Tuesday, December 31, 2019

Case 6.1 †Wild Horses Adm-624 Essay - 830 Words

Case 6.1 – Wild Horses Grand Canyon University: ADM-624 01/16/2013 In my opinion the Bureau of Land Management has had a great impact with all the services they have provided over the time. As the years have past it has become triple the coast to keep up with maintaining the care, services, shelter, and feeding of these horses. I understand the need and want to keep the horses population from dying out being instinct and letting them run freely in the wild as they are known to do. Not all animals should be restricted to where they can roam to just as humans. Also like the human race the more you roam and run wild the more it is going to cost you along with you reproducing. That is another mouth to take care of and provide for†¦show more content†¦Just as with us humans you cannot make everyone use some form of birth control but you can let them know it is out there and that it would be better to use it and be safe rather than not use it and add on additional mouths to feed, cloth or better yet not want abort. Now with all these know facts, acts, opinions all viewed as good and bad a decision can be made by looking at what is helping and what is not helping. What was the main goal and purpose of the program? Has it been met and if so are all the requirements and rules being kept and met to. Also have to look and what is going to help keep the funding up and enough of it to maintain the BLM up and running for years to come. This means abiding by the required rules regardless of what the public or anyone else thinks. The key factor here is that the BLM is making sure they are keeping these horses race alive, well, free to run, and very populated. By sticking to destroying and selling off with no limits then the BLM’s would not even be in this situation. Going through all those steps one at a time including feed back and input from all involved everyone will be able to see while agree on what needs to be done. Even with going step by step with the decision making process you may not come up with a resolution right at that moment or even a resolution that will make everyone happy. But know that in order to make any

Monday, December 23, 2019

I Had Been Out Of The Hospital For Two Weeks Essay

I had been out of the hospital for two weeks. I was staying on track with my medicine, with the help of my husband Bryon. I have been dealing with depression for a while now and I eventually ended up being emitted to the hospital. I decided to take time off work for a while until I got back in the swing of things. Me and my husband Bryon decided that was the best thing to do. Every day Bryon would make sure I took my medicine in the morning before he went to work and every evening when he got back. That’s what my psychiatrist recommended we do. I had been suicidal, and they wanted to make sure didn’t try anything to take my life. Bryon removed all of the sharp objects from the house, like knives and scissors. I didn’t feel like all of that was necessary, but I could see why he did that with the state of mind I was in before I was emitted to the hospital. Battling with severe depression took a toll on me. There was no definite cause for my depression either. It’s like no matter how good things were going in my life, there would always be a little bit of sadness that lingered. I was feeling confident that I was going to really get better and more stable. It is just so hard sometimes to find the medicine that worked. It is like trial and error. My medicine would have to be adjusted to get me feeling the best I could, but I was hoping that this was a real fix. I mean I knew that I would not always be happy because in life we all go through ups and downs, but I just wanted toShow MoreRelatedThe Crisis Center For South Suburbia Essay1275 Words   |  6 Pages†¢ This past week at the Crisis Center for South Suburbia was not as eventful as the past two weeks. The clients that were causing frequent verbal altercations have either exited on their own, exited involuntarily, or been given a written warning in which they are following the conditions of. I now have only one client on my caseload, since the other had voluntarily exited herself and her son. On Monday, 10/31/16, I was able to help the children in shelter celebrate Halloween. We set up trickRead MoreMy Experience At The Florida State Mental Hospital1375 Words   |  6 Pagesat the Florida State Mental Hospital as a psychology major has most definitely been an unforgettable one. The mere eight visits I was able to make has rewarded me with so much knowledge about what it takes to work alongside the mentally ill, mental health workers, and hospital staff altogether. Even though I have been constantly preparing my brain for my future career as a clinical psychologist by reading and researching in my classes as well as during my free time, I don’t believe any of these readingsRead MoreIndia s Impact On The City Of India1583 Words   |  7 PagesWhen I think of India I think of such a dry desert place. Two months ago that was not the case for a specific area in India. Chennai, India had terrible flooding that put a halt to transportation, and some people lost their houses including everything that was inside of them. This natural disaster took place near the end of l ast year. The week of November 15th Chennai and its suburbs received on again off again rainfall that lasted almost an entire week. Very similar situation on November 23rdRead MoreMy Wife And My First Child Essay974 Words   |  4 Pageswife and I found out we would be having our fourth child. We were living in Sugarloaf Key, FL while I worked in Key West, FL. Due to some unforeseen circumstances with our landlord, we terminated our lease in Sugarloaf early, rather than finding a place for the remaining six months we would be there. We moved the family back home to North Carolina over the Christmas break from school. I still had six months or so remaining before I transferred to my new job in Tybee Island, GA. The military had movedRead MorePatient Treatment in a Hospital Essays878 Words   |  4 PagesTreatment in a Hospital The purpose of visiting a hospital was to find out how a hospital is run and the experiences of patients who were receiving treatment there. Interviewing a patient gave me the opportunity to develop my own communication skills. It also allowed me to discover the pros and cons of healthcare in a hospital and assess how I would treat patients in the future as a doctor. I interviewedRead MoreMy Wife And My First Child996 Words   |  4 PagesIn December of 2008, my wife and I found out we would be having our fourth child. We were living in Sugarloaf Key, FL while I worked in Key West, FL. Due to some unforeseen circumstances with our land lord, we terminated our lease in Sugarloaf early, rather than trying to find a place for the remaining six months we would be there. We moved the family back home to North Carolina over the Christmas break from school. I still had six months or so remaining before I transferred to my new job in TybeeRead MorePersonal Narrative : The Longest Roller Coaster Ride Of My Life1502 Words   |  7 Pages The longest roller coaster ride of my life began Sunday, April 23rd and came to a relieving stop Wednesday, August 23rd. April 23rd, 2017 was the day I discovered my mom had Leukemia and then the roller coaster began. My brother and I had been away for the weekend with friends from our church at District Blitz in Duluth. Our mom was supposed to pick us up when we returned to the church, but our grandparents came and got us instead. As my grandpa drove from the church we began to wonder why ourRead MoreMy Life At The Nurses Clinic1721 Words   |  7 Pageschest hurts. I can barely walk as I stumble my way down to the nurse’s clinic. I realize I shouldn’t have left class alone. But it is only the first day of a new semester, so I barely know my teacher or classmates. I feel like I have been walking for hours. I finally reach my school’s office. I attempt to make my way through the main office to the clinic. But as I open to door to the main office the secretary looks at me. She is in the middle of a phone call. But suddenly the phone drops out of her handRead MorePersonal Narrative : My Miracle From God1519 Words   |  7 PagesMy Miracle from God It was January 18, 2009. The day I had to get an emergency C-section, I was 37 weeks pregnant and the doctors found out I had a condition called preeclampsia, which had turned into eclampsia. I was quite sick and the only cure for eclampsia is to deliver the baby. My beautiful baby boy Isaiah was born on January 18, 2009. He was six pounds, eleven ounces and nineteen inches long. He was the most beautiful baby I had ever seen. All was well, my doctor said that Isaiah was healthyRead MoreThe Day After Christmas703 Words   |  3 PagesChristmas, Russ and I were scheduled to meet up with our RV group for New Years, at an RV park, located on the way back to Tucson, and celebrate. The day we left to meet up with them, Russ asked if I minded just driving home! That was the last time we used the RV. We didnt go away for our anniversary, as planned, despite the fact he had always wanted to go to Camp Pendletons RV park, on the beach. In fact, the RV was sold by the end of February. Ap parently, Russ realized what Id been worried about

