Thursday, November 28, 2019

Women in Infantry free essay sample

Today, one of the biggest debates over womens rights is the one over females being in the infantry. The world is changing and with that comes a lot more responsibility for policy makers, and there is a great debate over women being on the front lines. Women have been in the Military for quite some time, but not in a front line type of role. I can see both sides of the argument; the one that wants people to broaden their views and accept women in the infantry, and the other side that sees at as more ofa male type of position. There are many pros and cons to the Military allowing women in combat positions, and I believe that while women should be allowed to have a chance in the infantry, the standards need to be the same whether it is a male or female. When the Secretary of Defense Leon Panetta removed the barriers of women being in the infantry it opened up 237,000 Jobs to women. We will write a custom essay sample on Women in Infantry or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Around 53,000 positions are closed to women by units, such as Brigade Combat Teams in the Army. Panetta said that if members of the military meet the qualifications for the Job- not reduced ualifications- then they should have the right to serve. The same argument can be made for having gays in the military. I dont believe that they should be excluded, but I do believe they should have to keep their personal life to themselves. I agree with Panettas statement saying that if they are qualified then women should be able to serve. And the Secretary of Defense also stated that if women were allowed in the infantry, it would gain them respect with the men who already serve. When people argue that women cant carry 80 pounds of gear, fly fghter Jets because they cant andle the g-force, or fght on the front lines with men, I think those people to be uneducated. There are plenty of men who try and Join the military who cant carry the gear, cant handle g-force, or are too squeamish to fght on the front lines. So if there are women who can make it through all the training then they should be able to serve. I believe that in some cases having a woman on the front lines or flying a plane has better a better advantage then a man does. Women tend to be smaller, giving the enemy less of a target to hit, and if they are flying planes, women are more likely to fit n the cockpit. Women also analyze things more radically then men do. Most men when on the front lines are pumped full of adrenaline and lose focus on analyzing their surroundings, and could have a better chance of getting themselves or a squad member killed. Women are usually much more calm then a man in a stressful situation, and may be able to keep her head straight and get her squad out of a fire fght and save lives. That to me is a big advantage of women being in the infantry. Also, women are more generous and thoughtful then most men. So if a man is having roblems or needs to vent to someone, it is a lot easier to vent to a woman then to a man. If a male soldier tried to vent to another male, then he may be deemed as soft and not fit for combat. On the other hand if a male soldier vents to a female soldier it is more likely the temale soldier will talk witn the man, and help him through his problems. And if men could vent to female soldiers comfortably then it would serve a greater good to the whole squad because no one would have to many emotions bottled up, which is extremely dangerous during war. On the other hand there are also a lot of problems with women being allowed in the infantry. Yes they can be very helpful on and off the battlefield, but what happens when it is a womans time of the month and her emotions are all out of whack? That would be very dangerous to the rest of the soldiers she is with. And since her emotions are everywhere, she would not be able to think straight and process situations on the battlefield the way she would need to. She would be doing more damage than good if she was allowed to be on the front lines during that time of the onth. Also with having women in combat sexual tension may arise. And women sometimes use their gender to get what they want from the male population. This might mean that a woman is not doing anything but is earning more merits because she may use her gender to attract the male population responsible for it. Another unfortunate downside with women being among all the men is rape. Its sadly a great possibility that with women in the infantry the chance for rape is extremely high. Seeing as men are out In the middle of nowhere surrounded by a bunch of other en, and all the sudden there squad begins to add women, and in the camp when no action is going on a man who has been stressed because of the war and all of the other things going on he could Just rape one of the female soldiers. And because the men outnumber the women, there really isnt much the women could do to fght back. There is also a greater risk that if a woman gets captured by the enemy, she would not have the mental strength to not tell the enemy the plans of her platoon, the whereabouts of their camp, and many other important locations and strategies that should be kept a secret. And one of the greatest downfalls of women being in the infantry would be plain physical strength. It isnt very often that a woman is flat out stronger than a man physically, and that plays a huge role in the infantry. You have to carry heavy gear and weaponry all day, and it is possible that it Just may be too much for a woman to handle. There is also a problem with military efficiency. While having women in combat that would be certified and pass all of the training is small, the monetary, and disciplinary costs do make the move worthwhile. It costs money to have people go nto basic training for the military, and if a great number of women try and Join, more than likely only a small number would succeed, so it makes it almost a waste of time to train them for nothing when the money and effort could have been placed somewhere else. Throughout history the military has been a male dominant environment. That means that there is a very important tradition to those who have served and are planning to enlist and maintain traditional gender roles. In some situations, men may act foolishly to protect the women in their combat units, and end up getting hemselves and that woman killed. There is an argument that if women are in combat positions then they will gain respect from the male population, but the presence of women in a masculine culture would likely become a major problem, like argument s and harassment. Men communicate and act much different around other men then they do women, and that tradition being intringed upon would cause problems within that unit. In my personal opinion I believe women should be allowed into the military, but only to an extent, and only be allowed on the front lines if qualified Just like a male has to be. The whole argument about equality can go both ways. I see that if women try to be in the infantry they are going to get there way by any means necessary, and that would hinder our military greatly. To have a woman in a position she is not qualified for is extremely dangerous. She could get tens of men killed, and she and the person who appointed her would know that someone else should have gotten that Job because they were more qualified. So I believe that women can be in the Military, but there should be some restrictions on what they can do Just to protect the ones that protect us.

