Wednesday, July 31, 2019

Cultural History Essay

Since long time ago, Bra has defined fashion and beauty among women. The history of Bra is linked to social history of the status of women which entails both the evolution of fashion and the changing views of the body of a woman. Since time immemorial, women have used various garments and devices to cover, elevate and restrain the breasts. Over a period of time the emphasis of bras has changed from the functionality point to fashionable point. This fact means that in current period bras are part of fashion of a woman. Origin of the Bra The origin of bra is believed to be in 2500BC worn by the Minoan women who resided in the island of Crete in the ancient Greece. These women used to wear garments that looked like Bra whose aim was to lift up their breast and boost them. Since then, there has been tremendous change in the shape of the breast with different social meanings. Evolution of Bras The evolution of bra starts with the Corsetry which was worn by the Cretan Women. The Cretan woman stood with bare breasts and the waist and hip corset shown above the decorative part of her underwear. The aim of the corset among the Cretan women was as a symbol of beauty and was aimed at showing off the breast. It is believed that bare breast had a cultural and religious significance. Around 450bc, the Greek started wearing a bodice tied above the breasts leaving the breasts naked. This Small band of material was referred to as Apodesme and was introduced after the corsets were prohibited. Apodesme played a functional role as they prevented the breast moving while walking. The bra like structures accompanied with fashionable clothes of that time. In many of the 18th century paintings show ladies wearing free falling, pleated loose dress backs. It was probably developed from the over gown that was worn in the 17th century. Under the pannier dress was perfectly crafted laced stays that were made of many pieces of whale bones. These stays were backstitched by hand and were very beautiful and decorative. The stays supported and raised the breast to a sharp point in the front as well as defining a trim shape. The stays always matched the dress as the bones in these stays were placed laterally across both the back and front shoulder blades to ensure that the front remained straight and an upright back. Although women had clothes that provided support to the breast such as crinolines and bustles in Victorian age, corsets started to reappear in 18th century and this was evident with Edwardian Era. During Edwardian era, Edwardian Corsets started making a big impact in women fashion. Fashion favored mature women as it exploited the curves of a highly corseted shape. The young and the old women laced themselves so tightly that they distorted their figures to get am s shape associated with that period. Health corsets were greatly favored in 1890s and 1900 and were designed with an aim of assisting the women in breathing. Aches Sarraute of Paris designed health corset with an aim of aiding health instead of endangering it. She introduced the straight fronted busk that left thorax free. It was also designed to support and raise the abdomen instead of forcing it downwards. She rightly aimed at reducing pressure on vital female organs dispensed with constricting curves at the waist which was a common feature among all corsets. Corsets after 1907 were straight as women’s obsession on small waist had reduced. The corsets of 1907 achieved a long slim figure. These corsets had had elastic gussets inserts which were supposed to increase the level of comfort. The new longer styles of 1912, corsets increased in length reaching the knees making it difficult for women sitting down. These corsets were designed for beauty purposes as fashion played a major role in their development. During this period, there was a shift of attention from metallic corsets and the concept of bra started to appear. (Workman, 1996) The word Bra was developed and first reported in America copy of Vogue in 1907. The original French name of brassier meant a soldiers arm. The First World War contributed to evolution of bras where women abandoned corsets and started wearing bras. During this period, the term brassier started to appear in high profile women magazines and eventually appeared in Oxford English dictionary in 1912. (Elizabeth, 1976) In 1913, Mary Phelps Jacob, a New York socialite, made a backless brassier from two silk handkerchiefs and some ribbon after discovering that the corsets were too restrictive when a woman was dancing in night clubs. Mary sold her patent to Warner Brother’s corset company for 1500 us dollars. After the year 1918, bras were made of lace bands with straps. The best bras at that time were the Symington side lacer which was a reinforced bodice. The side lacing was aimed at flattening the bust when it was tightened. It was at this time that the term bra changed from brassier. (Elizabeth, 1976) In 1930s the bra became more sophisticated and the home sewn version of bras started to diminish during this period. In 1928, entrepreneur William and Ida Rosenthal developed bra by introducing the cup sizes and bras for all the stages of a woman. Warmers developed the alphabet bra which was made in a set of sizes that were corresponding to alphabetical letters. This is as a result of women gaining interest in the size of their breast and other women breast. The women interest in these types of bra was as a result of aggressive marketing and the changing role of women in the society. During this period, bras became a major industry and there was great improvement in fiber technology, patterns, colors and varieties of the bras. There was increase in innovation such as sized cup, adjustable strap, increased elasticity and padded breast for small sized breast. The marketing of bras during this period targeted the younger women as beauty was an important aspect in them. The desired feature in 1930s was a pointy bust and this further increased demand for a forming garment and bras fitted well for this function. In 1940s, Clothing was determined by the Second World War. During this period, advertisements of clothes were based on patriotism. The highly structured conical pointed bullet bras were used as protection clothes whereby in the military fraternity, the female soldiers were advised to wear them for anatomical support, good taste and for morale. During this period, bra enhanced the concept of the sweater girl. Sweater girls often wore bullets bras which contributed to the development of later brassieres. The war had an impact on the flow of materials as there was shortage of material which resulted into women producing their own bras from parachute silk and old wedding dresses. Commercially manufactured bras were made from minimum amount of material and hence bore the utility mark. This led to the emergence of utility bras. In 1950s, the bras were typical long line stitch and fashion was a major contributing factor towards the development of bras. The long line conical bra gave support silhouette for girls who wanted to be like film stars sweater girls like Jane Russell. The bras got better as use of nylon materials made them more attractive, lighter and easier to wash. Pretty 1960s was a period that was characterized by increased interest of quality and fashion of bras. There was increased demand for maternity and mastectomy bras and increase in the use of washing machines led to increase in preference for durable bras. There was increased marketing promotion such as wearing bras 24 hours a day. This period was marked with cultural changes which represented a great threat to bra market. These counter culture to bra production included civil right movement and feminism which greatly opposed women wearing bras. During this period, there was development in the form of bras which were seamless, flattering and sexy and were more appealing to teenage girls. The invention was referred to as wonderbra invention. These Bras tugged the breast together and pulled them forward and hence they were a means of attraction. They were marketed as a form of luxury. The material used became durable, light weight and elastic. In late 1960s, bra and other feminine emblems became targets of feminist activism. The feminists viewed bras as objects which reduced women as sex objects. Some women started questioning the role of bra and this led to protest against 1968 miss American beauty pageant. For example, Germaine Greer stated that bras were absurd invention aimed at reducing the status of women. In 1968, they were a protest against Miss America beauty pageant by 400 women coming from New York Radical women in Atlantic City convention hall. The demonstration took place after Democratic national convention and the protestors placed bras, high heeled shoes, hairsprays and other beauty apparatus seen as symbols of oppression of women in a freedom trash can placed on the ground. This was a clear sign of protest against bra although no real burning of the bras took place. There was also another protest in 1970 which received wide coverage and was perceived as sexual liberation. This protest although seen by people as breaking of the law was somehow fruitful as many women stopped . This led to some stores such as Berkeley Roos closing Bra department due to poor sales. The protest led to development of ‘no bra’ by Rudi Gernreich in 1964. This bra was light, transparent stretch netting and had a simple shape. The fine layer of foam in the bras made the cups to stand up on the end (Pederson, 2004) The ‘burning of bra’ by feminist led to innovations in fashion industry in order top win back the lost customers. Gossard launched its wonderbra crusade in 1968 which led to introduction of original wonderbra. At first 36C was the top size of this innovatory under wired bra that was a necessity for V neck dresses of late sixties caftans which had ling necks were changed by the cleavage from a wonderbra. In case where one was in need of larger bra, a bra replacement fastener was used as an extender. Inserts of extra lagging or foam rubber could be inserted into small pockets in the wonderbra to increase the fullness where there was no bust. In 1990s, silicon implant scare caused the women to turn to bras as the best option of improving their breast size. The wonderbra became best seller in 1990s. In 1916s there was the presence of bra slips which were common for short skimpy dresses. The return of cleavage was recorded in 1990s . In a blonde ambition tour; Madonna was sported wearing sported ice unguent coned circular sewed cup on her Gaultier corset. Gautier first made designs of breast that were based on the conical breasts of 1980s but received full approval after Madonna used it in a number of her functions and hence sexy lace Bras came back into business. In 1990s there was the introduction of very plain tactel underwear slips which gave a good line beneath dresses making it possible to wear unlined dresses successful without static build up. Bra industry was further promoted during this period by the quest for women who had shed their breast in 1960s to have more figure control especially when wearing the straight sheath dress that were back in fashion. During this period, there was pursuit for cleavage by utilizing water, air and silicone pads and improvement in this development enhanced the sales of fashion companies in 21st century as they put more emphasis on breast management and improvement. The change in fashion trends resulted in different types emerging to suit different fashion needs of women. Cleavage enhancers are types of bras which have a plunging neckline which is important for maximum cleavage. The pads add an additional lift and the bra fully characterize bust hence ideal for low necklines. There are other fashionable bras referred to as Convertible/strapless which go up to five ways on a strapless bra often having molded padded cups that offer support and shape to the breast. They have seam free cups that are not visible under clothes. Bras do not only serve as fashion apparatus but they also play a big role in sports. Sport bras are perfectly constructed to provide a maximum support, compresses the breast and hence minimizing bouncing by the breasts. The material fabric is important in drawing moisture away from the body hence keeping the body comfortable. Silicone bra is a type of bra comes in different sizes from cup size A, B C; D. It does not have any strap. It is flexible and sticks tightly in conformity with the woman’s bust as it has self adhesive coating. It is made from high quality silicon gel. It is easy to wash, it has no strap and occurs in a range of colors and so the user has a wide choice of the colors she desires. This bra can be reused many times after laundering. Push ups and inflatable brassieres is a type of bra introduced in mid 1990s and added major sex appeal to the USA market. It was pioneered in 1960s by Fredricks of Hollywood . The look was classic pieces of soft cup inflated into a cone-shaped point. During this period, Singer and Dancer Madonna played a big role in making this bra to be famous. This bra has undergone much innovation such as volume adjustment systems, pairing of the sleek looking bra with air extricable padding. The bra has a molded cup and wireless lifts. It has a weightless padding which gives the cleavage a slight projection. It has barely three Bralettes. It is found in soft cup, Camisole like sheers as well as lacy under wire creations which exhibit double cleavage of their full cup counterparts. (Steele, 2001) Sex openness among the current time women In 1950s to 1980s feminists played great role in trying to liberate women from oppression by men. They tried as much as they could in transforming the working and business environment to suit women and this resulted in many of them getting jobs and becoming more liberal especially in their sexual lives. In the past, feminists opposed beauty apparatus which they considered as being tools which reduced women as sex objects. This did not get support from all the women as beauty was still valued b women and so they continued using beauty apparatus and fashion determined what they wore. Currently the society has changed greatly and as a result of empowerment, women have become more liberal and hence more open to sixths is depicted by the clothing they put on which more is revealing than in the past years. Also increase in innovation by fashion industries has played a major role as these companies strive hard to market products which are said to make women look sexy. Improved technology especially in the entertainment sector has contributed a lot to women becoming more sexual open as they mostly emulate the lifestyles of the entertainment stars. (Kunzle, 2004) Conclusion Innovation has played a major role in shaping the fashion in different time span. Bra comes out clearly as a major fashion tool and from its evolution, it can be concluded that it has played a central role in women fashion and enhancing beauty among the women. Women have considered fashion as an important aspect in their life and this is evident in the different variety of beauty apparatus they have been having since time immemorial. In the contemporary times, women open sexuality show that women are liberalized and hence free to select any type of lifestyle and clothing to put on. Reference List: Elizabeth, E. , (1976). â€Å"Underwear: A History. † New York, NY: Theatre Arts Books Kunzle, D. , (2004). â€Å"Fashion and Fetishism:† Thrupp, UK: Sutton Publishing Limited Stephanie, P. , (2004) â€Å"Bra: a thousand years of style,† Newton Abbot: David & Charles Valerie, S. , (2001). â€Å"The Corset: A Cultural History. † New Haven, CT: Yale University Press. Workman, N. , (1996). â€Å"From Victorian to Victoria’s Secret: The Foundations of Modern Erotic Wear. † Journal of Popular Culture. 30. 2, 61-73

