Saturday, August 31, 2019

Julian Assange: Hero or Terrorist

Attention Getter: George Orwell once said,† Political Language is designed to make lies sound truthful and murder respectable, and to give an appearance of solidity to pure wind. † 2. Bond: Link to Audience: It’s easy to take our 1st amendment rights for granted but imagine if we didn’t have them anymore. Can you imagine living in an America where it’s considered treason to say what you think and to tell the world what you know? Well, that is what the current battle between our government and Julian Assange is about. . †Credentials† of speaker: I have been following the developing story of Julian Assange for the last 3 years. So, it’s fair to say that I know a little bit about him. 4. Thesis: My research leads me to believe that Julian Assange should be afforded the same rights as every other journalist. 5. Speech Preview: First, I’m going to talk about the global smear campaign against Julian Assange. After that, I’m going to talk about the violations that the U. S. is posing to his human rights.Finally, I am going to talk about what America is going to look like if we don’t have our rights anymore. 6. Transition: But let’s start with the smears that have been dealt to Julian Assange. II. Body 1. Main Point #1: a. State Point 1: A global smear campaign is going on right this moment against Julian Assange. b. Argument: Some are saying that he is a woman raping terrorist. c. Proof: In an article by BBC News, Julian Assange said he believes that currently there is a global smear campaign to make him look disreputable and crazy.I read in an eBook called, Assange Agonistes that Nick Davies, a journalist for the New York Times, said that America’s preferred method of control is through Media management. He also said that the American government is,† the biggest media manipulation machine in the history of mankind. † I think that this is absolutely true because this isn ’t the first time the U. S. government has used smear tactics against someone who stood up against them. I discovered 2 other incidents where our government and a major bank had smeared someone’s name through the use of exual misconduct charges; the first being Scott Ritter. I watched a video on YouTube by The Young Turks, where they were discussing the allegations that were brought up against Julian Assange. In the video they were talking about how Scott Ritter, a decorated war veteran, who spoke out against the war in Iraq and said that there were no weapons of mass destruction in Iraq. Soon after Ritter made that statement, alleged sex charges were brought up against him to make him look like a dirty old rapist who would do anything to make our government look bad.The second case I also discovered was about Elliot Spitzer, who accused the banks of insider trading. Suddenly the North Fork Bank reported to the IRS that Spitzer was using funds to pay for a hooker and s ex charges were brought up against him. Due to the media scandal he resigned from his position as Governor of New York because it painted a negative reflection on our government. d. Give an Example: In an article that I read on Wired. com it talks about a woman that has accused Julian Assange of raping her. In the article it describes the process by which this woman describes her â€Å"incident† with Assange.Ms. Anna Ardin said that he pinned her down to the bed when she reached for a condom, but then he consented and put a condom on. According to Ms. Ardin she feels she was raped because the condom broke at some point in time during the act. While I was investigating I found out that she had posted to her blog the â€Å"7 steps to get legal revenge. † I personally don’t find her story very credible after reading a translation of her blog. Ms. Ardin is known in Sweden for her feministic views  on how men achieve social dominance through sex.The government was anxious to pounce on her accusations of rape even though she is a known feminist with a history of reporting baseless rape. I do not find this a coincidence that a few days before the rape accusation Mr. Assange had released an embarrassing video of US soldiers gunning down no less than a dozen unarmed civilians in Iraq, while they were talking about it like it was a game of Call of Duty. Julian believes it was not a coincidence that after he embarrassed the U. S. by leaking this video, he was then accused of a crime that would have him extradited back to Sweden and then to the U. S. for further punishment.This was before they discovered there was nothing that the US government could charge him with and it was a violation of his human rights to send him to Sweden where he hadn’t been charged for the alleged crime. To date Julian has never been charged with the rape of this woman and has been confined to house arrest for more than 500 days without any charge against him. e. Re state the point: There is a global smear campaign set against Julian Assange because he is the face of WikiLeaks. g. Transition Sentence: Next, let’s talk about the violation to his rights. 2. Main Point #2: Solutions to those problems . State Point 2: The U. S. government is violating Julian Assange’s human rights.b. Argument: In an article by The Atlantic quoted Hillary Clinton saying that Julian Assange was attacking their international community. c. Refutation: Julian Assange is a journalist and is protected by the U. N. ’s Declaration of Human Rights under article 19. Under article 19 it says: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. . Give an Example: In 1968 when we were in the thick of the Vietnam War there was a man named Daniel Ellsberg that was courageous and released classified Pentagon documents to the New York Times. On History. com and from my uncle, who was a journalist in the Vietnam War, I learned that that the war ended earlier as a result of a public outcry, where 75% of the American population protested the war. Daniel Ellsberg also helped end the war by releasing classified documents that exposed the lies that made us go to war in the first place which forced President Reagan to withdraw from Vietnam.If we stand together and say that we need to stop unjustly blaming Julian Assange for promoting a more transparent government and take a look at what it is that we are unknowingly promoting. Julian Assange believes that we have the right to know about the lies and secret dealings going on by our government. It is our right to know what they are saying and doing behind closed doors. Yes, there are instances where our government needs to have secrets, but that doesn’t mean that they can to lie to us about the general majority of secr et dealings that are going on.If Julian Assange is attacking our International Community then maybe it needs to be attacked because what is going on right now and all the lies that we are being told need to be known. We need to see just what is going on. We need to know why the rest of the world hates us so much. e. Restate the Point: Julian Assange’s human rights are being violated and we need to do something about it. 3. Main Point #3: Visualization a. State Point 3: Imagine an America where it becomes treason to say what you think and to tell others about it. b.Argument: Our government would say that there is a need to be censored in order to keep us safe. c. Refutation: Our 1st Amendment rights are going to disappear if we don’t halt this violation right now. Pretty soon we’re going to be trapped in a world where we don’t have our most basic of rights. Imagine a world populated with militarized police and being under lock down in an authoritarian dict atorship where we no longer have any rights or freedom. How many of you believe that the governments placing cameras on the roads and on top of buildings are really about watching traffic?I believe that it is really about watching the people. So, it’s already begun. d. Give an Example: We need to stand together and we need to tell our friends and loved ones. Spread the word tell people about what’s going on! Everyone needs to know that our rights are at risk right now! e. Restate the point: America is going to change dramatically if Julian Assange is arrested for being a journalist. f. Transition: Let’s summarize what I have been talking to you about today. III. Conclusion 1.Restate thesis: Julian Assange should be afforded the same rights as every other Journalist. 2. Restate main points: Julian Assange is being attacked by so many companies and governments. His rights are being violated and it’s going to change America if our government succeeds in arre sting Julian Assange. 3. Call- to-Action: Protest! Say what you think! We need to challenge our government and show them that they are wrong because if we don’t America, the so-called land of the free, is soon to be the Soviet America.

