Thursday, October 31, 2019

Asian Americans Essay Example | Topics and Well Written Essays - 1000 words

Asian Americans - Essay Example This objective, however, proves a challenging initiative, burdened by the negative heritage of history and by existing cultural gaps. According to Jandt (2004) the Asian-Americans represent a diverse group of cultures and people from many countries - Cambodia, China, India, Japan, Korea, Laos, Pakistan, the Philippines, Thailand, Vietnam, and Pacific Island nations. Initially the US legislation excluded Chinese and other Asians from US citizenship (Jandt, 2004) and this governmental policy impaired the assimilation process of Asian subgroups at the very beginning. Asian-American's resistance to assimilation is a natural process. For one thing, it is visible in first generation immigrants who sometimes lack documentation (Wikipedia, 2006) and whose dreams about the bright future are not met by reality (Jandt, 2004). This disappointment leads to greater uncertainty, and avoidance of socialization. Additionally, language barriers impair the social status of the Asian-American group in USA. For example exactly because of language deficiencies Korean-Americans use English language that can be viewed as rude and exploiting by customers and employees (Jandt, 2004). This has lead to misinterpretation of Korean's behavior, hence to the isolation of the group by the American society and other subgroups. Further on, other behavioral patterns that are interpreted by other cultures differently hinder effective communication. For example, Korean-Americans are reluctant to develop friendships with strangers, regard inappropriate smiles as superficial (Jandt, 2004). Especially in the services sector, where communication with customers is critical, keeping such distance makes the Korean culture look confusing and inappropriate. Tradition that is visible in medicinal practices, rituals, clothing and other cultural tokens is another source for misinterpretation of culture (Jandt, 2004). While rituals and habits are regarded as healthy by one culture, the US culture may condemn them as inappropriate, unhealthy and even dangerous. There is the example of a Vietnamese father who treated his sick child, as per Vietnamese tradition, with coins rubbed in hot oil. The father was imprisoned and subsequently committed a suicide (Jandt, 2004). Such tragic incidents do not only prove the necessity for mutual understanding of group specifics, but lead to the presumption that at minimum partial assimilation is a natural process, whereby the smaller cultural group adopts the norms of the larger group. This is so because practices that are regarded as extreme and health damaging by the US culture are unlikely to be tolerated by people and legislative authorities and pressure is exercised to change those tokens that contradi ct common US norms. Today attitudes towards Asian Americans vary greatly. There is a common conception that Asian Americans have not faced racial discrimination as African Americans and Latinos (Wikipedia, 2006), but this idea is based on the fact that these immigrants do not report such incidents. As a result, even reported incidents do not receive adequate

Tuesday, October 29, 2019

How would woman be effected if Roe v. Wade was over turned Essay

How would woman be effected if Roe v. Wade was over turned - Essay Example According to the online dictionary, abortion refers to a premature or miscarriage, that does not result into giving birth. Abortion was legal in most states before 1880, when it was banned in most states except when the life of the woman was in danger, due to medical complications. Abortion was illegal up to 1973, during this time, anti-abortion movements were largely influenced by efforts to make sure women remained in their traditional roles and as a backlash on birth control movement. During the 1880s, abortion was legal in thirty states and illegal in some twenty states (Leslie, 2000). Banning of abortion was implemented under the Comstock laws, which prohibited allocation on birth control information. The banning of abortion at this time was influenced by fears that the population of new immigrants could surpass that of Native Americans. The technology available at that time was backward, including the medical industry. â€Å"Back alley† abortions blossomed even when it w as illegal. Access to abortion facilities depended on race, economic status and someone’s place of residence. Women, especially the poor were subjected to shame and fear due to criminalization of the act. Some of the poor methods of abortion which were performed mostly on poor women involved administration of strong chemicals and insertion of needles and other equipment into the vagina. Unsafe abortions led to contraction of infections and led to numerous deaths witnessed during that period. No exact figures are available to know the actual number of victims, however many women were treated of complications resulting from such botched abortions (Leslie, 2000). Even before abortion was legalized, some experienced and well trained physicians began offering abortion services, even with the risk of imprisonment and loss of their medical licenses. Women who wanted to undergo abortion obtained the information through word of mouth. Making abortion a crime did not reduce the number of abortions, it is estimated that the number of abortion in a year shot up to one and a half million every year. Between the year 1967 and 1973, some states began to liberalize the practice. As we can see, it is right to agree with Lesley Reagan that abortion has been a part of us since the eighteenth century, despite the moral and philosophical arguments it brings. The supreme case decision in Roe v. Wade, in 1973, paved way for women to perform safer and legal abortions with experienced medical doctors. Prior to this different states allowed abortions under different circumstances, for example, in 1967, the state of Colorado legalized abortion in the cases of incest , rape or if the pregnancy would put the physical health of the mother in danger. This law made away with all this restrictions. The Supreme Court ruled that the Texas law abolishing abortion except when the life of the mother was in danger, to be criminal. This was ruled on the basis that carrying out an abortion fal ls under the right to privacy. This piece of legislation removed restrictions on the first trimester of pregnancy placed by different states, only allowed restrictions during later stages of the pregnancy. This decision was celebrated, but some especially the Catholic Church and other conservative churches were against the decision. It is at this time that terms such as â€Å"pro-life† and â€Å"pro-choice† emerged. The terms mean basically imposing restrictions to be imposed to criminalize abortion, and removing

