Thursday, December 26, 2019

Irenaeus and the Gnostic System Free Essay Example, 3500 words

Irenaeus establishes what has roused him to react in Book 1 and disproves it in Book 2. The remnants of his work reveal that his rejoinder transcends the motivation (Johnson, 2004, 28). Irenaeus initiates with a thorough description of a Valentinian myth which is the labor of a generation succeeding Valentinus and Ptolemy. The credit to Ptolemy is an interpretation; yet the writers were most probably Valentinians who, even as referring to themselves students of Valentinus, were actually students of Ptolemy. The work demonstrates four movements, namely, extension, dispersion, concentration in saviour, and return to unity by saviour, and alludes into six periods, namely, the first principle and first emanations; the passion of Sophia and the new emanations; the formation of Achamoth; three substances; creation of the cosmos; Christ and consummation (Cullman, 1959, 102). All things germinate from the rightness of the pro-father, pro-first principle, chasm, who is unfathomable, furthe r than apprehension, unseen, perpetual, serene in deep restfulness. With him subsists indivisibly reflection (ennoia) who is also silence (sige) and elegance (chairs). From this creation originate three pairs of emanations to the splendor of the Father and to create the Ogdoad: Nous (or Monogenes) and Aletheia, Logos, and Zoe, Anthropos and Ecclesia (ibid, 103). We will write a custom essay sample on Irenaeus and the Gnostic System or any topic specifically for you Only $17.96 $11.86/page However, the remaining of the thirty eons, Sophia, surrenders to an unmanageable motive to detain his limitless greatness which changes her through ardor.

Tuesday, December 17, 2019

Biography of Malcolm X Essay - 2268 Words

Biography of Malcolm X On May 19, 1925 in Omaha, Nebraska, Malcolm Little was born to Reverend Earl and Louise Little. Rev. Little, who believed in self-determination and worked for the unity of black people. Malcolm was raised in a background of ethnic awareness and dignity, but violence was sparked by white racists trying to stop black people such as Rev. Little from preaching the black cause. The history of Malcolms dedication to black people, like that of his father, may have been motivated by a long history of oppression of his family. As a young child, Malcolm, his parents, brothers, and sisters were shot at, burned out of their home, harassed, and threatened. This culminated in the†¦show more content†¦When a white person referred to the fact that some Southern university had enrolled black freshmen without bayonets, Malcolm reacted with scorn: When I slipped, the program host would leap on the bait: Ahhh! Indeed, Mr. Malcolm X -- you cant deny thats an advance for your race! Id jerk the pole then. I cant turn around without hearing about some civil rights advance! White people seem to think the black man ought to be shouting hallelujah! Four hundred years the white man has had his foot-long knife in the black mans back -- and now the whit man starts to wiggle the knife out, maybe six inches! The black mans supposed to be grateful? Why, if the white man jerked the knife out, its still going to leave a scar! Although Malcolm words often stung with the injustices against blacks in America, the equally racist views of the Nation of Islam kept him from accepting any whites as sincere or capable of helping the situation. For twelve years he preached that the white man was the devil and the Honourable Elijah Muhammad was Gods messenger. Unfortunately, most images of Malcolm today focus on this period of his life, although the transformation he was about to undergo would give him a completely different, and more important, message for the American people. The Change to True Islam On March 12, 1964, impelled by internalShow MoreRelatedEssay on Biography of Malcolm X1317 Words   |  6 PagesBiography of Malcolm X One of the most influential men of his time, not only with the black community, but also with other people of every community. His beliefs for many people are hard to understand and probably thought as if his beliefs are wrong, but until someone actually reads The Autobiography of Malcolm X, then people will not really understand the complexity of the man Malcolm X. His autobiography takes you on a tour of probably lots of black men of this time and shows all the hardshipsRead MoreA Brief Biography of Malcolm X698 Words   |  3 PagesMay 19, 1925 in the small town of Omaha, Nebraska. Malcolm Little was born to Louise Little and Earl Little. Little did they know that their son would change the future for African-Americans. Malcolm had a rough childhood due to the fact that he lived during the time of racism between African-Americans and Caucasians. Malcolm was treated a little different, because the color of his skin. Malcolm was lighter than his other siblings. Malcolm was treated badly by African-Americans, because theyRead MoreMalcolm X Biography Essay1085 Words   |  5 Pageslife to the advancement of the African American race. Few of these people created as much controversy during the 1960’s then the man who would be known as Malcolm X. Unlike many of the civil rights leaders of the time who promoted non violence, Malcolm X believed in the use of aggressive tactics in his battle for equality. Malcolm X was born Malcolm Little on May 19, 1925, in Omaha, Nebraska to Earl and Louise Little. His father, a minister and devout Christian, was known for being an outspoken followerRead MoreA Brief Biography of Malcolm X920 Words   |  4 PagesMalcolm X, born in 1925, didn’t have the easiest life. His family was not the wealthiest family and they went through the ups and downs of life more than anyone could ever imagine. After his father passed away a lot of things became harder to deal with. It was he, his mother, and his brothers and sisters. Life became harder to go through. Malcolm and some of his siblings were taken away from their mother and put into other homes while they sent his mom to a psychiatric hospital. Things were goingRead MoreDr. Martin Luther King Jr. and the Civil Rights Movement Essay1269 Words   |  6 Pagesmovement had many influential leaders and events. The overall importance of the movement was the profound impact it had on American life. The Civil Rights Movement had many important leaders, like Martin Luther King Jr., The Black Panthers, and Malcolm X, whose actions largely influenced the movement. Of the leaders involved in the Civil Rights Movement, one man stands alone; Dr. Martin Luther King Jr. Martin Luther King is known best for his contributions to the civil rights movement, for instanceRead MoreEssay on Malcolm X1238 Words   |  5 Pagesis living every night in fear, the burning down of your home by the Ku Klux Klan and the â€Å"accidental† death of your father who’s head was detached from his own body? This is the only memory that comes to Malcolm Little from his childhood. Malcolm Little who is famously recognized as Malcolm X was born into a world of hatred on May 19, 1925 in Omaha Nebraska. His father was a freelance Baptist Preacher who incorporated the teaching of Black Nationalist leader Marcus Gravey. With continuous threatsRead MoreThe Significance of the Role of Malcolm X on African American Activists1634 Words   |  7 PagesTo what extent was the role of Malcolm X significant in the rise of radical African American activism (1965-1968)? A. Plan of the Investigation To what extent was the role of Malcolm X significant in the rise of radical African American activism (1965-1968)? This investigation will assess the significance of Malcolm X’s significance in giving rise to African American activism. Malcolm X’s motives, involvement in the civil rights movement and his leadership will all be discussed in order toRead MoreThe Death Before Disunity : Malcolm X, Civil Rights Activist And Muslim Leader1173 Words   |  5 PagesDeath before Disunity Malcolm X, Civil Rights activist and Muslim leader, was an advocate of unity by all means necessary. Throughout history, people have often pondered what X intended to obtain before his tragic death at the hands of Talmadge Hayer, Norman 3X Butler, and Thomas 15X Johnson (â€Å"Biography†). Several people downplay X’s achievements in comparison to the accomplishments of Dr. Martin Luther King, Jr. Majority of activists such as Mohandas Gandhi, Rosa Parks, and Cesar Chavez are notoriousRead More The Black Community Essay1212 Words   |  5 Pageswhich addressed his dislike for how blacks are being treated in Alabama which was in a violent manner(Martin Luther King Jr. Biography, , The letter from the Birmingham jail section, para. 1).On August 28, 1963, he led 200,000 people on a march towards equality in Washington, D.C. On this day he also read his famous â€Å"I Have a Dream† speech(Martin Luther King Jr. Biography, , The letter from the Birmingham jail section , para. 1). In his speech, he spoke about his hopes that one day everyone wouldRead MoreMalcolm X was a Symbol of the Civil Rights Movement1573 Words   |  6 Pagesprepare for it today.† Malcolm X The 1920’s, or the â€Å"Roaring Twenties†, was a time in American history described as the â€Å"Wild West†. Prohibition brought controversy and anarchy to the once civilized American society, with mobs and gangs at the peak of their power with leaders such as Al Capone supplying alcohol and guns to the public. This was also a time of heightened racial segregation, with boundaries being set such as only white bathrooms and schools. Malcolm (X) Little was born in this

