health of the individuals. The materials should be free from asbestos, Urea formaldehyde, lead substance, Calcium silicate and mineral fibres substances. A substance like asbestos emits fibres substance that cause s cancer and other diseases to human beings. All substances should be prevented from the premise by using recommended materials in construction. Preston Developments Limited (PDL) and Contractor Build care Construction Limited (Build care) enter into a construction contract on 12th September 2014. The completion period was set to be on 10th June 2015. In accordance to the construction clauses, the contractor should accomplish the construction

Tuesday, August 27, 2019

The Internship in Sitio So Jos Agronegcios Assignment

The Internship in Sitio So Jos Agronegcios - Assignment Example Throughout the internship, I engaged in various activities. The main activities included: Understanding the operations of the factory, identifying possible sources of risks and hazards, and examining how hazards are communicated and handled within the factory. In addition, based on the findings, I proposed several measures that can be used to address the safety issues identified in the factory. By undertaking this internship, I was able to accomplish several learning outcomes. First, this helped me understand how safety standards are applied in a real working environment. Secondly, I gained the necessary experience in working with different people from varying backgrounds. The internship gave me the work experience needed to succeed in the job market. The main challenge was that I found it difficult to communicate with some of the workers at the factory, mainly because most of them were too busy to give me an audience. The internship was undertaken in the above-named factory at the start of June 2014. This is mainly a coffee factory that also deals with the growth and processing of sugarcane. In addition, the factory also engages in the production of feedlot beef. As a result, it is a fairly busy factory in which different activities are performed. As a student in safety management, this factory provided me with the opportunity to study issues related to safety. This factory is purely owned and run by the family. My supervisor was Newton Junqueira Franco who introduced me to the company and briefed me about the activities. He is an experienced individual who has worked at the company for a long time. Being a safety management student, my activities at the factory during the internship period focused on the safety issues around the company. Throughout the internship, attention was given to the safety issues that relate to the various activities carried out at the factory.  Ã‚  

Monday, August 26, 2019

A literature review of brand loyalty from marketing aspect

A of brand loyalty from marketing aspect - Literature review Example Having loyal customers reduces the firm’s marketing cost by approximately thirty percent, according to Rosenberg and Czepiel (1983), mostly because the cost of retaining old consumers is reduced. In addition, brand loyal clients are less price sensitive thus the are willing to pay more for the products as long as they are from their favourite brand, this is a strategy that Apple Inc has used for many years and is still profiting from their loyal consumers who flood to the Apple stores to get new products (Bennett and Thiele 2005). Generally, a sturdy brand name is the number one tool to control the market and to posses a competitive advantage which is essential for any business growth and thus brand loyalty offers a strategic asset that is identified as the leading source of brand equity (Fullerton 2005). This literature review will solemnly study brand loyalty which refers to maintaining old consumers due to their love, trust and faith in the firm’s products. The objectives of this review are to review the dimensions and measures of brand loyalty, the causes of brand loyalty decline, the root of decline in brand loyalty, the remedies and analyze both the merits and demerits of brand loyalty by bringing together thoughts and experiences from a variety of literature and pragmatic studies conducted in the area of brand loyalty. Brand loyalty can be defined either conceptually (abstract descriptions) or operationally (measurement methods). Based on research journals and several literatures worldwide, Jacoby and Chestnut (1978), presented the most elaborate conceptual definition of brand loyalty since it covers the most significant features of brand loyalty. â€Å"The biased, behavioural response expressed over time by some decision making unit with respect to one or more alternative brands out of a set of such brands and is a function of psychological

Sunday, August 25, 2019

Unilever Company Essay Example | Topics and Well Written Essays - 2500 words

Unilever Company - Essay Example The current nonexecutive director of the dual companies is Michael Treschow while the chief executive of the company is Paul Polman. The company has a sizeable slice in London stock exchange and has a rank of the eighteenth position in the stock exchange as at the close of 2011 (Murphy 2009). Back ground information Unilever Company began its operations at the start of 1930. The pioneers include Samuel Bergh, Antonius Johannes Jurgen and William Lever. This was through the amalgamation of two businesses, where the British soap makers who were the Level brothers came together with the Dutch margarine producer who was Margarine Unie in 1927. The amalgamation of the two companies was strategic in terms of the commercial benefit it would provide. This is basing on the fact that, for the production of margarine and soaps, there would be a requirement of palm oil thus the importation of palm oil, which was a key raw material, would be fast and in large quantities. This would help reduce th e number of times the product would require transportation as well as reduce the custom taxes due to importation. The palm oil in use by the companies was from Belgian Congo, where they had procurement of seven fifty thousand hectares of the forest land from where there was the extraction of palm oil. This was by labourers whose working conditions were poor as well as the labourers getting low pay. At the beginning of 1930, the Unilever business empire went global opening branches in Latin America and Africa where the initial business had taken root. During the year, there was acquiring of restraints so as to increase the company’s operations, soon after acquiring the shares, there was the sale of shares by the management so as to make an expansion in the operations of the business. By then the company was making edible fats and soaps leading to much income by the business. The purchasing of the Chesebrough-pond’s company, there was strengthening of Unilever Company. T he expansion of the Company was due to purchasing of Calvin Klein Company that was in the making of Cosmetics as well as the Farbege and Elizabeth Arden companies. The expansion has led to making of a headquarters for all its operation worldwide which is in London. The name rises up fully in the 1990s, and getting a complete charter and becoming the Unilever Company (Wilson 2009). Issues in staffing and training and development The company has the right staffing solution. To get a preview on this, there is consideration of the various issues that the company has put into place including; compliance where the employees sign contracts that show there compliance in working towards a common goal for the well being of the business. Compliance is essential for the development of the organisation in that the employees know what the management requires thus works hard to comply with the standards of the company set by the management. Another issue is retention where the company retains the working conditions of the company, by ensuring that the employees work in an able environment thus they do not have to move to other fields. Retention of their initial name and logo has come ensures that the company

Saturday, August 24, 2019

Critical assessment of the contention that todays globalised business Essay

Critical assessment of the contention that todays globalised business environment is mainly about the production of flows, and needs to take little account of territories - Essay Example Flows are a significant part of the current globalization process because they allow for cultures and economies of different countries to be integrated to one another. This leads to the creation of a common style of doing things and a step towards the development of a common global culture (Wolf 2004). A territory refers to a defined area of water and land mass, and air owned by a country, state, organization or a person. People have often hold the view that globalization has caused the dissolving of all boundaries and borders and that cultural influences, people and money can flow freely all round the globe. According to such a view, the globalised business environment is basically about the creation of needs and flows that take little consideration of territories. However, there are instances in which we find that the flows of goods, technologies or services are subject to territory border restrictions (Bhagwati 2004). ICT has played a significant role in globalization because it has changed the environment in which services and goods are created and distributed. Currently, people move across international boundaries for purposes of business, studies, searching for better economic opportunities and tourism. This in turn has led to transfer of technologies, trade patterns and factor endowments across the world. (Freeman 2006). Even with the potential advantages of globalisation, there are still policies that control or restrict the free movement of workers into advanced labour markets. Some territories continue to be a significant part of today’s globalization to a great extends for example the San Diego-Tijuana. Tijuana-San Diego lies on the border between, San Diego and Tijuana, two large coastal cities in North America. The international metropolitan area is located at the junction of major state routes, interstates and federal highways. It is positioned at the terminus of 10 major federal highways and interstates. Stiglitz(2006) explains that such a strategic position is important for globalization because it serves as a point which people or states meet and integrate. It facilitates easy flow and exchange of ideas, goods, capital, technology and people. San Diego is a significant area of culture finance, and economies in California while Tijuana is a significant regional business center in northwestern Mexico. Globalization has enabled the region to remain as a dominant commercial center in the US. According to Noah Timothy (2010), San Diego experiences the most active land-crossing in the world as people cross for business and tourist purposes. Globalisation has allowed san Diego-Tijuana to grow to a powerful economic region in the California. As much as globalization has increased the flow of goods or people across borders, there are still some policies and trade regulations in some countries that restrict the importation of certain goods (Bhagwati 2004). For exa mple the importation of certain merchandise are restricted or totally prohibited in Portugal to protect its economy and security while some are subject to restrain under import quota (US. Department of Commerce 2010).This means that globalization does not have the power to disregard territories. The current flow of goods people, finance and cultural ideas around has bound up territories through the creation of a global competitive environment that

Friday, August 23, 2019

What is HIPAA 5010 How will it impact healthcare informatics How will Coursework

What is HIPAA 5010 How will it impact healthcare informatics How will ICD-10 codes impact informatics - Coursework Example The new version of the standards is expected to create a major impact on the functioning of the healthcare industry as it has been designed to enhance the electronic exchange of information related to eligibility, claim submission and their status, electronic remittance, authorization for treatment and referrals. The 5010 standards are to be implemented by software vendors and clearinghouses on January 1, 2012 (American Academy of Dermatology, 2010; Emdeon Business Services, 2010). The implementation of the 5010 set of standards will be followed by the implementation of a new set of International Classification of Diseases-10 (ICD-10) Clinical Modification codes that replaces the current ICD-9 CM codes. The ICD-10 which consists of more than 68,000 codes with increased specificity and includes details required for classification of morbidity and diagnostic specificity is required to be implemented from October 1, 2013. The additional codes will help reveal more information related to healthcare and hence the complications and outcomes of care can be ascertained easily and issues can be resolved through better design of algorithms (American Academy of Dermatology, 2010). Thus implementation of both 5010 and ICD-10 standards will help in the delivery of safer and quality healthcare to the