Sunday, October 27, 2019

Cisa Questionnaire The Is Audit Process Information Technology Essay

Cisa Questionnaire The Is Audit Process Information Technology Essay This is sampling example of compliance, as it states whether controls are functional as per the policy. This will include taking samples of new user account creation forms and match it to ensure process is being followed. Variable sampling is used to determine numerical value. Substantive sampling tests the integrity of process such as credit / debit values, balances on financial statements. Stop or go sampling technique prohibits excessive sampling of an attribute. The Stop and go statistical sampling technique in a scenario where it is believed or perceived that relatively few errors will be exposed, so there is point in wasting over sampling of an attribute. Use of statistical sample for tape library inventory is an example of ____ type of sampling technique. Variable Substantive Compliance Stop or go Ans. B Explanation This is an example of substantive sampling which confirms the integrity of a process. This test will determine whether tape library records are stated in a correct manner. What is the major benefit of risk based audit planning approach? Planning scheduling in advance over months Staff exposure to varied technologies Resources allocation to areas of top concern Budget requirements are met by audit staff Ans. C Explanation The objective of risk based audit approach is focus on areas where risk is high. Various scheduling methods are used to prepare audit schedules and it does not come under risk based approach. It also does not relate to budget requirements met by staff and number of audits performed in a given year. Examples of substantive sampling technique include: Review of password history reports Approval for configuration parameters changes Tape library inventory Verifying list of exception reports Ans. C Explanation Tape library inventory is an example of substantive sampling as it confirms the integrity of a process associated with determining whether tape records are stated in a correct manner. All others are example of compliance sampling as they determine whether the process in practice is inline with the established policies and procedures. The characteristic of an audit charter is: Is dynamic is nature and keeps changing frequently as the technology changes It contains the objectives of audit, maintenance and review of internal records by delegated authority Detailed audit procedures Overall scope, ownership and responsibility of audit function Ans. D Explanation Audit charter states management objectives, scope, ownership and delegation of responsibility of audit function. It should not change frequently and approved by higher management. Also it does not contain detail audit procedures. The auditor actions and decisions impact the ___ type of risk in a major manner. Inherent Detection Control Business Ans. B Explanation Auditor selection / decisions during the audit process have direct impact on detection risks, such as enough number of samples not taken into consideration etc. Company actions manage the control risks and business and inherent risks are also not impacted by auditor. Particular threat to overall business risk can be articulated in terms of: Likelihood and magnitude of impact , where threat successfully exploited a vulnerability Magnitude of impact, where source of threat successfully exploited a vulnerability Probability of a given source of threat exploiting a vulnerability Risk assessment team group decision Ans. A Explanation The choice A addresses both likelihood and magnitude of impact and measures risk to an asset in best manner. Choice B doesnt consider the magnitude of possible damage to an asset. Choice C dont consider the possibility of damage due to source threat exploiting a vulnerability and choice D is an arbitrary method of determining risk and it is not a scientific risk management approach. Risk management approach over baseline approach in information security management gives a major advantage in terms of: Overprotection of information assets Base level protection to all assets irrespective of asset value Adequate protection applied to all information assets Equal level of protection for all information assets Ans. C Explanation Baseline approach applies a standard set of protection to all information assets whereas the risk management based approach determines the level of protection to be applied depending on a given level of risk. This saves the costs incurred on overprotection of an information asset. In baseline approach equal level of protection is applied for all information assets irrespective of asset value so as a result some assets could be under protective and some could be overprotective. Which testing method is most effective when doing the compliance testing? Attribute sampling Variable sampling Stratified mean per unit Difference estimation Ans. A Explanation Choice A is appropriate in this scenario. As attribute sampling model estimate the rate of occurrence of a specific quality in a population to confirm whether quality is present in compliance testing. The other means of sampling are used in substantive testing where details and quantity testing is done. Why email is considered a useful source of evidence in litigation in IS audit process? Wide use of email systems in enterprises as medium of communication Access control mechanisms to establish email communication accountability Backup and archiving of information flowing through email systems Data classification guidelines dictating information flow via email systems Ans. C Explanation Option C is most appropriate as archived/ backed up email files, may contain documents which have been deleted and could be recovered. Access controls only establish accountability but dont give evidence of the email. Data classification standardizes what to be communicated by email but dont provide information needed for litigation process. A post implementation review of an application is scheduled by IS auditor. What could be the possible situation which can hamper the independent assessment of IS auditor. Involved in the development of specific application and implemented specific functionality / control Integrated an embedded audit module in the application for auditing purpose Was member of application system project team but not involved at operational level Given advice on considering best practices while system was in development stage Ans. A Explanation Choice A is most appropriate in this scenario because the auditor independence is impaired in case he was involved actively during the development, acquisition and implementation of the new application. Choice B and C dont hamper auditor independence. And Choice D is not correct as auditor independence is not hampered by given advice on best known practices. What is the benefit of continuous audit approach: Collection of evidence is not required on system reliability during the processing stage Review and follow up on all information collected Improvement in overall security in time sharing environment where large number of transactions processed No dependency on complexity of organizations systems Ans. C Explanation Choice C is most appropriate w.r.t to continuous audit process major benefit as overall security is improved in time sharing environments where large number of transactions is processed but leaving insufficient trail of papers. Choice A is not correct as auditor need to collect evidence while processing is ON. Choice B is also not correct in this case as auditor does review and follows up on errors and material deficiency. Choice D is also incorrect as complexity of organization systems determines the use of continuous audit process technique. The objective of enabling audit trail is: Better response time for users Institute Accountability of processed transactions Improving operational efficiency of systems Better tracking of transactions to give useful information to auditors Ans. B Explanation Choice B is most appropriate in this scenario as accountability and responsibility can be established for processed transactions and tracing could be done end to end. Enabling audit trail dont improve user experience as it might involve additional processing which may impact user response time in other way. Choice D could also be considered valid but it is not the main reason for the purpose of enabling audit trails. In a risk based audit strategy, risk assessment is done by IS auditor to ensure: Risk mitigation controls are in place Threats and vulnerabilities are identified Risks related to audit are taken into consideration Gap analysis is done as per the need Ans. B Explanation Choice B is most appropriate in this scenario. Identification of threats and vulnerabilities is crucial in determining the scope of audit. Effect of an audit would be to develop controls to mitigate risks. Audit risks are not relevant to risk analysis of environment. Gap analysis compares the actual state to expected or desired state. A gap could be result of a risk not being correctly addressed or missed out. In order to achieve best value to organization in terms of audit resources we should : Do audit scheduling and measure the time spent on audits Training of audit staff on latest audit technologies Chalk out detailed plan based on risk assessment Progress monitoring of audits and have cost control measures in place Ans. C Explanation Choice C is most appropriate in this scenario. This will deliver value to organization in terms of dedicating resources on higher risk areas. Choice A, B and D will improve the staff productivity only. An IS audit charter includes: Plan for IS audit engagements Scope and objective of audit engagement Training plan for audit staff IS audit function role Ans. D Explanation Choice D is applicable in this scenario. Choice A is responsibility of audit management. Scope and objective is agreed on engagement letter and training of staff is again responsibility of audit management based on audit plan. In the evaluation of risk assessment of Information system. The IS auditor will first review: Controls in place Effectiveness of implemented controls Monitoring mechanism for risks related to assets Threats/ vulnerabilities impacting assets Ans. D Explanation Risks associated with using assets need to be evaluated first so choice D is most appropriate in this scenario. Controls effectiveness is part of risk mitigation stage and risk monitoring is part of risk monitoring function after risk assessment phase. During an audit plan, the most critical step is: High risk areas identification Skill set identification of audit team Identification of test steps in audit Identification of time allotted to audit Ans. A Explanation The choice A is appropriate in this scenario. The identification of high risk areas is most critical step as that will determine the areas to be focused during the audit. Skill set is determined before audit to begin. Test steps and time for audit is determined on the basis of areas to be audited. How much data to be collected during audit process will be determined on the basis of: Ease of obtaining the information records Familiarity with the environment to be audited Ease of obtaining the evidence Scope and purpose of audit Ans. D Explanation Scope and purpose will determine the amount of sample data to be collected during the audit. All other choices are irrelevant in this scenario as audit process is not hampered by ease of obtaining records or evidences or familiarity with the environment. During the audit plan, assessment of risk should provide: An assurance that audit will cover material items Material items would be covered definitely during the audit work Reasonable assurance that All items will be covered by audit work Assurance to suffice that all items will be covered during the audit work Ans. A Explanation Choice A. ISACA audit guideline G15 clearly states that An assessment of risk should be made to provide reasonable assurance that material items will be adequately covered during the audit work. Definite assurance clause in choice B is impractical, option C is also not correct as it states all items. Statistical sampling should be used by IS auditor and not judgmental sampling in the scenario: Objective quantification of error probability Avoidance of sampling risk by auditor General use audit software is available Unable to determine the tolerable error rate Ans. A Explanation With an expected error rate and confidence level, objective method of sampling is statistical in nature as it helps auditor to determine size of sample and quantify error probability or likelihood. Choice B is not correct because sampling risk is risk of sample. Choice C is also incorrect as statistical sampling doesnt need general software. Choice D is also incorrect because tolerable error rate is predetermined in statistical and judgmental sampling. The primary goal of an auditor during the IS audit planning stage is: Address audit objectives Sufficient evidence collection Mention appropriate tests Use less audit resources Ans. A Explanation As per ISACA guidelines auditor plan must address audit objectives. Choice B is not correct because evidence is not collected at planning stage. Choice C and D are also incorrect because they are not initial goals of audit plan. During an audit procedure selection, auditor will have to use professional judgment to ascertain: Sufficient evidence collection Identification of significant deficiencies and there correction in reasonable time period Material weakness identified Maintain minimal level of audit costs Ans. A Explanation Professional judgment during the course of an audit process involves subjective and qualitative evaluation of conditions. It is based more on past experience of auditor and auditor past experience plays a key role in this. Identification of material weaknesses is result of experience and planning thoroughness and also it does not deal with financial aspects of audit as stated in choice D. While evaluating logical access controls an auditor first: Documentation of controls applied to all possible access paths to system Testing of controls to access paths to determine they are functional Evaluation of security environment w.r.t. policies and procedures laid down Obtaining an understanding of security risks to information processing facilities Ans. D Explanation Choice D is most appropriate in this scenario. The first step is to gather security risks to information processing facilities, by studying documentation, inquiries and doing risk assessment. Documentation and evaluation is next step. Third step is to test access paths to ensure controls functionality. The last is auditor evaluation of security environment. The objective of forensic audit is to: Participation in investigations related to corporate fraud Evidence collection on systematic basis after system irregularity Assessment of correctness of organizations financial statements Determine if there was any criminal activity Ans. B Explanation Choice B is correct as evidence collection is used for juridical process. They are not only for corporate frauds. Financial statements correctness determination is not purpose of forensic audit. And criminal activity could be part of legal process but it is not the objective of forensic audit. An auditor is reviewing a backup log report of remote server backup. One of the entries in the backup log indicates failure to login to remote server for backup and there is no entry in log which confirms that backup was restarted. What IS auditor should do? Issue audit finding Explanation required from IS management Issue a non compliance Increase sample of logs to be reviewed Ans. D Explanation Choice D is appropriate in this case. Before issue audit finding or seeking explanation, or issue of non compliance auditor needs to gather additional evidence to properly evaluate the situation. For the purpose of auditing critical servers audit trail, auditor wants to use _______ tool to determine the potential irregularity in the user or system. CASE tools Embedded data collection tool Heuristics scanning tool Trend/variance detection tools Ans. D Explanation Trend/variance detection tools are used for determining the potential irregularity in the user or system. CASE tools are used in software development and embedded data collection tool is used for sample collection and Heuristics scanning tool used to detect virus infections. What could be the possible cause of great concern for an auditor while evaluating a corporate network for possible penetration from employees? Number of external modems connected to network Users have right to install software on there desktops Limited network monitoring or no monitoring at all User ids with identical passwords Ans. D Explanation Choice D is most appropriate in this scenario. It is the greatest threat. Choice A threat is there but depends on use of valid user id. In choice b likelihood is not high due to technical knowledge needed for penetration. Network monitoring is a means for detection. What is the major benefit of using computer forensic softwares in investigations? Preservation of electronic evidence Saving time and costs More efficient and effective Efficient search for violation of Intellectual property rights Ans. A Explanation The main purpose of forensic software is to preserve the chain of electronic evidence for investigation purpose. Others choice B and C are concerns to identify good / poor forensic software. Choice D is example of using forensic software. Data is imported from client database by auditor, now the next step is to confirm imported data is complete, what step need to be followed to verify the same. Match control total of imported data with original data Sort data to confirm data is in same order as the original data Review first 100 records of imported data with first 100 records of original data Category wise filtering of data and matching them to original data Ans. A Explanation The logical step in this scenario would be option A. this will confirm the completeness of process. Sorting may not be applicable in this scenario because original data may not be sorted order. Reviewing partial data does not suffice the purpose either. Filtering data would also need control totals to be established to ensure completeness of data. An audit is to be conducted to identify payroll overpayments in last year. Which audit technique would be best appropriate in this scenario? Data testing Use of general audit software Integrated test facility Embedded audit module Ans. B Explanation General auditing softwares include mathematical calculations, stratification, statistical analysis, sequence and duplicate checks and re-computations. So auditor can use appropriate tests to re-compute payroll data. Test data would not detect the anomalies and overpayments. Integrated test facility and embedded edit modules cannot detect previous errors. During an audit process, auditor finds out that security procedures are not documented what he should do? Auditor create procedure document Stop audit Do compliance testing Evaluate and identify exiting practices being followed Ans. D Explanation The purpose of audit is to identify risks, so the most appropriate approach would be identify and evaluate current practices being followed. Auditors dont create documentation, compliance testing cannot be done as no document is there and stopping audit will jeopardize the objective of audit i.e. risks identification. Threats and their potential impacts are identified during the course of an risk analysis stage what should be next most appropriate step? Identification and assessment of risk assessment approach of management Identification of all information assets and systems Disclosure of threats and impacts to management Identification and evaluation of existing controls Ans. D Explanation The next step would be choice D. once the threats and impacts are identified. Next step is to share them with management. Out of the following which one is the most significant concern for an auditor? Non reporting of network attack Notification failure to police of an attempted intrusion Periodic review of access rights not present No notification of intrusion to public Ans. A Explanation Failure to report a network attack is major cause of concern. Reporting to public is organization choice and notification to police is also matter of choice. Periodic examination of access rights could be causing of concern but not as big as option A. Which is the most dependable evidence for an auditor out of the following: Letter from 3rd party on compliance Line management assurance that application is performing as per design Information obtained from www Reports supplied by organization management to auditor Ans. A Explanation The most reliable evidence is the one given by external party. Choice B, C and D are not considered reliable. While evaluating a process on the basis of preventive, detective and corrective controls, an IS auditor should know? The point at which controls used as data flow through system Preventive and detectives controls are only relevant ones Corrective controls are only relevant Classification is required to determine which controls are absent Ans. A Explanation Choice A is most appropriate. Choice B and C are incorrect as all controls are important. Choice D is also not correct because functioning of controls is important and not its classification. The best evidence of duties segregation is identified by using ____ audit technique? Discussions with management Organization chart review Interviews and observations User access rights testing Ans. C Explanation Based on choice C an auditor can evaluate the duties segregation. Management may not be aware of detailed functioning, organization chart only depicts hierarchy of reporting, and testing will only tell user rights but will not give any details on function being performed by users. While reviewing a customer master file, auditor discovers that many customer names are appearing in duplicate causing variation in customer first names. How auditor will determine the amount of duplication in this scenario? Testing data to validate input Testing data to check sorting capabilities Use general audit software to detect address field duplications Use general audit software to detect account field duplications Ans. C Explanation As names are not same, so we need to use some other field to determine duplication such as address field. Test data will not help in this case and searching on account number may not yield desired result because customers could have different account numbers for each entry. While testing for program changes what is the best population to choose sample from? Library listings testing Listing of source programs Change request programs Listing of production library Ans. D Explanation The best source to draw sample or test system is automated system. Choice B would be time consuming. Program change request are initial documents to initiate changes; test libraries dont present approved and authorized executables. An integrated test facility is an efficient tool for audit: Audit of application control in a cost effective manner Integrating audit tests for financial and IS auditors Comparison of processing output with independently calculated data Tool to analyze large range of information Ans. C Explanation It is a useful audit tool because it uses similar program to compare processing with independently calculated data. This involves setting up dummy entities and processing test/production data. IS auditors use data flow diagrams to: Hierarchical ordering of data Highlighting high level data definitions Summarize data paths and storage in graphical manner Step by step details of data generation portrait Ans. C Explanation Data flow diagrams are used to chart flow of data and storage. They dont order data in hierarchical manner. Data flow not necessarily match hierarchy or order of data generation. Review of organization chart is done by auditor to: Understand workflows Identify all communication channels Responsibility and authority of individuals Network diagram connected to different employees Ans. C Explanation Organization chart always depicts the responsibility and authority of individuals in an organization. This is required to understand the segregation of functions. While performing an audit of network operating system, an auditor should review the following user feature? Network document availability online Support for terminal access to remote systems File transfer handling between users and hosts Audit, control and performance management Ans. A Explanation Network operating system user features comprise online availability of network documentation. Choice B, C and D are some examples of network OS functions. In order to ascertain that access to program documentation is only restricted to authorize users, an auditor should check: Evaluation of retention plan for off site storage Procedures being followed by programmers Comparison of utilization records to operational schedule Review data access records Ans. B Explanation Interview of programmers to understand procedures being followed is the best way to ascertain the access to program documentation is only with authorized personnel. Off site storage, utilization records and review of data access records will not address security of program documentation. Auditor is evaluating an application which does computation of payments. During the audit it is reveled that 50% of calculation is not matching with the set total. What should be the next step auditor need to follow as part of audit practice? Do further test on calculations having error Identification of variables that generated inaccurate test results Testify some more test cases to reconfirm the anomaly Documentation of results, findings, conclusions and recommendations Ans. C Explanation Auditor needs to examine some more test cases where incorrect calculations happened and then confirm with the final outcome. Once calculations are complete further tests can be performed and then report to be made only after confirmation and not before that. In order to prove the correctness of system tax calculation the best practice to be followed is: In depth review and analysis of source code Using general auditing software to recreate program logic for monthly totals calculation Simulate transactions for results comparison In depth analysis and flow chart preparation of the source code Ans. C Explanation The best way to prove accuracy of tax calculation is simulation of transactions. Detailed review, flow chart and analysis of source code will not be effective and monthly total will not confirm the correctness of tax calculations at individual level. In Applications control review , auditor must analyze : Application efficiency in meeting business processes Exposures impact Business processes performed by application Optimization of application Ans. B Explanation Application control review requires analysis of application automated controls and analysis of exposures due to controls weaknesses. The other options could be objective of audit but not specifically meant to analyze application controls. What is the most accurate evidence to prove that purchase orders are legitimate while auditing an inventory application? Application parameters can be modified by unauthorized personnel Purchase order tracing Comparison of receiving reports to purchase order details Application documentation review Ans. A Explanation Access control testing is the best way to determine purchase orders legitimacy and is the best evidence. Choice B and C are part of further actions and choice D will not serve the purpose as application documentation process and actual process could vary. Irregularities at an early stage can be detected in the best manner by using ______ online auditing technique. Embedded audit module Integrated test facility Snapshots Audit books Ans. D Explanation The audit book technique also involves embedding code in applications to reveal early detection of irregularity. Embedded audit module is used for monitoring application systems on select

