.

Wednesday, July 31, 2019

Essay on Black Boy

Black Boy Richard Wright wrote Black Boy which is a biography about his life in the south. He was born September 4th 1908 in Mississippi. He was raised in the turbulent times in the south where race relations were very tense. He has written several books besides Black Boy, such as Uncle Tom’s Children, Native Son, and The Outsider. Black Boy was published in 1945 and was received with open arms from the black community but however it saw a great opposition in the south.They believed that it portrayed a false representation and it was nothing but a book for slander. There was then an attempt to have it banned for social reasons. It was not only because of the negative aspect of the south but also to try and squander the literary advancement of a black person. This book is an autobiography of Richard Wright explaining the injustices and social stigmas that he had to go through as a child and young man.His frustrations with his living conditions eventually erupt so much he escape s to the north after saving his money and living frugally. This book also shows how terrible the treatment of blacks were at that time. The jobs they were allowed to maintain, their living conditions, and especially the suppression of them intellectually is a huge theme that is strung throughout the book. I believe that this book should be available to everyone that will gain something beneficial from it.By that I mean this book isn’t suitable for young children not only because some of the things said are vulgar and violent but it wouldn’t give them a message that they would understand. It would only confuse them and expose them to words that they would abuse without knowing the true meaning or context. In the issue of banning from the public I don’t agree with that at all. Just because people in power don’t enjoy having their dirty laundry out in the public isn’t a legitimate reason for a book to be banned from the public.

Tuesday, July 30, 2019

Family Essay

In a world of varying cultures and values for the elderly, there exists a principal notion about elderly homes that have spurred today. Oftentimes than not, the notion about elderly homes are of the negative and this stems from the fact that the elderly homes serve as a constant reminder about something that most people fear—death and old age (Dickinson and Vasen, 2006). However, according to Dickinson and Vasen, there is a positive side to the elderly homes that most people do not see (2006). One of these may be attributed to the view that the elderly homes can be considered as a family in itself. In this family, there are parts that comprise the whole, cooperation is existent, and there are groups formed within the family as will be expounded in the body. The elderly homes are composed of several members that comprise the family. First, we have the group of nursing aides who cares for the elderly and they are the lifeblood of the family. Without the nursing aides, the elderly home will be like a tree without its roots. This is the group that serves the purpose of nurturing and giving utmost care and attention needed by the elderly living inside. Second, we have the group of elder persons who serves as the air that the elderly home breathes. They are the purpose why the home exists and without them, there should not have been an elderly home in the first place. Moreover, they are the center of attention in the home because of their decreased strength and special needs that have to be attended to. They are also at the center of activities in the elderly home such as in Christmas parties, gatherings, and others. Third, we have the administration that runs the elderly home. They manage the day-to-day affairs of the elderly home especially with regards to routine maintenance and those functions not covered by the nursing aides. Although they serve the elderly indirectly, they still form a vital role because they are the ones responsible for the proper functioning of the elderly home. Moreover, the administration is considered as the support system of the whole. In conclusion, it can be said that each is a part of the whole and each plays a role that whose purpose is to contribute to the family to which they are a member of. Moreover, there are relationships that are formed between these groups that form the bond between them as a family. It is all up to the members of this family to determine what type of family they would be. But certainly, it is not a negative one as most people tend to see them. Instead, it is a harmonious and vital institution of the society.

Monday, July 29, 2019

Two papers Assignment Example | Topics and Well Written Essays - 500 words

Two papers - Assignment Example Discrimination can be overcome by encouraging diversity and making it an unacceptable action. It should be discouraged in all interactions and instead promote cultural diversity as a better alternative to interact with others. 2. What are the potential challenges posed by differences in nonverbal communication when communicating across cultures or communicating interracially? Provide two examples of specific types of nonverbal communication and describe the challenges they pose. What potential solutions can you suggest for overcoming these challenges? One of the major challenges posed by differences in nonverbal communication when communicating across cultures is miscommunication. A certain action, body language or sign may be construed as something else by the recipient thereby resulting in misunderstanding. People must be aware of this differences to avoid any miscommunication. Non-verbal communication is very important in communication process because they comprise majority of the message. In a study by Zhijing Chen (2009), she reported that one of the findings of a study in communication conducted in the United States, 93 percent messages were transmitted through nonverbal behaviours while only 7% were transmitted through the explicit verbal language. This means that nonverbal communication is very important in communicating across cultures. Two classic examples is the V sign where the two fingers are protruded with the face palm out signifying peace or victory in the US and other cultures such as Philippines. The V sign however is taken differently in Indonesia where it just meant number two. Another glaring example is the pointing of finger where one will use his index finger to point at people or objects. This is harmless in the US and is used to identify people or objects. In Asia however, this could mean trouble because

Sunday, July 28, 2019

Reflection Paper on Group Cases Essay Example | Topics and Well Written Essays - 500 words

Reflection Paper on Group Cases - Essay Example usiness practice to be operating without having a primary infrastructure as well as use of only a particular system to take care of all other necessary elements. Any company worth its salt should be equipped with an enterprise resource planning system (ERP) to ensure that its operations are carried out smoothly. This is because, without such an effective management system, a company’s business may be unable to coordinate its work across all functions, something that may lead to serious losses, even collapse of the business. The VTB case clearly illustrates this phenomenon and the company was in a terrible rush to make sure that it has its house in order just before peak seasons such as Christmas, Valentine’s Day as well as Mother’s Day. Secondly, I have learnt that it is good to always have a single centralised command from where an application can be run to manage the business functions.VTB for instance had a lot of complicated middleware as well as incompatible applications which did not provide the company with any benefits at all. Investment into a robust IT system therefore brings with it several benefits such as seamless working by eliminating lack of standard operating procedures, facilitating transfer and maintenance of information as well as allowing for strategic development of a firm’s information system. Information system therefore can be used as a tool for competitive advantage and can strategically be used to add value to a firm’s customer service by maximising the efficiency of the supply chain as well as solving operational constraints. The second case was that of IT outsourcing gone wrong. Clean & Cure, a multinational company had engaged the services of XperTrans; a provider of human resource outsourcing (HRO) to provide its services all over the world in 44 countries. However, this was never to be, and XperTrans encountered so many problems and finally had to engage a consultancy firm to bail them out. This is a case that really

Saturday, July 27, 2019

A GAINST THE ODDS Movie Review Example | Topics and Well Written Essays - 250 words

A GAINST THE ODDS - Movie Review Example The NAACP plus the Urban League began the task of educating African-American in the performing and visual arts so as to respond to the racial stereotype of African-American in the 20s. Against the Odds: the Harlem Renaissance was both an art society and a compound political awakening to change. African-American historians narrate the efforts African-American political leaders made in order to convert Americas belief of the black populace from negative to positive. For instance, David Levering Lewis, the writer of When Harlem Was in Vogue, clarifies that the Harlem Renaissance was not on the subject of aesthetics, but it wanted to improve the lives of the African-Americans (Edwards 1). In conclusion, this film explores the rich and complex account of the Harlem Renaissance. Its production quality is brilliant. Lighting and sound in every scene is steady. Against the Odds: the Artists of the Harlem Renaissance, finally, would be an excellent addition to public and school library

Friday, July 26, 2019

Changes in Social Lending Essay Example | Topics and Well Written Essays - 250 words

Changes in Social Lending - Essay Example dit permits very underprivileged people to insert themselves into projects that are focused on self-employment— with a view of generating some income. Yunus provides loans through his controversial bank, Grameen Bank—which makes him a pioneering single leader. Grameen Bank based in Bangladesh lends money through solitary groups. The bank’s approaches targets solitary groups as its prime building block. Further, the use of this technique has clearly had a significantly positive effect upon many prospective borrowers. Without Grameen, the financially handicapped wouldn’t have dared borrowing at all. I mean, to many of them, borrowing would figuratively be building castles in the air. Be that as it may, the determination to warranty that all members of solidarity groups are equally poor is inconsistent, and may not always improve the group performance at all. In all, microcredit is mere bunkum—in fact; it won’t succeed without the help of immense grants. In all, this is a reality that dents on the development of this approach. Conversely, this approach lacks clear lucidity. Glancing at it through perspectives, the overall effect of this development approach has not been to reduce poverty, but only to produce a debt gridlock for gullible borrowers—who are incredulously subjected to particularly supercilious rates of interests practical to conventional banks . It is no surprise at all that Yunus used the infused poverty in his country profitably to gain international attention. This approach of bottom of the pyramid has no capability of finally leading to long-term development, because many poor people will feel that they are being defrauded through the obviously feasible

Price Strategie of Ford Fusion Hybrid Research Paper

Price Strategie of Ford Fusion Hybrid - Research Paper Example The present research has identified that Ford has launched Ford Focus Hybrid car keeping in mind the continual rise in the price of gas and the overt health conscious that global society has become. This situation is ideal since people are looking for such hybrid cars and carmakers are ready to grab the opportunity to improve their financial health. Toyota has already launched a few hybrid cars and has captured a majority portion of the market. Ford, as a result, has to keep the price of its hybrid fusion in such a way that it can meet its objectives. It is found that the price of Ford hybrid Fusion is set at just over $27000 which is almost $3000 more than its Toyota counterpart. Hence, it can be said that the main objective of such pricing is to gain as much profit as possible; in other words, this pricing strategy of Ford is profit oriented. Flexibility is an important element in the overall pricing strategy. Flexibility is provided in terms of discounts, customization, and negoti ation. Like any other cars of Ford, a customer can place their customized order on the company’s website. Prices are set on the basis of specifications of the customers. Discounts are given to promote the car to some special customers. However, rebates or discounts vary with region. Consumers have little power to negotiate regarding the price of the product. Only customers i.e. dealers have the power to bargain with the manufacturer. Pricing strategies vary with the different stages in the product lifecycle. Usually, there are four different stages in the life cycle of a product. These are introduction, growth, maturity, and decline. Ford Hybrid Fusion is at its growth stage where its demand is found to be increasing continuously as consumers are looking for more and more fuel-efficient car. In other words, sales growth is rapid at this stage.

