Wednesday, December 25, 2019

List 3 stages Addiction - 1424 Words

Addiction Addiction, to a layman, is an insane attraction or out of control (being hooked) towards a substance, event, person or an activity in an attempt to escape or avoid emptiness, meaningless, monotonous, boredom, loneliness etc, etc in life. Something that normal people found impossible to understand or comprehend. Advice (gentle or harsh), scolding and even beating would not deter them. Types of addiction: Substance addictions e.g. heroin, nicotine, alcohol Behavioral additions e.g. gambling, sex, eating, relationships, work, compulsive physical exercise, internet/tv, shopping, etc Basically, they are divided into functional and dysfunctional type. Below discussions focused on the dysfunctional like drug, alcohol and†¦show more content†¦The addict starts to act out his belief system in a ritualistic manner and his behavior is more out of control. Because the addict must make emotional sense to himself of the inappropriate behaviour, he turns to denial, repression, lies, rationalizations, and other defences to cope with what is happening. When the addict acts out, he must withdraw into his addictive personality to receive support. He started to isolate himself from others and the loneliness becomes another signal to act out (more alcohol or drugs). This vicious cycle serves to strengthen the addictive process. The behaviour becomes more ritualised. As the addict becomes more controlled by the process, those people around the addict sense his emotional withdrawal and react to it. This is the start of people problems, as the addict manipulates people and treats them as objects. The next thing that happens is for the people around the addict to label him as irresponsible, troubled, tense, crazy, or strange. Stage two, includes the development of tolerance (not able to escape the pain). Not only the addict is avoiding people now, if possible, people around him also wanted to avoid him because of the many intolerable issues like lies and stealing that the addicts bring forth in the family, neighbourhood or workplace if he is still employable . Relationship starts to dwindle and causes confusion and resentment not only with the addicts but among other family members too. Because ofShow MoreRelatedAlcohol Dependence: A Case Study1243 Words   |  5 Pagessome can actually use it only on occasions while others mess up their lives for it. Teens particularly are prone to the hazards of alcohol if they start quitting school to. The role of family is very significant in helping alcoholics overcome their addiction and lead a healthy non-alcoholic life. 1.MEMBER ASSESSMENT This vignette, a case of social and psychological nature, comprises of three main characters of a family- the mother, father and daughter facing the issue of uncontrolled use of alcoholRead MoreDrug Addiction And Its Effects On The Central Nervous System1468 Words   |  6 Pages1. Define: drug, drug addiction, narcotic drugs, depressants, stimulants, opioids, cannabinols, hallucinogens, inhalants and over the counter drugs. †¢ Drug; Natural or synthetic substance introduced into de body produces on alterations of the SNC of the individual and is susceptible to create psychological, physical or both.. †¢ Drug addiction: is a dependence on an illegal drug or a medication when you are addicted, you may not be able to control your drug use and you may continue using the drugRead MoreRelapse Prevention Plan Essay1065 Words   |  5 Pagesrelapse warning signs, they are not able to identify them up to the point when they start feeling unbearable pain. Step 1: Stabilization Relapse prevention planning will most probably not work if the relapser is not sober and in control of himself (Addiction in women, 2010). Detoxification and sobriety are very vital for the relapse prevention plan to work successfully. Having in mind that most people who relapse are toxic, even if they are sober, it will still be very difficult for them to think clearlyRead MoreAbstract. Drug Addictions Are A Very Complicated Subject1737 Words   |  7 PagesAbstract Drug addictions are a very complicated subject to explain due to the fcact that there is so many types of addictions that we may not have the sufficient information to sustain the facts. People underestimate the effects of something so simple as drinking a beer or even smoking cigarette but in fact it is more dangerous than you think. Alcohol and Nicotine are the most common type of addiction that is a slowly but deadly killer. This paper should give you a more extend amount of informationRead MoreMotivational Interviewing : Motivation And Process1686 Words   |  7 Pageshandle the client s resistance to change. There are a few signs of resistance from a client, which include arguing, ignoring, denial, and interrupting. These signs can be observed during the course of a session with a client and can occur at any stage of change. The techniques used to work with resistance are simple reflection, which is when the counselor repeats back to the client what they have said. This allows the client to hear what they are saying. Another reflection strategy is the amplifiedRead MoreAbstinence vs. Harm Reduction1733 Words   |  7 Pagesprohibition. Then, â€Å"the Anti-Drug Abuse Act of 1988 mandates abstinence-based drug policy† (MacMaster 2004: 2) that promotes a drug free America. Also, critics of the harm reduction policy claim that as drugs are legalized, so will the rates of drug addiction. In the article â€Å"In Support of the United Nations Drug Conventions: The Arguments Against Illicit Drug Legalization and Harm Reduction,† David G. Evans expresses his opposing view of harm reduction and states reasons why legalizing drugs for theRead MoreCultural Sensitivity And Social Sensitivity801 Words   |  4 Pagesstrict guidelines for N.A. group, the established culture may not change much, however, the GSR can provide a survey to members with specific questions regarding culture and submit to the organization for review. Southeastern Arizona websi te meeting list could offer additional support, activity, or skill building groups that expand more on the fundamentals of culture and how it relates to improvement outcomes. The website or information pamphlets could include educational information on why cultureRead MoreDrug Addiction and Health Problems965 Words   |  4 Pages Drug addiction, also called substance dependence of chemical dependency, is a disease that is characterized by a destructive pattern of drug abuse that leads to significant problems involving tolerance to or withdrawal from the substance, as well as other problems that use of the substance can cause for the sufferer, either socially or in terms of their work or school performance.   More than 2.6% of people suffer from drug addiction at some time in their life. The term dual diagnosis refers to theRead MoreRationalization Of Addictive Behaviors And How Society s Views Affect Addicts And Their Recovery1744 Words   |  7 PagesAffect Addicts and Their Recovery What kind of person does society picture when they think of an addict? How are addictions and addictive behaviors viewed as a whole? Whether it be drugs, actions, or behaviors, addictions can tear lives, families, and friendships apart and are never positive. But is it really the addict’s fault? Could it be a genetic flaw that fuels the addiction? Or are these addicts just lazy people with no self control? Along with others, these questions are important becauseRead MoreThe Habits That Hold You Essay2417 Words   |  10 Pagesbecomes the habit.† This quote by David Ryan shows the level of addiction in some addicts (Ryan 1) Addiction is a serious disease that is incurable in most people, and the numbers of people who are addicts is growing worldwide. An addiction is being abnormally tolerant to and dependent on something that is psychologically or physically habit-forming, addictions range from a wide variety of things such as drugs, alcohol, and food addictions. In the United States, substance abuse is growing rapidly.

Tuesday, December 17, 2019

Essay about Painting a Portrait of Death - 811 Words

â€Å"Painting a Portrait of Death† Death is inevitable to all forms of life. In giving birth to a typical family, Flannery O’Connor immediately sets the tone for their deaths, in the story, A Good Man is Hard To Find. OConnor’s play on words, symbolism and foreshadowing slowly paves the way for the family’s death. nbsp;nbsp;nbsp;nbsp;nbsp;OConnor begins to paint the image of death with her presentation of the grandmother. As the family prepares for their adventure the grandmother carefully selects her attire. â€Å"A navy blue straw sailor hat with a bunch of white violets on the brim and a navy blue dress with a small white dot in the print. Her collars and cuffs were white organdy trimmed with lace and at her neckline she had pinned a†¦show more content†¦OConnor purposely places â€Å"five or six† graves in that area to symbolize each of the family members. This scene foreshadows that all of the family members are put to death in a completely isolated area, surrounded by the thickness of nothing. The grandmother tells the family, â€Å"That was the old family burying ground. That belonged to the plantation† (OConnor 268). Not only does her quote symbolize that their whole family will soon lay their, but it allows the son to inquire, â€Å"Were’s the plantatio n† (OConnor 268). The grandmother responds, â€Å"Gone With the Wind† (OConnor 268), this symbolically representing each of the family members at the end of the story as their souls have been let loose and set free like the wind. nbsp;nbsp;nbsp;nbsp;nbsp;By illustrating play on words, OConnor continues to maintain the trend of death. The town where the family meets their fate is brilliantly noted, Toombsboro† (OConnor 270). Two deadly words are excreted from the town’s name, tomb and bury. The meaning of the town enhances a foreshadowing quote from the misfit. The grandmother asks, â€Å"What did you do to get sent to the penitentiary that first time?† (OConnor 276). The Misfit’s answer slyly enhances the meaning of the town’s name by explaining, â€Å"Turn to the right, it was a wall†¦Turn to the left it was a wall.Show MoreRelatedJohn Copley and Benjamin West813 Words   |  4 Pagesfurther into Copley’s and West’s artwork(s) and this is what I have found. John Singleton Copley’s painting: Mars, Venus, and Vulcan: The Forge of Vulcan features Venus which is the symbol of love and sex. It shows Venus as very seductive young woman. It also has cupid’s arrows which also represents love. Half of the painting is painted dark giving the painting a dreadful feeling. Half of the painting is painted light giving the feeling of relief. There are three cupids in the picture doing completelyRead MoreArnolfini Marriage by Jan Van Eyck976 Words   |  4 Pagesâ€Å"Arnolfini Marriage† is a very famous painting by Jan Van Eyck painted in the early 15th century, which is in the National Gallery in London. According to the Catalogue of the National Gallery, the painting is just a portrait of the couple Arnolfini that is showing their marriage. Waldemar Januszczak, an author and presenter, believes that this portrait was wrongly named and it should have been called â€Å"the Arnolfini Pregnancy†. Januszczak believes that Mr s. Arnolfini is pregnant and she is dead atRead MoreThe Renaissance Era915 Words   |  4 Pageswake of death, destruction, and war came the Renaissance. The Renaissance was an era of cultural rebirth that swept across Europe during the 14th to the 17th century . This era marked the time in which man returned to their classical learning and values of ancient Rome and Greece and began to change their attitude towards religion (Renaissance Art). While the Renaissance is in the past it continues to live on throughout many different fields of art, theories and movements. However, paintings such asRead MoreThe Fall Of Death, Destruction And War879 Words   |  4 Pageswake of death, destruction and war came the renaissance. The renaissance was an era of cultural rebirth that swept across Europe during the 14th to 17th century . This era marked the time in which man returned to their classical learning and values of ancient rome and greece and began to change their attitude towards reli gion (history.com staff). While the renaissance is in the past it continues to live on throughout many different fields of art, theories and movements, however, paintings tend toRead MoreAnalysis Of Poe s The Oval Portrait 1067 Words   |  5 PagesPoe brings about the death of a beautiful woman through the theory of Biocentrism by using memory, imagery, and obsession with love. Robert Lanza, a professor from Wake Forest University School of Medicine in North Carolina proposed the theory of Biocentrism in 2007 and was credited in The American Scholar. He states that death does not exist in any real sense unless we associate ourselves with the body. The consciousness of an individual is just energy. Energy cannot be destroyed or created. ThereforeRead MoreThe Picture Of Dorian Gray1482 Words   |  6 PagesPicture of Dorian Gray, Oscar Wilde uses the portrait of the young protagonist as a symbol of many things, one of them being a mirror. Wilde also uses Gray’s death to not only signify suicide, but his true unhappiness through the stabbing and thus killing of his own soul. Throughout the novel The Picture of Dorian Gray, Oscar Wilde tells a tale about a young man named Dorian whose entire life changes after he meets Basil Hallward, who paints a portrait of Gray that ultimately leads to Gray’s demiseRead MoreSelf Portraits: Ekphrasis Poetry918 Words   |  4 Pagespainters, but also gives voice to the torments of the artists, their subjects, themes of death, life and love. The book as an entire collection gages the immediacy of art and time, because life is but a fleeting glimpse of fractured memories and light. Moreover, the images presented in Gehrke’s collection are intertwined capturing the urgency to paint, the transcendence of the artist from their body, as painting is an out of body experience, but also maintains the humanity of the artist’s by examiningRead MoreAnalysis Of Jan Van Eyck s The Wedding Portrait 1194 Words   |  5 Pageshis career as an artist in 1422 and continued until his death in 1441. While Van Eyck was active, he created many well-known paintings. According to John Haber, Van Eyck was a portraitist who was the first to paint in oils (pg.1). One of his most famous works is Wedding Portrait, or Giovanni Arnolfini and His Bride. This painting depicts a man and a woman holding hands in matrimony with many symbolic objects surrounding them. The painting was created in 1434 and currently resides at the NationalRead MoreComparing The Girl With A Pearl Earring And Mona Lisa1332 Words   |  6 PagesName Professor Course Date Comparison of the Girl with a Pearl Earring and Mona Lisa   The Girl with a Pearl Earring and Mona Lisa are the two most famous portraits ever painted  (Courtauld 36). The girl with a pearl earring follows the Mona Lisa painting, which is considered as the most famous painting. The girl with a pearl earring, by Johannes Vermeer, and the Mona Lisa by Leonardo da Vinci were created during the same historical time. Historians believe that Leonardo da Vinci created his artRead MoreArt Is A Great And Powerful Form Of Expression977 Words   |  4 PagesArt is a great and powerful form of expression. Artist such as Hans Holbein, have been immortalized within his paintings. One of his most profound paintings is The Ambassador. ‘This picture memorializes two wealthy, educated and powerful young men’. This painting resides inside the National Gallery in London. Hans Holbein was born in Augsburg in southern Germany in the winter of 1497. He learned how to paint from his father Hans Holbein the Elder. ‘In 1515 he and his brothe r Ambrosius Holbein went

