Friday, November 29, 2019

GutierrezS Analysis Of Book Of Job Essays - Book Of Job,

Gutierrez'S Analysis Of Book Of Job Frank Bottino Reaction Paper On Job: God-Talk and the Suffering of the Innocent (Synopsis) In Gutierrezs analysis on the book of Job, the justice of God seems to be the primary issue of his argument. Throughout his argument he justifies that Gods way of doing things is outside the comprehension of the human mind. He states that, God indeed has a plan, but it is not one that the human mind can grasp so as to make calculations based on it and foresee the divine action (73). In the book of Job, God tests Jobs faith by putting him through a series of trials and tribulations. Job initially doesnt understand why God does this because he has always been righteous in the sight of the Lord. His friends believe his suffering is a direct result from the sin in Jobs life but as the text explains, they are clearly ignorant. Job questions God directly, however God challenges him to explain how the universe was created and how it is ordered. Jobs error is his presumption that Gods ways and his omnipotence are humanly comprehensible. God both rebukes Job and makes his most direct reply to Jobs earlier question: What is the Almighty, that we should serve him? And what profit do we get if we pray to him? (21:15) Gutierrez states that here Job realizes he has spoken out of ignorance and that he may come no closer to God than his vision of him, therefore Job repents. In conclusion, Gutierrez main point is clearly that in order to understand God and his divine plan, one must avoid the temptation of imprisoning God in a narrow conception of justice (91). The book of Job reminds us that God is outside time and space and that He does whatever He wants despite what we as humans think is just. Personal Reflection I feel that Gutierrezs argument is right on target. As we have studied in previous chapters of the Old Testament, Gods way of doing things is not what we as humans would expect to be logical. For example, in Exodus we see that God chooses Moses to be the deliverer of the Israelites despite the fact that he is the second son, a murderer, and slow of speech and slow of tongue (4:10). This is strange because one would expect God to appoint someone of higher stature like his brother Aaron. Another example is seen in Genesis when God tells Abraham to sacrifice his son Isaac. This seems illogical to us at first because it clearly goes against Gods promise to Abraham. Abraham soon realizes when an angle of God stops him that it was only a test of his faithfulness to God. However, despite Gutierrezs strong argument, I believe that sometimes Gods ways are predictable and logical. For example, we constantly see throughout the Old Testament that whenever the Israelites break their covenant with God, we can be assured that they will be punished. This is clearly seen in the book Samuel when Saul defies God and his reign is slowly stripped away from him. On the other hand, when one obeys God, it is reasonable to conclude that they will be blesses. For example, because David followed Gods instructions, he was certainly blessed. In conclusion, sometimes Gods plans are logical and other times they are not. Therefore we as humans should never assume to know what God is going to do next. And no matter what God chooses to do, we should not be surprised because He certainly works in mysterious ways. Religion