Tuesday, July 30, 2019

Domains Of Culture Essay

1. When you think about the origins of Religion and Spirituality in American culture, a lot of different ideas, stories or parables come to mind. But one question is hardly ever asked or even thought of. Does American culture have a religion? More to the point, is there a religion that can solely be sourced to origins on American soil? The answer is yes. Both Mormonism and Scientology have roots deeply planted in American culture. However, around 25,000 Americans practice Scientology and an estimated 6.1 Million Americans practice Mormonism. That makes up 1.8% of Americans, in addition to that most Americans don’t recognize Scientology as a real religion and Mormonism falls under the Christianity branch of belief. So what ideas are truly native the country. I believe you must add Native American Spirituality to this argument as a source of religion truly sourced and founded in America as it is still practiced by a vast majority of living Native Americans. But in order to get t o that we must first talk about the origins of Christianity as it stands with Americans today. 2. As it is true that Christianity is the most prevalent religion in America, It is also true that Christianity was brought to this soil with the first settlers. In England you had two choices for worship, The Roman Catholic Church and The Church of England. Both Christian churches, and theses settlers knew nothing but that so it comes to no surprise that those are the two major influences on American religion and spirituality. It should also be noted that those settlers wanted to distance themselves from England’s brand of religion so badly that the First Amendment of the Constitution explicitly lays out the separation of Church and State1. Christianity then splintered off into the various denominations that we have today, yet all of those styles still have the same foundation that can be traced back to Rome or England. Native Americans on the other hand don’t have those same beliefs. While Christianity focuses on a One true Higher Power, Native Americans look more to selection of Spiritual figures known as Deities. 3. Native American culture focuses more on the Earth, Weather, Sky and Sprits who manifest physical form as Deities. Depending on the culture these beings can be attributed to almost everything that is possible or could be possible. In most Native American Cultures there is  always one deity that creates man but, they are not always benevolent. The Abenaki and the Algonquian tribes believe that life was created out wood, stone and other earthly elements by Tabaldak so that the earth could be full. If you follow the Navajo the Earth itself was created by AsdzÄ…Ì Ã„…Ì  Nà ¡dleehà ©, she was also responsible for the stars and sky2. So who is right and who is wrong? No one can say. Most of these deities are created in myths and stories passed down from generation to generation. But the message is the same across the tribes, Give thanks for what we have for it is not always promised. Now that we have an idea as how Native American Culture sees religion, let’s see if matches up with how American Culture sees it. 4. In Conclusion, we have seen how the most prevalent form of spirituality in American in not was actually brought in from England. That religion lays out the idea of a Supreme God who commands from Heaven and is omnipotent. While the Native American Culture has its religious and spiritual roots found on American soil. They champion multiple deities who are responsible everything from creation to the basic things like food and water. The one thing they both have in common is you are expected to be a good wholesome person or you will be judged for you actions. In the afterlife for the Christians or when you just so happen to come across whatever deity you have offended with the Native American Culture. So no matter what you happen to believe in remember to be a good person and be ready to be responsible for your actions. 1 United States History website, http://www.u-s-history.com/pages/h3787.html 2 Wheelwright, Mary C. (2008) [1942]. Navajo Creation Myth: The Story of the Emergence. Forgotten Books. p.17

Mcarthur Vitamin D Milk Essay

A. 1. McArthur Farm Grove is located in the Port Saint Lucie, South Florida where the climate is tropical with regular rainfall, this causes the usual soil composition consisting of rock, sand and mud. Shapeflies terrain has been created in South Florida, helping farming situations. 2. McArthur farms consist of 8,500 cows, owned by a large corporate farm with a labor force of typical farm employees. 3. McArthur cows are fed waste milk, that contains little mastitis. In this case all bacteria needs to be killed so the cows will consume good milk. B. 1. McArthur Milk was first produced in 1929 by Neville McArthur who created his own dairy with the produce of his own 20 cows. Over time, from Vero Beach to the Florida Keys, Neville McArthur gained the trust and loyalty of many families. 2. McArthur Milk is very important to our region’s economy , being the leading brand of diary products in South Florida. Though McArthur milk plays a vital role in our economy, it is 3.Market for McArthur is not only in the United States but the Caribbean Islands and Central America. McArthur brand milk supplies to many major business such as Abaco Market, Publix, and Rams Supercenter just to name a few. C. 1. Tanker trucks are loaded with McArthur Milk to transport the milk while keeping it cool. Temperatures of the milk can not rise beyond 44 degrees F when checked or else the entire load of which the milk is in will be trashed. Trucks which transept the milk also have to be cleaned every 72 hours. A characteristic of pasteurizing the milk is use of the Calf Milk Pasteurizer, a device which brings the milk to a temperature of 162 degrees F then cools it. 2. The largest market for McArthur Milk is in South Florida. D. 1. The type of images expressed from McAuthor milk are ones that is perfect for everyone. For example an Advertisement for McArthur milk produced one year ago by Grant Baird focuses on children who act as if they are grown-ups and no matter what their family size is the McAuthor milk is perfect. The language expressed is PG, so everyone can relate with this criteria. 2. The characteristics of the targeted market are families as well as single individuals, both young and old. Children are persuaded by the flavors marketed while adults and senior citizens are targeted with the family advertisement expressed. 3. An element of the packing that coveys a sense of the market for the product is the Vitamin D label placed on the packaging of the sleeve label. This brings in consumers for the benefits of nutrition in the milk.

