Tuesday, December 31, 2019

History on the War on Drugs Essay - 1788 Words

English 41461 October 26, 2010 History of the War on Drugs The war on drugs has been an ongoing fight that many presidents and foreign allegiances have tried to stop the trafficking, distribution and use of illegal drugs into the United States and around the world. Policy and laws have been created and maintained and changed to try and prevent illegal drugs being made in other countries as well as the United States and from being brought across the borders into the United States. The punishment for the drug traffickers and users has been an issue with the campaign to stop illegal drug use and trafficking. Through the United States history the president’s and their administration have been focusing on how to deal with the war on drugs†¦show more content†¦Drug Abuse Resistance Education (DARE) was initiated in schools all over the United States in 1983 to inform students about the effects drugs cause and to make children and their parents more aware of the drug problem in the U.S. (Frontline). Un der Reagan, the federal prison population doubled. Young offenders and non-violent drug users were sent to Special Alternative Incarceration boot camps, where they were brainwashed with yet more anti-drug propaganda, to undermine their subversive attitudes. The President declared the War on Drugs to be one of the major achievements of his administration, while the international narcotics trade thrived and cannabis prices sky-rocketed. Then in July 1984, the Washington Times published a story about DEA informant Barry Seal’s infiltration of the Medellin cartel’s operation in Panama. The story showed that Nicaraguan Sandinistas were involved in the drug trade. As a result of Seal’s evidence, a Miami federal grand jury indicts Carlos Lehder, Pablo Escobar, Jorge Ochoa and Jose Gonzalo Rodriguez Gacha. In February 1986, Seal is killed in Baton Rouge, LA., by a gunmen hired by the cartel (The Washington Times). For the first time Colombia extradites the drug traffick ers to the U.S. in 1985. Then the U.S. officials discover that the Medellin cartel has a â€Å"hit list† which included embassy members and their families, U.S. businessmen and journalists (NPR).Show MoreRelatedEssay History of the War on Drugs900 Words   |  4 Pageswith the nonmedical use of drugs (wisegeek). The war of drugs started primarily in the 1971 when Nixon declared the war on drugs. He dramatically increased the size and presence of federal drug control agencies (Drug Policy). With the first major organized drug imports from Columbia from the Black Tuna Gang based in Miami, Florida Columbia was quickly growing into a drug superpower able to feed America’s growing addictions. With the growth of America’s need for drugs cartels in Columbia quicklyRead Moreâ€Å"The War On Drugs Is A Big Fucking Lie†. In Recent History,1560 Words   |  7 Pagesâ€Å"The war on drugs is a big fucking lie† In recent history, there has been much rhetoric surrounding the eradication of cross-border drug trafficking. The â€Å"war on drugs† was introduced in the 1970s by Nixon, who wanted to eliminate the drugs coming into the United States, since they were seen by him as a threat to our nation. Many laws have been enacted with the purpose keeping illicit drugs out of the United States, yet they do so through the use of nativist ideology, which upholds white supremacyRead MoreA Brief Note On The War On Drugs1356 Words   |  6 PagesRachael Radvansky Sociology 101 War on Drugs February 28, 2017 The War on Drugs can be a very controversial topic to different people around the world. Everyone is entitled to their own opinion, and I fully respect that. Some people say that the War on Drugs is a waste of time and money while others are very concerned about the different drugs that are coming into the United States. It still amazes me that people are continuing to take/do drugs when they see and hear about how many people haveRead MoreWar on Drugs818 Words   |  3 Pagesunderstatement to the punishments given to drug dealers for their drug related offenses. Mandatory minimum drug sentencing was arguably established to target higher level drug dealers but recently the majority of cases have been low level drug dealers. Distributing narcotics is a serious offense, but do these people who are trying to support themselves, a family, or an addiction deserve to spend close to a lifetime incarcerated? During the 1960’s drugs became a symbol of â€Å"youthful rebellion, socialRead MoreProhibition Of Drugs And Alcohol1492 Words   |  6 PagesPopular belief holds that consumption of drugs and alcohol encourages violence and that the appropriate response is prohibition of these goods. However, a different viewpoint is that prohibition creates illegal underground markets, which require violence and crime to remedy in-house disputes. This paper examines the relationship between prohibition and violence using the historical data and behavior following previous U.S. drug and alcohol laws, regulations, and enforcement on indicators of violenceRead MoreDrugs and Alcohol in the Criminal Justice System1396 Words   |  6 PagesFrank Herton CJ411: Drugs and Alcohol in the Criminal Justice System Unit 2 Assignment May 1, 2012 Drug and alcohol abuse has been around as long as humans have been around. People have always had the desire to use substances to make them feel relaxed or stimulated. So because drugs and alcohol have always been existent, they have always been a part of our American culture through politics, media and advertising, and other American concepts. The time period of 1950-2000 was exceptionally activeRead MoreDrug Addiction : History, Laws, And Treatment Essay1570 Words   |  7 Pages Drug Addiction, History, Laws, and Treatment Drug Addiction itself affects almost  ­Ã¢â‚¬ Twenty-three million Americans are currently addicted to alcohol and/or other drugs. Only one in 10 percent of them (2.6 million) receives the treatment they need. The result: a treatment gap of more than 20 million Americans†(Writer, B. J. 2010). Drug Addiction is it truly a disease or a choice? Many state authority figures say it s a choice not a disease much of science says it s a choice disease, both inRead MoreThe War On Drugs And The United States956 Words   |  4 PagesThe War on Drugs has become an epidemic today that has afflicted in the United States and the United Nations; both are influenced by international drug laws which preserve the criminal justice system. These new laws promote an ineffective policies on the war on drugs. Therefore, communities are locked while the promotion of illicit drugs become the dominate framework to organized crimes. Today, the war on drugs continues to be an ongoing battle within our society. This paper will examine these issuesRead MoreArgumentative Essay On War On Drugs1515 Words   |  7 Pages War On All Drugs The War on Drugs has been a long and difficult road for humankind. So many drugs exist today, from street drugs to recreational use to prescription and over-the-counter medications. They all affect anyone who uses them. Some give you an inebriated high and if overused and can lead to death. Drugs that were originally intended to cure an illness or disease are being combined to form an illegal substance. When it comes to curing the illness that was made by the drug, rehabilitationRead MoreRace For Nonviolent Drug Offenses Essay1110 Words   |  5 Pagesput in place in the South and Midwest for drugs directed towards minorities. For the purposes of this essay I want to look at race when describing how race disproportionately plays in the legal system for nonviolent drug offenses. In America since 1970 since Nixon declared a war on drugs and the introduction of crack cocaine in the 80s America there has seen a rise of prison inmates. The majority of the inmates are minorities being c harged with nonviolent drug offenses. As result, I would like to examine

Monday, December 23, 2019

Essay about Student and Utah State University - 1194 Words

†¢ Discuss potential key changes in the external environment, specifically competition and technology including communications that Sigma will face in the future. Which will have the most impact on Sigmas future marketing strategies? We discussed in the previous theme the development of a market and how to determine if a product fits or if it needs alteration. Now, we look at the product in the marketplace and how long it can survive. All products have a lifecycle. They begin as an idea that needs Research and Development (RD) or time to develop. This is a direct cost to the company. Once the product and/or service is ready to be marketed, it goes through five stages: development, introduction, growth, maturity, and decline. Utah†¦show more content†¦Ã¢â‚¬ ¢ In what ways do you expect your chosen academic subject or career to be satisfying? †¢ If you have a professional role model, explain: how did they inspire you? Example: I have always been interested in cars. My father taught himself how to fix a lot of minor problems with cars, and I learned a lot from watching him. I have also learned from my work experience at a couple of service stations about how to work with customers. A lot of people do not think fixing cars is a great profession, but I have seen that a well-run shop can be satisfying and profitable for the owners. So many service stations have waiting rooms, which are small, noisy and uncomfortable, with only coffee and a vending machine. Customers get impatient when they feel stuck waiting in a place like that. I would like to start a service station with a waiting area, which was like a good cafà ©, and serve espresso drinks, smoothies and good food. There would be lots of car and racing magazines for people to look at, and customers could just relax and enjoy themselves while waiting. In order to make this dream come true, I need to develop my automotive technology knowledge and learn how to start and run a successful business. This is why I am enrolling†¦ Closing paragraph: Be positive, upbeat, and tell ‘em â€Å"I’m going to make it!† Just three sentences will do. Example: I am really looking forward to going to college. A lot of people doubted I would make itShow MoreRelatedSexual Assault And Rape Among College Campuses Essay1363 Words   |  6 Pagesongoing issue across the nation for decades. In the state of Utah, this complex issue will not have a simple solution, but measures can be taken to prevent sexual assault and rape occurring on campuses. Utah Valley University is a campus that is taking considerably impressive measures to combat sexual assault, which will be a basis of this paper. Through university sex education, stricter laws and enforcement, and providing on-campus services to students, cases of sexual assault and rape in the higherRead MoreThe Ethics Of The State Of Utah1229 Words   |  5 PagesIn the state of Utah, statistically one in three women will be sexually assaulted in her lifetime, a nd one in eight will be raped. (Morgan, E. 2014). Campuses nationwide, and specifically the state of Utah, are feeling the weight of this issue impact the campus environment. In the past, the honor code system at Brigham Young University interfered with the legal process, â€Å"revictimized† victims of rape and sexual assault, and most importantly, sent a message to the student body that they should notRead MoreAmerican Politics And Heritage Of The United States1731 Words   |  7 Pagesone who dreamed of exploring space and all of its mysteries. However after trying to say quantum physics like a NASA scientist I soon decided that my exploration of that particular career came to a close. Around 7th grade, I was enrolled in a United States history class and enjoyed the studies of American politics and heritage. I soon set out to be the first female president, disregarding my financial standings as a broke-unemployed junior high teenager. This aspiration stuck with me until th e recentRead MorePsychologists Help People with Their Personal Problems Essay626 Words   |  3 Pageshaving interesting and new tasks, psychologists also make an excellent amount of money. Like most jobs the amount of money that a psychologist will make all depends on how many years they have been working and what field they specialize in. According to Utah Department of Services, on a national average, a clinical psychologist at the beginning of their career will make around $38,450 per year and by the end of their career will make around $109,340 per year. On the other hand an industrial-organizationalRead MoreConsent And The Potential Effects Of Affirmative Consent Essay1165 Words   |  5 Pages 1. TITLE: Consent and What It Means to Utah College Students 2. OBJECTIVE This research is to determine students understanding of what sexual consent is and the possible effects of affirmative consent being implemented schools. The theory is that individuals do not have a common understanding of what sexual consent is. The hypothesis is that in college campuses, students have an unclear understanding of sexual consent, affirmative consent would decrease misunderstandings of consent and ultimatelyRead MoreAnxiety And Classroom Dynamics ( National Institute Of Mental Health1539 Words   |  7 Pagesadults. (National Institute of Mental Health). Many college students suffer from anxiety stemming from a range of classroom dynamics, from teaching styles to a student’s studying habits and lack of confidence can affect a student. Anxiety doesn’t always impact a student’s learning capacity, though it may hinder the process of grasping new concepts. Many educators find themselves adjusting their teaching styles, to maximize their studentsâ₠¬â„¢ learning capabilities. Professors understand the stress andRead MoreSample Bibliography : 20 Important Benefits Of Music1035 Words   |  5 Pagesbecause it supports many of my claims with facts. Abril, Carlos R., and Brent M. Gault. The State Of Music In The Elementary School: The Principal s Perspective. Journal Of Research In Music Education 54.1 (2006): 6-20. Education Research Complete. Web. An, Song, Mary Margaret Capraro, and Daniel A. Tillman. Elementary Teachers Integrate Music Activities Into Regular Mathematics Lessons: Effects On Students Mathematical Abilities. Journal For Learning Through The Arts 9.1 (2013): ERIC. Web. Read MoreDr. Bundy, The Murderer, Rapist And Necrophilia Of Many Young Men Between 1974 And 19781092 Words   |  5 Pages1978. Bundy murdered young women all over the United States, including Washington, Utah, Oregon, Colorado and Florida. He was a suspect in over thirty-six murders and allegedly murdered many more. (2015, www.twistedminds.com). Fortunately, forensic science played a key role in the conviction of several murders. The murders On the morning of January 4, 1974, Bundy entered the home of an 18-year-old female University of Washington student, Joni Lenz. Bundy used a crow bar and bludgeoned herRead MoreWhat Has Happened? College That Reveals Your Intelligence, Service, Or Capabilities?1301 Words   |  6 Pagesgrants and financial aid made my education possible, and so I tried to give back where possible. For two years I volunteered in a leadership role with SNAC, the Student Nutrition Access Center (SNAC) at USU. SNAC offered nutrition services and food assistance to struggling students. Although our services were limited, we helped our fellow students be more successful as they worked to improve their own lives. Volunteering with SNAC as well as a number of other experiences influenced my decisionRead MoreForensic Psychology : A More Than One Career Option933 Words   |  4 Pagespublic policy dealing with psychology and the law. Forensic psychologists can wear many hats, and their work opportunities can be sporadic; so their salaries are hard to track. The BLS states that general psychologists made a median annual wage of $69,280 a year in 2012 (BLS4), while Forensic Psychology Online states a starting salary for a forensic psychologist is $52,000 a year (FPO). Subsequently, you’ll want to check out the American board of forensic psychology. â€Å"The American board of forensic

