Monday, September 30, 2019

Homeland Security Essay

Outline I. Topic: The United States Homeland Security and The War on Terrorism II. Thesis Statement: Homeland Security plays a major role in the war on terror. Topic Sentences 1. The Homeland Security Act of 2002 reduces the vulnerability of the United States to terrorism. 2. The Department of Homeland Security was created for the war on terror. 3. The role of the Homeland Security Committee. 4. The history of the United States on foreign policy. 5. How terrorists communicate what they want to accomplish. 6. The study of Foreign Intelligence. 7. The Increasing Need for Domestic Intelligence. 8. How security benefits from intelligence. 9. The United States is strengthening our Nuclear Security. 10. How the U.S. is fighting the war on terror. 11. Conclusion The Homeland Security Act Created by President George W. Bush after the 9/11 attacks the United States Department of Homeland Security is the largest federal government reorganization since the Department of Defense was created via the National Security Act of 1947. The new department assumed a large number of services, offices and other organizations previously conducted in other departments, such as the Customs Service, Coast Guard, and U.S. Secret Service. The Department of Homeland Security was created for the war on terror The primary mission of the Department is to prevent terrorist attacks within the  United States. Homeland Security reduces the vulnerability of the United States to terrorism. It also minimizes the damage, and assists in the recovery, from terrorist attacks that do occur within the United States. The role of the Homeland Security Committee Homeland Security Committee States that The Committee on Homeland Security was created by the U.S. House of Representatives in 2002 in the aftermath of September 11, 2001. The Committee was first formed as a select, non-permanent Committee, to provide Congressional oversight over the development of the Department of Homeland Security. The Committee was made permanent when it was designated as a Standing Committee of the House on January 4, 2005, the first day of the 109th Congress. The Committee will be made up of 21 Democratic Members of Congress there is currently one vacancy, led by Chairman Bennie G. Thompson (D-MS), and 13 Republican Members of Congress, led by Ranking Member Peter T. King (R-NY). Frances Townsend currently heads the committee. Trudeau states that â€Å"President George W. Bush said We’re under attack because we love freedom, is why we’re under attack. And our enemy hates freedom. They hate and we love. We differ from our enemy because we love. We not only love our freedoms and love our values, we love life itself. Our enemy hates innocent life.† (2002) The history of the United States on Foreign Policy Because of its role as a major world superpower, the United States must carefully consider its national foreign policy goals. Although they may be carried out very differently from administration to administration, the primary goals of American foreign policy are most effective when they remain constant over time. Historically, the United States has pursued a number of foreign policy goals, but one goal has been and continues to be a primary goal of every generation is national security. The Realists point to several factors that demonstrate the importance of national security. They begin by declaring that humans are naturally aggressive and instinctively fight one another. This human tendency reveals the inevitable nature of war. The Cold War which was a period of strong change starting in 1945 led  America into a geopolitical mindset for the first time in American history. This period made national security and military affairs the center of focus for America. This gave way to the idea of national security being a strong focal point of the American agenda. It made it equally as important as anything else did on the agenda. Also the United States was now a state of mobilization. The armed forces would now and always be at a striking force. All of the changes were something new to the people of America but it was an idea that was not only accepted it was expected. The same rings true with 9/11 in relation to the role of America. Our sole focus is national security and to put our military at a point of being called upon any second. The United States has embraced the idea that things have changed and are willing to do whatever possible to prevent future events of this magnitude. Another characteristic that the Cold War Period and 9/11 hold in common is that both were a pervasive political and military competition that dominated international politics. On September 11, 2001 terrorism became a reality! There is no way for the United States to prevent future attacks on Americans without working as a coalition force with the other nations to identify, track, and eliminate terrorist networks around the world. One of the main problems with fighting a war on terrorism is that the nations of the world have become accustomed to working alone as individuals vice working together. The United States will need to change its approach in order to conquer the worldwide threat of terrorism. The way to defeat terrorism at home and around the world is to form an international counter-terrorist task force. In order to prevent future acts of terrorism on the United States and around the globe, the free-nations of the world will have to come together and form a large task force to counter against the terrorist threat. The main problem with forming a world wide counter-terrorist headquarters is that there is no one single definition of terrorism. Each country has a definition of the word â€Å"terrorism† based on the political stance that the country takes on use of force. The United Nations must first come up with a clear definition of terrorism in order to facilitate the creation of an international counter-terrorist organization. How Terrorists communicate what they want to accomplish Terrorists kill for a reason. The reason is to communicate a message that will instill fear in the enemy government and demoralize it. The strategy of terrorists is to provoke the government into repressive measures in the hope that this will cause a revolt. The Study of Foreign Intelligence The study of foreign intelligence has demonstrated that the purpose of intelligence is to acquire information necessary to apply governmental power with greater precision and that as the need for application of government power increases, so does the need for intelligence. Domestically, terrorist threats to homeland security will be countered by government power used by various domestic security agencies, and the newly created domestic intelligence programs will enable them to apply their powers with greater force and precision. As technological capabilities inevitably grow threats to homeland security will increase in the future, and the need for domestic intelligence will increase. The Increasing Need for Domestic Intelligence Homeland security will require greater levels of domestic intelligence in the future. Foreign intelligence has indicated that the purpose of intelligence both foreign and domestic is to facilitate precise application of governmental power. Countering terrorism has increased the need to collect domestic intelligence, but threats to domestic security will increase even more in the future due to growth in technological capacities. As the use of power increases to counter these threats, domestic intelligence capabilities must also increase so that the power is applied effectively. American officials created a permanent intelligence community to warn policymakers of threats to national security. The Japanese attack on Pearl Harbor had such a detrimental effect on American perceptions of security that after World War II ended, policymakers decided to create for the first time in the nation’s history a permanent bureaucracy intended to prevent any future surprise attacks or other strategic surprises. Historically, intelligence capabilities had been organized to provide targeted military information to commanders because losing wars held such disastrous consequences. The United States was the last major power to get into the intelligence analysis business. It was thought that it wasn’t  necessary because two great oceans protected America from foreign dangers. Marrin states that The attack on Pearl Harbor and subsequent American involvement in World War II changed the United States’ need for and use of intelligence. During World War II, the United States increased its overseas presence, and this necessitated the creation of a global intelligence capability commensurate with the United States’ expanded global role. After World War II ended, American political leaders decided that the United States needed an intelligence agency capable of integrating disparate pieces of information distributed throughout the military and other government agencies to prevent another Pearl Harbor. As a result, in 1947 the Central Intelligence Agency was created to prevent future surprise attacks by focusing on threats to national security. (2003) How security benefits from Intelligence The primary security benefit of intelligence is that it enables power to be applied with greater precision and with less collateral damage. The role of intelligence is the collection and analysis of information to find out who the terrorists are and what they are up to. Knowledge can make the application of power more effective, but knowledge alone is powerless. The benefit of foreign intelligence is easiest to illustrate in the application of military power. Foreign intelligence can also assist in the application of economic and political power. The United States is strengthening our Nuclear Security In the 1990’s we were warn of potential terrorists obtaining and using of weapons of mass destruction (WMD) whether chemical, biological, and nuclear. Chemicals weapons are available to terrorist through homebrew or rogue states. Nuclear terrorism is our biggest worry. Nuclear weapons are more difficult for terrorists to handle. Henderson (2004) states that With so many nuclear warheads being stored under conditions of uncertain security in the former Soviet Union, it is possible terrorists might be able to buy or steal a ready made nuclear weapon. But nuclear  warheads have safety interlocks, and it has been proposed that the weapons be fitted with devices that would allow them to be remotely destroyed or disabled if terrorists obtain them. U.S. agencies since the 1900s have sought closer coordination between U.S. and former Soviet Scientists and engineers in order to secure the nuclear stockpiles. How the U.S. is fighting the war on terror We have worked with a number of states around the world to expose plotting Al Qaeda cells. The United States has implemented broad-sweeping, even controversial, steps such as the Patriot Act in an attempt to improve our domestic security. There are three tools that can be used on terrorists. The criminal law and legal system is used to prosecute terrorist suspects. The military can be used to destroy terrorist’s infrastructures. Diplomatic efforts can be used in the hopes that nations can work together to prevent the movement of terrorists around the world. Conclusion After 9/11 the Department of Homeland Security was organized. The primary mission of the Department is to prevent terrorist attacks within the United States. Homeland Security reduces the vulnerability of the United States to terrorism. It also minimizes the damage, and assists in the recovery, from terrorist attacks that do occur within the United States. Intelligence has been used to collect and analysis information to find out who the terrorists are and what they are up to. It is best to see that the United States is taking the proper steps to fight terrorism. Reference: Henderson, H. (2004) Global terrorism, New York, NY: Facts on file, Inc. Homeland Security Retrieved November 25, 2009 http://homeland.house.gov/about/index.asp Marrin, S. (2003) Homeland Security Intelligence Retrieved November 25, 2009 http://www.homelandsecurity.org/journal/Articles/marrin.html Homeland Security Retrieved November 24, 2009 http://www.whitehouse.gov/issues/homeland-security/ Trudeau, G. (2008) The war in quotes p.20 Retrieved November 27, 2009 http://www.ontheissues.org/Celeb/George_W__Bush_Homeland_Security.htm