Monday, July 29, 2019

Dispute Settlement Understanding Essay Example | Topics and Well Written Essays - 3500 words

Dispute Settlement Understanding - Essay Example The members of the WTO are aware of the clear and well established legal procedures available for smooth trading and enforce the relevant rules to settle disputes among themselves. These rules are contained in the understanding on Rules and Procedures Governing the Settlement of Disputes (through Dispute Settlement Understanding or DSU)2 . The strict legal and policy framework of the DSU helps in promoting adherence to rules which are negotiated by WTO Members and since the rule of law rather than the rule of power is applicable and important, the DSU rules are beneficial for small and medium sized countries engage in worldwide trade so that there is very little scope for unilateral trade actions by large countries3. There are automatic establishments of panels to review complaints and disputes by WTO members and specific timelines are also established throughout the process so that all disputes are resolved quickly and efficiently. If the disputes are addressed in favour of a particular member, there are also provisions for a right to appeal against panel decision to a permanent Appellate Body on issues of law and automatic adoption of panel reports4. The WTO Members are encouraged to resolve disputes through consultations and for most disputes, reaching to the state of panel decision may also not be necessary5. If panel decisions are taken, the panel report and the Appellate Body report are adopted by WTO members and at a meeting of the Dispute Settlement Body, it becomes a WTO ruling. The members who are found to violate obligations are given a period of time to comply with the ruling in whatever manner possible. The member is given a time period within which it has to comply with the ruling. If the member fails to comply with the ruling, within the prescribed time limits, then it has to offer compensation to the complaining member during the time of pending compliance with the ruling. When there is disagreement on compensation, then the complaining member may be authorised to retaliate and take action until the other member has actually complied with the ruling. A rule based system seems to provide for a framework that helps to manage international trade relations and the trade disputes. The best method of resolving trade disputes have been considered as consultations and negotiations and when the consultations fail, then the dispute settlement provisions are utilised and panel decision may be sought.6 When even panel decisions fail, appeals are made to the Appellate Body and the legal provisions are identified and implemented. The DSU facilitates smoother trade transactions and exports between countries and also helps individual member countries to defend measures which may be challenged by the other trading partners7. In this assignment we will discuss the effects of Article 4, 6 and 23 of the

Sunday, July 28, 2019

Romantic Relationships Research Paper Example | Topics and Well Written Essays - 500 words

Romantic Relationships - Research Paper Example Researchers have identified mainly three kinds of romantic relationships. According to Sternberg (as cited in Santrock, 389), passion, intimacy, and commitment are the different traits found in romantic relationships. To illustrate, partners with passion is driven by physical and sexual attraction; whereas, intimacy indicates emotional feelings and attachment. Finally, commitment is rather ‘cognitive appraisal of relationship’ that makes the relation strong despite all difficulties (Santrock, 389). Therefore, depending on the intensity of these three factors, the collapse of a relationship can be either tragic or mild in effect. To begin with, a relationship will be effective or not effective depending on how the individuals involved think and act. If they maintain entirely different perspectives and romantic mood, the relationship will definitely fail regardless of their gender. The fundamental reasons for the same sex drive are still a subject for research. The way in which people carry on with their sexual relationship is markedly different in different cultures and communities. Even though the basic necessities are the same, the difference in lifestyle can be attributed to the choices.

Saturday, July 27, 2019

Final term paper Example | Topics and Well Written Essays - 4000 words

Final - Term Paper Example hosen from the provided context is the ‘Part 112 - Nondiscrimination in Federally Assisted Programs of SBA-Effectuation of Title VI of the Civil Rights Act Of 1964’. This law forms a part of the ‘Civil Rights Act of 1964’ and ensures that none of the individuals employed under any sort of ‘federal financial assistance processes’ within ‘small business process’ are subjected to discrimination based upon race, colour, sex or place of origin (GPOs Federal Digital System, n.d.). As a result, the discussion will majorly focus on evaluating every specific aspects of this chosen law along with the techniques through which the business entities within the domestic markets of the US can utilize this law as a form of competitive advantage. In addition, the discussion will encompass the illustration of suitable case examples where evidence regarding implementation of this law has been found. The ‘Part 112 - Nondiscrimination in Federally Assisted Programs of SBA-Effectuation of Title VI of the Civil Rights Act of 1964’ forms a part of the ‘Civil Rights Act Of 1964’. The law entitles the equalized distribution of federal or state governance funding or loan provision to all sorts of small scale or self-proprietorship business initiatives by taking consideration of the necessary financial and business related aspects such as applicants as well as recipients of a loan. Specific preference is provided to such business entities that projects involvement in terms of serving the society and surrounding communities. The specific discrimination prohibition aspects that are supported by this law have been provided as under in a summarized manner. The Act encompasses every possible dimension of business processes that are entitled to provide equal employment opportunities to the business participants without projecting any sort of discrimination associated with racial or gender parity (LegalZone, 2013). However, the ‘Part 112 - Nondiscrimination in Federally

Friday, July 26, 2019

Workshop Critique Essay Example | Topics and Well Written Essays - 2000 words

Workshop Critique - Essay Example The design chosen by this specific group put into effect KOLB's theory of experimental learning (Kolb 1976). This was against the other models for a variety of reasons. The Johari Window is specific to every individual because of its division into what the person knows about them, what others know about the individual that is known and unknown to them and what is unknown about the individual to both himself and the group (Luft & Ingham). Thus all the Johari Window does is represent information about the individual in relation to his team or group. The ladder of inference concentrates on the understanding that prevents an individual from reaching the wrong conclusions (Senge 1994). Thus, in other words it assists an individual to consider the facts and reality before making any decision. The ladder plays on the individual's belief that his ideas and data might not be the correct or rational proof that the team seeks. This idea was too specific to convincing and teaching the truth so it was foregone as the chosen concept Tuckman's theory is considered one of the most successful team concepts ever created. The concept revolves around concentrating on the team's history: from its creation to the fulfillment of the task, the theory concentrates and succeeds in understanding the entirety of achieving any given task (Tuckman 1965). Tuckman also feels the need of adding a phase known as: adjourning and transforming that applies only after the team has finished their project. Thus, the concept talks of five phases: creating a team, brain-storming ideas, creating rules and values that must be followed, carrying out the practice and learning from experience. Our team chose to follow Kolb's concept. For this concept to come into affect in its entirety it was necessary to run it against a certain sort of experimentation. Kolb's model works on the idea of a four-stage learning cycle: concrete experience, reflective observation, abstract conceptualization and active experimentation. Thus every individual in the team succumbs to four different emotions: feeling, watching, thinking and doing (Chapman 2003). Our team merged the Kolb model with certain aspects of the Tuckman model to create an activity and environment that would suit the needs to show the workings and intricacies of team-work. By choosing to play a short game, Tuckman's theory of short projects to be the best indicator came into play. Not only was the activity chosen, short but it also allowed the facilitator to observe the behavior of the team over a measurable timeframe, allowing the judgments that were created to be functional and precise. Also, the activity which took placed allowed every member of the team to engage in each aspect of Kolb's model. Not only was each team member expected to be an active participant but they were also engaged into following the rules of emotionally involving themselves into the task, participating in it, improving by watching the fellow members and eventually doing the best job they thought possible (Kolb & Fry). Outcomes and

Thursday, July 25, 2019

Db1 employee compensation and benefit Research Paper

Db1 employee compensation and benefit - Research Paper Example This was after concerns by labour groups and associations on the poor payments, working conditions, lack of adequate overtime payments and misuse of child labour. In addition, in 1994 the school to work opportunities act was introduced to the Fair Labour Standards Act. This act had more impact on those businesses that provided on the job training. The main rationale for this act was to provide on the site training and internship based on an agreement between the employer and the student. If any exemption was to be made from the Fair Labour Standards Act, the guidelines had to be followed. This guideline was to ensure the individual role was clearly defined as an intern and not an employee, hence was not entitled to the benefits that would have been in place if he or she was a permanent employee of the company or organization. The only expenses the employer incurred in this case were only those associated with the training. Moreover, the individual was not guaranteed a position after completion of the training. Through this, both parties benefited in that the student got the training and the employer benefited from work the student produced. The 1994 amendment also had in place guidelines whereby owners of small businesses whose annual revenue was below $500,000 were exempted from the FLSA, but did not for those who used interstate business calls or postal mails (Willis, 1997) In addition, it also stipulated that those employers covered by the act must pay a minimum wage rate of $4.25 per hour for the first 90 days of employment and the current wage thereafter to all the youth workers under the age of 20 years. The implication of the act was that every employer must meet all the criteria for exemption from the act guidelines without which he or she should comply with the acts working hour and wage guidelines (William,

Wednesday, July 24, 2019

Exploring Fashion, Fit And Affordability Report Analysing Essay

Exploring Fashion, Fit And Affordability Report Analysing - Essay Example The paper "Exploring Fashion, Fit And Affordability Report Analysing" analyzes the fashion availability, fit and affordability in the UK stores. The objective of the research has not been presented clearly and distinctly. If the researchers have a clear perception of the objective and the purpose of the research, it helps to develop the research methods more accurately. It also allows the reader to understand the purpose of the study better. Presenting the purposes as above would make it easier for the researchers to analyse their research and findings more effectively, and achieve what they intended to find. It also makes it easier for the reader to judge whether the findings corroborate with the purpose. Moreover it is easier to refer back to the purpose. The study applied a mix of the quantitative and qualitative research methodology, as one of the prime objectives was to examine the satisfaction/dissatisfaction with the retail experience. This would be difficult in a purely quant itative approach. Quantitative approach is equally essential for this study because it enables distance between the observer and the observed. Moreover, quantitative research is descriptive and such a study requires description. A qualitative approach, on the other hand, allows the researcher to get an â€Å"insider perspective on social action† (Knox, 2004). In the quantitative method the focus is on numbers while the qualitative method has the potential to reveal complexity. Pure quantitative research.