Monday, November 25, 2019

Human Growth And Development Social Work Essay Example

Human Growth And Development Social Work Essay Example Human Growth And Development Social Work Essay Human Growth And Development Social Work Essay Human being is non inactive and people are developing invariably ( Thompson and Thompson, 2008: 83 ) . For this ground, an apprehension of development is cardinal to set abouting professional societal work at a high degree of competency ( Ibid. : 99 ) . This instance survey focuses on Tony and Jan, their adopted nine twelvemonth old boy Sam, new babe and Jan s female parent Dorothy. It is apparent from reading this household s background information that a societal worker should see theories of human growing and development in order to to the full measure their fortunes and behavior. Hence, this is where our attending will now turn but as clip does non allow consideration of all household members, for the intent of this assignment two will be concentrated on ; Sam and Jan. Sam Sam was adopted by Tony and Jan at four old ages old, a move which, despite initial reserves, was successful. However, in recent months Sam s behavior has deteriorated and this, aboard other jobs, has led to the household seeking support. has long been regarded as important in kids s development ( Aldgate, 2007: 57 ) . Bowlby ( 1977: 203 ) described attachment behavior as behavior ensuing in a individual achieving or retaining propinquity to another differentiated and preferred single, normally considered stronger and/or wiser. He considered it built-in to human nature, seen to changing extents in all human existences and performed the biological map of protection ( Bowlby, 1988: 22 ) . can be affected when separated from a chief attachment figure ; particularly if this happens involuntarily such as when a kid is removed from their parents attention ( Aldgate, 2007: 64 ) . Irrespective of their old fond regard experiences, they will happen this terrorization because they do non cogni ze who to turn to assist them return to a province of equilibrium ( Ibid. ) . This explains why kids who have experienced maltreatment may still desire to be with their parents, even if they are insecurely attached to them ( Ibid. ) and could exemplify why Sam was late protesting that he wanted to travel back to his existent female parent. Daniel ( 2006: 193 ) asserts kids between the ages six months and four old ages are most vulnerable when separated from fond regard figures because: during these early old ages kids lack the cognitive accomplishments to grok the events taking to separation and this coupled with the leaning for charming thought, means immature kids are extremely likely to fault themselves for the loss . Sam was adopted at four old ages old and although we know small about the fortunes with his birth parents, significantly his fond regard bond was broken at this point. Aldgate ( 2007: 65 ) notes kids who have lost attachment figures through come ining the attention system are at hazard of farther injury by insensitive responses to their fond regard demands. Furthermore, kids get downing new arrangements with insecure attachment behavior may prove the parenting capacity of their carers ( Ibid. ) which could explicate Sam s recent deteriorating behavior. Following two decennaries of research showing that arrangement dislocation is an on-going job in the UK ( Ibid. ) , practicians working with this household should be particularly careful to seek to forestall this. Attachment theory differs from traditional psychoanalytic theories because it rejects the theoretical account of development suggesting an single base on ballss through a series of phases, in which they may go fixated or reasoning backward ( Bowlby, 1988: 135 ) . Alternatively, this theoretical account sees the person as come oning along one of many possible developmental tracts, some of which are or are non compatible with healthy development ( Ibid. ) . Yet, the function of parents in determining a kid s personality has been critiqued by Harris ( 1999: fifteen ; 359 ) , who offers an alternate point of view in The Nurture Assumption and proposes it is experiences in childhood and adolescent equal groups that modify a kid s personality in ways that will be carried frontward to adulthood. What s more, OConnor and Nilson ( 2007: 319 ) argue that amongst kids in the Foster attention system, fond regard is considered a powerful but diffuse beginning of behavioral and emotional jobs. Alm ost any riotous behavior can be attributed to attachment troubles in early relationships and the early experiences are frequently suggested as the lone beginning of their jobs, later understating the function of the current arrangement experiences ( Ibid. ) . They contend following research showing surrogate parents attachment and caregiving does act upon the kid s fond regard to them, it is important that the impact of early fond regard experiences on later development should non be considered independently of current caregiving environments ( Ibid. : 320 ) . Finally, supplying that new attachment figures for kids can react to kids s fond regard needs sensitively and are committed to manage any behavior that may prove their remaining power, it is believed early forms can be modified or discontinued ( Aldgate, 2007: 66 ) . Bronfenbrenner s ( 1979 ) Ecology of Human Development looks beyond the impact of fond regard to health professionals on development and offers much in footings of helping our apprehension of this households state of affairs and behavior. Bronfenbrenner ( Ibid. : 3 ) developed his broader prospective to development, supplying new constructs of the developing individual, the environment and the germinating interaction between them. He focussed on: the progressive adjustment, throughout the life span, between the turning human being and the altering environments in which it really lives and grows. The latter include non merely the immediate scenes incorporating the developing individual but besides the larger societal contexts, both formal and informal, in which these scenes are embedded . ( Bronfenbrenner, 1977: 513 ) . Harmonizing to Bronfenbrenner ( 1979. : 22 ) , the ecological environment is comprised of a nested administration of homocentric constructions with each one contained within the following. He labelled these the microsystem, mesosystem, exosystem, and macrosystem and each bed of a kid s environment affects their development. When looking at the microsystem, the form of functions, interpersonal dealingss and activities experienced by the developing individual in a given scene ( Ibid. ) , there are ways this could hold affected Sam s development. For case, within the household puting Jan has struggled to get by since the unexpected reaching of their babe, which later could hold affected Sam s relationship with her. He now has to portion his female parents attending with his sibling and may be experiencing left out or covetous. Furthermore, the disbursal of IVF has resulted in Tony working more, rendering him absent from the family more often. This alteration may hold influenced Sam s relationship with Tony and he may be losing holding his male parent about as in the yesteryear. Additionally, following his acceptance, Dorothy felt unsure whether to see Sam as her existent grandson, a tenseness which Sam may sensed himself. Bronfenbrenner ( Ibid. :7 ) besides regarded the connexions between other people in the scene of equal importance because of their indirect influence on the development kid through the consequence they have on those who deal first manus with that individual. Sam s development could hold been affected by labored dealingss between his parents as a consequence of Jan non having the support she needs from her hubby due to his work committednesss. Similarly, dealingss between Jan and Dorothy have become tense since the babe s reaching with Jan anticipating Dorothy s aid, which has non materialised. Beyond the microsystem, an exosystem refers to scenes that the developing individual is non involved in as an active participant but in which events occur that affect, or are affected by, what happens in the scene incorporating the developing person ( Ibid. : 25 ) . Bronfenbrenner ( Ibid. ) offered a kid s parents topographic point of work as an illustration and with the demand for Tony to work every bit much as possible, any emphasiss he experiences in the work environment could encroach upon Sam s development even though Sam spends no clip in this scene himself. This theory recognises everyone exists within a context influencing who they are and how they respond to state of affairss in life ( Phelan, 2004: online ) . Whilst the edifice blocks in the environmental facet of this theory were familiar constructs in the societal and behavioral scientific disciplines, the manner in which these entities relate to one another and to development was new ( Bronfenbrenner, 1979: 8 ) . Hence, before this theory, sociologists, psychologists and other specializers studied narrow facet s of kids s universes ( Brendtro, 2006: 163 ) . However, Tudge et Al. ( 2009: 6 ) evaluated the application of Bronfenbrenner s theory in late published work and found merely 4 out of 25 documents claiming to be based on his theory had utilised it suitably. They contend if theory is to play an of import function in developmental surveies it must be applied right because: a failure to make so means that it has non been tested suitably ; informations seemingly back uping the theory do no such thing if the theory has been falsely described, and a distorted theory is imperviable to assail from nonsupportive data ( Ibid. : 206 ) . Adoption is required when it is non possible for a kid to return place, either because the parents are unable to care for them or alter their lives in a manner that would be safe for that kid ( Brent Council, 2010: online ) . Whilst we are unsure of the fortunes taking to Sam s acceptance, we can theorize that the attention provided by his birth parents was deficient. Infant encephalon research demonstrated that if there is grossly unequal attention in babyhood, the baby s encephalon and other abilities that depend on encephalon development can be compromised ( Linke, 2000: online ) . The bulk of the critical times for encephalon development occur before the age of six months and research indicated orphans adopted after this age made less advancement than those adopted earlier ( Ibid. ) . Furthermore, parts of the encephalon that regulate emotions and emphasis responses are organised early in a kid s life and may non be mutable subsequently ( Ibid. ) . Subsequently, parts of the orga nic structure and encephalon that respond to emphasis may go over sensitive and ready to react to menace even when a menace is non manifest if the baby is continually exposed to trauma and emphasize ( Ibid. ) . If Sam experienced unequal attention in babyhood it is possible that he has developed over sensitive emphasis responses and now regards the new babe as a menace, which could supply an account for his noncompliant behavior and neutrality in his sibling. Pollak and the University of Wisconsin Child Emotion Lab are active in researching how early life experiences affect encephalon development ( see Child Emotion Lab, 2009: online ) . However, he and his co-workers stress that non all kids sing disregard develop the same jobs ( Wismer-Fries et al. , 2005: 17239 ) . In their work on the function of early societal experience in subsequent encephalon development they found kids sing lower hormonal responsiveness may travel on to develop satisfactory interpersonal relationships and highlighted potentially important single differences runing across the control group and the antecedently neglected group of kids ( Ibid. ) . Furthermore, other research led by Pollak has demonstrated how adjustable the encephalon can be when in the right environment ( University of Wisconsin News, 2003: online ) . Their survey of 5-6 twelvemonth old s who lived in orphanhoods during their first seven to 41 months of life found that kids performed better in many trials the longer they had lived with their adoptive households ( Ibid. ) . Pollak ( quoted in University of Wisconsin News, 2003: online ) hopes these findings will promote kids to be placed in households instead than in institutional scenes and offer new avenues for planing more effectual intercessions that could assist kids who spent their early old ages in disadvantaged environments reach their full potential . Jan Erikson s life rhythm attack proposes at certain points in their lives, people encounter life crises making a struggle within themselves as persons and between themselves and other important people in their lives ( Gibson, 2007: 74 ) . Each life crisis provides a struggle, characterised by a pull in different waies by two