Sunday, December 8, 2019

Topics in Information Technology Ethics for Computer Applications

Question: Discuss about theTopics in Information Technology Ethics for Computer Applications. Answer: Introduction Doing Ethics Technique (DET) is defined as a tool which assists in finding different ethical and non-ethical issues relating to a situation by giving answers to simple questions (Lekakos, Vlachos Koritos, 2014). This paper will implement Doing ethics technique on the situation provided in Scenario 3: Early launch (Video 1) (Al-Saggaf, 2016). The DET will assist in determining ethical issues provided in the scenario and analyse the potential implications of such ethical issues. Ethical theories will be implemented for assessing the morality of the situation. Further, different options will be discussed to find the most suitable solution to the ethical problems that occurred due to adoptions and use of ICT. Doing Ethics Technique What is going on? In the video, based on the recommendation of the CIO, project director is asking the project manager to deliver the software one month earlier than its original deadline. In order to save the time, he is asking him to avoid the encryption of the software. The project manager denies by saying that the senior developer has emphasised the importance of the encryption for the security of the software without which it might get hacked. The project director said that delivering the project earlier will give additional benefits to the project manager and his team. He also said that they can attach the encryption to a software update after delivering the software. What are the facts? Encryption helps in protecting personal data by converting it into code which can only be accessed by the person who has the code key (Singh, 2013). It prevents unauthorised access and protects the data in case of a breach (Rewagad Pawar, 2013). Project manager emphasis on the importance of encryption for the software and how lack of security can negatively affect millions of people. Project director tries to entice the project manager by saying that he and his team will receive bonuses if they deliver the software without encryption. What are the issues? The key issue is the security of the software since the project director is asking it to release the software without encryption. The project director is avoiding the recommendation of the senior developer that encryption is vital for the security of the software. For personal and companys gain, project director is willing to sacrifice the security of millions of people which is morally incorrect. The project director is enticing the project manager by saying that he and his team will receive additional benefits if they deliver the software one month before the deadline. Who is affected? Project Manager: The project manager is responsible for ensuring the security of the software and delivering it one month earlier than the deadline without encryption increases the risk of hacking. Project manager is responsible for protecting the privacy of millions of people who will get affected in case the software gets hacked. People: Without encryption, it is easier for cybercriminals to hack the software and collect the personal information of people who are using the software. Organisation: In case the software gets hacked, the reputation of the company will be lost, and it will be difficult for them to get new clients in the future. Client: The client will suffer the most in case the data gets led by hackers. The client can also sue the software development company for providing software without encryption which increases the risk of cyber-attacks. What are the ethical issues and implications? The primary ethical issue is the security of millions of people whose personal details will be leaked in case the software gets hacked. According to Deontological ethical theory, rightness or wrongness of an action prevail over it right or wrong consequences (Yazdani Murad, 2015). Therefore, based on this theory, it is ethically incorrect for CIO and project director to force and entice the project manager by saying he and his team will receive handsome bonuses if they deliver the software a month earlier than the deadline without encryption. The implications of the ethical issues might negatively affect millions of people by leaking their sensitive data (Derr, 2012). The company and its employees will also negatively affect due to adverse implications of issues. What can be done about it? In order to avoid ethical issues, CIO and project director should listen to the project manager and his team and take into consideration their recommendations. They should not force the team to deliver the software one month earlier without encryption to gain an unfair advantage. The company should focus on improving the quality and security of its software rather than providing it earlier than deadline to make the client happy. What options are there? Project managers can accept the offer of project director and deliver the software without encryption which makes it easier for cybercriminals to hack and collect the personal data of millions of users. Project director can avoid the recommendation of the project manager and deliver the project by hiring a new team of developers. Project director can listen to the recommendations of project manager and his team and focus on the security of the software rather than gaining an unfair advantage. Which option is best and why? The best option in this scenario is that project director listens to project manager and his team and dismisses the decision to deliver the software one month before the deadline. The software should be encrypted to protect the data of its users. The company can avoid the risk of hacking by delivering the software on the deadline after completing its encryption. It is the ethical decision since it will protect the reputation of the company and data of millions of users. Conclusion Conclusively, it is ethically incorrect for companies to put their advantage above peoples security. The top-level management should consider the recommendations of the team before taking any shortcuts which may negatively affect others. In this case, it is ethically wrong for the company to force and deliver the software one month early without encryption since it may get hacked and leaked personal data of millions of users. References Al-Saggaf, Y. (2016, October 31). Scenario 3: Early Launch. [Video File]. Retrieved from https://www.youtube.com/watch?v=v5M7ohdZ6qA Derr, C. L. (2012). Ethics and leadership.Journal of Leadership, Accountability and Ethics,9(6), 66. Lekakos, G., Vlachos, P., Koritos, C. (2014). Green is good but is usability better? Consumer reactions to environmental initiatives in e-banking services.Ethics and Information Technology,16(2), 103-117. Rewagad, P., Pawar, Y. (2013). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Yazdani, N., Murad, H. S. (2015). Toward an ethical theory of organizing.Journal of Business Ethics,127(2), 399-417.

Sunday, December 1, 2019

Polar Bears and Global Warming Essay Example

Polar Bears and Global Warming Paper This global climate change has made it difficult for the animals in these regions to survive. One animal whose home is rapidly disappearing is the Polar Bear. This change in temperature is melting their white icy prairies that the polar bears desperately need to survive. As the polar bears habitat diminishes, so does the polar bears population. In order to protect the polar bears, humans need to make a valor effort to reduce the amount of pollution and greenhouse gases that we produce. Polar bears are one of the many species that are being affected by the polar CE caps melting. Sea ice is the foundation of the Arctic marine environment. Vital organisms live underneath and within the ice itself, which is not solid but pierced with channels and tunnels large, small, and smaller. Trillions of diatoms, zooplankton, and crustaceans pepper the ice column. In spring, sunlight penetrates the ice, triggering algal blooms. The algae sink to the bottom, and in shallow continental shelf areas th ey sustain a food web that includes clams, sea stars, arctic cod, seals, walrusesand polar bears (McGrath, Para. 4). These magnificent bears depend on the tundra to provide a frozen landing for hunting and taking a break while swimming far distances. Most bears live their entire lives out on the ice and only visit land to build birthing dens; however, as the ice continues to melt, the polar bears are destined to die prematurely due to the lack of food available and the lack of safe places to rest between swims. According to The U. S. Fish and Wildlife Service, the declining amount of sea ice is the number one threat against the survival of polar bears (Campbell, Para. 2). To paraphrase from Colic Campbell and Kate Landaus article The War Over the Polar Bear, the United States Geological Survey (USGS) noted that as the Arctic sea ice continues to melt, approximately two-thirds of the worlds polar bear population is expected to die out by 2050. This prediction can even be considered conservative, because the sea ice is melting faster than previously anticipated, according to the USGS polar bear proj ect leader Steve Masters (Campbell, Para. 13). We will write a custom essay sample on Polar Bears and Global Warming specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Polar Bears and Global Warming specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Polar Bears and Global Warming specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As the effects of global warming continues to warm the planet, the Arctic ice caps continue to disappear at a dangerous rate, heartening the polar bears ability to survive in these conditions. Polar bears are native to Alaska, Canada, and Russia. The bears that live in the Norwegian archipelago of Scabbard, the Effort Sea, and Hudson Bay in Northeast Canada have been studied the longest. The western part of the Hudson Bay is where the ice is known to melt in the summer and freeze back in the fall. This is where the polar bears threat was first brought to light because as the years went on, and the planet continued to warm. The ice ceased to freeze back, making it difficult for the new mothers and baby cubs o survive the farther swims to find an frozen prairie where they could hunt and rest. As the distances between frozen arctic caps Increases, so does the number of bears that drown. Although polar bears are good, strong swimmers, they are not as well fed as they used to be, due to the lack of hunting land. As survival becomes less likely, fewer females give birth and fewer cubs actually survive. The polar bears predicament is a controversial topic, because in order for the government to put polar bears on the endangered species list, they would eve to admit that global warming is real and is happening right now. However, this is a time pressing matter, because within the next 50 years, the polar bear species could be wiped out completely. Global warming is the main cause of the problem at hand. If humans were able to limit the amount of green house gases that we release, maybe we could slow the warming of the planet and stop the ice caps from melting and never reforming. As long as the polar bears have ice caps to hunt on and rest on in between swims, less polar bears would die from starving or drowning. Slowing this death rate would increase the amount of cubs born each year and the survival rate would increase as well.

