.

Monday, September 30, 2019

Proposing a solution

One of the most vital problems that are being faced by many countries and communities today is that of electricity and power shortages. It is problem that is growing in magnitude as time passes. This problem basically arose because the entire world power generation is through coal and oil. These are depleting natural resources that have also become extremely costly today. Another problem with using such kinds of resources is that they also consume at of time in manufacturing. The cost of such projects is also very high. Another problem is that there is also much loss of the power that is produced during the process.For example if a plant is capable of producing about 800 mega watts of energy at a particular time, then due to the inefficiency of the machines it is only able to produce 670 mega watt and the rest of the energy is lost in the process. Energy is one of the most important components of productivity and growth. all the countries that have become industrialized or are in the process of industrialization are making extensive use of electricity. Besides the industrial users there are domestic users. Today every person has some sort of usage of light.Electricity has become one of the most important components of the human lifestyle. Today it is in fact unbelievable to think of a life without using light. Many of the developing countries are still facing huge electricity shortages in their country. For example in Pakistan we hear people protesting about the extensive load shedding that takes place on daily basis. Also many developed countries are finding it very difficult to fulfill the growing needs of the consumer. The better the buying power of the people in a country the more electricity they consume.Today we see that the entire appliances are in some way or the other dependant upon electricity either for charging or actual usage. Without electricity a person actually feels paralyzed today. Because nothing seems to work. In this age of information tech nology where everything is computerized and mechanistic. All the workings and transactions that take place on real time and otherwise use power. There are many solutions to this arising problem that have been suggested by the experts over the years. One of the most prominent solutions is to remove the dependability form electricity to some alternate resources.And the other solution is to save the energy or increase the production. In order to save energy there is a constant need to educate its users. With education I am referring to awareness. The energy crisis is not new to any generation therefore a small effort on the part of the government and the social organization can have a great impact on solving the problems. We have to agree that every individual in this world is in some manner wasting the energy. Despite the fact that every one is paying the due share of energy they use.But the problem is that if we waste energy there are not sufficient amounts left to be used by the des erving. An example of the wastage of energy is in offices we notice that they don’t switch of the lights when the employees leave. There are centrally air conditioned office spaces that are consuming large amounts of electricity. Many streets lights are not turned off in the early morning that can save energy. Therefore if a conscious effort is made on the part of every individual to save energy then the entire nation shall benefit from this action.Also saving energy will further improve the correct distribution of energy. In short the industries shall become form efficient and productive. Another solution to the problem is the use of alternate resources of energy. There have been many sources of energy for example the thermal, hydro, wind, solar, gas etc. and there has been research going on for many years to come up with other ideas that can be used as alternate resources of energy. Apparently one of the problems with the present system of electricity generation is that it is not environment friendly also.Therefore the other prescribed methods are far more independent and are much more environment friendly. The first alternate form is the wind power generation. Usually places that are situated near the sea or are at a height have a lot of wind that travels at great speeds. Certain fans are installed in such places that when pushed by the wind force other machinery to move and the pressure generates electricity. This is a viable source of electricity generation. The second alternate form of energy is through the use of water. The sea water travels at great speeds and has a good amount of pressure.Today we see many dams that are built at large rivers and seas. From which water flows at a great speed. This speed and pressure is used to generate electricity. Many countries are making effective use of this method of power generation. The third most used technique is the solar power generation. It is an alternate type in which the solar energy is captured t hroughout the day and is used in the generation of energy and many other things. There are also many other forms and alternate sources of power generation. For example the bio gas.But the question arises here why is it that the world hasn’t adopted any of these methods on a large scale. The answer to this is that all the methods that have been described above have some sort of limitation. If we take water there is some times that the speed is not as expected. It keeps on fluctuating. During the floods it is very high while in some parts of the year it is reasonably low. Same is the case with wind. The wind along with its speed also changes direction. This is a subject of great concern. . The solar energy plant has also not advanced to that an extent that it can totally replace the former systems.Another reason for them being not successful is that these methods require a lot research and are not cost effective. They also do not remove the dependability from natural resources. Therefore in order to deal with this problem effectively the only way is to use a combination of these resources. And whatever proves to be the most effective the greater burden should be shifted to that factor. In this way the dependence could be diversified and no single entity will have to bear the load of power generation. The dependence on oil and gas can prove to be very expensive in the future.As these resources are depleting and the prices are being raised on a phenomenal level. It is essential to tackle this problem in a intelligent manner. Works cited Feldman, David. F, The Energy Crisis: Unresolved Issues and Enduring Legacies, Edition: illustrated Published by Johns Hopkins University Press, 1996 Green, Jen, Energy Crisis, Edition: illustrated Published by Chrysalis Education, 2003 Richard P. Runyon, Richard. P, The Energy Crisis: [the imminent crisis of our oil, gas, coal and atomic energy resources and solutions to resolve it], Published by Crown Publishers, 1972

Sunday, September 29, 2019

Question: Discounted Cash Flow

Exam 2 Part 2 Answer any EIGHT of the ten questions. Each question is worth 5 points. Return your answers to me by 11:59 PM Sunday 11 November 2012 1. A number of publicly traded firms pay no dividends yet investors are willing to buy shares in these firms. How is this possible? Does this violate our basic principle of stock valuation? Explain. Our basic principle of stock valuation is that the value of a share of stock is simply equal to the present value of all of the expected dividends on the stock.According to the dividend growth model, an asset that has no expected cash flows has a value of zero, so if investors are willing to purchase shares of stock in firms that pay no dividends, they evidently expect that the firms will begin paying dividends at some point in the future. 2. Explain why some bond investors are subject to liquidity risk, default risk, and/or taxability risk. How does each of these risks affect the yield of a bond? Liquidity problems exist in thinly traded bond s making some bonds difficult to sell at their actual value. Default risk is the likelihood the corporation will default on its bond obligations.Taxability risk reflects the fact that some bonds are taxed disadvantageously compared to others. If any of these risks exist, investors will require compensation by demanding a high yield. 3. The discussion of asset pricing in the text suggests that an investor will be indifferent between two bonds which have equal yields to maturity as long as they have equivalent default risk. Can you think of any real-world factors which might make a given investor prefer one of these bonds over the other? 4. Why do corporations issue 100-year bonds, knowing that interest rate risk is highest for very long-term bonds?How does the interest rate risk affect the issuer? Treasury bonds make great safe, long-term investments, but is there any point in Why would the Fed consider issuing a bond with a 100-year maturation, are backed by the U. S. Government and typically have a very slim risk of default. 5. The market value of an investment project should be viewed as the sum of the standard NPV and the value of managerial options. Explain three different real or managerial options that management may have, what they are, and how they would influence market value. 6. Explain the use of real and nominal discount rates in discounting cash flows.Which is used more often and why? Discounted cash flow (DCF) analysis is a method of valuing a project, company, or asset using the concepts of the time value of money. All future cash flows are estimated and discounted to give their present values (PVs) — the sum of all future cash flows, both incoming and outgoing, is the net present value (NPV), which is taken as the value or price of the cash flows in question. Using DCF analysis to compute the NPV takes as input cash flows and a discount rate and gives as output a price; the opposite process — taking cash flows and a price and infe rring a discount rate, is called the yield.Discounted cash flow analysis is widely used in investment finance, real estate development, and corporate financial management. 7. Consider two firms with the same P/E ratio. Explain how one could be described as expensive compared to the other. 8. Explain how important a firm's growth is by creating an example of a growth and no-growth stock. 9. Everything held constant, would you rather depreciate a project with straight-line depreciation or with MACRS? 10. A local bank is contemplating opening a new branch bank in a large superstore across town from their main office.It is estimated that the new branch will generate $20,000 after expenses each month. The manager wonders if all these revenues should be considered an incremental cash flow. Given this information, explain which of the following statements is correct. A. $20,000 is generated by the new branch bank and therefore it is an incremental cash flow. B. We would first need to asses s the opportunity cost of placing a branch in a different location to answer this question. C. Some amount less than the $20,000 is incremental because of substitutionary effects. D. Some amount less than the $20,000 is incremental because of complementary effects.

Saturday, September 28, 2019

Nursing shortage and its effects on the provision of health care Term Paper

Nursing shortage and its effects on the provision of health care - Term Paper Example Despite renewed efforts at reform in most European countries, the number of uninsured people continues to grow, the cost of healthcare continues to soar, and the safety and quality of care are queried. The great challenges of the healthcare system need significant attention on the part of health experts, policy makers and the society. One problem that has continued to dog the health care sector over the last five years has been the perennial shortage of registered nurses as well as other health care professionals as a demonstration of the fragility and faults in the health care system. For health care delivery to be efficient, reasonable, and inexpensive, there must be an ample stream of knowledgeable, well spread and employed certified nurses. While the general quality of care seems to have responded progressively to the rising emphasis on evidence-based practice and performing procedures, major inequalities in quality stubbornly persist. The health care system and the nursing profe ssion are once more witnessing a shortage in nurses that is augmented by shortcomings of the system and the ever-rising need for health care, as the baby boomers grow old. The intricate environment of challenges of the health care system requires major attention on the part of health care professionals, policy makers and to a smaller extent the public.In all the health care literature available today, the widely accepted elements of health care reform are the ability to get health care, its quality, cost, and the workforce.

