Wednesday, November 27, 2019

Understanding the Backlash Against Feminism

Understanding the Backlash Against Feminism Backlash  is a negative and/or hostile reaction to an idea, especially a political idea. The term is usually used to refer to a reaction that happens after some time, as opposed to an instant negative reaction when an idea is presented. The  backlash  often occurs after the idea or event has had some popularity. The term has been applied to feminism and womens rights since about 1990. There is often perceived to be a backlash against  feminism  in U.S. politics and public media. Politics After the great successes of the  women’s liberation movement, a backlash against the  Ã¢â‚¬Å"second wave† of feminism  began during the 1970s. Social historians and  feminist theorists  see the beginning of the political  backlash  against feminism in several different events: The volatile political climate surrounding the effort to ratify the  Equal Rights Amendment (ERA)The anti-feminist groups who attacked the Supreme Court’s  Roe v. Wade  decisionThe election of  Ronald ReaganThe rise of Jerry Falwell’s Moral Majority organization Media There was also a backlash against feminism found in the media: In declarations that feminism is deadIn the description of the 1980s and beyond as â€Å"post-feminist†In the narrative that treats feminism as a movement of the past rather than a  still evolving forceIn the accepted use of stereotypes of feminist women, and of women in general Feminists point out that in the late 1800s and early 1900s, powerful voices also tried to sweep  Ã¢â‚¬Å"first wave† feminism out of the public’s awareness. The publication of  Susan Faludis  Backlash: The Undeclared War Against American Women  in 1991 began a significant  public conversation on the fate of feminism in the 1980s. The attack on the  Equal Rights Amendment  by the New Right, especially by  Phyllis Schlafly  and her  STOP-ERA campaign, had been disappointing, but with Faludis book, other trends became more apparent to those who read her best-seller. Today Women remain underrepresented among media decision-makers, and many have looked at later trends as being part of a continuing backlash against feminism, scapegoating womens rights advocacy for not only making women unhappy but destroying masculinity. In the 1990s, legislation about welfare seemed to make poor single mothers responsible for the problems of the American family. Continuing opposition to womens reproductive rights and decision-making authority regarding birth control and abortion has been described as a war on women, echoing Faludis book title. In 2014, a media campaign, Women Against Feminism, took to social media as yet another kind of backlash against feminism. Susan Faludis  Backlash In 1991, Susan Faludi published  Ã‚  Backlash: The Undeclared War Against American Women.  This book examined the trend at that time, and similar backlashes in the past, to reverse womens gains in moving towards equality. The book became a best-seller. The National Books Critics Circle Award was given in 1991 to  Backlash  by Faludi. From her first chapter: Behind this celebration of the American womans victory, behind the news, cheerfully and endlessly repeated, that the struggle for womens rights is won, another message flashes. You may be free and equal now, it says to women, but you have never been more miserable. Faludi examined the inequalities that faced American women during the 1980s. Her inspiration was a Newsweek cover story in 1986 about a scholarly study, coming out of Harvard and Yale, supposedly showing that single career women had little chance of marrying. She noticed that the statistics didnt really demonstrate that conclusion, and she began noticing other media stories that seemed to show that feminist gains had actually hurt women. The womens movement, as we are told time and again, has proved womens own worst enemy. In the 550 pages of the book, she also documented the factory closings in the 1980s and the effect on blue-collar women workers. She also noted that the United States was alone among industrialized nations in not providing a system of child care, making it more difficult for women, still expected to be primary caregivers of the familys children, to enter the workforce on an equal basis to men. Despite her analysis including racial and class issues, critics have pointed out that her book largely addresses issues of middle class and successful white women. With her focus on the marriage study, critics also noted the focus on heterosexual women. She documented many ways in which the media, including advertisers, newspapers, movies, and television, blamed feminism for problems of American women and families. She showed that the common media myths of unhappy women were not accurate. The movie  Fatal Attraction  seemed to sum up the negative image of a woman. Mary Tyler Moores independent character of the 1970s had been remade into a divorcee in a new 1980s series. Cagney and Lacy was canceled because the characters didnt fit feminine stereotypes.  Fashions featured more frills and restrictive clothing. Faludis book also documented the role of the New Right, anti-feminist conservative movement, identifying itself as pro-family. The Reagan years, for Faludi, were not good ones for women.    Faludi saw the backlash as a recurring trend. She showed how each time that women seemed to make progress towards equal rights, the media of the day highlighted supposed harm to women, and at least some of the gains were reversed. Some of the negativity about feminism came from feminists: Even founding feminist Betty Friedan has been spreading the word: she warns that women now suffer from a new identity crisis and new problems that have no name. This article has been edited and content added by Jone Johnson Lewis.