Tuesday, November 26, 2019

Mans Inhumanity to Man essays

Man's Inhumanity to Man essays Over the centuries, nothing has caused more pain and suffering for man than man himself. Through war, hate crimes, and random acts of violence, the fear of the different and unknown has made itself known in human nature. The novel Night, the movie Schindlers List and the article A Tortured Legacy are all examples of this. Through the suffering of the Jews at the hands of the Germans, there is no clearer example of mans inhumanity to man. The holocaust was far more than a tragedy; it is something you simply cannot describe with words. The sheer evil and hate that took place in the 1940s really simplifies what man can be like when hes at his weakest and lowest point of existence. Through the merciless slaughtering and torturing of the Jewish people, the Germans showed to the whole world what its like to be inhuman; to be an animal. In the wild, creatures kill for food and survival. In the death camps of Auschwitz, there was killing simply because of a difference of beliefs. The German Nazis believed that the Jewish people were responsible for their peoples suffering, that because they came over to Germany and thrived, they were effectively killing off the German people. With the aide of propaganda, Hitler and his followers convinced everyone who was willing to listen that the Jewish people must be stopped, that they werent even humans; that they were sub humans. Humanity? Humanity is not concerned with us. [p.30] Is a quote from the book Night, which was spoken by a man who was about to be sent to the gas chambers, and it sums up the entire holocaust. In the movie Schindlers List, people are being shot for no reason at all. One such instance, a woman is shot for simply walking down the street. If thats not inhumane, then what is? Not all the Jews were lucky enough to be gassed or shot in the head. Many of them went to concentration camps where they ...

Friday, November 22, 2019

Overcoming Empty Nest Syndrome

Overcoming Empty Nest Syndrome As sure as summer turns to fall, every August thousands of women across the country experience a unique form of heartbreak. It’s not unrequited love – it’s the bittersweet act of sending a child off to college. Empty nest syndrome creates anxiety for even the most independent of women. Next to childbirth, it’s one of the biggest transitions of motherhood. Departure - Not Abandonment For many, it’s a personal struggle to come to terms with one’s own feelings of loss and change. Mindy Holgate, 45, an office manager from New York, was surprised at how deeply she was affected by her daughter Emily’s departure for a large state university three hours away. â€Å"It was huge. We had a friendship as well as a mother/daughter relationship. When that was taken away, I felt so lonely.† Holgate says she cried for two weeks after saying goodbye last August. She also admits that she resented Emily and felt abandoned. But now, looking back with a year’s perspective under her belt, she acknowledges, â€Å"That was all about me, not her. Having that bond and then letting go was my own issue.† Transplantating Your Child Like Holgate, many mothers who sing the empty nest blues cant see beyond the hole created by a child’s absence. And maybe it’s the phrase ‘empty nest’ that’s partly to blame. The following analogy expresses this transition in a more positive light: Imagine transplanting a flower or bush to a new location so it can grow healthier and stronger. For this to successfully occur, you have to dig up the plant and sever its roots. There’s an initial shock to the system, but planted in its new surroundings, it extends new roots and eventually establishes itself more firmly than before. And the hole that’s left behind can be filled in with fertile soil ready to nurture new opportunities. Mother - Not Friend Letting go seems especially challenging for baby boomer mothers. Many pride themselves on being a friend first and a parent second. This may be why a term used by college administrators – helicopter parenting – has entered the mainstream to describe a mother and/or father who hovers to the detriment of their child’s personal growth and development. Anyone familiar with the cell phone habits of teenagers knows that constant contact with friends, whether texting or calling, is commonplace. But a responsible mother who wants what’s best for her college freshman has to behave like a parent – not a friend. She needs to refrain from picking up the phone and calling or sending text messages daily, or even weekly. School of Hard Knocks Let your child reach out to you and establish his or her own terms for staying in touch. They’re the ones who have to learn the ins and outs of college classes, dorm life, relationships, newfound freedom, and financial responsibility. Over-involvment - or trying to smooth over the rough spots that arise in college life - takes away opportunities for your child to envision solutions or develop coping strategies. Holgate found this out herself when her daughter casually mentioned in a phone conversation that she’d lost her student dining card and couldn’t access her meal plan. Though Holgate was frustrated that her daughter hadn’t thought to contact student services with her problem, she knew it was all a part of growing up. â€Å"Out of Your Hands† And the benefit of letting go? A life that blooms independently on its own. Holgate sees the process as similar to paying out rope: â€Å"First you ease it little by little, then suddenly it just slips out of your hands and you’ve let go.† She realized she’d let go when her daughter Emily decided to go to Canada this summer for a week with friends. â€Å"I didn’t ask her where she was staying, where I could reach her, or what she’d be doing. And I almost felt guilty about it. Last summer I wouldn’t have imagined I’d feel this way. Over the past year, the process of letting go almost happened right under my nose without my noticing it.† Holgate’s advice to mothers currently facing this situation: â€Å"Let the kid go. And don’t lose sight of the fact that it’s a transition for both of you.†

Thursday, November 21, 2019

Event Management Essay Example | Topics and Well Written Essays - 2250 words

Event Management - Essay Example A. Evaluate the current level of understanding of Events Impact and Events Stakeholder Management and how it integrates into the events management process (EMP). Table of Contents Introduction 3 Event Impacts 3 Significance of Culture and Time in Mega Events 7 Event Stakeholder Management 8 Event Management Process 9 Conclusion 12 References 13 Introduction Event management is fundamentally described as the appliance of a significant tool i.e. project management towards the generation and advancement of various types of festivals, conferences as well as events. The study related to event management comprises different valuable aspects that include determining the intricacies of a brand, assessing the target audience, pointing out the concept of the event, planning for logistics as well as coordinating various technical aspects prior to the launch of any event. An event manager has a greater role to play in the context of any major event. It becomes significant for the event manager t o consider the influences of an event all through implementing an effective planning process. Event impacts also capture the minds of the organisational members along with the policy makers for evaluating public expenditure on events and to assess any negative externalities (Damster & Tassiopoulos, 2006). This discussion intends to evaluate the current understanding level of events impact and events stakeholder management and how it integrates into the events management process (EMP). Event Impacts The study related to event impacts have been arrived by the requirement to test the positive as well as negative influences of holding an event for the purpose of justifying public spending on events (Faulkner & et. Al., 2003). The positive as well as negative influences can be observed at the time of conducting an event. The impact of event might be felt by numerous stakeholders along with the participants, local businesses as well as host community. There are different ways in which the event is likely to impact. The various areas upon which event are likely to impact include physical infrastructure, environmental, economic as well as tourism impacts, image enhancements and urban renewal. The inspirational power of any sporting event which further tends to be stimulated by media reach recommends the fact that they can be a useful tool in developing the interests of the people towards involvement in sports. It can be affirmed that the perception of an organiser relating to the socio-economic impacts of the festivals along with other special events tends to possess four main domains such as economic benefits, community cohesiveness, social incentives as well as social costs (Gursoy & et. al., 2004). It can be revealed that the positive inflows of revenues into the country cannot be considered as the only factor towards recognising the success of an event. The negative social influence related to an event can lead to greater damages to the future of an event and the ecological influence might also lead towards premature death of any poorly administered event (Janeczko & et. Al., 2010). It can be identified that an event tends to initiate seasonality of tourism in a particular region. It also assists in evenly distributing the flow of money into a region, escalating the scope for full-time employment. The factors that may lead towards successful event might comprise several imperative factors such as escalating visitors’

Tuesday, November 19, 2019

The Times of Harvey Milk connection to Sociology Essay

The Times of Harvey Milk connection to Sociology - Essay Example ranciscans participated in the protest rally after the murder and they expressed their anger by indulging in violent activities including attack on police vehicles. People were more furious on the leniency shown to White, during the trial procedure. (Profile/milk, time.com). It is very interesting to view this movie in the context of sociological theories, and especially the hero Harvey Milk, due to the concepts of deviance and conflicts involved, through out his life. All the deviant activities and conflicting events including his assassination and the resulting violence were illustrating the various aspects of different sociological theories of deviances and conflicts. Every conflicts and perceived deviances occurred as a result of the courageous life practiced by Harvey Milk, by questioning the conventional ideas and traditional social perceptions. Conflict theories suggest that society and culture influences individual behavior. Economic and social inequality in a society is cited as the most significant cause of conflict. According to conflict theorists every society will be economically unequal. The most important and influential position are handled by powerful people in a society. (pathway2, sociology.org.uk). In this movie also it is evident that the Harvey Milk being a member of a gay community was discriminated by the general society, especially the governing class. The protagonist of the movie, Harvey Milk, is suffering mainly from the inner conflicts. The socio economic environment in which he was brought up was sufficient enough to create conflict in his own inner sense. While dealing with other people his sociological background influenced him. Conflicts are created through out the structure of the society presented in the movie. Conflict in the society is instigated by competition. There are three assumptions related to conflict theory which are suggested by the traditionalists. Interests of various groups in the society are the one aspect of

