Friday, December 27, 2019

Despite The Issues That Have Surrounded Women In The...

Despite the issues that have surrounded women in the workplace since they first entered during the 40s, 50s, and 60s, there have been some evolution to the way women are seen and treated in the workplace. While women were expected to leave the workforce after their aid during World War II, feminist movements have pushed for the re-entrance of women in the workforce during the 1960s; there has been a lot of progression for the equality of women, although, this is not entirely consistent with every job, career, or internship. Either gender has been sexually harassed and prejudiced by the people who have power over them, or the workers they call friends. These issues that have appeared has caused a lot of fear, anger, and anguish. That is why†¦show more content†¦Sexual harassment can be characterized by unwanted sexual advances, or verbal conduct of a sexual nature which is not reciprocated. In Australia, they have implemented what is called a â€Å"Sex Discrimination Actâ₠¬  which states that â€Å"an employer is responsible for the actions an employee has committed during their employment unless the person took all the reasonable steps to ensure the act had not been committed† (Judd). Which means that unless the employer integrates training for sexual harassment and conduct, which includes how to identify sexual harassment, and how to deal with it, including the training of what sexual harassment is, and what to do when you encounter, it can possibly eliminate most of the fear that women have towards getting a career to support themselves. While many training programs have proven to aid in the amount of cases of sexual harassment there was a study conducted at the University of Georgia that studied how men react towards sexual harassment training, and it has been shown that â€Å"female policy trainers activate implicit gender stereotypes, but explicit gender egalitarian beliefs† (Tinkler). Which states that sexual harassment training has shown to improve the way that men treat women in concern to sexual harassment, but it does not change the belief men have about women in the workplace. While this may not be a huge change in the belief that women are the inferior race, it is a step towardsShow MoreRelatedThe Women s Movement Our History Essay1428 Words   |  6 PagesMore modern women no longer subscribe to the idea that they should only aspire to be housewives. This movement, which began in the 1940s, is hailed as the rebirth of feminism. Women entered the workforce to replace their husbands who had been sent off to fight in World War II. As a result, their work in factories and shipyards challenged the gender norms of that time period, and thus paved the way for future generations to come (â€Å"The Women’s Movement—Our History,† 2005). Today, in lieu of Rosie theRead More`` Eat Like A Man, Man : The Advertisement For Their New Texas Double Whopper Burger1473 Words   |  6 Pagescreat ed with a gender binary perspective, adequately reinforcing gender roles within society. These gender roles play a significant factor in a person s everyday life, as the media aids in solidifying heteronormativity to be the standard today. Humans have a very gender binary perspective on how the world operates and this mentality is very often limiting to some individuals. People continue to categorize actions, behaviours, and mannerisms by certain genders, which are simply just â€Å"socially createdRead MoreCultural Interview : Cultural Informant Interview1477 Words   |  6 PagesCultural Informant Interview My cultural informant was a friend who I have known for about six and a half years, Lisa. Lisa’s sister, Liya, and I became close friends during my freshman year of college. Liya, two other girls, and I became roommates from sophomore year through senior year. Lisa is a year younger than me, so I met her during my sophomore year. Liya and Lisa were international students from Ethiopia, so they often spent holidays and breaks with my family and I. The three of us becameRead MoreSustainable Development1650 Words   |  7 Pagesthe dangers of irresponsible behaviour which may lead to contracting diseases such as HIV/AIDS. The production of the book, The Other Presence, and its translation into local languages, are thus aimed at reducing the silence which has surrounded topics that have long been considered by traditional, religious and community leaders as being too sensitive to discuss. 1 The book is an interesting mixture of theological reflection and re al life experiences. It is informative, challenging,Read MorePresident Of A Multinational Company2119 Words   |  9 Pagesone by the equality of his actions and the integrity of his intent.† — Douglas MacArthur One continuous message that came across throughout the Kukin lecture series is that leaders in the business world come in all shapes and sizes. Most of us have an image of what a typical successful businessperson looks like; however, this image was certainly altered after hearing from the various speakers we had the privilege to learn from in our Contemporary Problems in Business class. Many of the speakersRead MoreFeminism, By Debra Baker Beck Essay1660 Words   |  7 Pages and economic rights for women - equal to those of men† (Dictionary.com). It is no secret that the true definition of a â€Å"feminist† has been tossed around and distorted throughout the years. There are several existing views on who feminists are today. Some think that feminists have devolved since the days of the women’s suffrage movements and that they are now simply â€Å"men-haters† that want to attain higher social and economic statuses than men. Others believe that women are still supporting and fightingRead MoreThe Movie Wolf Of Wall Street 1494 Words   |  6 Pagesare characterized and displayed profoundly throughout the movie Wolf of Wall Street. Based on a true story about the life of Jordan Belfort (Leonardo DiCaprio), the movie is narrated and gives insight to the struggle, power, and addictions that surrounded Belfort’s life. Belfort was a stockbroker who learned his way as an entry-level worker on Wall Street before creating his own company Stratton Oakmont. Belfort quickly learned that success on Wall Street was a result of doing any means necessaryRead MoreLatin Americ The United States Essay2417 Words   |  10 Pagesbehind the U.S. However, government power and initiatives have also disproved this. While the U.S. has never had a female president or even vice president, four Latin American countries have female leaders: Brazil’s Dilma Roussef, Costa Rica’s Laura Chinchilla, Argentina’s Cristina Fernà ¡ndez d e Kirchner and Chile’s Michelle Bachelet. (Weiss, L., 2014). Another stereotype is that immigrants are taking money away from the United States. Despite the speculation about the financial cost of immigrants,Read MoreDiscrimination And Its Impact On Society1971 Words   |  8 Pagestowards the overall lifestyle of the world, including different areas such as in education and in workplaces. Looking closer into the different kinds of segregation seen in today’s society, I noticed that inequality holds the faà §ade of being benign, considering the way it is currently being held, however it is indeed a contemplating issue. As multiple academic journals, books, and inspirational talks have shown me, discrimination should be seen beyond the simple statistics and facts. In the beginningRead MoreIs Solidarity for Only White Women?1799 Words   |  8 PagesThe phrase â€Å"solidarity is for white women† emphasizes the limited amount of women in color who participates in academic debates related to female issues. However, this is ironic since solidarity means agreement among individuals with common interest. The phrase species white women even though minorities are the people excluded from the debate agreements. Allan G. Johnson would certainty say that the white women have the privilege in mainstream media. â€Å"What it does mean is that I’m also getting something

Thursday, December 19, 2019

Free Marriage Can It Save Your Marriage - 10636 Words

HOW TO SAVE YOUR MARRIAGE Table of contents Introduction: Counselling: can it save your marriage? Understanding your partner’s emotional needs Working together to save your marriage Chapter 1: Communication Constructive communication Conflict resolution strategies Positive talk and actions Forgive and be forgiven Chapter 2: Overcoming problems Recovery from an affair Dealing with financial stress Analyse your anger Creating harmony in your relationship Your relationship and your responsibilities: finding balance Making second chances work: recovering from past relationships Eliminating outside interference Chapter 3: Reconnect Reduce tension Rebuilding mutual respect The importance of having fun Share goals and your vision for†¦show more content†¦When should couples consult a counsellor? Researchers have found that the primary problems experienced by couples are loss of connection and high levels of conflict. Counsellors agree that the sooner problems are attended to, the better. On average, most couples will have experienced problems for 6 years before considering counselling as an option. A quicker response time would reduce the amount of behavioural habituation that needs to be overcome. How does it work? The goal of counselling is not to present ready-made solutions, but to equip the couple with the tools they need to overcome their problems. The therapist interviews the couple together and sometimes requests individual interviews, then gives feedback. During a counselling program, couples should begin to notice minor but significant positive changes on a day to day basis. The basis of this success is mutual learning about and accommodation of each other’s perspectives. Professional counsellors won’t take sides, will respect both partners and will strive for a calm atmosphere in which each participant has an opportunity to speak and air their views. Sometimes one of the marriage partners is unwilling to undergo couples counselling, but the remaining partner can still benefit from relationship counselling and in time, persuade their

Wednesday, December 11, 2019

The Control of Corruption Indicator Free Sample for Students

Question: Select a Country and have a look at the Risk Indicators. What are the Implications of these Indicators for anyone wishing to conduct business in that Country? Answer: International Business According to the Worldwide Governance Indicators (WGI) project, there are six indicators of governance. The country chosen from the Australian Export Finance and Insurance Corporation (EFIC) website is China, a country in East Asia (Efic.gov.au, 2017). The control of corruption indicator refers to the extent of effectiveness that strengthens a countrys framework to prevent and combat corruption. According to the findings of World Bank in April 2016, China ranks in the second bottom quartile that makes it risky for the people to conduct business (Efic.gov.au, 2017). The company is experiencing issues such as political interference, bribery and facilitation payments when dealing with the system. However, there are several anti-corruption laws and he companies are advised to consider the type of gifts given by them as it may be considered as bribery for the foreign companies (Funderburk, 2016). The government effectiveness indicator refers to the quality of policy formulation, implementation and independence from political pressures. According to the findings of World Bank in April 2016, China has high government effectiveness (Efic.gov.au, 2017). This reduces the risk of doing business in China as it fosters a benign context for private investment. The President of China, Xi Jinping is formulating and implementing effective business policies that the country is able to manage without interruptions in policies or government services. However, there is prevalence of red tape that hinders business activities in China (Funderburk, 2016). Therefore, China has different dimensions of risk and governance that enhances or prohibits the companies from doing business in China. References Efic.gov.au,. (2017).China.Efic.gov.au. Retrieved 29 March 2017, from https://www.efic.gov.au/education-and-tools/country-profiles/asia/china/ Funderburk, C. (2016).Political corruption in comparative perspective(1st ed.). Abingdon, Oxon: Routledge.