Friday, October 25, 2019

Keep Your Eyes on Your Wife Essay -- essays research papers

Keep Your Eyes on Your Wife   Ã‚  Ã‚  Ã‚  Ã‚   Shaw’s depiction of Michael in The Girls in Their Summer Dresses is that he is happily married to his wife of five years. He thinks he supports his wife and loves her dearly; however, this is not true because his actions show otherwise. When he stares at other women, he hurts his wife’s feelings and hurts their relationship.   Ã‚  Ã‚  Ã‚  Ã‚  Marriage is portrayed as something that is a fact of life, not the special bond it is. A man or woman is married but still feels the need to look at the opposite sex while not realizing that this hurts the other. Even if a man thinks another woman is attractive or even more attractive than his wife, he should, under no circumstances, let his wife know he thinks this. It hurts a relationship when someone looks at the opposite sex as if they want him or her.  Ã‚  Ã‚  Ã‚  Ã‚   Michael is depicted as thinking he is happily married and very much in love with his wife. In reality, if he were so happy with his wife, he would not feel the need to obviously stare at other women. He is lying to himself to think he is happy with his wife. Because he is lying to himself, he is also lying to her. By him staring at other women, it shows that he is disregarding her by inattentiveness to her needs, wishes, and desires. A husband is supposed to want to fulfill his wife’s desires daily. Frances tells him â€Å"†¦we only see each other in bed (1034).† This shows that he does not ...

Thursday, October 24, 2019

Perception Essay Essay

When we look at something, are we all seeing the same thing? Perception is the ability to see, hear, or become aware of something through the senses. It is the way in which something is regarded and understood. Metaphysicians, Logicians, Political and Social philosophers have thought about perception since the beginning of history. We all perceive; our sensual organs discern information the way they are designed to however, do we see differently because we all interpret what we see differently? One of the major senses is sight. This sense allows us to see by simply reflecting light onto one of our organs. The complex part however is the decoding of the information that is reflected. Our minds interpret the light that is reflected and turn it into information for us to sense our environment. It can be argued that the processed information is not always true. One example of this idea of flawed information would be the Rubin’s Vase form, which was developed by Edgar Rubin, a Danish psychologist. The visual effect generally presents the viewer with two shape interpretations, each of which is consistent with the image. The viewer is meant to see two images; one being two humans facing each other and the other is a vase. This form is an illusion and is created by the mind. The fact that there are two images seen to us does not mean that one of them has to be wrong. There is no wrong or right, it is just how our brains interpret the information. It can be considered that these interpretations are affected by our lifestyles and societies. Interpretation of the same image also changes from person to person. If looked on a bigger scale, these changes are affected from differences in cultures and paradigms. Color is also a major variable in testing perception after illusions. Do we see colors differently? One of BBC’s most fascinating shows: â€Å"Do You See What I See† explores this question. In the English language, there are distinct words to describe specific colors. â€Å"Green† and â€Å"Blue† describe specifically the wavelengths received by our eyes, color is after all just waves. 2 circles made up of 5 green squares on the left side, and 4 green squares and 1 blue square on the right. When the same image was shown to villagers from northern Namibia, they couldn’t pick out the blue square on the right however, picked out the  slightly different green colored square on the left. Any kind of conclusion can be made from this research. For example, because of less vegetation in Namibia, the habitants have a more fragile sense of color when it comes to green. They can differentiate very easily. Further research shows that there are many other factors affecting color perception including peoples’ moods, memories and feelings. Everybody sees the same wavelength but every individual sees a different color. Emotions also play a vital part in creating a perception. When we are filled with our emotions, we tend to be out of control of things. We always think that what we believe is always right no matter what the circumstances are. One great example of such behavior is the emotion of love. When we are deeply in love with a particular person, our understanding of happiness changes into only being oriented around them. The same thing goes for if we dislike somebody. Everything they do annoys us. This is generally referred to as â€Å"Emotions taking over†. The senses are accompanied by other senses to further prove that something is correct. A person sees a yellow pencil inside a glass of water. The pencil is curved and it is therefore perceived by that person that it is that way. However when the person removes the pencil from the water by touching it, it is understood that the pencil was not curved after all. This is a common allegory used by philosophers to explain how senses are used together to perceive. The person touches the pencil in order to feel its texture and therefore disprove his interpretation through sight. Other senses such as hearing, smelling and tasting are also used in accompaniment to seeing. It can be reasoned that people use different sense with sight and end up seeing something else in accordance to someone else. In conclusion every person’s skill to see is the same. Every person has the ability to receive light and process it into information however; the decoding of this information is different in each and every human being. Illusions show us something that is not there or alters the image we see. Our minds process it in the most useful way for us to perceive. As other sight related perceptions, it can be debated that every person sees  illusions differently according to what they have learned over their life. This is closely related to the way our societies are built. Our minds and our perception are affected by our teachings from our societies. What we see and what we perceive is rendered in order of usefulness to our environment and us. Emotion is also majorly related to perception. It can be debated whether our perception affects our emotions or whether our emotions affect our perceptions, however it obvious that our emotions play a vital part in what we see.