Friday, August 30, 2019

The role of the teaching assistant in developing childrens learning

Historically, learning helpers, or aides as they were sometimes once known, were non learning grownups who helped qualified instructors by transporting out twenty-four hours to twenty-four hours preparatory and administrative undertakings and supplying pastoral attention to kids. ( Clayton. 1993 ) However, in 1998, the Local Government Chronicle published a sum-up of a Green Paper, ( LGC, 1998 ) , in which they outlined proposals for using a greater figure of support staff – 20,000 by the twelvemonth 2002 – in order to supply more support for instructors. The sum-up besides announced the authorities ‘s suggestions for a â€Å" more effectual usage of, and better preparation for, learning helpers and other school support staff † which, along with a subsequent OfSTED reappraisal, ( 2002a, p6 ) declared the demand for preparation that would, â€Å" fit any proposed construction of makings and to ease calling patterned advance. † The execution of nationa l occupational criterions for learning helpers, approved in 2001, and the HLTA position introduced in 2003, ( TDA, 2008 ) offered committed support staff the chance to come on and get the accomplishments to go more complete pedagogues. Working as a instruction helper started to go a calling and so began the existent argument about the function of the instruction helper. As with many occupation rubrics within the working environment, the rubric instruction helper is frequently interpreted in a assortment of ways but one common subject I have encountered, when oppugning educational staff, is that all learning helpers have the possible to be facilitators of acquisition and therefore are indispensable elements in the development of larning for kids. How the facilitation is carried out, nevertheless, is less clear and unfastened to single reading by both employers and employees. In order to back up the acquisition of all kids, learning helpers, like any pedagogue, need to hold a good apprehension of how kids learn. In the book, Teaching and Learning in the Early Old ages, Whitebread ( 2008, chapter 1 ) discusses Piaget ‘s thoughts that kids need to experience and keep control over their acquisition. Whitebread continues by researching Vygotsy ‘s claims that it is the function of the grownup to supply chances for societal interaction and to back up the kid in traveling out of their comfort zone or â€Å" degree of existent development † and towards their possible via their â€Å" zone of proximal development. † To make this, a instruction helper must understand how to advance wonder amongst kids while supplying chances for treatment and geographic expedition. With current category sizes in the part of up to 30 students, a category instructor will frequently be unable to prosecute in this critical facet of developing kids ‘s acq uisition and so it is indispensable that back uping grownups are equipped with the accomplishments to â€Å" scaffold † larning and to supply chances for them to develop the linguistic communication needed to be able to discourse and explicate their thoughts. ( Bruner 1983, cited in Peabody Journal of Education, pp 64-66 ) Recently I was fortunate to be portion of an enterprise to advance reading amongst a group of loath students who had formulated an sentiment that reading was a job to be undertaken with animus and merely when instructed to make so. Upon probe, it was obvious that these kids had encountered a assortment of barriers that had influenced their attitude and ability to read. My function was that of the â€Å" enabling grownup † as described by Chambers ( 1991 ) . By supplying them with an chance to portion and discourse each other ‘s reading experiences I was able to advance and animate in them a willingness and enjoyment of reading. The result of this rapidly became evident in their apprehension of written text. The kids besides began composing with enthusiasm, utilizing their ain cognition and experiences ; as a consequence, they had taken control of their ain acquisition. The kids ‘s vocal responses demonstrated that they felt empowered by the fact that they were stra ight responsible for the advancement that they were doing and they continue to bask our hebdomadal treatments about their reading and advancement. The kids mentioned do non hold particular educational demands, as is frequently the instance for students being supported by a instruction helper. Children with SEN necessitate a higher degree of support and this has, traditionally, been provided by learning helpers. ( Alborz et al, 2009a ) This has antecedently been an country for argument with The Daily Telegraph ( 2009 ) printing an article claiming that research shows that, â€Å" Students make less advancement in schoolrooms where schools employ more teaching helpers † . This article states that learning helpers frequently support lower attaining students, ensuing in them being less supported by a qualified instructor and to them doing limited advancement. The article does non, nevertheless, take into history the preparation of the instruction helpers. While reexamining the impact of work force remodeling, a study by OfSTED ( 2004 ) stated that when a instruction helper is appointed to work with carefully chosen students and is provided with the appropriate preparation to make so efficaciously, the students make important advancement. This is, of class, every bit good as the obvious benefits of supplying the instructor with more clip to concentrate on other students. Having worked alongside several learning helpers employed to back up kids with SEN I have witnessed the unmeasurable benefit to the student and the category as a whole. The instruction helpers enabled the students to be included in a mainstream schoolroom and entree the course of study, while leting the category instructor to back up the bulk of the students. Their support involved the re-enforcing of the whole category instruction, giving the student the assurance to take part in category treatments, simplification of vocabulary, offering congratulations and encouragement and feedback on the completed undertaking. Following the lesson, the instruction helper besides provided the instructor with appraisal and monitoring feedback to enable appraisal of and for larning. This appraisal has become a critical facet of the function of the instruction helper and supports the instructor and student by enabling distinction and personalised larning to go every twenty-four hours pattern. ( OfST ED, 2002b ) Guidance published by the NFER ( 2002, cited in Department for Education and Skills, 2005, p.22 ) found that when instructors and learning helpers work in partnership, the consequences are a more effectual degree of learning and larning. An illustration of this is a scenario I have experienced late where a instruction helper supported the acquisition of the bulk of the category while the category instructor focused on the kids with SEN. As a consequence of the instructor and instruction helper holding spent clip working together to be after the lesson, the instruction helper was able to back up the acquisition aims and help students in their accomplishment of them. Teaching helpers can besides, when included in the planning of a lesson, actively take part in the bringing of the lesson supplying an alternate point of view or by playing a character in function. One such illustration was provided by my co-worker who, upon gaining that many of the students within the category had misunderstood a cardinal construct, pretended to be confused and raised a manus to inquire for elucidation. As a consequence, students developed a clearer apprehension of the lesson and hence, the instruction helper had played an of import function in developing their acquisition. By implementing a combination of all of these attacks and with effectual preparation and counsel, learning helpers can supply priceless support for all kids within any lesson. Teaching helpers besides back up behavior direction within categories and can supply an alternate degree of perceptual experience within the schoolroom. In day-to-day Literacy lessons, I have observed a instruction helper back uping a student with ADHD and have no uncertainty that without her presence, the category instructor would hold to pass a big proportion of the lesson settling the kid and turn toing low degree distractions. Personal experience has shown me that kids with emotional or behavioral troubles are frequently more antiphonal towards a instruction helper with whom they can hammer a positive grownup / kid relationship. This can lend towards the societal and emotional well-being of the kid as outlined by Alborz et Al. ( 2009b ) . Besides the chance to back up kids ‘s larning during lesson clip, learning helpers continue to transport out a battalion of administrative undertakings in order to back up the category instructor and the school as a whole. The National Agreement, ( ATL et al. 2003, p.2 ) , implemented as portion of the authoritiess workforce remodelling enterprise, states that instructors should non pass their clip transporting out administrative duties that do non do full usage of their accomplishments and expertness but that these undertakings should be carried out by support staff. The understanding outlines 21 undertakings that learning staff should non be required to transport out including the readying of schoolroom resources, run offing, the aggregation of monies for educational visit and the readying and puting up of shows. These undertakings must besides, hence, be considered the duty of the instruction helper. Each and every one of the administrative undertakings has an impact on the educational environment and hence contributes towards back uping the development of kids ‘s acquisition. In pattern, nevertheless, the demand for learning helpers to be more involved in the bringing of lessons certainly means that they excessively will hold less clip for transporting out administrative responsibilities which in bend might relay these responsibilities back into the custodies of the instructors. In my experience, learning helpers frequently offer unconditioned support for the school in which they are employed. Many carry out responsibilities beyond their working hours supplying curriculum enrichment activities and on a regular basis being at the head of fund raising events. They often are able to supply a connexion between local communities and their schools as they frequently live in close propinquity to their workplace. This is a non indispensable yet valuable portion of their function as it enables learning staff to be cognizant of local issues and provides a nexus between parents and schools. ( Lipsett, 2008 ) In decision, the function of the instruction helper has evolved significantly over recent old ages and can offer committed persons with a recognized calling that is both progressive and honoring. With appropriate professional development chances, a instruction helper can give priceless support to persons and groups of students, learning staff, parents and schools. By supplying pastoral attention, administrative support and personalised larning they can, every bit outlined in the Governments Every Child Matters enterprise ( DfES, 2003 ) , promote enjoyment and accomplishment in a safe, nurturing environment ; contribute to the academic and emotional well-being of all kids ; assist them to go successful members of the school and wider community.