Tuesday, December 3, 2019

My Interview Essay on Techelle James free essay sample

The person I interviewed was Techelle Evans. Techelle James is a sixteen year old junior and was born on January 30th 1996. She is the eldest of three girls, her mother is from here St. Thomas USVI and her father is from Africa and has two pet dogs. I realized that Techelle plays shy in class but in reality she is actually noisy, full of life and fun to be around. She acts shy by sitting over there in that dry dusty area were she pretends to be in her own world. As she sits in her dried up chair she stares out at the morning sky and wonder about the different personalities that roams the class. I often sit and wonder why is she so quiet but then as I interviewed her I realized that Techelle isn’t as quiet as she seems to be in class. As I interviewed Techelle I couldn’t help myself but to notice that she is also a very interesting person in her own special way and what makes her even more interesting is that she is starting to discover her inner self. We will write a custom essay sample on My Interview Essay on Techelle James or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Techelle started playing volleyball last year and has grown to love it as being one of her favorite sports to play. Techelle likes to watch a television show called castle, her favorite movies to watch are the help and Madea’s big happy family, her favorite actors are Will Smith and Denvil Washington, she likes RB gospel music, loves the color purple, her favorite book is Begging for Change, her favorite subject is biology because she likes to dissect things and she eats jus about anything. She dreams about having her own business and graduating from college. Her bucket list is full of things to do such as sky diving, para shooting, flying an airplane, getting a monkey and she even wants to be a pole dancer just for one night. Her most embarrassing moment was when she got a ball kicked in her face. A little known fact about Techelle is that she pretends to be shy. If Techelle could meet anyone and sit down to hang out with to see what they are really like would be Tyra Banks, why you may ask because she likes how Tyra helps teen girls to find their inner beauty. If she had to go any were in the world Techelle would surely go to Paris to experience their culture and to see the Ifle tower. Right after high school Techelle hopes to go straight to college and get a job that involves children. In five years Techelle sees her self as being a successful college student and in the next ten years as being a wealthy business woman. If Techelle had to write a book about her self she would name it â€Å"Everything you need to know about me†.

Wednesday, November 27, 2019

Fiscal Policy and Sovereign Debt Crises

Introduction The term macro in English language has its origin in the Greek language term makros which means large.Advertising We will write a custom report sample on Fiscal Policy and Sovereign Debt Crises specifically for you for only $16.05 $11/page Learn More Macroeconomics, therefore, studies economic problems from the point of view of entire economy such as aggregate consumption, aggregate employment, national income, and general price level of goods and services (Jain 2007, p. 4). It is the part of economics which studies the over all averages and aggregates of the economic system. In macroeconomics, attention is generally focused on such problems as the level of employment, the rate of inflation, the nation’s total output, and other matters of economic wide significance (Hansen 2003, p. 83). Ordinarily, therefore, macroeconomics is concerned with the economy as a whole or large segment of it. According to Cauvery (2007, p. 51), the scope o f macroeconomics is the use of economic resources at the national level. Apparently, these are the very resources that have their effect on national income, employment, effective demand, aggregate saving, aggregate investment, price level, and the general economic development of a country. This paper discusses two main questions that are related to the subject of macroeconomics. The first part looks at what fiscal policy is and why fiscal deficits and increases in government debt occur. The second part then deals with why some governments have experienced sovereign debt crises and to what extent efforts to reduce government debt risk creating can double-dip recessions. Question 1a: Understanding Fiscal Policy and Why Fiscal Deficits and Increases in Government Debt OccurAdvertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More What is Fiscal Policy? According to Dwivedi (2010, p. 601), fiscal polic y can be defined in general terms as a government’s program of making discretionary changes in the pattern and level of its expenditure, taxation, and borrowings in order to achieve certain economic goals such as economic growth, employment, income equality, and stabilization of the economy on the path to growth. Fiscal policy may also be regarded as any decision to change the level, composition, or timing of government expenditure or to vary the burden, structure or frequency of the tax payment (Shaikh 2010, p. 256). It is also the process of shaping taxation and public expenditure to help dampen the swings of the business cycle and contribute to the maintenance of a growing high employment economy that is free from high or volatile inflation. According to Jain (2007, p. 160), fiscal policy is the policy related to revenue and, expenditure of the government for achieving a set of definite objectives. Apparently, fiscal policy relates to treasury or government exchequer and i ts significance has greatly increased in the recent past. In summary, the role of fiscal policy is confined largely to stabilization of employment and price level. A narrow concept of fiscal policy is budgetary policy. Whilst budgetary policy refers to current revenue and expenditure of the financial year, fiscal policy refers to the budgetary operations including both current and capital receipts and expenditure. The essence of fiscal policy lies, in fact, in the budgetary operations of the government. Typically, the two sides of the government budget are receipts and expenditure. The total receipts of the government are made up of tax and non tax revenue and borrowings, including deficit financing. The items in the budget represent the budgetary resources of the government.Advertising We will write a custom report sample on Fiscal Policy and Sovereign Debt Crises specifically for you for only $16.05 $11/page Learn More The government expenditure refer s to the total expenditure made by the government in any given fiscal year. Generally, the total government expenditure is constituted by payments for goods and services, wages and salaries, interest and loan repayments, subsidies, pensions and grants in aid, and so on. From economic analysis point of view, receipt items give the measure of the flow of money from the private sector to the government sector. The government expenditure on the other hand, represents the flow of money from the government to the economy as a whole. The government’s receipts are inflows and expenditures are outflows. Using its statutory powers, the government can change the magnitude and composition of inflows and outflows and thereby the magnitudes of macroeconomic variables which include aggregate consumption expenditure, and private savings and investments. The magnitude and composition of inflows and outflows can be altered by making changes in taxation and government spending. The policy under which these changes are made is called the fiscal policy. The Scope of Fiscal Policy The scope of fiscal policy comprises the fiscal instruments and the target variables. Fiscal instruments are the variables that the government can use and maneuver at its own discretion to achieve certain economic goals. Fiscal instruments include taxation, direct and indirect, government expenditure, transfer payments, grants and subsidies, and public investment. The target variable on the other hand, are the macro variables including disposable income, aggregate consumption expenditure, savings and investment, imports and exports, and the level and structure of prices (Dwivedi 2010, p. 602).Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Why Fiscal Deficits and Increases in Government Debt Occur There are various reasons why fiscal deficits and increases in government debt occur. In the United States, for example, the government’s budget deficit is attributed to the country’s poor saving habits. Apparently, most American families save a smaller fraction of their incomes than their counterparts in many other countries such as Japan and Germany. Although the reasons for these international differences are not clear, many policy makers in the United States view the low level of saving as a major problem that drives the government into heavy borrowing in order to meet its obligations to its citizens (Mankiw 2008, p. 282). In most cases, a country’s standard of living depends on its ability to produce goods and services. However, this productivity gets affected when citizens do not save as much as they should since saving is regarded as an important long run determinant of a nation’s level of productivity. If, for instance, the United States could somehow raise its saving level, the growth rate of the Gross Domestic Product (GDP) would increase, and over time, the citizens of the United States of America would enjoy a higher standard of living. Despite the fact that the a country may be driven into budget deficits and subsequent debt as a result of poor saving habits among its citizens, the government also has a major part to play in encouraging its people to save more. Many economists have used this argument to suggest that the low saving rate in the United States is at least partly attributable to unfriendly tax laws that discourage saving. In general, many state governments collect revenue by taxing all forms of income received by individuals or corporations. In response to this problem, many economist and law makers have proposed reforming the tax code so as to encourage greater saving. The effect of such a saving incentive on the market for loanable funds is illustr ated by figure 1 (Mankiw 2008, p. 283). As can be seen from the figure, a change in the tax laws to encourage individuals and corporations to save more would shift the supply of loanable funds to the right from S1 to S2. As a result, the equilibrium interest rate would fall, and the lower interest rate would stimulate investment. Whilst the equilibrium interest rate declines from 5 per cent to 4 percent the total amount that may be given out in form of loans increases from $ 1,200 billions to $ 1,600 billions. Figure 1: Saving Incentives Increase the Supply of Loanable Funds Although this analysis of the effects of increased saving is widely accepted among economists, there is little consensus about what kinds of tax changes should be enacted. Many economists endorse tax reforms aimed at increasing saving to stimulate investment and growth. Others, however, are skeptical that such tax changes would have much effect on national saving. These skeptics also doubt the equity of the pro posed reforms. They argue that, in many cases, the benefits of tax changes would accrue primarily to wealthy people, who are least in the need of tax relief (Gupta 2004, p.124). Fiscal budget deficits and increased borrowing are also attributed to less attractive investment incentives. Tax reforms aimed at making investment more attractive will definitely bring many investors on board and the final result would be an improved economy. An investment tax credit, for example, gives a tax advantage to any firm building a new factory or buying new equipment, and this encourages many to invest. Figure 2 shows the effect of a government budget deficit. Figure 2: Effect of Government Budget Deficit When the government spends more than it receives in tax revenue, the resulting budget deficit lowers national saving. The supply of loanable funds decreases and the equilibrium interest rate rises. As depicted by the figure, when the supply shifts from S1 to S2, the equilibrium interest rate ris es from 5 per cent to 6 per cent, and the equilibrium quantity of loanable funds saved and invested falls from $ 1,200 billions to $ 800 billions. Question 1b: Why some Governments have Experienced Sovereign Debt Crises and to what Extent Efforts to Reduce Government Debt Risk Creating can Double-Dip Recessions As explained previously, some countries have ended up in deficits and heavy spending as a result of having unfriendly tax policies that, to a large extent, lead to low saving by citizens and discourage investments. According to Giles (2012, p. 1), fiscal policy can not provide a lasting solution to all economic problems. There are other factors that also affect the economy. In the United Kingdom, the idea of cutting down government expenditure and the rapid increase in the rate of taxation have failed to yield the desired results. On the contrary, they have are blamed for slow economic growth and high unemployment. This in turn, has forced the government to borrow more in ord er to offset its budget deficit. Summers (2012, p. 1) suggests that a better way to deal with Britain’s economic challenges is to first realize that lack of demand is the main factor that is preventing its economy to progress. According to Krugman and Layard (2012, p. 1), the present economic woes are can be attributed to the fact that many countries are operating based on ideas that worked so many decades ago. There is, therefore, a need to create policies that are suitable for the present economic environment. Among others, most economic problems are caused by irresponsible public borrowing behavior and the high levels of poverty and unemployment which leave many individuals economically powerless. It will, therefore, be beneficial for the government to work hard to empower citizens economically. With friendly economic policies in place, many individuals will be encouraged to participate more actively in growing the economy. Reference List Cauvery, R 2007, Public Finance: F iscal Policy, S. Chand Company Limited, New Delhi. Dwivedi, DN 2010, Macroeconomics: Theory and Policy, 3E, Tata McGraw-Hill Education Private Limited, New Delhi, India. Giles, C 2012, Fiscal Policy can’t Cure all Britain’s Ills. Web. Gupta, GS 2004, Macroeconomics; Theory and Applications, Tata McGraw-Hill Publishing Company Limited, New Delhi. Hansen, B 2003, The Economic Theory of Fiscal Policy, Volume 3, Routledge, London, UK. Jain, TR 2007, Macroeconomics Management, FK Publications, New Delhi, India. Krugman, P Layard, R 2012, A Manifesto for Economic Sense. Web. Mankiw, NG 2008, Principles of Macroeconomics, Cengage Learning, Mason, OH. Shaikh, S 2010, Business Environment, 2/E, Pearson Education India, New Delhi, India. Summers, L 2012, Britain Risks a Lost Decade unless it Changes Course. Web. This report on Fiscal Policy and Sovereign Debt Crises was written and submitted by user Giovani I. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Individual, community and macro points of view on migration Essays

