Monday, September 30, 2019

Web Server Attacks

Web Server Attacks Aaron G. Flaugh Strayer University Dr. Patricia White April 15, 2013 Web services are the most frequently attacked services of the modern network. There are three common attack types. They are all mitigated in different ways, this paper will discuss the means of protecting against them. The most effective attacks are call Denial of Services or DoS attacks. No organization is save from a denial of service attack even the federal government has been successfully attacked. How corporations can reduce the risk of these attacks will also be discussed.Web Application Vulnerabilities Web services have become one of the most frequently used technologies in business today, therefore it is no surprise, which are among the most frequently targeted applications. There are five common types of attacks for web services: SQL injection, remote file inclusion, local file inclusion, directory traversal and cross site scripting. Those were just the technical type attacks there are al so two other business layer attacks, they are email extraction and comment spamming.According to a survey group iMPERVA; cross-site scripting (XSS) accounts for twenty-nine percent of sampled attacks, directory transversal (DT) accounted for twenty-two percent, local file inclusion was fifteen percent of the attacks, SQL injections were fourteen percent of the malicious traffic, business logic attacks accounted for another fourteen percent and finally remote file inclusion only accounted for six percent of the traffic. The business logic attacks were split as follows email extraction was nine percent and comments spamming accounted for five percent of the section. Cross-Site ScriptingIn this attack type the attacker attempts to hijack a user session then steal the information that they need to log on to the site. Sometimes they hijacker inserts hostile content or redirect the user to a malicious site to steal information. The final flaw that is used is not properly validating and es caping that content. Directory Traversal Directory traversal is attacking parts of a web site that are not typically exposed to the public viewers. This an exploit of the security of the web server. It is also possible to use this attack by not properly removing user-supplied file names to the file API’s.SQL Injection Attacks against the background database server is called SQL injection attacks. Using this type of attack the attacker is able to steal the data contained on the page or site. This attack is most viable when user input is either incorrectly filtered for escaped characters in the SQL statements or the user input is not typed appropriately. Combating Web Server Attacks There are several things that users can do to protect themselves from web server attacks. First they can patch their operating systems up-to-date. Second, install a personal firewall, anti-virus and anti-malware tools.Use complex usernames and passwords, and change passwords regularly. Finally, turn off client-side scripting such as JavaScript or ActiveX. On the web server side, there are some suggested fixes. First of all implement SSL connections however, it used to be that 128-bit encryptions was sufficient according to Saumil Shah from Net Square. Now it is not uncommon to utilize 1024-bit RSA encryption on SSL certificates. Second, run a best practices analyzer or threat analyzer and implement security fixes. Another, security method to protect internal resources through the use of reverse proxy servers.The final solution to these web attacks is the human element, verify code written by developers and correct any errors discovered. Denial of Service Attacks The most feared attacks on a network is denial of service attack or a distributed denial of service attack. In both attacks the objective is very simple as the name implies it is to disrupt the flow of information into a network, generally the objective is not to steal data or release confidential information. Denial o f service attacks are performed usually by a single attack thus, are much easier to defend against.Distributed denial of service attacks are much more difficult to detect and thus much more difficult to defend against. They are generally coordinated amongst many individuals or through automation using botnet malware. Defending and halting denial of service type attacks can be very easy to stop since they are from one threat. The first defense against this type of attack is the use of access control lists on either the firewall or on the border router. Cisco uses the following syntax in its IOS enabled devices: permit tcp eq .Within Cisco’s firewall products the PIX or the current Adaptive Security Appliance (ASA) the syntax is similar to that of the IOS devices. Cisco’s ASA platform has a much more diverse set of features to block attacks at the border of the network. The ASA con also be configured to detect and block ICMP flood attacks. The more sophisticated web se rvers can be configured the block http attacks. Cisco also offers products that are designed to detect and block single origin attackers. Most operating systems have firewall functions that are built into them.Third party security companies such as Symantec, Sophos, McAfee, and Zone Alarm offer personal firewalls to potentially block an incoming threat. This is the best alternative if a person or group doesn’t have control of their border devices. There are two other means by which a single attacker can be stopped. They are interrupting the communication between a hacked machine through the use null routes on a pc or device its, however this is sometimes very difficult to accomplish and only works on some Operating Systems.The final means by which to slow an attacker down is to enable web server security to block connections from the particular ip address. In a distributed denial of service attack there is generally no clear indication of which ip addresses are causing the ev ent. This make the DDoS attack extremely difficult to detect and defend against. Most the time DDoS traffic looks like ordinary network traffic, which makes detection difficult if not impossible in some cases. DDoS attack can be used against many different protocols used in network including TCP, UDP, ICMP and DNS, using flooding techniques to overwhelm a victim’s network.One of the best ways to prevent http or https flooding attacks is the incorporation of reverse proxy servers into the mix. The proxy server sits outside of the network and acts like a traffic cop in many ways. It doesn’t allow packets through that it deems at threat. It also breaks up or fragments the requests from the outside world. Department of Justice attacks Many organization has fallen victim to web server attacks. In October 2002, a DDoS attack was used to cripple the internet in the United States.This was done by simultaneously attacking eight of the thirteen root DNS servers. The Federal Gove rnment has fallen victim to DDoS a number of times, the Department of Justice has been attacked twice in the last eighteen months. In the last two notable events in January of 2012 and just this past January, the hacker group Anonymous has claim responsibility for the attacks. They were targeted in protest of the Stop Online Piracy Act and most recently in support of Aaron Swartz who had recently committed suicide.The only possible way that DDoS attacks could be carried out against the government’s servers is either enlisting thousands of people to assist by flooding the webservers with http requests or by the use of malware and the use of botnets. In either case the, it would take a lot of time to detect the attack and even more time to stop the attack. DDoS attacks on the Federal Government would need to be extremely complex and would take a long time to plan and carry out. I do not believe that they are as easy to carry out as some make it out to be.In order to mitigate at tacks in the future the Government needs to do several things. Implement reverse proxy server in front of the web servers. Make sure that all security fixes are up-to-date on all servers. Implement policies and procedures tracking changes to the web server security settings. Verify all user supplied information through the use of security images or the use of services like capture. Use of web services are common these days. Corporations, users and Government all need to take steps to protect themselves from web server attacks.This can be done in a variety of ways and is the responsibility of the information services to help management understand and prevent these attacks. References Geiger, William (2001). SANS Security Essentials GSEC Practical Assignment 1. 2f Practively Guarding Against Unknown Web Server Attacks Murphy, David (26 January, 2013). Pro-Swartz Hackers Attack U. S. Department of Justice Website retrieved from http://www. pcmag. com O’Keefe, Ed (20 January, 201 2). How was the Justice Department Website Attacked? Retrieved from: http://www. washingtonpost. com Romm, Tony (19 January, 2013).After Anonymous claims hack, DOJ site back. Retrieved from: http://www. politico. com Shah, Saumil (2002). Top Ten Web Attacks Presentation at BlackHat Asia Thatcher, Greg. How to Stop a Denial of Service Attack? Retrieved from: http://www. gregthatcher. com Weiss, Aaron 02 July, 2012). How to Prevent DoS Attacks Retrieved from: http://www. esecurityplanet. com Cisco Systems (2004). Defeating DDOS Attacks White Paper Citrix Systems Protecting Web Applications from Attack and Misuse Imperva (2012). Imperva’s Web Application Attack Report Government of Hong Kong (2008). Web Attacks and Countermeasures

Sunday, September 29, 2019

What Are Some Techniques

Integrating Sources Techniques for Paraphrasing When you write a paraphrase, you restate other's ideas in your own words. That is, y oh write the meaning of the author's ideas. You use some of the author's key terms, but you use many of your own words and sentence structures. You include in- text citation, including the author's last name and year of publication. Following are some techniques you can use to help you paraphrase. An effective par phrase includes more Han one of these techniques.If you use only one of these techniques when paraphrase aging, you have not paraphrased effectively. 1 . Change a word from one part of speech to another Original: Medical professor John Swanson says that global changes are influencing t he spread of disease. Paraphrase: According to John Swanson, a professor of medicine, changes across the globe are causing diseases to spread dames, 2004). 2. Use Synonyms Original: The U. S. Government declared that the AIDS crisis poses a national security thr eat.The announcement followed an intelligence report that found high rates of HIVE infection c could lead to widespread political desalination. Paraphrase: The government of the United States announced that AIDS could harm t he nation's security. The government warned the population after an important governmental study conch dude that political problems could result from large numbers of people infected with HIVE (Snell, 2005). 3. Change numbers and percentages to different forms Original: Minority groups in the United States have been hit hardest by the epidemic.African Americans, who make up 13 percent of the U. S. Population, accounted for 46 percent of the AIDS cases diagnosed in 1998. Paraphrase: The AIDS epidemic has mostly affected minorities in the United States. F or example, in 1998, less than 15 percent of the total population was African, but almost half of the people diagnosed with AIDS

Saturday, September 28, 2019

Operations & Process Mgt Assignment Example | Topics and Well Written Essays - 1000 words

