Saturday, August 31, 2019

Acknowledgement of report Essay

I had sincerely expressed my ineptness & gratitude towards Max Life Insurance for giving me an opportunity to join this esteem organization for 45 days of summer training. My summer training in Max Life Insurance Kurukshetra, of duration 45 days has been quite successful. During my stay for 45 days, I had received full co-operation from employees and officers of the Max Life Insurance. The practical visualization of the summer training has helped me to understand a lot of practical things. In order to acquire myself to the task of the organization and to analyze them, I met staff who helped by their kind co-operation and guidance. During the training they have been giving the practical knowledge .I would be special thank to our college faculty (HOD) under supervision this topic. This Acknowledgement would be incomplete if I fail to express my deep gratitude towards all the facility of Kurukshetra Institute who gave me a lot of support and guidance .Last but not least I would be special gratitude to our all friends who heartening me to complete this project. PREFACE In our two year degree program of M.B.A of theirs provision for doing training, after 2nd semester. The essential purpose of this project is given an exposure and detailed outlook to the student of practical concept, which they already studied research. For this purpose, I assigned the project for the â€Å"RECRUITMENT AND SELECTION â€Å"in MAX LIFE INSURANCE COMPANY. It is a matter of great privilege to get training from MAX, One of the largest organizations of its kind. I hope this report will provide an experiment outlook to the dynamic functioning in the HR DEPTT. Of this company.

Friday, August 30, 2019

Psy 300

|[pic] |Syllabus | | |College of Social Sciences | | |PSY/300 | | |General Psychology |Copyright  © 2009, 2006, by University of Phoenix. All rights reserved. Course Description General Psychology is a survey course which introduces the student to the major topics in scientific psychology as applied to human behavior. Applications of these principles will be made to the human experience. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. †¢ Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Kowalski, R. & Westen, D. (2011). Psychology (6th ed. ). Hoboken, NJ: Wiley. All electronic materials are available on the student website. |Week One: The Science of Psychology | | |Details |Due |Points | |Objectives |Examine the major underlying assumptions of the various schools of thought in psychology. | | | |Explain how psychological research applies to various aspects of personal and social life. | | | | |Determine what guidelines should be applied to the evaluation of psychological research and | | | | |practices. | | | | |Identify ethical dilemmas that may arise in psychological research. | | | |Describe the basic biological foundations of psychology. | | | |Readings |Read Ch. 1–3 of Psychology. | | | | |Review this week’s Electronic Reserve Readings. | | | |Participation |Participate in class discussion. |4 out 7 days |2 | |Discussion Questions |Respond to weekly discussion questions. DQ 1: |2 | | | |Day 3 | | | | | | | | | |DQ 2: | | | |Day 5 | | |Nongraded Activities and |Use the link on the student web page to access and view the following video clips: | | | |Preparation | | | | |MyPsychLab |Branches of Psychology | | | | |The Complexity of Humans | | | |Learning Team Instructions |Resources: Learning Team Toolkit |Day 7 |2 | | |Complete the Learning Team Charter. | | | |Individual Foundations of |Prepare a 700- to 1,050-word paper in which you examine the foundations of psychology.In |Day 7 |10 | |Psychology Paper |your paper be sure to address the following components: | | | | | | | | | |Identify the major schools of thought in psychology and examine their major underlying | | | | |assumptions. | | | | |Identify the primary biological foundations of psychology linked to behavior. | | | | | | | | | |Prepare to discuss this paper in class. | | | | | | | | |Format your paper consistent with APA guidelines. | | | |Week Two: Sensation and Perception | |Learning | | |Details |Due |Points | |Objectives | | | | | |Describe the concepts of transduction and absolute threshold. | | | |Examine sensation as it relates to the visual, auditory, tactile, olfactory, and gustatory | | | | |systems. | | | | |Distinguish sensation from perception. | | | | |Explore the conditioning processes involved with learning. | | | | |Distinguish between classical and operant conditioning. | | | | |Define unconditioned stimulus, conditioned stimulus, reinforcement, shaping, and extinction. | | | |Examine cognitive-social models of learning. | | | |Readings |Read Ch. 4 & 5 of Psychology. | | | | |Review this week’s Electronic Reserve Readings. | | | |Participation |Participate in class discussion. |4 out of 7 days|2 | |Discussion Questions |Respond to weekly discussion questions. |DQ 1: |2 | | | |Day 3 | | | | | | | | |DQ 2: | | | | |Day 5 | | |Activities and Preparation |Use the link on the student web page to access and view the following video clips: | | | | | | | | | |A Nobel-Winning Study in Feat ure Detectors | | | | |Frequency and Amplitude of Sound Waves | | | | |The Shaping Process | | | | | | | | | |Learning Team: Outline for Week 3 Paper | | | | | |Day 7 |4 | |Individual |Prepare a 1,050- to 1,400-word paper in which you discuss phobias and addictions as related |Day 7 |10 | |Phobias and Addictions Paper |to classical and operant conditioning. Phobias and addictions are two emotional difficulties| | | | |which learning theorists can account for. Be sure to include the following: | | | | | | | | | |Explore how phobias can be developed through classical conditioning. | | | | |Explore how addictions can be developed through operant conditioning. | | | |Distinguish between classical and operant conditioning. | | | | |Explain what extinction means and how it is achieved in both classical and operant | | | | |conditioning. | | | | | | | | | |Format your paper consistent with APA guidelines. | | | Week Three: Memory, Thought, Language, and Intelligence | | |Details |Due |Po ints | |Objectives | | | | | |Examine the processes of memory and information processing. | | | | |Describe short-term memory and long-term memory in relationship to each other. | | | | |Compare and contrast language, thought, reasoning, and problem solving. | | | |Explore the definitions of intelligence and the validity of intelligence measurements. | | | | |Articulate the relationship between memory and intelligence. | | | |Readings |Read Ch. 6–8 of Psychology. | | | | |Review this week’s Electronic Reserve Readings | | | |Participation |Participate in class discussion. |4 out of 7 days|2 | |Discussion Questions |Respond to weekly discussion questions. |DQ 1: |2 | | |Day 3 | | | | | | | | | |DQ 2: | | | | |Day 5 | | |Individual Gardner |Prepare a 1,050- to 1,400-word paper in which you discuss the theory of multiple |Day 7 |10 | |Intelligence paper |intelligences developed by Howard Gardner. Pick three and discuss how each can have an | | | | |impact on your personal success.Below is a list of the eight intelligences: | | | | | | | | | |Linguistic | | | | |Musical | | | | |Logical-Mathematical | | | | |Naturalist | | | | |Spatial | | | | |Bodily-Kinesthetic | | | | |Intrapersonal | | | | |Interpersonal | | | | | | | | | |Format your paper consistent with APA guidelines. | | | |Learning Team Prepare a 1,050- to 1,400-word paper in which you discuss the type of environment that |Day 7 |10 | |Sensation, Perception, and |facilitates the attention and perceptive processes of each Learning Team member. In order to | | | |Attention Paper |prepare your report, perform the following activities: | | | | | | | | | |Conduct an open dialogue about each team member’s threshold for auditory stimuli. | | | | | | | | |Compare the experiences and comfort levels of each team member with dichotic listening, or | | | | |the â€Å"cocktail party† phenomenon. | | | | | | | | | |Discuss how dividing attention facilitates or impedes each team memberâ⠂¬â„¢s learning. | | | | | | | | |Identify and articulate what you see as the sensory perception problem involved. | | | | | | | | | |Make recommendations and ground rules that will accommodate the auditory sensation, | | | | |perception, and attention to learning during your Learning Team meetings. | | | | | | | | |Format your paper consistent with APA guidelines. | | | |Week Four: Motivation and Personality | |Human Development | | |Details |Due |Points | |Objectives | | | | | |Examine basic theories of motivation. | | | |Compare and contrast theories of personality in terms of how they explain an individual’s | | | | |unique patterns and traits. | | | | |Determine the usefulness and the limitations of personality testing. | | | | |Identify basic theories of development. | | | | |Distinguish between the influences of heredity and environment on psychological development. | | | |Readings |Read Ch. 10, 12, & 13, of Psychology. | | | |Review this week’s Electronic Reser ve Readings | | | | | | | | | |Learning Team: Outline for the week 5 paper |Day 7 |4 | |Participation |Participate in class discussion. |4 out of 7 days|2 | |Discussion Questions |Respond to weekly discussion questions. |DQ 1: |2 | | | Day 3 | | | | | | | | | |DQ 2: | | | | |Day 5 | | |Individual |Resources: Articles located through the University Library or other sources |Day 7 |10 | |Life Span Development and | | | | |Personality Paper |Select a famous individual from the 20th or 21st centuries. Conduct research concerning the | | | | |background of your selected individual to determine what forces have impacted his or her life| | | | |from the viewpoint of developmental psychology. | | | | | | | | |Prepare a 1,050- to 1,400-word paper in which you address the following items: | | | | | | | | | |Distinguish between the influences of heredity and environment on the person’s psychological | | | | |development. Be sure to specify which area of psychological development: moral, emotional, or| | | | |other. | | | | | | | | | |What family issues or social support systems may have influenced the person’s developmental | | | | |growth and adjustment? | | | | | | | | |Select two different theories of personality and apply them to your selected figure, and | | | | |answer the following question: How does each theory differ in terms of how it explains the | | | | |individual's unique patterns or traits? | | | | | | | | | |Explain which theoretical approach you believe best explains the individual's behaviors and | | | | |achievements.Make sure to explain why you made this choice. | | | | | | | | | |Use a minimum of three sources and be prepared to discuss your paper in class. | | | | | | | | | |Format your paper consistent with APA guidelines. | | | Week Five: Social Psychology | |Abnormal Psychology and Therapy | | |Details |Due |Points | |Objectives | | | | | |Analyze precursors and consequences of human interaction in terms of social psychology | | | | |concepts. | | | | |Explore basic concepts of human interaction from a social psychology perspective. | | | | |Define abnormal psychology in contrast to â€Å"normal psychology. † | | | | |Examine mental disorders and mental illness from the psychological perspective. | | | |Compare and contrast therapies designed for each school of thought in psychology for treating| | | | |mental disorders. | | | |Readings |Read Ch. 14-17 of Psychology. | | | | |Review this week’s Electronic Reserve Readings | | | |Participation |Participate in class discussion. |4 out of 7 days|2 | |Discussion Questions |Respond to weekly discussion questions. DQ 1: |2 | | | |Day 3 | | | | | | | | | |DQ 2: | | | | |Day 5 | | |Individual |Resources: Articles located through the University library or other sources |Day 7 |10 | |Social Influences on Behavior | | | | |Paper |Prepare a 1,050- to 1,400-word paper in which you examine basic concepts of human interaction| | | | |from a psychology perspect ive. In your examination, describe at least two examples of how | | | | |human behavior changes based on social situations. In your description be sure to address the| | | | |following: | | | | | | | | |Describe the specific behaviors. | | | | | | | | | |Describe the context in which the behaviors occurred. | | | | | | | | | |Analyze precursors and consequences of the behaviors in terms of social psychology concepts. | | | | | | | | |Identify any associated phenomenon with your selected behaviors, such as social facilitation,| | | | |social loafing, or groupthink. | | | | | | | | | |Determine if the exhibited behaviors necessitate therapeutic intervention. | | | | | | | | |Prepare to discuss your paper in class. | | | | | | | | | |Format your paper consistent with APA guidelines. | | | |Learning Team |Prepare a 1,050- to 1,400-word paper in which you discuss abnormal psychology and therapy. In|Day 7 |10 | |Abnormal Psychology and |your paper, be sure to address each one of the follo wing items: | | |Therapy Paper | | | | | |Compare and contrast normal and abnormal psychology. | | | | |Examine at least two mental disorders and two mental illnesses from the perspective of | | | | |psychology. | | | | |Discuss the similarities and differences among the therapies for each school of thought in | | | | |psychology for treating mental disorders. | | | | |Use a minimum of three sources and be prepared to discuss your paper in class. | | | | | | | | |Format your paper consistent with APA guidelines. | | | Copyright University of Phoenix ® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft ®, Windows ®, and Windows NT ® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited i n accordance with University of Phoenix ® editorial standards and practices.