Monday, November 25, 2019

History of the Zeppelin essays

History of the Zeppelin essays It is worth mentioning that the rigid dirigibles pioneer had but one prior experience in air travel and no engineering background whatsoever. Count Ferdinand Von Zeppelin was a Prussian military veteran who dreamed of building a fleet of airships to give his homeland an advantage over France in the event of a war. No flying vehicles outside of the balloon existed at this time Zeppelins idea, in short, was to add a skeleton to the existing balloon design to make it easily steered. The Counts vision was rather regal his airships were to be giant and luxurious, looming warbirds to rule the sky. His first test vessel, the LZ 1 (Luftzeppelin), was indeed quite large, 420 feet long and 38 feet in diameter. However, the weight of the ship itself, with its engines and ballast, was a massive 26.4 thousand pounds. This left roughly 600 pounds for cargo, including passengers. Moreover, the craft was only able to fly for 18 minutes. The Count scrambled for more funds to improve his design, but the LZ 2 was not a great step forward. During its test run, both engines failed and the airship crashed into the ground. Count Von Zeppelins tenacity did not allow him to give up on his design. His 3rd test, the LZ 3, flew for over two hours, carrying 11 passengers at 25 miles per hour. It was his LZ 3 that finally gained the military attention Zeppelin had desired if he could perfect his craft to maintain flight for 24 hours, the German War Department would purchase and develop his design. The Count added rear stabilizing fins to keep the craft from pitching dangerously in the wind. His upgraded LZ 3 flew for 8 consecutive hours over a distance of 220 miles; impressive, but far short of the target 24 hours. The LZ 3 ultimately was too small for this feat. A larger craft, one that could hold more fuel and more cells of gas, was necessary to meet the quota. Thus the LZ 4 was developed,...

Thursday, November 21, 2019

Article Review Example | Topics and Well Written Essays - 500 words - 9

Review - Article Example This paper will analyze the works of Piaget, Vygotsky and Erikson and what their theories which were aimed at explaining the growth of the human psychology. This theory was developed commencing from 1920 by Jean Piaget. The research was aimed at analyzing the behavior of children at different ages. Piaget realized that children acquired different traits and behavior when they are at new stages of developments. The theory was also aimed at understanding the psychological changes and developments through each stage of growth. The theory covered the life of a child from birth till adolescent. In the article by Crain (2011) the theory also determined the influence made on language, memory, moral development and scientific reasoning. The article by Van der Veer (2007) refers to the theory as the most conclusive article ever written on human psychology. The theory is by Lev Vygotsky and was aimed at explaining the psychological changes and development in children. The article explains the theories explanation on the psychology behavior in children. The theory relates the change in psychological behavior to the behavioral change children show as they grow. From the theory we are informed as the reason why maturity precedes learning. The theory by Vygotsky provides information to relate maturity to learning and understanding the concepts of life. The relation of language to maturity and psychological development is also analyzed (Van der Veer, 2007). The theory is an articulation by Erik Erikson. From the article by Slater (2003) the article is an explanation of the stages which humans go through from infancy to late adulthood. The article explains the growth sates in eight steps. From the eight stages humans go through constraints and master new challenges that present themselves throughout the stages. In these stages of development Erikson claims that the development of humans depends on their ability to pass through the forces

