Saturday, August 31, 2019

Respect to Culture Essay

This paper will highlight the key issues that Kellogg’s should consider when deciding to expand to the country of Jordan. Will the people living in Jordan able to afford this product? What are the values connected to the people that will force them to purchase it? What is needed to fill this heterogeneous culture? All these questions will be answered in this paper with respect to the product Special K by Kellogg’s. Homogenous vs. Heterogeneous with Respect to Culture The population of Jordan is divided into different ethnic groups which include the Bedouins, the people from Circassia and the Palestenians. The majority of the Jordanians is from the Arab descent and form a population of around 4. 4 million (The Royal Hashemite Court). These Arabs have migrated into Jordan from numerous origins. These people mainly travelled in tribes and whole tribes used to migrate into Jordan before the 19th Century. The population also includes some proportions of Muslim refugees from Caucasus who migrated to Jordan when Russia invaded. Jordan also houses some Americans and small groups of Chechens. Therefore the culture in Jordan is expected to be pretty heterogeneous as the population includes people from diverse backgrounds and descents. There is heterogeneity of languages being taught and learnt in Jordan. People in Jordan are given complete freedom to preach their religion, teach their language and promote their culture. This makes Jordan so culturally diverse and rich. The different ethnic groups have their own clubs, places of worships, schools and associations which has allowed the heterogeneity of culture to remain in Jordan. There has been a tradition of appreciation and tolerance for the diverse cultural background. Around 6% of the population comprises of Christian population but the majority 92% consists of Sunni Muslim population (The Royal Hashemite Court). Hence, some similarities in culture can also be expected as almost 9 out of every 10 people in Jordan are Sunni Muslims. These Sunni Muslims belong to same sect of the same religion which makes their religious activities the same. Hence we can conclude that Kellogg’s will have to consider the diverse cultural background as the population are from different countries and descents, however, the same religion of most of the people is going to make it easier for Kellogg’s to penetrate the market as the religious views and values will be the same for most of the people in Jordan. Needs that Kellogg’s Special K can Fill in this Culture Kellogg’s Special K mostly attracts the people who are aware and conscious about their health. Boosting the physical activity for attaining better fitness is the goal of most of the people in the developed nations now. Increased physical activity can not only improve the mood but also improve the health of a person. The people of Jordan require a little addition to their lives which can be added to their daily routine and can have a good affect on their health. The ethnically diverse population of Jordan has different practices for maintaining their health. Some people go for a brisk walk, while others regularly go to the gym. The median population in Jordan is around 22 years old which means the population is pretty young. Most of these people are health conscious and engage in regular physical activity to stay fit. The target market of Kellogg’s Special K will be the urban population which consists of 78% of the total population. The urban population is the wealthy lot which has concerns about their health and body weight. This population can be targeted by telling them the health benefits of consuming Kellogg’s Special K. Kellogg’s Special K website includes expert advice of how to get slimmer, Body Mass Index (BMI) calculator and free personal planner (Kellogg’s). It also includes the nutritional plan for the whole day and informs about the nutrition that Special k provides. The population of Jordan is yet not informed about the importance of breakfast and hence this is the perfect time to introduce the Special K with variety of nutrient intake. Can Enough People Afford the Product? Around 15% of the population in Jordan lives below the poverty line which means that they do not have enough money to afford the basic necessities of life. The economy of Jordan is amongst the smallest in the Arab world. There are insufficient supplies of food, water and other health care items. In other words, the economy was suffering from poverty until ten years back King Abdullah implemented changes in foreign policies and economic reforms that took Jordan to a higher level. In the current situation, Jordan’s economy has not been so hard hit like the other economies because of the isolation from the international market (CIA). However, the top ten percent population has the highest percentage share of total income. Around 30% of the total income is being earned and spent by the top ten percent of the population and this population can certainly afford Kellogg’s Special K. The GDP per capita has risen to US$ 5,300 which is a lot higher than many developing countries. Around 13% of the population is unemployed in Jordan but still the imports of the country amounted to US$ 12 billion in 2009 which indicates that many people in the country can afford to have foreign goods imported. The most imported items include oil, machinery, equipment, iron and cereal and the major import partners are USA, Saudi Arabia, China and Germany (CIA). Hence it can be expected that enough people will purchase the Kellogg’s Special K who are in the top income group and have concerns for their health. Values Relevant to the Purchase and Use of Special K The Bedouins find it hard to search for food as most of them are still nomadic in nature. What they need is some form of dried food which can be consumed at any time of the day or night without water and other staple food. Kellogg’s Special K can be consumed with milk and milk is available abundantly to these nomadic tribes as they have many animals such as camels, sheep and goats which give milk. The Palestinians who left their homeland in the wars of 1967 and 1948 and came to Jordan stilled have not settled down and many do not have living spaces. These people can be provided with Kellogg’s Special K as it is a dry food and it does not require special handling like other local foods. The value of Special K is pretty high because of the nutrient contents of the cereal. Most of the population is now getting educated and moving into urban cities and adopting the foreign lifestyle. As the penetration of television is also increasing in the population, they are starting to follow the Western lifestyle which includes a healthy breakfast. Therefore the value of Kellogg’s Special k will be pretty high for the purchase as it provides an easy way to make the breakfast with a lot of health benefits and nutrients. Works Cited CIA. Fact Book. 2009. 21 July 2010 . Kellogg’s. The Importance of Breakfast. 2010. 21 July 2010 . The Royal Hashemite Court. The people of Jordan. 2001. 21 July 2010 .

Friday, August 30, 2019

Mina Harker: A Strong Character Essay

A strong character is one who possesses many qualities such as being selfless, courageous and sacrificial. Dracula written by Bram Stoker portrays the young and witty Mina Harker. She is the best example to fit the description of a strong character. Mina starts off as a young school mistress who is engaged. As the plot progresses, her normal life changes and she is faced with many challenges that she overcomes, that show that she is the strongest personality in the novel. The first attribute that portrays Mina as being the strongest character in the novel is her habit of being caring of everyone. The first time we see Mina doing so is when Lucy tells her that she has been proposed to by three different men, Dr. Seward, Quincey P. Morris, and Arthur Holmwood. Lucy loves the attention that is given to her by the three men and just like any best friend she tells Mina about it. Lucy says, â€Å"Just Fancy! THREE proposals in one day!† (P. 60) Meanwhile, Jonathan, Mina’s fiancà ©e has been out of reach for the past month. Mina is quite worried about it but she hides her pain from Lucy so she doesn’t worry about her problems. This not only shows that she is caring, it also shows that she is a great friend. Another example of Mina being caring is when she was staying with Lucy and her mother. Lucy had just started sleep walking and Mina did whatever she could to stop her. Mina did that despite knowing that she was under the curse of Dracula. She wrote, â€Å"Lucy did not wake, but she got up twice and dressed herself. Fortunately, each time I awoke in time and managed to undress her without waking her, and got her back to bed.† (P.93) Mina does a lot of little things that show that she is a genuinely caring person. Mina shows the reader that she cares about the ones around her and she is willing to do anything for them, even if it means to sacrifice her wants and needs. She shows that she really loves her husband by sacrificing for his sake. Her journey of sacrificing starts when she is called to Vienne because Jonathan has been staying there because he was ill. Within a very short time of being with Jonathan, they get married. She marries a man who is not very sane at that time because of what he has been through. Jonathan’s insanity  starts to become more obvious to her when he and Mina are walking down the road and he spots the Count and says â€Å"I believe it is the Count, but he has grown young.† (P. 184) Mina says that Jonathan was â€Å"was very pale, and his eyes seemed bulging out as, half terror and half in amazement.† (P. 183) She doesn’t get upset or regret marrying Jonathan. She doesn’t break down despite everything that’s going on aroun d her. This proves how strong she really is. The heroine of the novel continues to show how strong she really is by protecting her husband. After marrying Jonathan, Mina becomes Dracula’s next victim. Even though, it is not clearly said, she is dragged into Dracula’s deceitful plan because she is Jonathan’s wife. In chapter 21, Dracula comes into Mina’s room and threatens her by saying if she screams he’ll kill Jonathan. Dracula then makes her drink blood from his chest. Mina made another sacrifice by protecting her husband by doing something very unhygienic and immoral. She shows her strengths by protecting her husband all for the great sacrifice for love. The sacrifices that she makes show how much courageous she has. Her bravery in the plan to kill Count Dracula shows that she is willing to risk her life in order to save mankind from Dracula’s immorality. Her bravery begins to show right after Lucy has become un-dead and Van Helsing wants answers from Mina. The idea of being interrogated about somebody’s death can be quite frightening. Although, Mina shows that she is brave and answers everything Van Helsing has to ask. Van Helsing and the other men start to think of her as a â€Å"new woman† rather than a Victorian woman. Her ability to be brave like a man puts her in a position in which she is thought of as to be one of them. Van Helsing says, â€Å"Ah, that wonderful madam Mina! She has a man’s brain- a brain that a man should have where he much gifted- a woman’s heart. The good God fashioned her for a purpose believe me.† (P.253) This leads to the men trusting Mina with the strong qualities that she possesses. They know that despite the fact that she is a woman, she is brave. Mina shows her bravery and courage again when the men leave her in Dr. Seward’s home while they go to Carfax. The courage the she shows in these small scenes makes her a strong person overall. Despite all of the â€Å"new woman† qualities she possess such as bravery and  intelligence. She also possesses some other attributes of a strong person. She is a great listener and very comforting. Right after Lucy’s death, Van Helsing gets caught up in trying to explain what actually happened to Lucy to the other men. Dr. Seward, Quincey P. Morris and Arthur were in love with her. They went through quite an emotional ride after finding out what happened to her. In Chapter 17, everybody decided to meet at Dr. Seward’s house. The three men that loved Lucy hadn’t really opened up to anybody about their pain. Dr. Seward went through a lot of pain after seeing what Lucy went through. He hid it from others and himself by working day and night. On the other hand, Arthur was quite upset and shared a cry with Mina. Arthur and Mina were talking about Lucy and â€Å"he turned away and covered his face with his hands.† (P.247) Mina could hear him crying. Then Mina comforted him, something that the men had never done before. She became more of a motherly personality to him. She said, â€Å"With a sob he laid his head on my shoulder and cried like a wearing child, whilst he shook with emotion.† (P.247) Arthur understood that she had comforted him so he spoke to her freely. He said, â€Å"and none other can ever know __ how much your sweet sympathy has been to me to-day.† This shows that Mina is strong because she can provide emotional support to the people around her, something that the men can’t even do.