Thursday, July 25, 2019

Analysis of Learning Weekly at University of Phoenix Essay - 1

Analysis of Learning Weekly at University of Phoenix - Essay Example Class discussions were very helpful and interesting. Communication is an important aspect of any academic work. Once a piece of academic work is complete, it should be communicated to relevant persons through means such as presentation. I learned how to prepare for a presentation and how the same can be presented to various stakeholders using platforms such as cell phones, text messaging, and e-mail. Understanding the concept of the presentation will enable me to present my research as well as academic work through online or digital platforms supported by our mode of online learning. As a professional, I will be in a good position to do research and present my findings using available web communication platforms. Communication in the digital age was very interesting to learn. Cell phones, text messaging, and e-mail has certainly changed the role of formal writing since they are increasingly becoming preferred methods of communication. However, formal writing ensures that communication standards are maintained so that it remains relevant to all the stakeholders  involved.

Wednesday, July 24, 2019

One variety of Shamanism Essay Example | Topics and Well Written Essays - 1250 words

One variety of Shamanism - Essay Example These are the needs, which paved the way for Shamans and Shamanism. Since the earliest Homo sapiens, hundreds of cultures around the world have developed different varieties of Shamanistic traditions which have fascinated generations of scholars and researchers. The traces of shamanism can be found in every continent. Some of the varieties of Shamanism are the Celtic Shamanism, Vedic Shamanism, Siberian Shamanism, Mongolian Shamanism, Tibetan Shamanism, Chinese Shamanism etc. what is common to all these manifestations of Shamanism is the healing of the body, mind and soul - a kind of purification. The study of these aboriginal traditions broadens our understanding of Shamanism as a whole. The evidence of the fact that Shamanism is an age-old tradition can be found in ancient literary texts such as The Rig Vedas. Vedic Shamanism, which flourished in the East and Central Asia is very similar to the other Shamanistic traditions, and believed in an animating principle that permeates through all things and all beings. That unseen essence of being is called the soul. The Shamans used roots and barks and produced a rattle sound while healing. It is believed that the Shamans made the rock paintings of Bhimbetaka in India. The meditative tradition in Asia that advocates Yoga is an offshoot of the Vedic Shamanism. Yoga attempts to set the mind in a thoughtless zone. This meditative tradition explores the ancient wisdom that an unseen energy flows through all beings and is connected directly to the quality of life. By trapping that life force, physical, emotional and spiritual well-being can be ensured. Although the process is spiritual in nature, it is not confined to any religion. The Yoga masters suggest that it is necessary to have a clear perception of the Self. Unless one recognizes the inherent energy, the pilgrim's progress towards eternity will be obstructed. How does one come to become a Shaman According to Robert M. Huff, a Shaman "may have received" his "calling to become a shaman as a result of a near-death experience in which" he was "carried into the spirit world and met teachers who helped them to learn healing songs, medicines, and revelations about the future. A shaman may also be born into the role, or be trained for it after demonstrating some special aptitude for healing." Every generation expects someone to take on the role of the shaman. The Roles of a Shaman: Michael Harner tells us that 'Shaman' is a Tungis word which originated in Siberia. It means one who can see with eyes closed or in the dark. The Shaman can be either a man or a woman. The chief role that the Shaman plays is that of a healer, as he knows the pragmatic techniques of diagnosis. Another important role of the Shaman is dealing with the spirits, because he is the one who can retrieve lost souls and banish the intruding souls. Davidson, in his book Gods and Myths of Northern Europe, writes, "The shaman acts as intermediary between the world of men and the gods, and has the power to descend into the realms of the dead. His spirit is believed to journey forth from his body, which remains in a state of trance. Sometime the long journey which it takes is described by him in a chant." (118). A significant role of the shaman, according to

Tuesday, July 23, 2019

The Acquisition of Walls With Polka and the Acquisition of Adobe With Research Paper

The Acquisition of Walls With Polka and the Acquisition of Adobe With Macromedia - Research Paper Example Acquisition is the purchase of one company by another company. For successful acquisition deal, company should take enough data about the market position and market performance of acquiring company. Because of not collecting enough data, 50% of acquisition deals are unsuccessful. Here we represent the two examples of successful acquisition deals. Acquisition of Wall’s with Polka In 1993, the administration of Lever Brothers formulated a team to search for business potential of Ice Cream in Pakistan. This team went back with the result that there is a lot of potential of Ice Cream business in Pakistan. So they decided to launch Wall’s ice cream in Pakistan. Wall’s is the biggest ice cream manufacturers in the world and second to it is Nestle. The administration of Wall’s wanted to enter in the market through acquisition strategy. They wanted to acquire Polka which was the established local brand and was representing the only national ice cream business in P akistan. They wanted to save time by acquiring Polka which was needed to capture the market. In 1994 Lever Brothers tried to acquire Polka ice cream for US$ 600 million but Polka refused the bid and they demand one billion rupees. But Wall’s established an ice cream factory in eleven months and did not acquire Polka (LePage, 2007). In February 1995, Wall’s launched with twelve products. After the launching they gave tremendous services and Polka loosed its market share. At this time Polka approached Wall’s to sell itself but now Wall’s had done all the hard work which they did not initially want to do by acquiring Polka. The administration of Polka spread a rumor that Nestle is coming through Polka which Wall’s did not want because Nestle is the biggest competitor of Wall’s. So Wall’s purchased Polka in 1997. The Strengths of the acquisition of Wall’s with Polka. After the acquisition they are working together for many years. O n Polka packaging there is a brand mark of Wall’s ice cream. The acquisition of Wall’s with Polka enhances the resource strengths and competitive capabilities of these companies in this way. 1. This acquisition made Wall’s the unchallenged leader and now the sale of Wall’s 85% and all other brands like Yummy, Hico and Igloo have sale with single digit. Omore is another emerging brand but its sale cannot compete Walls. 2. The Wall’s emerged as â€Å"Impulse Brand† 3. Unilever is also the most reliable brand in the country and through this acquisition Polka also saves itself from the tough competition and also realize that it was facing loss in market share before the acquisition 4. If Nestle was approached Polka then it would become biggest threat for Wall’s as Polka was the only local brand and also most familiar brand for the people of country. The Wall’s save itself from tough competition through acquisition. Acquisition of A dobe with Macromedia Adobe Systems Incorporated is an American multinational computer software company and it was founded in 1982 by John Warnock (Adobe’, 2012). The company has focused upon the creation of multimedia and creativity software products. In 2005, Adobe acquired its former competitor Macromedia.

Monday, July 22, 2019

The Birthday Party Essay Example for Free

The Birthday Party Essay Theatrical features of the birthday party The birthday party considered as one of the greatest Pinter’s work which reflect his own rules and features of his own drama. Perhaps Pinter is very different from other absurdist writers as the Irish Samuel Becket and Inesco.but in anyhow I can assume that the theatre of the absurd as called by Martin Essllin has witnessed some other themes and set of ideas that makes it relevant .This is partly as a results of Pinter’s style of writing ; he does not preach lecture or categorical statement , but instead present his audience with incident ,characters ,language that suggest that something of great significance is taking place ,without ever being specific about what is it . So that the birthday party is an exploratory work that stimulate the audience into a wide range of topic , and perhaps the most vital thing to remember it is at one and the same time a play about the status of the artist in society , and how people fail to communicate, and about people need for security . Language is a tool to articulate and express opinions, but in the birthday party people used language in other aims. we have the undesirability of communication characters do not want to talk with each other they use language as an escape from truth we do not know whether the word they said are true or false and that is related to lack of verification and unverifiability which is between truth and falsehood cannot be detected. In the opening of the play we have a talkative woman that speaks a lot with her husband in an absurd manner communicating things with no real value. Pinter suggesting that people are too frightened of real communication to use language for this purpose, because real communication may reveal other weakness and deficiencies thus much language in the play is an attempt to cover up and evade the truth. Goldberg’s memories of youth as an example used in order to remove from Goldberg the obligation or need to talk about what is happening now. So the whole theme in the birthday could be summed up by saying that in the birthday party people are shown as being either unable or unwilling to convey accurately their feeling and thoughts to other people. Also in this play we have a struggle or a paradoxical situation between individuality presented by Stanly that presented as an artist in society. in this interpretation in which Stanly represent the man with creative talent who defies the conventions of society by his mode of living as someone who  refuses the traditional way of thinking and the values of society , and by refusing to accept it , and insist remains outside .therefore the character of Stanly considered as a menace to the system of society he may encourage other people to revolt against it. If this could happen people doesn’t do what society demand from them it mean the collapse and a total distraction of society as a whole . therefore Stanly has to be drawn back in order to obey to the rules and being conformist by force if necessary .and the second part the two conformist man Goldberg and McCann whom considered as symbol that shattered the illusion of security of Stanly .that least one is an artist means freedom of artistic expression furthermore Stanly appears at end of the play in dark suit and white collar , shaven and unable to articulate or express himself this notions means Stanly start to fit in society . he has been made respectable, from this it is easy to argue that this is what society demands of its members an unthinking obedience and lack of any individuality . All Pinter’s play has the same scenario that have in the middle of it an unknown menace that come from the outside world. The first play was the room wirriten in 1957 that contains that idea of outsiders force. In the Birthday party the room have also a great significance that made by Harold Pinter, it means the security for Stanly also as a womb of a mother , somewhere warm secure for its inhabitants . This significance of the room is related to the isolation of Stanly as an individual member. But this security is shattered by outsiders’ forces which considered as metaphysical that comes from outside the room and show that this security is unrealistic, a vain of hope. We can say that outsider menace is the result of being strange and not like the majority of society. Stanly as an example he isolate himself from others and that what considered as a threat to the government. Finally we can assume that the play of the birthday party is an illustration of the state of modern man in the historical context after the second world war. I suggest that it main purpose is to describe the modern man who was influenced by the wars and violence he is lost and this feeling of lost is clearly shown in the play when Pinter used darkness in his play and this action made the reader and audience lost too. Obviously that theme of obscurity is also applied at level of communication and use of  language when people fail to express their real emotion and opinion. There is an undesirability of communication people are frightened to tell other what they feel rather they keep silence and this use of pause by the writer is deliberately in a manner to show the audience that not everything we communicate is in purpose, but the truth is what isn’t as Pinter said : I think we communicate only too well in our silence, in what is unsaid. Also in this play we have the use of la nguage as a weapon to distract and make other obey to other’s willing and that is a part of the menace which comes from the outside of the secure room .