Saturday, November 23, 2019

The History of Black Women in the 1950s

The History of Black Women in the 1950s African-American women are an essential part of our collective history. The following is a chronology of events and birthdates for women involved in African-American history, from 1950-1959. 1950 Gwendolyn Brooks became the first African-American to win a Pulitzer Prize (for Annie Allen). Althea Gibson became the first African-American to play at Wimbledon. Juanita Hall became the first African-American to win a Tony Award, for playing Bloody Mary in South Pacific. January 16: Debbie Allen born (choreographer, actor, director, producer). February 2: Natalie Cole born (singer; daughter of Nat King Cole). 1951 July 15: Mary White Ovington died (social worker, reformer, NAACP founder).   Linda Browns father sued the Topeka, Kansas, school board because she had to travel by bus to a school for African-American children when she could walk to the segregated school for white children only.  This would become the  Brown v. Board of Education  landmark civil rights case. 1952 September:  Autherine Juanita Lucy and Pollie Myers applied to the University of Alabama and were accepted. Their acceptances were rescinded when the university discovered they were not white. They took the case to court, and it took three years to resolve the case. 1954 Norma Sklarek became the first African-American woman licensed as an architect. Dorothy Dandridge was the first African-Amerian woman nominated for a Best Actress Oscar, for playing the lead role in Carmen Jones. January 29: Oprah Winfrey born (first African-American woman billionaire, first African-American woman to host a nationally syndicated talk show). September 22: Shari Belafonte-Harper born (actress). May 17: In Brown v. Board of Education, Supreme Court ordered schools to desegregate with all deliberate speed - finds separate but equal public facilities to be unconstitutional. July 24: Mary Church Terrell died (activist, clubwoman). 1955 May 18: Mary McLeod Bethune died. July: Rosa Parks attended a workshop at the Highlander Folk School in Tennessee, learning effective tools for civil rights organizing. August 28: Emmett Till, 14 years old, was killed by a white mob in Mississippi after he was accused of whistling at a white woman. December 1: Rosa Parks was arrested when she refused to give up a seat and move to the rear of the bus, triggering the Montgomery bus boycott. Marian Anderson became the first African-American member of the Metropolitan Opera company. 1956 Mae Jemison born (astronaut, physician). Hundreds of women and men in Montgomery walked for miles to work rather than use the buses as part of the Montgomery Bus Boycott. A court ordered the University of Alabama to admit Autherine Juanita Lucy, who filed a lawsuit in 1952 (see above). She was admitted but was barred from dormitories and dining halls.  She enrolled on February 3 as a graduate student in library science, the first black student admitted to a white public school or university in Alabama. The university expelled her in March, claiming she had slandered the school, after riots broke out and the courts ordered the university to protect her. In 1988, the university annulled the expulsion and she returned to school, earning her M.A. degree in education in 1992. The school even named a clock tower for her, and featured her portrait in the student union honoring her initiative and courage. December 21: The Supreme Court ruled bus segregation in Montgomery, Alabama was unconstitutional. 1957 African-American students, advised by NAACP activist Daisy Bates, desegregated a Little Rock, Arkansas, school under the protection of military troops ordered in by the federal government. April 15: Evelyn Ashford was born (athlete, track and field; four Olympic gold medals, Track and Field Womens Hall of Fame). Althea Gibson became the first African-American tennis player to win at Wimbledon and the first African-American to win the U.S. Open. The Associated Press named Althea Gibson their Woman Athlete of the Year. 1958 August 16: Angela Bassett born (actress). 1959 March 11: Raisin in the Sun by Lorraine Hansberry became the first Broadway play written by an African-American woman - Sidney Poitier and Claudia McNeil starred. January 12: Motown Records founded in Detroit after Berry Gordy deferred working for Billy Davis and Gordys sisters Gwen and Anna at Anna Records; female stars from Motown included Diane Ross and the Supremes, Gladys Knight, Queen Latifah. December 21: Florence Griffith-Joyner born (athlete, track and field; first African-American to win four medals in one Olympics; sister-in-law of Jackie Joyner-Kersee).