Wednesday, November 20, 2019

Bridge Management System for Saudi Arabia Research Paper

Bridge Management System for Saudi Arabia - Research Paper Example Hence, there is need for the development of a bridge management system in Saudi Arabia. This study provides a background on the infrastructural setting and bridges in Saudi Arabia. A detailed look at the preservation considerations is followed by inquiry into the improvement considerations available for the existing bridges in Saudi Arabia. The natural hazards that may impact bridge infrastructure in Saudi Arabia is then discussed, followed by a look at the policy considerations, project considerations, economic/non-economic considerations and prioritization to base decision support for the bridge management system proposed. Provisions for updating of the bridge management system are given before providing a summary of the study. Background Saudi Arabia is an oil-dependent economy in the Arabian Peninsula with a $350 billion budget in infrastructure development as of the year 2007. The main infrastructural developmental goals for the country aim to transform it into a global industrial force. According to Business Week (2007), this transformation is to be supported by positioning the country as a regional transport and logistics hub. As a result, plans for the $5 billion budget Saudi Landbridge project connecting the Red Sea and the Gulf Coast to be constructed by a private consortium are underway. The consortium will have a 50 year operating rights on the bridge. The other major project is the Saudi-Egypt Causeway that has a causeway and a bridge component, meant to link Egypt and the Arabian Peninsula to boost development in the region. The project will is projected to cost about $4 billion and will be owned by the two governments. The two bridges described above are an addition to the already existing Jamaraat Bridg e whose purpose is to enable pilgrims to throw stones at the Jamrah pillars. The bridge may sometimes carry about one million individuals, leading to serious safety issues and need for maintenance. The bridge has been under reconstruction into a nine-storey one that will be able to accommodate about 9 million people a day (Saudi Info, 2004). Besides the three bridges mentioned in this background, there are about 4,200 bridges in Saudi Arabia’s highway network. Philosophical Approach As Hearn et al. (2007) argues, bridge management systems represent a unique convergence of a number of disciplines including structural engineering, economics, operations research, planning, and information technology. There is need for prudent data collection to support decision making in bridge management systems. Collection of timely and quality data enables the parties in charge to discern crucial information about bridge conditions, costs of the project and effectiveness. This study calls on the disciplines listed above to produce a formidable report on bridge management in Saudi Arabia. The study will explore the preservation conditions, improvement considerations, extreme event considerations and then detail possible

Monday, November 18, 2019

Formal and Informal Testing Research Paper Example | Topics and Well Written Essays - 750 words