Wednesday, October 23, 2019

Are We Too Dependent on Technology

If you were to ask somebody what a computer was sixty years ago they would look at you look at you puzzled. Now days it is hard to find a household or office in America that does not contain at least one personal computer. With all of this information at our finger tips, we have to ask ourselves if we are becoming too dependent on technology. Imagine if we were to wake up tomorrow with all electronic devices disabled. Everybody’s life would be impacted in one way or another. We would lose what has become the largest portal for communication. We would also lose countless information that has been stored on computers. There is no denying that technology is going to continue to grow; and impact every aspect of our lives. But the question is if we are becoming too reliant on something that can quickly disappear. We very well could be at risk of losing it all very soon. I will discuss what could cause this change to happen. I will also go over how I believe our dependence on technology is growing. Earth’s magnetic field protects us from most of the suns radiation and other harmful effects. However, the sun is a very powerful force that can cause sudden intense outbursts of energy that are called solar flares. If a very powerful solar flare where to strike Earth it could cause serious effects to our power grid. If we have no power grid, we have lost all of our electronic devices that we count on so much. Solar flares usually impact us the most on an eleven year cycle. The most recent time solar activity peaked was in 2001, and caused widespread radio blackouts in the pacific. The newest cycle of solar activity had begun in late 2007, a year earlier than expected. Scientists say it will peak in 2012 and be between thirty to fifty percent more intense than the one in 2001. With the next one being hypothesized as so much more intense, I believe that it’s time we have a backup plan to accommodate a life without technology. A lot of people believe that we are not too dependent on technology. I spoke to my brother; he stated we just utilize it like we would automobiles or anything else like that. There is no denying the benefits of technology, however, I believe we should not get ahead of ourselves. Over the last fifty years our civilization has changed dramatically. Communication with friends and family has become as easy as the click of the mouse. Also we have saved countless trees by using electronic mail instead of paper mail. I agree that it is in our best interest to continue to use technology in the future. However, I feel that we all should get into the mindset of having a contingency plan in case we lose it. It is hard to go anywhere now days without interacting with a computer. A lot of jobs now require that you fill out applications on the internet. It has also become crucial that you have basic computer skills to be employed in any office setting. In 1994 only 3% of public schools had internet access. In just over ten years in 2005 that number had jumped to 94% of all public schools now having internet access. (US Department of Education) This just goes to show how fast technology is really growing. I feel that we are way to acceptant of something new and need to realize the repercussions before jumping right in. So many people rely on technology in their everyday lives. It could be from using your cell phone for an alarm clock, to setting a flight plan for a commercial flight. If we were to lose all of this, I believe that we would all be left in discontent. I believe that now is the time to slow down a little bit and gain a view of where we are heading. The way that I see it technology is going to continue to grow at a rapid pace. Everybody always wants the next coolest or fastest thing on the market. If you stop to realize how much our lives have changed in the last fifteen years. You can only imagine what our daily activities will be like another fifteen years from now. I believe the one thing that will remain the same in that fifteen years will be our dependence on technology. That is unless we do realize that we need to keep our advancements in check. I believe that a new potentially life changing technology should be closely analyzed before being released to the general public. If we don’t fully realize the potential effects of a new technology, we could be faced with unexpected consequences. Although I welcome change and enjoy using new devices myself, I feel that I too would be lost if I were to lose it all. For that very reason I think that we as a civilization need to realize the potential effects if it were all gone.

Tuesday, October 22, 2019

Free Essays on The Sovereignty And Goodness Of God

Throughout Mary Rowlandson’s narrative, The Sovereignty and Goodness of God, we receive a glimpse of what captivity among the Indians is like. Rowlandson’s personal account is from a Puritan’s point of view about Native Americans beginning in February of 1675. While reading this narrative, one must understand that the Native Americans were treated as bad if not worse than Mary Rowlandson herself. To get a true understanding, one must be aware of both sides of the story. Rowlandson’s faith remained the primary basis of how she dealt with most problems and her attitude towards the Indians. Even before her capture, Rowlandson saw â€Å"the causeless enmity of these Barbarians, against the English, and the malicious and revengefull spirit of these Heathen† (64). She perceived the Indians as â€Å"murtherous wretches†, â€Å"merciless Heathen†, and â€Å"Infidels† (68-69). As a woman of the Lord, she did not like all the battling, and the sight of murder was frightening. She dreaded the day they would invade her community. They came that â€Å"dreadfull hour,† and all the stories she had heard from others about invasion became a reality (69). Before she was actually captured, she always said she would â€Å"rather be killed by them than be taken alive,† but once she was captured she â€Å"chose rather to go along with those ravenous Beasts† (70). To go through such a trial as captivity would be such a witness to her Christian faith. Rowlandson did not think very highly of the Indians when they captured her, and to h er when they were all gathered in one place, it portrayed â€Å"a lively resemblance of hell† (71). Before Rowlandson’s captivity and throughout her first remove, the Indians are given the image as being animals. Even through these trying times, Rowlandson’s faith remained strong, and she never lost hope. When she felt like she might not make it, â€Å"the Lord renewed my strength still, and carried me along† (... Free Essays on The Sovereignty And Goodness Of God Free Essays on The Sovereignty And Goodness Of God Throughout Mary Rowlandson’s narrative, The Sovereignty and Goodness of God, we receive a glimpse of what captivity among the Indians is like. Rowlandson’s personal account is from a Puritan’s point of view about Native Americans beginning in February of 1675. While reading this narrative, one must understand that the Native Americans were treated as bad if not worse than Mary Rowlandson herself. To get a true understanding, one must be aware of both sides of the story. Rowlandson’s faith remained the primary basis of how she dealt with most problems and her attitude towards the Indians. Even before her capture, Rowlandson saw â€Å"the causeless enmity of these Barbarians, against the English, and the malicious and revengefull spirit of these Heathen† (64). She perceived the Indians as â€Å"murtherous wretches†, â€Å"merciless Heathen†, and â€Å"Infidels† (68-69). As a woman of the Lord, she did not like all the battling, and the sight of murder was frightening. She dreaded the day they would invade her community. They came that â€Å"dreadfull hour,† and all the stories she had heard from others about invasion became a reality (69). Before she was actually captured, she always said she would â€Å"rather be killed by them than be taken alive,† but once she was captured she â€Å"chose rather to go along with those ravenous Beasts† (70). To go through such a trial as captivity would be such a witness to her Christian faith. Rowlandson did not think very highly of the Indians when they captured her, and to h er when they were all gathered in one place, it portrayed â€Å"a lively resemblance of hell† (71). Before Rowlandson’s captivity and throughout her first remove, the Indians are given the image as being animals. Even through these trying times, Rowlandson’s faith remained strong, and she never lost hope. When she felt like she might not make it, â€Å"the Lord renewed my strength still, and carried me along† (...

