Wednesday, December 25, 2019

The Pros And Cons Of The Fourth Amendment - 1031 Words

The Fourth Amendment is the right for people to be secure in their homes, papers, and effects against unreasonable search and seizure. The amendment also states that warrants will not be issued unless they are issued under probable cause. This amendment is the biggest factor in the case of Omaha Herald v. Police, however, this case cannot as easily be defined by the Fourth Amendment can be and there are arguments and cases which can be made for both sides. In favor of the Omaha Herald: The Privacy Protection Act of 1980 protects journalists from being required to turn over to law enforcement any work product and documentary materials, including sources before it is disseminated to the public. Journalists who most need the protection of†¦show more content†¦So, according to this case in this scenario, the police are in the wrong. The police are not allowed to issue a warrant to search for evidence because O’Riley isn’t suspected of criminal conduct nor is anyone at the Omaha Herald. In favor of the police: In the 1987 case of Maryland v. Garrison, Garrison was convicted of violating Maryland’s Controlled Substances Act and Maryland filed and received a search warrant. However, the warrant only stated the premises known as 2036 Park Avenue third floor apartment but there were two apartments on the third floor. Before the officers executing the warrant became aware that they were in a separate apartment occupied by defendant, they had discovered what they needed for convection. Garrison sued claiming that the seizure was prohibited by the Fourth Amendment. However, the court ruled that the warrant was valid when it was issued and the way it was executed was reasonable. The validity of the warrant was assessed based on the information the officer disclosed and the fact the warrant was reasonably executed as stated in the warrant itself and was within the realms of the Fourth Amendment. Taking this into account would mean that since the warrant was reasonably served to Chester O’Riley and then also reasonably executed, and the officers only obtained what was pertained to their investigation The 1972 case of Branzburg v. Hayes, Branzburg, one of the petitioners, observed the making of hashish from marijuana and wasShow MoreRelatedThe Fourth Amendment Of The United States Constitution1327 Words   |  6 PagesThe fourth amendment to the United States Constitution is part of the Bill of Rights, and was introduced to Congress by James Madison in 1789. The role of the Fourth Amendment is to prohibit unreasonable search and seizure and a warrant is to be required that is supported by probable cause. Even though the Amendment was introduced in 1789, it wasn’t adopted as an official amendment until 1792, because in December of 1791 three quarters of the states had ratified the amendment. The fourth amendmentRead MoreThe Decision Of Purchasing Drones For The Purpose Of Local Law Enforcement952 Words   |  4 PagesFlorida. There are several pros and cons on this issue. Some of the pros and cons revolve around money, time, and the issue of individual rights. A drone is â€Å"an unmanned aircraft or ship guided by remote control or onboard computers.† (Merriam-Webster). It is also â€Å"beyond [the] line of sight: the GPS of a U.S. spy drone.† (Dictionary.com). The issue that will be continuously brought up will be the right of privacy. Will the usage of drones violate the Fourth Amendment? It can be a violation if abusedRead MorePros And Cons Of The Exclusionary Rule1017 Words   |  5 Pagesabout the pros and cons of the exclusionary rule, how it is effecting the criminal justice system of the United State. In addition, I will speak and summarize the case of Pennsylvania Board of Probation and Parole v. Scott from 1998, this will be a great example of the exclusionary rule and the effects about them. Furthermore, I will show how this case was important with the Exclusionary Rule, and my opinion on the matter. Arguments are powerful in the United State on the pros and cons of the exclusionaryRead MoreAbortion Must Be Legal Essay1211 Words   |  5 Pageslegalized. It’s not a question of morality or what the bible says to do. It’s not possible to determine someone’s morality; everyone has different versions of what is right and wrong. If abortion becomes illegal then the Fourth Amendment, Fifth Amendment, Ninth Amendment, and Fourteenth Amendment are being violated, because the right to privacy would be demolished. There are many people who say that the ricks or abortion should keep abortion from being legal. It’s true that there are ricks in having an abortionRead MorePros And Cons Of The Patriot Act1304 Words   |  6 Pagesaccess to certain financial information without the individuals consent. There has been a lot of controversy over the act, because some say it is a violation of their Fourth Amendment right. This research will show some of the pros and cons and why the USA Patriot Act is necessary to protect the lives of Americans. The Pros and Cons of the USA Patriot Act The USA Patriot Act was passed by the Senate October 25th, 2001 right after the terrorist attacks on the World Trade Center on 9/11. The PatriotRead MoreHow Drones Have Becoming Serve And Protect The Lives And Safety Of The Community816 Words   |  4 Pagesobjects are a major technological advancement and can ultimately help law enforcement to better serve and protect the lives and safety of the community. But as we all know, technology advancements come with many pros and cons, some of which will be discusses further in this paper. Pros An article in the Baltimore Sun, â€Å"Eye’s in the Sky†, describes three public policy reasons that would support the use of drones by law enforcement. Three main reasons why law enforcement supports the use of dronesRead MoreThe Amendment Of Food And Public Safety1338 Words   |  6 PagesPart A 28th Amendment: The 28th amendment requires labeling on all produce that is genetically engineered and products that contain Genetically Modified Organisms’ (GMO’s). Topic: This amendment is within the topic of Food and Public Safety. This amendment protects the public from buying genetically modified products without their knowledge. This amendment would give the people the right to know what is in their food and products and will also give people the assurance that their money is goingRead MoreCase Study on the Use of a GPS Without a Warrent641 Words   |  3 Pagesof Cocaine. There was a search warrant issued to follow this vehicle with the global positioning system (GPS). This event happened in Washington D.C. Procedural Posture The two areas that the court wanted to pursue were: A violation of the fourth amendment and installing the global positioning system (GPS) without a valid warrant. Using the global positioning system tracked every move the Jones family made and it was an invasion of their privacy at some points during their trips to certain locationsRead MoreThe Processing Of Possessing A Gun1383 Words   |  6 Pages2nd Amendment, however, gun control laws change frequently in response to current events. National Rifle Association Founded, National Firearms Act, Federal Firearms Act, Gun Control Act, Bureau of Alcohol, Tobacco and Firearms created, Law Enforcement Officers Protection Act, Firearms Owners Protection Act, Crime Control Act, Brady Handgun Violence Prevention Act, Violent Crime Control and Law Enforcement Act, President Obama Proposes Sweeping Changes to Gun Control, Colorado Recalls Pro-Gun ControlRead MoreShould Federal Agents Be Allowed For Collect Dna From Anyone Arrested?1228 Wo rds   |  5 Pagesbut if federal agents can look in a database where DNA samples are stored and compare it to anyone who was arrested especially those who committed sex crimes more crimes would be solved. Many say DNA testing violates suspects rights under the Fourth Amendment of the Constitution of the United States. DNA testing has toppled the way federal agents gather evidence in various criminal cases, particularly assault and homicide and thus had an expansive effect on a lot of people past cases. In this paper

Tuesday, December 17, 2019

Compare Achilles And Achilles - 2072 Words

In Homer’s â€Å"The Iliad†, we come across Achilles and Hector. Both characters are seen as brave soldiers of great honor, yet they have very different opposing traits. Hector is a compassionate man, who would do anything possible to fight for his family. While Achilles on the other hand, though he can be compassionate, he is also a man of immense pride who can be selfish and would do anything to protect his honor, even at the cost of others demise or destruction â€Å"†¦Achilles’ rage, Black and murderous, that cost the Greeks Incalculable pain†¦Ã¢â‚¬  (Homer 5). Achilles is more of a loner, only thinks of himself when making decisions, hence hurting people. However, they both have shown other sides to their personality that we are not familiar with like†¦show more content†¦He had a more genuine reason to not participate in the war but he chose to fight for his family and his city instead. Hector has a wife and a son, and could have chosen to stay with them instead of fighting the battle that his brother started after abducting Helen. However, Hector knew he had an obligation to fight for his city, hence did not run away from his responsibilities. His wife Andromache begged him to stay when he visited her and their son because she was afraid that he would die at the battlefield â€Å"Your courage Is going to kill you, and you have no feeling left for your little boy or for me† (Homer 430). Hector advised Andromache that he could not run away from his fate. If he was destined to die in the battlefield, then there was nothing he could do to change that, he also told her that he was doing this for her and Astyanax, their son, because they might end up as slaves if he is not successful. Hector could have told his father and Paris that he was not going to get involved in the war since he did not personally cause it, just like Achilles told Agamemnon â€Å"I don’t have any quarrel with the Trojans, they didn ’t do anything to me to make me come over and fight† (Homer 160). However, he is a man of reason and feels a sense of duty that overpowers any fears he has and prevents him from making any selfish decisions. Being selfish however, is one of the bad traits that Achilles has. His selfishness is brought about by his pride. When theShow MoreRelatedCompare and Contrast of Hector and Achilles1355 Words   |  6 PagesOption B : Compare and contrast the characters of Hector and Achilles. I choose to compare and contrast the characters of Hector and Achilles because I am interested in their story. I think there are many theme in this story, but the central theme is the fate of men; if it is ï ¬ xed or changed by the will of men. I feel interesting that the gods decides the fate of people. And I choose this option because I feel that I can understand what the author wants to express to the readers by comparing HectorRead MoreCompare And Contrast Achilles And Aeneas1263 Words   |  6 PagesGilbert DWC 101: Paper 1 11/01/2017 Heroes of Opposing Audiences A comparison of Homer’s Achilles and Virgil’s Aeneas brings up the question concerning what makes someone an epic hero. Although each poet lived in a dramatically different time period, with different literary integrity, Homer and Virgil each portray an epic hero using different development of the characters, but similar themes and influences. Achilles and Aeneas demonstrate that an epic hero will do whatever it takes to fulfill their dutiesRead MoreAchilles vs Beowulf compare and contrast Essay1150 Words   |  5 Pagesï » ¿Compare and contrast Achilles vs Beowulf The way of the warriors Achilles and Beowulf were two characters that had an amazing power that made his name lives for hundreds of years. Great warriors need some to have some specific characteristics to reach their fame because we have seem in some heroes that they have gods strong, a unique way to be and goals to achieve. Comparing the character of Achilles and Beowulf who were two of the best warrior of the history we could know if there areRead MoreAchilles and Odyssey Compare and Contrast Essay1625 Words   |  7 PagesLarger-Than-Life Heroes: Achilles and Odysseus What are the main characteristics of a larger-than-life epic hero? An epic hero is a brave and powerful warrior who is motivated to fight both internal and external conflicts to achieve glory and ranks above a normal man. In Homer’s epic poems The Iliad and The Odyssey, Achilles and Odysseus are the well-known heroes. Achilles fights Hektor outside the walls of Troy because Hektor killed his best friend, Patroclus. After fighting in the TrojanRead MoreIliad - Self image1193 Words   |  5 Pagesfollowing questions Include a List of Works Cited 1. Tragic Hero: â€Å"Achilles is the first great tragic hero in world literature.† Discuss the conflicts of Achilles as developed by Homer and how the author finally resolves them. 2. The Wrath of Achilles: The entire epic is framed within the Wrath of Achilles. Why? How does the poet highlight larger over reaching issues such as life and death within the Wrath of Achilles. Why the poet would chose to focus on his wrath? 3. Gods: How does HomerRead MoreAnalysis Of Homer s The Iliad887 Words   |  4 Pagesabilities. Meanwhile, the shame culture has a different concept to the Greeks. Shame meant to have good morals towards others and it is a more logical way of living. In the ancient Greek era a majority of people were associated with the honor culture compare to the shame culture. The honor culture was more praised back then and the reason being is that everyone wanted to feel in control and powerful in a certain way. Homer believes that one culture is better than the other and the reason being is thatRead MoreEssay about Homer vs. Ovid1417 Words   |  6 Pagescontaining over 250 myths. To compare and contrast these two poets and their writing styles, I will use Achilles’ battle with Hector in Homer’s Iliad book 22 and compare it with Achilles’ battle with Cycnus in Ovid’s Metamorphoses book 12. The comparison of these battles will give us a better understanding of th ese poets different views on the Trojan War. This battle also takes place outside the city of Troy, at the beginning of the Trojan War, nine years previous to Achilles’ battle with Hector. RumourRead MoreEpic Heroism And Values Of The Iliad1030 Words   |  5 Pages The image of Achilles killing Hector and the image of Aeneas killing Turnus classify them as epic heroes. In the Greek epic poem the Iliad, Homer portrays Achilles as an enraged warrior fighting for revenge for a woman he loved. In the Roman epic poem the Aeneid, Virgil portrays Aeneas as fleeing the city of Troy to establish a new city. Achilles and Aeneas are epic heroes because they both show courage, boldness, and embody the ideals of their nation. Homer portrays Achilles as individualisticRead MoreAchilles the Illiad1570 Words   |  7 PagesIliad 21.70-135 (Lykaon supplicates Achilles, Achilles kills him) Consider Achilles’ response to supplication in this passage. How does this compare to his attitude in the extracts from the Iliad in your lecture/tutorial readings? The cruel rejection by Achilles to the supplication of Lykaon in Book 21 represents a fundamental transformation in the attitude of Achilles. Achilles has become full of anger and self-loathing following the death of Patroclus. Achilles answers Lykaon’s supplication byRead MoreHow Does Homer Use The Effectiveness Of Ajax s Speech1723 Words   |  7 PagesAjax’s speech, specifically Ajax’s similarities to Achilles and the speech’s focus on the Greek value of timÄ“ (one’s honor or how one is perceived by others), to reveal the motivations and nature of Achilles. In book IX of the Iliad, Ajax, known primarily for his brute strength and martial prowess, delivers the speech Achilles finds most compelling. Conversely, Odysseus, although the most adept orator sent, is the least effective in convincing Achilles to rejoin the war. In my opinion, this is because