Friday, September 27, 2019

Explain the reasons why left realism emerged Essay

Explain the reasons why left realism emerged - Essay Example Therefore, to fill in the radical vacuum that was prevalent in left-realists thoughts regarding crime, the left-realists had to take a position. This was meant to balance the extreme ideas regarding crime, which were being advanced by the right-realists on the one hand, and the left idealists, on the other hand (Young & Matthews, 1992). Upholding the view that crime was a matter of free will and personal choice as opposed to a behavioural problem, the left-realists emerged to criticize the politics of establishing longer sentences and more prison facilities (Matthews &Â  Young, 1986). Rather than addressing crimes through the concentration of criminals in prisons and rehabilitation centres, left realism advocated for the political class to take the causes of crime seriously. Further, the concept of left realism required that victims of crime must be taken even more seriously, considering that the fear of crime is not irrational, and everyone stands the chance of being a victim of crime (Lea, 2002). In this respect, the left-realists sought to criticize the distorted view that was being advanced by the right-realists and the left idealists. While the right realists cited crime as a function of a sick society full of moral decay and crime that is out of control, the left idealists did not take crime seriously, and thought it was simply a form of exaggerated societal panic (Lea & Young, 1984). The major focus of left realism is the victim, who should be the main concern of criminology. The left-realist also advances the view that it is out of the prevalence of unstructured inequality and perceived social injustices, that crime finds a breeding ground to grow and thrive (Matthews &Â  Young, 1986). Thus, left realism regards the establishment of better and equitable policies as a means of addressing the crime problem. The view of left realism is

Thursday, September 26, 2019

Behavioral finance Assignment Example | Topics and Well Written Essays - 2500 words

Behavioral finance - Assignment Example Modern financial economics are pegged on the assumption that financial practitioners act both meticulously and with rationale. However as evidenced and earlier stated, this is not always the case. These deviations from the norm are not rampant and inherent but follow a systematic chain of events. With this information in mind it is possible to incorporate these systematic human deviations into the standard model of financial markets (Rutledge 264). In so doing, two commonly overlooked mistakes come to the foreground: Financial practitioners tend to indulge in excessive trading with belief that the next trade will rake in more lucrative returns. This is irrational trading and is propelled by emotion rather than rational thinking. The human trait of being too overconfident or corky in this case is the key driving motivation behind this bias. Some financial practitioners are also in the habit of holding on to losing stocks while at the same selling their winning stocks. This again is in stigated by lack of confidence and the need to avoid both failure and regrets coupled with poor judgments. Behavioral finance contributes to asset pricing in two major dimensions. These dimensions are reached upon by use of agents which may in them are not completely rational. These are: I. Limits to arbitrage This argues that the damage caused by irrational traders in their irrational deviations may be difficult, if not impossible to be undone by the more rational trades. The traditional asset-pricing model does not factor in market frictions and greatly undermined trading frictions like transaction cost, bid spread, ask spread etc. These forces have a great impact on asset returns and therefore should not be ignored. The limits to arbitrage create a model where mispricing exist for the simple reason that risk adverse arbitragers are not concerned mainly with the riskless values of an asset, but about the price of assets in periods following these irrational traders. This model con siders the cost of arbitrage more so the volatility returns and states that the habit of mispricing will inevitably dominate markets especially in the cases of highly volatile stocks whereby arbitragers may avoid the risky volatile position. Finding mispricing is a tasking affair and may involve institutional laws that should regulate the type of trade to be done. For instance short selling which is essential to effective arbitrage including cost of borrowing, legal fees and liquidity risk is not allowed in mutual and pension funds. Therefore there should exist a cap on the limits to arbitrage. II. Psychology: This helps in creating a continuum of deviations spurning from full rationality to completely irrational. The known concept of asset pricing therefore is in a very vibrant flux whereby there is a slow paradigm shift from the completely irrational approach to a more accommodating broader outlook based on the psychology of investors. Risk and misevaluations are therefore the two main determinants of the security expected returns. This is roughly based on a concept by Savage (183) which is a decision making method with imminent or existing risks in consideration. This concept is known as the Subjective Expected Utility whereby it is widely

Wednesday, September 25, 2019

Market Opportunity Analysis - Walmart Essay Example | Topics and Well Written Essays - 3000 words

Market Opportunity Analysis - Walmart - Essay Example Changing demographic data such as growing population, ethnic diversity, income, percentage of single parents and percentage of people living in metropolitan triggers four prospects—more food for growing population, more easy-to-prepare foods for single parent households, more variety of products for diversified people and more upgraded foods for individuals with higher incomes. (Umberger, Thilmany and Ziehl p9-13) Nowadays, consumers are changing their buying patterns to be online because of lower prices and available 24/7. Consumer tastes can be different based on another demographic factor: age. For example, consumers under 35 years old are most likely to be interested in domestics (73.3%), lawn & garden (71.4%), stationery (66.7%), personal care appliances (65.5%) and glasses and dishware (60.0%). (Negley) And the willingness to switch brands also depends on the age groups—for instance, consumers over 50 years old have strongest loyalties. Jennifer Negley also claimed that the loyalties of consumers were falling down. It could be seen in groceries and canned food products which possessed 84% loyalty in 1993 and shifted to 73% in 1997. Wal-Mart, the largest retailer in the world, is operating in the highly competitive retail industry in both local US market and international market. Wal-Mart Stores, Inc. is based in Bentonville, Arkansas, and comprises of four separate retail segments namely Wal-Mart Supercenters, Discount Stores, Neighborhood Markets, and SAM’S CLUB. As of January 31, 2010, the company operated 2,612 Supercenters ,891 Discount Stores, 153 Neighborhood Markets and 602 SAM'S CLUB warehouses and in the United States. (Wal-Mart Annual Report, p 14) There are 3,615 Wal-Mart units outside US including countries such as Mexico, Canada, Brazil, UK, China and Germany. The retail products available at Wal-Mart include general merchandise such as household goods, apparels, jewelry, health & beauty products, electronics, toys, fabrics, shoes, garden appliances and crafts. Along with other retailers in the industry like Kmart and Sear, Wal-Mart is facing the changing consumer buying patterns and prefere nces. The essence of Wal-Mart’s success is its ability to purchase a huge amount of goods and re-sell them to customers with lower prices. It also intends to sell quality products at the same time. So, it would be a high risk if it could not predict correctly on which items to be purchased to meet the changing consumer tastes. As we learned that consumers from different places prefer separate items, it may affect on setting localization strategy for each international unit. Next, as Wal-Mart is selling many products across several product lines, it is more inflexible to change compared to its competitors who only focus on one or two product lines. If consumers change their tastes in one product line, the competitors can adapt with customers’ preferences more easily than Wal-Mart can. Moreover, it is vital to catch up with changing consumer’s online behaviors for the effects can be critical for how Wal-Mart’s online store should be shaped. 2. How well are these changes in customer tastes and preferences being reflected in competitive strategies in the industry? Changes in customer tastes and preferences are reflected in competitive strategies pursued by different retailers in the industry. Competitive strategies help an organization to build a competitive advantage which is the result of having superior performance over competitors. (Hill) And that advantage makes a

Tuesday, September 24, 2019

Human Resources Essay Example | Topics and Well Written Essays - 4000 words

Human Resources - Essay Example The more common usage within corporations and businesses refers to the individuals within the firm, and to the portion of the firm's organization that deals with hiring, firing, training, and other personnel issues. This article will address both definitions." This has come to be regarded as the most integral part of businesses today globally. The labour is an asset in the businesses of today and the way it is managed has loads of effects on the performance and efficiency of the business. Labour is the most important component of the production function. It is the only factor of production that could be changed in the short-run and its performance depends upon a lot in the way it is managed and controlled. The bad and poor management of labour could easily turn it into a liability that would perform inefficiently and thus, the business on the whole will suffer a setback. The human resource department in the company these days has a proper hierarchy and organisational culture and the head of this department is regarded as an important member of the business itself. It is a position that requires constant interaction with the labour and is of great consequence for the firm. The recruitment of labour and the quality and quantity of labour recruited depends upon the human resource department. ... We often come across the terms human resource and personnel management. This leaves confusion in the minds of some whether both are the same or have different meanings and connotations. There is in reality a slight difference between the two. The personnel management could be seen as a prelude to the contemporary human resource management that is prevalent and found amongst the organizations today. We can actually search for and find the concepts relating to human resource management in business literature of old times such as the decade of 1970s.These concepts include theories such as human capital theory and human asset accounting. The contemporary and modern view of human resource management gained recognition in the year 1981 when it was included in the course of the famous MBA of the prestigious Harvard Business School. It was a kind of a prelude and introduction to the kind of courses throughout North America and the rest of the world making this version and interpretation of human resource management highly popular and in vogue. Other interpretations of the concept were developed in Michigan and New York. These ideas travelled to other countries in the decades of 1980s and 1990s that included Australia, New Zealand and Northern Europe including specifically the UK, Ireland and Scandinavia. South and South-East Asia and South Africa also got a taste of the approach. Nowadays, the HRM approach is successfully practiced in many countries of the world. Besides being influential it is practised in many parts of the world. It is essentially practised anywhere where businesses want to prove their mettle and become successful. It is an approach used by businesses; small and big alike. It is also recommended by