Formal and Informal Testing - Research Paper Example Let us discuss some formal and informal assessment techniques in order to know how they can help teachers assess the learning level of their students. Formal Assessment Techniques Weaver (n.d.) states, â€Å"Formal assessments have data which support the conclusions made from the test†. Such assessments provide ways to the teachers to assess their students’ performance using standardized measures. Two of the widely used formal assessment techniques include non-referenced tests and criterion referenced tests. Non-Referenced Tests Using norm-referenced tests, teachers compare performance of each student to a large number of other students. Teachers prepare one test for all students to compare the performance of each student with the performances of other students. Such tests make teachers know which students is the best performer among all other students. Another advantage is increase in the level of motivation for the students. Such tests provide motivation and appreciat ion to the best performer. When a student is told that his/her performance is the best in the class, it increases motivation of the student. Along with advantages, there also exist a couple disadvantages of using non-referenced tests. First one of those disadvantages is that scores do not show actual knowledge of the students, which students of a specific grade level must possess, rather they show the performance in relation to the individual performances of other students. Moreover, the goal of excellence in class performance cannot be achieved because there is no standard criterion set for exams. Teachers measure performances of students against each other instead of a specific criterion, which does not reflect actual learning of the students. Criterion Referenced Tests In these types of tests, performance of the students is compared to a standard criterion set by the teachers instead of comparing with other students. Such tests provide accurate assessment to the teachers. These t ests help teachers know whether there students have acquired the required amount of knowledge or they need to improve their learning skills. The results of such tests reflect actual skills of students instead of reflecting individual edge of students over other students. If a student meets the set criterion, it means that he/she is learning well in the classroom. Some of the concerns regarding use of these tests for assessment include criterion validity and individual rankings. For these tests, a proper criterion needs to be set. Sometimes teachers set improper criterion that does not properly measure what it should actually measure. Moreover, students like to know their individual rankings but in these tests, they cannot know it because their performances are not compared with others. Informal Assessment Techniques In informal assessment, teachers use multiple ways to assess students’ performance. Sawetch (2009) states, â€Å"An informal assessment can compromise of almost any teaching in the classroom that an individual student has to participate in†. Some of the widely used informal assessment techniques include checklists and oral interviews. Let us discuss both of these methods in some detail. Checklists A checklist is a list of skills, knowledge, and other qualities that teacher creates to know whether their students possess those qualities or not. If a student is short of any specific quality, the teacher can work to improve that quality of the student. Checklist method is not a very time consuming one. A teacher can