Thursday, August 22, 2019

Profession of Arms Essay Example for Free

Profession of Arms Essay Characterizing the Army as a profession is a widely debated issue. Some attest that the military employs a small cadre of professionals, yet this does not qualify the entire vocation as a profession. Others are not so kind and paint a picture of mindless robots simply following orders. The debate rages because it is fundamentally difficult to find an absolute definition for a profession. This troublesome task is further exasperated because the trust of the public ultimately certifies a profession. Nevertheless, the principle characteristic that remains constant to all professions is that they possess a guiding ethic that controls the effective application of their expertise. 1 The Army constitutes a profession because it possesses an ethical framework that is intrinsically present within the institution. As it relates to a professional ethic, all professions possess a code that governs the moral, ethical and legal activities of their members. For example, The American Medical Associations Code of Medical Ethics holds to the Oath of Hippocrates.2 This oath is Western civilization’s expression of the ideal conduct of a physician.3 Lawyers also take an oath of office that anchors them to the ethical practice of their craft. This code of ethics provides parameters for lawyers on how they should conduct their affairs and matters ranging from client confidentiality to conflict of interest.4 Similarly, all members of the United States Army swear or affirm an oath upon initial entry. The Oath of Enlistment or the Oath of Office marks the beginning of each Soldier’s military service and their commitment to a higher ethic. This oath is the bedrock of the Soldier’s moral and legal principles. The Army Values, the Soldier’s Creed and the Warrior Ethos exemplify the pinnacle of the Army’s organizational ethic. Some might argue that many organizations have a similar ethic, yet they are not a professio n. Why are athletic teams that incorporate and enforce team rules, not considered professions? Another issue concerning the Army professions ethical barometer stems from comments made by senior Army officials like General Maxwell Taylor, the fifth Chairman of the Joint Chiefs of Staff. According to him, as long as a man performed his duty he  was fine. â€Å"For [GEN] Taylor, a good [S]oldier, even a good [O]fficer, could be a bad man.†5 What these dissentions fail to consider is that the Army, or any profession, does not singularly apply its ethic to the daily living of its members. Concerning the members of an athletic organization, it must be understood that one does not ethically hit, pass or throw a ball. Athletes do not apply ethical guidelines in the performances of their sports. Conversely, GEN Taylor fails to realize how private character affects the ability to command troops. One cannot compartmentalize the ethic of professionals into private and public sectors. Professionals apply their ethic to the application of their craft on behalf of the society they s erve. 6 Soldiers, like all members within a profession, must exercise their ethic in the execution of their work, not just in their private lives. Although, a universal criterion to qualify a particular vocation as a profession is difficult to quantify, the possession of a guiding ethic is common to all professional definitions. The Army is a profession because throughout its ranks it has continued to operate within the ethical framework it has set forth for itself. The Army, as a profession, demonstrates not only that it possesses ethical cannon, but is committed to operating by it. The Army Values, the Soldier’s Creed and the Warrior Ethos are the natural outpouring of these ethical cannon. Regardless of these facts, it remains unique to a profession that they cannot simply declare themselves a profession.7 The public reserves the right to determine so. Americans will only continue to regard the Army as a profession based on our effective and ethical application of landpower.8 Des pite many ethical failings, the American people recognize that the Army possesses the courage to hold its members ethically accountable and therefore legitimize itself as a profession of arms. Bibliography Pbs.org,. NOVA | The Hippocratic Oath Today. Last modified 2014. Accessed September 12, 2014. http://www.pbs.org/wgbh/nova/body/hippocratic-oath-today.html. Robinson, Paul. Ethics Training And Development In The Military. Ebook. 1st ed., 2007. Accessed September 11, 2014. http://strategicstudiesinstitute.army.mil/pubs/parameters/Articles/07spring/robinson.pdf. Training and Doctrine Command, â€Å"An Army White Paper: The Profession of Arms,† 8 December 2010, 2. http://www.benning.army.mil/armor/content/PDF/Profession%20of%20Arms%20White%20Paper%208%20Dec%2010.pdf U.S. Department of the Army. The Army Profession. Army Doctrine and Training Publications 1. Washington, DC: U.S. Department of the Army, June 13, 2013. Accessed September 11, 2014. http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/adrp1.pdf. YourDictionary.com,. Code Of Ethics Examples. Last modified 2014. Accessed September 11, 2014. http://examples.yourdictionary.com/code-of-ethics-examples.html.

Appeal Letter Essay Example for Free

Appeal Letter Essay Id be happy to give you some suggestions if youll take them. I was an English major in college and I currently work as a copywriter for a company, so hopefully I can give you a few tips to make your letter more formal. How about this: Dear Office of Student Financial Aid, My name is *your name* and I am writing to ask you to appeal my suspension of federal aid. The fall and summer semesters were a very stressful and overwhelming time in my life because I was not only returning to school after being out of it for ten years, but I was also taking care of my seven children, sharing one car between my husband and myself, and also working a full-time job. It was very difficult for me to concentrate and do well in my classes when I had to put my family ahead of myself. I do realize that I neglected my studies and I would like another chance to do better in them. I have compiled a list of steps I need to take in order to be successful in school: 1. I will resign from my full-time job in order to give my full attention to school. 2. I will obtain a tutor for my most difficult classes by becoming familiar with the tutoring center on campus. 3. I will talk to each of my instructors personally to find out how I can do well in their classes. 4. I will manage my time wisely so that I can balance my family and studies together. 5. I will attend all of my classes to take advantage of what they have to offer. My goal is to earn a degree in education so that I can make a difference in the lives of young students. This is very important to me because I want to make sure that they dont make the same mistakes that I did. But I can only do this if I can apply for financial aid. I am a hard-working student and a dedicated mother, and I would like the chance to prove to you that my next semester will not be a disappointment. I will try my hardest to be good role model to my family and other students.