Monday, December 9, 2019

Public Health for Esophageal Adenocarcinoma - myassignmenthelp

Question: Discuss about thePublic Health for Esophageal Adenocarcinoma Development. Answer: Overview Terry et al., (2000) briefly presented the research study clearly in an informative manner of the study designing, study findings that help readers to decide whether the paper is suitable for referring and reading purposes. The issue addressed in the paper is the association between gastroesophageal reflux (GER) and risk for esophageal adenocarcinoma. In people with long-term GER illness, the risk for carcinoma increases by 40 folds in gastric cardia and esophageal cancer. According to Karimi et al., (2014) the incidence of gastric cardia and esophagus adenocarcinoma has risen in Western Europe and United States including Sweden in recent years. Among all reasons, the study highlighted the role of GER in esophageal adenocarcinoma development. There is paucity of data that illustrates association between GER and risk for esophageal adenocarcinoma as a previous study showed weaker associations, however, medical records showed occurrence of GER (Pohl et al., 2013). Moreover, several foods cause temporary reflux symptoms where relaxation of lower esophageal sphincter (LES) takes place. Therefore, the present study was aimed at determining the association between these foods with risk for esophageal adenocar cinoma or gastric cardia. The participants who were newly diagnosed with gastric cardia (n=313) or esophagus carcinoma (n=216) were eligible for the study. From Swedish population, randomly selection was done for case control subjects after the inclusion or exclusion criteria, 258 and 185 cases of cardia and esophageal adenocarcinoma respectively and 815 controls. All the participants were subjected to one-to-one interviews with interviewers and a structured food frequency questionnaire was used. The questionnaire comprised of 63 beverage and food items that was used for the evaluation of dietary habits 20 years before the interview. It comprised of frequency of consumption, last daily meal, and average meal size of the seven common Swedish meals. Apart from this dietary assessment, the other exposures include reflux tertiles consisting of chocolate and time of last meal, fruit juice and reflux symptoms studied for regurgitation, heartburn or absent at the time of assessment, severity and frequency. The dieta ry assessment compared the case group with control group and studied how frequently LES relaxing foods gives rise to chronic reflux symptoms among the sufferers as compared to controls. The outcome of the exposure was that there was no association found between dietary factors that cause LES relaxation and adenocarcinoma risk of esophageal cancer and gastric cardia. This might be possible as sufferers that cause LES relaxation might avoid these foods (Sethi Richter, 2017). The outcome of exposure showed no association between LES relaxation caused by dietary factors and risk for esophageal malignancy. The study design is nationwide population-based case control study in Sweden that was studied with 250 and 185 gastric cardia and esophageal malignancy cases respectively and 815 controls. This design is a type of epidemiological observational study where two groups (case and control) groups are identified and comparison is done to identify the factors that contribute to a particular medical condition (Breslow, 2014). In the given article, case group (newly diagnosed adenocarcinoma of esophagus and gastric cardia) and control group were compared for the identification of dietary factors that contribute to risk for gastric cardia and adenocarcinoma of esophagus. The study population was a nationwide Swedish case-control study of age below 80 years who lived between 1 December 1994 and 31 December 1997. The case group participants for the study comprised of newly diagnosed patients with gastric cardia and esophageal adenocarcinoma. The control group was selected randomly from the Swedish population register that matched gender and age among the cases. Therefore, after the exclusion criteria, 258 and 185 gastric and esophageal adenocarcinoma respectively and controls (815) were taken for the study. The main finding of the paper was that there was no association between LES-relaxing foods and chronic reflux symptoms, however, it might have happened due to avoidance of these reflux causing foods among the sufferers. Moreover, there was no association found between dietary factors associated with risk for gastric or esophagus cardia. This finding indicates that LES relaxation in dietary factors and transient GER are not associated with risk of gastric and esophageal adenocarcinoma. There is no such future study implication, although previous study showed eating habits and consumption of foods with relaxed LES or temporary GER were not related with adenocarcinoma risk of gastric cardia and esophagus. However, the paper findings indicated that dietary factors associated with transient GER and LES relaxation are not related with risk of gastric cardia or esophageal malignancy. Internal validity Yes, the author has studied the confounding variables in this study that might have an outside influence changing the effect of the independent and dependent variables. The independent variable is the dietary factors and variable of reflux symptoms like heartburn or regurgitation are dependent on it. The results of study conducted by Terry et al., (2000) are likely to be affected by confounding variables. LES-relaxing foods associated with dietary factors were studied in the sample population; however, the subject characteristics suggested that other factors also influenced the study findings. Men were 86% and 83% of the cases and controls respectively. Among the case group, tobacco smoking was higher with gastric cardia or adenocarcinoma of oesophagus as compared to controls that had lowest history of tobacco smoking. In addition, median BMI was higher among gastric cardia or oesophageal adenocarcinoma in case group as compared to control group having low median BMI. Alcohol drinkin g was also more prevalent among gastric cardia or oesophageal adenocarcinoma patients as compared to controls. This illustrates that these confounding variables are likely to affect the result findings, as dietary factors are not only the variable that increases the risk for adenocarcinoma of oesophagus or gastric cardia. Researchers in their study have mentioned these confounding variables in their study that may have damaged the internal validity of the experiment (Szklo Nieto, 2014). These third variables were no controlled or eliminated by the researchers in the study. In the study, dietary factors that affect LES-relaxation increase the risk for adenocarcinoma of oesophagus and gastric cardia. In this dietary factors is independent variable and increased adenocarcinoma risk is the dependent variable, however, other variables like alcohol drinking, tobacco smoking and high median BMI are other variables that affected the dependent variable. This confounding variable may have an effect on the risk of adenocarcinoma rather than only dietary factors. The author has explicitly explained the confounding variables in their study explaining the characteristics of subjects in the results. The results are also affected by bias, as there was potential measurement error in exposure as the questionnaire comprised of questions associated with dietary habits of the participants in last two decades prior to interview (Vandenbroucke et al., 2014). The result findings were weakened by non-differential measurement error of exposure. The dietary factors were only studied in the study that fulfilled the research aim and accordingly, the questionnaire comprised of questions about reflux symptoms two decades before interview that assessed the factor with a possible latency period before cancer occurrence. There is possibly limitation of the data collection due to potential measurement error in the exposure. However, this bias was used for gathering data that is relevant to GER that was useful to detect increased risk with reflux symptoms based on severity, presence and duration (Levy Lemeshow, 2013). Looking into the issues and bias witnessed in case-control studies, there is selection, incident, sources of cases and selection of controls. The selection of cases in the study showed that there were more males than females comprised of 83% controls and 86% cases being baseline subject characteristics. Selection bias is a major problem in case control studies that depicts non-comparability between controls and cases. Cases or controls for the study are selected based on some characteristic that is exhibited related to exposure to risk factor (Fithian Hastie, 2014). In the given research study, the cases are selected who are unrepresentative of the general population producing cases. However, case control study is designed to select controls that represent population producing cases. Incident case is another bias observed in this case-control study during a particular period as the cases comprised of newly diagnosed patients with 313 and 216 gastric cardia and adenocarcinoma of oeso phagus respectively studied between 1 December 1994 and 31 December 1997. The incident cases use is preferential for the researchers as recall of exposure is accurate among the newly diagnosed adenocarcinoma cases for esophagus and gastric cardia (Geneletti et al., 2013). However, it is easy to assess the temporal sequence of intervention or exposure and disease among the newly diagnosed or incident cases. Sources of cases are another issue observed in this study as the sample recruitment is also biased. In the present study, the sample is recruited from Swedish register being population based. The research study is population based nationwide case control study and it has major limitations, as it is difficult to conduct and is more expensive. The selection of controls is also biased as it is an inherent issue in case-control studies (van Rein et al., 2014). The controls used in this kind of study design are subjected to estimate the prevalence of exposure in population that give rise to cases. Hence, the control group is selected randomly from the general population that gives rise to cases. However, in practical, this condition is not possible, as the control group, selection should also be subjected to same exposure status as cases in absence of exposure and disease association (Sedgwick, 2015). For minimizing bias, controls need to be selected from a representative sample among the population from which cases are produced. The controls must have been selected from Swedish population register only as the cases. Exposure and outcome According to Bradford-Hill criteria, the stronger the association between risk factor and outcome, the relationship is likely to become causal (Boniface, Scannell Marlow, 2017). In the given study, there is no relationship between dietary factors causing LES relaxation and risk for oesophagus adenocarcinoma risk and gastric cardia. Another criterion that can be suggested is that risk occurred before exposure that cannot be plausible suggesting there is no causal association between exposure and outcome (VanderWeele et al., 2016). Moreover, there is no consistency in the findings, as the same findings are not observed among different populations. Previous findings suggested strong relationship between foods that cause LES-relaxation (dietary factors) and risk for oesophageal adenocarcinoma and gastric cardia, however, this study showed no association between dietary factors and adenocarcinoma risk. There is also lack of specificity of association where there is no one to one relation ship between cause and outcome. The temporal sequence of association is also not observed, as exposure did not precede outcome where the sample were already exposed to oesophageal adenocarcinoma and gastric cardia before studying the outcome (Marshall Galea, 2014). The study did not suggest any biological gradient association as the changes in adenocarcinoma rates did not follow corresponding exposure changes that are dietary factors being dose dependent (Vandenbroucke, Broadbent Pearce, 2016). The biological plausibility is also not explained in the study, as there was no explanation of any potential biological mechanism. The results showed no association between dietary factors causing LES relaxation associated with gastric cardia or oesophageal adenocarcinoma. Therefore, the findings suggested no association between LES relaxation and risk for gastric cardia or oesophageal malignancy. External validity External validity is another great challenge in case-control studies as it occurs due to systematic error. It is defined as the ability to generalize results to a wider population setting (Allodi Massacci, 2014). The inferences made in the cause-effect relationships from specific study that are externally valid can be generalized to the wider population (Woolcock, 2013). The results obtained in the present study cannot be generalized to other population as the samples are large obtained from single geographic location (Sweden). This is the reason that the conclusions drawn from the cause-effect relationship cannot be applied to other geographical locations. The food avoidance among the sufferers is a possible consequence that narrowed the exposure range. The reflux-promoting foods like garlic, onion and citrus may have anti-carcinogenic properties negating harmful effects of reflex symptoms. Moreover, the previous studies examined the diet factors and risk for cancers, however, the present study only comprised of few dietary aspects that caused reflux symptoms. This can be one reason that the conclusions drawn from the study cannot be generalized to the wider population. However, the present study results do not contradict the pervious results that there is a strong relationship between severity and frequency of reflux associated with risk of gastric cardia and oesophageal adenocarcinoma. Furthermore, the results suggest that in the general population, reflux symptoms are not a public health issue, rather a consequence of the adenocarcinoma condition. The response rates of controls and cases are related to LES-relaxing foods that is called recall bias or differential misclassification that explain negative findings of the study. The hypotheses regarding mint, chocolate, coffee, portion size and time of last daily meal are unknown among the public and that might have elicited differential recall between control and case subjects in the study. Although, the response rates were high as compared to previous findings of dietary factors associated with oesophageal adenocarcinoma, a high degree of differential participation in exposure could have cause bias results away or towards unity. The discussion section of the paper is explained beautifully depicting results of the study article lacking external validity, as the sample is not representative in the general population. The sample consisted of population from Sweden with self-reported recurrent reflux symptoms before interview and no considerations regarding low mean basal pressure or dyspepsia. The association between reflux producing foods with respect to gastric cardia and oesophageal adenocarcinoma is not addressed properly in the study and this is the reason, it cannot be generalized into other population settings. In addition, the time of last meal before bedtime, average portion size of meal were not related to adenocarcinoma risk of oesophagus and gastric cardia. This issue is witnessed in the nationwide population case study in Sweden that are addressed in the paper. Proper explanations are given for the result findings showing no association with adenocarcinoma risk with good discussion of the strengths of the paper, however, the limitations are not addressed explicitly. References Allodi, L., Massacci, F. (2014). Comparing vulnerability severity and exploits using case-control studies.ACM Transactions on Information and System Security (TISSEC),17(1), 1. Boniface, S., Scannell, J. W., Marlow, S. (2017). Evidence for the effectiveness of minimum pricing of alcohol: a systematic review and assessment using the Bradford Hill criteria for causality.BMJ open,7(5), e013497. Breslow, N. E. (2014). Case-control studies. InHandbook of epidemiology(pp. 293-323). Springer New York. Fithian, W., Hastie, T. (2014). Local case-control sampling: Efficient subsampling in imbalanced data sets.Annals of statistics,42(5), 1693. Geneletti, S., Best, N., Toledano, M. B., Elliott, P., Richardson, S. (2013). Uncovering selection bias in casecontrol studies using Bayesian post?stratification.Statistics in medicine,32(15), 2555-2570. Karimi, P., Islami, F., Anandasabapathy, S., Freedman, N. D., Kamangar, F. (2014). Gastric cancer: descriptive epidemiology, risk factors, screening, and prevention.Cancer Epidemiology and Prevention Biomarkers,23(5), 700-713. Levy, P. S., Lemeshow, S. (2013).Sampling of populations: methods and applications. (pp 380-389) John Wiley Sons. Marshall, B. D., Galea, S. (2014). Formalizing the role of agent-based modeling in causal inference and epidemiology.American journal of epidemiology,181(2), 92-99. Pohl, H., Wrobel, K., Bojarski, C., Voderholzer, W., Sonnenberg, A., Rsch, T., Baumgart, D. C. (2013). Risk factors in the development of esophageal adenocarcinoma.The American journal of gastroenterology,108(2), 200-207. Sedgwick, P. (2015). Bias in observational study designs: case-control studies.BMJ: British Medical Journal (Online),350. Sethi, S., Richter, J. E. (2017). Diet and gastroesophageal reflux disease: role in pathogenesis and management.Current opinion in gastroenterology,33(2), 107-111. Szklo, M., Nieto, J. (2014).Epidemiology. (pp. 350-358) Jones Bartlett Publishers. Terry, P., Lagergren, J., Wolk, A., Nyrn, O. (2000). Reflux-Inducing Dietary Factors and Risk ofAdenocarcinoma of the Esophagus and Gastric Cardia. Nutrition and cancer, 38(2), 186-191. van Rein, N., Cannegieter, S. C., Rosendaal, F. R., Reitsma, P. H., Lijfering, W. M. (2014). Suspected survivor bias in casecontrol studies: stratify on survival time and use a negative control.Journal of clinical epidemiology,67(2), 232-235. Vandenbroucke, J. P., Broadbent, A., Pearce, N. (2016). Causality and causal inference in epidemiology: the need for a pluralistic approach.International journal of epidemiology,45(6), 1776-1786. Vandenbroucke, J. P., von Elm, E., Altman, D. G., Gtzsche, P. C., Mulrow, C. D., Pocock, S. J., ... STROBE Initiative. (2014). Strengthening the Reporting of Observational Studies in Epidemiology (STROBE): explanation and elaboration.International journal of surgery,12(12), 1500-1524. VanderWeele, T. J., Hernn, M. A., Tchetgen Tchetgen, E. J., Robins, J. M. (2016). Re: Causality and causal inference in epidemiology: the need for a pluralistic approach.International journal of epidemiology,45(6), 2199-2200. Woolcock, M. (2013). Using case studies to explore the external validity of complexdevelopment interventions.Evaluation,19(3), 229-248.