Thursday, November 21, 2019

Rolex Essay Example | Topics and Well Written Essays - 250 words

Rolex - Essay Example were being charged on products like gold along with silver utilized for the cases he specialized in was making the costs rise beyond what he could afford. The company was then registered as the Rolex Watch Company which has remained its name since then. However, after the death of Hans’s wife in the year 1944, the founder created a foundation that would handle the entire shares his company owned. He made sure that all the company’s’ income would from then on be going to charity thereby making the company the private trust it still is today. This implies that the company’s shares are not also traded on the stock exchange (Fernande, 2011). According to Fernande, the company has recently been witnessing a decline in its sales along with profitability. The company currently has a debt expenditure of over 2.28 billion dollars but has attracted private capital investments to the tune of 1.5 billion dollars. The company in collaboration with the individual investors aims at producing motor vehicle parts like gearboxes, wheel hubs for the purpose of diversifying their revenue collection efforts. In the year 2010, the company reported a loss of 73.48 million dollars from their net sales that were worth 1530.0 million dollars. This again showed a loss of over 9 million dollars from their previous year’s net sales worth 2593.0 million dollars (2011). The company is currently battling the sale of fake Rolex watches which have adversely affected their sales along with profitability. The company has opened up branches across many nations in the world to help in the distribution of their products. The revenue collected is directed to charity work across many parts of the world (Fernande,

Wednesday, November 20, 2019

What factors affect the gender pay gap in the UK industries Literature review

What factors affect the gender pay gap in the UK industries - Literature review Example Recent statistics indicate that the percentage for GPG has increased exponentially in recent times as compared to the previous five years despite the measures taken to abate the differences. Women begin to experience these wage differences with their male counterparts in their first jobs and the gap continues to widen as the women continue to rise in their careers (Blau, Brinton, Grusky, 2009, pp. 121). This literature reviews examines the different factors that have resulted in such discrepancies in the labor force in the UK. The factors contributing to gender pay gap among women in full time employment can be grouped in to four main categories namely education, experience, occupation, and unexplained factors. Over the years, the number of women accessing higher education has been minimal as compared to the number of men. This has negatively affected both employment and wage rates for women because men often most men have higher educational qualifications. As a result, women need to have slightly superior degrees, for instance a masters or a doctorate degree in order to earn the same amount as their male counterparts with only a first degree (Chant, 2010, pp. 73). The government has taken several, measures to promote higher education for women in the country and the situation is likely to be remedied in the future. Another factor related to experience is professional experience. Women tend to have less professional experience as compared to their male counterparts in similar positions. Women’s professional experience is cut down due to various factors including duration spent on maternity leaves, or time taken off to take care of children. This has in turn affected the wages and salaries that women get in similar positions held by men. One other factor that contributes to the GPG is occupation. The society generally classifies various occupations as male or female professions. Most women would therefore be