Thursday, August 29, 2019

Urban design

Urban designOverviewWhat is built-up design?Urban conceive is the method of organizing the personal scene for life in towns, small towns and small towns. It is the art of doing topographic points. It engages the conceive of constructions, assemblies of constructions, infinites and countrysides, and puting up the methods that make booming development possible. Why are so legion locations so terribly designed? Why are the locations we are building so distinguishable from the locations we like? So legion new enlargement snuff out what makes a location exceptional and give the consequence of holding been conceived ( if that is the word! ) by person with no sense of what makes a booming topographic point. Why is so much development so terribly designed? The item that 84 per centum of planing entries are drawn up by person with no conceive instruction may hold certain thing to make with it. But being taught in conceive does non necessarily mean that the person to fault for the development will gestating certain thing that might do a booming topographic point. After all, they may non hold glimpsed that as their occupation. They may hold been gestating merely of restricted and short-run purposes: to build certain thing that the developer can cover rapidly ; or to help the edifice ‘s users, other than doing a more pleasing know-how for individuals transient by.The public involvement is broader, and longer term. Urban conceive petitions to individuals who are involved in more than merely the conceive of a solitary building or the concerns of a lone user. What gets built-up interior decorators out of bed in the morning is the difference of gestating a location that will be utilized and relished by a wide assortment of distinguishable individuals for distinguishable grounds, non merely now but in old ages to come.A new professionUrban conceive is one of the newest profe ssions. The grade ‘urban interior decorator ‘ is little more than 25 old ages old. Much of what built-up interior decorators do – organizing the locations where we reside – was finished by professionals of diverse types before so, but the occupation was glimpsed from the point of view of specific professions. Architects and contrivers utilised to postulate about the maps of their two professions. Architects would impeach contrivers of impeding with aesthetic personal businesss about which they were non trained to judge. Planners would impeach designers of gestating constructions entirely as things, with small attempt to take history of their context or of their expected influence on the milieus. In 1978 some designers and contrivers called a armistice. This adept sniping is unpointed, they said. We have certain thing in common: we are all in the endeavor of doing topographic points. That should be the basis of our employed together.Peoples with a missionThe Urban Design Group was formed, and shortly designers, contrivers, countryside designers, applied scientists, public originative persons and a assortment of other professionals were confirming their house promise to built-up design. Their aim was to alter how the natural environment was shaped. They contended that designers should be worried with the location, non merely with gestating a building to carry the client ‘s claims entirely. Planners should be worried, non merely with land usage, but with the personal form of development. Landscape architecture should be engaged in look intoing and groking sites at the start of the designing and conceive method, other than being conveyed in at a late phase to mask unattractive constructions with some planting. Highway applied scientists should utilize their abilities to do locations that are delighting to be in and to saunter through, other than concentrating narrowly on keeping the traffic traveling. Modern built-up conceive can be advised as portion of the broader control and regard of Urban planning. Indeed, Urban planing started as a action chiefly used by with personal businesss of built-up design. Works for illustration Ildefons Cerda ‘s General Theory of Urbanization ( 1867 ) , Camillo Sitte ‘s City Planning Harmonizing to Artistic Principles ( 1889 ) , and Robinson ‘s The Improvement of Cities and Towns ( 1901 ) and Modern Civic Art ( 1903 ) , all were chiefly worried with built-up conceive, as did the subsequent City Beautiful motion in North America. ‘Urban design ‘ was foremost utilized as a characteristic period when Harvard University hosted a sequence of Urban Design Conferences from 1956. These seminars supplied a phase for the commencing of Harvard ‘s Urban Design plan in 1959-60. The Hagiographas of Jane Jacobs, Kevin Lynch, Gordon Cullen and Christopher Alexander became important plants for the school of Urban Design. Gordon Cullen ‘s The Concise Townscape, foremost released in 1961, and moreover had a big purchase on legion built-up interior decorators. Cullen analyzed the customary originative attack to town conceive of theoreticians for illustration Camillo Sitte, Barry Parker and Raymond Unwin. He conceived the impression of ‘serial vision ‘ , characterizing the built-up countryside as a sequence of associated infinites. Jane Jacobs ‘ The Death and Life of Great American Cities, released in 1961, was moreover a accelerator for involvement in constructs of built-up design. She critiqued the Modernism of CIAM, and claimed that the publically ownerless infinites conceived by the ‘city in the park ‘ thought of Modernists were one of the major causes for the increasing offense rate. She contended instead than for an ‘eyes on the street ‘ attack to village designing, and the Resurrection of major public infinite case in points, for illustration roads and rectangles, in the conceive of metropoliss. Kevin Lynch ‘s The Image of the City of 1961 was furthermore seminal to the action, particularly with considers to the impression of discernability, and the lessening of built-up conceive thought to five fundamental constituents – paths, vicinities, margins, nodes, landmarks. He moreover made good liked the usage of mental charts to groking the town, other than the planar personal expert designs of the predating 50 old ages. Other outstanding plants encompass Rossi ‘s Architecture of the City ( 1966 ) , Venturi ‘s Learning from Las Vegas ( 1972 ) , Colin Rowe ‘s Collage City ( 1978 ) , and Peter Calthorpe ‘s The Following American Metropolis ( 1993 ) . Rossi presented the impressions of ‘historicism ‘ and ‘collective memory ‘ to built-up conceive, and suggested a ‘collage metaphor ‘ to gain the montage of new and older types inside the indistinguishable built-up infinite. Calthorpe, on the other manus, evolved a pronunciamento for sustainable built-up home by intermediate denseness home, every bit good as a conceive manual for building new towns in understanding with his impression of Transit Oriented Development ( TOD ) . Bill Hillier and Julienne Hanson in â€Å" The Social Logic of Space † ( 1984 ) presented the impression of Space Syntax to calculate how action patterns in towns would help to built-up verve, anti-social demeanor and f iscal success. The attraction of these plants produced in periods for illustration ‘historicism ‘ , ‘sustainability ‘ , ‘livability ‘ , ‘high value of built-up constituents ‘ , etc. go mundane idiom in the country of built-up planning.