Wednesday, August 21, 2019

Project Development Approach And Justification

Project Development Approach And Justification To solve actual problems in an industry setting, software engineer or a team of engineers must incorporate a development strategy that encompasses the process, methods and tools layers and generic phases. This strategy is often referred to as process model or a software engineering paradigm or project development approach. A process model for software engineering is chosen based on the nature of the project and application, the methods and tools to be used, and the controls and deliverables that are required. Our software is based on Rapid Application Development (RAD) Model. This software development approach is as described as below. Rapid Application Development Model RAD model is an incremental software development process model that emphasizes an extremely short development cycle. If requirements are well understood and project scope is constrained, the RAD process enables a development team to create a fully functional system within short time periods (60-90 days). RAD approach encompasses the following phases: Business Modeling: The flow of information among business functions is modeled in such a way that answers following questions: What Information drives the business? What Information generated? Who generates it? Where does Information go? Who Process it? Data Modeling: The flow defined as part of business modeling phase is refined into a set of data object that are needed to support the business. Data Modeling answers a set of specific questions that are relevant to any data processing application. It enables software engineer to identify data objects and their relationship using a graphical notation. C:Documents and SettingshiralsMy DocumentsMy Picturesuntitled.bmp Figure 2. RAD Model (Rapid Application Development Model) Process Modeling: The data objects defined in the data modeling phase are transformed to achieve the information flow necessary to implement a business function processing description s are created for adding, modifying, deleting or retrieving a data object. Application generation: RAD process works to reuse existing program components or create reusable components. Testing and turnover: The RAD process emphasizes reuse; many of the program components have already been tested. This reduces overall testing time. However, new components must be tested and all interfaces must be fully exercised. Advantages of RAD Model: Emphasizes an extremely short development cycle Fully functional system within very short time periods Drawbacks of RAD Model: Like all process models RAD approach has drawbacks: For large but scalable projects, RAD requires human resources to create the right number of RAD teams. RAD requires developers and customers who are committed to the rapid-fire activities necessary to get a system complete in a much-abbreviated time frame. If commitment is lacking from either constituency, RAD projects will fail. Not all type of applications are appropriate for RAD. If system cannot be properly modularized, building the components necessary for RAD will be problematic. RAD is not appropriate when technical risks are high. Weeks Months Week l Week 2 Week 3 Week 4 1st Month 1)Orientation program 2)Introduction session 3)Overview of training training Program 4)Introduction to system setup 5)ISO introduction 6)Study of ACTL intranet sites 1) Seminar on ACTL coding standards 2) Database standards and practices. 3) Implementation of demo project named Inventory Management System 1) Testing of demo project named Inventory Management System 2) Lecture on quality assurance 3) Lecture on SDLC 4) Introduction to CRS 1) Study Project definition and requirement analysis of proposed system 2) Data flow analysis of proposed system 3) Decided the software process model for the proposed System. 4) Prepare required diagrams. 2nd Month 1)Learn how JQuery works 2)Study about CRS Restaurant modules 3)Database design 1) Study about amenities module 2) Implement amenities module 3)Testing of created module 1) Study about policy module 2) Implement policy module 3)Testing of created module 1) Study about promotion module 2) Implement promotion module 3)Testing of created module 3rd Month 1) Study about Servings module 2) Implement Servings module 3)Testing of created module 1) Study about Cuisine, Hall, Price List module 2) Implement module 3)Testing of created module 1) Study about booking , Cancelation , Stop Sales module 2) Implement of it 3)Testing of created module 1) Study of Event, Loyalty, User module 2) Implement Events, Loyalty module 3)Testing of created module 4rd Month 1) compliance, Roles , Themes module 2) Implement module 1)Testing created module Report Development 2)Integration of all modules 1) Integration testing 2) Add facility of multi lingual facility 1) Test system on different browsers. 2) Solve Issues. Figure 2.2 Project Planning Milestones: Every task or group of tasks should be associated with project milestone. A milestone is accomplished when one or more work products has been reviewed for quality and has been approved. Project Milestones include completion of some defines tasks in defined time limits. The milestones associated with this project are shown below: Study of ACTL Framework JQuery First milestone includes study of ACTL framework, SDLC, study of JQuery documents. JQuery documents includes JQGrid, JQuery Wizard, JQuery Validation, Menu, JQuery Date picker, etc., Database coding standards, query optimization, etc Project planning Scheduling Second milestone includes analysis of project and designing. Then we have started coding to develop first prototype which includes Servings Halls. Cuisine Items setup also includes setup of Items and based on selection of Cuisine, Finally all these modules are debugged and tested. Development of various modules Third milestone includes developing price list module, stop sell module, search booking module. Item Price List module includes setup of rates for different items hall wise. Booking search includes guest searching. Also these modules are debugged and tested. Development continued Fourth milestone includes developing reports module, business setup module, compliance module, etc. These all modules are again tested and reviewed. Testing and Documentation Fifth milestone includes the integration testing and documentation. Deliverables: Every task that is scheduled should have a defined outcome. For software projects, the outcome is normally a work product (e.g., the design of a module) or a part of a work product. Work products are often combined in deliverables. They are delivered at end of some major phase such as specification, design etc. Deliverables for this project are shown below: Project Specification It includes the requirement analysis and specification of each module to be developed. It includes description of each module containing what that module does, how it interacts with another module, what is input to that module and the outputs from that module. Project Design It includes structural design for each module. Design is used for better understanding of each modules functionality and interface. Designing consists of many diagrams which help us to view a system as a whole. Developed Product It is the working product or prototype delivered to customer. Documentation It includes some facilities to help the customer while using this project. Roles: After careful review of requirements, this project requires following different modes for interaction: programming mode, test mode, monitoring mode, and troubleshooting mode. Therefore, roles can be defined as programmer, tester, monitor, and troubleshooter. Here we are three peoples in our team. We all play these four roles as per requirements of project and as per our scheduling. Project Managers role is to review the project and suggest the improvements to be done. Responsibilities: Every task that is scheduled is assigned to a specific team member. Each members responsibility is to develop the assigned module, test it and troubleshooting for that module. Resources: The first step in building the project schedule is to identify the resources required to perform each of the tasks required to complete the project. A resource is any person, item, tool, or service that is needed by the project that is either scarce or has limited availability. The project could include computer resources (like shared computer room, mainframe, or server time), locations (training rooms, temporary office space), services (like time from contractors, trainers, or a support team), and special equipment that will be temporarily acquired for the project. One or more resources must be allocated to each task. To do this, the project manager must first assign the task to people who will perform it. For each task, the project manager must identify one or more people on the resource list capable of doing that task and assign it to them. Once a task is assigned, the team member who is performing it is not available for other tasks until the assigned task is completed. While some tasks can be assigned to any team member, most can be performed only by certain people. If those people are not available, the task must wait. In our team each and every member is assigned specific modules. Resources required by these modules are also allocated to him/her only. Dependencies: Once resources are allocated, the next step is to identify dependencies between tasks. A task has a dependency if it involves an activity, resource, or work product that is subsequently required by another task. Dependencies come in many forms: a test plan cant be executed until a build of the software is delivered; code might depend on classes or modules built in earlier stages; a user interface cant be built until the design is reviewed. It is the project managers responsibility to work with everyone on the engineering team to identify these dependencies. The project manager should start by taking the each module and adding dependency information to it: each task in the selected module is given a number, and the number of any task that it is dependent on should be listed next to it as a predecessor. Figure 2.3 shows the four ways in which one task can be dependent on another. Figure 2.3: Dependency among Modules We have also identified dependencies among the modules and sub modules in our project. Then we have divided our work as per dependencies. Schedule Representation Software project scheduling is an activity that distributes estimated efforts across the planned duration by allocating the effort to specific software engineering tasks. Time Line Chart (Weekly) 1st February To 29th February Week 1 Week 2 Week 3 Week 4 Work Task Introduction to CRS Study Project Definition Analysis Analysis of Amenities Module Analysis of Policy Module Milestone Implementation of Amenities Policy Module Figure 2.4: Project Schedule Representation Work Task Week 4 Week 3 Week 2 Week 11st March To 29th March Testing of developed modules Servings, Cuisine, Halls Implementation of price list, Bookings, stop sell, Testing of developed modules Loyalty, Events Analysis of multilingual Milestone Implementation of Search booking Stop sell Module Work Task Week 4 Week 3 Week 2 Week 11st April To 26th April Testing of developed modules Analysis of Compliance Module Implementation Testing of Compliance Module Integration Testing Solve Issues Creating Themes Multi lingual Milestone Implementation of CRS RISK MANAGEMENT It is the process of measuring or assessing risk and then developing strategies to manage the risk. In general, the strategies employed include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes (e.g. natural disasters or fires, accidents, death, and lawsuits). Financial risk management, on the other hand, focuses on risks that can be managed using traded financial instruments. Project Risks are risks, which affect the project schedule or resources. Product Risks are risks, which affect quality or performance of the software being developed. Business Risks are risks which affect the organization developing or procuring the software. In ideal risk management, a prioritization process is followed whereby the risks with the greatest loss and the greatest probability of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled later. In practice this process can be very difficult, and balancing between risks with a high probability of occurrence but lower loss vs. a risk with high loss but lower probability of occurrence can often be mishandled. Risk Identification Risk identification is a systematic attempt to specify threats to the project plan (estimates, schedule, resource loading, etc.) By identifying known and predictable risks, the project manager takes a first step towards avoiding them when possible and controlling them when necessary. There are two distinct types of risks Generic risks and Product-specific risks. Generic risks are a potential threat to the project and Product-specific risks are those that can be identified by only those with clear understanding of the technology, the people and the environment that is specific to that project. Possible risks involved in developing Central Reservation System are technical risks and project risks. First risk Central Reservation System is totally dependent on ACTL Framework. Second risk is that our system needs to be integrated to booking engine via Dxchange middleware that uses XML format data as communication standard . Third risk is associated with authorization; if in the software the anonymous or wrong user is authorized or assign role by mistake then he may do changes that cause the system in dangerous mode. We are planning to give multilingual co-branding system. The risk is associated with time period, the degree of uncertainty that project schedule will be meet, maintained and that the product will be on time. Project Risk includes personnel (staffing and organization) risk and schedule risk. Currently our team size is 3. We can follow our schedule as per planning. If team size gets reduced then schedule and planning must be changed. Risk Analysis Risk analysis = Risk Assessment + Risk Management + Risk Communication. Risk Assessment:- It involves identifying sources of potential harm, assessing the likelihood that harm will occur and the consequences if harm does occur. Risk Management:- It evaluates which risks identified in the risk assessment process require management and selects and implements the plans or actions that are required to ensure that those risks are controlled. Risk Communication:- It involves an interactive dialogue between stakeholders and risk assessors and risk managers which actively informs the other processes. There are two points to keep in mind when analyzing risk: Where is the risk? How significant is the risk? By analyzing the identified risks we have the following conclusion. The probability that algorithm risk becomes reality is very high. We have to study and implement JQuery components. So there is possibility that some of the components cannot fit into current structure. Without these components our current system can run efficiently but either we have to change our desired component. Risk Planning Once risks have been identified and assessed, all techniques to manage the risk fall into one or more of these four major categories: Risk Avoidance It includes not performing an activity that could carry risk. An example would be not buying a property or business in order to not take on the liability that comes with it. Avoidance may seem the answer to all risks, but avoiding risks also means losing out on the potential gain that accepting the risk may have allowed. To avoid the risk also avoids the possibility of earning profits. Risk Reduction It involves methods that reduce the severity of the loss. Modern software development methodologies reduce risk by developing and delivering software incrementally. Early methodologies suffered from the fact that they only delivered software in the final phase of development; any problems encountered in earlier phases meant costly rework and often jeopardized the whole project. By developing in iterations, software projects can limit effort wasted to a single iteration. A current trend in software development, spearheaded by the Extreme Programming community, is to reduce the size of iterations to the smallest size possible, sometimes as little as one week is allocated to an iteration. Risk Retention It involves accepting the loss when it occurs. Risk retention is a viable strategy for small risks where the cost of insuring against the risk would be greater over time than the total losses sustained. All risks that are not avoided or transferred are retained by default. This includes risks that are so large or catastrophic that they either cannot be insured against or the premiums would be infeasible. This may also be acceptable if the chance of a very large loss is small or if the cost to insure for greater coverage amounts is so great it would hinder the goals of the organization too much. Risk transfer It means causing another party to accept the risk, typically by contract or by hedging. Insurance is one type of risk transfer that uses contracts. Other times it may involve contract language that transfers a risk to another party without the payment of an insurance premium. Liability among construction or other contractors is very often transferred this way. On the other hand, taking offsetting positions in derivatives is typically how firms use hedging to financially manage risk. Some ways of managing risk fall into multiple categories. Risk retention pools are technically retaining the risk for the group, but spreading it over the whole group involves transfer among individual members of the group. This is different from traditional insurance, in that no premium is exchanged between members of the group up front, but instead losses are assessed to all members of the group. The planning by which the identified risks for this project are handled is described as following: We have planned to build sample application in ACTL Framework so all team members can be familiar with framework. We planned to use OTA standard to communicate with booking engine. We have also planned to use compliance driven system so even if a user is assigned a role accidently then also users changes need to be approved by super administrator. ESTIMATION Effective software project estimation is one of the most challenging and important activities in software development. Estimation is one of the cornerstones of effective project planning: effective project planning and control is not possible without a sound and reliable estimate. Under-estimating a project leads to under-staffing it (which often results in staff burnout), under-scoping the quality assurance effort (running the risk of low quality deliverables), and setting too short a schedule (resulting in loss of credibility as deadlines are missed). This negatively impacts staff productivity, product quality, customer relationships and overall credibility. Conversely, overestimating a project can be just as detrimental. Since most projects expand to fit their estimated schedule, allocating appropriate resources to future projects can quickly become an issue, creating scheduling bottle necks and planning difficulties. Good software estimation and planning goes beyond tools, techniques and processes. Its also about the right attitude, understanding and mutual expectations not just from the software developers but also from senior management. When we understand together what can be done, what has been done, and what is being put before us, we can successfully plan projects to make them more predictable. A sound estimate starts with dividing project in some phases. Each phase is that, if completed, will produce the final product. There are many ways to decompose a project into tasks. The project can be broken down by feature, by project phase (requirements tasks, design tasks, programming tasks, etc.), or by some combination of the two. Now the team must create an estimate of the effort required to perform each task. The most accurate estimates are those that rely on prior experience. Team members should review previous project results and find how long similar tasks in previous projects took to complete. Sources of delays in the past should be taken into account when making current estimates. No estimate is guaranteed to be accurate. People get sick or leave the organization; teams run into unforeseen technical problems; the needs of the organization change. The unexpected will almost certainly happen. Therefore, the goal of estimation is not to predict the future. Instead, it is to gauge an honest, well-informed opinion of the effort required to do a task from those people in the organization who have the most applicable training and knowledge. Effort Estimation Software costs and effort estimation will never be an exact science. Too many variables human, technical, environmental, political can affect the ultimate cost of software and effort applied to develop it. However, software project estimation can be transformed from a black art to a series of systematic steps that provide estimates with acceptable risks. To achieve reliable cost and effort estimates, a number of options arise: Delay estimation until late in the project Base estimates on similar projects that have already been completed. Use relatively simple decomposition techniques to generate project cost and effort estimates. Use on or more empirical models for software cost and effort estimation. We are adapting following criteria to estimate the effort. Step 1: We are computing the count total which will be used to define the complexity of a project. You will do that by completing the Figure 2.5. Top of Form Measurement Parameter Count Simple Average Complex Total Number of user inputs X 3 4 6 = Number of user outputs X 4 5 7 = Number of user inquiries X 3 4 6 = Number of files X 7 10 15 = Number of external interfaces X 5 7 10 = Count Total Figure 2.5: Table to compute Count Total Step 2: We are finding the complexity adjustment values based on responses to the questions shown in Figure 2.6. Question 0 1 2 3 4 5 1. Does the system require reliable backup and recovery? 2. Are data communications required? 3. Are there distributed processing functions? 4. Is performance critical? 5. Will the system run in an existing, heavily utilized operational environment? 6. Does the system require on-line data entry? 7. Does the on-line data entry require the input transaction? 8. Are the master file updated on-line? 9. Are the inputs, outputs, files, or inquiries complex? 10. Is the internal processing complex? 11. In the code designed to be reusable? 12. Are conversion and installation included in the design? 13. Is the system designed for multiple installations in different organizations? 14. Is the application designed to facilitate change and ease of use by the user? Total fi Complexity Weighting Factors (0 = No influence, 1 = Incidental, 2 = Moderate, 3 = Average, 4 = Significant, 5 = Essential): Figure 2.6: Table to compute Complexity Adjustment Values The Function Points is: (FP=Count Total + {0.65+0.01*(Efi)}) Step 3: We are finding LOC (Lines of Code), and we do this by choosing a programming language that we will use when developing a project. Figure 2.7 shows LOC/FP for different programming languages. Programming Language LOC/FP (average) Select Assembly Language 320 C 128 COBOL 105 Fortran 105 Pascal 90 Ada 70 Object-Oriented Languages 30 Fourth Generation Languages (4GLs) 20 Code Generators 15 Spreadsheets 6 Graphical Languages (icons) 4 Figure 2.7: LOC/FP Values for Different Programming Languages So LOC/FP for our project is Step 4: Final Step is to select complexity of the software project. Figure 2.8 is used to calculate effort and duration of the project. Software Project ab bb cb db Select Organic 2.4 1.05 2.5 0.38 Semi-detached 3.0 1.12 2.5 0.35 Embedded 3.6 1.20 2.5 0.32 Figure 2.8: Table to compute Effort and Duration From Figure 2.8 calculated effort and duration are: Effort (E) = ab(KLOC)bb = Duration (D) = cb(E)db = Cost Analysis: A cost-benefit analysis is necessary to determine economic feasibility. The primary objective of the cost-benefit analysis is to find out whether it is economically worthwhile to invest in the project. If the return on the investments is good, then the project is considered economically worthwhile. Cost-benefit analysis is performed by first listing all the costs associated with the project. Costs consist of direct costs and indirect costs. Benefits can be broadly classified as tangible benefit and intangible benefits. Tangible benefits are directly measurable and intangible are not. The sum of all costs is compared with the sum of all the savings (tangible and intangible). It is not always easy to assign money value to intangible benefits. It is arrived at by discussion amongst users of the system. Figure 2.9 shows general cost associated with project. Procurement Cost Installation cost for installing supporting software like Microsoft Office, Microsoft Visual Studio etc. The company already has the license for this software. Project Related Cost Cost of Data Collection for System Analysis. Cost of preparing Documentation. Cost of Development Management. Cost of Organization Resources. Ongoing Cost System Maintenance cost. Depreciation cost. Figure 2.9: Cost Representation Estimation of Cost is not provided to us as it is against the policy of Avani Cimcon Technologies Ltd. and due to some security reason.