Sunday, December 15, 2019

Macbeth- General Information, Rough Essay Free Essays

then is revealed as being weak and easily manipulated. He then descends into become a murderous madman. one realizes Macbeth’s transformation into one of drama’s most infamous villains coincides with a profound transformation of his conscience—to a point where he has none at all. We will write a custom essay sample on Macbeth- General Information, Rough Essay or any similar topic only for you Order Now Throughout the play Macbeth makes a journey from following a moral ethic, implementing a flawed ethic, and arriving to a point where he had none at all. When comparing Banquo and Macbeth, after they meet the weird sisters, one see’s that Banquo adheres to warrior ethics where Macbeth moves away from it. At the start of the play Macbeth was idolised by everyone and thought to have been a man of very great power whom could be defeated by nobody: â€Å"All is too weak for brave Macbeth – well he deserves that name† 1. 2. 15. It is stated in this quote by the Captain that at the start Macbeth was known as a brave heroic man, which his enemies were too weak to overthrow. By the end of the play his status falls from a man of great magnificence to one that has barely managed to keep his own sanity. Thus our first description of Macbeth is that of a brave, loyal soldier defending his King and country He appears to be a strong military leader ‘brave Macbeth- well he deserves that name’’, is then called ‘noble Macbeth’ and given the traitor’s title, Thane of Cawdor: ‘’with this former title greet Macbeth’’. The Captain tells the King killed the traitor Macdonald in a very horrible and gory manner ‘’unseamed him from the nave to th’chops’’ Therefore, we are led to believe that Macbeth is a good, loyal, courageous, and determined man. Things From the moment they are introduced to the play the witches are seen as a negative effect on Macbeth, creating chaos by prophesysing to Macbeth that he is going to become Thane of Cawdor ‘’All hail, Macbeth! Hail to thee, Thane of Cawdor! ’’ and that he is going to become king ‘’All hail, Macbeth! That shall be King hereafter’’and getting him to act. He knows he is already Thane of Glamis, but does not know that Duncan has promoted him to Thane of Cawdor. Macbeth is surprised by the promise of kingship. Banquo’s prophecy is even more fantastic: he will be the father of kings but not king, and will be greater and happier than Macbeth. That is the moment when Macbeth wants to know more. The witches basically planted the seed of evil in Macbeth’s mind that later on grew to dominate his every action. However, it was Macbeth’s ambition that decided to take action on these prophesies, therefore it was he that decided the final outcome. When Ross and Angus enter to proclaim Macbeth’s promotion, he is very surprised: ‘’The Thane of Cawdor lives, why do you dress me in borrowed robes? ’ Moreover, Macbeth believes that this is the fulfilment of the witches prophecies, However, there is no clear reason why Macbeth would become king, especially since the present King is so loved and admired. In the next few lines it becomes apparent that Macbeth not only has thought about being king, but he also believes what the witches told him is true: Glamis, and Thane of Cawdor: The greatest is behind Two truths are told, As happy prologues to the swelling act Of the imperial theme. (1. 3. 115-116, 126-128) This is the first time we see him realising that he might have to do something, as killing Duncan, in order to get to the throne. He debates the good and the bad side of the prophecies : ‘’If good, why do I yield to that suggestion whose horrid image doth unfix my hair’’ we are shown that Macbeth not only loves his King and country,’’our duties are to your throne and state, children and servants’’ but also himself. It still remains to be seen what action he will take. Macbeth’s change has begun. ** Soon enough, we are taken to Macbeth’s home, wherewe meet his wife, Lady Macbeth. Lady Macbeth has just received a letter from her husband in whichhe tells her everything that has happened. Because the witches got him very interested in their prophecies, he has had them investigated and has ’’ learned by the perfectest report that they have more in them than mortal knowledge. ’’ It is clear that after calling the witches ‘imperfect speakers’ (1. 3. 68), Macbeth has now changed his mind. He also interprets the prophecies and tells his wife a slightly changed version. He addresses her ‘’my dearest partner in greatness’’ and seems to be sincere. Lady Macbeth, however, is determined that her husband becomes king. she says that Macbeth lacks the qualities necessary to assassinate Duncan without remorse or regret: ‘’yet do I fear thy nature, it is too full o’th’milk of human-kindness to catch the nearest way’’ . she hen prays for supernatural help to take away all of her feminine qualities and basically any traits of conscience: ‘’ unsex me here, and fill me from the crown to the toe top full of direst cruelty! ’, ‘’stop up th’access and passage to remorse’’, ‘’that my keen knife see not the wound it makes’’. After Macbeth arrives, Lady Macbeth is telling him to ‘’look like the innocent flower, but be the serpent under’t’’ and to ‘Leave all the rest to me’ Th is implicates her in the murdering of Duncan and shows us that she is taking the responsibility. She is essentially taking over. After the King arrives at the castle and prepares to sleep peacefully, Macbeth is still debating how he can achieve the crown without getting caught. He doesn’t want to do it personally; he wants to get it over with:’’ If it were done, when’tis done, then ‘twere done well it were done quickly’ and doesn’t really want to kill his cousin and King; he has a conscience: ‘’he’s here in double trust’. On the other side, he’s obsessed with becoming king and his thoughts keep flowing in the same direction: ‘’I have no spur to prick the sides of my intent, but only vaulting ambitions, which o’er-leaps itself and falls on the other’’. We see duality when he says: ‘’we will proceed no longer in this business’’ and tries to procrastinate the murder. His wife then plays games with his mind and basically psychologically bullies and pressures him into killing Duncan by telling him that he is less than a man if he does not carry out the murder:’’ when you durst do it, then you were a man; and, to be more than what you were, you would be so much more the man’’, and that she, being a woman has more strength of purpose than he does: ‘’i would, while it was smiling in my face, have plucked my nipple from his boneless gums, and dashed the brains out, had i sworn as you have done to this’. As soon as Macbeth has kills Duncan, he seems to start to lose his ind. He starts hallucinating: ‘’is this a dagger which i see before me, the handle toward my hand? Come, let me clutch thee. I have not, and yet I see thee still’’. He is unable to think clearly and is very paranoid. He is ready to eliminate anything that stands in his waybecause oft his ambitions for himself and the fear of being discovered. He just doesn’t know what to do with himself while trying to keep the crown. Even though he is committed to Duncan, he Because Macbeth is afraid of the witches’ prophecy that he will lose the crown: ‘’To be thus in nothing, but to be safely thus. Our fears in Banquo stick deep’’ and Banquo will become king, he sends people to kill Banquo and Fleance. He hires three murderers in order to make sure that they won’t be able to escape. They ambush Banquo on his way to a royal feast, but Fleance escapes into the night. Macbeth is now the prisoner insolent and nagging doubts and fears,: ‘’But now I am cabined, confined, bound in to saucy doubts and fears’’, and is now paranoid because Fleace has escaped: ‘’There the grown serpent lies; the worm that’s fled hath nature that in time will venom breed’’. How to cite Macbeth- General Information, Rough Essay, Essays

Saturday, December 7, 2019

Independence Day Speech or Has India Really Progressed free essay sample

At the stroke of the midnight hour, when the world sleeps, India will awake to life and freedom. A moment comes, which comes but rarely in history, when we step out from the old to the new†¦India discovers herself again. We are proud of our democracy. We are proud of our values and ideals Today, we remember all those martyrs who laid down their lives for the freedom and security of our country. The best way of paying homage to those brave sons of our country will be to resolve today that we will always stay committed to strengthening the unity and integrity of our nation. Let us all together take a vow that we will spare no effort to take India to greater heights. In the early hours of the 15th of August, 1947, when our nation had just become Independent, our first Prime Minister, Jawaharlal Nehru spoke to the nation and asked us all one important question on the very first day we became a free country: Are we brave enough and wise enough to grasp this opportunity and accept the challenge of the future? Today, my fellow citizens, I stand here once again and ask you that same question. We will write a custom essay sample on Independence Day Speech or Has India Really Progressed? or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Are we ready to face the challenge of the future? Are we brave enough, to do so, and wise enough, in doing so? Can we rediscover the ideas and ideals that shaped our freedom struggle, and use them to take our country forward into the future? Are we willing to show the courage and the wisdom that Panditji wanted us to show in building a new India in a new world? Are we really independent? Well that depends. A country cannot be independent till it can freely express its opinion and act based on its national and strategic interests. Yes, we are independent constitutionally. But let us give it a second thought and ask After 63 years, are we really independent? I do not think so. We still do not have complete freedom. Laws are made by our elected representatives and thrown upon on us. And we call ourselves the largest democracy in the world. we are expected to co-operate. India is said to be a secular state. But our secularism goes for a ride whenever there is communal tension in any part of our country. I do not say that all Indians are alike, but a handful of trouble-makers are enough to change the perception of a large majority of sensible minds. We cant even think independently! An Indian should feel proud throughout the year. Just one Independence Day celebration in a year is not enough. We must be a self-sustaining nation with least dependence on foreign culture, money, power and influence. Let us start with culture – are we not eager to shed our â€Å"Ego and Parampara† and embrace the Americanism for money and status symbol? Money – isn’t our national reserve dependent on how much foreign money comes through foreign institutional investments? Let us take power – did we not withdraw from Kashmir border on insistence of America? Did we not settle in Kargil and not cross the LOC because of what the super powers will do in United Nation? Are we not compromising with China to keep America and Pakistan in check? Well you will say this is part of diplomacy! Influence – Whom do we influence? We tried to give money to only Bangladesh and a few African countries to build their railways! Then I found that we really never gave them the money – just proposed and they are nervous about accepting the same! We have a huge population, more than half of them are uneducated, employed, living in terrible conditions without major health and hygiene provisions, and still India has managed to shine. Yes, if you say technologically or as per the growth rate, then it is doing very well. But there is so much cultural unrest, In other words, is the real India shining? Not from a political perspective.

Saturday, November 30, 2019

The American Delima Essays - A Raisin In The Sun, William Younger

The American Delima The Younger family is a sterling example of a typical black, urban, Northern United States family living in Southern Chicago subsequent to World War II. Their life is not an easy one, as they endure daily indignities and sufferings while trying to measure out their existence on a very uneven playing field. Indeed African Americans face many hardships; many of which are self-induced whilst others are imposed upon them by the dominant culture that exists. I. Pride is an expensive luxury that the Younger family seems to have an addiction to, however, it later serves as a character defining ?virtue? that allows the Younger family to escape their current state of depravity and move into a new and better situation. A. Walter Lee Younger has a great ?manly pride? that gets both him and his family in a great deal of trouble and creates huge turmoil within the Younger household. B Mrs. Younger holds on very tightly to her ?old fashioned? pride and this serves to hold the family together, however in Walter's case it back fires. C Benetha's intellectual pride has a positive effect on daily family life and proves to be very important in the family's future aspirations of economic and social development. D The varying degrees and forms of pride in the Younger family all serve as catalyst for steamy family discussions and heated debates, however, it is the family's cultural and ethnic pride that allows them to rise out of their depravity and destitution. II. Mrs. Younger's hope is the primary reason for the family's ascension out of its viscious cycle of depravity. .A Mrs. Younger's hope was so strong and consistent in its fashion that it spread to other members of the family, serving an important purpose in saving the family from an eternal suffrage in their small two bedroom apartment. III. The differences in the stages of personal development of the many people living in the Younger household were also a cause of conflict within that household. It was quite amazing that despite all of he hardships that the Youngers had to endure that the all triumphed over their adversity and all eventually self actualized to become greater than they were before. Social Issues

Monday, November 25, 2019

Role of Medical Staff

Role of Medical Staff Free Online Research Papers The first important role for a medical staff is the administering medical service to patients. The selection of administering medical service to the patient is most important, because it could mean the difference in life or death. Patients go to the medical facilities because they are in need of medical attention. When administering medical help to a patient, the service should be with compassion and dignity. Medical service includes diagnosing, treatment, and delivering exceptional customer service. To maintain a profitable business, all medical staff must understand that the patient comes first. The other very important role for the medical staff is administering medication. Staff members have to make sure that when patients are given medication, they are paying very close attention to what is being done because it has to be ensured that patients are given the right medication. If the wrong medication is given to a patient, it can cause many problems, even deaths in some cases. Hospital administrators play a vital a role in saving lives, without having to perform surgery, physicals, or rehabilitation. For example, hospital administrators manage hospitals, hospices, outpatient clinics, and drug-abuse treatment centers. In large hospitals, there may be several administrators, one for each department. In smaller facilities, they oversee the day-to-day operations of all departments. Administrators make sure hospitals operate efficiently and provide adequate medical care to patients. Their responsibilities are numerous and sometimes require the assistance of the medical and support staff. They act as communicators between governing boards, medical staff, and department heads and put together the activities of all departments so they function as a whole. Following policies set by a governing board of trustees, administrators plan, organize, direct, control and coordinate medical and health services. Administrators recruit, hire, and sometimes train doctors, nurses, interns, and assistant administrators. Administrators plan budgets and set rates for health services. A hospital administrator’s job is difficult and demanding. They need to keep up with advances in medicine, computerized diagnostic and treatment equipment, data processing technology, government regulations, health insurance changes, and financing options. I selected these roles to be important because they explain the details of roles of medical staff and hospital administrators. Research Papers on Role of Medical StaffThe Fifth HorsemanArguments for Physician-Assisted Suicide (PAS)Lifes What IfsInfluences of Socio-Economic Status of Married MalesGenetic EngineeringOpen Architechture a white paperTwilight of the UAWNever Been Kicked Out of a Place This NiceThe Project Managment Office SystemThe Effects of Illegal Immigration

Friday, November 22, 2019

A Motivational Article for IBPS PO and IBPS Clerk Aspirants

A Motivational Article for IBPS PO and IBPS Clerk Aspirants These immortal words were penned down by the late Padma Shri awardee Shri. Sohanlal Dwivedi. The translation is simple it states that â€Å" if you keep on getting scared of the waves you will never be able to cross the sea to the other side which is full of beautiful scenes, and that the one who keeps on trying always will eventually succeed†. In order to crack IBPS PO and IBPS Clerk examinations, one needs a lot of patience and sometimes eventually has to face failure. But even in failure, one should not get demotivated but instead find the courage and keep on fighting on until you have finally cracked the exams. Some talented students are able to crack the exams in one attempt while others take a few more. The ones who have failed also are talented but it was just not their time. Hard work beats talent every time but when you start working a little hard with the little talent you have then nothing can stop you from achieving the bigger thing in life. IBPS exams are not cleared overnight, it is just like climbing a mountain. It may take months or perhaps even years to get there but eventually, when you do get there the view from above will be worth the wait. Learn to make the obstacles you face in your way your best friends as at the end of the day these obstacles will form a ladder for you that will take you places. Over 30 lakh aspirants gave exam in 2017 for Ibps PO alone and many more for Ibps clerical exam. The numbers may be demotivating at times with only a few seats to qualify these numbers do pose a bigger threat than the exam itself to some. But out of this whole basket of fruits only a few are sweet. Most of the candidates out of this 30 lakh are just following a trend to give exams because others are doing so and an estimated 10-20 % of people never even appear for exams at all. And only the last remaining few candidates are the few real competitors who are seriously willing to give it all for IBPS exams. Be passionate about what you do, Be acceptable to all the criticism you are receiving or have received in the past, Stay motivated always and last but not the least always stay focused on your goal that is to become PO officer or Clerk. Follow inspirational people from all the fields be it sports, stay updated about what’s going around and last but not the least dont try to be like other heroes but be a hero in your own rights. Surround yourself with all the positive people and more important thoughts. And when you are in trouble or some other thoughts just keep reminding yourself of the life you are going to have after clearing the exam and you will be relieved of your tensions. Brave all the difficulties in the battle of life, dont just make it the battle of talent or luck instead make it a battle fought with much patience and hard work.

