Wednesday, November 27, 2019

Understanding the Backlash Against Feminism

Understanding the Backlash Against Feminism Backlash  is a negative and/or hostile reaction to an idea, especially a political idea. The term is usually used to refer to a reaction that happens after some time, as opposed to an instant negative reaction when an idea is presented. The  backlash  often occurs after the idea or event has had some popularity. The term has been applied to feminism and womens rights since about 1990. There is often perceived to be a backlash against  feminism  in U.S. politics and public media. Politics After the great successes of the  women’s liberation movement, a backlash against the  Ã¢â‚¬Å"second wave† of feminism  began during the 1970s. Social historians and  feminist theorists  see the beginning of the political  backlash  against feminism in several different events: The volatile political climate surrounding the effort to ratify the  Equal Rights Amendment (ERA)The anti-feminist groups who attacked the Supreme Court’s  Roe v. Wade  decisionThe election of  Ronald ReaganThe rise of Jerry Falwell’s Moral Majority organization Media There was also a backlash against feminism found in the media: In declarations that feminism is deadIn the description of the 1980s and beyond as â€Å"post-feminist†In the narrative that treats feminism as a movement of the past rather than a  still evolving forceIn the accepted use of stereotypes of feminist women, and of women in general Feminists point out that in the late 1800s and early 1900s, powerful voices also tried to sweep  Ã¢â‚¬Å"first wave† feminism out of the public’s awareness. The publication of  Susan Faludis  Backlash: The Undeclared War Against American Women  in 1991 began a significant  public conversation on the fate of feminism in the 1980s. The attack on the  Equal Rights Amendment  by the New Right, especially by  Phyllis Schlafly  and her  STOP-ERA campaign, had been disappointing, but with Faludis book, other trends became more apparent to those who read her best-seller. Today Women remain underrepresented among media decision-makers, and many have looked at later trends as being part of a continuing backlash against feminism, scapegoating womens rights advocacy for not only making women unhappy but destroying masculinity. In the 1990s, legislation about welfare seemed to make poor single mothers responsible for the problems of the American family. Continuing opposition to womens reproductive rights and decision-making authority regarding birth control and abortion has been described as a war on women, echoing Faludis book title. In 2014, a media campaign, Women Against Feminism, took to social media as yet another kind of backlash against feminism. Susan Faludis  Backlash In 1991, Susan Faludi published  Ã‚  Backlash: The Undeclared War Against American Women.  This book examined the trend at that time, and similar backlashes in the past, to reverse womens gains in moving towards equality. The book became a best-seller. The National Books Critics Circle Award was given in 1991 to  Backlash  by Faludi. From her first chapter: Behind this celebration of the American womans victory, behind the news, cheerfully and endlessly repeated, that the struggle for womens rights is won, another message flashes. You may be free and equal now, it says to women, but you have never been more miserable. Faludi examined the inequalities that faced American women during the 1980s. Her inspiration was a Newsweek cover story in 1986 about a scholarly study, coming out of Harvard and Yale, supposedly showing that single career women had little chance of marrying. She noticed that the statistics didnt really demonstrate that conclusion, and she began noticing other media stories that seemed to show that feminist gains had actually hurt women. The womens movement, as we are told time and again, has proved womens own worst enemy. In the 550 pages of the book, she also documented the factory closings in the 1980s and the effect on blue-collar women workers. She also noted that the United States was alone among industrialized nations in not providing a system of child care, making it more difficult for women, still expected to be primary caregivers of the familys children, to enter the workforce on an equal basis to men. Despite her analysis including racial and class issues, critics have pointed out that her book largely addresses issues of middle class and successful white women. With her focus on the marriage study, critics also noted the focus on heterosexual women. She documented many ways in which the media, including advertisers, newspapers, movies, and television, blamed feminism for problems of American women and families. She showed that the common media myths of unhappy women were not accurate. The movie  Fatal Attraction  seemed to sum up the negative image of a woman. Mary Tyler Moores independent character of the 1970s had been remade into a divorcee in a new 1980s series. Cagney and Lacy was canceled because the characters didnt fit feminine stereotypes.  Fashions featured more frills and restrictive clothing. Faludis book also documented the role of the New Right, anti-feminist conservative movement, identifying itself as pro-family. The Reagan years, for Faludi, were not good ones for women.    Faludi saw the backlash as a recurring trend. She showed how each time that women seemed to make progress towards equal rights, the media of the day highlighted supposed harm to women, and at least some of the gains were reversed. Some of the negativity about feminism came from feminists: Even founding feminist Betty Friedan has been spreading the word: she warns that women now suffer from a new identity crisis and new problems that have no name. This article has been edited and content added by Jone Johnson Lewis.