opposing temperaments, and if the single achieves a favorable balance between these so they are every bit prepared as possible to travel onto the following phase in the procedure ( Ibid. ) . However, if one does non accomplish this favorable ratio, this renders wining in subsequent life crises debatable ( Ibid. ) . Generativity vs Stagnation is Erikson s 7th and next-to-last phase of psychosocial development covering in-between maturity and generativity is chiefly the concern in set uping and steering the following generation ( Erikson, 1965: 258 ) and represents the major struggle in maturity ( Slater, 2003: 57 ) . As Slater ( Ibid. ) asserts, everybody has to conf ront the crisis of parentage whereby: mmake a deliberate determination to go parents, but some become parents without witting determination, others decide non to go parents, and still others want to go parents but can non. The determination and its result provoke a crisis that calls for a re-examination of life roles . Successfully accomplishing this sense of generativity is of import for both the person and society and parents demonstrate it through caring for their kids ( Slater, 2003: 57 ) . A failure to accomplish this leads to a feeling of stagnancy and unproductivity ( Heffner, 2001: online ) . Jan spent a long clip seeking to go a female parent to carry through this phase in Erikson s theoretical account and accomplish a favourable ratio ( Erikson, 1965: 262 ) of generativity over stagnancy. After two old ages of seeking to gestate, three unsuccessful efforts at IVF and two gruelling old ages of the acceptance procedure, they adopted Sam and have since out of the blue conceived of course. However, as Erikson ( Ibid. : 259 ) asserts the mere fact of holding or even lacking kids does non achieve generativity . Blyth ( 1999: 730 ) composing about assisted construct, significantly high spots parentage after such attempts will non needfully fit outlooks and Jan s feelings of being a useless fem ale parent and happening maternity a battle may be unexpected after seeking for a household for such a long clip. Furthermore, in this phase, the importance of grownup mature dependence is implicitly inferred and suggests there are psychological wagess for those grownups who can run into the demands of others and hold other people dependent on them ( Gibson, 2007: 83 ) . Jan reports experiencing unable to soothe her babe and run into their demands and this should be addressed by a societal worker to forestall a pervading sense of stagnancy and impoverishment ( Erikson, 1965: 258 ) in this phase of the life rhythm. Slater ( 2003: 53 ) acknowledges Erikson s work, whilst grounded in psychoanalytic theory, rejects Freud s impression that personality is fixed by childhood experiences entirely and provides an extension of the phases of development to cover adolescence, maturity and old age. However, Rutter and Rutter ( 1993: 1-2 ) criticised theories such as Erikson s sing psychological growing as a systematic patterned advance through a series of phases in a preset order, through which everyone moves, taking them closer to adulthood represented by grownup operation. This trust on the universals of development and the impression of one developmental tract has ignored single differences ( Ibid. ) . They believe that whilst this theory made important parts to understanding the procedures involved in development, Erikson s attack does non suit with what is known about socio-emotional development and it is likely that kids take a assortment of waies, and grownup results can non sanely be reduced to mer e differences in degrees of maturity ( Ibid. : 2 ) . Goffman ( 1963: preface- 3 ) employed the term stigma to mention to a deeply discrediting property of an person that disqualifies them from full societal credence. Their ownership of this property that makes them different means they can be reduced in people s heads from a whole individual to a discounted and tainted one ( Ibid. : 3 ) . Furthermore, the wider societies criterions mean the person is cognizant of what others regard as their weakness, which can necessarily do them to believe they fall short of what they ought to be and later shame becomes a cardinal possibility ( Ibid. : 7 ) . His work offers insight into how Jan may be experiencing about herself after being unable to gestate for such a long clip because for many adult females, infertility carries a concealed stigma Born of shame and secrecy ( Whiteford A ; Gonzales, 1995: 27 ) . Involuntary childlessness can adversely impact an persons relationships, their feelings about themselves and their ability to map, develop an d take part in society may be compromised by their inability to set about conventional functions associated with parenting ( Blyth, 1999: 729-730 ) . Whiteford A ; Gonzalez s ( Ibid. : 27-35 ) research on 25 adult females who sought medical intervention for sterility, demonstrated the concealed load of sterility reflected in the stigma, hurting and spoiled individualities of those interviewed. The adult females in their sample experienced the effects of their societal individuality and suffered because they had: internalized the societal norms expressed in dominant gender functions, and in so making see themselves as faulty. They suffer from being denied the chance proceed with their lives as others do ( Ibid. : 35 ) . Goffman ( 1963: 9 ) believed the stigmatised individual frequently responds to their state of affairs by doing an effort to rectify their weakness. This is apparent in Whiteford A ; Gonzales ( 1995. : 35 ) survey where the adult females attempted to rectify their job and repair the broken portion of them, giving all they could to go a normal and whole individual and take the stigma of being sterile. Unfortunately, failure is the most likely result of sterility intervention ( Blyth, 1999: 729-730 ) , as experienced by Tony and Jan, who had three unsuccessful efforts at IVF before retreating from the programme. Furthermore, Goffman ( 1963: 9 ) emphasised that where such a fix is possible, this does non needfully take to the acquisition of to the full normal position. Alternatively a transmutation of ego from person with a peculiar defect into person with a record of holding corrected a peculiar blemish ( Ibid. ) occurs, which Jan, who has successfully overcome her sterility and go a female parent may be sing. One important unfavorable judgment levelled at Goffman s theory is of the seemingly incapacitated function attributed to persons with stigmatic qualities ( Carnevale, 2007: 12 ) . Furthermore, Nettleton ( 2006: 96 ) reiterates the importance of recognizing stigma is non an property of the person but a thoroughly societal construct which is generated, sustained and reproduced in the context of societal inequalities alternatively. Nonetheless, Goffman s theoretical account remains dominant and extremely respected and his representation of the societal troubles people with stigmatic qualities face is still considered extremely valid ( Carnevale, 2007: 12 ) . Whilst attachment behavior is particularly apparent in childhood, it besides characterises people from cradle to the grave ( Bowlby, 1977: 203 ) . Furthermore, the capacity to organize intimate emotional bonds in both the attention giving and attention seeking function is considered a chief characteristic of effectual personality operation and mental wellness ( Bowlby, 1988: 121 ) . Bowlby ( 1977. : 206 ) proposed there was a strong relationship between a individual s experiences with their parents and their ulterior ability to organize affective bonds and that: common fluctuations in that capacity, attesting themselves in matrimonial jobs and problem with kids every bit good as in neurotic symptoms and personality upsets, can be attributed to certain common fluctuations in the ways that parents execute their roles ( Ibid. ) . Subsequently, attachment theory advocators believe many signifiers of psychiatric upsets can be attributed to failure of the development of attachment behavior ( Bowlby, 1977: 201 ) . This is supported by et Al s. ( 1996: 310 ) research which found insecure fond regard appeared to impact upon self-esteem and self worth eventualities ensuing in depressive symptoms in maturity. Whilst we know small of Jan s attachment behavior as a kid, her relationship with her female parent is unstable at present and when looking at the symptoms that Jan is exposing they could deduce she is sing postpartum depression. The Edinburgh Postnatal Depression Scale was developed by Cox et Al. ( 1987 ) to help wellness attention professionals recognise postpartum depression. Statements used to place the status include: Things have been acquiring on top of me ; I have been experiencing sad or miserable ; I have been dying or worried for no good reason and I have blamed myself unnecessarily when things went wr ong , all of which could be applied to how Jan is experiencing at present. Furthermore, her changeless low temper and feelings of insufficiency as a female parent lucifer some of the symptoms of postpartum depression described on NHS Direct s ( 2008: online ) web site. Therefore, whilst this is merely a probationary account of Jan s feelings, it should be explored by the societal worker working with this household. Additionally, unresolved childhood attachment issues can go forth grownups vulnerable to sing troubles in forming secure grownup relationships ( Evergreen Advisers in Human Behaviour, 2006: online ) . Attachment jobs can be handed down transgenerationally unless the concatenation is broken and hence, an insecurely attached grownup may miss the ability to organize a strong fond regard with their ain kid ( Ibid ) . Subsequently, uthis theory offers the possibility that hapless formation of affective bonds in Jan s ain childhood could explicate why she is fighting to organize an attachment bond with her ain babe. Furthermore, new dealingss can be affected by outlooks developed in old relationships and there is a strong correlativity between insecure grownup fond regard and matrimonial dissatisfaction ( Ibid. ) . This could offer an account for why Jan believes Tony does non supply the emotional support she requires. However, whilst trauma experienced in the early old ages can be associated with jobs in the long term, it should non be assumed this is black for a kid s physical, cognitive and emotional development and will automatically plague the remainder of a their life ( Daniel, 2006: 195 ) . As Barth et Al. ( 2005: 259 ) contend, while attachment jobs may predispose a kid towards subsequently jobs, these jobs must be evaluated and treated within the context of their current environment. Social work practicians supplying appropriate intercessions can do a long-run difference because hardship experienced in the early old ages can be compensated for and the worst effects ameliorated if support is given ( Daniel, 2006: 195 ) . Obviously, an apprehension of human development theory provides more than an interesting background subject and is indispensable to good societal work pattern ( and Thompson, 2008: 139 ) . Whilst no theories supplying penetrations into development are unfailing, in combination they have much to offer to a practicians apprehension of those they work with. Therefore, it is imperative a societal worker should see biological, psychological and sociological attacks in order to transport out a full and holistic appraisal of this household s demands. However, as Thompson and Thompson ( Ibid. ) assert, it is easy for practicians to wrongly believe the cognition base will offer off-the-rack, ready-made replies and merely use theories to pattern in a mechanical, across-the-board manner. Therefore, it is of import for skilled brooding practicians to be competent at pulling out relevant facets of the theory base and use them in a manner that is tailored to suit the state of affairs alternatively ( Ibid. ) . Furthermore, as Thompson ( 2009: 63 ) accents, there is a danger that when looking at development across the life class it can be used as a stiff model that we expect everyone to suit into and so see those who do non as abnormal or holding a job. Consequently, it must be recognised that this traditional attack taken to development across the the life class can be really oppressive and discriminate against those who do non conform to the tendency ( Ibid. ) . For this ground, the life class should be considered as a agency of beginning to understand common phases of development and is non a stiff model for doing opinions about abnormality ( Ibid. ) . To reason, as Thompson and Thompson ( 2008: 99 ) remind us, understanding development is non doing everyone tantrum into a stereotyped premise about what is normal but instead to recognize there are important forms that underpin growing and development and to the attitudes and behaviors associated with these.