Sunday, November 17, 2019

Network Design for the 2012 London Olympics Essay Example for Free

Network Design for the 2012 London Olympics Essay This report is a step by step analysis of the requirements planning and implementation of a network based on the infrastructure of an office environment. Throughout this report, the reader will see how the requirements planning is broken down into detailed sections to illustrate how each requirement has been identified for the stages of planning to implementation. In the first part of the report, we will be identifying what hardware is required for the scale of the network, taking into consideration a room for future expansion and devices to be added at a later date. The second part of the report will be the identification of software that will be needed to run all services on the network including set-up and configuration of the software. Network Planning Why is a network required? Before actually planning the set-up of a network, the use of a network has to be justified. There are many uses to a network, some of the basic uses are †¢ Sensitive information exchange – information is shared only between departments and/or specific users and not to other people, e. g. customer account information that contains bank information and/or other personal information. †¢ Internal digital mail requests and communication between departments in a business may be increased and messages can be saved for later use. †¢ Resource sharing – information updated constantly is shared from one location and is referenced by other departments and/or users within the same network, e. g. a database of customer details and orders for a company. †¢ File Backup Services – information is backed up or stored in a secure location in the event of future problems and to maintain records of information. There are other uses of networks as well but mainly they are used as a means of security. Within a company, when a network is utilised correctly, the flow of information across a network can be monitored and tracked back to the user. This is essential to ensure no information used within the company is accessed from an outside source or is used in an unlawful manner by a company employee. Scope of the network Since the network is being made for the London 2012 Olympics, we can assume that the network will be of large scale (roughly 500-2,000 users). This means that each service, such as email and DHCP services, will require its own dedicated hardware in order for the resources to be adequately shared without any network latency or slow access experience. If the network is used on a much smaller scale, then the services could run from using only a few pieces of dedicated hardware such as the domain and email services sharing hardware. A site survey should always be performed before installation a network to ensure that wireless signals can be transmitted throughout the building or buildings and to see how the network can be modelled based on the environment it is going to be installed in. Identifying Network Hardware In this section, we will identify different hardware and its uses on a network, how a network is connected and what devices are used to connect a network throughout a company building. Servers and Services There are many different types of services that can be hosted from a server on a network. Many of these services usually have their own dedicated hardware but depending on the scale of the network, the services can easily be bunched together on the same hardware to cut down on overall equipment usage. Domain Server The domain server is used to authenticate users and computers included on the network. It is considered the main access control to a network because it stores all user account information used in authentication. Email Server The email server is used to direct messages to the correct recipient once the message has been processed by the server. Many companies today use a private internal mail system as a way of faster communication within departments. File Server A file server is used to provide users access to information and data across the network. This helps reduce file duplication across different computers on the network. Permissions can be set for file access so that important documentation can be read but not written to or deleted. DNS Server A DNS server is a kind of server that translates DNS names into an I. P address that is used for communication on the internet. DHCP Server A DHCP server is used by hosts to retrieve I. P addresses and other information. Firewall Server A firewall server is used for monitoring the network for vulnerabilities and intrusions and detecting viruses in the event of an attack from the internet. Application Server An application server is used to host applications and make them a part of the network’s resources. The servers are commonly used to save on costs for multiple software licenses compared to a site license. Database Server A database server is used to host a database for access by users. These servers can be updated and viewed. These are commonly used in finance departments or companies that host customer records that needs to be accessed and amended constantly. Network Devices This section will better explain the other devices that make up a network such as the network equipment itself and other devices which can be considered essential to a networked environment. Modem A modem is used to connect an outside line (usually from an internet service provider) via telephone communication to the network enabling internet access or access to another site’s resources. Router A router is a device that forwards data packets between devices on a network and can manage which network node receives certain data rather than sending the same data to each node. Routers can also have their own firewalls. Switch A switch is used to connect segments of a network together. Switches are an important part of a network as they are used to connect multiple devices at once. These switches come in all shapes and sizes, ranging from a simple 2 port switch to a 48 port switch which fits into a server rack. Wireless Access Point The wireless access point is a device that adds wireless connectivity to your network. This type of network device is often used to connect portable devices such as laptops, PDA and Smartphones to the network. It is also used for wireless printers and