Saturday, November 23, 2019

The History of Black Women in the 1950s

The History of Black Women in the 1950s African-American women are an essential part of our collective history. The following is a chronology of events and birthdates for women involved in African-American history, from 1950-1959. 1950 Gwendolyn Brooks became the first African-American to win a Pulitzer Prize (for Annie Allen). Althea Gibson became the first African-American to play at Wimbledon. Juanita Hall became the first African-American to win a Tony Award, for playing Bloody Mary in South Pacific. January 16: Debbie Allen born (choreographer, actor, director, producer). February 2: Natalie Cole born (singer; daughter of Nat King Cole). 1951 July 15: Mary White Ovington died (social worker, reformer, NAACP founder).   Linda Browns father sued the Topeka, Kansas, school board because she had to travel by bus to a school for African-American children when she could walk to the segregated school for white children only.  This would become the  Brown v. Board of Education  landmark civil rights case. 1952 September:  Autherine Juanita Lucy and Pollie Myers applied to the University of Alabama and were accepted. Their acceptances were rescinded when the university discovered they were not white. They took the case to court, and it took three years to resolve the case. 1954 Norma Sklarek became the first African-American woman licensed as an architect. Dorothy Dandridge was the first African-Amerian woman nominated for a Best Actress Oscar, for playing the lead role in Carmen Jones. January 29: Oprah Winfrey born (first African-American woman billionaire, first African-American woman to host a nationally syndicated talk show). September 22: Shari Belafonte-Harper born (actress). May 17: In Brown v. Board of Education, Supreme Court ordered schools to desegregate with all deliberate speed - finds separate but equal public facilities to be unconstitutional. July 24: Mary Church Terrell died (activist, clubwoman). 1955 May 18: Mary McLeod Bethune died. July: Rosa Parks attended a workshop at the Highlander Folk School in Tennessee, learning effective tools for civil rights organizing. August 28: Emmett Till, 14 years old, was killed by a white mob in Mississippi after he was accused of whistling at a white woman. December 1: Rosa Parks was arrested when she refused to give up a seat and move to the rear of the bus, triggering the Montgomery bus boycott. Marian Anderson became the first African-American member of the Metropolitan Opera company. 1956 Mae Jemison born (astronaut, physician). Hundreds of women and men in Montgomery walked for miles to work rather than use the buses as part of the Montgomery Bus Boycott. A court ordered the University of Alabama to admit Autherine Juanita Lucy, who filed a lawsuit in 1952 (see above). She was admitted but was barred from dormitories and dining halls.  She enrolled on February 3 as a graduate student in library science, the first black student admitted to a white public school or university in Alabama. The university expelled her in March, claiming she had slandered the school, after riots broke out and the courts ordered the university to protect her. In 1988, the university annulled the expulsion and she returned to school, earning her M.A. degree in education in 1992. The school even named a clock tower for her, and featured her portrait in the student union honoring her initiative and courage. December 21: The Supreme Court ruled bus segregation in Montgomery, Alabama was unconstitutional. 1957 African-American students, advised by NAACP activist Daisy Bates, desegregated a Little Rock, Arkansas, school under the protection of military troops ordered in by the federal government. April 15: Evelyn Ashford was born (athlete, track and field; four Olympic gold medals, Track and Field Womens Hall of Fame). Althea Gibson became the first African-American tennis player to win at Wimbledon and the first African-American to win the U.S. Open. The Associated Press named Althea Gibson their Woman Athlete of the Year. 1958 August 16: Angela Bassett born (actress). 1959 March 11: Raisin in the Sun by Lorraine Hansberry became the first Broadway play written by an African-American woman - Sidney Poitier and Claudia McNeil starred. January 12: Motown Records founded in Detroit after Berry Gordy deferred working for Billy Davis and Gordys sisters Gwen and Anna at Anna Records; female stars from Motown included Diane Ross and the Supremes, Gladys Knight, Queen Latifah. December 21: Florence Griffith-Joyner born (athlete, track and field; first African-American to win four medals in one Olympics; sister-in-law of Jackie Joyner-Kersee).

Thursday, November 21, 2019

Rolex Essay Example | Topics and Well Written Essays - 250 words

Rolex - Essay Example were being charged on products like gold along with silver utilized for the cases he specialized in was making the costs rise beyond what he could afford. The company was then registered as the Rolex Watch Company which has remained its name since then. However, after the death of Hans’s wife in the year 1944, the founder created a foundation that would handle the entire shares his company owned. He made sure that all the company’s’ income would from then on be going to charity thereby making the company the private trust it still is today. This implies that the company’s shares are not also traded on the stock exchange (Fernande, 2011). According to Fernande, the company has recently been witnessing a decline in its sales along with profitability. The company currently has a debt expenditure of over 2.28 billion dollars but has attracted private capital investments to the tune of 1.5 billion dollars. The company in collaboration with the individual investors aims at producing motor vehicle parts like gearboxes, wheel hubs for the purpose of diversifying their revenue collection efforts. In the year 2010, the company reported a loss of 73.48 million dollars from their net sales that were worth 1530.0 million dollars. This again showed a loss of over 9 million dollars from their previous year’s net sales worth 2593.0 million dollars (2011). The company is currently battling the sale of fake Rolex watches which have adversely affected their sales along with profitability. The company has opened up branches across many nations in the world to help in the distribution of their products. The revenue collected is directed to charity work across many parts of the world (Fernande,