Wednesday, November 20, 2019

Discussion Board 5 Essay Example | Topics and Well Written Essays - 750 words

Discussion Board 5 - Essay Example The Washington Times, p. 1. Retrieved July 7, 2006, from Questia database: http://www.questia.com/PM.qst?a=o&d=5001572892 sexually assaulted her, and the woman offered evidence in the way of a bite mark and DNA from certain articles of clothing. Because of Mr. Albert’s celebrity status, the case was closely followed by the public and much attention was given to the use of the forensic evidence, especially the bite mark left on the victim. Cases involving celebrities are often sensationalized by the media, perhaps giving more credibility to certain forensic evidence than is warranted, when in actuality forensic evidence such as bite marks, fingerprints, palm prints and lip prints should not alone be evidence enough to convict a person of a serious crime, especially a crime involving the death penalty. An article by Molly Burton and Donna Lyons, appearing in State Legislatures (2001), stated â€Å"Back in the 1970s, the Law Enforcement Assistance Administration (LEAA) did proficiency tests of crime lab hair comparisons, bite marks, serology, these types of things. They knew they were getting it wrong like fifty percent of the time. It was terrible. And then that sort of analysis disappeared with the LEAA (p. 1).† What Burton and Lyons are suggesting, is that each of these sources of evidence are, first, subject to lab error and one should not infer from the results of a test using these sources that the information stemming from the tests is infallible. Alone these sources of evidence should not be enough to cause a person to be convicted of a major crime, especially one that carries the penalty of death. â€Å"Fraudulent and junk science is a critical, critical area,† write Burton and Lyons, â€Å"Forensic science has not always been the discipline that the best pe ople in the profession want it to be (p. 1).† One case that brought attention to the infallibility of fingerprint evidence was an

Tuesday, November 19, 2019

European Government Essay Example | Topics and Well Written Essays - 2000 words

European Government - Essay Example The tension that ensued in 1989 after the fall of Berlin Wall and the need to put hands on deck in fighting global terrorism have combinable shaped EU to implement diplomacy and intervention policy. One of the E Us efforts to maintain its power across the world that should be presented to support this essay is of its roles during the Yugoslavian crises around 1992. Though by then treaty was signed within it, which was tagged: "Common Foreign and Security Policy", but the Union effort to halt the fighting proved abortive. The EU countries had to join the United Nation Force, which at the end were under the United State leadership. Another Foreign Policy of EU that also focus on security which is seen as a strict diplomacy measure was its effort by creating formidable force that involves representatives from within its members countries, which great supports were attached to it The key action of this force is to foreseen and signal and alert on possibility of tensions. Thus it's dispatched action representatives to various hard areas around the world, so they can expand their power. Examples of these areas include Balkans, Afghanistan, Africa and the Middle East. In its effort in creating more credibility's to intervention strategies under the Common Foreign and Security Policy (CFSP), EU has programmed European Security and Defense Policy (ESDP) that would mean to have unanimous defense structure. Since 2003, EU leaders endorsed an European Security strategy with basic focus on crushing terrorism especially in the Middle East, though the acts of terrorism is under increase in that part of the world, which signifies one of the EU failure in its mission over foreign policies. Moreover, EU has pointed out some measure assignments that its Military Force should undergo as part of foreign policy. These are peacekeeping, crises management, humanitarian and rescue mission, including peace making. To achieve these tremendous objectives, a formidable force has been created which is expected to grow strongly in the coming recent years. Meanwhile, despite points that are seen as EU achievements on the above discussion, yet there are some angles that its failures are also noted. One of these point states that though the Union had included political aspect in its international roles, members are finding it a hard task to reshape their nation's policy. A typical example explained how these members failed to come under one umbrella during a debate held in 2003 on if the United Nation should give a go-ahead on the United States led War on Iraq. Another important area that needs a focus as parts of EU Foreign Policy is the adaptation of "Common Agriculture Policy" (CAP), a policy that aims to offer agricultural subsidies for European Union. CAP was created in the late 50s and early 60s to supplement food shortages, which hit EU countries during and after the Second World War. "As part of building a common market, tariffs on agriculture would have to be removed. However, due to the political clout of farmers and the sensitivity of the issue, it would take many years before CAP was fully implemented". (Common Agricultural Policy). The CAP steering strategies had come into being in 1960 by the founding members, while in 1962 these strategies begin to take effect. In the same year there

Saturday, November 16, 2019

Nazi Germany in the 1930s Essay Example for Free

Nazi Germany in the 1930s Essay Jews faced several problems that made life very difficult and strenuous during the mid-1930s. People who were Jewish were often persecuted and treated as the worst class of people when it comes to social hierarchy. Throughout this time, there were many things happening to Germany that were of and related to government, which destroyed the ability for a Jewish citizen to have a positive life. There were several hardships and problems faced by Jews regarding emigration out of Europe. Also, Jewish people during this time period suffered from government and social ridicule, losing many rights and necessities that should be given to every human being upon birth. During the mid-1930s, Germany tried to persecute Jews by forcing their emigration from the country. This was caused by the anti-Semitic legislation in Germany. Jews were not allowed to take with them any more than $4 and very few belongings. Along with that, trying to get to another country was nearly impossible. With the terrible great depression that was occurring, other countries were afraid that immigrants would threaten local job opportunities, thus emigration out of Germany was very difficult for Jews (Obstacles to Immigration). All the documents required to leave the country were also nearly impossible to obtain. Jews often called these â€Å"Bureaucratic Hurdles†. These were up to 15 documents that could include 5 visa applications, 2 local citizen sponsorships, tax and financial documents, police conduct documents and evaluations, a physical, and proof of a booked passage to the new country(Documents Required to Obtain a Visa). According to Ann Jacobson , when she emigrated out of Austria, when it became part of the Reich, her father was only allowed to take $80 and they had extreme difficulty finding all the documents required to move (â€Å"Flight From the Reich†). This was extremely fortunate for her to be able to get the opportunity to move, because for most Jews, obtaining such documents was nearly impossible. Overall, trying to emigrate out of a Nazi occupied territory in the mid-1930s was almost impossible, due to the legal and social restrictions posed by people and the government. Jewish lifestyle was often full of being discriminated against and mistreatment by non-Jewish citizens and government affiliated people during this time period. Many Jewish people lost their jobs and children were taken from schools (â€Å"Flight from the Reich†). With the little things available for Jews to take with them due to confiscation and newfound poverty, Jews were figuratively chased out of Germany by Nazis (â€Å"1938 Propaganda Poster†). Poverty is caused by lack of work, and Jews definitely were forced into poverty. An example of somebody being forced out of their job was Elisabeth Abegg. She was a teacher who was forced out of the position in 1933 for being of the Jewish religion (Rescue and Resistance 1). With no money, jobs, or hope for help from others, anybody would have struggled for shear survival. That is what these Jews were being denied during this time. They were forced out of a normal lifestyle, and constantly had to be looking over their shoulders for the government. A citizen in any country should never feel threatened or attacked by their own government. For the Jews trying to survive in this time period, the case was practically opposite. The government was brutal, and forcibly making Jewish people evacuate the country, yet made immigration to other countries nearly impossible. This is what made life so difficult for Jews during this time period. Eventually there was an establishing of the Nuremburg Laws, which caused Jews to lose citizen rights in Germany (â€Å"Jews in Nazi Germany† 1). Some people tried to resist the movement, but were quickly dealt with. In 1933, Karl Barth opposed pro-Nazis and based his opposition on his biblical theology (Rescue and Resistance 11). He was expelled from Germany for his â€Å"unruly behavior† in 1935. When people got on boats to sail to new countries, the exit of Europe did not always guarantee complete freedom from the Reich. If Jews were to get on a Germany controlled ship, they were technically on German land wherever they were. It was best to get on an American controlled ship, so that Germans had no control over what happened to it or its passengers while in operation (â€Å"Flight from the Reich†). If an emigrant was on a German controlled ship, like the St. Louis, problems could have occurred. This boat consisted to 900 or more people trying to go to Cuba. The government in Germany knew that Cuba had changed its mind about accepting these people yet they did not inform the passengers. When the boat got to Cuba, it was turned around with only 28 people admitted onto the island . The rest were sent back to Europe. Only half of those people sent back ended up surviving through the Holocaust (Voyage of the St. Louis). With the difficulty posed by the inability to obtain documents, and the process it actually took to get to a new country, emigration for Germans during this time period was seemingly impossible. Altogether, this time period was probably the most difficult time for a certain persecuted group of people to live. They were treated with utmost disrespect and extremely persecuted. Even though I am not a Jew myself, I feel extreme remorse for the Jews during this time period. Being able to relate to what these people went through is nearly impossible for anybody who would ever try to give themselves the task. These people are an example of how little wrong one must do in society to be treated in the most malicious of ways. The human race itself will always be the leading factor in the prevention of development, and this time period demonstrates this more than most others. When humans do and think like the Nazis did in the mid-1930s is when our race will reach ultimate failure. People do not deserve to be persecuted or mistreated, unless it is an earned treatment for negative behavior or acts. These Jews did nothing wrong, yet were treated worse by the Reich than any other people on the planet at the time. When looking for something to take away from this, one could take away the knowledge to know how destructive a simple persecution could become. It is not wise to single out any one group of people in any social context, due to the harmful global impacts made when this happened to the Jews. Humans are all born equally, and unfortunately are unable to treat each other as such. People should always be treated and given the title and rights they were born with. That title is a human being.

Thursday, November 14, 2019

Self management approach at King Fahd University Hospital in Saudi Arab

Self management approach at King Fahd University Hospital in Saudi Arabia There are many diseases in the world that affect patient’s life. WOH has mentioned that chronic conditions might lead to disability in the future which leads to spend a lot of money to treat patients (WHO, 2005). The prevalence of chronic diseases like cardiovascular diseases, obesity, overweight and diabetes has become a great cause of concern for the Saudi Arabian government. In addition, the number of patients with chronic diseases is increasing. The main reasons for that are people in Saudi Arabia have bad lifestyle, unhealthy diet and lack of physical activities (Maheshwari, 2011). To control chronic diseases and prevent patients from getting worse, we need to distinguish between chronic diseases and cute diseases. Chronic condition is one that 'has been (or is likely to be) present for at least 6 months, or is terminal' (The Royal Australian College of General Practitioners 2000). To treat chronic diseases we need to change lifestyle and we need to consider many things such as cost of drugs, availability of the medication, health providers. In addition, all health professional and patients should be aware about self management. Many studies proved that self-management is an important component of effective management of people with chronic conditions. It is a frame work that consists patients, family and health providers. Self management program can improve the quality of life, increasing patients information, decreasing hospitalization and visiting physician, improving patient's behaviors and improving the health care system for chronic diseases (Epping-Jordan et al. 2004). Unfortunately, Saudi Arabia does not have any self management approach to ... ...which may led to increase patient's confidence (self management toolkit 2011).Self management toolkit shows good communication strategies for improving self management in patients with chronic diseases which are engaging the patients, exploring importance ambivalence and collaborative action planning (self management toolkit 2011). The good self model that can be implanted in my service is Flinders model. The Flinders model of chronic disease management has been developed by Dr. Malcolm Battersby and associates at Flinders University in Adelaide, South Australia. There are many reasons for using Flinders model. Firstly, it is a patient-centered care model and easy to be used. Another reason is that it creates a good partnership between health care providers and patients where the patient can be the decision maker and the health care provider can be facilitator.

Monday, November 11, 2019

Health Is Wealth Essay

Health means state of being well in body or mind. Wealth means riches or being rich. So what is more important health or wealth? Clearly health is superior parameter over wealth. But how to be healthy. You have to eat healthy food. Where from these healthy food will come at this market condition. Straight way from money. Again we have reached on wealth. So we can see one is running cbehind other in a circular path. But only money is not important for being healthy. Peace and happiness is also attached for being healthy. So what does it means? The more wealth and more happiness cannot lead to good health. But sufficient wealth and sufficient happiness and peace can result healthiness. So the proverb is justified that â€Å"health is wealth†. And wealth is not health but a parameter of health. Without money you cannot recover health. Try to earn some money for your health. So, do not spoil your health for earning more wealth. All of us are very much familiar with the proverb â€Å"Health is Wealth†. But it is very unfortunate that we always remain attached very much to acquire wealth. Attached word is not justified, actually maximum of us are at a state of madness to achieve and satisfy our hunger of money. Health is not cared while dealing one`s target of becoming rich . It is only taken as a subject of life when one starts loosing health and enters into home of illness. Until this stage money was coming smartly and after becoming ill money starts to drain out . Net result becomes zero on monitory basis and negative on the scale of â€Å"Health is Wealth†. That means there should be a balance of putting our life business. Health is above all priorities. Tips of keeping us healthy and wealthy- First of all we try to know what bigger diseases are; which affects us and finally damage our life. These are Sugar, Blood Pressure, Headache, Indigestion diseases etc. I am not a doctor but have very much common sense about the killer reason of these diseases. I am giving her a very top secret to keep us free from disease and to keep us completely healthy. It`s a killer tips what I am going to disclose here. Before knowing the tips we have to know the reason of today`s disease. It is tension, tension and tension. Tension is such a parameter of today lifestyle; which is producing these diseases in many cases. Stress is the physical and mental state of deviation from the natural condition of mindset  and body behavior . Then how to get escaped from tension. First simple tip is that our sleep must be sound. To achieve this we must correct our metabolic activity. It is a medical term but is very simple to correct it by walking at least 4 km per day. Also remember one shaayaraana lines for getting rid of tension-I lived simply, blown away every stress into smoke, I accepted my fate w hat I got. I forgot and forgot what I lost. How to control health without losing wealth: In absolute sense it will be very impractical to say that there is a magic of keeping oneself healthy. But there is guaranteed formula of remain less affected from disease. Suppose if it is told to give a disease to someone then it is possible for small diseases only like loose motion, Malaria etc. To give loose motion is very easy. Just give someone to eat rich, bad oil fry food. Similarly put someone among strong mosquitoe`s area and it is sufficient to inject malaria in him.