Tuesday, August 20, 2019

Attitude Toward Warfare in Beowulf :: Anglo Saxon English Literature Essays

Attitude Toward Warfare in Beowulf Many historians and authors, such as Tacitus, described Anglo-Saxon England as a region dominated by warlike, belligerent tribes of Germanic descent. These people constantly fought for territories and treasures, which they possessed or wished to acquire. It was the duty of a king or a lord to acquire jewels and armor for his people and that was how he kept his kinsmen loyal to him. In the legendary epic poem, Beowulf, these traits of Anglo-Saxon culture are clearly defined. The character of Beowulf is a true representative of Anglo-Saxon culture. First, Beowulf performs his duties as a kinsman to his uncle, Hygelac, with loyalty and dedication. Further, a reader witnesses Beowulf acting as a lord to his people, acquiring land and treasures for them. Moreover, the attitude of unknown narrator of the poem reflects his support and approval of the culture described in Beowulf. The epic, Beowulf, begins with the funeral of Shield Sheafson, the originator of the Danish people. Shield Sheafson is described as a "scourge of many tribes, a wrecker of mead-benches, rampaging among foes" (lines 4-5). Obviously, this ring-giver has led an aggressive and violent life. He has terrorized his neighbors and rival tribes, destroyed their mead-halls or gathering places, and in addition, made them pay tribute. Therefore, while the king was alive, his tribe was protected from enemies, fed, clothed and enjoyed the treasures which their lord acquired for them. The author of the epic shows his approval of this culture and its attributes by saying that Shield Sheafson "was one good king" (line 10). Kinship was one of the main aspects of Anglo-Saxon England - a lord led his men in fyrd (journey or expedition) against enemies, acquired treasures for them and protected his tribe and in return for all that, his kinsmen were loyal to him and followed their lord in battles. People w ere not identified on a demographic basis, but by their belonging to a particular king or a ring-giver. Furthermore, the idea of kinship is demonstrated in other parts of the epic. When Beowulf is described preparing to fight the dragon, his last battle, Wiglaf follows Beowulf, his lord, into the fray. Wiglaf remains by Beowulf's side until the hero's death, although the rest of Beowulf's warriors disappear with the first sight of the dragon. Wiglaf demonstrates his loyalty not to his country or to his tribe, but particularly to his lord, Beowulf:

Monday, August 19, 2019

Essay on Voltaire’s Candide: Use of Language -- Candide essays

Use of Language in Candide      Ã‚  Ã‚   A great philosopher Liebnitz once said that this is the best possible of all worlds. Voltaire disagrees. In Voltaire's Candide, the impartial narrator travels to distant lands and experiences a range of extremes. After having spent a great deal of time away from his homeland, and having seen more than most people see in a lifetime, the narrator is forced to conclude that this may not be the best possible world because of the reality of evil. Voltaire relates this point very effectively through his mastery of language and the choices he makes, both gramatically and content-related.    In one particular passage, Voltaire uses explicit diction, exaggerated details and manipulated syntax in order to contrast the optimist's romantic view of battle with the horrible reality that is war. Voltaire's grossly exaggerated details give a somewhat comical description of an otherwise horrible event.   "The cannons battered down about six thousand men", and then "the musket-fire removed...about nine or ten thousand" and finally, the bayonet kil... ...g his lifetime, Voltaire awakened people through his writing.   He masterfully chose his diction and details to show the contrast between the ridiculous ideas of the optimist and the truth that only the realist could see.   His choice of syntax leaves the reader with unforgettable images of war that will have a lasting effect.   Through his clever satire, Voltaire urges the reader to be more practical rather than happily ignorant.    Work Cited: Voltaire.   Candide.   Trans. Bair, Lowell.   New York: Bantam Books, 1988.