Evidence Base Assignment Example | Topics and Well Written Essays - 250 words

Evidence Base - Assignment Example On the other hand institutional changes, healthcare practitioner aptitude, proficiency, education play vital role. Research indicates that challengers disagree about evidence based research making significant difference in health care. A lacuna is observed in insightful approach as healthcare expenses are substantially predisposed by the implementation, acceptance and proliferation of knowledge and technology. This directly influences mortality as well as morbidity and hence evidence-based health care. Research reviews suggest that evidence based nursing practice does sway â€Å"substantial gains† in terms of patients’ behavior, knowledge, physiological and psychosocial upshots in contrast to patients who obtained customary nursing care. It is believed that evidence-based nursing is more than utilizing research findings as it is assimilation of investigations and explorations carried out while performing the research besides patient predilections, the clinical locale and situations. One of the studies conducted by Thomas et al acknowledged 18 studies of 467 healthcare contributors (partakers were nurses in all except 1 study). It was found that reporting method was inadequate and required improvement while 3-5 studies display some development and perfection indicating that evidence –based research do occupy an important position in nursing care and improvement in patient’s well

Wednesday, August 28, 2019

Security Planning and Assessment Quiz Essay Example | Topics and Well Written Essays - 750 words

Security Planning and Assessment Quiz - Essay Example Security personnel should also have some knowledge in regards to their role in the justice system and the legal process, aspects of evidence, and the ability to detain or arrest. A college education is an important part of everyone's life, even though it is not a requirement for working as a security guard. However, college courses in psychology, sociology, criminology, and security can be very helpful for anyone working in the security industry. Security consultants and managers have a greater need for a college education in security. It gives them a greater awareness of the industry and the most comprehensive knowledge on trends and research. It can also keep them abreast of changes in the law, the handling of evidence, or new processes and procedures available for private security. As managers, an educational background in management theories and styles is very important in today's technology based competitive world. One of the major asset protection challenges is the protection against cyber-crime. This area is one of the fastest growing, and fastest changing, fields within security. Not only are computer systems vulnerable to attack to transfer money from bank accounts, there is also massive amounts of information that needs to be secured. According to Ortmeier (2008), information is "the lifeblood of almost every enterprise" and "represents one of the most important vehicles for survival within a competitive global economy" (p.152). This information may relate to national defense, product design, or corporate strategy. Information security will continue to be a challenge as systems continually change and criminals sharpen their skills. Confronting this challenge will require security personnel with very high level computer skills. 4.) What trends in terrorism can we expect to see in the future Will the tactics and strategies terrorism uses remain the same or change In either case how will these strategies be used, and what steps should security do to reduce the potential for a terrorist act against their organizationOne of the trends in terrorism that will become more noticeable in the US will be the increase in crimes committed by terrorists to finance their terrorism (Hamm, 2005, p.1). Terrorist targets will become high value assets, or cyber crime that preys on bank accounts. In addition, the increase in cooperation among domestic terrorists, foreign terrorists, organized crime, and gangs could see an increase in multi-organizational operations. It could also open the door for terrorist 'outsourcing', where a gang commits the act but the terrorist organization takes credit for it. US gangs and organized crime could use their freedoms and protections to give the foreign terrorists an advantage. 5.) What role should the United States play in the future to international order, and what government policy implications regarding that role do you see that could impact

Tuesday, August 27, 2019

Admission essay Example | Topics and Well Written Essays - 500 words - 4

Admission - Essay Example m my work experiences and my educational career at Tarrant County College that group synergy translates into outstanding work performance and maximum satisfaction for the participants of the group. I have work on several projects as an undergraduate student in which have displayed the ability to interpret both qualitative and quantitative information. I have always had a passion for math, science, and field work. The discipline of electrical engineering provides a good mix of office and outdoor work. It is important always to work cohesively as team to achieve the optimum results. I like designing work. I understand that it takes hard work and dedication to achieve the disciplined required to become an engineer. I have always tried my best at everything life since it perseverance shows true character. Obtaining the educational attainment of an electrical engineering degree is my ultimate professional goal which I planned to achieving by enrolling in a top engineering school. The world has become a place where the interrelations among nations have become imperative in order for people to survive. The continent on earth that is behind all other in terms of social economical progress is the continent of Africa. I was born and raised in the nation of Sudan. As an African is my obligation to better myself in order to help my families and my people. Africa is one of the poorest nations in the world. In order to improve the well being of a nation education must be a top priority. In Africa only 57% of children are enrolled in primary school and only one in three does not complete school (Fightpoverty, 2006). I want to become a part of the movement and participation needed to change Africa forever. There needs to be a commitment from the private and public section to dramatically increase the investment in education to reach larger sectors of the population. In order to improve the standard of living of Africans we need to build better basic infrastructure such as roads,

Monday, August 26, 2019

With the increase in global interconnectedness, the scope of strategic Essay

With the increase in global interconnectedness, the scope of strategic policy choices available to individual governments and the effectiveness of many traditional policy instruments tends to decline - Essay Example Various contemporary scholars from different fields of discipline support the belief that globalization is the main concept in these contemporary times. Although there is no single definition for globalization, those who support its tenets believe that as interconnectedness is advancing in most economies, national governments are also losing their relevance and their power to impact on economic outcomes. Based on such perspective, the state seems to have become a mere pawn in the globalized economy. Held and McGrew (2003, p. 13) point out that "[w]ith the increase in global interconnectedness, the scope of strategic policy choices available to individual governments and the effectiveness of many traditional policy instruments tends to decline". This paper shall discuss this statement, considering any supporting proof or evidence to this statement, and possibly discussing any claims contrasting such statement. This study is being carried out in order to establish a clear evaluation of the above statement, as a means for this student to establish a clearer and more logical assessment of the claim. A better understanding would likely provide assistance also for interest groups and other scholars in their better understanding of globalization and state roles. ... 90). They argue that the economic activities are now less under government control and the state power is withering, often giving rise to different kinds of state. These states appear to have lost their sovereignty and have stepped back on their welfare programmes and industrial policies, entering into more collective government processes (Garland, 1990, p. 449). In general, it is important to understand that â€Å"globalization, as a process, is one that rejects and obliterates boundaries† (Basu, 2008, p. 26). In order to understand globalization, it is also important to understand that globalization refers to various overlapping interactions of national economies, up to a point where the impact of the national networks declines in relation to the effect of global networks (Kaldor, 2003, p. 18). The concept of globalization therefore implies the spread of international interactions to the extent that it creates new social relations. This seems to be what most authorities beli eve when they seek to assess the impact of global economic integration (Kaldor, 2003, p. 18). III. Globalists It is important to note that the globalization discussion does point out that for the globalists and for its critics, evaluating the international activities has become the main measure of globalization (Kaldor, 2003, p. 19). However, even where globalization networks may be advancing, this would not necessarily settle the issue because it would not eliminate the possibility that the expansion and sustenance of globalized networks are based on national interactions as much as transnational networks (Mann, 1997, p. 99). In effect, supporters of globalization must confront issues being pointed out in the globalization discussion. One of these issues is on whether or not the

Sunday, August 25, 2019

BHE 415 - Community and Domestic Violence (Module 4-SLP) Essay

BHE 415 - Community and Domestic Violence (Module 4-SLP) - Essay Example The rate of physical violence towards the elderly people is more than the street violence and the studies have shown that elderly people are more likely to be harmed by family members than the strangers (Quinn & Tomita 1997 p33). The fact that most of the abuse is caused at the hands of children, spouse or close relatives make it shameful for the elders being abused to report it to the authorities. There are different reasons for not reporting the abuse and most of them are based on the fear of being exposed in the society. Some of the reasons that lead to not exposing the torture and the abuse are protection of the family privacy, embarrassment in front of people, humiliation, fear that they will be tortured more if the abuse is reported, a belief that they deserve the abuse and the fear that if the abuse is reported then they will be sent to the care center and hence lose the privacy of life (Elder Abuse Awareness n.d.). However, there are other reasons like elderly people being incapable of understanding that they are being abused. Elderly people suffering from mental problems like dementia and Alzheimer’s are not in position to understand that they are being abused(Quinn & Tomita 1997 p53). In the book, ‘Mental abuse and neglect’, a case of a elderly woman who was 78-year old and was a widow, is described. In this case, the elderly woman confused her son to be her husband and was being sexually exploited by her son. So even the physical and mental incapability of reporting the abuse is a cause of the abuse not getting reported. The short term consequences are mostly physical in nature like bruises over the body, scratches, scars

Saturday, August 24, 2019

Campaign Analysis of Dre beats Essay Example | Topics and Well Written Essays - 2500 words

Campaign Analysis of Dre beats - Essay Example The media has also influenced the rights of many. The paper will present the history of feminism and post-feminism and to what extent different media have driven it. The success of Women feminism can thus be linked to the positive contribution of the media. Women before the 19th century suffered rampant abuse and shame that was propagated by culture and government. Women had little access to maternal health care. Women died during childbirth because of lack of proper mechanisms facilitate reproductive health rights. The women also had to deal with insecurity perpetuated by society that was characterized by wars and violence (Richardson & Wearing 2014). Women were raped and had to have male guardians to protect them from the risks in the society. Women’s participation in politics and society was limited and attracted critism. Men were raised to believe that the world rotates around them, and the women who tried to speak up for their rights were victimized and brutalized, physically and emotionally (Walsh 1917). The education of women was not a priority as girls were raised to become good housewives. Women were never allowed to make decisions in the family. The rise of feminist movements can be linked to the abolishment of slavery that set the tone for the respect human rights. The first two decades of the 20th century is significant as the right of women to vote was enshrined in the law. The voting of women in elections thus ensured that women were able to elect political leaders that addressed their issues. Once feminist movements got the right to vote, they shifted their attention to issues of education and maternal healthcare. The 1970s and 1960s saw the rise of feminism as a result of the revolutionary spirit that was vibrant at that time. The movements saw the adoption of equal pay act of 1963 and civil rights act of 1964. The women feminist movements hoped that the laws would address the discriminatory and sexist

Friday, August 23, 2019

History Essay Example | Topics and Well Written Essays - 500 words - 32

History - Essay Example Yet, new inventions and technological up-gradations are important. Neil Postman has identified a framework that has five factors that he thought is essential for any technological development. The experts feel that the frame work holds good for almost all of the technologies. The five factors are as follows: As the new technology comes in, it has certain advantages and disadvantages associated with it. But those advantages and dis-advantages are never distributed equally among the population and always there are certain gainers and some losers when a new technology is introduced. Western America had been famous for mines. It was in 1848, when James Marshall found gold at a ranch in Northern California. Soon, whole lot of Americans gathered in the region in search of luck through minerals. Some mined for gold while others for silver and other precious minerals. But the technology of mining changed soon. The crude wooden sluices that were used previously were replaced by hydraulic mining that used water jets to break the earth. Such a change impacted greatly over the economy and the society which can be co-related with the Neil Postman’s framework of new technology. As the first principle goes, the new technology called for huge investments and many of the small miners could not bear the cost and they lost the mines to big Western companies. The new technology was advantageous for the big established players and the companies as it called for huge investments. The entrepreneurs who dreamt of making it big through mines were definitely in the disadvantageous positions. The message (third principle) that came with the new technology was that more power was bestowed in the hands of the powerful and the rich with sound infrastructure only could take advantage of it. Though Postman says that the power should not be left to the few, in his fourth principle, most unfortunately same happened. It was only the big companies