Operations & Process Mgt - Assignment Example Expected inventory level is the stock held by a business more than its obligation for the lead-time. Firms hold Expected inventory level to guard against â€Å"stock-out† (Shah, 2005:227). Average inventory is utilized to approximate the quantity of inventory that a company naturally has on hand more than a longer time period than just the last period. Since the balance of inventory is computed at then end of the last dealing day of a month, it can vary significantly from the average quantity over a longer period of time, depending upon whether there was an unexpected decline of stock or possibly a big supplier delivery at the ending of the month. â€Å"Average inventory† (702) is also helpful for assessment to revenues. While revenues are naturally accessible in the statement of profits and loss not only for the most recent month, but also for the â€Å"year-to-date† (Bragg, 2011:151), it is helpful to also compute the average stock for the â€Å"year-to-date† (151), and then match the inventory average balance to the revenues of year-to-date in order to see how much stock investment was required to support a specified sales level. The company considers the average costs connected with â€Å"placing, processing and receiving† (Sabri, Gupta & Beitler, 2007:34) a replacement order for any part amounting to  £40. It also estimates the standard cost of holding a particular unit of every component in inventory for an entire year at 6% of the unit cost of the item. An â€Å"alternative inventory policy† (Fu, 2014:46) that denotes the quantity of units of inventories, which should be held to decrease costs is proposed. We can reduce the total annual stockholding costs by recognizing average inventory and decreasing â€Å"safety stock† (Minner, 2000:35). By reducing overall lead time and lead time variability, estimating investment cost and having a clear awareness of real possible investments

Friday, September 27, 2019

Organizational Behavior Movie Review Example | Topics and Well Written Essays - 250 words

Organizational Behavior - Movie Review Example Similarly, Nanny employs the goal setting and reinforcement theories. She is committed to changing the children’s behavior by teaching them the five lessons. Fundamentally, goal-setting theory centers on devising targets, showing commitment, and creating support systems (Borkowski, 2011). The employment of the reinforcement theory is evident when the children pretend to have contracted measles. Nanny punishes the children by giving them concoctions while indoors (Doran & Jones, 2006). The application of attribution theory is evident in the Nanny McPhee movie. Borkowski (2011) contends that attribution theory centers on the way and the reason people explain events in a certain manner. Attributions inform the behavioral and emotional responses (Borkowski, 2011). Nanny identified that destructive and unbearable behavior of the children, and planned on a workable way to change them. The spirit of optimism pointed by Borkowski motivated Nanny to endeavor to change the children’s behavior. The children were unruly to everyone, including Mr. Brown (Doran & Jones, 2006). Similarly, Nanny McPhee promoted the psychological closeness that enabled the children to adjust their

Thursday, September 26, 2019

Blackhead Essay Example | Topics and Well Written Essays - 1000 words

Blackhead - Essay Example Two of such conditions are mentioned below; tetany and diabetes. Tetany: Calcium ion, Ca+2, is an essential ion in the proper functioning of all cells in the body. Hence, its maintenance in the blood within a narrow range is very important, as both its excess and deficiency can have very unpleasant effects. Normally, it is kept at a concentration of around 10mg/100ml. This is achieved by the antagonistic effect of two hormones; calcitonin and parathyroid hormone (PTH). Calcitonin is released by the thyroid gland in cases of excess calcium ion concentration in the blood, and so it reduces the concentration by causing increased calcium deposition in the bones, and reducing uptake of the ion by the intestines and the kidneys. On the other hand, parathyroid hormone (PTH) is released by the parathyroid glands in cases of a lowering of blood calcium levels from the normal, and so it induces an increased absorption of the ion by the intestines and the kidneys, and an increased decomposition of mineral calcium into the calcium ion by osteoclasts in the b ones, thereby increasing the concentration in the blood and returning it to normal. However, in the condition known as tetany, there is a dramatic decrease in the blood calcium levels, resulting in uncontrolled convulsive contractions of the skeletal muscles. If worsened, tetany can be fatal. Hence, the homeostatic control of calcium levels in the blood is compromised, resulting in dire effects on the body. Diabetes: the blood glucose levels are maintained around a narrow set point of 90mg/100ml. Glucose levels are monitored and controlled with the antagonistic functioning of two hormones, both released by the pancreas; insulin and glucagon. Insulin lowers the blood glucose level by inducing an increased uptake of glucose by the cells, and its conversion to glycogen to be stored in the liver and muscles, a decrease in the conversion of amino acids and fatty acids to glucose, and inhibiting glycogen breakdown in the liver. Glucagon, on the other hand, reduces blood glucose levels by decreasing an uptake of glucose by the cells, so that more glucose is present in the blood, an increase in the breakdown of glycogen to glucose in the liver, and an increased conversion of amino acids and fatty acids into glucose. However, in the condition called diabetes, be it Type1 or Type2, there is a drastic increase in the blood glucose levels, either due to insufficient insulin production by the pancre as (Type1), or a decrease in the response of the target cells to insulin (Type2). Glucose concentration if increased so much that it is secreted by the kidneys in urine, and as excess urine is formed, this leads to dehydration and glucose accumulation in the blood. However, this glucose can not be utilized by the cells for metabolism due

Wednesday, September 25, 2019

Ancient greek art paper Essay Example | Topics and Well Written Essays - 500 words

Ancient greek art paper - Essay Example These figures are seen throughout the Aegean period. This is a clear indication that these figures were adored mainly among people of Crete and Greece (van, Schaik, 11). Interestingly, one of the well-known marble figures is mainly musicians; one who is a harp player, and another one who is a pipe holder. These are dated around 2500 BCE. These are considered the earliest extant musicians in the Aegean. Majority of the figures during this period were mostly women ranging from simple adjustment of stone to developed figures resembling human beings. Some of these figures had natural proportions while some were idealized (van, Schaik, 19). It is important to note that high number of these figures during Spedos type depicted uniformity and proportion, a clear indication that they were planned with a compass. Additionally, through scientific analysis it is evident that the surfaces of these figures were painted with mineral based pigments-azurite for blue ores or cinnabar for red. The figure in the Appendix shows a male seated on a high-backed chair playing a stringed instrument to assist him as he sings. Painted information that originally inflated the figure has currently been eroded into a plain white marble (van, Schaik, 22). Despite this, the information is still legible and engaging. What is interesting about this figure is its elegant wedge shape. The marble figure tilts back his head drawing his lips frontward. This enables one think or imagine words that he is likely to singing. Additionally, his ears are prominent. This enables him to hear his own music (van, Schaik, 26). The arm muscles and vigilantly articulated fingers suggest his capability as a musician; he releases his right thumb, maybe to sound a note on a string. The back of the musician’s head was painted maybe to show a close fitting cap. It is evident that he holds the front of the harp by use of his hands, and placing it on his leg and shoulder in

Tuesday, September 24, 2019

WiFi, VPNs & Encryption Assignment Example | Topics and Well Written Essays - 250 words - 1

WiFi, VPNs & Encryption - Assignment Example In this scenario, different restrictions are implemented on the system access mechanisms. As a result, it becomes very difficult for these security threats to pollute a system and spread to other systems and devices (Merrifield, 2015). In other words, the concept of least privileges is used by the system administrators to offer the smallest amount of system resources needed to complete important business tasks. This mechanism is implemented through a variety of methods such as user rights (for instance putting restrictions to users’ rights, the way they access to the systems), resource permissions for instance implementing restrictions on CPU, network, memory and file system permissions. For instance, if a middleware system simply needs access to the network, the capability to write to a log, and read access to a database table, it refers to all the authorizations that should be approved. However, the middleware server should not be granted administrative privileges in any cas e under any circumstances (OWASP,

Monday, September 23, 2019

Students-Teachers Friendship on Facebook Essay Example | Topics and Well Written Essays - 1250 words

Students-Teachers Friendship on Facebook - Essay Example It is worth noting that nowadays teens are making friends with everyone whom they find in face book or whoever requests them to be friends without being cautious of the possible harmful implications of such friendship. Teachers are adults charged with the responsibility of guiding young minds towards success in life. They act as role models to their students and whenever they decide to send them a friend request they are most likely to accept. On the other hand, students are most likely to find a teacher’s profile in the process of surfing and send a friend request. However, as adult’s teachers should give some ethical consideration due to some special reasons. A shocking discovery from schools that allow access to face book in schools indicates that about 60-70% of teenagers below the age of fifteen years have access to adult social networks including their teachers’. These children are too young to access these sites bearing in mind the nature of content that i s normally posted. This paper will focus on the main reasons as to why teachers should avoid being friends with students in face book. Body Privacy When teachers and students become friends, their privacy is compromised. This is because students will access teachers’ private information and content that is not fit for their consumption. Therefore, teaching and learning becomes a difficult venture as respect is compromised. Harassment If the relationship between the teacher and the student is not good, face book can act as a good ground for harassment and this applies for both students and teachers. Socialization through face book platform can create good environment for teachers and especially male teachers to harass female students sexually for example requesting sexual relationships and this often deteriorates class performance Intimidation Some students might see a teacher’s face book friendship intimidating .As a result they may become hesitant to accept their requ est for friendship mainly because they would not like their teachers to be privy to their conversations with their peers. At the same time they may fear saying no to a teacher’s friend request for fear that they will offend the teacher and negatively affect the teachers’ treatment of them Age appropriation Since teachers are adults, there may be postings from friends on their face book page regarding their adulthood status that does not concern students, the content in this case would be inappropriate for their students to read or review because it is deemed to compromise teacher’s privacy. Expectations Face book friendship between teachers and students changes the expectations of both parties .A learner who is a friend to teacher on face book will expect to be treated in a special way from the rest by the friend teacher. The teacher may also expect a student to post what regards to class work in their face book walls which would have otherwise be reserved to cl ass work this changes the expectations of everyone thus leading to a misunderstanding Prejudice As much as teachers try not to allow outside knowledge affect their treatment of students, technology will still have subliminal effect. A friendship between students and teachers on face book may compel a teacher to view a student in a whole different way in class than it was before. This creates an environment where students will fully be understood hence meaningful academic performance. Today’s situation where teachers are friends with students on face book is undisputable fact that requires urgent solution. If a teacher hasn’t given this situation some consideration then it is the right time to do so. The simplest resolution is to make a personal guiding