installing hardware devices to computers where network cabling is not applicable. Network Printer Network printers are printers made available on the network as a resource so that many users can print from one location. This cuts down multiple hardware usage per computer which saves hardware costs and maintenance. Aside from users, all of these services and devices are what make up a network. Connecting your Network: Cabling and Access Points Now that we have outlined what services and devices make up a network, there is the matter of how a network will be connected. There are a few methods of connecting a network, each with its own pro’s and con’s. The standard method of connecting a network is via cable. Cable Connection Cable connection for a network is one of the most trusted methods of connecting users to resources. The reason for this being that wired connections were the first standard and constant communication to be used with computers. Wireless connection is still a fairly new method of communication and is therefore still changing. Types of Network Cables There are quite a few types of network cables that are used today in business, each suited for different purposes. Twisted Pair is a type of copper cabling that is used for telecommunications and most Ethernet networks. There are two types of twisted pair cabling. †¢ Unshielded twisted pair (UTP) – UTP cables have a range of 100 meters and rely solely on the cancellation effect produced by the twisted-wire pairs that limits signal degradation. †¢ Shielded twisted pair (STP) – STP cables reduce electrical noise from within the cable since each pair of wires is wrapped in metallic foil to better shield the wires from noise. Four pairs of wires are then wrapped in a metallic braid or foil. Coaxial cable is a copper-cored cable that is surrounded by heavy shielding. There are several types of coaxial cable. †¢ Thicknet or 10BASE5 – used in networks and operated at 10mbps, maximum length of 500 meters. †¢ Thinnet or 10BASE2 – used in networks and operated at 10mbps, maximum length of 185 meters. †¢ RG-59 – Most commonly used with cable television. †¢ RG-6 – Higher quality than RG-59, with more bandwidth and less susceptibility to interference. A fibre optic cable is either a glass or a plastic fibre that carries light along its length. Fibre optic cable can reach distances of several miles before the signal needs to be regenerated. Fibre optic is more expensive than copper cable and connectors are more expensive and harder to assemble than other connections. Wireless Connection Wireless technology is also a greatly utilised technology in business today even though the reliability of wireless connection does not compare to that of a cable connection. Security There are a few different ways to apply security in a network. Some security protocols may be placed during network design and some protocols when the network is running. Network security during the design During the designing of the network, avoid giving anyone outside the implementation team or network designer any information, such as work plans about the network design or the materials that will be used for the network, which will help Vandals infiltrate or use the network inappropriately. Basic security that should be present in a network 1. Firewall will offer a tougher barrier between the private network and the Internet. Firewalls will prevent unwanted users or hackers from accessing the network. 2. Proxy can be used to provide users a way to connect to the proxy server by requesting authentication from the security service during the exchange of files in the network. 3. Antivirus – is used to prevent viruses from penetrating the network and the computers connected to it. It also eliminates the counter-espionage potential within a network. Since there are many antivirus softwares available, the network has the freedom to choose the appropriate antivirus for the network. 4. Strong password encourages all network an   web users to use a password that contains letters, numbers and symbols so as to increase the difficulty of breaking or cracking the password and steal any information from the network. 5. Packaging – cables used to make sure no unauthorized person have access to data and change it. Disaster Planning and Recovery Before setting a network, the manager of the project requires designers and developers of the network to take into account unforeseen circumstances, such as natural disasters and hardware failure, to reduce their impact. Earthquakes, floods, fires and such disasters may be given a solution using the following points †¢ The proximity of cables to main electrical wirings must be significantly distant to avoid fire. †¢ As much as possible, servers must be placed outside the building. Extra security protocols must be applied to avoid losing information. †¢ If a building has multiple servers, it is advised that all servers be placed on an isolated location and away from public gathering places. This will require the development of additional security precautions. †¢ Different types of cables should be considered in setting up a network to maximize its us †¢ Do not put cables near bodies of water or water discharge sa this may damage the cables †¢ Provide rooms with electric generators in case a power outage occurs. Make sure that these rooms are close to their central control devices to avoid technical problems in connecting the machines to the generator. †¢ Provide fire-preventing equipment such as fire extinguishers near the whereabouts of control systems †¢ Provide water and fire alarms to inform personnel if water or fire gets near the data storage devices †¢ The network team should provide a spare or backup server to perform full back up planning after disaster With the increase in number of intrusions and attacks on networks trying to take data and information, a way of protecting these data should be prioritized in a network. Since the data are, most of the time, secret and important to companies, detection and control of intrusions must be strictly implemented. Through the latest presentations that we have done in class, we have learned new techniques and OSI Models that should be taken into account to provide the highest standards of security and quality. Some of these techniques are firewalls, proxies, encryptions, IP security, data authenticity, communications type and satellites.