Thursday, August 22, 2019

Krishna and Ang Mahabharata Essay Example for Free

Krishna and Ang Mahabharata Essay Bahagi ng Mahabharata ang Bhagavad Gita (o Bhagavadgita), isang diyalogo o pag-uusap sa pagitan nina Krishna atArjuna. The Mahabharata or is one of the two major Sanskrit epics of ancient India, the other being the Ramayana.[2] Besides its epic narrative of the Kurukshetra War and the fates of the Kaurava and the Pandava princes, the Mahabharata containsphilosophical and devotional material, such as a discussion of the four goals of life or purusharthas (12.161). Among the principal works and stories in the Mahabharata are the Bhagavad Gita, the story of Damayanti, an abbreviated version of the Ramayana, and the Rishyasringa, often considered as works in their own right. habharata, ( Sanskrit: â€Å"Great Epic of the Bharata Dynasty†) one of the two Sanskrit great epic poems of ancient India (the other being the Ramayana). TheMahabharata is an important source of information on the development ofHinduism between 400 bce and 200 ce and is regarded by Hindus as both a text about dharma (Hindu moral law) and a history (itihasa, literally â€Å"that’s what happened†). Appearing in its present form about 400 ce, the Mahabharata consists of a mass of mythological and didactic material arranged around a central heroic narrative that tells of the struggle for sovereignty between two groups of cousins, the Kauravas (sons of Dhritarashtra, the descendant of Kuru) and thePandavas (sons of Pandu). The poem is made up of almost 100,000 couplets—about seven times the length of the Iliad and the Odyssey combined—divided into 18 parvans, or sections, plus a supplement titled Harivamsha (â€Å"Genealogy of the God Hari†; i.e., of Vishnu). sinulat ang tulang epikong ito na may layuning parangalan ang mga bayani nang maganap ang paglusob ng mga Aryano (mga Aryan) sa India.  Halos kapantay ng mga diyos ang mga maalamat na mga bayaning ito. The Mahabharata tells the story of two sets of paternal first cousinsthe five sons of the deceased king Pandu (the five Pandavas and the one hundred sons of blind King Dhritarashtrawho became bitter rivals, and opposed each other in war for possession of the ancestral Bharata kingdom with its capital in the City of the Elephants, Hastinapura , on the Ganga river in north central India. What is dramatically interesting within this simple opposition is the large number of individual agendas the many characters pursue, and the numerous personal conflicts, ethical puzzles, subplots, and plot twists that give the story a strikingly powerful development. The five sons of Pandu were actually fathered by five Gods (sex was mortally dangerous for Pandu, because of a curse) and these heroes were assisted throughout the story by various Gods, sages, and brahmins, including the great sage Krishna Dvaipayana Vyasa (who later became the author of the epic telling this story), who was also their ac tual grandfather (he had engendered Pandu and the blind Dhrtarastra upon their nominal fathers widows in order to preserve the lineage). The one hundred sons of the blind king Dhartarashtra, on the other hand, had a grotesque, demonic birth, and are said more than once in the text to be human incarnations of the demons who are the perpetual enemies of the devotees of the lord. The most dramatic figure of the entire Mahabharata, however, is Sri Krishna who is the supreme personality of Godhead himself, descended to earth in human form to reestablish his devotees as care takers of the earth, and who practice Dharma. Krishna Vasudeva was the cousin of both parties, but he was a friend and advisor to the Pandavas, became the brother-in-law of Arjuna , and served as Arjunas mentor and charioteer in the great war. Krishna Vasudeva is portrayed several times as eager to see the war occur, and in many ways the Pandavas were his human instruments for fulfilling that end. The Dhartarashtra party behaved viciously and brutally toward the Pandavas in many ways, from the time of their early childhood. Their malice displayed itselfwhen they took advantage of the eldest Pandava, Yudhishthira (who had by now become the ruler of the world) in a game of dice: The Dhartarashtras won all his brothers, himself, and even the Pandavas common wife Draupadi They humiliated all the Pandavas and physically abused Draupadi; they drove  the Pandava party into the wilderness for twelve years, and the twelve years of exile had to be followed by the Pandavas living somewhere in society, in disguise, without being discovered. The Pandavas fulfilled their part of that bargain by living out side the kingdom, but the evil leader and eldest son of Dhartarashtra, Duryodhana , was unwilling to restore the Pandavas to their half of the kingdom when the thirteen years had expired. Both sides then called upon their many allies and two large armies arrayed themselves on Kurus Field (Kuru was one of the eponymous ancestors of the clan), eleven divisions in the army of Duryodhana against seven divisions for Yu dhishthira. Much of the action in the Mahabharata is accompanied by discussion and debate among various interested parties, and the most famous dialog of all time, Krishna Vasudevas ethical lecture and demonstration of his divinity to his devotee and friend Arjuna (the Holy Bhagavad Gita appeared in the Mahabharata just prior to the commencement of the world war. Several of the important ethical and theological themes of the Mahabharata are tied together in this Gita, and this Song of the Blessed One has exerted much the same sort of powerful and far-reaching influence in the Vedic Civilization that the New Testament has had in the Christian world. The Pandavas won the eighteen day battle, but it was a victory that deeply troubled all except those who were able to understand things on the divine level (chiefly Krishna, Vyasa, and Bhishma the Bharata patriarch who was symbal of the virtues of the era now passing away). The Pandavas five sons by Draupadi, as well as Bhimasena and Arjuna Pandavas two sons by two other mothers (respectively, the young warriors and Abhimanyu, were all tragic victims in the war. Worse perhaps, the Pandava victory was won by the Pandavas slaying, in succession, four men who were like fathers to them: Bhishma, their teacher Drona , Karna (who was, though none of the Pandavas knew it, the first born, pre-marital, son of their mother), and their maternal uncle Shalya (all four of these men were, in succession, supreme commanders of Duryodhanas army during the war). Equally troubling was the fact that the killing of the first three of these respected elders, and of some other enemy warriors as well, was accomplished only through trickery, most of which were suggested by Krishna Vasudeva as absolutely required by the circumstances. The ethical gaps were not resolved to anyones satisfaction on the surface of the narrative and the aftermath of  the war was dominated by a sen se of horror and malaise. Yudhishthira alone was terribly troubled, but his sense of the wars wrongfulness persisted to the end of the text, in spite of the fact that everyone else, from his wife to Krishna Vasudeva, told him the war was right and good; in spite of the fact that the dying patriarch Bhishma lectured him at length on all aspects of the Good Law (the Duties and Responsibilities of Kings, which have rightful violence at their center; the ambiguities of Righteousness in abnormal circumstances; and the absolute perspective of a beatitude that ultimately transcends the oppositions of good versus bad, right versus wrong, pleasant versus unpleasant, etc.); in spite of the fact that he performed a grand Horse Sacrifice as expiation for the putative wrong of the war. These debates and instructions and the account of this Horse Sacrifice are told at some length after the massive and narrative of the battle; they form a deliberate tale of pacification that aims to neutralize the inevitable reactions of th e war. In the years that follow the war Dhritarashtra and his queen Gandhari , and Kunti, the mother of the Pandavas, lived a life of asceticism in a forest retreat and died with yogic calm in a forest fire. Krishna Vasudeva departed from this earth thirty-six years after the war. When they learned of this, the Pandavas believed it time for them to leave this world too and they embarked upon the Great Journey, which involved walking north toward the polar mountain, that is toward the heavenly worlds, until ones body dropped dead. One by one Draupadi and the younger Pandavas died along the way until Yudhishthira was left alone with a dog that had followed him all the way. Yudhishthira made it to the gate of heaven and there refused the order to drive the dog back, at which point the dog was revealed to be an incarnate form of the God Dharma (the God who was Yudhishthiras actual, physical father), who was there to test Yudhishthiras virtue. Once in heaven Yudhishthira faced one final test of his virtue: He saw only the Dhartarashtra Clan in heaven, and he was told that his brothers were in hell. He insisted on joining his brothers in hell, if that were the case! It was then revealed that they were really in heaven, that this illusion had been one final test for him.