Sunday, September 22, 2019

How Can Americans Manage Obesity Throughout the United States Essay

How Can Americans Manage Obesity Throughout the United States - Essay Example As researchers gain knowledge more of about the health hazards of obesity, the increase in the incidence of obesity in children, and in grown up people as well, is progressively becoming more a foremost concern to a society at large and thus a societal health dilemma requiring nationwide attention. Over the previous decades, the pervasiveness of overweight children has enlarged remarkably in the United States, making it more probable that children and adolescents nowadays will be more vulnerable to various serious, fatal diseases and illnesses prematurely in life, including diabetes. The increase in obese children arrives at a time when present-day conveniences and establishment such as fast food, video game and most importantly the Internet, have contributed dramatically to inactive lifestyles, a pattern that is becoming progressively pervasive among today’s children and adolescents (Caprio, 2006). Approximations of the population of overweight and obese children and youths in the United States differ. Figures from the U.S. Department of Health and Human Services reveal that â€Å"13 per cent of children and 14 per cent of adolescents are affected by obesity—triple the adolescent rate since 1980† (Holloway, 2005, 118). An article of the American Family Ph ysician released in 1999 approximates that the population fall roughly between 25 per cent and 30 per cent of young children and teenagers. The boost spreads across ethnic and social groups (ibid, 118). Dr. Shiriki Kumanyika, a childhood obesity specialist, and others are attempting to pinpoint the cause for the steep increase in overweight children. â€Å"We’re trying to figure out how much of the problem is food intake and how much is the result of little to no physical activity (Koplan, 2005, 58),† says Dr. Kumanyika. â€Å"The social trends affecting children are definitely in favor of overeating. The impact of eating portions that are

Saturday, September 21, 2019

Treaty of Versailles Essay Example for Free

Treaty of Versailles Essay The 1919 Treaty of Versailles was made by George Clemenceau, David Lloyd George and Woodrow Wilson. They were the World War One leaders of France, Great Britain and America respectively, and after the war, made the Treaty to decide what to do with a defeated Germany. Four years of fighting and losses throughout the First World War made decisions difficult, but overall, the Treaty was the best that could have been achieved under the circumstances. The months of arguing, negotiation and compromise that led to the completed Treaty of Versailles were without Germany. She had not been invited to join in in any of the decisions, and the Treaty was presented to the nation on a take-it-or-leave-it basis. This was because the Big Three were arguing with each other so much, and didnt want to seem weak or divided in front of their enemy. Not only did this anger Germany, but there was nothing she could do about it. If the German government refused to sign the Treaty, the war would restart and it would be impossible for them to win. The German leader Friedrich Ebert had to sign it, or inflict inevitable defeat on his country. It was signed on the 28th June 1919. Part of the Treaty was Wilsons League of Nations; his ideal world parliament, to which many of the Germans overseas colonies were given to. Germany was not invited to join until it had shown it was a peace loving country, which insulted them greatly. Another of Wilsons ideas was self-determination for people in Eastern Europe; however German people in the newly-created countries of the other post-war treaties, were treated as second-class citizens and ruled by non-Germans. They thought this was unfair and that the Allies were treating them with double standards. This angered Germany, giving her people another reason for revenge. One of the Treatys other terms was that Germany had to accept full responsibility for starting the war and all of the consequent damage it had caused. Clemenceau and Lloyd George were in favour of this, however Wilson, known for his idealism, believed that Europe as a whole had triggered the war. He was probably right, as America had been an observer for the most part of the war. Germany was outraged at being given all of the blame. The German Count Brockdorff said, We are told that we should acknowledge that we alone are guilty of having caused the war. I would be a liar if I agreed to this. Their army was also restricted to 100,000 volunteers, roughly an twenty times smaller than it had been. The bitter resentment of holding the all of the war guilt hurt the Germans pride, but was also why in the 1930s, Hitlers idea of re-building the German army was so popular. The Treaty did not come down on either side of the fence. Germany was weakened, but no so weakened that it could not rise within a generation to threaten the balance of world power once again, said historian John Sheerer. The Treaty wasnt kind enough so the German people wouldnt be bitter, but not harsh enough to ensure that they wouldnt retaliate. It left the Germans both strong and resentful and the rest of the world in a dangerous position. The Treaty also lost Germany all of its overseas land, ten percent of its territory; population; agricultural land; coal, steel and iron industries; as well as a massive reduction in its army size. The reparations fee was an immense ? 6. 6 billion, which the nation only would have finished paying in 1984, had the fee not been reduced in 1929. Despite this, a treaty the Germans gave to the Russians, the 1918 Treaty of Brest-Litovsk, demonstrated how harsh the Germans would have been if they had won the war. The Treaty of Brest-Litovsk stripped Russia of thirty-four percent of its population, thirty-two percent of its agricultural land, fifty-four percent of its industry, twenty-six percent of its railways and eighty-nine percent of its coalmines, as well as a fine of 300 million gold rubles. The Treaty of Versailles seemed harsh, but was very mild in comparison to Brest-Litovsk. Historian Sally Marks adds, The real difficulty was not that the Treaty was exceptionally severe, but that the Germans thought it was, and in time persuaded others it was. Another point of view is Historian Dr. Ruth Henig, who says: The German people were expecting victory not defeat. It was the acknowledgement of defeat as much as the treaty terms themselves, which the found so hard to accept. The Treaty had not been read from cover to cover by anyone when it was presented to the Germans in the spring of 1919. Nobody knew what its cumulative effect would be, and none of the three leaders were satisfied with their work. Maybe if someone had taken the time to read it, or the Germans had been allowed to negotiate with the Big Three, history would be different. However, this may not have been possible. On the eleventh hour of the eleventh day of the eleventh month, the War to End All Wars ended, and the Allies were left with an unstable defeated nation, on the brink of economic and political chaos. The Big Three were under a lot of pressure to get a Treaty together before Germany totally collapsed, and the Treaty of Versailles may have been the best they could have achieved given the time pressure. It was better to come up with a solution, than not have one at all. The whole world was watching them make a decision that could change history, and that must have been stressful for the politicians. The leaders were also being pressured by their countries. Not being dictators, Clemenceau, Lloyd George and Wilson had to represent their peoples views. However, voters often see things in black and white, and in 1919, nothing was different. The citizens of France and England especially wanted to see Germany suffer, but did not understand the complex situation that their leaders did. In fact, George Clemenceau was actually voted out of parliament in 1920 for not being harsh enough on the Germans. Without a doubt, the Treaty was hard to make, and some historians point of view is that Lloyd George and Wilson were forced into agreeing to a harsh treaty. George Clemenceau was famous for being a tough, uncompromising politician, but he also had the moral high-ground. France had been most badly affected by the war. The stomach-turning pictures we see of wounded, shell-shocked soldiers were taken on French soil, not British or American. Large parts of France had been destroyed, and they wanted pay-back. Furthermore, France is geographically closer to Germany than Great Britain or America, and if Germany were to attack, the French would be the first victims. Clemenceau and the French population knew this, and this may have been why a lot of the Treatys terms seem to benefit France; for example, Alsace-Lorraine being returned to France. The Big Three all had very different aims: Lloyd Georges were to weaken Germany, but not cripple it so much, because Germany was Great Britains second biggest trading partner. If they were not able to trade with Germany, many British people would lose their jobs. He also needed France to be rebuilt, as they were long standing allies and when both strong, were useful to each other. As well as this, Lloyd George wanted the Germans to lose their empire, as it threatened the British Empire. Like the British Prime Minister, Wilson didnt want Germany crippled, because he feared that they would want revenge if their punishment were too cruel. He also campaigned for his League of Nations, which would bring world peace; and self determination for the people in Eastern Europe. However, Lloyd George disagreed with this, as self determination in some countries might lead to revolution in the British Commonwealth. Wilsons idea to end all empires obviously didnt go down well with the British or French either. Clemenceau only wanted Germany to be crippled and crushed enough so France wouldnt be attacked. Germany had invaded France twice in the past fifty years, and Clemenceau had been around to witness it both times. He wanted Germany to pay dearly for the damage and suffering it had caused, expand the French industry and to rebuild the towns and villages that had been turned to rubble. This was all going to be hugely expensive. There had to be a compromise. Some of the aims were almost polar opposites, and whichever way it turned out, disappointment was inevitable. If the circumstances had been different, and France, Great Britain and America had all wanted the same things, the Treaty would have been much easier to put together, but this was not the case. With the benefit of hindsight; knowing that the Treaty indirectly caused the Second World War, it is easy to say that the Big Three didnt do enough to maintain the peace they created. There are some elements of the Treaty that could have been handled better (for example, reading it beforehand), but overall, it was the best outcome under the tough circumstances, especially seeing what the Germans would have done if they had been victorious. When you think of the pressure on the politicians, as well as the inevitable anger from the Germans, and three exhausted, arguing, war-weary nations trying to decide what to do with their enemy, the Treaty of Versailles was definitely the best that could have been achieved in 1919.