Wednesday, November 20, 2019

What factors affect the gender pay gap in the UK industries Literature review

What factors affect the gender pay gap in the UK industries - Literature review Example Recent statistics indicate that the percentage for GPG has increased exponentially in recent times as compared to the previous five years despite the measures taken to abate the differences. Women begin to experience these wage differences with their male counterparts in their first jobs and the gap continues to widen as the women continue to rise in their careers (Blau, Brinton, Grusky, 2009, pp. 121). This literature reviews examines the different factors that have resulted in such discrepancies in the labor force in the UK. The factors contributing to gender pay gap among women in full time employment can be grouped in to four main categories namely education, experience, occupation, and unexplained factors. Over the years, the number of women accessing higher education has been minimal as compared to the number of men. This has negatively affected both employment and wage rates for women because men often most men have higher educational qualifications. As a result, women need to have slightly superior degrees, for instance a masters or a doctorate degree in order to earn the same amount as their male counterparts with only a first degree (Chant, 2010, pp. 73). The government has taken several, measures to promote higher education for women in the country and the situation is likely to be remedied in the future. Another factor related to experience is professional experience. Women tend to have less professional experience as compared to their male counterparts in similar positions. Women’s professional experience is cut down due to various factors including duration spent on maternity leaves, or time taken off to take care of children. This has in turn affected the wages and salaries that women get in similar positions held by men. One other factor that contributes to the GPG is occupation. The society generally classifies various occupations as male or female professions. Most women would therefore be