Friday, November 22, 2019

Direct Mail and Email Advertising Research Paper - 1

Direct Mail and Email Advertising - Research Paper Example The report examines direct marketing as a method of sending advertising messages to potential and existing customers through direct mail. It highlights the major advantages and disadvantages of this method as a traditional method of advertisement. This method is costly and customers may not read the intended ad message. Email advertising involves the conveyance of advertisement messages through email. With the rise of internet technology, emails are becoming easy and fast methods of sending emails. It is less costly and generates more customer response than direct mail advertising. Email marketing is considered as the most suitable method of advertisement because it is less costly, easy, fast and effective. It generates more customer responses than direct mail and earns more returns on investment. However, the retailer should avoid sending email messages too often and send only relevant information targeted at specific individual customers who demonstrate an interest in the companyâ €™s products. Working as a marketing consultant in Big Consultant Company, my aim is to advise a retail marketer in the High Street who has approached our company for consultancy services. The client wants to choose the best method to advertise his retail products to target customers. He is faced with a rhetoric situation in which he has to choose between direct mail and email advertising to advertise his products. The retailer sells electronic devices including computers, mobile phones and tablets to customers on order. He already has a large number of customers within his neighborhood, but he wants to expand to other neighborhoods. He has already generated a large database of potential customers including university and college students. He is now wondering which method he should use to communicate with them. Direct mail and email advertising are his most preferable methods.

Wednesday, November 20, 2019

Modern Age Europe 1348-1789 Essay Example | Topics and Well Written Essays - 3000 words

Modern Age Europe 1348-1789 - Essay Example For a long time Europe was under the power of monarchs and popes creating a great controversy between the church and the state as to who should hold absolute power. The period between 1350 and 1550 in Europe was also characterized by increased trade among nations, conquest and colonization of states such as Africa and Asia. It was also a period when slave trade was thriving due to labor requirements in plantations, mines, and at homes of the noble citizens. The discovery of the Americas by Columbus also played a great part in the changes that took place thereafter. The aim of this paper is to discuss the political, religious, social and cultural changes that took place in Europe between 1350 and 1550. The paper will thus be divided into four sections. First it will discuss the political changes. Secondly, the religious changes. Thirdly, the social changes will be discussed and lastly, the cultural changes. Political Changes There are various political changes that occurred in Europe from 1350 to 1550. These were necessitated by the various events that occurred during this time such as the bubonic plague, the hundred years war and the rise of national sentiment, the late medieval church the great schism, the renaissance, the reformation age, and the religious wars. ... The noble landowners were the most powerful people but the plague deprived them of their power since it rendered agricultural products undesirable and wages were high thus loss of revenues which was the source of power. The church also lost some political power as it depended on land for revenue. On the other hand, the political power of the artisans increased as their items of trade such as jewelry was on high demand. Due to loss of revenue from agricultural produce the government had no option than to apply restrictive legislations and impose taxes on peasants so as to get revenue. As a result there were increased peasant uprisings which were detrimental to the growth of the economy. Another political change in Europe was the increasing nationalism especially in France as a result of the 100 years of war in Europe. The war took place between May 1337 and October 1453 with the defeat of England by France. Before the war, there was a lot of disunity in France which the Estate General took advantage of to usurp the power of the royals. However, efforts by Joan of Arc to unite the country led to nationalistic feelings in France and desire to have a national identity. This led to a political shift whereby France adopted a centralized form of government as opposed to feudal monarchy. Nationalism also led France to dishonor the Treaty of Troyes which had led to disinheritance of the French king by the English king. France was thus able to elect its own king and gain political power. Another crucial outcome of the war was the end of King Edward’s vassalage to the king of France thus acquiring sovereignty over English territories in France although by the end of the war, England had control of only one French territory

Monday, November 18, 2019

MHE510, Occupational Health and Safety, Mod 1 SLP Essay

MHE510, Occupational Health and Safety, Mod 1 SLP - Essay Example and Safety would look for any and all things that might cause an employee to fall causing traumatic injuries, realizing that traumatic injuries often prevent the employee from working (Woods, 2005). The employee that cannot work because of an injury is a liability to himself as well as the organization so this is a needed prevention. There are many things, some of the surprising that might cause an employee to fall in an organization such as this one. Some of those are wet or slippery floors, having things fall against the employee causing a fall, impediments such as cords and/or product in the walkway. Certainly preventing a fall from a slippery floor is not difficult if one knows the floor is slippery, however, this does not always occur. A slippery floor should either be corded off from the employees preventing them from walking on it or auto scrubbers should be used (Anonymous, 1987) Another possibility and one particularly liked by OSHA is the use of non -slip footwear. This kind of footwear is being recommended for use in many kinds of companies where floors may become slippery. Other types of falls that cause injury are usually caused by the employee being hit and knocked down. This can cause crush injuries, traumatic falls, lacerations, bruising, sprains, and fractures. There should be a concerted effort not to stack too high, not to overload trolleys, and not to overload stack racks. Assuring that there are no cords or equipment left in walkways is also important. Violence in the workplace has escalated over the last several years. It has become a major concern for OSHA. There are many types of violence that the employee may have to deal with including those from the outside which would include robbery and those from co-workers. OSHA has recommended that a zero tolerance policy be in place to prevent this from happening. This would need the commitment of upper management, a worksite analysis, safety and health training and record keeping and