Sunday, August 18, 2019

America and Haiti Essay example -- American History

America and Haiti The United States interest in Haiti, as mentioned above, began a huge increase in the first decade of the twentieth century. The extent of U. S. economic penetration was not as great as that of France and Germany, but by 1910 it controlled sixty percent of Haiti’s import industry. Unfortunately, the Haitian banking system did not follow this path and was, at this time, "perilously close to domination by European interests." (Langley, 1982, 70) In an effort to gain more control over Haitian economic affairs, the United States engaged in a battle with France and Germany over the Banque Nationale. Two banks from the U. S. attempted to obtain control of the bank but lost out to a German bank, which proceeded to ally itself with the Banque’s French managers in an effort to acquire domination. But the United States protested the exclusion of American banks so forcefully that the French and Germans folded and agreed to let the two American banks have a fifty percent share in t he Banque Nationale. With a foot in the door, the Americans essentially took control of the Banque’s management. In doing so they gained much influence over the Haitian government executives, who relied on the Banque to cover monthly expenses. This would prove to be a huge asset in terms of fulfilling American interests in Haiti in the future. The administration under William Taft that was in power in the United States at this time saw Haiti experience almost continuous insurrection and political disorders. American warships were constantly present in the region, and by 1911 there were never less than five patrolling the Haitian waters at any given time. Things became so unstable in August that the Naval Command in Haiti was granted the power to ... ...ars: An Inner History of the American Empire, 1900-1934; The University Press of Kentucky (Lexington, 1983). Langley, Lester D. The United States and the Caribbean in the Twentieth Century; The University of Georgia Press (Athens, 1982). Shannon, Magdaline W. Jean Price-Mars, the Haitian Elite and the American Occupation, 1915-1935; St. Martin’s Press, Inc. (New York, NY, 1996). http://www.arlingtoncemetery.com/awcatlin.htm Marine officer who participated in almost all the major US military interventions in the Caribbean, from the Spanish-American War to the occupation of Haiti!! http://www-cgsc.army.mil/csi/pubs/intrvene.htm Great bibliography for sources detailing U.S. inteventionism in the early twentieth century. http://aristotle.schreiner.edu/worldpac/eng/r000010/r009697.htm Book detailing U.S. intervention in Haiti. http://www.medalia.net/Hhistory.html

Saturday, August 17, 2019

How does Steinbeck use setting in his novellas Essay

Steinbeck uses the beginning of each chapter to paint the image of the room or location in which the chapter takes part. The main locations are the place near the pool, the bunkhouse, the dream farm, Crooks’ room, and the barn. Steinbeck picks items or feature of each place to help evoke the atmosphere of the place and to symbolise the greater ideas of the story. The idealised setting near the pool is where people start waiting to begin working towards the American dream, hoping to live an idealised existence; it acts as a canvas for their dreams to be painted upon. However, Crooks’ room and the bunkhouse represents the difficulty to reach the ‘American dream’. The barn is somewhere to reminisce about the struggle on the path to the idealised world. Then the last chapter of the novella returns to the place near the pool, this is when they know they have failed. That this is reality and it is clear it is just a dream. This cyclical structure shows the contra st about dream and reality. As mentioned the first chapter of the novella is set in the place near the pool. The setting resembles paradise. Somewhere you can be at peace. This fools Lennie into believing that he is safe when he is not. The picturesque setting makes people believe that dreams are attainable. There is great peace and tranquillity, as indicated by the fact that ‘deer come to drink in the dark.’ There is no one that can endanger their lives, the dears are not afraid of the predators, just as Lennie is not. But the danger that lurks underneath. This is illustrated in the killing of the snake by the heron ’a silent head and beak lanced down and plucked it out by the head, and the beak swallowed the little snake while it tail waved frantically’. Lennie’s arrival describe as ‘silent as a creeping bear’. Mirrors the arrival of the snake ‘A water snake glided smoothly up the pool, twisting its periscope head from side to side; and it swam the length of the pool’ this foreshadows Lennie’s death. The bunkhouse and Crook’s room are the two settings in which most of the novel la takes place. The settings contrast because the bunkhouse is plain, but Crooks’ room is full of possessions. The reason for this is Crooks is that he doesn’t have a chance @being a stable buck and a cripple he was more permanent than other men’ and he is black. In light of this the harness room is more than he can wish for. Crooks has ‘more possessions than he could carry on his back.’ This is a lot more than the other men, meaning that he is a more permanent inhabitant. On the other hand, the men in the bunkhouse  are transient and not move a lot of possessions. ‘Over each bunk there was apple box with the opening forward so that it made two shelves for the personal belongings of the occupant of the bed †¦ this shelves were loaded’. The men (except Crooks) share a long rectangular building with 20 other men, where they could have a whole farm to themselves; even if the men do not have a house to themselves they still try to create some persona l space and belongings. The dream farm is the fantastical world for the ranch workers to work and live in. this is the place where people feel free, and can do whatever they please ‘if we don’t like a guy we can say, â€Å"Get the hell out† an’ by God he would.’ This shows that they are they boss and do not ‘have to buck no barley eleven hours a day’. They could set their own rules. When they have this dream farm they would be independent. They do not have to be given food, money and shelter ‘No more running’ round the country and gettin’ fed by a Jap cook. No sir, we’d have our own place where we belonged and not sleep in no bunkhouse.’ In the dream farm they had a place where they could settle for once, they could even think about making a family, because they would be settled and have a regular income to support the family with. This is a dream that is currently impossible for them. The barn is a place to be supposedly safe as it is a place to shelter and protect the animals in. this is ironic as it is the place that Lennie kills he dog and Curley’s wife in the barn. All the places in the novella signify the hardships of life. The place near the pool symbolises the contrast between dreams and reality. The bunkhouse is a gateway to their ‘dream’. Crooks’ room shows the segregation and prejudice that was around in 1930s America. The barn represents loneliness and death. The fault of the dream farm is it does not actually exist.

Friday, August 16, 2019

The British Politics

Structural-Functionalism in politics states that the political system is composed of different institutions which includes interest groups, political parties, government bodies and a bureaucratic machinery. In nature, this political model is conservative as it is not responsive to political changes. It’s first objective is to ensure its own survival (London). In British politics, its root for survival had been visible over time.Its parliamentary development over the centuries, and the emergence of the two-house parliament is a way of coping to the changing political calls intended for survival. Interest articulation and aggregation in this light has been effective because the citizens of the country and the parliament as well is anchored on the basis of their â€Å"shared sense of justice†. One which is believed that they are accountable for the laws that are being enacted. The parliament system has gone through many changes over time.A strength in the system can be att ributed to the fact that since it has gone through many eras, changes has occurred and in a way, those changes have improved the system as a whole. The system is now well-established and it since leadership in the higher level goes from generation to generation, it is stable and the government form and leaders will not change as often as other political systems do. However, its weaknesses lie on the same thing that its governance is being inherited.It may be the case that the next heir for the position will not suit perfectly to become a leader. Or that the leaders shall use their powers and family prestige in pursuit of their own interest. Thus it is inevitable that future leaders may make a mistake due to incapacity or selfishness that the hereditary process of leadership entails. Works Cited A Parliament for England. October 9, 2007 London, Scott. On Structural Functionalism. October 9, 2007