Sunday, December 15, 2019

Database Slides on Normalization Free Essays

Chapter 11 Relational Database Design Algorithms and Further Dependencies Chapter Outline ? ? ? ? ? ? ? 0. Designing a Set of Relations 1. Properties of Relational Decompositions 2. We will write a custom essay sample on Database Slides on Normalization or any similar topic only for you Order Now Algorithms for Relational Database Schema 3. Multivalued Dependencies and Fourth Normal Form 4. Join Dependencies and Fifth Normal Form 5. Inclusion Dependencies 6. Other Dependencies and Normal Forms DESIGNING A SET OF RELATIONS ? Goals: ? Lossless join property (a must) ? Algorithm 11. 1 tests for general losslessness. Algorithm 11. decomposes a relation into BCNF components by sacrificing the dependency preservation. 4NF (based on multi-valued dependencies) 5NF (based on join dependencies) ? Dependency preservation property ? ? Additional normal forms ? ? 1. Properties of Relational Decompositions ? Relation Decomposition and Insufficiency of Normal Forms: ? Universal Relation Schema: ? A relation schema R = {A1, A2, †¦, An} that includes all the attributes of the database. Every attribute name is unique. ? Universal relation assumption: ? (Cont) ? Decomposition: ? ? Attribute preservation condition: ? The process of decomposing the universal relation schema R into a set of relation schemas D = {R1,R2, †¦, Rm} that will become the relational database schema by using the functional dependencies. Each attribute in R will appear in at least one relation schema Ri in the decomposition so that no attributes are â€Å"lost†. (Cont) ? ? Another goal of decomposition is to have each individual relation Ri in the decomposition D be in BCNF or 3NF. Additional properties of decomposition are needed to prevent from generating spurious tuples (Cont) ? Dependency Preservation Property of a Decomposition: ? Definition: Given a set of dependencies F on R, the projection of F on Ri, denoted by pRi(F) where Ri is a subset of R, is the set of dependencies X Y in F+ such that the attributes in X U Y are all contained in Ri. Hence, the projection of F on each relation schema Ri in the decomposition D is the set of functional dependencies in F+, the closure of F, such that all their left- a nd right-hand-side attributes are in Ri. (Cont. ) ? Dependency Preservation Property of a Decomposition (cont. ): ? Dependency Preservation Property: ? ? A decomposition D = {R1, R2, †¦ Rm} of R is dependency-preserving with respect to F if the union of the projections of F on each Ri in D is equivalent to F; that is ((? R1(F)) U . . . U (? Rm(F)))+ = F+ (See examples in Fig 10. 12a and Fig 10. 11) ? Claim 1: ? It is always possible to find a dependency-preserving decomposition D with respect to F such that each relation Ri in D is in 3NF. Projection of F on Ri Given a set of dependencies F on R, the projection of F on Ri, denoted by ? Ri(F) where Ri is a subset of R, is the set of dependencies X Y in F+ such that the attributes in X ? Y are all contained in Ri. Dependency Preservation Condition Given R(A, B, C, D) and F = { A B, B C, C D}    Let D1={R1(A,B), R2(B,C), R3(C,D)} ? R1(F)={A B} ? R2(F)={B C} ? R3(F)={C D} FDs are preserved. (Cont. ) ? Lossless (Non-additive) Join Property of a Decomposition: ? Definition: Lossless join property: a decomposition D = {R1, R2, †¦ , Rm} of R has the lossless (nonadditive) join property with respect to the set of dependencies F on R if, for every relation state r of R that satisfies F, the following holds, where * is the natural join of all the relations in D: (? R1(r), †¦ , ? Rm(r)) = r ? Note: The word loss in lossless refers to loss of information, not to loss of tuples. In fact, for â€Å"loss of information† a better term is â€Å"addition of spurious information† Example S s1 s2 s3 P p1 p2 p1 D d1 d2 d3 = S s1 s2 s3 P p1 p2 p1 * P p1 p2 p1 D d1 d2 d3 Lossless Join Decomposition NO (Cont. ) Lossless (Non-additive) Join Property of a Dec omposition (cont. ): Algorithm 11. 1: Testing for Lossless Join Property Input: A universal relation R, a decomposition D = {R1, R2, †¦ , Rm} of R,and a set F of functional dependencies. 1. Create an initial matrix S with one row i for each relation Ri in D, and one column j for each attribute Aj in R. 2. Set S(i,j):=bij for all matrix entries. (/* each bij is a distinct symbol associated with indices (i,j) */). 3. For each row i representing relation schema Ri {for each column j representing attribute Aj {if (relation Ri includes attribute Aj) then set S(i,j):= aj;};}; ? (/* each aj is a distinct symbol associated with index (j) */) ? CONTINUED on NEXT SLIDE (Cont. ) 4. Repeat the following loop until a complete loop execution results in no changes to S {for each functional dependency X ? Y in F {for all rows in S which have the same symbols in the columns corresponding to attributes in X {make the symbols in each column that correspond to an attribute in Y be the same in all these rows as follows: If any of the rows has an â€Å"a† symbol for the column, set the other rows to that same â€Å"a† symbol in the column. If no â€Å"a† symbol exists for the attribute in any of the rows, choose one of the â€Å"b† symbols that appear in one of the rows for the attribute and set the other rows to that same â€Å"b† symbol in the column ;}; }; }; 5. If a row is made up entirely of â€Å"a† symbols, then the decomposition has the lossless join property; otherwise it does not. (Cont. ) Lossless (nonadditive) join test for n-ary decompositions. (a) Case 1: Decomposition of EMP_PROJ into EMP_PROJ1 and EMP_LOCS fails test. (b) A decomposition of EMP_PROJ that has the lossless join property. (Cont. ) Lossless (nonadditive) join test for n-ary decompositions. (c) Case 2: Decomposition of EMP_PROJ into EMP, PROJECT, and WORKS_ON satisfies test. (Cont. ) ? Testing Binary Decompositions for Lossless Join Property ? ? Binary Decomposition: Decomposition of a relation R into two relations. PROPERTY LJ1 (lossless join test for binary decompositions): A decomposition D = {R1, R2} of R has the lossless join property with respect to a set of functional dependencies F on R if and only if either ? ? The FD ((R1 ? R2) ? (R1- R2)) is in F+, or The FD ((R1 ? R2) ? (R2 – R1)) is in F+. 2. Algorithms for Relational Database Schema Design Algorithm 11. 3: Relational Decomposition into BCNF with Lossless (non-additive) join property Input: A universal relation R and a set of functional dependencies F on the attributes of R. 1. Set D := {R}; 2. While there is a relation schema Q in D that is not in BCNF do { choose a relation schema Q in D that is not in BCNF; find a functional dependency X Y in Q that violates BCNF; replace Q in D by two relation schemas (Q – Y) and (X U Y); }; Assumption: No null values are allowed for the join attributes. Algorithms for Relational Database Schema Design Algorithm 11. 4 Relational Synthesis into 3NF with Dependency Preservation and Lossless (Non-Additive) Join Property Input: A universal relation R and a set of functional dependencies F on the attributes of R. 1. Find a minimal cover G for F (Use Algorithm 10. ). 2. For each left-hand-side X of a functional dependency that appears in G, create a relation schema in D with attributes {X U {A1} U {A2} †¦ U {Ak}}, where X ? A1, X ? A2, †¦ , X Ak are the only dependencies in G with X as left-hand-side (X is the key of this relation). 3. If none of the relation schemas in D contains a key of R, then create one more relation s chema in D that contains attributes that form a key of R. (Use Algorithm 11. 4a to find the key of R) 4. Eliminate redundant relations from the result. A relation R is considered redundant if R is a projection of another relation S Algorithms for Relational Database Schema Design Algorithm 11. 4a Finding a Key K for R Given a set F of Functional Dependencies Input: A universal relation R and a set of functional dependencies F on the attributes of R. 1. Set K := R; 2. For each attribute A in K { Compute (K – A)+ with respect to F; If (K – A)+ contains all the attributes in R, then set K := K – {A}; } (Cont. ) 3. Multivalued Dependencies and Fourth Normal Form (a) The EMP relation with two MVDs: ENAME — PNAME and ENAME — DNAME. (b) Decomposing the EMP relation into two 4NF relations EMP_PROJECTS and EMP_DEPENDENTS. (Cont. ) c) The relation SUPPLY with no MVDs is in 4NF but not in 5NF if it has the JD(R1, R2, R3). (d) Decomposing the relation SUPPLY into the 5NF relations R1, R2, and R3. (Cont. ) Definition: ? A multivalued dependency (MVD) X — Y specified on relation schema R, where X and Y are both subsets of R, specifies the following constraint on any relation state r of R: If two tuples t1 and t2 exist in r such that t1[X] = t2[X], then two tuples t3 and t4 should also exist in r with the following properties, where we use Z to denote (R -(X U Y)): ? t3[X] = t4[X] = t1[X] = t2[X]. t3[Y] = t1[Y] and t4[Y] = t2[Y]. t3[Z] = t2[Z] and t4[Z] = t1[Z]. An MVD X — Y in R is called a trivial MVD if (a) Y is a subset of X, or (b) X U Y = R. ? ? ? Multivalued Dependencies and Fourth Normal Form Definition: ? A relation schema R is in 4NF with respect to a set of dependencies F (that includes functional dependencies and multivalued dependencies) if, for every nontrivial multivalued dependency X — Y in F+, X is a superkey for R. ? Informally, whenever 2 tuples that have different Y values but same X values, exists, then if these Y values get repeated in separate tuples with every distinct values of Z {Z = R – (X U Y)} that occurs with the same X value. Cont. ) (Cont. ) Lossless (Non-additive) Join Decomposition into 4NF Relations: ? PROPERTY LJ1’ ? The relation schemas R1 and R2 form a lossless (non-additive) join decomposition of R with respect to a set F of functional and multivalued dependencies if and only if ? (R1 ? R2) — (R1 – R2) (R1 ? R2) — (R2 – R1)). ? or ? (Cont. ) Algori thm 11. 5: Relational decomposition into 4NF relations with non-additive join property ? Input: A universal relation R and a set of functional and multivalued dependencies F. Set D := { R }; While there is a relation schema Q in D that is not in 4NF do { choose a relation schema Q in D that is not in 4NF; find a nontrivial MVD X — Y in Q that violates 4NF; replace Q in D by two relation schemas (Q – Y) and (X U Y); }; 1. 2. 4. Join Dependencies and Fifth Normal Form Definition: ? A join dependency (JD), denoted by JD(R1, R2, †¦ , Rn), specified on relation schema R, specifies a constraint on the states r of R. ? ? The constraint states that every legal state r of R should have a non-additive join decomposition into R1, R2, †¦ Rn; that is, for every such r we have * (? R1(r), ? R2(r), †¦ , ? Rn(r)) = r (Cont. ) Definition: ? A relation schema R is in fifth normal form (5NF) (or Project-Join Normal Form (PJNF)) with respect to a set F of functional, multivalued, and join dependencies if, ? for every nontrivial join dependency JD(R1, R2, †¦ , Rn) in F+ (that is, implied by F), ? every Ri is a superkey of R. Recap ? ? ? ? ? D esigning a Set of Relations Properties of Relational Decompositions Algorithms for Relational Database Schema Multivalued Dependencies and Fourth Normal Form Join Dependencies and Fifth Normal Form Tutorial/Quiz 4 Q1) Consider a relation R with 5 attributes ABCDE, You are given the following dependencies: A B, BC E, ED A a) List all the keys, b) Is R in 3 NF c) Is R in BCNF Q2) Consider the following decomposition for the relation schema R = {A, B, C, D, E, F, G, H, I, J} and the set of functional dependencies F = { {A, B} {C}, {A} {D, E}, {B} {F}, {F} {G, H}, {D} - {I, J} }. Preserves Lossless Join and Dependencies? a) D1 = {R1, R2, R3, R4, R5}, R1={A,B,C} R2={A,D,E}, R3={B,F}, R4 = {F,G,H}, R5 = {D,I,J} b) D2 = {R1, R2, R3} R1 = {A,B,C,D,E} R2 = {B,F,G,H}, R3 = {D,I,J} How to cite Database Slides on Normalization, Essay examples