Individual, community and macro points of view on migration Essays Individual, community and macro points of view on migration Essay Individual, community and macro points of view on migration Essay Migration does not always coupled with growth unless it was given proper measures and economic restructuring (Appleyard: 1992; Hammar et al. : 1997;Ghosh: 1998). The major reason for migration is considered to be for economic purposes. History showed evidences that the immigrants and their descendants play an important role in the economic growth of the host countries. Developed countries which welcome immigrants become richer and richer. In addition to the openness of the immigrants to all types of work, they can also work under cheap labor that the natives will reject.This allows the old businesses such as textiles and garments to still exist adding to the income of the host country. Migration of skilled workers will further strengthen the skills and talents pool of the country. These enhance their productivity and economical gains. Simultaneous with the gain of brain and skills of the host country is the loss of the brain and skills of the country of origin which are oftentimes the poor countries or the developing countries. This may bring brain drain or loss of the trained, educated and skilled individuals which will inhibit the development of the native country or country of origin.Dependence to foreign countries will be one of the consequences of this which will post negative effect on productivity and economy of the native country. Some researchers, however, regarded immigration to contribute to economic growth of the native country through the remittances that the immigrants send to their family. These remittances are the major source of foreign exchange in developing countries which alleviate the poverty line. According to the International Migration Data, global remittances to developing countries worldwide are estimated at $204 billion per year.(International migration data) The countries who registered the highest remittances are Mexico, India, Philippines, Egypt and Morocco. ( International migration data) This enormous value made the home countries considered their emigrants to have the major role in improving its economy. It contributed to the fluidity of cash flow and development of business sectors. Realization of the major participation of emigrants’ remittances made the home government sets priority regarding the welfare of these workers.Researches showed that these remittances tend to be invested to the home country for housing, consumption, land, loan payment and savings and to business which the home government targets. (Addy, p. 16) Their families are well supported in establishing their own business in the country and given other privileges. The increasing value of remittances and the business established are expected to balance the effect of brain drain, the source country is experiencing. At the personal level, the immigrant faces a quandary on culture and environment.Furthermore, in the foreign land, he is also vulnerable to racial discrimination, exploitation and deportation. He is forced to embrace whatever is offered to him for a common good. Coping with these adaptations to host country’s norms and practices simultaneous with physically adapting to climate and health conditions requires a great level of energy and determination. Absence of the family members also adds to the burden the immigrant is experiencing. New technologies of communication help in this endeavor which makes it easier to gain emotional stability.Both positive and negative effects do not limit to the individual alone. Whatever happens to the immigrant in the host country will definitely affect his family in the home country. Studies showed that the family is more affected when the migrant worker is a woman for basically she is the homemaker and takes care of the children. Nowadays, there is an increasing number of migrant women accounting for 48 per cent international migrants. Some effects radiates from the family to the community. The flow of income, for example can be manifested in the economics within the area.This will be radiated further to the home country reducing the poverty. They also contribute to development through investments, business or entrepreneurial activities and the return of newly developed skills and knowledge. The community of the host country, on the other hand, may initially be skeptical of accepting the immigrant. On their point of view, the immigrants can change and influence their economy and other values. A community which does not allow immigrants may be giving up the values, education, perhaps specialization and other benefits brought by the immigrants.