A Tale of Two Cities Essay

Does strong devotion overpower the will of a good heart? Ernest Defarge, a character in A Tale of Two Cities by Charles Dickens, is no more than a puppet to his wife. Though he does not like the idea of killing innocent people just because they are aristocrats, he refuses to speak up due to fear of confrontation with his wife. Due to his background and life as a slave, Defarge, like many other revolutionaries, dislikes the aristocracy, and has some desire to get revenge. However, he does not truly want these desires to build to the extent that the revolution got to. Ernest Defarge is a man with a good heat, driven to be a catalyst to the revolutionary acts by his strong devotion to the two things he cares about most: his country, and his wife. Paragraph 1: Though many may not see it behind all the terrible things he has done, Ernest Defarge really does have a good heart. Ernest Defarge shows compassion my comforting Gaspard, saying, â€Å"Be a brave man, my Gaspard! It is better for the poor little plaything to die so, than to live. It has died in a moment without pain. Could it have lived an hour as happily?† Defarge didn’t have to make an effort to help him out, but he does. This random act of kindness shows that he does in fact have a good side to him. After the child is run over, the Marquis throws a coin out of the carriage, thinking he can pay for the child’s life, and in return he is â€Å"suddenly disturbed by a coin flying into his carriage†. In this action of throwing the coin back, which is believed to be done by Monsieur Defarge, shows his dislike to the aristocracy, and foreshadows the fact that he will take a stand against it for the good of his country and its people. Monsieur Defarge’s personality differentiates from this sense of kindness when he barks orders at the revolutionaries such as, â€Å"Patriots and friends, we are ready! The Bastille!† (214). In opposition to his good heart, Defarge is also the leader of the Revolution. In this part of the book, he, and his fellow revolutionaries, destroy The Bastille, and everything else that happens to be in their path. This completely contradicts the compassion shown from Ernest Defarge earlier in the book, but also shows that there may be something behind his madness. Monsieur Defarge also happens to be an old servant to Dr. Manette, and cares deeply for him, but when it comes to choosing between helping the Doctor, or helping his country, Defarge’s great devotion to France towers over his feelings towards Manette. Do the square thingy with this quote * â€Å"†¦In a hole in the chimney, where a stone has been worked out and replaced, I find a written paper. This is that written paper. I have made it my business to examine some specimens of the writing of Doctor Manette. This is the writing of Doctor Manette. I confide this paper, in the writing of Doctor Manette, to the hands of the President.† This note he found, is of Manette â€Å"(add quote where he condems darnay)† Even though he deeply cared for Manette, he would do anything, literally anything, to help the people of his country. He believes that sentencing Darnay to death is the right thing to do for France, and since he believes that, he will do everything in his power to make it happen. Defarge knew how bad this would hurt Doctor Manette, since Darnay was the Doctor’s son-in-law, but it was his and his wife’s duty to kill all aristocrats, therefore he couldn’t show and mercy. Defarge would even hurt a friend, in order to do what he thinks will help his country. Paragraph 4:  Even though it is kind of hard to see at first, Madame Defarge seems to have a great deal of power over her husband. â€Å"As to thee†, pursued madame, implacably, addressing her husband, â€Å"if if depended on thee-which, happily, it does not, thou wouldst rescue this man even now† Even though Monsieur Defarge wants to help Charles Darnay, she wouldn’t allow it. He wanted to help out the Manette’s and save Darnay, but after the revolutionaries were informed on what the Evermond’s did to Madame Defarge’s family, he was the only one who wanted to show mercy. Due to the fear of confrontation with his wife, he doesn’t speak of saving Darnay again. Ernest Defarge, from A Tale of Two Cities by Charles Dickens is portrayed as a great leader to the revolutionaries, but in reality, he is merely a puppet, with Madame Defarge as his puppeteer. Devotion can be a strong thing, sometimes so strong that it can lock up the kindness of a good heart, and throw away the key. A Tale Of Two Cities Essay We learn that the Signal man has seen very disturbing events such as the train crash and the bride dying and what is more troubling is that he seen it coming, throughout the story we see how the signal man opens up to the narrator on how he is troubled and is emphasizing how he saw a ghost but the narrator starts to doubt his new friends mind and starts to have a very patronizing attitude towards the signal man. Throughout the story the fear is spreading. Dickens also uses tactile imagery â€Å"Frozen finger tracing out my spine† and also Dickens uses olfactory imagery â€Å"an earthly deadly smell†. The relationship between the narrator and the signal man is one of trust as the signal man opens up to him on their second meeting â€Å"do the signal man and the narrator linked in some way? Dickens has made the story raise some doubts about the afterlife and fate. However Bram Stoker famed for his book â€Å"Dracula† has created a short story that is much like ‘The Signal Man† but has a different approach to the horror genre for the first few pages are a little bit of a mysterious â€Å"Dracula’s Guest† is full of suspense the title alone raises the expectation for the reader as it does not give away the plot but creates a feeling of intrigue making the reader want to read on, this is a clever ploy Stoker has used and it was also a popular theme to use as in the middle ages and Victorian era the legends of vampires have been popular among the people of Britain and Ireland and perhaps the world. The short story contains many dark themes that create mystery and also adds to the mounting tension that is created by the title â€Å"Dracula’s Guest† Bram who is Known for his Dark stories that contain major supernaturalist elements such as Mythism and oppressive that are including as the novel â€Å"The Lair of the White Worm†, Bram creates the prefect atmosphere for the short story and for the century as the Victorian era had a thing for vampirism stories. The story begins in Munich the weather is idyllic â€Å"The sun was shining brightly on Munich, and the air was full of the joyousness of the early summer† is the weather too idyllic? Bram cleverly opens the story this way to lull the reader into a sense of false security a very smart move I think personally, but that all ends when â€Å"still holding his hand on the handle of the carriage door† is used which is very arousing and causes a lot of interest, He also uses personification † a shiver in the north wind† adds more dramatic effect so does the use of alliteration â€Å"Sudden Storm† but the line â€Å"But I am sure you will not be late, here he smiled and added for you know what night is it† mysterious what is the night in question? And why is it so important? The 1st paragraph creates a sense of importance for the night and adds to the mystery and we then learn the reason the maitre and coachman fears the night and also we learn the name â€Å"Walpurgis Nacht† which translated from German means â€Å"Night of Evil† this term is very important to Catholics this is the first relation to religion, later on we here â€Å"Walpurgis nacht! â€Å", Stoker uses the language barrier and the fail to understand adds to the suspense and surreal aspect, later the weather changes to â€Å"dark clouds drifted rapidly across the sky† the atmosphere changes to a sinister dull mood. Again the language barrier is there and the personification has the desired effect â€Å"the storm of snow he comes before long time† also the dialogue become vague and broken creating more tension here vampirism applied ‘mouths red with blood†, we see that the protagonist seems to doubt his sanity a lot like Dickens character â€Å"The Signal Man† it seems he also is succumbing to his fear â€Å"Paroxysm of the fear- white face perspiring, trembling† Bram Stoker’s technique second to none he uses detailed descriptions for his characters and settings and his use of the language devices such as metaphors â€Å"glistening white carpet† and his alliteration â€Å"Sudden Storm† and lastly repetition â€Å"Walpurgis nacht†. Each writer Dickens and Stoker uses different methods to create a spine-chilling effect on the reader each could even be masters of horror and suspense, all the aspects that the gothic genre needs to be successful and â€Å"The Signal Man† and â€Å"Dracula’s Guest† where very successful in that age and successful today in the study of literature . In conclusion after close analysis of both stories I have seen that both stories are great for maintaining tension and use techniques such as alliteration, pathetic fallacy and are good to create confusion among the readers. This wining combination gives the story a kick and keeps the reader engrossed in the story. I believe that stoker is perfect for building suspense and tension while Dickens plays on the reader’s emotion by lulling them into a sense of security and then confuses them and then plays on their confusion. Gavin Teggart Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Miscellaneous section. A Tale of Two Cities Essay Throughout well-known stories, authors tend to develop memorable characters in order to enhance the plot; although they may not always be portrayed in the most considerate manner. In Charles Dickens’ novel A Tale of Two Cities, he also uses such characters. First, Lucie’s role of over dramatic damsel in distress. Second, Miss Pross’ participation as the over protective mother figure. And third, Mme. Defarge as the bloodthirsty crazed villain. Through these characters, Dickens portrays women in the three most stereotypical demeanors: weak and fragile, a worrisome mother and a psychotic wife. Throughout the novel, Lucie is a feeble girl who cannot stand up to the hardships of life. â€Å"Perfectly still and silent, and not even fallen back in her chair, she sat under his hand, utterly insensible; with her eyes fixed upon him and with that last expression looking as if it were carved or branded in to her forehead† (Dickens 25). This is Lucie’s reaction to the news from Mr. Lorry that her father, presumed to be dead, has been found alive after spending eighteen years in the Bastille. Instead of a normal reaction of tears and joy, she is simply so stunned that she cannot even move; her expression of shock and fear is frozen upon her face. She reacts very similarly when she goes to meet  her father for the first time. Dickens writes, â€Å"Mr. Lorry got his arm securely round the daughter’s waist, and held that she was sinking†¦ ‘I am afraid of it’ she answered, shuddering. ‘Of it? What?’ ‘I mean of him. Of my father’ † (36). Of course it would be intimidating for her to meet her father for the first time in her life but she is on the verge of fainting a second time just from thinking about her father. She also does not even see him as human referring to him as â€Å"it†, not even wanting to approach her father. Finally, when her husband is taken away to prison, again she displays weakness, â€Å"As he went out at the prisoners’ door, she turned laid her head lovingly on her father’s breast, tried to speak to him and fell at his feet† (324). Yes it horrible to have her husband sentenced to death and is taken away to prison. But, she has a 6 year old daughter, she cannot give in to self-pity and weakness, it is the time for her to be strong not only for herself but for her daughter as well. It is important for her to see her mother strong and able to be there for her, but when she faints, her hope falls alongside her mother’s body. It seems Lucie has never had to really fight or be strong for anything in her life before. She acts like she always needs to rely upon someone else; she is very dependant upon others. Miss Pross’ role in the novel, although not very large, was nonetheless very important, especially for Lucie. Miss Pross was the mother figure in Lucie’s life, always caring for her and always nurturing her. When Lucie faints at the mention of her father, it is Miss Pross who is the first to her side: â€Å" ‘Why, look at you all!’ bawled this figure, addressing the inn servants. ‘Why don’t you go and fetch things, instead of standing there staring at me?†¦if you don’t bring smelling salts, cold water, and vinegar, quick, I  will’ † (26). She quickly takes charge of the situation and gives out orders in the same urgency as if it was her own daughter. It is also always Lucie for whom she is most concerned about: â€Å" ‘O me, O me! All is lost!’ cried she, wringing her hands. ‘What is to be told to Ladybird? He doesn’t know me, and is making shoes!’ † (187). Dr. Manette has a relapse and is no longer coherent. Miss Pross’ first concern is not restoring Dr. Manette back to health, but what the impact of seeing her father like this will do to Lucie. Finally, Miss Pross demonstrates her love for Lucie because she is willing to lay down her life for Lucie: â€Å" ‘I am a Briton,’ said Miss Pross, ‘I am desperate. I don’t care an English twopence for myself. I know that the longer I keep you here, the greater hope there is for my ladybird’ † (356). This demonstrates Miss Pross’ love for Lucie, risking her life in the hope that her sacrifice will keep Lucie safe. Miss Pross means well and is always looking out for Lucie and would do anything for her. However at times her actions are a bit eccentric. Finally, there is Mme Defarge, a very angry and vengeful woman. Mme Defarge takes it upon herself to make a register of all the nobility whom she proclaims as enemies to the revolution: â€Å" ‘Knitted in her own stiches and her own symbols, it will always be as plain to her as the sun. Confide in Madame Defarge. It would be easier for the weakest poltroon that lives, to erase himself from existence, than to erase one letter of his name of crimes from the knitted register of Madame Defarge’ † (166). This is M. Defarge explaining his wife’s register to others of the revolution, and saying that any who make it onto the register; will meet certain death. Not only does she register all  nobility in her knitting, but Mme Defarge also makes a point to remember the faces of anyone who is an enemy to the revolution: â€Å" ‘His appearance; is it known?’ ‘Age, about forty years; height, about five feet nine; black hair; complexion dark; generally, rather handsome visage; eyes dark, face thin, long and sallow; nose aquiline, but not straight, having a peculiar inclination towards the left cheek’†¦Ã¢â‚¬ËœIt is a portrait!’ said madame, laughing. ‘He shall be registered to-morrow’ † (171). Just from this short description, Mme Defarge already has a mental image of this man and even commits it to her memory. Finally, once she decides to kill someone, she will stop at nothing to kill them: â€Å" ‘I have been in the streets from the first, nothing has stopped me, I will tear you to pieces, but I will have you from that door’ † (356). This is Mme Defarge when she is confronting Miss Pross, telling her that she has been fighting in the streets for the revolution since day one, and nothing will keep her from killing Lucie as well. Mme Defarge’s rage and thirst for blood did greatly help the revolution. However, it became something that ultimately consumed her and turned her in to what she set out to destroy in the first place. It is through these characters that Dickens portrays women very unjustly. Lucie as delicate and flimsy, not being able to handle life’s hardships. Miss Pross as the overprotective mother, sometimes taking her job to the extreme. Mme Defarge as the crazed wife, always full of anger and violence. Even though women display these qualities from time to time, is it really fair to say that these traits define their whole character.