Sunday, September 29, 2019

Notes Experimental Psych Overview

Sociology Biology Chemistry Physics Astronomy Anthropology Psychology Others Outer circle (CO) : Art Music Literature Language Solvable and unsolvable Problems Solvable problem- one which poses a question that can be answered with the use of normal capacities (answers questions under the inner and outer circle) Unsolvable problem – raises a question that is unanswerable. This concerns supernatural phenomena (falling under Metaphysical disciplines) Science is Empirical (Observable) Solvable problems are susceptible to empirical solution by studying observable vents Science Defined 1 .Sciences apply the scientific method to solvable problems 2. Dullness's In the CO don't use the SMS but their problems are typically solvable 3. The dullness's outside the circles neither use the SMS nor pose solvable problems C] Science is the application of the SMS to solvable problems. Psychology as a Science Psychology Is Materialistic, Objective and Deterministic If psychology Is ever to becom e a science, It must follow the example of the physical sciences: it must be materialistic, mechanistic, deterministic, objective. -WatsonMaterialism (Same as Physicality) – observable responses, physical events Objectivity – the principle of intersecting reliability Intersecting- two or more people share the same experiences Determinism- the assumption that there is lawfulness Experimentation is the most powerful research method 0 Psychology became a science by applying the SMS to solvable problems. Psychological experimentation is an application of the SMS Stating the Problem and Hypothesis Testing the Hypothesis 1. Select participants 2. Randomly assign to groups 3. Randomly assign groups to condition/treatment . Experimental group given a novel treatment b.Control group given normal treatment 4. Define the IV 5. Define the DVD 6. Control relevant EVE 7. Conduct statistical tests 8. Generalize and explain the hypothesis 9. Predict new situations Terms 1 . Replicatio n – an additional experiment is conducted but with the same process 2. Stimuli – aspects of the external environment 3. Response – aspects of behavior 4. S-R Laws – if a certain environmental characteristics is changed, behavior of a certain type also changes 5. Variable – anything that can change in amount 6. Independent variable – manipulated, treatment, investigation 7. Dependent variable – measure of any change in behavior 8.Continuous variable – capable of changing by any amount 9. Discontinuous variable – assume only numerical values that differ by clearly defined steps without intermittent values possible 10. Hypothesis -tentative solution to problem Functions of Apparatus 1. To administer experimental treatment 2. To collect data 3. To reduce experimenter influences 4. To analyze data specifically Conducting Statistical Tests Chance difference Reliable difference Real 0 statistically reliable Accidental 0 due onl y to chance Significant 0 reliable (Preferable) Confirmed 0 probably true Discontinued 0 probably false it can be measured. J.B. Watson – If psychology is ever to become a science, it must follow the example of the physical sciences: it must be materialistic, mechanistic, deterministic, and objective. Chapter 2 – The Problem Problem Scientific inquiry starts when we have already collected some knowledge but there is something we still do not know Ways Problem is Manifested 1 . When there is a noticeable gap in the results of investigations Students conducting thesis are reading related literature so their storehouse of information is filled with new knowledge 2. When the results of several inquiries disagrees The results are contradicting 3.When a fact exists in the form of unexplained information When a new theory explains a fact, it also explains other phenomena, because theories are general that it can explain many facts Defining a Solvable Problem 1. The proposed s olution is Testable 2. The proposed solution is Relevant to the problem A. What is a testable hypothesis? A. If it is possible to determine that it is either true or false B. Knowledge is expressed in the form of propositions a. The requirement that knowledge can occur only in the form of a statement is critical for the process of testability. C.Degree of Probability Instead of True or False Kinds of Possibilities 1 . Presently attainable – the possibility is within our power at the present time 2. Potentially attainable – possibilities that may come within the powers of people at some future time Classes of Testability 1 . Presently testable – related with Presently attainable 2. Potentially testable – related to Potentially attainable Working Principle for the Experimenter . Applying the criterion of Testability a. Do all the variables contained in the hypothesis actually refer to empirically observable events? B.Is the hypothesis formulated in such a w ay that it is possible to relate it to empirically observable events and render a decision on its degree of probability? Term: determine the degree of probability for them. Unsolvable Problems The Unstructured Problem Inadequately defined terms and the operational definition Solution Through Operational Definitions Operational definitions – one that indicates that a certain phenomenon exists, and sees so by specifying precisely how the phenomenon is measured Operations – adequate definitions of the variables with which a science deals are a prerequisite to advancement.Initiated by P. W. Abridgment in 1972 Impossibility of Collecting Relevant Data Vicious circularity renders problems unsolvable Additional considerations Problems should be technologically or theoretically important Problems of the impasse variety should be avoided unless creative solutions are possible Psychological reactions to problems- we should emphasize a truth criterion and not dismiss a discovery only because it is disturbing

Friday, September 27, 2019

Impact of the HIPAA Privacy Rule and Implications for Future Term Paper

Impact of the HIPAA Privacy Rule and Implications for Future Generations - Term Paper Example Writing on the official website of the U.S. Department of Health and Human Services, Thacker (2003) reports that the HIPAA Privacy Rule is â€Å"pursuant to the Health Insurance Portability and Accountability Act of 1996.† Since its inception in 2003, there has been extensive This research paper seeks to complement existing researches by examining the impact of the Rule today and the implications it has for future generations – thus how it can be well preserved for generations unborn. The paper finds that, though generally accepted as a good system, there still needs to be more study and research conducted into the policy to ensure that it serves the interest of the patient to the later. It is clear that the HIPAA Privacy Rule was passed with a every good intention for the privacy of information of the patient. However, it should take constant education of the masses to help them appreciate the Act as their Right and begin to fight for it. Again, research work for possi ble amendments on the Act should not cease. Debates on the Act should continue; just as the case studies on it. ... The Health and Human Services Department (2011) summarizes that it provides â€Å"standards [that] address the use and disclosure of individuals’ health information — called â€Å"protected health information† by organizations subject to the Privacy Rule — called â€Å"covered entities,† as well as standards for individuals' privacy rights to understand and control how their health information is used†. Enforcement is provided by the Office of Civil Rights, or OCR. Health plans, HMOs and insurance companies, health care providers, health care clearinghouses, and researchers are all covered by the bill's elements (HHS, 2011). Protected information includes â€Å"all individually identifiable health information† (HHS, 2011, their emphasis). This is an expansive provision. It covers â€Å"past, present and future† health information, all provisions of health care to the individual, and payments thereof. But some information is â₠¬Å"de-identified† as being outside of the purview of HIPAA. Information can become certifiable as â€Å"de-identified† for purposes such as research or other public release either by a statistician approving it or by the removal of identifiers of the individual and all relatives and household members. The basic principle regarding disclosures is that, aside from provisions in the Act, no disclosure may be given without the written consent of the patient. Legally required disclosures can only be elicited by the person or their representatives and HHS. Patients must be presented a copy of HIPAA rights and a disclosure of the provider's health care practices (HHS, 2011). State law is eclipsed when it is contrary, or where the two are clearly mutually exclusive, but it does not eclipse more

Bullying English Essay Example | Topics and Well Written Essays - 1250 words

Bullying English - Essay Example Bullying may occur because of several reasons that include but are not limited to racism, hatred, and jealousy. When an individual bullies another, it fundamentally reflects a sense of insecurity in the bully to alleviate which, the individual tends to make use of bullying. Bullying is one of the most complicated issues in all kinds of organizations including schools and offices. This paper discusses the effects of bullying on the victim. Bullying has many negative effects on the psychological and physical health of an individual at any age, and is often a root-cause of life-long trauma. Bullying has many psychological effects on the victim. Bullying puts the victim into the psychological trauma. This does not only put the victim into depression, but also ruins the personality of the victim. The victim loses the tendency to deal with the challenges of life. The victim tends to underestimate his ability to handle bullies in any kind of task, because he has failed to deal with them eff ectively once in the past. This shatters the victim’s self-confidence. While the victim has a lot of potential, he is not able to utilize that because of under-estimation of his abilities. Mental scars are much more long-lasting and painful as compared to the physical scars that may be caused by bullying. Mental scars are formed as a result of complete break-down of the reputation, self-respect, and self-esteem of the victim of bullying. Sometimes, bullying inculcates violence in the behavior of the victim. The feeling that he was not able to defend himself against the bully makes the victim over-conscious in his social behavior in the future. The victim tends to interpret everything negatively even if it was not intended by the other party. Thinking that bullying has caused him a lot of suffering in the past, and moved by the urge to not let that happen ever again to him, the victim overreacts in situations where it is not required at all. As a result of this, the victim sta rts losing his respect in the eyes of others and is perceived by the society as an evil person. â€Å"[S]o many children who are bullied turn to delinquent behaviors in an effort to escape the mental anguish that has pushed upon them by a bully† (I Hate Bullies, 2009). While at heart, the victim is not a bad person and the over-reaction is just a measure of self-defense necessitated by years of pain and suffering, he gets his image tarnished in the eyes of the public. Bullying has many physical effects on the victim, particularly when the bully casts physical abuse on the victim. Physical abuse can cause anything ranging from minor scars to death of the victim. Victim of bullying is susceptible to becoming drug addict. Victims of bullying tend to seek refuge in drugs in an attempt to escape the constant feeling of embarrassment and loss of self-esteem caused by bullying. The victim becomes extremely depressed and finds ways to numb the depression, and drugs seem to provide a way out. The victim starts from occasional drug intake, and gradually becomes regular which leads him to the path of drug addiction

Thursday, September 26, 2019

Choose a topic urself for my research proposal in finace .i am doing

Choose a topic urself for my in finace .i am doing mba in finace and i have to submit a for my dessertation.find tha infromation file about this - Research Proposal Example termining the answers to these questions, there is a need for conducting a research study, which may provide the guidelines to the investors while selecting the right stocks. Small-cap, Mid-cap and Large-cap companies show varied performance based on the difference in time-horizons and geographic setting thereby creating discrepancies in the expected/predicted and actual movement in company performance Fisher (1966), Fisher and Lorie (1968, 1970, and 1977) and Ibbotson and Sinquefield (1976) studies are primarily based to determine the long-run returns of different cap companies.2 According to Casey, Quirk & Associates (2006), â€Å"The Small Cap universe has grown much faster than the Large Cap universe.†3 The small cap European companies outperformed the large cap European companies in first quarter of 2006, thereby, continued their six year cycle of out-performance.4 â€Å"Market expects 21% growth in small caps, 16% in mid caps and 10% in large caps.†5 Brad (2006) argued that market capitalization-based indexes signify the clearest explanation of the market opportunity set.6 According to Integrity Research Associates (2007), during the last five years, the small cap companies have outperformed large cap companies and the assets of these companies have grown from $86 billion in 2005 to $102 billion in 2007.7 â€Å"Today, there is a growing demand for managers with a broader small/mid cap, or â€Å"SMID† cap mandate to manage the non-large cap equity portion of a portfolio.†8The mid cap companies outperform the large cap companies because mid cap stocks are flexible, innovative, capitalised, globally diversified and high growth aspects.9 In order to evaluate the impact of the market cap on the performance of the companies, Ibbotson Associates conducted a study, which showed that 94 percent of the 20-year periods from 1976 to 1995, the smallest cap companies performed better as compared to the large cap companies.10Roxy Capital Management, LLC also conducted a