Monday, December 9, 2019

Causes and Spread of Infection free essay sample

Diseases can be classified as genetic, metabolic, or infectious. Infectious diseases are caused by bacteria, viruses, fungi and parasites that use our body as a host for reproduction and cause illness. Bacteria, viruses, fungi and parasites. These are all microorganisms which cause infection, yet they are all different in structure, required environment and conditions needed to thrive and multiply. Bacteria is a single celled organism. It’s shape and size can vary greatly from one type of bacteria to another, but its general structure is that of a simple cellular one with a nucleus that lacks a membrane. They can thrive in almost any environment and can be found within almost any substance/surface, also within the human body. However, it is thought that only about 7% of all bacteria is actually harmful and cause diseases. These are called â€Å"pathogenic† bacteria. Pathogenic bacteria cause illness as they rapidly reproduce and produce a toxin that kills or mutilates cells. Sometimes the infection does not give any symptoms – this is called an ‘asymptomatic’ infection. When the germ is commonly found on our body without causing an illness, it is called carriage or colonisation. Carriage may be very short term (transient). For example, acquired by touching someone but quickly removed by washing your hands, or persistent with the germ multiplying on your body (usually called colonisation). In certain circumstances, the germs that colonise our bodies may go on to give an infection. 1. 4 Systemic infection is a generic term for an infection caused by microorganisms in animals or plants, where the causal agent (the microbe) has spread actively or passively in the host’s anatomy and is disseminated throughout several organs in different symptoms of the host. Systemic infections are also called disseminated infections, and they can be caused by bacteria and bacteria-like prokaryotes, fungi, protozoa in the broad sense, and viruses. Localised infections are confined to one specific area. The skin around a localized infection may be red, swollen, tender, and warm to touch. The wound may have pus-like drainage and fever may develop. 1. 5 Poor practices that may lead to the spread of infection: * Not washing hands regularly * Not using PPE * Not storing or cooking foods properly * Not covering your nose or mouth when sneezing or coughing * Not cleaning surroundings 2. 1 The conditions needed for the growth of microorganisms are: * Food – they need nutrients to grow on * Acidity – pH 7. 5-4. 6 Temperature – they grown best between 40-141 degrees F * Time – if you leave food in the danger zone for 4 hours or more, the levels of Microorganisms can be high enough to make some ill * Oxygen – some but not all need oxygen to grow * Moisture – some but not all need moisture to grow 2. 2 There are four main routes for infections to enter the body: 1. Down the respiratory tract into the lungs. Coughs, colds, influenza and other common airborne infections are contracted in this fashion. 2. Breaks in the skin. One of the many functions of the skin is to act as a barrier against infection. Anything that penetrates the skin, or for that matter the mucous membrane that lines the mouth or nose, provides a route for infection to enter. Typically, bites, scratches, puncture wounds by needles etc. increase the risk of infection. 3. Down the digestive tract. Food, drink or other infected products can be swallowed and infect the stomach or bowels. Most people have experienced an ‘upset stomach’, which reveals itself in the form of diarrhoea and or vomiting. 4. Up the urinary and reproductive systems. The infectious agent may remain localized or may enter the blood stream. Sexually transmitted diseases most commonly infect the genitals. HIV, the AIDS virus, is carried in bodily fluids and can be transmitted in saliva, seminal fluid, or blood. 2. 3 2. 3 Common sources of infection: A person can be a source of infection; either for him/her self (endogenous) or to other people (directly through contact, or indirectly, e. g. by contaminating food or beverages). Objects may be sources of infection; food, water, air-conditioning systems, showers, medical instruments, recreational waters, doorknobs, cotton handkerchiefs etc. Most man-made products that may be sources of infection are required to be produced while limiting the risk of contamination. In addition to people, also animals can be sources of infection. 2. 4 Infective agents can be transmitted to a person. There are two different modes of transmission; direct and indirect. Direct transmission refers to the transfer of an infectious agent from an infected host to a new host, without the need for intermediates such as air, food, water or other animals. Direct modes of transmission can occur in two main ways: * Person to person – the infectious agent is spread by direct contact between people through touching, biting, kissing, sexual intercourse or direct projection of respiratory droplets into another person’s nose or mouth during coughing, sneezing or talking. * Transplacental transmission – this refers to the transmission of an infectious agent from a pregnant woman to her foetus through the placenta. Indirect transmission is when infectious agents are transmitted to new hosts through intermediates such as air, food, water, objects or substances in the environment, or other animals. Indirect transmission has three subtypes: * Airborne transmission – the infectious agent may be transmitted in dried secretions from the respiratory tract, which can remain suspended in the air for some time. * Vehicle-borne transmission – a vehicle is any non-living substance or object that can be contaminated by an infectious agent, which then transmits it to a new host. Contamination refers to the presence of an infectious agent in or on the vehicle. * Vector-borne transmission – a vector is an organism, usually an arthropod, which transmits an infectious agent to a new host. Arthropods, which act as vectors, include houseflies, mosquitoes, lice and ticks. 2. 5 Key factors that will make it more likely that infection will occur: * Environment * Diseases such as HIV/AIDS which suppress immunity * * Poorly developed or immature immunity, as in very young children * Not being vaccinated * Poor nutritional status (e. g. malnourished children) * Pregnancy

Sunday, December 1, 2019

Social interaction Essay Example

Social interaction Essay We all engage in countless behaviors during our daily lives. We cough, laugh, scratch our heads, grimace when we struggle to carry a heavy package or other routine behaviors. Other people sometimes see our behaviors and alter their own accordingly. In response to our cough, they turn away to avoid catching our cold; in response to our laugh, they smile; in response to our grimace, they offer help. Aware of the responses we have triggered in others, we, in turn, may adjust our behavior. This is social interaction—the process of people orienting themselves to others and acting in response to what others say and do. The word social implies that more than one person is involved, while interaction means that all parties are mutually influencing one another. Physical proximity is not necessary for social interaction to occur. People interact when they communicate via letter, phone or fax. Moreover, just being near others does not always mean that social interaction will take place. One could be hurrying through a crowded train station, surrounded by hundreds of people, and never even make eye contact with a single one. Social interaction is purposive: People can react and act with each other in pursuing their objectives in life. In some social interactions, the participants can have different goals. For instance, an interviewer would like to finish her interview session and finish the job as quickly and as efficiently as possible, whereas the candidate wants to capture her interest and extend the interview so that he can impress her with his many qualifications. Different goals do not lead to conflicts, though. Sometimes, goals can be complementary. In some situations, participants can intentionally work together with a common aim. Whether social interaction is complementary or cooperative, competitive or coercive, it is always ordered by patterns of social structure and culture. When people get together, they generally fall into routinized schemes for expected behavior. Thus, even if one has never gone on a job interview, one knows a good deal about how to prepare for one and what to expect. Even at a party, there is order and predictability to interaction; it is never completely free form. The party-goer who sits on a couch reading, or keeps asking everyone to quiet down and get serious, will be thought distinctly odd. At parties, one is expected to be sociable and to have fun. We will write a custom essay sample on Social interaction specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Social interaction specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Social interaction specifically for you FOR ONLY $16.38 $13.9/page Hire Writer One approach to studying social interaction is to look at how people define the situation. A simple definition of a situation allows people to know so much about what is expected of them. The answer lies in the large stock of cultural knowledge about social life that we acquire through socialization. This knowledge is shared—we all have internalized it—and we can draw on it anytime. That is not to say that we explicitly did not say to the interviewer: â€Å"This is a job interview, you know, which means that you are in charge and I should be differential.† We do know however, implicitly keep such cultural knowledge in mind and let it help guide our actions. The definition of a situation, however, is not always obvious. If a friend asks you to go with him or her to the library, is this a date or just an effort to get your help with an assignment? It is sometimes hard to say. In some cases, both parties are unclear about what is going on; in other cases, people have definite but different definitions of the situation. When different definitions exist, the participants can be thought of as inhabiting different social realities (Schutz and Luckmann, 1973). In the light of this, W. I. Thomas sociologist states an important issue about this called after his name—Thomas theorem. This theorem says that once we define a situation, that definition determines not only some of our actions, but also of the consequences of what we do. Most of the situations we encounter are ambiguous to some extent. As a result, we must constantly â€Å"test out† actions and modify them based on feedback as we strive toward a more precise, collective definition of what is going on. Thus, definitions of a situation are best seen as a form of negotiated order. Shared expectations impose limits (or social structure) on interactions, but these limits are not engraved in stone. There is always rooms for improvisations and negotiation. Negotiations, however, tend to create new rules that impose constraints on future interactions. The processes of social interaction are the bases for creating social relationships—relatively enduring patterns of interaction between two or more people. Most people have many social relationships—relatively enduring patterns of interaction between making sure that many social relationships, from casual acquaintances, to intimate friendships and close family bonds. In all these, it is helpful to recognize the different levels of role-taking which helps us to tailor our words and actions to those of other people. What good can a well-planned management program do when it is not at all communicated effectively in the team that is in-charge to manage the Company?   What good can communication do when communication process is distorted, manipulated, blocked off or otherwise broken hence causing misunderstanding, misinterpretation, dishonesty, and mistrust in the information generated by the system?   To illustrate, every organization must put importance to the security and risk management component in running the affairs of the business because a huge part of the success of the Company or Organization is determined by how strong it can withstand threats of risk and security in the business.   The more robust the security and risk management process is established, the greater the chance for the Company to succeed.   But then, this is no gua rantee all the time.   Circumstances can vary. System reliability can be altered.   One has to be vigilant and well-equipped for any eventualities and through effective communication he is half-way towards achieving success. Good social interaction facilitates matters swiftly. Most especially today, the advent of communication and information technology is right before everyone’s eyes and the demand for change is inevitable. Customers or users are becoming more diverse and a large portion of them depend on technological infrastructures availability and confidentiality. Hence, one has to keep up with competition by enhancing productivity in order to stay ahead of the rest or to stay on top of everything. Moreover, one has to sustain change to survive in the business. The ongoing challenges is a struggle and most often than not, such challenges are accompanied by increasing risks in existing systems such as â€Å"downtime, information inaccuracy and employee inefficiency† (Novak, 2004). Nothing compares to having an open communication among individuals within the organization. It is always a common fact that many organizations and projects succeed because open communication eradicates misunderstanding between and among people from bringing about successful solutions to problems. â€Å"A free-flow of information not only reduces the risk of misunderstandings and wasted effort but also ensures that all team members can contribute to reducing uncertainties surrounding the project.† (Security Risk Management Guide, 2004).