Thursday, November 21, 2019

How did the French Revolution inspire Romanticism and why Essay

How did the French Revolution inspire Romanticism and why - Essay Example Romanticism, therefore, turned to an assessment of imperialism and materialism of an industrial community. Although the French revolution enabled romanticism to gain popularity, it turned romantics against it. The French revolution in an immense way influenced the era of romanticism and most of it in a positive way. The French revolution significantly inspired interest in the portrayal of modern-day events, although there was evidence of detailed paintings that were done before the revolution (Mosse, 1989). The French revolution was inspired by the enlightenment era which led to a period of anticipation and optimism. Artists in France chose to represent their happenings in highly detailed forms of art. Their leader Napoleon demanded that their achievements should be displayed in detailed pictures. Napoleon wanted everything to be remembered and, therefore, pictures would do the representation better. Paintings that also represented individual suffering were represented in â€Å"The Raft of the Medusa.† rudiments of romanticism can be establish in art, music and literature and other forms of writings (Mosse,1989). Napoleons invasions can be attributed to dispersal of reforms across Europe. The Romantic Movement also helped shape the political movements such as the French revolution, and it was also shaped by the revolution. Both played a significant part in the creation of nationalism among the citizens. The romantics were ready to end the terrible reign and would do everything possible to improve the society. The French revolution helped cultivate the idea that rebuilding of the society was achievable. The revolution built on the Enlightenment plan of advancement that society could improve. The romantics, therefore, began embracing their history and displayed it in the form of art and music. The revolution inspired them and they started looking at their ancestral origins as a source of inspiration. The romantics during those times were focused on ending the reign of terror. It seems that they had the same vision as the people of France who wanted to break away from the monarchy. Romanticism developed to being a philosophy, which could not match the power that the French revolution had (Friedrich). The French revolution brought about the change that the romantic philosophers so much desired. Before the French revolution, the romantics lived in an oppressive society with no or little freedom. The romantics wanted a strong group to intervene and help them attain a stable government and a strong sense of individuality. Their society was particularly divided, and they could not write anything that was not acceptable. This made them desire so much for freedom. The rise of the French revolution, therefore, enabled people to be capable of putting across their feelings in whichever way they wished. The French revolution had a significant impact on the European lifestyle in the nineteenth century. A significant wave of emotion was spread thr oughout the society. The French revolution introduced new laws for the citizens. It also resulted in change, in both literature and art (Doyle). Romanticism is largely responsible for shaping the world to a better place to live. The French revolution was the climax of the romantic philosophy. The revolution provided with problems, which acted as a basis for the romantic literature and art. The French revol

Wednesday, November 20, 2019

HOW WE CAN HELP NATIVE AMERICANS AND THEIR FIGHT WITH ALCOHOLISM IN Research Paper

HOW WE CAN HELP NATIVE AMERICANS AND THEIR FIGHT WITH ALCOHOLISM IN THE NATIVE AMERICAN FAMILY ON A FEDERAL LEVEL - Research Paper Example Booker T. Washington in terms of overcoming addiction says, â€Å"Success is to be measured not so much by the position that one has reached in life, as by the obstacles one has overcome trying to succeed.† Therefore, Native Americans who are no doubt facing obstacles but they should get rid of their addiction with alcoholism by overcoming the obstacles. In America, Native Americans have been known to over-indulge in drinking more than any other ethnic groups in the country. As a result of this, statistics indicate that nearly 12% of all deaths among the Native Americans are a result of using alcohol (Schinke et al 319). Most cases of traffic accidents, liver and heart problems, and cases of homicide and suicide are related to alcohol use and to some extent other substance abuse by the ethnic group. The legacy of manifest destiny contributed to the high rates of alcoholism in Native Americans by forcing the Native Americans to highly secluded lands that limited their political voice as intended by the federal government; in totality creating a snowball effect that would lead the Native Americans to decades of self-destruction related to alcoholism. The federal government is now focusing on ways that it can reverse this effect on the Native Americans and see the society to a reformation. Alcohol was a medium of exchange for Native American goods by European settlers during the pre-independence period in America. Because of the easy availability, Native Americans got accustomed to using the drink quite freely. The European traders often tricked the Native Americans into over-indulging in the drink so that they could get unfair trade with them. The effects of the drink were new and widely acclaimed in America so that a number of Native Americans found it fashionable to drink. The trend, however, continued past American independence to date (Sherman 45). Scientists studying these phenomenological high drinking rates have linked the use of alcohol to genetics . Studies have shown that some individuals experience gene mutation, which cause significant reactions to over-drinking alcohol. Those who posses this gene suffer worse side effects when they drink such as nausea, increased heartbeats, headache, and extreme drowsiness. This gene is common among the Chinese and Japanese, explaining their less indulgence in the drink (Young 112). Other groups, such as the Native Americans, however, do not possess this gene that mutates, therefore, do not experience adverse effects associated with drinking. Besides this genetic point of view, the environment and cultural tendencies of the Native Americans have played a great role in making it appropriate for them to indulge. When the European settler moved in to America and took over their land, Native Americans became an oppressed group. The European culture clashed heavily with that of Native Americans, creating a major conflict and depression on the side of the Native Americans. The native culture w as presumed to be inferior to that of the dominant European group, and the Native Americans lost pride in their existence and developed a lack of will to protect their culture (Schinke et al 134). The

Sunday, November 17, 2019

Legal Aspects of Supply Chain Management Case Study

Legal Aspects of Supply Chain Management - Case Study Example The M.D. would like to clarify some details of the contractual report based on these guidelines. The less favoured common laws (or case laws) for contracts are developed through individual contractual decisions by judges necessary to decide cases brought before them. On the other hand, statutes formed via legislations have become the commonest source of contract laws. These statutes are actually derived through Acts of UK Parliament. Since the sales of goods are within the United Kingdom, it is important to note that all statutes can be applied to any combination of jurisdictions within the UK, whereas the common law jurisdictions are more limited. In order for the contract to be legally binding under local English law and statutes, it requires the main following contractual elements: an offer and an acceptance.With respect to frozen food contracts, these basic contract requirements require careful consideration. With respect to offer of a contract, it is an expression of willingness for both parties, MorrisBury (buyer) and Freeze'n'Go (seller), to agree on certain bilateral terms that would benefit both sides. It must be made with the intention that the contract will become binding upon acceptance. The nature of an offer can be encapsulated by a case involving the defendant, Manchester City Council. The Council decided to sell houses that it owned to sitting tenants. In two cases, the claimants entered into agreements with the Council. The Council then resolved not to sell housing unless it was contractually bound to do so. In this case, the question arose as to whether or not the Council had entered into a contract. In the case [25], the Court of Appeal found that there was a binding contract. The Council had sent Storer a communication that they intended would be binding upon his acceptance. All Storer had to do to bind himself to the later sale was to sign the document and return it. In similarity, MorrisBury could make an unconditional offer which could be accepted by Freeze'n'Go.In this case, if the supplier informs buyer that the offer is accepted, there will be a binding contract.It is particularly important for the buyer wanting to purchase frozen foods are interpreted as a legal binding contract.If MorrisBury constitute a formal offer to receive certain foods, then the they may be in breach of civil and even criminal laws if there are certain categories of Freeze'n'Go who would not ordinarily be entitled to sell which are being offered [1]. For an offer to be effective, an offer must be communicated. Another way of stating this is to say that there can be no acceptance of the offer without knowledge of the offer. The reason for this requirement is that if we say that a contract is an agreed bargain, there can be no agreement without knowledge. There can be no meeting of the minds if Freeze'n'Go is unaware of the MorrisBury. Stated another way, an acceptance cannot mirror an offer if the acceptance is made in ignorance of the offer. In an exemplary case of [14], a policeman was