Saturday, November 16, 2019

The Smart Metal Detector

The Smart Metal Detector This project is the combination of hardware and software product. With the aid of the micro-controller, this metal detector can have more useful function. This system consists of 3 main parts of hardware: The construction of smart metal detector required the gathering of information/ knowledge/ concepts of obstacle sensor, LCD Display, H-Bridge DC motor driver, PIC micro-controller, metal detector technology and so on. Besides that, some knowledge in software part: PIC Assembly language and other useful software: MPLAB, Protel XP, and multisim are also needed. Nowadays, Metal detectors have become a very common staple in todays society and widely used in human live in a range of usage from leisure to work and also safety purpose. For Safety purpose, Metal detector that used in airport to ensure that there is no dangerous weapon such as knives, guns or any metal objects that could be used as weapons has been brought along by terrorist into the airplane. In technical area, people used metal detector to search for the underground pipe or cable before digging in walls and floors. Besides that, many people enjoy in discovering hidden treasure or valuable metal like gold and silver by using metal detector. Metal detector products are available in market. It has many types of metal detectors are sold which used in different area. However, many of them have the following disadvantages: Expensive The prices of metal detectors are very expensive. Although the more expensive metal detector has higher performance and functionality, usually we dont need so much of the function. The extra function that we dont need will be wasted. So the prices of metal detector products that sold in market wouldnt be afford by everyone. Manually controlled metal detector Many of the metal detectors are manually controlled by human where users are required to handle it and walk around to detect the underground metal. This is very exhausted and tired work. Based on these two disadvantages, users need a low cost and have basic function of mobility metal detector. The smart metal detector is a device that used to detect metallic material such as coins, gold and other metal items. It can move and change the direction of movement in certain situation to scan the underground metal. It will take a U turn when it reached the desired distance which already set inside the microcontroller and continue move in another track. It will avoid the obstacle with the help of sensor. When it detects a metal, it will beep on alarm to indicate user. 2.0 Statement of Aims Below are the aims that targeted to achieve in the Smart metal detector project: Automatic movement: In this section, the concept of relationship between H-Bridge driver and DC motors are applied into the project. The H-Bridge driver is a circuit that used to control the direction of DC motors with the help of micro-controller. Obstacle avoidance: When the device has detected an obstacle blocking in front of the metal detector, it will avoid the obstacle automatically by changing its movement direction to prevent collision happened. Micro-controller application: A micro-controller is used to become the main brain of the mobile metal detector. The main purpose of the micro-controller is used to give instruction to control all the function of the metal detection. Alarm beep when detect metal: When the metal detector has been detected underground metal, the buzzer will beep on to inform users that some metal elements have been detected. LCD display indication: All the status and message from the metal detector are indicating in the LCD display. For example, the message of Metal Found will be shown in LCD when the metal detector has been detected metal element. 3.0 Objective The main objective of this project is to develop a Smart Metal Detector into more automation area. With the automation of metal detector, this concept will be contributed to the real life application. The sub-objectives of this project will be elaborate below: To apply the electric and electronic knowledge that I have learned into the real application field. To provide a low cost metal detector for general metal detection purpose. To learn the skill of writing software in PIC Assembly language. To learn the skill of debugging the software problems or bugs. To learn how to work followed the planned schedule, as well as the Gantt Chart. 4.0 Literature Review The first person that invented the first crude metal detector in 1881 was Alexander Graham Bell. After that, the metal detector concept has been kept on improving to become more advance and applicable in various areas. Basically, there are three technologies used in metal detectors. These three technologies are: I. Very Low Frequency (VLF) Technology II. Pulse Induction (PI) Technology III. Beat-Frequency Oscillation (BFO) Technology VLF is known as induction balance and it is also the most popular metal detector technology used nowadays. There are two distinct coils that used in a VLF metal detector, transmitter coil and receiver coil. The transmitter coil is the outer coil loop which is coiled with wire. Electricity is being sent along the wire and creates the electromagnetic field. The receiver coil is the inner coil loop which is also coiled with another wire. The receiver coil acts as an antenna to pick up and amplify the frequencies which come from the target metallic objects in the ground. The metal detector has the ability to determine approximately the deeper of the targeted buried object. This can be done by determine the strength of the magnetic field that the object generates. The concept is very simple: The stronger magnetic field will be detected if the metal detector is closer to the surface of the targeted object. Alternately, the further the object away from the metal detector, the weaker the magnetic field will be detected. The metal detector also can differential the types of metals. It is relied on a phenomenon called as phase shifting. The differences in timing between the frequencies of transmitter coil and the targeted object is called phase shift. For example, an object with high inductance will have a larger phase shift because it takes longer time to alter its magnetic field. However, an object with high resistance will have a small phase shift. The phase shift concept provided VLF based metal detector has the capability called discrimination. The metal detector used a pair of electronic circuits called phase demodulators to compare the phase shift of target object with the average of a particular type of metal to examine the metal class of the target object. The detector will then notifies user with audible tone or visual indicator of what class of the metal is most likely to be. The phase shift concept also allowed user to filter out (discriminate) the unwanted object above a certain phase-shi ft level. Pulse Induction (PI) technology is a less common form of the metal detector. PI metal detector uses only single coil as both transmitter and receiver, or using 2 or 3 coils work together. The metal detector sends powerful, short pulses of current through a coil of wire. This cause each pulse generates a brief magnetic field. The magnetic field will reverse polarity and collapses very suddenly after the pulse ends and causing a sharp electrical spike. After the spikes, a current called reflected pulse will run through another coil and this process will keep on repeating in very short time. The PI based metal detector works like echoes: If the metal detector is over a metallic object, an opposite magnetic field will create by the pulse in the object. After the collapsing of the pulses magnetic field, the reflected pulse will be generated, and thus the magnetic field of the object cause it take longer time for the reflected pulse to disappear absolutely. A sampling circuit is set to monitor the length of the reflected pulse. The circuit can determine if another magnetic field has caused the reflected pulse decay in longer time (usually a few microseconds) than normal, it will suspected that some metallic object is being interfering with it. Usually the sampling circuit is connected to a device called integrator. This integrator can read the received signal from sampling circuit amplifies and converts the signal to direct current (DC). This DCs voltage is connected to an audio circuit which used to indicate the user that targeted object has been detected. This function is almost similar to the VLF based metal detector. PI based metal detector is not as good as VLF based metal detector in discrimination due to the limitation of reflected pulse length of various metals are difficult to separated. However, PI detector is very useful to detect object in areas that have highly conductive material such as salt-water exploration. In addition, PI detector has the advantage that can detect metal much deeper in the ground than other systems. Beat-frequency oscillator (BFO) technology is the most basic way that used to detect metal. There are 2 coils of wire in BFO detector. A large coil is in the serarch head and the smaller coil is located inside the control box. Both coils are connected to an oscillator that generates thousands of pulses of current per second. The frequency of the pulses is slightly offset between two coils. When the search head passes over a metal object, the objects magnetic field will interferes with the frequency of the radio waves which generated by the search head coil. After that, the frequency will deviates from the frequency of the coil in the control box and cause the audible beats change in duration and tone. The BFO detector is sold in low cost compare to other technologies detector, however, the accuracy and the level of control are not provided. Although there are 3 different of technologies used in metal detector, the basic concept of metal detector can be simplify as using the coil of wire to detect the magnetic field of the underground metal. Hence send a feedback signal to main circuit or micro-controller to process it. Those metal detectors have various types of function and advance performance however; most of them are manually controlled by human. This project is basically applied the technology of metal detector into a more automation field instead of using human control, but not improving of the performance of any market products. 5.0 Design Methodology In order to complete the project in time, I have separated the whole project progress into several parts. The project development progress is shown in the flowchart form: Planning Literature research Literature Review in background knowledge of metal detector. Information of hardware/components gathering Software learning Components purchasing Hardware constructing (Prototyping) Testing/Experiments Writing software (Programming) Modify Prototypes Software improving Testing Troubleshooting/Debugging Final Assembling Project Completed 6.0 Research and Competitive Analysis The hardware part of smart metal detector consists of inputs and outputs. The input parts included: obstacle sensor and metal detector circuit. The output parts included: H-bridge driver, DC motors and buzzer. A micro-controller is used to interconnect and control the operations among the hardware components. It receives input signals from different inputs and gives the instruction to the outputs based on the situation. The micro-controller will only execute the program that stored inside the memory. Micro-controller works as the brain of the Smart Metal detector. It gets the feedback signal from the sensors/detectors then sending signal to control the condition of the H-Bridge driver and turn on the buzzer once metal is detected. Obstacle Sensor to detect obstacle that blocking in front of the mobile detector to avoid collision happened. Metal detector used to detect the underground metal/mine. The metal detector circuit is uses the coil/inductor to detect the magnetic field of the underground metal. When the coil/inductor cuts the magnetic field of the targeted metal, it will send a feedback signal to the micro-controller. LCD Display can have a better looks and more powerful in showing message instead of using LEDs or Seven-Segments display. It displays the message in the form of alphabet or numbers. So, user will have a better understanding in reading the alphabet message compared to just light on some LEDs. Buzzer/Alarm acts an alarm to warn/inform user that something has happened to the metal detector such as mine has been detected. H-Bridge driver and DC motors used to control the direction of DC motors for different condition such as move forward, stop moving and turning. The DC motors are used to rotate the wheels of the mobile metal detector. 8.0 Software Flow Chart The programming code is written to interconnect the input hardware and the output hardware. The received signal form inputs will be process in the microcontroller and thus send out the react instruction to the output parts. The PIC assembly language is used in this project. The programs of the basically project can be separated into 3 main parts: Main routine of moving. Obstacle avoidance. Metal detected. The estimated cost of this project is to prepare a fund which enables us to control the project expenses. For this project, a sum of RM 615 will be allocated to fund the entire project including the hardware and software parts. The cost of the project can be reduced to a certain amount by doing market research and comparing the cost among the vendors. In addition, compare different type of metal detector and obstacle sensor also needed to reduce the project cost. Another alternative is to get second-hand or used goods in order to minimize the expenditure. Besides this, daily wages must also take into consideration. Considering 400 hours will be utilized to accomplish this project and RM 5 per hour will be paid. Yet another RM 150 is allocated to fund the resources fee such as the electricity and petrol usage. Hence, the overhead cost for this entire project will be charged at RM 2765. 11.0 Risk Assessment and Management To complete this project, a few risks that might affect the progress of the project have been drawn out as prevention is better than cure. If there is no other alternative plan has been made or planned now, then it will definitely leave a bad impact to us if this risk does happen. Firstly, in order to make this project a success, intensive learning of assembly language through reference book and Subject EN0318 Embedded Systems Advanced Digital System Design is crucial because I am lack in PIC knowledge and it is new to me and it posts a risk to me. 12.0 Conclusion and Recommendation Now just a beginning stage of the project, I have provided a clear view of the objectives and aims of metal detector project and i will complete the entire task stated step by step by following the project planning time. My project planning has stated clearly through the Gantt chart as well as the critical path analysis. The entire research and development job has been done throughout this semester but it still in the early stage the final project. Hence, more information from supervisor, reference book and internet needed. I can increase my knowledge level by workout with the research activity and this may help me to boost up my project to quality completion. In addition, found that many interested features and ideas can be added on to the project. But the insufficient time, knowledge and financial problems have restricted me to achieve those extra features. However, if possible I will try my best to achieve it. The extra features are: Measuring of the deeper of the underground metal Password is required to activate the metal detector Robot arm added to the mobile metal detector As a conclusion, this project smart metal detector may give me experience as an equipment and product engineer with excellent technical and management skills with moral values and bring future benefits to me as an engineer. 13.0 References [1] http://travel.howstuffworks.com/airport-security.htm [1] http://www.losttreasure.com/auction/APViewInCat.asp?ID=7 [2] http://inventors.about.com/library/inventors/blmetal_detector.htm [3] http://home.howstuffworks.com/metal-detector1.htm [4] http://www.microchip.com