Friday, September 20, 2019

Introduction To Safety And Hygiene Environmental Sciences Essay

Introduction To Safety And Hygiene Environmental Sciences Essay Nowdays, requested for food safety facility is increasingly demanding in hospitality line. The food safety facility is availability of safe food improves the health of people and is also important basic for human right. Every day people will get ill from the they eat when prepare the food or cooking without contain a good food safety facility. Normally, people get ill or food poison is because the microorganisms including baterial, viruses and moulds in the food, leading to a whole host of unpleasant symptoms, such as stomach pains, diarrhoea and vomiting. Contamination is the undesired presence of harmful microorganisms or substances in food. Food can be contaminated by unhygienic practices in storage, handling and preparation, and may compromise food safety and palatability, example have a good safety facility for the user. If microorganisms are allowed to multiply, this will have the potential to cause disease if the food is eaten. So, people must understanding and knowledge about the food safety facility to concerned the health risks, for example, need to meet the increasing demands for hygiene requirements and scale for the facility. This is a significant public health burden that can be largely preventable. Not only for our healthy, food safe facility also give due emphasis to good hygienic practices to prevent and control foodborne diseases. Foodborne diseases result from eating foods that contain infectious or toxic substances. As per organization, there is also considerable variation in expertise and resource between the different agencies, and a conflict between the need to protect public health and obligations to facilitate trade or develop an industry or business sector. You need to be aware of these potential difficulties with the food control system. This session will introduce the principles of food safety facility and consist about of floor, temperature, restrooms, ventilation, lighting, personal hygienic, cooking, keep food, waste disposal and equipment. Also learn about food control, food inspection and supportive enforcement measures that can contribute to food hygiene and safety of facility. MAIN BODY Floor About the flooring, as hospitality need to provide a hygienic flooring. The purpose of the hygienic flooring is to provide a healthy and environmentally friendly flooring choice for those who use it. Usually this type of flooring, helps resist mold and bacteria, but also reduces the amount of allergens can build, create better air quality. Others, the flooring must be clearning by daily with chemicals to reduce bacterial on the floor and require a smooth surface easy to clean up. Temperature As temperature, to ensure that the time effective temperature control is critical to the safety and suitability of food. Such control, including the received time and temperature for the process cooking, cooling, storage, packing, distribution, food service reached. Normally, a room as like kitchen must be always maintan the temperature become moderate. Wherever cooking is open with fire shall be provide the equipment like chimney, exhaust fan or ventilation to reducing smoke and steam, also can reduce the high temperature of the room. Lighting Adequate natural or artificial lighting should be provided to the food establishment, to commitment operate in a hygienic manner. Lighting must place appropriate protection, in order to ensure that the food is not damaged by pollution. Ventilation Ventilation is more important of the food safety facility it can process change or replace of any space in the indoor air quality, such like temperature control, supplemental oxygen, moisture, odor, smoke, heat, dust and air in the bacterial. Others, ventilation also can reduce activity of bacterial and also can obtain a protective effect like reduce food contamination by bacterial. So, all regarding of food safety ventilation shall be designed and constructed so that air can maintain circulation and air does not contaminate or affect the food. Restroom For the restroom shall be separate from the food processing and service areas, which may not be a direct result of the food production, service and storage areas. In restroom must have implemented a system for keeping records of all action taken to address identified risk factors for food-borne disease. These records should be preserved for the establishment and in the inspection process. Equipment As equipment must provide a display board mentioning dos donts for the workers should be put up inside a prominent place in the premise in English or in local language for everyones understanding. Display board also to ensure user have follow the instruction and understand how to use the equipment. As food safe facility, the owner must give training for the user to understanding the dangers from work equipment and how to handing the equipment like electrical equipment, fire prevention and other regarding for equipment. When the food process they will get injured any time if user use the equipment without any traning. Others, the equipment shall be have monthly inspection to ensure all the facility can be use without any damage, in addition it can extend life of the equipment. When need easily to maintanance and cleaning function as per its intended use, the eqiupment shall be such located, designed and fabricated, its also can facilitates a good hygiene practices inside the premise including monitoring and audit. Washing of Raw Materials The washed raw food, adequate facilities should be provided. All basins or other Facilities, used for washing food items must have sufficient heat and cold water supply. The water should be at least in the essence of drinking water. These facilities must be kept clean, Necessary to be disinfected. Used for washing a raw material of food flume should be maintained alone should not be used for washing dishes, or for any other purpose. Personal Facilities Personal facilities should include appropriate means appropriate washing and drying of hands before touching food materials including washbasins and supply hot water and separate lavatories of appropriate hygienic design. These facilities should be appropriate to the position, so that they do not open directly into the food processing, handling, or storage areas. Before user begin to perpare any food, make sure that user are using the utensils is clean. Clean worktops thoroughly and wash utensils with washing-up liquid and hot water, or use a dishwasher if user have one. Make sure user clean up any spilt food straight away. They should be made aware of the cleanliness requirement while handling food, if food processing without handled properly people fall ill and many died as a result of eating unsafe food. Storage of Food Proper storage of food reduces the risk of food poisoning. A well-stocked kitchen can be a lifesaver when it comes to pulling quick meals together and keeping our food intake healthy. To ensure your food is safe to eat, however, it is important to take proper care with how your food is stored. As storage of food has beware of the temperature danger zone because food poisoning bacterial grow and multiply fastest in the temperature danger zone between 5 C and 60 C. It is important to keep high-risk food out of this temperature zone. Other, some foods need to kept in the fridge to help stop baterial growing and the time limits for frozen foods are to maintain flavor and texture. It is also still safe to eat frozen foods that have been stored longer, example the storage of foods in fridge, meat, fish, fruit, and etc. CONCLUSION In conclusion, food safe facility is not just about maintaining a clean working environment, and non compliances can occur in any stage during the food handling process from receiving, storing, cooking, cooling and reheating, or serving. As a food safety the owner of restaurant or regarding the food processing shall be ensure a food-safe facility are in control and reduce the hazard of food poison. The food needs assessments were carried out in a professional way. A owner of restaurant they must give training and fully understanding the types of food and the conditions to prevent the growth of bacteria which can cause food poisoning for any employer and employee. In additional, provided the procedure and guideline for all restaurant to ensure food processing can provide the healthy food to the people and also provided the standard facility. So make sure all user implement adequate training, safety facility and monitoring procedures to keep working environment as safe as possible. BIBLIOGRAPHY Anonymous, 6th January 2012, Socia, viewed on 6th July 2012, http://www.fssai.gov.in/Portals/0/Training_Manual/Volume%20III-%20Food%20Regulatory%20Enforcement%20and%20complience%20through%20Inspection.pdf Food Safety http://www.bupa.co.uk/individuals/health-information/directory/f/food-hygiene#textBlock254403 http://www.virtual-college.co.uk/products/food-hygiene-catering.aspx http://switchboard.nrdc.org/blogs/ahershkowitz/how_to_manage_food_waste.html http://extension.psu.edu/food-safety http://www.foodsafety.com/ http://www.sfdph.org/dph/eh/Food/default.asp http://www.centerforfoodsafety.org/ INTRODUCTION The concept of HACCP (Hazard Analysis and Critical Control Point) is a system that helps food business operators look at how they handle food and introduces procedures to make sure the food produced is safe to eat. The HACCP system, which is science based and systematic, identifies specific hazards and measures for their control to ensure the safety of food. It is a HACCP which for focuses on keeping food in proper time and temperature zones and free of contamination, indentifies and controls potential problems in food handling before they can occur, evaluates and monitors each step in the entire food preparation process, works daily to provide feedback and eliminates or reduces risk of food borne illness. The HACCP is used for control risk and the hazard of food is biological, chemical, physical and allergenic. Biological is refer to organisms or organic matters produced by these organisms that are harmful to human healthy. These are include viruses, parasites, bacterial, fungi and protein. The harmful effects posed to human healthy by these biological hazards are mainly of three types infections, allergy and poisoning. A chemical hazard is any substance that can cause harm, primarily to people. Chemicals of all kinds are stored in our homes and can result in serious injuries if not properly handled. The Physical hazards are those substances which threaten a person physical safety. The most common types of physical hazards are raw ingredients, food packinging, building and equipment such as flahing paint, food handlers and the pets. As allergenic is a human immune system response to certain food. An allergenic reaction is triggered by a protein contained in a food. The type of food allergenic included milk, eggs, penuts, and fish. Allergenic symptoms are wheezing or breathing problems, stomach cramps, vomiting, diarrhea, hives, rashes or sickness. To successfully carry out HACCP, food service operations will need to personalized HACCP plan. The plan is built a round 7 principles. This chapter will presents an introduction and overview of the 7 principles of HACCP. MAIN BODY Principle 1 Conduct a hazard analysis As food safety hazard is any biological, chemical or physical properties may result in food for human consumption is unsafe. The analyze hazards to identify any hazardous biological, chemical, or physical property in raw materials and processing steps, and assessment of their tune, and may lead to the consumption of food insecurity. All possible food safety hazards that could cause a product to be unsafe for consumption, and the measures that can be taken to control those hazards. For example, at the food processing step of the cooking, one of the identified hazards due to insufficient cooking time or temperature of the survival of pathogens. In additional, hazard got 7 step of analysis is hazards, risk, flow of food, type of customers, type of food, suppliers, the size type of operation. Principle 2 Determine the Critical Control Points (CCPs) A CCP is a critical control point. It is a practice, preparation step, or procedure where a preventive measure or control can be applied. A CCP would prevented, eliminated, or reduced to an acceptable level. For example, a chicken arrives with salmonella. Cooking the chicken to an internal temperature of 170 F is a measured CCP and control measures are necessary to deal with the hazard of pathogens surviving the cooking process. Other is focus on time temperature and need to provide standard operating procedures (SOP). Principle 3 Establish critical limits The limit of the critical control point is to distinguish between acceptable and unacceptable standards. Its maximum or minimum value, must be controlled at a critical control point to prevent, eliminate or reduce to an acceptable level of food safety hazards identified physical, biological or chemical hazards. For example, critical limits including products for cooking stage a lot of time and temperature. In addition shall be provide a food thermometer, tech employee or employer how to use them correctly and to ensure that employee use them on a regular basis. Principle 4 Establish a system to moniter control of the CCP Monitering is a planned sequence of observations or measurement to assess whether under the control of the critical control point to produce an accurate record for future use verification. Monitoring HACCP system is very important. If have lost control of the trend, therefore, it can take action to regain control of the process before more than the limit, the monitor can warn the plant. For example, monitoring critical control points in cooking procedures, including internal temperature with a special thermometer. Other, employees must be involved in the process and understand the critical control point. Record temperatures, cold, hot, cooking, chilling at each stage. Principle 5 Establish the corrective action to be taken when monitoring indicates that a particular CCP is not under control These monitoring establishing a critical limit deviation the action to be taken. The final rule requires a plants HACCP plan to determine the corrective measures to be taken and if user do not meet a critical limit. The purpose of the corrective action is to ensure that the deviation is not harmful to health or otherwise adulterated products into the commercial. For example, if the internal temperature did not reach the required corrective action would require that the product is further cooking. The cooking temperature can not be achieved, alternative corrective measures will be required to be held and destruction. Other is employees must be involved in the process and understand. Principle 6 Establish procedures for verification to confirm that the HACCP system is working effectively Validation is the application of methods, procedures, testing, sampling and evaluation of monitoring, to determine whether the control measures of the critical control points being or has been run as expected. Verification activities to ensure that the companys written HACCP plan monitoring and corrective action. Verify some examples at specified time interval the direct observation of the process of monitoring activities and corrective action monitoring instrument calibration. Other is keep record to prove the system is working effectively. Principle 7 Establish documentation concerning all procedures and records appropriate to these principles and their application HACCP process and monitoring results to establish a record for keeping system file. This can be any simple and fast system such as the printing of the temperature from which critical control point, employees can record your own standards compliant. For example, employees of the plant is responsible for monitoring the cooking critical control points to complete the record sheet of cooking. This table includes the date, start and the end time temperature and the signture of the employee. If deviations occur in the production process responsible for the details of the plant employees deviation logbook records. CONCLUSION Hazard Analysis and Critical Control Point (HACCP) system is a way to keep food safe because it is through the mobile catering servise processes. It is based on the concept of preventing foodborne disease and to ensure safe food. HACCP plan is a particular food servise the development of a written document food safety procedures to be followed. Also HACCP system must be kept up to date, make revisions when changes occur. A change may be needed when recipes, suppliers, storage, preparation, or equipment changes, or when corrective actions are not working and employees need continuous training. Developed using the seven principles of HACCP plan and specific menu, facilities and equipment for the food service process, For a specific food on the menu, it describes the food safety program appropriate food processing and how the procedure will be monitored and recorded.