Wednesday, August 21, 2019

Abigail progressed Essay Example for Free

Abigail progressed Essay Abigail is the former mistress of John Proctor, and also the previous maid of the Proctor residence. Abigail is the niece of Revered Parris and attempted to practise witchcraft, only to be caught by her uncle. This lead to the arrival of several other characters to precede in the Salem witch trials, where Abigail and her friends act as witnesses. In the beginning of the play, she seems to be dishonest in admitting to witchcraft. When she talks to Parris, she attempts to use Tituba as a scapegoat. But we never conjured spirits She always sings her Barbados songs, and we dance. Abigail tells this to Parris to attempt to clear her name, as she and her friends are accused of witchcraft by the Reverend. She might be thinking that if she persuades her Uncle long enough, the civil blood between the two would make Parris believe that she is innocent, yet Parris is already concerned over the reputation she is getting from a remark that Elizabeth had supposedly made. she comes so rarely to church this year for she will not sit so close to something soiled This has one of the biggest in the opening Act as this sends a message to the audience of what Abigails character is based around, and what she is truly like. In my opinion, Miller describes Abigails character in this manner as he is trying to contrast her character with that of Elizabeth, in the sense of honesty, as how Elizabeth is described in a later discussion between Proctor and Danforth. Abigail is shown to be a sweet young woman, caring for her relatives. This is shown in the book, which would make you believe that she is innocent. However, in the film of The Crucible, Abigail is shown dancing at the beginning of the first segment. This changes your perspective of the character Abigail, due to the relatively bad thing she is performing, which back in those days and what many people believe even now to be a sin. In her life sir, she never lied my wife cannot lie Therefore Abigail is said to lie a great deal, whilst Elizabeth hardly ever lies. Abigail is quick to change her attitude to the girls, intimidating them into a worrisome state. She speaks to her so called friends about the consequences of telling of the witchery they attempted to perform. She uses a natural power she has to strike terror in the hearts of her friends. She also shows how maniacal and ruthless she can be. Let either of you breathe a word and I will come in the black of some terrible night and I will bring a pointy reckoning that will shudder you. Abigail says this to her group of girls as she aims to strike fear in the eye of her followers, stating that if they were to betray her, she would come back and haunt them. And as she explains how she has seen murders occur before her very own eyes, she exclaims she is able to murder any victim she desires. This affects the audience, as in the beginning of the play, they observe a sweet, young lady transform so quickly into this vicious, desperate girl. I think Miller quickly turns Abigail into this enraged character as now the audience can see just how she really acts, behind the faces of her elders. He is successful in doing this as just a few minutes in the plays time before this, as she talks to Parris; she seems to be trying to show Parris of how considerate she is of his feelings by asking him to rest. Uncle, youve prayed since midnight. Why do you not go down and - He shows her speaking with Parris in a manor which a child would talk to their own parents, contrasting the way she talks to her friends, which I think in her opinion is people who she has power over. Miller attempts to show a classic stereotype of a distressed person in a forlorn situation when she is seen talking to her friends. Abigail does have a soft spot in her heart for one person John Proctor. We, the audience hear that John and Abigail have had an affair. In Proctors mind, it is now clearly over between them. Ill not be comin for you no more But Abigail does not see their relationship this way, and thinks that they should be together. Give me a word, John. A soft word. She says this to entice him towards her, in a manner of flirtation. This affects the audience by letting them know who the one man Abigail is in love with is, and how she is willing to re-kindle her relationship with Proctor, even if it means to make Elizabeth a divorcee. I think Miller writes about Abigail in this way to show the audience just how her character resembles that of a stereotype of a young, spoilt girl who will do anything to get what she wants, but never what she deserves. Abigail becomes quick to hand the blame of practising witchcraft over to Tituba, whilst she and her friends knew that it was her lead the witchery into the stage of being worshippers of Lucifer. When Hale and Parris came to confront Abigail about the witchery, the pressure became too much for her, and blurted out the only persons name she thought she could get away with. Did you call the Devil last night? I never called him! Tituba Tituba Hale and Parris are quick to believe the story of Abigail, calling for the presence of Tituba. But at the same they time, they do begin to fear the safety of Abigail from the Devil. Have you sold yourself to Lucifer? I never sold myself! Im a good girl! Im a proper girl! She probably done this to show all of her elders that she is a good Christian girl, and lied to protect herself from a punishment and to also save her Uncles reputation as the towns Reverend. This shows just how ruthless Abigail can be, and to what lengths she would go to bring her own happiness, even if it meant causing pain and suffering to others. I think Miller done this to be constant in Abigails character, showing she can be deceiving and sly. This also shows throughout Act 1, Abigail has maintained a constant character. In the duration of Act Two, Abigail didnt make an appearance, but she was, however, talked about a lot by the other characters, especially by the Proctors. It also appears that she tried to frame Elizabeth Proctor of witchcraft, by cleverly, yet deceivingly sticking a needle into her in the same position a needle was in Elizabeths doll, acting as if Elizabeths poppet was a voodoo doll. But this incident isnt seen, but only talked about by Cheever to Hale, Proctor and Elizabeth.