Thursday, August 29, 2019

Banana Peel as an Alternative Floor Wax Research paper

TABLE OF CONTENTS CHAPTER I: The problem and its settings Statement of the problem Importance and Significance of the study Definition of terms Scope and Delimitation of study Conceptual Framework CHAPTER II: Related Literature Studies CHAPTER III: Methods of Research and Procedure CHAPTER IV: Analysis Presentation and Interpretation of Data CHAPTER V: Summary, Conclusion Recommendation CHAPTER VI:  Bibliography Chapter I: The problem and its setting The Statement of the problem: a) Can banana be an alternative source in making a floor wax? b) Can Pandan leaves helps to lessen the original odor of a particular products? MISSION: To know if the banana peels can be an alternative source of making floor wax and also to create a floor wax that has a less odor compared to the other floor wax that we had. To inform are target market that they can create floor wax by using banana peels. The purpose of this research is to innovate the reusable banana peels to lessen environmental waste. VISION: In 2015, we tend to educate families that they can make a home made floor ax by themselves. In this case, they can save money as well as they can save mother earth. We also want to extend the knowledge to those in the public schools who mostly used floor wax to make their classroom floor shiny. This will educate them that they can make an alternative floor wax instead of buying commercial floor wax. Importance and Significance of the Study This study can give benefits to the people especially to the poor ones to save money for their other needs. Especially in schools, it will give a benefit to the students as well as their parents to save money. Not only on that, this study help people who really used a floor wax in school or even on their house that their health are not affected because we did this wax to lessen the odor of original floor wax. * Scope and Delimitations of Study This study is only limited for the investigation of banana used as alternative source for floor wax making. We chose this study for further investigation if the banana can be an effective source for floor wax and how we can help our mother earth though we are only a student. Definition of Terms a) Banana Peel – main ingredient in making floor wax. b) Pandan leaf – the beneficial plant gave our product an aroma. c) Crude fiber – * Conceptual Framework INPUT * Banana Peel * Pandan Leaves * Candle * Kerosene * Dye OUTPUT An alternative floor wax which is eco-friendly and not hazardous to children’s health. PROCESS All the materials should be prepared. Slice the Banana and Pandan. Crush the candles. Use a casserole to boil a 2cups of water. Boil the pandan within 30minutes. Put the banana peel together with the pandan. Put a 1/2cup of kerosene and 3 teaspoon of cooking oil and dye. Observe the color to know if the extract of the Banana Peel change. Strain and squeeze the banana peel with pandan. Put the crushed candles into casserole and until it melts. Combine the melted candles and the extract of banana peel with pandan. Wait until it forms like a wax. Chapter II: Related  Literature Studies BANANA  is the  common name  for a fruit and also the  herbaceous  plants of the  genusMusa  which produce the commonly eaten fruit. They are native to the tropical region of  Southeast Asia  and  Australia. Today, they are cultivated throughout the  tropics. Banana plants are of the  family  Musaceae. They are cultivated primarily for their fruit, and to a lesser extent for the production of fiber and as ornamental plants. As the bananas are mainly tall, upright, and fairly sturdy, they are often mistaken for trees, when the truth is the main or upright stem is called a pseudostem, literally meaning â€Å"fake stem†, which for some species can obtain a height of up to 2–8 m, with  leaves of up to 3. 5 m in length. Each pseudostem would produce a bunch of yellow, green, or even red bananas before dying and being replaced by another pseudostem. Banana leaves are widely used as plates and for lining cooking pits and for wrapping food for cooking or storage. A section of leaf often serves as an eye-shade. In Latin America, it is a common practice during rains to hold a banana leaf by the petiole, upside-down, over one’s back as an â€Å"umbrella† or â€Å"raincoat†. The leaves of the ‘Fehi’ banana are used for thatching, packing, and cigarette wrappers. Pandan is widely known for the many uses it contributes to us. It is a very beneficial plant that provides many useful things for our day to day life. The aroma of the  pandan leaves  is unique very hard to describe. It is somewhat nutty, similar to fresh hay which is eventually pleasant. You can also found this kind of aroma in some varieties of rice that are grown in South East Asian countries. A good example to that is the Thai Jasmin Rice. The distinct development of the aroma of the said leaves is best when it is wilting because the freshly picked pandan leaf is eventually odourless. But if you dry it, it would surely lose the aroma very quickly. On the other hand, the flavour component of the said plant is still unknown. Some experts suggested that the aroma comes from a volatile product of oxidation degragation of a yellow carotenoid pigment fround on the plant and forms only when the plant is withered. In that aspect, the pandan leaves is also similar to rose and saffron which also has a caratenoid derived aroma compound that makes it smell extra good. Pandan leaves  are a very famous plant in some Asian countries. It contributes a lot in many different ways but most distinctly to enhance the aroma of rice and other rice products, maybe because Pandan leaves has a hay-like odour. There is also other usage of pandan leaves that would contribute a lot to us. The following common usages of  Pandan Leaves  are as follows. The most common use of pandan leaves, especially people in Asia, to add a subtle flavour of pandan in your food. It contributes a very good smell when added in the top of the rice so that, it will produce a good smell. It is very useful since it can add appetite to anyone who will eat the cooked rice. People in Asian countries tend to enjoy eating that kind of rice. It is also best if you add coconut milk together with pandan leaves in the cooked rice. That will result to a very special taste you could ever imagine. You could not compare its taste to anything. It is simply delicious that you can forget it comes from pandan leaves. Another useful thing you can produce through pandan leaves is that you can create a paste out of it. This kind of paste can be use in several kinds of recipes. You just simply cut the leaves, 1 inch each leaves, then place it in a pot at the stove. Add a cup of water to it and place as many leaves as long as it fits the pot. Boil the said mixture. Wait until the leaves are soft. Allow some water to evaporate. Lastly, process the water and the in a food processor to create a paste. By following those simple steps, you will be able to create something useful out of pandan leaves. Floor wax can be made out of used candle by heating the used candles till they melt completely, then we add a little kerosene to the melted candles. This is an excellent polish especially for wooden floors as they keep termites away. Organic matter is the peel’s principal constituent. Proteins account for 0. percent by weight of the peel, lipids are 1. 7 percent, carbohydrates are 59. 1 percent and crude fiber is 31. 7 percent. This composition makes the peel a good animal feedstock. Wood flooring brings an old time, rustic elegance to your home that lasts a life time. Unfortunately, many home owners do not know the correct way to clean and care for their wood floors. A common method for cleaning wood floors is with the use of oil soap. Many wood flooring manufacturers state that using oil soap on your flooring will void the warranty. Oil soap is essentially vegetable oil and vegetable oil leaves a residue behind. For centuries, people have used kerosene to clean their wood flooring. Kerosene will not only keep your floors from looking dull, but it removes heal marks, crayon and lipsticks without causing harm to your floors Chapter III: Methods of Research and Procedure Procedures: All the materials should be prepared. Slice the Banana and Pandan. Crush the candles. Use a casserole to boil a 2cups of water. Boil the pandan within 30minutes. Put the banana peel together with the pandan. Put a 1/2cup of kerosene and 3 teaspoon of cooking oil and dye. Observe the color to know if the extract of the Banana Peel change. Strain and squeeze the banana peel with pandan. 10. Put the crushed candles into casserole and until it melts. Combine the melted candles and the extract of banana peel with pandan. Wait until it form like a wax. Chapter  IV: Analysis Presentation and Interpretation of Data SURVEY QUESTIONNAIRE PART I SURVEY QUESTIONNAIRE PART II Chapter  V: Summary, Conclusion Recommendation CONCLUSION Banana peel has its many uses. One of these is as an alternative resource in making floorwax. It contains good fiber that makes the wax smoother and shiner. It offers the same quality just like the other common floorwax can offer. Moreover, it is cheaper and has a nicer fragrance than the former. Recommendation: The researcher would highly recommended that we could use banana floor wax instead of busy commercial floor wax in the market because it is cheaper and fits in our budget.   Bibliography http://www. hort. purdue. edu/newcrop/morton/banana. html#Other%20Uses http://en. wikipedia. org/wiki/Banana Components of a Banana Peel | eHow. com http://www. ehow. com/info_10033568_components-banana-peel. html#ixzz2KKGbgW6A How to Clean Wood Floors With Kerosene | eHow. com http://www. ehow. com/how_6153768_clean-wood-floors-kerosene. html#ixzz2KKVytGce Banana Peel as an Alternative Floor Wax Research paper TABLE OF CONTENTS CHAPTER I: The problem and its settings Statement of the problem Importance and Significance of the study Definition of terms Scope and Delimitation of study Conceptual Framework CHAPTER II: Related Literature Studies CHAPTER III: Methods of Research and Procedure CHAPTER IV: Analysis Presentation and Interpretation of Data CHAPTER V: Summary, Conclusion Recommendation CHAPTER VI:  Bibliography Chapter I: The problem and its setting The Statement of the problem: a) Can banana be an alternative source in making a floor wax? b) Can Pandan leaves helps to lessen the original odor of a particular products? MISSION: To know if the banana peels can be an alternative source of making floor wax and also to create a floor wax that has a less odor compared to the other floor wax that we had. To inform are target market that they can create floor wax by using banana peels. The purpose of this research is to innovate the reusable banana peels to lessen environmental waste. VISION: In 2015, we tend to educate families that they can make a home made floor ax by themselves. In this case, they can save money as well as they can save mother earth. We also want to extend the knowledge to those in the public schools who mostly used floor wax to make their classroom floor shiny. This will educate them that they can make an alternative floor wax instead of buying commercial floor wax. Importance and Significance of the Study This study can give benefits to the people especially to the poor ones to save money for their other needs. Especially in schools, it will give a benefit to the students as well as their parents to save money. Not only on that, this study help people who really used a floor wax in school or even on their house that their health are not affected because we did this wax to lessen the odor of original floor wax. * Scope and Delimitations of Study This study is only limited for the investigation of banana used as alternative source for floor wax making. We chose this study for further investigation if the banana can be an effective source for floor wax and how we can help our mother earth though we are only a student. Definition of Terms a) Banana Peel – main ingredient in making floor wax. b) Pandan leaf – the beneficial plant gave our product an aroma. c) Crude fiber – * Conceptual Framework INPUT * Banana Peel * Pandan Leaves * Candle * Kerosene * Dye OUTPUT An alternative floor wax which is eco-friendly and not hazardous to children’s health. PROCESS All the materials should be prepared. Slice the Banana and Pandan. Crush the candles. Use a casserole to boil a 2cups of water. Boil the pandan within 30minutes. Put the banana peel together with the pandan. Put a 1/2cup of kerosene and 3 teaspoon of cooking oil and dye. Observe the color to know if the extract of the Banana Peel change. Strain and squeeze the banana peel with pandan. Put the crushed candles into casserole and until it melts. Combine the melted candles and the extract of banana peel with pandan. Wait until it forms like a wax. Chapter II: Related  Literature Studies BANANA  is the  common name  for a fruit and also the  herbaceous  plants of the  genusMusa  which produce the commonly eaten fruit. They are native to the tropical region of  Southeast Asia  and  Australia. Today, they are cultivated throughout the  tropics. Banana plants are of the  family  Musaceae. They are cultivated primarily for their fruit, and to a lesser extent for the production of fiber and as ornamental plants. As the bananas are mainly tall, upright, and fairly sturdy, they are often mistaken for trees, when the truth is the main or upright stem is called a pseudostem, literally meaning â€Å"fake stem†, which for some species can obtain a height of up to 2–8 m, with  leaves of up to 3. 5 m in length. Each pseudostem would produce a bunch of yellow, green, or even red bananas before dying and being replaced by another pseudostem. Banana leaves are widely used as plates and for lining cooking pits and for wrapping food for cooking or storage. A section of leaf often serves as an eye-shade. In Latin America, it is a common practice during rains to hold a banana leaf by the petiole, upside-down, over one’s back as an â€Å"umbrella† or â€Å"raincoat†. The leaves of the ‘Fehi’ banana are used for thatching, packing, and cigarette wrappers. Pandan is widely known for the many uses it contributes to us. It is a very beneficial plant that provides many useful things for our day to day life. The aroma of the  pandan leaves  is unique very hard to describe. It is somewhat nutty, similar to fresh hay which is eventually pleasant. You can also found this kind of aroma in some varieties of rice that are grown in South East Asian countries. A good example to that is the Thai Jasmin Rice. The distinct development of the aroma of the said leaves is best when it is wilting because the freshly picked pandan leaf is eventually odourless. But if you dry it, it would surely lose the aroma very quickly. On the other hand, the flavour component of the said plant is still unknown. Some experts suggested that the aroma comes from a volatile product of oxidation degragation of a yellow carotenoid pigment fround on the plant and forms only when the plant is withered. In that aspect, the pandan leaves is also similar to rose and saffron which also has a caratenoid derived aroma compound that makes it smell extra good. Pandan leaves  are a very famous plant in some Asian countries. It contributes a lot in many different ways but most distinctly to enhance the aroma of rice and other rice products, maybe because Pandan leaves has a hay-like odour. There is also other usage of pandan leaves that would contribute a lot to us. The following common usages of  Pandan Leaves  are as follows. The most common use of pandan leaves, especially people in Asia, to add a subtle flavour of pandan in your food. It contributes a very good smell when added in the top of the rice so that, it will produce a good smell. It is very useful since it can add appetite to anyone who will eat the cooked rice. People in Asian countries tend to enjoy eating that kind of rice. It is also best if you add coconut milk together with pandan leaves in the cooked rice. That will result to a very special taste you could ever imagine. You could not compare its taste to anything. It is simply delicious that you can forget it comes from pandan leaves. Another useful thing you can produce through pandan leaves is that you can create a paste out of it. This kind of paste can be use in several kinds of recipes. You just simply cut the leaves, 1 inch each leaves, then place it in a pot at the stove. Add a cup of water to it and place as many leaves as long as it fits the pot. Boil the said mixture. Wait until the leaves are soft. Allow some water to evaporate. Lastly, process the water and the in a food processor to create a paste. By following those simple steps, you will be able to create something useful out of pandan leaves. Floor wax can be made out of used candle by heating the used candles till they melt completely, then we add a little kerosene to the melted candles. This is an excellent polish especially for wooden floors as they keep termites away. Organic matter is the peel’s principal constituent. Proteins account for 0. percent by weight of the peel, lipids are 1. 7 percent, carbohydrates are 59. 1 percent and crude fiber is 31. 7 percent. This composition makes the peel a good animal feedstock. Wood flooring brings an old time, rustic elegance to your home that lasts a life time. Unfortunately, many home owners do not know the correct way to clean and care for their wood floors. A common method for cleaning wood floors is with the use of oil soap. Many wood flooring manufacturers state that using oil soap on your flooring will void the warranty. Oil soap is essentially vegetable oil and vegetable oil leaves a residue behind. For centuries, people have used kerosene to clean their wood flooring. Kerosene will not only keep your floors from looking dull, but it removes heal marks, crayon and lipsticks without causing harm to your floors Chapter III: Methods of Research and Procedure Procedures: All the materials should be prepared. Slice the Banana and Pandan. Crush the candles. Use a casserole to boil a 2cups of water. Boil the pandan within 30minutes. Put the banana peel together with the pandan. Put a 1/2cup of kerosene and 3 teaspoon of cooking oil and dye. Observe the color to know if the extract of the Banana Peel change. Strain and squeeze the banana peel with pandan. 10. Put the crushed candles into casserole and until it melts. Combine the melted candles and the extract of banana peel with pandan. Wait until it form like a wax. Chapter  IV: Analysis Presentation and Interpretation of Data SURVEY QUESTIONNAIRE PART I SURVEY QUESTIONNAIRE PART II Chapter  V: Summary, Conclusion Recommendation CONCLUSION Banana peel has its many uses. One of these is as an alternative resource in making floorwax. It contains good fiber that makes the wax smoother and shiner. It offers the same quality just like the other common floorwax can offer. Moreover, it is cheaper and has a nicer fragrance than the former. Recommendation: The researcher would highly recommended that we could use banana floor wax instead of busy commercial floor wax in the market because it is cheaper and fits in our budget.   Bibliography http://www. hort. purdue. edu/newcrop/morton/banana. html#Other%20Uses http://en. wikipedia. org/wiki/Banana Components of a Banana Peel | eHow. com http://www. ehow. com/info_10033568_components-banana-peel. html#ixzz2KKGbgW6A How to Clean Wood Floors With Kerosene | eHow. com http://www. ehow. com/how_6153768_clean-wood-floors-kerosene. html#ixzz2KKVytGce