Sunday, November 17, 2019

Network Design for the 2012 London Olympics Essay Example for Free

Network Design for the 2012 London Olympics Essay This report is a step by step analysis of the requirements planning and implementation of a network based on the infrastructure of an office environment. Throughout this report, the reader will see how the requirements planning is broken down into detailed sections to illustrate how each requirement has been identified for the stages of planning to implementation. In the first part of the report, we will be identifying what hardware is required for the scale of the network, taking into consideration a room for future expansion and devices to be added at a later date. The second part of the report will be the identification of software that will be needed to run all services on the network including set-up and configuration of the software. Network Planning Why is a network required? Before actually planning the set-up of a network, the use of a network has to be justified. There are many uses to a network, some of the basic uses are †¢ Sensitive information exchange – information is shared only between departments and/or specific users and not to other people, e. g. customer account information that contains bank information and/or other personal information. †¢ Internal digital mail requests and communication between departments in a business may be increased and messages can be saved for later use. †¢ Resource sharing – information updated constantly is shared from one location and is referenced by other departments and/or users within the same network, e. g. a database of customer details and orders for a company. †¢ File Backup Services – information is backed up or stored in a secure location in the event of future problems and to maintain records of information. There are other uses of networks as well but mainly they are used as a means of security. Within a company, when a network is utilised correctly, the flow of information across a network can be monitored and tracked back to the user. This is essential to ensure no information used within the company is accessed from an outside source or is used in an unlawful manner by a company employee. Scope of the network Since the network is being made for the London 2012 Olympics, we can assume that the network will be of large scale (roughly 500-2,000 users). This means that each service, such as email and DHCP services, will require its own dedicated hardware in order for the resources to be adequately shared without any network latency or slow access experience. If the network is used on a much smaller scale, then the services could run from using only a few pieces of dedicated hardware such as the domain and email services sharing hardware. A site survey should always be performed before installation a network to ensure that wireless signals can be transmitted throughout the building or buildings and to see how the network can be modelled based on the environment it is going to be installed in. Identifying Network Hardware In this section, we will identify different hardware and its uses on a network, how a network is connected and what devices are used to connect a network throughout a company building. Servers and Services There are many different types of services that can be hosted from a server on a network. Many of these services usually have their own dedicated hardware but depending on the scale of the network, the services can easily be bunched together on the same hardware to cut down on overall equipment usage. Domain Server The domain server is used to authenticate users and computers included on the network. It is considered the main access control to a network because it stores all user account information used in authentication. Email Server The email server is used to direct messages to the correct recipient once the message has been processed by the server. Many companies today use a private internal mail system as a way of faster communication within departments. File Server A file server is used to provide users access to information and data across the network. This helps reduce file duplication across different computers on the network. Permissions can be set for file access so that important documentation can be read but not written to or deleted. DNS Server A DNS server is a kind of server that translates DNS names into an I. P address that is used for communication on the internet. DHCP Server A DHCP server is used by hosts to retrieve I. P addresses and other information. Firewall Server A firewall server is used for monitoring the network for vulnerabilities and intrusions and detecting viruses in the event of an attack from the internet. Application Server An application server is used to host applications and make them a part of the network’s resources. The servers are commonly used to save on costs for multiple software licenses compared to a site license. Database Server A database server is used to host a database for access by users. These servers can be updated and viewed. These are commonly used in finance departments or companies that host customer records that needs to be accessed and amended constantly. Network Devices This section will better explain the other devices that make up a network such as the network equipment itself and other devices which can be considered essential to a networked environment. Modem A modem is used to connect an outside line (usually from an internet service provider) via telephone communication to the network enabling internet access or access to another site’s resources. Router A router is a device that forwards data packets between devices on a network and can manage which network node receives certain data rather than sending the same data to each node. Routers can also have their own firewalls. Switch A switch is used to connect segments of a network together. Switches are an important part of a network as they are used to connect multiple devices at once. These switches come in all shapes and sizes, ranging from a simple 2 port switch to a 48 port switch which fits into a server rack. Wireless Access Point The wireless access point is a device that adds wireless connectivity to your network. This type of network device is often used to connect portable devices such as laptops, PDA and Smartphones to the network. It is also used for wireless printers and installing hardware devices to computers where network cabling is not applicable. Network Printer Network printers are printers made available on the network as a resource so that many users can print from one location. This cuts down multiple hardware usage per computer which saves hardware costs and maintenance. Aside from users, all of these services and devices are what make up a network. Connecting your Network: Cabling and Access Points Now that we have outlined what services and devices make up a network, there is the matter of how a network will be connected. There are a few methods of connecting a network, each with its own pro’s and con’s. The standard method of connecting a network is via cable. Cable Connection Cable connection for a network is one of the most trusted methods of connecting users to resources. The reason for this being that wired connections were the first standard and constant communication to be used with computers. Wireless connection is still a fairly new method of communication and is therefore still changing. Types of Network Cables There are quite a few types of network cables that are used today in business, each suited for different purposes. Twisted Pair is a type of copper cabling that is used for telecommunications and most Ethernet networks. There are two types of twisted pair cabling. †¢ Unshielded twisted pair (UTP) – UTP cables have a range of 100 meters and rely solely on the cancellation effect produced by the twisted-wire pairs that limits signal degradation. †¢ Shielded twisted pair (STP) – STP cables reduce electrical noise from within the cable since each pair of wires is wrapped in metallic foil to better shield the wires from noise. Four pairs of wires are then wrapped in a metallic braid or foil. Coaxial cable is a copper-cored cable that is surrounded by heavy shielding. There are several types of coaxial cable. †¢ Thicknet or 10BASE5 – used in networks and operated at 10mbps, maximum length of 500 meters. †¢ Thinnet or 10BASE2 – used in networks and operated at 10mbps, maximum length of 185 meters. †¢ RG-59 – Most commonly used with cable television. †¢ RG-6 – Higher quality than RG-59, with more bandwidth and less susceptibility to interference. A fibre optic cable is either a glass or a plastic fibre that carries light along its length. Fibre optic cable can reach distances of several miles before the signal needs to be regenerated. Fibre optic is more expensive than copper cable and connectors are more expensive and harder to assemble than other connections. Wireless Connection Wireless technology is also a greatly utilised technology in business today even though the reliability of wireless connection does not compare to that of a cable connection. Security There are a few different ways to apply security in a network. Some security protocols may be placed during network design and some protocols when the network is running. Network security during the design During the designing of the network, avoid giving anyone outside the implementation team or network designer any information, such as work plans about the network design or the materials that will be used for the network, which will help Vandals infiltrate or use the network inappropriately. Basic security that should be present in a network 1. Firewall will offer a tougher barrier between the private network and the Internet. Firewalls will prevent unwanted users or hackers from accessing the network. 2. Proxy can be used to provide users a way to connect to the proxy server by requesting authentication from the security service during the exchange of files in the network. 3. Antivirus – is used to prevent viruses from penetrating the network and the computers connected to it. It also eliminates the counter-espionage potential within a network. Since there are many antivirus softwares available, the network has the freedom to choose the appropriate antivirus for the network. 4. Strong password encourages all network an   web users to use a password that contains letters, numbers and symbols so as to increase the difficulty of breaking or cracking the password and steal any information from the network. 5. Packaging – cables used to make sure no unauthorized person have access to data and change it. Disaster Planning and Recovery Before setting a network, the manager of the project requires designers and developers of the network to take into account unforeseen circumstances, such as natural disasters and hardware failure, to reduce their impact. Earthquakes, floods, fires and such disasters may be given a solution using the following points †¢ The proximity of cables to main electrical wirings must be significantly distant to avoid fire. †¢ As much as possible, servers must be placed outside the building. Extra security protocols must be applied to avoid losing information. †¢ If a building has multiple servers, it is advised that all servers be placed on an isolated location and away from public gathering places. This will require the development of additional security precautions. †¢ Different types of cables should be considered in setting up a network to maximize its us †¢ Do not put cables near bodies of water or water discharge sa this may damage the cables †¢ Provide rooms with electric generators in case a power outage occurs. Make sure that these rooms are close to their central control devices to avoid technical problems in connecting the machines to the generator. †¢ Provide fire-preventing equipment such as fire extinguishers near the whereabouts of control systems †¢ Provide water and fire alarms to inform personnel if water or fire gets near the data storage devices †¢ The network team should provide a spare or backup server to perform full back up planning after disaster With the increase in number of intrusions and attacks on networks trying to take data and information, a way of protecting these data should be prioritized in a network. Since the data are, most of the time, secret and important to companies, detection and control of intrusions must be strictly implemented. Through the latest presentations that we have done in class, we have learned new techniques and OSI Models that should be taken into account to provide the highest standards of security and quality. Some of these techniques are firewalls, proxies, encryptions, IP security, data authenticity, communications type and satellites.