Friday, November 15, 2019

Present and Discuss the Views submitted by Socrates and Thrasymachius i

In the first book of the Republic Socrates and Thrasymachus argue about the nature of justice. Thrasymachus claims that justice is the advantage of the stronger. He also claims that Socrates’ arguments against that position stem from a naive set of beliefs about the real intentions of rulers, and an uncritical approach to the way words acquire their meaning. Present the arguments on both sides. Who do you think is right? Justify your position. In the first book of the Republic Plato orchestrates a dialogue between his teacher Socrates and one of his peers Thrasymachus in order to demonstrate the desirable nature of justice. In this essay I shall present Thrasymachus argument that justice is a tool of oppression wielded by the strong over the weak, whereas injustice provides a happy and fulfilled existence, and Socrates notion that justice is a desirable commodity and characteristic that benefits all individuals and is the only way to achieve any common goal. I believe that both philosophers have elements of truth in their arguments, however in the essay I intend to show that it is not possible to agree entirely with either party because of the underlying premise of their argument. I shall demonstrate that neither party has a correct view because they base their arguments on examples whose essence is incompatible with the concept of justice, and refute their claims due to the obvious fallacy of arguing two extremes when con sidering human nature. In the first book of the Republic, Thrasymachus states that justice is not desirable. He describes human behaviour as fundamentally self-interested, and states that justice is ‘an advantage of the stronger’ employed to suppress ‘the weaker’ . He submits the view that injustice is therefore preferable in relation to politics and to common living. Thrasymachus postulates that it is right and just to obey the rules of the state created by the ruling power, but that the ruling power will be making rules that benefit themselves. He supports his claim that the ruling power capitalise upon the weaker party by drawing a parallel between the profession of government and the profession of sheep herding: ‘The shepherd and the herdsman study the good of their flock and herds (for) the good of their masters and themselves’ . He considers that rulers rule with the objective of procuring some profit from them. On a basic level ... ... is in favour of ‘the weaker party’ and is a position of strength that provides a more fulfilling life. However, both arguments attempt to provide an explanation for the nature of justice without defining it and base their arguments on tangible concepts such as crafts and professions in order to give weight to their beliefs. Without a definition of the subject we cannot make a concrete comparison as it is unrealistic to try to prove that the nature of justice is the same as the nature of medicine. In addition, both arguments endeavour to confine human nature to extremes, just and unjust, knowledgeable and ignorant, and good and bad, without acknowledging the depth of the human experience and intermediate levels that we have. The conclusions of these arguments are incongruous with human nature and when we speak of justice, we are trying to define a concept that has distinct links with human nature. Therefore, I cannot say that either of the positions is ‘rightâ €™ as neither acknowledge my nature and have attempted to justify that justice is a commodity to desire or expel without explicating justice itself. Word Count: 2120 Bibliography Plato, The Republic, (Penguin Books, 2003)