Sunday, November 17, 2019

Significance of chapter 5 in Frankenstien Essay Example for Free

Significance of chapter 5 in Frankenstien Essay Look at the significance of Chapter Five to the novel as a whole. Focus on the relevance and effect of writers use of language to describe setting, character and what it shows about social and historical influences. When Mary Shelley was writing Frankenstein, she was heavily influenced by events going on in society at the time. She was married to Percy Shelley, who also influenced her with his romantic poetry. Mary Shelley wrote the novel for many different reasons. One of the reasons was said to have been that she was playing a game to see who could write the scariest horror story; this is where she began writing the basics of Frankenstein. Chapter Five is a crucial moment in the novel because this is where Frankenstein brings the monster to life. The chapter opens with It was a dreary night of November. This is building up an atmosphere, and it shows that it is dark, gloomy and that potential events are ahead. Frankenstein is feeling very emotional at this time, when he says How can I describe my emotions at this catastrophe. This is because he thought that bringing the monster to life would be great, even though it turns out to be a big disappointment and too much for him to handle. Therefore he rejects the monster and abandons him. Consequently, this results in events such as; The monster feeling lonely and rejected, and ends up killing Elizabeth (Frankensteins future wife) because he wanted a companion for himself, and also to get revenge on his creator. In Chapter Five, you get to know understand the character of Dr Frankenstein much more. He is shown as many things, such as; Obsessive- I had worked hard for nearly two years, for the sole purpose of infusing life into an inanimate body, which means he had spent all his time trying, and being determined to create the monster. He also is shown as anxious- With an anxiety that almost amounted as agony, which shows that he his worried about what he had done. On the other hand he is shown as nai ve, when it says The beauty of the dream vanished, which means he finds it impossible to face up to what he has done and he doesnt take responsibility for his actions. This is a significant moment in Chapter Five because of the language used to describe the character. Mary Shelley uses language to develop an atmosphere in Chapter Five. She wrote things such as The rain pattered dismally against the panes, which shows that the setting is gloomy and using the word dismally means that it is also wet and miserable. She also said It was on a dreary night of November, (refers to the Gothic ideas in the novel) which shows that it isnt light outside- she uses this to show that it isnt a happy setting. The emphasis on her language describing the setting and atmosphere shows the importance of Chapter Five in the novel. In Chapter Five, one of the key themes linked to society in the 19th century is science. This is because people didnt know much about it and it was new to them. Frankenstein says, Two years for the sole purpose of infusing life into an inanimate body, which links to the industrial period, because he tried to do something that hadnt been done before. Another key theme used in the novel is nature, and that links to science, because Frankenstein is trying to break the boundaries of nature by trying to create life unnaturally. This makes Chapter Five significant because it shows the social and historical influences at the time. In conclusion, studying Chapter Five has given me a better understanding of the 19th Century life, and it has also given me a better understanding of why future events in the novel happen.

Thursday, November 14, 2019

Violence On Television :: essays research papers

Violence on Television   Ã‚  Ã‚  Ã‚  Ã‚  Since its introduction, television has increased in popularity to such an extent that the TV has become the electronic member of the family. The TV can hypnotize us and lure us into worlds of fantasy and adventure as we escape from our worries and cares. It can also inform us and bring us up to date on the latest news. The TV can be a teacher, a friend, and a source of knowledge and information, or it can have a negative effect on our behavior. No matter what effect television has on a person, it is often possible to know someone's lifestyle by observing the way he watches TV.   Ã‚  Ã‚  Ã‚  Ã‚  When the television was first introduced, critics claimed that it would be mind numbing, addictive, and utterly passive. These critics were describing the stereotypical TV watcher, the Addict. As his name implies, this person's life revolves around watching television. TV is like a drug to him, and he cannot get enough of it. He epitomizes the couch potato and the â€Å"boob† in boob tube, and can often be described as intellectually empty, especially while he is watching TV. The Addict lives hand to mouth from the potato chip bag. He is lazy and will often go for hours without moving from the television.   Ã‚  Ã‚  Ã‚  Ã‚  If the Addict is not glued in front of the TV, he is most likely to be found paging through his latest issue of TV guide, carefully selecting the shows which he will watch that week and marking them off with a highlighter. On an average day the Addict will come home from work or school, put off all responsibilities, and escape into the world of TV. In this world, the Addict has no demands or responsibilities. The TV becomes his only focus of attention, and all of his energy goes into staring at the TV. While watching one of his favorite shows, the Addict becomes totally oblivious to the world around him. He will not answer his phone, talk to his family or friends, or do anything else which may distract from his viewing pleasure. He lives to watch TV.   Ã‚  Ã‚  Ã‚  Ã‚  Just as the Addict emerged with the invention of the TV, the Surfer arose with the invention of the remote control. When a Surfer sits down to watch television, he first grabs the remote before anyone else can get to it. He turns on the TV with the remote, and it does not leave his grasp until he is finished watching. He is constantly changing the channels and will pause on a particular show only for a moment.

Tuesday, November 12, 2019

Effects of Broken Family to Students Essay

Family is the basic components of the society. And the parents are the most important source of youth’s behavior, which effect to their outlook in life. A home is where a family lives. It may be alternated to the word ‘house’ but a house is more appropriately referring to the material structure, whereas ‘home’ refers to the intangible things that bind together the family members. The Family is an essential factor for a human’s whole-being, everything about a man, his background, attitude, all of his achievements, his honor and dignity, relies on the structure of the family a man lives in with. A family is composed of a father a mother and their offspring, bonded by their love for each other. Here in the modern age a family could be two things, complete or broken. A broken family is believed to be a cause of a child’s mislead in life, some people give it as the main reason of the rebellious and unclear acts of a person. Meanwhile school is another factor which molds us on becoming a good person. Separation, family problems and misunderstandings from the family are the major causes of single – parent or broken families. see more:having relationship while studying Good relationship of parents to their siblings may build a strong relationship and a strong relationship with their family can develop the behavior of a person. The behavior of a person can also affect by the relationship of their family. A person who comes from broken family will have different behavior on their social well-being. The parents have a special role in the behavior of a person. Here in the Philippines, most of the students come from broken family with a single parent. Many of them feel sad. Sometimes they can’t explain to their self or to others why they feel that way. When they saw a happy family they feel depressed moods seems to arise from within. They depression feels unpleasant, inconvenient, and unacceptable. Some of the VMA Global College students come from broken family as well. This research helps the reader to understand the role of good relationship of parents on the behavior of a student. Broken Family can affect the behavior of a student. But the students who come from broken family have different behavior and different principle in life. It also show us the different ways of the respondents on how they overcome their situation.

Saturday, November 9, 2019

My Childhood Memory: An Accident That I Can Never Forget Essay

When I was aged 3 in 2002 I had an accident at home that I would never forgot. I use to live in Helmsley, North Yorkshire and attended a nursery school called Montessori Nursery in a town/village called Wombleton. It was a Thursday I had been at nursery, I was very hyper and pumped up bristling with energy, my mum had come to collect me to take me home which I didn’t want to do although I had no choice, while my mum was making lunch I was watching my favourite programme on the TV which at the time was â€Å"Thomas the Tank Engine†. Once I had lunch mum started to clear up and afterwards started to disassemble me and Neil’s (my brother) bunk beds, I decided to be a bit more adventurous, I had seen a small old wooden step ladder (It was designed for the bunk beds), I decided to use it, I took the ladder down the stairs without my mum knowing, took it into the front room and proceeded to rest it against the TV unit and climb up it. I thought that this would be fun and exciting at the time, I climbed the ladder holding onto to the top of the television as I got to the top where I grabbed hold of the handles at the back, I lost my balance and I kind of knew what would happen but I didn’t have enough time to react as I was very small back then, I fell backwards still holding onto the television, I landed on the floor with a thud and a cracking noise came from the tv , the television landed on my right leg and the screen was smashed to pieces, I felt a throbbing pain in it. I screamed in pain and the whole neighbourhood could hear it, tears rushed down my face while I could hear my mum come rushing down the stairs, my mum came running into the room and was shaken to the core to find me on the floor crying with a tv on my leg, I was in agonising pain, she lifted the TV off me and then comforted me until I let her see my leg, I could not walk without being in a whole load of pain and falling over, so my mum had to carry me to the setae where should could examine my leg further before making a decision. Mum contacted the local doctor to make an emergency appointment as the hospital was over 30 miles away in Northallerton, the place that I was born in, same hospital, the doctor said they could not x-ray because they didn’t have the right equipment for the job at hand and therefore he suggested that mum take me to the hospital. My mum looks a little bit cross when the doctor said that as she didn’t want to drive that far, but she did anyway. We had to collect my brother from school as my Dad was away on business, (which was unfortunate at the time), and then drove to the hospital, we arrived at accident and emergency and were the only people there but had to wait for nearly two hours to be seen which is really stupid now that I think about it, there was no one there but we had to wait 2 hours, during those hours I fell asleep and that kind of helped ease the pain cause it made me forget about the fact a tv landed on my foot, I couldn’t walk on the leg as it would probably have made it worse and also because it would mean I would be in excruciating pain. Eventually I was taken to have an x-ray(at long last) and had to wait for the results, when they came back my mum was told that it was not broken but badly bruised my mum was relieved to hear it , they tried to put an elastic sock on my leg but I would not wear it. I didn’t feel comfortable with one being put me. It just wouldn’t feel right because I was very stubborn at the time and I had never worn one so I didn’t want to wear one, I would now if the same thing happened again to me but that’s not that likely. My poor mum had to carry me about for about a week or so until my leg recovered from the accident, the only down side of this was that the TV screen was smashed when it fell on my leg and had to be repaired so me and my brother Neil couldn’t watch our favourite shows for a few weeks which was a huge pain. No â€Å"Thomas the Tank Engine† for me.