Monday, October 21, 2019

Free Essays on Legalizing The Magic Herb

Marijuana has been around since the beginning of time and it’s been used safely by people of all different types of cultures. Legalizing marijuana would not only better the country but could also help people in difficult medical situations. Marijuana is a commonly used name for a â€Å"drug† made from the dried leaves and flowering tops of a hemp plant. The Latin name for marijuana is Cannabis sativa. People can smoke, chew, or eat marijuana for its intoxicating effects. The flowering tops of the Cannabis plant let out a sticky resin that has in it the active ingredient of marijuana, known as tetrahydrocannabinol, commonly THC. It first became noticed in the United States in the 1960`s. Soon it became the second most popular drug after alcohol, and its popularity raised all through the end of the millennium, mostly among younger Americans. The pot that people smoke today is much more potent then the stuff people were smoking in the 1960’s and 1970’s. Most countries consider marijuana an illegal substance, but other countries differ on how they prosecute the use and possession of marijuana. Some countries only give small fines to pay, while others giver worse punishments, as well as imprisonment. If we legalize marijuana, we reduce the black market and the violence associated with the sale of marijuana. If it were legal, no one would have to sneak around trying to sell and or get it. People would not fight over it or kill over it if it was as available as cigarettes or alcohol. I believe gang fights would decrease and there would be less deaths in more urban areas. This would weaken organized crime a lot. The government could tax the sale of marijuana and use this income to lower the national debt. The government seams to tax everything. If marijuana was legal, why not tax it, also? The taxes could help lessen the nation debt of the United States so we can put that money to better use. There would also be a decrease in money s... Free Essays on Legalizing The Magic Herb Free Essays on Legalizing The Magic Herb Marijuana has been around since the beginning of time and it’s been used safely by people of all different types of cultures. Legalizing marijuana would not only better the country but could also help people in difficult medical situations. Marijuana is a commonly used name for a â€Å"drug† made from the dried leaves and flowering tops of a hemp plant. The Latin name for marijuana is Cannabis sativa. People can smoke, chew, or eat marijuana for its intoxicating effects. The flowering tops of the Cannabis plant let out a sticky resin that has in it the active ingredient of marijuana, known as tetrahydrocannabinol, commonly THC. It first became noticed in the United States in the 1960`s. Soon it became the second most popular drug after alcohol, and its popularity raised all through the end of the millennium, mostly among younger Americans. The pot that people smoke today is much more potent then the stuff people were smoking in the 1960’s and 1970’s. Most countries consider marijuana an illegal substance, but other countries differ on how they prosecute the use and possession of marijuana. Some countries only give small fines to pay, while others giver worse punishments, as well as imprisonment. If we legalize marijuana, we reduce the black market and the violence associated with the sale of marijuana. If it were legal, no one would have to sneak around trying to sell and or get it. People would not fight over it or kill over it if it was as available as cigarettes or alcohol. I believe gang fights would decrease and there would be less deaths in more urban areas. This would weaken organized crime a lot. The government could tax the sale of marijuana and use this income to lower the national debt. The government seams to tax everything. If marijuana was legal, why not tax it, also? The taxes could help lessen the nation debt of the United States so we can put that money to better use. There would also be a decrease in money s...

Sunday, October 20, 2019

Catcher In The Rye Psychiatric Analysis English Literature Essay

Catcher In The Rye Psychiatric Analysis English Literature Essay At the time of telling his story, Holden is in a patient in a mental hospital. He is telling his story to an unnamed listener. Pretend that you are a highly respected psychiatrist who is listening to Holden’s account. It is your responsibility to write a report on the mental stability of patient to determine whether or not he is fit for release. Below this is the standard psychiatric report sheet that you must fill out to examine Holden’s state of mind. Your evidence must be well documented and complete. Refer to specific incidences. You will need to research emotional depression, its causes, effects and treatments. (You might try searching ‘manic behavior†.) Account for the possible causes of Holden’s breakdown and suggest possible treatments. Remember, a person’s freedom depends on your professional judgment. Holden’s father is a lawyer who. He seems to be rather strict and very interested in appearances he shows this by making sure t hat Holden stays in exclusive prep schools, whether he has to to be or not. He never got to know Holden because of this. His mother is mentioned as being â€Å"nervous as hell†, having frequent headaches and sitting up smoking most nights. All of it is blamed on her never getting over Allie’s death. Holden never got to know his parents because he was for the most part sent to boarding schools. He never had a chance at developing a healthy relationship with his parents. Holden’s family is obviously very important to him. At the beginning of his account he begins with talking about his parents and his brother. Holden negatively criticizes them to conceal the fact that he truly loves them. Holden is constantly being sent from one boarding school to a new. The emotional distance between him and his parents strengthens his general alienation from everyone. STANDARD PSYCHIATRIC RELEASE FORM (page 2) 2. Sibling Relationships / Rivalries He has a good relationship with his sister, Phoebe. He loves his sister and admires her. He wants to protect Phoebe from the cruel world. Phoebe understands what Holden is talking about and what he is going through. Holden feels the constant need to protect her from the â€Å"cruel world’ around her. Phoebe is concerned about Holden’s future and what will happen to him when their dad finds out Holden got kicked out of boarding school (pg 164 Salinger). When Holden is going to run away to the west, she tells him that if he goes, she will too (pg 207 Salinger). After this Holden seems to be able to grasp the reality that she will be destroying her life if she runs with him, and decides that he will go home with her. This is the only time that Holden put another person ahead of himself and acknowledge that he has the capacity to change the lives of others. This judgment of his shows that there may be hope that Holden has the capability to heal into a fully functioning adult subsequently to his re-entry into the world after exiting the mental hospital.

Saturday, October 19, 2019

Sub-Problems in Decision Making of Business Management Literature review

Sub-Problems in Decision Making of Business Management - Literature review Example Researchers emphasize on the fact that decision making is simply a rational process or ideology that takes place within any organization. Many studies however, fail to emphasize on the fact that taking a decision involves various stages where formulating a particular decision can take time and effort, and can have multiple variables involved as well. Theorists have developed mathematical models based on averages and probabilities through which alternatives can be evaluated before taking a final decision. These models have been utilized in several industries and in various areas in order to evaluate various alternatives at hand in order to make a decision. In this context, it must be noted that even though these models allow for rational decision making in a scenario where all other variables are constant, environment plays a critical role in how businesses take their decisions. For instance, organizations where dynamism is lacking and munificence is low, it may be noted that decision s may not be as rational as dictated by the mathematical models. ... In this context, this research will particularly emphasize on some problems that are related to decision making within organizations, and evaluate why organizations face these particular problems at hand. In addition to that, the research will aim to identify various ways through which organizations can improve their decision making ability based on the answers ascertained through this research for the hypotheses formulated below. Sub-Problems in Decision Making of Business Management 1. The time and place to use programmed or non-programmed decision making is always a problem in business management. 2. Lack of dynamism affects the decision making and becomes a major problem in business management. 3. Lack of munificence negatively affects the ability of the managers to take risk. Thus affects the decision making in business management. Hypothesis Based on the fact that each organization requires a certain level of decision making at each layer within the hierarchy, following problem s have been identified in general, pertaining to decision making: 1. Mathematical models for decision making are only useful when undertaking rational decision making. 2. Decision making will not be rational if dynamism within an organization is not present. 3. Risk taking within organizations is reduced when munificence is not present within organizations. This leads to lack of rational decision making at each step within the organization. These hypotheses will be tested within the research, after conducting a detailed primary and secondary research, including review of literature and conducting quantitative research as well. Literature Review Decision

Friday, October 18, 2019

How Do We Use Stories Essay Example | Topics and Well Written Essays - 1750 words

How Do We Use Stories - Essay Example Stories are also powerful. They enchant, delight, recall, touch, teach, motivate, inspire and challenge us. They help us understand certain things by creating pictures in our minds. Our lives revolve around stories, and as such, they move us and make us feel alive. Our appetite for stories is a demonstration of our insatiable desire to understand life patterns, an understanding that in addition to providing an ideal intellectual exercise also provides a personal emotional experience. Thus stories offers a platform through which we can reach out to people, and connect with them emotionally. It is therefore imperative that we understand the various forms and occasions that we use stories, the objectives we want to achieve, and the means we employ in our quest for achieving the said objective. The primary motive of a story is to capture a moment or event and then immortalize it. This is how information regarding various cultures and occurrences that took place way before the advent of writing passed down through generations, until this day we are able to either read them in books, or listen to people narrate them. These stories, whether we hear them or read them, have several aspects that tend to remain unchanged over time. For instance, a good number of stories we hear or read focus on human beings, the people. Be it ancient tales or modern stories delivered in a setting such as in an organization, or a story focusing on the environment or of the times before humans came to be, the central focus remains the people, in the form of characters at play, and by extension, the audience. All stories maintain this focus on the people in order to remain relevant, attract the listener or the readers’ attention, and thus pass the information, which as aforementioned, could b e to educate, or just to preserve facts and ideas about the community. Stories also stir up emotions. The preservation of an event or occurrence

Wind Moment design analysis Statistics Project Example | Topics and Well Written Essays - 1750 words

Wind Moment design analysis - Statistics Project Example To counteract this old technological view, wind moments or wind connections remain as the only simple method design for multipurpose frames. Though developed earlier, the design was initially developed to compensate for the wind loads while the preferred connection method was by angles, bolting or/and small T-stab sections this were used to carry the column flanges and the bam flanges.Wind moment apply to row rise frames of to four or less. The method assume that when structure are subject to wind loads. The connections behave normally as rigid joints (figure1) and that under vertical loads, the connections act normally simple connections; figure 2.Designer view this deign as having more advantage as compared to the conventional design grades.   They are simple and suitable for manual calculations. The frames of the structure are taken to be statically determinate. Internal forces and moments are not depended on the relative stiffness of the individual structural members. In constr uctions, this methodological design is relatively simple of the steelwork in comparison to full rigid construction. It has been determined that the steelwork contractors are always concerned with making steel work connections in the workshops. This increases the cost of construction by as high as 50% of the total cost of the completely erected work. With the wind moment design, the connections are simplified and thus reduced fabrication input.   This has a notable reduction in the total cost of steel frame erection. 1.2.  Connections

Thursday, October 17, 2019

Structureal engeneering Assignment Example | Topics and Well Written Essays - 3000 words