Saturday, November 9, 2019

Conflict Between Reality and Illusion as a Major Theme of ‘the Glass Menagerie’ Essay

Over the past century discoveries in physics have revealed a whole new paradigm for life – one that you can apply to your life right now to get extraordinary insights, intuitions and results. I believe knowing these principles is crucial for your ability to be ‘tapped in’ to the unseen world that surrounds you. To me quantum physics has always interested me. Since a child, I wanted to know what this world was about, and if I could go deep into understanding the nature of matter that makes up our world, and know what is it made of, then I could understand my own essence and the purpose of life itself. So I set off on an exploration into the area of science known as quantum physics. It is the branch of science that explores the universe at the very tiniest and the very largest of scales. What I found was science is really the new religion. For instance, no one has ever seen an atom even though scientists tell us that’s what all things are made of. Since we cannot see an atom, then we have to accept it from the scientific community based on faith. To me, when you involve faith, even an experimentally confirmed version, you also imply a new religion in a sense. In the past, the masses of people got their meaning of life from religious teachers who taught well-understood spiritual laws. The teachers of religion along with ancient myth tellers were the storytellers giving people the ultimate truth of reality. At some point in history, religion became political and was used more for state control of the masses rather than for providing the truth of reality. When Science was discovered all that changed. Over the past 300 years or so science has made an attempt to start from scratch and rebuild what is true. From Galileo to Darwin these rebels sought the truth yet paid the price for going against the inherent worldview. Inspired by these great leaders more and more people joined the scientific exploration for truth, which led to the forming of institutions and organizations. As with any good intention, when it becomes institutionalized, it can lose sight of it’s main objective and eventually become biased as well. In this case, our modern scientists have focused on what can be seen in the material world and have forgotten or downright ignored other unseen forces such as mind or consciousness as factors in the laws of nature. Most scientists have bought into a materialistic and lifeless universe. Even though there is evidence to the contrary, modern scientists do not want to acknowledge such a paradigm – despite what quantum physics shows. This may be because, if scientists go against the inherent worldview, they create the real potential of losing their reputation along with their university-funded careers, which has been know to happen all too often. Only a handful of open-minded scientists, who are willing to put their reputations and careers on the line, have pursued the truth of reality in spite of the consequences. â€Å"At present, of all the stories, it is the scientific ones that most define us,† writes Lynne Mctaggart, author of her book entitled â€Å"The Field†. She continues, â€Å"Our current scientific story is more than three hundred years old, a construction largely based on the discoveries by Isaac Newton – a universe in which all matter moves within three-dimensional space and time according to certain fixed laws. The Newtonian vision describes a reliable place inhabited by well-behaved and easily identifiable matter. The worldview arising from these discoveries is also bolstered by the philosophical implications of Charles Darwin’s theory of evolution, with its suggestion that survival is available only to the genetically rugged individual. These, in their essence, are stories that idealize separateness. From the moment we are born, we are told that for every winner there must be a loser. From that constricted vision we have fashioned our world. † The current scientific worldview is simple: We are all separate beings being influenced by random events, surviving from cradle to grave, and that’s pretty much it. There is no before life or after life for us. This reality is all we have, and it is based on random, or cause and affect relationships along an ongoing flow of time. â€Å"Although we perceive science as an ultimate truth, science is finally just a story, told in installments† writes Mctaggart. But the latest installment is quantum physics, which reveals a whole different paradigm. We are all not separate but rather interconnected – called non-local entanglement by these physicists. Unfortunately, quantum physics is considered an anomaly in the scientific community. Because it is such a variant to long held beliefs, most scientists have not incorporated these new-found principles into their respective areas of science let alone their own personal lives. If they did, we would have an updated version of biology, physiology, geology, medicine, psychology, sociology and even theology. We would have a whole new paradigm for life, thus impacting our worldview in every way. Instead, these principles stay isolated into the lonely branch of physics that explores the very tiniest of particles. This whole new view of life would say we are not separate at all, not from each other, not from the solar system we are part of, or the universe we belong to. We are all interconnected at the most fundamental aspect of our nature. We may appear as physical things, but we are more than that, we are processes intimately connected to our environment and to each other. Without awareness of these principles, things look random in our lives, but according to quantum physics they are not. If you would like to learn more about the principles of quantum physics and how to apply them to your life, then you may want to enquire about our monthly gatherings we have in Richmond Hill. This group aims to be the leading think tank for gathering answers to life’s most interesting questions, from the meaning of your life, to exploring hidden forces that heal the body and mind, to discovering answers to the riddles of ancient civilizations. Each gathering will be a special event consisting of a professional presentation followed by a short discussion on various topics of interest in order to explore the answers to life’s mysteries, learn the underlying unseen laws governing your everyday existence, and how to apply this wisdom to transform your life. Each event will enhance your sense of wonder and appreciation for you and the world in which you live. No previous knowledge is necessary and everyone is welcome.

Thursday, November 7, 2019

Free Essays on Gulliver’s Travels As Both Story & Satire

At the surface, Gulliver’s Travels is a rousing adventure story, full of strange, comical and wondrous lands and beings. It is a straightforward tale of several voyages and adventures, wild and imaginative. However, scratch beneath this surface and you will find scathing commentary on the state of mankind. Gulliver’s first voyage to Lilliput can be seen as a critique of English party politics and the small-mindedness Swift ascribes to it. The final voyage, though, we see Gulliver, soured by what he has seen throughout those long years, finally abandon humanity illustrated (at least in his eyes) by the vile Yahoos. In the end, Swift portrays Gulliver as equally flawed and absurd as the other beings he encountered by not allowing him to see the potential in his fellow human being. This book is not merely an adventure, but a depiction of the human condition, its debased nature as well as its promise. The first voyage begins with a violent storm, which strands Gulliver on an uncharted island. He soon finds himself captured by the miniscule Lilliputians. Gulliver engages in a treaty with the king and begins to learn about their society. Gulliver, the fictional author of these accounts is as straightforward as the prose, taking Lilliputian society seriously and without criticism. Swift, however, has made these tiny, petty men to represent his attitude towards English party politics. By having Gulliver tower over the people of Lilliput, Swift exaggerates their smallness of character, creating a more absurd view of their legalese, boasts of vastness of realm, and the almost Babylonian description of their king. Their pettiness is further illustrated by the charges of treason leveled at Gulliver for his various actions to save the castle from fire, and the realm from invasion. Several parallels can be made between the Lilliputians and England of the 17th and 18th centuries. The eternal war with Blefuscu can be seen as the centuries long ... Free Essays on Gulliver’s Travels As Both Story & Satire Free Essays on Gulliver’s Travels As Both Story & Satire At the surface, Gulliver’s Travels is a rousing adventure story, full of strange, comical and wondrous lands and beings. It is a straightforward tale of several voyages and adventures, wild and imaginative. However, scratch beneath this surface and you will find scathing commentary on the state of mankind. Gulliver’s first voyage to Lilliput can be seen as a critique of English party politics and the small-mindedness Swift ascribes to it. The final voyage, though, we see Gulliver, soured by what he has seen throughout those long years, finally abandon humanity illustrated (at least in his eyes) by the vile Yahoos. In the end, Swift portrays Gulliver as equally flawed and absurd as the other beings he encountered by not allowing him to see the potential in his fellow human being. This book is not merely an adventure, but a depiction of the human condition, its debased nature as well as its promise. The first voyage begins with a violent storm, which strands Gulliver on an uncharted island. He soon finds himself captured by the miniscule Lilliputians. Gulliver engages in a treaty with the king and begins to learn about their society. Gulliver, the fictional author of these accounts is as straightforward as the prose, taking Lilliputian society seriously and without criticism. Swift, however, has made these tiny, petty men to represent his attitude towards English party politics. By having Gulliver tower over the people of Lilliput, Swift exaggerates their smallness of character, creating a more absurd view of their legalese, boasts of vastness of realm, and the almost Babylonian description of their king. Their pettiness is further illustrated by the charges of treason leveled at Gulliver for his various actions to save the castle from fire, and the realm from invasion. Several parallels can be made between the Lilliputians and England of the 17th and 18th centuries. The eternal war with Blefuscu can be seen as the centuries long ...

Monday, November 4, 2019

Financial Case Study Example | Topics and Well Written Essays - 2000 words

Financial - Case Study Example It is noteworthy that family is though enjoying the current ease of payments but is piling up debt that will move beyond the capacity of the family in future. Major pressures will be piled up from regular home installment, investment unit’s huge payment that is also not offering redraw facility, credit card that is piling up with regularity. The dividends from the stocks that Ann inherited are already recognized as franked and so cannot be relied for payment of certain of such debt. One aspect that identifies the issues is the capital appreciation from stocks in three years is 2.2% only. This percentage appears worthless as it is multiple to the percentage payable on the investment unit. Also investments made by the family are not generating the notable income such as tenant income from investment unit is running in deficit of USD 134 after meeting expense of interest. Two children are still to gain the higher education, the price of which is constantly on rise due to economic pressures. This problem will be complimented with the fact that both bread earners of family are in their late forties; therefore, the woman will retire in middle term in future while man though has his own business but will reduce the capacity to visit same number of clients as he does today and so will earn less or no. Also fast paced technological changes will ultimately require men to hire workforce which will add cost to the business. Hence, the overall revenue and expense plan is not worth. Considering these factors the future of the family is gloomy and troublesome. It can be safely stated that the future of the family is at financial risk. Steps To Improve the Situation with Respective Rationales The reflection of future developed from the assessment of the case clearly requires that it is high of time for family to assess the contribution from each cost incurred and respective benefit derived from it in current point in time as well as for future. This long term planning r equires family to set the future goals. Goals to be set as suggested must meet following requirements: Each goal set must ensure that it results in meeting the financial benefit in the long terms. Goals must also enable family to align their current financial resources in a manner that are able to generate the productive results. With above two financial directions for setting goals and well as the case information, following goals must be set by the family: Readiness to re-allocation of the financial resources. Meeting and paying-off the debt burden without generating any additional debt. Enable the family to meet the educational expense of the children Enable the family to meet the meet medical requirement for father and Jack and Ann in future Enable the family to meet the fixed expenditure of the family safely once the family bread earners retire. The last goal of the family is to ensure the contribution in the family budget from every earning head. Once the family has determined what financial resource they require in the different points in time, then it shall focus itself in directing the financial resources accordingly. This will require the family to rebuild its budget. Following steps are suggested to the family for the reallocation of the budget: The family must retire the debts it has piled from two cars and a

Saturday, November 2, 2019

Diversity of the World for Children Essay Example | Topics and Well Written Essays - 1750 words

Diversity of the World for Children - Essay Example Gay marriage is often discussed by contemporaries. Whether homosexuality is a sexual or psychological deviance or is it a norm, should it be public or not and many other issues are high on the agenda nowadays. The children’s literature is another sphere, which is properly considered in the modern world as a really important phenomenon of the modern life. In the book â€Å"Daddy’s Roommate† by Willhoite (1990) these issues are correlated. Whether children literature should illustrate phenomenon of homosexuality or not is argued further on. Thesis: In spite of different stereotypes, gay relationships are present in the modern world and there is no need to avoid this demonstration of the world’s diversity. It is better to position gay relationships as another kind of love, which is the way to happiness, as the author of the book claims. Summary The book â€Å"Daddy’s Roommate† by Willhoite shows to the modern readers a challenging problem of living in family of two gays. Basically, homosexual parents do not differ from heterosexual parents. There is a strong emotional bound between two parents and a boy. They go shopping, gardening, making trips to the zoo. There are affectionate relationships between these two parents and boy is growing up surrounded with a great care and tolerance. There is a friendly atmosphere in their family. For this small boy being gay is just another kind of love. It is not a socially perverted representation of love it does not violate moral norms and it is not against social stereotypes. Analysis There are equal incongruities between gay couples and heterosexual couples: the author presents that there are even fights between two gay parents (Willhoite 1990, pp.8-12), but it is possible to underline that heterosexual couples are often quarrel and even fight. Moreover, the book does not promote gay love, it tells about gay love as about another kind of love. There is a story about two adult men, who are gay. They are not young and their relationship is stable. There is a tendency to establish short-term love relationship among heterosexual young people, as well as among homosexual young people. The point of the book is different. It informs about gay relationships, it neither criticizes nor promotes it. Gay relationship is shown as is. The book shows that in the course of time there is a natural necessity to appreciate the beloved person and there is a need to contribute much into the development of mutual happiness. Gay family is positioned as a final point of two lonely hearts’ wanderings. Both men are pacified and put their mutual efforts into social development, social activity etc. The ban In spite of criticism against the book, there are also proponents of the book and they argue against the book’s ban. On January 20, 1998, the Hays (K ansas) public library board showed antagonistic moods against the book’s ban. Their main claim coincided with the main claim of a small boy, the main character of the book. This book was another depiction of love and a homosexual life style did not differ much from life style of other couples. In accordance with the moods of the Library Director Melanie Miller: â€Å"I do not believe in restricting access to those child library patrons who would benefit from the book because there are parents who do not believe that their children should have access to the material† (Nava and Dawidoff 1995, p. 34). Another claim is made by the Brevard County (Florida) Library Board, which removed the book from the library shelves. The members of the Christian Coalition made an emphasis on the absence of necessity to leave the book in the library. As a result, de facto censorship was criticized by the readers. There is an evident struggle against the book and in 1999 the Nampa (Idaho) L ibrary Board decided to leave  Daddy’s Roommate  and  Heather Has Two Mommies  in the juvenile nonfiction section. The staff of the library claims that there is no book, which would be acclaimed by all parents to the