Thursday, November 7, 2019

Essay on Agenda 3

Essay on Agenda 3 Essay on Agenda 3 Fire Evacuation Meeting December 23, 2019 0900hrs – 1130hrs Padre White Lounge Meeting called by: Positive Outlook Company Type of meeting: Planning Planning Facilitator: Tom Jones Note taker: Sally Fairfield Sally Field Timekeeper: Sally Field Attendees: Tom Jones, Fred Nerks, Sally Field, Peter Rabbit, Karen Goat, Peter Hazard Apologies: Nil Minutes of last meeting Sally Field Minutes Agenda item: O901hrs 1. Proposed Planned Evacuation Routine, Companies fire/ evacuation policies. Presenter: Tom Jones Discussion: Welcome by Tom Jones explanation of meeting purpose given Request for all phones to be turned off. Companies fire evacuation procedure need to comply with the companies fire safety policies and government by-laws. Building Plan shown Action items Person responsible Deadline Nil action required Agenda item: 0938hrs Role of Fire Brigade in the event of fire or evacuation of building and requirements of this department Presenter: Fred Nerks Discussion: Fire chief would take command on delegating tasks in the event of fire. Fire Brigade free uncluttered access to all parts of building at all times Have access to building plans displaying location of exit doors fire extinguishers etc .A plan of building to be placed clearly in foyer showing locations of fire equipment, exits and evacuation assembly point. Action items Person responsible Deadline Plan of building charting the above needs Tom Jones 20th Jan Agenda item: 1000hrs Fire wardens role in event of fire, evacuation Presenter: Karen Goat Discussion: Fire Warden will delegate duties and direct staff to appropriate areas in the event of fire. Fire warden will do roll call to identify if any person is missing. Was determined more Fire wardens needed Karen voiced concern she was unsure of fire wardens role compared to the fire chief Fire wardens role explained by Fred Nerks (fire brigade chief) Participants agreed a role description should be prepared and issued Action items Person responsible Deadline Fire wardens selected Karen Goat 10th Jan Fire Wardens role description Fred Nerks 10th Jan Agenda item: 1022hrs Hazards and risks Presenter: Peter Rabbit Discussion: Hazards that could cause problems in the event of a evacuation. Exit doors need to be cleared. Flammable liquids need to be stored in correct manner. Determined that wheelchair access is poor in case of evacuation alterations need to be made. Ramps instead of steps suggested and agreed on by participants. A full hazard/risk evaluation to be completed and addressed at next meeting. Action items Person responsible Deadline Full Hazard/Risk evaluation of premises inner and outer Peter

Tuesday, November 5, 2019

US Neutrality Acts of the 1930s and the Lend-Lease Act

US Neutrality Acts of the 1930s and the Lend-Lease Act The Neutrality Acts were a series of laws enacted by the United States government between 1935 and 1939 that were intended to prevent the United States from becoming involved in foreign wars. They more-or-less succeeded until the imminent threat of World War II spurred passage of the 1941 Lend-Lease Act (H.R. 1776), which repealed several key provisions of the Neutrality Acts. Key Takeaways: Neutrality Acts and Lend-Lease The Neutrality Acts, enacted between 1935 and 1939, were intended to prevent the United States from becoming involved in foreign wars.In 1941, the threat of World War II drove passage of the Lend-Lease Act repealing key provisions of the Neutrality Acts.Championed by President Franklin D. Roosevelt, the Lend-Lease Act authorized the transfer of U.S. arms or other war materials to Britain, France, China, the Soviet Union, and other nations threatened by the Axis powers without the requirement of monetary repayment. Isolationism Spurred the Neutrality Acts Although many Americans had supported President Woodrow Wilson’s 1917 demand that Congress help create a world â€Å"made safe for democracy† by declaring war on Germany in World War I, the Great Depression of the 1930s spurred a period of American isolationism that would persist until the nation entered World War II in 1942. Many people continued to believe that World War I had involved mainly foreign issues and that America’s entry into the bloodiest conflict in human history had mainly benefited U.S. bankers and arms dealers. These beliefs, combined with the people’s ongoing struggle to recover from the Great Depression, fueled an isolationist movement that opposed the nation’s involvement future foreign wars and financial involvement with the countries fighting in them. The Neutrality Act of 1935 By the mid-1930s, with war in Europe and Asia imminent, the U.S. Congress took action to ensure U.S. neutrality in foreign conflicts. On August 31, 1935, Congress passed the first Neutrality Act. The primary provisions of the law banned the export of â€Å"arms, ammunition, and implements of war† from the United States to any foreign nations at war and required U.S. arms makers to apply for export licenses. â€Å"Whoever, in violation of any of the provisions of this section, shall export, or attempt to export, or cause to be exported, arms, ammunition, or implements of war from the United States, or any of its possessions, shall be fined not more than $10,000 or imprisoned not more than five years, or both †¦,† stated the law. The law also specified that all arms and war materials found being transported from the U.S. to any foreign nations at war, along with the â€Å"vessel, or vehicle† carrying them would be confiscated. In addition, the law placed American citizens on notice that if they attempted to travel to any foreign nation in a war zone, they did so at their own risk and should not expect any protection or intervention on their behalf from the U.S. government. On February 29, 1936, Congress amended the Neutrality Act of 1935 to prohibit individual Americans or financial institutions from loaning money to foreign nations involved in wars. While President Franklin D. Roosevelt initially opposed and considered vetoing the Neutrality Act of 1935, he signed it in the face of strong public opinion and congressional support for it.   The Neutrality Act of 1937 In 1936, the Spanish Civil War and the growing threat of fascism in Germany and Italy boosted support for further expanding the scope of the Neutrality Act. On May 1, 1937, Congress passed a joint resolution known as the Neutrality Act of 1937, which amended and made the Neutrality Act of 1935 permanent. Under the 1937 Act, U.S. Citizens were barred from traveling on any ship registered to or owned by any foreign nation involved in ​a  war. In addition, American merchant ships were forbidden from carrying arms to such â€Å"belligerent† nations, even if those arms were made outside of the United States.  The president was given the authority to ban all ships of any sort belonging to nations at war from sailing in U.S. waters. The Act also extended its prohibitions to apply to nations involved in civil wars, like the Spanish Civil War. In one concession to President Roosevelt, who had opposed the first Neutrality Act, the 1937 Neutrality Act gave the president the authority to allow nations at war to acquire materials not considered â€Å"implements of war,† such as oil and food, from the United States, provided the material was immediately paid for – in cash – and that the material was carried only on foreign ships. The so-called â€Å"cash-and-carry† provision had been promoted by Roosevelt as a way to Help Great Britain and France in their looming war against the Axis Powers. Roosevelt reasoned that only Britain and France had enough cash and cargo ships to take advantage of the â€Å"cash-and-carry† plan. Unlike other provisions of the Act, which were permanent, Congress specified that that â€Å"cash-and-carry† provision would expire in two years. The Neutrality Act of 1939 After Germany occupied Czechoslovakia in March of 1939, President Roosevelt asked Congress to renew the â€Å"cash-and-carry† provision and expand it to include arms and other materials of war. In a stinging rebuke, Congress refused to do either. As the war in Europe expanded and the Axis nations’ sphere of control spread, Roosevelt persisted, citing the Axis threat to the freedom of America’s European allies. At last, and only after lengthy debate, Congress relented and in November of 1939, enacted a final Neutrality Act, which repealed the embargo against the sale of arms and placed all trade with nations at war under the terms of â€Å"cash-and-carry.† However, the prohibition of U.S. monetary loans to belligerent nations remained in effect and U.S. ships were still prohibited from delivering goods of any kind to countries at war. The Lend-Lease Act of 1941 By late 1940, it had become unavoidably apparent to Congress that the growth of the Axis powers in Europe could eventually threaten the lives and freedom of Americans. In an effort to help the nations fighting the Axis, Congress enacted the Lend-Lease Act (H.R. 1776) in March 1941. The Lend-Lease Act authorized the President of the United States to transfer arms or other defense-related materials – subject to ​the  approval of funding by Congress – to the â€Å"government of any country whose defense the President deems vital to the defense of the United States† at no cost to those countries. Permitting the president to send arms and war materials to Britain, France, China, the Soviet Union, and other threatened nations without payment, the Lend-Lease plan allowed the United States to support the war effort against the Axis without becoming engaged in battle. Viewing the plan as drawing America closer to war, Lend-Lease was opposed by influential isolationists, including Republican Senator Robert Taft. In debate before the Senate, Taft stated that the Act would â€Å"give the president power to carry on a kind of undeclared war all over the world, in which America would do everything except actually put soldiers in the front-line trenches where the fighting is.† Among the public, opposition to Lend-Lease was led by the America First Committee. With a membership of over 800,000, including national hero Charles A. Lindbergh, America First challenged Roosevelt’s every move. Roosevelt took complete control of the program, quietly sending Sec. of Commerce Harry Hopkins, Sec. of State Edward Stettinius Jr., and diplomat W. Averell Harriman on frequent special missions to London and Moscow to coordinate Lend-Lease overseas. Still acutely aware of public sentiment for neutrality, Roosevelt saw to it that details of Lend-Lease expenditures were hidden away in the overall military budget and not allowed to become public until after the war. It is now known that a total of $50.1 billion- about $681 billion today- or about 11% of the total U.S. war expenditures went to Lend-Lease. On a country-by-country basis, U.S. expenditures broke down as follows: British Empire: $31.4 billion (about $427 billion today)Soviet Union: $11.3 billion (about $154 billion today)France: $3.2 billion (about $43.5 billion today)China: $1.6 billion (about to $21.7 billion today) By October 1941, the overall success of the Lend-Lease plan in assisting the allied nations prompted President Roosevelt to seek the repeal of other sections of the Neutrality Act of 1939. On October 17, 1941, the House of Representatives overwhelmingly voted to repeal the section of the Act prohibiting the arming of U.S. merchant ships. A month later, following a series of deadly German submarine attacks on U.S. Navy and merchant ships in international waters, Congress repealed the provision that had barred U.S. ships from delivering arms to belligerent seaports or â€Å"combat zones.† In retrospect, the Neutrality Acts of the 1930s allowed the U.S. Government to accommodate the isolationist sentiment held by a majority of the American people while still protecting America’s security and interests in a foreign war. The Lend-Lease agreements provided that the countries involved would repay the United States not with money or returned goods, but with â€Å"joint action directed towards the creation of a liberalized international economic order in the postwar world.† Meaning the U.S. would be repaid when the recipient country helped the U.S. fight common enemies and agreed to join new world trade and diplomatic agencies, such as the United Nations. Of course, the isolationists’ hopes of America maintaining any pretense of neutrality in World War II ended on the morning of December 7, 1942, when the Japanese Navy attacked the U.S. naval base at Pearl Harbor, Hawaii.

Sunday, November 3, 2019

Human Computer Interaction Essay Example | Topics and Well Written Essays - 1500 words

Human Computer Interaction - Essay Example This research is mainly aimed at designing and developing an attractive system. In this report I will provide a detailed analysis of the CDROM Encyclopaedia development and renovation. There are several CDROM Encyclopaedia areas available and offering a better and effective knowledge on different fields. The intended system is aimed at offering a detailed knowledge on the specific field. Its enhanced development and designing will promote and make it popular among the people. Encyclopaedia is a special type of computer system that needs to be designed with a greater care. These systems are designed to help the people for taking detailed and in-depth information about a particular field. This report will offer detailed and comprehensive overview of the main areas regarding the system design and analysis. The main goal of this report is to suggest a system that fulfils all the necessary needs and requirements of the better system regarding its operations and working.