How To Secure Routers And Switches Information Technology Essay

How To Secure Routers And Switches Information Technology Essay You have been approached by your manager give a talk on the Network security standard ISO 17799. Write a short precise detailing the purpose of this document and the main components within parts 1 and 2 of the document. (http://www.17799central.com/iso17799.htm) Write a brief analysis detailing the possible threats and consequences for a company that does not have an adequate Security Policy. Write a summary of how an Edge router can be configured into a firewall; include detail of how it can be used to filter traffic. Describe the operation of CBAC Detail the encryption techniques that are used in VPN systems and explain how/when they are used. Describe how you can secure/harden routers and switches Router hardening, password requirements, ssh, parser views, etc Port security, vlan hopping, anti-snooping, private vlans Multi-choice Review Questions 1. In which type of attack does the potential intruder attempt to discover and map out systems, services, and vulnerabilities? stake out reconnaissance tapping sniffing 2. Which type of attack prevents a user from accessing the targeted file server? Reconnaissance attack Denial of service attack Prevention of entry attack Disruption of structure attack 3. Which type of action does the ping sweep pose to an organization? eavesdropping reconnaissance denial of service unauthorized access 4. An employee of ABC Company receives an e-mail from a co-worker with an attachment. The employee opens the attachment and receives a call from the network administrator a few minutes later, stating that the employees machine has been attacked and is sending SMTP messages. Which category of attack is this? B) denial of service trojan horse port scanning password attack social engineering 5. What is a major characteristic of a Worm? D) malicious software that copies itself into other executable programs tricks users into running the infected software a set of computer instructions that lies dormant until triggered by a specific event exploits vulnerabilities with the intent of propagating itself across a network 6. A large investment firm has been attacked by a worm. In which order should the network support team perform the steps to mitigate the attack? A) A. inoculation B. treatment C. containment D. quarantine C,A,D,B A,B,C,D A,C,B,D D,A,C,B C,B,A,D 7. At XYZ Company, the policy for network use requires that employees log in to a Windows domain controller when they power on their work computers. Although XYZ does not implement all possible security measures, outgoing traffic is filtered using a firewall. Which security model is the company using? D) open access closed access hybrid access Restrictive access 8. Which three of these are common causes of persistent vulnerabilities in networks? (Choose three.) new exploits in existing software misconfigured hardware or software poor network design changes in the TCP/IP protocol changes in the core routers on the Internet end-user carelessness 9. A new network administrator is assigned the task of conducting a risk assessment of the companys network. The administrator immediately conducts a vulnerability assessment. Which important task should the administrator have completed first? threat identification security level application patch and update deployment asset identification perimeter security upgrade 10. A company deployed a web server on the company DMZ to provide external web services. While reviewing firewall log files, the administrator discovered that a connection was made to the internal e-mail server from the web server in DMZ. After reviewing the e-mail server logs, the administrator discovered that an unauthorized account was created. What type of attack was successfully carried out? phishing port redirection trust exploitation man-in-the-middle 11. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring? reconnaissance access DoS worms, viruses, and Trojan horses 12. Which two are examples of Distributed Denial of Service attacks? (Choose two.) B) D) SYN Flood Stacheldraht Ping of Death Smurf WinNuke Targa.c 13. Which two of these are examples of DDoS network attacks? (Choose two.) A) B) smurf attack Tribal Flood Network (TFN) teardrop.c man-in-the-middle attack port redirection social engineering 14. Which two are technological weaknesses that can lead to a breach in an organizations security? (Choose two.) C) D) software compatibility weakness DHCP security weakness TCP/IP protocol weakness operating system weakness LDAP weakness 15. What is the effect of applying this command to a Cisco router? E) router(config)# no service finger UNIX commands are disabled on the router. All TCP/IP services are disabled. PING usage is disabled. Users logged into the router remotely will not be able to see if other users are logged into the router 16. A partial router configuration is shown in the graphic. The network administrator adds the following command at the router prompt. router(config)# security passwords min-length 10 Which of the following is correct? A) The current password will continue to be used as a valid password until changed. No password is required. The current password is invalid and will not allow a login. A password that is at least ten characters long must immediately be implemented for a successful login. 17. The Security Wheel promotes a continuous process to retest and reapply updated security measures. What is the core or à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¦Ã¢â‚¬Å"hubà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ã‚  component of the Security Wheel? D) testing policy monitor improve security policy 18. After providing for all operational requirements of the network, the network support team has determined that the servers should be hardened against security threats so that the network can operate at full potential. At which stage of the network life cycle does server hardening occur? E) planning design implementation operation optimization 19. A network administrator installs a new stateful firewall. Which type of security solution is this? secure connectivity threat defense policy enforcement trust and identity authentication 20. XYZ Company recently adopted software for installation on critical servers that will detect malicious attacks as they occur. In addition, the software will stop the execution of the attacks and send an alarm to the network administrator. Which technology does this software utilize? host-based intrusion detection host-based intrusion protection host-based intrusion prevention host-based intrusion notification 21. A security team is charged with hardening network devices. What must be accomplished first before deciding how to configure security on any device? Audit all relevant network devices. Document all router configurations. Create or update security policies. Complete a vulnerability assessment. 22. Which two objectives must a security policy accomplish? (Choose two.) provide a checklist for the installation of secure servers describe how the firewall must be configured document the resources to be protected identify the security objectives of the organization identify the specific tasks involved in hardening a router 23. Which router command will result in the router only accepting passwords of 16 characters or more? service password-encryption enable secret min-length 16 security passwords min-length 16 security passwords max-length 16 24. Which command will encrypt all passwords in the router configuration file? D) enable secret password encrypt all enable password-encryption service password-encryption no clear-text password 25. MD5 can be used for authenticating routing protocol updates for which three protocols? (Choose three.) B), D) E) RIPv1 RIPv2 IGRP EIGRP BGP 26. Which configuration will allow an administrator to access the console port using a password of password? B) router(config)# line aux 0 router(config-line)# login router(config-line)# password password router(config)# line console 0 router(config-line)# login router(config-line)# password password router(config)# line console 0 router(config-line)# password password router(config)# line console 0 router(config-line)# access router(config-line)# password password router(config)# line vty 0 router(config-line)# password password router(config)# line vty 0 router(config-line)# access router(config-line)# password password 27. Which command sets the inactivity timer, for a particular line or group of lines, to four minutes and fifteen seconds? E router(config)# line-timeout 4 15 router(config-line)# line-timeout 4 15 router(config-line)# exec-timeout 255 router(config-line)# timeout 255 router(config-line)# exec-timeout 4 15 router(config-line)# line-timeout 255 28. Which encryption type uses the MD5 hash algorithm? Type 0 Type 1 Type 5 Type 7 29. Which privilege level has the most access to the Cisco IOS? level 0 level 1 level 7 level 15 level 16 level 20 30. Which algorithm implements stateful connection control through the PIX Security Appliance? Network Address Translation Algorithm Access Control Security Algorithm Adaptive Security Algorithm Spanning Tree Protocol Algorithm 31. The Cisco Security Device Manager (SDM) allows administrators to securely configure supported routers by using which security protocol in Microsoft Internet Explorer? B) IPSec SSL SSH L2TP PPTP 32. A network administrator has received a Cisco PIX Security Appliance from another division within the company. The existing configuration has IP addresses that will cause problems on the network. What command sequence will successfully clear all the existing IP addresses and configure a new IP address on ethernet0? B) pix1(config)# clear ip all pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 pix1(config)# clear ip pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 255.255.255.0 pix1(config)# no ip address pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 255.255.255.0 pix1(config)# clear ip pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 0.0.0.255 33. A network team is configuring a Cisco PIX Security Appliance for NAT so that local addresses are translated. The team is creating a global address pool using a subnet of network 192.168.5.0 with a 27-bit mask. What is the proper syntax to set up this global address pool? B) pix1(config)# global (inside) 1 192.168.5.33-192.168.5.62 pix1(config)# global (outside) 1 192.168.5.33-192.168.5.62 pix1(config)# global (inside) 1 192.168.5.65-192.168.5.95 pix1(config)# global (outside) 1 192.168.5.65-192.168.5.95 pix1(config)# global (inside) 1 192.168.5.64-192.168.5.127 pix1(config)# global (outside) 1 192.168.5.65-192.168.5.127 34. A network administrator has configured an access control list on the Cisco PIX Security Appliance that allows inside hosts to ping outside hosts for troubleshooting. Which debug command can be used to troubleshoot if pings between hosts are not successful? debug icmp inside outside debug ping debug icmp trace debug trace icmp 35. Which protocol provides time synchronization? STP TSP NTP SMTP L2TP 36. Which command would configure a PIX Security Appliance to send syslog messages from its inside interface to a syslog server with the IP address of 10.0.0.3? D pixfirewall(config)# syslog inside 10.0.0.3 pixfirewall(config)# logging inside 10.0.0.3 pixfirewall(config)# syslog host inside 10.0.0.3 pixfirewall(config)# logging host inside 10.0.0.3 37. The configuration in the graphic has been entered into a PIX Security Appliance with three interfaces. The interfaces are inside, outside, and DMZ. What source address range will the traffic from inside devices use when they access devices in the DMZ? 10.0.0.1 to 10.0.0.254 172.16.0.20 to 172.16.0.254 172.16.0.1 to 172.16.0.254 192.168.0.20 to 192.168.0.254 10.0.0.1 to 10.255.255.254 38. What source IP address will the traffic from devices in the 10.0.2.0 network have when they leave the trusted network? C) 192.168.0.8 always 192.168.0.9 always 192.168.0.8 if ports are available, or 192.168.0.9 if 192.168.0.8s ports are exhausted 192.168.0.9 if ports are available, or 192.168.0.8 if 192.168.0.9s ports are exhausted 39. The commands in the graphic have been entered into a PIX Security Appliance. Which two statements are accurate descriptions of what will happen to outgoing traffic when it leaves the trusted network? (Choose two.) B) C) The source IP address will be from a pool of addresses in the 192.168.0.3 to 192.168.0.254 range. The source port will be a random port above port 1023. The source IP address will be 192.168.0.2 for all outgoing traffic. The source port will be port 1024. The source IP address will be in the range 10.0.0.1 to 10.0.255.254. 