Structureal engeneering - Assignment Example These are often polluted by hazardous wastes and pollutants of low level. The brownfield sites have become very popular recently because of the lack of availability of green lands (lands which have not been built-upon in past). These sites are very popular in urban areas where demand for residential and commercial buildings is very high. In such areas the old buildings are destroyed and new buildings take their place. The government in UK is taking considerable steps to encourage the use of brownfield sites and these sites have become very popular in recent past. Brownfield sites are being developed on priority basis. Brownfield sites can be redeveloped in many ways, not only by constructing residential or commercial buildings but also as recreational and open spaces. The first step in the redevelopment of a brownfield site is its assessment through certain specified experimental procedures. These experimental procedures involve analysis of the soil, analysis of surface and ground water through testing for hazardous compounds. After the conduction of these tests test reports are obtained which dictate the extent of pollution and the nature of remedial measures. Certain specific laws are present which govern the redevelopment of brownfield sites, these laws are subjected to strict environmental regulations and these can be prohibitive for the developers. A brownfield site developer should not only know about the construction techniques but also should be highly equipped to cope with environmental challenges which are to be faced during the redevelopment of a brownfield site. After the correct assessment of the potential risks involved in the redevelopment of the brownfield site, the next step is the remediation. Remediation means the removal of al l the assessed contaminants to an extent that will bring the contamination level to a very low which is

UK policing Essay Example | Topics and Well Written Essays - 4750 words

UK policing - Essay Example It shows us that in the present time the police can exploit the technology to seize the criminals (i.e. via DNA Testing, Finger-Prints etc), unlike in the past with no use of technology. (EDWARDS 1994 131-50) Triumphs, achievements, mistakes and failures are what make up the study of history. Studying the history of Policing can be precious in many ways because it gives an insight into way the practices were carried out in the past and why they have changed or emerged over time. To value police history is to appreciate the development of what policing is now. vast example of policing history is protection against Indigenous cultures. Before the governing bodies where introduced after the massacre at Myall Creek, rights and social acceptance towards Aboriginal people were non existent, but dramatically changed after the conviction of 7 men of brutal killing of innocent Aboriginal people. The new rights have given the chance for Indigenous cultures to live as normal of live as possible and feel socially accepted thanks to changes of policing history and the way it differs from when the first fleet stepped foot on Australia's shores. Studying the history of policing allows one to appreciate how and why the police are the way it works today. Studying the history of policing embraces the way policing fits into day's society and highlights how lucky we are in terms of police protection compared to history of policing. I found visiting the museum gave me clear understanding of policing history and why society is the way it works today. In conclusion studying the history of policing was very important and valuable in order to understand how certain rules and laws came about in reference to policing and why they are in place now. (COOK 2001 107-19) What Kinds of Work Do the Police Do Complementing these qualitative studies of policing, are series of more quantitative research projects which aim to establish the relative importance of specific activities that constitute routine police work in urban areas. The somewhat surprising conclusion of many of early studies of this type was that, contrary to air popular image, the police appear to spend relatively little time on law enforcement and crime-related tasks. Sherman's assessment that "the vast majority of police man-hours (sic) are expended in activity having little to do with law enforcement, but much to do with social service and peace keeping was typical of Anglo-American studies of police patrol work carried out in the early 1970s. Indeed, Punch's study of policing in inner-city Amsterdam went as far as describing the police as 'secret social service'. More recent research, however, has questioned this conclusion on both theoretical and empirical grounds. (BENNETT 2001 1-14) The Police and the Control of Urban Crime Given the importance of crime-related tasks, the effectiveness of police in controlling crime is an

Wednesday, October 16, 2019

History and Developyment of Religion Term Paper Example | Topics and Well Written Essays - 250 words

History and Developyment of Religion - Term Paper Example Religion can be separated into three fundamental groups: polytheistic, pantheistic, and monotheistic. Polytheism is a belief in many gods and came out of Hinduism, which began in roughly 2,500 BC. Also, it was the religion of other kingdoms such as the Assyrians, Babylonians, Egyptians, Greeks, and Romans (â€Å"Origin†). Polytheists believed that the gods were responsible for natural occurrences such as rainfall, harvests, and fertility. Typically, polytheistic cultures believed in sacrifices in order to placate their gods. On the other hand, pantheism is the belief that god is in everything. Pantheistic religions such as Buddhism, Confucianism, and Taoism believe that god is part of nature (â€Å"Origin†). The main principle to this belief is that humans are no different from animals, and we must live in harmony with them. The most famous pantheist was the Buddha, Siddharta Gautama, who founded Buddhism in 543 BC.

UK policing Essay Example | Topics and Well Written Essays - 4750 words

UK policing - Essay Example It shows us that in the present time the police can exploit the technology to seize the criminals (i.e. via DNA Testing, Finger-Prints etc), unlike in the past with no use of technology. (EDWARDS 1994 131-50) Triumphs, achievements, mistakes and failures are what make up the study of history. Studying the history of Policing can be precious in many ways because it gives an insight into way the practices were carried out in the past and why they have changed or emerged over time. To value police history is to appreciate the development of what policing is now. vast example of policing history is protection against Indigenous cultures. Before the governing bodies where introduced after the massacre at Myall Creek, rights and social acceptance towards Aboriginal people were non existent, but dramatically changed after the conviction of 7 men of brutal killing of innocent Aboriginal people. The new rights have given the chance for Indigenous cultures to live as normal of live as possible and feel socially accepted thanks to changes of policing history and the way it differs from when the first fleet stepped foot on Australia's shores. Studying the history of policing allows one to appreciate how and why the police are the way it works today. Studying the history of policing embraces the way policing fits into day's society and highlights how lucky we are in terms of police protection compared to history of policing. I found visiting the museum gave me clear understanding of policing history and why society is the way it works today. In conclusion studying the history of policing was very important and valuable in order to understand how certain rules and laws came about in reference to policing and why they are in place now. (COOK 2001 107-19) What Kinds of Work Do the Police Do Complementing these qualitative studies of policing, are series of more quantitative research projects which aim to establish the relative importance of specific activities that constitute routine police work in urban areas. The somewhat surprising conclusion of many of early studies of this type was that, contrary to air popular image, the police appear to spend relatively little time on law enforcement and crime-related tasks. Sherman's assessment that "the vast majority of police man-hours (sic) are expended in activity having little to do with law enforcement, but much to do with social service and peace keeping was typical of Anglo-American studies of police patrol work carried out in the early 1970s. Indeed, Punch's study of policing in inner-city Amsterdam went as far as describing the police as 'secret social service'. More recent research, however, has questioned this conclusion on both theoretical and empirical grounds. (BENNETT 2001 1-14) The Police and the Control of Urban Crime Given the importance of crime-related tasks, the effectiveness of police in controlling crime is an

Tuesday, October 15, 2019

Hollywood and Hip Hop Stereotypes Essay Example for Free

Hollywood and Hip Hop Stereotypes Essay For this activity, I choose this picture of American tennis champion Serena Williams. In the photo, Williams is wearing the latest attire for tennis which tends to reveal more skin as shown in her midriff-baring shirt for women players though it is meant to allow more freedom of movement and at the same time keep the player’s bodies from heating up during grueling matches. In this photo, it would appear Williams typifies the brute stereotype associated with African-Americans where those who are physically endowed, especially men, are savage, wild and violent and likely to be lustful (Ferris State University, 2010). Although this tag applies to men, this photo shows it could be applied to Serena though she has not declared herself a lesbian. Her physique is the result of her intense training regimen that comes with being an athlete in a sport that also requires strength. She can hardly be labeled as â€Å"Mammy† or even †Jezebel† where the former is laid-back and docile and the other is alluring but promiscuous. Her powerful strokes, her rippling muscles and nearly her athleticism makes her a â€Å"Brute† as all blacks are treated this way whenever they try are associated with sports. In conclusion, it would appear are blacks athletes or anyone physically endowed for that matter are classified brutes and along with that are the jokes or stereotyping. Racists believe this is the result of the evolution from apes to humans as the former are renowned to be the very aggressive and violent and the black people are said to have inherited these same animal traits which makes them faster, stronger, and more durable. Naturally, nobody in his right mind would think every black man is a dangerous animal waiting for the right moment to unleash his beastly qualities. If one were to judge a person it should not be on the basis of his ability, rather than the color of his skin and should not immediately subscribe to stereotypes despite the fact they do excel in sports. It is apt to frighten the womenfolk, prompting their fathers or husbands to protect them from these â€Å"savages† which of course, is wrong. Reference Ferris State University. (2010). Jim Crow Museum of Leftist Memorabilia. Retrieved July 24, 2010, from Ferris State University: http://www. ferris. edu/jimcrow/menu. htm