Friday, November 15, 2019

Present and Discuss the Views submitted by Socrates and Thrasymachius i

In the first book of the Republic Socrates and Thrasymachus argue about the nature of justice. Thrasymachus claims that justice is the advantage of the stronger. He also claims that Socrates’ arguments against that position stem from a naive set of beliefs about the real intentions of rulers, and an uncritical approach to the way words acquire their meaning. Present the arguments on both sides. Who do you think is right? Justify your position. In the first book of the Republic Plato orchestrates a dialogue between his teacher Socrates and one of his peers Thrasymachus in order to demonstrate the desirable nature of justice. In this essay I shall present Thrasymachus argument that justice is a tool of oppression wielded by the strong over the weak, whereas injustice provides a happy and fulfilled existence, and Socrates notion that justice is a desirable commodity and characteristic that benefits all individuals and is the only way to achieve any common goal. I believe that both philosophers have elements of truth in their arguments, however in the essay I intend to show that it is not possible to agree entirely with either party because of the underlying premise of their argument. I shall demonstrate that neither party has a correct view because they base their arguments on examples whose essence is incompatible with the concept of justice, and refute their claims due to the obvious fallacy of arguing two extremes when con sidering human nature. In the first book of the Republic, Thrasymachus states that justice is not desirable. He describes human behaviour as fundamentally self-interested, and states that justice is ‘an advantage of the stronger’ employed to suppress ‘the weaker’ . He submits the view that injustice is therefore preferable in relation to politics and to common living. Thrasymachus postulates that it is right and just to obey the rules of the state created by the ruling power, but that the ruling power will be making rules that benefit themselves. He supports his claim that the ruling power capitalise upon the weaker party by drawing a parallel between the profession of government and the profession of sheep herding: ‘The shepherd and the herdsman study the good of their flock and herds (for) the good of their masters and themselves’ . He considers that rulers rule with the objective of procuring some profit from them. On a basic level ... ... is in favour of ‘the weaker party’ and is a position of strength that provides a more fulfilling life. However, both arguments attempt to provide an explanation for the nature of justice without defining it and base their arguments on tangible concepts such as crafts and professions in order to give weight to their beliefs. Without a definition of the subject we cannot make a concrete comparison as it is unrealistic to try to prove that the nature of justice is the same as the nature of medicine. In addition, both arguments endeavour to confine human nature to extremes, just and unjust, knowledgeable and ignorant, and good and bad, without acknowledging the depth of the human experience and intermediate levels that we have. The conclusions of these arguments are incongruous with human nature and when we speak of justice, we are trying to define a concept that has distinct links with human nature. Therefore, I cannot say that either of the positions is ‘rightâ €™ as neither acknowledge my nature and have attempted to justify that justice is a commodity to desire or expel without explicating justice itself. Word Count: 2120 Bibliography Plato, The Republic, (Penguin Books, 2003)