Wednesday, September 25, 2019

Proffecional report on ethical behavior and unethical behavior Assignment

Proffecional report on ethical behavior and unethical behavior articles - Assignment Example It studies what factors make the system ethical or unethical. It also aims to highlight the issues which prevail in the society and how they are effecting the environment and system of any nation. The Global business standard code is a code of conduct based on code of ethics. It helps to understand the regulation of any system internally and externally on ethical laws and codes. It is a principle of 8 codes which focus on responsible practice of ethics in any system. It’s not a one sided plan; but a complete code which applies on both authorities and underworkers. Evaluation and Assessment of the Article Article 1 summery (unethical) The Dowager Queen of Belgium is reported to have evaded 70% of bereavement duties by channeling the finances to her relations through a foundation. The Queen, Fabiola, has been getting an annual public reward from Belgium from the time when the King Baudouin, her spouse, passed away in 1993. The unpleasant incident now causes upheaval given the cu rrent economic state of the bulk of European nations. Like the majority of European states, Belgium has laid down plans underway to cut back on public spending and monarchs within the European states have been criticized for their copious public expenditure. The Queen insists that she wasn’t placing publicly funded payment within the charity. She said that fund â€Å"would only include her private money.† She further claimed that the lone costs that were covered by the payment were housekeeping costs, together with salaries. Belgium wants to cut the annual stipend of Queen Fabiola after political leaders learned she had put up a private charity to provide for her nephews and nieces and for her preferred Catholic foundations after her demise. Premier Elio Di Rupo had told MPs he sought to cut the sum to â‚ ¬923,000 (?776,000) back from â‚ ¬1.4 million (?1.18m). As the only widow of the late King Baudouin – a dedicated Catholic who in 1990 did step aside pro visionally to steer clear of signing the nation's abortion bill – insists the cash came from assets inherited from her Hispanic family. The 84-year-old at the moment maintains that she has had to dissolve the charitable vehicle set up in September that let her to forward monies. The surfacing of the plan not many weeks ago aggravated rare fury in both political and media circles in Belgium and has hit the realm to its foundations. The Property Principle and The Citizenship Principle were not respected by the monarch in her dealings with the state. Evaluation over GBS codex: This is an unethical article over the realities of the story when we see it as a system; evaluating it over Global Business Standards Codes we can classify it as an unethical one. Out of eight components of GBS codes which fit over the story are first The Transparency Principle and Fiduciary principle because being the Queen she has the duty to do charity and help poor whereas it has been reported about he r that she had been ignoring about 70% of the bereavement duties she is supposed to do. She furthermore had been controlling and channelizing the finances to a foundation she made and didn’t announce publicly; which basically is going to benefit her own relatives. All this tells that she had been ignoring the Transparency and Fiduciary principles according to GBS codex. The Queen Fabiola has an annual

Tuesday, September 24, 2019

Triangle Solutions Essay Example | Topics and Well Written Essays - 500 words

Triangle Solutions - Essay Example (Brain, 2011) Triangle Solutions would design this park as such that it would be entertaining for both, the adults and children. The amusement park would be designed on the concept of â€Å"Lord of the Rings†. As amusement parks already exist on the concept of Disney and Harry Potter, other successful stories like â€Å"Lord of the Rings†, should also be given due attention, in the form of an amusement park. â€Å"Lord of the Rings† being a successful story and a trilogy of movies is very well-known by all and it has fans amounting to that of Star Wars and Harry Potter. The plan of the park would be based on the map of places mentioned in Lord of the Rings. The Amusement Park would welcome its customers with the â€Å"Shire†, the luscious green mountains and valleys where the main character Frodo Baggins lived. This place would include going through Frodo’s house, and the small pubs and houses present in the valley. Here, the journey of the Shire would end. Not to mention, that characters like Frodo Baggins, Bilbo Baggins, Gandalf the Grey, Peregrin Took, and Meriadoc Brandybuck would be present too, to give a feel of the Shire. Next would be the Elven forest of Lothlà ³rien, where the Lady Galadriel who took care of Frodo and bestowed him with gifts would be present to welcome the customers. The Fangorn Forest, where Frodo meets the giant talking trees the Ents, would be the next stop to give the park a more adventurous feel, with characters dressed up as these trees. Then the customers would move on to Helm’s Deep, the dark place underground where Sauron’s Orcs would surprise the customers as they surprised the character Frodo Then the city of Minas Tirith would loom in front of the people, the city which was situated on mountainous terraces, and was attacked by Sauron’s forces. Its majestic white towers would be there to welcome the customers as

Monday, September 23, 2019

Auditing Essay Example | Topics and Well Written Essays - 1500 words - 8

Auditing - Essay Example Auditing is the process that involves the assessment of the financial statement of a company to verify whether the contents of such statements comply with the required framework. Auditors are charged with the task of ensuring that the financial statement of the company contains all the information considered as material. In a nutshell, the auditors check whether the content of the financial statement is free of fraud, errors or omission of material information. On that note, an audit risk is the possibility that the auditor will not detect any error, fraud or misstatement of material information when reviewing the financial statement (Thompson & Ward 1993, pp. 2-9). Based on the auditor’s opinions, it is fair to conclude that the financial statements of Mobile Streams PLC present a true and fair financial position. That is; they are free from errors, fraud or material misstatements. However, the auditors should pay more attention to the following three areas of heightened audit risks: foreign currency translation, share-based compensation, and financial income. Based on the financial statement, the company’s foreign currency loss is  £ 1,347. The Foreign currency loss is encountered if the previous spot rate when selling the local currency is higher than the current spot rate when buying the local currency (Annual report: Mobile Streams PLC 2014, pp. 8 & 15). Close to 99% of the company’s revenues are generated outside the United Kingdom. Therefore, a larger part of the company’s operation is exposed to foreign currency risk. Fortunately, there are strategies used to lessen the exposure. However, Mobile Streams PLC does not use any to reduce the risk. The company relies on the prevailing spot rate for transaction purposes. The exchange rates constantly fluctuate. The company could manipulate the exchange rate to reduce the amount of taxable income. Assume that the loss on foreign currency was  £ 690

Sunday, September 22, 2019

How To Stop Violence In Schools Essay Example for Free

How To Stop Violence In Schools Essay We all know there is violence in schools. Like in the past a couple of years there has been many shootings in school and I wonder how we could stop that. We could have a police officer on campus at all times. We could also have a group of students be a crime watch team. But the most important is to have kids be in a non-violent environment at home. If schools would have a police officer there, it would stop most violence because he knows all of the laws. When anything suspicious happened, he could investigate the situation. If he found resulting in violence, he could give the person punishment, so the situation doesnt result in violence. Schools with crime watch teams would probably have a lower violence rate because there would be more people trying to stop violence. The school could have some of the students that get good grades and have them look for violence in schools. The most important way to avoid violence in schools isnt even something at school. The students need to have a non-violent environment at home. They need parents that show positive attitudes because everyone learns from their environment and if its good there more likely to do good things. If its bad theyll probably do bad and violent things. Well now you know some ways violence could be stopped in schools. So spread the information because we dont want any innocent students getting hurt or even dying.

Saturday, September 21, 2019

Tet Holiday Essay Example for Free

Tet Holiday Essay According to our traditional custom, the Tet holiday is the Lunar New Year Holiday – the most important holiday in Vietnam. It is around late January or early February, depends on each year. We celebrate three days beginning of the new year, the first day of new year marks the beginning of Tet . This year, the New Year Day is in January 26th. People will have about two weeks off. Although there are three days which are the main days of Tet but we usually start to prepare much time before. There are many things to do such as clean and redecorate our houses, try to pay all our debts or everything we borrowed before the Tet, buy new clothes and presents for our relatives On this special occasion, everybody wants to return to their families, to where they grew up. The people, who are married, manage to take their families to visit or stay with their parents. Tet is the occasion to everybody gathers in warm atmosphere. We prepare for get-together meals, talk about the good things. People try to avoid arguments, or saying any bad things. There is a funny thing that people try not to sweep their house during Tet, because they believe that sweeping means put the good luck away. We forget all the troubles in past year and hope for a better new year. The first person comes to our houses on the New Year Day, who is called the first-foot is very important. People believe that they will bring our good luck or bad luck for the new year, so people usually choose who will be their first-foot. We spend time on visiting our relatives, friends, colleagues and go to pagodas or temples to pray health, happiness ans success for our families. When coming others’ houses or meeting anybody at Tet, we usually wish each other health, happiness, success and many good things. Children are the happiest at Tet. They are usually received presents, especially little red envelopes with money in as New Year’s Wishes, which people believe that will bring good things to children in the new year. People usually say â€Å"the First Day is Father’s Tet, the Second Day is Mother’s Tet and the Third Day is Teacher’s Tet†. On the First Day morning (New Year Day), after finishing what we have to do in our houses , we go to our parents house to give New Year’s greeting. People who are married manage to visit their parents on the husband’s side on the First Day, and then their parents on the wife’s side on the next day. People usually spend the Third Day to visit their teachers. Tet is time to hold get-together parties.