Saturday, December 7, 2019

Capital Maintenance Doctrine and Securities

Question: Discuss about the Capital Maintenance Doctrine and Securities. Answer: Introduction The doctrine of capital maintenance enjoins a company to safely maintain its capital for the benefit of creditors and allow the courts to ensure check if it has been lawfully spent (Saidul, 2013). It is an important principle in company law that requires the company to obtain a lawful consideration fro all the shares that it may seek to issues. The main principles that underpin this doctrine include the prohibition of a company purchasing its own shares and the payment of dividends to shareholders (Saidul, 2013). According to the doctrine, the profit that is made by the company is not to be recognizes unless the amount of the net assets owned by the company is maintained. Origin and Rationale of the Doctrine It is imperative to note that the doctrine has been developed as result judicial interpretation. In Flitcrofts Case (1882) the court highlighted two components of the doctrine; that the creditors have the right to check and ensure that the capital of the company is not used or shared unlawfully and that the capital of the company should not be incongruously shared to the members of the company by way of shares. In the case of Trevor v Whitworth (1887) a company bought a significant amount of its own shares from the company. It was held that such an action would lead to the reduction of the capital owned by the company and therefore the company was first obligated to pay the shareholder the amount of his contribution upon liquidation. As a matter of course, it was held in Aveling Barford Ltd. V. Perion Ltd (1989) that the shareholders of a company are entitled to their contribution to the capital upon liquidation, but the creditors will be given priority during the payment. It bears n oting that the doctrine of capital maintenance has mainly originated from the development of English case laws. The rationale for the existence of the doctrine is largely two fold. First it seeks to protect the interest of the creditors and secondly it ensures that the capital of the company is lawfully used. The courts have been vigilant in protecting the capital of the company so that it remains intact for the creditors (Zahir, 2000 p 50). Application of the Doctrine in Australia The capital maintenance doctrine is a weakening phenomenon in Australia. This has been demonstrated by the fact that most of the financial institutions such as banks do not maintain an intact capital that will prevent them from the adverse effects of a financial crisis (Gluyas, 2014 p 23). According to Roman (2016) there has been limited regulation on the use of capital in Australia. Australia has recorded an upsurge in flexibility in the freedom of use of capital but the same time the protection of the creditors has also been a top priority (Roman, 2016). It can thus be conceded that the doctrine of capital maintenance is debilitating in Australia and its application is losing relevance in most companies and financial institutions. References Aveling Barford Ltd. V. Perion Ltd (1989) BCLC 626 at p. 630-3. Flitcrofts Case (1882) 21 Ch. D. 519. Gluyas, R (2014) Capital hijacks Murray inquiry as regulators put stability before credit creation, The Australian, Roman, T (2016) The Rise and Fall of the Capital Maintenance Doctrine in Australian Corporate Law, Commercial Law in the Twenty-first Century Forum, Tsinghua University, Beijing Saidul, I. ( 2013) The Doctrine of Capital Maintenance and its Statutory Developments: An Analysis , The Northern University Journal of Law Trevor v Whitworth (1887) 12 App. Cas. 409. Zahir, M. (2000) Company and Securities Laws, , The University Press Limited, Dhaka

Friday, November 29, 2019

Brain Structure Essays - Hypothalamus, Limbic System,

Brain Structure The part of the body that motivates eating is the hypothalamus. The small gland is located in the midline at the base of the brain, just below the hypothalamus, and interacts closely with the pituitary gland and acts in coordination with the reticular formation. The two components of the hypothalamus dealing with hunger are the lateral hypothalamus and the ventromedial nucleus. The lateral part is what allows a person to feel hungry and sends out signals to the rest of the body that one is ready to eat. If this part is damadged, one would not feel hunger and would experience aphasia, which is starving. The ventromedial nucleus gives satiety, or the feeling that one is full. This component is also necessary, because an injury here would produce hyperphasia, when the body does not know when to stop eating, and would surely become obese. Along with his theory of emotions, Schachter studied obesity and the reasons for the uncontrollable urges to binge by those who are overweight. His research reveals that much of the overeating is due to the reinforcements that the obese find in food. He mentions that while those with an appropriate weight are stimulated to eat when aroused by internal cues, obese look for other factors to reinforce their need to eat. For example: the smell of food, the way a platter is served, the colors and decorations on a plate, or even the contact comfort that the food produces in the hands or in the tongue. This euphoric way of eating might be satisfying during dinner time, but in the long run, it is extremely dangerous. By eating only what appeals to vision, smell, or texture, one does not satisfy the bodily needs for varied nutrients, vitamins, and minerals, and therefore be mal-nutrinioed and be exposed to obesity and other illness as well. Anatomy and Physiology

Monday, November 25, 2019

Free Will Essays - Free Will, Determinism, Causality, Free Essays

Free Will Essays - Free Will, Determinism, Causality, Free Essays Free Will Do I have Free Will? After considering the evidence for the three views I have concluded that soft determinism is best supported. I will be arguing for soft determinism with evidence presented in the class readings. I will start out with the evidence of unconscious motivation. It is the unconscious that forces us to act out things we think are justifiable but can actually be hurtful. With the three factors of our unconscious state, the ID, super-ego and the unconscious ego, we tend to be in a tug-of-war with our mind over who has control. With the mind being in the unconscious state we tend to make compromises in our actions. With the unconscious working, we have the freedom of free will. Once the ID is in action it puts its demands in the table and wants satisfaction while the super-ego denies the wish. We need our unconscious to mediate between the two forces otherwise our mind would be in a constant battle. Another argument for the point would be of moral responsibility. According to Hospers we have none. We are conditioned from birth with qualities of our personality, social standing and attitudes. Most people are so set on their ways that unconsciously they block out rational thought and act on what they have been programmed to do. In the unconscious state we are just bystanders to our neurosis which is always in control and has already been unconsciously determined. If most of our acts are compelled then we have no means of true freedom. Now let us look at free acts versus unfree acts. First, we should have a definition of both: free acts are caused at that moment by internal states whereas unfree acts occur due to outside forces. A true Libertarian believes that there is no cause for anything, that everything happens as the self decides while a Determinist believes everything happens due to some outside force. The soft determinist has the right idea, that all acts are necessitated by previous causes. There are some free acts and there are some unfree acts. We need both of these forces to guide us through life. If we go through life without worrying about a single thing then I believe that this life has been wasted, that we have just been going through some routine only to get by and then move on to something better which has been determined for us somehow. We need free acts thrown into the mix so we have some reason for living. Right now I am acting out of free will in a way, I am writing this paper. You might say i t is an unfree act because it is an assignment but I can choose not to do it. My free act is that I want to learn more by exploring this subject so I can apply myself to better things. In soft determinism we also need some unfree acts. Just this past weekend after the snow storm I was pulling into the parking lot and pulled into the space, knowing very well that I buried my car in 8 inches of fresh snow. This event was caused by the huge amount of snow we got and that the lot wasn't plowed. Since it was not my choice to get my car stuck in the snow, this is an example of an unfee act. While most things are determined for us it is that little free agent that keeps us going. The evidence for Libertarianism is less persuasive than Determinism and Soft Determinism. First of all the argument for the inner standpoint is very unpersuasive. This is trying to show that determinism is false, which is entirely impossible. The argument is that you cannot look at things from an outer standpoint, that a determinist tries looking at it as through a different, or wrong, point of view and when they discover that it is not there then they their beliefs don't exist anymore. Also, that moral freedom is an inner act is hard to comprehend. It is said that the act must be one of which the person judged can be regarded as the sole author. He can be held morally responsible for

Friday, November 22, 2019

Bus 617-week 12 Essay Example | Topics and Well Written Essays - 1000 words

Bus 617-week 12 - Essay Example It varies from the day and individual. Cafeteria benefits allow the employee to choose benefits from array of menu benefits. First the employer must identify the benefits package. This will help to evaluate and monitor whether benefits objectives are meet in a set targets of goals. The benefits improve the employee morale, productivity and motivate the employee. The flexible benefits are synchronized with other social insurance programs that employee subscribes and the organization pays to maximize the benefits and reduce the risks of the employee. With updated communication on the benefits programs the employee confidence grows and organizations’ values are meet. The benefits choice highly influences the employee satisfaction toward the organization (Raymond A. Noe, 2011). Self managed teams incorporate a wide range of benefits. With team decision making capabilities, productivity is improved, there is a high interconnection between the employees and there can be negotiated flexible benefits depending on the job roles and responsibilities. Depending on the personal life different employees have different scope of priorities. Thus a health care plan may differ according to responsibilities and personal life. A 55 yrs. old man need a cover for himself, and the wife and the rest cover channeled to other retirement plans where as a 30yr old single mum needs a comprehensive cover for herself and children. All these scenarios can be negotiated on a team level and budgeted for with little input for he management. The team can decide on the flexibility of the job apply mode of flexibility depending on the work schedules and responsibilities of each employee. The compressed work schedules can be incorporated for the employees who are furthering their studies externally. The tele-commuting can be applied for the sales and marketing workers who’s productivity is measured via the sales targets and other factors and have a little to do in daily production of

Wednesday, November 20, 2019

Complementary and Alternative Medicine (CAM) - CAM Therapies Assignment - 2

Complementary and Alternative Medicine (CAM) - CAM Therapies - Assignment Example The authors of the article document the profiles of most likely candidates for complimentary alternative medicine (CAM). This paper uses the authors’ context to discuss the reasons why some people opt for CAM, the demographic that is most susceptible to CAM, and how the article has contributed to the study of CAM practices in terms of benefits and distractions of its modality. Individuals select complimentary alternative medicine (CAM) for three major reasons when compared to the traditional allopathic methods of healing. Primarily, individuals who do not go for checkups or attend conventional medical facilities for medical care develop a tendency to seek alternative medicine. For instance, the study depicts that about 19.3% of the population did not seek conventional medical care in a 12-month period. Another reason why some people prefer complimentary alternative medicine (CAM) to conventional medicine is that such individuals have more health problems. The study reveals that 14.7 million people with more health problems could not seek conventional care due to cost and non-cost factors. Perhaps such individuals think that contemporary alternative medicine is more convenient and affordable when compared to the conventional medicine. In as much as education and gender appeared to be the key predisposing factors, enabling factors such as insurance coverage and poverty status did not directly associate individuals to complimentary alternative medicine (CAM). Huge disparities exist in the demographics and profile of the individuals who are prone to complimentary alternative medicine. Approximately 19% of people who did not seek conventional care over the past one years of the study were highly likely to opt for complimentary alternative medicine (CAM). Of these, 38.4% had some health needs with others harboring acute cases. Primarily, 25% of the people who did not use conventional care sought complimentary alternative care. It implies that most of the