Monday, December 2, 2019

Stress Management in the Investment Banking Industry free essay sample

An analysis of change management and strategies that deal with possible emergence of stress as a result of organizational change. This paper examines certain workplace issues of satisfaction, including job security, fair wage and salary levels, equitable distribution of benefits, training and career enhancement opportunities that integrate to create an environment that fosters both motivation and high performance and attempts through that to maximize productivity. The purpose of this research is to review the psychology behind the factors that contribute to employee stress as a result of organizational change, environmental and economic factors. The author attempts to analyze these concepts and examine how they contribute to workers stress levels, thereby revealing the type of training and coping skills that organizations can attempt to provide. This paper addresses this problem specifically in the investment banking industry, with reference to the firm of Goldman Sachs. The author looks at the the financial services industry that has been characterized by ongoing and ever-increasing merger and acquisition acti vity and expansion with focus on change in technology, organizational settings, workforce and management. We will write a custom essay sample on Stress Management in the Investment Banking Industry or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The author investigates how these changes may effect employee anxiety and stress levels with focus on the causes of stress and their possible psychological and physiological effects. The author provides recommendations as to how to achieve economies of scale and efficiencies through innovation and welcoming of change that is planned and appropriately dealt with and how to deal with the possible stress that may emerge through training, leadership, support, work teams, increased employee decision making and involvement, communication, change in reward systems and enforcement of a culture of change, innovation and challenge. While the profitability of corporations is typically measured in dollars, overall success can be measured in terms of profitability plus the attainment of organizational goals. This success derives from a synergy of inputs, including the work of employees who are dedicated, skilled and knowledgeable, and a management team that understands how to inspire competent and motivated performance through sensitive and responsive management of a continually changing workplace. The cost of socially-responsible management is an investment: the workplace environment directly impacts the motivation and productivity of the workforce. Simply put: happy, secure workers are productive workers. Companies are responsible for creating and maintaining a positive and supportive workplace environment through ethically responsible policies, fair compensation and proactive management. While not quantifiable as a line item, an attitude of responsibility to workers and to the workplace environment has a n oticeable effect on the corporate bottom line. According to Alan Reder in his book In Pursuit of Principle and Profit (1994), responsible policies ensure that every quality of a company will emerge over time and greatly increase a companys chances of long-term success. Workplace issues of employee satisfaction include job security, fair wage and salary levels, equitable distribution of benefits, training and career enhancement opportunities that integrate to create an environment that fosters motivation, high performance and maximized productivity.

Wednesday, November 27, 2019

Adventures of Huck Finn Essays - English-language Films, Free Essays

Adventures of Huck Finn Essays - English-language Films, Free Essays Adventures of Huck Finn title = Adventures of Huck Finn American Heritage Pd 5 & 6 The Adventures of Huckelberry Finn Mark Twains The Adventures of Huckleberry Finn is a novel about a young boys coming of age in the Missouri of the mid-1800s. The main character, Huckleberry Finn, spends much time in the novel floating down the Mississippi River on a raft with a runaway slave named Jim. Before he does so, however, Huck spends some time in the fictional town of St. Petersburg where a number of people attempt to influence him. Before the novel begins, Huck Finn has led a life of absolute freedom. His drunken and often missing father has never paid much attention to him; his mother is dead and so, when the novel begins, Huck is not used to following any rules. The books opening finds Huck living with the Widow Douglas and her sister, Miss Watson. Both women are fairly old and are really somewhat incapable of raising a rebellious boy like Huck Finn. Nevertheless, they attempt to make Huck into what they believe will be a better boy. Specifically, they attempt, as Huck says, to "sivilize" him. This process includes making Huck go to school, teaching him various religious facts, and making him act in a way that the women find socially acceptable. Huck, who has never had to follow many rules in his life, finds the demands the women place upon him constraining and the life with them lonely. As a result, soon after he first moves in with them, he runs away. He soon comes back, but, even though he becomes somewhat comfortable with his new life as the months go by, Huck never really enjoys the life of manners, religion, and education that the Widow and her sister impose upon him. Huck believes he will find some freedom with Tom Sawyer. Tom is a boy of Hucks age who promises Huck and other boys of the town a life of adventure. Huck is eager to join Tom Sawyers Gang because he feels that doing so will allow him to escape the somewhat boring life he leads with the Widow Douglas. Unfortunately, such an escape does not occur. Tom Sawyer promises muchrobbing stages, murdering and ransoming people, kidnaping beautiful womenbut none of this comes to pass. Huck finds out too late that Toms adventures are imaginary: that raiding a caravan of "A-rabs" really means terrorizing young children on a Sunday school picnic, that stolen "joolry" is nothing more than turnips or rocks. Huck is disappointed that the adventures Tom promises are not real and so, along with the other members, he resigns from the gang. Another person who tries to get Huckleberry Finn to change is Pap, Hucks father. Pap is one of the most astonishing figures in all of American literature as he is completely antisocial and wishes to undo all of the civilizing effects that the Widow and Miss Watson have attempted to instill in Huck. Pap is a mess: he is unshaven; his hair is uncut and hangs like vines in front of his face; his skin, Huck says, is white like a fishs belly or like a tree toads. Paps savage appearance reflects his feelings as he demands that Huck quit school, stop reading, and avoid church. Huck is able to stay away from Pap for a while, but Pap kidnaps Huck three or four months after Huck starts to live with the Widow and takes him to a lonely cabin deep in the Missouri woods. Here, Huck enjoys, once again, the freedom that he had prior to the beginning of the book. He can smoke, "laze around," swear, and, in general, do what he wants to do. However, as he did with the Widow and with Tom, Huck begins to become dissatisfied with this life. Pap is "too handy with the hickory" and Huck soon realizes that he will have to escape from the cabin if he wishes to remain alive. As a result of his concern, Huck makes it appear as if he is killed in the cabin while Pap is away, and leaves to go to a remote island in the Mississippi River, Jacksons Island. It is after he leaves his fathers cabin that Huck joins yet another important influence in his life: Miss Watsons slave, Jim. Prior to Hucks leaving, Jim has been a minor character in the novelhe has been shown being fooled by Tom Sawyer and telling Hucks fortune. Huck finds Jim on Jacksons Island because the slave has run awayhe has overheard a conversation