Thursday, October 31, 2019

2008 Economic Crisis in the U.S. and media connection Assignment

2008 Economic Crisis in the U.S. and media connection - Assignment Example While millions of people have spent their lives adhering to this American dream, there have been periods throughout our history where tireless amounts of work and sacrifice have not been able to stop the economy of this nation from crashing down upon the very people who work endlessly to build it. Nearly five years ago, 2008 was no exception as the core of the American economy crumbled beneath the people of this nation who were standing upon it to bolster their careers, their lives and their homes. As this recession immediately spurred talk of the next Great Depression, the American people as well as the rest of the world watched in varying states of horror as the media depicted an economic downfall which the country was not prepared for. The purpose of this paper is to establish that the America people give the media almost an absolute power in determining what we believe, see, think and feel about the world around us. In order to demonstrate the proposed goal of this literary work, the following pages will first define the â€Å"economic crisis† the country faced and then will break into discussions on how the media covered the events which unfolded in the midst of such a crisis at both a national and international level. Economic Crisis Upon its arrival, the 2008 economic crisis left families decimated and crippled the financial outlook of this nation. As soon as the reality of what was happening became apparent, the media became fixated with determining a cause and definition for this crisis. Initially after the crisis, news media turned to the experts and featured a high number of guest experts who could immediately pinpoint causes of the economic situation. One such example comes from the Accuracy in Media group with a guest column from financial expert James Davis. According to Davis, an international bank analyst, the complete downfall which caused the 2008 financial crisis was caused by faulty bank lenders (2008). From a media perspective, using these analysts in such a heavy rotation placed incredible emphasis on their words to the public. Essentially, whatever reasoning these analysts were giving were becoming the scapegoats of the financial crisis with heavy rotation of media coverage. In 2011, the New York Times was able to compile and pinpoint key causes of this economic crisis. According to the article, the economic crisis can be defined as the combination of â€Å"widespread failures in government regulation, corporate mismanagement and heedless risk-taking by Wall Street,† (Chan, 2011). In addition to these components, the New York Times also highlights that the key parts of these economic failures included a factor of American life which affected nearly all people in the country – the real estate market. As Chan wrote, the economic crisis can be defined as a â€Å"calamitous concoction – shoddy mortgage lending, excessive packaging and sale of loans to investors and risky bets on securities b acked by the loans† (2011). With the gravity of the situation recognized by news organizations, the chain of events was quickly dubbed an â€Å"economic crisis† as the amount of families standing to lose their homes was staggering. According to Baily, Litan and Johnson in â€Å"The Origins of he Financial Crisis,† the issues which were at the center of the economic crisis included faulty lending practices in the form of adjustable rate mortgages (ARMs) and allowing homebuyers to purchase homes with no money down, substandard financial portfolios and credit default swaps (2008). As the housing market buckled in the wake this crisis, financial panic spread through America with

Tuesday, October 29, 2019

U.S History Review Essay Example for Free

U.S History Review Essay It is important to study the history of the U. S because it helps us to learn about the people of America and even about American societies. It also helps us understand how these people or the societies usually behave. This is because history tends to base evidence on analyzing and contemplating about how societies function not only nowadays, but from the past. Examining the history of the U. S can help us understand the changes of the society from the very past up to the state they are in today (Crabtree, 1993). Further, studying U. S history can make us understand Americas’ political progress from the past to date. We thus can be informed on the shape of the politics in the past and the major developments. Moreover we can even look into the factors that caused changes in the various American political parties. Conversely, historical analyses of voter turnout in key American elections and the associated evolution can make us understand some of the problems American people face today. This can also enable us to understand the present political health of the U. S (Steele, 2009). Moreover, we can understand economic changes in America and factors or policies that the government used to see their economy rising. This information can also help any other nation to improve their economy (Crabtree, 1993). Conversely, the cultural values of the American people can be understood by studying the history of U. S. We can understand the issues of the past by having a look at how people used to live in the past ages which serve as a sense of excitement and beauty (Steele, 2009). Studying the history of America can make one grow psychologically. This can broaden one’s mind besides making somebody to understand how they can solve problems as they come using facts that were used by philosophers in the past (The Manhattan Institute). References Crabtree, D. (1993). The Importance of History. Retrieved 8th June 2010, from http://www. mckenziestudycenter. org/society/articles/history. html Steele, D. D. (2009). The Importance of Local History. Charleston, SC: BiblioBazaar, LLC. The Manhattan Institute. Why Study War? Victor Davis Hanson, City Journal Summer 2007. Retrieved 8th June 2010, http://www. city-journal. org/html/17_3_military_history. html

Sunday, October 27, 2019

Type A Personality Implications with Stress Related Illness

Type A Personality Implications with Stress Related Illness VULNERABILITY OF TYPE A PERSONALITY  TO STRESS-RELATED ILLNESSES  DUE TO THEIR ERRATIC PERSONA Angelica Marie C. Jarabe Outline Type A personality is prone to stress-related illness because of their 3 major negative characteristics and attitudes towards work. Introduction â€Å"It’s not the stress that kills us; it our reaction to it.† – Hans Selye. Stress is inevitable part of our existence. The self-imposing reaction of our body and mental capacity to different situations, events, and even in our environment is also cause by our different dominant behaviour or so called â€Å"persona.† It is the one that affects our way of coping and perceiving stress. Stress sometimes consumes our inner ability to grasp the essence of living. We feel stress when we get bogged down by problems, deadlines, realistic desires, and uncontrollable events on our lives. They say that it is our choice on how we response to those circumstances. Sometimes we either take it as a negative or positive but the truth is it is natural mechanism of our body. According to a book entitled Introduction to Psychology (Aguire, 2008), â€Å"stress may be the difficult word to define†. It is because we have different way of responding in such circumstances when people experience stress. This response is based on person’s perception and evaluation of oneself to the nature of events. The differences of the way we respond to a situation are cause by our personality. Higher risk of illnesses can be linked with one of the type of personality which so called Type A personality. Type A personality is prone to stress-related illness because of their 3 major negative characteristics and attitudes towards work. Type A personality is prone to stress-related illness because of their 3 major negative characteristics and attitudes towards work. Discussion One of the factors that contribute to the development of chronic diseases and illness is being linked by our repetitive pattern of behaviour and our unique personality. Our personality defined as our pure and total makeup of ourselves which includes thoughts, habits, attitudes, weaknesses, strengths, and deepest fears. (Nevid, Rathus Greene, 2000, p.158) Sometimes we feel and considered that stress is brought by some changes in our environment. In fact, even we are the major contributor of stress. Based on what I found, psychologist stated that people carries a lot of destructive thoughts and unreasonable beliefs which afflicted our normal living. (Morris Maisto, 2006, p. 359) Some features of our unique makeup can have positive and negative effects to our health. A person being optimistic and appreciative can impose a positive effect to one’s health. They tend to see the good things even in worse situation. As a result, they are capable to strive and have a positive outlook in life. Others manifest challenging situation as a negative part of their success. Those personalities being engage to certain erratic persona are so called Type A personality increases the effects of major stress-related health problems. (Morris Maisto, 2006, p. 359) I found out that there are some findings that relate stress to certain illnesses like coronary heart disease, headaches, hypertension and even cancer. (Aguirre, 2008, p. ) Based on observation in 1950 carried out by the two cardiologists Friedman and Rosenman, who are trying to found out the relation of personality to heart disease, those patients who are short-tempered and easily irritated has a higher risk of developing heart disease. This brought to a theory which accompany as a certain type of behaviour – Type A behaviour pattern (TABP). (Saul McLeod, 2011). According to my gathered data, these are the following facet of Type A personality: Ambitious – Type A individual are driven to compete and has a critical evaluation of oneself in terms of achievement and success. They tend to complicate certain situations and being doubt by their irrational beliefs. Time-consciousness – They always set their priorities and task with a timeframe and deadlines. Most frequently, they easily irritated if they encountered certain delays and tight schedule situations. Because of that, they tend to be in a hurry and simultaneously do their work. Aggressive – This is the most dominant behaviour characterized by Type A personality. Due to certain negative perception of any situation they often feel frustrated and angry. This shows direct relation to the development of heart disease. (Adapted from Saul McLeod, 2011) These are the following criteria to test if a person possesses a trait of Type A personality: Usually feel guilty if they used their spare time to relax and do nothing for few days. Competitive in different ways and not being content within themselves. Do their work more than at a time. Move, eat and walk quickly Prefer to read concise concepts rather than the whole content of the book. Lose patience and irritated if they encountered delays, traffic, and unfortunate events. Tend to evaluate their achievement and success by quantities. Make different gestures like fingers drumming, teeth grinding and fist pounding. Things must be done in certain set of time. Over think of their problems even when they doing something or talking to someone. (As cited in Coon, 2006, p. 443) According to Rathus (2007), â€Å"Many health problems are affected by psychological factors, such as attitudes, emotions, and behaviour.† These are the following serious health problems that also being linked to Type A behaviour Pattern: Coronary Heart Disease (CHD) – As cited in Rathus (2007), â€Å"It is the leading cause of death in United States.† It is characterized as by the decreasing of supply of oxygen in the heart and result to hardening of arteries (arthrosclerosis). I found that the incidence of having this disease is also cause by our attitudes and emotions to certain situation in life. Severe stress and negative emotional response has a huge impact to our immune system. Based on a research conducted in people with Type A personality, found out that the dominant behaviour which is hostility contribute to the increase of blood pressure in the body, high cholesterol level and clogging of arteries which may be a serious threat to their health. (Rathus, 2007, p. 388) Headaches – According to one study I found, about 53% people are susceptible to migraine headaches showed a Type A behaviour pattern. This throbbing pain of head can be triggered by some psychological factors like anxiety, depression and exposed to extreme stressful conditions. (Rathus, 2007, p. 386) Cancer – Based on my researches, there is no direct evidence that stress can cause cancer. However, stress weakens our immune system and can cause various changes in the functioning of other system in the body. One study conducted to show the effects of emotional stress to the development of cancer cells. The condition of producing and spreading of cancer cells happen in the stage called â€Å"metastasis†. Based on the laboratory results conducted to mice and human which are subjected with cancer. When they are under influence of stress their system produce a hormone called norepinephrine. Thus, that hormone will boost the growth and spread of cancer cells in the body. (â€Å"Psychological†, 2002) Type A personality is prone to stress-related illness because of their 3 major negative characteristics and attitudes towards work.

Friday, October 25, 2019

Sports And Money :: essays research papers

Anywhere you look today you can see Mark McGwire hitting a home run, or Kobe Bryant dunking over someone. Every time someone watches television or reads a newspaper these, and many other, athletes can be found. Professional sports are all around us; they're a part of our culture. But, in the last few decades some changes have started to take place. As the popularity of professional athletics has increased, so has the cost to render them and their players' salaries. Many of the contracts signed today are for millions of dollars. This is unreasonably exorbitant for doing something gaiety. These days sports are centered around money and not focused on the love for the game and entertaining the fans.   Ã‚  Ã‚  Ã‚  Ã‚  Some economists argue the point that major league sports, their products, players, and stadiums endow millions of dollars to our economy. This is true, but the 'fine print'; that goes along with it is often overlooked. Stadiums, for example, cost millions of dollars to build, maintain, etc. The funds to do this are provided by the tax paying citizens of that city. Many teams then, in return, relocate to other cities in search of more money and better facilities. This is no way to reward fans for years of loyal support. There are many programs, scholarships, foundations, etc. formed by many players and organizations though. These are good ways to give back to the communities that sustain them and use their grand salaries in a nice, resourceful manner.   Ã‚  Ã‚  Ã‚  Ã‚  Now the major appeal of playing in the 'big leagues'; is landing big contracts and getting endorsements; instead of a higher, superior level of competition. A prime example of this is Elton Brand, who bypassed his junior and senior year at Duke to go directly to the NBA. Another athlete looking for a big paycheck is Kevin Brown, who recently signed a $105 million dollar contract with the Los Angeles Dodgers. This is an outrageous remuneration for someone that plays a game. Not only are athletes overpaid, many ignore the rules of etiquette that come along with being in the major leagues.