Tuesday, November 12, 2019

Academic Objectives Essay

By the time I attend the graduation ceremony of University of Phoenix, there are three academic objectives I would like to accomplish. First and foremost, I would like to get a bachelor’s degree in psychology. Secondly, I would like to become a better writer. Last, I would like to become a better communicator so that I can network with people who are in the same career and field of work as me. With lots of dedication, hard work and completion of my classes, these are three goals I intend to complete. Receiving a bachelor’s degree in psychology from the University of Phoenix is my first academic objective. I get one step closer to my goal by attending all my classes, completing my assignments with a passing grade, and doing the best at passing all my exams. Today, having a bachelor’s degree is like having a high school diploma. Most jobs require or prefer some type of degree from a person when hiring. Like Achieve said, â€Å"Much has been said about the importance of increasing the labor supply for ‘middle skills jobs,’ or those jobs that now (compared to decades past) require more than a high school education but less than a bachelor’s degree (e. g., associate degree, postsecondary certificate, apprenticeship, etc. )† (Achieve, 2012) I recently applied for a job as a personal therapist to children with disabilities. When it came down to the interviewing and hiring portion, I was not able to get the job because I still have not received my bachelor’s degree. It was tough hearing the news but it really motivated and pushed me to go back to school and finish my degree. A bachelor’s degree has now become a necessity rather than a choice for me. Becoming a better writer would not only help in school but also in the world after graduation. Beginning with the Gen 200 class, one main focus there is writing. Whether it is writing a paper or doing a project, it is important to know where a person is making mistakes and where he or she is doing a good job. I find myself having to refresh my memory with all the writing rules and regulations. I have to go back to what I learned in high school and in the college courses to remember what I need to know when it comes to writing. Having the proper knowledge of what a perfect paper looks like will be as important in school as it will be in the real world. If a person is required to submit a report for work, he or she wants to be fully prepared so he or she does not look like a fool to the boss and coworkers. Good writers do not just happen. Good writers work hard at becoming who they are and are not afraid to ask questions. Never being afraid to ask questions or ask for help will make me a better writer and a better student. Constantly finding myself writing papers and doing assignments that involve writing will help me achieve my second academic goal of becoming a better writer. Communication and networking are really important in a career life. The better of a communicator and net worker a person is, the better chances the person will have to escalate. In school one gets graded partly on how well he or she communicate in class, whether he or she talks, participate or just stay quiet and not say anything. But in the real world, one does not get graded on how good he or she communicates. One gets ascended or promoted if he or she is a good communicator and are not shy to speak up when needed. According to the journal The Importance of Communication, â€Å"There is a sheer necessity for personal effectiveness that stems from effective communication. Time and again researchers have reinforced the importance of communication and its impact at the workplace. † (Radhaswamy & Zia, 2011) If one is always being open and communicative, then networking should not be a problem. I want to not only be a good communicator and net worker, I also want to be a good listener to be able to get places and become someone. In order to fulfill my academic objectives, I need a plan to incorporate effective strategies for success as a student. How am I going to accomplish my goals and get them done? By me attending my classes and passing them, I get one step closer to receiving my bachelor’s degree. I need to push myself to do my best in all the assignments and test so I can pass all my courses. Each class requires students to complete papers and assignments that need to be written. With that in mind, I will be able to perfect my writing skills. I have to remember to proofread all my papers and really strive for the best. To become a better communicator and net worker, I need to put myself out there so other can get to know me. I need to find a mentor that is in the same career field as I am, so that that person can not only guide me but also help me when I need it. Nothing will get done I am willing to fully commit in achieving my academic objectives. The three academic objectives I would like to accomplish by graduation are not just to be a good student but also to set myself for greater things in life. Getting my bachelor’s degree, becoming a better writer and a better communicator/net worker are very important to me. With those three academic objectives, I will become a better employee, person and student. They are three essential things that any person can use in their lives to get further in their careers. I know with the motivation, want to succeed, and push from those around me, I can accomplish my three academic goals from here to graduation day. References Achieve, I. C. (2012). The Future of the U. S Workforce: Middle Skills Jobs and the Growing Importance of Postsecondary Education. Achieve, Inc. Radhaswamy, P. , & Zia, A. (2011). The Importance of Communication. IUP Journal Of Soft Skills, 5(4), 52-56.

Sunday, November 10, 2019

Reflection about

Wars seemed like things that only happened in the past or in movies, but now we grew up seeing the news, the deadlines, and the stories of the horrific events that have been happening since 2001 and now we see them as normal issues in our world, our perspective about the wars, social and political tragedies are way too normal now.This film made me think about how twisted the mind of some people is, how they can agree to destroy the life of many innocent people, either way for the AH-Qaeda group and for the â€Å"supposedly† attack of the Americans to the Muslim people that Osama Bin Laden once claimed. It also got me thinking hat the security of the airports back in those days were highly poor, maybe they trusted more or they didn't even wonder that someone would dare to hijacked a flight, but of course it changed after all this tragedies, now you can't even travel with liquids that are more than 3 oz. ND obviously you can't travel with knives anymore. This film made me feel s o disturbed and uncomfortable, seeing what it actually happened in those towers, the Pentagon, how people were running for their lives, how they were struggling to get out and survive the hell that hey lived in, and the death of all the people that were in those planes.It made appreciate that life can be taking away from us in just the matter of 1 second, we should appreciate all the things that we have no matter what and always demonstrate the love that you have towards your family, never skipping a day telling that you love them. What I found most surprising/interesting was that all of this events happened in such a small matter of time, in less than 3 hours bunch of things happened, he two Twin Towers were hit, the Pentagon was hit also by an airplane, and that the passengers took over the plane that was going to hit the White House.Also I found out to be really interesting that the people that were in the United Airlines Flight 93 were brave enough to go and risk their lives jus t so they could save the life Of others, those people are the kind who should be called heroes. What I found most shocking or disturbing is that the fact of people who were in the Twin Towers got so desperate and they decided to kill themselves by mumping out of the building because they gave up, they couldn't stand all the suffer and the agony of being trapped in a 80 floor building and be completely helpless.Also, I got so disturbed in just thinking of hearing some outdoor soft music that was coming from the speakers while people were dying in the inside of those 2 buildings. The music felt and sounded so demoniac, like if it were a horror film. It is important for people to know about 9/11 because it was an event that left a mark in the world that we live in, it changed so many lives and the lifestyle f most human being in the Earth.It got some consequences that can explain why the present is like it is, the consequence of the problems that 9/11 caused, and because it's a tragic event that happened in our lifetime and we saw everything that was happening. Also, we should be informed in all the important and basic events that the humanity has lived and not repeating them again, these are mistaken decisions that people have made and We need to learn from them to not committing them again.