Tuesday, November 26, 2019

Hittites and the Hittite Empire

Hittites and the Hittite Empire Two different types of Hittites are mentioned in the Hebrew Bible (or Old Testament): the Canaanites, who were enslaved by Solomon; and the Neo-Hittites, Hittite kings of northern Syria who traded with Solomon. The events related in the Old Testament occurred in the 6th century BC, well after the glory days of the Hittite Empire.The discovery of the Hittite capital city of Hattusha was an important event in archaeology of the near east, because it increased our understanding of the Hittite Empire as a powerful, sophisticated civilization of the 13th through 17th centuries BC. The Hittite Civilization cuneiform    Timeline Old Hittite Kingdom [ca. 1600-1400 BC]Middle Kingdom [ca. 1400-1343 BC]Hittite Empire [1343-1200 BC] Babylon Sources Cities: Important Hittite cities include Hattusha (now called Boghazkhoy), Carchemish (now Jerablus), Kussara or Kushshar (which has not been relocated), and Kanis. (now Kultepe)

Saturday, November 23, 2019

Reasons to Send Graduation Announcements

Reasons to Send Graduation Announcements Amidst everything else youre trying to finish before graduation- least of all, your actual classes- youre being pressured to send out graduation announcements. Why should you spend the time to send them out when you have so much else going on? Reasons to Send Graduation Announcements Your family and friends want to knowSure, some may know that you are graduating...sometime this year. An announcement is a great way to keep them informed and to let them know what your degree is and when, officially, youll be receiving it. Your parents and other family members want to brag about youHave you ever been to someones house and seen a graduation announcement hanging on their fridge? Wasnt it exciting and impressive? Your family has been supporting you during your time in school; let them have some bragging rights for the next few months by having their own announcement to post. Not to be crass, but...many folks might send you some cashIn many cultures, its traditional for friends and family members to send money as a graduation gift. And who doesnt need a little help as they have to pay for work clothes, a new apartment, and everything else thats needed for a new job (or even graduate school)? Its a good way to start networkingYoure graduating with a degree in Computer Science, and your uncle Chris just happens to work at a computer company youre interested in working for, too. An announcement can be a great way to open the door to future job opportunities  since people will know you are now officially a college graduate looking for work. Its a great keepsakeIt may seem like a pain now, but finding a copy 20 years from now of your graduation announcement, stored in a shoebox in your attic, is a great gift you can give your future self. Its a good way to keep in touch with peopleSure, Facebook and social media is a great way to keep in touch with friends. But what about family members or other folks who you dont see very often but still consider an important part of your life? Sending an announcement is a great way to keep the doors of communication open. Its a great way to celebrate your achievementLets not forget all the late nights, study sessions, hard work, cramming, and everything else you did to earn that degree. This is your perfect chance to let everyone know that youve finally earned your degree without sounding too pompous about it. Its a great way to thank those who helped you get to where you are todayDid you have an influential high school teacher who helped you get to college? A mentor in your church? A family member who really stepped in when you needed it? Sending graduation announcements to those who really made a difference in your life can be a great way to thank them for all their love and support.

Thursday, November 21, 2019

Brand management Essay Example | Topics and Well Written Essays - 1500 words

Brand management - Essay Example However, the only thing common between both the pearls is the quality, natural beauty and value of the pearl which is left only to nature. Figure 1 The Australian, 2011 Pearls can be pear-shaped, oval and at times misshapen; but the most valuable pearls for all sorts of consumers will be the round, smooth and free from marks. A strand of pearls which fits directly to the throat is a collar. The one which rests on the neck is a choker. The princess length of the strand would be the one reaching the collarbone while the matinee is 20-24 inches and Opera is 30-36 inches. Rope is all the other strands that are more than 36 inches. These are important details to understand the consumer perceptions and tastes in the pearl industry. Another aspect which is important is the origin and types of pearls. Natural pearls are the most precious pearls and unfortunately the rarest. They were originated in the Persian Gulf and have already been harvested at large. The ones available in the market tod ay are small in sizes and immensely costly. There was a time when consumers did not buy anything but natural pearls, but today the perceptions have changed. The cultured pearls are widely available and produced in pearl farms. They have contributed majorly to the pearl market today. These cultured pearls produced through a delicate process. The pearls formed through this process are not always high quality. These pearls are sorted and about 10,000 are discarded before a 16 inch strand is assembled of high quality pearls. Figure 2 Morning Dove Studios, 2012 Pearls are also found in saltwater and freshwater where there are different types of mollusks and thus they produce pearls that are different looking. Saltwater pearls are the akoya cultured pearls which are grown in Chinese and Japanese waters. These pearls are very tiny starting from 2mm to 10mm, and are cream or white colored with a round shape. They are cheaper due to their sizes. The Australian, Indonesian and Philipinnian pe arl is the South Sea pearl which is the largest pearl of all. Their size is about 9mm to 20mm and is cream, white or golden colored. The South Sea pearls are the most expensive ones as they are rare and have thick nacre. The Tahitian pearls have sizes ranging from 8mm to 16mm and they are not only found in Tahiti but also on French Polynesia islands. These pearls are known as the black pearls but are gray, green, purple, blue and black colored. Black pearls are also found in Fiji, Cook Islands and Micronesia. They are expensive. Figure 3 Chinese Pearls (United Nations University, 2013) Figure 4 Black Pearls (squidoo, 2013) Freshwater pearls grow in lakes, ponds and rivers mostly in China. Most of these pearls have the same size and shape as akoya pearls but may also be different. They are comparatively cheaper and the most common of all pearls sold. These pearls may not have the nucleus of the bead hence having thicker nacre. Imitation pearls are pearls that have a coated glass bead . These have high luster which can be easily separated from a cultured pearl by a knowledgeable jeweler. Sometimes it becomes a challenge to identify the imitated and the cultural or natural but certified gemologists from the American Gem Society can easily do the job. These pearls may also be going through processes and treatments to enhance their color or luster, and this immensely affects their value. A consumer would never want to buy one! Some of the best pearl brands today are

Tuesday, November 19, 2019

The Importance of Progression Planning and Retaining Human Resources Essay

The Importance of Progression Planning and Retaining Human Resources Within Hong Kong Construction Organizations - Essay Example From this study it is clear that macau has a large demand for construction workers because of the opening up of the gaming industry with a record 10,000 Hong Kong construction workers being employed in Macau in 2008. China has been employing Hong Kong surveyors, architects and engineers extensively. The relocation of construction talent to China and Macau is due to the opportunity to work on high-profile, large and iconic projects at these destinations. Apart from China and Macau, Singapore and Malaysia have also been competing for skilled engineers based in Hong Kong. The manpower needs in the sector in Hong Kong is expected to grow at 1.9 percent annually by 2018. However, Hong Kong has not demonstrated change in the use of technology in the sector while safely and quality continues to be an issue. This has impacted the local labor market in Hong Kong as higher incentives and pay structure have become essential to attract talent in the industry. Major construction projects such as railways and housing have been conceived but the retirement of the ageing workers and the reluctance of the younger generation to join the industry are some of the other challenges for the sector in Hong Kong. The Royal Institute of Chartered Surveyors has released a statement in February 2014 that skilled shortage in the Hong Kong construction market is high among quality surveyors, bricklayers, carpenters and joiners. Despite technological changes the Hong Kong construction industry continues to be labor-intensive and crafts based.