Health drinks Essay

In India Consumers behavior towards purchase of food drink products like beverage are changing due to economic and personal factors. Once if we compare last five years the prices of beverage products, it could be noted that there is an increase. The major reasons for the increase in the sales of food drinks are due to the increased consumption level among the customers. On an average an individual would consume these products two to three times in a day. Moreover, the prices were also designed in such a manner by the manufacturers making it possible so that every consumer from different segment based on their demographic and geographical patterns could be able to make the purchase. In effect it influences the consumers at large to opt for non-branded and cheap products that are available in the marketplace. This work was undertaken with an object to identify the pattern of purchase by the consumers, factors that dominate and influence the consumers to purchase the products and lastly the impact of demographic factors on the purchase of health food drinks consumption in the study area. The study clearly shows that demographic factors like gender, place of purchase are largely influence the consumers while they purchase beverage products in the shops. Clanging consumerism is the biggest factor that plays a major role as for as consumers purchase behavior is concern. KEYWORDS Health Food and Soft Drinks, Demographic Factors, Purchase, Beverages, Consumer Behaviour, Corporate, Leverage, Consumerism, Consumption. INTRODUCTION Changing consumer behaviour is the biggest challenge for any corporate beverage companies especially for companies like Tata, ITC etc. This is mainly due factors that influence the consumers while purchasing beverage products. For instance, factors such as offers, discount etc. , often increase the purchase. Health food drink products like beverages (hot and cold) are major items that consumer purchase as they consume beverage products not less than two to three times a day. According to the consumers demographic factors like Gender, Age, Educational Status, Marital Status, Occupation, Domicile, and Shopping Destinations often influence consumers while purchasing health food drink products. SCOPE OF THE STUDY The study aims to find the customer preferences towards health food drink products. It has been carried out for period of 2 months focusing all type of consumers. It was restricted to information regarding the demographic profile of the consumers and questions regarding four P’s of marketing tools. OBJECTIVES OF RESEARCH To understand the overall purchase pattern of the beverages by the consumers. To identify the level of influence various factor dominate the consumers. To have an insight about prepurchase behavior of consumers. To understand the impact of demographic factors of consumers upon purchase beverage products. RESEARCH DESIGN A Research design is process of collection and analysis of data in a manner that aims to combine relevance to the research purpose with economic aspect involved in mind. A Research is purely and simply the framework and a plan for the study that guides the collection and analysis of data. It is a blue print followed in completing a study which contains the steps as: Research is an art of scientific investigation. Research is a process of systemic study. Research is a search of knowledge. Research is an area of investigation which includes collection, analysis and interpretation of data. Research has to proceed systematically in the already planned direction with the help of a number of steps in sequence. To make the research systemized the researcher has to adopt certain methods. The method adopted by the researcher for completing the project is called Research Methodology. DATA COLLECTION METHODOLOGY AND Data refers to information or facts. It is not only refers numerical figures but also include descriptive facts. The method of data collection includes two types for the study, such as primary data and secondary data. PRIMARY DATA COLLECTION METHOD The primary was collected with the help of a structured questionnaire directly from consumers through personal interview. The questionnaire contains questions that suit the objectives of the study. The questions will help to draw the information A Study On Consumers Buying Habits Towards Health Food Drink Products In Salem District Tamilnadu – Mr. P. Arun relating to purchase pattern of beverage products by the consumers. The Primary data was collected with a set of specific objective to assess the current status of variables considered for the study. Primary data is useful and applicable only for a specific time. and previous reports, magazines, sales vouchers etc. DATA ANALYSIS AND INTERPRETATION MULTI-DISCRIMINANT FUNCTION ANALYSIS METHODS OF PRIMARY DATA COLLECTION The performance of buying behaviour varies by the different stages of influence. In the study area out of 106 respondents divided into two groups, one is low level of influencer and high level of influencer. For the purpose of the study 7 variables were selected. Although there are several methods are being used for collecting primary data, questionnaire and interview methods has been employed in this study. SECONDARY DATA Gender Age Educational Status Marital Status Occupation Living Place Place of Shopping It was used mainly to support the primary data. Secondary data was collected from sources such as through books, annual reports, significant, available literatures from organization TABLE No. 1 – SUMMARY TABLE BETWEEN LOW INFLUENCER AND HIGH INFLUENCER GROUPS STEP 1. 2. VARIABLE ENTERED Gender Place of purchase WILK’S LAMBDA 0. 955 0. 909 MINIMUM D2 SIGNIFICANCE 0. 222 0. 471 ** * *. Significant at 1% level, ** Significant at 5% level, TABLE No. 2. – CANONICAL DISCRIMINANT FUNCTION CANONICAL CORRELATION 0. 302 WILKS LAMBDA 0. 909 The canonical correlation is 0. 302 when squared is 0. 091 that is 9. 1% of the variance in the discriminant group can be accounted for by this model, Wilk’s Lambda and chi-square value suggest that D. F. is significant at 1% level. The variables given above are CHISQUARE 9. 711 D. F. SIG 2 Significant at 1% level identified finally by the D. F. A. as the eligible discriminating variables. Based on the selected variables the corresponding D. F. coefficients are calculated. They are given in the following table. TABLE NO. 3: DISCRIMINANT FUNCTION COEFFICIENTS Namex International Journal of Management Research 33 Vol. 2, Issue No. 2, July – December 2012. A Study On Consumers Buying Habits Towards Health Food Drink Products In Salem District Tamilnadu – Mr. P. Arun. VARIABLES COEFFICIENTS 1. 812 0. 777 4. 635 Gender Place of Purchase Constant The equation is: Z = – 4. 635+ 1. 812 (Gender) + 0. 777 (Place of purchase) The discriminating power or the contribution of each variable to the function can sufficiently. For this consider the following table. TABLE No. 4- RELATIVE DISCRIMINATING INDEX FACTORS Gender Place of Purchase GROUP 1 MEAN X1 1. 58 2. 90 GROUP2 MEAN X2 UNSTANDARDIZED DIC. COEFF. (kj) 1. 35 2. 55 1. 812 0. 777 Ij = ABS (Kj) MEAN (Xjo – x ji) 1. 24 0. 29 1. 53 Total Rj = Ij / sum Ij j*100 81. 0 19. 0 100. 0 This reclassification is called predictor group membership. In short, the efficiency of the D. F. is how correctly it predicts the respondents into respective groups. TABLE NO. 5 – CLASSIFICATION RESULTS PREDICTED GROUP MEMBERSHIP ACTUAL GROUP No. OF CASES GROUP I Group 1 (Low Influencer) Group 2 (High Influencer) 20 (64. 5%) 31 (41. 9%) 31 74 GROUP II 11 (35. 5%) 43 (58. 1%) Percent of grouped cases correctly classified: 60. 0%. The above table gives the results of the reclassification. The function, using the variables selected in the analysis classified 60. 0% of the cases correctly in the respective groups. low and high influencer. The following factors significantly discriminate the two influencer groups. They are: Gender (at 5% level) Place of purchase (at 1% level) Discriminate function analysis was applied to the respondents based on the TABLE NO. 6: DEMOGRAPHIC PROFILE OF RESPONDENTS (N=106) ITEM GENDER Male Female MARITAL STATUS Single Married NUMBER Namex International Journal of Management Research PERCENTAGE 61 45 58. 00 42. 00 21 84 19. 88 79. 25 34 Vol. 2, Issue No. 2, July – December 2012. A Study On Consumers Buying Habits Towards Health Food Drink Products In Salem District Tamilnadu – Mr. P. Arun Widow EDUCATIONAL STATUS Elementary School High School Graduate Post Graduate Doctoral Degree OCCUPATION Professional Worker Business Retired Staff House Wife PLACE Salem Omalur Mecheri Mettur Dam Kolathur The Present study is related to consumers’ behaviour on health food drinks in Salem area. In the constituted sample size of 106 respondents it was found there were 61. 33% professionals, 04. 71% workers, 30. 18% businessmen, 0. 94% retired staff and 02. 83% house wife. The distributions of consumers were found to be from locations such as Salem, Omalur, Mecheri, Mettur Dam and Kolathur. From the above table it could be seen that 34. 91 % of consumers were from Kolathur, 31. 33% of consumers were from Mettur 01 0. 94 09 12 23 55 04 08. 49 11. 33 21. 69 51. 89 03. 78 65 05 32 01 03 61. 33 04. 71 30. 18 0. 94 02. 83 25 01 10 33 37 23. 59 09. 44 09. 44 31. 33 34. 91 doctoral. With respect to the occupation of the respondents was concerned, 61. 33% were professional, 30. 18 were business person and remaining 6% were worker, retired staff and house wives. STATISTICAL TOOLS APPLIED The primary data collected through interview schedule from 106 respondents. The statistical tool applied is multi discriminant analyses were used for this study. FINDINGS Dam, 23. 59% of consumers were from Salem City, 9. 44% of consumers were from Mecheri and the remaining 0. 94% of consumers were from Omalur. The gender distributions of consumers in the study, it is noted 58% of the respondents were male and the remaining 42% were female. As for as education qualification of the consumer was concerned, there were 51. 89% post graduate, 21. 69% graduate, 11. 33% high school level, 8. 49% elementary school level and the remaining 3. 78% Namex International Journal of Management Research The study shows the following findings. It’s clearly shows that the below gender and place were significantly differed: Gender (at 5% level) Place of purchase (at 1% level) CONCLUSION The study clearly shows that demographic factors like gender, place 35 Vol. 2, Issue No. 2, July – December 2012. A Study On Consumers Buying Habits Towards Health Food Drink Products In Salem District Tamilnadu – Mr. P. Arun of purchase are largely influence the consumers while they purchase beverage products in the shops. Clanging consumerism is the biggest factor that plays a major role as for as consumers purchase behavior is concern. REFERENCES Ogden CL, Carroll MD, Curtin LR, McDowell MA, Tabak CJ, Flegal KM. Prevalence Of Overweight. And Obesity In The United States, 1999–2004. JAMA. 2006; 295(13):1549–1555. [PubMed] The Surgeon General’s Call to Action to Prevent and Decrease Overweight and Obesity 2001. Rockville, MD: Office of the Surgeon General, Public Health Service, US Dept of Health and Human Services; 2001. Flegal KM, Graubard BI, Williamson DF, Gail MH. Excess deaths associated with underweight, overweight, and obesity. JAMA. 2005; 293(15):1861–1867. [PubMed]. Mokdad AH, Marks JS, Stroup DF, Gerberding JL. Actual causes of death in the United States, 2000. JAMA. 2004; 291(10):1238–1245. [PubMed]. Hedley AA, Ogden CL, Johnson CI, Carroll MD, Curtin LR, Flegal KM. Prevalence of overweight and obesity among US children, adolescents, and adults, 1999– 2002. JAMA. 2004; 291(23):2847–2850. [PubMed]. National Initiative for Children’s Healthcare Quality. Expert Committee recommendations on assessment, prevention, and treatment of child and adolescent overweight and obesity 2007. [Accessed January 27, 2008]. http://www. amaassn. org/ama1/pub/upload/mm/43 3/ped_obesity_recs. pdf. Johnston FE. Health implications of childhood obesity. Ann Intern Med. 1985; 103(6, pt 2):1068– 1072. [PubMed]. Namex International Journal of Management Research Serdula MK, Iver D, Coates RJ, Freedman DS, Williamson DF, Byers T. Do Obese Children Become Obese Adults? A review of the literature. Prev Med. 1993; 22(2):167–177. [PubMed]. Flegal KM, Carroll MD, Kuczmarski RJ, Johnson CL. Overweight And Obesity In The United States: Prevalence And Trends, 1960– 1994. Int. J. Obes. Relat Metab Disord. 1998; 22(1):39–47. [PubMed]. Sellers K, Russo T, Baker I, Dennison B. The Role Of Childcare Providers In The Prevention Of Childhood Overweight. J Early Child Res. 2005; 3(3):227–242. WEBSIGHTS www. yahoo. com. www. google. com. www. hul. co. in. 36 Vol. 2, Issue No. 2, July – December 2012.

Thursday, August 29, 2019

Securitization Assignment Example | Topics and Well Written Essays - 750 words

Securitization - Assignment Example Banks, intermediaries and other financial institutions are not in a position to cope with the situation. So there is a window of opportunity in mortgage funding (Comptroller, 1997, p 02). In order to attract investors, bankers initially develop the investment vehicle that isolated defined mortgage pools, segmented the credit risk, and structured the cash flows from the underlying loans. Although it took several years to develop an efficient mortgage structure. In the early 1980s, the current shape of securitization was introduced into capital markets in which payments were pooled and used as collateral for securities issues. U.S government played a very pivotal role by creating agencies whose work is to ensure the securities, payment and interest (Comptroller, 1997, p 02). In the late 1980s, companies such as Citibank, General Motors Acceptance Corporation, Marine Midland Bank, Chrysler Corporation, and Ford Motor Company entered into the securitization market and raise billions of d ollars through off-balance-sheet financing and in years to come, new issuance of consumer asset-backed securities averaged about $50 billion annually. Securitization works in manner that seller provides goods or services to its valued customer in manner that payment is to be received in later days so he/she creates an asset then this pool of asset is sold to SPV (issuer) in order to acquire the particular asset and issuing a debt instrument to investor. Now this debt instrument is traded in secondary market in order to attract different rating agencies (Comptroller, 1997, p 06). This approach is quite fruitful for the seller because highly-rated debt instruments attract the finest prices. In addition, the credit rating of the debt instrument is very much dependent on the quality of assets that are securitized with in the pool. Investment banker provides protection, if there