Saturday, November 23, 2019

English Vocabulary for Clothing

English Vocabulary for Clothing The words below are some of the most important used when talking about clothes and fashion such as when you go shopping. Words that are used only for women are marked with a w, words that are only used for men are marked with an m. General Clothing Terms and Examples anorak - If youre hiking in cold weather, youll need an anorak.belt - Ive lost weight, so I need a new belt to hold up my trousers.blouse w - Thats such a pretty blouse. I love the checked pattern.cardigan - Put on a cardigan and turn down the heat to save money at home.dress w - Anna wore an elegant red dress to the reception.gloves - I prefer to wear gloves to mittens because my fingers need to be free.jacket - Let me put on a jacket and lets go for a walk.jeans - I only wear jeans on the weekend as I have to wear a business suit during the week.jumper - Thats a cute jumper. Where did you buy it?overalls - Overalls have been out of fashion for a very long time.overcoat - When dressing formal, its best to wear an overcoat.pullover - Im cold, so I need to put on a pullover.raincoat - Raincoats wont keep you warm, but they will keep you dry.scarf - A scarf is a beautiful accessory to add a touch of elegance.shirt - You should wear a dress shirt to work today.sweatshirt - I put on a sw eatshirt and went to the gym to work out. T-shirt - He usually wears a t-shirt to work. Hes a slob.tie - On the west coast people dont usually wear ties. However, ties are quite common on the east coast.skirt w - She wore a skirt and blouse to the job interview.mini-skirt w - Mini-skirts were introduced in the 1960s and were considered very provocative.shorts - Its summer. Why arent you wearing shorts?socks - If you dont wear socks, your feet will stink!suit - Some professions require men to wear a suit to work.sweater - I pulled on the warm sweater and drank a cup of cocoa.trousers - Everyone puts on their trousers one leg at a time. Sportswear jogging suit - Alice got into a jogging suit and ran three miles.tracksuit - In some countries, people like to wear tracksuits when lounging around the house.bikini w - Sports Illustrated features a bikini issue every year. Some think beautiful women in tiny bikinis dont have much to do with sports!swimming costume / swimming-suit w - Get your swimming-suit on and lets go to the beach.swimming trunks m - In the USA, most men wear swimming trunks rather than speedos. Footwear boots - If youre going for a hike, youll need to wear boots.sandals - During the summer, I usually wear sandals on the weekends.slippers - I sometimes like to get in my pajamas, put on my slippers and spend a quiet evening at home.shoes - The heels on my shoes have worn out. I need a new pair.sneakers - Were just getting some groceries, put on your sneakers and lets go. Underwear bra w - Victorias Secret has made the bra into a fashion statement.knickers w - Dont get your knickers twisted!panties w - She bought three pairs of panties with her bra.tights/pantyhose w - My sister doesnt like to wear dresses because she hates pantyhose.boxers m - She thinks boxers look better on men than briefs.briefs m - Briefs are also called tightie whities in idiomatic American English. Hats and Caps beret - Men in France seem to love wearing berets.cap - Americans wear a lot of baseball caps.hat - Men used to wear hats in the 1950s. Everything has changed since then!helmet - Soldiers could be recognized during the war by the type of helmet they wore. Natural Materials cotton - Cotton breathes and is an excellent all-around fabric.denim - Denim is the cloth used to make jeans.leather - Leather jackets are considered quite stylish by some.linen - Linen sheets are very comfortable during hot summer nights.rubber - The souls of boots are often made out of rubber, or rubber-like materials.silk - Silk sheets are considered a luxury in most parts of the world.suede - Dont you step on my blue suede shoes is a line from a famous Elvis Presley song.wool - I prefer to wear a traditional wool coat to keep warm in winter. Artificial Materials plastic - There are many plastic components in todaysporting shoes.nylon - Nylon is used to make rain jackets.polyester - Polyester is often mixed with cotton to make a shirt iron-free. Fashion designer - Designers are often outlandish people.fashion - The latest fashions come from Paris and London.fashion-conscious - Fashion-conscious people spend thousands on clothes every year.trend - I cant keep up with the latest trends.unfashionable - That jacket is quite unfashionable. Patterns checked - The checked shirt is quite popular in Portland.flowered - She likes to wear flowered dresses.patterned - I generally stay away from patterned shirts.plain - I prefer a plain blue shirt.polka-dots or spots - Spotted blouses are fashionable this season.pinstriped - A dark blue pinstriped suit can be very elegant.tartan - The Scottish are known for their tartan clothes.

Thursday, November 21, 2019

THE LOST BEAUTIFULNESS Essay Example | Topics and Well Written Essays - 250 words

THE LOST BEAUTIFULNESS - Essay Example On the other hand, I utterly dislike the characters of Jake Safransky, Hanneh’s husband, and Benjamin Rosenblatt, the landlord. Hanneh’s husband is a grouch who only thinks of their material condition and refuses to appreciate the beauty that his wife is offering to him. He also persistently dampens Hanneh’s enthusiasm, but fortunately Hanneh does not give in to his discouraging words. But the most appalling character in the story is the landlord, Mr. Rosenblatt. He is an unjust, greedy, uncaring, and wicked person. He is a classic epitome of a voracious capitalist during that period. The story fosters a strong connection with its audience. I, for one, felt the gravity of the injustice imposed on Hanneh. I felt how her efforts, dreams, and created beauty were crushed by the greediness of one man. The story already has a ‘universal appeal’ for it tackles issues that people all over the world experience, such as poverty, injustice, indifference, and hopelessness. And, more importantly, the story engages its audience to a realm of beauty, which no one could say no

Tuesday, November 19, 2019

Assessment Activity Week 6 Essay Example | Topics and Well Written Essays - 250 words

Assessment Activity Week 6 - Essay Example One could say there is lack of synergy in the functioning of the company from a global perspective. The other issue in the case is that there is a disconnect with the way things are carried out, this is so because there are too many subsidiaries and fragmented teams that handle tasks which can be done by a single, core team. This would lead to information symmetry with is not the case currently. Although there is no doubt that there is going to be value addition to the company in the long run, to see significant results in the short run priorities have to be changed and looked at from a global perspective. The process has to be modified and restructured a bit to incorporate the current issues. For example the strategic team should look at the option of allocating funds based on criticality of the goal served and how the project would impact the overall development of the company. In fact a good way to evaluate a project is to see its weighted average score across the various goals sp ecified in the NRG.

Sunday, November 17, 2019

Atmosphere and Fossil Fuel Inputs Essay Example for Free

Atmosphere and Fossil Fuel Inputs Essay 1. Weather and Climate. Discuss the concept of energy/mass conservation as it pertains to the climate system. Be sure to address each component of the climate system in your example and feel free to use multiple examples if necessary to address each component. 2. Facts and Fiction. Explain the figure below. Be sure to address the three key components discussed in class as well as the overall (net) anthropogenic impacts on global warming. 3. Atmospheric Composition Structure. Draw a diagram labeling the five atmospheric layers discussed in class as well as the ozone layer. On your diagram, list the significance of each layer. 4. Atmospheric Circulation. Calculate the residence time of carbon dioxide in the atmosphere given the figure of the carbon cycle below. You can assume that the ocean, soil, vegetation and fossil fuel inputs together make the rate. 5. Ozone. Compare and contrast the two types of ozone depletion. Be sure to discuss the cause(s) of each, the impacts of each and the location of each at a minimum.