Thursday, August 15, 2019

Expectations

Finally, the blade deepens and hits just right, the scar of what the doubtful and painful knife has left me insecure and filled with emptiness. The sparks of love I had was weak and burning low, it soon became a weapon that only caused me harm. This body soon became an empty vessel searching for a purpose in this constant non-fiction world. Tick tock, tick tock, the clock goes, teachers writing riddles on the board, speaking of a foreign language that I cannot comprehend. Various noises filled the classroom, speaking of gibberish as I sit in this isolated bubble of my own. Surviving in this vessel, searching for a purpose- no, but rather waiting to be re-wired and commanded day by day. I love the languages subjects so I am pretty good at it, but I hate maths and sciences, hence I am bad at it. With no further comments I scanned through the whiteboard, but everyday I worry on how people kept instructing me how to grow as a person; giving me options on what's right and wrong, but in the end, the things that I will choose will forever be false.Everyday, I noticed to have a work that is always incomplete; I stare at the blank piece of paper reflecting about my life. With not much personality as an individual, hence I do not find it as an inconvenience to survive in this school. As time continued to pass by, I realized that I'm currently stuck in a never ending cycle of hypnotism, staggering through the same hallways each day, and soon it feels as though everything is on repeat. In class again, questions and answers that are not even needed in my daily life, being drilled into my mind, as I flipped through the textbook, which contains no specific answer. â€Å"How are your grades?† you asked with a smile.I shrugged, â€Å"The same, I guess.†Piercing me with your eyes, reminding me of the â€Å"future† I will soon have. If my tears were colours, then my pillow would be painted with rainbows. Thus in the morning, I would wake up with dark rings around my eyes, taunting me every time I look at myreflection. I would try and cover it up so that they would be a shade lighter, but I know they can never completely disappear. Staggering through the same hallways, towards an empty seat, one far from the sunlight, but rays still reached, blinded me and left me a daze, as if it is trying to question me; â€Å"What were you expecting in life?† â€Å"What are your dreams?†Searching frantically for an answer in that textbook, I can't breathe, I'm choking and it hurts. The stares that they give, beating down my confidence and pride all over again, I tried to find an answer, but its all the same; still an empty white paper, reflecting about my accomplishment in life. â€Å"I can do this†¦Ã¢â‚¬ I keep repeating those words in my mind, as I stare at that incomplete work, reminding me about â€Å"responsibilities†, â€Å"success†, â€Å"achievements†, â€Å"grades†, and so on, and every time I climb back up, your words kept knocking down my stance, chaining me down, to expectations, that I cannot achieve. Expectations and dreams, which are so heavy chaining me, more than gravity ever will. â€Å"I've tried†¦I'm tired†¦It hurts†¦Ã¢â‚¬ Ã¢â‚¬ When will you ever grow up?† But let me ask, what is the meaning of â€Å"growing up† in the first place? If this is what's it feels like, then I just want to stop. The path they build for me is dictated to be perfect and filled with beautiful lies. Feeding me with expectations, rewiring my senses, choking me with perfection. I cannot breathe, I feel nauseous. My body cannot sustain it. Staggering to a mirror, I see the rings under my eyes, as a constant reminder the about those disappointing glares I noticed:†Ah†¦ they are getting darker.†