Friday, September 20, 2019

Anti Virus Uses And Benefits Computer Science Essay

Anti Virus Uses And Benefits Computer Science Essay This report presents antivirus protection, its definition and different types of. It shows how it is important of this program to protect computer. Because attacker spread viruses around the world, people need strong and effective antivirus program to prevent their computers from these viruses. In this report, will be mentioned the idea of antivirus protection types, how its work and which methods use and benefits of this program. Introduction A  computer virus  is a  computer program  that can copy itself and infect a computer. It is also used to refer to other types of  malware, including to  adware  and  spyware  programs that do not have the reproductive ability. In fact, the world has witnessed great development in the computer world and most of businesses have become highly dependent on the computer. Since most computers are now connected to the Internet it is increasing the chance for spreading these viruses which necessitated the presence of powerful software to protect computers from these threats. Antivirus software is a simple tool to use, but it has a large effect. It search on your computer for malicious files, viruses and spyware that are hidden somewhere. Definition and Types of Antivirus The Antivirus (or anti-virus) software is a program that used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. These software scan throw the PC of the computer looking for viruses to remove it before the virus start to damage the computer files. There are different types of Antivirus software that have been developed over the years to keep up with the current virus issue such as Conventional Disk Scanner, Memory Resident Scanners, Behavior Based Detection and Start up Scanners. Some of this software can be run upon the users request and others are designed to be run every time the PC id booted up (types of antivirus). 1 of 4 Top Antivirus There is a lot of Antivirus software, but they are not built with the same power. The most powerful Antivirus software is the Shield Deluxe 2011- Antivirus Protection. This antivirus company protects tens of millions of home and business users across the globe. You can set your computer to update viruses weekly and run a complete virus scan. The system can be restored after malicious activity. It controls the status of the system registry and notifies users of any suspicious objects. The second powerful antivirus software is the Trend Micro Titanium Antivirus 2011. It provides complete and easy to use protection from Internet-threats. Then the Norton Antivirus 2011 come after which provide fast, responsive defense against all types of malicious software. The new Norton Protection System employs a multilayered set of security technologies that work to detect, identify, and block attacks. There is also the Panda Antivirus 2011 which is a good choice for windows that keeps the computer protected from any Internet threats. More over there is the Zone Alarm Antivirus software which is the best virus protection with significantly enhanced detection and removal capabilities. There are also the ESET NOD32 Antivirus and mthe Kaspersky Anti-Virus 2011 which are good on protecting (best antivirus software). How antivirus program work 2 of 4 Antivirus programs are designed to protect computer systems from viruses. These programs provide two levels of functionality when protecting against viruses which are real time protection and scanning of files stored on computer drives or disks (Anti-virus). Antivirus programs can detect viruses by two ways. First way is Footprint of virus program and this method is a common method that used to identify viruses. Footprint is the pattern of data that include file. The purpose of this method is comparing the virus footprint with a library of known footprints that match viruses. Also when using this method, viruses must be as viruses and then added to the library of footprints. Footprint of virus program has a one disadvantage. There is a time period when the virus is released to when the library of known footprints is updated.  Virus will not be recognized during this period and it could affect computer. In addition, Characteristics of program is the second way to detect virus es from computer. This method called heuristic scanning and it examines the actions that the program attempts to take or may attempt to take.  It looks at the type of system function calls that included in the executable code. It looks if this calls too suspicious, may flag the program as a possible virus and ask for user intervention. As footprint method, characteristics of program have a disadvantage which is that there is no time period when the computer is not protected after specific viruses are released (Anti-virus, n.d). Benefits of Antivirus Protection Downloading or buying any antivirus software program give chance for people to buy any desktop or laptop. Antivirus program is the best safe measure to stop and minimize risk and any effects. There are various levels of security protection for PCs and they depend on the particular antivirus program offered by trusted vendors. However, there are many benefits that all antivirus programs offer. First of all, it thwarts any virus that related damage. Any antivirus program helps to prevent damaging operating system and other functionalities of the PC from any virus that PC attached. Second, antivirus program maintains PCs security. This happens by updating antivirus package or creating a firewall to improve a PCs overall security. It helps to keep operation system running and internet resource  accessing and browsing experience. Third, all antivirus programs protect data and information. All information, critical data, presentations, files, documents, photos, and other material stored in the computer are secured from virus attacks infections. Finally, antivirus programs protect financial saving. Any unprotected or less protected PC is easy to attack from viruses. With effective antivirus program that protect the PC, you dont need help from technical support and loss a lot of money (Benefits of Antivirus Protection, n.d). Conclusion In sum up, the use of antivirus program is protecting computers from viruses attack. It helps to prevent data and information to be attacked. Antivirus program is software that installing to computer and use to scan PC to search any viruses can damage the computer. There are different types of Antivirus software that developed to use for production. There are many powerful antivirus programs that built with high quality of protection like Norton and MacAfee. Furthermore, this program can detect any virus by two ways which are footprint and characteristics. This kind of program has many benefits of using, it helps to prevent any virus that related damage to computer maintain CPs security and protect data and information. 3 of 4

Thursday, September 19, 2019

French Revolution :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"What is the end of our revolution? The tranquil enjoyment of liberty and equality; the reign of that eternal justice, the laws of which are graven, not on marble or stone, but in the hearts of men, even in the heart of the slave who has forgotten them, and in that of the tyrant who disowns them.† (Robespiere, On the Principles of Political Morality)   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"... to put an end to the anarchy in the interior of France, to check the attacks upon the throne and the altar, to reestablish the legal power, to restore to the king the security and the liberty of which he is now deprived and to place him in a position to exercise once more the legitimate authority which belongs to him.† ( Duke of Brunswick, Proclamation)   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"The poor man is superior to government and the powers of the world; he should address them as a master.† (Saint-Just, Republican Institutes)   Ã‚  Ã‚  Ã‚  Ã‚  The French Revolution was essentially the pivotal culmination of a rising conflict between two opposing conceptions as to the source by which a governing state derived its authority. During the late eighteenth century an ideology accentuating reason, freedom, and the sovereignty of the common man grew in direct opposition to the accepted dogmas of absolutism and divine right of the monarchy. As illustrated within the three aforementioned quotes, the divergent depth between these two philosophies of government created a void, one which would ultimately lead to the French Revolution and alter the course of Western culture.   Ã‚  Ã‚  Ã‚  Ã‚  Within Robespiere’s quote one is able to observe the aspirations of the Bourgeoisie and peasant revolutionaries; an ideal society of liberty and equality wherein one is as much a subject of the state as the state is a subject of thee. This converging movement towards reasoning and justice grew from the theories of such revolutionary thinkers as Voltaire, Rousseau, and the Encyclopedists, who presented a vision of a liberal community with equal rights and responsibilities, wherein reason replaced the monarch’s claim to divine right as the ultimate authority, and where all men lived in a brotherhood. It must be acknowledged that such influences as France’s severe financial difficulties and the resulting poverty, peasant grievances with such abuses as the seigniorial system, a weak and unstable monarchy under Louis XVI, and the expense of supporting Washington’s army in the New World all attributed to the eventual revolt. However, it was this new ideology set upon equality, justice and freedom, an ideology further fueled by some of the ideas that French soldiers returned with from America, that was the essential keystone which led to the Revolution.

Wednesday, September 18, 2019

AI vs Frankenstein :: essays research papers

Movie: Artificial Intelligence Synopsis: In the not-so-far future the polar ice caps have melted and the resulting rise of ocean waters has drowned all the coastal cities of the world. Withdrawn to the interior of the continents, the human race keeps advancing, reaching to the point of creating realistic robots-called mechas-to serve them. An ambitious Professor succeeds in building David, an artificial kid, the first of its kind programmed to provide endless love for its adopter. David is adopted by Monica as a substitute for her real son, but an unfortunate sequence of events leads Monica to abandon David. Believing that Monica will love him only if he becomes a real boy, David sets off to find the Blue Fairy (from the fairy tale Pinocchio), whom he earnestly believes is the only one with the power to grant him his wish. Explanation: Artificial Intelligence is very similar to Mary Shelly’s Frankenstein in that the underlying themes, questions asked, and moral issues raised are the same. The main idea being appropriated is that of creating life, although not ‘life’ in its usual context referring to living organisms. The ‘life’ created (or rather built) in AI is in fact a mere imitation of life, a mechanical substitute human boy†¦artificial intelligence. In AI, the creation is David, and he bears immediate similarities to the Frankenstein monster. In the book, the monster was to be Frankenstein’s ‘perfect’ human, a soul who knew nothing but love. Ironically, David was programmed to provide unconditional love and also served the purpose of being the perfect replacement of a ‘human’ boy. The desire to aid mankind through scientific and technological advancement is shared by both creators in their respective texts. In the film however, the Frankenstein equivalent is indirectly achieved by another character after David’s initial creation. The Frankenstein role is in fact fulfilled by Monica, David’s adopter (‘mother’), who activates David by ‘imprinting’ him to her. Although for different reasons, both ‘parents’ (mother/father figures) hastily rush the ‘activation’ process without closely assessing the risks and responsibilities of their doings or even realizing the wishes of their creations. Both creators end up abandoning their creations, leaving them alone, friendless in societies where they are both hunted. A woman talking to the Professor in the first scene of the film asks directly: â€Å"if a robot child loves his mother, is she expected to love him back?†-â€Å"Can a robot be loved?† The film maintains the same stance as Mary Shelley’s book by arguing that society is in fact to blame for the mistreatment of David.