Monday, October 14, 2019

The Concept of Equitable Globalisation

The Concept of Equitable Globalisation Rebecca Knighton Globalisation Debates: The Concept of Equitable Globalisation and the Offshoring of Jobs ‘One of the fundamental questions of todays world is undoubtedly the question of equitable globalisation’, these were the words of Dr Janez DrnovÃ… ¡ek (2004), then President of the Republic of Slovenia, in a speech addressing members of the Alliance of Liberals and Democrats for Europe. In order to realise the importance of that sentence, an understanding must be gained of what is meant by globalisation. A word that Godin (2006) described as a buzzword; globalisation is today used to define, justify and legitimise the interconnectedness of the world. Theodore Levitt and his 1983 article The Globalisation of Markets in the Harvard Business Review are accepted by many commentators as the origin of the mainstream use of the term (Mullen, 2006; Abdelal Tedlow, 2006). Equitable globalisation can be defined as an interconnected world in which progress made is fair and development is impartial. When comparing this ambition to how modern day global relationships operate, it’s clear that globalisation today does not possess these qualities. Joshi (2009) explores globalisation and describes it as the increasing economic interdependence of national economies across the world, attributing this interdependence to a rapid increase in the cross-border movements of ‘goods, service, technology, and capital’, while this idea does not contradict the pursuit for fairness, the real and tangible effects of global interconnectedness do not always embody fairness or impartiality. The debate that will be the focus of this discussion, one that routes from the equality – or lack of equality – within global interconnectedness, is centred on offshoring. Offshoring is the process of moving parts of a business’s operations to a different country – this can be either through subcontracting with a contractual agreement or setting up business further premises in another carrying out tasks there. Mankiw (2004) describes the notion as the latest manifestation of the gains from trade ‘that economists have talked about at least since Adam Smith’, his opinion is that this so-called ‘phenomenon’ (Vedder, Guynes and Reilly 2010) is simply the next step businesses can take to profit in many ways in a progressing business environment. The source of the debate leads on from the aforementioned pursuit of equitable globalisation and the contrasting opinions, and justifications of those opinions, between those who support or dis parage offshoring. The debate itself can be separated between the country a business originates from and its chosen destination of offshoring, arguments from both locations identify reasons either for or against. Throughout the debate, the economic, political, social and cultural elements of this element of globalisation will be examined. The first area of the debate to be examined is the contrasting opinions about offshoring in the country of the business’s origin. For the purpose of this discussion, there will be a focus on the USA. A word that seems synonymous with these contrasting opinions is ‘protectionism’ – Mankiw and Swagel look into the term in their insightful 2006 article and conclude that in different arguments it come with entirely different connotations. Members of the American public are looking for some security and consistency in their job and the services they receive, and the term ‘protect’ is tantamount to this, and something they feel the US Government should prioritise. Brothers Ron and Anil Hira are prominent authors within this globalisation debate, and their book Outsouring America (2005) represents the debate well. Their view is that America policy, representative of MEDC’s around the world, is ‘naà ¯ve’ – stating that †˜the formula of free, deregulated markets and faith in American superiority ignores how the international economy has slowly and gradually shifted in the last few decades ‘. Their point follows on from book’s foreword by Lou Dobbs, in which the accusation is made that globalisation and its consequential offshoring have and continue to lead to economic insecurity which is in direct contradiction of the American Dream. This argument is somewhat fuelled by the media (Mankiw Swagel 2006; Amiti Wei 2005). Within the last decade, political events such as the publishing and the controversy surrounding CEA’s February 2004 Economic Report for the President Report in the run up to the 2004 election which mentioned offshoring have coincided with impartial reports and media attention regarding job losses and economic slowdown. These overlapping events have led to the subject of offshoring becoming thought of as a justification for a faltering labour market. In addition to the argument of a loss of American jobs, an element of this debate is about the quality of exported services. A customer survey by American Banker/Gallup (2004) found that of the two thirds of respondent aware of offshore outsourcing, the vast majority (78%) held an unfavourable opinion. Exemplifying this point is the relocation, and consequential return, of a call centre for the computer technology firm Dell due to customers complaining that upon its move to India, standards dropped and customer service quality was reduced, this was discussed by Taylor and Bain (2004). Although this case is not alone it its controversy, may call centres have remained in India and other popular offshoring locations – part of the Asian information technology enabled services (ITES) industry estimated to be worth US$1.5–1.6 trillion in 2020 (NASSCOM 2009a). To refer back to the aforementioned point of varying connotations of protectionism, the opinions found in academic and particularly economic literate are that the notion carries negative implications. This academic literature forms part of the discourse that offshoring is a positive contribution to a country’s economy. In order to justify the concept of outsourcing, economists look into the theory that defines their subject area – a part of this theory is comparative advantage. This is the ability for one party to produce a good or provide a service at a lower marginal cost to its competitor (Baumol Minder 2009) and can also be applied to whole countries. The comparative advantage that, for example, India can offer US companies for elements of their business that can be outsourced, is the driver of offshoring. One view of this concept is that of Bhagwati (2008), who labelled the phenomenon ‘kaleidoscopic comparative advantage’ is recognition of its complex ity. In direct contradiction to the so-called protectionists’ opinion of a negative effect on the economy, McKinsey Consulting (2003) calculate that overall net US income rises by about 12–14 cents for every dollar of outsourcing; this is due to the increased profits of companies being contributed to tax, being used to develop and grow the business – leading to more US employment, and consumers paying lower prices for products and services that have been made cheaper by offshoring. A further point in the debate that this embodiment of globalisation is good for the economy is that these global economic developments could be liken to a third Industrial Revolution. Blinder (2006) explored this idea – he identified that such vast and unsettling adjustments are not unique today as the same repercussions were felt during both the agricultural and the manufacturing industrial revolutions, but added that both of those economic changes are looked back upon as succ essful and relevant steps forward. The article goes on to address the opinion that jobs are risk of being relocated are those that are typically lower paid; using an example of taxi drivers, aeroplane pilots, janitors and crane operators as ‘safe’ jobs, compared with accountants, computer programmers, radiologists and security guards as jobs that could potentially be outsource. The range of jobs that are or are not at risk do not correspond to traditional distinctions between high-end and low-end work. A further point opposed to the argument against the offshoring of job to America is the contest to opinions that it lead to a reduced quality of customer service. Blinder (2006) comments on the constant improvements in technology and global communication, says that due to this there has been little or no degradation in quality. The education of the employees in foreign companies is discussed by Doyle (2012) – he used the example of the recent vast improvements of English Language education in India and puts forward the point that this in turn eliminates a potential language barrier that may have supposed negative effect on the customer service provided by companies that outsource their call centres to country that don’t have English as a first language. Having explored both view of offshoring in the country of the business’ origin, the nest step to gaining an understanding of this globalisation debate is that of the country hosting these outsource jobs. Similarly to the previous arguments, using a case study will allow a more in depth investigation into the opinions and justifications of this debate. India will be the focus of this debate – chosen due to its popularity amongst business as a destination for offshoring jobs. According to the Tholons 2013 report of the top worldwide outsourcing destinations, six Indian cities are within the ten most favourable, including the 1st and 2nd being Bangalore and Mumbai respectively. The offshoring of jobs to India is regarded as the main vendor of offshored jobs, with some estimates that an additional 400 people are employed a day due to jobs that have been offshored (Bergh et al, 2011). This contribution to the economy is the main positive with this globalisation debate in favour of outsourcing jobs to India; a contribution estimate by Nasscom to be growing 19% per year (Nasscom, 2012). Bergh et al (2011) go on to discuss the impacts of this input into the India economy, such as vast improved have been made to infrastructure that has in turn allowed further expansion and an increased quality of life. A further part of the debate is the social side of this embodiment of globalisation: this impacts of increased employment. Despite criticism, that will be explored further into this discussion, there is evidence within academic literature and other publications that improvement are made to the quality of lives of those employed by companies that have offshored their jobs to India, Ball et al (2005) explore this point, their findings indicate that those employed by subsidiaries of the original company that has outsourced the jobs benefit from working conditions better than if they were employed by companies based in India, as well as a better sense of job security. Another point is the claims that these companies recognise the nature of the work, identifying that by working and travelling home overnight employee would be increasingly vulnerable, and by offering security and transport services care is taken of these employees (Messenger and Ghosheh, 2010). Whilst this argument of the positive effects on the vendors’ economy and the satisfactory to good working conditions provided is legitimised by academic papers on the subject, the opposing opinions come from a strong stand point and are very well justified by both academic research and events in the media. One underlying point of this discourse relates back to the point of equitable globalisation and the impartiality of development – a concept which ties in with the opportunity to develop sustainably. A major criticism of the presence of outsourced jobs and the effects of these in India and other vendor nations is the instability of and speed in which changes are being made. Whilst governments, such as in India, have been recognised as paramount in facilitating an inflow of not only foreign capital but also knowledge and technology. Winters and Yusuf (2007) highlight the pressure felt governments by internationally trading companies to aid their overseas operations – attributing this to the fast growth and lack of forward planning when implementing incentive schemes. This potential instability is worsen by claims that India may be losing its popularity amongst multi-national companies leading to a slowdown in investment (Helyah, 2010; The Economist, 2013). A second element to this discourse is explored by Messenger and Ghosheh (2010), and is based on the deep rooted cultural differences between vendor countries, i.e. India, and the companies’ country of origin. This leads to difficulties in integration and segregation between higher management and workers, which is turn can very negatively affect moral. A further point in the issue of cultural difference, is the westernisation of the nation a company is operating – an example of this is demonstrated in a Post-Colonial perspective investigation into recent changes in Indian culture and an example within the paper, by Ravishenkar et al (2013), is the education system in India that is said to ‘mimick’ Western concepts and ignore local stakeholder. Whilst this change would not be considered a negative by all commentators, it exemplifies a potential loss of national identity which has been explored in the wider sense of globalisation by Featherstone (2005). A final point in the discussion of this debate is the working conditions of people employed in offshored jobs. Ghimire (no date) commentates the topic and highlights the following point as issues within the sector: disturbed social and family life due to overbearing work commitments and a lack of flexibility by employers; detachments from local culture and lifestyle; racist abuse from customers abroad. This list is increased by further contributions from Messenger and Ghosheh (2010) who explain that of their sample over 50% have suffered from work related illnesses and conditions including back and neck pain, sleep problems and headaches; they also reveal that many regulations set out by India’s government are not adhered to or are interpreted in the favour of employees: example are having the breaks required by law being dependant on outputs and call levels (in call centres) or breaks cut short due to overloading workloads and missed, sometime considered unattainable, targets . Due to the nature of companies with insufficient working condition, data is not available across the board due to secrecy and strict employee contracts; information in the media gives an insight into how conditions are worse than this, but cannot be relied on to be true and legitimate sources in an academic discussion. By investigating the debate with what can be identified as four separate discourses, a comprehensive understanding can be gained of the opinions, justifications and evidence of each opposing argument. The exploration of such a topical and global debate bring some difficulties – such as contradicting literature and misinterpretation of statistical evidence. The question of the practice of offshoring is a prominent debate within globalisation; and due to its so called ‘kaleidoscopic’ complexity (Bhagwati, 2008) and multiple standpoints it demonstrates the complexity in the global interconnectedness of today’s world. When returning to the initial concept of equitable globalisation, this debate highlights how the pursuit of that ideal is somewhat unattainable; the impartiality of the concept is impossible to obtain due to the nature of the profit driven forces that dominate the global relations and drive globalisation itself. References Abdelal, R and Tedlow, R S (2003) Theodore Levitt’s ‘The Globalization of Markets’: An Evaluation after Two Decades. Harvard NOM Working Paper No. 03-20; Harvard Business School Working Paper No. 03-082. [Online] Last accessed 04/01/14 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=383242 American Banker/Gallup (2004), What Americans think about overseas outsourcing? American Banker. 169 (192) 18 Amiti, M and Wei, Shang-Jin (2005) Fear of Service Outsourcing: Is it justified? Economic Policy. 20 (42) 308-347 Anon (2004) Economic Report of the President, 108th Congress, 2nd Session [Online] Last accessed 06/01/14 at http://www.gpo.gov/fdsys/pkg/ERP-2004/pdf/ERP-2004.pdf Anon (2013) India No Longer Automatic Choice for Services and Back Office Work. The Economist. (Special Report). Bain, P and Taylor, P (2004) Call Centre Offshoring to India: The Revenge of History? Labour and Industry: A Journal of the Social and Economic Relations of Work. 14 (3) Baumol, W and Binder, A (2009) Economics: Principles and Policy. Ohio: South Western Cengage Learning Bergh, A, Israels, R, Mehta, S, Sheychenko, A (2011) A decade of offshore outsourcing to India: Define your strategy for the next decade. [Online] Last accessed 07/01/14 at http://www.quintgroup.com/content/library/A_Decade_of_Offshore_Outsourcing.pdf Bhagwati, J (2008) The selfish hegemon must offer a New Deal on trade. [Online] Last accessed 06/01/14 at http://delong.typepad.com/egregious_moderation/2008/08/jagdish-bhagwat.html Blinder, A (2006) Offshoring: The Next Industrial Revolution? Foreign Affairs. 85 (2) 113-128 DrnovÃ… ¡ek, J (2004) Speech by President DrnovÃ… ¡ek at the opening of the meeting of European Liberals in Ljubljana [Online] Last accessed 04/01/14 at http://www2.gov.si/up-rs/2002-2007/jd-ang.nsf/dokumentiweb/A28B9C6C3EC2ABFEC1256F95002CB360?OpenDocument Farrell, D, Baily, M, Agrawal, V, Bansal, V, Beacom, T, Kaka, N, Kejriwal, M, Kumar, A, Palmade, V, Remes, J, Heinz, T (2003) Offshoring: Is it a Win–Win Game? McKinsey Global Institute Featherstone, M (2005) Undoing Culture: Globalisation, Postmodernism and Identity. London: Sage Publications Ghimire, b (no date) Social Impact of Outsourcing. Understanding Outsourcing. Professional Education, Testing and Certification Organization International [Online] Last accessed 07/01/14 at http://www.peoi.org/Courses/Coursesen/outsrc/outsrc6.html Ghosheh, N and Messenger, J (Eds) (2010) Offshoring and Working Conditions in Remote Work Godin, B (2006) The Knowledge-Based Economy: Conceptual Framework or Buzzword. The Journal of Technology Transfer. 31 (1) 17-30 Guynes, C, Reilly, R and Vedder, R (2010) Offshoring Limitations. Review of Business Information Systems. 14 (1) Helyar, J (2012) Outsourcing: A Passage out of India. Bloomberg Business Week Companies and Industry Hira, A and Hira, R (2005) Outsourcing America: What’s behind our national crisis and how we can reclaim American jobs. New York: AMACON Joshi, R M (2009) International Business. New Delhi and New York: Oxford University Press Levitt, T (1983) Globalization of Markets. Harvard Business Review. May/June. 92-102 Mankiw, G and Swagel, P (2006) The Politics and economics of Offshore Outsourcing. Journal of Monetary Economics. 53 (5). Mullen, J (2006) An ‘Original Mind’ of Marketing Dies. Advertising Ages. 77 (8) NASSCOM. (2009) Gender inclusivity in India: Building an empowered organisation. [Online] Last accessed 06/01/14 at: http://www.nasscom.in Tholons (2013) 2013 Top 100 Outsourcing Destinations: Rankings and Report Overview. p2 Winters, A and Yusuf, S (2007) Dancing with Giants: China, India and the Global Economy. Washington: World Bank Publications