Thursday, October 31, 2019

Economics Issues Coursework Example | Topics and Well Written Essays - 500 words

Economics Issues - Coursework Example Consumers play a key role in perpetuating discrimination in the labor market through their choices and consumption patterns. If consumers prefer one commodity over another, they will lower demand in that labor market in which they do not prefer their goods.  Consumers play a key role in perpetuating discrimination in the labor market through their choices and consumption patterns. If consumers prefer one commodity over another, they will lower demand in that labor market in which they do not prefer their goods.  The law of diminishing marginal utility states that as consumption of a given commodity is increased by an individual while keeping the consumption of other products constant, there will be a decline in the marginal utility of the individual that is derived from the consumption of each and every additional unit of the product. The law of diminishing marginal utility does not contract the notion that individuals always want more of all goods because they are limited by the ir budget constraint hence they cannot acquire all that they want at any given instance.  Properties of indifference curves(a) NonintersectionIndifference curves cannot intersect each other because, at the point of tangency, the curve on the higher side will yield much more of the two commodities as compared to the lower curve hence they can never intersect.  (b) Convexity to the origin(c) The higher the indifference curve, the higher the level of satisfaction. The consumers will prefer to choose higher indifference curves since they aim at maximizing their utility.  (d) Negatively sloping. The indifference curves are negatively sloping because the consumer must give up the consumption of one commodity in order to consume more of the other commodity.  

Tuesday, October 29, 2019

Human resources strategic Essay Example | Topics and Well Written Essays - 3000 words

Human resources strategic - Essay Example The organizational managers and leaders have now understood that to be successful in this hypercompetitive market, job performance and efforts of the employees are important. Whether it is for making profit or not, but the managers have to continuously look for innovative ideas for facilitating the employees to work more efficiently and effectively (Morris, Heames & McMillan, 2011, pp. 265-266). Modern Human Resource Management has now moved out of personnel management and more into strategic management, embracing the management of change, socialization, job design and appraisal. The modern HRM is trying to find integration between organizational strategy, employee commitment, flexibility and quality. Effective HRM is an approach of employee management through deployment of capable and committed workforce using an array of â€Å"personnel, structural and cultural techniques† (Smith & Smith, 2007, pp. 263-264). Thus Strategic Human Resource Development enables an organization t o analyze the technological, economic and social changes and adopting strategic steps to respond to these changes more effectively. In this study the focus will be on trends that lead to SHRM, the connection between strategic management and human resource management. The study also throws light on the connection between Strategic HRM and various issues related to the business process. Relevant examples help in better understandability of the issues. These four factors are giving rise to various challenges and issues in Human Resource Management. The HRD professional continuously monitors these changes and adjusts themselves to these changes so that the organization gets adapted to the change. Adapting to the new requirement leads to the greater efficiency, effectiveness and harmony in the organization. HRM is considered as a part of strategic management, which formulates a mission, a business strategy and a corporate objective for the organization (Peery & Salem, 1993, p. 82). The manager

Sunday, October 27, 2019

Types of Threats and Prevention in Networking

Types of Threats and Prevention in Networking TASK 4 TASK4 (1) Major types of threats There are heap of threat in the networking or which can be the internal and external. Here I will explain both these threats below; Internal Threat: USB devices: The biggest reason of internal threat is USB devices; according to one of the survey over 35% organizations believe that these devices were actually used for stealing or compromising the important information. Missing of security agent: Each organization has to install some agents on their endpoints. The work of these agents is to monitor the network traffic and various other things. If these agents are out of date then our data is not secure. (cook, 2007) External threat: Peer to peer sharing: These programs are also responsible for stealing the data to the network. Similarly with the peer to peer program, we can connect one device to another device and can check whole the data of another computer Device on the loose: One of the other reasons might be the when we lose our thing. If all the information is in that device so anybody who found the device can stole the data easily. Malware: This may also be the reason of external threat. As we probably know that malware comes from internet from some bad sites, therefore if malware enter in our device, then in some way they access or device. TASK 4 (B) Network security attacks Network security attack: These are few codes that can damage our codes as well steal the data as well. Some of the network threat is characterized below:- DoS: Its also known as denial of service assault. Basically form the name it is clear that it assault our system. Teardrop attack, Exploit limitations in the TCP/IP protocols are few of the DoS attacks. We can utilize programming to dispose of these DoS. DDos: Distributed Denial of Service attack is an attempt to make the service unavailable by huge with traffic. It overwhelming it from so many sources. It always targets the essential resources from various important sites. Unauthorized access: Unauthorized access means it access the network or without any permission. That unauthorized person can steal or delete the data. In addition to that he can also misuse the information. Thats why we have to increase the security. Data theft and loss: Data theft is basic process of stealing the data. The stealing can be from the system or from the server where it is stored. To happening this we have to increase the security. Physical attack: Physical attack is in any physical form where the information can be damage. For instance, any natural climates such as earthquake, flood or anything else. In addition to this it also cover any physical harm cause by the mankind like whether the server is destroyed or something else. TASK 5 TASK 5- Network threat mitigation techniques Firewall: Firewall is a network security system. It acts as a barrier between networks. It stops the virus to enter in our device. So we can say that its a better way to secure our data. It only gives access to authorized sites. The standard specification of a firewall is listed below:- Anti-spam Anti-virus Anti-spoofing Anti-phishing Anti-spyware Denial of service protection The other categories is end user control feature User based filtering Individual spam scoring Personal allow and block list Simplified and centralized administration Multilingual user interface Barracuda energizes update Logs and graphic report No per user charges Multiple domain (Barracuda Spam Virus Firewall) IDPS (Intrusion detection and prevention): It main work is to analyze the traffic for suspicious type of activities. Whenever there is something unexpected it gives sign to the network administrator which can move to end The standard specification of IDP is listed below:- Frequency Required 50/60 Hz INTERFACE PROVIDED Type Network host Interface Ethernet 10Base-T/100Base-TX/1000Base-T Connector Type RJ-45 NETWORKING Features Diff Server support, DoS attack prevention, High Availability, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Quality of Service (QoS), built-in hardware bypass Data Link Protocol Ethernet, Fast Ethernet, Gigabit Ethernet Performance Throughput: 300 Mbps RAM Installed Size (Juniper Networks IDP 250 security appliance) Anti-virus: Anti-virus is the program which detect the virus and delete it. We can remove malware, including worms, spyware and adware with the help of anti-virus. The standard specification of Anti-virus is listed below:- Stop unknown threats with artificial intelligence Layered protection with next generation technologies Symantecs global intelligence Reduce bandwidth usage Patented real time cloud Access control: This is the method which we utilize to manage the access of the user. Due to this we can create limit for the user, which is very helpful for the networking. There are two types of access control physical and logical. Standard specification The standard access controls the physical and the logical security as well. Simple to manage. Provide the best security. Physical security: Physical security is the outside security which may help to keep the networking from the outside resources. It covers some of area, and very useful. Standard specification Strong walls Strong locks CCTVs Security guard Strong password: Strong password protects our information from stealing. It can also protect our data from the hackers. A strong password contain varieties of thing like pattern, retina scan many of the things. Standard specification Pattern lock Retina scan Voice scanner Finger scanner TASK 6 TASK 6- SCENARIO In the above scenario there is discussion about the principle of information security between two companies AA and YY who are partner in the nuclear project. Before claiming anything fist we have to study the basic principle of the information. Confidentially: It basically refers to the privacy. It is design to check or save the essential data from some of the participant and other persons. Sometime in the big organizations if the data is very essential, then they provide the training to the person to make the information of confidentially stronger. More things which they add to make it more safe is to set the password. Because it will give the better security to the information. So basically if two or more organizations are working on the same project, then a one company cannot indicates the information without the agreement of the other companies. Availability: Availability is called to give every significant thing which is needed for the project. For instance, if they need any other help then its duty to provide them these help. Like if two organizations are working on the similar project and one of the companies has availability of data which second company needed then it is responsible of the company to give that data to his partner, so they can complete their task easily. Integrity: Integrity is known as to provide the correct data, if it is coming from one person to another. To make it better we can use the encryption so data may not be lost TASK 7 TASK 7- Role of cryptography in securing communication Cryptography is the term which we use to secure the data. It changes the message into an unreadable format and this message called the cipher text. Just the person who has the access to decrypt that message will able to read and understand the message. Sometime code breaking should be possible by some of the peoples. Nowadays, as all the major discussion occurs on the internet so the security of the internet communication is very important. For this reason the cryptography is used. It protects few things like credit card details and e-mails. It gives end to end encryption so if we are sending message over the internet to some person we can send it safely. TASK 8 Task 8-Major types of cryptography There are three major cryptography schemes which are explained below:- Symmetric cryptography: A symmetric cryptography is that where both sender and user utilize the similar key for the encrypting and decrypting the message. It is the quicker cryptography as compare to another one, but each party have to swap the keys for decoding the message. Asymmetric cryptography: Its called the public key cryptography. It utilizes two different keys to encrypt and decrypt the message which is known as public and private keys. Hash function: It takes the set of the keys and maps to the value of certain length. It shows the original sequence of the character, while if it is smaller than the original. Whereas, we can say that it take message as the input and provide a fix size string in the return. This string also called hash value, message digest, digital fingerprint. References Barracuda Spam Virus Firewall. (n.d.). Retrieved from firewallshop.com: http://www.firewallshop.com/barracuda/spam-firewall.aspx Cook, R. (2007, june 19). Securing the Endpoints: The 10 Most Common Internal Security Threats. Retrieved from CIO: http://www.cio.com/article/2438695/infrastructure/securing-the-endpointsthe-10-most-common-internal-security-threats.html gameboyrom. (2007, july 24). What is a LAN modem? Retrieved from DSL reports: http://www.dslreports.com/faq/1669 How to connect the word. (n.d.). Retrieved from whatlsmyIPaddress.com: http://whatismyipaddress.com/nat Juniper Networks IDP 250 security appliance. (n.d.). Retrieved from C|NET: https://www.cnet.com/products/juniper-networks-idp-250-security-appliance/specs/