Monday, September 23, 2019

PMP application Essay Example | Topics and Well Written Essays - 1000 words

PMP application - Essay Example I laid out an effective technical plan as to how system upgrades and server migration would take place. I served as the liaison to internal and external auditors. I chaired the monthly patch review meeting. In the execution phase, I directed the system administrators make a journal that would record all changes being made to the desktop systems so that we could recover in case of a mistake. I held meetings on daily basis to keep a track of every step. My company wanted to move to a server which had different PHP deployment method. I created, on the destination server, duplicates of each extra SSH/SFTP user, database and application that were on the original server, copied all files to the destination server, and created DNS overrides for the testing part. I told my teammates to make entries in the website to access the content of destination server. I told them how to upgrade the DNS overrides to point to the migrated server. Lastly, we waited for these changes to propagate, and clea red the original server. I was responsible for the first four phases of project management in this project. I helped my teammates with the concept development for the website. I defined the purpose, stakeholders, the basic outline of the organization’s biases, limitations and initial requirements, and the deliverables. I analyzed the executive requirements, business benefits and goals, implementation requirements, functional and financial requirements, infrastructure requirements, and technical analysis and design which included an analysis of the hardware and software tools needed. I, along with other members, wrote down the briefs, set the milestones, and assigned tasks. After briefing the client visually, I laid down basic components of the website and plotted out how they were going to work along. Risk evaluation was one important step in which I balanced the project’s time and cost. I created the staging environment and began the production guide to which I added all the

Sunday, September 22, 2019

Executive Summary Memo Assignment Example | Topics and Well Written Essays - 500 words

Executive Summary Memo - Assignment Example We also hope to become the most desired tourist destination both for the domestic and international tourists. In future, we plan to relocate to the central business development which we believe will provide us with an advantageous place. The tax incentives will give money to establish another business (Tracy, 2000). We are aggressively planning to increase the sales in the second year by about 55%. By creating a new bakery, Olympia Bakery will increase its sales volume by at least $240,000 over the next three years while maintaining the gross margin of 77%. Through the philosophy of â€Å"all is possible† regarding the products and services, Olympia Bakery will establish itself as an exceptional dessert supplier in the larger Michigan. We will gain a competitive advantage in take out. The summary outlines the concept philosophy and financial forecasted financials. Olympia Bakery is a hospitality company that is dedicated to providing high quality products in free and fair atmosphere for the clients within and without the city. Our intention is to make profit and return to our investors to continue financing our company. We strive to maintain friendly and fair relationships (Pinson, 2004). In addition we maintain creative work environment with respect to culture diversity, ideas and handwork of the members This information is necessary for the customer and the potential financier to our bakery. This information informs the customer of the company stand and is potential in the future. It can be found online at

Saturday, September 21, 2019

Father Brown vs Brother Cadfael Essay Example for Free

Father Brown vs Brother Cadfael Essay Father Brown and Brother Cadfael were both men of the church who were put into situations where they needed to solve some sort of crime. Unmistakably the two had similarities in how they solve the crime. Who would have been better to solve a crime than a man of God? They had their differences in how they did their job as well. Most of all, they had the biggest difference, which is the dissimilarity in what they believed. They didn’t solve the same crime, but how they did it was similar in certain ways. Brother Cadfael and Father Brown were both crime-solving men, who had some similarities. They were both behind the scenes doing work, as they tried to find clues in there own way. Ultimately Brown was more observant with his listening, while Cadfael was more observant with his sight and his touch. They were very similar in some ways and both wanted to get the job done. The notably natural detectives both share the want to solve the crime. Although they have many similarities, they also have many differences. Cadfael and Brown undoubtedly had the want to solve the crime, but how they solve it is the difference. Naturally, the two â€Å"detectives† have a lot of differences ranging from a variety of things. Cadfael had to touch the body and had to get into the nitty gritty work, while Brown listened and observed from a distance. Brown could find out who did it and what happened fairly quickly while it took Cadfael much longer to understand what happened and who did it. Cadfael had a rough life in the army and joined ministry because he wanted a quiet life. He did not join in because he wanted to serve the Lord. Brown loves the lord and people and that was a big difference between the two. Brown was very observant and knows different characteristics, such as on page 84 in the story â€Å"the salad of Cornel Cray† Brown says â€Å"real madmen always encourages their own morbidity. They never strive against it. But you are trying to find traces of the burglar; even when there aren’t any. You are struggling against it. You want what no man wants. † This insists that Brown knew far more about people’s habits than Cadfael did. The two of them had a lot of differences and they were as close to opposite as you could get. They had differences of solving the case but also in how they view what was going on. There way of the solving the case was different and so was their world view. Brown wanted to solve the crime and to make the world a better place, while Cadfael just wanted to get it over with so that he can go back to his peaceful life. Specifically, Cadfael was a man from the army before his life in the church. All Cadfael wanted was a life of peace, especially from his service to his country. Cadfael had felt no remorse from the men he had killed. Cadfael wasn’t doing some of the work for God he was doing the work for himself. Brown was doing what he did for God and so that the world would be a better place, and not for his own good. The cautious but completely clever Father Brown had a sense of heart, when a war hero was the bad guy he didn’t do anything because he didn’t want to bring disgrace to a national hero. Cadfael would possibly want the glory to be brought to him, and Brown would want everything be solved, they are very different on their view of how things work. Father Brown and Brother Cadfael were crime solving, God following men. Under one God they serviced. They were alike in some ways. Also they were different in many ways. When it came to their worldview, the two of them were very far apart. When it came to crime solving they had a few similarities. They also had lots of differences and each had their own advantage in that case. When it comes down to the point they get the job done. Altogether they both had their strengths and weaknesses. The aggressive detectives always did get the job done.