Wednesday, August 28, 2019

Why Is Cultural Diversity a Concept Diversity That Businesses Today Term Paper

Why Is Cultural Diversity a Concept Diversity That Businesses Today Should Value - Term Paper Example Cultural diversity can be defined as the cultural differences and cultural variety that exist around the world, society, nation, or an institution. It is important for business organizations to understand the role and challenges that cultural diversity plays in influencing economic success. In a World Report titled, investing in Cultural Diversity and Intercultural Dialogue, the UN Educational Scientific and Cultural Organization (UNESCO) explains the importance of diversity; in a highly globalized marketplace, the ability of organizations to diversify their products according to various consumers adds significant value to the brand image, and product value of the business. This paper, therefore, seeks to outline the benefits of cultural diversity to a business. Analysis Today, Cultural diversity plays a major role in the marketing strategies, brand image, and conceptions of products that successfully hit the global market. Multinational organizations that make it in the global marke t customize and diversify their products to meet the expectations of the various international markets they intend to capture. Cultural diversification is the answer to cultural isolationism, the development of intercultural skills in organizations, and the means to reducing imbalances in world differences. Business corporations need to understand the concept of cultural diversity and incorporate this concept into business operations due to its various benefits (Laroche, 2003). Advantages of Cultural Diversity in Business Business Communication Cultural diversity enables the organization to understand the cultural norms, taboos, biases in political, social and spiritual issues of other people, regions, countries, or continents. Business organizations must understand the cultural eccentricities of their competitors before making contact with foreign clients of other subcultures. Cultural diversity also enables businesses to understand verbal and non-verbal cues appropriate to various international business dealings; this is on the basis of subcultures relevant to the foreign countries (Ingram, 2013). Access to Domestic and International Markets Human beings are of various ancestries and languages. Cultural diversity, therefore; Opens up new market networks at a local, regional and international level Enables businesses to serve and understand an increasingly dynamic clientele. Provides the business with crucial language skills, cultural understanding and knowledge. Provides the business with vital information regarding protocols, and practices in overseas markets. Provides business with low cost intimate details regarding consumer tastes and preferences in overseas markets (Diversity Council Australia, 2013, 1). Productivity and Innovation A business can maximize the efficiency and productivity of its personnel through; Improving cross-cultural communication and understanding thus fostering cohesive efforts at work. Identifying and embracing the full range skil ls of employees, eliminating obstacles in the working processes, and capitalizing on the skills of the workforce. Research shows that, businesses that encourage innovative ideas from a cross-cultural workforce, meet their product launch dates 47% more often, and revenue targets 46% more often than their competitors (Diversity Council Australia, 2013, 1). People from India and China benefit companies in the United States with their stellar quantitative skills while European workers do very well in high-level jobs (Laroche 2003). Valuing Cultural Diversity Enables the Business to Capture the Best Talent Cultural diversit

Tuesday, August 27, 2019

In a Better World by Susanne Bier Movie Review Example | Topics and Well Written Essays - 2000 words

In a Better World by Susanne Bier - Movie Review Example His separation from his wife Marianne has made an impact on the lives of his two sons, specifically, their separation has influenced on the life of his 12 years old son, Elias, who becomes the victim of school bullying. On the other hand, we have a life of Christian who has just shifted back to Denmark from London with his rich-businessman father, Claus. Both of the men are suffering from the death of Christian’s mother, who just died due to cancer. Christian accuses his father of hiding the real state of his mother’s condition till the last moments. With so much anger that is buried deep inside him, he confronts Elias’ oppressors. On one hand, the boys were trying to overcome the schoolyard bullying and, on the other hand, Anton is dealing with a challenging situation in the Sudanese refugee camp. His problem revolves around a person who terrifies his people by cutting open the stomach of the women he sexually assaulted and impregnated in order to verify the gen der of his child. Anton is not sure whether he should or he should not save the life of such a person. Theme and Story of the Movie: The theme of the movie revolves around justice, equality and freedom. ... The whole idea revolves around how Anton fulfills his commitment to his profession and how Christian establishes freedom for the young guy. The story also revolves around the complexities that have surrounded the relationships in society. For instance, Christian relationship with his father, Anton’s with his wife and the emerging friendship between the young Christian and Elias. It projects how relationships can influence a person’s life and how strong or weaker a person can become with or without a sincere relationship in his life. These are a few of the things that people and society, in general, lack today.