Wednesday, November 13, 2019

The Marx Brothers :: Research Papers

The Marx Brothers In his book entitled Creating Minds, Howard Gardner (1993) engaged in a thorough study of creativity. He did this by studying the lives of exceptional creators in seven different domains in search of trends that could be readily identified and, perhaps, even help to paint a clearer picture of what the ingredients for creativity are. After examining these creators' lives he came to some conclusions based on the trends he identified and formed a model of creativity. In order to test both his model and his findings, it is necessary to extend the search (and study) beyond his initial seven great creators. In doing this it becomes possible to refute or add credence to his conclusions. This extension also allows for further questions to be asked. During the reading of Creating Minds I happened upon an interesting thought: Could Gardner's model for creative individuals be applied to the study of a creative group? Furthermore, would a group show similar trends in their creative development? If I was going to attempt to answer this question I decided I would have to qualify what a creative group was. I defined a creative group as a group of individuals producing a single creative work. The creativity of this work must be a result of the combination of the individuals' strengths being pooled (as equally as possible) to produce an output that could not have been produced by any of the individuals on their own. The group would be analogous to Gardner's individual creator, and the group's combination of mental talents would parallel the individual creator's personal array of intellectual strengths. Having defined what a creative group was, it became necessary to ask perhaps an even more important question: Could such a group exist? If so, could an example be found? The answer to both questions, I decided, was yes. But who? My ponderings on this subject invariably brought me to the Marx Brothers, kings of comedy. My Method In his study Gardner had followed the lives of his chosen creators and examined the progression of their works as a function of the creator and his or her surroundings. It would be difficult to treat the progression of a group in precisely the same manner. If I chose to treat the group as a single unit and reported on its progress and surroundings, the workings of its component creators could be lost.