Wednesday, August 28, 2019

Comparison between the retail revolutions in the UK and US Essay

Comparison between the retail revolutions in the UK and US - Essay Example Lao (2008) pointed that the transformation of economic sphere thru retail system generated both social acceptance and disdain because the development of chain stores have also marginalized the small retailers that lacked the capacity to offer first class convenience, a feature preferred by most consumers for comfort while shopping. Its adverse impact leads to the closure of small bookstores, eyewear, footwear and the like as branded goods enter the chain stores (Lao, 2008). This reality is true for United States of America (USA) and United Kingdom (UK). In the last four decades, the countries’ retail revolution boom with the influx of chain â€Å"stores, supermarkets and self-service stores† (Lao, 2008). The UK and the Retail Industry It’s just lately when UK retail trade is dominated by small shops run by the whole family which offers services to the market for long hours and sometimes round the clock. This system also engenders personal relations with customers as owners sometimes allow credit. Others employ salesmen for home delivery services or for mobile selling. Lao (2008) however pointed that retailer and consumer relations in the UK was affected when large chains like Fine Fare, Sainsbury’s, Tesco and other food stores started to operate with express leverage in bargaining power and in offering cheaper prices of pre-packed fresh goods in the markets compared to that of â€Å"old small proprietary stores.† As a consequence, old corner shop closed in favor of thriving convenient well-stocked stores.; employment shifted from proprietary to supermarket chains; and relationships were formalized by using checkout counter and digitized sales and accounting. Stores restructured and employed educated salespersons and managers. And as competition heightened, proprietary retailers and wholesalers organized themselves into association to devise their own promotions, pricing of products, and mechanism to retain customers. With these turn of events, it is likely that dominant chain will rise and proprietary stores die in the absence clear state policies that protect small retailers. This affirmed fears that with retail owners allying themselves to protect their corporate interests, the retail grocery will maintain its oligopolistic character (Burt &

Tuesday, August 27, 2019

Gospel of Matthew and Gospel of John Essay Example | Topics and Well Written Essays - 750 words

Gospel of Matthew and Gospel of John - Essay Example Gospel of Matthew reveals the substance of Teaching.Here Jesus' image is of a Messiah King,Anointed One, Son of God, Kingdom of God, etc.with an emphasize on Jesus' kingly rule and divine authority. Jesus' image is drawn through His authority over nature with the means of miracles, authority over sin by forgiving, and authority over death through the resurrection. This starts with the depiction to be as descendant of King David with the miracle birth story. The historical correctness about the lineage presents Jesus more with human aspects and less with the incarnation. The most apparent is the factthat Jesus' image is consistent with the Gospels of Mark and Luke with a dependency upon history. "Matthew collected the sayings of Jesus in the Hebrew tongue." Taking liberty with the historical framework, the Gospel of John,presents a unique perspective varying not only from the Gospel of Matthew but also from theother remaining gospels. The interpretation is presented with spiritual theme rather than the historical events. With differentiation this provides with John's unique record of his first hand accounts of experiences with Jesus during His life on earth beginning with His identification as "the lamb of God who takes away the sin of the world." Just in the second chapter Jesus performs His first miracle by converting water into wine; and also He predicts His resurrection. Jesus' image is built with vivid lessons, instructions, and the priorities of life using many parables tolearn from effectively. Jesus explains the significance of having a relationship with Him with true difference in life, in addition to the importance of living life on earth and determining our eternal destiny after death. Here, He is a Jewish Messiah. John subs tantiates His purpose and the reason He was sent to earth by God. Jesus' persona clarifies the truth about God, eternity, and making a choice to accept Him as our personal Savior. He becomes flesh and makes His dwelling among us. He came to earth in human form by stooping to the human level with a vision of dying a physical death for taking away our sins. From the beginning John's Jesus was with God, and Jesus was God. Jesus is the key to membership in God's family. Matthew's ministry of Jesus is restricted only to Galilee with Jerusalem trip in the end; whereas for John that is full of traveling with diverse locations. John's Jesus issupposed to be questioned; some explanation is released upon question. Whereas Matthew' Jesus is the preacher with the conclusion without a need of clarification. Both depictions conjure up Jesus to be the God; but Matthew's Jesus reflects a journey from human to God, while John's Jesus remains God throughout. Matthew's presentation is of a human form, initially, that later on develops into the vast personification of God; Johns' presentation is of the God Himself since the onset taking birth as a human to help and save the people. The scenepresented in Gospel of Matthew exhibits a tendency of "no question" because He is the God. Jesus in Gospel of John, though being a divine power, helps people with explanation. Iftheformer is just a Teaching, then the later is a kind of Learning. If the former is a story of Reali zation, the later is a story of Incarnation. However, the illustration by Matthew is believed to be more correct due to being in accordance with the "original voice" and the historical actuality. The illustration of John is

Monday, August 26, 2019

Marketing in France Report II Essay Example | Topics and Well Written Essays - 500 words

Marketing in France Report II - Essay Example Some countries have banned some or all the forms of alcohol advertising (http://www.bbc.com/news/world-europe-18960770). In France, advertising for any drink that has alcohol content that is above 1.2% is prohibited on television, radio (between 5 pm to midnight, and on Wednesdays) and on print media that are targeted at teenagers and kids (http://www.theguardian.com/media/2001/jul/26/advertising). Advertising is allowed in the remaining printed media, on radio between midnight and 5 pm, billboards, posters, and leaflets. Since 2009, using the Internet was allowed except on websites that target the youth or related to sports (Nic, Gormley, and Usher 61). Given this information, we will gear our advertising more towards internet marketing because of the media restrictions through television. The French government is stepping up its effort so as to gather more of the taxes that owners of TV set are to pay to assist public service broadcasting. This has led to the private TV companies t o respond by increasing up their rates of advertising making the advertising cost high and this contributes towards effective regulation of liquor consumption and moral responsibility (http://www.theguardian.com/media/2001/jul/26/advertising). Overall use of TV for advertising in France stands at 35.4% (Austin, Barnard, Galli and Hutche, 3). The competition between Television stations in France has become intense. TV also has to compete against the other media, i.e. radio stations that are commercial, public sector and the press. At the same time, expansion in the TV sector has led to jockeying for dominating the market so as to win for advertisers and audience. The market in supplying through the TV is relatively open and the costs are lower as compared to the other forms of media. Print media advertisements greatly vary and this depends on the publication, number of insertions, circulation, quantities (if it is flyers, direct mail, handouts,

Sunday, August 25, 2019

Research Methodology for Matrix management Thesis

Research Methodology for Matrix management - Thesis Example The findings of the research would provide insight on how companies apply the principle of matrix structure to properly implement the roles of the employees in order to maintain smooth operations due to efficient coordination of function. The right choice of research design to be employed in a study is an important factor to consider because the appropriate instruments or tools as well as strategies to undertake greatly depend on it. Hence, in general the research methodology utilized for this research study is a mixed research. Since it both involved qualitative and quantitative research, this also involved various combinations of research instruments which are significant in gathering needed data and information. Therefore, for better understanding, a brief overview to mixed research as well as to qualitative and quantitative research will be provided in the succeeding part. Mixed research is considered as the third form of research design used in research studies. It is described as a type of research which involved more than one method such combination of qualitative and quantitative method, a mix of quantitative, or a mix of qualitative method. Since its evolution it becomes preferred for use by several researchers because it allows them to collect, analyze, and integrate/mix both the quantitative and qualitative data in a single study or in multiple/series of studies in a sustained program of inquiry. In addition, the advantages of this method outnumbered its disadvantages and even provide opportunities as long as the research is conducted properly. There are two types of mixed research method: the mixed model research and the mixed method research. 3.2.1.1 The mixed model research The mixed model research is commonly utilized by researchers when he/she wants to mixed within or across the stages the quantitative and qualitative approaches in the research process (South Alabama University, 2011). Mixed within This mixed model is so called when the research er combined or mixed the qualitative and quantitative approaches in one or more stages of the research. For instance, the researcher employed two different research instruments to separately gather qualitative and quantitative data. Like close-ended or checklist questionnaire for the quantitative and open-ended interview for qualitative data (SAU, 2011) Mixed across In like manner, the mixed across model are more suitable when the researcher utilized only one approach to obtain both quantitative and qualitative data. For this method, the most applicable research instrument to be employed is open-ended interviews wherein the quantitative data would be obtain through grouping the responses and counting the number of times they occur in the interview. Likewise, the narrative result of the interview will served as the source for the needed qualitative data

Saturday, August 24, 2019

Discuss the Pros and cons of ASP.NET MVC Essay Example | Topics and Well Written Essays - 250 words

Discuss the Pros and cons of ASP.NET MVC - Essay Example MVC pattern is not new, it was created in 1978 and the project Smalltalk Ð ² Xerox PARC, but it is very popular due the number of reasons. The interaction of the user with the MVC is following the natural cycle: the user implements action and in response MVC changes the model of data providing the user with a new look. Then the cycle is repeated. This is very suitable for supplements, which are presented as a HTTP questions and answers. The necessity of the supplement to combine several technologies, for example the database, HTLM and the code, as a rule, is divided into many levels and layers. The models, which are received from these combinations, are natural for MVC conception. ASP.NET MVC Framework realizes the MVC pattern and provides the significant improved division of conceptions. There are still some problems with the supplement: â€Å"the end result is that web forms breaks the stateless nature of the Web. Both Viewstate and Postbacks have been made lot of problems and increased complexity of the web application development. Many web pages having hundreds of KB size of Viewstate that affected the performance of the applications sometime. Developers do not have the control of the rendering HTML of web forms and Server controls that render html with mixed inline style and deprecated tags that does not follows standards† (ASP.net MVC Vs ASP.net Web