Thursday, September 19, 2019

Embryonic Stem Cell Research :: Argumentative Persuasive Topics

Americans are asked by the media to support embryonic stem cell research (ESCR) that uses human embryos. Many Americans favor ESCR because of the potential for benefiting people in need, people racked by disease. This essay goes beyond the emotional issues surrounding ESCR and informs the reader of the scientific background so that he is capable of making a well-informed decision about ESCR. Â   In August of last year, President Bush approved the use of federal funds to support research on a limited number of existing human embryonic stem cell lines (Bush). The decision met with notably mixed reactions. Proponents of embryonic stem cell research argue that restricting federal funding to a limited number of cell lines will hamper the progress of science, while those opposed insist that any use of cells derived from human embryos constitutes a significant breach of moral principles. It is clear that pressure to expand the limits established by the President will continue. It is equally clear that the ethical positions of those opposed to this research are unlikely to change. Â   Regrettably, much of the debate on this issue has taken place on emotional grounds, pitting the hope of curing heartrending medical conditions against the deeply held moral convictions of many Americans. Such arguments frequently ignore or mischaracterize the scientific facts. To arrive at an informed opinion on human embryonic stem cell research, it is important to have a clear understanding of precisely what embryonic stem cells are, whether embryonic stem cells are likely to be useful for medical treatments, and whether there are viable alternatives to the use of embryonic stem cells in scientific research. Â   Embryonic development is one of the most fascinating of all biological processes. A newly fertilized egg faces the daunting challenge of not only generating all of the tissues of the mature animal but organizing them into a functionally integrated whole. Generating a wide range of adult cell types is not an ability unique to embryos. Certain types of tumors called teratomas are extraordinarily adept at generating adult tissues, but unlike embryos, they do so without the benefit of an organizing principle or blueprint. Such tumors rapidly produce skin, bone, muscle, and even hair and teeth, all massed together in a chaotic lump of tissue. Many of the signals required to induce formation of specialized adult cells must be present in these tumors, but unlike embryos, tumors generate adult cell types in a hopelessly undirected manner.

Wednesday, September 18, 2019

History Of The Internet Essay -- essays research papers

The year is 1957 and the USSR has just launched the first artificial earth satellite. In response America launches the Advanced Research Projects Agency (ARPA) within the Department of Defense (DOD) to create America’s lead in science and technology. The Internet had its humble beginnings here, within ARPA’s many projects.   Ã‚  Ã‚  Ã‚  Ã‚  The Internet has become one of the key symbols of today’s pop culture: everything has a â€Å"dot com† address; people do not say â€Å"call me,† but instead its â€Å"I’ll E-mail you;† and the new word on the stock market is â€Å"E-business.† The Internet has not always been such a key figure in American life; in fact it was mostly unheard of until recently.   Ã‚  Ã‚  Ã‚  Ã‚  The theory for the Internet first started being published in 1961 with Leonard Kleinrock’s document on packet-switching theory, â€Å"Information Flow in Large Communication Net.† This document presented the theory behind the first problem of the Internet, and how to solve it1. The problem was this: when a large document is sent then pieces of it become lost in transfer and the entire document has to be resent, but then different pieces are missing from the new copy of the document. This is a major problem and the obvious solution is to â€Å"chop† the information up into smaller pieces and then transmit the smaller pieces2. Then another problem was realized, how does the computer know where to put these small bits of information? The solution to that was what has come to be known as packet-switching (PS). In PS, the entire document is sent in a bunch of tiny â€Å"packets,† these packets contain the information of the document â€Å"wrapped† in its placement on the page. The receiving computer then sends a message back to the transmitting computer telling it which packets were corrupted or missing and the transmitting computer then re-sends the lost information3.   Ã‚  Ã‚  Ã‚  Ã‚  The next problem that the Internet faced was first discovered at the ARPA’s networking project, ARPAnet. Since it was militarily connected, the leaders of ARPAnet wanted a way that information could be moved between two computers without requiring a direct connection in case the direct link between two computers failed (was destroyed). The way that the ARPAnet project dealt with this was by having the network bounce the information around without it taking a direct path... ... but enough to crash the Internet and land Mr. Morris (Jr.) a hefty fine and prison time. Earlier in that year, Internet Relay Chat was developed; something that has become one of the key factors in Internet usage today8.   Ã‚  Ã‚  Ã‚  Ã‚  In the ten years since the Morris Worm the Internet has gone mainstream. After the ARPAnet ceased, the Internet had an explosion in usage and has become the giant that Americans know today. It has transformed from its humble beginnings, when it crashed on the first attempted remote LOGIN, into an economy driving, pop culture staple. Few people have heard of men such as Leonard Kleinrock, but none can say he has not contributed to America today. So, when you think about the Cold War, think about Sputnik and the Internet it created. Bibiography Hafner, Katie; Lyon, Matthew. Where Wizards Stay up Late: The Origins of the   Ã‚  Ã‚  Ã‚  Ã‚  Internet. Touchstone Books; 1998. Kristula, David. â€Å"The History of the Internet.† Network Solutions, Inc. â€Å"What is the History of the Internet?.† Segaller, Stephen. Nerds 2.0.1: A Brief History of the Internet. TV Books Inc.; 1999 Sterling, Bruce. â€Å"A Brief History of the Internet.†

Tuesday, September 17, 2019

Working at McDonalds by Amitai Etzioni

In response to â€Å"Working at McDonald's† by Amitai Etzioni I think that Etzioni is way off on his evaluation of the lower skill, lower paying jobs in America. He makes it sound as if the employer must provide some sort of skill along with their jobs that will provide a learning experience. Why? Where in the Constitution does it state that employers must provide their employees with training while paying them to do work? It does not. And what of the people that choose jobs such as those provided by McDonalds simply because they wish to have less responsibility, as is shown in the recent movie â€Å"American Pie†. In this movie the main character quit his corporate, good paying job and applied for a regular burger flipping position at McDonalds because he was tired of the stress. And what about higher pay and benefits? The way the American economic system is set up, there must be some low paying jobs because there is always menial tasks that must be done and unskilled workers to do them. Say for instance, that everyone was guaranteed at least ten dollars an hour, no matter what the job was. There would therefore be no reason for some people to get an education because they knew they would have a decent job paying at least ten dollars an hour. This would also upset the people who had gotten an education only to find out they made little or no more than uneducated people now. Employers, now that they had to pay drastically higher wages, would have to charge much higher prices. Now the people earning the higher wages are right back to where they started, because the extra money they earn now just goes back to the employer. It†s just a vicious cycle, and higher wages or jobs that teach new skills to those who don†t need them are just not practical. As hard as you argue, the simple fact sticks is ugly head out, there are always low pay, low skill jobs for those who have no wish to better themselves in life.