Friday, November 15, 2019

Cloud Computing Literature Review Computer Science Essay

Cloud Computing Literature Review Computer Science Essay [Michael et al. 2010] Cloud computing is the IT liberation model that provides infrastructure and computer resources as service. In an organization, the information is shared by implementing the private cloud. The achievement of an organization is based on the important advantages such as simplifying management, reducing costs and accelerating processes. In a broad diversity of designs, the cloud computing technologies can be implemented under different services and deployment methods. In the organization cloud computing is used to transfer the existing server infrastructures into dynamic environments. By adopting the cloud computing, the business activities can be carried out with little difficulty and greater efficiency. Cloud computing offers many advantages to different ranges of customers and it is simple to acquire. By considering the above views of authors it can be concluded that, cloud computing is IT delivery model and it gives the infrastructure and computer resources. By implementing the cloud, the information can be shared. Simplifying management, reducing costs and accelerating process such advantages provides success to the organization. Based on different services and deployment methods, the cloud computing technologies can be implemented in a broad diversity of designs. This provides many advantages for different ranges of customers and these advantages are simple to obtain. Through adopting the cloud computing, business activities can be done with great efficiency and little hassle. [Meiko et al, 2009] Generally, cloud computing provides the dynamical and scalable resources as a service over the internet. Cloud is used for reducing the capital and operational expenditure, and provides economical growth. This is happened in realism and however, there are some confronts are explained by the cloud. It is described as a valuable consideration for an enterprise IT integration. Even the adoption of cloud computing has many advantages and still it faces a number of risks. The security of cloud is one of the important issues in the cloud computing. By considering the above views of authors it can be concluded that cloud computing provides dynamical and scalable resources over the internet. Cloud provides economic growth and reduces the capital and operational expenditure. It defines as a valuable consideration for IT integration. It has a number of advantages but still it faces some risks. Sometimes cloud cannot provide security for the customers property. It considers important disadvantages of cloud computing. [Chang et al, 2005] Usually, in the cloud computing, the significant data of the customer can be stored in data centers. Actually, Data centers means where the data should be stored on the centralized location by having a large size of data storage. The data processing is done on the servers. The important data should be handled by the cloud provider. Therefore, the customers have to trust the cloud provider on the data security as well as on availability. For this, the legal agreement which is called as SLA (service legal agreement) should be provided by cloud computing between cloud customer and cloud provider. The provider can gain trust of the client through this agreement, so, SLA should be consistent. In the cloud environment, the whole security depends on the security levels of the cloud. This concept of cloud computing is promising to change the future of the computing by providing many benefits in the field. And the main obstacle in achieving this is nothing but the disadvan tage of the security concern. From the above views of authors it can be concluded that, generally, in the cloud computing, the data will be stored in the data centers. Data storing methods are being done on the data servers. A large si9ze data can be stored in the data centers. In the cloud computing, the data of customer should be handled by the cloud provider. Therefore the cloud providers should give the guarantee on the data security. To have trust on the cloud provider, the cloud customer should follow the legal agreement which is called as SLA that should provided by cloud computing between cloud customer and cloud provider. [McKinsey, 2009] Basically, cloud computing is the self motivated specification of the IT capabilities (hardware, software, or services). Clouds are hardware based services that offers computing, networking and storage capacity. It has exclusive features that need risk measurement in parts such as data honesty, revival, and privacy. A security perimeter is set up to create a trust boundary where customers valuable information is stored and proceed. The network provides transportation to which works in a similar manner, and which consist of other trusted end hosts. The confidential information may be processed outside and identifies trusted areas as these computing environments often have unclear boundaries as to where data is stored and processed and when the security perimeter becomes unclear in the sense. Privacy issues which frequently happen in the cloud are not only raised by public cloud and also have its own security concerns. By considering the above views of authors it can be concluded that clouds are hardware based services which offers computing, networking and storage capacity. Particularly, in some parts such as data honesty, revival and privacy it has exclusive aspects which need risk measurement. A security border is used to create a trusted boundary where customers valuable information is stored and secured. The network which includes the cloud is used to transport the trusted end hosts which work in the similar manner. Public cloud is not only reason for the privacy issues which regularly happen in the cloud computing and also have it share of security concerns. 2.2. Different sections of cloud computing: [Rob, 2008] the cloud computing is divided into three sections namely cloud application, cloud platform, and cloud infrastructure. These sections can be represented as the cloud pyramid in the cloud computing. Cloud application: [Rob, 2008] the cloud application is the first section that presents in the top of the pyramid. According to the cloud application, the interaction of the applications via web browser is taken place in the cloud computing. Through the cloud application, the need to install and run the application on the customers own computer can be eliminated. It reduces the difficulty for the customer to maintain the software and its process. From the above discussion it can be concluded that in the cloud computing pyramid, three sections are there namely cloud application, cloud platform and cloud infrastructure. Cloud application is the first section in the cloud pyramid and used to communicate the applications with each other via web browser. It used to reduce the difficulty for the customer in maintaining the software and its process. Cloud platform: [Rob, 2008] Usually, the theoretical work as a service or the calculating platform is provided by the cloud platform. This is the second section and the middle layer of the cloud pyramid. As indicated by the requirement, the cloud platform offers the animatedly necessities, configures and reconfigure servers. From the above views of the authors it can be concluded that cloud platform is used to calculate the platform and the framework as a service. This is the second section in cloud computing pyramid. The animatedly necessities, configures and reconfigure servers are provided by this section. And this is the middle section of the cloud pyramid. Cloud infrastructure: [Rob Lovell 2008] cloud infrastructure is the last layer of the cloud pyramid. It delivers the IT infrastructures by means of the virtualization. Through the cloud infrastructures, the splitting of the hardware into independent and self ruled environments can be completed. The services that are delivered as the web services or farms or cloud centers and other hardware appliances are included in the cloud infrastructure. Source: Rob Lovell, 2008, introduction to cloud computing- white papers. From the above discussion it can be concluded that cloud infrastructure is the last section of the cloud pyramid and it delivers the IT infrastructures through the virtualization. By using this section, self ruled environments can be completed. Web services or farms or cloud centers and other hardware appliances are included in the cloud infrastructure. 2.2. Security issues in the cloud computing: [Jensen et al, 2009] the cloud is provided responsibility for the security of the data when the user is released the data into the cloud. It has some issues in their operation which are explained as follows: 2.2.1. Operational security: [Jensen et al, 2009] The property of the organization can be uncovered which causes a major drawback in the security point of view throughout the cloud operation. The critical information of the company may be leaked and may cause the data exposures. The cloud may not be managed to sufficient standards in the cloud computing. The defensive of the data may not be secured in a proper way in the clouds then it causes for the security issues. Among the customer and the provider a complete security management system must be developed. It can be protects the data from hacking by third parties. By considering the above views of authors it can be concluded that generally cloud provides responsibility for secure the customers valuable information. But sometimes it faces some problems when data transfers into the cloud. Operational security is one of the major issues in the cloud computing. Through the cloud operation, the property of the organization can be unsecured. The cloud may not ensure to sufficient standards in the cloud computing. Through this type of security issues, the protecting of the information may not be done in a proper way in the clouds. This security management system must be developed between customer and provider. Then it can be protects the data from the hackers. 2.2.2. Privacy: [Siani et al, 2010] The service supplier of the cloud should be able to give the declaration of the vital data. And they make sure that any unpermitted person cannot view or access the confidential data or the information of the user. From the above views of authors, the service providers have to give guarantee about the valuable information and make sure that any unpermitted person cannot view or access the private information of their customer. 2.2.3. Reliability: [Siani et al, 2010] The modification of the innovative data or any efforts to alter the data should be severely prohibited by the provider and this make sure that the data detained in the system of the cloud is proper and used to maintain the integrity. 2.2.4. Accessibility: [Siani et al, 2010] The entire resources which are needed by the user for processing the data should be accessible and this should not be made unavailability at any chance by the interference of the outsiders or the spiteful actions of the unauthorized persons. 2.2.5. Non-Reputation: [Siani et al, 2010] It is make sure that the agreements which are created automatically between the organizations or authorized persons and the officials should have been created to be confirmed if necessary. The security is needed at various levels in the organizations. The requirement is about the access to server, internet, database and the programs. The service supplier of the cloud should be ensured that the privacy of the data is well preserving. From the above views of authors it can be concluded that reliability, accessibility and non-reputation are common issues in the cloud computing security point of view. Modification of the innovative data ca be prohibited by the provider and this data should be used in proper way to maintain the integrity in the cloud. The complete resources which are needed by the user for processing the data should be accessible. This should not be created unavailability at any chance by the interference of the outsiders. 2.2.6. Other issues: [Steve, 2008] In a traditional enterprise environment, there are a number of tools which have been already developed for attaining the security in computer, storage and network. The data of the users is processed and co-located on the shared equipment in the concept of cloud computing. Basically, cloud computing can implemented in any type of the companies such as large medium and small and even startup companies. The given specific threats are caused for cloud security issues. The significant issues of securities are related by which parties are responsible for which features of security. Through the customer data security, some problems are raised such as the risk of loss, unauthorized collection and problem in usage of that. From the above views of authors it can be concluded that, according to usual project environment, there are a number of tools that have been previously developed for achieving the security in computer, storage and network. In the thought of cloud computing, the data of the users is developed and co-located on the communal tools. Cloud computing is used in any type of the companies such as large, medium, and small. Security issues in the cloud computing are caused by under given threats. Failures in the security provision: [Steve, 2008]The data is stored and the applications are run on the hardware and hypervisors and these are controlled by the cloud. The security of the cloud provider should be at very good standards. Form the above views of authors it can be concluded that, storing the data and the operation of applications are controlled by cloud and it employs based on the hardware and hypervisors. The cloud provider should have very good standards in the sense of security. Other customers attack: [Steve, 2008]All the customers inside of the cloud or connected with the cloud can be shared the data in the cloud environment. Access of the data or the interference of the data by other users can be possible at any chance if the barriers break down between the users. From the above views it can be concluded that, the customer of the cloud shares the data in the cloud environment. When the barriers break down between the users then interfering of the data or access of the data can be possible at any chance. Legal and regulatory issues: [Mather, 2009] Many legal and regulatory issues are being raised by implementation of the cloud computing techniques. There might be a restriction in the export of the data in an authority. In any cases such sensitive issues happened in cloud computing, there legal and regulatory problems should be addresses and resolved. By considering the above views of authors it can be concluded that, by implementing the cloud computing techniques in any organizations, many legal and regulatory issues are being raised. Legal and regulatory issues are happened hen the common issues raised. Perimeter Security Model Broken: [Mather, 2009] To have strong security at the perimeter of the enterprise network, the model of the perimeter security is being employed by most of the organizations. Over the years, this model has been failing with outsourcing and workforce as well as with high mobility. Some critical data and the applications can be stored by the cloud now even though it is certainly outside the perimeter of the enterprise. From the above views of authors it can be concluded that, the model of the border security is being employed by most of the organizations to have strong protection at perimeter of the enterprise network. From the past years, this model has been failing with high mobility, workforce as well as with outsourcing. 