Friday, August 23, 2019

Assignment 1 Behaviour in Organisations - Analysis of The Amazing Essay

Assignment 1 Behaviour in Organisations - Analysis of The Amazing World of Fun case study - Essay Example A specific problem with a new habitat zone head, Krista Katz, will be highlighted and her relationship with AWFs Maintenance Crew. Suggestions for realistic improvements to the management hierarchy in the park will also be discussed in this project. At "The Amazing World of Fun" theme park, most of the senior-level decision-making is carried out by Eric and George Pinter who act as the Vice Presidents of AWF. Eric Pinter is the Vice President of Wildlife and Conservation (W & C), with direct responsibility for directing the management of all W & C staff including Species Specialists and Animal Assistants. George Pinter is the Commercial Vice President and acts as director of five Habitat Zone Heads and deals with the Hospitality Crew, Maintenance Crew, and the Cast of AWF (who interact with the customers). Board member Amy Rockbridge, reporting to George, has management jurisdiction of the Maintenance Staff (part of Estates), a group made up primarily of skilled craftsmen who are responsible for the technical upkeep of the theme park. Among Eric Pinters responsibilities is ensuring the efficient operation of the Mammals, Birds, Marine, and Reptiles division of Wildlife and Conservation. Species specialists and senior animal scientists from the Wetland Zone report directly to the Zone Heads, but can call upon Eric for area conflicts needing senior-level advisement, since Wetland Wilderness is linked to W & C. The appointed Zone Head of Wetland Wilderness is Krista Katz, who reports directly to George Pinter. In July of 2000, problems began to erupt in the management structure of AWF in regards to the Zone Head of Wetland Wilderness, Krista Katz. Krista was appointed to her position by George, who had recently left Disneyland Paris to help make Wetland Wilderness a profitable business success. Kristas strategic goal was to improve the efficiency and operations of Wetland Wilderness and it

Thursday, August 22, 2019

Experimental Study Essay Example | Topics and Well Written Essays - 500 words

Experimental Study - Essay Example Initially, participant clinics, instead of individual participants, were recruited based on the following inclusion criteria: (1) willingness to participate in the study; (2) the number of patients; and (3) similarity of clinical routines. During this stage, there were a total of 179 patients in all the clinics being considered. The following exclusion criteria were adopted in the selection of individual participants for both groups: (1) duration of diabetes of less than 6 months; (2) mental retardation; (3) lack of fluency in the Dutch language. Only eight patients were excluded, but 80 patients refused to participate. After the baseline data have been obtained, 2 clinics were allocated for monitoring intervention and 2 clinics were allocated to control group. Informed consent was administered among patients willing to participate in the research study. The initial sample size is 46 patients for the intervention group and 45 patients for the control group. Data collection at baseline was not discussed in detail in this study, but in the related study with the same set of authors (De wit, et al., 2007).   All patients and their parents were administered a booklet containing questions regarding demographic information and questions to assess their physical and psychosocial well-being which were to be answered at home and returned by mail or submitted to the clinic during one of their routine appointments. Most recent glycosylated hemoglobin (HbA1c)  and treatment regimen were recorded form the patients’ charts. Physical and psychosocial well-being  of the patients was measured using the 87-item child report version of the Child Health Questionnaire (CHQ-CF87), while their parents completed the CHQ-PF50 equivalent to the CHQ-CF87. Depression, as part of the psychosocial well-being of the patients was assessed using the 20-item Centre for Epidemiological Studies Scale for Depression (CES-D)  for both patients and their

The Advantages of a Technological Advance Curriculum Essay Example for Free

The Advantages of a Technological Advance Curriculum Essay As technology advances, more schools are adopting a technological curriculum. Only about 20 years ago computers were not common and very few people understood the importance of the internet. Today almost everyone in America has some sort of device hooked up to the internet. Schools started using technology in the 1980’s, and as time moved on, more and more schools became technologically integrated. Technology integrated schools not only teach classes like computer programming, keyboarding, and web tech but also use technical devices in class. Some people argue that the technological approach to education is not effectively teaching students social skills but instead depriving students of human communication. However, technology in the curriculum is a step forward and can only improve the general education system for three main reasons the technology job field has increased drastically and will continue to do so, the positive benefits are outstanding, and students are more engaged, lastly, technology in the education system has helped people who would normally have difficulties and handicaps. The age at which children learn to use these technologies is decreasing as the popularity of the internet increases. Education department chair, Bill Lynch says technology gets students used to the idea that they are not just a consumer of knowledge but also a creator (Zeeble). Teaching children skills that they can build on and thrive in is one of the most important aspects of the education system. The earlier a student is introduce d to the technology world the better they will learn advanced skills in the future. (Effect on technology on classrooms and studies). Children who play video games are not only learning the game but they are learning life skills: Kids are clearly learning how to do certain kinds of things, whether that’s running around, whether that’s actually playing the game. They are learning what to do. Because rules are not given to them, they have to intuit them. They are learning why to do certain things, which is the strategic part of the game. They are learning where, which is the context of the game†¦ and most important, they’re learning whether to do something or not. So that just because you can hit somebody over the head with a baseball bat in the game, the question is, should you. (Elmasry) Video games promote skills needed like working in teams, collaborating, and other skills needed to succeed (Elmasry). There are many jobs that require even the basic computer skills and there are many jobs that didn’t even exist ten years ago. Social media/online community manager, blogger and online advertizing manager are a few off the list (Liz Ryan). Experts view video games as tools that help kids develop certain skills needed in tomorrow’s workplace. Teaching students how to understand and how to manage technologies used in today’s workforce at an early age is an experience every school should offer. Multiple studies have proven technology in education as positive. In 2005 Empire High School in Vail, Arizona gave every student and Apple laptop and came away with two impressions, students with laptops where more engaged and there was more they could do with the technology (Beardsley). With the internet you have the world’s information at the student’s fingertips; research is more efficient and less time consuming. Schools have seen multiple improvements from higher test scores to better attitudes. â€Å"In a west Virginia state wide research study, researchers found that the more time students participated in the Basic skills/ computer education program, the higher the Stanford 9 scores rose.† with technology students are able to complete more complex task improving scores and attitudes. Students in a technology integrated school have shown increases in motivation from multiple perspectives. Many teachers have noted the kids have an increased willingness to work and a want to complete and perfect projects. Students also receive confidence about being able to learn skills that will help support them and their education for the rest of there life’s. (Effect on technology on classrooms and studies). Technology provides a new and changing way that students are able to share information and express themselves. Technology can also help people in situations that might make school a difficult place . In 2005 Cathy Carolyn’s year long intensive medical technology training program lectures where in MP3 format. Cathy was skeptical at first but she soon saw that her students where learning better than ever before. The students in her classes loved the new system. Busy students could listen to lectures anywhere they need. It also gave the students the option to review as much times as needed. (Zeeble) â€Å"It’s about how we can reach out to the students in a way that meets their needs, because so many of today’s students are not the so-called traditional learners† (Zeeble). If a teacher has their lesson online than missing a day or two may not be that big of a deal, but in traditional schools it’s really hard to collect make up work and finish it along with the work you already have. If a student has needs that traditional schools can not meet than technology can always improve the situation. Some people believe that challenging the traditional way of learning is destructive. Director of the Lifelong Kindergarten Group at the Massachusetts Institute of Technology Mitch Resnick, said, â€Å" What we found in our research is that children’s best learning experiences come when they are activity engaged in designing things, creating things, inventing things.† Which most believes requires hands on approach. People also challenge the idea of multitasking, humans can only truly focus on one specific thing at a time, the idea of children multitasking is ridiculous (Bouchard). Teachers are also concerned with the level of language presented by students and the deterating vocabulary of students that use technology. Besides these worries children in technological advanced schools are still more advanced than kids who are not. People may argue that technology in the class rooms can be harmful but it’s clear that integrated schools have helped students more than harmed. With rules and close moderation students can use the tools given to them to advance in the system. Technology in schools improves motivation; helps prepare students for the future and can help people who may have difficulties in the regular school system. The world is advancing and many schools are lagging along, soon to be left behind. Hopefully, in the future all schools will be technologically integrated so all children can experience the advanced learning system and excel in all aspects of school.