Thursday, November 14, 2019

The Christian Perspective in An Essay on Man -- Alexander Pope Essay o

The Christian Perspective in An Essay on Man  Ã‚     Ã‚   Some might argue that Alexander Pope's "An Essay on Man" presents the viewpoint of a deist. Others might claim that the poem fails to exhibit Christian concepts of good and evil, especially since the poet concludes his first epistle with the seemingly unchristian claim that "whatever IS, is Right" (I. 1. 294).    Yet Pope's arguments actually reflect a traditional Christian perspective, which can be verified by comparing his poem with New Testament teachings.   In his attempt to vindicate God in the face of suffering, he does not, like the pantheist, rule out the existence of evil. Pope knows that men are capable of vice and that suffering is real. Pope does not argue that evil does not exist; rather he argues that its existence does not preclude the justice of God. Like the writers of the New Testament, particularly the apostle Paul, Pope claims that pride and envy leads man to question the justice of God, and he insists that men submit to God, remaining content with th eir lot in life. Although Pope claims that "[o]ne truth is clear, `Whatever IS, is RIGHT'" (I. 1.294), he recognizes suffering: But errs not nature from this gracious end, From burning suns when livid deaths descend, When earthquakes swallow, or when tempest sweep Towns to one grave, whole nations to the deep?   (I. ll. 140-143) Pope does not only acknowledge the existence of evil. He describes it in vivid detail. In the above passage, he paints a horrid picture of plagues caused by excessive heat, of destructive earthquakes, and of storms that decimate entire towns and nations. He writes too of Ammon, who was turned "loose to scourge mankind" (I. l. 160). He may argue that nature does not err t... ...realizes this himself for a moment at the end of the second epistle. For he does not conclude by attempting to explain the existence of evil. Rather, he says only that "one comfort still must rise, / 'Tis this, Tho' Man's a fool, yet GOD IS WISE" (II. ll. 292-293). In the end, it is better to believe that every man (including Pope) is a fool for failing to explain evil than to believe that God is not wise for allowing it. This couplet is one further proof of the Christian influence in Pope's "An Essay on Man." In the Epistle to the Romans, Paul writes: "Let God be true, but every man a liar" (Romans 3:4).   Works Cited Pope, Alexander. "An Essay on Man." Ed. Gordon N. Ray. Boston: Houghton Miflin Company, 1969. The New American Bible. Nashville: Catholic Publishers, Inc., 1971. The King James Bible. Cleveland: The World Publishing Company, 1967.   

Tuesday, November 12, 2019

Advantages of Using Ict as a Tool for Teaching and Learning Process

Advantages of using ICT as a tool for teaching and learning process in higher education institution. ICT defined as information and communication technology (ICT) the hardware and software that enables data to be digitally processed, stored and communicated. ICT can be used to access, process, manage, and present information model and control events, construct new construct new understanding and communicate with other. In the context of learning process, ICT may be referred as a necessary tool for any student who desires further learning shortly after the internet explosion of the 1990s.ICT was immediately integrated into educational field. Even though symbolized advancement in human knowledge was seen as a setback by many educator and instructors at the university. There are many advantages of using ICT as a tool for teaching and learning. The advantages such as ICT can be used at anytime, anywhere, access to remote learning resources and it help to prepare individual for the work p lace. First of all, the advantage of using ICT as a tool for teaching and learning process in higher education learning is anytime and anywhere. Dr.Ken Olson, President of Digital and Equipment Corporation who said he had prescribed a time when computers will weigh no more than one and a half tons. One defining feature of ICT is the capability to transcend time and space between time. ICT make possible asynchronous learning or learning characterized by a time lag. For example, internet can be accessed 24hours per day for seven days per week. ICT based educational delivery such as educational programming broadcast over radio or television also dispenses with the need for all learners and instructors to be in one physical location.In addition, certain type of ICTs, such as teleconferencing technologies, enable instruction to be received simultaneously by other learner at higher learning institution. In a nutshell, we can see that using of ICT tools in higher learning institution give many advantages. The advantages in information technology have heavily influenced especially in teaching and learning process. In 2000, most excellent student of National University of Malaysia used ICTs tool as medium to excellent were stated and published in Berita Harian newspaper.All the benefits can lead many student to excellent in their study and at the same time they can diverse their knowledge in their study and provide so many resources if they really want to do some research about their study. They also can communicate better with their lecturers or instructors through the web cam on their computer. Internet services provide â€Å"Skype† to make people easier to communicate with each other. They can ask their lecturers or instructors about so many question and clarify better about their assignment or lecture syllabus. The most important thing it’s a free services.

Sunday, November 10, 2019

A Connecticut Yankee in King Arthur’s Court Essay

The concept of time travel was not a subject new for fiction. However, it was quite a leap for the like of Mark Twain who has been writing about clear-cut fiction (To Sawyer, Huckleberry Finn) before he wrote something purely out of fantasy. The Legend of King Arthur arguably does not have a historical base; it is arguably a tale that gave one of this world’s strongest nations its foundation. Indeed, England’s rich traditions would not be complete without this great legend of the King. Such tradition must have caught the fancy of Mark Twain for in this book, he placed a Yankee, an American to the core, in the midst of England’s most precious fictional knights and in the book, Mark twain made the particular American powerful as he had the benefit of 1200 years of mankind advancement. Mark Twain did not embellish on the time travel itself. The Yankee just knocked his head and managed to wake up in King Arthur’s court. Of course, he was ridiculed because he talks funny and dresses weird and Merlin himself sentenced him to burn at the stake, like a woman accused of making a pact with the devil. It just so happened that the Yankee has the benefit of luck. He remembered from his history lessons the great eclipse that will happen and at the time of his burning at that. He used this advanced knowledge to get himself out of death and because he was cunning enough to be a great actor and convince the citizenry of his powers, he was elevated to a position equal to that of the King or the Pope. He even surpassed the great Merlin in rank. Merlin, of course cannot allow this, hence a power struggle between the Yankee and Merlin ensued but what use is Merlin’s incantations to science and technology? As the book trivialized, chanting of magic spells cannot really repair a leak as much as good, old repair can. Merlin lost and the Yankee then introduced more modernization to the court, attempting to abolish monarchy. How Mark Twain must have enjoyed writing this novel. The Yankee introduced the then modern American way of living- telephones, public education system, newspaper publications, factories – all these aimed to destroy Arthur’s romanticized and chivalrous kingdom. It is like the American revenge to the British Empire for colonizing them and treating them like heathens for centuries. At this time in the 19th century and even to this date in 2010, there are a lot of British snobs who look down on Americans. This was Mark Twain’s fantasy- had this book happened in reality, then the British will probably know some humility and perhaps make Americans superior to the British citizenry. The 6th century Britain could certainly use introduction to the modern world. Economics was developed by the Yankee; industrialization was commenced yet despite all these contributions, the King refused to get out of his chivalric way of living. The Yankee, being weird yet intelligent was despised by fellow noblemen. His rise to prominence angered the others who were bested by the weird man who talks funny and seems to be loved by the people. Many people devised his ruin and eventually succeeded. The ending of the book raises some eyebrows; the Yankee was cursed by Merlin to sleep for 1300 years, transporting him back to the day and age he initially came from. Mark Twain puts the elements of â€Å"what if† in his readers’ mind as with the ending, the readers will think, â€Å"Hey, this could be real after all†. Overall, despite being a fantasy, A Connecticut Yankee in King Arthur’s Court shows Mark Twain’s disdain for romanticism. The Yankee’s logic and intellect reflects how stupid chivalric people were. The most chivalrous time was arguably in King Arthur’s court and Sir Lancelot and Guinevere’s love story was most romanticized about and Mark Twain in this book showed how silly all of these are. Works Cited: Twain, Mark. â€Å"A Connecticut Yankee in King Arthur’s Court. † 1889. New York: Bantam Classic, 1983.