2.3. Fuzzy key word search in cloud computing: [Jin Li et al 2008] the unclear (fuzzy) key word search is widely prolonged the system usability via giving back the same files when the users penetrating contributions equals the predefined keywords accurately or the nearby believable corresponding files are dependent on keyword similarity semantics when specific match becomes ineffective. By considering the above views of authors it can be concluded that, the fuzzy keyword is extensively protracted the system usability by means of giving back the alike files when the users penetrating contributions equals the predefined keywords correctly. Otherwise, if the specific match becomes ineffective, the nearby credible matching files are needy on keyword similarity semantics. 2.4. Plain text fuzzy keyword search: [Li et al, 2008] The significance of the fuzzy search has increased focus in the conditions of the plain text search in information recovery zone. This problem has been documented in the classical information access paradigms through providing the user to search without trying and study the technique for determining the applicable data based on the predictable string corresponding. Therefore, the estimated string corresponding algorithms between one and another can be classified into two sections such as on-line and off-line. From the above views of authors it can be concluded that, in the plain text fuzzy keyword search, some problems are happened such as the significance of the fuzzy search has focus in the conditions of the plain text search in information recovery zone. Therefore, through providing the user to search without trying and study the technique for determining the suitable data based on the predictable string corresponding, this problem has been documented in the conventional information access paradigms. The estimated corresponding algorithms between one and other can be classified into two sections such as online and offline. [Chakrabart et al, 2006] However, according to the on-line techniques, the method of doing search without the participation of index seems to be unwanted for their short explores capability while the off-line technique employs indexing techniques for generating it to be completely faster. There is a number of indexing algorithms such as suffix trees, metric trees and q-gram methods and so on. On the first look, it is attainable for the user to describe these string matching algorithms are explicitly to the viewpoint of the searchable encryption through evaluating the trapdoors on the nature support locating in an alphabet. But, this insignificant structure will experience attacks connected with dictionary and statistics and somehow ineffective to achieve the search privacy. By considering the above views of authors it can be concluded that, in the sense of online techniques, the method of doing search without performance of index seems is unwanted for their short explore of capability. This method is done while the offline technique uses indexing techniques for generating it to be faster. It has a number of indexing algorithms such as suffix trees, metric tress, and q-gram methods and so on. But the important structure can be experienced which attacks connected with index and statistics. 2.5. Searchable encryption: [Curtmola et al, 2006] The previous searchable encryption methods have been extensively evaluated in the cryptography conditions. These works are majorly focused on the security definition formalizations and efficiency developments. In the early creation, each statement in the text is encrypted independently in a two covered encryption structure. Behind them, bloom filters approached into existence in order to create the indexes for the data files. [Bellare et al, 2007] This technique is developed and accumulated on the server for every file which consists of the trapdoors of overall words. In order to search for a word and finally sends it to the server, the user has to create the search request through evaluating the trapdoor of the word. After getting the request, the server checks whether any bloom filter have the trapdoor of the query word or bounces back the equal file recognizers. By considering the above views of authors it can be concluded that the earlier searchable methods are widely calculated in the cryptography circumstances. Theses works are significantly focused on the security definition formalizations and efficiency developments. In the previous generation, every statement in the text is encrypted independently in a two covered encryption structure. After that, bloom filters move towards into existence in order to create the indexes for data files. For each file, this method is developed and accumulated on the server which consists of the trapdoors of overall words. The user has to create the search request through measuring the trapdoor of the word in order to search for a word and finally sends it to the server. [Waters et al, 2004] Similar index techniques should be projected for achieving more successful search. This technique created a single encrypted confusion table index for the overall file compilation. Every entry has an encrypted group of file identifiers whose equivalent data files contain the keyword in the index table. And it has the trapdoor of a keyword. A Public -key based searchable encryption technique is also developed as a complementary approach for the first one. Though, these are not considered due to the issues with the agreement of the users. In fact, they are applicable for cloud computing as these whole current techniques assist just accurate keyword search. By considering above views of authors it can be concluded that, for accomplishing more successful search, similar index techniques should be projected. For overall file completion, this technique created a single encrypted confusion table index. In the index table, each entry has an encrypted group of files identifiers whose equal data files contain the keyword. And also it has the trap door of key word. Key based searchable encryption technique is also urbanized as balancing approach for the first one. However, these are not considered as a development, due to the issues with the agreement of the users. In fact, they are related for cloud computing as these whole current techniques help as accurate keyword search. [Shi et al, 2007] The confidential matching data in the conditions of the secure multi-party calculation is used to allow dissimilar parties in reviewing some function of their individual data without revealing their data to others collaboratively. These functions have the connection or approximate private matching of the two different sets. However, this technique is frequently employed method to recover the correspondent sets in secret. This has been widely employed in data retrieval from database and it usually acquires calculation complexity randomly. From the above views of authors it can be concluded that, the private corresponding data is used to permit different parties in reviewing some functions of their individual data without revealing their data to others in conditions of the secure multi party calculations. These functions have the approximate matching or the connection between two different sets. However, to recover the correspondent sets in confidential; this technique is frequently employed method. It is usually acquires calculation complexity randomly and it has been widely employed in data retrieval from data base. 2.6. Advanced techniques for building fuzzy key words: [Chow et al, 2009] Highly developed techniques are used to provide more sensible and efficient fuzzy keyword search constructions which include storage and search efficiency. They are mostly projected to expand the uncomplicated approach for structuring the unclear keyword set. The scholars concerted on the case of edit distance d=1 without loss of generalization in this technique. The calculation is same for better values ofd. This technique is carefully designed in such a way that it will not force the search accuracy while restraining the unclear keyword set. In accordance with the above observations, wild card based fuzzy set construction is developed in order to signify correct operations at the equal location. To avoid security issues in cloud computing, wild card based, gram based and symbol based fuzzy key words are used. From the above views of authors it can be concluded that, in avoiding security issues in cloud computing, wild card based, gram based and symbol based fuzzy key words can be used. More sensible and efficient fuzzy keyword search creations are provided by highly developed techniques which include storage and search efficiency. Basically, they are mostly projected in developing the simple approach to create the fuzzy keyword set. The researchers concentrated on the case of edit distance d=1 without defeat of simplification in this method. The computation is similar for improved principles ofd. Through this method, wildcard based fuzzy set structure is developed in order to mean right operations at the equal site. 2.6.1. Wildcard-based Fuzzy Set construction: [Song et al, 2000] A wild card based fuzzy set construction techniques are projected to signify the correct operations at the same position. The unclear or fuzzy set of wi signifies as Swi,d={Sà ¢Ã¢â€š ¬Ã‚ ²wi,0, Sà ¢Ã¢â€š ¬Ã‚ ²wi,1, ·Ã‚ ·Ã‚ · , Sà ¢Ã¢â€š ¬Ã‚ ²wi,d} with its edit distance d, where Sà ¢Ã¢â€š ¬Ã‚ ²wi,à Ã¢â‚¬Å¾ signifies the set of words wà ¢Ã¢â€š ¬Ã‚ ²i with à Ã¢â‚¬Å¾ wildcards. The correct operation on wi is accepted by each wildcard. It is completely described by considering the equation. For example, the words CASTLE with the pre-set of correct distance d=1 and its wildcard fuzzy key word is constructed as following: The storage in the clouds can be decreased based on the pre-set edit (accurate) distance d=1. When the correct distance is set 2, then the representation of size Swi, 2 will be When the correct distance is set to 3, then the representation of size Swi,3 will be By considering the above equations it can be concluded that, wildcard based fuzzy set structure is developed in order to mean right operations at the equal site. The accurate operation is accepted by this each wildcard. It is completely considered from the above equation. The data storage of the clouds can be decreased based on the pre-set edit distance d=1. The representation of size is based on their edit distances. 2.6.2. Gram based fuzzy set construction: [Behm, 2009] gram based creation is one of another efficient technique which is used to build the fuzzy set. The gram of the string is a substring which is used as a signature for the efficient estimated search. These grams are used for the matching purpose. The sizes are represented as follows: = = For the keyword CASTLE, the fuzzy word set can be created as follows: {CASTLE, CSTLE, CATLE, CASLE, CASTE, CASTL, ASTLE} By considering the above views of authors it can be concluded that, to create the fuzzy search set, this gram based fuzzy set construction is one of another best techniques. To use as a signature for the efficient estimated search, this creation of the string is considered as the substring. For the corresponding purpose these grams can be used. 2.6.3. Symbol-based Trie-traverse search scheme: [Feigenbaum, 2001] for improving the search efficiency, a symbol based trie-traverse search scheme is developed. A multi way tree is created for storing the fuzzy keyword set over a limited symbol set. The main reason behind the creation of the symbol based trie traverse search scheme is all the trapdoors sharing the common prefix and that may have common nodes. The symbols which involves in a trapdoor can be improved in a search from the root to the leaf at where the trapdoor ends. An empty set is present at the trapdoor then symbols can be recovered. By considering the above views of authors it can be concluded that, a symbol based trie-traverse search scheme is developed to expand the search efficiency. For storing the fuzzy keyword set over a limited symbol set, a multi way tree is created. The symbols can be recovered when any empty set is present at the trapdoor. 2.7. An efficient fuzzy keyword search scheme: [Boneh et al, 2004]The following points to be considered in order to build the efficient key word search scheme. They are stated below: At first, the information holder creates an unclear keyword set Swi, d to create the index for wi using the wildcard based technique. After that it needs to compute trapdoor set {Twi} for each wi ÃŽÂ µ S wi d with a secret key Sk shared data holder and the certified users. The data holder encrypts FID wi as,.. Though, the directory table and locked data files are outsourced to the cloud server for storage the data. The approved user computes the trapdoor set to search with w and k in which S w, k is also derived from the wildcard based fuzzy set structure. Then users send to the server. The server evaluates them with the locked file recognizers upon getting the search request. At the end, the user recovers appropriate files of interest and unlocks the returned results. [Bao et al, 2008] The method of creating search request for w is matching to the creation of directory for a keyword in this onset. Thus, the search request is a trapdoor set needy on S w, k as an choice of a single trapdoor as in the straightforward method. In this way, the searching result accuracy can be assured. From the above views of author it can be concluded that, to create an efficient fuzzy key word search, above given two points would be considered. They are: the first one is fuzzy keyword is created by the information holder. And the second one is the accepted user computes the trapdoor set to search with wildcard based fuzzy keyword structure. 2.8. Conclusion: Cloud computing is the IT liberation model which offers infrastructure and computer resources as service. Through take up the cloud computing, business activities can be carried out with little difficulty and greater efficiency. Cloud computing provides many advantages to various ranges of customers and it is simple to acquire. Generally, cloud computing provides the dynamical and scalable resources as a service over the internet. Cloud is used for reducing the capital and operational expenditure, and provides economical growth. Even the adoption of cloud computing in organizations has many advantages and still it faces a number of risks. In the cloud computing, the significant data of the customer can be stored in data centers. The cloud computing is divided into three sections namely cloud application, cloud platform, and cloud infrastructure. It has some issues in their operation they are: operational security, privacy, reliability, accessibility, non reputation, failures in the security provision, other customer attacks, legal and regulation issues, and perimeter security model broken. The fuzzy keyword is extensively prolonged the system usability by means of giving back the alike files when the users penetrating contributions equals the predefined keywords correctly. The significance of the fuzzy search has increased focus in the conditions of the plain text search in information recovery zone. The confidential matching data in the conditions of the secure multi-party calculation is used to allow dissimilar parties in reviewing some function of their individual data without revealing their data to others collaboratively. Highly developed techniques are used to provide more sensible and efficient fuzzy keyword search constructions which include storage and search efficiency. To avoid security issues in cloud computing, wild card based, gram based and symbol based fuzzy key words are used.