Sunday, November 17, 2019

Global Warming Essay Example for Free

Global Warming Essay According to Live Science, global warming is used to describe a gradual increase in the average temperature of the Earths atmosphere and its oceans, a change that is believed to be permanently changing the Earths climate forever. The scientific consensus on climatic changes to global warming is that the average temperature of the Earth has risen between 0. 4 Cto 0. 8 C over the past 100 years (as cited in Live Science, n. d. ). In the article from the American Policy Roundtable Arguments against Global Warming, many claim that global warming is obvious and that all arguments against global warming fall. The problem is that what is obvious often isnt true. Concern over global warming is overblown and misdirected. More than 17,000 scientists have signed a petition circulated by the Oregon Institute of Science saying in part, there in no convincing scientific evidence that human release of carbon dioxide, methane, or other greenhouse gases is causing or will, in the forseeable future, cause catastrophic heating of the Earths atmosphere and disruption of the Earths climate. Satellite readings of temperatures in the lower troposphere show no warming since readings began 23 years ago. These readings are accurate within 0. 01 C, and are consistent with data from weather balloons. Only land-based temperature stations show a warming trend, and these stations do not cover the entire globe, and often contaminated by heat generated by nearly urban development, and are subject to human error (cited in American Policy Roundtable, n. d. ). When it comes to government and industrial leaders, a certain number of these are not being honest to citizens about the amount of pollution the industries and countries create. According to Exact Weather, from an article called Hysteria, all the main players from politicians and scientists to big corporations and the United Nations benefit from instilling fear into billions of human beings over the unproven theory of man-made global warming, Indeed, just three weeks after the U. N. ratcheted up international fears over global warming, a panel of 18 scientists from 11 countries has not reported to the U. N. that the only thing that can stop catastrophic climate change is a global tax on greenhouse gas emissions. Global problems, real or conjured up, require global governmental solutions. Environmentalism is nothing less than the global elitists replacement ideology for communism/socialism. Elitists who desire to rule other peoples lives have gravitated an even more powerful ideology. More powerful because it seems to trump all other considerations, as it claims the very survival of life on earth is dependent on implementing its agenda. (cited in Exact Weather, n. d. ). This is not the first time Americas major media has predicted an impending global climate crisis. It has happened four different time with each prediction warning that entire countries would be wiped out or that lower crop yields would mean the billions would die. In 1895, the panic was over an imminent ice age. Later, in the late 1920s, when the earths surface warmed less than half a degree, the media jumped on a new threat global warming, which continued into the late 1950s. Then in 1975, the New York Times headlined that global cooling was inevitable. Then in 1981, it was back to global warming, with the New York Times quoting seven government atmospheric scientists who predicted global warming of an almost unprecedented magnitude. (cited in Exact Weather, n. d. ). In an article written John Coleman, founder of the Weather Channel, he believes that not only is global warming the greatest scam in history, he believes some dastardly scientists with environmental and political motives manipulated long term scientific data to create an allusion of rapid global warming. Other scientists have also jumped into the circle to support and broaden the research to further enhance the totally slanted, bogus global warming claims. Mr. Coleman also believes that any person who spends a decade at a university obtaining a PHD in Meteorology and become a research scientist, more likely than not, becomes a part of that single minded culture. They all look askance like anyone, certain of their superiority. They respect government and disrespect business, particularly big business. They are environmentalists about all else. These scientists know that if they do research and results are in no way alarming their research will gather dust on the shelf and their research will languish. But if they do research that sounds alarms, they will become well know and respected and receive scholarly awards and, very importantly, more research dollars will come flooding their way. These scientists had to strive to be accepted, invited to present and review papers and travel to international meetings of the committee. Otherwise they were a nobody in the field. When many researchers did climate change studies in the late 90s they were eager to produce findings that would be important and be widely noticed and trigger more research funding. It was easy for them to manipulate the data to come up with results they wanted to make headlines and at the same time drive their environmental agendas. Then their like-minded Ph. D colleagues reviews their work and hastened to endorse ti without question (Coleman, n. d. ). Everyone has heard already that global warming is an international problem. Some say worldwide organizations are needed to address the worldwide issue to make sure all nations adhere to standardized pollution regulations. Some countries and the regions that comproise them have there own rules and regulations set to determine the daily life of how much electricity, coal, nuclear power, and other resources can be used, as well as how cars can be made, how buildings and bridges can be built as to not effect environmental damage. All of this comes at an extra cost to society and put more debt to these countries that implement the regulations. According to the article Destroying America to Save the World, the Kyoto Treaty is a international treaty designed to cut emissions that already contribute to global warming. The heart of the global warming dispute remains quite important. Scientists have been debating the reality of climate change and its potential impact for years. Despite extensive scientific opposition, worldwide environmental groups pushed for action that led to the 1997 Kyoto Protocol on Climate Change. The pact required reductions in emissions below 1990 levels for developed nations. When a ABC News report mentioned the estimated cost of the Kyoto Treaty if the United States implemented it, the result would be a damaging US economu with job losses and a increase in the price of energy by $2,000 per family. When the Fox News channel addressed the issue short, but to the point, it explained the reason for the U. S. opposition was that the treaty would not force reductions by the developing nations including major polluters such as China, but it would have cut emissions by about 30 percent beginning in 2008. Fox also mentioned that the supporters of the treaty believed the cost to American families was about $100 a year, while critics claimed it would have doubled the price of energy, costing families $2,700 a year. (Gainor, n. d. ) But this is not just the only example of regions, states, countries, or international communities imposing treaties or regulations that are costly. Arguments against Global Warming also mentions efforts by state governments to reduce greenhouse gas emissions are even more expensive and threaten to bust state budgets. After raising their spending with reckless abandon during the 1990s, states now face a umulative projected deficit of more than $90 billion. Incredibly, most states nevertheless, persist in backing unnecessary and expensive greenhouse gas reduction programs. New Jersey, for example, collected $358 millions a year in utility taxes to fund greenhouse gas reduction programs. Such programs will have no impact on global greenhouse gas emissions. All they do is destroy jobs and waste money (cited in American Policy Roundtable, n. d. ). There are many developing nations that are beginning to feel the positive impact of economic growth and development. Some of those developing nations have shown high amounts of pollution that is clogging up these countries cities especially in China and India. The Kyoto protocol will not solve the problem because it costs are too much and there is skepticism about it among the international community. The best way to prevent developing countries from have revolutionary and economic uprisings is not through international public policies. In article called International Clean Energy Initiative from the Office of Science and Technology Policy, using Advanced, low-polluting energy technologies, developed and manufactured in the United States. It is an initiative built on a set of recommendations by the Presidents Committee of Advisors on Science and Technology and is directed at leveling the playing field between cleaner U. S. energy technologies and services and polluting alternatives. While this technology carries higher up-front costs, and can be risky to decision-makers in developing countries, the real benefits of the initiative will help lay the technical and policy foundation that will allow developing and transition countries to build a clean energy future, leapfrogging past the polluting energy technologies used by the industrial countries. cited in Office of Science and Technology Policy article, 2001, pg. 1) The best option for world enforcement of pollution control, economic growth, and political stability is no regrets. Arguments against Global Warming mentions that while the alternative demands for immediate action to stop global warming, the best option is to do nothing. The best option is to invest in atmospheric research now and in reducing emissions sometimes in the future if the science becomes more compelling. Right now, investments should be made to reduce emissions only when such investments make economic sense in their own right. This is the strategy of no regrets. The United States spends more on global warming research each year than the entire rest of the world combined, and American businesses are leading the way in demonstrating new technologies for reducing and sequestering greenhouse gas emissions. (cited in American Policy Roundtable, n. d. ). If many countries emulate the way the United States does its research on global warming, and uses its methods, world enforcement becomes less and less likely since there are alternatives other than control, rules, and regulation. (cited in American Policy Roundtable, n. d. ).

Thursday, November 14, 2019

Platos Allegory of a Cave, Wachowskis Matrix, and Marge Piercys Woman on the Edge of Time :: Argumentative Persuasive Papers

Plato's Allegory of a Cave, Wachowski's Matrix, and Marge Piercy's Woman on the Edge of Time Plato's Allegory of a Cave is a story about prisoners that are chained underground, who can not see anything except for shadows caste on a wall by a fire. The only thing that these prisoners can see is the shadows of people. Eventually, one of the prisoners breaks free of the chain and ventures out into the real world. In the real world the freed prisoner discovers that the shadows in the cave are created from light diverge off people. He recognizes there is a whole new world filled with light. The freed prisoner is very confused and blinded by the light so he decides to return to the cave. When the prisoner returns to the cave, he shares what he saw in the real world with the other prisoners. The remaining prisoners treat the freed prisoner like he is crazy and they tell the freed prisoner that the real world does not exist. The prisoners in the cave do not believe in the real world because the cave is all that they know exists. Platos story is a close parallel to the film The Matrix and Marge Piercys Woman on the Edge of Time. Platos theory suggests that masses should be silenced in order to discourage desire because desire leads people to be unjust. Thus, equilibrium is needed to create peace and prevent chaos between two powerful worlds. The parallel of Platos theory can be seen in Marge Piercys Woman on the Edge of Time. The novel is about a chosen person, Connie, and her journey to keep peace between the machine world and the human world. Connie has special communicating powers, in which she is able to contact two completely different future worlds. The first world is a total utopia where Connie communicates with Luciente. The utopian world is a very high spirited, trustworthy, healthy community which is extremely peaceful and relies very little on technology. The world in a dysutopian, is completely controlled by computers, and humans are slave-like to cyborgs. This world is very dirty and the world wa s completely trashed. Connie lives in the present, where the worlds future is threaten by complete control by machines or a world with no technology. Like the prisoner in Platos story, Connie is shunned by society and put in a mental hospital.

Tuesday, November 12, 2019

Obama VS Chamberlain

When Chamberlain went to Munich on September 29th, 1938, to ask Hitler to discontinue, as he would have said, his plans to take over Poland, Chamberlain had good intention, but bad execution. He claimed that the appeasement was for, â€Å"The peace of our time,† and that his agreement with Hitler, that which Hitler biblically disregarded 7 days later, would allow Europe to continue war-free, sparing It from the trauma and anxiety associated with war. It Is well known that Chamberlain failed utterly to accomplish anything with the appeasement, and war did in fact break out he following year.Recently, President Obama went to Geneva to negotiate peace terms with Iran regarding them physically possessing nuclear weapons, and failed to accomplish anything. In fact, Iran slapped America in the face by completely undermining America's request, and this is the cause for much controversy and ill feelings toward Obama as of late. In comparison to Chamberlain's utter failure at Munich, B eam's inability to impose his country will Is far more severe than what happened in 1938.While It Is rue that both Britain and the US practically surrendered to Germany and Iran, respectively, Nazi Germany was much larger of a world power In its day when compared to modern day Iran. In addition, Brutal was In a weak state economically and militarily, while the united States, although Isn't In tip-top shape economically due to the recent recession, has one of, if not, the largest and most powerful militaries in the entire world. To have to surrender to a country whose inferiority on the world scale of sovereignty is an obvious step in the wrong direction.In defense of Chamberlain, he didn't have the power of hindsight in terms of WI. The same cannot be said for Obama and Iran. Obama had clear historical evidence and resources to show that appeasement, in large part, does not work. Ben Shapiro, who hosts his own radio talk show and is author of a bestseller, said â€Å"The deal with Iran Is Worse than Munich' in part because In 1938 Hitler had not made known his plans to exterminate European Jews, while Iran has explicitly expressed a desire to completely wipe Israel off the map.How, then, could Obama simply request that Iran hand over one of Its most prized possessions, that being nuclear weapons, which are clearly documented as present in the country, when America's greatest ally is at risk and is the direct victim of Iran's plans? This isn't acceptable, and is a clear sign that Obama, who was supposed to be America's FAD, is becoming America's Nixon. Obama VS. Chamberlain By Broadband disregarded 7 days later, would allow Europe to continue war-free, sparing it from the trauma and anxiety associated with war.It is well known that Chamberlain failed impose his country's will is far more severe than what happened in 1938. While it is respectively, Nazi Germany was much larger of a world power in its day when compared to modern day Iran. In addition, Britain wa s in a weak state economically and militarily, while the United States, although isn't in tip-top shape economically deal with Iran is Worse than Munich' in part because in 1938 Hitler had not made that Iran hand over one of its most prized possessions, that being nuclear weapons,