Friday, November 8, 2019

Diceratops - Facts and Figures

Diceratops - Facts and Figures Name: Diceratops (Greek for two-horned face); pronounced die-SEH-rah-tops; also known as Nedoceratops Habitat: Woodlands of North America Historical Period: Late Cretaceous (70 million years ago) Size and Weight: About 15 feet long and 2-3 tons Diet: Plants Distinguishing Characteristics: Two horns; odd holes on sides of skull About Diceratops (Nedoceratops) You can learn a lot about Greek numbers by studying ceratopsian (horned face) dinosaurs and their distant and not-so-distant relatives. Theres no such animal (yet) as Monoceratops, but Diceratops, Triceratops, Tetraceratops and Pentaceratops make for a nice progression (alluding to two, three, four and five horns, as indicated by the Greek roots di, tri, tetra and penta). An important note, though: Tetraceratops wasnt a ceratopsian, or even a dinosaur, but a therapsid (mammal-like reptile) of the early Permian period. The dinosaur we call Diceratops also rests on shaky ground, but for another reason. This late Cretaceous ceratopsian was diagnosed at the turn of the 20th century by the famous paleontologist Othniel C. Marsh, on the basis on a single, two-horned skull lacking the characteristic nasal horn of Triceratopsand given the name Diceratops, by another scientist, a few years after Marshs death. Some paleontologists believe this skull actually belonged to a deformed Triceratops, and others say Diceratops should properly be assigned to the synonymous genus Nedoceratops (insufficient horned face.) If, in fact, Diceratops winds up reverting to Nedoceratops, then the possibility exists that Nedoceratops was directly ancestral to Triceratops (this last, most famous ceratopsian only awaiting the evolutionary development of a third prominent horn, which should only have taken a few million years). If thats not confusing enough, another option has been touted by the famously iconoclastic paleontologist Jack Horner: perhaps Diceratops, aka Nedoceratops, was actually a juvenile Triceratops, in the same way Torosaurus may have been an unusually elderly Triceratops with a grotesquely overwrought skull. The truth, as always, awaits further fossil discoveries.

Tuesday, November 5, 2019

Affordable Qualitative Data Software Programs

Affordable Qualitative Data Software Programs When we talk about software used in sociological research, most people think about programs designed for use with quantitative data, like SAS and SPSS, that are used for generating statistics with large numerical data sets. Qualitative researchers, however, also have several software options available that can help analyze non-numerical data like interview transcripts and responses open-ended survey questions, ethnographic fieldnotes, and cultural products like advertisements, new articles, and  social media posts, among others. These programs will make your research and work more efficient, systematic, scientifically rigorous, easy to navigate, and will asist your analysis by illuminating connections in the data and insights about it that you might not otherwise see. Software that You Already Have: Word Processing Spreadsheets Computers are great note-taking devices for qualitative research, allowing you to edit and duplicate easily. Beyond basic recording and storage of data, however, simple word processing programs can also be used for some basic data analysis. For example, you can use the find or search command to go directly to entries containing keywords. You can also type code words alongside entries in your notes so that you can easily search for trends within your data at later point. Database and spreadsheet programs, like Microsoft Excel and Apple Numbers, can also be used for analyzing qualitative data. Columns can be used to represent categories, the sort command can be used to organize data, and cells can be used for coding data. There are many possibilities and options, depending on what makes the most sense for each individual. There are also several software programs designed specifically for use with qualitative data. The following are the most popular and highly rated among social science researchers. NVivo Nvivo, made and sold by QSR Internationl is one of the most popular and trusted qualitative data analysis program used by social scientists around the world. Available for computers running both Windows and Mac operating systems, it is a multifunctional piece of software that allows for advanced analysis of text, images, audio and video, webpages, social media posts, emails, and datasets. Keep research journal as you work. Case coding, theme coding, InVivo coding. Color coding stripes make your work visible as you do it. NCapture add-on to collect social media posts and bring it into the program. Automatic coding of datasets like survey responses. Visualization of findings. Queries that examine your data and test theories, search for text, study word frequency, create cross-tabs. Easily exchange data with quantitative anlaysis programs. Collect data on mobile device using Evernote, import into program. As with all advanced software packages, it can be costly to purchase as an individual, but people working in education get a discount, and students can buy a 12-month license for about $100. QDA Miner and QDA Miner Lite Unlike Nvivo, QDA Miner and its free version, QDA Miner Lite, made and distributed by Provalis Research, work stricly with text documents and images. As such, they offer fewer functions than Nvivo and others listed below, but they are fantastic tools for researchers focusing on analysis of text or images. They are compatible with Windows and can be run on Mac and Linux machines that run virtual OS programs. Not limited to qualitative analysis, QDA Miner can be integrated with SimStat for quantitative analysis, which makes it a great mixed-methods data analysis software tool. Qualitative researchers use QDA Miner to code, memo, and analyze textual data and images. It offers a range of features for coding and linking sections of data together, and also for linking data to other files and webpages. The program offers geo-tagging and time-tagging of text segments and graphic areas, and allows users to import directly from web survey platforms, social media, email providers, and software for managing references. Statistical and visualization tools allow patterns and trends to be easily viewable and shareable, and multi-user settings makes it great for a team project. QDA Miner is costly but is much more affordable for people in academia. The free version, QDA Miner Lite, is a great basic tool for text and image analysis. It does not have all the features as the pay-version, but can get the coding job done and allow for useful analysis. MAXQDA The great thing about MAXQDA is that it offers several versions from basic to advanced functionality that offer a range of options, including text analysis, data collected through a variety of qualitative methods, transcription and coding of audio and video files, quantitative text analysis, integration of demographic data, and data visualization and theory testing. It functions much like Nvivo and Atlas.ti (described below). Each piece of software works in any language, and is available for Windows and Mac OS. Prices range from affordable to costly, but full-time students can use the standard model for as little as $100 for two years. ATLAS.ti ATLAS.ti is a software program that contains tools to help the user locate, code, and annotate findings in the data, weigh and evaluate their importance, and visualize the relationships among them. It can consolidate large volumes of documents while keeping track of all notes, annotations, codes and memos in all fields of the data. ATLAS.ti can be used with text files, images, audio files, video files, or geo data. Variety of ways of coding and organizing coded data. It is available for Mac and Windows, and a part of its popularity, also works on mobile with Android and Apple. Educational licenses are fairly affordable, and students can use it for less than $100 for two years. Updated by Nicki Lisa Cole, Ph.D.