Marketing Planning Essay Example | Topics and Well Written Essays - 5000 words

Marketing Planning - Essay Example HSBC has a network of 6,600 offices in all these regions. It is a public limited company headquartered in England (HSBC, 2013a). This bank was originally established with the aim of facilitating trade between two most important trade partners in the world during the mid 19th century; China and the countries in Europe. The Chinese economy had been progressing for all these 150 years, due to which, since the 19th century the bank has occupied a good position to reap real benefits from the rapid GDP growth of the Chinese economy. However, the financial break down that occurred in the last decade, increased regulatory activities and led to higher scrutiny of the financial transactions taking place all over the world. In 2012, the HSBC bank faced strong regulation by the international organizations. Public scrutiny can potentially cost the bank many billion dollars. This paper presents a marketing plan for the bank framed according to the SOSTAC structure. Organizational structure Organiz ational structure refers to the relationships that are established in any firm. It refers to the hierarchical structure within the organization. Hierarchy is created with the organization by way of the rules set down for the functionalities and responsibilities at different levels of the organization and also the way in which the relationships are maintained among the employees at different levels. ... This structure describes the level of communication among the employees working at the same level within the organization (Vos and Schoemaker, 2005). High level of transparency in communication among the employees creates a number of benefits; easier flow of communication among employees, minimal bureaucracy and most importantly a pleasant working atmosphere. Increased transparency allows the employees to work with a relaxed mood. Furthermore, HSBC promotes a very informal work culture within the company. This culture allows employees to solve any kind of discrepancy to be solved informally. It also motivates employees and reduces job related stress. In turn it helps the organization to improve overall employee performance. Mission, vision and values HSBC bank has the vision of becoming â€Å"the leading international Bank† (HSBC, 2013b) in the world. The organization has certain missions that it follows in order to achieve their vision. The mission of the bank is to set up a network among all its customers by offering them top ranked service. The bank is growth oriented and all activities of the bank follow the growth objective of the organization. Precisely, the mission of the bank is â€Å"connecting customers to opportunities† (HSBC, 2013b). The bank wants to play a fulfilling role in helping people realize their dreams and achieve their ambition. By successfully following this mission the organization can enable its clients to make more profitable business. It helps economies to thrive and make prosperous economic activities. This is the purpose with which the bank operates. Organizational values The company holds high value regarding its own principles and also about the values of the clients that engage in business

Tuesday, July 23, 2019

Experience with Market Place Live Term Paper Example | Topics and Well Written Essays - 1250 words

Experience with Market Place Live - Term Paper Example Advertising- The Company had a small advertising budget because it wanted to keep its costs low. Having a low advertising budget led to the rejection of the company’s adverts by the International advertising federation. Had the advertising succeeded, the company would have sold more and even increased its market share from the current 38 percent. Sales team- The selected sales team was too small as compared to the demanding market in which the company operates. If the company had a stronger sales team, it could have sold more units and would have sold all the units as compared to the current situation where it had inventory left. The company should, therefore, focus on building a strong sales team both for the web and the sales office. Un-fulfilled demand- Dues to the small size of the company’s sales team; a situation which left the company with inventory totaling 400 as shown below. The figures above show that the demand per salesperson for Space-Age Technology was mu ch higher as compared to other of its competitors. The sales team had to work three times harder than those of other companies. Cutting costs- The Company decided to cut costs by redesigning its brand of computers and invest more in areas that were thought would help the company grow. The company missed the opportunity to make money and increase its market share by using the competitors brand data in making its redesign decision. The redesign decisions that affected Space Age Technology are shown below.

Monday, July 22, 2019

Campus Recreation Essay Example for Free

Campus Recreation Essay Sheer volume of participants and diversity of facilities make this an exciting area Def – a program that provides facilities and activities to those that go to school or work at a high school, college or university Intended to promote wellness and develop life long skills Can serve the local community through special memberships or facility rentals Campus recreation gains thousands of new participants every year loses thousands as well Participation can have a significant impact on the campus environment Approx 75% of students participate in campus rec High campus participation can be related to higher GPA Facilities are used to recruit student athletes and potential faculty/staff Individual involvement in has been reported to produce 3 benefits: improved emotional well-being, reduced stress improved happiness Correctional Recreation. Role that recreation plays in correctional facilities varies but there are some standard approaches that have been used throughout North America: Access to appropriate forms of recreation should not be denied Goal of incarceration is to prepare offenders for release and since recreation is part of a normal balanced lifestyle, it must be incorporated into correctional facilities Correctional facilities have a responsibility to â€Å"work† the whole person, which involves the mental, social, physical and spiritual needs of prisoners 1. Develop acceptable outlets for stress – inmates learn to identify and practice acceptable way to relieve stress 2. Identify activities that serve as alternates to addictions – replace time previously devoted to drug use with rec activities 3. Foster interpersonal skills – learn cooperation and team work through rec programs 4. Develop a new sense of purpose – help to guide thinking and future behaviour 5. Enhanced self-esteem – positive rec activities will improve this 6. Foster new interests – provides an outlet to new experiences 7. Awareness of personal needs – recreation can provide appropriate ways to satisfy specific needs 8. Develop decision-making/problem solving skills – recreation allows participants to experience and process the impact of their decisions 9. Develop a possible career – creative skills can be identified and channelled (e. g. music, writing) Worksite Recreation s the offering of recreational activities through the workplace Programs are offered before work, at lunch or after work. Employers have learned that the investments they make in employee health/wellness have a positive benefit financially Benefits employer in recruitment and retention of employees Reduced health care claims Reduced absenteeism Enhanced business image within community Armed Forces Recreation Military recreation programs are founded on 7 principles: 1. Provide inclusive, creative diversified recreation 2. Address physical, emotional social interests 3. Making optimal use of their resources 4. Leadership development 5. Create opportunities for individual and group growth 6. Nurture partnerships with other rec organizations 7. Ensure that rec services are governed in accordance with Canadian military financial management policies Defining Culture Consists of 3 attributes: religion, language social/arts activities Culture influences what we do and how we do it Culture helps to understand our behaviours, attitudes and mindsets Multiculturalism Act (July 1988) – Commits the Gov.. of Canada to assist communities and institutions in bringing about equal access and participation for all Canadians in the economic, social, cultural political life of the nation 1. Ethnicity Theory – Differences in leisure choices is due to ethnicity, cultural values preferences 2. Sociodemographic Theory – Differences in ethnic group participation are actually due to differences in age, education income 3. Opportunity-choice Theory – Considers leisure participation to be influenced by both ethnicity sociodemographic factors Aboriginal People Recreation can be used as a means to alleviate social problems Within the Aboriginal community recreation is recognized as a way to combat: Youth criminal involvement. Teen pregnancy Alcohol abuse Family violence Unemployment It fills the free time of the youth Expenses Structural Expenses – expenses associated with maintaining or improving the physical structure of the facility/site Gross Income – the total amount of money generated over a specified amount of time Net Income – the remaining funds after all expenses have been paid (profit) Fees/Charges Rentals Donations Sponsorships Budgeting – Four types of operating budgets: Line-item Budget Object Classification Budget Program Budget. Performance Budget Recreation Facility Management Management an art that coordinates the efforts of people to accomplish goals and objectives using available resources efficiently and effectively Recreation Facility Management is an interdisciplinary field devoted to the coordination of space, infrastructure, people and organization, often associated with the administration of office blocks, arenas, schools, convention centers, shopping complexes, hospitals hotels employees, money, equipment and facilities marketing Def. – the effort to reach and audience to deliver them a product/service Marketing can be divided into the 4 P’s: Product, Promotion, Price Place Special Recreation Special Recreation – a recreational service that takes place in a public community setting to provide enjoyment and to challenge and enrich people with disabilities Special Olympics ;Provides sports opportunities to people with intellectual disabilities More then 3 million participants worldwide Includes more then 25 sports (swimming, track field) Paralympics. Largest sporting event in the world for people with physical disabilities 21 sports 6 categories – visual impairments, intellectual disabilities, amputation, spinal-cord injuries, cerebral palsy â€Å"les autres† First Paralympics held in 1960 in Rome Offers disabled war veterans an area of sport to develop after injuries Outward Bound Developed in Wales in 1941 Believes young men women must face increasingly complex situation in which self-esteem confidence are at a premium Prepares people to face difficult natural environments. Programs for special needs youth developed in 1970’s focusing on strengthening mental aspect and self-confidence VSA Arts International non-profit dedicated to creating a society in which people with disabilities can learn through, participate in enjoy the arts Offer innovative programs on local, national international levels (e. g. Training institutes, arts camps award programs Therapeutic Recreation Purposeful selection of recreation activities to reach a goal 2. Enhancement of independent functioning through recreation participation 3. Quality of life, wellness, optimal health as core concerns 4. Focus on the individual in the context of their own environment TR Process Assessment . Planning Implementation . Evaluation Recreation Sport Management Participation in rec sports surpasses that of all other rec activities In 2009 77% of Canadians 6 yrs and older participated in some form of sport or fitness activity Once considered only a diversion from work, sport has become a multi-billion dollar industry Much of a fan or participants time and money is devoted to their sport or team. Def – the administration and management of a large number and variety of sport, fitness, and recreation programs Focuses mainly on the business 5 basic programming areas: Instructional sports – teach skills, rules and strategies in a non academic environment Informal sports – self-directed participation focused on fun and fitness Intramural sport – structured sports (leagues/tournaments) conducted in a particular setting Extramural sports structured sports between winners of intramural programs Club sports – groups of participants that organize because of a common interest Trends. Funding Legal Aspects Sport Facilities Technology Sport Facilities Technology Health – a state of complete physical, mental and social well-being and not merely the absence of disease Wellness Def The condition of good physical and mental health, especially when maintained by proper diet, exercise, and habits Genetics Race or ethnicity Access to health care 4. Environment 6 wellness dimensions: Physical Wellness Intellectual Wellness Emotional Wellness Social Wellness Environmental Wellness Spiritual Wellness.