Thursday, November 7, 2019

Biography of Benito Juárez, Mexicos Liberal Reformer

Biography of Benito Jurez, Mexico's Liberal Reformer Benito Jurez  (March 21, 1806–July 18, 1872) was a Mexican politician and statesman of the late 19th century and president of Mexico for five terms during the turbulent years of 1858–1872. Perhaps the most remarkable aspect of Jurez’s life in politics was his background: he was a full-blooded native of Zapotec descent and the only full-blooded native to ever serve as president of Mexico. He did not even speak Spanish until he was in his teens. He was an important and charismatic leader whose influence is still felt today. Fast Facts: Benito Juarez Known For: First Mexican president of full Mexican heritageAlso Known As: Benito Pablo Jurez Garcà ­aBorn: March 21, 1806 in  San Pablo Guelatao, MexicoParents: Brà ­gida Garcà ­a and Marcelino JurezEducation:   Oaxaca Institute of Arts and SciencesDied: July 18, 1872  in Mexico City, MexicoAwards and Honors:  Namesake for many roads and schools as well as the Mexico City airportSpouse: Margarita Maza  Children: 12 with Margarita Maza; 2 with Juana Rosa ChagoyaNotable Quote: Among individuals, as among nations, respect for the rights of others is peace. Early Years Born on March 21, 1806, into grinding poverty in the rural hamlet of San Pablo Guelatao, Jurez was orphaned as a toddler and worked in the fields for most of his young life. He went to the city of Oaxaca at the age of 12 to live with his sister and worked as a servant for a time before being noticed by Antonio Salanueva, a Franciscan friar. Salanueva saw him as a potential priest and arranged for Jurez to enter the Santa Cruz seminary, where young Benito learned Spanish and law before graduating in 1827. He continued his education, entering the Institute of Science and Art  and graduating in 1834 with a law degree. 1834–1854: His Political Career Begins Even before his graduation in 1834, Jurez was involved in local politics, serving as a city councilman in Oaxaca, where he earned a reputation as a staunch defender of native rights. He was made a judge in 1841 and became known as a fiercely anti-clerical liberal. By 1847 he had been elected governor of the state of Oaxaca. The United States and Mexico were at war from 1846 to 1848, although Oaxaca was nowhere near the fighting. During his tenure as governor, Jurez angered conservatives by passing laws allowing for the confiscation of church funds and lands. After the end of the war with the United States, former President Antonio Là ³pez de Santa Anna had been driven from Mexico. In 1853, however, he returned and quickly set up a conservative government that drove many liberals into exile, including Jurez. Jurez spent time in Cuba and New Orleans, where he worked in a cigarette factory. While in New Orleans, he joined with other exiles to plot Santa Anna’s downfall. When the liberal general Juan Alvarez launched a coup, Juarez hurried back  and was there in November 1854 when Alvarez’s forces captured the capital. Alvarez made himself president and named Jurez the minister of justice. 1854–1861: Conflict Brewing The liberals had the upper hand for the moment, but their ideological conflict with conservatives continued to smolder. As minister of justice, Jurez passed laws limiting church power, and in 1857 a new constitution was passed, which limited that power even further. By then, Jurez was in Mexico City, serving in his new role as chief justice of the Supreme Court. The new constitution turned out to be the spark that reignited the smoking fires of conflict between the liberals and conservatives, and in December 1857, conservative general Fà ©lix Zuloaga overthrew the Alvarez government. Jurez and other prominent liberals were arrested. Released from prison, Jurez went to Guanajuato, where he declared himself president and declared war. The two governments led by Jurez and Zuloaga were sharply divided, mostly over the role of religion in government. Jurez worked to further limit the powers of the church during the conflict. The U.S. government, forced to pick a side, formally recognized the liberal Jurez government in 1859. This turned the tide in favor of the liberals, and on Jan. 1, 1861, Jurez returned to Mexico City to assume the presidency of a united Mexico. European Intervention After the disastrous reform war, Mexico and its economy were in tatters. The nation still owed great sums of money to foreign nations, and in late 1861, Britain, Spain, and France united to send troops to Mexico to collect. Intense, last-minute negotiations convinced the British and Spanish to withdraw, but the French remained  and began fighting their way to the capital, which they reached in 1863. They were welcomed by conservatives, who had been out of power since Jurez’s return. Jurez and his government were forced to flee. The French invited Ferdinand Maximilian Joseph, a 31-year-old Austrian nobleman, to come to Mexico and assume rule. In this, they had the support of many Mexican conservatives, who thought that a monarchy would best stabilize the country. Maximilian and his wife Carlota arrived in 1864, where they were crowned emperor and empress of Mexico. Jurez continued the war with the French and conservative forces, eventually forcing the emperor to flee the capital. Maximilian was captured and executed in 1867, effectively ending the French occupation. Death Jurez was reelected to the presidency in 1867 and 1871, but he did not live to finish his last term. He was felled by a heart attack while working at his desk on July 18, 1872. Legacy Today, Mexicans view Jurez much like some Americans see Abraham Lincoln: he was a firm leader when his nation needed one and took a side on a social issue that drove his nation to war. There is a city (Ciudad Jurez) named after him, as well as countless streets, schools, businesses, and more. He is held in particularly high regard by Mexico’s considerable indigenous population, which rightly views him as a trailblazer in native rights and justice. Sources Gonzalez Navarro, Moises. Benito Juarez. Mexico City: El Colegio de Mexico, 2006.Hammett, Brian. Jurez. Profiles in Power.  Longman Press, 1994. Ridley, Jasper. Maximilian Juarez. Phoenix Press, 2001.

Tuesday, November 5, 2019

Nyasasaurus - Facts and Figures

Nyasasaurus - Facts and Figures Name: Nyasasaurus (Greek for Nyasa lizard); pronounced knee-AH-sah-SORE-us Habitat: Plains of southern Africa Historical Period: Early Triassic (243 million years ago) Size and Weight: About 10 feet long and 100 pounds Diet: Unknown; probably omnivorous Distinguishing Characteristics: Long, lithe build; exceptionally long tail About Nyasasaurus Announced to the world in December of 2012, Nyasasaurus is an exceptional find: a dinosaur that lived in the southern continent of Pangaea during the early Triassic period, about 243 million years ago. Why is this such stunning news? Well, scientists previously believed that the earliest true dinosaurs (such as Eoraptor and Herrerasaurus) arose in middle Triassic South America, at a remove of 10 million years and 1,000 or so miles. Theres still a lot we dont know about Nyasasaurus, but what we do know points to an unmistakably dinosaurian lineage. This reptile measured about 10 feet from head to tail, which may seem enormous by Triassic standards, except for the fact that fully five feet of that length was taken up by its unusually long tail. Like other early dinosaurs, Nyasasaurus clearly evolved from a recent archosaur ancestor, though it may have represented a dead end in dinosaur evolution (the true dinosaurs we all know and love still being descended from the likes of Eoraptor). One thing about Nyasasaurus that remains a mystery is this dinosaurs diet. The earliest dinosaurs preceded the historic split between saurischian and ornithischian varieties (saurischians were either carnivorous or herbivorous, and all ornithischians, as far as we know, were plant-eaters). It seems most likely that Nyasasaurus was omnivorous, and its descendants (if any) evolved in more specialized directions. It may yet turn out that Nyasasaurus is technically classified as an archosaur rather than a true dinosaur. This would not be an unusual development, since theres never a firm line that separates one type of animal from another in evolutionary terms (for example, which genus marks the transition from the most advanced lobe-finned fish to the earliest tetrapods, or the small, feathered, fluttery dinosaurs and the first true birds?)

Sunday, November 3, 2019

Judicial Review Essay Example | Topics and Well Written Essays - 250 words

Judicial Review - Essay Example 78), because it is emphatically, the province and duty of the judicial government to say what the law is (Marbury Vs. Madison), and because the Constitution is the fundamental law, judges must give preference to it over ordinary laws† (11). It is the vested power of the judiciary branch of the government to strike down statutes which are inconsistent with the Constitution. In the event that a conflict shall arise between two laws, it is the duty and obligation of the Court to interpret the law and has the power to determine which among these laws are contrary to the intent of the supreme law of the land or the Constitution. According to Corwin, â€Å"Well-entrenched is the principle that the Constitution is superior to any ordinary act of the legislature, then, the Constitution, must govern the case to which they both apply† (8). The doctrine of judicial activism holds that the â€Å"federal judiciary should take an active role in using its powers to check the activitie s of the governmental bodies, when those bodies exceed their authorities â€Å"(Bardes, Shelley and Schmidt, 458). There are some judges who play as activists or a restraintists. An activist is one who presents the role of the judge as liberal wherein he applies the law in deciding the case and produces appropriate results.

Friday, November 1, 2019

Classical and Modern Rhetoric Essay Example | Topics and Well Written Essays - 2000 words

Classical and Modern Rhetoric - Essay Example Classical rhetoric can be traced back to the ancient times beginning with Homer who is thought to be the father of oratory having inspired many in the art. Athens in 510BC consisted of democratic institutions that forced citizens to engage in public service and making oratory skills necessary. This decree gave rise to the formation of an assembly of scholars called Sophists who strove to educate people in the art of speaking and make them better speakers. Protagoras one of the first sophists taught his students the method in making the weaker part of speech or discussion the stronger argument. In 5th century BC, Corax of Syracuse described rhetoric as the art of persuasion. He wrote the first book on rhetoric and is thought to be the actual originator of rhetoric as a science. Pupils of Corax such as Tisias also mastered the art of rhetoric. Others included Gorgias, Thrasymachus and Antiphon who was the first to unify the theoretical and practical aspects of rhetoric. The 4th century great orator Isocrates developed the art of rhetoric into a cultural academic work, a doctrine having practical objectives. He lectured on public speaking as a way of self improvement. He aimed to distance himself from the Sophists whom he viewed as pretending to know more than they did. He accepted oratory as an art to be learned and excelled in, but also that it relied on ones own personal inclinations and interest to progress in the field and this included persistence, practice and following role models. He opined that public speaking was of more value when the speaker talked on noble ideas and posed critical questions that made people think. This had the effect of improving the character of the speaker and audience as well as providing them food for thought. His written speeches were models for his students to emulate. He wrote no handbooks on the subject of oratory but his speeches 'Antidosis' and 'Against the Sophists' are considered to be models of oratory, influencing later orators such as Cicero and Quintilian (Corbett p.496.) Greek philosopher Plato highlighted a technical approach to rhetoric. His work titled Gorgias debated the Sophistic view that persuasion could be independent from the art of dialectic. Plato emphasised truth over persuasion and noted that audiences will not improve simply by listening to flattering and coercive statements. In Phaedrus, he explained the underlying conventions that comprised the substance of rhetorical art. He indicated the differences between true and false forms of rhetoric. He suggested that dialectic produced true form of rhetoric where logic and rational arguments with persuasive power seemed much more effective and genuine way to get the message across and sway audiences. Plato's coinage of the word 'rhetoric' was his way of criticizing the Sophists assertions about teaching virtue through persuasive oratory. Plato's student was Aristotle (384-322 BC) whose work on rhetoric continues to be a subject of study. Aristotle described the purpose of rhetoric as being rather than persuasion. It was a process of uncovering all possible means of persuasion. Greater emphasis was placed on a persuasive gathering of truth to win an argument rather than swaying audiences by rousing their emotions. Aristotle considered rhetoric as the opposite of logic or as he describes it, the antistrophe of dialectic.