Packet Sniffing Software Is A Controversial Subject Information Technology Essay

Packet Sniffing Software Is A Controversial Subject Information Technology Essay Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to sniff out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave Busters, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. Definitions A packet sniffer is a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when an attacker monitors network packets, modifies them, and inserts them back to the network (Whitman, et al., 2008). For example, a MITM attack could occur when two employees are communicating by email. An attacker could intercept and alter the email correspondence between each employee, without either knowing that the emails had been changed. MITM attacks have the potential to be a considerable threat to any individual or organization since such an attack compromises the integrity of data while in transmission. Packet sniffing programs work by capturing binary data that is passing through the network, and then the program decodes the data into a human-readable form.   A following step called protocol analysis makes it even easier for the data to be read.   The degree of these analyses varies by individual packet sniffing program. Simple programs may only break down the information in the packet, while more complicated ones can provide more detailed information and analysis, for example, by highlighting certain types of data such as passwords that pass through the network (Packet Sniffing, Surasoft.com, 2011). As for todays networks, switch technology is commonly used in network design. This technology makes it increasingly easy to set up sniffing programs on servers and routers, through which much traffic flows. In addition, there are already built-in sniffing modules being used in todays networks. For example, most hubs support a standard called Remote Network Monitoring (RMON). This kind of standard allows hackers to sniff remotely with the SNMP (Simple Network Management Protocol), used in most network devices, and only requires weak authentication. Network associates Distributed Sniffer Servers are used by many corporations. These servers are set up with passwords that are quite easy to guess or crack. In addition, computers with Windows NT system usually come with Network monitoring agent, which also allows remote sniffing (Packet Sniffing, ISS.net, 2011). Essentially, these sniffing programs are set up for the use of network administrators. However, the threat exists that hackers ca n gain access to the network and view the program logs. Packet sniffers capture all of the packets that travel through the point where the sniffer is located.   For example, if the program was installed next to the server of an organization, the user could have access to all the data being transferred across the company through that server.   Typical types of packets intercepted by attackers include the following: SMTP (email): The attacker can intercept unencrypted emails (Packet Sniffing, ISS.net, 2011). HTTP (web): Web traffic information and history can be easily captured (Packet Sniffing, ISS.net, 2011). Telnet Authentication: Login information to a Telnet account can be intercepted (Packet Sniffing, ISS.net, 2011). FTP traffic: Access to an FTP account can be sniffed in cleartext (Packet Sniffing, ISS.net, 2011). SQL database: Information from web databases is also vulnerable (Packet Sniffing, ISS.net, 2011). Functionality and Possible Uses of Packet Sniffers Good and Bad Uses Like any tool, a packet sniffer is a double-edged sword because it can be used for good or bad purposes (Orebaugh, Ramirez, and Beale, 2007). It can be used by security professionals to investigate and diagnose network problems and monitor network activity (Orebaugh, et al., 2007). Conversely, it can be used to eavesdrop on network traffic by hackers, criminals, and the like, who can use the data gathered for harmful purposes (Orebaugh, et al., 2007). Professionals such as system administrators, network engineers, security engineers, system operators, and programmers use packet sniffers for a variety of uses, including troubleshooting network problems, figuring out system configuration issues, analyzing network performance (including usage and bottlenecks), debugging during the development stages of network programming, analyzing operations and diagnosing problems with applications, and ensuring compliance with company computer usage policies (Orebaugh, et al., 2007). Good: Troubleshoot Network Problems When an error occurs on a network or within an application, it can be very difficult for administrators to determine what exactly went wrong and how to correct the error. Many consider the packet sniffer to be the best tool for figuring out what is wrong with programs on a network (Neville-Neil, 2010). Examining packets as a starting point for solving problems is useful because a packet is the most basic piece of data and holds information, including the protocol being used and source and destination address (Banerjee, Vashishtha, and Saxena, 2010). Basically, at the packet level of analysis, nothing is hidden when all layers are visible (Neville-Neil, 2010). Understanding the timing of what happened is another important factor in debugging network problems (Neville-Neil, 2010). This information can be easily attained by using a packet sniffing program. Essentially, packet sniffers allow you to find out the who, what, and when of a situation, all of which are vital to understanding how to fix a problem (Neville-Neil, 2010). Once these things are known, the administrator can determine what is causing the problem and how to go about fixing it. As soon as a problem occurs, the first recommended step is for the network administrator to use a packet sniffing program to record all network traffic and wait for the bug to occur again (Neville-Neil, 2010). If the administrator already had a packet sniffing program with logging in place, then he or she could go back and examine the log records. Assuming the administrator did not have a log previously set up, the next step would be to only record as much information as necessary to repair the problem (Neville-Neil, 2010). It would not be a good idea to record every single packet of data because if too much data is collected, finding the error will be like finding a needle in a haystack although the administrator has likely never seen a haystack that big (Neville-Neil, 2010). For example, recording only one hour of Ethernet traffic on a LAN will capture a few hundred million packets, which will be too large to sort through (Neville-Neil, 2010). It goes without saying that the admini strator should not record the data on a network file system because the packet sniffer will capture itself (Neville-Neil, 2010). Once the data is recorded, the administrator can examine the packets to analyze and understand what occurred to solve the problem. Good: Network Optimization In addition to solving network communication problems, packet sniffers can help administrators plan network capacity and perform network optimization (Shimonski, 2002). A packet sniffer allows users to view data that travels over a network packet by packet (Shimonski, 2002). However, rather than having to examine each packet, the appropriate sniffer program will perform the analysis for the administrator. The tools are especially useful because depending on the packet sniffing program used, the packet data will appear in an easy-to-understand format. Packet sniffers can often generate and display statistics and analyze patterns of network activity (Shimonski, 2002). Data can appear in graphs and charts that make analysis and comprehension easy. Additionally, the network administrator can filter by selected criteria to capture only the relevant traffic rather than having to sort through irrelevant data (Shimonski, 2002). Knowing what programs and which users use the most bandwidth can help administrators manage resources efficiently and avoid bandwidth bottlenecks. Good: Detect Network Misuse Packet sniffers can be used to monitor application traffic and user behavior (Dubie, 2008). This can be used to detect misuse by company employees or by intruders. To use a packet sniffer to monitor employees legally, a network administrator must do three things. First, he must be on a network owned by the organization, second, he must be directly authorized by the networks owners, and finally, he must receive permission of those who created the content (Whitman, et al., 2008). Permission by content creators is needed because packet sniffing is a method of employee monitoring (Whitman, et al., 2008). Typically, an employee will sign a release form when first employed that allows the employer to monitor the employees computer usage. By using a packet sniffer, employers can find out exactly how each employee has been spending his or her time. Packet sniffers can be used to see all activity and administrators can monitor for behaviors such as viewing inappropriate websites, spending time on the job on personal matters, or abusing company resources. For example, a packet sniffer program could show that a particular employee was downloading music at work, both violating organizational policies and using a large amount of network bandwidth (Dubie, 2008). Packet sniffers are also used to detect network intrusion, log traffic for forensics and evidence, discover the source of attacks such as viruses or denial of service attacks, detect spyware, and detect compromised computers (Orebaugh, et al., 2007). A packet sniffer and logger that can detect malicious entries in a network is a form of an intrusion detection system (IDS) (Banerjee, et al., 2010). The packet sniffer IDS consists of a database of known attack signatures. It will then compare the signatures in the database to the logged information to see if a close match between the signature and recent behavior has occurred. If it has, then the IDS can send out an alert to the network administrator (Banerjee, et al., 2010). Despite this use of packet sniffers to detect intrusion, hackers have methods of making themselves very hard to detect and can use packet sniffers for their own advantages. Bad: Gain Information for Intrusion Intruders maliciously and illegally use sniffers on networks for an innumerable number of things. Some of the most common are to capture cleartext usernames and passwords, discover usage patterns of users, compromise confidential or proprietary information, capture voice over IP (VoIP) telephone conversations, map out a networks layout, and fingerprint an operating system (Orebaugh, et al., 2007). The previously listed uses are illegal unless the user is a penetration tester hired to detect such types of weaknesses (Orebaugh, et al., 2007). An intruder must first gain entry to the communication cable in order to begin sniffing (Orebaugh, et al., 2006). This means that he must be on the same shared network segment or tap into a cable along the path of communication (Orebaugh, et al., 2007). This can be done in many ways. Firstly, the intruder can be physically on-site at the target system or communications access point (Orebaugh, et al., 2007). If this is not the case, the intruder can access the system in a variety of ways. These include breaking into a certain computer and installing sniffing software that will be controlled remotely, breaking into an access point such as an Internet Service Provider (ISP) and installing sniffing software there, using sniffing software that is already installed on a system at the ISP, using social engineering to gain physical access to install the software, working with an inside accomplice to gain access, and redirecting or copying communications to take a path that the intruders comp uter is on (Orebaugh, et al., 2007). Intruders can use sniffing programs designed to detect certain things such as passwords and then use other programs to have this data automatically sent to themselves (Orebaugh, et al., 2007). Protocols that are especially vulnerable to such intrusion include Telnet, File Transfer Protocol (FTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP), Simple Mail Transfer Program (SMTP), Hypertext Transfer Protocol (HTTP), Remote Login (rlogin), and Simple Network Management Protocol (SNMP) (Orebaugh, et al., 2007). Once the intruder has access to the network, he can collect data and use it as he likes. Common examples of stolen data include credit card numbers and proprietary organizational secrets, but include anything the hacker desires. Although organizations may use a primarily switched network, they are not protected from sniffer attacks because many programs exist that allow packet sniffing in a switched network (Whitman, et al., 2008). Because intruders who use packet sniffers do not directly interface or connect to other systems on the network, they are considered to be a passive-type of attack (Orebaugh, et al., 2007). It is this passive nature that makes sniffers so difficult to detect (Orebaugh, et al., 2007). In addition to this, hackers use normally use rootkits to cover their tracks so that their intrusion will not be detected (Orebaugh, et al., 2007). A rootkit is a collection of Trojan programs hackers use to replace the legitimate programs on a system so that their intrusion will not be detected (Orebaugh, et al., 2007). Rootkits replace commands and utilities that the hacker inputs and clears log entries so that there will be no record of his entry (Orebaugh, et al., 2007). Though it is difficult, there are some ways to detect rootkits. Methods of detection include using an alternate, trusted operating system, analyzing normal behaviors, scanning signatures, and analyzing memory dumps (Rootkit, Wikipedia , 2011). Removing rootkits can be very complicated and difficult and if the rootkit is in the central operating system, reinstalling the operating system may be the only option (Rootkit, Wikipedia, 2011). The threat of eavesdropping by intruders is large and challenging. However, there are some defenses that can be taken to prevent hackers from using packet sniffers against an organization. Protecting Against Packet-Sniffers and Man-in-the-Middle Attacks Packet sniffing and man-in-the-middle attacks compromise the integrity and confidentiality of data while in transmission.   Fortunately, there are several techniques that can be used by organizations and individuals to protect against these threats and reduce risk.   Specifically, technology, policy, and education are typically used to cover all aspects of security.    Technology Encryption is the best form of protection against any kind of packet interception (Orebaugh, et al., 2007).   The reason behind this is that even if the data is captured by the packet sniffer, the information is completely unreadable by the attacker (Orebaugh, et al., 2007). By using this technique, messages are encrypted once the data leaves the senders computer.   Both sender and receiver hold a key that decrypts the message being transferred.   Most popular websites apply a level encryption by using the HTTP Secure (HTTPS) protocol.   With this technology, the connection between the web server and the users computer is encrypted; making the information intercepted by a third party useless.   Currently, most popular websites such as Google, Facebook, Yahoo, and Twitter use the https technology.   However, some sites (such as Amazon.com) use https only at the login page and fail to provide a secure connection afterwards.   In order to assure complete security, it is im portant to apply the https protocol throughout the users browsing experience.   The main disadvantage of this feature is that it slightly slows down the users connection.    Email can also be protected from packet sniffers by using encryption.   Email extensions such as Pretty Good Protection (PGP) can be easily implemented using standard email platforms like Microsoft Outlook (Orebaugh, et al., 2007).   Once sender and receiver start using the encryption techniques, intercepted email messages cannot be interpreted by an attacker (Orebaugh, et al., 2007). Another way to protect against sniffers is by using One Time Passwords (OTP). With this method, a different password is sent every time the authentication is requested to the user (Orebaugh, et al., 2007).   Similarly to the case of encryption, if a third party intercepts someones password, this information will be useless since these can only be used once (Orebaugh, et al., 2007).   This technology can be extremely useful to ensure security; however, remembering new passwords for each login can be very challenging and frustrating for most users. A new security technique called quantum encryption is also provides good protection against sniffing attacks.   This technique consists of making each bit of data as small as a photon (McDougall, 2006).   The data is then transferred across fiber-optic lines.   Ã‚  If the information is picked up and intercepted by any kind of packet sniffer, the entire photon message is disrupted, ending up the entire transmission (McDougall, 2006).   A technology like this would make it impossible to intercept information since the communication will be cut in the case of interception.   However, it requires fiber-optic Internet connections, which many service providers do not own and its installation can be expensive. Policy Information security professionals can help secure employees connections by requiring the use of any of the technologies explained before.   For example, if certain employees need to access websites that are outside of the organizations network, they should be allowed to use only websites that use the https protocol such as Google and Yahoo.   Policies requiring Access Control Lists (ACL) can also help prevent sniffer attacks.   All secured networks and assets should be supported by an ACL to prevent unauthorized access.   Additionally, physical security policies should be implemented to efficiently protect the computer and server rooms in the organization.   Unauthorized access to these locations could cause the installation of sniffer programs and equipment. Education Every security initiative should have a training program supporting it.   Basic but regular training sessions given to employees about the dangers of packet sniffing can prove to be very valuable when protecting a network.   Security facts such as not allowing strangers to computer rooms should be explained to all employees. Example and Demonstration of a Packer-Sniffer Program: Wireshark Originally named Ethereal, Wireshark is a free and open-source packet analyzer (sniffer) typically used by network and security professionals for troubleshooting and analysis (Orebaugh, et al., 2007).   However, many potential attackers also use it to perform man-in-the middle attacks and gain information for password cracking.   Wireshark is available for most operating systems (including OS X, Windows, and Linux) and allows users to see all the traffic that goes through a specific network (Orebaugh, et al., 2007). Wireshark differs from other packet-sniffer programs mainly because of its easy-to-understand format and simple Graphical User Interface (GUI) (Orebaugh, et al., 2007).   Wireshark can be easily set up to capture packets from a specific channel.   Once the program is running, all the network packets are shown in the screen.   The top panel (summary panel) shows a summary of the entire packet, including source, destination, and protocol information (Orebaugh, et al., 2007).   Since one quick web browse can provide a large amount of packets, Wireshark solves packet browsing issues by categorizing each packet according to its type and showing each category with a specific color in the GUI.   Additionally, the user has the option of applying filters to see only one type of packets.   For example, only packets dealing with http functions may be shown.   The middle panel in the GUI is called the protocol-tree window. It provides decoded information of the packet (Orebaugh, et al., 2007). Finally, the bottom panel (data view window) shows the raw data of the packet selected in the Summary panel (Orebaugh, et al., 2007).   Figure 1 shows a screenshot of Wireshark while running and graphically shows the three main panels of the GUI. Figure 1 Screenshot of Wireshark while running and the three main panels. To troubleshoot network problems, Information Systems professionals use Wireshark by installing the sniffer program in various locations in the network and seeing which protocols are being run in each location (Orebaugh, et al., 2007).   Additionally, if the sniffer is placed in a location where it can capture all data flowing to the main server, Wireshark can detect network misuse by providing the source and destination of all packets.   For example, if an employee in a company uses his computer to access inappropriate websites, Wireshark will show the employees and the websites IP addresses in the source and destination columns with detailed information about the website in the info column and the protocol tree panel. It is easy to see how useful Wireshark is for network troubleshooting and identifying misuse; however, the program can also be used with malicious intent.   For example, the program can be used to find out passwords on unencrypted websites.   To demonstrate this case, the username john_doe_user and password 123mypasswrd were used to log in to the unencrypted and unsecured www.bit.ly website.   At the same time, Wireshark was set up to capture all packets in the computer.   After the packets were captured by the sniffer, the data can easily be filtered by the http category.   In the info column, a packet labeled POST means that someone has entered text to a website.   After clicking on this specific packet, all the username and password information can be seen in the center section of Wireshark (as shown in figure 2).   Unencrypted and unsecured websites are very vulnerable to these types of attacks.   On the other hand, websites using the https security feature prove to be safer for users.   For example, the same situation as before was applied to the encrypted website www.facebook.com by trying to log in, but Wireshark was unable to capture any packets with login information. Figure 2 Wireshark screenshot showing username and password. Other types of malicious attacks can also be performed with Wireshark.   For example, some toolkit add-ins to Wireshark such as Dsniff and Ettercap can be used to perform man-in-the-middle attacks and password cracking (Orebaugh, et al., 2007).   Even if the incoming data is encrypted, these tools can crack some passwords by using dictionary brute force attacks (Orebaugh, et al., 2007). Case Study: A costly attack at Dave Busters In 2007, the popular restaurant chain Dave Busters experienced the power of malicious packet-sniffing software attacks.   A multinational group of hackers was able to penetrate the companys corporate network and install basic packet-sniffing software at 11 of the chains restaurant locations (Thibodeau, 2008).   During a four-month period, the attackers were able to intercept customer credit card data going from Dave Busters restaurant locations to the corporate headquarters network in Dallas (McMillan. 2008).   Extremely sensitive information such as credit card numbers and security codes were sold to criminals, who used this data to perform fraudulent transactions to online merchants (McMillan, 2008).   The attack proved to be very profitable for the hackers.   For example, from information coming from only one restaurant location, the criminals were able to gain over $600,000 in profits (McMillan, 2008).   It was estimated that approximately 130,000 credit or debit ca rds were compromised by this attack (Westermeier, 2010). To access Dave Busters network, the attackers simply drove around a restaurant location with a laptop computer and took advantage of vulnerable wireless signals to access the computer networks (Westermeier, 2010).   Malicious sniffing software was then installed in the network to intercept credit and debit card information (Westermeier, 2010).   The packet-sniffing software was written by one of the groups hackers and consisted of SQL injection attacks (Thibodeau, 2008).   However, many organizations have stated that the code was not very impressive.   For example, the CERT Coordination Center described the programs source code as a college-level piece of technology (Thibodeau, 2008).   Additionally, the malicious code had one weakness: it would shut down every time the computer that was monitoring rebooted (McMillan, 2008).   Therefore, the criminals had to go back to the restaurant location, gain access, and re-start the packet-sniffer every time this happened. The fac t that this costly program was developed by someone with just basic programming skills and how they consistently gained access to the network highlights the lack of protection of Dave Busters security systems.    According to the Federal Trade Commission (FTC), Dave Busters information security systems and policies did not provide the necessary security features to protect customers information (Westermeier, 2010).   The attackers were able to access the network not just once, but repeatedly over a time frame of four months (Westermeier, 2010).   The fact that the company was oblivious to these multiple intrusions during a long time period proves that they were vulnerable to attacks and that Dave Busters did not apply any Intrusion Detection Systems (IDS) to their networks, nor did they monitor outbound traffic (Westermeier, 2010).   Additionally, sensitive customer information was not given special protection.   Credit card data was transferred across simple unprotected and unencrypted networks (Westermeier, 2010).    What could Dave Busters have done? First of all, private networks should have been protected in a better way.   It was just too easy for hackers to gain access and install malware.   By allowing only a specific group of IP addresses, or granting only temporary access, the firm could have been safe from unauthorized access by strangers.   But even in the case of hacker access, tools such as IDS can help monitor the network during an attack.   If the company had implemented an IDS in their network, the unauthorized intruders would have been detected in time to prevent losses. Additionally, by treating sensitive data differently than regular communications, the company could have considerably reduced the threat.   Dave Busters could have simply used readily available firewall systems to the networks that held customer data (Westermeier, 2010). Encryption devices could have also proven to be useful.   If link encryptors had been used, the intercepted data would have been completely useless for the hackers.   Data isolation could have also been useful.   The firm could have separated the payment card systems from the rest of the corporate network (Westermeier, 2010). Sensitive information did not necessarily require connection to the Internet; so the company should have separated these transmissions from the network. Finally, a general company-wide policy requiring access restriction, IDS installation, firewall usage, and sensitive data isolation throughout all restaurant locations could have been extremely useful.   A uniform and thorough information security policy along with a comprehensive training program given to specific employees would help enforce the security features.   Considering that Dave Busters had not implemented any of the security features explained in this section, it is obvious that their story would have been different if these techniques had been used. Conclusion Packet sniffing is a sophisticated subject that wears two hats. It can be used for either good or evil depending on the intentions of the person using the program. It can help with analyzing network problems and detect misuses in the network for good purposes. Meanwhile, it can also help hackers and other cyber-criminals steal data from insecure networks and commit crimes, as in the case of Dave Busters. The best way to protect data from being sniffed is to encrypt it. Necessary policies and training also help with the protection. As technology evolves, there will be more and more ways to commit cyber crime. Extremely sensitive data like credit card information and health care data should be well protected, from the perspectives of both the business and personal. In order to protect this information, organizations and individuals must be aware of the threat of packet sniffers.