Thursday, October 24, 2019

It Report on Networking

CHAPTER ONE 1. 0INTRODUCTION 1. 1BACKGROUND SIWES was established by ITF in 1973 to solve the problem of lack of adequate practical skills preparatory for employment in industries by Nigerian graduates of tertiary institutions. The Scheme exposes students to industry based skills necessary for a smooth transition from the classroom to the world of work. It affords students of tertiary institutions the opportunity of being familiarized and exposed to the needed experience in handling machinery and equipment which are usually not available in the educational institutions.Participation in Industrial Training is a well-known educational strategy. Classroom studies are integrated with learning through hands-on work experiences in a field related to the student’s academic major and career goals. Successful internships foster an experiential learning process that not only promotes career preparation but provides opportunities for learners to develop skills necessary to become leaders in their chosen professions. One of the primary goals of the SIWES is to help students integrate leadership development into the experiential learning process.Students are expected to learn and develop basic non-profit leadership skills through a mentoring relationship with innovative non-profit leaders. By integrating leadership development activities into the Industrial Training experience, we hope to encourage students to actively engage in non-profit management as a professional career objective. However, the effectiveness of the SIWES experience will have varying outcomes based upon the individual student, the work assignment, and the supervisor/mentor requirements.It is vital that each internship position description includes specific, written learning objectives to ensure leadership skill development is incorporated. Participation in SIWES has become a necessary pre-condition for the award of Diploma and Degree certificates in specific disciplines in most institutions of hig her learning in the country, in accordance with the education policy of government. Operators-The ITF, the coordinating agencies (NUC, NCCE, NBTE), employers of labor and the institutions. Funding-The Federal Government of Nigeria Beneficiaries- Undergraduate students of the following:Agriculture, Engineering, Technology, Environmental, Science, Education, Medical Science and Pure and Applied Sciences. Duration -Four months for Polytechnics and Colleges of Education, and Six months for the Universities. 1. 2 OBJECTIVES 1. SIWES will provide students the opportunity to test their interest in a particular career before permanent commitments are made. 2. SIWES students will develop skills in the application of theory to practical work situations. 3. SIWES will provide students the opportunity to test their aptitude for a particular career before permanent commitments are made. 4.SIWES students will develop skills and techniques directly applicable to their careers. 5. SIWES will aid st udents in adjusting from college to full-time employment. 6. SIWES will provide students the opportunity to develop attitudes conducive to effective interpersonal relationships. 7. SIWES will increase a student's sense of responsibility. 8. SIWES students will be prepared to enter into full-time employment in their area of specialization upon graduation. 9. SIWES students will acquire good work habits. 10. SIWES students will develop employment records/references that will enhance employment opportunities. 1. SIWES will provide students with an in-depth knowledge of the formal functional activities of a participating organization. 12. SIWES will provide students the opportunity to understand informal organizational interrelationships. 13. SIWES students will have higher levels of academic performances. 14. SIWES will increase student earning potential upon graduation. 15. SIWES Students will be able to outline at least five specific goals with several staff members by comparing perf ormance with job duties and develop a draft plan with staff to accomplish performance needs, supervision plan and rewards. . 3BRIEF HISTORY OF THE ESTABLISHMENT OF ATTACHMENT The Information communication Department in the Governor’s office was first established in 2003 as a unit by the then Governor of the State, Governor Donald Duke. In 2007 it became a Department with Nine Units namely, 1. Training unit 2. Maintenance unit 3. Networking unit 4. Information system application 5. Audit unit 6. Account unit 7. PRS unit 8. Administration 9. Support unit 1. 4BRIEF DUTIES OF EACH UNITTRAINING UNIT- this unit does the training of students in Computer literacy and also runs a certificate program in CCNA and project management, comptia A+ MAINTENANCE UNIT- This Unit is in charge of maintenance of all computer systems in the department NETWORKING UNIT- This unit is in charge of Network administration in the department and in all the MDAs and the Governor’s office, this unit t akes care of the states network affairs INFORMATION SYSTEM APPLICATION UNIT- This unit is in charge of the database of the establishment Support unit- this unit is in or supports the network unit in network administration.GOALS Vision to be a leading ICT driven state in the country Mission to create an information rich, knowledge driven society RESPONSIBILITIES Is to make sure that we meet our client requirement and need in the various MDA and give them better service delivery CHAPTER TWO 2. 0 LITERATURE REVIEWIn the course of my training with the ICT Department in Governor’s Office I was privileged to work with the support Unit which is in charge of administration of the Cross River State Network the Cross River State Network this works with the Database Center at the Governor’s Office where the Network Operating Centre(NOC) is Located This Units is in charge of the network and makes sure that all Ministries Departments Agencies are Connected to the network at all tim es, in case of Network breach the units does troubleshooting to rectify the problems as fast as possible. . 1NETWORK DOMAIN AND ADMINISTRATION. (SUMMARY ON THE CROSS RIVER STATE NETWORK) Cross River State Network uses a domain to organize the network environment. Domains are groups of PCs on the same network and are a method to isolate communications between the members in the domain and the other data traffic. Anyone in a domain can communicate with each other and out bound, however PCs not defined in the domain cannot communicate with those in the domain.Basically the network starts from when the satellite in space sends radio signals down to the satellite dish receiver (ku-band, ka-band, c-band e. t. c). This satellite dish receiver is connected to the private port of the internet modem then the public port of the modem is connected to the ISA server which acts as the gateway to internet access. The ISA server is connected to a domain controller which controls the domain environm ent by granting anyone who has a registered account on the domain access to the internet recourse.I. e. anyone who does not have an account or valid log on credentials cannot use the internet. Domain controller can also be used to control the network environment by restricting the rights to chance setting on the workstation so that only administrative rights can alter settings. The ISA server is also connected to an antivirus server which monitors the automatic updates and downloading of update for all workstation in the domain with a specific antivirus used for the network installed on them.The ISA server is also connected to a 24 port switch which is connected to the different switch cabinet in each directorate of office buildings (since it is a 24 port switch it take a maximum of 23 directorates, another switch can be connected to the first switch in case of more buildings). Ever building has a cabinet where LAN (local area network) connections are distributed to different office s. The cabinet comprises of switches and patch panels. The patch panel is a device that is used as a repeater so that signals don’t get loss over a long cable.One of the cables that comes from the main 24 port switch goes to the patch panel then a RJ-45 cable is connected from the patch panel to the switch (mostly a 24-port switch) in the cabinet (in case of two switches we have two patch panels. ). The patch panel then distributes the connection in the office or to other offices in the building as LAN port where workstations can be connected to by the use of RJ-45 cable (workstations can also be connected directly to the switch). As for wireless connection, a wireless router or access point is placed at every passage way in each building.The wireless access point is either connected to one of the switches in the cabinet or the main 24-port switch. 2. 2 ISA SERVER/PROXY SERVER/GATEWAY The ISA server also acts as a proxy server/gateway. A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. A proxy can also do logging. A user on a workstation which is connected to the domain can only view the internet if the address and port number of the ISA server is set in the proxy address and port settings. 2. 3 HOW TO SET THE PROXY SETTINGS: †¢STEP 1: Click tools then click internet options on the browser. STEP 2: Click on the connection tab and then click LAN settings. †¢STEP 3: Type in the ISA server ip-address ( e. g. 192. 168. 2. 1) in the address box and also insert the port number (e. g. 3128). 2. 4 HOW TO JOIN A WORKSTATION TO A DOMAIN STEP 1: right-click on my-computer then clicks properties. STEP 2: click on system properties. STEP 3: Click on computer name tab, click change. STEP 4: Type in the computer name (e. g. pro 10), then click the domain radio button and type in the domain name (e. g. dpetri. net), then click ok.STEP 5: After clicking OK you would prompt with a username and password dialog box where only those with administrative credentials would be able to logon. Type in the user name and password, and then click OK. STEP 5: After clicking OK, you would be prompted with a dialog box welcoming you to the domain. Then restart the system. 2. 5 ANTIVIRUS SERVER The antivirus server is a separate system that is connected to the ISA server. It is used to protect the network from harmful treats like spyware (i. e. worm, virus, adware e. t. c. ).The antivirus server makes use of wi ndows server 2003 operating system, with a network antivirus (e. g. e-trust) installed on it. For any workstation on the network to be protected by the network antivirus server a copy of the network antivirus must be installed on them. To make the antivirus copy work with the antivirus server the proxy settings must be set using the antivirus server Ip-address (e. g. 192. 168. 2. 4) as the address in the proxy settings. 2. 6 MAIN SWITCH The main switch is a switch that is used to distribute the network connection to different buildings.A switch is a device that is used to link systems or workstations together. A switch is mainly used in a star topology. Properties of a switch: †¢Collision: this is the jamming of signal in a transmission medium. †¢Collision domain: this is the environment in which collision occurs. †¢ Broadcast: this is the sending of signal from a system to the rest of the system connected to the switch. A broadcast is usually sent across all the coll ision domains as one virtual domain. †¢Broadcast domain: this is the environment in which a broadcast is sent across. Multicast: this is the sending of signal from one system to a selected group of systems connected to the switch. †¢Unicast: this is a signal that is sent from one system to another. 2. 7PATCH PANEL A patch panel is a panel of network ports contained together, usually within a telecommunications closet that connects incoming and outgoing lines of a LAN or other communication, electronic or electrical system. In a LAN, the patch panel connects the network's computers to each other and to the outside lines that enable the LAN to connect to the Internet or another WAN.Connections are made with patch cords. The patch panel allows circuits to be arranged and rearranged by plugging and unplugging the patch cords. The use of a patch panel is necessary because is help to repeat signals travelled over a cable from a long distance to prevent data loss. A patch panel i s connected to a switch respectively according to the number on each port of both the switch and patch panel. 2. 8 ROUTER/VPN A router is a device or a computer that is used to connect two or more networks together. Routers are physical devices that join multiple wired or wireless networks together.Technically, a wired or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects networks (as gateways do), and that the router operates at the network layer of the OSI model. A router can also be called a computer because it has a LAN-port, an operating system (OS) and memory. A router has an operating system and a user interface (depending on the brand of the router). The user interface can be viewed by connecting the router via LAN-cable to a computer. 2. 8 STEPS TO VIEW THE USER INTERFACE OF A ROUTER: Know the default IP-address of the router (usually 192. 168. 0. 1). †¢Connect the router to a computer. †¢Open a browser. †¢Click on the file tab. †¢Click on open then a dialog box appears. †¢ Type in the IP-address of the router in the text box and click OK, then a logon dialog box appears. The default username and password are both admin and admin. †¢ Type in the username and password then click OK. In the user interface you can change the Ip-address to suit your company setting, change the security protocol (i. e. either WAP, WAP2, WEB e. t. c), router name e. t. VPN: A VPN (virtual private network) is a device that uses a series of encryption and algorithms to secure the data transmitted over the public internet. It allows users to work on their company network from their home with a higher level of confidence that no one else can access their work i. e. it provides a level of encryption so that an outsider would not be able to hack in to the network. VPN eliminates distance between two computers and establish a secured connection with two computers. A VPN can also act as a router in the sense that it c an be used for connecting two or more networks together.CHAPTER THREE 3. 1HARDWARE AND MAINTAINNACE During the course of training I was also fortunate to receive lectures and training on comptia A+ that is hardware and maintenance which covered Knowledge on system maintenance as a whole approaches on how to prevent system damage. A computer system basically contains the following components/devices: System case, Mother board, Processor, Memory, Graphics card, Sound card, Modem, NIC Card, Hard disk CD-ROM/DVD-ROM Monitor. SYSTEM CASE: A system case is required to hold all your components together. It houses all the internal component of a system.The system cases come in two form factors which are AT and ATX. Nearly all the cases made nowadays are ATX as the motherboard manufacturers make majority of their motherboard in the ATX form. MOTHERBOARD: A motherboard is the central printed circuit board (PCB) in a computer that holds many of the crucial components of the system, while provi ding connectors for other peripherals. The motherboard is sometimes alternatively known as the main board, system board. PROCESSOR: The processor (CPU, for Central Processing Unit) is the computer's brain.It allows the processing of numeric data, information entered in binary form, and the execution of instructions stored in memory. The Central Processing Unit (CPU) is responsible for interpreting and executing most of the commands from the computer's hardware and software. It is often called the â€Å"brains† of the computer. MEMORY: A memory is the name given to a silicon chips that stores volatile computer data. The word Volatile means that the contents of memory will be lost if the power of the computer switched off. Memory stores some of your operating system and application data while it is being run.The more memory you have in your computer the higher the amount of application you can run simultaneously, and will provide an overall better system performance. Memory com es in different forms. The older system uses SDRAM, while Fig 3. 1 A typical system board The current system uses DDR-SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory). Fig 3. 2 3. 2. SYSTEM BOARD COMPONENTS Now that you understand the basic types of motherboards and their form factors, it’s time to look at the components found on the motherboard and their locations relative to each other Figure 3. illustrates many of the following components found on a typical motherboard: * Chipsets * Expansion slots * Memory slots and external cache * CPU and processor slots or sockets * Power connectors * Onboard disk drive connectors * Keyboard connectors * Peripheral port and connectors * BIOS chip * CMOS battery * Jumpers and DIP switches * Firmware CHIPSETS A chipset is usually designed to work with a specific family of microprocessors. Because it controls communications between the processor and external devices, the chipset plays a crucial role in determining system performance.The manufacturer of a chipset often is independent from the manufacturer of the motherboard. Current manufacturers of chipsets for PC-compatible motherboards include NVIDIA, AMD, VIA Technologies, Intel and Broadcom. There can only be two (2) chipsets in a computer namely Northbridge and Southbridge. NORTHBRIDGE The Northbridge links the CPU to very high-speed devices, especially main memory and graphics controller’s . The communications between the CPU and memory occur over what is known as the front side bus (FSB), which is just a set of signal pathways between the CPU and main memory.The Northbridge chipsets also manage the communications between the Southbridge Chipset and the rest of the computer SOUTHBRIDGE Southbridge connects to lower-speed peripheral buses (such as PCI or ISA). In many modern chipsets, the Southbridge actually contains some on-chip integrated peripherals, such as Ethernet, USB, and audio devices. A typical motherboard chipset for Pentium architecture. EXPANSION SLOTS The most visible parts of any motherboard are the expansion slots. These look like small plastic slots, usually from 3 to 11 inches long and approximately 1? 2 inch wide.As their name suggests, these slots are used to install various devices in the computer to expand its capabilities. Some expansion devices that might be installed in these slots include video, network, sound, and disk interface cards. If you look at the motherboard in your computer, you will more than likely see one of the Main types of expansion slots used in computers today: * ISA * PCI * AGP * PCIe Each type differs in appearance and function. In this section, we will cover how to visually identify the different expansion slots on the motherboard. ISA Expansion SlotsISA bus first appeared in PC based on 80286 CPU. The idea was to put a standard in interfacing with peripheral devices. In our days this bus is kept for compatibility with â€Å"legacy† peripheral devices such as B IOS ROM, Parallel and Serial Ports, Sound and Modem devices. These devices have historical fixed address range (no Plug and Play option) and aren't hurt by low speed of ISA bus (8/16 bit data bus with 8 MHz clock speed). Most modern PCs don't even have extra ISA slots since most peripheral components moved to PCI and USB. ISA bus requires 4 bus cycles for each data transfer. Fig 3. EXPANSION CARD AND SLOT PCI Expansion Slots PCI bus was developed by Intel for high performance peripheral devices, such as graphic accelerators, disk controllers, data acquisition boards. PCI was supposed to overcome limitations of existing ISA bus. 16 bit ISA bus with clock speed of 10 MHz with theoretical bus throughput 2M transfers/sec but practically not more than 500k. PCI bus is much faster: in burst mode PCI can transfer 32 or 64 bit data with 33 MHz or 64 MHz clock, that yields transfer rates from 132 MB/sec to 538 MB/sec, PCI supports huge address range: 32/64 bit address bus instead of 16 bit I SA.It is a burst oriented bus designed for large transfers; hidden bus arbitration among multiple musters is provided on each bus. In theory up to 32 logical devices can reside on PCI bus. But practically, a PCI bus is more likely to have maximum 10 devices because of its low-powered, reflected wave-switching. If more devices is desired PCI to PCI bridge is used. PCI devices are automatically configured in software (Plug and Play option). This eliminates earlier problems with ISA configuration using fixed addresses or user configured switches and jumpers.In recent years some peripheral devices have gotten faster and PCI became too slow for CD and hard disks. Then new interfaces appeared: IDE, SCSI. Fig 3. 