Monday, November 11, 2019

Importance of Financial Decision-Making in the Business World

In the business world, financial decision-making is important. Some organizations have trouble with accounting and the financial decision-making process in today’s diverse organizational ethics. In this world’s current economy, the expectation for organizations is to behave in an ethical manner. The business world consists of people with different ethical belief systems, which makes it difficult to define ethics (The Journal of Accountancy, 2007). Organizations that do enforce a code of ethics can create unwanted behaviors within the organizations. These unethical behaviors can affect every individual associated with the organization. When an organization instills good ethical behaviors, its rate of success and longevity is more likely to be high. Organizational ethics are a significant part in financial decision-making and accounting. Ethical principles set the foundation on which a cultured society exists. An exceptional illustration of ethics in accounting and finances is the Sarbanes-Oxley Act of 2002. After several financial frauds reported in 2001 and 2002, the president signed the Sarbanes-Oxley Act in July 2002. This act established major modifications to the financial practices and corporate governance regulations. According to n. d. 2006), â€Å"The given name is after Senator Paul Sarbanes and Representative Michael Oxley, who were its main architects, and it also set a number of non-negotiable deadlines for all organizations to comply† (para. 1). The Sarbanes-Oxley Act, known as the corporate responsibility act, act gives considerable supervision responsibilities and control to the Securities an d Exchange Commission (SEC) above organizations external auditors and distribution of financial statements. The SEC must employ a public company accounting oversight board (PCAOB) with the authority to control the public accounting (Albrecht, Stice, Stice, & Swain, 2005, p. 01). This law was put in place because of the involvement of Enron and Tyco International in several accounting scandals. For most organizations, making money is important; money is what makes the business successful. However, a business that becomes greedy and decides to make money illegally will eventually fail. In the article â€Å"Beyond Sarbanes-Oxley†, Neil S. Lebovits, advises businesses to ensure their ethical health by doing several things. Lebovits suggests that organizations must employ the following three ethical best practices to be successful: â€Å"cultivate ethical role models, demonstrate ethical ecision-making, and encourage pushback† (Lebovits, 2006, para. 5). The Directorate of P lanning, Training, Mobilization, and Security (DPTMS) organization that I work for employs these three ethical best practices daily. The management always ensures that workers behave professionally while serving soldiers and making the right decisions that could affect the soldiers training during this time of war. The DPTMS leaders provide explanations on how to make decisions and why the selection of the judgment. The organizational managers have an open-door policy to listen to the workers concerns. Additionally, managers walk throughout the day asking employees if he or she has any issues that the managers could assist on. These types of actions create a sense of trust in the leadership that everyone worker wants to emulate. Lebovits also proposes that organizations can do more to ensure the organization workers behave ethically at all levels. Lebovits suggests that, first, organizations cultivate ethical role models. These role models structures’ must include natural influencers who exhibit strong ethical behavior in their day-to-day work in the financial departments of the organization. Organizations must give influencers proper recognition on every occasion possible. By involving influencers in assignments, the individuals can have an encouraging impact in the organization. When an organization rewards its influencers efforts’, the organization can cultivate ethical conduct (2006). Organizational ethical behavior starts at the top of the organization. The leadership must motivate individuals to follow its behavior. Employees watch and listen to their management carefully for signs of how to act. Leaders should behave accordingly and set the example for the workers to follow. When suitable, leaders must tell workers examples of their business decisions involving their ethics and how they used good judgment. This type of honest conversation provides employees with a quick look on how leaders act and think while representing the organization (2006). Moreover, Lebovits proposes that organizations should also encourage pushback. In other words, companies should encourage their employees to speak up if they question financial actions and decisions that affect them. Ethics hotlines, anonymous e-mails and â€Å"approachable† managers are ways for companies to obtain this type of feedback. Organizations and their key personnel should always conduct themselves ethically and legally. They should promote an environment in which employees can articulate work-related concerns without negative effects and free exchange of information (2006). The organizations that decide to implement and follow good ethical behavior will achieve success and an excellent status as ethical and fair instiution to the clients, employees, and the shareholders. These benefits will assist the organization in the financial phase, and when organizations fail to execute will result in poor financial performance. References Albrecht, Stice, Stice, & Swain, (2005). Accounting: Concepts and Applications (9th Ed. ). Quebecor World, Versailles, KY: South-Western, Thomson. Lebovits, N. (2006, August, 2006). Beyond Sarbanes-Oxley: Three best practices to adopt in your organization. Retrieved March, 2011, from http://www. aicpa. org/pubs/jofa/aug2006/lebovits. htm N. D. (2006). The Sarbanes-Oxley Act. Retrieved from http://www. soxlae. com The Journal of Accountancy (2007). Retrieved March, 2011, from http://www. aicpa. org/pubs/jofa/joahome. htm

Saturday, November 9, 2019

Marijuana Argument Paper

To Legalize or Not to Legalize The question of whether or not to legalize marijuana has been a hot spot for this generation and is something that has enflamed a lot of passion in people. This issue plays a big part in the lives of Americans because marijuana is the most commonly used, and abused, drug in the United States (DuPont par. 3). Some people think it should be legalized because it would be good for the economy, it would help stop the drug wars, and because they believe it’s the right of individuals to smoke marijuana if they so desire.Other people think that it should not be legalized because of its negative health effects, dangers to society, and because they don’t think that marijuana has any benefits to the community of our country. Because of the scope of this issue, there are many strong arguments for and against the legalization of marijuana. However, in my opinion, marijuana should not be legalized due to its harmful side effects, negative impact on our economy, and overall danger to society. The first reason marijuana should not be legalized is that it leads to numerous health concerns for the user and those around him or her.Marijuana will increase the heart rate by 20% to 100% after using it and this can lead to later heart problems. It also affects the lungs and because when smoking marijuana, one inhales more deeply and for a longer time than when smoking cigarettes, so the effect on the lungs is even worse (â€Å"Marijuana† screens 1-2). It can lead to coughing, pulmonary infections, and lung cancer, and marijuana also represses the immune system, which exposes the body to numerous diseases (â€Å"What are the medical dangers of marijuana use? † screens 1-2).Finally, marijuana is very unhealthy for the brain. According to the web page â€Å"Marijuana† written by the National Institute on Drug Abuse, marijuana causes one to have distorted perceptions, impaired coordination, and problems with learning and m emory. These results can last for multiple days. Other extreme mental diseases that smoking marijuana can cause are anxiety, depression, and schizophrenia (screen 1). Not only that, but marijuana can indeed be addictive which leads to further health problems (â€Å"What are the medical dangers of marijuana use? † screen 3).Many people, when arguing in favor for the legalization of marijuana, neglect the negative impact marijuana has on its user, which is an incredibly important part of the argument. Yet marijuana does not only negatively affect the user, it also presents many dangers for society. One of these dangers is all the health risks that come from secondhand smoke. The secondhand smoke of marijuana can cause all of the health problems that smoking it directly does. If children are around smoke from marijuana, it can cause asthma, ear infections, breathing problems, and it can stunt their mental and emotional development (â€Å"Effects of Smoking† par. -2). Anot her concern for the safety of society that marijuana presents is people driving under the influence. If marijuana were legalized, the amount of DUI’s would absolutely increase (â€Å"Arguments For and Against Legalizing Marijuana† screen 1). Currently if a person gets pulled over for driving under the influence, they’re in for â€Å"double trouble,† so to speak, because the officer could arrest them for, obviously, driving under the influence, but they could also arrest them for possessing marijuana since it is illegal.If marijuana is legalized, people will still be given DUI’s, but they won’t be worried about going to jail for possessing marijuana, which might lead to more DUI’s. Marijuana has so many dangerous outcomes on society, which is one more reason why it should not be legalized. Finally, marijuana truly would not have any positive outcomes on our country. Many people argue that if we legalize marijuana, we can put high taxes on it and improve our economy from it. However, marijuana is very easy to get from other sources, so why would people buy taxed marijuana when they can get along just fine with marijuana bought from other locations? DuPont par. 11). People can grow their own marijuana in their backyards, get some from friends, or even get it from another country. In addition, the legalization of marijuana could lead to people advocating for the legalization of other, more dangerous drugs, which would cause of plethora of new problems. In the end, legalizing marijuana would truly do no good for our society. In conclusion, legalizing marijuana would not help at all in our fight to prevent the abuse of this drug.Legalizing marijuana will lead to numerous health problems, will hurt the safety of all people, not just the users, and it will do no general good for society. In fact, legalizing marijuana will simply increase the number of users and abusers. An effective way for controlling our countryâ€⠄¢s use of marijuana would be creating more prevention awareness problems. Many people do not know the harmful effects of marijuana and if they did, the amount of people who use marijuana would most likely drop. We need to take action to educate people about the harmful effects of marijuana so that this issue oes become exacerbated in the future. Works Cited â€Å"Arguments For and Against Legalizing Marijuana. †Pros & Cons of Legalizing Marijuana. University of Missouri at St. Louis. Web. 11 Sept. 2012. DuPont, Dr. Robert L. â€Å"Why We Should Not Legalize Marijuana. †Marijuana & Money. CNBC. 20 Apr. 2010. Web. 11 Sept. 2012. â€Å"Effects of Smoking. †Diseases & Health Conditions. Livestrong. 2012. Web. 11 Sept. 2012. â€Å"Marijuana. †DrugFacts. National Institute on Drug Abuse. Nov. 2010. Web. 11 Sept. 2012. â€Å"What are the medical dangers of marijuana use? † Health Concerns. Harvard. Web. 11 Sept. 2012.