Monday, November 18, 2019

Comparison on Pietro Germi's film Divorce, Italian Style and Martin Essay

Comparison on Pietro Germi's film Divorce, Italian Style and Martin Scorsese's film Goodfellas - Essay Example Clearly, their future, their past was something that was hidden in the dark corners of their minds (Liehm 56). Germi’s film Divorce; Italian style examines ideas like social customs through a shadowy comedy about a gentleman, Ferdinando. He attempts at thinking of reasonable and legal way in which he can get divorced from his wife. This reason behind all this thinking is because Ferdinando wants the freedom to marry his true purpose of craving, his 16 year-old cousin. In this mirror, we can clearly see that the Italian social life is extremely at odds with each other. The illegal divorce and the stigmatization of women in society clearly show that something is extremely at stake. In a lot of many ways, Ferdinando’s actions show the extreme levels of peculiarity the society can get to. Additionally, the manner in which Fernando gets annoyed his wife, just serve at great to show us the banalities of the two characters. What is quite unbelievable is that the society well accepts Fernando’s decision to murder his wife. This is like adding salt to injury. In any case, it high lights how callous the society can get (Liehm 96). Martin Scorsese’s film Goodfellas is wrought in sinister gangster activities. In terms of courses of texture, no film comes near it. In short, this means that it ahs shares a large monogyny in the sphere of rivalry, detail, and expansiveness. It covers widely the gangster life-style. In this film, the gangsters are mostly men, and such they have the slightest tinge of idea about of appropriate attitudes, the notion of masculinity, and certain inclinations. Some of the crucial aspects in this film and the predominately male gangster society include reputation, trustworthiness, and brazenness. Ideally, the idea of male masculinity is expressed in the manner in which the characters are concerned with the welfare of each other by

Saturday, November 16, 2019

Cloud computing security

Cloud computing security Abstract The term Cloud computing becomes more popular day by day. As this is happening, security concerns start to arise. Maybe the most critical one is that as information is spread into the cloud, the owner starts to lose the control of it. In this paper we attempt to give a brief overview of what is described by the term Cloud computing and provide a small introduction to what we mean by Cloud computing security [Brunette, 2009]. Make a discussion of what are the security benefits that Cloud computing introduces and also the security risks that arise due to its adaptation according to [ENISA, 2009]. Index Terms Cloud, security, risks, security benefits. Introduction Cloud computing funds started to build in early 90s. The main idea behind cloud computing is to separate the infrastructure and the mechanisms that a system is composed of, from the applications and services that delivers [Brunette, 2009]. Clouds are designed in such a way that can scale easily, be always available and reduce the operational costs. That is achieved due to on demand multi-tenancy of applications, information and hardware resources (such as network infrastructure, storage resources and so on). According to [Mell, 2009] Cloud computing is composed by five Essential Characteristics, three Service Models and four Deployment Models as shown in figure bellow. More details on each of the above components can be found in [Mell, 2009] Security The way that security control is implemented on Cloud computing is most of the times similar to this of traditional IT environments. But due to the distributed nature of the assets security risks vary depending on the kind of assets in use, how and who manages those assets, what are the control mechanisms used and where those are located and finally who consumes those assets [Brunette, 2009]. Furthermore earlier we mentioned that multi-tenancy. This means that a set of policies should be implementing how isolation of resources, billing, segmentation and so on is achieved is a secure and concise way. In order to measure whether the security that a Cloud Provider (CP) offers is adequate we should take under consideration the maturity, effectiveness, and completeness of the risk-adjusted security controls that the CP implements. Security can be implement at one or more levels. Those levels that cover just the Cloud infrastructure are: physical security, network security, system security and application security. Additionally security can take place at a higher level, on people, duties and processes. It is necessary at this point to have understanding of the different security responsibilities that CPs and end users have. And also that sometimes even among different CPs the security responsibilities differ. Security Benefits [ENISA, 2009] in its report has spotted the following top security benefits that arise due to the use of Cloud computing. Security and the benefits of scale: when implementing security on a large system the cost for its implementation is shared on all resources and as a result the investment end up being more effective and cost saving. Security as a market differentiator: as confidentiality, integrity and resilience is a priority for many the end users, the decision on whether they will choose one CP over another is made based on the reputation this CP has on security issues. Hence competition among CPs made them provide high level services. Standardise interfaces for managed security services: as CPs use standardise interfaces to manage their security services the Cloud computing market benefits from the uniformity and tested solutions this introduces. Rapid, smart scaling of resources: Cloud computing is considered resilient since it has the ability to dynamically reallocate resources for filtering, traffic shaping, authentication, encryption. Audit and evidence gathering: since virtualization is used in order to achieve Cloud computing, it is easy to collect all the audits that we need in order to proceed with forensics analysis without causing a downtime during the gathering process. More timely, effective and effective updates and defaults: another thing that Cloud computing benefits from virtualization is that virtual machines (VM) can come pre-patched and hardened with the latest updates. Also in case of a configuration fault or a disaster caused by changes made on the VM, we can rollback to a previous stable state. Benefits of resource concentration: having all of your resources concentrated makes it cheaper to maintain and allows physical access on those easier. That outweighs most of the times the risk the disadvantages that this generates. Security Risks The following classes of cloud computing risks were identified by [ENISA, 2009]. Loss of governance: as users do not physically posses any resources, CPs can take control on a number of resources. If those resources are not covered from an SLA security risks arise. Lock-in: as we write this paper there is still no standardization on how to move data and resources among different CPs. That means in case a user decides to move from a CP to another or even to migrate those services in-house, might not be able to do so due to incompatibilities between those parties. This creates a dependency of the user to a particular CP.. Isolation failure: one of the disadvantages of multi-tenancy and shared resources occurs when the resource isolation mechanism fails to separate the resource among users. That can occur either due to an attack (guest-hopping attacks) or due to poor mechanism design. In present days attacks of this kind are pretty rare compared to the traditional Oss but for sure we cannot rely just on that fact. risk category covers the failure of mechanisms separating storage, memory, routing and even reputation between different tenants. Compliance risks: there is a possibility that investing on achieving certification is put under risk due to the following: The CP cannot provide evidence of their own compliance with the relevant requirements The CP does not permit audit by the cloud customer (CC). Also it is possible that compliance with industry standards is not able to be achieved when using public Cloud computing infrastructure. Management interface compromise: CPs provide to the users, management interface for their resources on public Cloud infrastructures. That makes those interfaces available over the internet allowing remote access applications or web browsers vulnerabilities to allow access on resources from unauthorised users. Data protection: CP is possible to handle data in ways that are not known (not lawful ways) to the user since the users looses the complete governance of the data. This problem becomes even more obvious when data are transferred often between locations. On the other hand, there are lot of CPs that provide information on how data are handled by them, while other CPs offer in addition certification summaries on their data processing and data security activities. Insecure or incomplete data deletion: there are various systems that upon request of a resource deletion will not completely wipe it out. Such is the case with Cloud computing as well. Furthermore difficulties to delete a resource on time might arise due to multi-tenancy or dues to the fact that many copies of this resource can exist for backup/ redundancy reasons. In cases like this the risk adds to the data protection of the user is obvious. Malicious insider: there is always that possibility that an insider intentionally causes damage. For that reason a policy specifying roles for each user should be available. The risks described above constitute the top security risks of cloud computing. [ENISA, 2009] further categorises risks into policy and organizational risks, technical risks, legal risks and finally not specific risks. Vulnerabilities The list of vulnerabilities that follows [ENISA, 2009], does not cover the entirety of possible Cloud computing vulnerabilities, it is though pretty detailed. AAA Vulnerabilities: Special care should be given on the authentication, authorization and accounting system that CPs will use. Poor designed AAA systems can result to unauthorized users to have access on resources, with unwanted results on both the CP (legal wise) and the user (loss of information). User provisiontion vulnerabilities: Customer cannot control provisioning process. Identity of customer is not adequately verified at registration. Delays in synchronisation between cloud system components (time wise and of profile content) happen. Multiple, unsynchronised copies of identity data are made. Credentials are vulnerable to interception and replay. User de-provisioning vulnerabilities: Due to time delays that might occur, credential of user that have earlier logged out might appear to still be valid. Remote access to management interface: Theoretically, this allows vulnerabilities in end-point machines to compromise the cloud infrastructure (single customer or CP) through, for example, weak authentication of responses and requests. Hypervisor Vulnerabilities: In virtualized environments Hypervisors is a small piece of middleware that is used in order to be able to control the physical resources assigned to each VM. Exploitation of the Hypervisors layer will result on exploiting every single VM on a physical system. Lack of resource isolation: Resource use by one customer can affect resource use by another customer. For example IaaS infrastructures use systems on which physical resources are shared among VMs and hence many different users.. Lack of reputational isolation: The resource sharing can result on one user acting in such a way that its actions have impact on the reputation of another user. Communication encryption vulnerabilities: while data move across the internet or among different location within the CP premises it is possible that someone will be reading the data when poor authentication, acceptance of self-signed certificates present and so on. Lack of or weak encryption of archives and data in transit: In conjunction with the above when failing to encrypt data in transit, data held in archives and databases, un-mounted virtual machine images, forensic images and data, sensitive logs and other data at rest those are at risk. Poor key management procedures: Cloud computing infrastructures require the management and storage of many different kinds of keys; examples include session keys to protect data in transit, file encryption keys, key pairs identifying cloud providers, key pairs identifying customers, authorisation tokens and revocation certificates. Because virtual machines do not have a fixed hardware infrastructure and cloud based content tends to be geographically distributed, it is more difficult to apply standard controls, such as hardware security module (HSM) storage, to keys on cloud infrastructures. Key generation: low entropy for random number generation: The combination of standard system images, virtualisation technologies and a lack of input devices means that systems have much less entropy than physical RNGs Lack of standard technologies and solutions: This is the case of lock-in risk, where users cannot move across different providers due to the lack of standards. No control on vulnerability assessment process: If CPs will not prevent their users from port scanning and testing for possible vulnerabilities and also there is no audit on the time of use (ToU) for a user (something that places responsibility on the customer) severe infrustrusture security problems will arise. Possibility that internal (Cloud) network probing will occur: Cloud customers can perform port scans and other tests on other customers within the internal network. Possibility that co-residence checks will be performed: Side-channel attacks exploiting a lack of resource isolation allow attackers to determine which resources are shared by which customers. Lack of forensics readiness: While the cloud has the potential to improve forensic readiness, many providers do not provide appropriate services and terms of use to enable this. For example, SaaS providers will typically not provide access to the IP logs of clients accessing content. IaaS providers may not provide forensic services such as recent VM and disk images. Sensitive media sanitization: Shared tenancy of physical storage resources means that sensitive data may leak because data destruction policies applicable at the end of a lifecycle may either be impossible to implement because, for example, media cannot be physically destroyed because a disk is still being used by another tenant or it cannot be located, or no procedure is in place. Synchronizing responsibilities or contractual obligations external to cloud: Cloud customers are often unaware of the responsibilities assigned to them within the terms of service. There is a tendency towards a misplaced attribution of responsibility for activities such as archive encryption to the cloud provider even when it is clearly stated in the terms of the contract between the two parties that no such responsibility has been undertaken. Cross cloud applications creating hidden dependency: Hidden dependencies exist in the services supply chain (intra- and extra-cloud dependencies) and the cloud provider architecture does not support continued operation from the cloud when the third parties involved, subcontractors or the customer company, have been separated from the service provider and vice versa. SLA clauses with conflicting promises to different stakeholders: An SLA might include terms that conflict one another, or conflict clauses made from other providers. SLA causes containing excessive business risk: From CPs perspective an SLA can hide a bunch of business risks when someone thinks of the possible technical failures that might arise. At the end user point SLAs can include terms that can be disadvantageous. Audit or certification not available to customers: The CP cannot provide any assurance to the customer via audit certification. Certification schemes not adapted to cloud infrastructures: CPs will not really take any actions to provide security measures that comply with Cloud computing security standards. Inadequate resource provisioning and investments in infrastructure: This vulnerability comes in hand with the one that follows. Provisioning of resources should be done carefully in order to avoid failures of the provided services. No policies for resource capping: CPs should make really well provisioning of their resources. Also end users should be able to configure the resources that are allocated to them. If the limits of requested resources exceed this of the available resources results can be unpredictable. Storage of data in multiple jurisdictions and lack of transparency: Multiple copies of users data can exist since mirroring of the data is performed in order to achieve redundancy. During that time the user should we aware of where are those data stored. Such a move can introduce unwanted vulnerabilities since CPs may violate regulations during this time. Lack of information jurisdictions: there might be a case where data are stored using high level of user rights. In that case end users should be aware of it in order to take preventing measures. Conclusion In this paper we tried to give a brief overview of cloud computing and discuss what security on Cloud computing means. Furthermore, we made it easy for the reader to understand what the benefits and risks of moving toward Cloud computing are. Vulnerabilities of Cloud computing are listed as those were described in [ENISA, 2009], allowing us to have a full view of what are the considerations that we should keep in mind when moving on Cloud computing. It is also well understood that exhaustive risk and security control is not recommended on all Cloud computing implementations. The level of control should always depend on prior evaluation. There are still lot of open research areas on improving Cloud computing security, some of those are; Forensics and evidence gathering mechanisms, resource isolation mechanisms and interoperability between cloud providers. References [ENISA, 2009] ENISA editors. (2009). Cloud Computing Benefits, risks and recommendations for information security. . [Accessed 25 March 2010] [Brunette, 2009] Glenn Brunette and Rich Mogull (2009). Security Guidance for Critical Areas of Focus in Cloud Computing, Version 2.1 [Accessed 25 March 2010] [Mell, 2009] Peter Mell and Tim Grance (2009). The NIST Definition of Cloud Computing, Version 15. [Accessed 26 March 2010]