Sunday, November 10, 2019

Creationism vs. Evolution

Since high school, I have been on something of an intellectual and spiritual journey from what I was told to believe to what I believe for myself. It wasn't until recently that I have finally started to become comfortable with what I do and do not accept as the truth regarding the origins of our existence here on this planet. I grew up in a diverse Christian home: my mother's side are devout Roman Catholics and my Father's Lutheran. I was raised Catholic and we went to mass religiously (no pun intended) every Sunday and my mom said my Hail Mary's with me every night before bed. The existence of God and His role in our lives was not even a question. From there, I went to a Christian pre-school, a Catholic kindergarten and grade school, and then a privet Catholic all-girls academy. In High School, evolution was barely talked about unless you were taking a class specifically related to it (or maybe it was but I tended to fall into a coma during science related lectures) and in primary school, it wasn't talked about at all. My father is what my mother likes to call a â€Å"holy roller†: he is a starch Fundamentalist Christian and a Young-Earth Creationist who believes that the bible is fact and not to be interpreted in any way other than literally. I can remember him talking about the evils of evolution and how it was impossible for monkeys to still exist if we evolved from them. He said that the evolutionary theory was just that: a theory and not fact like the bible. My father is an extremely intelligent man who reads and researches his beliefs but he is blindly religious. My high school was an extremely intellectually nurturing environment. When I started religion classes there, while there was some bias, I got to hear other peoples points of view and beliefs which helped me to start figuring out what it was that I truly believed. It was through these classes that I met some girls who happened to be atheists. I had no idea that the general consensus among those girls was that all religious people were un-intellectual and unintelligent because of Young-Earth Creationist. It was during this time that I started read about the subject and I read a lot. I read a book by a Christian astronomer named Hugh Ross, an Old-Earth Creationist who believes that the first few chapters of the Book of Genesis are not a literal portrayal of actual events but rather, God's revelation of the creation of events to the writer of Genesis. I thoroughly enjoyed the book but I promised my father I would at least give some Young-Earth Creationist views a chance. My dad gave me two books: one by Henry Morris and one by Ken Ham (the author of the assigned article. ) I was unimpressed by Henry Morris's book as I found it extremely tangental and rambling. I then moved on the Ken Ham's book, called The Answeres Book: The 20 Most-Asked Questions about Creation, Evolution, and the Book of Genesis Answered! I was actually appalled because essentially, he said that a person who does not believe in Young-Earth Creationism is not a Christian because they don't believe the Bible. This was extremely disturbing to me because most of his comments throughout the book and on his website Answers In Genesis/ mission were extremely intolerant and even at times abusive towards scientific community as a whole. How could it be possible that the same PhDs and other teachers from whom I was learning all be deceptive liars? I think that's why I had such a problem reading and accepting this article to be anything other than bullshit. True, he is not spouting any of his â€Å"holier than thou† spew in this particular piece but because I know and have read his other works I know he is trying to sell something: his own small-minded one-sided view of the world. The truth of the matter is that evolution is not anti-Biblical. I know that the Earth and the universe are both old. I know that life itself is old, we have scientific proof of it, but the question for me remained how exactly did life begin and develop. The Biblical creation story is clear: God created everything from the very beginning. How it progressed from there is not specifically spelled out. I have come to believe through reading, research, and soul-searching that evolution is the best and most plausible explanation for the progression of life on this planet. When my father was learning about evolution, it was discussed in terms of long-term gradual changes facilitated by natural selection. It had now been found that the process can be sped up by natural selection and other genetic processes. Over time, evolution has become better supported through tireless research. I think Evolution is easy enough to digest for people like my mother until it gets to the issue of monkeys. Whenever that subject is brought up it gets uncomfortable because she doesn't want to believe that we, God's handmade â€Å"mini-me's†, originated from, to quote the immortal line from the movie Planet of the Apes, â€Å"damn dirty apes†. The idea that God hand-made each and every one of us from scratch is an easier pill to swallow for most Christians. I feel that biological evolution is a beautiful and reasonable explanation for the physical progression from apes to humans but it lacks a spiritual explanation. My Grandmom always said to me that she never fully believed in God until she was in the room when someone died. You can see all the life: the intelligence, the love, everything they were in life completely drain from them and all thats left is an empty vessel. I never thought I'd have an experience like that until my Grandmom passed away in her sleep last March. I saw everything she described happen right before my eyes and it was then that I realized that there had to be something, some supernatural aspect to humans that no other animal possesses. When I saw her lying in the casket, it was no longer my Grandmom but the shell of the beautiful and complex person she once was. Whether you want to call it a soul, God's breath of life, or his image and likeness we are different and not just in our linguistic skills. It is clear to me that God chose us to be His children and to love Him forever but how or why he chose to differentiate us from the rest of the primates is still unclear to me. I have come to find that my thoughts and beliefs align with what is called Theistic Evolutionism or Evolutionary Creationism. Theistic Evolution is the concept that classical religious teachings are compatible with modern scientific understanding about biological evolution. Because I found this concept that fully aligned with my beliefs, I have never been more firm in my faith or more sure of my belief in God and Jesus Christ. I believe that God sent Jesus to cleanse me of my sin and I believe that He loves me. I believe that He hears my prayers and answers them and I believe that God did create the universe and everything in it but he chose to do it in a ways that we, his children, can study scientifically so we can better understand Him and His plan for us.

Thursday, November 7, 2019

Free Essays on Terorist Of The Net

and tap into all sorts of files. (www.computerworld.com) From the Pentagon: Democratic and Republicans; Israelites and the Palestinians; as well as emails and personal websites, satellites, or lockers; hackers are using their special skills to terrorize and exploit. In order to do this; a hacker needs to tap into another machine that has the files. The only way for a hacker to tap into another machine, is for the machine to have an outside line. Every single machine that has an outside line either has an IP (Internet Protocol) address, adapter address, or a simple phone number that can be located and dialed to gain access. Once a hacker is inside that machine they are able to do what ever they want with it, as if they were actually there. To a real hacker, the whole point of hacking into another machine is to gain certain information. The pioneers of hacking were out to expose the world to government cover-ups to find the real truth. In order to tap into that machine there a re loopholes in the programs, or programs that can create loop holes, such programs as decoders, rippers, and crackers. In order to regain control of the Internet we need to find a way to protect our own personal computers. Through certain software, hardware, and surveillance the Internet may become more protected and secured to its users. Software, series of instructions that tells your computer how to perform, is one way to protect your computer from... Free Essays on Terorist Of The Net Free Essays on Terorist Of The Net Numerous amounts of files are becoming terrorized as hackers all over the world log onto the Internet. It’s getting worse as the new generation of hackers in their teens along with everyone preceding them. . Over 160,000 times a year the pentagon computers are broken in as suppose to keeping out only 35% of all that have tried. The pentagon being the first to own a network can’t even protect it’s own files. The underground net is where many people are able to get software to help crack passwords and tap into all sorts of files. (www.computerworld.com) From the Pentagon: Democratic and Republicans; Israelites and the Palestinians; as well as emails and personal websites, satellites, or lockers; hackers are using their special skills to terrorize and exploit. In order to do this; a hacker needs to tap into another machine that has the files. The only way for a hacker to tap into another machine, is for the machine to have an outside line. Every single machi ne that has an outside line either has an IP (Internet Protocol) address, adapter address, or a simple phone number that can be located and dialed to gain access. Once a hacker is inside that machine they are able to do what ever they want with it, as if they were actually there. To a real hacker, the whole point of hacking into another machine is to gain certain information. The pioneers of hacking were out to expose the world to government cover-ups to find the real truth. In order to tap into that machine there are loopholes in the programs, or programs that can create loop holes, such programs as decoders, rippers, and crackers. In order to regain control of the Internet we need to find a way to protect our own personal computers. Through certain software, hardware, and surveillance the Internet may become more protected and secured to its users. Software, series of instructions that tells your computer how to perform, is one way to protect your computer from...

Tuesday, November 5, 2019

South African Apartheid-Era Identity Numbers

South African Apartheid-Era Identity Numbers The South African Identity Number of the 1970s and 80s enshrined the Apartheid era ideal of racial registration. It was brought in to effect by the 1950  Population Registration Act  which identified four different racial groups: White, Coloured, Bantu (Black) and others. Over the next two decades, the racial classification of both the Coloured and other groups were extended until by the early 80s there was a total of nine different racial groups being identified. Black Land Act Over the same period, the Apartheid government introduced legislation creating independent homelands for Blacks, effectively making them aliens in their own country. The initial legislation for this actually dated back to before the introduction of Apartheid- the 1913  Black (or Natives) Land Act, which had created reserves in the Transvaal, Orange Free State, and Natal provinces. The Cape province was excluded because Blacks still had a limited franchise (entrenched in the South Africa Act which created the  Union) and which required a two-thirds majority in parliament to remove. Seven percent of the land area of South Africa was dedicated to roughly 67% of the population. With the 1951  Bantu Authorities Act  the Apartheid government lead the way for the establishment of territorial authorities in the reserves. The 1963  Transkei Constitution Act  gave the first of the reserves self-government, and with the 1970  Bantu Homelands Citizenship Act  and 1971  Bantu Homelands Constitution Act  the process was finally legalised. QwaQwa was proclaimed the second self-governing territory in 1974 and two years later, through the Republic of Transkei Constitution Act, the first of the homelands became independent. Racial Categories By the early 80s, through the creation of independent homelands (or  Bantustans), Blacks were no longer considered true citizens of the Republic. The remaining citizens of South Africa were classified according to eight categories: White, Cape Colored, Malay, Griqua, Chinese, Indian, Other Asian, and Other Colored. The South African Identity Number was 13 digits long. The first six digits gave the birth date of the holder (year, month, and date). The next four digits acted as a serial number to distinguish people born on the same day, and to differentiate between the sexes: digits 0000 to 4999 were for females, 5000 to 9999 for males. The eleventh digit indicated whether the holder was ​an SA citizen (0) or not (1)- the latter for foreigners who had rights of residency. The penultimate digit recorded race, according to the above list- from Whites (0) to Other Coloured (7). The final digit of the ID number was an arithmetical control (like the last digit on ISBN numbers). Post-Apartheid The racial criteria for identity numbers was removed by the 1986  Identification Act  (which also repealed the 1952  Blacks (Abolition of Passes and Co-ordination of Documents) Act, otherwise known as the Pass Law) whilst the 1986  Restoration of South African Citizenship Act  returned citizenship rights to its Black population.