Wednesday, August 21, 2019

Advantages and disadvantages of WAN

Advantages and disadvantages of WAN Assumption. The company consist of 4 buildings, one as headquarter which located in Kuala Lumpur, Malaysia and three as branches which located in Jakarta Indonesia, Bangkok Thailand and Manila Filipina. The company consists of 4 departments that are admin staff, IT department, marketing department and human resources department, which have total 40 employees in every office. Each department has 10 employees, which mean every departments room consist of 10 personal computers. LAN architecture will be the same between headquarter and branches. Every building Consist of 3 floors, 1st floors for administrator staff and human resources staff, 2nd floor for IT department and server room and the 3rd floor for marketing and meeting room. Every department has its own peripherals such as printer, scanner, and Photostat machine. Projector will be in meeting room. Have connection to the Internet and connection to each office. Headquarter office has external backup which located in Malaysia nearby headquarter office approximately 2 km, its provide backup for the database. Problem identification. The company does not have network yet. The company does not have DBMS (Database Management System). The company does not have backup yet. Security issues. WAN explanation. There are five sites in the WAN diagram, consist of headquarter office which is located in Kuala Lumpur Malaysia, three branches offices which is located in Thailand Filipina and Indonesia and one external backup which is located nearby headquarter office. The function of external backup is to keep the data as the original data. WAN topology. Basically WAN topology is almost similar with the LAN topology consist of point-to-point topology, ring topology and star topology. There are several advantages and disadvantages for every topology. The advantages and disadvantages of each topology will be shown in table bellow. For this company we suggest to use star topology because it is more scalable, provides shorter data paths between two sites and easy to add new nodes, if someday the company will expand the business by adding new branches in the other country it will easy to add to the existing WAN, the disadvantages of star topology is it has single point of failure at the concentrator routers. To overcome this problem network administrator tend to add some alternatives links between sites. WAN transmission technology. For WAN technologies we will do comparison between three technologies that are leased line, frame relay, X.25 and PPP. For WAN technologies we suggest to use frame relay because it can provide performance similar with the lease line with significantly less cost over long distance. Another reason is reduce internetworking cost because with frame relay required fewer port to access other network, increase performance with reduce complexity and definitely it is cheaper than leased line. Lower cost over long distance makes frame relay is good for this company because the branches office located across the country. Technology. For WAN technology we suggest to use VPN (virtual private network). VPN is alternatives technology to replace the more expensive WAN technology. The advantages of VPN that available online on: (http://www.universitydissertations.com/Communications/using-VPN.php) are, provide well security method, less expensive when compare with the WAN technology, reduce setup times, fast network link, simple network topology and productivity improved due to less constraints when compared with other networking methods. And the disadvantage of VPN is limited security for wireless users. According to the comparison above, we suggest to use star topology to each department. It is because star topology is more robustness, when one link fails only that link is affected and not the entire networks, and also it is easy to add new devices into the network if someday the company will expand the network. The major disadvantages of this topology is dependants on the hub or switch, if central hub or switch fails the entire network will be affected, but sometimes this dependency will becomes another advantages of star topology, because it make easy to troubleshoot the errors, if the entire network is not working it will be problems in the hub or switch. And for connecting each floor, we use backbones cable. So overall LAN topology for each office is using tree topology that combines BUS topology and STAR topology. It will combine the advantages of both topologies, which is easy installation, expandable, combine between multipoint and point-to-point. Transmission media. According Michael Palmer and Robert Bruce Sinclair (2003), when choosing the best medium for LAN or WAN, it is important to consider the capabilities and limitations of each type, including factors such as: data transfer speed, use in specific network topologies, distances requirement, cable and cable component cost, additional network equipment that might be required, flexibility and ease of installation, immunity to interference form outside source, and upgrade options. For LAN transmission media is using UTP and fiber optic. UTP or Unshielded Twisted Pair also known as 10BaseT is one of twisted pair type. There are several category of UTP, namely, cat3 has a maximum transmission rate16 Mbps, cat4 maximum rate up to 20 Mbps, cat5 has transmission rate 100Mbps, cat5e transmission rate up to 1000Mbps and cat6 has a transmission rate up to1000Mbps. For cat5e and cat6 is support for using gigabyte Ethernet. For UTP cable in this LAN we use cat5e and cat6. Cat5e is using to connect workstations and peripherals to the switch and switch to the backbones in each departments room. The reason why we select the UTP cat5e because it has high-speed networking capabilities of up to 1000 Mbps. Another UTP that we use is cat 6 to connect between backbones cable and server. This cable can carry twice the bandwidth of cat5 and has less crosstalk than cat5e. Whereas for backbone cables we suggest for using fiber optic, no doubt about it that now a days fiber optic is the best cable. Why we suggest using fiber optic, it is because highest bandwidth than other cable, resistance to electromagnetic interference and Radio frequency interference, secure transmission and early detection of cable damage. The main disadvantage of this cable is very high cost. LAN protocol. We use TCP/IP (Transmission Control Protocol/Internet protocol) for protocol. The reason why we use TCP/IP because: according Michael Palmer and Robert Bruce Sinclair (2003), it has many advantages includes: It is used on most networks and Internet, which makes it the international language of translation. There is a wide range of network device designed compatible with TCP/IP. Most computer operating system now uses TCP/IP as their main protocol. There is a larger body of network professionals who understand TCP/IP. There are several protocol and application of the TCP/IP suite. In our network we only use application that we need such as FTP, DNS, STMP, Telnet, HTTP. FTP (File Transfer Protocol) There is three transfer protocol that support with TCP/IP: FTP, TFTP and NFS. For our network we use FTP because it is the file transfer protocol options preferred by Internet users. FTP is an application that enables to transfer data from one remote device to another, its very useful application in our network because the user in branches office can log in into the headquarter office and download one or more data files, the user have an authorized user ID and password on the host. DNS (Domain name system) DNS is used to converts a computer or domain name to an IP address or that converts form IP address to a computer or domain name. STMP (Simple Mail Transfer Protocol) STMP is used for sending email. SMTP can only send text files, so files in other format must be converted into text files before sending through STMP. By using this application the staff can send and receive the email. Telnet (telecommunication network) Telnet is used to communicate with host computer usually mainframes minicomputer and to ensure that all network devices connect properly. HTTP (Hyper Text Transfer Protocol) HTTP is used World Wide Web communication. Using this application protocol the staffs can use internet properly in their workstations. Security. Proxy server. Proxy servers are devices that operate as intermediary agents on behalf of clients that are on a private or protected network. Clients on the protected network send connection requests to the application proxy in order to transfer data to the unprotected network or the Internet. Consequently, the application proxy sends the request on behalf of the internal client. (Jazeb Frahim and Omar Santos, 2005). According to Michael Dance in (http://www.ehow.com/facts_5016663_functions-proxy-server.html) the functions of proxy server are, caching: proxy server will save frequently accessed resources to save the bandwidth and faster loading, content filtering: it will filter the accessed web, by blocking certain web, security: when accessing the website proxy servers send Internet requests through a proxy before reach website destination. The proxy will encrypt the information, such as a password, before passing it onto the website. DMZ (Demilitarized zone) Basically DMZ is separate between public server and the LAN to allow external user to access into public server without access the internal server. Benefit of using DMZ is, by separating the public server with the private servers if someone hacks into one of public server does not mean that he can hacks into the private servers and also does not afford any easy route to the LAN. Multimedia devices.