Friday, September 20, 2019

Examining The Match Fixing Of Sports Games Information Technology Essay

Examining The Match Fixing Of Sports Games Information Technology Essay Nowadays match-fixing is done in organized sports. Match-fixing is a done in the sports as a game played at a predetermined result. In whole or in part, in violation of rules and often the law as well. If the race is a sporting competition in question, the event is called a record of the race fixing. Games, are know as thrown games which are lost deliberately. When a team intentionally lose a game or have not been as high as you can get a perceived future competitive advantages rather than the players could participate, the team is often said that he plunged the game instead of throwing it. HOW IT WORKS:- Thrown into the game when motivation for the game(thrown game), need contacts or agents between players, gamblers, team officials and/or arbitrator. These contacts and bookies can sometimes be found and lead to prosecution by law or by the sports leagues. In contrast, the inner tank is individual act of team so it is hard to prove. Often by replacing the coach is designed to increase the chances of the losing team, often containing one or more key players sit, rather than order the players on the field made intentionally under perform, was cited as a major factor in cases where the reservoir has been claimed. Most of the time match-fixing is not an individual act. There are countries, groups, bookies or gamblers, team management, players, referees or umpires. To investigate match-fixing using link analysis we start from the top node means country and go down to the last node means players. Link analysis often explores associations among different object of different types. For investigating match-fixing application we might examine relationships among suspects, including their home addresses, hotels they stayed in, wire communication received and sent, flight schedules, hotel check in and outs, telephone numbers they dialled or received during the suspected time. All these things have been checked for each and every node, for players to bookies to team management and so. The ability of link analysis is to represent relationships and associations among objects of different types has proven crucial in helping us in investigating comprehend complex webs of evidence and draw conclusions that are not appeared from any single piece of information. Link analysis can be used to expose the underlying patterns and behaviours pertaining to match-fixing investigators. As we know link analysis is a data mining technique that reveals the structure and content of a body of information by representing it as a set of interconnected, linked objects or entities. For a match-fixing investigator first analysis the match, then look for individual acts of different nodes. Investigate the hotel check in and out of each node, telephone records, meetings, bank details, money in and out. These all Beeb examined by link analysis and look for some common nodes. Linkage data is typically modelled as a graph with nodes representing suspects of interest to the analyst and the links representing relationships and transactions. Like collection of telephone data with phone numbers, times of calls, and duration of calls. By collecting all these information and putting all this on a graph representing each with nodes and link them, it will be much easy to investigate the match-fixing process. Q-2. Write an essay on each of the following topics: Industrial Espionage; Executive Fraud; Cyber Extortion. INTRODUCTION:- One of the troubles within grounds of information pledge is that there are few creditable threats of information systems. We also find problems, troubles of facts compilation during this part, with no departing into facts there are many reasons to believe that many people do not realize that the intrusion occurred and that many of those was not reported so that the growth of numerical stand permits. The US National Counter intelligence Centre (NACIC) which afterwards turn into the agency of the state Counter intelligence exclusive (ONCIX) have be staling yearly towards Congress ever since 1995 on strange financial compilation plus industrialized spying. industrialized spying is performed into two major types. Here short, the reason of spying is in the direction of obtain facts or information concerning organizations. This might comprise the attainment of academic possessions such as industrialized production data, ideas, methods and procedures, recipes and formulas. Or acquisition of any protected information and operational data such as customer databases, pricing, research and development, sales, pricing, marketing, policies, quotes, design strategies or marketing or change the composition and production. It also involve specific activities like trade secrets, bribery, extortion, and technology watch. As well as orchestrate a trade organizations and espionage, governments may exist as goals. For instance establish the conditions of the contract bidding for the governments to underbid each other bidders. industrialized spying is mainly usually linked by technology-heavy businesses, as well as PC software plus hardware, biotechnology, aerospace, telecommunications, hauling plus mechanism skill, automobiles, machinetools, energy, fabrics plus covering furthermore so on. Silicon Valley, be well-known near live one of the worlds mainly aimed regions intended for spying, however, inside result, some business by information of employ to contestants maybe an objective. RISK FACTORS:- The main danger issues for failure of confidential data and academic possessions amongst every one responding corporations be previous workers, overseas players, domestic competitors, on-site freelancers. Hackers may too be quoted the same as a main cause of alarm in several regions. The area most frequently cited risk of incident was reported by companies are research and development(49%), client records plus linked statistics (36%) and fiscal statistics(27%). The number of incidents reported the order was customer data. Strategic plans financial data. Research and development. THE EFFECT OF LOSS:- Among all companies the biggest impact of the loss of confidential information increased legal costs and lost income. designed for big organisations defeat cut-throat benefit be the mainly grave trouble. For Financial companies the most annoying problem was embarrassment and used for high-tech organisations vital subject be the defeat of passive benefit. The evaluation of the order or the value of logical possessions be the liability of the patent and in home advice who stand their judgements of competitive gain, productivity plus investigate with growth criterion. USE OF COMPUTERS AND INTERNET:- Computers have become an essential practice of industrial espionage and large amount of information can easily be copied and transmitted. Computer used to have augmented quickly in spying during the 1990s. Data have be frequently taken away or duplicated as of unwatched pcs. The term bag-op is used in the tavern employees to contact information, such like laptops, tavern rooms, data may be taken away in shipment, taxis, baggage counters on the airfield baggage carousels plus trains and so on. EXECUTIVE FRAUD:- A disgruntled employee of a large international company left a message on the fraud hot line of the company, indicating he had information about fraud conducted by a number of business leaders. Within hours, the third party independent of the fraud hot line has been contacted and the employee is dissatisfied with the initial information that is collected. Shortly thereafter, the president of the companys audit committee informed the initial request. Such claims are not taken lightly in any case, but something about the caller and the information presented in the body a little extra credibility, he remained a firm conduct a full investigation. Within 24 hours, the firm has been the team of investigators to the site. The first efforts of investigators were to meet the disgruntled employee, or ant other information related to fraud. The information collected at this meeting suggested that the amount of fraud is easily in millions of dollars. Early data indicate that several key leaders of the business potential conspirators in the conspiracy to inflate company revenue to increase corporate profit and therefore, the annual salaries and bonuses to executives. The lawyer representing the firm hired to conduct the survey claimed responsibility for leading the investigation. In a large investigation team, composed of over 20 financial accountants, tax accountants and corporate lawyers, as well as computer forensic were together. There were three objectives outlined in the test group; To determine whether fraudulent activity has occurred. To examine e-mail, internal communications and computer systems all potentially affected parties in an attempt to prove and/or documents in support of the alleged fraud. To identify all the financial measure of the alleged fraud and knowing exactly how the restatements, which will surely be made. The case study focuses on the second goal. What does work, assuming that investigators have discovered that a number of fraudulent activity took place. This is not a weak hypothesis, and we ensure that only the short and in the heart of the matter. We do not want to suggest, even in the current context of financial scandals, allegations of fraud, immediately, is the truth. These claims must be carefully considered in this case. CYBER EXTORTION:- Cyber extortion is an attack or threat of crime against a company in which the coupled with demand for money to prevent or stop the attack. Cyber extortion have many forms, initially, denial of service(DOS) attack were the most common method. In recent years Cyber criminals have developed enough knowledge to encrypt information from victim. The attacker then request money for the decryption key. As the number of companies that rely on the internet for their business has increased, opportunities for Cyber extortionists also exploded. The likelihood of the recognition, seizure plus trial is less as Cyber extortionist generally operate from countires other than the preys plus the utilization of nameless financial statements plus bogus electronic post addresses. Cyber extortion can be lucrative, compensation of millions of dollars annually attackers. A typical attack is due to the demand of thousands of US dollars. Payment dose not guarantee that new attack not occurs by the same group or another Cyber extortionist group. Coordinated efforts and high technology use, some Cyber extortionists found and some arrests has been made, prosecuted, sentenced to prison. However, according to some reports, most episodes Cyber extortion was unreported because victims do not want the publicity, and so, majority of reported attacks do not result in arrests. Criminals groups be more and more with the internet as a instrument for extortion of cash from companies. Many of dispersed refutation of examination assaults happening in the world daily, plus it is vital to superior administration be alert of the extremely genuine danger of such an attack. As we explain that in current time, some corporations contain shifted their industry procedures online plus e-commerce have been a major basis of economic enlargement. Though the increase of the internet use has many advantages, also it includes a number of threats in the shape of bugs, hackers, malware, plus worms. Mainly businesses be conscious of these dangers plus suitable procedures and technologies, rather than lessen these. Although in current time, these dangers on the internet were made in a malicious and complicated way, bug scripting is not a hobby for youths by too a good deal of moment on their self, in its place of bugs may now printed in cyber-criminals stimulated organized solely for the cash. EXTORTION: A RISING DILEMMA:- Those illegals be more and more via the way named as dispersed denial of services(DDoS). DDoS assaults started amid the only reason of contravention the organisations net-site or server through attacking those as sachet of statistics, typically within the shapes of net appeal or electronic post. nothing like sole font assaults, the attacker compromises between several pcs, which, consecutively, contaminate many of previous pcs, you can work with agents of the attack. Those contaminated pcs, recognized as zombies or spam, after that begin overflowing the preys site inquiries, the creation of an enormous flow of facts and eliminate the goals location, therefore stopping it as of giving a service. BUSINESS AT RISK:- The cost of a DDoS attack is important, and it is calculated to in excess of 10,000 place each day around the world have been attacked. DDoS extortion assaults be at first used next to online betting spots. Criminals groups to launch assaults to take the location downwards ahead of a large fair occasion, the smash up caused to the maximum. at the present, though, DDoS assaults maybe used towards extracting cash from every one types of business. The truth is that not a single corporation be secure. Lack of awareness is making businesses vulnerable. THE FUTURE OF ONLINE EXTORTION: Initially, the extortionist celebrated a good deal of success. The cost associated with the fight against the hackers usually exceeds the cost of extortion payment. So many online businesses declined and paid the ransom. Once the Betcris situation drain, online gaming companies have realized that they have no other choice. It is also recognized that the long term consequences of this war, extortion could very well be the optimal course of action. The lessons of recent years, the gaming industry have an interest in many other types of businesses. The attacks on these gaming sites. Q3 (Stream Cipher) Investigate the use of the Berlekamp-Massy algorithm as a cryptanalysis tool. Ans: INTRODUCTION: Nowadays many modern and reasonable secure communication systems like Personnel Computers, networks, SSL, mobile phone, Bluetooth etc. oblige a soaring pace binary encoding algorithms to encrypt messages that can be millions of fragment extensive and remarkable exhibit formation. The most frequently used encryption of this case is flow cipher. A flow cipher encryption explains the process itself which is to encrypt binary plain text one bit at a time. Mostly and easiest flow cipher utilized for encrypting binary plaintext is where a point intermission of a imitation accidental progression is connected with section two of XOR with the plaintext bit mt, with cipher text bit represented by ct. following expression shows the simple stream cipher explanation: ct = mt à ¢Ã…  Ã¢â‚¬ ¢ zt where à ¢Ã…  Ã¢â‚¬ ¢ denotes XOR(Exclusive OR). The decryption procedure could be articulated as: mt = ct à ¢Ã…  Ã¢â‚¬ ¢ zt It should be noted from the equations that both encryption and decryption require to be capable of generating the alike key flow progression zt. The encryption key K is the preliminary beginning to begin the producer. Either the encryptor or decryptor has to deal with this key. The most frequent approach of shaping the streams is that zt be implemented to non-linear boolean function f of the invention of binary progressions by linear feedback shift register (LFSRs) which is distinctive prehistoric polynomial. CRYPTOGRAPHY: Cryptography or cryptology is a local office of computer science and mathematics copping with data security and relevant matters mainly encryption and verification and applications like access monitor. Cryptography is an interdisciplinary matter, founded on some grounds. Before the start of 20th century, cryptography was principally worried about linguistic prototypes. As the result, the concentration has been boosted and cryptography is widely using mathematics. Cryptography is the subdivision of manufacturing as well but an extraordinary one, as it is only deal of energetic, intellectual and malicious disagreement. Cryptography is the major means for data security and system such as access monitor and discretion. Cryptography has many implementations influencing the life on a daily basis of the security like electronic commerce, computer passwords and ATM cards, they all based on cryptography. 1.1 STREAM CIPHER:- In cryptography, a stream cipher is a symmetric encryption algorithm, where plaintext digits encrypted one at the same time and succeeding digits differ throughout the procedure of encryption. Following figure show the encryption of each digit bases on the present situation, typically one bit at the same time. Stream cipher corresponds to a diverse method to symmetric encryption as compared to block cipher. Block cipher working with great masses of digits in the fixed steady conversion. This feature is not constantly simple. Some functions apply block cipher prehistoric effectively as compared to stream cipher. Stream cipher is usually performed at superior speeds as compared to block cipher and connected to lower hardware complexity. There are some popular stream ciphers RC4, applied in Netscapes Secure Socket Layer (SSL) protocol. A5, in the global scheme for mobile message (GSM). Bluetooth stream cipher, criterion of wireless short-term connectivity, particular of the blue tooth particular attention group. Word-oriented tributary codes, appropriate pro software functioning (e.g. SNOW, SOBER, SCREAM). Tributary code forms of process of mass code (e.g. code response, productivity advice style of triple DES or AES). CRYPTANALYSIS:- Cryptanalysis is analysis or study the method to obtain the encrypted data, lacking right of entry towards undisclosed data usually needed to perform it. That typically entails ruling the underground input. Non-technically it is the exercise of contra-venting the cipher or demolishing the cipher other than that verdicts may also contain a particular method story. Cryptanalysis may also be used towards demote towards one effort en route for evading the safety of previous kinds of cryptographic algorithms plus procedures in common, not immediately encryption. though, cryptanalysis typically leave out the option so as to the assaults be not chiefly goal flaws real cryptographic ways such like dishonesty, bodily compulsion, theft, input classification plus hence on. Even though the last kind of assault be significant towards influence the safety of pcs plus extra effectual then usual cryptanalysis. THE BERLEKAMP-MASSEY ALGORITHM:- The linear difficulty of dual sequences of the span of the smallest LFSR that can be produced in the series. For a series it is also suitable to use an enciphering succession inside a tributary code it be vital so as to it have a adequately big linear difficulty. Readily available are two shapes of linear difficulty, worldwide linear difficulty endless dual series in the same period, and the limited linear difficulty of dual series of limited span. Any finite binary sequence of period p can be generated by linear reappearance of span p otherwise fewer. The linear difficulty of the smallest series of such a recurrence is to establish the series. This is equivalent to saying that the linear complexity is the span of the smallest LFSR to make the series. The berlekamp-massey algorithm be an effectual process for searching the shortest length LFSR of a known limited series. If the linear complexity is m, the algorithm requires at least 2m bit series. If the encryption key has the small linear complexity, then it will be replicate to short LFSR. This is not desirable, therefore, the encryption key must has a large linear complexity. The following is the berlekamp-massey algorithm that is expert in the distinctive dual limited grounds F2 and GF(2). The parts 0 plus 1 in the ground processes + as well as is the similar plus go round to be the only possessions elite OR operation(XOR). * The development worker is a consistent and process. The distribution operator increases to the personality operation i.e. the area defined in the for the dividing by 1 and x/1=1. Let s0, s1,s3,..Sn be the bits of stream. F(x) à ¢Ã¢â‚¬  Ã‚  1 B(x) à ¢Ã¢â‚¬  Ã‚  1 D à ¢Ã¢â‚¬  Ã‚  1 L à ¢Ã¢â‚¬  Ã‚  0 bà ¢Ã¢â‚¬  Ã‚  1 Nà ¢Ã¢â‚¬  Ã‚  0 If N=n, Stop. If d=0, then D à ¢Ã¢â‚¬  Ã‚  D+1 and got if d à ¢Ã¢â‚¬ °Ã‚  0 and 2L>N, then F(x) à ¢Ã¢â‚¬  Ã‚  F(x)-dB-1xDB(x) Dà ¢Ã¢â‚¬  Ã‚ D+1 if d à ¢Ã¢â‚¬ °Ã‚  0 and 2Là ¢Ã¢â‚¬ °Ã‚ ¤N, then T(x) à ¢Ã¢â‚¬  Ã‚  F(x) {temporary storage of F(x)} F(x) à ¢Ã¢â‚¬  Ã‚ F(x) dB-1xDB(x) Là ¢Ã¢â‚¬  Ã‚ N+1-L B(x) à ¢Ã¢â‚¬  Ã‚ T(x) B à ¢Ã¢â‚¬  Ã‚  d D à ¢Ã¢â‚¬  Ã‚  1 N à ¢Ã¢â‚¬  Ã‚  N+1. This section describes the execution of the berlekamp-massey algorithm to discover the linear complication of a mentioned series. Two new methods for encrypting data stream are, an attack first known attack using the combination part of the assumption that the data are a major threat to the right answer. The second method, an attacker combines part of the discovery of unknown behaviour (truth table), the combination of the algorithm into two parts. Once upon a time, we look for the fact table of the connecting element, we, afterwards, discover the preliminary principles of the record keeping part or drawing a map combining some functions to help you reverse engineering algorithm for reconstruction and participate in the combines. There are mostly two algorithms used: Algorithm A Take the digits of b with highest (conditional) probability p* as a guess of the sequence a at the corresponding positions. Approximately n digits are required to find a by solving linear equations. Computational complexity: O(2cn), 0 complexity is exponential. c is a function of t and N/n. Example: c = 0.012 if p = 0.75 and N/n = 100. Algorithm B 1. Assign the correlation probability p to every digit of b 2. To every digit of b assign the new probability p* . Iterate this step a number of times. 3. Complement those digits of b with p* (suitable threshold). 4. Stop, if b satisfies the basic relation of the LFSR, else go to 1. The number of iterations in 2. and the probability shreshold in 3. have to be adequately chosen to obtain maximum correction effect. CONCLUSION:- It can be concluded that as a consequence of applying the methods under study: encryption stream is not recommended to use confidentiality because the stream cipher is vulnerable to prevent a planned attack suggested that the number of LFSR is a part that must go over the capability to carry out the algorithm, which refers the number of LFSR must be above 20 with current computing ability. Q.4. (Artificial Intelligence) Investigate the use of Expert Systems as a tool in security systems. Give examples and references to support your arguments and concluding remarks. EXPERT SYSTEM:- The definition of an expert system is a computer program that simulates thought processes of a human expert to solve complex problems of decision in the specific field. The characteristics of expert systems that make them different from traditional programming and traditional harvest support tools are explained later. The growth of expert systems has been continue several years ago. Continued growth, many new and exciting applications appear. A system of peer review works as an interactive system that responded to questions and inquiries, recommendation and usually helps in decision making. Expert systems advice and guidance on a wide range of activities, computer-based diagnostics, medical surgery etc. Various definitions of expert systems proposed by several authors. A general definition that describes the intended functions of experts systems: The expert system is a computerized interactive decision tool that the use use of facts and heuristics to solve the problems of a difficult decision based on knowledge from the expert. The expert system can be considered a computer simulation of human experts. Expert systems is an emerging technology in many areas as possible applications. Applications move from MYCIN, used in medical diagnose infectious diseases in blood, to XCON, used to configure the computer systems. These expert systems have been very good. Most expert systems applications fall in the following categories: identification and interpretation. Plan Diagnosis Planning Designing Monitoring Debug and test Education and training Controlling Applications that are computation and deterministic, is not good candidates for expert systems. The traditional decision-making, such as spreadsheets are very mechanically, they solve problems. Work based on mathematical operators and logical in their execution, and receives one and only one static solution for a data set. Calculation intensive most demanding applications extremely rigorous to better manage traditional tools for decision support or traditional programming. The best application candidates for heuristics expert systems or expert problems. Following are fundamentals of expert systems: Traditional computer programs are based on facts knowledge, the convincing power of computers. However, the people, solve problems based on a mixture of facts and heuristics. Heuristics knowledge composed of intuition, conviction and logical conclusions, the unchallenged power of the people. An expert systems for success are those that combine facts and heuristics, and thus unite the human knowledge computer to solve problems. SPECIAL PROGRAMMING LANGUAGES:- Expert systems are usually written in specific programming languages. The languages such as LISP and PROLOG development expert system simplifies the encoding process. The big advantage of these languages over traditional programming languages is the simplicity. In addition, elimination or substitution of the new regulation and memory management capabilities. A feature of some programming languages required for expert systems work are as follows: Efficient mixing of the whole and real variable. Good procedures for memory management. Extensive data manipulation routines. Incremental compilation. The memory architecture tagged. Optimization of environmental systems. Procedures for effective research.