Tuesday, August 20, 2019

Chuck Jones, Producer, Director, Animator :: essays papers

Chuck Jones, Producer, Director, Animator Chuck Jones was born on September 21, 1912. Jones entered the animation industry in 1932 as a cel washer at Ubbe Iwerks Studio after graduating from the Chouinard Art Institute (now California Institute of Arts). He joined the Leon Schlesinger Studio, later sold to Warner Bros., as an animator in 1936. There, Jones was assigned to Tex Avery’s animation unit. In 1938, at the age of 25, he directed his first animated film â€Å"The Night Watchman.† Jones remained at Warner Bros. animation until it closed in 1962, though he had a brief stint with Disney Studios in 1955 during a break at Warner Bros. In 1966, while heading up the animation division at MGM Studios, Jones directed one of the most memorable holiday television specials ever produced, â€Å"Dr Seuss’ How the Grinch Stole Christmas.† First aired on Sunday, December 18, 1966, the half-hour special was met with glowing reviews from newspapers across the country and has since become one of the most beloved holiday programs on television. Translating â€Å"Dr. Seuss’ book into animation was not a easy as it looks. With great persistency and a little charm, director and co-producer, Chuck Jones, had finally convinced his old friend Ted Geisel (author of the book) to give him a shot at How the Grinch Stole Christmas. Ted and Chuck were always fans of each other’s work. Ted was reluctant to have anyone animate his books, so he wanted it done carefully and well. Chuck Jones and Ted Geisel first met doing the Private Snafu cartoons about a goof-up soldier made by Warner Bros. for the army between 1943 and 1945. When you read How The Grinch Stole Christmas, it takes about 10 minutes. Chuck Jones’ challenge was making those same rhyming couplets and drawings come alive for television. Jones worked hard to create the Grinch model based on Dr. Suess’ book. Geisel was not always entirely satisfied, but knew Chuck well enough to trust him with the character design and the story to make an attractive half hour special. Making character animation without any CGI enhancements is an expensive offer, but Chuck insisted on doing it correctly and using the best animators, Maurice Noble, Auril and Richard Thompson, Hall Ashmead and Phil Roman. Good character animation costs $110,000 - $150,000 per minute, multiply that by 20 and you realize the money involved. Chuck Jones, Producer, Director, Animator :: essays papers Chuck Jones, Producer, Director, Animator Chuck Jones was born on September 21, 1912. Jones entered the animation industry in 1932 as a cel washer at Ubbe Iwerks Studio after graduating from the Chouinard Art Institute (now California Institute of Arts). He joined the Leon Schlesinger Studio, later sold to Warner Bros., as an animator in 1936. There, Jones was assigned to Tex Avery’s animation unit. In 1938, at the age of 25, he directed his first animated film â€Å"The Night Watchman.† Jones remained at Warner Bros. animation until it closed in 1962, though he had a brief stint with Disney Studios in 1955 during a break at Warner Bros. In 1966, while heading up the animation division at MGM Studios, Jones directed one of the most memorable holiday television specials ever produced, â€Å"Dr Seuss’ How the Grinch Stole Christmas.† First aired on Sunday, December 18, 1966, the half-hour special was met with glowing reviews from newspapers across the country and has since become one of the most beloved holiday programs on television. Translating â€Å"Dr. Seuss’ book into animation was not a easy as it looks. With great persistency and a little charm, director and co-producer, Chuck Jones, had finally convinced his old friend Ted Geisel (author of the book) to give him a shot at How the Grinch Stole Christmas. Ted and Chuck were always fans of each other’s work. Ted was reluctant to have anyone animate his books, so he wanted it done carefully and well. Chuck Jones and Ted Geisel first met doing the Private Snafu cartoons about a goof-up soldier made by Warner Bros. for the army between 1943 and 1945. When you read How The Grinch Stole Christmas, it takes about 10 minutes. Chuck Jones’ challenge was making those same rhyming couplets and drawings come alive for television. Jones worked hard to create the Grinch model based on Dr. Suess’ book. Geisel was not always entirely satisfied, but knew Chuck well enough to trust him with the character design and the story to make an attractive half hour special. Making character animation without any CGI enhancements is an expensive offer, but Chuck insisted on doing it correctly and using the best animators, Maurice Noble, Auril and Richard Thompson, Hall Ashmead and Phil Roman. Good character animation costs $110,000 - $150,000 per minute, multiply that by 20 and you realize the money involved.