Friday, November 15, 2019

Improving WPA and WPA2

Improving WPA and WPA2 Introduction: WPA is an acronym for â€Å"Wi-Fi Protected Access†. It was designed and developed by Wi-Fi alliance as a reponse to the weaknesses and vulnerabilities in the previous wireless security protocol i.e. WEP (Wired Equivalent Privacy). It is a certification program developed by WiFi alliance to indicate compliance with the previous security protocol and secure wireless networks. WPA2: WPA2 is vulnerable to insider attack(If attacker is in the network or somehow gets into the network) under certain conditions. Following are the attacks on WPA/WPA2: PSK (Pre-Shared Key) vulnerability. PSK cracking tool, Eavesdropping. (Attack on PSK Authentication) PEAP mis-configuring Vulnerability. (Attack on Authetication Server) TKIP Vulnerability. (Attack on Encryption) Encyption in WPA2: There are two types of keys used in WPA2 for encryption: Pairwise key(PTK): It is used to protect unicast data frames. Group key (GTK): It is used to protect group addressed data frames like Broadcast APR data request frames. It is used as an encryption key in Access Point(AP) while as a decryption key in Client. Analysis and Improvement of 802.11i (WPA2): The security requirement for WLAN(Wireless Local Area network) industry are data confidentiality. Intergrit, mutual authentication and availability. Primary recommendations: CCMP should be used for data confidentiality. Mutual Authentication must be implemented for security concerns. Addresses DoS(Denial of Service ) in MAC (Medium Access Control)layer. Wireless Threats: Passive Eavesdropping/ Traffic Analysis: An attacker can easilty sniff and store all the traffic in the WLAN. Message Injection / Active Eavesdropping: An attacker is capable of inserting a message into the wireless network with the help of NIC cards(Network Interface cards). Attacker can generate any choosen packet, modify contents of the packet and completely control the transmission of the packet. Message Deletion and Interception: It is done by interfering with the packet reception processon the receivers antenna. eg. Causing CRC errors so that the receiver drops the packet. Message interception means that an adversary is able to control a connection completely i.e an attacker can capture a packet before the receiver actually receives it and decide whether to delete the packet or forward it to the receiver. Masquerading and Malicious AP (Access Point): An attacker can learn MAC addresses by eavesdropping and it can also spoof MAC address. Session hijacking: An adversary may be able to hijack alegitimate session after the wireless devics have finished authenticatin themselves successfully. It can be overcome using data confidentiality and strong integrity meachanism Man in the Middle Attack (MitM): ARP cache posioning is a type of Man in the Middle Attack in case of wired connection. Denial of Service(DoS): An adversary is capable of making the whole Basic Service Set (BSS) unavailable, or disrupting the connection between legitimate peers . Ex. forging the unprotected management frames, protocol weaknesses or jamming of frequency bands with denial of service to the legitimate users. Data Confidentiality and integrity: It defines threee confidentiality security protocols: WEP (Wired Equivalent Privacy). TKIP (Temporal Key Integrity Protocol) CCMP (Counter Mode Cipher Blocking chaining MAC (Message Authetication Code) Protocol). A temporal key (TK) is assumed tobe shared between peers before executing any data confidentiality protocols. Authentication and Key Management: There are two types of Authetication systems: Open System Authetication. Shared Key Authentication. These are not secured so IEEE802.11i definesa new standard viz. RSNA (Robust Security Network Association) RSNA establishment procedure: Network and Security Caability Discovery. 802.11 Authentication and Association. EAP / 802.1X / RADIUS Authentication. 4-way handshake Group key handshake. Secure data communication. Availability: Main cause is due to DoS attack: First, an adversary can launch an 802.11i attack much more easily than a physical layer attack, with only moderate equipment. Second, it is much more difficult for a network administrator to detect and locate these attacks. Layer abstraction is a very important concept in networks, requiring each layer to provide independent functionality separately. Michael Algorithm is used to solve above problems. It woks as follows: When a incorrect packet is detected by Access point, it waits for 60 secs,within this time span of 60 secsif another incorrect packet is received by access point from the same source then it shut down that link. Application: 1. Security for Mobile ATE: The data collected from hardware systems using mobile phones, PDAs application needs to be protected as currently many internet like things are done on mobiles only. We are also aware that the security in mobile phones while accessing internet is not secured.To overcome this, many ATE (Automatic test Equipment) are isolated from networks and run in stand-alone environments. An ATE system describes a single hardware device performing test measurements or a group of devices testing another hardware system. Mobile app developers need to focus on securing data using apps: Configuration of the mobile device. Apps running on the device. Equipment communicating with the device. Wireless connection between the device and ATE. When ATE is sending data out from the device, it can use an https connection, data encryption and user authenticationto ensure that the non-trusted sources will not have access to the data.The wireless connection between the device and the server should be secured using wireless security protocols like WPA,WPA2, HTTPS and AES encryption. Below fig. shows the security concerns for the mobile devices. Fig. Major Mobile Application Server Areas Securing the Wireless Connection: The mobile device should never connect to the ATE system through an unsecure WiFi network. Users must connect to the networks that implements strongest security protocol with encryption included. In strict scenarios, the application must use a secure VPN(Virtual Private Network) to connect to the server. Securing the mobile Device: No amount of coding, server configuration or wireless setup will be useful if the hardware containing the mobile application has already been compromised. Before installing any application on the mobile device, user must check that they have ot already compromised their systems security features by jailbreaking or rooting the device. A jailbroken device is that device where user removes â€Å"Operating system limitations imposed by the manufacturer†. By both of the process i.e. jailbreaking or rooting, all of the security features that the system designers built-in to protect users are put into jeopardy. Securing the Application: Application must not gain too much controlof the mobile device. Each application must be independent of each other i.e one application must not call other application or use resources of the other. Securing the ATE system: The administrator and the developer on the ATE server need to work together to assure that the server providing the mobile apllication data is secure. Most of the data processing must be done on the ATE server side as it is difficult for the attacker to access data and also computing power is ore on server side. (A)Data Acquisition Methodology: Obtaining black -listed IP addresses: It was obtained from a german website, which was not up-to-date. This blacklisted IP addresses were the primary source for quantifying illegal activities. Associating blacklisted IP addresses with geographic locations: IP addresses were never assigned to a specific geographical area or region. IP addresses were assigned to organisations in blocks or assigned to residences through fixed commercials ISPs. Maxmind provided one such tool named GeoIP. The GeoIP tool contains a database of IP addresses and their corresponding global location information viz. City, State, Country, longitude and latitude. Obtaining security statistics of WiFi deployments: The statistics of WiFi deployments such as percentage of secure access points and the number of blacklisted IP address occuring within the specific deployments for cities. (B) Data Manipulation Methodology: It involves processing the data. Depending on the number of IP addresses balcklisted, city were choosen i.e the city having highest number of blacklisted IP addresses were considered. Data Analysis Methodology: We generated derived statistics of fileds such as IP address availability, WiFi network security and the number of blacklisted IP addresses. Results of Data realated Methodology: Suggestion: After 2006, every wireless enabled device is WPA/WPA2 certified and Trademarked by WiFi alliance. The biggest hurdle is that users are unaware of the wireless security protocols and in the security dialogue box also first one is â€Å"None† and after that there is a list from WEP to WPA2. It has been seen that the user choose â€Å"None† or WEP as a security protocol without knowing exactly what that security protocol does as it comes earlier in the list. So, the first and the foremost thing is do make user aware of the protocols and advice them to use better protocol as per the requirements. For Ex.,Corporate world must use the toughest to decipher protocol whereas normal user can use somewhat lighter version of the protocol with good password, but it must never have the Wireless access without any security protocol i.e. none. References: Security for Mobile ATE Applications by Susan Moran. Malicious WiFI Network: A First Look by Andrew Zafft and Emmaneal Agu. Security Analysis and Improvements for IEEE 802.11i by Changhua He and John C Mitchell .