Thursday, September 19, 2019

Impacts of Global Climate Change on Temperature and Precipitation Patte

Impacts of Global Climate Change on Temperature and Precipitation Patterns in the Midwest and the Consequences for Soils Introduction During the last century, human activities in agriculture, industry and technology have brought about a change in the chemical composition of the atmosphere. This change so far has not had a noticeable or discernible effect on world climate, but if these same activities continue, global climate change will become irreversible. The major contributing factor is the increase in the amount of carbon dioxide and other gasses in the atmosphere. These gasses are being cited as the cause for a "greenhouse effect" where they trap the heat of the sun and cause global climate change, specifically a warming trend on the surface of the Earth. Many different scenarios for the possibilities and extent of global climate change have been proposed, and many global climate models have been created to look at the possibilities. While there are a wealth of differing opinions, there are also some consistencies in the predictions. Among other things, climate change is expected to cause increases in average global temperatures and changes in worldwide precipitation patterns. Even though these broad consequences are agreed upon, the affects which these changes will have on the climates and ecosystems around the world is still a matter of uncertainty. However, there is some consensus for the localized effects of global change in different climatic zones of the world. In the subboreal climate of the Midwestern region of North America, it is generally agreed that the temperature will increase an average of one to five degrees over the next ten to one hundred years (Varallyay, 1990). Also, it is expected that overall ... ...e Scenarios for Soil Erosion Potential in the USA" Land Degredation and Rehabilitation 4: 61-72 Ritchie, J.C. 1986 "Climate change and vegetation response", Vegetation 67: 67-74 B.G. Rozanov and E.M. Samoilova 1990 "Soils of the subboreal region on a warmer earth" in Developments in Soil Science, volume 20: Soils on a Warmer Earth pp185-191; H.W. Scharpenseel ed., Elsevier Science Publishing Company Inc., New York Tate, K.R. 1992 "Assessment, based on a climosequence of soils in tussock grasslands, of soil carbon storage and release in response to global warming" Journal of Soil Science 43: 697-707 Varallyay, G.Y. 1990 "Influence of climate change on soil moisture regime, texture, structure and erosion" in Developments in Soil Science, volume 20: Soils on a Warmer Earth pp 39-51; H.W. Scharpenseel ed., Elsevier Science Publishing Company Inc., New York.