Sunday, July 21, 2019

Violence Through The Eyes Of Hannah Arendt Philosophy Essay

Violence Through The Eyes Of Hannah Arendt Philosophy Essay In this essay I will try to the best of my understanding to evaluate and critically analyse subject of violence through the eyes of Hannah Arendt. The title of the book is called On Violence and has been written by Hannah Ardent and published in 1969. In this book Hannah Ardent tries explaining the subject of violence in a historical context and questions the nature of its use. She also re-examines the relationships between politics, war, violence and power and uses other theorists to differentiate her point. My purpose in writing this, is to critically analyse chapter 2 from this book in order to understand how successful the authors argument is and how effective are the example she use to prove her argument. I will then finally identify any examples that disprove of the authors argument and provide my own understanding of political concepts. How successful is the authors argument? The historical background of the essay was depressing and chaotic in all domains: in the international arena it was the clash between West and East, North and South, in internal politics, and even on the level of personal life, this is when she has lost her husband. What makes her essay so outstanding and even classical, in the sense of both timeless and timely, is her vigorous defence of politics against its simplistic and increasingly prevalent equation with violence. Without supporting a radical form of pacifism, Arendts text sought to justify the integrity of politics, construed as concerted action or shared exercise of public power, in the face of a growing fascination with violence and the progressive colonization of public life by violent strategies and ideologies. Hannah Arendt in chapter two tries to define what she sees as the key concepts that must be understood for the construction of any theory of violence.  Ã‚  Concepts such as power, authority, force, legitimacy and explains and defines power, violence, authority, force, strength and clarifies their relationships with one another. The author evaluates these concepts and provides examples to enhance understanding of the subject to illustrate her point. Her approach will be understood by most social scientists, that you cannot describe reality correctly if your linguists are faulty.  Ã‚   She says that it is A rather sad reflection on the present state of political science that our terminology does not distinguish among such key concepts. Arendt identifies and acknowledges the enormous role violence has always played in human affairs.  Ã‚   According to Arendts argument there is a great shortage of real critical analysis on the role and function of violence in human society no one engaged in thought about history and politics can remain unaware of the enormous role violence has played in human affairs, and it is at first glance rather surprising that violence has been singled our so seldom for special consideration She attempts to identify the connections if any between these theories of violence and what she calls the suicidal development of modern weapons that have become central to the arsenals of violence produced by governments in the post war world. As Arendt sets her analysis of violence within the tradition of the enlightenment the means-ends and cause-effect debate pose one of the central paradoxes for her. All the authorities that she quotes have strong opinions on the question of violence and its role and function in society.  Ã‚   Arendt argues that there is a general consensus that Violence is nothing more than the most flagrant manifestation of power.  Ã‚   She quotes Max Webers definition of the state as the Rule of men over men based on legitimate that is allegedly legitimate violence. Arendt does not agree with such a consensus because she says that to accept such a consensus you would have to Equate political power with the organization of violence and this only makes sense if you follow Marxs estimate of the state as an instrument of oppression in the hands of the ruling classes. She believes that no government exclusively based on the means of violence has ever existed or ever existed for more than a very short period.   The crucial reason for this according to Arendt is that in the Power Violence relationship there is a fundamental ascendancy of power over violence.  Ã‚   Governments in order to exist need power but they do not necessarily need violence.   She believes that power needs no justification but its needs legitimacy.  Ã‚  Ã‚   While violence can destroy power it can not create power.   Arendt believes that Power and Violence are opposites and where one rules absolutely the other is absent.  Ã‚   Rule by violence comes into play only when power is being lost.  Ã‚  Ã‚   A short definition that Arendt refers too is that power equals institutionalized force and that violence is a manifestation of power. phenomenologicallyà ¢Ã¢â€š ¬Ã‚ ¦ is close to strength, since the implements of violence, like all other tools, are designed and used for the purpose of multiplying natural strength until, in the last stage of their development, they can substitute for it This analyzes the implications for modern governments modern peoples on the significance of civil obedience and consent we have to decide whether and in what sense power can be distinguished from force to ascertain how the fact of using force according to law changes the quality of law itself and presents us with an entirely different picture of human relations How effective are the examples they use to prove their argument? Hannah Arendt argue that it is insufficient to say power and violence are not the same and believes that they are opposites Power and violence are opposites and not the same as where the one rules the upmost and the other is absent. The author uses Alexander Passerin dEntreves opinion in order to prove her point. Passerin visualises violence as the most fragrant manifestation of power. This is what the author of the book The Notion of the state illustrates, we have to decide whether and in what sense power can be distinguished from force to ascertain how the fact of using force according to law changes the quality of law itself and presents us with an entirely different picture of human relations What counter-examples can you identify that disprove the authors argument? (you must properly reference your sources. Atleast two alternative sources must be identified. Foucault truth and power From completing this task what have you learnt about the particular political concept? It is clearly seen that Ardent believes that to exercise power people need to gather together and act in a group. As she says: Power  corresponds to the human ability not just to act but to act in concert. Power is never the property of an individual; it belongs to a group and remains in existence only so long as the group keeps together.   Ardent believes that power does not belong to single man but it springs up whenever people act in concert. Her concept of a power as a property of a group sounds interesting but is not practical. . Violence, she writes, can always destroy power. Out of the barrel of a gun grows the most effective command, resulting in the most instant and perfect obedience. What never can grow out of it [violence] is power. [For example, violence and threat of violence by the emperors Caligula and Nero did not enhance their power. It diminished their power.] Arendt writes that In a head-on clash between violence and power, the outcome is hardly in doubt   as in a military against collective non-violent resistance (power). But, she adds, Nowhere is the self-defeating factor in the victory of violence over power more evident than in the use of terror to maintain domination, about whose weird successes and eventual failures we know perhaps more than any generation before us. Violence, she sums up, can destroy power; it is utterly incapable of creating it. Writing at the end of the 1960s, Arendt was critical of the advocacy of violence by blacks critical of Martin Luther Kings non-violent movement, and she took issue with the advocacy of