Wednesday, November 13, 2019

Lillian Hellman Essay example -- essays research papers

Comparing Lillian Hellman’s The Children’s Hour and The Little Foxes.   Lillian Hellman was a well-known American dramatist who was born in 1905 in New Orleans ("Hellman," 1999). She later moved and attended New York public schools and went on to go to New York University and Columbia University as well. Within the confines of her youth, there had been confusion about her family background (Harmon, 1999). There has always been talk about her parents troubled marriage and other events have cropped up to make Hellman an intriguing figure. Yet, she went on to grow up and find a husband, something typical in her day. She married another playwright named Arthur Kober, but this relationship ended in divorce ("Hellman," 1999; James, 1999). Her intimate friendship with the novelist Dashiell Hammett would continue until his death in 1961 (1999). Yet, Hellman would never remarry. Hellman did not begin to write plays until the 1930s, her dramas are well known for focusing on various forms of evil ("Hellman," 1999). Her work has not escaped criticism however. She has been criticized at various times for her doctrinaire views but she nevertheless kept her characters from becoming social points of view by including credible dialogue and a realistic intensity which put her a step above her peers ("Hellman," 1999). Indeed, Hellman wrote with the skill of a professional but the emotions of a child. I feel she was able to capture the innermost fears and thoughts of people, drawing on their most hideous features. In the encyclopedia Hellman is described as an American Dramatist, whose plays are distinguished for the forcefulness of their matter, usually a condemnation of personal and social evil. They are also notable for character development and expert construction (Encarta). These points come through clearly in both The Children's Hour and The L ittle Foxes. Interestingly, Hellman seemed to entitle these works in an innocuous but mischievous way. In a variety of works, it appears that Hellman’s themes have all centered around evil and lies. They have drawn on things that, for the most part, people do not like to look at. Her works are truly disturbing, as she forces the audience to dig deep into their own psyches. It is important to note that Hellman had grown up in interesting times. She was a teenager in the Roaring ... ...x Plays by Lillian Hellman. New York: Vintage Books. pp. 1-78 Hellman, L. (1979). "The Little Foxes." Six Plays by Lillian Hellman. New York: Vintage Books. pp. 147-199 James, C. (1999, May 31). "That 50's Cocktail of Hellman, Hammett and the Red Scare." New York Times, pp. E1. Kaupunginkirjasto, K. (2000, July 22). "Lillian Hellman (1905-1984)" [online]<www.kirjasto.sci.fi/lhelman.htm> McHenry, R. (1995, December 20). "Hellman, Lillian (biography), Her Heritage: A Biographical Encyclopedia of famous American women" <electronic library> Reuben, P. (2000, July 22). "Chapter 8: American Drama-Lillian Hellman." PAL: Perspectives in American Literature- AA research and reference guide. [online]<www.csustan.edu/english/reuben/pal/chap8/hellman.html> Webb, K. (2000, July 22). "It’s all a lie: Destructive dishonesty in the works of Lillian Hellman." [online]<http://www2.rpa.net/~webb/kaw/allalie.htm> Wright, W. (1996, November 3) "Why Lillian Hellman remains fascinating." New York Times pp. H9.