Tuesday, August 20, 2019

Rdbms Oodbms Ordbms And Xml Information Technology Essay

Rdbms Oodbms Ordbms And Xml Information Technology Essay Data modeling refers to the process where data is structured and organized. It is a key component in the field of computer science. Once data is structured, it is usually then implemented into what is called a database management system (DBMS). The main idea behind these systems to manage vast amounts of both structured and unstructured data. Unstructured data include documents, word processing, e-mail messages, pictures, and digital video and audio files. Structured data, what is needed to make a data model (via a data model theory), is found in management systems like relational databases. A data model theory is the formal description of a data model. In the development of software, the projects may focus on the design of a conceptual data model, or a logical data model. They represent two ways of describing data models. The logical description focuses on the basic features of the model, outside of any particular implementation. The physical description, on the other hand, focuses on the implementation of the particular database hosting the models features. 1.2 Data Models We can define the Data Model as a collection of concepts that can be used to describe the structure of a database, provides the necessary means to achieve this abstraction. Notice that we mean by structure of a database the data types, relationships, and constraints that should hold on the data. Most data models also include a set of basic operations for specifying retrievals and updates on the database. In addition to the basic operations provided by the data model, it is becoming more common to include concepts in the data model to specify the dynamic aspect or behavior of a database application. This allows the database designer to specify a set of valid user-defined operations that are allowed on the database objects. Database Model can be categorized according to the data structures and operators they present to the user. (1) E-R Model (2) Hierarchical Data Model (3) Network Data Model (4) Semi Structured Data Model (5) Relational Data Model (RDBMS) (6) Object Oriented Data Model (OODBMS) (7) Object Relational Data Model (ORDBMS) Among all data models mentioned below, relational model followed by object oriented and object relational models enjoyed most popularity, we are going to compare them and then we try to find out what is the relationship between XML and these relational data models. COMPARISON RDBMS, OODBMS, ORDBMS  and XML 2.1 Relational Database Management System (RDBMS) The relational model is based on the structure of a database. A database is simply a collection of one or more relations or tables with columns and rows. The use of set theory allows for data to be structured in a series of tables that has both columns and rows. Each column corresponds to an attribute of that relation, while each row corresponds to a record that contains data values for an entity. The main elements of RDBMS are based on Ted Codds 13 rules for a  relational system, the concept of relational integrity, and normalization. The three fundamentals of a relational database are that all information must be held in the form of a table, where all data are described using data values. The second fundamental is that each value found in the table columns does not repeat. The final fundamental is the use of Standard Query Language (SQL). Benefits of RDBMS are that the system is simple, flexible, and productive. Because  the tables are simple, data is easier to understand and communicate with others. RDBMS are flexible because users do not have to use predefined keys to input information. Also,  RDBMS are more productive because SQL is easier to learn. This allows users to spend more time  inputting instead of learning. More importantly, RDBMSs biggest  advantage is the simplicity with which users can  create and access data and extend it if needed. After the original database is created, new data categories can be added without the existing application being changed. There are limitations to the relational database management system. First, relational databases do not have enough storage area to handle data such as images, digital and audio/video. The system was originally created to handle the integration of media, traditional fielded data, and templates. Another limitation of the relational database is its inadequacy to operate with languages outside of SQL. After its original development, languages such as C++ and JavaScript were formed. However, relational databases do not work efficiently with these languages. A third limitation is the requirement that information must be in tables where relationships between entities are defined by values. Today, the relational model is the dominant data model as well as the foundation for the leading DBMS products, which include IBMs DB2 family, Informix, Oracle, Sybase, Microsofts Access and SQLServer. 2.3 Object Oriented Database Management (OODBMS) The main objective of Object-Oriented  Database Management Systems, commonly known as OODBMS, is to provide consistent, data independent, secure, controlled and extensible data management services to support the object-oriented model. They were created to  handle big and complex data that relational databases could not. There are important characteristics involved with object-oriented databases. The most important characteristic is the joining of object-oriented programming with database technology, which provides an integrated application development system. Object-oriented programming results in 4 main characteristics:  inheritances, data encapsulation, object identity, and polymorphism. Inheritance allows one to develop solutions to complex problems incrementally by defining new objects in terms of previously defined objects. Data encapsulation or simply encapsulation allows the hiding of the internal state of the objects. Encapsulated objects are those objects that can only be assessed by their methods instead of their internal states. There are three types of encapsulated objects users and developers should recognize. The first is full encapsulation, in which all the operations on objects are done through message sending and method execution. The second is write encapsulation, which is where the internal state of the object is visible only for reading operations. The third is partial encapsulation, which involves allowing direct access for reading and writing for only a part of the internal state. Object identity allows objects of the database to be independent of each other. Polymorphism and dynamic binding allow one to define operations for one object and then to share the specification of the operation with other objects. This allows users and/or programmers to compose objects to provide solutions without having to write code that is specific to each object. The language important to OODBMS is data definition and manipulation language (DDML). The use of this language allows persistent data to be created, updated, deleted, or retrieved. An OODBMS needs a computational versus a relational language because it can be used to avoid impedance mismatch. DDML allows users to define a database, including creating, altering, and dropping tables and establishing constraints. DDMLs are used to maintain and query a database, including updating, inserting, modifying, and querying data. The OODBMS has many advantages and benefits. First, object-oriented is a more natural way of thinking. Second, the defined operations of these types of systems are not dependent on the particular database application running at a given moment. Third, the data types of object-oriented databases can be extended to support complex data such as images, digital and audio/video, along with other multi-media operations. Different benefits of OODBMS are its reusability, stability, and  reliability. Another benefit of OODBMS is that relationships are represented explicitly, often supporting both navigational and associative access to information. This translates to improvement in data access performance versus the relational model. Another important benefit is that users are allowed to define their own methods of access to data and how it will be represented or manipulated. The most significant benefit of the OODBMS is that these databases have extended into areas not known by the RDBMS. Medicine, multimedia, and high-energy physics are just a few of the new industries relying on object-oriented databases. As with the relational database method, object-oriented databases also has disadvantages or limitations. One disadvantage of OODBMS is that it lacks a common data model. There is also no current standard, since it is still considered to be in the development stages. A significant difference between object-oriented databases and relational databases is that object-oriented databases represent relationships explicitly, supporting both navigational and associative access to information. As the complexity of interrelationships between information within the database increases, so do the  advantages of representing relationships explicitly. Another benefit of using explicit relationships is the improvement in data access performance over relational value-based relationships. 2.4 Object Relational Database Management System (ORDBMS)   Object Relational Database Management System (ORDBMS) is an extended development of existing relational database system. To overcome the certain limitations and to increase the performance level, and to achieve the benefits of relational model and object model, ORDBMS technology evolved by combining the relational databases and object oriented concepts. We can incorporate our custom data types, functions, operators and methods with the database and we can store images, geographical information and multimedia objects such as audio and video in ORDBMS. And it allows us to raise the level of abstraction at which we want to view the problem domain. In RDBMS, it is difficult to map the objects to the database whereas in OODBMS object oriented features are supported extensively. However, in ORDBMS limited support of object oriented features, mostly to new data types. Moreover, it supports abstract data types (ADTs) and complex relationships. ORDBMSs have the same query centric approach to data management as we have in RDBMS. Through declarative SQL statements, we can handle the data access and there is no procedural or object-at-a-time, navigational interface. ORDBMS allows us to continue using our existing systems, without having to make major changes. Another advantage is that it allows users and programmers to start using object-oriented systems in parallel. In ORDBMS technology the concept of extensibility is a principal innovation. ORDBMSs have an extended functionality of DBMS and information system which can be deployed over different machines as it has a central server program whereas OODBMS has a typical distributed data architecture. This is the difference in architectures of ORDBMS and OODBMS. Another difference between ORDBMS and OODBMS is, an object-oriented databases design is based solely on Object-Oriented Analysis and Design (OOAD) principles whereas ORDBMS is an extended development of traditional relational database with object oriented concepts structures such as abstract data type, nested tables, and varying arrays. In simple words, we can say that ORDBMSs synthesize the features of RDBMSs with the best ideas of OODBMSs.   Where Does Xml Fit? DBMS have advanced into the Internet and Web Age.  Stored data is widely being accessed through a Web browser. Today, queries are being generated through Web-accessible forms and answers are being formatted using a mark-up language such as HTML or XML. In addition, many vendors and distributors are adding features to their DBMS aimed at making it better equipped for Internet usage If your application requires moving data between enterprises, XML is a good solution. XML lets you send data across the Internet and through firewalls by using the standard HTTP protocol. XML is also a good choice if your application needs to move data between hardware or software platforms (OSs).  XML is not machine- or OS-specific. Finally, XML is a  good choice if you simply want to ensure that your application or data source is robust even if the data schema changes.  XML enables your application to be extensible  because you access the XML-formatted data by using element and attribute names instead of offsets, which structured programming languages use. If you have one or more of these application requirements, then XML is a good solution. 3.1 Data storage using XML XML Databases offer the same functionality of Object Databases, data is structured in a hierarchical manner and they store XML documents instead of theoretical Objects. We could even say that the XML database model is just a comeback of the hierarchical model because in principle this is the same concept of data storage, indexation and querying. XML databases have the added benefit of being able exchange the data in its native format, which is perfect for todays web requirements. 3.2 Data exchange using XML   XML  messages exchanged are by nature hierarchical and deeply tree structured, sometimes the data is even unpredictable and sometimes the structure is prone to change at any time, developers trying to map this data to a relational structure may find their lives becoming more and more difficult. XML Databases can accept structured as well as unstructured data. XML documents do not have to conform to any set Schema so a developer can fire anything they wish at the database, no need to modify tables and columns. XML Schema allows one to define an XML document in both its node structure (e.g. elements and attributes) as well as the data types contained within these nodes. It allows one to define these data types in very explicit detail. This usage has a lot of advantages, at least for front-end applications: It saves a lot of memory by removing application-specific classes and replacing it with a small set of classes, the DOM. This means that a single application server can handle a lot more of different data types. This is important to us as we designed our presentation layer for Application Service Provider (ASP) usage. The ASP context means that to keep costs as low as possible, you run many different applications in the same application server. If each application had its own set of application-specific classes to model data, the application server would be crowded with classes. It saves a lot of time and energy by the sheer flexibility of XML. If your data and application code are written in XML, adding or removing data to the presentation layer is a way much easier than if data was modelled in application-specific classes. You dont have to modify the application-specific classes, recompile the whole application and redeploy. There are of course some disadvantages, but I think its just a matter of work and time before they can be fixed: -If you dont seem to have a requirement to move data between enterprises, across the Internet, or through firewalls.  So, unless youre trying to make your applications more extensible, XML isnt a good choice for your scenario -Using XML as your database will work fine as long as your datasets stay relatively small. Meaning, it can all fit in memory and stay there comfortably. Once your data grows to the point where it will not all fit in memory, you will probably start seeing serious performance degradation -The problem for many XML aspirations is that the core of an RDBMS are its  relations. In particular, the set of constraints that exist between tables, and that are enforced by the RDBMS are what make RDBMSs so useful and powerful. XML has no inherent mechanism for enforcing constraints. -If you have a heavy investment in an Object-Relational DBMS (Oracle, MS, IBM) and have learned to live with them changing the data model in such systems from relational to anything else would entail a huge amount of work and risk. Conclusions Relational databases have a strong-hold on the current database market due to their maturity, reliability, the majority of existing applications using the relational model. As object-oriented programming languages continue emerging as the favored or dominate programming language for building new applications, probably OODMBS will surpass the RDBMS as the most popular and dominate database management systems in the business market. Something similar is happening to the object-relational database management system (ORDBMS) which the main objective is to merge the benefits of both the relational and object-oriented model. Many RDBMS products on the market today are releasing first generation ORDBMS products. If these products are able to fulfill the main objective of ORDBMS as well as enable companies to convert existing relational models to partial or full object-oriented models, the end of relational databases could be eminent. The growth in popularity of XML has been almost as dramat ic as that of OO. As a consequence, new standards for data objects and new development products based on XML keep emerging. In my opinion the main reason why RDBMS Data Model dominates the market right now is because RDBMS design has evolved to disallow users from asking questions that the database isnt good at answering. The fact that we ship databases that only permit things that we know how to answer efficiently does NOT imply that we will never be able to answer other questions more efficiently. It is quite easy to see a trend in the industry that shows consistent continual progress at solving hard query problems. Of course some problems will always be hard (distributed cost-based query optimization is one), but I would point out that research on RDBMS optimizations has tapered off quite a bit and we have seen major increases in research geared towards semi-structured data. So we are simply easing off on some of the traditional RDBMS constraints and beginning to allow things like recursive self-joins, ragged hierarchies, etc. and we are optimizing these things. I mean, we already solved the RDBMs opti mization challenge and now it is time to move to the next thing. XML seems like a very appropriate evolutionary step.