Monday, September 16, 2019

Childhood Memories

In every human life, there is an unforgettable childhood experience. There could be many experiences or just one. These journeys can be good or bad and possibly end up beneficial or not. I have had a few bad ones. However, they occurred around times when I was trying to fit in and find my inner-self. In a sense, these experiences help to define my personality. In one way or another, bad experiences can lead to great success. Now I can talk about my experiences and what they led to. This is my story. Over the years between the third grade to the eighth grade, I have tremendously struggled with friendships. To be popular was a big need during the late 1990's and early 2000's. Kids were hanging out at basketball and football games, going to school dances, starting to date and have crushes on other students, and earn reputations throughout the school. Some students already had a reputation of being very `popular' while some were trying to fit in. I was one of those students. However, as time went by, I started to fit in more with cliques and different groups of friends. It sounded great however; being popular also comes with consequences. There are rumors that could be spread about you or someone else with your name in it.  Like read about memories? Read also  Flashbulb memory! Well, that's what happened to me. I was a friend of a student named Lorena. Our friendship was really good that we would hang out after school with other friends after riding the school bus home. As our friendship grew, so did our trust between each other. She told me that she had a crush on another student. I felt so special and popular but my 15 minutes of popularity would not last long. One day, Lorena and I had an argument. I threatened to tell people about her crush on another student. In reality, I never told anyone about her crush. One day, I was threatened verbally by some of her friends and I felt so bad. From that point on, I learned that being popular is not a big deal. Its consequences can put a damper on people's lives and can put people under pressure such as my situation. That means, people will remember or you will remember how you used to be. In addition, people will see how you will handle situations under pressure. If you don't come out strong, you will go from extremely popular to unrecognized. My 15 minutes of popularity was good to experience, but I'm glad the time was up. The consequences of being popular were more effective than the popular feeling itself. My last experience came with not being alert to public dangers. The cause of this experience was partially my fault. I will never forget that day. I was in the 7th grade and it was either a Tuesday or Wednesday night at the Wizards game. I was with my after-school group. Some of us had separated and looked around the stores inside the MCI Center. I went into the Discovery Center with one of the students from the program. We looked around and enjoyed some of the scientific display models. On our way out of the Center, we happened to encounter these young teenagers or younger in the elevator with us. There were 3 of them who were from either DC or Maryland. They looked sort of troubled but I was not giving them much attention. While in the elevator, one of them asked us for a dollar. I responded with saying of five dollars, which was larger than they asked for. From this moment, I was not street smart at because I was raised with out any street troubles and had no knowledge on how to be safe while you some talks to you that you do not know. My friend jumped out the elevator on purpose and left me in with the other guys. The three of them decided to tackle me and held me on the ground. Then, one of them reached in my pockets and took a dollar. I had realized I was just robbed. After 5 seconds, the elevator made it to ground level. When I got exited the elevator, security and my after-school chaperones came and made sure everything was all right. I was in complete shock and people asked me about what happened and I said to them that they took a dollar from me. In my mind, I was thinking of what I could have done to make the situation better. The reminisce lasted several months. This incident put a major effect in my life and it changed my personality. I am much more cautious of my surroundings and whom I hang out with. I definitely learned a lot from this situation. Those were my unforgettable experiences. I learned that being popular is not the best thing. If you just be yourself, people will accept you for who you are and not for what you are trying to be. Also, the elevator incident warned me that I need to be more alert of my surroundings. I should of never told those guys I had money in the first place. Secondly, I could have founded another way to get to the ground level once I saw those guys of what they're appearance looked like. I really learned from these situations. It's hard to predict when you're in the wrong place at the wrong time. Unless you use your senses, you definitely can determine what can happen. These were great experiences for me to go through. If it were not for these experiences, I would be a fake fool and a mess. Now, I have a great personality and street smarts. I have made remarkable achievements. I am one of many people who probably went though experiences like that, that made a change for the better. This experience had a good and bad part of it, but there was a lesson learned from it. There will always be a lesson learned from any experience and they are a good way for people to look at if they are having problems themselves. Experiences are part of life. Childhood Memories In every human life, there is an unforgettable childhood experience. There could be many experiences or just one. These journeys can be good or bad and possibly end up beneficial or not. I have had a few bad ones. However, they occurred around times when I was trying to fit in and find my inner-self. In a sense, these experiences help to define my personality. In one way or another, bad experiences can lead to great success. Now I can talk about my experiences and what they led to. This is my story. Over the years between the third grade to the eighth grade, I have tremendously struggled with friendships. To be popular was a big need during the late 1990's and early 2000's. Kids were hanging out at basketball and football games, going to school dances, starting to date and have crushes on other students, and earn reputations throughout the school. Some students already had a reputation of being very `popular' while some were trying to fit in. I was one of those students. However, as time went by, I started to fit in more with cliques and different groups of friends. It sounded great however; being popular also comes with consequences. There are rumors that could be spread about you or someone else with your name in it.  Like read about memories? Read also  Flashbulb memory! Well, that's what happened to me. I was a friend of a student named Lorena. Our friendship was really good that we would hang out after school with other friends after riding the school bus home. As our friendship grew, so did our trust between each other. She told me that she had a crush on another student. I felt so special and popular but my 15 minutes of popularity would not last long. One day, Lorena and I had an argument. I threatened to tell people about her crush on another student. In reality, I never told anyone about her crush. One day, I was threatened verbally by some of her friends and I felt so bad. From that point on, I learned that being popular is not a big deal. Its consequences can put a damper on people's lives and can put people under pressure such as my situation. That means, people will remember or you will remember how you used to be. In addition, people will see how you will handle situations under pressure. If you don't come out strong, you will go from extremely popular to unrecognized. My 15 minutes of popularity was good to experience, but I'm glad the time was up. The consequences of being popular were more effective than the popular feeling itself. My last experience came with not being alert to public dangers. The cause of this experience was partially my fault. I will never forget that day. I was in the 7th grade and it was either a Tuesday or Wednesday night at the Wizards game. I was with my after-school group. Some of us had separated and looked around the stores inside the MCI Center. I went into the Discovery Center with one of the students from the program. We looked around and enjoyed some of the scientific display models. On our way out of the Center, we happened to encounter these young teenagers or younger in the elevator with us. There were 3 of them who were from either DC or Maryland. They looked sort of troubled but I was not giving them much attention. While in the elevator, one of them asked us for a dollar. I responded with saying of five dollars, which was larger than they asked for. From this moment, I was not street smart at because I was raised with out any street troubles and had no knowledge on how to be safe while you some talks to you that you do not know. My friend jumped out the elevator on purpose and left me in with the other guys. The three of them decided to tackle me and held me on the ground. Then, one of them reached in my pockets and took a dollar. I had realized I was just robbed. After 5 seconds, the elevator made it to ground level. When I got exited the elevator, security and my after-school chaperones came and made sure everything was all right. I was in complete shock and people asked me about what happened and I said to them that they took a dollar from me. In my mind, I was thinking of what I could have done to make the situation better. The reminisce lasted several months. This incident put a major effect in my life and it changed my personality. I am much more cautious of my surroundings and whom I hang out with. I definitely learned a lot from this situation. Those were my unforgettable experiences. I learned that being popular is not the best thing. If you just be yourself, people will accept you for who you are and not for what you are trying to be. Also, the elevator incident warned me that I need to be more alert of my surroundings. I should of never told those guys I had money in the first place. Secondly, I could have founded another way to get to the ground level once I saw those guys of what they're appearance looked like. I really learned from these situations. It's hard to predict when you're in the wrong place at the wrong time. Unless you use your senses, you definitely can determine what can happen. These were great experiences for me to go through. If it were not for these experiences, I would be a fake fool and a mess. Now, I have a great personality and street smarts. I have made remarkable achievements. I am one of many people who probably went though experiences like that, that made a change for the better. This experience had a good and bad part of it, but there was a lesson learned from it. There will always be a lesson learned from any experience and they are a good way for people to look at if they are having problems themselves. Experiences are part of life. Childhood Memories In every human life, there is an unforgettable childhood experience. There could be many experiences or just one. These journeys can be good or bad and possibly end up beneficial or not. I have had a few bad ones. However, they occurred around times when I was trying to fit in and find my inner-self. In a sense, these experiences help to define my personality. In one way or another, bad experiences can lead to great success. Now I can talk about my experiences and what they led to. This is my story. Over the years between the third grade to the eighth grade, I have tremendously struggled with friendships. To be popular was a big need during the late 1990's and early 2000's. Kids were hanging out at basketball and football games, going to school dances, starting to date and have crushes on other students, and earn reputations throughout the school. Some students already had a reputation of being very `popular' while some were trying to fit in. I was one of those students. However, as time went by, I started to fit in more with cliques and different groups of friends. It sounded great however; being popular also comes with consequences. There are rumors that could be spread about you or someone else with your name in it.  Like read about memories? Read also  Flashbulb memory! Well, that's what happened to me. I was a friend of a student named Lorena. Our friendship was really good that we would hang out after school with other friends after riding the school bus home. As our friendship grew, so did our trust between each other. She told me that she had a crush on another student. I felt so special and popular but my 15 minutes of popularity would not last long. One day, Lorena and I had an argument. I threatened to tell people about her crush on another student. In reality, I never told anyone about her crush. One day, I was threatened verbally by some of her friends and I felt so bad. From that point on, I learned that being popular is not a big deal. Its consequences can put a damper on people's lives and can put people under pressure such as my situation. That means, people will remember or you will remember how you used to be. In addition, people will see how you will handle situations under pressure. If you don't come out strong, you will go from extremely popular to unrecognized. My 15 minutes of popularity was good to experience, but I'm glad the time was up. The consequences of being popular were more effective than the popular feeling itself. My last experience came with not being alert to public dangers. The cause of this experience was partially my fault. I will never forget that day. I was in the 7th grade and it was either a Tuesday or Wednesday night at the Wizards game. I was with my after-school group. Some of us had separated and looked around the stores inside the MCI Center. I went into the Discovery Center with one of the students from the program. We looked around and enjoyed some of the scientific display models. On our way out of the Center, we happened to encounter these young teenagers or younger in the elevator with us. There were 3 of them who were from either DC or Maryland. They looked sort of troubled but I was not giving them much attention. While in the elevator, one of them asked us for a dollar. I responded with saying of five dollars, which was larger than they asked for. From this moment, I was not street smart at because I was raised with out any street troubles and had no knowledge on how to be safe while you some talks to you that you do not know. My friend jumped out the elevator on purpose and left me in with the other guys. The three of them decided to tackle me and held me on the ground. Then, one of them reached in my pockets and took a dollar. I had realized I was just robbed. After 5 seconds, the elevator made it to ground level. When I got exited the elevator, security and my after-school chaperones came and made sure everything was all right. I was in complete shock and people asked me about what happened and I said to them that they took a dollar from me. In my mind, I was thinking of what I could have done to make the situation better. The reminisce lasted several months. This incident put a major effect in my life and it changed my personality. I am much more cautious of my surroundings and whom I hang out with. I definitely learned a lot from this situation. Those were my unforgettable experiences. I learned that being popular is not the best thing. If you just be yourself, people will accept you for who you are and not for what you are trying to be. Also, the elevator incident warned me that I need to be more alert of my surroundings. I should of never told those guys I had money in the first place. Secondly, I could have founded another way to get to the ground level once I saw those guys of what they're appearance looked like. I really learned from these situations. It's hard to predict when you're in the wrong place at the wrong time. Unless you use your senses, you definitely can determine what can happen. These were great experiences for me to go through. If it were not for these experiences, I would be a fake fool and a mess. Now, I have a great personality and street smarts. I have made remarkable achievements. I am one of many people who probably went though experiences like that, that made a change for the better. This experience had a good and bad part of it, but there was a lesson learned from it. There will always be a lesson learned from any experience and they are a good way for people to look at if they are having problems themselves. Experiences are part of life.