4 PCI expansion slot AGP EXPANSION SLOTS AGP port When 3D graphics applications became common, graphic devices were still found on the PCI bus. AGP port provides high speed access to the memory and allows sharing it with local video memory. AGP is not a bus (no competition between devices sitting on the same bus), but port with a dedicated connection between North bridge and graphic accelerator.Speed is 264 MB/s – 1 GB/s Fig 3. 4 An AGP slot PCI EXPANSION SLOTS The newest expansion slot architecture that is being used by motherboards is PCI Express (PCI). It was designed to be a replacement for AGP and PCI. It has the capability of being faster than AGP while maintaining the flexibility of PCI. And motherboards with PCI will have regular PCI slots for backward compatibility with PCI. The diagram below illustrates Pentium IV system. You can see that ISA bus is gone and a new interface introduced: PCI Express. LPC is a subset of PCI (low pin count).PCI Express provides advanced features such as better power management, performance and bandwidth increases, enables support for streaming media, TV tuners, cameras, graphics. POWER CONNECTORS In addition to these sockets and slots on the motherboard, a special connector (shown in allows the motherboard to be connected to the power supply to receive power. This connector is where the ATX power connector plugs in. Fig 3. 5 An ATX power connector Central Processing Unit (CPU) and Processor Socket or Slot The â€Å"brain† of any computer is the central processing unit (CPU).This component does all the calculations and performs 90 percent of all the functions of a computer. There are many different types of processors for computers—so many, typically, in today’s computers, the processor is the easiest component to identify on the motherboard. It is usually the component that has either a fan or a heat sink (usually both) attached to it. These devices are used to draw away the heat a processor generates. This is done because heat is the enemy of microelectronics. Theoretically, a Pentium (or higher) processor generates enough heat that without the heat sink it would self-destruct in a matter of hours.Sockets and slots on the motherboard are as plentiful and varied as proc essors. Sockets are basically flat and have several rows of holes arranged in a square, as shown in Figure 1. 10. The processor slot is another method of connecting a processor to a motherboard, but one into which an Intel Pentium II or Pentium III–class processor on a special expansion card can be inserted. Fig 3. 6 Processors with a fan and heat sinks Fig 3. 7An example of a CPU socket Modern processors can feature the following: OVER CLOCKING: Over clocking your CPU offers increased performance, on a processor designed to operate at the over clocked speed.However, unlike with the processor designed to run that fast, you must make special arrangements to ensure that an over clocked CPU does not destroy itself from the increased heat levels. An advanced cooling mechanism, such as liquid cooling, might be necessary to avoid losing the processor and other components. 3. 3 COMPUTER MEMORY Computer RAM is the best known form of memory your computer uses. Every file or applicatio n opened is placed in RAM. Any information the computer needs or uses becomes part of a continuous cycle where the CPU requests data from RAM, processes it and then writes new data back to RAM.This can happen millions of times a second. However, this is usually just for temporary file storage, so unless the data is saved somewhere, it is deleted when the files or applications are closed 3. 4 HARD DISK DRIVE A hard disk drive (HDD), commonly referred to as a hard drive or hard disk, is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Strictly speaking, â€Å"drive† refers to a device distinct from its medium, such as a tape drive and its tape, or a floppy disk drive and its floppy disk.Early HDDs had removable media; however, an HDD today is typically a sealed unit with fixed media. Figure 3. 8 showing a Hard disk and its components. A hard disk drive stores information on one or more rigid, flat, disks. The disks are mounted on a spindle, with spacers in between, and a motor on the bottom end of the spindle. To read and write to the surface of the disks, the drive uses a small electro-magnet assembly, referred to as a head, located on the end of an actuator arm. There is one head for each platter surface on the spindle. The disks are spun at a very high speed to allow the head to move quickly over the surface of the disk.Towards the other end of the actuator arm is a pivot point, and at the end is a voice coil, which moves the head. Above and below each voice coil is a rare earth magnet. This allows the head to move towards the center of the disk or towards the outside, in a radial pattern. Fig 3. 9 Describing inside the HDD 3. 5 PREVENTIVE MAINTENANCE OF THE HARD DISK DRIVE The preventive measures are used to improve the performance of the hard disk. The primary tools or utilities available are: Scandisk: This utility can be used to scan surface for media errors, scan files and folde rs for data problem.Scan disk is run each time window is not properly shot down. You should run scan disk at least weekly to find and repair small error on disk before they become major problem. Disk Defragmentation: This utility is use to rearrange your disk files, combined and organized unused disk space so that application run faster. As we modify or delete file on hard disk, file become fragmented. The defragmenter eliminates fragmentation so that data in the file are readily available to program asking for it. Disk Cleanup/delete Unused File: This utility remove unnecessary file from your hard disk.This tool scan the disk you designate to fine files that can be removed without affecting the operation of the PC and the Window operating system. Backup: Backing up hard disk data to another storage media that can be stored outside the PC is also a preventive maintenance. This usually prevent hard disk against failure, PC problem hardware can be replaced but most often data cannot b e recovered, so making a backup copy of your file is a safety precaution that ensure that your data can be outlive on the device on which it is stored.Empty Recycle Bin: The recycle bin should always be emptied at least monthly in order to remove all deleted data, file, programs that are no longer needed. 3. 6 FLOPPY DISK DRIVES Floppy disks, also known as floppies or diskettes (where the suffix -ette means little one) were ubiquitous in the 1980s and 1990s, being used on home and personal computer (â€Å"PC†) platforms such as the Apple II, Macintosh, Commodore 64, Atari ST, Amiga, and IBM PC to distribute software, transfer data between computers, and create small backups.Before the popularization of the hard drive for PCs, floppy disks were typically used to store a computer's operating system (OS), application software, and other data. Many home computers had their primary OS kernels stored permanently in on-board ROM chips, but stored the disk operating system on a flopp y, whether it be a proprietary system, CP/M, or, later, DOS. Since the floppy drive was the primary means of storing programs, it was typically designated as the ‘A:' drive. The second floppy drive was the ‘B:' drive.And those with the luxury of a hard drive were designated the ‘C:' drive, a convention that remains with us today long after the decline of the floppy disk's utility. Fig 3. 10 CD-ROM DRIVES Figure3. 10 showing Old 4x CD-ROM DRIVE CD-ROM discs are read using CD-ROM drives, which are now almost universal on personal computers. A CD-ROM drive may be connected to the computer via an IDE (ATA), SCSI, SATA, Fire wire, or USB interface or a proprietary interface, such as the Panasonic CD interface.Virtually all modern CD-ROM drives can also play audio CDs as well as Video CDs and other data standards when used in conjunction with the right software. 3. 7 INSTALLING THE HARDWARE COMPONENTS OF A COMPUTER SYSTEM Things to get in place before starting: Set of sc rewdrivers and pliers, Piece of cloth, CPU Thermal compound (recommended), PC components. Make sure you have all the components in place and a nice, clean and big enough place to work with. Fig 3. 11 All PC components accept the case Tip: CPU Thermal compound is not a necessity but it is recommended to keep your CPU cool under load conditions by helping heat dissipate faster.It is a must if you intend to over clock your PC. Installing the motherboard Fig 3. 12. Open the side doors of the cabinet Lay the cabinet on its side Put the motherboard in place Drive in all the required screws Most motherboards come with an antistatic bag. It is advisable to put the motherboard on it for some time and then remove it from the antistatic bag before placing it in the cabinet. Fig 3. 13 Step 1 Installing the CPU CPU is the heart of a computer so make sure you handle it properly and do not drop it or mishandle it. Steps 1 * Lift the CPU lever on the motherboard Place the CPU properly on the mother board * Pull down the lever to secure the CPU in place Warning: Do not try to push the CPU into the motherboard! Step 2 Got the thermal compound? Now is the time to use it. Take small amount of it and carefully apply it on the top surface of the processor. Be careful not to put it on the neighboring parts of the motherboard. If you do so clean it immediately using the cloth. Tip: Thermal compounds should be changed once every six months for optimal performance. Step 3 installing the heat sink Fig 3. 15 After installing the processor we proceed to installing the heat sink.There are different kinds of heat sinks that are bundled with the processor and each has a different way of installation. Look into your CPU manual for instructions on how to install it properly. Place the heat sink on the processor Put the jacks in place Secure the heat sink with the lever After this you will need to connect the cable of the heat sink on the motherboard. Again look into the motherboard manual on wh ere to connect it and then connect it to the right port to get your heat sink in operational mode. Installing the RAM Fig 3. 16 Installing the RAM is also an easy job.The newer RAMs that is DDR RAMs are easy to install as you don’t have to worry about placing which side where into the slot. The older ones, SDRAMs are plagued by this problem. Push down the RAM into the slot Make sure the both the clips hold the RAM properly Installing the power supply Fig 3. 17 Installing the power supply as the components we install after this will require power cables to be connected to them. There is not much to be done to install a PSU. Place the PSU into the cabinet Put the screws in place tightly Tip: Some PSU have extra accessories that come bundled with it. Consult your PSU manual to see how to install them.Step 6: Installing the video card Fig 3. 18 First you will need to find out whether your video card is AGP or PCI-E. AGP graphics cards have become redundant and are being phased ou t of the market quickly. So if you bought a spanking new card it will certainly be a PCI-E. * Remove the back plate on the cabinet corresponding to the graphics card * Push the card into the slot * Secure the card with a screw * Plug in the power connection from PSU (if required) High-end graphics cards need dedicated power supply and if your graphics card needs one then connect the appropriate wire from PSU into the graphics card.Step 7: Installing the hard disk Fig 3. 19 Hard disk is another fragile component of the computer and needs to be handled carefully. Place the hard drive into the bay Secure the drive with screws If the jumpers or switches are set for the only hard drive or master role, move on. If the jumpers or switches are not configured correctly, move them to the correct position with your needle-nose pliers or your tweezers. Connect the power cable from PSU Connect the data cable from motherboard into the drive If your hard drive is a SATA one then connect one end of SATA cable into the motherboard and other into the SATA port on the hard disk.If your hard disk is PATA type then use the IDE cable instead of the SATA cable. Tip: If your PSU does not support SATA power supply then you will need to get a converter which will convert your standard IDE power connector to a SATA power connector. Fig 3. 20 Testing the Hard disk installation Verify that a monitor, keyboard, and mouse are connected to the PC. Make sure the power cord is connected and that the computer is receiving power. Power up the unit and watch the boot. Step 9: Connecting various cables Fig 3. 21 First we will finish setting up internal components and then get on to the external ones.You will need to consult your motherboard manual for finding the appropriate port for connecting various cables at the right places on the motherboard. Connect the large ATX power connector to the power supply port on your motherboard. Next get hold of the smaller square power connector which supplies power to the processor and connect it to the appropriate port by taking help from your motherboard manual. Connect the cabinet cables for power, reset button in the appropriate port of the motherboard. Connect the front USB/audio panel cable in the motherboard Plug the cable of cabinet fansYou are done with installing the internal components of the PC. Close the side doors of the cabinet and get it upright and place it on your computer table. Get the rest of the PC components like monitor, keyboard, mouse, speakers etc. which we will connect now. Connect the VGA cable of the monitor into the VGA port If mouse/keyboard is PS/2 then connect them to PS/2 ports or else use the USB port Connect the speaker cable in the audio port Fig 3. 22 Plug in the power cable from PSU into the UPS Also plug in the power cable of the monitor You are now done with setting up your PC.Power on and see your PC boot to glory. Step 10: Installing Operating System Here are some useful steps enter your BIOS s ettings instruct the computer to boot from the CD –ROM, insert a bootable disk fold your arms and watch your PC boot to Glory. CHAPTER FOUR 4. 1 NETWORKING AND NETWORK CABLES Knowledge gained on Networking Network is a group of connected computers. This can be as small and simple as two (2) computers connected together or as large and complex as a multisite network that supports thousands of computers and printers and other device.Networking allows for increased communication (video conferencing, real-time chats, e-mailing etc), hardware and software resources sharing (printers, drives, data, files application etc) and Data back up and retrieval. Network models can be any of peer-to-peer or client/server model. Types of network include LAN (Local Area Network), WAN (Wide area network), MAN (Metropolitan Area Network), Virtual LAN, Virtual Private Network, (VPN). 4. 2 NETWORK DEVELOPMENT COMPONENTS Components used to develop a network can be classified broadly into 2 that is H ardware and software The Hardware components include * Computers Modems * Interfaces * Peripherals * Networking cards * Cabling – UTP, STP, Fiber Optics, coaxial * Interconnecting devices, e. g. repeaters routers, hubs, NIC, switches, bridges The software includes operating system (such as MS Dos, UNIX, protocols and other software tools supporting the data communication across the network. The number of components (software and hardware) depends on a number of factors like, type of Network to be used, number of workstation, hosts, PC terminals other peripheral devices to be connected to the Network, data volume, speed of transmission, application program and services required. . 3 MAIN TYPES OF NETWORK TOPOLOGIES In networking, the term â€Å"topology† refers to the layout of connected devices on a network. This article introduces the standard topologies of computer networking. One can think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find an actual ring topology there. Network topologies are categorized into the following basic types: * Star Topology Ring Topology * Bus Topology * Tree Topology * Mesh Topology * Hybrid Topology More complex networks can be built as hybrids of two or more of the above basic topologies. Star Topology: Many home networks use the star topology. A star network features a central connection point called a â€Å"hub† that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. If the hub fails, however, the entire network also fails. ) See the illustration of Star Network Topology. Fig 4. 1 Advantages of a Star Topology * Easy to install and wire. * No disruptions to the network then connecting or removing devices. * Easy to detect faults and to remove parts. Disadvantages of A Star Topology * Requires more cable length than a linear topology. * If the hub or concentrator fails, nodes attached are disabled. * More expensive than linear bus topologies because of the cost of the concentrators. The protocols used with star configurations are usually Ethernet or Local Talk.Token Ring uses a similar topology, called the star-wired ring. Star-Wired Ring: A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring. The Token Ring protocol uses a star-wired ring topology. Ring Topology: In a ring network, every device has exactly two neighbors for communicatio n purposes. All messages travel through a ring in the same direction (either â€Å"clockwise† or â€Å"counterclockwise†).A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses. See the illustration of Ring Topology. Fig 4. 2 Bus Topology: Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector.A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 (â€Å"Thin Net†) and 10Base-5 (â€Å"Thick Net†) both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result.In addition, if the backbone cable fails, the entire network effectively becomes unusable. See the illustration of Bus Network Topology. Fig 4. 3 Advantages of a Linear Bus Topology * Easy to connect a computer or peripheral to a linear bus. * Requires less cable length than a star topology. Disadvantages of a Linear Bus Topology * Entire network shuts down if there is a break in the main cable. * Terminators are required at both ends of the backbone cable. * Difficult to identify the problem if the entire network shuts down. * Not meant to be used as a stand-alone solution in a large building.Tree Topology: Tree topologies integrate multiple star to pologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus and each hub functions as the â€Å"root† of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone. See the illustration of Tree Network Topology. Fig 4. 