Wednesday, November 13, 2019

Should Marriage Be Left To The States? Essay -- essays research papers

My short answer is "no", but let me explain. Before answering what I think the situation should be, it is helpful to look at what the situation is. Currently family law is a matter left to a great extent to the states. States have the power to decide who may marry, the legal process required to do so, and what the legal consequences of that marriage are within the state. In all these matters states differ from each other. The state is limited in its actions, though, to the requirement of its own constitution as well as the constitution of the United States. What those constitutions require is often a matter of great debate, but the ultimate judge is the state's highest court for matters pertaining to its own constitution, and the Supreme Court of the US for matters in the US Constitution. In either case the constitution can be amended by a process laid out therein. So, for example, the US has ruled that a state may not forbid interracial marriages, or forbid inmates from m arrying (except under compelling reasons). I am not aware of any argument claiming that the US Constitution currently forbids same-sex marriage, although there are arguments that it requires it either as matter of a fundamental right to marry, or as a matter of equal protection. It has been noted that the federal government has banned polygamy, but I don't believe this is quite true. The US Congress is ultimately responsible for the laws in DC and the territories. It thus banned polygamy in Utah when Utah was a territory. The Congress also the power to decide whether to admit a new state to the Union (both these powers are in Article IV, Sec. 3). Thus Congress refused to admit Utah to the union unless it's state constitution perpetually forbade polygamy. If Congres had thought it had the power to ban polygamy in the states, this would not have been necessary. There is also the issue of section 1 from the above Article IV which guarantee Full Faith and Credit shall be given in each State to the public Acts, Records, and judicial Proceedings of every other State. (Section 2 could also lead to some issues, but as it has been interpreted these issues seem minor). Here is briefly my understanding of how the SCOTUS has interpreted that clause, based primarily on my reading from Andrew Koppelman's book (see left sidebar) which devotes all of chapter 5 to this subject. Fulll Faith and ... ...ough a process they decided upon. As I said, I'm not a big fan of the state as sovreign concept, but it's what we have right now. Unless we are going to abandon that concept, it is up to the state to deal with matters of how their own constitution should be interpreted. Other than prohibition (which many say in hindsight was a terrible idea) the only time we limit what a state can do within its own territory is when otherwise it would violate the right of an individual as a US citizen. In summary, if I could write the constitution as I saw fit, states wouldn't have rights and marriage policy would be set by the federal government. If we are going to leave marriage policy to the states, as the constitution currently does, I see no reason to carve out an exception for same-sex marriage. States already have the requirement to provide equal protection in all of their laws including marriage, and I believe this would require same-sex marriage. I have no problem with somebody pushing for an amendment to the constitution if they see a change as necessary. I would hope the amendment would be narrowly tailored, though, to address the specific problem or problems it is designed to address.

Monday, November 11, 2019

Final Exam Solutions (Leadership and Organizational Behavior) Essay

1. TCO A, B) Define organizational behavior and list the four emotional intelligence competencies that contribute to understanding ourselves and others within the organizational behavior environment. 2. (TCO D) Referring to the team decision-making process, define consensus and unanimity and explain the difference between the two. 3. (TCO E, F) Although conflict is usually considered a negative experience to be avoided, it actually has the potential to produce positive organizational outcomes. Please identify three ways in which conflict can be a positive influence. 4. (TCO G) There are six sources of position power in organizational settings. Identify and define three of these sources. 5. (TCO H, I, J) The senior executive team at AllGoodThings.com, after a strategy review session with the Board of Directors, has decided that it’s time to invest some time and capital in improving the corporate culture. The company has rebounded from a near calamity two years ago, and while it was a great scramble, the company survived and is in the strongest position ever. They knew that the culture had been strained by the episode and wanted sincerely to work to bring things back to â€Å"normal.† With the assistance of local HR offices, a case was made to the employee population that certain aspects of their current culture might have suffered over the past few years and that it was time to think about change. They announced that they would be undergoing an organizational culture review and that everyone’s opinion was valued. A whopping 79% of the employees participated in the survey that they administered. Senior management had worked with the consultants for a few months before the survey was given and had determined their â€Å"Ideal† scores. The survey confirmed their suspicions. 6. (TCO C) As a manager you are in a situation where a key employee seems to have lost his excitement about the job. The employee’s familiar positive tone and high energy approach to the job and the workplace seem to be on the wane. You really don’t know what is going on with this person. But, you can try to start to understand this employee by examining various motivation theories. Use elements from each of Maslow’s theory, Herzberg’s Two-Factor theory, and Equity theory and assemble your own motivation theory to help you to start understanding this employee. Be sure to fully explain and define all elements that you use in your new model of motivation. Finally, compose a short case to demonstrate how your motivation model can actually be applied. 7. (TCO G) The Michigan and Ohio State studies represent seminal research on leadership theory. Both studies identified two basic forms of leader behaviors. What were the similarities in the findings from these two studies and what was the significance of the research? 8. (TCO A, B) In order to meet organizational goals and objectives management must comprehend organizational behavior in relationship to the functions of management. List and describe the management process functions and describe how the five personality traits contribute to the management process. 9. (TCO E, F) Neff Incorporated is a small business with 100 employees and 4 managers. 10.(TCO D) Define the concept of social loafing. Why does social loafing occur? Give an example of social loafing and a suggestion for how to prevent it.