Sunday, November 3, 2019

Computing Essay Example | Topics and Well Written Essays - 2500 words

Computing - Essay Example This research will begin with the statement that the field of computer science deals with the idea of computability theory which looks at mathematical and logical problems by examining their solvability. In essence, it examines if a problem can be positively handled by a logic machine or not. In even simpler terms, computability theory works at the very limits of computing power so while we can expect computers today to be very powerful and complex machines; there are certain limits to the problems they can solve. In certain situations, computability theory suggests that specialized computers might be required for solving specific kinds of problems.   The theory, of course, would depend on our own definition of a computer and how a computer operates depending on its language and coding principles. Computability theory considers various models of computers but the three most popular ones are: Finite State Machine Pushdown Automaton System Turning Machine The Finite State Machine is the most common computer machine model which is available to us. It has also been suggested that this is the only theoretical computer model which is realistically possible and all present computers are based more or less on this machine. This computer has a set of predefined states and methods by which transitions can take place from one state to the other. In certain situations, the computer can accept data while in others it is used to output information of some kind. A common desktop computer can be used as a good example of this machine type.

Thursday, October 31, 2019

Comparison-Contrast Essay Example | Topics and Well Written Essays - 500 words

Comparison-Contrast - Essay Example Traditionally, husband serves as the bread-earner for the family while the wife manages the household. In the contemporary age, both may be working partners and yet fulfill their respective responsibilities with respect to home. Cohabitation, on the other hand, does not associate any responsibility to any partner because it has no religious or social significance. Just like an individual is not lawfully responsible for a stranger’s needs in the society, a partner living with another does not have to earn for him/her. Marriage is a much more stable relationship as compared to cohabitation. This is because in marriage, the contract between the two partners is publicly announced and the two have to respect religious teachings regarding marriage. Therefore, married people think a million times before proceeding towards a divorce. Cohabitation is not made with any announcement and most religions deny the followers right to make love in a relationship without marriage. So the cohabiting partners do not really have any solid reason to be together and they may part ways any time. From a religious perspective, marriage is a noble thing to do while cohabitation is an evil thing to do. When marital partners make love, there is no accountability in the religion for their act. Instead, the religion appreciates their intimacy and promotion of love. On the other hand, when two cohabiting people make love, they practice adultery and commit a heinous sin. They invite God’s wrath and will be held accountable for their act in the world hereafter. Children born to married parents are happier and more contented psychologically as compared to children born to cohabiting parents. Children of married parents can confidently introduce themselves to the society and associate openly with their parents. They derive their confidence from the fact that their parents are living together in a marital contract that is not only lawfully approved but is also

Tuesday, October 29, 2019

The Right to Privacy and Personal Life Research Proposal

The Right to Privacy and Personal Life - Research Proposal Example Their main guiding principle is the aspect of confidentiality with customer data. Indeed, there is need to inculcate public trust in order to get more customers. Data recovery business is a very sensitive one which deals with handling customer information hence there is need to maintain a good reputation in order to remain in business. One of the guiding principles of this data recovery company is the aspect of confidentiality and this company is working as a private entity, not a jury or ought to perform other undercover investigations which is vital for the sake of earning public trust. Except in cases where someone is planning criminal actions such as murder, the company should not easily divulge any other personal information which in most cases is private that would have been retrieved from customers’ computers. In the given case, a technician comes across what seems to be a sensitive murder case. However, he should basically take into consideration the fact that their company is guided by principles which seek to ensure public trust. On the other hand, there is need to safeguard the interests of the public such as safety against criminal activities. The only problem emanating from this case study is that the alleged evidence of murder found in the study may not be abundant enough to lay a case against a client given that it may be fictional writing. After all, this company is not out to probe or do investigative work but only to recover data for the clients. 2. Roughly translated, an organization's ethics come down to the standards that are followed in a relationship with others. This basically is the real integrity of the organization. Mills’ principle cited in Fraser Seitel (1995) states that â€Å"ethical considerations always seek the greatest happiness for the greatest number.† The operations of any given organization should be within the generally accepted standards in a society of which they operate from. The aspect of privacy is also one very important component of the concept of ethics.

Sunday, October 27, 2019

Isolation of Sarracenin from Root Barks of Strychnos Spinosa

Isolation of Sarracenin from Root Barks of Strychnos Spinosa On isolation of Sarracenin from Root barks of Strychnos spinosa and its Antimicrobial Properties. A known iridoid, Sarracenin, was isolated from the root bark of Strychnos spinosa. Its structure was elucidated by 1D and 2D-NMR experiments, and comparison with reported data. This is the first time it has been isolated from this species. The compound showed significant antimicrobial activities against Staphylococcus aureus, Streptococcus pyogenes, Shigella dysenteriae, Klebsiella pneumonia, Candida albicans Candida tropicalis, Candida thrusei, and Candida stellatoidea, respectively. The genus Strychnos (Loganiaceae), consist of about 75 accepted species found throughout the tropics and subtropical Africa [1]. Strychnos spinosa is commonly known as Kaffir orange, Spiny monkey orange or Natal orange. It is utilized variously in African traditional medicine for ailments such as dropsy, earache, snakebite, fever, elephantiasis, fever epilepsy and rheumatism [2]. The isolation and structural elucidation of the iridoid sarracenin from the root bark of this plant and its antimicrobial activity against Staphylococcus aureus, Streptococcus pyogenes, Shigella dysenteriae, Klebsiella pneumonia, Candida albicans Candida tropicalis, Candida thrusei, and Candida stellatoidea, respectively, is hereby reported. Results and Discussion. The compound was obtained as fine, transparent, needle shaped crystals. It was determined as Sarracenin using 1D and 2D-NMR experiments, and comparison with reported data [3, 4, 5]. Some revisions to reported chemical shift assignments [3, 4] based on our DEPTq135, H, H-COSY, HMBC, HSQC and NOESY data are suggested. Table 1.1HNMR Data of Sarracenin in CDCl3 (ÃŽ ´ in ppm, J in Hz) based on fig. 1A DEPT spectra: DEPTq 135 spectrum gave the proton chemical shifts 166.77 (quaternary or methylene), 150.08 (methine or methyl), 112.32 (quaternary or methylene), 91.68 (methine or methyl), 88.13 (methine or methyl), 68.99 (methine or methyl), 51.42 (methine or methyl), 35.06 (quaternary or methylene), 32.26 (methine or methyl), 22.06 (methine or methyl), 18.70 (methine or methyl). The conclusion by Miles et al, [3] that signals at 35.1 and 22.1 are due to methine (C-5) and methylene (C-6), respectively, does not agree with our results; otherwise, we agree with their 13 C conclusions. Similarly, Wang et al, [4] report of chemical shifts at 91.7 as quaternary, 112.3 as methine, 18.7 as quaternary and 166.8 as methyl (Table 2.) is at variance with their justifications on HMQC and HMBC data. In addition, Wang et al, [4] reports 1HNMR (400 MHz, CDCl3) ÃŽ ´ 5.78 (d, J = 1.6 Hz), 1.34 (d, J = 6.5Hz, 3 H) as signals for protons at C-1 and C- 10, respectively; no protons are located at those positions (Figure 1A). It would seem a different numbering scheme was used, however, two different numberings were considered (Figures 1A 1B) neither agreed completely with Wang et al, [4]. Those assignments would appear to have distorted conclusions on 1H, 1H-COSY, HMBC and HMQC data (Tables 1 2). 1HNMR (400 MHz, CDCl3) ÃŽ ´ 7.46 (s, 1H), 5.79 (t, J = 1.9 Hz, 1H), 4.99 (dd, J = 3.5, 0.8 Hz, 1H), 4.22 (q, J = 6.5 Hz, 1H), 2.98 (ddt, J = 10.7, 4.0, 1.9 Hz, 1H), 2.44 – 2.31 (m, 1H), 1.68 (dddd, J = 10.0, 5.3, 2.9, 1.0 Hz, 2H), 1.35 (d, J = 6.5 Hz, 3H). Table 2.13C-NMR Data of Sarracenin in CDCl3 (ÃŽ ´ in ppm) based on fig. 1A Key * = Major areas with observed variation. It was noted that the compound contained 11 signals using13C-NMR and DEPT spectra, including two Me, one CH2, six CH, and two quaternary carbons. Analysis of overall NMR spectroscopic data revealed the signals at 1 2 E Figure 1A. Numbering of Sarracenin as by Miles et al, [3] and present work, B: Numbering as on www.chemspider.com[6] C: Important HMBC correlations, D: Important NOESY correlations, E: Important 1H-1HCOSY correlations. 1HNMR (400 MHz, CDCl3, TMS)ÃŽ ´7.46 (s, 1 H), 5.79 (t, J = 1.9, 1 H), 4.99 (dd, J = 3.5, 0.8, 1 H), 4.22 (q, J = 6.5, 1 H), 3.76 (s, 3 H), 2.98 (ddt, J = 10.7, 4.0, 1.9, 1 H), 2.37, 1.68 (m, dddd, J = 10.0, 5.3, 2.9, 1.0, 2 H), 1.35 (d, J = 6.5, 3 H); 13CNMR and DEPT (100 MHz, CDCl3, TMS) 166.77 (ester C=O), 150.08 (olefinicCH), 112.32 (olefinic quaternary carbon), 91.68 (CH), 88.13 (CH), 68.99 (CH), 51.42 (ester OCH3), 35.06 (methylene), 32.26 (CH), 22.06 (allylic CH), 18.70 (CH3) Antimicrobial activity The antimicrobial activities of sarracenin were assayed against some pathogenic microbes obtained from the Department of Medical Microbiology A.B.U. Teaching Hospital, Zaria, Nigeria. The compound showed significant antibacterial and antifungal activities against Staphylococcus aureus, Streptococcus pyogenes, Escherichia coli, Salmonella typhi, Shigella dysenteriae, Pseudomonas aeroginosa, Klebsiella pnuemoniae, Candida tropicalis and Candida stellatoidea (Table 3.). This points sarracenin out as a major medicinal principle of Strychnos spinosa and lends justification to its use in traditional medicine. Experimental Collection of Plant Material The root bark of Strychnos spinosa was collected from Katsina-Ala, Benue State, Nigeria, in August, 2013. The bark was air-dried and their size reduced with the aid of a wooden mortar and pestle. Extraction and Isolation The ground material (750 g) was macerated for 72 hours using 500 mL each of hexane, chloroform, ethyl acetate and methanol. Preliminary antimicrobial screening revealed the ethyl acetate extract to be most active against test microbes. Thus the ethyl acetate extract (10 g) was separated by Vacuum liquid chromatography. A very gentle gradient elution was used from hexane through to ethyl acetate. Thirty fractions (25 ml each) were collected and allowed to evaporate to approximately half their initial volumes. Fine needles were observed in fractions 20-25. These were monitored by TLC on ethyl acetate- methanol (1:1) solvent system and plates visualized using iodine vapour. The combined needles (221 mg) were further purified using SephadexLH20 with methanol-ethyl acetate ratio (1:1) as solvent. 1HNMR, 13CNMR and 2DNMR experiments were carried out on the purified compound using 30 mg. Its melting point was 123 – 1240C determined using Electro thermal IA 9300 (Gallenkhamp capillary melting point apparatus with a thermometer). Antimicrobial Assay The compound (0.01 mg) was weighed and dissolved in DMSO (10 mL) to obtain a concentration of 10 Â µg/mL (This would subsequently be used to determine the antimicrobial activities of the plant). Mueller Hinton and Sabouraud dextrose agar were used as growth media for the microbes. All the media were prepared according to the manufacturer’s instructions, sterilized at 121 oC for 15 min and were poured into sterile petri dishes, allowed to cool and solidify. Disc diffusion method was used to screen the initial crude extracts. Sterilized media were seeded with a standard inoculum (0.1 ml) of test microbe, Mueller Hinton for the bacteria and SDA for the fungi. The inoculum was spread evenly over the surface of the media using a sterile swab. A well (6 mm) was cut at the center of the inoculated medium using a standard cork-borer (6 mm diameter). Solution of the extract (0.1 mL) was introduced into each well of the inoculated medium. The inoculated media were incubated at 37 oC fo r 24 hours for bacteria and at 30 oC for 7 days for the fungi, after which plates were observed for zones of inhibition of growth. Minimum Inhibitory Concentration of the compound was determined using the broth dilution method. Minimum bactericidal concentration and minimum fungicidal concentration (MBC and MFC) were also carried out to determine whether the test microbes were killed or only inhibited. Ciprofloxacin, Fulcin and Fluconazole were used as positive controls. Table 3. Antimicrobial Activity of sarracenin Key: S = Sensitive, R = Resistant, = (No turbidity) No colony growth, Ã ° = MIC or MBC or MFC, + = (Turbid) Scanty colony growth, ++ = Moderate colony growth, +++ = Heavy colony growth References Sitrit, Y., Loison, S., Ninio R, et al. (October 2003). Characterization of monkey orange (Strychnos spinosa Lam.), a potential new crop for arid regions. J. Agric. Food Chem. 51 (21): 6256–60. De, B.B. and Bisset, N.G. (1988). Alkaloids from the leaves of strychnos wallichiana steudelEx. A. DC. Indian Drugs 26 (2): 90-91. Miles, H. D.,Kokpol, U., Bhattacharyya, J.,Atwood, J. L.,Stone, K. E.,Bryson, T. A. and Wilson, C. (1976). Structure of Sarracenin. An Unusual EnolDiacetalMonoterpene from the Insectivorous Plant Sarracenia Java.J. Am. Chem. Soc. (6) 1570 Wang, Y., Wei, Q., Yang, L., and Liu, Z. (2003). Iridoid Glucosides from Chinese Herb Lonicerachrysathaand their antitumor activity. J. Chem. Research (S) 676-677 Yang, X., Li, E., Zhang, Q., Yuan, C., and Jia, Z. (2006). Five New Iridoids from Patrinarupestris. Helv. Chim. Acta. (3) 762-770 http://www.chemspider.com