4 Advantages of a Tree Topology Point-to-point wiring for individual segments.Supported by several hardware and software vendors. Disadvantages of a Tree Topology Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies. Mesh Topology: Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths fro m source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction. Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others. See the illustration of Mesh Network Topology. Fig 4. 5 Hybrid Topology A combination of any two or more network topologies. Note 1: Instances can occur where two basic network topologies, when connected together, can still retain the basic network character, and therefore not be a hybrid network.For example, a tree network connected to a tree network is still a tree network. Therefore, a hybrid network accrues only when two basic networks are connected and the resulting network topology fails to meet one of the basic topology definitions. For example, two star networks connected together exh ibit hybrid network topologies. Note 2: A hybrid topology always accrues when two different basic network topologies are connected. 4. 4 Network Adapters There are many different names for network adapters, including network cards, Network Interface Cards, NICs. These are all generic terms for the same piece of hardware.A network card’s job is to physically attach a computer to a network, so that the computer can participate in network communications. The first thing that you need to know about network cards is that the network card has to match the network medium. The network medium refers to the type of cabling that is being used on the network. Wireless networks are a science all their own, and I will talk about them in a separate article. At one time making sure that a network card matched the network medium was a really big deal, because there were a large number of competing standards in existence.For example, before you built a network and started buying network cards and cabling, you had to decide if you were going to use Ethernet, coaxal Ethernet, Token Ring, Arcnet, or one of the other networking standards of the time. Each networking technology had its strengths and weaknesses, and it was important to figure out which one was the most appropriate for your organization. Today, most of the networking technologies that I mentioned above are quickly becoming extinct. Pretty much the only type of wired network used by small and medium sized businesses is Ethernet. This is what an Ethernet card looks likeFig 4. 6 4. 5 UTP CABLE TYPES UTP cabling, terminated with RJ-45 connectors, is a common copper-based medium for interconnecting network devices, such as computers, with intermediate devices, such as routers and network switches. Different situations may require UTP cables to be wired according to different wiring conventions. This means that the individual wires in the cable have to be connected in different orders to different sets of pins in the RJ-45 connectors. The following are main cable types that are obtained by using specific wiring conventions: * Ethernet Straight-through Ethernet Crossover * Rollover Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place. This is a common error in the lab and checking that the device connections are correct should be the first troubleshooting action if connectivity is not achieved. Unshielded twisted-pair (UTP) cabling, as it is used in Ethernet LANs, consists of four pairs of color-coded wires that have been twisted together and then encased in a flexible plastic sheath.The twisting has the effect of canceling unwanted signals. When two wires in an electrical circuit are placed close together, external electromagnetic fields create the same interference in each wire. The pairs are twisted to keep the wires in as close proximity as is physically possible. When th is common interference is present on the wires in a twisted pair, the receiver processes it in equal yet opposite ways. As a result, the signals caused by electromagnetic interference from external sources are effectively cancelled. 4. 6UTP CABLING STANDARDSThe UTP cabling commonly found in workplaces, schools, and homes conforms to the standards established jointly by the Telecommunications Industry Association (TIA) and the Electronics Industries Alliance (EIA). TIA/EIA-568A stipulates the commercial cabling standards for LAN installations and is the standard most commonly used in LAN cabling environments. Some of the elements defined are: * Cable types * Cable lengths * Connectors * Cable termination * Methods of testing cable There three (3) types of unshielded twisted pair Ethernet cables and they are: Ethernet Straight- throughEthernet Crossover Rollover The figure below shows the color combinations for producing these cables Fig 4. 7 CABLE TYPE| STANDARD| APPLICATION| Etherne t straight- through| Both end T568A or both end T568B| Connecting a network host to a network device such as a switch or hub. Connect a computer to a cable/DSL modem's LAN portConnect a router's WAN port to a cable/DSL modem's LAN port. Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)Connect two (2) switches/hubs with one of the switch/hub using an uplink port and the other one using normal port. Ethernet crossover| One end T568A, And the other end T568B. | Connecting two network hosts. Connecting network intermediary devices such as (switch- to- router) or (router-to-router)Connect 2 switches/hubs by using normal port in both switches/hubs. | Rollover| Cisco proprietary| Connect a workstation serial port to a router console port, using an adapter. | Making Ethernet UTP cables WHAT YOU NEED Fig 4. 8 Cable- Be sure the cable(s) you are using is properly rated for CAT 5. It should state clearly on the jacket of the cable, what it is rate d at.One option that you have when selecting your cable is to use a pre-made normal ‘straight through' cable, and simply whack off one of the ends, and replace with a new â€Å"Crossed Over† end. For the purpose of this report, though, we aren't going to go that route. We are going to make the whole thing from scratch – using bulk CAT 5 cable. Connectors – Crossover cables are terminated with CAT 5 RJ-45 (RJ stands for â€Å"Registered Jack†) modular plugs. RJ-45 plugs are similar to those you'll see on the end of your telephone cable except they have eight versus four contacts on the end of the plug.Also, make sure the ends you select are rated for CAT 5 wiring. There are also different types of jacks which are used for different types of cabling (such as Solid Core wire). Make sure you buy the correct jacks for your cabling. Crimper – You will need a modular crimping tool. Fig 4. 9 Stripper – There are several specialized tools, whic h can be used to strip the jackets off of cabling. If you do not have access to one of these tools, cautious use of a razor blade or knife should work just fine – but keep in mind if you go the razor blade / knife route, extra special care must be used as to not damage the wires inside the jacket.Cutters – You need a pair of cutters that will allow you to cut a group of cables in a straight line. It is very important that all the wires are the same lengths, and without proper cutters, this can be a difficult task. Fig 4. 10 LAN Tester – You need the LAN tester to test the cable after crimping to ensure the functionality of the cable. Connect the cable to the tester and see if all lights turn green. If all lights turn green, your cable is working properly. If they do not, cut the RJ-45 connector off and re-terminate the ends of the cable with a new one.Fig 4. 11 1. Start by stripping off about 2 inches of the plastic jacket off the end of the cable. Be very caref ul at this point, as to not nick or cut into the wires, which are inside. Doing so could alter the characteristics of your cable, or even worse render it useless. Check the wires, one more time for nicks or cuts. If there are any, just whack the whole end off, and start over. Fig 4. 12 2)Spread the wires apart, but be sure to hold onto the base of the jacket with your other hand. You do not want the wires to become untwisted down inside the jacket.Category 5 cable must only have 1/2 of an inch of ‘untwisted' wire at the end; otherwise it will be ‘out of specification' Fig4. 13 Up to this point, things have been pretty easy. Things will get a little bit tricky here, but don't worry; we'll get through this together. We are at a point in this report where a decision needs to be made. You need to decide which end of the cable you are making at this point in time. If you are making your cable from scratch like I am doing while writing this report, you have 2 end jacks, which must be installed on your cable.If you are using a pre-made cable, with one of the ends whacked off, you only have one end to install – the crossed over end. Below are two diagrams, which show how you need to arrange the cables for each type of cable end. Decide at this point which end you are making and examine the associated picture below. Fig4. 14 Begin to untwist the twisted exposed wires on your cable. Use caution so that you do not untwist them down inside the jacket. Once you have all the wires untwisted begin to arrange them in the proper order based on the pictures above.This stage can be a frustrating one, especially some of the middle wires. Once you get all the wired arranged in the proper order, make sure your wire cutters are within reach then grasp them right at the point where they enter the jacket. Make sure you keep them in the proper order! Grab your cutters now. Line them up along your prepared wires about 1/2 inches above the jacket. Be sure at this point that you are both 1/2 inches above the jacket, and that your cutters are aligned straight across the wires. You want to make a clean cut here – also make sure you don't let go of that jacket / wires!Fig4. 15 5. Grab those crimpers – because not all crimpers are exactly the same your pictures may not match exactly what you see below. Be sure to keep a good grip on that jack and the cable. Insert the jack into the crimper. It should only go in one way, so you don't have a whole lot to worry about inserting it. Begin to compress those crimpers. You will more than likely hear a clicking sound. Keep squeezing. If you try to let go too early, nothing will happen. They will not release. Keep going until they stop clicking / stop moving all together.At this point, you should be able to let go of the jack, and the crimpers. The crimpers should release now leaving you with a crimped jack. If the crimpers do not release, you probably didn’t press hard enough. Fig4. 16 6)I t's time to examine what we have done. If you look at the end of the jack you should see that the copper connectors should not be pressed down into the wires. Toward the back of the jack (where the jacket meets the jack) it should be crimped securely holding the jacket / cable in the jack. If something has gone wrong, don't worry, it’s not the end of the world.Grab those cutters, and just whack the whole jack off and start back at step 1 (a frustrating one I know, but it’s better to have a cable that works, than to spend hours trouble shooting your PC trying to figure out why you can't see the other machine). If everything is cool, all you have to do now is make the other end of the cable so go back to step one, and make the other end as I have explained in this report. Fig 4. 17 Good |   |   | Fig4. 18|   | WRONG WAY – Note how the blue plastic shielding is not inside the connector where it can be locked into place. |   |   |   | Fig4. 9|   | WRON G WAY – Note how the cables do not go all the way to the end of the connector. | 4. 7 CONNECTING TWO COMPUTERS USING CROSSOVER CABLES Fig 4. 20 Plug in network card each to computer and then install network card driver for each computer. Connect the cable to both computers’ network card. Here comes the network configuration, let’s create a simple network by assigning following network info to each computer's network card: Computer A: IP Address: 10. 1. 1. 1 Subnet mask: 255. 255. 255. 0 Gateway: DNS Servers: Computer B: IP Address: 10. 1. 1. 2 Subnet mask: 255. 255. 255. 0 Gateway: DNS Servers:Since these 2 computers are directly connected, no gateway and DNS servers are needed. After assigning IP address, try to ping the other computer from command prompt, you should be able to ping each other and then sharing printers or files as you wish. 4. 8 USING PING TO TROUBLESHOOT NETWORK PROBLEM Sometimes if your network connection is down, you can use ping to troubles hoot network problem and then fix it. Ping is a program used to check whether a host is up and active in network. It’s very simple and usually used to troubleshoot network problem. Here is typical technique for pinging and it applies to wireless network as well. . First thing you need to do is to make sure there is light on network card with cable connected. Sometimes network down is due to disconnected network cable or loose cable connection. If you notice no light on your network card after connecting with network cable, make sure the network cable is working. If you see the light, then proceed to step 2. 2. Go to Start and click on Run. Type CMD, and hit Enter or click OK. Fig 4. 21 Type â€Å"ping† in the Command Window. Hit the space bar once. Type the IP or website address that you want to ping. For example, if you want to ping eBay, type â€Å"www. ebay. om† after the space. Hit â€Å"Enter. † If the website is up and actively responding, you recei ve replies back from the server that you pinged with the following information: The IP address The number of Bytes sent The time it took in milliseconds The TTL is Time to Live (This indicated the number of â€Å"hops† back from the computer pinged from that computers initial TTL value. ) Fig4. 22 4. 9HUBS AND SWITCHES As you can see, computers use network cards to send and receive data. The data is transmitted over Ethernet cables. However, you normally can’t just run an Ethernet cable between two PCs and call it a network.In this day and age of high speed Internet access being almost universally available, you tend to hear the term broadband thrown around a lot. Broadband is a type of network in which data is sent and received across the same wire. In contrast, Ethernet uses Baseband communications. Baseband uses separate wires for sending and receiving data. What this means is that if one PC is sending data across a particular wire within the Ethernet cable, then th e PC that is receiving the data needs to have the wire redirected to its receiving port. You can actually network two PCs together in this way.You can create what is known as a cross over cable. A cross over cable is simply a network cable that has the sending and receiving wires reversed at one end, so that two PCs can be linked directly together. The problem with using a cross over cable to build a network is that the network will be limited to using no more and no less than two PCs. Rather than using a cross over cable, most networks use normal Ethernet cables that do not have the sending and receiving wires reversed at one end. Of course the sending and receiving wires have to be reversed at some point in order for ommunications to succeed. This is the job of a hub or a switch. Hubs are starting to become extinct, but I want to talk about them anyway because it will make it easier to explain switches later on. There are different types of hubs, but generally speaking a hub is no thing more than a box with a bunch of RJ-45 ports. Each computer on a network would be connected to a hub via an Ethernet cable. You can see a picture of a hub, shown in Figure C. Fig 4. 23 A hub is a device that acts as a central connection point for computers on a network A hub has two different jobs.Its first job is to provide a central point of connection for all of the computers on the network. Every computer plugs into the hub (multiple hubs can be daisy chained together if necessary in order to accommodate more computers). The hub’s other job is to arrange the ports in such a way so that if a PC transmits data, the data is sent over the other computer’s receive wires. Right now you might be wondering how data gets to the correct destination if more than two PCs are connected to a hub. The secret lies in the network card. Each Ethernet card is programmed at the factory with a unique Media Access Control (MAC) address.When a computer on an Ethernet network transmi ts data across an Ethernet network containing PCs connected to a hub, the data is actually sent to every computer on the network. As each computer receives the data, it compares the destination address to its own MAC address. If the addresses match then the computer knows that it is the intended recipient, otherwise it ignores the data. As you can see, when computers are connected via a hub, every packet gets sent to every computer on the network. The problem is that any computer can send a transmission at any given time.Have you ever been on a conference call and accidentally started to talk at the same time as someone else? This is the same thing that happens on this type of network. When a PC needs to transmit data, it checks to make sure that no other computers are sending data at the moment. If the line is clear, it transmits the necessary data. If another computer tries to communicate at the same time though, then the packets of data that are traveling across the wire collide and are destroyed (this is why this type of network is sometimes referred to as a collision domain). Both PCs then have to wait for a random mount of time and attempt to retransmit the packet that was destroyed. As the number of PCs on a collision domain increases, so does the number of collisions. As the number of collisions increase, network efficiency is decreased. This is why switches have almost completely replaced hubs. A switch, such as the one shown in Figure D, performs all of the same basic tasks as a hub. The difference is that when a PC on the network needs to communicate with another PC, the switch uses a set of internal logic circuits to establish a dedicated, logical path between the two PCs.What this means is that the two PCs are free to communicate with each other, without having to worry about collisions. Fig4. 24 A switch looks a lot like a hub, but performs very differently Switches greatly improve a network’s efficiency. Yes, they eliminate collisions, bu t there is more to it than that. Because of the way that switches work, they can establish parallel communications paths. For example, just because computer A is communicating with computer B, there is no reason why computer C can’t simultaneously communicate with computer D.In a collision domain, these types of parallel communications would be impossible because they would result in collisions. 4. 10 PLANNING AND CABLING NETWORKS. When planning the installation of LAN cabling, there are four physical areas to consider: Work area Telecommunications room, also known as the distribution facility Backbone cabling, also known as vertical cabling Distribution cabling, also known as horizontal cabling Total Cable Length For UTP installations, the ANSI/TIA/EIA-568-B standard specifies that the total combined length of cable spanning the four areas listed above is limited to a maximum distance of 100 meters per