40. Interface Ethernet3 on a PIX Security Appliance has been configured with three subinterfaces to pass tagged traffic from three different VLANs. What protocol will be used to tag the VLAN traffic? ISL 802.1x VTP 802.1q 41. Which two commands will configure a static default route on the PIX Security Appliance in the network shown in the graphic? (Choose two.) route inside outside 0.0.0.0 0.0.0.0 172.16.0.2 1 route outside 0.0.0.0 0.0.0.0 172.16.0.2 1 ip route inside outside 0 0 192.168.0.2 1 route outside 0 0 172.16.0.2 1 ip route inside outside 0 0 172.16.0.2 1 route outside 0 0 192.168.0.2 1 42. How are transactions between a RADIUS client and a RADIUS server authenticated? by using a shared secret which is never sent over the network by hashing the secret using MD5 and then sending it over the network by hashing the secret using MD4 and then sending it over the network by using a clear-text password and then sending it over the network 43. RADIUS uses which transport layer protocol? C) IP TCP UDP ICMP DLC 44. Which authentication method is susceptible to playback attacks? C) passwords using S/KEY passwords using token card passwords requiring periodic change passwords using one-time password technology 45. Which authentication method sends passwords over the network in clear text yet protects against eavesdropping and password cracking attacks? C) authentication with FTP authentication with Telnet authentication with S/KEY authentication in POP3 e-mail 46. After a security audit, network managers realized that the authentication method used by their telecommuting employees needed to be improved. They set up a server and installed client software on the employee laptops of their remote users. They also provided a device for each remote user that generated a password every time they needed to make a remote network connection. Which authentication technology does this process describe? B) authentication with S/KEY authentication with token card authentication with encrypted password authentication with compressed password 47. What function does a digital certificate offer to information security? C) authorization accounting nonrepudiation intrusion prevention 48. Bookline Inc., an online bookstore, recently installed a web server running Microsoft Windows 2003 Server. Where should the company obtain a digital signature for the web server in order to assure customers that they are connecting to Booklines server and not an impersonating web server? a digital signature generated by the CA in Microsofts corporate headquarters a digital signature generated by the CA from a trusted third party a digital signature generated by the CA from a government agency a digital signature generated by any CA that establishes a secure connection 49. A large law firm wishes to secure dialup access to its corporate network for employees working at home. Since much of the data to be transmitted is highly confidential, the firm requires a high level of encryption and also prefers that each component of AAA be provided separately. Which security protocol best meets these requirements? TACACS XTACACS TACACS+ RADIUS 50. What are three reasons TACACS+ is preferred over RADIUS for authentication services? (Choose three.) RADIUS has limited name space for attributes. RADIUS is not an industry supported standard. TACACS+ encrypts the entire TACACS+ packet. TACACS+ authentication is included with more recent Windows Server versions. TACACS+ separates authentication and authorization. RADIUS uses TCP as a transport protocol creating additional overhead 51. A static username/password authentication method is susceptible to which three types of attacks? (Choose three.) playback theft teardrop syn flood eavesdropping 52. Company security policy requires the use of a centralized AAA server for network access authentication. Which two protocols are supported by the AAA server? (Choose two.) C) D) IPSec SSL RADIUS TACACS+ SSH 53. Which three are functions of AAA? (Choose three.) A), C) E) accounting availability authentication architecture authorization accessibility 54. A network administrator wishes to use port-level authentication technology to determine network access and assign IP addresses from different DHCP pools to authenticated and unauthenticated users. What standardized framework supports this objective? A) IEEE 802.1x IEEE 802.11af IEEE 802.1q IEEE 802.1p 55. What will be the result of executing the command in the graphic? C) The default login method will use TACACS+ only. TACACS+ accounting will be enabled at login. The enable password will be used if a TACACS+ server is not available. The default TACACS+ user shell will be enabled. 56. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network? authentication accreditation accounting authorization 57. What tool should you use to add a single user account to the Cisco Secure ACS for Windows user database? database replication Unknown User Policy RDBMS Synchronization Cisco Secure ACS HTML interface 58. Refer to the exhibit. Which two services can the network access server use to direct requests from the remote user to the Cisco Secure ACS authentication service? (Choose two.) CSAuth CSUtil RADIUS RDBMS TACACS+ 59. RTA(config)# tacacs-server key [emailprotected]? RTA(config)# tacacs-server host 10.1.2.4 RTA(config)# tacacs-server host 10.1.2.5 What will be the effect of these commands on router RTA? C) The TACACS+ server is now authenticating for the hosts 10.1.2.4 and 10.1.2.5. The TACACS+ server key has been exported to the hosts 10.1.2.4 and 10.1.2.5. The TACACS+ servers 10.1.2.4 and 10.1.2.5 and the router have been set to share the same authentication key. The TACACS+ servers are 10.1.2.4 and 10.1.2.5 and the configuration adds router RTA as a third TACACS+ server. 60. RTA(config)# aaa new-model RTA(config)# aaa authentication login default group tacacs+ enable After entering the configuration shown, the administrator loses the connection to the router before having the chance to create a new TACACS+ account. What is the easiest way for the administrator to regain administrative access to router RTA? C) Connect to the router, and use the default TACACS+ username and password. Erase NVRAM, and redo the configuration from scratch. Connect to the router, and supply the enable password. Perform a password recovery procedure on the router 61. Which command associates the group MYGROUP with the AAA server using the TACACS+ protocol? D) Pixfirewall(config)# aaa-server MYGROUP tacacs+ protocol Pixfirewall(config)# aaa-server protocol tacacs+ MYGROUP Pixfirewall(config)# aaa-server tacacs+ protocol MYGROUP Pixfirewall(config)# aaa-server MYGROUP protocol tacacs+ 62. Which configuration command defines the association of initiating HTTP protocol traffic with an authentication proxy name MYPROXY? C) Router(config)# ip auth-proxy MYPROXY http Router(config)# auth-proxy MYPROXY ip http Router(config)# ip auth-proxy name MYPROXY http Router(config)# auth-proxy name MYPROXY ip http 63. With the following configuration command, how long does the PIX Security Appliance try to access the AAA server 10.0.1.10 before choosing the next AAA server if there is no response from 10.0.1.10? aaa-server MYTACACS (inside) host 10.0.1.10 secretkey 12 seconds 15 seconds 20 seconds 30 seconds 64. Which command will enable AAA services on a router? B Router(config)# aaa enable Router(config)# aaa new-model Router(config)# aaa set enable Router(config)# aaa new-model enable 65. What is the default timeout in minutes for the inactivity-timer parameter of the ip auth-proxy command? 15 30 45 60 90 66. The network administrator configured the aaa authorization command below on the PIX Security Appliance. What is the effect of this command? pix(config)# aaa authorization include tcp/22 outside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 auth1 FTP traffic from outside is subject to authorization by the AAA server. SSH traffic from outside is subject to authorization by the AAA server. HTTP traffic from outside is subject to authorization by the AAA server. SMTP traffic from outside is subject to authorization by the AAA server. 67. Which type of authentication is being used when authentication is required via the PIX Security Appliance before direct traffic flow is allowed between users and the company web server? C) access authentication console access authentication cut-through proxy authentication tunnel access authentication 68. What will be the effect in the router after these configuration commands are entered? B) Router(config)# ip auth-proxy name aprule http Router(config)# interface ethernet0 Router(config-if)# ip auth-proxy aprule An authentication proxy rule called aprule is created making all authentication proxy services available only through the ethernet0 interface. An authentication proxy rule called aprule has been created for the HTTP protocol and is associated with the ethernet0 interface. An authentication proxy rule called aprule has been created for all protocols except the HTTP protocol and is associated with the ethernet0 interface. An authentication proxy rule called aprule has been created for the HTTP server running internally to the router and is associated with anyone attempting to access the web server from the ethernet0 interface. 69. When Cisco IOS Firewall authentication proxy is enabled, a user sends HTTP traffic which will trigger the authentication proxy. What is the first action taken by the proxy? C) The user will be asked to supply a valid username and password. The TACACS+ server will be contacted to see if the user is a valid user. The authentication proxy will check to see if the user has already been authenticated. If the authentication proxy has no user account for the user, it will check to see if a default guest user has been defined. 70. A TACACS+ server is configured to provide authentication, authorization, and accounting. The IP address of the server is 192.168.50.1, and the AAA authentication encryption key is S3crtK3y. Which command sequence will configure a Cisco router to communicate with the TACACS+ server? D) Router(config)# aaa new-model Router(config)# aaa authentication default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# aaa tacacs-server host 192.168.50.1 Router(config)# aaa tacacs-server key S3crtK3y Router(config)# aaa enable Router(config)# aaa authentication default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# tacacs-server host 192.168.50.1 Router(config)# tacacs-server key S3crtK3y Router(config)# aaa enable Router(config)# aaa authentication login default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# aaa tacacs-server host 192.168.50.1 Router(config)# aaa tacacs-server key S3crtK3y Router(config)# aaa new-model Router(config)# aaa authentication login default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# tacacs-server host 192.168.50.1 Router(config)# tacacs-server key S3crtK3y 71. The lead network administrator notices that unknown users have made router configuration changes. These changes are adversely affecting the network. Which command can be entered on the router to help identify future configuration changes and who made these changes? aaa accounting show uauth aaa accounting console aaa accounting match 72. Refer to the exhibit. Since ABC, Inc. is strengthening security, a PIX Security Appliance firewall must be configured with AAA services. Accounting should be provided for all FTP and HTTP traffic from any host to the WWW server at 192.168.2.10. Which command sequence would successfully process the desired traffic to the NY_ACS accounting server? A pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting match 110 outside NY_ACS pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting access-list 110 outside 10.0.0.2 pixfirewall(config)# access-list 110 permit tcp any host 10.0.0.2 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 10.0.0.2 eq http pixfirewall(config)# aaa accounting match 110 outside NY_ACS pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting match 110 outside 10.0.0.2 73. Which command displays the current authenticated users, the host IP to which they are bound, and any cached IP and port authorization information on a Cisco PIX Security Appliance configured for AAA? B) pixfirewall(config)# show aaa all pixfirewall(config)# show uauth pixfirewall(config)# show aaa statistics pixfirewall(config)# show aaa-server 74. A user has initiated an HTTP session through a firewall and has been authenticated by an authentication proxy. They have not generated any traffic in a while and the idle timer has expired for that user. What will the user have to do to allow them to go through the firewall again? D) The user can manually restart the idle timer. The user can simply TFTP their user profile to t