Monday, August 26, 2019

Cloud Client Computing Essay Example | Topics and Well Written Essays - 1750 words

Cloud Client Computing - Essay Example The most common mistakes that are made are: ordering too much computing power, no shutting down the software in off hours, not using monitoring tools to keep tabs on cycles, and not telling programmers about the costs. Companies such as Netflix have written software that automatically shuts the system down during off-peak hours, but many companies who are not as large in size do not have the means to do this. When these things are not done, the costs of cloud computing soar making the idea of the cloud not as cost beneficial as previously thought. Still, the cloud market is expected to grow 23% a year through 2017. In the world, there are more than 2 billion devices connected to Internet and majority of them are smartphones. CEOs must think every change in technology to keep their firms in the business. CEO if Parkmobile, Cherie Fuzzell states that they can’t rely on their current app or services, technology changes every day and they should keep considering all the changes, otherwise they won’t survive in the business. IBM has decided to invest in faster-growth segments such as cloud, analytics, mobile, social and security technologies. Those businesses generated $25 billion in revenue last year, or 27% of total revenue, though the trend line has been rising for both figures. The $4 billion spending has set a new financial target for those faster-growth segments: $40 billion in combined annual revenue by 2018, or more than 40% of the company’s expected total revenue. The trend is Cloud/Client Computing. It describes concentrating on cloud and mobile computing with the aim of promoting the development of applications that are centrally coordinated and thus be delivered to any device. The first article by Boulton talks of the wastes that are associated with cloud computing. The second one by an anonymous writer is about the mobile devices that are connected to a cloud and the third one.

Sunday, August 25, 2019

Art Essay Example | Topics and Well Written Essays - 500 words - 54

Art - Essay Example The back colors in the paintings acted as background for all the customers but not for the seller in the restaurant. The customer who is isolated from the rest is at the precise centre of the frame-within-frame (that can be said to be the real centre of the entire painting). Despite the fact that they sit around the bended counter, couple’s heads are painted directly to his right in order for the horizontal line drawn halfway between the bottom and the top of the canvas would cut all the three heads. The painter was keen in presenting the whole human element in his painting to be contained within the lower right-hand quarter of the canvas. It is vividly clear that the painter used ‘a bit of bright’ ceiling in his painting near to hidden fluorescent light that illustrates the interior. The ceiling is of limited importance to any narrative that might be showing up among customers below which depicts that the painter’s realism in these paintings. In addition, outside the dinner, dull colors are dominant as might be expect during the night. In the interior, the men’s suits and counter tops are also dull not bright as the ceilings. The painter was interested in capturing the effect of light on the subjects and objects it tou ched. In addition, he was inspired by the nighttime effect of artificial and manmade light spilling out doorways, windows and porches. In the paintings, the painter captured the might-time effect of light. The darkness depicted in this painting is not just from the night. There is psychological darkness revealed in this painting in that customers seem frozen and deep in thoughts. These customers are physically close but they are detached emotionally. It can be noticed that they are separate from one another thus leaving the viewer with questions. For instance, it can be asked what are they doing at the restaurant at night or what are they

Start Up Decisions and Adjustments Coursework Example | Topics and Well Written Essays - 1000 words

Start Up Decisions and Adjustments - Coursework Example First, the business purchased the Green Theme Furniture for the business at $4,000 as opposed to the used furniture that whose cost was $2000 and the auto four high capacity espressos for $6000 as opposed to a two-cup espresso machine whose price was $3000. Such decisions came with an added cost as well as an added advantage; for instance, though the four-cup espresso maker was expensive, it was 30% faster than the two-cup espresso, thus guaranteeing fast and effective while serving customers, and therefore, lowering the demand for a large number of servers. In addition, the green theme furniture choice was aimed at attracting a wide variety of customers. Our business is located in a busy street, which includes businesspeople, students, and staff. Therefore, the furniture is supposed to fit their status and act as an attraction to many customers. In staff recruitment, we started with two managers, but later on added one more because the cafe opened on weekends. Six servers were hired and each was paid $7.75 per hour, however, their salaries were increased to $9.00 per hour as an effort of motivating them and avoiding the high turnover rate. The managers were paid $650 a week; however, their wages were increased to $670 to maintain them and reduce the rate of quitting. The prices of coffee were as follows, the small cup at $2.00, medium cup at $3.00 and the large cup went for $4.00. With the above prices, business was favorable and our customers suggested that our prices were great; however, there were long queues due to demand. The management decided to offer coffee in three different sizes as a means of product differentiation, whereby, this service differentiated our cafe from the rest by catering for all kinds of customers. In advertisement and promotion, the business preferred only newspaper for a start in order to minimize on costs. The operations decisions included opening hours, which raged from 9am to 9pm as from Monday to Saturday; however, the managem ent wished it had changed the opening hours from 9am to 8am in order to serve the ‘early birds’. If this decision had been made early enough, the cafe would have made some extra income. Nevertheless, there was no need of an insurance cover at first, as it was expensive; but with time, it will be considered. The business decision to purchase organic coffee was a tough one, as it is expensive compared to normal coffee. However, for the sake of our customer’s health, we had to compromise. Nevertheless, the prices should have changed due to the high price of organic coffee. Therefore, the small coffee cup increased by one dollar as the medium one increase by 50cents while the large cup remained the same. These changes are aimed at increasing revenues, while at the same time considering customers’ affordability; hence, the prices are not too high. Final modification on the business plan The main aim of this cafe business is to attract, satisfy, and retain custo mers, as they are the key to the success of business. The more customers the cafe retains, the more profits it accumulates. Therefore, the business is determined to maintain its position as the cost leader and still offer unique services, as strategies of attracting customers. The customer survey reports rate our customer satisfaction at 57%, which is somehow favorable;

Saturday, August 24, 2019

Policy Making in the Federal System Essay Example | Topics and Well Written Essays - 750 words

Policy Making in the Federal System - Essay Example Most people in America agree that there is no better healthcare program in the country. However, even the few reforms that are made in the federal government receive much criticism from many. It is evident that a good number of people do not have health insurance policies but the few who have are ever complaining of higher premiums and plans that may hinder them from getting maximum service (Williams, McClellan & Rivlin, 2010). Healthcare has had skyrocketing nature that is believed to outpace even people’s income and inflation yet the quality has continued to be poor. The Affordable Care Act was therefore prompted by the need to extend the insurance coverage t the larger uninsured population and improve the quality of healthcare as well as ensuring affordability in accessing healthcare facilities. The policy intended to address all the challenges facing the health system in the country such as lowering and controlling the ever rising cost of health care (Harrington, 2010). The policy requires that no American should be denied medical insurance cover regardless of the preexisting conditions. Medical history of an individual can no longer deny the person from obtaining medical insurance and therefore would be able to acquire the coverage with no regard to health underwriting. The policy also intends to increase the coverage for uninsured individuals who are almost 3 million Americans. Some of these people will include the 3.1 million aged between 19 and 25 but still in their parents’ plans since they cannot afford the cost of insurance. Whoever cannot afford to pay health insurance are catered for by the federal government through the states which will be required to add this category into their Medicaid program (Harrington, 2010). It is also apparent that this program will reduce the cost of healthcare because a larger

Friday, August 23, 2019

Kamlari System in Nepal Research Paper Example | Topics and Well Written Essays - 1000 words

Kamlari System in Nepal - Research Paper Example Hence the Kamlari system grew out of this practice. ii) Girls as young as six are sold and enforced into years of basic labor. They are made to do odd jobs like cooking, cleaning and babysitting in the homes of strangers. These Kamlaris normally work from sunrise to sunset, eat leftovers and sleep on the floor and, in the most terrible cases, are beaten and raped. Children in Western province of Nepal are given no choice over their future and are sold as domestic servants, laborers, and sex slaves. (a) Champhi Chaudhari, a Tharu girl from a family of six children, was one of these girls. She was sold away for domestic labor, where she was ill-treated and deprived of schooling by her employee. (b) Urmila Chaudhary, another girl was sold at the age of 6. She was often beaten and also burnt with boiling water for shoddy work explains Murray. (http://www.alertnet.org/thenews/newsdesk/PULITZER/9744defb200746ec1573910a6841018a.htm) III. Human Trafficking (Compliance with ILO Convention No.29 on Forced Labor, ratified in 2002). Girls are illegally transported from Nepal to other countries for forced and bonded labor. They are made to work in: In general education for girls in Nepal is very limited. ... (c) Another girl Jamuna Chaudhary, was bonded for 10 years. She was never let out, says Murray.) (http://www.alertnet.org/thenews/newsdesk/PULITZER/9744defb200746ec1573910a6841018a.htm) III. Human Trafficking (Compliance with ILO Convention No.29 on Forced Labor, ratified in 2002). Girls are illegally transported from Nepal to other countries for forced and bonded labor. They are made to work in: 1. Agricultural sector 2. Brick kilns 3. Prostitution and 4. Domestic Work (http://womennewsnetwork.net/2009/11/09/nepalgirlseducate820/) IV. Lack of opportunities for the poor girls. In general education for girls in Nepal is very limited. Several girls are sent to Nepali government schools which are not up to the required standards and are not funded sufficiently. In addition to this girls are generally asked to leave school at the young age of 12. Lack of opportunities, poor girls are sold by distressed parents to middle-men who promise to find work, along with training and education, for their daughters. (http://womennewsnetwork.net/2009/11/09/nepalgirlseducate820/) V. Difficulties in Rehabilitation. There were severe troubles in the process of release and rehabilitation of kamaiya bonded laborers. The program was hectic and rehabilitation did not reach all those affected in the rural areas. The Government has still not set out the plans for abolishment of the haliya system and make certain the recognition, release and rehabilitation of haliya bonded laborers. (http://www.unodc.org/pdf/india/Nat_Rep2006-07.pdf ) Broader research, planning of