Monday, August 19, 2019

Roanoke Island :: essays research papers

In 1584, explorers Phillip Amanda and Arthur Barlowe were the first people to set eyes on Roanoke Island. It is explained to be characterized by thick marshlands and stands of live oaks teeming with wildlife. The explorers were sent there by Sir Walter Raleigh. HE was a poet soldier and a statesman. The trip was for one specific reason, to search for an ideal location for settlement. The queen was very pleased about what was being done. She was so please that she granted Raleigh a patent for all the lands he could occupy. He called the new land Virginia in honor of the Virgin Queen. Raleigh recruited 117 men and women for a permanent settlement. When the people had got there they discovered that the Roanoke Indians had killed 15 men. They were forced to stay. On August 18 1587 Eleanor Dare gave birth to a girl. She named her Virginia. She was the first child to be bore on the American soil. The new land needed supplies in order to stay alive so John White left for Brittan. Little did he know that he would never see his family again. He returned in two years eager to see his family back on the island but he never found anyone. He had only found a carving which read â€Å"craotok â€Å". That meant that they had gone 50 miles up Maine. There was a terrible storm and he was forced to go back to Brittan. The people of Roanoke were never found for they had mysteriously disappeared. Raleigh had given up hope for settlement, but in 1591 he had his hopes high again. He sent another expedition to America but it had failed. In 1595 he decided to go for himself. He ended up on Guiana instead of Virginia. 15 years later he tried once again and failed. He tried again in 1603. This time he sent Bartholomen Gilbert. He and his crew were killed by Indians. After that tragic incident. Raleigh could no longer try anymore, because later he was imprisoned by the new king, King James I. Roanoke Island :: essays research papers In 1584, explorers Phillip Amanda and Arthur Barlowe were the first people to set eyes on Roanoke Island. It is explained to be characterized by thick marshlands and stands of live oaks teeming with wildlife. The explorers were sent there by Sir Walter Raleigh. HE was a poet soldier and a statesman. The trip was for one specific reason, to search for an ideal location for settlement. The queen was very pleased about what was being done. She was so please that she granted Raleigh a patent for all the lands he could occupy. He called the new land Virginia in honor of the Virgin Queen. Raleigh recruited 117 men and women for a permanent settlement. When the people had got there they discovered that the Roanoke Indians had killed 15 men. They were forced to stay. On August 18 1587 Eleanor Dare gave birth to a girl. She named her Virginia. She was the first child to be bore on the American soil. The new land needed supplies in order to stay alive so John White left for Brittan. Little did he know that he would never see his family again. He returned in two years eager to see his family back on the island but he never found anyone. He had only found a carving which read â€Å"craotok â€Å". That meant that they had gone 50 miles up Maine. There was a terrible storm and he was forced to go back to Brittan. The people of Roanoke were never found for they had mysteriously disappeared. Raleigh had given up hope for settlement, but in 1591 he had his hopes high again. He sent another expedition to America but it had failed. In 1595 he decided to go for himself. He ended up on Guiana instead of Virginia. 15 years later he tried once again and failed. He tried again in 1603. This time he sent Bartholomen Gilbert. He and his crew were killed by Indians. After that tragic incident. Raleigh could no longer try anymore, because later he was imprisoned by the new king, King James I.

Sunday, August 18, 2019

The Fellowship of the Rings :: essays research papers

The Fellowship of the Rings Book Report I want to introduce you to, The Fellowship of the Rings, by J. R. R. Tolkien. It is the first book to the Lord of the Rings, written by Tolkien. The settings in this book changed many times from the hills of the Shire, where the hobbits live, to the deep darkness of the mines of Moria. The book takes place in Middle Earth, which is described by Tolkien as a mysterious place that is full of good and evil. The way Tolkien described each place is amazing and it is as if you were looking at a picture and copying it down into your head. The setting in the book is very important to the story. It kept me thinking and wondering what was going to happen next, which made me read more and more. I couldn’t even begin to describe the setting of the whole book, so I mainly mentioned some of the major locations that took place in the book. In the book, the Protagonist is Frodo Baggins, a hobbit from the Shire who becomes the Ring-bearer. The Antagonist is Sauron, the Dark Lord that forged the One Ring to take over Middle-Earth. In the fellowship, aside for the ring-bearer, are three other hobbits, Samwise Gamgee, Peregrin Took and Meriadoc Brandybuck, three of Frodo’s closest friends. There is also Gandalf, the wizard; Legolas Greenleaf, son of the Elf King of Northern Mirkwood; the dwarf Gimli, son of Gloin; Aragorn, son of Arathorn, and heir to the throne of Gondor; and Boromir, oldest son of the Steward of Gondor. They all have some talent or purpose in aiding Frodo in the quest. As the action rises the mood is often tense with suspense and a sense of doom. They are in constant danger, always being watched or hunted. The hobbits leave their precious homes and travel through the Old Forest to get to Bree, where they meet Aragorn and he aids them in their journey. All five later leave for Rivendell and the mood is quite tense with the Black Riders hunting them down. On the way, they stop at Weathertop, where Frodo is, unfortunately, stabbed with a Morgul blade. Luckily, they all get to Rivendell safely with the help of Glorfindel, an elf. The fellowship continues on their quest to get rid of the ring and was forced to trudge through Caradhras in order to avoid ‘the dark and secret way’.

Saturday, August 17, 2019

Nike Liu Xiang Essay

Crisis Management in Celebrity Endorsement Group 3 Shweta Zacharia Kern Rachita Swarooparani Nike * World’s leading supplier of athletic gear * A major sponsor of various global sports events and high-profile athletes and athletic teams * Entered into China in 1980 Considered to be the ‘coolest’ brand in China- success due to clever marketing Liu Xiang * One of Nike’s most important brand ambassadors in China * First endorsement signed in 2002- he won his first World Championship * New television commercial (TVC) launched in 2004- he won a gold medal at Athens Olympics- â€Å"Stereotypes are meant to be broken† What went wrong in this arrangement? Nike spent heavily on high-profile advertising campaigns centred on Beijing Olympics themes * It also invested a lot of money to design new sportswear and footwear for Liu and other athletes specifically for the Beijing Olympics * Liu was considered to be more valuable than Yao Ming (Chinese Basketball Team) as he was believed to have a higher chance of defending his title from Athens Olympics- so more money was spent on him * A couple of days before the event, Liu quit the race due to an Achilles injury after a false start by another athlete * This was believed to be a big blow to Nike as Liu was the cornerstone for their program What was the reaction to this? * Mixed emotions spread throughout China. Some of them were sympathetic while others were angry as the news that Liu was injured was kept in the dark till the last moment. * Online posts on a major Chinese portal even criticized Nike by saying that Nike forced Liu not to participate, as the odds in favour of Liu winning the race was unfavourable. Liu made a public apology and expressed his interest in the sport. His de sire for victory is still burning in him and he will soon return back to the sport. What did Nike do? * The day after Liu’s withdrawal, Nike placed a full-page tweaked advertisement depicting Liu’s love of sport despite setbacks * Subsequently, a revised TVC was launched under the same theme- â€Å"Love sport despite setbacks† What is expected to happen now? Although Liu’s existing contracts might not be terminated immediately, in order to avoid public backlash, his withdrawal might affect advertisers’ decisions on renewals. Questions that need to be answered: * Would Nike’s â€Å"Love Sport despite Setbacks† tweaking strategy work? Yes, we think it will work. * Would Nike be able to turn Liu’s withdrawal from the Beijing Olympics into an opportunity to further boost its brand image? Yes, Nike might be able to turn this crisis into an opportunity to further boost its brand image if it continues with Liu. This will give it an edge over other sports gear-brands, which have contracts only with successful players and forget them once a better player comes into the picture. Nike can project itself as a partner to the player through thick and thin. This will help to make it a trusted brand. * What alternatives did Nike and other global brands have to minimise the losses from Liu’s withdrawal? 1. Nike and other global brands can still endorse Liu but reduce the amount spent on him. 2. Though Liu was injured, they can still keep Liu in their campaigns, making him support the upcoming champions in the sport. 3. By keeping Liu (though he was injured), Nike can prove to the customers that ‘Nike is with them through thick and thin’. * Would Nike and the other sponsors drop Liu from their future campaigns? No, we think that they should not drop Liu from their campaign so soon but stick to the theme that they have adopted in this crisis. This is in keeping up with the spirit of sportsmanship – never give up. Tough times do not last, but tough people do!

Motorcycle Helmet Law Essay

Hello, I am here today to talk to you about the Michigan Motorcycle Helmet Law. -This law permits anyone that is 21 years of age or older that has at least 20,000 dollars in heath insurance and has passed a safety course in the past 2 years to ride a motorcycle without a helmet. I am also here to persuade you that this law doesn’t have a person’s safety as the top priority. Just recently I have witnessed a motorcycle crash happen right before my eyes. My stepmother was taking a turn at only 30 mph when she locked up her breaks and crashed over the handle bars.She has been in the hospital for a little over two weeks and it is a miracle that she is in the condition that she is in, recovering from a skull fracture and bruising on the brain, She has been riding for twelve years, no other vehicles were involved, and she was wearing a helmet, if she was not wearing her helmet, I know that we wouldn’t have her with us anymore. We were hoping she would be home for the fo rth of July, but the medical staff still haven’t given us a go home date as of today.Studies from the National Highway administration in 2008 showed that motorcyclists who do not use helmets are three times more likely to suffer a disturbing brain injury in a crash than those who are wearing helmets. The regulations to this law are also very insufficient. 21 years of age is when adults are just allowed to start drinking. Many people that turn 21 haven’t quite learned yet how to handle alcohol or how much is too much when it comes to drinking and driving, or in this case drinking and riding.Also 20,000 dollars worth of health insurance is not nearly enough to cover medical bills caused by accidents with a helmet, let alone to be able to cover the costs of the injuries sustained without a helmet, I can’t help but think this is going to raise everyone’s insurance premiums eventually. Even if you still think not wearing a helmet is cool, take a minute to thin k of this, the only way for over worked understaffed police have to check if you have the proper health insurance coverage is to pull you over, this gives the police probable cause, which in turn takes up your time and the cops time.With this law in effect, death rates and injury rates have skyrocketed up to a new high. The Michigan helmet law is more about ‘freedom’ than about safety. If you want to feel the wind in your hair stand in front of a fan. If you want to get home safe wear a helmet. All in all the Michigan Motorcycle Helmet Law has caused far more bad than good. In the end, I hope that what I have told you today will persuade you to tell a friend, family member, stranger, or even to tell yourself that it is far safer to wear a helmet, than it is to go without one. Please think twice before you decide to ride without a helmet. Guarino, M. (2012, April 13).