Secure Corporate Network Infrastructure Development

Secure Corporate Network Infrastructure Development Pop Quiz! VPN stands for†¦ A.1 VPN stands for Virtual Private Network or Virtual Private Networking. A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only virtually private, however, because this data actually travels over shared public networks instead of fully dedicated private connections. Introduction I have a strong point of view that MCC has been fostering is dear students from all computing courses since its establishment. With the intention of uplifting the education standard in Computer Technology, MCC has collaborated with NCC of Greenwich College in London to set up the Joint Program of International Diploma in Computer Studies (IDCS). I have given my best effort and attention and I also obtained priceless knowledge and experience in developing and implementing the cost-effective VPN extranet infrastructure for National Bank for Rural Development. Overview The construction of the Rural National Development Bank brought great prosperity to an area where previously had tremendous hardship in making monetary transaction. Being in a rural area like this, we cant have hefty load of budgets invest in for the normal operation of the bank. The bank has currently been using Microsoft Windows operating system as client machines and also the network is window-based. The bank wants to create a corporate network infrastructure to connect their agents and branches securely. The bank preferred to use NOS for Ubuntu Linux for they will reduce the overall cost dramatically when compared to Microsoft Server Version. All of these multi-functioned organisations and personnel need to have a medium to communicate for the smooth flow of their work. As the new networking advisor for this project, I have thought out the plan to implement such medium on less costly basis. The aim of this project is to investigate the currently favourable means for building a secure corporate network infrastructure that consists of servers, extranet, preferred form of internet connection and clients. This report will contain recommended methods and a sample of a network security design with a clearly labeled diagram. Also, the source and references of information and excerpts in this report will be acknowledged and can be found at the end of this documentation. Prototype for the Extranet VPN for NBRD There are altogether 500 computers and 100 peripheral devices in the main office bank. There are tens of departments and hundreds of staff ranging from front-office to auditor. VPN actually is a private network for delivering of important data and facts within the organisation via the secure use of the public network like Internet or Wide Area Network. The internet source is coming from ISP which provides high-speed Asynchronous Digital Subscriber Line. The main office is a very sophisticated infrastructure and the daily normal operation of the bank is very much dependant on four servers-VPN Server which is a must in all VPN configured network, Print Server, File Server and Database Server. The computers and peripheral devices are connected from the four servers via multi-purpose switch (to regenerate signals). The outlet of the main office building has router in place for connecting separate logical networks to form an internetwork. And then comes the Gateway to convert Microsoft Ma il to Simple Mail Transport Protocol (SMTP) for transmission over the Internet. Although routers work at the Network layer and can route packets of the same protocol (such as TCP/IP) over networks with dissimilar architectures (such as Ethernet to token ring), gateways can route packets over networks with different protocols. And then comes a firewall. A firewall is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules. The data then travels on the VPN tunnel by using IPSec Protocol. It is the most popular method for encrypting data as it travels through network media. IPSec works by establishing an association between two communicating devices. An association is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates. Suburban branch has 300 computers and 50 peripheral devices and has varieties of de partments and large numbers of staff for its daily normal operation and performs the same task mentioned above. National Bank for Rural Development has 50 computers and 5 peripheral devices. It also has departments and staffs but it depends on VPN server for its normal operation. Business partners and agents are connected to the VPN via remote access. Brief biography of Ubuntu is an open source (can change the source computer code at your desire) operating system version is upgraded every six months desktop, server and ultimate editions are available Can be used wih wide ranges of computers and hardwares:-(Intel x86 (IBM-compatible PC), AMD64 (Hammer) and PowerPC (Apple iBook and Powerbook, G4 and G5) architectures) Supported by Canonical Ltd. is GNU/Linux (comprises of many programs and most essential one is ‘kernel which is linux in (GNU/Linux) and it combines with other GNU programs to boot up the system) and if an error occurs and the Kernel becomes corrupted, a different copy can then be used instead. debian-based Linux is the system descended from Unix GNU/Linux was put into existence by Free Software Foundation in 1984 is free-of-charge and totally aimed at programmers and developers The first Linux kernel was invented by Finland-national Computer Science student ‘Linus Torvalds Because of its alluring advantages such as being free of charge, compatible with many software programs, not easily hanged or freezed, multi-tasking, and more safer than other OS make Linux more popular among business partners and individual person hide the user from browsing the registry keys that have important information more effective in hindering the spread of viruses and executing of malicious programs and threats Ubuntu can be downloaded from this site: http://www.ubuntu.com/getubuntu is compatible with ‘Intel and AMD and the compatibility with hardware parts can be checked in this site: http://www.tldp.org/HOWTO/Hardware-HOWTO/ http://www.linux-laptop.net/ (For laptops) The minimum requirements for Ubuntu 700 MHz x86 processor 384 MB of system memory (RAM) 8 GB of disk space Graphics card capable of 1024768 resolution Sound card A network or Internet connection CD/DVD Drive For visual effects and graphic 1.2 GHz x86 processor 512 MB of system memory (RAM) Supported graphics card Note: the above descriptions are only minimum requirements and better processor and system memory will certainly enhance the performance of Ubuntu. For downloading software for disk partition by using disk management of windows: http://www.partition-tool.com/personal.htm Task 1- 50 Marks Your Bank currently has network client machines based on the Microsoft Windows Operating System. The Bank decides to evaluate the benefits of the open source Linux operating system, preferably the latest Ubuntu Linux distribution version 9.10 server edition (freely downloadable from http://www.ubuntu.com) Evaluate the benefit of Linux operating system as Interoperable and alternative NOS for the company in the form of a feasibility report to include the following: 1.1) The comparative Networking features of Windows and Linux. (10 Marks) Comparative Networking Features of Windows and Linux Windows Operating System Internet Connection Firewall (ICF) acts as a shield from unauthorized access to home networks and computers. It had come with the window installation package and it enables automatically in its default settings when the Network Setup Wizard is run and is compatible with most networks. ICF has manual switch on-off modes which can be done through the Network Connections folder. Wireless LAN provides Ethernet and Wireless Security with its improved standard IEEE 802.1X which has been developed with the combined effort of Microsoft, Wireless LAN dealers and PC dealers. Former version is highly inefficient in lacking security control with a key management system. The IEEE 802.1X is a port-based network access control and can be used with Windows XP via access points. Network Setup Wizard acts as a novice guideline in setting up the network can be utilised to configure the Internet Connection in networked computers, and also network adapters (NIC Card) can be used to enable Internet Connection Firewall (ICF), Network Bridge if appropriate, sharing resources such as files and printers and naming of computers. Network Diagnostics Features Diagnosing network features by using the following tools: The Network Diagnostics Web Page and NetSh helper Network Connections Support Tab Network Connection Repair Link Task Manager Networking Tab Updated Command Line Network Diagnostics Tool Internet Connection Sharing (ICS) A single internet connection from the source computer can be shared to all the other computers in a home or small office network. ICS is enabled in the source computer and gives out all the physical and IP addresses and translates these for all the networked computers in the organisation. Linux Operating System acts as a forbidder for all incoming connections but opens up for outgoing connections. When in ‘high mode, it allows for all outgoing connections and restricts to limited number of high ports for point-to-point applications. When switch to ‘medium mode, still permits outgoing connections, selected applications for incoming ports plus point-to-point application. When change to ‘none mode (â€Å"get out of my face†), it denies all incoming and outgoing connections. Only in the ‘laptop mode, the firewall does activate without giving any alert to an Interface (GUI). Protocols Linux supports IPv6 and SSH but Windows is not. 1.2) Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. (10 Marks) Interoperability refers to the capability of the system ranging from hardware and OS to work in multi-platforms. Windows and Linux are both OS and of x386 architecture. Open Office in Linux which is similar to MS Office in Windows is java based application. All of us know java -based applications will work in any platform. OpenOffice.org can be used to open and save Microsoft Office formats, such as PowerPoint, Word and Excel documents. Ubuntu can share files with Windows with ease, and can connect with current e-mail servers even Microsoft Exchange. Ubuntu support plug-n-play hardware, wireless networking, printing and other graphical and multimedia software. Connecting from Linux to Windows With the use of network, we can control Windows computer from Linux: enable â€Å"remote administration† on the Windows host make sure you reach the computer from your Linux box ping windows_computer connect to the computer rdesktop windows_computer Connecting from Windows to Linux The following can be used to have control over Linux computer from a Windows box: Vnc Xdmcp NX X-Servers for Windows puTTy (command-line only) Exchanging files between Linux and Windows When having two hard disk partitions but running on one OS, in case want to access a Linux partition when running Windows and vice versa, the following can be done: When on a Linux host and want to access a Windows drive Winhost has been assumed as Windows computers hostname in this case (the hostname can be checked by right clicking on My Computer Icon and select Properties). Open the Explorer windows on Windows computer. Right-click on the folder and choose â€Å"Sharing and security† from the drop-down box. Name it â€Å"share1†. Then, on Linux computer, open the file explorer either Konqueror or Nautilus and type smb: //winhost/share1 in the address bar. All the files and folders can be seen in that share. With just double-click, you can open and view them. Want to share When on a Linux computer and want to make the folder accessible on Windows machines over the network, need to run SAMBA service on Linux computer. Right-click on a folder in favourite file explorer like Nautilus and choose â€Å"Sharing Options†. Click and name the share. Nautilus will require a password without prior enabling of the Windows folder sharing and after that install the service. It now requires you to log out and log in again. Windows computer should be available with the share. When on a Windows host and want to access a Linux drive WinSCP is used and SFTP protocol should be chosen. The login procedure and password are same as when log in locally. Firewall should be shut down and openssh service should be installed on Linux computer. Want to share a folder By using normal Windows sharing procedures can share files with Linux. By using samba, the Linux host can access these files. NTFS (New Technology File System) is the Microsoft Window default file system. It is readable as well with Linux and more than 2GB of files can be stored. 