Sunday, July 21, 2019

River Water Pollution At Langkawi Island Environmental Sciences Essay

River Water Pollution At Langkawi Island Environmental Sciences Essay Increasing dearth of water in developing countries has made river water quality evaluation a relevant issue in recent years (Ongley, 1998). The surface water quality is a matter of serious concern today. Rivers due to their role in carrying off the municipal and industrial wastewater and run-off from agricultural land in their vast drainage basins are among the most vulnerable water bodies to pollution. The surface water quality in a region is largely determined both by the natural processes (precipitation rate, weathering processes, and soil erosion) and the anthropogenic influences viz. urban, industrial and agricultural activities and increasing exploitation of water resources (Carpenter et al., 1998 and Jarvie et al., 1998). Pollution of surface water with toxic chemicals and excess nutrients, resulting from storm water runoff, vadose zone leaching, and groundwater discharges, has been an issue of worldwide environmental concern. With an increased understanding of the importance of drinking water quality to public health and raw water quality to aquatic life, there is a great need to assess surface water quality (Campbell et al., 1993). APHA (1985), state that the use of water increases with growing population putting increasing strain in the water resources. In 1975, total global use of water was just under 4000 km3 per year, and this is expected to increase about 6000 km3 per year by the year 2000. Averaged on a global scaled, about 70% of this water is used in the agricultural sector, 20% by industry, and 10% for domestic purposes. Nowadays, there become a problem in finding adequate supplies of freshwater to meet our needs and maintaining its quality. Eventhough water availability is not a problem on a global scale, it may be a problem in finding high quality of freshwater at that required place in the required quantity. In Malaysia, 97% of water resources came from river. River can be defined as any natural stream of water that flows in a channel with defined banks. Malaysia is situated in between longitude 100 ° and 119 ° East and latitude 1 ° and 7 ° North covers a region on the subject of 329.733 km2 of land which include West Malaysia and the states of Sabah and Sarawak. The annual typical rainfall is 3000mm that contributes to a projected annual water resource of about 900 billion m3 (UNEP, 2002; FAO, 2005). Those rainfalls are stored in river, lake or either other water storage as water resources. The major water demand comes from irrigation for agricultural purposes as well as domestic and industry use (UNDP, 2005). Problem Statement As the important channel of substance cycle in biosphere, a whole river eco-system should have the functions of providing the food and water for living, industry and agriculture, amusement, shipping and commerce. Over the past century, it have been being seriously destroyed by various human activities including contaminant discharge, damming, solidifying riverside, destroying vegetation in the riparian zone and etc., resulting in deterioration of water environment, degradation of biological communities and riverbed atrophying. Therefore, the restoration and maintenance of healthy river ecosystems have become important objective of river management (Norris and Thoms, 1999). The development in Malaysia has lead to various kinds of environmental problems. Human activities such as industrialization, aquaculture activities, and urbanization caused a lot of pollution and damage the environment silently. According to the Department of Environment, Ministry of Natural Resources and Environment Malaysia, these activities can produce the anthropogenic pollutants and would be endangered the coastal environment (Chester and Stoner 1974; Ismail et al. 1993, 1995; Ismail and Idris 1996; Law and Singh 1991; Yap et al. 2002, 2003). The seriousness of heavy metals leads the marine environmental pollution to be recognized as a serious matter to human health concern. Industrial and agricultural activities were reported to be the leading potential source of the accumulation of pollutants in the aquatic environment including the sea (Freedman, 1989; Gà ¼mgà ¼m et al., 1994; Nimmo et al., 1998; Barlas, 1999; Tarra-Wahlberg et al., 2001; Akif et al., 2002; Jordao et al., 2002). The significance of Study Langkawi Island is one of the most attractive ecotourism spot in Malaysia with well diverse marine lives hence attracting thousands of tourists every year. To support the increasing number of tourist visiting the Langkawi Island, more development were made along the shore line such as hotels, resorts, jetties, shopping mall, and marine recreational facilities. This extensive type of development contributes to the direct impact on the productivity of the marine environment ecosystem and would cause pollution such as heavy metals pollution into the coastal and adjacent area (White, 1988). Langkawi is located in the northern west coast of Peninsular Malaysia, bordering the south of Thailand -off the coast of Kedah and is made up of 99 islands when the tide is high and 104 islands when the tide is low. The largest of the islands is Pulau Langkawi with an area of about 478.5 km2. Research on the geological resources and landscapes of Langkawi Islands has revealed the great geotourism potential of the island system. Comprising the oldest rocks and the most complete Paleozoic Mesozoic sequence of sedimentary formations, the Langkawi rocks tell the story of the beginning of the Malaysian Land. Diverse scientific records, fossil beds, geological structure and outstanding landforms further make Langkawi a living museum where visitors are able to directly experience a potential natural world heritage site. Conservation of geosites and geotopes are absolutely necessary, in the form of geological park, geological monument, protected site and beautiful landscape, to sustain its ecotourism activities (Ibrahim Komoo Kadderi Md Desa, 1989). Langkawi is one of the most beautiful islands group in Malaysia. Apart from having a distinct and unique morphological feature such as Machinchang ridge and karstic morphology in the limestone area, there are a lot of other interesting geological features. Among those are located in the already popular tourist sites, such as Pantai Pasir Hitam, Telaga Tujuh, Pantai Pasir Tengkorak, Telaga Air Hangat, Gunung Raya and Tasik Dayang Bunting. The geological features of those sites are described and is proposed to be made available in the pamphlet forms or placed at sites as geoinformation boards to increase the tourist geological understanding when they visit those sites. Apart from that, there are also many localities with interesting, as well as unique or rare geological features which are not easily found in other parts of Malaysia. All these localities are of very high potential to be promoted as new geotourism spots. Since the Langkawi Islands is very rich in either already popular o r potential geotourism localities, a number of geotourism trails is proposed. Each trail could be reach either by land or sea and may be visited in one day trip (Ibrahim Komoo Hamzah Mohamad, 1993). According to Ibrahim Komoo Kadderi Md Desa (1989), the rocks of Setul Formation are commonly found in the eastern part of Langkawi Island. Based on the change in strikes and dips of the bedding plane of the limestone, it is interpreted that the Setul Formation was folded regionally. Field observations indicate that the structures in the detrital members of the formation are more complicated than in the limestone. The limestone of this formation was faulted as well as folded. The well-known Kisap Thrust Fault was interpreted to play very important role in controlling the rock distributions in this area, which separates the Lower Paleozoic from the Upper Paleozoic rocks. Therefore, these study should be done as well as many human activities, directly or indirectly, lead to modification of the river and its basin which produce changes in the aquatic environment of the river water. Increased access to improved water sources has been a powerful factor in improving health and also in attracting the tourists visiting the Langkawi Island. On the other hand, it also may maintain the geological resources and landscapes of Langkawi Islands. Objectives The aims of this study are: To determine the concentration of selected ions for selected river water at Langkawi Island. To classify the water quality status at Langkawi Island based on water quality index (WQI). To evaluated the origin of pollution sources at Langkawi Island. Scope of Study This study involves the determination of selected ions (Na, K, Mg, Ca and Cl) by using Atomic Absorption Spectroscopy (AAS) at selected river in Langkawi Island. The research scope also extensive the classification of Langkawi river water status based on Water Quality Index (WQI) Formula by Department of Environment. CHAPTER 2 LITERATURE REVIEW 2.1 The Hydrology Water is a vital element in human life and it is a renewable resource. According to Wan Ruslan (1994), water is essential for physiological existence, very much the same as every other living organism does and for many other purposes such as agricultural, recreational, industrial, hydroelectric power, navigational, propagation of fish and other aquatic life, irrigation, etc. Generally, water quality means the standards of water body especially river for any beneficial uses. Water quality with a better index value indicates cleaner water body. High water quality is suitable for man and animals consumption compared to the low water quality. Water quality refers to the characteristics of a water supply that will influence its suitability for a specific use, i.e. how well the water quality meets the needs of the consumer. Water quality status indicates the level of pollutant composition and thus relates to human activities (Anhar et al.1998; Mohd Kamil et al. 1997a; 1997b). Water quality for various types of water body varies with input loads, flow rate and quantity of water (Mohd Kamil1991; Wan Nor Azmin et al.1997). River is one of the important water sources and is classified polluted when there are changes in their chemical and physical characteristics that make it unsuitable for any objective and function (Azizi et al. 1997). Pollution standards for eac h water body usually evaluated by measuring the value of selected water quality parameters. These parameters can be categorized as physical, chemical and biological. 2.2 Water Scarcity Water has been dubbed the oil of the 21st century as its scarcity is increasingly felt globally. Over the last 50 years, the worlds population had risen by more than two-and-a-half times to about 6.4 billion. At the same time, however, the demand for fresh water went up by four times (UNEP, 2002). The United Nations predicted that at this rate, up to 7 billion people in 60 countries may possibly face water scarcity by the year 2050. Without access to clean water, not only would public health suffer because of poor hygiene and sanitation, agricultural and industrial activities could also get disrupted. A report by UNEP (2002) also state that similar stresses have also been felt on the water resources in Southeast Asia. This is because economic development had generated greater demand for water from different sectors such as agriculture, industry and domestic users. The situation is likely to worsen in the future. As the regional population is expected to rise by an additional 250 million by 2025, per capita water will fall from 10,000 m3 to 6,700 m3. These trends pose several important questions that policy-makers would have to address. 