Tuesday, September 17, 2019

General Essay on Chinese Religions Essay

Early Chinese religion belongs to the mythical and prehistoric period. Tradition speaks of the origins of Chinese culture lying in the 3rd millennium BCE with the Hsia dynasty. As of yet no historical evidence has been found for such a dynasty; all references to it are mythical. It is only with the Shang dynasty, which is traditionally dated from 1766 to 1122 BCE, that we find evidence of a developing culture and religious practices. The religion of the Shang was principally characterised by the use of oracle bones for divination and the development of the cult of ancestors. It was believed that the cracks that resulted from burning ox bones or tortoise shells represented messages sent from the gods about a variety of matters such as illness, the weather or hunting. Belief in deities and the practice of the worship of ancestors has persisted in Chinese life, and has come to form the basis of what has broadly been termed popular religion. Popular religion in fact represents a mixture of early religion and elements of the three great religions: Buddhism, Confucianism and Taoism. At the heart of popular religion is the worship of deities and veneration of ancestors at shrines in the home or temples. There are many deities associated with this form of religion, but the best known are Shang Ti, the supreme ruler of heaven, and Kuan Yin, the goddess of mercy and protector of women and children. In the Chou dynasty a more structured form of religion developed. This is associated with the teaching of Kung-Fu Tzu (551-479 BCE), whose Latinised name is Confucius. Confucius sought to establish a socio-political ethical system, with theological beliefs concerned with human destiny and the conduct of human relationships in society, based on a belief in the goodness of human nature. He believed in a providential Heaven (T’ien) and in prayer which encouraged him in his mission. He emphasised the five relationships – namely, Father-Son; Ruler-Subject; Husband-Wife; eldest son to brothers; friend and friend – to be expressed by ‘li’ (correct ceremony) to bring ‘he’ (harmony). Such relationships were rooted in family piety which came to give a prominent place to Ancestor Worship and to respect for deified men, which came to find expression in the Sacrifices of the State religion. The Confucian canon can be divided into two parts: the Five Classics and the Four Books. The Five Classics were handed down from earlier times and emphasised by Confucius. These are the Book of Odes; the Book of History; the Book of Rites; the Book of Divination; and the Spring and Autumn Annals. The Four Books consist of The Analects (Conversations of Confucius); the Doctrine of the Mean; The Great Learning; and the Book of Mencius. Out of the teachings of Confucius emerged various schools associated with a master. Notable was the work of Meng-Tzu (c. 371-c. 289 BCE) and Hsun-Tzu (300-230 BCE). Meng-Tzu and Hsun-Tzu formed rival schools whose doctrinal differences were based in a fundamentally different conception of human nature. Meng-Tzu taught that people were fundamentally good and that what made them bad was their environment. Consequently, Meng-Tzu emphasised the importance of education as a means for bringing out the innate goodness of people. By way of contrast, Hsun-Tzu had a more pessimistic view of human nature. Hsun-Tzu taught that people were inherently evil, and that they could only be taught to be good through training. He also was religiously sceptical, teaching that religious ritual had no purpose except to provide moral training. It was this negative attitude towards religion that was one of the main factors behind the subsequent rejection of the teachings of Hsun-Tzu by mainstream Confucianism and the establishment of Meng-Tzu’s teachings as orthodox. At the same time that Confucianism was developing, two rival schools were active in China: the Mohists and the Legalists. Mohism was founded by Mo Tzu (c. 470-390 BCE). Mo Tzu advocated universal love and opposed the elaborate and expensive rituals that defined Chinese religious life. This put him at odds with Confucianism in that Confucianism advocated particular love for one’s parents as well as the importance of ritual for interpersonal relations. Although during the 4th century Mohism was strong enough to rival Confucianism, it went into decline in the 3rd century, and by the time of the unification of China in 221 had virtually disappeared. It is unclear why the tradition declined so quickly. Legalism is more of a political philosophy than a religion. The various strands of legalist doctrine were systematised by Han Fei Tzu (d. 233 BCE). Han Fei Tzu had been taught by Hsun Tzu and adopted his pessimistic attitude to human nature. Unlike Hsun Tzu, Han Fei Tzu did not believe that people could be reformed, advocating instead a strong, even ruthless, form of government that could control human behaviour. Legalist principles were put into effect by the Chin dynasty, which unified China in 221 BCE, and was subsequently overthrown in 207 BCE. The brief rule of the Ch’in had a devastating impact on Confucianism, whose scholars it persecuted and whose books it destroyed. Fortunately for the tradition, Confucianism received official acceptance of the Han dynasty and flourished during the Han period. Under the Han dynasty (206 BCE – 220CE), the T’ang dynasty (618-907 CE), and the Sung dynasty (960-1127CE) Confucian teaching was used for public examinations. In 631 CE the Confucian canon was made the sole subject for the examination of aspirants to official positions, so Confucianism came to be known as â€Å"Ju-chiao†, â€Å"the Doctrine of the learned†. During the Sung dynasty (960-1126 CE) Neo-Confucianism emerged as a distinct movement in response to Taoism and Buddhism. Two traditions of Neo-Confucian thought emerged: the School of Principle, represented by Chu Hsi (1130-1200), and the School of Mind, represented by Lu Chiu Yuan (1139-1193) and, later, Wang Yang Ming (1472-1529). Chu Hsi sought to provide a metaphysical explanation of the nature of reality as well as an ethic for human conduct. For Chu Hsi the basis of all reality was the Supreme Ultimate (T’ai Chi). In order for people to live properly they had to purify their ch’i (vital energy) through taming their desires so that they could be united with the Supreme Ultimate. In reaction to Chu Hsi’s dualistic perception of reality Lu Chiu Yuan presented a monistic picture of the universe. He claimed that the universe and the mind are one. Therefore, through understanding one’s own mind one could understand the nature of the cosmos. This was developed by Wang Yang-ming. Wang Yang-ming believed that individuals could perfect themselves through moral self-cultivation. This involved returning to an original mind whose principal quality was love (jen). Also of ancient origin is Taoism – whose classic text, the Tao Te Ching, is attributed to a supposed contemporary of Confucius (551-479), Lao Tzu. This text has had many interpreters whose works have developed in various sects, some of which have been very influential. There are two streams of Taoism: Religious Taoism, which is represented by the many sects concerned with the quest for immortality, and Philosophical Taoism, which was concerned to explain the human condition. The major imported religion is Mahayana Buddhism which is believed to have entered China in the 1st century BCE. An important early Buddhist teacher was An Shih Kao who founded what came to be known as the Dhyana School, characterised by its emphasis on meditation. Another major early school was the Prajna school whose doctrines were based on the interpretation of the Perfection of Wisdom (Prajnaparamita). It was, however, between the 5th and 8th centuries that Buddhist schools flourished and developed in China. Schools that were active at this time were: San-Lun, Ch’ing-tu, Ti’en-t’ai, Ch’an, Chu-she, Hua-yen, Lu, San-chieh, Fa-hsiang and Chen-yen. The great persecution of Buddhism in the middle of the 9th century led to its rapid decline, and by the time of the Sung dynasty only the Ch’an and Ch’ing-tu schools remained significant. Incursions from the West began at an early date, mainly in regard to trade and commerce from Arabia and India, probably to Canton or Hangchow. Infiltration of a different kind took place under the Mongols (1260-1368), when the armies of Ghengis Khan spread westwards over countries occupied by the Muslims. The records of the Yuan dynasty indicate that many distinguished officials (both military and civil) were Muslims, bringing with them knowledge of Arabic science known to Kublai Khan and the use of catapults in siege warfare. In Ming times Arabic books on science came into the Imperial library. After the Mongol period, no great influx of Muslims took place, but they spread into most provinces of China, especially in the north-west and west (the provinces of Kansu, Szechwan and Yunnan) and in the north-east (in Manchuria and Hipei). They mainly live in their own communities in their mosques and schools. Their first mosque appears to have been built in Sian in 742. Another group attracted by commerce were the Jews who traded across Central Asia, during the T’ang dynasty (618-907), whose communities have mainly been along the sea board in cities such as Shanghai and Canton. The earliest evidence we have of a Jewish community in China derives from a letter written in the 8th century by a Jewish merchant I China. By the 9th century there was a distinct Jewish community in Kaifung, its continued presence evidenced by the construction of a synagogue in the city in 1163. From the 15th century onwards the Jews became increasingly integrated into Chinese life to the extent that by the 19th century the community had all but lost its distinctive identity. As a result of the western colonialism of China in the 19th century and the establishment of new trading contacts with Europe Jews settled in some of the major cities of China. Christianity came to China first by the way of Nestorian Christians, after the arrival of A-Lo-Pen in 781 where it flourished for two centuries (by favour of the imperial court) until the reign of Wu Tsung who closed the monasteries and persecuted the church. It flourished again under Mongol rule in the 13th century, and in 1289 Kublai Khan established an office for the supervision of Christians. At about this time the Roman Catholic Church came to the Mongol empire, when a Franciscan monk came to the Khan’s court of Kharatorui in 1246. Shortly after that St Louis of France sent an embassy, followed by Marco Polo in 1275; a request from Kublai Khan for a hundred teachers did not, however, bear fruit apart from a small Franciscan mission led by John of Monterovino, who was appointed Archbishop in Cantilec in 1289, and under him three bishops were appointed. Then in the 16th century the Society of Jesus became very active in China inspired by the work of Francis Xavier who had preached in India and Japan. Matteo Ricci came to Canton in 1610 and then to Peking, where he founded a Christian community and gained prominence as an outstanding astronomer. From that time the Roman Catholic Church has continued despite periods of persecution. Protestant missions date from 1807 with W. Morrison’s arrival in Canton for the London Missionary Society. Other missions soon followed – with the Presbyterians in 1847, the Anglicans in 1849 and the Methodists in 1850. Also prominent have been the China Inland Mission, under Hudson Taylor – an interdenominational missionary society. In the twentieth century house churches have been prominent, often associated with such evangelists as Watchman Key. These Protestant activists have contributed greatly to educational and medical developments as well as political and social influences from the West; these were often backed by military force and, therefore, deeply resented. Recent changes under Communist influence, led by Mao, have been profound, strengthening agnostic tendencies for many in the population. Traditional religious practices are still continued in many homes in China and among overseas Chinese. In recent times relaxation of restriction has given fresh opportunity for religious activity. Many Taoist and Buddhist temples, as well as mosques and churches, are being renovated and reopened. Greater openness to the West has been accompanied by renewed conversion to Christianity; the demise of communism has encouraged the rediscovery of traditional religious values. Taiwan has provided an important haven for traditional Chinese religions, as well as the establishment of new religions, since the Nationalist government established itself on the island in 1949. A number of syncretic movements such as San-I-Chiao (â€Å"Three in One Religion†), were suppressed in China following the Communist victory, but have found a haven in Taiwan. Other interesting traditions that have been transplanted to Taiwan are those which are collectively designated the Hsien T’ien Tao (â€Å"Way of Former Heaven sects†). Five of the best known of these are the I-kuan Tao, the T’ung shan She, the T’ien-te Shang-chiao, the the Tao-yuan, and the Tz’u-hui T’ang. These are characterised by a belief in a creator deity (usually a cosmic Mother figure) from whom humanity has strayed. These sects also claim to transcend all other religions and, therefore, provide a way by which all these religions can be united. All but one (the T’zu-hui T’ang) were founded in mailand China, later moving to Taiwan. The T’zu-hui T’ang was itself founded in Taiwn in 1949. Also originating from the mainland are the spirit-writing cults. These are cults which derive religious beliefs and practices from a deity mediating through an entranced medium. The practice of spirit writing has been a part of Chinese life probably since the T’ang dynasty (618-907). In the 19th century a spirit-writing movement developed in China and entered Taiwan in the same century. This continues to be part of the Taiwanese religious landscape to the present day. There are, of course, a number of recently emerged distinctively Taiwanese movements. Xuan Yuan Jiao (â€Å"Religion of the Yellow Emperor†) was founded in Taiwan in 1957. Xuan Yuan Jiao represents the attempt to recapture the spirit of pre-Han Chinese religion through incorporating Taoist, Confucianist and Mohist teachings and interpreting these as emanating from a tradition that derives from the Yellow Emperor. The religion is highly political in character since its purpose is to revive China’s national spirit following the â€Å"loss† of the mainland to communism. Buddhism continues to flourish in Taiwan. Following the Communist victory in mainland China in 1949 a further wave of Buddhist monks arrived in Taiwan from the mainland. This has strengthened the presence of Chinese Mahayana Buddhism in the island and influenced the character of earlier traditions. Since 1950 the Buddhist Association of the Republic of China has been the focal point of Taiwanese Buddhism. This is responsible for ordination ceremonies for Buddhist monks, nuns and lay people. In more recent years Taiwanese Buddhism has adopted a more missionary approach both within Taiwan and abroad, particularly in North America. In the 1960s two important Buddhist organizations emerged: the Tzu Chi Compassion Relief Foundation and Fo Kuang Shan. The first of these was founded in 1966 by a self-ordained nun named Cheng-yen. This organization has sought to introduce a strong degree of social concern into Taiwanese Buddhism. Fo Kuang Shan’s origins can be dated to 1967 when when a Chinese monk, the Ven. Hsing-yun, opened a temple at Fo Kuang Shan in Southern Taiwan. Like the Tzu Chi Compassion Relief Foundation, Fo Kuang Shan emphasizes social action as a means to promote Buddhist values. More recently, Ling Jiao Shan in the north of Taiwan has become a centre of Buddhist activity. Founded by Master Hsin Tao, Ling Jiao Shan has acquired prominence within Taiwan and beyond on account of its establishment of a museum of world religions with branches in Taiwan and the United States.