Wednesday, October 30, 2019

Innovation and Sustainability Essay Example | Topics and Well Written Essays - 500 words - 2

Innovation and Sustainability - Essay Example This activity involves cutting, burning and bulldozing trees down to clear land or gain access to more land. It harms the earth when the carbon monoxide seeps into the soil and floats off into the atmosphere. The consumption point of this process is having land cleared to build an industry or commercial business. It allows humans to produce products and consume currency. Industrialization is also a major human production habit. It involves processing of raw material, could be natural resources from the earth, into finished products. Agriculture supports industrialization in the food sector and food systems sustenance (Likens, Driscoll & Buso 1996, p.120). This particular production habit has been greatly influenced by the technological changes and the scarce resources. These two factors have resulted to a lot of innovation and high utilization of the available resource. Consumption is the direct utilization of material resources. Transportation is one way that humans consume. The number of vehicles has increased gradually and the fuel we use to run them is very harmful to the atmosphere. In this way we consume the efficiency of mobility by producing vehicles to ferry us to our destinations. In the larger picture production is also a part of consumption especially in transportation since in the process of production materials have to be moved from one site to another. The concept of sustainable consumption and production is comprehensive and takes a holistic approach to the systems of production and consumption. Humans have to seek ways to ultimately reverse or reduce the negative social and ecological impacts. This calls for a means of aligning economic systems to meet the needs of current and future generations within the ecological carrying capacity of the Earth. Policy instruments and tools that affect change and shift in production and consumption patterns are efforts that need to be considered in sustenance of the global population.