Thursday, August 22, 2019

Mildred Taylor Essay Example for Free

Mildred Taylor Essay Draft No. 3 TJ is an unlikable boy who has only himself to blame for the situation at the end of the novel. How far do you agree? T. J is an unlikable boy but I do not believe that he has only to himself to blame for the situation at the end of the novel. There are other sides to the story as well. TJ starts off in the novel as a happy, cheerful young boy who enjoys life, but you can already start to see the cheeky side of him. In chapter 1, TJ says: Look on the bright side, Jus think of the advantage youve got. Youll be learnin all stuff fore the rest of us like whats on them tests. This proves that TJ is a cheat. If his mother were a teacher, then he would definitely look at the tests and cheat. TJ and his brother came from one of the poorest families. For example, when he comes into school on the first day, he is wearing no shoes. Whereas the Logans have: New coats and books and shiny new packards. One of the reasons that TJ is such a troublemaker is that he had a socially deprived background and therefore I think he needs to receive the attention that his family never gave him. His families are poor sharecroppers on Granger land. Sharecroppers were black people who work on white land, and get a small percentage of the produce. They are weak and frail and cannot control TJ. A description of TJs father shows he is: A frail sickly man with a hacking cough. The fact that he had a deprived upbringing and that nobody is doing any thing about TJs getting out of hand is why he is not fully to blame for what happens at the end of the novel. Later on, TJ says to Stacey: Friends gotta trust each other, Stacey, cause aint nothing like a true friend. However, TJ betrays Stacey. Stacey is caught with TJs cheat notes and Miss Logan (his Mama) beats her son in front of the whole class. This makes TJ unlikable. We also feel sympathetic towards Stacey for being blamed for something that he did not do. Later on, TJ is mesmerised by a pearl-handed gun. His behavior becomes increasingly disturbing. TJ mocks Stacey about his magnificent new coat because he is jealous. TJ says: He looks like the fat preacher. But the truth is, T. J. is a confused, insecure youngster. He is a character who sets much of the storys violent action into motion; this makes him unlikable. He is a liar, a cheat, and a thief. He causes trouble for different members of the Logan family. Firstly, TJ humiliates Stacey, who in the end disowns his new coat. In chapter 6, Stacey says: The coat was too big for me and and TJ said it made me look like like a preacher. TJ wanted the coat very much so he could show off to his white friends. Then he initiates the dismissal of Mary Logan because he has failed the exam. In that time, if anyone fails the end of year exam, then they must redo the year, thus being with the same teacher. He tells Mr. Granger that Miss Logan erased the word nigra on the books. This causes Mr. Granger to sack Miss Logan because she does not abide to the white rules. In chapter 8, Mr. Granger says: You so smart I expect youd best just forget about teaching altogether then thataway youll have plenty of time to write your own book Later on, in chapter 12, Papa sets fire to the land and ruins many of his crops, thus making him poorer in an attempt to save TJ from being lynched. Even though he is working away from home to improve family income. In the 1930s in the South, the Depression came and the black people often had to seek work elsewhere (Papa, for example, manages to hold down insecure work on the railroad during the Depression. ) TJ has no scruples, no morals, and will do anything to avoid accepting responsibility. This makes him unlikable. He bullies his brother Claude and he will use any devious method to avoid failing at school. But when TJ is in trouble he asks Stacey for help because he is going to fail. Stacey replies angrily: TJ, dont you come talking to me bout no more cheating! When TJ fails, he is full of resentment and anger, so he engineers the dismissal of Miss Logan. He is successful, but only with the help of two other white boys, RW and Melvin. He does this because the Simms brothers are white, and they have more power over what happens to the blacks. This makes TJ unlikable and we feel sympathetic towards Mama (TJ used to hate the whites. ) Mama says: Well you told me Jeremy said they were laughing at TJ behind his back. Some folks just like to keep other folks around to laugh at them use them. TJ does not realise that his white supposed friends are backstabbing him. Stacey discovers that it is TJs fault that his mothers beloved career is ruined. TJs friendships with the white boys spell trouble because they constantly use him, and get him into trouble. This is why TJ does not only have himself to blame for the situation at the end of the novel. Mary Logan understands that TJ is insecure and has no understanding for self-respect so she does nothing to punish TJ. Mama and Papa talk about Stacey in chapter 9: Mary, I want him strong not a fool like TJ Hes got more brains and learning than that' Cassie overhears her parents talking about Stacey and TJ. TJ has gotten out of hand. They discuss his future and what will happen to TJ if things carry on. When Cassie asks her mother if TJ is dumb, she answers, TJs not dumb Cassie, he just wants attention, but hes going after it the wrong way. This shows again why he is not totally to blame. TJ mainly needs attention. Mama says: Theyd better `figure out some way of getting that boy back on the right track because hes headed for a whole lot of trouble. This quotation shows the reader that TJ will get worse if things do not change for TJ. TJ arrives with RW and Melvin (who are both a terrible influence on TJ) and he is dressed like his white friends to impress his ex-friends, the Logans. Cassie realises that the brothers are merely using TJ. She is amazed by TJs stupidity. But TJ befriending white people shows just how desperate TJ is for attention. He thinks he is getting the attention that his parents and the Logans stopped giving him, but in reality, the white Simms brothers are just using TJ. TJ says to the Logans: Everything I want they give me, cause they really like me. Im their best friend. TJ arrives later, badly hurt and crying with despair. He has been tricked into robbing the Barnett store but RW and Melvin covered their faces and wore gloves. They used TJ as their scapegoat and they could not care less what happens to him. We feel sympathetic towards TJ and this is why TJ is not totally to blame for the end. The Lynch mob then come for TJ, intending to visit the Logans next. The sense of fear and anxiety felt by the Logan children, the stories told around the hearth and the consequences for T. J dominate the novel. The Author, Mildred D. Taylor is always giving very negative portrayals of TJ, with occasional references to why he is like he is. This makes him unlikable. But we do feel sympathetic towards him. At the end of the novel Cassie cries for TJ and the land and gives them economic independence, which shows she has fully realised that blacks are the targets for racism, and her whole life will be like that, and that TJs life was wasted. Racism was spreading during the 1930s, especially in Mississippi, the Ku Klux Klan were very active there. Cassie already knows about the dreaded Night Men. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Mildred Taylor section.

Wednesday, August 21, 2019

How to Introduce a Speaker Essay Example for Free

How to Introduce a Speaker Essay Speech introductions are often an afterthought, hastily thrown together at the last second by someone with little knowledge of the speaker, their speech, or the value for the audience. And yet, speech introductions are critical to the success of a speech. While a strong speech opening is vital, nothing helps establish a speaker’s credibility more than a carefully-crafted and well-delivered introduction. This article gives you a series of practical tips for how to introduce a speaker to position them with the best possible chance to succeed. 1. Answer three core questions. When you are introducing a speaker, your primary goal is to prepare the audience and get them excited for what they are about to hear. To do this, you must answer these three core questions: * What is the topic? * Why is this topic important for this audience? * Why is the speaker qualified to deliver this talk? By addressing these three questions, you’ve given the audience a motivation for listening (the topic is important to them), and you’ve reinforced the speaker’s credibility. 2. Prepare and practice adequately. â€Å"While a strong speech opening is vital, nothing helps establish a speaker’s credibility more than a carefully-crafted and well-delivered introduction.† At all costs, avoid thoughts such as â€Å"Oh, I don’t need to prepare†¦ I’m just introducing a speaker.† Thoughts like that lead to stumbling, bumbling, off-the-cuff introductions which undermine your credibility and the credibility of the speaker. You should write out (and edit) the full introduction, check it with the speaker, and practice it several times. 3. Memorize it, or minimize your notes. Try to memorize the introduction; speaking without notes will add to your authority, and the audience will put more weight in your recommendation (that is, to listen to this speaker). If you are unable to memorize the entire introduction, then use as few notes as you can. Be sure you can you deliver the last sentence of your introduction without notes as this will maximize momentum for the speaker. 4. be positive and enthusiastic. The audience takes cues from you. If you seem disinterested, they will be disinterested. If you are (genuinely) positive and enthusiastic, they will be too. Your choice of words, voice, gestures, and facial expressions should all convey enthusiasm. So, how do you ensure you are enthusiastic? 5. Get to know the speaker. It is difficult to get the audience excited about the speaker if you aren’t excited yourself. If the speaker is previously unknown to you — for example, suppose you’ve volunteered to introduce speakers at a large industry event — your introduction may lack sincerity. So, get to know the speaker. Google them. Talk with them. Ask others about them. Research the speaker and their expertise until you are excited by the opportunity to introduce them. 6. Eliminate mispronunciations. A sure way to weaken your own credibility and that of the speaker is to mispronounce their name, the title of their presentation, or any other key terms. Luckily, this is easily avoided through practice and by confirming the correct pronunciation with the speaker well before the presentation. (Don’t wait until you are delivering the introduction to ask them — this looks amateurish.) â€Å"A sure way to undermine your own credibility and that of the speaker is to mispronounce their name, the title of their presentation, or any other key terms.† 7. be accurate. Being accurate is as important as correct pronunciation, perhaps more so. Make sure you know the precise years, facts, or details. If you make factual errors, many speakers will feel an irresistible compulsion to correct you. This is a lousy way for them to begin their speech, and will almost certainly kill their momentum. 8. Don’t alter the speech title. Many speakers craft their presentation title very carefully, and the words matter to them. The title may be a phrase they want the audience to remember, it may reflect language used on accompanying slides, or it may be a humorous play on words. Don’t change it under any circumstances. (And, of course, know how to pronounce it.) 9. Should you attempt humor? In most circumstances, no. Your objective is to get the audience excited about the topic and the speaker, and this is not the time to tell humorous anecdotes about the speaker. Save those for a roast! There are exceptions (as there are to all public speaking advice), and you’ll have to use your judgment. If this speech is part of a longer event, and the preceding talk has been particularly sad or low on energy, then it may help to lift the spirits of the audience. If you need to do this, do it early in your introduction, and then move on to the more thought-provoking content leading to your climax. 10. Don’t give an outline of the speech. I was once introduced by someone who had seen a longer presentation I gave on the same topic two years prior. Not only did they ignore the introduction I had written for them, but they gave a detailed outline of my whole talk, including which parts were their favorites! Unfortunately, my outline had changed substantially, and they had created unreasonable expectations and sabotaged my talk. Avoid undermining the speaker by giving too many details about the speech, telling anecdotes from their speech, or making promises about details in their presentation. It is the speaker’s job to decide how and when they reveal their outline. Keep your introduction at a high level, unless they have specifically asked you to do otherwise. 11. Stick to relevant expertise of the speaker. One very common mistake is to recite a lengthy list of biographical details (education, awards, former job titles, publications, etc.) which may or may not be relevant to the topic being presented. This is especially common at academic conferences. For example, avoid introductions such as: Our speaker grew up in Seattle and graduated at the top of her mechanical engineering class at Carnegie Mellon University. She went on to earn a Master’s Degree from Duke University, and a Ph.D. in Computer Science from Harvard. She is a member of the Automotive Engineers Association, and a two-time recipient of the Stone Award for Distinguished Linguistics Research. She was previously the Director of Research at Hasbro, and is currently the CEO for the Miami Dolphins. Her talk today is entitled â€Å"How to Dougie.† A much better introduction would touch on how many years the speaker had Dougying whether she had been trained or self-taught, and that she had written a book on this topic. Okay, maybe that example was a bit extreme. But, even if the speaker has a lengthy list of biographical details that are related to her talk, there’s no need to recite them all. Pick a small number (about three) that are most relevant — usually the most recent details. Why not give all the details? 12. Don’t overdo it. Long introductions filled with biographical details are bad for two main reasons: * Long introductions are boring. Nobody attends an event to listen to the introducer go on and on. * Long introductions are pompous. Reciting dozens of professional accolades gives the impression that the speaker cares only about himself and his ego. Keep your introduction just long enough to accomplish your goals: [1] what’s the topic, [2] why does it matter, and [3] why is the speaker credible? â€Å"Keep your introduction just long enough to accomplish your goals: [1] what’s the topic, [2] why does it matter, and [3] why is the speaker credible?† I’m a big fan of short introductions in just about all situations. Sixty or ninety seconds is usually ample time. For really long presentations, (e.g. keynote addresses lasting an hour or more) two or three minutes may be warranted. 13. Avoid clichà ©s. How many times have you heard: â€Å"This speaker needs no introduction†¦Ã¢â‚¬ ? While the speaker may indeed be well-known to the audience, nearly every speech benefits from a brief introduction. 14. Avoid exaggerated hype. Your introduction should get the audience excited about the presentation, but don’t take it too far. For example, it is reasonable to claim that the presentation will help the audience solve a business problem, save time, or understand the complexities of tax policy. But, it doesn’t help anyone to claim that â€Å"this presentation will solve all your problemsâ€Å", or that it is â€Å"the best presentation you’ll ever hearâ€Å", or even that â€Å"you’ll be amazed by what you are about to hearâ€Å". Proud expectations will actually have a detrimental effect, because the audience will feel challenged to prove you wrong. 15. Build to a climax. Your vocal delivery (strength and volume) should build toward the end of your introduction. (Keep it reasonable†¦ there’s no need to yell.) By doing so, the audience will be compelled to welcome the speaker with loud applause. One effective way to do this is to end with the speaker’s name and explicitly encourage applause: Ladies and gentlemen, please join me in welcoming our guest speaker, Baby Girl! 16. Ensure a smooth transition. Know where the speaker will be as you speak your last words so that you can turn in that direction to greet them. Etiquette dictates that you should wait for them to come to you (e.g. on the stage, or at the lectern) and then shake hands before you leave. Shaking hands is a symbolic gesture that indicates you are â€Å"handing the floor† to them. Occasionally, the speaker may have a special entrance planned. (e.g. entrance music, a staged stunt, something with a prop) Make sure you ask the speaker about this, and do whatever you can to support them in a successful entrance. How to Introduce a Speaker: 16 Essential Tips for Success Preparing an Oral Report Follow these steps to put together and deliver a first-rate presentation. Step 1. Research the Facts Gather information about the subject of your oral report. List the facts and interesting information from your reading, taking notes accurately. Remember that relevant details and vivid descriptions will make your oral report more interesting, as will visual aids such as maps, charts, and pictures. Step 2. Organize Your Information Organize your oral report in three parts. †¢ Introduction How will you introduce your report? What will be your first line? Write a short introduction that briefly explains what your report will cover. †¢ Body Organize the main points of your report. They should follow a logical order. Be sure that: all your information is accurate; you have included information from your research to support your main points; you use details and descriptive sentences to make your report interesting. †¢ Conclusion Write a short conclusion. You can use the conclusion to: wrap up and restate your main points; draw upon your main points to formulate a personal opinion concerning the topic of your report. Step 3. Practice Giving the Oral Report Practice presenting your oral report with a friend or family member. If no one is available, try practicing in front of a mirror. Keep the following points in mind when you give your report. †¢ Hold your body upright and face your audience. †¢ Speak clearly and deliberately—you want everyone to hear what you have learned. †¢ Refer to your notes only when necessary. Step 4. Make A Final Copy of Your Report Notes Use your notes to make a final outline of your report and put it on one index card or half-sheet of paper. Try to use this card alone when giving your report. Refer to the rest of your notes only if absolutely necessary. http://go.hrw.com/resources/go_ss/teacher99/toolkit/TOOLKT19.pdf