2.3 Water Pollution Commonly, water pollution is defined as physicochemical alteration in water that may gives effect to organisms (Chiras, 2001). These broadly take into account the variety of water sources including lakes, rivers, oceans, streams, and also groundwater. The sources of water pollution can be either natural (e. g. animal waste) or by human activities such as runoff of pesticides, herbicides, and feces from agricultural land (Lerner Lerner, 2009b). The majority of tropical islands have limited sources of freshwater, no surface water or streams and fully reliant on rainfall and groundwater recharge (Praveena et al., 2010). The inhabitants of these islands mostly depend on groundwater to meet their needs, particularly for drinking and tourism purposes. The demand for fresh water has been rising in response to the increase of activities and development in tourism sector (Singh and Gupta, 1999; Aris et al., 2007). Numerous islands are experiencing water anxiety at the current levels of groundwater extraction at an outstripping supply. The freshwater lens on islands may simply be overexploited or polluted and vulnerable to climate change, pressure of island resources and the related impacts to freshwater resources (Griggs and Peterson, 1993; Singh and Gupta, 1999; Climate Change, 2007). A report by EQR Malaysia in 2009 state that compared to 2008, there was a slight deterioration in river water quality. There was a reduction in a number of clean rivers compared with 2008. There were 306 clean rivers in 2009 as compared with 334 in 2008 while the number of slightly polluted rivers increased from 197 to 217. There was also an increased in the number of polluted rivers from 48 in 2008 to 54 in 2009. However, the quality of the marine environment with respect to coastal and estuarine areas was within normal variations compared with the Malaysian Marine Water Quality Criteria and Standard (MWQCS). Figure 2.1 shows the trend of the river water quality for several years. Figure 2.1 River water quality trend (DOE, 2009) 2.4 Water Pollution Sources The sources of water pollution can be categorized as point and non-point sources (DOE, 2009). Point sources include sewage treatment plants, manufacturing and agro-based industries, and animal farms. Non-point sources are mainly diffused sources such as agricultural activities and surface runoffs. EQR Malaysia 2009 by DOE state that in 2009, 20702 water pollution point sources were recorded. These comprise of manufacturing industries (9762:47.15%), sewage treatment plants (9676:46.74% inclusive of 736 Network Pump Stations), animal farms (769:3.72%) and agro-based industries (495:2.39%). Figure 2.2 shows the composition of water pollution sources by sector in 2009. Figure 2.2 Composition of water pollution sources by sector in 2009 (DOE, 2009). The decrease in the number of clean rivers were attributed to an increase in the number of polluting sources such as sewage treatment plants, manufacturing industries, and palm oil mills which contributed to high pollution loading. As in previous years, the major pollutants detected were BOD, NH3-N and SS. High BOD can be attributed to untreated or partially treated sewage and discharges from agro-based and manufacturing industries. The main sources of NH3-N were livestock farming and domestic sewage, whilst the sources of SS were from earthworks and land clearing activities (DOE, 2009). Freshwater resources in island currently have been increase in demand as it may simply be overexploited or polluted and vulnerable to climate change, pressure of island resources and the related impacts to freshwater resources (Griggs and Peterson, 1993; Singh and Gupta, 1999; Climate Change, 2007). The most significant and instantaneous consequences of climate change are increase in air temperature, increase in sea surface temperature, changes in rainfall (precipitation) patterns and more extreme weather conditions (Tompkins et al., 2005). Vulnerable to climate change has become more frequent in various countries in the recent decade and Malaysia is not excluded from this phenomenon. Effects of climate change will alter the global hydrological cycle in terms of distribution and accessibility of regional water capital. A warmer climate with its increased climate variability will increase the risk of floods and droughts (Climate Change, 2007; Intergovernmental Panel on Climate Change, 1997). Changes in rainfall during rainy season reveal the groundwater recharge, as a sensitive function of the climatic factors, local geology, topography and land use (Dragoni and Sukhija, 2008). The islands complex and dynamic system will response dynamically in variable and complex ways to climate change (Watson et al., 1998). Most research on the possible impacts of climate change to the hydrologic cycle has been directed at forecasting the potential impacts to surface water, river discharge and quality. Nevertheless, according to Mokhtar et al. (2008), to protect valuable water resources, one must understand the natural evolution of water chemistry under natural water circulation processes in mixture with knowledge about the background of the study area. This is crucial for the evaluation and protection of water resources and in the assessment of water quality for creating threshold ions composition in natural water. 2.5 Water Quality Index Water quality index (WQI) act as a marker of water quality change and be able to indicate the effects of these changes on potential water use. The WQI serves as the basis for environmental assessment of a waterway in relative to pollution load categorization and designation of classes of valuable uses as provided under the National Water Quality Standards (NWQS) (Table 2.1 Table 2.2). The Water Quality Index (WQI) consists of six (6) parameters which are Dissolved Oxygen (DO), Biochemical Oxygen Demand (BOD), Chemical Oxygen Demand (COD), Ammoniacal Nitrogen (NH3-N), Suspended Solids (SS) and pH. Water classes and uses were shown in Table 2.3. SUB INDEX WATER QUALITY INDEX INDEX RANGE CLEAN SLIGHTLY POLLUTED POLLUTED BOD 91 100 80 90 0 79 NH3-N 92 100 71 91 0 70 SS 76 100 70 75 0 69 WQI 81 100 60 80 0 59 Table 2.1 Water Quality Classification Based On WQI (DOE, 2009) Table 2.2 DOE Water Quality Index Classification (DOE, 2009) PARAMETER UNIT CLASS I II III IV V NH3-N mg/l 0.1 0.3 0.3 0.9 0.9 2.7 >2.7 BOD mg/l 1 3 3 6 6 12 >12 COD mg/l 10 25 25 50 50 100 >100 DO mg/l >7 5 7 3 5 1 3 pH >7.0 6.0 7.0 5.0 6.0 >5.0 TSS mg/l 25 50 50 150 150 300 >300 WQI >92.7 76.5 92.7 51.9 76.5 31.0 51.9 Table 2.3 Water classes and Uses (DOE, 2009) CLASS USES Class I Conservation of natural environment. Water supply I Practically no treatment necessary. Fishery I Very sensitive aquatic species. Class IIA Water supply II Conventional treatment required. Fishery II Sensitive aquatic species. Class IIB Recreational use with body contact. Class III Water supply III Extensive treatment required. Fishery III Common, of economic value and tolerant species; livestock drinking. Class IV Irrigation. Class V None of the above. 2.6 Water Quality Index Parameter 2.6.1 Dissolved Oxygen (DO) Oxygen is essential to all forms of aquatic life, including those organisms responsible for the self-purification processes in natural waters. Low levels of DO are indicative of greater pollution in the river. Pollution can cause DO concentration to drop below the necessary level to maintain healthy biota (Radojevic Bashkin, 2006). DO can also be expressed in terms of percentage saturation, and levels less than 80 per cent saturation in drinking water can usually be detected by consumers as a result of poor odour and taste (Chapman, 1996). According to Laenen and Dunnette (1997), DO is a good indicator of the overall ecological health of a river. Although other indicators also signify general river health, an adequate supply of oxygen is essential for animal life. For many species of fish, DO levels below 6 mg/L for any length if time can be lethal. 2.6.2 Biochemical Oxygen demand (BOD) Biochemical Oxygen Demand (BOD) is the mass of dissolved molecular oxygen which is needed by microorganisms for the oxidation and conversion of organic substances in a sample (20 °C) of water under defined conditions and within a defined period of time (index n in days and hours) (Fresenius Schneider, 1988). Fresenius Schneider (1988) also state that standardized laboratory procedures are used to determine BOD by measuring the amount of oxygen consumed after incubating the sample in the dark at a specified temperature, which is usually 20 °C, for a specific period of time, usually five days. This gives rise to the commonly used term BOD5. BOD measurements are usually lower than COD measurements. Unpolluted water typically have BOD values of 2 mg/L O2 or less, whereas those receiving wastewaters may have values up to 10 mg/L O2 or more, particularly near to the point of wastewater discharge. Raw sewage has a BOD of about 600 mg/L O2, whereas treated sewage effluents have BOD values ranging from 20 to 100 mg/L O2 depending on the level of treatment applied. Industrial wastes may have BOD values up to 25,000 mg/L O2 (Chapman, 1996). 2.6.3 Chemical Oxygen Demand (COD) Chemical Oxygen Demand (COD) is a measure of the oxygen equivalent of the organic matter in a water sample that is susceptible to oxidation by a strong chemical oxidant (e. g. dichromate). The COD is widely used as a measure of the susceptibility to oxidation of the organic and inorganic materials present in the water bodies and in the effluents from sewage and industrial plants. Correspondingly, it does not indicate the total organic carbon present since some organic compounds are not oxidized by the dichromate method whereas some inorganic compounds are oxidized. However, COD is a useful, rapidly measured, variable for many industrial wastes and has been in use for several decades (Chapman, 1996). 2.6.4 Ammoniacal Nitrogen (NH3-N) The presence of ammonium ions in water is connected to the process of the biochemical decomposition of protein substances contained in household and industrial sewage (Chan, 2002). Ammonium ion is in equilibrium with dissolved oxygen in any aqueous solution. All nitrogen that exists either as ion or in equilibrium with NH3 is considered to be ammonia-nitrogen. The relative value for NH3 varies from 0.1 to 5.0% of total sum of ammonium and ammonia at typical pH value of 6-8 and temperature between 5-30 °C (Radojevic Bashkin, 2006). According to report by DOE (2009), the main sources of NH3-N were livestock farming and domestic sewage. 2.6.5 Suspended Solids (SS) Suspended solids are matter held in suspension in the water or wastewater and retained by a filter (Chan, 2002). The type and concentration of suspended solids controls the turbidity and transparency of the water. Suspended solids consist of silt, clay, fine particles of organic and inorganic matter, soluble organic compounds, plankton and other microscopic organisms. Such particles differ in size from approximately 10nm in diameter to 0.1mm in diameter (Chapman, 1996). 2.6.6 pH pH is important in natural waters and in water treatment. Aquatic organisms are sensitive to pH changes and require a pH of 6 to 9. The pH is an important variable in water quality assessment as it influences many biological and chemical processes within a water body and all processes associated with water supply and treatment. When measuring the effects of an effluent discharge, it can be used to assist determine the extent of the effluent plume in the water body. Generally, pH is a measure of the acid balance of a solution and is defined as the negative of the logarithm to the base 10 of hydrogen ion (H+) concentration. The pH scale runs from 1 to 14 (i.e. very acidic to very alkaline), with pH 7 representing a neutral condition. At any given temperature, pH (or the H+ activity) indicates the intensity of the acidic or basic character of a solution and is controlled by the dissolved chemical compounds and biochemical processes in the solution. In unpolluted waters, pH is principally controlled by the balance between the carbon dioxide, carbonate and bicarbonate ions as well as other natural compounds (e. g. humic and fulvic acids). Unpolluted water usually gives the neutral pH value or slightly alkaline. The natural acid-base balance of a water body can be affected by industrial effluents and atmospheric deposition of acid-forming substances. Changes in pH can indicate the presence of certain effluents, particularly when continuously measured and recorded, together with the conductivity of a water body. Variations in pH can be caused by the photosynthesis and respiration cycles of algae in eutrophic waters. The pH of most natural waters is between 6.0 to 8.5, although lower values can occur in dilute waters high in organic content, and higher values in eutrophic waters, groundwater brines and salt lakes (Chapman, 1996; Jonnalagadda et al., 2001). 2.7 Previous Study on River Water Quality Status Water Quality Index (WQI) value are inconsistent based on the activity and the sources of the impurity. A report by Yusoff Haron (1999), the study of river water quality status of Ayer Hitam Forest Selangor showed that the upstream water quality was better than the downstream river water quality throughout the phase of sampling. The study shows clearly that as the river flows from uninterrupted (upstream) to the distressed environment (downstream), the physicochemical characteristics vary and thus degrades the water quality status. The value of water quality index based on the DOE-WQI was in the ranged 89.6 99.8. Thus indicate that the water quality status within the vicinity fall under Class I and II. It reveals that there is a close relationship between the river water quality and the land use pattern within the vicinity of the sampling stations. Besides development activities, natural factors such as organic matter decomposition may also contribute and hence influence the river water quality in the study area. Refer to Suratman et al. (2005), river profile status in Ibai River Basin have value of WQI in between 65.0 85.4, which have been categorize under Class II with slightly polluted water status. The major activities that contribute to the decline of water quality are the contribution of domestic sewage from residential and from the small workshops. Table 2.4 below shows some previous study done by researchers on river water quality status at different location. Table 2.4 Previous study of WQI in Malaysia Study Area WQI Value