Saturday, November 9, 2019

Gsm Specification & Air Interface

[pic] WHAT IS GSM GSM: GSM (Global System for Mobile Communications: originally from Groupe Special Mobile) is the most popular standard for mobile telephone systems in the world. The GSM Association, its promoting industry trade organization of mobile phone carriers and manufacturers, estimates that 80% of the global mobile market uses the standard. GSM Specifications-I RF Spectrum GSM 900 1. Mobile to BTS (uplink): 890-915 MHz 2. BTS to Mobile (downlink):935-960 MHz 3. Bandwidth: 2* 25 MHz GSM 1800 1. Mobile to BTS (uplink): 1710-1785 MHz 2. BTS to Mobile (downlink) 1805-1880 MHz 3. Bandwidth: 2* 75 MHz GSM Specification-II 1. Carrier Separation : 200 KHz 2. Duplex Distance : 45 MHz 3. No. of RF carriers : 124 4. Access Method : TDMA/FDMA 5. Modulation Method: GMSK 6. Modulation data rate: 270. 833 Kbps ADVANTAGES OF GSM: 1. GSM uses radio frequencies efficiently & due to the digital radio path the system tolerates more intercellular disturbances. 2. The average quality of speech achieved is better than in existing analogue systems. 3. Data transmission is supported throughout the system. 4. Speech is encrypted & subscriber information security is guaranteed. . Due to the ISDN compatibility, new services are offered compared to analogue systems. 6. International roaming is technically possible within all the countries concerned. 7. The large market toughens the competition & lowers the prices both for investments & usages. GSM SPECIFICATIONS The main idea behind the GSM specifications is to define several open interfaces which then are limiting certain parts of the GSM system. Because of this interface, openness the operator maintaining the network may obtain different parts of the network from different GSM network suppliers. Also when an interface is open it defines strictly what is happening through the interface & this in turn strictly defines what kind of actions/procedures/functions should ne implemented between the interfaces. STRUCTURE OF GSM: [pic] GSM Specifications: Before looking at the GSM specifications, it is important to understand the following basic terms: * Bandwidth —the range of a channel's limits; the broader the bandwidth, the faster data can be sent * Bits per second (bps) —a single on-off pulse of data; eight bits are equivalent to one byte * Frequency —the number of cycles per unit of time; frequency is measured in hertz (Hz) Kilo (k) —kilo is the designation for 1,000; the abbreviation kbps represents 1,000 bits per second * Megahertz (MHz) —1,000,000 hertz (cycles per second) * Milliseconds (ms) —one-thousandth of a second * Watt (W) —a measure of power of a transmitter Specifications for different personal communication services (PCS) systems vary among the different PCS networks. Listed below is a description of the specifications and characteristics for GSM. * Frequency band — the frequency range specified for GSM is 1,850 to 1,990 MHz (mobile station to base station). * Duplex distance —The duplex distance is 80 MHz. Duplex distance is the distance between the uplink and downlink frequencies. A channel has two frequencies, 80 MHz apart. * Channel separation —The separation between adjacent carrier frequencies. In GSM, this is 200 kHz. * Modulation —Modulation is the process of sending a signal by changing the characteristics of a carrier frequency. This is done in GSM via Gaussian minimum shift keying (GMSK). * Transmission rate —GSM is a digital system with an over-the-air bit rate of 270 kbps. * Access method —GSM utilizes the time division multiple access (TDMA) concept. TDMA is a technique in which several different calls may share the same carrier. Each call is assigned a particular time slot. * Speech coder —GSM uses linear predictive coding (LPC). The purpose of LPC is to reduce the bit rate. The LPC provides parameters for a filter that mimics the vocal tract. The signal passes through this filter, leaving behind a residual signal. Speech is encoded at 13 kbps. GSM Subscriber Services There are two basic types of services offered through GSM: telephony (also referred to as tele services) and data (also referred to as bearer services). Telephony services are mainly voice services that provide subscribers with the complete capability (including necessary terminal equipment) to communicate with other subscribers. Data services provide the capacity necessary to transmit appropriate data signals between two access points creating an interface to the network. In addition to normal telephony and emergency calling, the following subscriber services are supported by GSM: * Dual-tone multi-frequency (DTMF) —DTMF is a tone signaling scheme often used for various control purposes via the telephone network, such as remote control of an answering machine. GSM supports full-originating DTMF. * Facsimile group III —GSM supports CCITT Group 3 facsimile. As standard fax machines are designed to be connected to a telephone using analog signals, a special fax converter connected to the exchange is used in the GSM system. This enables a GSM–connected fax to communicate with any analog fax in the network. * Short message services —A convenient facility of the GSM network is the short message service. A message consisting of a maximum of 160 alphanumeric characters can be sent to or from a mobile station. This service can be viewed as an advanced form of alphanumeric paging with a number of advantages. If the subscriber's mobile unit is powered off or has left the coverage area, the message is stored and offered back to the subscriber when the mobile is powered on or has reentered the coverage area of the network. This function ensures that the message will be received. * Cell broadcast —A variation of the short message service is the cell broadcast facility. A message of a maximum of 93 characters can be broadcast to all mobile subscribers in a certain geographic area. Typical applications include traffic congestion warnings and reports on accidents. * Voice mail —This service is actually an answering machine within the network, which is controlled by the subscriber. Calls can be forwarded to the subscriber's voice-mail box and the subscriber checks for messages via a personal security code. * Fax mail —With this service, the subscriber can receive fax messages at any fax machine. The messages are stored in a service center from which they can be retrieved by the subscriber via a personal security code to the desired fax number. Supplementary Services GSM supports a comprehensive set of supplementary services that can complement and support both telephony and data services. Supplementary services are defined by GSM and are characterized as revenue-generating features. A partial listing of supplementary services follows. * Call forwarding —This service gives the subscriber the ability to forward incoming calls to another number if the called mobile unit is not reachable, if it is busy, if there is no reply, or if call forwarding is allowed unconditionally. Barring of outgoing calls —This service makes it possible for a mobile subscriber to prevent all outgoing calls. * Barring of incoming calls —This function allows the subscriber to prevent incoming calls. The following two conditions for incoming call barring exist: baring of all incoming calls and barring of incoming calls when roaming outside the home PLMN. * Advice of charge (AOC) —The AOC service provides the mobile subscribe r with an estimate of the call charges. There are two types of AOC information: one that provides the subscriber with an estimate of the bill and one that can be used for immediate charging purposes. AOC for data calls is provided on the basis of time measurements. * Call hold —This service enables the subscriber to interrupt an ongoing call and then subsequently reestablish the call. The call hold service is only applicable to normal telephony. * Call waiting —This service enables the mobile subscriber to be notified of an incoming call during a conversation. The subscriber can answer, reject, or ignore the incoming call. Call waiting is applicable to all GSM telecommunications services using a circuit-switched connection. Multiparty service —The multiparty service enables a mobile subscriber to establish a multiparty conversation—that is, a simultaneous conversation between three and six subscribers. This service is only applicable to normal telephony. * Calling line identification presentation/restriction —These services supply the called party with the integrated services digital network (ISDN) number of the calling party. The restriction se rvice enables the calling party to restrict the presentation. The restriction overrides the presentation. * Closed user groups (CUGs) —CUGs are generally comparable to a PBX. They are a group of subscribers who are capable of only calling themselves and certain numbers. AIR INTERFACE In cellular telephone communications, the air interface is the radio-frequency portion of the circuit between the cellular phone set or wireless modem (usually portable or mobile) and the active base station. As a subscriber moves from one cell to another in the system, the active base station changes periodically. Each changeover is known as a handoff. A cellular connection is only as good as its weakest link, which is almost always the air interface. Radio-frequency (RF) circuits are subject to many variables that affect signal quality. Factors that can cause problems include: * Use of the handheld phone set or portable wireless modem inside buildings, cars, buses, trucks, or trains * Proximity to human-made, steel-frame obstructions, especially large buildings and freeway overpasses * Abundance of utility wires that can reflect radio signals and/or generate noise that interferes with reception * Irregular terrain, particularly canyons and ravines * Inadequate transmitter power in phone set or wireless modem Poorly designed antenna in phone set or wireless modem In addition to these variables, some cellular networks have inadequate coverage in certain geographic areas. Usually this is because there are not enough base stations to ensure continuous communications for subscribers using portable (handheld) phone sets. As a network evolves, more base stations may be installed in a given region, and in that case, this problem will dim inish with time. Conversion of a network from analog to digital can result in dramatic improvement.

Wednesday, November 6, 2019

Professional Certification and Your Career

Professional Certification and Your Career Professional certification is a process by which a person develops the knowledge, experience, and skills to perform a specific job. Once the individual completes a course of study, he or she receives a certificate earned by passing an exam that is accredited by an organization or association that monitors and upholds prescribed standards for the particular industry involved. The National Organization for Competency Assurance (NOCA) is a leader in setting quality standards for credentialing organizations. A wide variety of industries and careers offer professional certification, from highly technical jobs and human services of all kinds to jobs in the arts, including ballroom dancing. In each case, the certificate assures employers, customers, students, and the public that the certificate holder is competent and professional. In some professions, certification is a requirement for employment or practice. Doctors, teachers, Certified Public Accountants (CPAs), and pilots are examples. What’s in It for You? Professional certification shows employers and clients that you are committed to your profession and are well-trained. It gives them confidence in your abilities  because it proves that your skills have been evaluated and approved by a well-regarded professional organization. Certification makes you more valuable to employers and so you can expect to: Enjoy better employment and advancement opportunitiesHave a competitive advantage over candidates without certificatesEarn higher wagesReceive tuition reimbursement for continuing education A Sampling of Careers Requiring Certification Many of the careers that require certification are represented here at About.com. Below is a list of articles on various types of certifications. In the end, there is also a link to the list of NOCA member organizations that require certificates. It offers an interesting glance at the various types of industries from which to choose if you’re uncertain about which certificate you want. Certified Meeting ProfessionalCoast Guard Captain’s LicenseCulinary Arts CertificatesDatabase CertificationsDesktop Publishing CertificationESL CertificationGraphic DesignInterior DecoratingLandscaping Certificate ProgramsLogistics and Supply Chain ManagementParalegal certificatesProfessional CounselingProfessional Massage TherapyProfessional Studies Certificate in OperaReal estateRetail CertificationSpecialist Certificate for Sign Language InterpretersTechnology Certification GlossaryHighest paying jobs in the technology industry NOCA’s list of member organizations State Certification Requirements Many of the professions that require or offer certification are governed by the state in which the certificate holder practices. Your school or association will help you understand these requirements, but you can also find them at each state’s government website. Search for: state.your two-letter state code here.us/. Example: state.ny.us/. On the home page for your state, search for certifications. Choosing the Best School There are almost as many requirements for earning a certificate as there are fields requiring them, so how you go about becoming certified has everything to do with what kind of certificate you want and what you want to do with it. First, know the differences between all the different types of schools so you can choose the right school for you. Begin your search by visiting the websites of the associations and organizations that govern or accredit the schools in the field you have chosen. On the Internet, search for the name of your field and associations, organizations, and schools: Search: nursing associations results in the American Nurses AssociationSearch: pilot associations results in the Aircraft Owners and Pilots AssociationSearch: CPA organizations results in the American Institute of Certified Public AccountantsSearch: project management schools results in both directories like the Trade Schools Directory and specific schools such as the Project Management Institute at Capella University Online Schools If you think an online school would work best for you because of the flexibility it provides, read up on online certificates before you choose a school. Financial Aid Paying for school is a concern for many students. Loans, grants, and scholarships are available. Do your homework before going to school: Paying for Business SchoolFAFSASallie Maes Scholarship Search Continuing Education Most professional certifications require that certificate holders complete a certain number of hours of continuing education annually or bi-annually in order to remain current. The number of hours varies by state and field. Notices are generally sent out by the governing state and/or association, as is literature advertising continuing education opportunities, conferences, and conventions. Make the Most of Continuing Education Conferences Many professional associations gather their members yearly in the form of conferences, conventions, and/or trade shows to provide continuing education seminars, to discuss the state of the profession and new best practices, and to showcase the latest products and services. Networking at these gatherings can be extremely valuable to professionals.