Monday, September 16, 2019

Cause-Effect Essay* Causes of Divorce

You know that divorce is more common nowdays, but do you know the causes? According to the statistics offered by INEGI in a survey practiced in 2005, 70% of the couples who get married take the decision of getting divorce. There are many reasons why they make yhis decision, but there are three main causes which are lack of communication, financial issues, and abuse. Lack of communication is one of the main causes of divorce.A marriege is on the rocks when the lines of communication fail. You cannot have an ineffective realtionship if either one of you does not discuss about his/her feelings, cannot talk about his/her mutual or personal issues, and expects his/her partner to guess what the whole problem is about. Another cause of divorce are financial issues. Money or aspects related to ot are of course a possible cause of disagreement between couples.Married couples could squabble over such issues as shared financial responsibility, unequal financial status, undisclosed financial sta te, over spending, and lack of financial support. The last cause of divorce are the ways of abuse. This does not just include intentional and habitual phusycal abuse. It may also come in the form of sexual abuse and emmotional abuse. One partner may actively seeks to degrade his/her partner through harsh language.Drug and alcohol make the person so violent; in addition, there may be no physical or verbal abuse, but the other partner would understandibly have a difficult time managing finances and daily life with an addicted spouse. Now we know that lack of communication, financial problems, and violence are the main causes why people get divorce. May be you should considet living in free union for a short time before you get married, by doing this, you can meet your partner well. It is not the best option, but if you are really in love, you can get married without any problem.

Sunday, September 15, 2019

Lord of the Rings: Fellowship of the Ring Summary

Lord of the Rings: The Fellowship of the Ring The Fellowship of the Ring is the first book in a trilogy of books. The main character is Frodo Baggins. Frodo is one of many unusual creatures that are not heard of normally in books called Hobbits. Hobbits are quiet, peace-loving, simple creatures. They enjoy leisure activities and generally do not like to take risks or go on adventures. Hobbits who like to do such things are looked down to by society, and are generally considered queer-folk. And this is a story about one of those hobbits and his friends. The story starts off at Bilbo and Frodo’s birthday party, Bilbo is Frodo’s uncle. Bilbo had built up a reputation of being queer, and having gold hidden in his home. He had previously gone on an adventure in the book The Hobbit. In the book, Bilbo finds a ring, a ring that later he finds, holds magical properties. And when he feels the need to go on one last adventure and leave the Shire all together, he disappears at the end of his party, leaving the ring to Frodo. â€Å"Even the smallest person can change the course of the future. –Galadriel, elf queen. Gandalf, who is a wise wizard who accompanied Bilbo on his adventure in The Hobbit, fills Frodo in on what needs to be done to the ring, and that he needs to leave the Shire, possibly forever. Frodo is accompanied by: Samwise Gamgee, Frodo’s best friend; Peregrin Took, also known as Pippin; Meriadoc Brandybuck, also known as Merry; and later on is joined by Aragorn, a ranger who is known as Strider; Lego las, an elf friend of Aragorn’s; Gimli, a dwarf who befriends the group; and Boromir, a man from Gondor. They travel from the Shire to the lawn of Parth Galen, which is where the Fellowship separates. Pippin and Merry are captured by a battalion of Orcs, which Aragorn, Legolas, and Gimli follow in pursuit. Boromir falls trying to protect the two hobbits, and Frodo tries to escape to go to Mordor alone, but Sam follows him and soon Frodo is glad to have him along. Gandalf had died fighting a Balrog in Moria. Frodo changes from being light-hearted and spirited to dark, and serious. The ring starts to change him, and it starts to be a burden to carry. He is constantly tempted to slip it on in times of danger. And he soon finds out that he cannot trust anyone. This book was banned and challenged, because of the black magic, and the idea of good versus evil. Personally, I do not think it should be banned or challenged. It really doesn’t have anything that stands out to me as something that no one should read, or even be restricted. I see no problem with the ideas of magic and good versus evil. This book is such a good read. The story is very thorough and detailed, giving the reader a clear image of what is happening. This book is valued as entertainment, and an adventure to experience. I loved the book, I thought it was a great read and would recommend it to anyone who loves fantasy, and who loves adventures, because that is what it is, a fantasy and an adventure. The ending is a major cliffhanger! It draws you in and leaves you begging for more, therefore I am going to start the sequel as soon as possible.