Sunday, September 15, 2019

Tool Control

So, it’s about 1700 and my flight has just landed and everything went pretty well. We are closing up the bird and getting ready to go home. The helicopter is all tied up and wiped down and everything is start to look good. Then some last minute maintenance comes up and the VELOs need to be tightened an blade pins need to be safety wired. Shortly thereafter, about 2 hours because I’m a retard and safety wired the VELOs instead of tightening them, but that’s another story. We finish the job I come in to sign off the MAFs and BAM!I set my cranial down on the floor or desk I don’t recall and I didn’t see it again until the next morning about 70ft above the hangar floor. Now I know the importance of the tool control program I am about to, in detail, explain to you. Hopefully my mistakes will not be repeated. There is a tool control program active in every shop. This program is very important to the safety of the helicopter and the men and women that main tain them and fly them. This program is the responsibility of each and every mechanic, avionics man, air framer, flight equipment men and women, pilots and crew chiefs.Basically, the tool control program established in the United States Marine Corps is the responsibility of every member of the squadron. This program depends on each individual to perform their jobs carefully with the safety of themselves, their fellow marines and the aircraft always in mind. This program cannot afford small mistakes, and definitely no big mistakes. My experience with tool control is a little closer than most would want to come. I have terrible short term memory and it shows in my work.Whether it be in replacing the number one boost reservoir cap after I serviced it, before a flight, or it be in remembering to not leave my cranial just lying around on the shop floor and then never coming back to pick it up or put it in its proper place. My experiences have been numerous and cannot be tolerated on the Flight line, in the squadron or in the Marine Corps. My actions could have in a direct or indirect way been the reason another marine or myself are not here alive today. Thankfully my actions were being closely monitored by the NCOs and other members of the shop .No one was hurt because of my actions and I have to say I am not surprised. The tool control program is also designed to prevent anything awful from happening in the case that a young inexperienced crew chief in training loses two or three rags, his cranial or any other tool he may have while performing a Daily and turnaround inspection or just signing off MAFs. Then never coming in to pick his cranial up and put it in the correct place. The way the tool control program in the Marine corps is set up, it makes it almost impossible to lose tools.It is dummy proof. Almost. Once that tool is lost they have a very effective way of retrieving that tool. The first step in insuring that tools do not get lost is an inventory list. I t is a list of individual items in a tool container. It identifies the tool location within the container by panel and item number. Each tool is etched with a number. When tool sizes do not permit etching the inventory list is noted to draw attention to those small tools. These tools are checked out via a log book kept in each shop witch is updated and checked three times a day.Once in the morning prior to starting any maintenance, again during shift change and again before securing night crew the logs are checked. Too make it easy to identify each tool the Navy and Marine Corps have set up a standardized way of labeling (etching) each individual tool that is large enough to etch. The order the numbers etched on each tool goes like this: First number is the organization code, the second number is a work center code and the third number is the Tool Container number.When the work center is authorized more than one of a certain type of tool container (ie: Pre Flight Kits) the number wi ll be extended to identify the container. The tools that are too small to etch are kept in a special container with a special label affixed to it saying â€Å"CONTAINS TOOLS TOO SMALL TO MARK†. Tool issue is not an issue taken lightly because accountability of all tools is absolutely necessary to ensure none are lost. Special and common tools alike fall under this rule that all tools are accounted for.Even things as small as goggles and sound suppressors to things as big as Ladders and Hydraulic Servicing Units need tool tags from specific boxes to be checked out. Hand tools and common tools fall into two groups. They have the Eighty percent (80%) group which consists of tools required to complete eighty percent of the maintenance tasks. These tools are found in the checkout boxes for the shop. They also have the 20 percent (20%) group which is consist of tools not so commonly used inside a box in the shop. These tools can only be checked out individually and a tool tag is re quired for each individual tool.Another reason why the tool control program in the Marine Corps is so successful is because of the thorough methods we have in place that prevent us from completely losing a tool. If ANY tool is found to be missing or lost at any stage of the inventory process, an immediate search of the area will be conducted. We look everywhere we had been with the tool and everywhere we might have been. Once that has been done and the tool is still missing after extensive searching you notify your work center supervisor and another search, probably with a few more marines will be conducted.If the tool still can not be located your work center supervisor will notify Quality Assurance, Maintenance Control and the Aircraft maintenance Officer (AMO). In the mean time you will initiate a lost or missing tool report and give it to your work center supervisor. You will give a detailed statement of what happened all the way up until you realized the tool was lost and you w ill sign the statement for Quality Assurance. Maintenance Control puts a hold on all Air Traffic until the tool is found or Quality Assurance gives the good to go for flights to continue.The AMO is notified by Maintenance Control. You just standby and wait for the hammer. The meticulous tool check out procedures are another way to keep track of all tools in a shop. The procedures are as follows: You open the tool container and do a thorough inspection of the tool container to be checked out, the condition of the tool container and missing or broken tools in the container are what you are looking for. You want to sure all devices used to secure tools in the tool container are not worn out or broken or missing.Inspect the tool container for FOD. You will be looking for things like safety wire, cotter pins, pieces of attaching hardware and pieces of broken tools. You want to ensure that all tools are wiped clean of any foreign fluids or grease. Also, very important, ensure that every t ool is marked and belongs in that particular tool container. After inspecting the container you take it to an authorized member of the shop to inspect again and sign out in the tool container log book. When you bring the tool container back after maintenance is inished you do the process all over again. Including inspections, and signing the tool container back in to the shop. If at any point in your inspections you find a discrepancy in the condition of a tool there are steps you need to take. First of all you do not accept the tool container from the shop. The tool room will initiate a broken or missing tool report. The unserviceable tool should be replaced by a new one almost immediately. If a tool should break while performing maintenance there are also steps you need to follow.First you do an immediate search of the area and collect all the broken pieces of the tool. You initiate a broken tool report. The broken tool will be replaced by a new one and that tool will be marked ap propriately. Tool Control saves lives by preventing numerous hazardous situations from ever happening. It saves time by keeping track of all tools which aids in finding lost or missing tools. The tool Control program saves money by keeping a close eye on all the tools in a shop preventing lost and missing tools from ever occurring.