Tuesday, November 12, 2019

Stereochemistry: Addition of Bromine to Trans-Cinnamic Acid

STEREOCHEMISTRY: ADDITION OF BROMINE TO trans-CINNAMIC ACID Required Prelab Readings:McMurry Chapter 5, Sections 8. 2 & 21. 2 Morhig, Sections 7. 1 and 7. 3. Previous techniques that you must know and be able to perform: Suction Filtration and Melting Point This experiment is designed to demonstrate two concepts. First, it will provide a demonstration of how chemists can use chemical reactions to understand reaction mechanisms. Second, is the concept of multi-step synthesis. You will be performing the following reaction: Isomer IIsomer II + Enantiomer+ EnantiomerBrominetrans-Cinnamic Acid2,3-Dibromo-3-phenylpropanoic acid MW 160 g/molMW 148 g/molMW 308 g/mol bp 60  °Cmp 133-134  °Cmp 93-95  °Cmp 202-204  °C When an electrophile, such as bromine, adds to an alkene, the addition can be done in a syn fashion, in which the two groups add to the same side of the molecule, or in an anti fashion, in which the groups add to opposite sides of the molecule. Depending on the mode of add ition, syn or anti, and the stereochemistry of the starting alkene, various stereoisomers will result. In some cases, a racemic mixture of products is formed, other times a meso compound is produced. Feature Article –  Free-Radical BrominationThe Fischer projections shown above are two possible stereoisomers that could form in the bromination reaction that you will perform. One is the result of a syn addition, the other is the result of an anti addition mode. Note that each would form as a racemic mixture, (+). You are to determine, based on the melting point of your product, which pair of enantiomers is produced. By knowing which enantiomeric pair is formed one can predict a plausible mechanism. Hint: you can predict the stereochemical outcome of a syn vs. anti addition of bromine to alkenes before you step foot into the laboratory.The simplest example of a multi-step synthesis is to examine virtually any commercial medicine. Almost without exception that medicine was prepared by a series of reactions rather than in a single step. A multi-step synthesis generally requires a chemist to perform a chemical reaction, isolate, purify and characterize the product and then use that product as the starting material for the next reaction. You will be using the product of this reaction as your starting material next week. It will be important for you to have the product from this week properly identified so you can correctly predict the product of next week’s reaction. The most time-consuming part of this experiment is setting up the glassware. Be sure all fittings are tight, well-greased, and clamped so as to prevent any escape of bromine vapors into the laboratory environment. An actual set-up is provided for you in the lab for you to look at. ? You will need to set up the apparatus as shown in figure 7. 4 a on page 63 of Mohrig. NOTE:You are responsible for calculating the amount of trans-cinnamic acid (in grams) equivalent to 4  mmol. You must have this done before you enter the lab. HazardsMolecular bromine is extremely toxic and corrosive; its vapors are damaging to the skin eye and respiratory tract. Wear gloves and UNDER NO CIRCUMSTANCES AR E YOU TO REMOVE THE BROMINE STOCK SOLUTION FROM THE HOOD. Only remove your bromine solution in the stoppered funnel. Sodium thiosulfate reduces Br2 to Br-1. When working with Br2, always keep a bottle of 5% sodium thiosulfate handy for rinsing the skin in case of contact. Experimental ? Assemble a 50 mL round-bottom flask with a Claisen head, reflux condenser, and addition funnel. Into the round-bottom flask, add trans-cinnamic acid (4 mmol) and 10 mL of methylene chloride.Add a stir bar. ? Obtain 4. 0 mL of a 1. 0 M solution of bromine in methylene chloride in the addition funnel. Attach a heating mantle and variac and heat the mixture to a gentle reflux. The variac setting should initially be 25-30. Adjust this setting as necessary until the solution is refluxing . ? While it is refluxing, add the bromine solution at a rate of two drops per second. You need not loosen the stopper on the funnel for the bromine addition due to the high density of methylene chloride. The red-orange c olor of the bromine should dissipate as it reacts with the mixture.Continue to reflux for an additional 10 minutes after the last of the bromine has been added. ? The color of your final solution should be a very pale yellow. If the red-orange color persists after the 10 min, add cyclohexene dropwise (1-2 mL) until the red color disappears. ? Remove the reaction flask and cool it in an ice bath for 10 minutes with a greased stopper on top. Allow the product, 2,3-dibromo-3-phenylpropanoic acid, to crystallize. ? Meanwhile, disassemble the rest of the reflux apparatus and sit it in the back of your hood to allow the fumes to dissipate.Rinse the glassware with a small amount of sodium thiosulfate to destroy any remaining bromine. ? Collect the crystalline product by suction-filtration, and rinse with a minimal amount of ice-cold methylene chloride. Allow it to air-dry and record the mass and melting range of the product. Have your instructor check the weight of your product and initial this value in your lab notebook. Save all of your product as it is the starting material for next week. STEREOCHEMISTRY: Addition Of Bromine To trans-Cinnamic Acid DATA SHEET NAME: Section Number: Overall Reaction (including stereochemistry, Symyx Draw): Mass of acid: Theo mmol product: mmol of acid:Theo mass product: Volume of Br2 sol’n: Mass recovered product: mmol of Br2: mmol recovered product: % yield of product: Melting point of recovered product: Literature melting point: Calculations: (notebook) Post Lab Questions 1. What is the stereochemical relationship between Isomer I and Isomer II? 2. Use perspective drawings, Fischer Projections and words, to demonstrate whether syn addition of bromine to trans-cinnamic acid results in Isomer I or Isomer II. Repeat the process for anti addition. NOTE CAREFULLY:The question is about mode of addition (syn vs. anti), not mechanisms; do not use curved arrows to explain your answer.3.Based on your results, did the addition occur by a syn or anti mode? Explain your reasoning. 4. Provide the â€Å"electron-pushing† mechanism for this reaction and show how both enantiomers are produced. Use perspective representations to draw structures. Assign the R / S configuration to each stereocenter in the products. 5. Using perspective drawings with the correct stereochemistry, redraw the pair of enantiomers you drew in question 4 and show how each can be redrawn as the Fischer projection of Isomer I, Isomer II, or the enantiomer. Clearly label all stereocenters as R or S. 6. Show the products of the following electrophilic addition reactions (symyxdraw):