Monday, November 4, 2019

Merriwell Bag Company Case Study Example | Topics and Well Written Essays - 500 words

Merriwell Bag Company - Case Study Example Furthermore, demand forecasting helps in constructing the pricing decisions as well as estimating the investment requirements for the future use (Lapide, 2006). From the demand forcast, it can be noted that the demand for the bags are maximum in the market in the pick season. It shows that Merriwell Bag Company’s bag demands depend largely upon its seasonality. However, it can also be observed that the demand for the bag declines steeply in the market during the off-season. Even though, from an overall perspective a growing trend can be witnessed in the demand forecasted. To certain extent the accuracy of forecasting can be improved through selecting separate forecasting groups with proper management control system. The primary objective of forecasting group is to make plans in order to collect appropriate information related to demand. The members of the forecasting group should be well trained in this regards. Members of the group should use both the qualitative and quantitative method in forecasting to gain more accurate information along with development of new measures for improving forecasting in future. After every session the group member should measure the processed method and re-analyze the data collected to minimize errors (Moon, Mentzer, Smith, & Garver, 1998). The forecasting method used by Ed Merriwell in the prior years was based upon his ‘feel’ which has been recently observed as ineffective in terms of accuracy. According to the quantitative method used, the sales of the organization are likely to increase during the entire year of 2008, especially in the season time. However, in establishing the new sales forecast, Ed Merriwell’s ‘feel’ is quite likely to have a negative impact on the operational process owing to the changes in the personnel associated with the customer purchasing departments along with the rapid increase in the short-shipped accounts. It is worth mentioning in this regard that quantitative method

Saturday, November 2, 2019

Journal critique Essay Example | Topics and Well Written Essays - 1000 words

Journal critique - Essay Example And this study was carried out to understand the factors that affect the international students so that in the future, programs can be designed so as to make their stay comfortable, easy and enjoyable rather than a stressful experience. Although the study started with a good intention, while reading the article, it becomes evident that the research was not well planned and many things were missed out. First of all, depression and anxiety are two different things. ‘Depression’ can be defined as a condition of emotional dejection and sadness which can go on for weeks, months and also for years ( Depression â€Å"n.d.†). While ‘anxiety’ is a mental ‘state’ or a feeling of apprehension characterized by stress ( Anxiety â€Å"n.d.†). The major difference is that depression can be for months together while anxiety is temporary state of mind which occurs in response to certain event in life . The study of the depression and anxiety should be carried out separately and not together. While answering the questions, the participants might not be able to clearly point out if what they are feeling is a something temporary or permanent in nature. The second most important thing about the study is the method that was used to conduct the study. The article says that the e-mail of request to participate in a study was sent to 3000 students and only 440 actually participated. This narrowed down the scope of the study and so, some of the conclusions could not be considered permanent. For e.g. It was found that the students from Latino ethnicity had higher level of depression than the students from Asian ethnicity. However, as the sample which was studied had very small number of

Thursday, October 31, 2019

FACILITIES, STADIA AND THE ENVIRONMENT Essay Example | Topics and Well Written Essays - 2000 words

FACILITIES, STADIA AND THE ENVIRONMENT - Essay Example Some of these international sports events uphold the principles of promoting goodwill and friendship while the Olympic Games promotes mutual interdependence and economic cooperation, as what is shown in the logo. There are lots of Olympic sports events that were inherited from the Ancient Greek Olympic. Some of these were the Javelin throw, which was originally women's game; walkathon, originated by the Greeks and Romans; and, wrestling. The Athens Olympic Stadium stands as monument of the Ancient Greek sports in the modern world. The magnificence of Athens Olympic Stadium reminds the world that at one time, the Greek nation who owns this stadium were the ones dominant in sports, and their keen interest in reviving the glory of sports as evidence by the huge budget they spent merely for the renovations of the stadium. The stadium is indeed, believed to be "the biggest and most beautiful in the world."(Rizzo, internet source) It was the Greek who introduced Olympic Games in the world which paved the way for the modern Olympic Sports events. Originally, the Olympic Games dated from the Mycenaean times and were "held in honor of Zeus."(Athens 2004) In Greek and Roman times, "the track provided for foot races."(Universal World Reference Ency. p.4661) The stadium eventually came to be oval shaped and were sometimes built against a hill in order to enable spectators to view the races from elevated seats out into the hill.(ibid) The games were originally designated "exclusively for young Greek males confronting each other for the glory and wreath of olive leafs,"(Athens 2004) because Olympia was dedicated to Zeus and was therefore sacred area for men. The venue of most sports events were at the temple of Zeus in the fields of Olympia. Thus, the early games were held in the "character of festival of sports."(History of Olympic Games) The Olympic Games were highly regarded as festival that they would even stop wars to give way for the start of festival every full moon of August. During the games, athletes usually competed naked. They originally wore shorts but "competitors deliberately lost his short so that he could run more freely during the race in 720 .C., and clothing was then abolished"(History of Olympic Games) But the Olympic Games turned to be potentially corrupt, and finally "declared the games corrupt in 393 AD. (History of Olympic Games) Emperor Theodosius II destroyed Olympia's temple that ended the games that had been going on for centuries. However in 1870, a German excavation "unearthed the beauty and magnificent statues of the classical Greek games."(History) This archeological discovery at the sacred ground of Olympia prepared the way for the revival of the Olympic Games. Through the initiation of a Frenchman by the name of Pierre de Coubertin, the Olympic Games were re-instituted and the modern Olympics were born. With the first Olympiad "celebrated two years later in Athens where an estimated 245 male athletes from 14 nations competed in the ancient Panathenaican Stadium before a large and ardent crowd."(History) Although, the American got 9 of the 12 track and field events, Greece won the most number of medals with highlights of the victory by native peasants Spiros Louis in the first marathon race. The Olympic Stadium was later named after him. Inspired by this performance and by the revival and the return of the Olympic Ga

Tuesday, October 29, 2019

The Major Old Testament Eras Essay Example for Free

The Major Old Testament Eras Essay The Old Testament, the first section of the Christian bible has been reputed to date back to around 4000 years. Different scholars divide the old testament period into different epochs depending on the major events that occurred during this time. The occurrences may have happened in the world at that time or in the history as related by the bible. Some of the old most categorization divides the Old Testament history into primeval period/creation, patriarch era, exodus, Canaan conquest, the era of the judges, monarchial era, exile, return and restoration era. The dates of the eras are believed to have started from the beginning (4000BC). After this unique era of time, then came: the Patriarch Era around (1800-1290BC),Exodus era dated1447-1406,conquest of Canaan Era(1406-1390),The Era of Judges(1290-1050BC),the era monarchy(1050-750BC),Era of division and Exile(605-538BC)and finally the era of return and restoration (538-323BC). It is noteworthy that these given dates may not be precise and accurate. However they are archaeologically accepted. In the history of the Old Testament many outstanding events are recorded not only biblically but also secularly. This period of the existence of the old Old Testament could therefore be termed as one of the most outstanding historically active period in the history of world existence. In the primeval Era it is believed the creation took place. Heaven and earth with their contents remain inclusive were created as designed by God. In the Patriarchal Era recorded in Genesis 12-50, God in abide to reconcile with man ets requirements and laws to govern the existing generation of humans. During the Exodus, Moses led the Israelites who had been slavery in Egypt for 400yearsout of Egypt to go to the Promised Land as promised to Abraham their main descendant . This is the very period when the children of Israel of bondage stayed in the wilderness on their way to Canaan for 40 years. During this period world’s process of civilization continues in the powerful empires like Egypt. In the Era of conquest, Israelites led by Joshua after Moses death are conquering and entering Canaan hence focusing more on Joshua’s leadership. In other parts of the world the Iron Age commences, the 19th Dynasty is on and the powerful Chinese Chou Dynasty is in being. In era of Judges, there is no concrete leadership in Israel after their settlement the 19th Dynasty of Egypt is on and also the reign of raameser 2 perceived mistakenly to be spear led of the oppression to non- believers of alliterate translation by the liberal scholars of the time. In the Monarchial Era Israel comes up with Monarchy establishing a kingdom and doing away with the Judges. The king of Israel in this era was Saul, David and Solomon. Subsequently some world religions are being established secularly, it’s the period of time when a solar eclipse is recorded in Nineveh and Jerusalem on June 15th. In addition to that Mayan civilization commences in South America. After proper establishment and being of the kingdom there is division and exile of inhabitants and occupants of some portions of the kingdom go to Exile after capture by the Babylonians. Subsequently Rome was conquered by Etruscans and the existence of Buddha of India in rule hence development and establishment of Budhism. This is also time of some major prophets like Jeremiah of service to Gods people. Finally in the Era of Return and Restoration Israelites who were definitely of a generation were now set free from captivity and were to return to their original land. This is the very period that would when in the coming of the Messiah hence the New Testement. Majorly in the world, Mexander becomes the king of Macedonia and the statues of Zeus, Artenis temple Tomb of Mausollos are identified as 3rd, 4th, and 5th wonders of the ancient world respectively. In this era great scholars like: Alexander the great and Aristotle lived making there inventions remembered update. This is also the time of Confucius of China. Conclusively, these era of history are clearly cited in biblically as follows: The creation Era is found in Genesis 1-12, the Patriarch Era in Genesis 12-50, Exodus era in Exodus, Leviticus, Numbers and part of Deutronomy, conquest Era in the book of Joshua and even Deutronomy, the Era of Judges in Judges and era of Monarchy is found in Samuel and chronicles. The era of Division and Exile is found in 2kings, 2chronical, Jeremiah etc while the era of Return and restoration is chronologically cited in Jeremiah, Ezra, Nehemiah and Esther. After all these events the New Testament is ushered in with the coming of the Messiah (Jesus Christ) fulfilling the prophecies made in the Old Testament in during the existence of various prophets in various occasions and under different inspirational cases and circumstances. References NLJV (2007). Life application study bible. NY: Tyndale House Publishers. Merill. (2000). Settle for more. Alabama: Wisconsin.