Friday, October 25, 2019

Egyptian And Mexican Pyramids Essay -- essays research papers fc

Mysteries of the Ancient World   Ã‚  Ã‚  Ã‚  Ã‚  For many centuries people have been fascinated by ancient cultures and treasures. During the last two centuries the science of archeology and modern inventions allowed people to get inside of the Egyptian and Mayan pyramids and discover the treasures of Egyptian pharaohs and Mayan rulers. Most of what we know about Egypt we owe to the pyramids. Thanks to Egyptian belief in the afterlife we can now find out about the civilization that existed nearly five thousand years ago. Egyptian culture is not the only culture that left us its heritage in pyramids. In America we find pyramids build by civilizations of Olmec and Maya about 7th century CE. These pyramids had different purposes and usage then the ones in Egypt but they stand as memorials to ancient civilizations as well.   Ã‚  Ã‚  Ã‚  Ã‚  Egyptian people believed in life after death. One of the way pharaohs prepared themselves for the afterlife journey was by building a pyramid and putting there all their belongings and riches. Egyptian people believed that pharaoh is the closest person to the God and treated him accordingly. That is the reason for Egyptian tombs being full with the golden jewelry, precious stones and art objects. Most of the time art objects were not considered a treasury but they played their particular role in religious rituals. Jars were holding food and drinks for pharaoh’s journey, so he would not get hungry and would have food and drinks to offer to the Gods. The figurative sculptures were suppose to accompany Ka ( spiritual entity) in its lonely stay or serve as a twin for the mummy. If something happens to the mummy the ka could use the sculpture of the pharaoh for the revelation. As well as for Egyptians religion was an everyday concern for many of the Maya, whether the dynastic ruler, the zealous priest, or the humble believer. Maya has an extensive religion structure which we can not know in details. Chac and Itzamna are the most famous gods of Mayan culture. Hunahpu and Xbalanque are among the most interesting mythical characters. One of the most crucial gods was Tlaloc, who was worshiped in various guises by the culture of Teotihuacan, the Toltec of Tula, and later Aztecs. The Maya received the cult of Tlaloc during the 4th century more or less. The Cauac Monster, also known as the Witz monster, is a... ...ties of the ancient Maya†. Mystery of Maya. CMCC. May 1999. http://www.civilization.ca/membrs/civiliz/maya/mmc01eng.html â€Å"Herodotus Reports on Mummification.† May 1999. http://pluto.clinch.edu/history/wciv1/civ1ref/mummy.html â€Å"Life in Ancient Egypt. Shabtis.† Ed. Craig Patch. Exc. from Reflections of Greatness: Ancient Egypt at the Carnegie Museum of Natural History. 1990. http://www.yahoo.com/egypt/ â€Å"Maya Civilization.† Mystery of Maya. CMCC. May 1999. http://www.civilization.ca/membrs/civiliz/maya/mmc01eng.html Newby, P.H. The Egypt story, its art, its monuments, its people, its history. Italy: Abbreville Press: 1979. Payne, Elizabeth. The pharaohs of Ancient Egypt. New York: Random House, Inc. 1984. â€Å"Photographs of Maya ruins of Tikal showing how Hasselblad cameras and Zeiss lenses result in better pictures†. Maya Art & books. International Photographic Archive of Maya Art. June 1998. http://www.maya-art-books.org/html/New_photos.html â€Å"The First Egyptian Mummies†. Corkankhamun explains mummification. May 1999. http://members.aol.com/mumifyddog/first.html â€Å"Why Egyptians Made Mummies†. Corkankhamun explains mummification. May 1999. http://members.aol.com/mumifyddog/first.html

Thursday, October 24, 2019

The play ‘The Birthday Party’ Analysis

The play ‘The Birthday Party' is about an everyday, domestic lifestyle/ characters with mixed emotions. The whole play is based on a boarding house with one guest, Stanley. It starts off with the owners, Meg and Petey, leading a normal day with Stanley. Two men come to look at the house to stay and Stanley gets nervous. The two men, McCann and Goldberg hold Stanley's birthday party and make it a living hell! Throughout the play McCann shows signs of confusion and innocence at the task-in-hand. However this is not always the case, for example McCann, later on in the play, attempts to strike Stanley with a chair. When McCann and Goldberg arrive at the boarding house in Act 1, McCann states, ‘what are we doing here Nat?' this gives off signals that McCann is there as Goldberg's aid and not a leading figure. As the play goes on, the audience may start to feel sorry for Stanley due to unfortunate circumstances and more hatred and dislike towards Goldberg and McCann for making him feel so negative. McCann: He killed his wife! Goldberg: Why did you kill your wife? Stanley: What wife? (Back turned, facing the audience) The above quote shows how McCann and Goldberg continue to bully Stanley. Pinter uses the language in the above quote as if McCann and Goldberg were ‘pressing' Stanley for information and as if Stanley found it hard to lie whilst looking at them so he turned his back. The prospect of McCann being more innocent may counter the dislike and tempt the audience to feel sorry for McCann as he gets dragged deeper and deeper into the unknown. Pinter does this to, yet again, represents the plays psychotic nature and obscure mentality. Read also Analysis of Characters in Flannery O’Connor’s â€Å"The Life You Save May Be Your Own† At the beginning of act two McCann is said to be sitting at a table tearing newspapers into 5 equal strips. This may make the audience uncomfortable as it is a rather curious thing to do and may make the audience paranoid as to why he is doing this and what he is thinking as it never tells you this in the play. Stanley picks up a strip of paper McCann moves in McCann: Mind that. McCann clearly has a motive for tearing the paper or he wouldn't mind it being touched. It is a fine example of the plays paranormal mentality. Also Pinter wrote McCann's line like this to make the audience uncomfortable as it is a rather subtle, commanding statement. During Stanley's birthday party in act 2, McCann offers to take Stanley's glasses for him during a game of blind mans buff Stanley stand blindfold. McCann backs slowly across the stage to the left. He breaks Stanley's glasses, snapping the frames. McCann picks up the drum and places it in Stanley's path Stanley walks over and puts his foot through it. Here McCann proves to be quite a bully and may convince the audience to feel disgust towards him, due to the audiences feeling towards the main character, Stanley, countering the possible sorrow from earlier on in the play. Pinter may do this to make sure that the audience can never set on a real feeling for McCann which may add to the ‘fog' of confusion surrounding the play. As a conclusion I think that McCann is a character the brings emotion and excitement and you can never really settle on a feeling for him

Wednesday, October 23, 2019

College: An Opportunity to Succeed in Life Essay

College, to some people, may be a waste of time, but to me college is an opportunity to succeed in life. I spent all those years in elementary school, middle school, and high school, than why not take a few more helpful years and not be a waste! If I don’t spend time to make my life better, than how will I succeed in life? I’ll tell you how. I won’t! Although the dictionary says that college is some school we go to or education to get a job or occupation. It’s much, much, more! It’s one of the best opportunities anyone will ever get, and if you go there you can insure your future will be the best roller coaster ride you’ve ever ridden in a theme park. College isn’t just a simple building people go to. It’s my future. It determines what my life is going to be. If I succeed or if I won’t. College is really important to me because it’s one step closer to my dreams and is a door opening to many opportunities. In my family, no one has received a full education. My mother finished high school and got married. My father lost interest in education after 7th grade and then never went back to school. My grandparents hardly studied because their parents weren’t rich enough to pay their school fees. As a child I had many dreams and wants which my parents couldn’t fulfill because they weren’t rich enough or they didn’t have time because they were too busy saving up every penny they earned. No one in my family has been as far as college. So, for me college is one of my dreams come true. The most important dreams of my life is to be a successful person in my life and make my parents proud for which I need a good education and college is one of my most important levels of education. College is just a staircase closer to my dreams after which I will be very close to the top. All the way from elementary school till high school a student is told what to do, what to study and how to do everything but, college is different. It’s the first time you have to stand on your very own two feet and do something. It’s is a place with many opportunities. A place where you get to know where you stand and what you have to do to get to the top. In college, you could decide what you want to do in life and where you want to go. College is a door to opportunity when it teaches people new skills, makes them more productive and gives them a greater understanding of the world around them. College opens doors to opportunity and expands your horizon. For me, college will be a place I can truly prove my abilities and talents to the world. College is really important to me and I think it’s important to all those people who are serious about life and who know how to accept an opportunity and make the best out of it. For most people college is their alma mater, the place that makes you a good and capable person. I personally think college is going to be one of the best experiences for me. An experience I’ll really like. A place I’ll always love to be at. College for me I think is going to be a home with a unique family and unforgettable memories.

Tuesday, October 22, 2019

The Hobbit - Bilbo Baggins essays

The Hobbit - Bilbo Baggins essays Then something Tookish woke up inside him, and he wished to go and see the great mountains, and hear the pine-trees and the waterfalls, and explore the caves, and wear a sword instead of a walking-stick. In the book, The Hobbit, the cautious Bilbo Baggins slowly develops his abilities, both physical and mental. A hobbit is a dwarf-like person, yet quite the opposite. They are proper mannered and have a very simple and tedious life. But a hobbit, Bilbo Baggins, was about to change the reputations of the hobbits. Bilbo, along with Gandalf and thirteen dwarves were on a quest to reclaim their stolen riches from an evil dragon. But Bilbo was not strong and had never seen the outside world. Bilbo starts to use his strength, courage, and wisdom to pursue the closing of his Bilbo used his strength to help himself and his company. As Bilbo goes with Gandalf and the dwarves everything changes for him. He is on an all-day traveling schedule and he could barely eat a proper meal. He was not used to this, any other hobbit would have given up by now, but not Bilbo. He was determined to finish his quest along with the others. Bilbo had to use his brute strength to climb up trees in the thick woods. Since Bilbo was the lightest he was the only one able to. His job was to see were the forest ended. He pushed his way through the tangled twigs with many a slap in the eye; he was greened and grimed from the old bark of the greater boughs; more than once he slipped and caught himself just in time. He was tired and lightly hurt, but he was in stable condition. His brute strength did help him in his quest. In some situations, Bilbo showed admirable courage. Once, Bilbo was in the caves and was separated from his group. He later woke up after being unconscious and although it was pitch black, he kept calm and managed to get to the closure of the cave. As he went ...