Wednesday, September 18, 2019

Essay --

PHL100 Prompt 1 Baraa Abukhudhayr March 12, 2014 Final Paper In her essay, â€Å"The Difficulty of Reality and the Difficulty of Philosophy,† the American philosopher Cora Diamond discusses animal rights and our obligations as human beings to nonhuman animals. Diamond has a fascinating philosophical take on the matter of animal rights. She is concerned with reminding people that they are animals. They are just another species among a plenty of others. Diamond uses the idea of the existential other to remind us of our animality, because it is in our shared mortality that humans and animals are alike. Furthermore, our morality is simply a human construction that allows us to talk about others from a distance as Diamond calls it the â€Å"language-game† (Diamond, 45). In essence, we view ourselves as different, separate or better than those animals because of the separation that we emphasize between mind and body, forgetting that we are animal as well. By placing the animal in a position of equality which is the place of the other , we should find compassion and sympathy for it. In her essay, Diamond states that â€Å"the difficulty of reality shoulders us out of life† (Diamond, ). What Diamond means here is that our morals, concepts, and actions in our ordinary life, pass by the difficulty of life as if it were not there (Diamond, 58). If we try to see this difficulty, it shoulders us out of life. This difficulty moves us out of life by the force of others which is against our will. Therefore, the difficulty of reality in Diamond’s sense is the reality's resistance to one’s ordinary modes of thinking and talking. It is the feeling of a discrepancy between concepts and experience. Significantly, this kind of difficulty may lead to a philosophi... ...rent approach of conceiving the relationship between humans and animals. As she suggests, we need to grant animals rights and treat them ethically because as Diamond says, â€Å"animals cannot speak for themselves and claim rights for themselves as we can† (Diamond, 52). She wants us to behave differently to one another and to other species in respect to our shared affection. She wants us to realize the difficulty of life and act instead of avoiding and deflecting from these difficulties and problems. She encourages us to take philosophy as a guide to walk us through these difficulties. In respect to the rights of animals matter, she states that â€Å"philosophy characteristically misrepresents both our own reality and that of others, in particular those 'others' who are animals† (Diamond, 57), thus, it is our obligation as humans to realize this misrepresent and act upon it.

Tuesday, September 17, 2019

Willy Loman, Redefining the Tragic Hero in Arthur Millers Death of a S

Willy Loman, Redefining the Tragic Hero in Arthur Miller's Death of a Salesman      Ã‚  Ã‚   The events in the life of Willy Loman in Arthur Miller's Death of a Salesman are no doubt tragic, yet whether or not he can be considered a tragic hero in a traditional sense is a topic requiring some discussion. Aristotle set the criteria for qualities a character must possess in order to be considered a tragic hero. In order to reach a conclusion on this matter, all six criteria must be examined to determine whether or not they are present in the character of Willy Loman. The first criterion for a tragic hero is hamartia, or a tragic flaw in the character's personality that brings about their downfall. Willy Loman definitely does possess a tragic flaw, and in his case it is pride. Loman cannot accept that he is a terrible salesman, a substandard provider, and suffering from mental illness. He borrows money every week from Charley, his neighbor, so that he can tell his family stories of his successful sales trips. While Willy definitely does possess a tragic flaw, another criterion required by Aristotle is peripeteia, a character's reversal near the end of the story for the purpose of self-reservation. Willy definitely does not meet this criterion. When Willy is terminated from his job late in the story, Charley offers him a job working for him, but feeling too much pride, Willy turns it down, saying he's already got a job. He turns down a chance to make a decent means to finish paying off his house and refrigerator, but turns it down because of his stubborn pride. A tragic hero must have a mix of both good and bad qualities, predominantly good, so that they are more of a character that readers could relate ... ...Sons in which the main characters are somewhat like tragic heroes but lack the high standing. They are all just common people, which might lead to the idea that Arthur Miller tried to create a mold for an American tragic hero. This however, is not a topic relevant to this assignment. So overall, Willy Loman is not a tragic hero, but just an unlucky man destined to be the Low Man. Sources Field, B.S.   "Death of a Salesman" Twentieth Century Literature.   January, 1972. 19-24.   Rpt. in World Literary Criticism.   Ed. Frank Magill.  Ã‚   "Arthur Miller" Detroit: Gale Research, 1992.   2366-2368. Hoeveler, D. J.   "Redefining the Tragic Hero Arthur Miller's Death of a Salesman: Modern Critical Interpretations.   Ed. Harold Blum.   Philadelphia: Chelsea House, 1988. 72-81. Miller, Arthur. Death of a Salesman. Gerald Weales, ed. New York: Penguin, 1996

Leadership Styles in Professional Nursing Essay

According to Hood (as cited in Agnes, 2005) â€Å"Leadership is defined as a process of influencing others or guiding or directing others to attain mutually agreed upon goals† (p. 457). This paper will describe four different leadership styles, and the effectiveness of each style as dependent upon the situation. Review of the Professional Nursing Literature All nurses are leaders but may not recognize the different types of leadership or traits of an effective leader (Sims, 2009). There are four leadership styles to consider, the first one is autocratic or authoritarian. The autocratic leader is someone who usually needs to dominate others. The autocratic approach is often one-sided and the leader is likely attempting to achieve a single goal or objective (Sims, 2009). Autocratic leadership is a behavior in which a leader makes choices with no involvement from any peers, regardless if those ideas are better suited for the organization. This type of leader requires constant pressure and direction to get the task done. This type of leader provides clear expectations for what, when, and how a process should be done without consulting employees. Organizations that have this type of leader tend to see a high turn-over of employees and absenteeism for the simple fact that employees don’t feel valued. This approach would not be the way to get the best performance from the team. The implementation of this style of leadership could be used in a situation where an immediate decision needs to be made such as a crisis in an emergency room. The second leadership style is democratic or participative. This style is one that encourages employees to be a part of the decision making process. This type of leader keeps employees informed about everything that affects the work being done, and shares in the problem solving situation. A drawback of this type of leader is that the leader could be viewed as not being able to make a decision; therefore, the employees may not respect this style and view this leader as not being a true leader. The democratic leader uses the team approach and is the coach in the process, but has the final say when the group comes to a consensus. Implementation of a democratic leadership style can best be executed in a situation where a process or practice change is needed, such as documentation on electronic medical records. With this leadership style the leader can get staff ideas and suggestions for a smooth transition to the change. This not only increases job satisfaction by involving team members, but it also helps to develop people’s skills. This method inspires a group effort, but it can take lots of time for the leader to develop and come to an end to the topic at hand (Sims, 2009). The leader may spend a lot of time in discussions, sending emails, or scheduling meetings. This leader may be happy to do this to see that staff are working together to achieve a better outcome, but it can also be a time-consuming process. A good democratic leader encourages staff participation, is supportive, but never loses sight that the leader is the one responsible for the final decision. This leader must accept that the outcome may turn out differently than originally planned. Transactional leadership is the third style, and is one where the leader focuses on the day to day tasks of the team, and makes sure that the work is completed. Transactional leadership is really a type of management, not a true leader style, because the focus is on short-term tasks. Transactional leaders set a goal, provide directions, and then reward the employee if performance is met at an acceptable level (McGuire & Kennerly, 2006). Transactional leadership style can best be used when a state survey is taking place and if successful, then reward will be given to the employees. These leaders use this style to get the desired outcomes. Transactional leaders give tasks to be done by the employee, and if it’s done wrong then the employee is accountable. If the task is completed to this leader’s standard, then the employee is rewarded. This type of leader doesn’t focus on the staff’s needs, or personal development, instead the staff must adhere to what the leader wants. Transactional leaders often work under the assumption that if everything is working fine, then there is no need to fix anything. Under this type of leader, there is no interest in change, and the employee will not feel any job satisfaction. The fourth leadership style is the transformational leader. This style of leadership is one that’s very appropriate in many corporate situations because of the wide range of abilities and approaches that are drawn upon. This style focuses on the leader and the employee working together for a common goal. This type of leader has a vision for the organization, and inspires employees to solve problems creatively in a way that provides support and encouragement without diminishing the nursing role (Kleinman, 2004). Transformational leaders have several traits that inspire the employee to utilize the strengths to improve the team, have better staff satisfaction, and reduce stress (Weberg, 2010). Transformational leaders are coaches, or mentors; they show respect, have empathy, and utilize individual leader skills to promote change. These leaders are very energetic and passionate about the job, and concerned about all staff in succeeding. These leaders set good examples, clear goals, and recognizes good work from the team. Transformational leaders should remain a part of the team and share in the work load to better understand the team’s viewpoint. With this leader style, there is a higher level of committed employees, reduced stress, and increased morale (Dunham & Klafehn, 1990). This in turn creates an employee who will provide a positive outlook when change is taking place and increases employee job satisfaction. Application of Clinical Example A clinical example of when transformational leader style would work best is when an organization is going through a change process, such as the way report is given. Transformational leaders motivate staff to work towards a greater good and create a positive change (Dunham & Klafehn, 1990). Many nurses don’t like change in the way care is provided, but when it’s important for patient safety change is inevitable.