1.3) You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Installation of Ubuntu Server Edition 9.10 During the ongoing installation process of Ubuntu Server Edition, LAMP which is a combination of Linux, Apache, and MySQL and PHP servers can be used instead. It is excluded from the Ubuntu Server Installation Package and can easily be used during the time of installation. The LAMP option does not require individual installation and integration separately of each of these components which can take prolonged period of time and need a help from an expert who is skilled in this particular installation. The overall cost can be greatly reduced due to the enhanced security performance, requiring lesser amount of time to install and any possibility of misconfiguration can be reduced. Flexible installation can be carried out with the Ubuntu Server Cloud computing server as varieties of servers like Mail Server, Open SSH Server, Samba File Server, Print Server, Tomcat Java Server, Virtual Machine Host, Manual Package selection, LAMP and DNS options work jointly with cloud computing node and P ostgreSQL Database options. These versions can be installed by Ubuntu LAMP server. Ubuntu 9.10 (Karmic) Apache 2.2.12 Mysql 5.1.37 PHP 5.2.10 Ubuntu 9.10 (Karmic) LAMP Server Installation is successfully completed and all applications installed will support apache, mysql and php. Ubuntu server 9.10 edition static ip address configuration The command [sudo apt-get install vim-full] can be used to install vim editor TCP/IP utilisation in a corporate or enterprise network needs the devices to be configured in detail, assigned addresses and the destined machines they were assigned need to be kept track of. Dynamic Host Configuration Protocol (DHCP) is used to make this process easier. Through Dynamic Host Configuration Protocol Ubuntu installer has arranged our system to acquire its network settings. But we need to switch it to static IP address by editing setup: Edit/etc/network/interfaces and the detail data of your ip address needs to be entered. For instance, IP address 173.20.9.10 is used in this case. The command [sudo vi/etc/network/interfaces] is entered and the file is saved and exit by using the procedure â€Å"In vi, ESC, and then ZZ to save and exit†. The chief network interface auto eth0 iface eth0 inet static address 173.20.9.10 netmask 255.255.255.0 network 189.18.9.3 broadcast 198.34.8.9 gateway 167.8.2.3 Now the command [sudo/tec/init.d/networking restart] is used to restart network services When DHCP is not in use, manual setting up of DNS servers in resolv.conf file is needed with command [sudo vi/etc/resolv.conf] In resolv.conf file the one similar to below should be added. search domain.com nameserver xxx.xxx.xxx.xxx File Sharing configuration in Ubuntu server 9.10 edition Sharing File by using NFS which is the *nix systems default networking protocol inclusive of Ubuntu Linux. File sharing by using Samba protocol Samba File Sharing Samba client permits easy and smooth networking with Windows-based networks except firewall is in place at the ports. Ubuntu Jaunty comes originally installed with Samba client. Samba server When Samba server is not installed by default, the instructions below can be used to configure a Samba server. In this way, files can be shared seamlessly between windows Samba network computers to other Samba clients. Install Samba with the command [sudo apt-get install samba samba-tools system-config-samba] Samba-tools and system-config-samba are not compulsory Samba settings can be altered by:- Method 1 System>Administration>Advanced>Samba This method can only be performed only if system-config-samba is installed Method 2 Needs User Authentication to connect to File Sharing Server and it is highly recommended because of its reliability The instructions below should be carried out to share files on the machine. Current user should be added to Samba by command [sudo smbpasswd- a username] The login username should replace username. Samba config file is opened by command [sudo nano/etc/samba/smb.conf] The directories is to be added at the far end by using the format Path=/home/username/ (The username is to be replaced with your own username and with the folder to be shared) CTRL+ X is pressed and later Y to save Samba is restarted by the command[sudo/etc/init.d/samba restart] The format[\192.168.x.x] is used to access the folder in Windows Explorer. In this instance, \192.168.x.x is used as a sample IP address and the actual IP address of the server in which folder exists should be replaced. The format[smb://192.168.x.x] should be typed in Konqueror or Nautilus of Linux. In this instance also, 192.168.x.x should be replace with the actual IP address of the server in which the folder exists. In case of bug when sharing in KDEs System Settings panel, erase out any situations concerning with these two lines (â€Å"case sensitive† and â€Å"msdfs proxy†) in /etc/smb.conf. Workgroup changing in Windows network workgroup Change your Windows network Samba workgroup by the command [sudo nano/etc/samba/smb.conf] and search out for this line â€Å"workgroup= WORKGROUP† change the setting according to your LAN workgroups name. Print sharing configuration in Ubuntu server 9.10 edition Printers Many printers can be recognized by the new CUPS interface. The Linux Foundation OpenPrinting database provides instructions to install particular types of unrecognized printers. Printer configuration System>Administration>Printing>New Printer>New Printer Usually the printer connected and switched on will be detected automatically. My network printer was configured with IP address at 192.168.10.23 and it was correctly installed at socker://192.168.10.23:9100. Through Samba printers on a Windows system and on other networks can be chosen plus directly connected printers. 1.4) Enumerate the various costs associated with the performance, security, support and maintenance of the Ubuntu within the bank. Cost associated with security of the Ubuntu within the bank A Linux-based operating system, Unix-like and open source make the Ubuntu more secure than any other OS. Translation into higher quality code makes it less prone to spyware and viruses than other OS. Rather strict and hyperactive security policy prevents the effects as a result of open ports or misconfigured software. It is truly multiuser operating system with it allowance in users to accomplish their tasks without giving any harm to the system. In Ubuntu, the user never logged in with an administrator account instead log in as a simple user and can change settings concern only with the user but for modifying settings that can somehow affect the system, the user required to type in administrator password. Cost associated with maintenance of the Ubuntu within the bank LTSP thin client technology makes Ubuntu deployment and management simpler and easier. With only a single server, over 50 workstations can be setup, manage and administrate. Ubuntu can therefore reduce the amount of time spend in administrating computers. Ubuntu is and will always be free to obtain, use and upgrade. No license fees or upgrades expenses are cost even if 100 or more machines are to be installed or can install on computers only having specific programs. Ubuntu also assist in saving hardware costs by allowing redeploying older machines as thin clients using LTSP technology. Cost associated with support of Ubuntu within the bank Ubuntu support can be getting from Ubuntu communities. Authors of the Ubuntu can get in touch directly through mailing lists and IRC channels including Ubuntu developers. Wide varieties are support are available, on mailing lists, wiki websites, IRC channels and bug trackers. Canonical who finances Ubuntu development can give help in any paid work. The community at the back of Ubuntu attracts people to the use of operating system. Linux community people are largely ex-Windows users and they have exact feelings the newness of an operating system and they are willing to help. In the Linux environment the best community support is offered by Ubuntu. Cost associated with performance of Ubuntu within the bank Program calls Synaptic offers access to most applications available to Ubuntu and by clicking the program wanted and it will install without needing to accept agreements several times pre-installation. Just select the program and click OK and it is finished. Ubuntu will download the installation files, install them and start the application on its own. That makes Ubuntu easier to install new programs. Ubuntu is fast and does not take up a lot of resources. Performance will not even slow down in prolonged use. Everything will be opened in a short time after clicking the icon and closes immediately when click the icon X. Ubuntu gets update every six months. Everything about Ubuntu is free. Even they will dig their pockets to pay postal charges if you ask them a free copy of the operating system. The software installed is free including all the software that can be downloaded, any help and support is free. Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: Performance of VPN within the bank VPN has other indirect cost savings advantages over other communications methods such as lesser requirements in training and staff, flexibility and scalability has been greatly increased. The largest benefit to utilising VPNs is money savings. The amount spent will be significantly reduced when compared to dedicated leased line options. Remote users can connect locally to an ISP and tunneling that connection to a VPN device on the destined network. Therefore, reduced technical help is required to install, configure, and manage networking equipment. With the use of a single WAN interface, it can carry out multiple functions so the expenses on WAN equipment installation and maintenance is no longer needed. Organisations can extend their network and capacitate their performance by setting up more accounts to control the increased demand. This will facilitate the answers to market demands or organizational challenges and is also time-saving. Therefore enterprises and corporate organisations can be linked from different locations into the network without the need of complex infrastructure, delays and tremendous expenses in joint with connection across borders. The wide area networking costs are cut down via telecommunication costs. Support of Ubuntu within the bank Technical help resources are sharply reduced with the emergence of VPNs. This is as a result of dependability on one type of Internet protocol (IP) from mobile users to an ISPs POP and security needs are standardised. If taking the help of the service providers to set up VPNs, they will take most of the support tasks for the network. Security of Ubuntu within the bank Fewer networking experts are required to control security features of the VPN as the ISP manages the WAN equipment. Hidden costs associated with distribution of VPN client software. Some adopters are finding that simple tasks not unique to VPNs, such as distributing and installing client software to remote users, pose a bigger challenge than ever imagined. Managing security and authentication systems require realising that complex skill sets not available in-house. Cost-VPN often requires a substantial up-front effort for configuration and software deployment. 2.1) A brief overview of current VPN technologies (both hardware and software). Components needed with VPNs With the effect of high security performance, VPNs are originally complicated. Typical components needed for an effective VPN include: Gateway devices Routers Dedicated servers Firewalls Client software Public-Key infrastructures (PKI) and associated key-management strategies Hardware-based encryption accelerators X.509 digital certificates Certificate Authority (ies) Directory services Servers with these features: Load balancing Failover Redundancy Network-transport communication mechanisms Typically, VPN components connected to the Internet include these: -Certificate Authority (CA) system -Managed ISP to support remote employees Corporate VPN gateway with these indispensables: -LDAP server -Registration Authority (RA) system Firewalls help in accomplishing three goals: Restrict accessing to certain segment of a network Block services requests that are thought to be insecure or unnecessary Interpret network addresses to conceal real device addresses from other segment of a network and is called Network Address Translation, or NAT VPN evaluation Certificate Authority (CA) support: If youll be handling more than a handful of users who possess digital certificates for authentication, youll need robust support for an external provider of CA services. Logging: If youre requiring information logs from the VPN, can they integrate into your existing logging mechanisms and reporting systems? Selective encryption: If youre thinking about adding a VPN to an existing firewall, you may want to encrypt only certain traffic- or risk bringing your firewall to its knees with an overload of overkill. VPN-management modules: Can you integrate your VPN into your existing enterprise networks monitoring system? If you cant, then how will you monitor its uptime? In your evaluation of VPN gateway products, look for these features: X.509 digital-certificate support LDAP support IPSec-compliant Encryption types supported Performance (Mbps) Maximum number of interfaces Maximum number of connections Quality of Service support Clustering (SMP) support Custom-application support Support for High-Availability (HA) features EAL/ITSEC/TCSEC Level In evaluation of VPN client products, look for these essentials: Thin-client support Fat-client support Network-mapping support Dynamic Host Configuration Protocol (DHCP) support NT Domain logon support 2.2) Design a suitable VPN using appropriate Internet Service Provider (ISP) for the requirements of the bank. 2.3) Identify and list the hardware and software required to implement the banks VPN. The infrastructure of existing network should be supported by a server. A server should serve as a domain controller, DNS server, Certificate authority and DHCP (Dynamic Host Configuration Protocol) server. The next step is to set up a certificate authority. A VPN server should be kept separate for the sole purposes of security threats. A firewall should be placed at the outlet of VPN server to only permit flow of VPN traffic into this server. Two NICs cards are needed to connect to the internet and the private corporate network. Identification of the remote users identity when trying to access the private corporate network is also necessary. The Server operating system comes with RADIUS- Remote Authentication Dial In User Service and IAS- Internet Authentication Service to do authentication process. VPN hardware products also do the authentication process. The Web Server (HTTP server) responds to HTTP requests for HTML pages that it delivers to customer browsers over the Internet. Its the only server that sits in front of the firewall and allows direct controlled access to the public internet. Its on this server you may want to store static Web page content and graphic images. All information processing that the Web server needs from applications or Database servers can only be accessed through the Firewall. Application Servers store, manage, and operate those software components relevant to the business, including Merchant server software, back-office accounting systems, customer information systems, order entry and fulfillment systems. You many opt for multiple application servers as your needs dictate. Any links to other legacy systems (such as mainframe-based systems0 may be made through the application servers as well. Database Servers store your product, purchase, and customer data in addition to all other distributed processing data already in place. They may use Object-Oriented Database Management products, traditional relational database products, or hybrids of the two. Choices of Database Server software include these: Oracle MS SQL Server Sybase DB/2 Informix Firewalls control the access to the internal (back-office) corporate networks. They serve as the mechanism under which the Web server accesses applications and data that is found behind them. These Firewalls will typically run monitoring software to detect and thwart external attacks on the site, and are needed to protect internal corporate networks. Common Firewall services are implemented as routers that sit in between two domains (subnets), and are selective about IP addresses from which it receives packets before it permits their routing to the other domain (subnet). These select IP addresses are considered as trusted hosts. Mainframe systems, If youve got them, can a