Friday, October 25, 2019

State Laws :: essays research papers

Most legal disputes involving state law are initially decided in the trial courts or by an administrative agency. But after such a decision, an individual may turn to the state’s appeal courts if he or she believes a legal error occurred that harmed the case. In fact, thousands of cases are appealed every year.(1) They include criminal convictions as well as civil cases involving personal injury, contracts, employment, real estate, probate, divorce, child custody and many other issues. Whenever an appellate court reverses a trial court decision, it almost always allows that court to rehear the case using the correct law and procedures. In the vast majority of cases, the decision of a Court of Appeal is final. The state Supreme Court does not review the vast majority of cases – it steps in to resolve new or disputed questions of law as well, as to review death penalty cases. Death penalty cases proceed directly to the Supreme Court, bypassing the lower Court of Appeal. The appellate courts of California consist of the Supreme Court and the Courts of Appeal. The judges who serve on these courts are called appellate justices. There are seven justices on the Supreme Court and 93 justices on the Courts of Appeal. The Courts of Appeal are divided into six geographical districts and hear cases arising within the district. Proceedings in appellate courts are very different from those in trial courts. In trial courts a judge or jury hears the testimony of witnesses and reviews physical evidence, exhibits and documents before deciding a case. Appellate courts do not decide an appeal by taking new evidence or reassessing the credibility of the witnesses who testified in the trial court. Instead, they review the written record to determine if the trial court properly interpreted the law and used the correct procedures when considering the case. The opposing parties submit written documents, called briefs, to assert their position. The parties also participate in oral arguments before the appeal court justices. To ensure that the cases are examined from several perspectives and receive a thorough analysis, each Court of Appeal case is decided by three appeal court justices. All seven justices decide the Supreme Court cases. In both cases, a majority of justices must agree on a decision. All justices are bound to apply the law whether they agree with that law or personally disagree with it.

Thursday, October 24, 2019

Nelson Mandela’s Speech “I Am Prepared to Die” Essay

In 1962-1964, Nelson Mandela was charged for opposing the white government of South Africa, high treason, sabotage, and the conspiracy to overthrow the government. In his defense, Mandela gave a speech titled â€Å"I am Prepared to Die† at his trial. This speech is powerful and full of literary devices. In parts of this potent speech he utilizes facts, statistics, and allusions as a tool to his defense. In the beginnings of his speech he uses an anecdote, which is a short interesting story about a real incident or person. Here Mandela states that as young boy in Transkei he listened to the elders of his tribe telling stories of how it used to be, and of wars their ancestors fought against the fatherland, and names such as Dingane, Bambata, Hinsta, and Makana were praised all over the African nation. He uses this to elucidate that he hoped to help his people and make a difference in their freedom. As of the factual parts he states within them, that he admits he was one of the people who helped to form Umkhonto we Sizwe until he was arrested in August 1962, holds a Bachelor’s Degree in Arts and practiced as an attorney in Johannesburg, a convicted prisoner serving five years, and saying that more than 85,000 people defied the apartheid laws and went to jail. With more facts throughout the speech, it gave Mandela more of a reasoning to not be convicted. As of the statistical portions of this speech he stated that more than 85,000 people were arrested for defying the apartheid laws, adaging that 70 percent of South Africa were not entitled to vote, also stating that sixty-nine unarmed Africans died at Sharpeville. These statistics gave Mandela more edge to his defense and supported him. Though Mandela’s speech was intense it wasn’t enough to find him innocent. He was sentenced to life, which he was released at 71 years of age, on February 11, 1990. Yet I still find that this speech was powerful. The literary devices gave him edge and his evidence was correct.