Monday, August 19, 2019

Pearls Life Without Shame in Nathaniel Hawthornes The Scarlet Letter

Pearl's Life Without Shame in The Scarlet Letter Neither Hester's love for Authur Dimmesdale nor her need for atonement of her sins were the primary reasons why Hester remained in Boston. However, Hester mainly lived out her punishment to set an example for Pearl of what she should not become. Hester Prynne's life had been a continuous series of disappointments and shame. Because she cared for her daughter, Pearl, Hester treated her punishment more as a means of teaching Pearl a respectable lifestyle than a means of confronting her vices. Hester experienced on three occasions of heart shaking blows, which most would only encounter once in a lifetime. Marrying Roger Chillingworth was Hester Prynne's first documented mistake. She even went as far to call it her most significant sin, despite the array she had to choose from. Not only had Hester married Roger Chillingworth when she did not even love him, she also was partly responsible for bring so much pain on her true love, Authur Dimmesdale. When Chillingworth derived that the Reverend Dimmesdale was Hester's partner in shattering the purity of their marriage, he made it his duty to obtain revenge by torturing Dimmesdale: This unhappy person had effected such a transformation by devoting himself, for seven years, to the constant analysis of a heart full of torture, and deriving his enjoyment thence, and adding fuel to those fiery tortures which he analyzed and gloated over. The scarlet letter burned on Hester Prynne's bosom. Here was another ruin, the responsibility of which came partly home to her. (116) Hester could not escape her evil husband nor her liability in augmenting Authur's anguish. Secondly, Hester's adultery was the most prominent sin in the eyes of ... ...er. Hester proved, like she had before, that she was fallible. She momentarily lost sight of Pearl's lesson. However, Reverend Dimmesdale was a martyr, losing his life at the time when Hester's desires for a new setting were at their peak and thus bringing back her primitive motive. The conclusion in Chapter Twenty-four proved that Hester's decision was the best for Pearl, which was all she had wanted. "Pearl was not only alive, but married, and happy, and mindful of her mother" (177). Pearl was successful after her outcast childhood, free from the mistakes Hester had made and able to be true to everyone around her. Pearl was a better person because her mother was brave enough to keep them there in the fire and teach her daughter how to lead a life without shame. Works Cited: Hawthorne, Nathaniel. The Scarlet Letter. Oxford: Oxford University Press, 1998.

Sunday, August 18, 2019

student :: essays research papers fc

I believe managed care plans do not provide coverage for the necessary duration of hospital stays. Most managed care plans, particularly HMOs, are run by for-profit companies. These for-profits are constantly looking for ways to cut costs and increase their market share. Managed care plans limit choice of physicians and health care facilities and tightly control both the utilization of services and the amount charged for these services. In many plans, a set fee per person/per month is negotiated between health care purchasers and providers. This rate is the same no matter how much or how little care a person receives. This can encourage incomplete advice and inadequate treatment, as in the case of the duration of a hospital stay. Most hospital procedures and surgeries, both outpatient and inpatient, require prior approval. Most plans may require that certain procedures and surgeries be done on an outpatient basis in order to be paid for by the plan. Basically, managed care plans cut s the duration of a hospital stay form the usual post-procedure stay period by discharging them home early. For inpatient hospital care, managed care plans often require prior approval to limit the number of days they will pay for your child to stay in the hospital. Coverage for longer stays requires approval by the managed care plan. (Your Managed Care) If longer stay or duration is needed in a hospital, you will be needed to require lengthy appeals and numerous referrals. Without such approval, you may be responsible for part or all of the hospital and physician charges, thus effectively limiting the length of hospital stay. Not only are patients being pressured/forced into limiting their duration of stay in a hospital, but lately physicians are also facing pressure from managed care plans to lower costs of treatments to gain a bigger profit margin. For example until 1996, doctors were allowing a new mother to stay for as little in a hospital post pregnancy as dictated by managed care plans, until a federal mandate put a minimum and gave new mothers at least 48 hours in the hospital. (Wehrwein 1997) Managed care organizations are offering incentives to doctor changes normal procedures and length of stays to limit expense. Procedures that are simpler or require less time, work are done, over more modern better suited for patient procedures. Managed care organizations are primarily worried about controlling costs, and they see that having doctors perform procedures and treatments that require the least amount of hospital stay as more efficient.

Saturday, August 17, 2019

Environmental toxicology Essay

Environmental toxicology refers to specific organs as target organs. This is an organ that has the highest probability of being affected by exposure to a specific substance. Target organ toxicity refers to the negative effects a chemical has on that target organ after entry into the body (Hodgson, 2010). There are multiple organs such as the liver which are targeted simply because of ease of access. Any organ that can be accessed through less guarded cell walls or higher levels of lipids are more susceptible to entry by toxicants. High traffic organs like the kidneys and liver make it easy as they receive and filter all blood therefore taking the toxin in large doses to cleanse the body. The primary purpose of the kidneys and liver is to expel toxins and therefore this action is there specialty making them more susceptible. The human body has a specialized detoxification process that includes a specific target organ, the liver. The liver is a primary regulator of chemical levels in the blood and it also excretes bile that helps the breakdown of fat (Lucile Packard Children’s Hospital, 2012). This breakdown helps to prepare the fats for the final stages of digestion and ultimately absorption. The liver has two sources of blood flowing threw it at all times, oxygenated blood from the hepatic artery and nutrient-rich blood from the hepatic portal vein. Approximately 13% of blood in the body is held in the liver at any moment (Lucile Packard Children’s Hospital, 2012). The blood that leaves the stomach and intestines will be passed through the liver before it is allowed to travel anywhere else in the body. In the liver nutrients and toxins are broken down so they can be used easily the body. Waste is not only excreted through the bile but also in the blood which will travel to the kidneys and leave the body as urine (Lucile Packard Children’s Hospital, 2012). The liver has many very important duties it carries out such as cleaning the blood of toxins and bacteria, and producing the bile that carries away waste and breaks down fat (Lucile Packard Children’s Hospital, 2012). With all of this toxic intervention the liver an be overworked and disease can overcome, such as chronic liver disease (Lucile Packard Children’s Hospital, 2012). The conditions that lead to chronic liver disease are vast but they fall into five groups (Chronic liver, 2011). The first group is the viral group classification which includes conditions such as hepatitis B and C (Chronic liver, 2011). The second group is the metabolic group which includes diseases such as Wilson’s disease (Chronic liver, 2011). The third group is the autoimmune response group which includes primary biliary cirrhosis sufferers (Chronic liver, 2011). The fourth group is the toxin-related group which includes alcoholism and the last is the miscellaneous group with ailments such as right heart failure (Chronic liver, 2011). Within these groups there is a silent killer though which raises the risk for that group. That is the toxin-related group because alcoholism leads to cirrhosis and then to hepatitis (Chronic liver, 2011). That group alone takes a person through three groups in one shot. While researching toxicants and reactions there have been some similarities found. Many toxicants affect the lungs, skin, and eyes. Take for instance Sulfur Dioxide, Asbestos, and gasoline. Sulfur Dioxide is a colorless gas with a choking odor and suffocating qualities (Air Gas, 2012). It is toxic to humans even at low concentrations. The target organs of Sulfur Dioxide are the lungs, upper respiratory tract, the skin, and eyes (Air Gas, 2012). At the low dose of 8ppm coughing will commence leading to severe respiratory tract issues as well as eye and skin burns (Air Gas, 2012). Another toxic substance is a naturally occurring fibrous mineral called asbestos (Centers for Disease Control and Prevention, 2011). The most common types are Chrysotile and Amosite. It targets the respiratory system, eyes, and is known as a carcinogen because it causes lung cancer. With chronic exposure dyspnea will begin, interstitial fibrosis and restricted pulmonary functions will be observed as well as finger clubbing, and eye irritation (Centers for Disease Control and Prevention, 2011). Gasoline is a volatile combination of flammable liquid hydrocarbons. Taken from crude petroleum it is highly used for internal-combustion engines. No matter the grade gasoline affects the eyes, skin, lungs, gastrointestinal tract, nose, throat, the respiratory tract, the central nervous system, the liver and kidneys (Amerada Hess Corporation, 2004). In the eyes the effects are moderate causing irritation. When it comes to the skin it depends on the exposure, if acute gasoline is mild but with prolonged contact toxic amounts can be absorbed and damage can be made. If the gasoline is ingested there are many major issues that will follow (Amerada Hess Corporation, 2004). First the breathing of liquid drops into the lungs when vomiting occurs, which can cause chemical pneumonia, lung damage, respiratory failure and ultimately death (Amerada Hess Corporation, 2004). This is not all ingestion can cause though as gastrointestinal issues can arise such as nausea, diarrhea, vomiting and even brain damage (Amerada Hess Corporation, 2004). If the ingestion is a chronic level of exposure convulsions could follow, even loss of consciousness, coma, and respiratory arrest. Another means of exposure is through inhalation. This can cause serious issues with the nose, throat, lungs and once again the respiratory tract (Amerada Hess Corporation, 2004). It can also cause headaches, dizziness and in vertigo, unconsciousness that leads to coma and even death. At the most chronic of levels gasoline that contains benzene can cause anemia or leukemia. If the liver or kidneys of the exposed person have already been compromised they can also become a target organ (Amerada Hess Corporation, 2004).