Saturday, July 20, 2019

Things Fall Apart Book Report- 11 Pages Long. I Got An A :: essays research papers

Things Fall Apart Book Report 1. Title of work: Things Fall Apart 2. Author and date written: Chinua Achebe, 1959  Ã‚  Ã‚  Ã‚  Ã‚   3. Country of author: Nigeria 4. Characters: Unoka – Okonkwo’s father, Unoka, was considered lazy and a failure. He never worked and always took from others. Okonkwo considered him a complete embarrassment and vowed never to be like his father. He had to hate what Unoka once loved, and never borrow money or stop working. Okonkwo - Okonkwo is a clan leader in Umuofia. He has a large family, yet is very stubborn and known for his violent personality. He became well known through all of the seven villages by throwing â€Å"The Cat† during a wrestling tournament. Ekwefi - Ekwefi is Okonkwo's second wife. She had nine children, but each of which died at a very young age. Enzinma is her only surviving child. She is a dedicated mother and a proper wife. Ezinma – Ezinma is open-minded and understanding. She is her father’s favorite child because of those reasons. He wishes that she would have been a boy, and keeps referring to that wish throughout the course of the novel. Ikemefuna – Even though Ikemefuna is seen as the perfect son and clansman, he is still sentenced to death by the Oracle. He is a hard-working, caring character. Nwoye – In the eyes of Okonkwo, his oldest son, Nwoye, is weak and lazy from an early age. He dislikes his father because he beats him so often to make him more masculine. After the death of Ikemefuna, Nwoye becomes very depressed and later converts to the Christian faith, which makes Okonkwo disown him. Obierika – He is a close and loyal friend to Okonkwo. He is always there for him, even when he is banished for seven years, Obierika still comes to visit Okonkwo and his family in the motherland. He also takes care of the yam distribution and it’s payment because Okonkwo is unable to do so. Chielo - Chielo is the oracle who speaks to the villages as the goddess Agbala. She is very fond of Ekwefi and Enzinma. Ogbuefi Ezeudu – He is the oldest man in the tribe. He was very successful and he had won three out of the four titles that you can take in the tribe. When his funeral came, they had a great warrior celebration in remembrance of him. Uchendu – Uchendu is Okonkwo’s uncle. He welcomes Okonkwo and his family with open arms when he goes to the motherland for his seven years of punishment.

Friday, July 19, 2019

Gonorrhea Essay -- essays research papers

Gonorrhea   Ã‚  Ã‚  Ã‚  Ã‚  We chose the bacterial disease gonorrhea. We were not able to find when the disease was discovered or who discovered it.   Ã‚  Ã‚  Ã‚  Ã‚  Gonorrhea is a bacterial disease that is an infection caused by gonoccocus bacteria. This bacteria is round shaped and can live only in dark, warm, moist places. These places would include; inside your body, cervix, penis, throat, and rectum. It usually involves the urethra in males, and vagina, cervix, and fallopian tubes in females.   Ã‚  Ã‚  Ã‚  Ã‚  For 2-9 days there are no symptoms of Gonorrhea. Then some do occur. There can be frequent burring urination and thick green-yellow discharge from the penis or vagina. Also, there may be rectal discomfort and discharge, joint pain, a mild rash, or sore throat and swollen glands. For men, the opening of the penis may be red and sore. Symptoms of gonorrhea show up more in males than in females, in fact, about half of the women with gonorrhea have no symptoms. Effects of this disease could include; gonococcal eye infection, blood poisoning, infectious arthritis, pelvic inflammatory disease, epididnmitis, endocarditis, sexual impotence in men, and infertility in women. Also, pregnant women can infect unborn babies.   Ã‚  Ã‚  Ã‚  Ã‚  Gonorrhea can be diagnosed by tests that include blood studies. There could be laboratory cultures and microscopic analysis of the discharge from the reproductive organs, rectum, or throat....

Thursday, July 18, 2019

Teenagers and Use of Contraceptives

Teen pregnancy has been a great issue that has been widely discussed about and seen to increase in the United States. According to the National Campaign to Prevent Teen and Unplanned Pregnancy one-third of girls in the US get pregnant at least once by the age of 20 and most of the pregnancies are unplanned (2011). Teen pregnancies have been increasing due to the fact that teens are not using contraceptives to prevent any pregnancies and society does not do a good job on informing teens of the importance of contraceptives and protecting themselves when they engage in sexual activity, especially at a young age.Psychological and socio-economical issues can also play a role in teen pregnancy, some girls decide to intentionally get pregnant because of their low self esteem, not having any goals for the future, having problems at home or even if their mother or sister were teen mothers. Teens should have more knowledge on protection and the importance of contraceptives because not only can it prevent pregnancies but also prevent sexually transmitted diseases.As previously mentioned teen pregnancies are at a high once again and teens who engage in sexual activity do not use the proper forms of protection and society does not highlight the importance of birth control. Sarah Brown, CEO of The National Campaign to Prevent Teen and Unplanned Pregnancy stated that the magic formula for the decline of teen pregnancy is having less sex or using more contraceptives (PR Newswire). Most teens are unaware of the importance of having protected sex it can change their life dramatically. Half of all pregnancies in the US are unplanned–about three million each year (NCPTUP).Unplanned pregnancies result from unprotected sex; therefore, the use of birth control should be highly motivated in order to prevent any pregnancies. In their public opinion survey the NCPTUP concluded that 46% of teens wished young people were getting more information about abstinence and contraception. Rekha Daver, professor of gynecology at the grant Medical School in JJ Hospital states that there needs to be more reproductive health education among children to teach them about safe sex and proper methods of contraception.Teens should be taught at a younger age to think about their future and how being pregnant can transform and affect their whole life, as well as teaching them the value of safe sex and what can be taken to prevent unwanted pregnancies or abortions. More health education in schools should be emphasized to acknowledge students the risks of becoming teen parents and the importance of preventing pregnancies by the use of birth control. Teens should have easy access to these contraceptives in order to protect themselves during sexual intercourse and should not be ashamed to seek these resources since it is for their well-being.The media can play a prominent figure in teen pregnancy and the use of contraceptives; it has its positives and negative outlooks on it. Many people are skeptical about TV series that are popular among adolescents because some believe that it teaches them to practice safe sex or not practice sex at all to prevent any unwanted pregnancies, but on the other hand some believe that it lionizes teen parents that are on shows like Teen Mom and it gives them a higher status since they are now popular and highly seen throughout the nation.Some teens may want to follow their footsteps and believe that if they become teen parents they might also become recognized like the teen moms on the show. Another TV series that is very popular and seen among teens is The Secret Life of an American Teenager, it informs the audience how not using protection during sex can cause a serious life changing effect and becoming a teen parent is followed by many psychological, socio-economic and social issues such as becoming alienated from friends, not being able to financially sustain and care for a baby and believing that others think they are infer ior now that they have had a baby.In a poll conducted by the National Campaign to prevent pregnancies concluded that seven in ten young adults between the ages of 18-29 would support a campaign that would educate women and teens about all the birth control that can be accessed (2011). Many people support the use of the media to educate young teens the importance of protection and the wide range of birth control that can be used in order to prevent pregnancies, this will help decrease the high rate of teen pregnancies in the future. It also highlights the significance of using protection to prevent any further health risks such as sexually transmitted diseases.Each year, approximately three million cases of sexually transmitted diseases occur among teenagers according to Centers for Disease Control and Prevention. Not only does protection prevent pregnancies but it protects the health by preventing the transmission of sexual diseases among partners; according to the mentioned statist ic, many teens are becoming victims of these diseases and most of the teens could have prevented this by using a condom, but most teens are not informed how to prevent these diseases so it is very important for them to become educated on the topic in order to decrease the rate of sexually transmitted diseases.Another factor that plays a prominent role in teen pregnancy and knowledge of birth control comes from the teen’s psychological issues and how their parents raise them. Some teens may face difficult issues at home or at school and feel depressed and alone, some may have a low self-esteem and do not have a set goal for their future. Andrea Parrot, a Cornell women’s health and human sexuality expert said that girls intentionally get pregnant because they do not see any life goals in their future other than becoming a mother.She also mentions that teens do not have anything to strive for and have no one to look up to for admiration or affection so they believe that a baby may be a source to receive unconditional love. Parrot believes that more programs that would help young girls acquire skills to achieve life goals, increase their self esteem, relationship with family and education on sex and protection would dramatically decrease teen pregnancy; although, these programs should be more effective if it targets girls at an early age in order for them to be informed at a younger age and not commit these mistakes later on in their life.The way the teen was raised also is important because teens who were raised in a single parent household are often left to learn life lessons and sex on their own or through peers, and a teen whose mother was a teen mother or whose sister was a teen parent as well, is more likely to become a teen parent themselves. Parents influence their children’s decisions, so parents should inform their children more on safe sex and the importance of it.In a survey by The national Campaign states that 46% of teens say par ents influence their decision about sex, eight in ten teens say it would be much easier for teens to delay sexual activity if they were able to openly talk to their parents about sex, and six in ten teens agree that they do not use contraceptives because they fear that their parents will fond out. It is the parents’ responsibility to inform their teens about safe sex and contraceptives in order to prevent unwanted pregnancies at an early age and prevent diseases.Parents should be more open about the topic and feel comfortable to cover the issue with their children so their children can openly talk about sex with their parents. Teen pregnancy is a major issue in the US, psychological issues such as self esteem, sociological issues like relationship with peers and parents and social problems like society’s role on informing teens on sex and birth control play a prominent role in teen pregnancies.Informing teens at a younger age on the importance of safe sex and protectio n does not only decrease the rate of teen pregnancies but also decrease the rate of sexually transmitted diseases. Having a greater knowledge on sex education is the key factor for teens to make a dramatic decision in their lives to take precaution and think about their future before acting upon a simple consequence that can change their life such as not taking precaution.