Wednesday, October 23, 2019

A Brief Analysis of Subprime Crisis

A Brief Analysis of Subprime Crisis Introduction The US subprime mortgage crisis was one of the first indicators of the late-2000s financial crisis, characterized by a rise in subprime mortgage holes and foreclosures, and the resulting decline of securities backing mortgages. Approximately 80% of U. S. mortgages issued to subprime borrowers were adjustable-rate mortgages. After U. S. house sales prices peaked in mid-2006 and began their steep decline forthwith, refinancing became more difficult.As adjustable-rate mortgages began to reset at higher interest rates, mortgage crisis soared. Securities backed with mortgages, including subprime mortgages, widely held by financial firms, lost most of their value. Global investors also drastically reduced purchases of mortgage-backed debt and other securities as part of a decline in the capacity and willingness of the private financial system to support lending. Concerns about the safety of U. S. credit and financial markets led to tightenin g credit around the world and slowing economic growth in the U.S. and Europe. 1. Background—mortgage market The immediate reason or trigger of the crisis was the bursting of the United States housing bubble which peaked in approximately 2005–2006. High default rates on â€Å"subprime† and adjustable-rate mortgages , began to increase quickly thereafter. An increase in loan incentives, such as simple initial conditions and long-term trend of rising housing prices encouraged borrowers to increase the commitment that they will be able to quickly re-financing more favorable conditions for mortgage difficulties.Additionally, the economic incentives provided to the originators of subprime mortgages, along with outright fraud, increased the number of subprime mortgages provided to consumers who would have otherwise qualified for conforming loans. However, once interest rates began to rise and housing prices started to drop moderately in 2006–2007 in many parts o f the U. S. , refinancing became more difficult. Defaults and foreclosure activity increased dramatically as easy initial terms expired, home prices failed to rise as expected, and adjustable-rate mortgage interest rates reset higher.Falling prices also resulted in 23% of U. S. homes worth less than the mortgage loan by September 2010, providing a financial incentive for borrowers to enter foreclosure. The ongoing foreclosure epidemic, which part of subprime loans, that began in late 2006 in the U. S. continues to be a key factor in the global economic crisis, because it drains wealth from consumers and erodes the financial strength of banking institutions. In the years leading up to the crisis, significant amounts of foreign money flowed into the U. S. from fast-growing economies in Asia and oil-producing countries.This inflow of funds combined with low U. S. interest rates from 2002-2004 contributed to easy credit conditions, which fueled both housing and credit bubbles. Loans of various types (e. g. , mortgage, credit card, and auto) were easy to obtain and consumers assumed an unprecedented debt load. As parts of the housing and credit booms, the amount of financial agreements called mortgage-backed securities, which derive their value from mortgage payments and housing prices, greatly increased. This financial innovation so that institutions and investors around the world to invest in the U.S. housing market. With falling house prices, is to use the world’s leading investment mortgage-backed securities severe financial institutions to report significant losses. Defaults and losses on other loan types also increased significantly as the crisis expanded from the housing market to other parts of the economy. Total losses are estimated in the trillions of U. S. dollars globally. While the housing and credit bubbles were growing, a series of factors caused the financial system to become increasingly fragile.Policymakers did not recognize the increasingl y important role played by financial institutions such as investment banks. Some experts believe these institutions had become as important as commercial banks in providing credit to the U. S. economy, but they were not subject to the same regulations. These institutions and some regulated banks was also a significant debt burden, while providing the loans, there are not enough financial cushion absorb large amounts of loan default or mortgage-backed securities losses. These losses impacted the ability of financial institutions to lend, slowing economic activity.Concerns regarding the stability of key financial institutions drove central banks to take action to provide funds to encourage lending and to restore faith in the commercial paper markets, which are integral to funding business operations. Governments also bailed out key financial institutions, assuming significant additional financial commitments. The risks to the broader economy created by the housing market downturn and subsequent financial market crisis were primary factors in several decisions by central banks around the world to cut interest rates and governments to implement economic stimulus packages.Effects on global stock markets due to the crisis have been dramatic. Between 1 January and 11 October 2008, owners of stocks in U. S. corporations had suffered about $8 trillion in losses, as their holdings declined in value from $20 trillion to $12 trillion. Losses in other countries have averaged about 40%. The value of the stock market and housing losses further down the local consumer spending, an important economic engine downward pressure. The larger developed countries and emerging nations in November 2008 and March 2009 met with state leaders to develop strategies to resolve the crisis.A variety of solutions have been proposed by government officials, central bankers, economists, and business executives. 2. Causes The crisis can be attributed to a number of factors pervasive in both housi ng and credit markets, factors which emerged over a number of years. 2. 1 Boom and bust in the housing market The housing bubble in the United States grew alongside the stock of the late1990s. High stock wealth induced families to spend more of their new disposable income and save much less. This â€Å"consumption boom† was largely focused on housing.The increase in damand for housing had multiple effects. First, the value of houing increased, which in turn increased demand of housing and jump-started the bubble. Second, the supply of housing decreased and more housing had to be built to meet the rising demand. The rising housing prices created an expectation that housing values would continue to rise, leading home buyers to pay more for housing than the housing was actually worth. This self-fulfilling cycle continued until the median price of housing outgrew median incomes, peaking in about 2005.When the growth became unsustainable in 2006, the housing bubble â€Å"burstâ⠂¬ . Before the rapid rise, followed by a sharp fall in housing prices, which will greatly exceed the mortgage debt, the translation of the value of the property. 2. 2 High-risk mortgage loans In the years before the crisis, the behavior of lenders changed dramatically. Lenders offered more and more loans to higher-risk borrowers, including undocumented immigrants. Subprime mortgages amounted to $35 billion in 1994, 9% in 1996, $160 billion in 1999, and $600 billion in 2006.A study by the Federal Reserve found that the average difference between subprime and prime mortgage interest rates declined significantly between 2001 and 2007. Decline in risk premiums and credit standards are common to the combination of the credit boom and bust cycles. In addition to considering higher-risk borrowers, lenders have offered increasingly risky loan options and borrowing incentives. In 2005, the median down payment for first-time home buyers was 2%, with 43% of those buyers making no down paymen t whatsoever. By comparison, China has down payment requirements that exceed 20%, with higher amounts for non-primary residences.The mortgage qualification guidelines began to change. At first, the stated income, verified assets loans came out. Proof of income was no longer needed. Borrowers just needed to â€Å"state† it and show that they had money in the bank. Then, the no income, verified assets loans came out. The lender no longer required proof of employment. Borrowers just needed to show proof of money in their bank accounts. The qualification guidelines kept getting looser in order to produce more mortgages and more securities. This led to the creation of NINA. NINA is an abbreviation of No Income No Assets.Basically, NINA loans are official loan products and let you borrow money without having to prove or even state any owned assets. All that was required for a mortgage was a credit score. 2. 3 Mortgage fraud In 2004, the Federal Bureau of Investigation warned of an â€Å"epidemic† in mortgage fraud, an important credit risk of nonprime mortgage lending, they said, could lead to â€Å"a problem that could have as much impact as the S&L crisis†. The Financial Crisis Inquiry Commission reported in January 2011, that: â€Å"†¦ mortgage fraud†¦ flourished in an environment of collapsing lending standards and lax regulation.The number of suspicious activity reports—reports of possible financial crimes filed by depository banks and their affiliates—related to mortgage fraud grew 20-fold between 1996 and 2005 and then more than doubled again between 2005 and 2009. One study places the losses resulting from fraud on mortgage loans made between 2005 and 2007 at $112 billion. Lenders made loans that they knew borrowers could not afford and that could cause massive losses to investors in mortgage securities. † New York State prosecutors are examining whether eight banks hoodwinked credit ratings agencies, to in flate the grades of subprime-linked investments.The Securities and Exchange Commission, the Justice Department, the United States attorney’s office and more are examining how banks created, rated, sold and traded mortgage securities that turned out to be some of the worst investments ever devised. In 2010, virtually all of the investigations, criminal as well as civil, are in their early stages. 2. 4 Credit default swaps Credit default swaps are financial instruments used as a hedge and protection for debtholders, in particular MBS investors, from the risk of default.As the net worth of banks and other financial institutions deteriorated because of losses related to subprime mortgages, the likelihood increased that those providing the protection would have to pay their counterparties. This caused the system uncertainty, investors did not know which company would be required to pay to cover the mortgage defaults. When investment bank Lehman Brothers went bankrupt in September 2008, there was much uncertainty as to which financial firms would be required to honor the Credit default swaps contracts on its $600 billion of bonds outstanding.Merrill Lynch’s large losses in 2008 were attributed in part to the drop in value of its unhedged portfolio of collateralized debt obligations after AIG ceased offering Credit default swaps on Merrill’s collateralized debt obligations. The loss of confidence of trading partners in Merrill Lynch’s solvency and its ability to refinance its short-term debt led to its acquisition by the Bank of America. 2. 5 Boom and collapse of the shadow banking system The securitization markets supported by the shadow banking system started to close down in the spring of 2007 and nearly shut-down in the fall of 2008.More than a third of the private credit markets can not be uesd as a source of funds. According to the Brookings Institution, the traditional banking system does not have the capital to close this gap as of June 2009: â€Å"It would take a number of years of strong profits to generate sufficient capital to support that additional lending volume. † The authors also indicate that some forms of securitization are â€Å"likely to vanish forever, having been an artifact of excessively loose credit conditions. † 3. Impacts 3. 1 Impact on the USThe credit market is likely to respond with tighter lending standards, fewer warehouse subprime mortgage lines, fewer subprime lenders, and greater self-regulation and reformation, most of which will be driven by the securitization market to the extent that it still exists. There may be an urge to proactively modify loans that would likely result in default. The increased pressure from the government and consumer groups, combined with new subprime lending standards, will decrease lenders’ willingness to lend to nonprime borrowers and investors’ willingness to participate in subprime loan securitization.The result has been a nd will continue to be a â€Å"credit crunch† for subprime borrowers. The result will decrease availability of subprime lending, which in turn, will decrease homeownership among low-income or minority borrowers. When the housing bubble began to deflate in 2006, borrowers saw a sharp reduction in the value of their homes, and found themselves in a position of â€Å"negative equity†, or a mortgage debt that far exceeded the value of the mortgaged home. Because homeownership is the single most important source of wealth, this meant many Americans experienced a dramatic loss in personal wealth.The decline in home prices has cost American homeowners more than 4 trillion dollars in wealth, and as previously noted, has cost African Americans alone between $71 and $122 billion. The decrease in home values not only caused homeowners, but also communities, to lose wealth. As a result of foreclosure, surrounding house values have declined. Neighbors matter when it comes to puttin g a value on homes. Appraisers use comparable sales data to calculate the value of a home, which lenders require for selling and refinancing.Comparable sales in the community to reduce problems of all foreclosure houses, where in a position to sell the owner is not a pleasant option value. In addition, the borrower becomes unable to refinance at lower interest rates, this will cause even more foreclosures. 3. 2 Impact on the Chinese economy The US credit crunch has played out in the Chinese housing market. The house price movements in China, the US and the UK have moved synchronically, with the Chinese market lagging a bit behind the two developed countries.The market condition of China at the start of 2008 was similar to the US market during the first half of 2007, when the house prices began to drop. House prices in China increased sharply and even doubled during 2006-2008 in some fast developed cities. The Chinese National Development and Reform Commission showed that the House P rice Index of 70 Large- and Medium-sized Cities in China rose 6. 5% in 2008, 1. 1% lower than the previous year. Meanwhile, the interest rate adjustment is widely used as a monetary instrument by most central banks to manage their national economies.From January 2001 to 2003, the US Federal Reserve cut the interest rate from 6. 5% to 1% to boost the economy . Cheap credit overheated the US housing market quickly. Consequently, the Federal Reserve raised interest rates to cool the market. This U-turn in interest rate policy was the catalyst for the crash in the housing market that accelerated from 2006 onwards. 4. Regulatory proposals and long-term solutions President Barack Obama and key advisers introduced a series of regulatory proposals in June 2009.The proposals address consumer protection, executive pay, bank financial cushions or capital requirements, expanded regulation of the shadow banking system and derivatives, and enhanced authority for the Federal Reserve to safely wind -down systemically important institutions, among others. The Dodd–Frank Wall Street Reform and Consumer Protection Act was signed into law in July 2010 to address some of the causes of the crisis. 4. 1 State and Local Action Increasingly, state and local governments have taken action responding to the foreclosure crisis through a combination of municipal litigation and anti-predatory lending bills.Baltimore and Cleveland initiated public nuisance suits against prominent lenders last year for targeting their communities through predatory lending. These cases may have an important role in providing meaningful, timely relief for a large number of homeowners who are in default or on the verge of default. In addition, over 25 states have initiated anti-predatory lending legislation triggered by North Carolina’s successful legislation enacted in 1999 and 2000. However, state legislation is limited due to federal anti-predatory lending statutes preempting state action.The Bal timore complaint, in particular, stresses the racialized impact of predatory lending. Two-thirds of the foreclosures associated with Wells Fargo lending were in census tracts with over 60% African American populations, while less than 16% were in tracts with less than 20% African American residents. 4. 2 Federal Legislative Actions Over the last year, Congress has introduced a variety of proposals designed to address the crisis, from increased funding for housing counseling and consumer education to empowering bankruptcy judges to unilaterally change the terms of existing mortgages to bail-out distressed borrowers.Federal and state regulators are following suit with guidance and restrictions on some prime lending. There has been an increase in litigation related to the subprime lending market based on discriminatory predatory lending, an increased call for â€Å"suitability standards† in mortgage lending, and more non-consumer law suits, such as investors suing issuers, lende rs suing brokers, and investors suing lenders. This comprehensive legislation includes the Federal Housing Finance Regulatory Reform Act, The Hope for Homeowners Act, and the Foreclosure Prevention Act.The Federal Housing Finance Regulatory Reform Act provides regulation for government sponsored entities such as Fannie Mae and Freddie Mac and the Federal Home Loan Banks. This regulator will have the authority to establish capital standards, prudential management standards; enforce its order through cease and desist authority, civil money penalties and the authority to remove officers and directors; restrict asset growth and capital distributions for undercapitalized institutions; put a regulated entity into receivership; and review and approve new product offerings of the enterprises.Conclusion This subprime mortgage crisis demonstrated a lesson for the world. Every financial institution and company learned an expensive lessen from it. Every country learned what they should do and w hat they should avoid in the future. Moreover, each individual also learned the norm, the ethics, and the responsibilities that they need to follow and take in business practice. One important thing to remember is to not be too obsessed and greedy about anything.