Tuesday, August 20, 2019

Variable Length Hash Algorithm Using RC6

Variable Length Hash Algorithm Using RC6 Hash_RC6 Variable Length Hash Algorithm using RC6 Kirti Aggarwal Dr. Harsh K. Verma ABSTRACT In this paper, we present a hash algorithm using RC6 that can generate hash value of variable length. Hash algorithms play major part in cryptographic security as these algorithms are used to check the integrity of the received message. It is possible to generate hash algorithm using symmetric block cipher. The main idea behind this is that if the symmetric block algorithm is secure then the generated hash function will also be secure [1]. As RC6 is secure against various linear and differential attacks algorithm presented here will also be secure against these attack. The algorithm presented here can have variable number of rounds to generate hash value. It can also have variable block size. Keywords:  Cryptography, Symmetric Encryption, Asymmetric Encryption, Data Integrity, Authentication, Confidentiality, Non-Repudiation, Access Control, Hash, RC6 INTRODUCTION Cryptography is the ability of keeping message secure form others while sending information between participants (Confidentiality). There are many cryptographic algorithms categorized as symmetric encryption algorithm and asymmetric encryption algorithm. Symmetric encryption algorithm is the one that use same shared key from encryption and decryption, while asymmetric algorithm is the one that use different keys from encryption and decryption. With the Confidentiality cryptography also provide other services known as data integrity, authentication, non-repudiation, access control etc. Data Integrity is assuring that data received is same as sent by the sender. Authentication is the ability to assure that communicating party is who that it claims to be. Non-Repudiation is the prevention against the denial by entities involved in the communication. Access Control is the prevention against the unauthorized use of resources [2]. Figure 1. Fundamental of Cryptography Hash Function A cryptographic hash function is any algorithm or subroutine that maps large data sets of variable length to smaller data sets of a fixed length. The values returned by a hash function are called hash values, hash codes, hash sums, checksums or simply hashes. Where h has fixed length. An (accidental or intentional) change to the data will (with very high probability) change the hash value. For a hash function to be considered secure, it must be computationally infeasible to find has a predefined hash value and similarly it must be computationally infeasible to find two messages having same hash value. RC6 RC6 is a symmetric block cipher based on RC5 and designed by Rivest, Sydney, and Yin for RSA security [3]. Like RC5, RC6 is a parameterized algorithm where the block size, the key size, and the number of rounds are variable; again, the upper limit on the key size is 2040 bits [4]. RC6 was designed to meet the requirements of the Advanced Encryption Standard (AES)competition. RC6 proper has ablock sizeof 128 bits and supportskey sizesof 128, 192 and 256 bits, but, like RC5. RC6 can be viewed as interweaving two parallel RC5 encryption processes. It uses an extra multiplication operation not present in RC5 in order to make the rotation dependent on every bit in a word. SHA-256 SHA-256 operates on eight 32-bit words. The message to be hashed is first padded with its length in such a way that the result is a multiple of 512 bits long, and then parsed into 512-bit message blocks M(1);M(2); : : :;M(N). The message blocks are processed one at a time: Beginning with a fixed initial hash value H(0), sequentially compute Where C is the SHA-256 compression function and + means word-wise mod 264 addition. H(N) is the hash of M [5]. SHA-512 SHA-512 is a variant of SHA-256 which operates on eight 64-bit words and block size of 1024 bits. It uses different shift amounts and additive constants, but its structure is otherwise virtually identical, differing only in the number of rounds, which are 80 for SHA-512[15]. HASH FUNCTION A cryptographic hash function is a mathematical transformation that takes a message of arbitrary length and computes a fixed length value also known as hash value, message digest, hash code, hash sum, checksum, etc. Where H is Hash Function, M is variable length message; H is fixed size hash value. Creating hash function is accomplished by iteration. Instead of using a hash function with variable-size input, a function with fixed size input is created and is used a necessary number of times. This fixed size input function is known as compression function. It compresses an n-bit string to create a m-bit string where n is normally greater than m. This scheme is referred to as an iterated cryptographic hash function [6]. These compression function fall into two categories: a function specially designed for the hash function or a symmetric block cipher [2]. Figure 2. Iterated Cryptographic hash Function Characteristics of one way Hash Function: Given M, it is easy to compute h. Given h, it is hard to compute M such that. Given M, it is hard to find another message, M’, such that The whole point of one way hash function is to provide a finger print of M that is unique. In some application one wayness is insufficient; we need an additional requirement called collision-resistance (It is hard to find two random messages, M and M’, such that [1]). Figure 3. Basic Hash Algorithm at sender and receiver Hash Function takes message and an initial value as an input and produces the hash value. The hash value is appended to the message at a time when the message is assumed or known to be correct. The receiver authenticates the message by generating the hash value with the same procedure and compares it with the hash value send by the sender. If both the value matches then the received message is same as it is send by the sender otherwise message has been tampered with. RC6 RC6 [7] is a fully parameterized family of encryption algorithms. A version of RC6 is more accurately specified as RC6-w r bwhere the word size is wbits, encryption consists of a nonnegative number of roundsr, andbdenotes the length of the encryption key in bytes. Since the AES submission is targeted atw= 32 andr= 20, we shall use RC6 as shorthand to refer to such versions. When any other value ofworris intended in the text, the parameter values will be specified as RC6-w r. Of particular relevance to the AES effort will be the versions of RC6 with 16-, 24-, and 32-byte keys [4]. Figure 4. RC6 Encryption For all variants, RC6-w r boperates on units of fourw-bit words using the following six basic operations. integer addition modulo integer subtraction modulo bitwise exclusive-or of w-bit words integer multiplication modulo Rotate to the left by the amount given by the least significant bits of Rotate A to the right, similarly parallel assignment Key Expansion Use two magic constants:- Where:- †¦Ã¢â‚¬ ¦.(base of natural logarithm) †¦Ã¢â‚¬ ¦..() is the odd integer nearest to . INPUT byte key that is preloaded into word array denotes the no of rounds. OUTPUT w-bit round keys . ALGORITHM For do Encryption Four w-bit registers A, B, C, D contain the initial input plain-text as well as the output ciphertext at the end of encryption. The first byte of plaintext is placed in the least significant byte of A; the last byte of plaintext is placed into the most significant byte of D [6]. INPUT Plaintext stored in four w-bit input registers Number r of rounds w-bit round keys OUTPUT Ciphertext stored in ALGORITHM C = C + S[2r + 3] Decryption For decryption of cipher-text load these cipher text into registers A, B, C, D Algorithm uses integer subtraction modulo 2w and right rotation on registers for getting plain text. INPUT Ciphertext stored in four w-bit input registers Number r of rounds w-bit round keys OUTPUT Plaintext stored in ALGORITHM HASH FUNCTION USING RC6 RC6 is a uses 44 words of key material making it more complex to break. RC6 parameterized cipher; the block size can be grown in a straightforward manner to 256 bits and beyond.RC6 has maximum key size of 2040 bits, making the corresponding hash function very fast.20 rounds using RC6 will have all these features which make the hash more efficient and secure. It is possible to use a symmetric block cipher algorithm as a hash function. If the block algorithm is secure, then the one-way hash function will also be secure. One approach is to encrypt the message with the algorithm in CBC mode, a fixed key and an initial vector (IV), the last cipher text block is the hash value. Another more better approach uses the message block as the key, the previous hash value as the output. Here we will use second approach. Algorithm presented here has variable parameters i.e. different parameter value can be taken according to the need. Block size (b), Number of rounds (r), length of hash value (l) are the different variable parameters that are the inputs of the algorithm. The length of hash value (l) should be multiple of 256. First of all padding is done. Message is padded with zeros in a way such that the padded message length is multiple of the block size (b). Then initial vector is needed to generate the hash value. Initial Vector is a piece of data is needed to begin running an algorithm, and is not secret. There are two initial vectors in this algorithm which are used to generate initial hash value. To generate the initial hash value combination of v (size of hash value divided by 256) 256 bits values calculated as follows: After generating initial hash value from initial vectors the message (M) is divided into number of small chunks (n). The size of message chunks should be equal to block size b, after that RC6 key generation is applied on each message block to generate keys that will be used to encrypt the previous hash value to generate next hash value. Initial 256 bits v hash values are encrypted via RC6 using RC6 keys generated from first message block (M1). This is then encrypted again from the keys generated from second message block (M2) and so on until all the message blocks (n) are used. At last all the v final hash values of length 256 bit each are concatenated to generate the final hash value of length l. Number of rounds (r) is divided in to two parts, 3r/4 rounds are used to generate the RC6 keys from the message block and r/4 rounds are used to encrypt the previous hash value to generate next hash value. Figure 5 shows the procedure for hash value of size 512 bits. Figure 5. Hash Value Generation using RC6 PSEUDO CODE INPUT Message M, Number of rounds r, Block size b, Length of hash value l; OUTPUT Final hash value h; ALGORITHM Pad 0s (zeros) at the end of the message so the message length is multiple of b; Divide message into chunks of size b; Repeat step 7 to 21 Load Repeat step 10 to 12 Repeat step 13 to 16 Repeat step 20 Repeat step 22 to 33 Load Repeat step 26 to 30 for do Load Concatenate to get final hash value h PERFORMANCE AND ANALYSIS This algorithm was implemented using java in NetBeans IDE 7.0.1. Following results were obtained on Intel(R) Core(TM) i3 CPU M 370 @ 2.40 GHz 2.39 GHz 32 bit system with 4 GB of RAM running Windows 7 Ultimate. Algorithm presented in this paper is compared with SHA-256 and SHA-512 respectively. Comparison between algorithm presented here and SHA are done on the basis of throughput of the algorithms and time to produce hash value for files of different sizes. To be more accurate the program is executed ten times for each input file and the average of those results are reported here. Results in Figure 6 to Figure 9 and Table 1 for Hash using RC6 are obtained for r=64, b=512, l=256 and these results are compared with SHA-256 which has same value for these parameters. Figure 6. Throughput of RC6_HASH and SHA-256. Figure 7. Bar Graph of Hash value generation time of RC6_HASH and SHA-512 Figure 8. Line Graph of Hash generation time of HASH_RC6 (256) and SHA-256 Figure 9. Execution time saving caused by Hash_RC6 Table 1. Comparison of Hash_RC6 (256) SHA-256 on the basis of Execution Time of different type of Files. Figure 6 shows the throughput of RC6_HASH and SHA-256 the algorithms in KB/sec. Figure 7 shows the Bar Graph hash value generation time (in millisec) of both the algorithms for the file of different sizes (in KB). Figure 8 shows the Line-Graph of execution time according to their file size for each file using algorithms Hash_RC6 (256) and SHA-256. Line graph is more convenient to show that Hash_RC6 (256) performs faster than SHA-256. This Graph also shows that for the file of small size both the algorithms performs approximately same i.e. there is not much of the difference but when the file size increases Hash_RC6 (256) performs much better than the SHA-256. Bar chart in Figure 9 shows the execution time saving caused by Hash_RC6 in percentage in comparison with SHA-256 for different file sizes. It’s greater than 30% for almost all the file sizes and for some of the file sizes its approx 50% that is greater advancement. The average percent execution time saving by Hash_RC6 for hash value of 256 bits over SHA-256 is 40.26. We compare the execution time of each algorithm on different file types like text file, audio file video files, for this purpose we mainly used 10 files and recorded their hash value generation time in milliseconds for these algorithms. List of Input files and their size are given in Table 1. Results in Figure 10 to Figure 13 and Table 2 for Hash using RC6 are obtained for r=80,b=1024,l=512 and these results are compared with SHA-512 which has same value for these parameters. Figure 10. Throughput of RC6_HASH and SHA-512. Figure 11. Bar Graph of Hash value generation time of RC6_HASH and SHA-512 Figure 12. Line Graph of Hash Generation Time of HASH_RC6 (512) and SHA-512 Figure 13. Execution Time saving caused by Hash_RC6 Table 2. Comparison of Hash_RC6 (512) SHA-512 on the basis of Execution Time of different type of Files. Figure 10 shows the throughput of RC6_HASH and SHA-512 the algorithms in KB/sec. Figure 11 shows the Bar Graph of hash value generation time (in millisec) of both the algorithms for the file of different sizes (in KB). Figure 12 shows the Line-Graph of execution time according to their file size for each file using algorithms Hash_RC6 (512) and SHA-512. Line graph is more convenient to show that Hash_RC6 (512) performs faster than SHA-512. This Graph also shows that the difference is not so much for file of small size but when it comes to file of larger size Hash_RC6 (512) is much better than the SHA-512. Bar chart in Figure 13 shows the execution time saving caused by Hash_RC6 (512) in percentage in comparison with SHA-512 for different file sizes. It’s greater than 15% for almost all the file sizes and for some of the file sizes its approx 35% that is greater advancement. The average percent execution time saving by Hash_RC6 for hash value of 512 bits over SHA-512 is 24.625. We compare the execution time of each algorithm on different file types like text file, audio file video files, for this purpose we mainly used 10 files and recorded their hash value generation time in milliseconds for these algorithms. List of Input files and their size are given in Table 2. CONCLUSION In this research paper a new algorithm for generating hash value is presented. This algorithm is generated on a symmetric block cipher known as RC6 and can generate hash value of different sizes. The algorithm can also operate on different block size and different number of rounds. The implementation of algorithm is done using JAVA in NetBeans IDE 7.0.1. on Intel(R) Core(TM) i3 CPU M 370 @ 2.40 GHz 2.39 GHz 32 bit system with 4 GB of RAM running Windows 7 Ultimate. Hash value generated using algorithm presented here are secure against many attack because when a hash algorithm is generated using symmetric block cipher it inherit the properties of underlying cipher. The idea behind this is that if the symmetric block algorithm is secure then the generated hash function will also be secure [1]. Then the algorithm is compared with SHA-256 and SHA-512 for same parameter and on the same environment. The results of comparison conclude that the algorithm present here has better throughput