Wednesday, November 6, 2019

Lables shown in G.I. Jane essays

Lables shown in G.I. Jane essays The movie GI Jane is about a test to see if women are capable of becoming part of combat units in the United States military. It is a test of the capabilities of a woman (played by Demi Moore) and to see if she can complete Navy SEAL training. This is designed to see if the US policy on women in combat units (Navy SEALs, Army Special Forces, Marine Force Recon, etc.) is valid. Currently, the US military does not allow women in front line units such as the SEALs and they are not allowed in units that are designated combat arms such as infantry, armor, and artillery. The purpose of the policy is to keep women out of the front lines and the majority of the fighting when a battle is fought. Some people say that it is because women dont have the physical capability to keep up with men and they would be a hindrance to the unit. In the movie the Command Master Chief in charge of the SEAL training made a comment on the Israelis trying to put women in combat. He said that the Israeli troops mourned more over a fallen female soldier then they did a fellow man who had been killed. These emotions caused the men to be less effective in combat and cost additional lives. When Lieutenant ONeal was allowed into SEAL school she was labeled from the start as a female that would never be allowed to pass the training. From the moment she reported to her commanding officer she was treated differently. This type of treatment (regardless of how obvious it might be) is designed to single people out. In a situation like this being an individual is the easiest way to fail. This individualized treatment was designed to make this woman fail. Because she was labeled as a woman her instructors wanted to see her fail and her fellow trainees had no desire to help her succeed. If anything her fellow trainees wanted her to fail even more. Quotes such as No split tail ...

Monday, November 4, 2019

Professional standards in mental health care Essay

Professional standards in mental health care - Essay Example The ethical dilemma that this paper will address is that of a mental health nurse who receives a phone call from a doctor that asks her to breach patient confidentiality. Firstly, the ethical and legal considerations of the dilemma will be presented. Secondly, the managerial qualities that the nurse in question should display will be provided. Finally, the implications of a chosen solution for the nurse's personal professional practice shall be highlighted. The practice of mental health nursing requires scientific and technical knowledge, and also the ability to make value based judgments (General Medical Council, 2001; Thompson, Melia & Boyd, 2000). These judgments need to be critically analysed and evaluated in the same way that scientific information is assessed. The term ethics is a generic word used to represent a variety of methods for investigating and understanding moral life. As such, medical ethics requires that a mental health nurse go beyond the individual, and draw on presumed universal laws (General Medical Council, 2001). The United Kingdom Mental Health Act states that medical ethics must ensure that a patient is provided with reception, care and treatment, and adequate management of their property and related matters. It is postulated here that a patient's right to confidentiality is a matter that must be properly managed stipulated by the Act (General Medical Council, 2001).Medical ethics can be summarized into four g eneral principles: 1) patient autonomy; 2) beneficence for the patient; 3) avoidance of harm to the patient (non-maleficence); and 4) justice (General Medical Council, 2001). The principles are intended to guide the value judgments of the nurse, not to substitute judgment. As such, each principle is followed until it conflicts with one or more of the other principles, although no principle is ranked higher than any other principle. However, in recent times, justice has become a significant issue. Justice involves not only the fair distribution of benefits from medicine, but also legal justice and doing what is required of the law. This includes human rights which are grounded in the ethics of justice.The current dilemma involves issues of patient confidentiality. It is argued here that the right of confidentiality would be included in the principle of patient justice, and their rights to confidentiality in regards to their medical treatments. A nurse's respect for confidentiality is vital to cultivate and maintain a sense of trust between themselves and their patients (British Medical Association [BMA], 1999). As such, a therapeutic relationship is unable to be conductive to the healing processes if the patient cannot be confident that their personal information will not remain confidential and private. The breach of confidentiality should only occur in the most exceptional of situations, and the medical professional who breaks confidentiality should be able to adequately justify their reason for doing so (BMA, 1999). The personal health information of a patient is collected by medical staff to provide the future care and treatment to the patient, in general, this information is not to be used for any other purpose if the patient has not been made aware of the other uses, and given permission fro their information

Saturday, November 2, 2019

The chassis of a typical motorcycle Essay Example | Topics and Well Written Essays - 2500 words

The chassis of a typical motorcycle - Essay Example dy components are made from cast-able aluminum, we will discuss here, the characteristics for aluminum casting with reference to its various grades, as this is the best non-ferrous casting alloy and Accordingly, the proper aluminum grade is to be selected, depending on the type of casting. In most of the cases, â€Å"Twin Spar† type aluminum is used for the manufacture of a motorbike frame. The further techniques and processes for the manufacture of this chassis involve welding, tube manipulation and profiling, sheet metal work and Jigging, tooling. These are described here in brief This process is involved when the product turnover is huge .As indicated above, the sand casting or die-casting techniques are used for the manufacture of a motorbike chassis. However die-casting is the technique mostly used for the aluminum chassis manufacture. The process can be either hot chamber or cold chamber die casting methods. The molds involved are required to be quality tested frequently due to their high ware and tear. Various casting processes have their respective advantages and limitations. Some of them are detailed below Apart from the nonferrous metals like aluminum, which are used for die-casting to manufacture the motorbike chassis, other non-metal materials are used currently. These include high resistance and strong polymer based compounds that may need a different casting procedure. The road-going version of Norton featherbed frame was manufactured using electric arc welding process only. However, the technology has advance a lot since then and it is now found that electric arc welding may not be suitable for the chassis building as the requirement of the tubing wall thickness here is more than 2mm, which makes the material expensive. This is also called CO2 gas welding. The weld material is in the form aof a wire or electrode and the gas fed as a shroud is the mixture of carbon dioxide and argon. While, the process is used mostly for steel tubing and other