Monday, November 11, 2019

Save a Girl Child

GIRL CHILD IN TODAY’S SOCIETY The female child in India has been most vulnerable for centuries. We are committing the worst crime against humanity when we don’t even allow children to be born just because they carry the stigma of being girls . The poor infant girls have no choice because they are killed inside the womb of their mothers or killed after birth in parts of Bihar ,Tamil Nadu ,Rajasthan and other parts of India. We forget that only girls take care of their parents and their in-laws also. they are always giving a helping hand. Only girls when they get married take care of their children. They are really responsible for any duties they take on. Usually girls are the topper in board exams. Still we don’t welcome them. Then ask yourself why do we behave like this? Aiman Muskaan V-C THE GIRL CHILD â€Å"GOD COULD NOT BE EVERYWHERE, SO, HE CREATEDMOTHERS†A MOTHER IS A HIGHLY ADORABLE FORM OF GIRL CHILD. Children are the blooming buds in garden named ‘earth’ A child brings immense happiness in the family . Children are a special gift from the almighty to a family and particularly a girl child is a wonderful blessing because the birth of a girl child is a symbol of incoming prosperity . A girl child is a living deity on this earth. A girl child plays a vital role in the upliftment of society . as they usually are apostreles of care, kindness, adoration and understanding . everybody should respect – respect the girl child as she is future of nation. â€Å"Give me good mothers; I will give you good nation! † YASHICA CHUGH V-C CHANGES IN A GIRL CHILD IN TODAY’S SOCIETY Girl child is a topic of discussion today also in India. Nowadays girls have gone is a topic of discussion today also in India. Nowadays girls have gone much ahead than boys and are working in similar or better positions than boys. They have their best in every field like-wrestling, sports, and business as they too are capable and equal to boys. Example of such great women are-Indira Gandhi, Kiran Bedi, PT Usha. But even now in some places the position of a girl child remained unchanged. They are killed. On other hand some people think opposite. They educate their daughter and treat them well. Government is giving free education to girls. They are working on good posts like-IPS officer, president etc. They are good role models as housewife, mother or sister, I am proud to be a girl. UJJWAL NEGI V-C

Friday, November 8, 2019

QUEBEC HISTORY essays

QUEBEC HISTORY essays Quebec is an important province of Canada with a population of around 7, 487, 200 according to current statistics. The significance of this province lies both in its size and its interesting rich history. Majority of Quebec population is composed of French speaking people, making it one of the most influential and biggest French areas in North American region. Quebec is a huge province as far as occupied area is concerned. It is almost three times the size of France. Quebec's history goes back to early 16th century when it first explorer, Jacques Cartier, set foot on this region in 1534. The province has been known as the cradle of Canada because of the fact that it served as a gateway to other Canadian regions. Some history of the place must be known in order to understand why French-speaking people largely occupy Quebec. It also helps in understanding the problem that Quebec has faced due to the conflict between English and French-speaking Canadians and how the two sections differ in their views on various issues. Quebec became an important area for trade and business in 17th century when explorers, fur traders and missionaries thronged the place. However these economic activities were halted in 1663 when King Louis XIV turned Quebec into a colony and it became New France'. However New France did not remain in French occupation for very long as in mid 18th century, British took over this region and turned New France into Quebec. Since the French had left an indelible mark on the cultural and economic fabric of the place, Quebec people were allowed to practice and retain their culture under the However while the law had been formulated and French Canadians were given rights to retain their cultural and social traditions, it was never easy for the British to rule the French in Canada since the latter were hostile towards the former and this hostility o...