Monday, September 16, 2019

Communication Opinion Paper Essay

Communication is the most important tool that we as human us. It is an imperative component in our daily lives. Communication begins when we greet or see another individual that we know. There are many forms of communication and they are effective communication, healthcare communication, and regular communication and many more. The time and place in which we used a type of communication depends on the context of the situation and purpose. Understanding the necessary elements of communication allows individuals to know when and how to use different forms of communication. Elements of communication or sender/receiver when you are speaking to someone they receive the message and then they will give you feedback. Encoding is when you put thought into symbols (gesture or words). Assigning meaning to symbols is called decoding. Message is the idea though, feeling or opinion. Channel is the medium in which through which message travels from sender to receiver. Feedback is the receiver response to the message and indicates how the message is seen (Cheesebro, O’Connor, Rios, 2010). The entire basic element are needed in order to communicate with other effectively the basic element help you to convey your feeling your though with an individual in order to get feedback from the person that is receiving the message. Do the basic elements and the rules of healthcare communication differ? They are the same in order for you to speak to a patient or their families you still have to us the basic element of effective communication. The ethical principles by treating patients with dignity and respect, being honest and trustworthy in their professional relationship, and maintaining patient confidentiality. We utilize the same element when we are speaking with an individual on a personal aspect. By being honest with the patient and their families they gain confide in the decision that you will make when carrying for the patient. How might a provider encourage communication to a reluctant consumer? When a consumer is reluctant to communicate you have to gain the consumer trust that you know what you are talking about. Sharing situation in a conversation that is similar to the consumer can be helpful and may break the ice. Smiling and reassuring the consumer that you are knowledgeable in can answer any question that they may have (Repetto, Gibson, Lubbers, Gritz, Reiss,). How might cultural differences influence communication? Cultural differences may affect the way you communicate. The differences may be verbal and nonverbal communication. Facial expressions like smiling can indicate that people are friendly and approachable but in other culture people who smile can be seen as inappropriate. Context whether it is high or low. High context culture explain everything that they are talking about and assume that other do not have any information on a certain topic. Low context culture assumed that people understand what is being said to them and as a result, they do not explain everything. Eye contact show interest in another person but in other cultures eye contact convey honesty. Formality speaking can be formal or in formal depending on cultural norms. Informal culture assume that everyone is equal. Formal cultures assume that there is hierarchy among people. Touching the way people touch one another may depend upon whether they are a contact culture or a noncontact culture. Contact cultures touch each other when they are speaking. Noncontact touching is inappropriate, pushy and aggressive. Even though we communicate there are still barrier that can stop us from communicating effectively with other. There are culture barrier and language barrier. We communicate with other on day to day bases; whether it is speaking to a friend or a consumer in order to communicate effectively we have to use the basic elements of communication in order to establish a relationship that is honest straight forward and respectful to whom you are speaking with. Barrier can be hard to overcome as well as cultural differences but with the basic element in place when we are communicating with other can establish a great relationship between the sender and the receiver. References: Communicating in the workplace Thomas Cheesebro, Linda O’Connor, Francisco Rios, copyright, 2010 Chapter 1 & 3 Practical Application of confidentiality rules to health lake transition instruction Repetto, Jeanne B, Gibson, Robert W, Lubbers, Joyce H., Gritz, Sheila, Reiss, John 2008 vol.29 issue 2

Sunday, September 15, 2019

Jim’s Nobility in Huck Finn

Houlihan 1 Mike Houlihan Ms. Fledderman English H April 15, 2013 Nobility at the Bottom of Society Someone who is noble is defined as a distinguished person noted for feats of courage and heroism. The character of Jim in  Huckleberry Finn  by Mark Twain certainly fits that description. He risked his life in order to free himself from slavery, and in doing so, helps Huck to realize that he has worth. Huck becomes aware of Jim's sense of love and humanity, his basic goodness, and his desire to help others.Jim faces discrimination based on the color of his skin and is faced with the challenges of racist stereotypes. Twain characterizes Jim as a sincere yet naive character, representing the runaway slave as a fatherly figure who maintains his integrity as being one of the sole characters of the novel who wouldn't be described as hypocritical, despite the fact that Jim also retains a childlike mentality. Throughout the novel Jim expresses nobility through his selfless nature, his stre ngth to good while resisting evil, and his ability to bear with any misfortune that may befall on him or his loved ones.Mark Twain allows Jim to break racist stereotypes by showing more human qualities of him when he expresses his selfless nature. by assuming a role as a father figure to Huck, who he watches over throughout the bulk of the novel. Jim protects Huck by shielding his view from the dead body that turned out to be Huck's father Pap. â€Å"I went in en unkivered him and didn't let you Houlihan 2 come in? Well, den, you kn git yo money when you wants it kase dat wuz him† (320).This show of consideration and paternal care for Huck makes Jim out to be more humane. Jim demonstrates his humanity by not only caring for Huck physically, but also mentally and emotionally in shielding him from a sight that could have been mentally or emotionally strenuous on someone like Huck. Jim’s actions are partly a result of his inability to distance himself from the society whi ch he has been conditioned. There are countless opportunities for Jim to leave Huck during the story, yet he remains by Huck’s side.When Huck and Jim are separated in the fog, Jim says â€Å"When I got all tired out wid work, en wid de callin you, en went to sleep, my heart wuz most broke because I was los, en I didn’t kyer no mo what became er me or der raf† (85). Jim’s freedom is then not worth the price of Huck’s life, and let’s people know that he would readily risk his life for Huck. Twain represents Jim as a paternal figure who maintains his integrity as being one of the only sincere characters of the novel, while contrasting this quality with the typical stereotypes of an uneducated slave during the American slave era.Jim is one of the sole characters of the novel who wouldn't be described as hypocritical, for he has the integrity to do what’s right when everyone around him choose not to. After Jim and Huck decide to travel tog ether on the Mississippi river; the pair has to depend on each other for survival as they encounter  people who cause obstacles and jeopardize Jim’s freedom. For example when Jim is forced to accompany the king and the duke during their scams he says â€Å"But Huck dese kings o ourn is jus reglar rapscallions; dats what dey is deys reglar rapscallions† (153).Although Huck is simply putting on an act and appeasing them in order to prevent turmoil. Jim thinks that it is ridiculous for someone to be entitled to a servant and recognizes that this is wrong by calling them â€Å"rapscallions†. This could also be twain making a jab at slavery, which is Houlihan 3 ironic because Jim has been a slave all his life without asking questions. When Jim talks about his family, he mentions his daughter whom he had hurt due to the misunderstanding that she was deaf and dumb; this proves to be pivotal point in the novel to see what kind of man Jim truly is. Oh, she was plumb de af en dumb, Huck, Plumb deaf en dumb en I’d ben a treatn her so† (156). Jim, like most fathers wanted his child to have manners and due to his ignorance of his daughter’s condition hurt her, for he believed she was just being rude. After coming to the realization of her condition, he begins to feel guilt for being unintentionally cruel. By being simple minded and at the very bottom of the social order, Jim is able to see right wrong, while others who claim to be above him cannot see this. Jim continues to show his nobility by enduring the hardships that he is faced with throughout the novel.He talks about how he feels to Huck to the extent where he forces Huck to stop and think over how he treated Jim. After talking down to Huck after playing a trick on him, Jim tells Huck how he feels and Huck even thinks that â€Å"I wouldn't done that one if I'd a knowed it would make him feel that way† (142). After thinking this, Huck himself subverts the racist stereo type by humanizing Jim and acknowledging that the black man has the capacity to feel, and Huck allows his mood to be negatively influenced by the thought that he hurt the feelings of a man he considered his friend.Jim's condition as a human being is improved even more when Huck considers Jim as his friend, making him equal to a white boy. By making Jim equal to himself, Huck is able to humanize Jim and break the cultural perception that Jim is bound to. Another example of how the book illustrates this theme is when Tom kept Jim locked up as a slave when he clearly could have been set free at any moment. Tom was aware Jim was freed from being a slave but decided to keep it a secret. This caused Jim unnecessary poor treatment. Houlihan 4He was forced by Tom to do things he didn’t want to do. This is shown when Tom forces Jim to have rats, spiders, and snakes in his room. Tom says to Jim â€Å"But Jim, you got to have ‘em- they all do. So don’t make any more fuss a bout it† (263). This was cruel because Jim was forced to live with the creatures that traumatized him in his past. Though Mark Twain breaks some racist barriers with Jim, other stereotypes about blacks in the era are reinforced throughout the novel and Jim still maintains the strength to endure.Throughout the novel, Mark Twain both reinforces and disputes racist stereotypes of the time period through the portrayal of Jim as a noble character. Jim is depicted as a genuine yet unsophisticated character. Twain represents Jim as a selfless, paternal figure that is able to see right from wrong and maintains his integrity as being one of the only sincere characters of the novel. Twain contrasts this quality with stereotypes typical of an uneducated slave during the American slave era.Though he is a stoic character, Jim is able to span the entire novel as a father figure who protects Huck both physically and emotionally and, even after Huck plays tricks on him, forgives Huck and cont inues to protect him. Nobility is reinforced when Jim's simple nature is revealed in various parts throughout the novel. Jim's gullibility and his language relay the stereotypes of the antebellum south that blacks were somehow not people and were much lower than whites. These ideas become relinquished in the end, for readers are able to see the distinguished human being that Jim characterized.