Monday, August 19, 2019

Sources of Stalins Power in Russia :: Joseph Stalin

Question 3 The following are equally important reasons why Stalin was able to hold on to power in the Soviet Union: -The purges -The secret police -Propaganda and the cult of personality -Stalin?s economic policies Explain how far you agree with this statement. Stalin ruled Russia from the late 1920s until his death in 1953. There were a number of reasons why he was able to hold on to power. These reasons include Purges, Secret Police, Stalin?s economic policies and Propaganda and cult of the personality. One important reason was the great purges, which lasted from 1934-38. To purge means to cleanse, to get rid of. During this period many Russians- in the Communist part, the army, the arts and sciences, and many other walks of life-were arrested and mainly shot or sent to labour camps. He used the purges to get rid of anyone who was against him in the communist party. Zinoviev and Kamenev were killed and so were many others. He believed that getting rid of them gave him a much better chance of being able to keep hold of power. Stalin once said: "Death solves all problems. No man, no problem." They were all put on trial and the whole world listened to what they called as a show trial on the radio. Lots of people were put on public show trials at which they pleaded guilty to incredible crimes they could never have done. Getting confessions were important because it showed to the world that the state and Stalin were right. Stalin believed that Russia had to be united ? with him as leade r ? if it was to be strong. The purges wouldn?t be possible without the secret police. The secret police were used to mainly scare people, so that they would never think anything bad about Stalin. If someone said one thing bad about him, then you could be guaranteed that the secret police would take you to one of the labour camps. The secret police were called the NKVD. The use of the secret police was so that everyone would be scared of saying anything bad about Stalin. That way it seemed as though everyone liked him, he would be able to keep control of the Soviet Union for much longer. Propaganda is a joined set of messages aimed at influencing the opinions or behaviours of large numbers of people. Stalin?s propaganda was used to make people see that he was the only right person for the leader of the USSR.

American Caplitalist Governement Essay -- essays research papers fc

"We hold these Truths to be self-evident, that all Men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the Pursuit of Happiness -- That to secure these Rights, Governments are instituted among Men, deriving their just Powers from the Consent of the Governed, that whenever any Form of Government becomes destructive of these Ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its Foundation on such Principles, and organizing its Powers in such Form, as to them shall seem most likely to effect their Safety and Happiness." (Thomas Jefferson, Declaration of Independence) When Thomas Jefferson wrote these words, he wrote them with the intent of establishing a new government that would not give anyone favoritism over others. After 224 years, this idea is still believed in by the citizens of America, but not practiced by their government. As the year s passed, the values of America have slowly altered to materialism. The people trusted our government to make the best decisions for the entire country, but some decisions seem to favor the wealthiest citizens rather than all of the citizens. Not to say that the government is completely corrupt, but their priorities seem to have a monetary value, and they must pay for it some how. As a country with a capitalist government, one that has the main focus of making profit through free markets, money has an unfortunately big influence on policies that are made by the government. According to the public, which was based on middle-class adults in the US, business editors and college students, the general consensus came out to be that they believed that "capitalism must be altered before any significant improvements in human welfare can be realized." This can be seen throughout history in the positions taken by the government about free markets, unionization, and . The United State s of America's government is hyper-capitalistic, because the markets are freer than in any other country. We consume more and are more dependent on working. The markets in the US have not always been so free. In the beginning we had small markets that people did not depend so much on because of the fact that they were all farmers and sharecroppers. The existence of slavery was in very recent in history... ...d States put down its unions. In the United States, we have always believed that all men are created equal. Americans, however, know that even though we were created equal, we are not treated equally. The rich are the V.I.P to the government. They are taken care of well, and pampered with money and privileges that the other hard working Americans deserve more than them. We are in the age of profits, and if the government does not see any monetary value in something, they will not bother with it, even if it is its own people. Bibliography Peterson, Robert A.,Gerald Albaum, and George Kozmetsky.Modern American Capitalism. New York: Quorum Books, 1990. Perlo, Victor. Superprofits and Crises: Modern U.S. Capitalism. New York: International Publishers, 1988. Frances Fox Piven and Richard Cloward, Chapter 3 from Poor People's Movements: Why they Succeed, How they Fail,(Vintage, 1977), pp96-180. Lembcke, Jerry. Capitalist Development and Class Capacities: Marxist Theory and Union Organization. New York:Greenwood Press, 1988. Joel Roers and Joshua Cohen, On Democracy, (Penguin, 1983), Chapter Six, "Democracy", pp146-183. "Industrial Revolution" Encarta Encyclopedia