Monday, October 21, 2019

Iraq Government, Facts, and History

Iraq Government, Facts, and History The modern nation of Iraq is built upon foundations that go back to some of humanitys earliest complex cultures. It was in Iraq, also known as Mesopotamia, that Babylonian king Hammurabi regularized the law in the Code of Hammurabi, c. 1772 BCE. Under Hammurabis system, society would inflict upon a criminal the same harm that the criminal had inflicted upon his victim. This is codified in the famous dictum, An eye for an eye, a tooth for a tooth. More recent Iraqi history, however, tends to support the Mahatma Gandhis take on this rule. He is supposed to have said that An eye for an eye makes the whole world blind. Capital and Major Cities Capital: Baghdad, population 9,500,000 (2008 estimate) Major cities: Mosul, 3,000,000 Basra, 2,300,000 Arbil, 1,294,000 Kirkuk, 1,200,000 Government of Iraq The Republic of Iraq is a parliamentary democracy. The head of state is the president, currently Jalal Talabani, while the head of government is Prime Minister Nuri al-Maliki. The unicameral parliament is called the Council of Representatives; its 325 members serve four-year terms. Eight of those seats are specifically reserved for ethnic or religious minorities. Iraqs judiciary system consists of the Higher Judicial Council, the Federal Supreme Court, the Federal Court of Cassation, and lower courts. (Cassation literally means to quash - it is another term for appeals, evidently taken from the French legal system.) Population Iraq has a total population of about 30.4 million. The population growth rate is an estimated 2.4%. About 66% of Iraqis live in urban areas. Some 75-80% of Iraqis are Arabs. Another 15-20% are Kurds, by far the largest ethnic minority; they live primarily in northern Iraq. The remaining roughly 5% of the population is made up of Turkomen, Assyrians, Armenians, Chaldeans and other ethnic groups. Languages Both Arabic and Kurdish are official languages of Iraq. Kurdish is an Indo-European language related to Iranian languages. Minority languages in Iraq include Turkoman, which is a Turkic language; Assyrian, a Neo-Aramaic language of the Semitic language family; and Armenian, an Indo-European language with possible Greek roots. Thus, although the total number of languages spoken in Iraq is not high, the linguistic variety is great. Religion Iraq is an overwhelmingly Muslim country, with an estimated 97% of the population following Islam. Perhaps, unfortunately, it is also among the most evenly divided countries on Earth in terms of Sunni and Shia populations; 60 to 65% of Iraqis are Shia, while 32 to 37% are Sunni. Under Saddam Hussein, the Sunni minority controlled the government, often persecuting Shias. Since the new constitution was implemented in 2005, Iraq is supposed to be a democratic country, but the Shia/Sunni split is a source of much tension as the nation sorts out a new form of government. Iraq also has a small Christian community, around 3% of the population. During the nearly decade-long war following the US-led invasion in 2003, many Christians fled Iraq for Lebanon, Syria, Jordan, or western countries. Geography Iraq is a desert country, but it is watered by two major rivers - the Tigris and the Euphrates. Only 12% of Iraqs land is arable. It controls a 58 km (36 miles) coast on the Persian Gulf, where the two rivers empty into the Indian Ocean. Iraq is bordered by Iran to the east, Turkey and Syria to the north, Jordan and Saudi Arabia to the west, and Kuwait to the southeast. Its highest point is Cheekah Dar, a mountain in the north of the country, at 3,611 m (11,847 feet). Its lowest point is sea level. Climate As a subtropical desert, Iraq experiences extreme seasonal variation in temperature. In parts of the country, July and August temperatures average over 48 °C (118 °F). During the rainy winter months of December through March, however, temperatures drop below freezing not infrequently. Some years, heavy mountain snow in the north produces dangerous flooding on the rivers. The lowest temperature recorded in Iraq was -14 °C (7 °F). The highest temperature was 54 °C (129 °F). Another key feature of Iraqs climate is the sharqi, a southerly wind that blows from April through early June, and again in October and November. It gusts up to 80 kilometers per hour (50 mph), causing sandstorms that can be seen from space. Economy The economy of Iraq is all about oil; black gold provides more than 90% of government revenue  and accounts for 80% of the countrys foreign exchange income. As of 2011, Iraq was producing 1.9 million barrels per day of oil, while consuming 700,000 barrels per day domestically. (Even as it exports almost 2 million barrels per day, Iraq also imports 230,000 barrels per day.) Since the start of the US-led War in Iraq in 2003, foreign aid has become a major component of Iraqs economy, as well. The US has pumped some $58 billion dollars worth of aid into the country between 2003 and 2011; other nations have pledged an additional $33 billion in reconstruction aid. Iraqs workforce is employed primarily in the service sector, although about 15 to 22% work in agriculture. The unemployment rate is around 15%, and an estimated 25% of Iraqis live below the poverty line. The Iraqi currency is the dinar. As of February 2012, $1 US is equal to 1,163 dinars. History of Iraq Part of the Fertile Crescent, Iraq was one of the early sites of complex human civilization and agricultural practice. Once called Mesopotamia, Iraq was the seat of the Sumerian and Babylonian cultures c. 4,000 - 500 BCE. During this early period, Mesopotamians invented or refined technologies such as writing and irrigation; the famous King Hammurabi (r. 1792- 1750 BCE) recorded the law in the Code of Hammurabi, and over a thousand of years later, Nebuchadnezzar II (r. 605 - 562 BCE) built the incredible Hanging Gardens of Babylon. After about 500 BCE, Iraq was ruled by a succession of Persian dynasties, such as the Achaemenids, the Parthians, the Sassanids and the Seleucids. Although local governments existed in Iraq, they were under Iranian control until the 600s CE. In 633, the year after the Prophet Muhammad died, a Muslim army under Khalid ibn Walid invaded Iraq. By 651, the soldiers of Islam had brought down the Sassanid Empire in Persia  and began to Islamicize the region that is now Iraq and Iran. Between 661 and 750, Iraq was a dominion of the Umayyad Caliphate, which ruled from Damascus (now in Syria). The Abbasid Caliphate, which ruled the Middle East and North Africa from 750 to 1258, decided to build a new capital closer to the political power hub of Persia. It built the city of Baghdad, which became a center of Islamic art and learning. In 1258, catastrophe struck the Abbasids and Iraq in the form the Mongols under Hulagu Khan, a grandson of Genghis Khan. The Mongols demanded that Baghdad surrender, but the Caliph Al-Mustasim refused. Hulagus troops laid siege to Baghdad, taking the city with at least 200,000 Iraqi dead. The Mongols also burned the Grand Library of Baghdad and its wonderful collection of documents - one of the great crimes of history. The caliph himself was executed by being rolled in a carpet and trampled by horses; this was an honorable death in Mongol culture  because none of the caliphs noble blood touched the ground. Hulagus army would meet defeat by the Egyptian Mamluk slave-army in the Battle of Ayn Jalut. In the Mongols wake, however, the Black Death carried away about a third of Iraqs population. In 1401, Timur the Lame (Tamerlane) captured Baghdad  and ordered another massacre of its people. Timurs fierce army only controlled Iraq for a few years  and was supplanted by the Ottoman Turks. The Ottoman Empire would rule Iraq from the fifteenth century through 1917  when Britain wrested the Middle East from Turkish control and the Ottoman Empire collapsed. Iraq Under Britain Under the British/French plan to divide the Middle East, the 1916 Sykes-Picot Agreement, Iraq became part of the British Mandate. On November 11, 1920, the region became a British mandate under the League of Nations, called the State of Iraq. Britain brought in a (Sunni) Hashemite king from the region of Mecca and Medina, now in Saudi Arabia, to rule over the primarily Shia Iraqis and Kurds of Iraq, sparking widespread discontent and rebellion. In 1932, Iraq gained nominal independence from Britain, although the British-appointed King Faisal still ruled the country and the British military had special rights in Iraq. The Hashemites ruled until 1958  when King Faisal II was assassinated in a coup led by Brigadier General Abd al-Karim Qasim. This signaled the beginning of a rule by a series of strongmen over Iraq, which lasted through 2003. Qasims rule survived for just five years, before being overthrown in turn by Colonel Abdul Salam Arif in February of 1963. Three years later, Arifs brother took power after the colonel died; however, he would rule Iraq for just two years before being deposed by a Baath Party-led coup in 1968. The Baathist government was led by Ahmed Hasan Al-Bakir at first, but he was slowly elbowed aside over the next decade by Saddam Hussein. Saddam Hussein formally seized power as president of Iraq in 1979. The following year, feeling threatened by rhetoric from the Ayatollah Ruhollah Khomeini, the new leader of the Islamic Republic of Iran, Saddam Hussein launched an invasion of Iran that led to the eight-year-long Iran-Iraq War. Hussein himself was a secularist, but the Baath Party was dominated by Sunnis. Khomeini hoped that Iraqs Shiite majority would rise up against Hussein in an Iranian Revolution-style movement, but that did not happen. With support from the Gulf Arab states and the United States, Saddam Hussein was able to fight the Iranians to a stalemate. He also took the opportunity to use chemical weapons against tens of thousands of Kurdish and Marsh Arab civilians within his own country, as well as against the Iranian troops, in blatant violation of international treaty norms and standards. Its economy ravaged by the Iran-Iraq War, Iraq decided to invade the small but wealthy neighboring nation of Kuwait in 1990. Saddam Hussein announced that he had annexed Kuwait; when he refused to withdraw, the United Nations Security Council voted unanimously to take military action in 1991 in order to oust the Iraqis. An international coalition led by the United States (which had been allied with Iraq just three years earlier) routed the Iraqi Army in a matter of months, but Saddam Husseins troops set fire to Kuwaiti oil wells on their way out, causing an ecological disaster along the Persian Gulf coast. This fighting would come to be known as the First Gulf War. Following the First Gulf War, the United States patrolled a no-fly zone over the Kurdish north of Iraq to protect civilians there from Saddam Husseins government; Iraqi Kurdistan began to function as a separate country, even while nominally still part of Iraq. Throughout the 1990s, the international community was concerned that Saddam Husseins government was trying to develop nuclear weapons. In 1993, the US also learned that Hussein had made a plan to assassinate President George H. W. Bush during the First Gulf War. The Iraqis allowed UN weapons inspectors into the country, but expelled them in 1998, claiming that they were CIA spies. In October of that year, US President Bill Clinton called for regime change in Iraq. After George W. Bush became president of the United States in 2000, his administration began to prepare for a war against Iraq. Bush the younger resented Saddam Husseins plans to kill Bush the elder and made the case that Iraq was developing nuclear weapons despite the rather flimsy evidence. The September 11, 2001 attacks on New York and Washington DC gave Bush the political cover he needed to launch a Second Gulf War, even though Saddam Husseins government had nothing to do with al-Qaeda or the 9/11 attacks. Iraq War The Iraq War began on March 20, 2003, when a US-led coalition invaded Iraq from Kuwait. The coalition drove the Baathist regime out of power, installing an Iraqi Interim Government in June of 2004, and organizing free elections for October of 2005. Saddam Hussein went into hiding  but was captured by US troops on December 13, 2003. In the chaos, sectarian violence broke out across the country between the Shia majority and the Sunni minority; al-Qaeda seized the opportunity to establish a presence in Iraq. Iraqs interim government tried Saddam Hussein for the killing of Iraqi Shiites in 1982  and sentenced him to death. Saddam Hussein was hanged on December 30, 2006. After a surge of troops to quell violence in 2007-2008, the US withdrew from Baghdad in June of 2009  and left Iraq completely in December of 2011.