Saturday, September 14, 2019

Virtual teams

Any team whose members are not all physically under the same roof can be considered to be virtual, as long as the participants have complementary skills and knowledge that produce greater value when they work together than if they worked separately. A virtual team can be local, national, or global, with members from one firm or many. Teams can be made up of full-time, in-house practitioners or full- or part-time contractors.They are enabled by technology, which allows members to work from anywhere in the world with phone, Internet, and wireless access as long as hey produce work that meets the firm's and the client's standards of quality, and the client's deadlines. Social changes in the workforce are leading more and more employees to demand more and more control over how, when, and where they work. The result, which is gaining increasing traction, is a rise in lifestyle-driven virtual teams. 2417? Running to Gate 9? Who needs them.Especially when forward-looking employers can accom modate the needs and wants of talented, ambitious employees by creating lifestyle-driven virtual teams. This author describes how professional services firms hat can make this approach work will make them employers of choice. In recent years, professional services firms have watched as more and more senior talent, especially women with children, have left their employ. Many of these valued practitioners are not Jumping to other companies or starting up competing agencies.Rather, they are walking away from their careers (and in many cases high salaries) because their employers are unwilling or unable to provide them with the flexibility they need to balance their work and family lives. The decision is rarely an easy one, nd many women would have welcomed the opportunity to remain in the workforce if truly flexible options had been available. To stem the exodus, keep top talent, and remain competitive, professional services today must meet an imperative: They must create new arrangeme nts to accommodate talented practitioners who need more choice when it comes to how, when, and where they work.They must consider ways to ensure that working parents (especially women) do not have to work long hours or travel extensively, but instead have the flexibility they need to raise a family or care for aging parents. And with Canada expected to experience a labor shortage that could begin affecting employers as soon as 2020, having these new work arrangements in place will become increasingly essential to the delivery of high- quality professional services. This article will examine how adopting a virtual-team model can help organizations attract and retain that top talent.The article will first define virtual teams and explain why they are on the rise. It will then outline the various benefits of virtual teams (for both employers and employees) and look at some of their unique challenges. Finally, the article will outline best practices for esigning and implementing new wor k arrangements. VIRTUAL TEAMS DEFINED VIRTUAL TEAMS ARE ON THE RISE The popularity of virtual teams is being driven by social change. Women now constitute nearly one-half of the North American workforce, and in nearly one-half of households, all adults are working.As well, more working adults are pursuing educational opportunities to advance their careers; they therefore need the flexibility that a virtual arrangement provides. [l] When I was in the process of building my PR agency in 2008, I witnessed this social change first-hand and realized many senior omen were caught in an unnecessary and intractable dilemma: how to pursue a fulfilling and meaningful career while meeting the demands of their personal and family lives. I spoke with dozens of senior women in the industry who were torn between the need to put in long, billable hours at their offices and the need to tend to matters at home.Some told me that they sacrificed family time by hiring nannies and placing their children i n daycare. Others made career-limiting moves such as working four days a week or turning down promotions that would mean longer hours. And some of them left the workforce entirely or switched to less demanding careers because they were unable to balance their work and personal lives. Many women also told me they wanted to avoid lengthy, stressful commutes because of the time they took away from time spent their families.They talked about scrambling for childcare when a child was home sick from school or they had to work later than expected, and described missing important school functions and other milestones in their children's lives. Some also said they were frustrated by the traditional approach o â€Å"flex-time,† whereby practitioners work four out of five days, at a reduced annual salary. With this approach, five days' worth of work is often completed in four, which can actually add to workplace stress rather than reduce it.Talent is everything in professional services, and successful firms know that flexible work arrangements make them more attractive to a wider range of professionals. Recent studies have shown that flexibility is a growing trend. A 2011 U. S. study showed that the number of employees who principally work from home grew by 61 per cent between 2005 and 2009. 2] Two years earlier, Aon Consultings Benefits and Talent Survey reported that 97 per cent of organizations either planned to increase or maintain their use of virtual teams. 3] AN EMERGING APPROACH: LIFESTYLE-DRIVEN VIRTUAL TEAMS Once considered a way for companies to reduce overhead, the popularity of virtual teams is now being increasingly driven by employee demand. This is especially true in professional services firms, where both full-time practitioners and part-time associates or consultants are becoming more vocal about their desire to have approach to flexible workplace arrangements – a lifestyle-driven one that rewards esults over face time, so practitioners ca n maximize the time they devote to their personal lives.These lifestyle-driven virtual teams may not be a realistic option for all industries, or even all professional services firms, for example, those consulting firms that require staff to travel or be on site to meet with clients. However, the model can work for most professional services firms because much of their work is knowledge- based and often performed by individuals. As a result, it can easily be transferred to a home office with the right planning, processes and project management in place.When implementing this model, firms must also remove the focus on billable hours, and instead focus on the number of hours each associate wants to work – while planning project resources and compensation accordingly. This differs from the traditional model in which each practitioner must focus on billable-hour targets. For practitioners, there is some risk involved in using the virtual model, as they are not guaranteed a regula r pay cheque. Experience has shown, however, that some part- time practitioners who are compensated hourly actually earn more than they did as alaried employees, even while working significantly fewer hours.This is particularly true of practitioners whose quality work and outstanding client service make them an obvious choice for recurring account management roles and back-to-back projects. VIRTUAL TEAMS BENEFIT EMPLOYERS AND EMPLOYEES EQUALLY In a 2010 study, 80 per cent of respondents said they were part of a team based in various locations, while 63 per cent indicated that nearly half their team members were located outside their home country. 4] Supported by technology, practitioners are able to be as efficient and engaged as they have ever been while keeping far reater control over their work schedules and environments. The traditional billable- hour-driven agency model often requires practitioners to work 60 or more hours a week. However, the lifestyle-driven virtual model per mits practitioners to be selective about their hours and often their projects, naturally making for a happier, more satisfied, and less-stressed practitioner.A company that can offer this kind of flexibility will find itself with better options when it comes to hiring and retaining talent, especially individuals with specialized knowledge and skills. This arrangement, hich encourages true balance, will also create more well-rounded employees who will bring their varied experience to projects and who will be motivated to remain in the workforce. Many practitioners will also find the benefits of this model Just as important as incentives such as paid vacation time, health benefits, and pension contributions.Indeed, it is hard to put a price on this type of flexibility. With the ability to bring on skilled team members when needed, professional services firms are better able to handle peak workloads, project work, and short-term assignments. For any particular project, they can hand-pi ck key team members from their roster of talent, regardless of where the individual is based. This means they can usually offer clients their â€Å"A team,† not whoever happens to be available.With infrastructure in place for teleconferences and other online collaboration, travel and other overhead expenses are reduced, if not eliminated. Margins improve accordingly and, most important, firms are able to offer a more family-friendly structure that attracts top talent who want to add balance to their working lives and still have a fulfilling and erformance is crucial to securing future projects. As a result, everyone is motivated to do their best and to collaborate effectively with other team members to produce quality work and results.ATTRACTING AND RETAINING A MULTIGENERATIONAL WORKFORCE For many practitioners, particularly those who embrace the philosophy that â€Å"work is something you do, not somewhere you go,† the increase in virtual teams is a welcome developmen t. This applies to the future workforce, too. A recent study by Dr. Alison Konrad[5] of the Richard Ivey School of Business found that undergraduate business tudents in her class (most of them women in their early 20s) yearn for a meaningful career that allows them to contribute to business and society while maintaining balance in their lives.In the study, students were asked what an employer could do to make their chosen career more attractive. The most frequent responses were flexible hours, the ability to work from home, no face time, and a family-friendly culture. Surprisingly, these are many of the same characteristics sought out not only by working parents but also by people nearing retirement and wanting to slow down heir schedules. Professor Konrad's study shows that employers who most closely meet the lifestyle demands of a multigenerational workforce are in the best position to attract and retain the most desirable talent.Executives must fully support the virtual structure and be aware of the potential challenges of managing a virtual team. They should consistently monitor the team's progress to ensure deadlines are being met and budgets are on track. 2. Choose the right team members. Individuals should be selected with a view to forming a successful team. Not all practitioners will thrive in a virtual environment. Those who are self-reliant and self-motivated will fare best. 3. Set expectations from the start. Articulate objectives and define team member roles up front to avoid the possibility f overlooking or duplicating aspects of the work.This is especially important given the geographical distance between members of a virtual team. 4. Implement strict protocols. Establishing protocols will ensure that each team member knows when and how quickly to respond to action items, and will determine the steps to take when a team member fails to do so. Team meetings should be run by a strong chair. People should be prompted to give their opinions as oppos ed to volunteering them. Digressions should be discouraged as they tend to disengage other team members. Multitasking during meetings should be prohibited. . Use proven processes.Teams need processes that govern the way they work and how the work will get done, from being aware of individual responsibilities and decision-making procedures to the consequences of poor work or missed deadlines. Virtual teams have little margin for error when it comes to project management, as problems can go unnoticed and grow into major issues. 6. Manage timelines and budgets carefully. Often a project budget will dictate the number of hours that can be charged to a client. Because freelance practitioners are paid according to the time they take, budgets can easily e exceeded if not properly monitored. . Establish meaningful project milestones. Milestones should be implemented to chart a project's progress and act as checkpoints for the timeliness and quality of virtual team work. 8. Encourage interac tion. Leadership must ensure that team members have some mechanism by which to develop strong working relationships. They should also bring team members together by organizing social functions every few months to help them build rapport. 9. Communicate more efficiently. Virtual teams can be connected by various technologies, including phone, email, instant messaging, as well as video and eb conferencing.Use more than one of these options so team members can choose the technology theyre most comfortable with. In addition, more communications do not necessarily mean better communication. Too many emails can lead to convey only relevant information, and to do so clearly and consistently. 10. Minimize team conflict. Although conflict can lead to better ideas and solutions, conflicts within a virtual team should be dealt with immediately, because they can escalate quickly. Virtual teams do not build rapport as easily as other teams, and managers may have to become more involved in confli ct resolution.

Friday, September 13, 2019

A Discussion on Iron Deficiency

A Discussion on Iron Deficiency To be honest, I’m quite shocked that despite the very fact that iron deficiency is seen thus oftentimes, amazingly few individuals grasp pretty much concerning it. First of all, whats iron deficiency? because the name would counsel, it means the body doesn’t have enough of the mineral, iron, to try and do it’s job properly. Generally, the primary proof of this is often an occasional haemoglobin level, which suggests that the body doesnt have as several red blood cells because it is meant to own, or the quantity of haemoglobin in them is low. Not enough red blood cells or haemoglobin is termed anemia. Since there area unit variety of causes of anemia, tests area unit then run to rule out the a lot of frequent ones, and if they are available back with an occasional protein level (a check of body iron stores), we all know that theres a deficiency of iron, and that we decision the condition iron-deficiency anemia. Why is that this important? the work of your red blood cells is to move O from the lungsto each single cell within the body. thus if there’s not enough haemoglobin, then basically we’re depriving our bodies of O. O is important for life; its wont to convert fuel (food) into the energy required for each perform within the entire body. thus low haemoglobin = low O = suboptimal activity in each cell. Is it any marvel that symptoms of iron deficiency embrace fatigue, weakness, dizziness, issue concentrating, and a bunch of alternative potential problems? And what causes iron deficiency? Since iron is thus crucial for all times, the body doesn’t surrender th e mineral simply. the first reason for a deficiency is blood loss: menstruum, blood donation, injury, and gi hurt, which can occur with regular salicylate use or ulcers or for variety of alternative reasons. accumulated blood volume will increase desires for iron: pregnant ladies, athletes, and youngsters and teenagers having a growth spurt all have bigger blood volume and consequently have higher desires for iron. Another reason for iron deficiency is reduced absorption. There area unit some conditions which can cause reduced absorption, like Crohn’s or celiac disease; enteric surgery like viscus bypass; or taking medications that scale back abdomen acid, that is required for iron absorption. Another one, which can in all probability surprise, is high consumption of tea. Not coffee, just tea. All teas, black or flavoring, with the exception of Aspalathus linearis and Honeybush, contain tannins, and tannins interfere with iron absorption. As funny aside, throughout the time after I was learning bioscience in Washington, DC, my father was diagnosed with a iron deficiency anemia; he was shuttled around between doctors and blood specialists to undertake and puzzle out the reason for the deficiency to no avail. after I later detected of the case, the primary issue that popped into my mouth was â€Å"dad! You drink such a lot tea, after all you’re iron deficient.† He would simpl y drink 8-10 tiny (6oz) cups of tea throughout the day frequently. afterward day, he created a degree of not drinking tea for a time unit before or associate hour once his meals, and has not been anemic since. Finally, what does one do if you have got associate iron deficiency? you would like to dine in such some way that initial, youre overwhelming a lot of foods with iron, and second, that you just area unit increasing it’s absorption. Iron from animal sources is absorbed higher than iron from feeder sources. a number of the simplest animal sources embrace clams, liver, oysters, lean beef and turkey (dark meat). Of feeder sources, the simplest embrace soy merchandise (tofu, soybeans), white beans, lentils, fortified breakfast cereals, and roast pumpkin and Sesamum indicum seeds. To enhance absorption from feeder sources, its best to incorporate a supply of antioxidant within the same meal, as this victuals converts the iron to an improved. Examples embrace citrus fruits and juices, strawberries, bell peppers, kiwi, and lots of others. Another tip to urge a lot of iron in is to cook in forged iron kitchen utensil. particularly once you’re preparation one thing acidic (like p asta sauce), iron is leeched out of the pan into the food. Instant iron-fortified food! So iron is clearly necessary, however that actually doesn’t mean that everybody ought to begin supplementing his or her diets with iron. As i discussed before, the body doesn’t wish to get eliminate iron, thus if you’re not in an exceedingly deficiency state, taking associate iron supplement will simply cause iron-storage disease and toxicity. So, if you’re taking a multivitamin pill, it’s in all probability an honest plan to require one that doesn’t embrace any extra iron unless you recognize you would like it.