Tuesday, November 12, 2019

Academic Objectives Essay

By the time I attend the graduation ceremony of University of Phoenix, there are three academic objectives I would like to accomplish. First and foremost, I would like to get a bachelor’s degree in psychology. Secondly, I would like to become a better writer. Last, I would like to become a better communicator so that I can network with people who are in the same career and field of work as me. With lots of dedication, hard work and completion of my classes, these are three goals I intend to complete. Receiving a bachelor’s degree in psychology from the University of Phoenix is my first academic objective. I get one step closer to my goal by attending all my classes, completing my assignments with a passing grade, and doing the best at passing all my exams. Today, having a bachelor’s degree is like having a high school diploma. Most jobs require or prefer some type of degree from a person when hiring. Like Achieve said, â€Å"Much has been said about the importance of increasing the labor supply for ‘middle skills jobs,’ or those jobs that now (compared to decades past) require more than a high school education but less than a bachelor’s degree (e. g., associate degree, postsecondary certificate, apprenticeship, etc. )† (Achieve, 2012) I recently applied for a job as a personal therapist to children with disabilities. When it came down to the interviewing and hiring portion, I was not able to get the job because I still have not received my bachelor’s degree. It was tough hearing the news but it really motivated and pushed me to go back to school and finish my degree. A bachelor’s degree has now become a necessity rather than a choice for me. Becoming a better writer would not only help in school but also in the world after graduation. Beginning with the Gen 200 class, one main focus there is writing. Whether it is writing a paper or doing a project, it is important to know where a person is making mistakes and where he or she is doing a good job. I find myself having to refresh my memory with all the writing rules and regulations. I have to go back to what I learned in high school and in the college courses to remember what I need to know when it comes to writing. Having the proper knowledge of what a perfect paper looks like will be as important in school as it will be in the real world. If a person is required to submit a report for work, he or she wants to be fully prepared so he or she does not look like a fool to the boss and coworkers. Good writers do not just happen. Good writers work hard at becoming who they are and are not afraid to ask questions. Never being afraid to ask questions or ask for help will make me a better writer and a better student. Constantly finding myself writing papers and doing assignments that involve writing will help me achieve my second academic goal of becoming a better writer. Communication and networking are really important in a career life. The better of a communicator and net worker a person is, the better chances the person will have to escalate. In school one gets graded partly on how well he or she communicate in class, whether he or she talks, participate or just stay quiet and not say anything. But in the real world, one does not get graded on how good he or she communicates. One gets ascended or promoted if he or she is a good communicator and are not shy to speak up when needed. According to the journal The Importance of Communication, â€Å"There is a sheer necessity for personal effectiveness that stems from effective communication. Time and again researchers have reinforced the importance of communication and its impact at the workplace. † (Radhaswamy & Zia, 2011) If one is always being open and communicative, then networking should not be a problem. I want to not only be a good communicator and net worker, I also want to be a good listener to be able to get places and become someone. In order to fulfill my academic objectives, I need a plan to incorporate effective strategies for success as a student. How am I going to accomplish my goals and get them done? By me attending my classes and passing them, I get one step closer to receiving my bachelor’s degree. I need to push myself to do my best in all the assignments and test so I can pass all my courses. Each class requires students to complete papers and assignments that need to be written. With that in mind, I will be able to perfect my writing skills. I have to remember to proofread all my papers and really strive for the best. To become a better communicator and net worker, I need to put myself out there so other can get to know me. I need to find a mentor that is in the same career field as I am, so that that person can not only guide me but also help me when I need it. Nothing will get done I am willing to fully commit in achieving my academic objectives. The three academic objectives I would like to accomplish by graduation are not just to be a good student but also to set myself for greater things in life. Getting my bachelor’s degree, becoming a better writer and a better communicator/net worker are very important to me. With those three academic objectives, I will become a better employee, person and student. They are three essential things that any person can use in their lives to get further in their careers. I know with the motivation, want to succeed, and push from those around me, I can accomplish my three academic goals from here to graduation day. References Achieve, I. C. (2012). The Future of the U. S Workforce: Middle Skills Jobs and the Growing Importance of Postsecondary Education. Achieve, Inc. Radhaswamy, P. , & Zia, A. (2011). The Importance of Communication. IUP Journal Of Soft Skills, 5(4), 52-56.