Saturday, July 20, 2019

Free College Essays - Lusting After Ladies at the A&P :: A&P Essays

Does lust lead to hardship and emptiness? In this paper (do you mean "this paper" or "John Updike's 'A&P'?) Sammy has a sexual appetite that causes him problems. His worship of a woman's (careful with placement of possessive apostrophe) body causes him to misplace his values and center only on one value. This value is his lustful pleasure he gets when he sees three girls in their skimpy swimsuits. The pleasure he receives outweighs the consequence of emptiness he finally feels after he defends those girls and they do not respond to his pleasurable feelings. Updike in his short story "A&P" uses characterization to illustrate that heroics based upon animalistic sexual appetite, which objectifies women, will lead to a hard and unsuccessful life. Updike uses the characterization of Sammy to illustrate that animalistic sexual appetite objectifies women. Sammy describes Queenie in a sexual manner when he described (try to avoid using the same word twice in a single sentence; try a synonym--to find synonyms there's a cool thesaurus webcite by Merrium Webster at www.m-w.com; also note that you have shifted from present to past tense here; when writing on art you normally stay in the present tense throughout) Queenie's body and bathing suit. He says (missing the proper punctuation after says; if you kept your Holt handbook you should be able to look up punctuation with quotations) "With the straps pushed off, there was nothing between the top of the suit and the top of her head except just her, this clean bare plane of the top of her chest down from the shoulder bones like a dented sheet of metal tilted in the light" (13). (don't forget that MLA style demands that you put the page number of each quote in parentheses immediately af ter each quote) Sammy describes this as more than pretty. His sexual appetite is geared in not seeing these three girls as people but as objects. Sammy sees these women as icons to lust after just like in an eastern orthodox church where they have icons of Jesus and Mary that you can have as objects to focus on and worship. Sammy in effect is using these women as objects to lust after and thus worship human sexuality. He sees these women as objects of pleasure thus fueling his animalistic sexual appetite. (I have a couple of comments on the preceding passage--which I've colored blue.

Friday, July 19, 2019

Mother Courage: The Hole In The Cheese :: essays research papers

Mother Courage contains a quote that pulls the entire play together so innocuously; it's hard to believe that Brecht originally intended it to be so symbolic. Yet, there it is, in scene six, the chaplain rhetorically asks, "What happens to the hole when the cheese is gone?" This line operates on the three essential layers of the play: the level of the character, of the playwright (plot), and of the audience. On "face" value, this line is said about peace. The chaplain believes that the image of peace as the norm and war as an abnormal event is backward. He sees war as the standard occurrence (the cheese) and peace as merely an interim incidence (the holes in the cheese). Thus peace is nothing without a backdrop of war upon it; a hole is only a hole - it contains nothing. The substance of life is war.But the chaplain's line wouldn't be as significant if it didn't have a more global meaning. In the light of the plot, "What happens to the hole when the cheese is gone?" is a question that Mother Courage should ask and apply to herself. Clearly the cheese is Swiss Cheese specifically, and more generally all of her children. Mother Courage only thinks about a certain part of her children - their use to her in her business. She has an odd sort of motherly care for her children; abstractly, she has affection for them, but it's only abstract. The only concrete feelings she expresses toward her children is that they should listen and depend on her; as long as they stay and work with her, she will keep them safe. But she can't understand that their identities are so crucially different than the tiny roles she has given them in her life. She only sees the hole, but her children are real people with real ambitions. Swiss Cheese has such a desire to be honest and useful, but she only sees a simpleton. Kattrin can't voice her feelings, but it's clear that she's a strong woman like her mother, and yet Mother Courage slams her (unintentionally) in every interaction they have. Kattrin is treated like an unwanted wage slave. Mother Courage cannot see the substance of her children, and when it is lost, cannot find what she thought they were because her reality was a hole. Their use to her was a hole framed in substance, and when the substance is lost, the hole is exposed to never have existed.

Fried Green Tomatoes :: essays research papers

Fried Green Tomatoes At The Whistle Stop Café "HER ORIGINAL NAME was Patricia Neal"(Reynolds1), but the author of Fried Green Tomatoes is better known under the alias: Fannie Flagg. In the novel Fried Green Tomatoes she uniquely compares the modern day world to the world in the early and the middle 1900’s. As the novel shifts from the 1930’s to the 1980’s the significance of life is seen through two of the main characters, Mrs. Cleo Threadgoode and Evelyn Couch, as life ends and begins. Fannie Flagg shows that living life to its fullest indeed has its consequences, but is the only way to live a happy life without regrets. From her start in the late 1920’s Mrs. Cleo Threadgoode knew a little girl by the name of Imogene but everyone called her Idgie. Idgie was one of the Threadgoodes and back in Whistle Stop the name Threadgoode was a good name to have. They were the basic life of this little town in Alabama. The Threadgoodes were people known and well liked by the rest of the sparsely populated area. The name she carried did not stop Idgie from doing whatever she wanted to do whenever she wanted to do it. "Idgie used to do all kinds of harebrained things just to get you to laugh. She put poker chips in the collection basket at the Baptist church once. She was a character all right†¦"(12). This shows that nothing would stop Idgie from doing her pranks and having her laughs. Maybe she was lectured by her priest or by her parents but she didn’t regret it. Idgie was concerned with the present, not the past or the future. Of course she had her hardship that wouldn’t let her forget, like when her brother Buddy died, and she even looked forward to a day, but she lived in the present. She lived life for the moment. "Now, seriously, Idgie, I’m not trying to run your business or anything, but I just want to know if you’re saving any money, that’s all. What for? Idgie said. Listen, money will kill you, you know that"(31). This shows that Idgie was not concerned with what tomorrow will bring and if she is prepared for it or not. It also shows that Idgie is not concerned with wealth, she is more concerned about the well being of others. This next passage gives a better impression of her pure unselfish heart.