Sunday, August 18, 2019

Personal Narrative- Cousins Death :: Personal Narrative Essays

Personal Narrative- Cousin's Death It is amazing how many things we take for granted. We make plans for the day, and don't think twice about how those plans can be taken away in the blink of an eye. I never thought much about it myself, until I was faced with the shock, and undeniable truth of my cousin's death. I don't think anyone really thinks about tragedy until they are actually faced with shocking news. My mom had been going to school in Greeley and staying at my Aunt Margaret's house . She had been away for two weeks and wanted to come home for the Fourth of July weekend. My mom had suggested that I go back with her and visit colleges, shop, go to movies and just spend time together. I had been feeling pretty sorry for myself since she had been gone. I had been working alot as a maid and helping my dad run the house, I was getting very irritated with my siblings as I felt that I was the only family member doing my part to help my dad. I was really excited to have a week with my mom to myself. The whole ride over we were talking about what I wanted to do that week. Making plans and having "me time" seemed very important at the time. I woke up Tuesday morning excited for the day I was going to spend with my mom. I was sitting at the kitchen table drinking fresh coffee listening to my mom and aunt tease and joke around about how paranoid my mom was about doing well in her classes, my aunt was telling her that maybe now that I was there, she would relax a little bit and have some fun. Our plan was to go to one of mom's classes with her, and then on a tour of UNC and then we were going to go to dinner and a movie. We were interrupted by a phone call from my dad. My mom was still joking and in a silly mood when she started talking to my dad. Suddenly the conversation turned from joking to dead silence and my mom started crying. She tearfully asked, "Is she ok? Was she alone?" I was thinking my sister went riding and fell off her horse or that something had happened to my grandma.

Saturday, August 17, 2019

Two Women, Three Man on a Raft

In the article â€Å"Two women, three men on a raft†, the author Robert Schrank are mainly talk about the problems of power relationship and cooperation between the sexes in organizations by using an analogy between the raft experience and company management according to the Outward Bound raft trip In this article, the author mentioned that one participant’s story of how Raft No. 4 fared on the Rogue. What is more, it specifies to describe the power relationship between the sexes. In the whole trip on a raft, the men unhappy when a women as helmsperson, and the men had subconsciously and proceeded to undermine the women by habit.However, when a man was in charge, they always feel comfortable, and worked to help him be a better helmsperson. In fact, there are many people like John and the other two men in the organization. In other word, the author considers that men often unconsciously desire to protect their power from women’s control in organizations as the sit uation happened on Raft No. 4 on the Rogue River. Generally speaking, men usually want to control the whole things and do the sabotaging behavior to the women. In addition, the article point out that what happened on Raft No. 4, Inc. , occurs in most organizations when women enter positions of leadership.The organizations are usually designed as pyramids. It is less squeezes when got to the top. So, once women enter the squeezing, men are doubly threatened. However, more women become managers in organization; there will have to be shift in power. So for subordinates, it should be support the administrators even they are women. Furthermore, how the men cooperate with women it is very important in a collective activity. The author thinks that women should be support by the men. Otherwise, it must be like the raft is foundering. Like in this trip when the Marlene was in charge. At last, the author mentioned that there are analogy between navigating a river and a big bureaucracy. Like river, a big organization also has sleepers and chutes. However, there existence is a far more political than intellectual task. Women trying to navigate most organizations, they may found it more complex than the Rogue. The men struggled to take over and colluded against the women so they could give their simplistic orders, they were living out the now-outdated command-and-control style of large bureaucratic organizations. In sum, in the organization, the male-female have conflict. When the women from climbing the corporate ladder. Men would act to preserve their positions of power, and they knew how to do that with behaviors both subtle and obvious. However, in this society, the power not only belonged to the men, the women also have the right and ability to gain the power and should be supported. In addition, the author uses the river to analogy the diversity management; the manager should create the environment in which a diverse team can achieve trust and mutual respect. Otherwise, the result was there in a throwaway line in the story—the raft lost its place in line. Finally, they will lose competitive position.

Friday, August 16, 2019

Causes of the Reign of Terror

The reign of terror was a period of violence in which occurred from 1793- 1794 after the strong onset of the French Revolution. It was a time of fierceness and anger, resulting in the deaths of thousands of people living in France at that period of time. The terror followed the trial and execution of King Louis XVI in 1793 and was incited by the conflict between the Girondins and Jacobins. Soon after, King Louis’ wife, Marie Antoinette, was executed in the guillotine- the new form of constitutionalist justice.Many of the people who were executed during this period of time were not aristocrats, but ordinary people who may have only stated a critical thought or judgment going against the revolutionary government. Many believe that once Robespierre became leader of the Committee of Public Safety, he overpowered France and dominated the public, leading to the terror. Some believe that the terror occurred to stop counter-revolutionaries, such as the War in Vendee, and happened beca use of the factions between the Jacobins and Girondins.The Reign of Terror was the governments reaction’s to counter-revolutionary threats occurring particularly in the Vendee region of France in 1793. Here the public armed themselves in order to attempt to overthrow the Republic and restore the monarchy to the way it was. The counter-revolutionaries in this region were strongly against Robespierre and upset he had launched a movement to de-Christianize the nation and persecute the Church- massacring priests, destructing churches and destroying religious images.During this time all of the people of Vendee loyally stood by the Church and the Catholic monarchy of France and could clearly be distinguished wearing Rosaries around their necks at all times and the symbol of the Sacred Heart of Jesus sewn onto their hats. The people of Vendee fought hard against the French revolutionary government, many calling the War in Vendee the first modern ‘genocide. ’ A French ge neral of the time, Francois Joseph Westermann, stated â€Å"We are shooting them non-stop†¦Mercy is not a revolutionary sentiment,† exaggerating the intensity of the situation in Vendee and the success of the revolutionary government against the West region, supposedly leading to the ‘Reign of Terror’ in France. A number of people living in France, including nobles, priests and the bourgeoisie fled the country during the French Revolution, abandoning the struggle the country was going through. Emigrating, they formed armed groups and moved to neighboring countries, acquiring the name of emigres.In 1791, legislation against the emigres was passed by the King stating that anyone caught emigrating would be punished with a death sentence, namely the guillotine. Due to the politics of the time period, France was inevitably drawn to War with Austria and its allies, including Prussia, declaring War against them on 20 April 1792. Robespierre opposed the occurrence o f War due to the fact that it would strengthen the monarchy and the military as well as attract the anger of ordinary people in Austria and its neighbouring countries.The Jacobins increased the size of the army, determined to have more soldiers who demonstrated their patriotism and trained ability effectively. The Republican Army of France dominated the battles and were able to overcome the Austrians, Prussians, British and Spanish- the countries against the revolutionary government, and the strong violence was a large part in why the Reign of Terror began. Factional disputes in the Convention caused for the replacement of the Girondins with the Jacobins as they desired for a centralized government in France. This dispute could have been one of the main causes of the Reign of Terror breaking out.They wanted to keep Paris as the national capital city and to have the temporary government of the time to take control of the economy as a whole. The Jacobins were able to utilize their pow er of the sans-culottes and gained much of the public’s support opposed to the Girondins. On June 22, 1793, 80000 armed sans-culottes gathered and surrounded the National Convention halls and demanded the arrest of the Girondin party, resulting in the immediate arrest of 29 Girondin members. The Jacobins then had firm control of both the National Convention and France as a nation, left to deal with the violence and repression on the streets of France.Robespierre became leader of the Committee of Public Safety in 1793, causing a shift in power from Georges Danton to Maximilien Robespierre, Danton being an implausible public speaker and having a stronger physical presence while Robespierre less passionate about the public in general and their needs. He encouraged violence in France during the political deterioration and the fact that the attempt to set up a workable constitutional monarchy under King Louis XVI‘s reign failed made him passionate about politics. He wished t o create a temporary dictatorship in order to save the Republic from falling completely.He believed that it was â€Å"One’s duty to punish traitors, to help the needy, respect the weak, defend the oppressed, do good to one’s neighbour and behave justly,† meaning he wanted to punish those who were against the government in any way and act justly- not something that he achieved. He believed that the â€Å"Terror is nothing but quick and hard justice,† granting that he wanted the terror to be something which was handled quickly and only for those who acted against their choices in any way. Robespierre was a large influence in the Reign of Terror and wanted the people who acted out to be punished for their actions.Many people believe that he was the reason why the Reign of Terror originally began. Many dispute that the Reign of Terror simply does not exist due to the fact that there was already violence occurring before this supposed period of time. The Storm ing of Bastille was a violent period in which happened on July 14, 1789 where a mob of people marched to the Bastille, a large structure in which was previously an eight-towered castle, in search for prisoners and gun powder that had been taken by the unpopular King, Louis XVI.The building was being used as a prison at this period of time and only guarded by 30 Swiss guards, making it easy for the mob to get through in possession of canons and 3000 rifles under their belt. This shows that before the Reign of Terror strong violence was already occurring and was a large part of the nation. The Reign of Terror was not a significant change of violence to what was already occurring in France at the time, causing people to argue that the ‘violent Reign of Terror’ never existed in reality; it was simply a continuation of the violence already taking place.The Reign of Terror began in order to repress counter-revolutionary groups, which forced the Committee of Public Safety, led by Robespierre, to use the ‘humane’ form of execution- the guillotine. This resulted in external enemies being executed and anyone living in France who was under suspicion or was overheard stating a critical judgment against the government put under the guillotine. Through these executions the Revolutionary government ained momentum against their political enemies and had confidence with all of the power they were given. The mentality of violence had built up gradually from the very beginning of the revolution, not particularly when the Reign of Terror supposedly begun in 1792; the strong violence and destruction progressively increasing and the death toll reaching to new heights in this time period. By 1794, the Jacobins’ power was overbearing as they started to become unpopular with the public and media- those with accepted opinions.Their bloodshed result of power and recognition in the nation caused the bourgeoisie and former Jacobins to prompt propaganda aga inst them, aiming to destroy the monarchy. The Reign of Terror impacted the people of France and forced them to conform to what was accepted by the Committee and the Jacobins, allowing for them to have no say or judgment in the events of the time. There were many causes of the terror, some in which included strong violence, others strong leaders, yet they all marked the same thing- the end and beginning of France again.