Sunday, October 13, 2019

A Lady in a Machine-Shop Essay -- Susan Bivin Aller

In "A Lady in a Machine-Shop," Susan Bivin Aller uses creativity, determination, and confidence to demonstrate how they led Margaret Knight to succession as an inventor. Knight and her family moved to Manchester, New Hampshire when she was at a young age. At the age of twelve, Knight witnessed a mill worker injured by a steel-tipped shuttle. This motivated her to create a safety mechanism, her first invention, to prevent any further injuries in cotton mills. Knight's mind was built with creativeness and that helped her succeed. As Knight grew up with her brothers, she invented "sleds, kites, and other playthings that?were the envy of all the boys in town." Knight often had a smile on her face when making new items for her brothers. She enjoyed inventing and helping others in need. "Because she didn't play with dolls," like other girls did, Knight's mind developed independently and creatively. She was the type of person that had her own thoughts and feelings. When Knight worked at the Columbia Paper Bag Company, she wanted to improve how the machines made the bags. The bags were si...

Saturday, October 12, 2019

The Satire of Animal Farm :: Animal Farm

The Satire of Animal Farm Orwell's book, "Animal Farm", is full of satire. This satire is Orwell's way of communicating problems and resolutions. The main message in Animal Farm is that power cannot be divided equally. There will never be equality for all. Once power is obtained it is always abused, and power causes all to think as the leader does. Equality does not exist, for it is impossible for everyone to be equal. There will always be a leader and there will always be followers, and they will never be equal. A society in which all are equal will never exist because people will have different opinions on the way that the society should be run. "This arrangement would have worked well enough if it had not been for the disputes between Snowball and Napoleon. These two disagreed at every point where disagreement was possible." Snowball and Napoleon are battling for control of the farm, they both want to be the leader because they know that the leader has the most privileges. The animals that are in charge, the pigs, do less work than the other animals. "All that year the animals worked like slaves." The title of leader is highly sought after, because the leader tells everyone what to do without actually having to work. The pigs not only do less work but they receive more food. "Once again all the rations were reduced, except those of the pigs and the dogs." The fact that the pigs receive more food than the other harder working animals, shows that the farm is full of inequality. This type of governing is wrong, and Orwell wants it to stop. Less power should be given to the leader, so that the leader and his followers can be more equal. Once a group or an individual obtains power, it is impossible to manage it correctly. The leader will always take advantage of his power. Power causes the leader to make decisions, that will only better himself. "... Boxer was being sent to the knacker's." The pigs killed an animal just so that they could make some money. The power led them to this decision, they could kill Boxer, make some money, and no one would ever find out. Everyone has heard about the golden rule: "whoever has the gold makes the rules." This applies to "

Friday, October 11, 2019

My Father Birthday

My father birthday It’s my habit to revise my homework every morning. This was became my grandmother used to wake me up since I was in primary school. This had helped me a lot in improving my school result and I wanted to keep it up and score good result in my spm Yesterday I also woke up early but not to revise my homework because the day was my father birthday. We all son decided to open a party for my father, but we did not know how to prepare a surprise party as I had no experience in buying things in market and cook my father favourite food. So we decided to ask my neighbour Jun Hen brother for helping. He is a kind heart person as he always help me when I need his for helping. When he knew I needed his helped to prepare party, he didn’t refuse and agree to help immediately. I was very happy because he also helped me to cook the dishes. We didn’t spend much time in the market because we needed a lot of time to prepare after my father came back from work. We cooked a lot of dishes such as sweet sour fish, fried chicken, curry, dessert and of cause a delicious cake. After cooking we also decorated my home, my whole family members helped me to hang balloons and ribbons Approximately 5pm we finish preparing and waiting my father back home.. My father would reach home at 6 pm sharp. before 6 pm we all hid behind the door to give him a big surprise as he didn’t know we were celebrating for his this special day. He was terrified when he entered the house, he could not believe that we still remembered his birthday and what he liked to eat. After enjoying the meal we had a karaoke session. We sang a lot of English song and my sister took a lot of photographs with my father. After that we played some games, my parents also joined in. I felt happy as I had never seen this such a long time. We whole family members also sang the birthday song for my father and gave him a big present that was a â€Å"kiss†, my father was touched then he cried. He felt happy. This was lovely day, my father was very happy as he didn’t expect this would happen, he felt that we have grown up and hopelly we can always celebrate this kind of occasions