Effects of Having a Broken Family on the Academic Performance of the Fourth Year Students

Hispanic IssuesOne hot political, societal and cultural topic is immigration and naturalization. The Hispanic population in the United States has continued to grow and change. One popular research topic is examining this growth and the increased role and influence of Hispanics in American society and politics.SpaceAlthough the race for space of the Cold War has ended, man continues to look to the sky as technology develops and changes. As advancement continues, possibilities for space travel increase. This topic examines the history of space exploration and considers opportunities for the future.Energy SourcesWith a world dependent on nonrenewable resources of energy, this energy dependence impacts the world in many ways. Although some alternative energy options have been developed, they have not yet been able to sufficiently provide for the energy needs of the world's population. This topic considers the history of various energy sources and looks at new developments in this area.Wa ste DisposalWith a world population of around 6 billion, waste disposal is a paramount concern. This population creates a great amount of waste and if it is not handled correctly it can cause great damage to the planet. This topic examines the methods used for waste disposal and recycling and determines what possible changes are available with the development of technology.Imposed DemocracyAfter World War II, the United States had greater influence in countries around the world. Involved publicly in several conflicts, it also influenced policy in other nations â€Å"behind the scenes.† This popular topic considers the role of the United States in other nations and whether or not the U.S. has â€Å"imposed† democracy on other countries.Political Environment in the Middle East The Middle East, continuously an area in turmoil with changes in political leadership, relationships between various countries also change. This topic  examines the history and development of nat ions in the region and how they interact. It also considers possible solutions for peace in the Middle East.The Impact of Globalization on ReligionWith the influence of technology, the world is interconnected in a totally new way. Decisions made in one nation can have an impact on a country half-way around the world. This topic considers how this â€Å"smaller world† has impacted religion and its practices.The Impact of U.N.  Policies on the EnvironmentMan continues to learn more about his impact on the environment of the planet. Some policies have been put in place to try to address global environmental issues. This topic examines whether the U.N. policies that have been put into place have made an impact on human behavior.Marketing and Media Influence on TeensMedia is a very powerful tool that has continued to develop and influence thoughts and beliefs. Marketing is focused on how to influence the choices people make and the products they buy through media channels. This topic considers how marketing negatively impacts teens.Bar Code Implants Replacing Social Security NumbersA controversial topic for many is the use of bar code implants for identification. Although social security numbers can be stolen and identity theft is a big issue, some are very opposed to having any type of body implants for the purpose of identification. This topic can discuss the issues with both methods of identification and describe the technology involved.

Saturday, September 14, 2019

Cunard Line, Ltd Essay

Cunard Line Ltd. is a cruise line that represents luxury and class providing four to five star cruise ship options. Their overall target market is mature adults with mid to very high income-levels. A lot of the marketing efforts put forth by Cunard were going towards tactical efforts and the promotion of individual ships as opposed to the promotion of the entire brand. Although most of the ads portrayed the same look and had an individually tailored paragraph and/or photo. Set backs caused by the worldwide recession as well as the Iraq War has caused Cunard the dilemma of risking their prestigious company image to provide consumers with larger discounts or develop other marketing strategies that will seek to maintain their 90% occupancy rate without lowering their high quality position. It created more pressure for the creation of â€Å"sales oriented† marketing, which would jeopardize their high-class image. With competitors such as Carnival who are able to provide large discounts, it makes it difficult for Cunard to avoid using the same approach in order to compete. Segmentation Strategy Cunard seems to have taken a Concentrated Marketing approach to segmentation. Generally, they focus on one target market – the upper class. Although this can be seen as a disadvantage in an economy experiencing a recession, by segmenting based on this niche income and lifestyle, Cunard is able to tailor their services specifically to them rather than targeting more than one market and not providing the best service possible. Not only do their advertisements and brand perception demonstrate this segmentation but they make efforts to communicate personally with their clients. This is demonstrated through through letters that they send with personalized marketing messages, tailored specifically to the needs of their customers. Price/Quality Relationship The concept of price/quality relationship is heavily integrated into the target market that Cunard has chosen. Along with their brand image, the high price of their services gives off a perceived high quality. Although services are generally intangible, services such as providing reservations for an entire mealtime in their five-star cruise ship is merely one example of how Cunard tries to maintain this price/quality relationship. With the price that consumers pay, they come to expect the best service for their dollar. Generally those who pay these high amounts believe that money is no object as long as they receive a great quality product or service. Satisfaction would mean that they reached or exceeded the expectations consumers had of the service. Cunard tries not to portray prices in their advertising or have constantly advertised sales in order to keep the price/quality relationship high and retain customers who respect this aspect of their company. Alternative Strategies There are multiple strategies that Cunard may take in order to maintain their high-class brand image while bringing in enough consumers from their target market. One of these alternatives is to create relationships with big companies and provide them with a vacation package deal. An example of this is creating a relationship with a large insurance company who is then able to create a contest for self-employed insurance advisors. As self-employed individuals they have the potential of gaining high incomes and through a contest they will be motivated to meet certain productivity requirements. Only those who qualify will be able to go on the trip and will therefore meet the high standards of the Cunard brand. This method would probably be more effective for the four star ships who cater less to those at or near the retired age and target a little bit of a lower income than the five star ships. Another alternative strategy would be to create a loyalty program for existing Cunard customers. This method can be used for customers of the four or five star ships. This loyalty program would provide occasional direct offers to customers who already have experience with Cunard and therefore will not view the deals as a lowering of standards. An example of a deal that can be provided is a selling package that is good for a year or two. This package would outline a discounted price for a set amount of people to travel on a certain cruise ship. That way, there is enough time for a customer to realistically plan out a trip while providing an incentive for them and encourage more action as opposed to a regular priced ad. Lastly, an alternative that can be taken is to build relationships with various large companies with employees who make an income in the target range and make offers to company executives. This method would not downplay the company image because Cunard would be communicating directly with high-income executives and furthermore will not be making any public sales or advertisements. This method would create new potential customers who are directly in the target market of choice using the method of relationship building. This may also result in additional customer retention. This method can be used for both the four and five star ships. In order to attract the target market of the five star ships, Cunard can make an arrangement with a company to offer a deal with their luxury ships as part of a retirement plan. Recommendations As a general recommendation, Cunard should focus on brand loyalty and relationships. Marketing efforts should go towards the advertising of the overall brand rather than individual ships while the rest of the company’s efforts should go towards relationship building. These relationships will then in turn target certain customers to certain ships through Cunard’s arrangements with companies. Considering the situation regarding the recession and war, Cunard should focus heavily on the strategy of building relationships with companies who can create vacation contest packages for their employees. During the time of a recession, anyone would appreciate an incentive to make more money and the opportunity to gain something from it. By winning something so prestigious, consumers gain confidence as well as social benefits, which can initially be their motivation. If it is a large company, there is potential for many qualifiers who can turn into loyal customers whether it be through the continuation of the contest yearly, or by their own personal desire to continue their relationship with Cunard. These contests will not jeopardize the high-quality image of the company because through negotiation, Cunard can insure that the qualification requirements are at a level where when achieved, it will be viewed as prestigious. If this contest continues yearly, Cunard can maintain their customer value, satisfaction and trust and therefore have customer retention. This will result in less price sensitivity, positive word of mouth, returning customers and a long lasting relationship. If Cunard continues to use marketing to market their entire company while bringing their services directly to their desired market, they can ensure a 90% occupancy and the continuation of a high-class cruise ship operation.

Friday, September 13, 2019

Effective time management skills and techniques are needed for Essay

Effective time management skills and techniques are needed for effective university study - Essay Example 12 ). Due to the increasing busy lifestyles and social duties, students are finding themselves with many commitments due to the busy academic calendar, family obligations, and work related ties for those who work and study at the same time. Therefore, time management becomes a necessity for success. This paper discusses effective time management skills and techniques necessary for effective university study. Effective planning is one of the most important time management skills. It refers to the wise evaluation of all tasks that need to be accomplished and effectively allocating adequate time for each task so that the overall plan is successful. This ensures that things and events are organized according to their priority (Forsyth, 2007, p. 17). Activities to be accomplished can be classified as important and urgent, important but not urgent, urgent but not important and neither important nor urgent. Mancini claims, â€Å"Good time management requires setting priorities-and in setting priorities, we accept that time limits must naturally limit our choices† (Mancini, 2007, p. 4). Therefore, to be successful in the university, students must endeavor to make an elaborate plan of all-important activities, make a schedule, and put the plan into action. It is also important to consider personals strengths and weaknesses as well as threats and available opportunities when making a time plan. Some students are gifted in understanding concepts when taught in class. Others might need to spend several hours doing personal studies and group discussions on order to understand the same concepts. Hence, time plans may be different for different students though they may be taking the same course in the university. When making a time plan, setting realistic and reasonable goals determines the success of the plan. Time management calls for a clarity of

Thursday, September 12, 2019

Personal Analysis Essay Example | Topics and Well Written Essays - 500 words - 1

Personal Analysis - Essay Example In taking such undertakings, such an individual totally gains the approval as well as the confidence of his subjects. In this regard, the author elucidates that a promoter is someone who can very easily persuade people in many ways (Keirsey, 298). In such situations, people often come to terms easily with whatever proposals made, or whatever contributions made by the said individual. Relevant to persuasion, a promoter depicts several other qualities involving trustworthiness, positiveness, confidence, faithfulness as well as surety. In addition to persuasion, it is important to note that promoters are always outgoing, wise and very attentive, as well as respects the rule of law. People always find promoters very dependable. Promoters always take their time with people. They are always very sociable and easy to mingle with as well as easy to understand. All these qualities describe that of promoters. I always take great interest in people, perhaps the reason other people find me warm, sociable and interesting. While I take time alone sometimes, I spend much more of my time being with people, talking to them and trying to bring out the best in them. It hardly goes without my notice when a friend or close acquaintance is in a bad or good mood. In addition, I always take no pride seeing my people suffer. In such a case, I always offer my assistance as much as possible. Other than being with people, I am also quite dependable. In this regard, I take my work seriously and often focus on the details maintaining warmth and energy. Perhaps it is for this reason that in many occasions I find myself being chosen as a team leader. I have what it takes to ensure that things get done the right way. I also generally like to be in control and will give my opinion without fearing, no wonder some people consider me manipulative. As an aspiring person, I always concentrate on developing several skills to meet the demands of people within the