Sunday, October 27, 2019

The Introduction To Malicious Software Computer Science Essay

The Introduction To Malicious Software Computer Science Essay Malware is a collective term for any malicious software which enters system without authorization of user of the system. The term is created from amalgamation the words malicious and software. Malware is a very big hazard in todays computing world. It continues to grow in capacity and advance in complexity. As more and more organization try to address the difficulty, the number of websites distribute the malware is rising at an frightening rate and is getting out of control. Most of the malware enters the system while downloading files over Internet. Once the malicious software finds its way into the system, it scans for vulnerabilities of operating system and perform unintended actions on the system finally slowing down the performance of the system. Malware has ability to infect other executable code, data/system files, boot partitions of drives, and create excessive traffic on network leading to denial of service. When user executes the infected file; it becomes resident in memory and infect any other file executed afterwards. If operating system has a vulnerability, malware can also take control of system and infect other systems on network. Such malicious programs (virus is more popular term) are also known as parasites and adversely affect the performance of machine generally resulting in slow-down. Some malware are very easy to detect and remove through antivirus software[1]. These antivirus software maintains a repository of virus signatures i.e., binary pattern characteristic of malicious code. Files suspected to be infected are checked for presence of any virus signatures. This method of detection worked well until the malware writer started writing polymorphic malware [15][16] and metamorphic malware. These variant of malware avoid detection through use of encryption techniques to thwart signature based detection. Security products such as virus scanners look for characteristics byte sequence (signature) to identify malicious code. The quality of the detector is determined by the techniques employed for detection. A stealth malware detection[36] technique must be able to identify malicious code that is hidden or embedded in the original program and should have some capability for detection of yet unknown malware. Commercial virus scanners have very low resilience to new attacks because malware writers continuously make use of new obfuscation methods so that the malware could evade detections. 2.1 Computer Virus A computer virus[6] is basically a program which is written by the programmers whose behaviour is to replicate itself and spread from one computer to another. The term virus is also normally, but incorrectly, used to refer to other types of malware, including but not limited to adware .and these spyware programs that do not have a reproductive ability. Malware includes various computer viruses[6], such as computer worms, Trojan horses[17], most of them are rootkits, spyware which are also considered as dishonest adware and other malicious or redundant software, including proper viruses. Viruses are occasionally confused with worms and Trojan horses, which are theoretically different. A worm can exploit security vulnerabilities to spread itself repeatedly to other computers through networks[7], while a Trojan horse is a program that appears nontoxic but hides malicious functions. Worms and Trojan horses[17], like viruses, may harm a computer systems data or recital. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohens theoretical compression virus[6]. However, various antivirus professionals[5] dont admit the concept of kindly viruses, as any beloved function can be implemented without involving a virus automatic compression, for instance, is available under the Windows operating system at the choice of the user. Any virus will by definition make unconstitutional changes to a computer, which is undesirable even if no damage is done or intended. On page one of Dr Solomons Virus pdf, the undesirability of viruses, even those that do nothing but reproduce, is thoroughly explained. 2.1.1 Academic Work Veith Risak published[6] the article whose title was as follows Selbstreproduzierende Automaten mit minimaler Information sà ¼bertragung (Self-reproducing automaton with minimum information switch over). The article described a fully serviceable virus written in assembler language for a particular SIEMENS 4004/35 computer system. In the year 1980 Jà ¼rgen Kraus wrote his thesis on Selbstreproduktion bei Programmen at the University of Dortmund. In his work Kraus guess that computer programs[4] can behave in a way parallel to biological viruses. In the year of 1984 Fred Cohen at the University of Southern California wrote his paper on the Computer Viruses[6] Theory and Experiments. It was the first paper of him in which he has explained to clearly call a self-reproducing program a virus, a term introduced by Cohens mentor Leonard Adleman. Fred Cohen published a exhibition that there is no algorithm that can perfectly detect all potential viruses. An article that published on malware that describes useful virus functionalities was available by J. B. Gunn in the title Use of virus functions to provide a virtual APL predictor under user control in 1984. 2.1.2 Science Fiction There are several myths associated with the science.The actual term virus was first used to symbolize a self-reproducing program in a small story by David Gerrold in Galaxy magazine in 1969-and later in his 1972 novel, When HARLIE Was One. In that novel, a attentive computer named HARLIE writes viral software to recover damaging personal information from other computers to blackmail the man who wants to turn him off. Michael Crichton[7] told as a sideline story of a computer with telephone modem dialing potential, which had been automatic to randomly dial phone numbers until it hit a modem that is answered by another computer. It was an attempt to program the answer computer with its own program, so that the second computer would also begin dialing unsystematic numbers, in search of yet a different computer to program. The program is assumed to spread exponentially through susceptible computers. 2.1.3 Virus Programs The Creeper virus[6] was first detected on ARPANET, the prototype of the Internet, in the early 1970s. Creeper was an new self-replicating program developed by Bob Thomas at BBN Technologies in 1971. Creeper has used the ARPANET to infect DEC PDP-10 computers which are running on the TENEX operating system. Creeper gain admission via the ARPANET and banal itself to the isolated system where there was a message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called which is known as Elk Cloner was the first PC virus to appear in the uncultivated that is, outside the single computer or lab where it was created by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skrenta was studying in the high school and was injected in a game on a floppy disk. On his 50th iterative use the Elk Cloner virus would be activate, which prone to infecting the PCs and displaying a short poem beginning Elk Cloner: The program with a personality. The first IBM PC virus in the natural was a boot sector virus dubbed and created by the Farooq Alvi Brothers in Lahore, Pakistan, seemingly to deter piracy of the software they had written. Before computer networks[7] became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the PCs, many users frequently exchanged their information and programs on floppies. Some of the viruses are spread by infecting programs which are stored on these disks, while others programs installed themselves into the disk boot sector, which ensure that they would be run when the user booted the computer from the disk, usually inadvertently. Personal computers of the period would try to boot from the floppy at first if one had been left in the drive. Until floppy disks rejects, this was the most unbeaten infection strategy and that is why boot sector viruses were the most common in the wild for many years. Conventional computer viruses[6] emerge in the 1980s, that are driven by the spread of PCs and the consequential increase in BBS, modem use, and software sharing. Bulletin board-driven software giving out contributed directly to the swell of Trojan horse programs, and computer viruses which were written to infect readily traded software. Shareware and bootleg software were equally common vectors for viruses on BB Systems Viruses can increase their chances of spreading over the several other computers which in networks[7] by infecting the files on the particular network file system or a file system which can be access by other computers Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as MS-Word and MS-Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word processor and Excel spread sheets were also available for Mac OS, most could also spread to Macintosh computers. Although most of these computer viruses[6] may not have the capability to send contaminated email messages to those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to repeat themselves with added blank lines. If two macro viruses concurrently infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend which isa trusted source follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005.There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo!. 2.2 Classification In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs (see code injection). If a user attempts to begin an infected program, the virus code may be executed concurrently. Viruses can be separated into two types based on their performance when they are executed. Nonresident viruses straight away search for other hosts system or OS which can be infected, or infect those targets, and finally transfer organize to the application program they infected. Tenant viruses do not search for hosts when they are happening. Instead, a resident virus masses itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed by other programs or the operating system itself. 2.2.1 Nonresident Viruses Nonresident viruses can be notion of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file. 2.2.2 Resident Viruses Resident viruses contain a replication module which is parallel to the one that is engaged by nonresident viruses. This section, however, is not called by a finder module. The virus[27] masses the duplication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to carry out a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer. Resident viruses are sometimes can be divided into a class of fast infectors and a class of slow infectors. Fast infectors are those which are designed to infect as many files as soon as possible. A fast infector, for instance, can infect every potential host file that is accessed. This pose a special difficulty when using anti-virus software[1], since a virus scanner will access every prospective host file on a computer when it performs a system-wide scan. If the virus scanner fails to notice that such a virus is present in memory the virus can piggy-back on the virus scanner and in this way infect all files that are scanned. Fast infectors rely on their fast infection rate to spread. The disadvantage of this method is that infecting many files may make detection more likely, because the virus may slow down a computer or perform many suspicious actions that can be noticed by anti-virus software. Slow infectors, on the other hand, are designed to infect hosts infrequently. Some slow infectors, for instance, only infect files when they are copied. Slow infectors are designed to avoid detection by limiting their actions: they are less likely to slow down a computer noticeably and will, at most, infrequently trigger anti-virus software[5] that detects suspicious behavior by programs. The slow infector approach, however, does not seem very successful. In most of the operating systems which use file extensions to determine program relations such as Microsoft Windows. The extensions may be normally hidden from the user by default. This makes it probable to create a file that is of a different type than it appears to the users or programmers. For example, an executable file may be created named picture.png.exe, in which the user sees only picture.png and therefore assumes that this file is an image and most likely is safe, yet when opened runs the executable on the client machine. An additional scheme is to generate the virus system from parts of existing operating system files by using the CRC16/CRC32 data. The initial code can be quite small (tens of bytes) and unpack a fairly large virus. This is analogous to a biological prion in the way it works but is vulnerable to signature based detection. This attack has not yet been seen in the wild. 2.3 Infection Strategies Virus avoids detection[31] by users, some viruses employ different kinds of deception. Some of the old viruses, especially on the MS-DOS operating system, make sure that the last modified date of a host file stays the same when the file is infected by the virus. This approach does not fool antivirus software, however, especially those which maintain and date cyclic redundancy checks on file changes. Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file. Some viruses try to avoid detection by killing the tasks associated with antivirus software[1] before it can detect them. As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access. 2.3.1 Read Request Intercepts While some antivirus software employ various techniques to counter stealth mechanisms, once the infection occurs any recourse to clean the system is unreliable. In Microsoft Windows operating systems, the NTFS file system is proprietary. Direct access to files without using the Windows OS is undocumented. This leaves antivirus software little alternative but to send a read request to Windows OS files that handle such requests. Some viruses trick antivirus[5] software by intercepting its requests to the OS. A virus can hide itself by intercepting the request to read the infected file, handling the request itself, and return an uninfected version of the file to the antivirus software. The interception can occur by code injection of the actual operating system files that would handle the read request. Thus, an antivirus software[1] attempting to detect the virus will either not be given permission to read the infected file, or, the read request will be served with the uninfected version of the same file. File hashes stored in Windows, to identify altered Windows files, can be overwritten so that the System File Checker will report that system files are originals. The only reliable method to avoid stealth is to boot from a medium that is known to be clean. Security software can then be used to check the dormant operating system files. Most security software relies on virus signatures or they employ heuristics, instead of also using a database of file hashes for Windows OS files. Using file hashes to scan for altered files would guarantee removing an infection. The security software can identify the altered files, and request Windows installation media to replace them with authentic versions. 2.3.2 Self-Modification Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. Unfortunately, the term is misleading, in that viruses do not possess unique signatures in the way that human beings do. Such a virus signature is merely a sequence of bytes that an antivirus program looks for because it is known to be part of the virus. A better term would be search strings. Different antivirus programs[1] will employ different search strings, and indeed different search methods, when identifying viruses[6]. If a virus scanner finds such a pattern in a file, it will perform other checks to make sure that it has found the virus, and not merely a coincidental sequence in an innocent file, before it notifies the user that the file is infected. The user can then delete, or in some cases clean or heal the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viru ses modify their code on each infection. That is, each infected file contains a different variant of the virus. 2.3.3 Encryption With A Variable Key A more advanced method is the use of simple encryption to encipher the virus. In this case, the virus consists of a small decrypting dependent methods and an encrypted copy of the virus code. If the virus is encrypted with the help of different key for each infected file, the only part of the virus that leftovers stable is the decrypting unit, which would (for example) be appended to the end. In this case, a virus scanner will not able to detect directly the virus using signatures, but it can still detect the decrypting unit, which still makes indirect revealing of the virus possible. Since these would be symmetric keys, stored on the infected host. In fact completely possible to decrypt the final virus, but this is almost certainly not required, since self-modifying code is such a scarcity that it may be basis for virus scanners to at least flag the file as suspicious. This may be old , but solid, encryption involves XORing each byte in a virus with a even, so that the exclusive-or operation has only to be frequent for decryption. It is doubtful for a code to adjust itself, so the code to do the encryption as wll as decryption may be part of the signature in many virus definition. 2.3.4 Polymorphic Code Polymorphic code was the first technique that posed a serious threat[27] to virus scanners. Likewise various normal encrypted viruses such as a polymorphic virus[15][16] infects files with an encrypted copy of itself, which may be decoded by a decryption method. In the case of polymorphic viruses or polymorphic worms[10], however, this decryption module is also modified on each infection. A well-written polymorphic virus thus has no parts which wait identical between infection, making it very difficult to detect directly using signatures. Antivirus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has must have a polymorphic engine which is also called mutating engine or mutation engine anywhere in its encrypted body. Some viruses employ polymorphic code in a system that constrain the change rate of the virus appreciably. For example, a virus can be planned to alter only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that previously contains copies of the virus. The benefit of using such sluggish polymorphic[15][16] code is that it makes it more difficult for antivirus professionals to get representative sample of the virus, because tempt files that are infected in one run will naturally have identical or parallel sample of the virus. This will make it more liable that the detection by the virus scanner will be variable, and that some instances of the virus may be able to avoid detection. 2.3.5 Metamorphic Code To avoid being detected by emulation, some viruses revise themselves completely each time they are to infect new executables. Viruses that make use of this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine must be needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consists of over 15,000 lines of assembly language code, 90% of which is part of the metamorphic engine. 2.3.6 Avoiding Bait Files and other Undesirable Hosts A virus wants to infect hosts in order to multiply further. In some cases, it might be a bad idea to infect a mass program. For example, many antivirus softwares perform an integrity check of their own code. Infecting such programs will therefore increase the likelihood that the virus is detected. For this reason, some viruses are programmed not to infect programs that are known to be part of antivirus software. Another type of host that viruses[27] sometimes avoid are bait files. Bait files (or goat files) are files that are specially created by antivirus software, or by antivirus professionals themselves, to be infected by a virus. These files can be created for various reasons, all of which are related to the detection of the virus: Antivirus professionals can use tempt files to take a test of a virus. It is more realistic to store and exchange a small, infected lure file, than to swap a large application program that has been infected by the virus. Antivirus professionals can use bait files to study the actions of a virus and assess detection methods. This is particularly useful when the virus is polymorphic[15][16]. In this case, the virus can be made to infect a large number of entice files. The grimy files can be used to test whether a virus scanner detects all versions of the virus. Some antivirus software employ bait files that are accessed regularly. When these files are modified, the antivirus software warns the user that a virus is probably active on the system. Since bait files are used to detect the virus, or to make detection possible, a virus can benefit from not infecting them. Viruses typically do this by avoiding suspicious programs, such as small program files or programs that contain certain patterns of garbage instructions. A related strategy to make baiting difficult is sparse infection. Sometimes, sparse infectors do not infect a host file that would be a suitable candidate for infection in other circumstances. For example, a virus can decide on a random basis whether to infect a file or not, or a virus can only infect host files on particular days of the week. 2.4 Vulnerability and Countermeasures 2.4.1 The Vulnerability of Operating Systems to Viruses Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems and office suites. Microsoft software is targeted by virus writers due to their desktop dominance. Although Windows is by far the most popular target operating system for virus writers, viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses. As of 2006, there were at least 60 known security exploits targeting the base installation of Mac OS X (with a Unix-based file system and kernel). The number of viruses[6] for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. Many Mac OS Classic viruses targeted the HyperCard authoring environment. The difference in virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising. In January 2009, Symantec announced the discovery of a Trojan that targets Macs. This discovery did not gain much coverage until April 2009. While Linux, and Unix in general, has always natively blocked normal users from having access to make changes to the operating system environment, Windows users are generally not. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like XP. In 1997, when a virus for Linux was released-known as Bliss-leading antivirus[5] vendors issued warnings that Unix-like systems could fall prey to viruses just like Windows. The Bliss virus may be considered characteristic of viruses-as opposed to worms-on Unix systems. Bliss requires that the user run it explicitly, and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator user except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked. 2.4.2 The Role of Software Development Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits. 2.4.3 Anti-Virus Software and other Preventive Measures Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computers memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus signatures. The disadvantage of this detection[32] method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect novel viruses that anti-virus security[7] firms have yet to create a signature for. Some anti-virus programs are able to scan opened files in addition to sent and received email messages on the fly in a similar manner. This practice is known as on-access scanning. Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to recognize the latest threats[27]. One may also minimize the damage done by viruses by making regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives. 2.4.4 Recovery Methods A number of recovery options exist after a computer has a virus. These actions depend on the virus. Some may be safely removed by functions available in most anti-virus software products. Others may require re-installation of damaged programs. It is necessary to know the characteristics of the virus involved to take the correct action, and anti-virus products will identify known viruses precisely before trying to dis-infect a computer; otherwise such action could itself cause a lot of damage. New viruses that anti-virus researchers have not yet studied therefore present an ongoing problem, which requires anti-virus packages[1] to be updated frequently. 2.4.5 Virus Removal One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files and does not exist in previous restore points. Some viruses disable System Restore and other important tools such as Task Manager and Command Prompt. An example of a virus that does this is Cia Door. Many such viruses can be removed by rebooting the computer, entering Windows safe mode , and then using system tools. Many websites run by anti-virus software companies provide free online virus scanning, with limited cleaning facilities (the purpose of the sites is to sell anti-virus products). Some websites allow a single suspicious file to be checked by many antivirus programs in one operation. Additionally, several capable antivirus software programs are available for free download from the internet (usually restricted to non-commercial use), and Microsoft provide a free anti-malware utility that runs as part of their regular Windows update regime. 2.4.6 Operating System Reinstallation Reinstalling any OS is another loom to virus removal. It involves either reformatting the computers hard disk drive and installing the operating system and