Thursday, September 12, 2019

Nursing -Activity homework Essay Example | Topics and Well Written Essays - 1250 words - 1

Nursing -Activity homework - Essay Example 345). Depending on the condition of the patient, monitoring should be either continuous or intermittently. Bubbling and swinging are assessed with the patient’s respiration. In normal respiration, the fluid within the tube rises with inspiration and falls with expiration (Paul and Williams, 2009 p.45). Absence indicates that the tube is blocked, or it is out of the pleural space. Intermittent bubbling in the water seal chamber shows an air leak when the patient coughs or exhales. Continuous bubbling indicates air leak between the patient and the drain. Volume, color and consistency of the drainage are monitored (Smeltzer et al., 2010, p. 234). The drain insertion site is also assessed for signs of infection and inflammation. The sutures are checked if they are intact and secure and that the dressing is clean and intact (Smeltzer et al., 2010 p. 252). The rationale for clamping the chest drain is to reduce the risk of tension pneumothorax. Smeltzer et al., (2010 p. 252) recommend disconnection of the chest drain in the case of sunction or the patient are ambulant. However, during the transport, the chamber should be kept below the patient’s chest level to enable draining (Smeltzer et al., 2010, p. 123). This allows gravity drainage and prevents backflow of fluid. However, Paul and Williams (2009, p. 13) suggest that clamping can also be done when the drainage bottle requires a replacement or to locate any air leak in the drainage system. Therefore, the suggestion that chest drains should only be removed when the patient is to be moved is false. If the water in the chest tube was—swinging but not bubbling or draining it means the air has been removed from the pleural space but that the pneumothorax has not resolved. When bubbling initially stops this should be further assessed by instructing the patient to cough. When monitoring for the patient with chest pneumothorax the bubbling shows the presence of air in

Week-3 Essay Example | Topics and Well Written Essays - 250 words

Week-3 - Essay Example The reason as to why I enjoy doing this is to analyze how the court interprets the law, therefore gaining an understanding on how the criminal justice system in United States of America operates. One of the jobs that I don’t enjoy doing is collecting fines, fees and forfeitures from convicted individuals. On this note, while carrying out my duties, I always work on the interesting things first. This is for the purposes of motivating me, and improving my morale so as I may work effectively on the uninteresting job that lies ahead. These interesting jobs are easy for me to handle, this is because I enjoy doing them. On this note, the first tasks accomplished during my work rounds are the easier tasks. However, during the process of my duties, there are always urgent matters and important matters (Carroll, 18). For instance, a magistrate might request for a filed case law for purposes of relying on it to make a decision. This falls under the category of an important matter. An example of an urgent situation is when there remains some few minutes to the closing of government offices, and yet a suspect wants to pay fine in order to gain his or her freedom. Failure to pay at the moment, might result to him or her spending some another day in prison. This is an urgent matter, and as an intern clerk, I would work on the urgent matter first and the concentrate on the important matter because there is sufficient time to handle the issue. Regarding on an important matter, there is no need of waiting for the deadline to approach before working on the issue (Carroll, 13). For instance, as soon as a magistrate requires a file on a previous judgment, it is my duty to look for the file and give it out as soon as possible. This will save my time, and allow me to engage on other duties. On this note, the best way to manage my time is to start by working on the interesting tasks, and thereafter move to

Wednesday, September 11, 2019

Humanities Ethics Coursework Example | Topics and Well Written Essays - 1250 words - 2

Humanities Ethics - Coursework Example Application of this understanding is equally to restate that human sexuality is to exhibit divine purpose that justifies why it is immoral to engage in sexual activities without the slightest intention and obligation to deliver the finality of the act. In other words, sexual activities are only mandated to be used for purposes of procreation. This one and the only end desire as evinced by the moral discourses. It is explained that only people in marriage that have the absolute authority of giving birth to offspring. Reproduction is essential in human life for the extensions of lineage (White 264). The family owns the moral objective ensuring that human beings multiply to fill the world as stated in the bible. The declaration does not however provide adequate information on giving birth to offspring outside the wedlock, but rather offers a poignant illustration on the danger of having children outside binding relationships that are sanctioned and approved by the society. For instance, if premarital sex can be used to raise offspring then there is a huge possibility that the family as a unit and a value will crumble (White 263). There will be immoral binding between such couples hence families will disappear and no one would take care of children. Sexual activities must therefore be for purposes of achieving the moral finality bestowed upon such an act, and this finality is procreation or reproduction. Other sexual engagements like homosexuality, pre-marital sex, masturbation are immoral since they do not possess any bit of the sexual moral teleology. They are meant simply for entertainment and recreation hence not justified by a moral discourse. There is no form explanation that can support sexual engagements outside marriage since they are not only valid for such important engagements b9ut most of them lack the ability to do so. It is immoral and unjustified by any available moral discourse. They do not meet the expectation of sexual activities as important and divine act given by the most high. 2. Explain the two sides of the debate regarding homosexual marriage and traditional heterosexual marriage, citing arguments both for and against. Which side appears to carry the weightiest arguments? Why? In a balance of acts, the society has undergone extremely severe changes. Many issues have not only cropped up, but they have delivered with them â€Å"moral justifications† for the respective acts. A huge proliferation of sexual acts has made the society succumb to a state of confusion. Many people are engaging in sexual activities such as homosexuality and masturbations. Homosexuality has gone to an extent of being integrated and accepted as a normal sexual act, hence people engaging in such kind of sexual activities should not be demonized or punished. In one way, this reasoning may be right because all human beings have the natural rights and freedom. They also have the constitutional right of liberty hence things that they do in thei r private lives should not be used against them as long as such acts do not affect others or those around them (White 274). On the other hand, these acts beat the logics of sexual morality. They do not see sexual engagements as unique phenomenon that is only entitled to provide the medium of reproduction or procreation. They defy the holiness that the religious moral emphasize in many occasions. Most of the religious mor

Tuesday, September 10, 2019

Legal advice ( case study) Study Example | Topics and Well Written Essays - 1250 words

Legal advice ( ) - Case Study Example This will include statutes and regulations that specifically define the use of such exclusion clauses in a contract. There are two situations involved in this case that would impact on the contractual obligations of Harpreet. The first involves the agreement between the hotel and Joseph and Rebecca. Their contract already involves Harpreet having received the monetary deposit. The cancellation of the wedding reception would, first and foremost, pose the question of whether Harpreet would be obligated to return the deposit given by the couple. In the second scenario, the question posed would be the liability, if ever, of Harpreet for the damage to one of the hotel guest's cars that was parked there. Let us first tackle Joseph and Rebecca's situation. The doctrine of frustration operates in situations where it is established that due to a subsequent change in circumstances, the contract is rendered impossible to perform, or it has become deprived of its commercial purpose by an event not due to the act or default of either party1. In Taylor v Caldwell2 Blackburn J stated that ""The principle seems to us to be that, in contracts in which the performance depends on the continued existence of a given person or thing, a condition is implied that the impossibility of performance arising from the perishing of the person or thing shall excuse the performance." In this case the reception did not push through without the fault of either of the contracting parties. Both Harpreet and the couple have already partially performed their obligations under the contract with the former buying flowers, decorating the room and looking for a particular wine while the latter paid the deposit. So on t his point, Harpreet no longer has any contractual liabilities to Joseph and Rebecca since the non-holding of the reception was not the hotel's fault. The second scenario requires a more elaborate understanding of contract law. Julie's success in demanding for compensation from Harpreet for the damage to her car would depend on, 1) the exact terms of the contract she entered into with the hotel when she booked a stay there and 2) the validity of the general exemption of the hotel for damage to cars at their parking lot as shown by a sign that was posted there. Furthermore, clauses that exempt a party from liability must pass the test of incorporation, reasonable notice and construction or interpretation. On the first point, contract law is based on the fundamental principle of party autonomy. This means that the parties to a contract are free to modify the nature and extent of their liability under the contract if they so wish on the assumption that the parties have equal bargaining power. It is not so obvious from the facts given whether the hotel contract itself stipulates for an escape from liability for damage to hotel guests' cars at their parking lot. We can safely assume that the sign in the parking lot warning car owners that they park at their own risk would refer to those persons who do not stay at the hotel but rather are mere transients. Going back to Julie, the contract that she signed with the hotel when she checked in contains all the stipulations that govern their contractual relationship. Should this