Thursday, July 18, 2019

Difference between Branding and Brand Equity Essay

â€Å"Though no one can go back and make a brand new start, anyone can start from now and make a brand new ending†. (Bard qtd. in. ThinkExist. com) This quote shows one fact that the process of ‘branding’ is endless. Because, simply, when ‘brand equity’ is known or measured, the brand could be protected and managed properly. This essay aims at giving an overview of the ‘branding’ and ‘brand equity’ terms or concepts to show the difference between both of them. And due to the fact that â€Å"both terms are usually defined around the concept of adding value to a product (or service)† (Binnie 17), it could be hard for some people to differentiate between both of them. That’s why the best approach to realize the difference between ‘branding’ and ‘brand equity’ is to dig and search in the literature to define both terms to know what is meant by each one of them. However, before separating each term from the other -to know the difference between both of them-, let’s move to the real world to have an idea about a simple fact concerning a certain brand (Coca-Cola in this case). This interesting example –mentioned by Blackett- deserves to be mentioned here to realize how important a brand could be for a company. â€Å"By mid-2002, Coca-Cola Company’s stock market value reached $136 billion, while the business net asset value (the book value) was only $10. 5 billion†. (5) The interesting fact here is when we add this information to the fact that: â€Å"The value of Coca-Cola brand for the same period (mid-2002) was estimated by $70 billion (over half of the $136 intangible value mentioned above! . † (Blackett 5) Then, after realizing the importance of ‘branding’ to the company in the marketplace -in the previous example-, it’s time to know what is meant by both terms, ‘branding’ and ‘brand equity’. First of all, a ‘brand’ is defined by the Dictionary of Business and Management as â€Å"a name, sign or symbol used to identify items or services of the seller(s) and to differ entiate them from goods of competitors. † (qtd. in. BuildingBrands Ltd. ) However, a ‘brand’ is more than a name, a sign or a symbol. In another word, this definition is not sufficient to describe the term ‘brand’. Grimaldi gave a better definition for the term ‘brand’ as â€Å"a combination of attributes, communicated through a name, or a symbol, that influences a thought-process in the mind of an audience and creates value. † And this is what Blackett assured when he mentioned that â€Å"the visual distinctiveness of a brand may be a combination of any of the following: name, letters, numbers, a symbol, a signature, a shape, a slogan, a color, a particular typeface. (3) Also, Davis (2) defined the ‘brand’ term as â€Å"all the promises and perceptions that an organization ‘wants’ its customers to feel about its product(s) and service offerings. † (2) Now, moving to the ‘branding’ concept or term, according to Davis (1), ‘branding’ is a complex ‘process’, but its goal is simple: it is the creation and development of a specific identity for a company, product, commodity, group, or person. † (3) Grimaldi mentioned an interesting definition for ‘branding’: The blend of art and science that ‘manages associations’ between a brand and memories in the mind of the brand’s audience. † And this blend â€Å"involves focusing resources on selected tangible and intangible attributes to differentiate the brand in an attractive, meaningful and compelling way for the targeted audience. † Now, after understanding what is meant by both ‘bra nd’ and ‘branding’ terms, it’s time to know what is meant by ‘brand equity’ term or concept. The ‘brand equity’ concept â€Å"emerged in the early 1990s†, (Tuominen 96) and introduced in marketing literature in the 1980s† (Rajh 1) and before mentioning definitions of this term, it is necessary to realize that â€Å"brand equity is the key to understanding the net impact of marketing† (Reynolds and Philips qtd. in. Binnie 16) According to Hoeffler and Keller, â€Å"most definitions of brand equity rely on ‘brand knowledge’ structures in the minds of consumers –individuals or organizations-† (421 qtd. in. Binnie 17). And Pullig gave a simple definition to the term ‘brand equity’ as â€Å"consumer brand knowledge†. Keller also defined the ‘brand equity’ term as â€Å"the ‘differential consumer response’ from ‘knowing’ the brand†. (qtd. in. Binnie 17) According to Keller and Kevin, ‘brand equity’ is â€Å"the value of the brand in the marketplace† (qtd. in. Pullig). McDonald added another dimension when she defined it as â€Å"the stored value built up in a brand which can be used to gain ‘market advantage’† (2). So, after studying these definitions, it is obvious -as Tuominen mentioned- that â€Å"there are three key ingredients in the ‘brand equity’ definition and they are: (1) brand knowledge, (2) differential effect, and (3) consumer response to marketing. † (75) Finally, according to these definitions, it is obvious that (1) ‘branding’ is the process of creating, developing, protecting, and managing the special identity of the product, or the ‘brand’ (to differentiate it in the marketplace) and it is not only marketing effort, it includes all the companies efforts to build this differentiation; (2) the ‘brand’ is the end result of that process or the combination of all the tools used to create this special identity of the product; and (3) the ‘brand equity’ is the ‘feedback’ of the ‘branding’ process or the key to measure, assess, or weigh the end result ‘brand’ –as we saw previously in the Coca-Cola example- and compare it with what is desired or planned in the ‘branding’ process. In another word, ‘brand equity’ will show whether the ‘branding’ process and other marketing efforts (or even public relations) are on the right track or not.

Wednesday, July 17, 2019

A country boy Essay

Not just my family members and I, every Cambodian citizen is the victim of genocide, the act which took the lives of almost two million Cambodian citizens. iodin can record that this is the curse that either Cambodians were to experience mend the others might say that it is our sin or karma. The war ended, and my family had to uprise from the scratch all over again. I did not really k right away how troublesome my grandparents had to go through to raise quaternity children, but I experienced ontogeny up living in a one-storey flat which was the shelter of at to the lowest degree ten family members.Un wish wellspring the other kids, I rarely saw my parents since my father had to function far away from home, and my mother was put away pursuing her Bachelor class in Biology. I spent most of my puerility with my grandparents. My grandmother would always tie me crumb her back to the hospital where she is stillness work as a retired doctor while my grandfather is a retired administrative faculty of the same hospital, and was a former Lon Nols air force.I can still remember how I envied some of my childhood friends whom I called Rich Kids. During my very start- glowering day at school, my classmates were showing off their new clutchs, yet I lone(prenominal) had a black plastic bulk to store my books and pencils. The other kids were mocking that I did not even begin a bag to carry my books to school. I was a quiet kid, and I chose to remain silent. I came back home, and told my grandmother that I cute a bag. It took her around a workweek or two to buy me a yellow used bag which speak to around 1000 Riels or less. though it was a used bag, I hugged my bag with joy.I was a kid from the province, and I did not cast a lot to go to expensive language schools like some other kids. Due to monetary constraint, my parents had to send me to the language schools nearby. I neer did well in slope class. I was the worst student in my English class. Luc kily, my parents were better-off, and they sent me to an inter discipline school. It is the place that channelised my life. From a language student who never did well in class, I have now become a teacher of English. From a student who copied the whole reading school text to submit to the teacher as a writing assignment, and got zero for plagiarizing, I have now won four national writing awards.Again, March and April this year have marked another turning superman of the life of this country kid. I was slapping my character to see whether it was a dream or reality. I used to be jilted by the 26th ranking university in Asia, yet I got admitted and have been attached a full intuition to do a Master Degree at the second- best university in Asia which is one among the crystallise universities in the world, and at the same time, I was also among the citizens of five Southeast Asian nations to be offered a full scholarship to pursue a Master Degree at one of the wealthiest universi ties in Europe.I failed once or twice, and it does not implicate that I would always fail. I suppose that life is full of possibilities. flavor tests us to see how patient and how determined we are. Life does not kill us, but it teaches us. With apply and commitment, I believe that a soulfulness can make positive change to his or herself and to the society.I like the night. Without the dark, wed never see the stars. Stephenie Meyer, Twilight

Tuesday, July 16, 2019

How to write an introduction for a dissertation?

How to write an introduction for a dissertation?

The introduction is the starting point of your dissertation. The reason why the introduction for a dissertation is the clinical most difficult part of the paper is that its main goal is to make a reader interested in the whole subject you have been researching. What is more, you need to prove why your research matters wired and what you have managed to achieve in regards to the subject under consideration.Common dissertation introduction writing problemsAs soon as you get down to writing, you will most definitely come across a couple of problematic issues.Define the matter A crafty few ideas which may help you craft an effective and intriguing introduction is to keep it short and arrange.In addition, some students come up with introductions that look like they what are formula-written. Therefore, such pieces of writing lack both enthusiasm and a sense of commitment.Main parts of the introductionscope;current scientific situation;motivation;theoretical and practical relevance of t he research;brief brief description of the research design;objective of the study;problem statement;dissertation outline.You need to begin with stating the motive for your research.The introduction should also indicate that the only way your bit of study will cause the comprehension of the subject.

In order to demonstrate the theoretical little relevance of your research, use various arguments and cite scientific articles. Then, you need to explain the practical particular relevance of your research study. Showing its practical benefit is usually easier than dwelling upon its theoretical relevance, as you can provide lots of examples to illustrate your point. Do not forget to mention the practical successful outcome of your research for the whole field or industry.An introduction is merely among the elements of a dissertation.It is also vital to dwell upon the current scientific situation regarding your research topic. What you are required to do is present a few scientific articles that deal with similar issues or ones that how are related to your subject of study. Briefly explain the gist and the main message of those articles. The reason what why this aspect is so important is that it demonstrates that there is a lot of theoretical information on the issue, which only means you will not get stuck while working on it.Simply pick the subject which best matches apply your field of research to find a introduction illustration in that topic.

Try to summarize the gist of each chapter in one sentence. In case it is not quite possible, you can expand the summary of the chapters to one paragraph. Keep in mind that the brief outline should not be repetitively phrased. Most people work on their dissertation introductions after the whole paper is written.Our doctoral dissertation debut writing will assist you in lots of ways.Make sure you write to the point. Do not repeat yourself. Present useful information to the reader. Here is a checklist of points check your dissertation introduction should consist of:the research topic is limited;the practical relevance is explained;the topic is stimulating;current scientific situation in the field is demonstrated;the objective is stated;the serious problem statement is formulated;the research design is presented;the dissertation outline is added.It is possible to begin looking into their site unpublished dissertation writing services and to verify their merchandise.

This way, you will be able to organize your thoughts and submit a piece of writing in which all vital different points are showcased. Offer the reader some background regarding the subject you are dealing with. Clarify what the focus of check your study is. Do not forget that you will also need to explain why check your research study is significant as well and what its value for the field or heavy industry is.Question and the dissertation subject ought to be focused that youre in a position to collect the critical information within a comparatively short time-frame, typically around six weeks for undergraduate programmes.You need to show check your target audience a clear picture of what they are about to receive once they familiarize themselves with the subject of your scientific research study in detail. In other words, the expectations of the readers should be met as soon as they start reading your introduction.Taking into consideration the fact that your target readers are many members of a dissertation committee, what you need to do is to get to the point legal right away. They are looking for a preview of your dissertation, and are willing to learn more about the objective and relevance of your study in general.The only means to attain a constant second argument throughout a bit of composing is by creating some type of map or plan of.

Do not forget to define the public key terms of your dissertation. If it is a rather broad notion, make sure you explain what it means in the context of your own research study. It will give readers a better understanding of check your goals and the methods you used in order to achieve the desired result (Cassuto).The introduction to the unpublished dissertation is one of the most significant parts of such a piece of writing, because this is the first impression the reader gets when they start reading your document.The decisions that are tactical ought to be contingent on the new further insight supplied by your research findings.Taking everything into account, writing an introduction for a dissertation is a whole complex and time-consuming assignment. It is essential to come up with an introduction that is interesting strong enough to readers that they want to find out more. Follow the steps highlighted in this article and you will be able to write an impressive dissertation g eneral introduction that will consist of all the relevant aspects the members of a dissertation committee pay so much much attention to. Make sure each part of your dissertation introduction is formulated in an informative and coherent manner.Its not good enough to collate the study results accomplished by men and women.

Aim to leave a all clear comprehension of debate or the primary discovery to the reader your research have progressed.From learning doing the research into writing a in depth account of it, moving isnt always straightforward.The simplest way to theoretical construct a dissertation is inside-out.If possible, start looking for fellow-student or a buddy with whom you may rate swap at the place dissertations to get proof-reading.