Sunday, November 3, 2019

Proposal Design Essay Example | Topics and Well Written Essays - 750 words

Proposal Design - Essay Example The instances of the observed conduct disorder (if any) will be recorded. Contrary to the requirements of the ordinary scientific studies, this type of research doesn’t require any control group. For this reason, most of the experimental designs will hardly fit in this study. The most appropriate experimental design for this kind of study would be direct observation, since the symptoms of the conduct disorders are observable (Kenneth & Bruce, 2014). The observation method supports the use of between-subjects research design. In this research, the target population is composed of the patients who underwent conduct disorder treatment, either through the group or home therapy methods. Due to the nature of the target population, each member should be given an equal opportunity of forming the sample group. This is because the treatments that each of the members underwent were similar. In this research therefore, the sampling technique will be simple random sampling. This technique will give each of the members equal chances of being selected to form the sample group. The sample size will be made up of 30 participants, in an equal number, across the two treatment methods. 15 participants will be randomly selected to as representatives, depending on the method of conduct disorder they were subjected to. The nature of this study is comparative in nature (Thorndike & E. L. 1913). For this reason, as opposed to the ordinary scientific researches, this study would not require splitting the sample group into control and experimental groups (Lacort & M. O, 2014).  . The study compares the effectiveness of the home and group treatments for the treatment of conduct disorders. For this reason, in this study, the observations will be made on the persons treated under each category of treatment. The effectiveness of each treatment option will be determined by considering the number of

Friday, November 1, 2019

Safety Elements in Aircraft Performance Essay Example | Topics and Well Written Essays - 500 words

Safety Elements in Aircraft Performance - Essay Example The objective of this exercise is to investigate why, if at all, and by how much, if so, each safety element within the overall aircraft performance criteria affects such safety. 6. the take-off thrust performance data is based on take-off thrust setting instructions as per Diamond 1A, General, 2005. These have been left out because they are not considered germane to this paper's purpose. (Diamond 1A, General, 2005) The paper shall now also include the basis on which the operational factors that have been considered for inclusion of the Diamond 1A, 2005, aircraft performance data, the last having been utilized for the purpose of this paper. The decision speed - the speed (IAS), after engine failure or any other cause, at which the pilot may elect to stop or takeoff - varies with weight, temperature, altitude, wind, runway gradient, takeoff flap setting, anti-skid availability, and takeoff speed schedule. (Diamond 1A, p. 6.8, 2005) The IAS at which airplane rotation is initiated assuming a continued takeoff after engine failure . When it is assumed that, under these conditions, the airplane is rotated at nose up body altitude at it will reach a speed of before a height of 35ft is attained the rotation speed will vary with weight, altitude, temperature, takeoff flap setting, and takeoff speed schedule. (Diamond 1A, p. 6.8, 2005) This is the actual speed attained at 35ft above runway surface with engine failure at and