Wednesday, August 14, 2019

Child Abuse in Vietnam

Banking Academy of Vietnam International Training Program (ITP) ——-o0o——- CHILD ABUSE IN VIETNAM Course Title:Academic writing Advisor: Student: Class: Hanoi, July 2012 1 ABTRACT In many countries, children are considered as the future of nation and should be provided with the best things, best condition for the development and nutrition. This is quite true and in fact, in developed countries such as the United States of America, France, Britain, Austria, etc. , children are always ranked as the highest priority more than other people.As â€Å"the future of country†, they must be protected far away from violence, infringement and exploitation. However, in contrast to developed countries, children in developing countries are not provided with good conditions and sometimes they are affected from something called abuse. Vietnam is also one of those countries suffering from this situation. So what is the real situation, causes and which solutions could best deal with that problem are what this paper will look into. Moreover, through it is expected that through the research the awareness of people regarding children could be much improved.Key words: child abuse, violence, infringement, exploitation, neglect, physical abuse, emotional abuse. CHAPTER I. INTRODUCTION 1. Research background: In Viet Nam, child abuse is a very hot topic and attracts a lot of attention from public. As a developing country, children in Vietnam are not provided with good condition and sometimes they are also considered as a kind of labor force. That could be happened everywhere from the city, mountainous areas, or countryside. 2. Research purpose: This research will identify the situation of child abuse in Vietnam and their causes, consequences as well as relevant solutions.Through it, reader may have better understanding of the situation and further contribute to the prevention of child abuse, at least in their family. 3. Definition of the key terms: In t his research, key terms are used and understood as follows: †¢Child abuse: child abuse or maltreatment constitutes all forms of physical and/or emotional ill-treatment, sexual abuse, neglect or negligent treatment or commercial or other exploitation, resulting in actual or potential harm to the child’s health, survival, development or dignity in the context of a relationship of responsibility, trust or power. Child neglect: Neglect is the failure to provide for the development of the child in all spheres: health, education, emotional development, nutrition, shelter, and safe living conditions, in the context of resources reasonably available to the family or caretakers and causes or has a high probability of causing harm to the child’s health or physical, mental, spiritual, moral or social development.This includes the failure to properly supervise and protect children from harm as much as is feasible †¢Physical abuse: Physical abuse of a child is that which results in actual or potential physical harm from an interaction or lack of an interaction, which is reasonably within the control of a parent or person in a position of responsibility, power or trust. There may be a single or repeated incidents. Emotional abuse: Emotional abuse includes the failure to provide a developmentally appropriate, supportive environment, including the availability of a primary attachment figure, so that the child can develop a stable and full range of emotional and social competencies commensurate with her or his personal potentials and in the context of the society in which the child dwells. There may also be acts towards the child that cause or have a high probability of causing harm to the child’s health or physical, mental, spiritual, moral or social development.These acts must be reasonably within the control of the parent or person in a relationship of responsibility, trust or power. Acts include restriction of movement, patterns of belittling , denigrating, scapegoating, threatening, scaring, discriminating, ridiculing or other non-physical forms of hostile or rejecting treatment. †¢Sexual abuse: Child sexual abuse is the involvement of a child in sexual activity that he or she does not fully comprehend, is unable to give informed consent to, or for which the child is not developmentally prepared and cannot give consent, or that violate the laws or social taboos of society.Child sexual abuse is evidenced by this activity between a child and an adult or another child who by age or development is in a relationship of responsibility, trust or power, the activity being intended to gratify or satisfy the needs of the other person. This may include but is not limited to: ? The inducement or coercion of a child to engage in any unlawful sexual activity; ? The exploitative use of child in prostitution or other unlawful sexual practices; ? The exploitative use of children in pornographic performances and materials. Exploitat ion: Commercial or other exploitation of a child refers to use of the child in work or other activities for the benefit of others. This includes, but is not limited to, child labor and child prostitution. These activities are to the detriment of the child’s physical or mental health, education, or spiritual, moral or social-emotional development. (Source: World Heal Organization) 4. Significance of the research: As children will be the people who make up the future, when they are not provided with good conditions, that could lead to serious consequences to family and society.The situation will worse when they are abused, the research, therefore, is aiming at find out the root causes, identify the possible consequences and solution. It can help readers to better understand the problem and have right behaviors such as: helping other children, having better behaviors to children. The best results could be raising awareness of the whole society and decreasing the child abuse in V ietnam. 5. Methodology: In this research, the following methods are used: Data collection from books, magazines, internet to get statistics, data and general understanding of child abuse in Vietnam as well as to review other researches in this topic and identify which aspects are still missed. †¢Questionnaires have been distributed to 100 of people of over 20 years old to collect their opinion and understanding about child abuse as well as to find some suggested solutions. Procedures: At first, researcher finds books, magazines and all sources of information related to child abuse to get statistics, data about the problem.From this activity, researcher has identified what is child abuse, its consequences, and the existing situation. Further more, it can help researcher to determine which aspect is still missed and needed to be studied more. After that, questionnaires are developed and distribute to 100 people from the age of 20 to identify their understanding about child abuse and also to collect some suggestions for the solutions. The questionnaires provides the researcher with practical point of view to compare with those written in book or magazines. CHAPTER II. RESULTS AND DISCUSSIONS 1. Situation of Child Abuse in VietnamFor children, family is the most solid and quiet shelter in their early years. To live with their parents and relatives and enjoy love as well as physical and mental care are the inalienable rights of every child. However, in fact, there are many children in Vietnam, who can't live like that. Even though Vietnam is one of the first members of the International Convention on the Rights of the Child, the situation of children affected by violence still occurs at serious level. It has actually become an anxiety for both society and family and does occur with not only girls but also boys.For our country, the situation of violence against children or child abuse in recent years tends to increase in both number and extent. Here are some st atistics on the media: From 2008-2009, there were 5956 cases of child abuse (an average of 3,000 cases a year), over 100 child murders and 50 kidnappings, child trafficking were detected and processed. Many children suffered from violence from their parents, family members, teachers, employers and the persons responsible for foster care. (em tim them mot so dan chung, so lieu ve lam dung tre em o Vietnam nhe) 2. Causes:Through collection of information and conduct of questionnaires, the following causes of the child abuse in Vietnam has been identified: Poverty Insufficient legal system Inappropriate teaching method Family break (em tim them mot so nguyen nhan nua nhe) Two main reasons are the same thing repeated: -First, The law is not sufficient deterrent. -Second, despite the law, but we do not comply in. Article 110 of the Penal Code on charges of torturing other people who have defined cruelty with an audience of dependent children shall be subject to warning, non-custodial ref orm for one year to three years.This is the sentence too light. While child abuse cases are often repeated in a long time that children not only affected physically but also mentally affected very badly, sometimes those that haunt the children for life. – At school, the punishment by using whips from customs, cultural traditions from the previous generation to the â€Å"Trade for the whip, to jump. † Under the old way of thinking of Vietnam, the teacher is very powerful, the idea that parents â€Å"should be the new hit†. So, should the majority support him, his teacher spanking children as a punishment to help them know the next time the error does not recur again.In addition to the teacher, the teacher with the indifference of pedagogy, the lack of knowledge of social, legal, psychological †¦ These factors led to the application of whips or insulting words to physical and spiritual children. – At home, along with the traditional view â€Å"Trade f or whip, to jump†, the parents reported that the use of whips children is their right, largely due to the education of children, with family present from 1 to 2 children, the parents are expecting children, investing heavily in education leading to heavy pressure with the children, using whips to force the children to achieve results as your parents want.Besides, there are many different reasons for parents to use whips for children, husband and wife hit me angry, angry with her husband also hit me, hit me daughter in response to her husband, son in law does not by his mother and wife also brought me out to battle †¦ in addition, a form of violence in the family, it is the excessive demand for their age and development of children and with words or actions that cause children to be mental damage, outraged, abandoned, rejected love . There are also many cases of children being beaten by parents' own childhood by their parents also lead to violence so traumatic and they als o teach children to use violence. The boys live in family violence, father or mother type . Long days also affected the character of father . (nhung ly do em neu o day chua thuyet phuc, em tim lai nhe) 2. Consequences: (tim lai cac hau qua, anh huong cua child abuse, phai ro rang theo tung muc vi du nhu: anh huong len gia dinh, anh huong len xa hoi, anh huong len giao duc, anh huong den tinh mang cua tre em, vv.. Violence against children is traumatic for children in psychiatric severity. The psychological research on children indicates that children are not cared for and caring will be taught psychological deviations unruly freedom, prefer to use violence. – The boys live in family violence, father or mother type †¦ Long days also affected the character of father. Many children are growing up and harsh, rude, even cruel to women like father or the child is more violence against women published. aking crime when enticeme. For girls, the most often aloof, afraid of men, a fraid of marriage, illness self-esteem, depression, panic neurological †¦ that is, the girls would be difficult to integrate with the community than the boys. – Both boys and girls often witnessed violence in the family, make sure the child is likely to have violence, poor education, may be arising negative intentions, and psychological operations are passive, there be prone to headaches, stomach pain and neuralgia style schizophrenia. Vulnerable age group is 5-10 years old †¦Domestic violence causes mental trauma in children, injuries that can last a lifetime, causing deep wounds in the minds of children â€Å". 3. Solutions The cases sexually abused children, domestic violence recently has once again sounding bells, there should be drastic measures to protect children. Along with that, in the current situation, policy system, legal protection, child care need to be completed quickly. Crimes against the immediate future, especially violence against children is to be heard with strict penalty, more closely.Need to build inter-sectoral coordination mechanisms at both central and unified basis in the detection, treatment, intervention, help abused children, domestic violence. Propaganda and dissemination of policies and laws of the State and measures to prevent and combat violence against children should be taken regularly to the executive committee, government, communities, schools, families and children. To ensure that in future, prevent and gradually reverse the violence, child abuse should focus on the weaknesses in the coordination of activities between ministries, sectors, localities and communities society.They also need to be urgently overcome the weaknesses in the overall investment structure and the overall budget for child protection; research established the National Commission on children to contribute to prevention of violence against children in the future. The authorities and relevant agencies should also consider the problem as a factor in the development of local society. Moreover, we should focus on building child protection system in which to strengthen and consolidate the team of civil servants, social workers engaged in the protection, care and forming services social protection young to be systematic and professional.System policies and laws on the protection and care for children should be completed quickly, clearly defining the responsibilities of all levels and branches in this area, can even study the construction of the law. For localities should do better propagation and dissemination of knowledge and education on violence against children and raise awareness of parenting for parents. Parents also must quickly try to correct the pragmatism that is affecting families, such as overly pampered children or children at the mercy †¦ And each family member should review yourself, do not blame each other.Need to devote more time to stay inside their loved ones, to understand and share with each o ther, especially when conflicts occur. Despite many difficulties and challenges, but in the next period by the resolution of legal, judicial, administrative and other measures of education, social conformity to stop and eventually reverse the violence power, abuse of children. In summary, to prevent violence against children requires the close coordination, synchronization between the three family environment, school and society. CHAPTER IV. CONCLUSION ReferencesAppendix Questionnaires used for the research: That survey researches about child abuse in Vietnam. This survey questionnaire aims to find out your knowledge child abuse. Therefore, your help is not only useful for me to complete my research, but also useful for futher this problem. Please complete all the following questions. Thanks you for your help! I. Personal Information (Please circle your choice) NAME: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. DOB:†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1. Gender? Male Female 2. What is your age-group? 18-23 24-54 over 54 II.Multiple choice: Choose and circle the best answer 1. What do you think about reality child abuse in Vietnam? Very serious Normal Other answer 2. Who did talk to you about the event about child abuse in Vietnam? The mass media People around me Don’t pay attention 3. If you are in one of the child abuse. At this time happen, did you feel? Always calm (Luon binh tinh ) feeling scared It never happened to me 4. If you suspect or know of a child being abused. What would you do? Nothing Intervene and dissuade (Can thi? p va ngan c? n) Report to political power (Bao cao v? quy? n l? c chinh tr? ) 5. Child abuse- who is having responsibility about child abuse? Family and Social Themselves Both A and B III. Short answered questions: Give short answer of these below questions 1. In your opinion, what is cause of child abuse? 2. What should you do if you are young and you think you are being abuse d by your parent? 3. What do you say to a teen who is telling you that they are being abused? 4. Many parents think that spare the rod, spoil the child. What do you think about that opinion? Do you agree or disagree? Why?