Saturday, September 14, 2019

Features a of Successful School Essay

The way in which U. S. schools are ran today are not adequate for the growing needs of students in the 21st century. According the Darling-Hammond (2010), if these trends continue, by 2012, America will have 7 million jobs in science and technology fields, â€Å"green† industries, and other fields that cannot be filled by U. S. workers (p. 3). Other nations have figured out how to educate their youth, and those students will take the jobs of their U. S. counterparts if the U. S. does not change the ways in which we educate our youth. Darling-Hammond (2010), found that higher-achieving nations are more focused on quality teachers, and development of curriculum and assessment that encourages continuous reflection of teachers and students (p. 8). There is a need for change in the current education system, which was designed to educate students in the 20th century. According the Darling-Hammond (2010), â€Å"At least 70% of U. S. jobs now require specialized knowledge and skills, as compared to only 5% at the dawn of the last century, when our current system of schooling was established (p. 2). Now that a need for change has been identified, it is up to the districts, schools and teachers to implement the changes. Through much research Darling-Hammond (2010), has identified five essential features of education that need to be changed to help prepare students for success in elementary though college. These five features include: small school size or learning communities within the school, personalization and strong relationships among teachers and students, challenging and relevant instruction, performance based instruction, and collaboration of teachers (p. 244). Features Defined  The aspect of small school size and learning communities are important to schools success, because it allows students to feel important in the school system. Studies have been done by Darling-Hammond (2010), and have identified that there is less violence in smaller school compared to larger schools, because everyone knows each other and there is more accountability for a student’s action (p. 245). When the school and or class sizes are smaller the teachers get to know each of their students and have the ability to identify with each student, where as larger schools the students just ecome a number with little to no individual attention. Darling-Hammonds research states: These experiences underscore evidence accumulated over several decades that suggest that, overall, smaller high schools are associated with greater safety more positive student attitudes about school, higher levels of student participation and attendance, much lower dropout rates (p. 245). The reduction of school size alone will not solve the education problem our nation is facing, but merely an aspect that will help with the problem. The second aspect to a successful school according to Darling-Hammond (2010) is the need for â€Å"structures that allow for personalization and strong relationship† (p. 244). The way that teachers and students gain these strong relationships is through an advisory class, teachers are given a small number of students and in many cases these students stay with the same teacher over a number of years. Because of these factors of small class sizes and extended time with the teacher, teachers are able to gain strong relationships with their students. By knowing students well, teachers are more able to tailor instruction to students’ strengths, needs, experiences, and interests† (Hammond & Friedlaender, 2008, p. 17). According the research done by Darling-Hammond: †¦ we found that strong relationships between and among students and faculty were central to participants’ views of what enabled them to succeed. Students often compared their school to a family and linked their achievement to their caring relationships with teachers (p. 248). Another equally important aspect to a successful school touched on by Darling-Hammond (2010) is â€Å" intellectually challenging and relevant instruction† (p. 44). Since the beginning of time teachers have taught curriculum and given students assignments based on what was taught, but is the assignments relevant to the students learning? Darling-Hammond, (2010) says teachers should be getting away from fill in the blank worksheets and having students produce more meaningful work such as research reports, discussions of problems, and open-ended questioning to challenge students more (p. 249). These types of challenging assignments help prepare st udents to become critical thinkers, and get them ready for college. Successful schools also ensure that teachers are giving performance-based assessments, Darling-Hammond (2010) states: All of the schools engage students in completing complex projects and investigations of various kinds, and most of them require the completion of portfolios for graduation, which include high-quality work illustrating disciplinary inquiry in each of the major subject areas (p. 257) These types of assessments are helping create students that are critical thinkers, rather than just recall and memory, which were previously performed. These high-quality assessments are beneficial to students in helping them be more prepared for success in college and beyond. The final aspect of Darling-Hammond plan to improve education is â€Å"highly competent teachers who collaborate in planning and problem solving† (2010, p. 244). The idea of collaboration allows teachers and students significant time to discuss, problem solve and create valuable lessons. If teachers were just left to their own means they could teach lesson with little to no results. There is the need for collaboration to identify ways in which they can teach lesson to better help their students. When time for professional development is built into teachers’ working time, their learning activities can be ongoing and sustained and can focus on particular issues over time (Wei, Andree & Darling-Hammond, 2009, p. 39). In the U. S. very few hours are build in to the work week for teachers to plan and many times the planning is done individually and not collaborative with other educators. Many high achieving nations provide the opportunity for continued staff development as well as a wide-range development to teachers, where as the United States give one day workshops with little to know follow up (Wei, Andree & Darling-Hammond, 2009, p. 1). The small amount of time by U. S. teachers spend on collaboration has an adverse effect on students achievement. Prioritizing the Essential Aspects The most important of Darling-Hammond’s aspect is providing students with highly competent teachers that are given the opportunity to collaborate with their peers. As addressed by Darling-Hammond and Richardson (2009): Current research suggests that providing intensive, content-rich, and collegial learning opportunities for teachers can improve both teaching and student learning. When schools support teachers with well-designed and rich professional development, those teachers are able to create the same types of rigorous and engaging opportunities for students—a foundation for student success in school and beyond (p. 52). Teachers are one of the key features to the important of student’s education, therefore they need to be given the opportunity for collaboration with their peers to gain the knowledge needed to reflect and plan to become better at their profession. Research done by Darling-Hammond shows that professional communities are an aspect that is important to schools that are achieving high levels of student learning (2010, p. 261). The next important aspect is providing instruction that is challenging and relevant to instruction. Teachers need to have high exceptions of their students and give students experience through task that are relevant to the real world and future success. Students are placed in internships and volunteer work as young as 11th grade to provide students with real-world experiences (Darling-Hammond, 2010, p. 257). According to Darling-Hammond (2010): Students reported that, even when they found they did not like the work or setting they had chosen, or when they experienced conflicts on the job, their internships made them feel more capable, responsible, and confident about solving problems and succeeding in their world beyond school (p. 256). These skills that students are learning from their internship are helping them become more prepared for their future. Keeping instruction relevant helps keep students interested in learning. Just as important as instruction is on education is the types of assessments used. It is important that the school system gets away from memorizing and gives more performance-based assessments, where students are involved in the revision of their work. Students need to be given more authentic assessments that are relevant to their learning and then have the opportunity to present their portfolios to communities of students. In the study by Darling-Hammond (2010) â€Å"†¦a deep sense of accomplishment from their experience, and, having repeated it several times before graduation, a growing sense of confidence† (p. 260). These types of assessments are giving students the skills needed to be successful in life. Schools that allow for personalization and strong relationships are important to students’ growth in school. Today students are cranking through each day like an assembly line (Darling-Hammond 2010, p. 250). Teachers know very little about the potential of each of their students, and therefore the students suffer. Students from the study by Darling-Hammond have said that they feel like teachers care about them and their work as well as pushing them to perform at their ability (2010, p. 50). The last aspect is also related to personalization of students, it is small sized school and or classes. With the small class sizes teachers are better able to know each of their students to help tailor their learning to meet those needs of the students. It is not a surprise that smaller schools have the ability to have a focus on safety. These smaller schools have an increase in safety a decrease in incidents, because the adults know the students in the school and hold them accountable for their actions (Darling-Hammond, 2010, p. 45) Implementation The changes that need to be made to school system are something that is not going to happen over night by one teacher. These changes need to start at the state level with help of the district, schools and teachers. Teachers cannot implement all of these changes on their own. The aspects that teachers can control are changing the way that they teach to create students that are more critical thinkers and provide students will more meaningful assessments. Teachers can also help guide students to assess their own learning. Another aspect that teachers can control is the amount of time they are spending collaborating with colleagues to share strategies, and solve problems. Teachers can so also try to get to know each of their students, but this a daunting task with such large class sized. There are many changes that need to be made that are out of control of the teacher’s hands. One of these changes is the amount of time they spend collaborating with other teachers. The district and school site needs to make this a priority and give those teachers the time they need to become more effective teachers. The district and school also needs to implement more meaningful staff development training. As teachers can start implementing more meaningful assessments for students, it is the district that will need to set graduations requirements associated with these assessments. To more effectively tailor students learning it will be the districts responsibility to lower classes sizes or implement an advisory period. Teachers can try to get know each of their students’ strengths, but with such large class sizes it is very difficult to individualized instruction. The aspect that teachers have no control over is the school size. If the district wants students to feel safe and accountable for their actions, this is something they will need to implement. Conclusion The traditional model of education that was designed for the 20th century is not working to educate the youth in the global world of the 21st century, and changes need to be made to better reach the needs of the students today. Some schools have already implemented and embraced these changes and have seen great results in achievement of students. By making the necessary changes to the education process students will become better prepared with skills to help them be successful beyond high school.

Friday, September 13, 2019

Movie review Essay Example | Topics and Well Written Essays - 500 words - 9

Movie review - Essay Example car crashing in the start of the movie while she was driving to get her son from the center, I was eagerly looking forward to what kind of a woman she was. However, unfortunately but yet interestingly, I found out how gruff she was when I listened to her â€Å"hello† over the phone call in the car crash scene. She was very non-sexy yet elegant in her own style. Moreover, when she was in the center where she had to take the custody of her son Steve, she was in conversation with the governess or the headmistress whosoever she was. That woman was a normal looking, kind lady. Die also got into harsh conversation with her. I can tell that because she was not talking nicely with her, and her body language showed how irritated she was. However, when she received her son and the two were walking down the street, Die kissed him on the cheek and forehead which showed that she had that kind of a heart that is stereotype of a loving mother. Die showed her fondness toward her son through these gestures no matter how harsh she herself was. Later on, I saw her with her son resting his head on her lap. This was very interesting for me, and I could see a totally different woman inside the embodiment of a strong and sturdy man-ish character. This different woman was a bit kind, gentle, loving and affectionate. Die smiled at that point like a normal, fragile lady. She talked to her son like a good communicative mother. This shows that man is a versatile creature who can act and react in a myriad of ways, depending upon his moods and the circumstances. For me, Die is a strange and creepy character because I am not able to figure out properly in which category of human nature I should fit her in. She is harsh but gentle, non-se xy but fragile, all at the same time. Hence, the mother and her son walking toward their home was the most interesting sequence for me as it helped me reveal different aspects of Die’s nature as a human being and as a mother. Although the whole movie was