Sunday, October 27, 2019

Communication Theory Has Emerged Media Essay

Communication Theory Has Emerged Media Essay Different schools of thought have defined communication in many ways. Renowned scholar, G.G. Brown defines communication as: transfer of information from one person to another, whether or not it elicits confidence. But the information transferred must be understandable to the receiver. On the other hand, Fred G. Meyer defines communication as: the intercourse by words, letters or messages. Nonetheless, the central theme in all these definitions is the exchange and flow of information between two or more parties. This may result to the use of both verbal and non-verbal cues. Evidently, communication affects human livelihood and its behaviour and there is need to demonstrate how it affects individual actions. Thus, an introspection of how communication theory has emerged from the pre-christian era to modern times responds to the need of explaining individual actions. The history of communication dates back to time immemorial, with significant variation in communication technologies evolving in tandem with shifts in socio-political and economic systems. Various modes of communication have subsequently emerged with the passage of time and technological advancements. On the other hand, we are still able to trace the history of communication to oral and written speech. An insight into how communication theory came into being is demonstrated in the Holy Bible. In the Old Testament book of Genesis chapter one, verse three, it reads: And God said, Let there be light, and there was light This expression of communication serves to show that communication existed since time immemorial. God was able to undertake creation through His speech. Again, further credence to the foundation of communication theory presents itself in the New Testament through the book of John chapter one, verses one to two; In the beginning there was the Word. The Word was with God, and the Word was God. He was with God in the beginning. Once God created man, He was able to connect with him by words. This is revealed through the stories of Adam and Eve, Abraham, Noah, Moses and many others in the bible. Further, God communicated with prophets, and his people through visions, dreams, words, signs and symbols. Notably, the Old Testament portrays the usage of communication through figures of speech, especially through metaphors. Metaphors were widely used to intimate deeper meaning in speech and writing. This attribute is well observed in the books of Proverbs and Psalms. As such, the pre-christian era was well founded in communication through language use and its mastery. The same applies to the Christian era as well which derives much of its communication foundation from language mastery. This is well exemplified through Jesus parables. Aside from the religious views of communication theory, there is also the philosophical basis for communication theory. The proponents of this school of thought are mainly Greek philosophers and historians ranging from Aristotle, Isocrates, Socrates and Plato. From their insights emerged the theory of rhetoric. Despite both Isocrates and Sophists maintaining that rhetorics objective is persuasion, Isocrates promoted its use for human improvement while Sophists held the view that rhetorics purpose was for self-praise and thrift. Given the divergent views on the purpose of rhetoric, Plato also weighed in on the matter showing favour to dialectic than to the manner of oral presentation. As such, he favoured the use of reason and rationality in arguments. On the other hand, Aristotle sought to chart a defining measure to communication theory as the mode by which a person interacts with his/her audience. Due to the insights of the aforementioned philosophers, rhetorical theory has developed to become a solid basis by which communication is defined in many sectors. Persuasion of individuals by communication extends beyond politics, media, journalism and even religion. This is achieved through the use of Aristotles Rhetoric principles which include invention, arrangement, style, persuasion and memory. Despite there being many classes of communication theories, including the seven traditions (classical rhetoric, semiotics, phenomenological, cybernetic, social psychology, sociocultural communication, and critical traditions), thee major classifications can be adopted by mode of influence; Rhetoric theory as a result of the influence of oratory speech; social communication theories resulting from socio-political changes; and theories of mass communication as a result of journalism spread. In its modern form today, rhetoric theory is interrelated with traditional forms of communication theory, e.g. semiotics. Through the propagation of text in print media or images in visual media, which are both sign elements, the mass audience is able to be persuaded along cultural lines. As such, signs and symbols are continually employed in oratory speech to move masses and influence their perception of issues. On the socio-political scope, theories such as Authoritarian, Free press, Commmunist and Social responsibility are notable. These theories help explain communication theory evolution in the wake of various social-political changes in the society. Significantly, these theories focussed on the beginning of information dissemination to large population groups and the accompanying influence on the political class e.g. the governments. Again, they pronounce some of the social plights and classification within society attributed to information access. As authoritarian leadership was the norm before the widespread prevalence of print media, governments took it upon themselves to restrict flow of information to the common people, and as such, freedom of expression was strictly guarded. Consequently, the elite class would deprive the common people the right to information and access through controlling media sources. As a result therefore, print media was in low circulation and only accessibl e to the few due its then high price. Nevertheless, with the clamour for free will in the 17th century, Libertarianism/Free press took over. This was significantly influenced by the emergence of print media which in time became affordable to the common populace and reflective of their views which were previously gagged under authoritarian leadership. On the other hand, as free press offered an avenue for expression of free will, it was noted to be devoid of social responsibility. This necessitated the need for checks and balances, especially with the development of other communication media such as radio, television and film. Social responsibility therefore advocated for accountability through government and self regulation in order to promote social welfare and equity. Free press was further limited by the communist theory which promoted media control in the guise of effective press freedom. Consequently, the medias role was to educate but not to inform the general populace. In addition, the population was expected to post opinion on issues covered by the media so as to foster the so-called greater press freedom and institute greater audience participation. In effect therefore, the Communist theory was associated as a counter to capitalism trend where the media was in the control of a few media elites and only serving their inte rests. However, the 20th century marked a dramatic shift in communication theory evolution. This was brought about by advancement in communication technology to spur the spread of journalism. Notable events that defined this spread included the occurrence of the World Wars which depicted the strength of information pre-, during, and post war. Information was a tool in itself during the warring period and as such, theories were formulated once validated. This was articulated through stimulus response theory, propaganda and many more theories. Stimulus response theory took note that mass media has a significant effect on individuals perception of issues and in response, people would normally subject themselves to viewership that conforms to their beliefs and attitudes. Propaganda theory on the other hand was used to great effect to spreading rumours and falsehoods either in favour or disfavour of a certain person or group of persons. Evidently, it was during the World Wars and in the politica l sphere that propaganda is commonly used. Derived from rhetoric theory, propagandas main objective is persuasion in order to influence peoples perception of issues at hand. Nonetheless, in the modern day setting, propaganda is also employed in advertising, marketing and socio-economic conflicts. Again, technological advancement brought with it new media of communication e.g. television, computer, mobile phones, radio and other forms such as internet and social networking. These media served to spread journalism through provision of information of news and information for public consumption. A number of theories were hence formulated to describe this phenomenon, viz: Agenda setting theory, two-step flow theory, diffusion of innovation theory and uses and gratification theory. Agenda setting theory explains a very highly effective impact of the media the ability to inform the population about essential issues. Agenda setting hypothesizes that communication consists of information and awareness. Therefore in community discussion, media interaction has an influence on community understanding of various issues. These may range from state policies, economic system, and other community issues. As a result, a classification of agenda-setting emerges; Policy-agenda setting, Media-agenda setting and public agenda-setting. Under public-agenda-setting, the publics viewpoint shows the key issues of concern; Media agenda setting shows the significance and depth of news items being covered in relation to their coverage in various media stations; Policy agenda-setting points to the influence that a reported issue has on policy makers. In effect therefore, Agenda setting has led to the prominence of the CNN Effect whereby 24-hour news channels set the international news agenda. In fact, locals in the developing nations view their news items captured in these channels as being of very prime importance. Nonetheless, Agenda setting is based on thinking that media does not necessarily indicate reality; they narrow it down and shape it; media focus on a few problems and topics bring the community to understand those problems as more essential than other problems. For this reason, agenda-setting helps individuals comprehend the role of the media in shaping news items and issues for public consumption. This is well exemplified by how media stations, publishers and news anchors set the news agenda and consequently, viewers affix much significance to the amount of broadcasted information and its position in the broadcast. The two-step theory theorizes how casual relationships play a part in changing the way in which individuals take up relevant information from media campaigns. Consequently, the primary source of information for the public is normally the newspaper and radio segments, whose information bits is adopted by opinion leaders who further relay the information to the less active segment of the society. In effect therefore, informal social groupings have some influence on society information uptake and dictate which information is worth sharing. Diffusions of Innovations theory explains the mode by which a new concept or exercise is conveyed to individuals through certain communication programs over time. Consequently, the selected mode of transfer assists in explaining the aspects that impact individuals ideas and activities. Therefore, the media selected as well as cultural interaction provide information that impacts common or well-known viewpoints. The diffusions process is therefore the procedure by which technological advancement is conveyed through certain media over a certain period among individuals in a social system. An illustration of how diffusions of innovation theory is prominent is through social media e.g. the youth accessing information and news in the internet mode via facebook. Another notable viewpoint of journalism spread mass communication in the modern times is the Uses and Gratification theory. This concept describes the uses and features of the press for diverse user groups ranging from the people, and the community in general. In order to describe how people use mass journalism to please their needs, the theory: seeks what people do with the medial; identifies their intentions for particular media use; and examines the individual effect of a particular media use. The main underlying factor of the theory is the supposition that individuals constantly seek a media channel to fulfil personal needs. Consequently, a medium is frequently used when the current purposes to use the medium results in more gratification. In light of the evolution of communication theory from pre-christian era to the modern times, it is definite that communication has evolved over time. Its mystery is captured in Gods creation act and its complexity has been researched by various scholars. The Greek philosophers made wise attempts in its definition which apparently form the cornerstone of todays knowledge. On the other hand, global socio-political events and transformation have further shaped communication theory development. And yet, as technology continues to advance, further definitions of communication shall continue to be formulated to track its changes with time.