Wednesday, November 6, 2019

Learning Journal Entry Essay Essays

Learning Journal Entry Essay Essays Learning Journal Entry Essay Essay Learning Journal Entry Essay Essay Team LeadershipThere is always the need for any team leaders to motivate his or her members for the best results. It is essential for any team leaders to employ strategies that will aid in motivating the team members to focus on productivity and the needs of their working environment. As a student of team leadership, there are various concepts I gained from the motivation session. It is an integral part of any team that wants to succeed and for any team leader that wants the best output from the members. The session focused on how to motivate team members and the various kinds of motivation available for any team leader. These were constructive motivation and restrictive motivation. I learned that constructive motivation comes mainly through incentives and a working environment that the team enjoys. Therefore, the team will want to be engaged in the team activities thus giving the needed output. The team leader may offer rewards to members who seem to be reaching their targets or surpassing them. Such an incentive will encourage them to work more and the rest of the team to improve their productivity. There is also restrictive motivation where team members have to give what is expected of them. In such instances, a team leader may employ disciplinary techniques for those who seem to be lagging behind. The team leader will spell out actions from members that will warrant disciplinary action, and therefore this will act as a motivation to work. I, therefore, learned that an effective team leader would need to employ the use of both types of motivation to ensure that he or she does not lose respect from the team but also maintains a positive working relation with every individual within the team.

Monday, November 4, 2019

The socio-cultural repercussions of Language identiity on English as a Essay

The socio-cultural repercussions of Language identiity on English as a Second Language instruction - Essay Example Most of the business activities are international at present because of the Globalization and Liberalization policies implemented by majority of the countries. An international language is essential for the business world in order to establish proper communication between the organization and the diverse customers. Because of the above facts, most of the countries where English is a foreign language, adopted English as a second language in their educational curriculum. â€Å"More than 200 million children in China are studying English, a compulsory subject for all Chinese primary school students† (Teaching Language for National Security and American Competitiveness) â€Å"The need for a common international language with the expansion of a global communication network has made the English the language of choice† (TESOL& Dang, p.9 ) Even the native speakers of English, like the Americans, the British or the Australians use or speak English differently. The accent and vocabulary of English is different in these countries. Many factors like the social and cultural differences contributed heavily to these differences even though the essence remains the same. The non-native English speakers who learn English as a second language are coming from different social and cultural backgrounds. These differences have a significant effect on their English language learning abilities. It is not possible for the Chinese to learn and speak English same way like the Indians though both India and China are non-native speakers of English. Communities or cultures which have similarities or relation with the English culture may learn the English quickly compared to others. For example, French language has lot of similarities with English and the French people can learn English quickly compared to others. People who are staying nearer to the English speaking countries can also learn the English language quickly compared to others. Economy also can play a vital role in

Saturday, November 2, 2019

The Systems Development Life Cycle Essay Example | Topics and Well Written Essays - 750 words

The Systems Development Life Cycle - Essay Example This involved establishing the business processes used by the company. This is necessary so that the processes are redesigned to take advantage of the modern system solutions operating characteristics. Data analysis is also quite useful in the determination of the system requirements. To accomplish this, a study on flow of information in the organization is carried out in order to come with dataflow diagrams that will be quite important in the design of the system (Somers & Nelson, 2004, P.258). Decision Analysis is meant to identify the decisions that are made by the manager. The main decisions that are made by the manager are identifiable at in individual level. Gathering of this information will help in the actual development of a system that will assist the managers to make decisions (Somers & Nelson,2004,P.259). This method is valuable when the primary objective of the system is decision support. There was also process analysis that was meant to review business processes of the company. In this stage, the processes of an organization are identifies and divides into a number of events that can either change or add data. Modification and reengineering of these processes help in improving the operations of the organization through improving service, cost reduction, quality and management information The development of an accounting information system can be successful if the process is divided into different phases or stages. The phases in the field of software development is referred to as System development life cycle(SDLC) which comprises Planning and Investigation, System Analysis,Design,Coding ,implementation, maintenance and Follow up. The planning and investigation phase needs the creation of a team to carry out an investigation on the current system and provide recommendations to a steering team. The main focus of the team is to come up with a way handing the request of