Sunday, November 10, 2019

The Future of Oil

TIME Magazine, titled † The Future of Oil† by author Bryan Walsh which is a senior writer for TIME magazine, covering energy, environment and diseases infers and appraises the future of oil in the aspect of economy, value, scarcity and finding its alternatives. The author reveals and reviews the importance of oils to global economy as well as the urgency on finding another replacement for oil in order to flee the world from over-relying on this non-renewable natural resources.This facts have agonized the world and people starts concerning nice decades ago when people found that the oil is not renewable and not reusable. SUMMARY In the first part of the article, the author reviews the discovery of new plentiful oil sources in the Atlantic Ocean 180 miles east of ROI De Jeanine could producers,OHO barrels of crude a day, yet it is still disproportional to the demand all around the world.Nevertheless, the latest advanced technologies applied on automobiles and recession of e conomy in US have temporary shed the demand oil, the rapid growth in other countries like China, India and certain developing countries have equalize gain the demand and supply graph back to the extreme level. These bring a phenomena that plentiful but expensive oil in the market. The price of oil will still be hardly to drop. Moreover, there is still no other substitute available for oil, it is prone to be big booms and deep busts, taking the global economy along with it.When the global economy heats up, demand for oil rises, boosting the price and encouraging producers to pump more. Inevitably those high prices eat into economic growth and reduce demand Just as suppliers are overproducing. Prices crash, and the cycle starts all over again. However, the environmental issues and costs have to be brought to be concerned. The catastrophic oil spill accident happened in the Gulf of Mexico had brought huge impact to the environment and it needs decades to recover.Yet, the demand of oil is never stop, supply of oil must be ideally inexhaustible to the world. People are facing the more challenging and dangerous tasks while getting the unconventional oil to satisfy the demand of oil. Hence, the best solution is still to develop other kind of energy alternative to break temporally of oil for environmental, economy and future. Analysis of the Presentation The first element of the article â€Å"The Future of Oil† written by Bryan Walls in April 2012 that is going to be discusses will be the author's purpose of intent.From the article, the author's purpose is to inform the audience about the current amount of available crude left and the number of production of barrels of oil per day which to fulfill the unlimited demand from the international market, and to predict that the oil which supports our daily transportation will be getting expensive in the future and it will be much more polluting in order to process the oil as the process is destructive to the environm ent. The second element to be discusses will be the author's point of view.As what have written before, since the author have stated that the price of oil becomes expensive (Bryan Walls, 2012). Thus the author suggests that it will be important to hold as more researches and developments of carbon-free alternatives such as wind power, solar power, nuclear power and befouls as possible now in order to reach better technology in fuel-efficiency which is believed potential to reduce the burden of the high price of oil in our daily life later. Next, the author's tone in writing the article will be another element to be discusses where a tone fleets the author's feeling and attitude towards the subject.Audience can feel the author's tone was excited when he describe on the size of the floating oil-production platform deck in Atlantic, Brazil which he wrote † The platform deck is so big you could play the Super Bowl on it, if not for the nest for the interlocking pipes and valves th at circulate oil, methane and steam throughout the ship. † (Bryan Walsh, The Future of Oil, paragraph 2 line 5-7). The author shows the feeling of regret too from his word â€Å"A combination of recession, conservation and improved auto efficiency has eloped the U.S. Shed demand impressively. But demand in China, India and other developing nations have replaced it. Result: plentiful but expensive oil that translate into painfully high gas prices. † (Bryan Walsh, The Future of Oil, paragraph 5 line 3-5). Other than that, the author's worry can be found from the written â€Å"The new supplies are for the most part more expensive than traditional oil from places like the Middle Each, sometimes significantly so. They are often dirtier, with higher risks of accidents. (Bryan Walsh, The Future of Oil, paragraph 8 line 2-4). The author also wows the feeling of sarcastic and contradiction when he wrote muff may not like Exxon because of the pump price or its oversize profits, but how much love do you have for autocratic poetasters like Iran or Russia? Oxen's growth trickles down; the oil-and-gas industry created 9% of all new Jobs last year, according to a report by the World Economic Forum, even as oil companies booked multimillion-dollar profits. † (Bryan Walsh, The Future of Oil, paragraph 15 line 5-9).The author used the tone sarcastic once again later in his word â€Å"Low oil prices in the sass lulled U. S. Auto companies into disastrous complacency; they had dew efficient models available when oil turned expensive. † (Bryan Walsh, The Future of Oil, paragraph 18 line 5-6). Other than all of the above, the author used the tone of exaggerate when he describing the amount of available extreme oil, â€Å"Extreme oil meaner there will still be enough?more than 1 trillion barrels by one estimate?to keep cooking the planet if we decide to burn it all. (Bryan Walsh, The Future of Oil, paragraph 25 line 7-8). In addition, the author used some fact information instead of opinion sentences teen the paragraphs in the article; which a fact is the statement that can be proven right or wrong, and an opinion is the statement of feeling that cannot be proven right or wrong (Dahlia, Critique Essay). The author stated that since there is increase in crude collecting activities which requires drilling technology now thus â€Å"Tight oil has helped revivalist the American drilling industry. (Bryan Walsh, The Future of Oil, paragraph 11 line 1). Besides that, the author also stated that U. S. ‘s import of liquid fuels have decreased from 60% in year 2005 to 45% in last year, if domestic oil production continues to rise, U. S could move toward to energy independence (Bryan Walsh, The Future of Oil, paragraph 12). Other than that, he also included fact information in his article, written that â€Å"There is no substitute for economy along with it. (Bryan Walsh, The Future of Oil, paragraph 17). Last of all, the author have ref erred to other's speeches and opinions such as from President Obama, energy expert–Michael Clare, state geologist of Text–Scott Tinker, and chief economist at EIA?Afterbirth, which he have written into his article â€Å"The Future of Oil† but yet he do not enclose the links and quote them to the references or origins which e have used as materials, thus his scholarly is considered as unclear.RESPONSE TO THE PRESENTATION In the article â€Å"The Future of Oil†, author Bryan Walsh has used many statistics and data to strengthen the persuasiveness of his view to audience, but he fails to indicate the exact sources of certain data. Maybe some of these data are very common to local people, example the average price of oil last year in US, â€Å"Last year the average cost for a gallon of unleaded was $3. 51, the highest on record, up from $2. 90 a year before. On March 26 the national average was$3. 90†³(Bryan, 2012), but that was uncommon to reader from other area.He actually should include the sources of those data in order to make his article to be more convincing. The same problem occurs on the information on the production of crude barrels daily by Petrol's in Atlantic Ocean. The author stated the amount of crude produced, but he did not mention where he got the data from. Instead, these might bring some doubts and seems exaggerating to the audience. Nevertheless, in this article, Bryan Walsh focuses more on the impact of oil to US economy,but hectically provides sufficient facts while explaining the influence of oil to the global future economy.He states and redirects US might be able to achieve energy independence as more sophisticated hydraulic fracturing and horizontal trinitrotoluene's applied to open up reserves of oil which previously considered unobtainable, but he does agree also that more production of oil in US does not really help to calm the increasing global oil demand. He states â€Å"Energy security is fine, bu t it doesn't have that much meaning in a globalizes economy,† says Guy Caruso, a former head of the EIA (Bryan, 2012).This is very true that no matter how much new and unconventional oils are being discovered, the world will never satisfy from the supplies. Nonetheless, Bryan Walsh, in his article, besides economy issues, he does talk about the impact of producing oil to the environment, the true cost to the environment which he intends to warn people the consequences and the future challenge of producing oil. He does provide some facts and sayings of certain representative to attract reader's attention on this serious issue.Example†elf you think cleaning up an oil spill in the Gulf of Mexico was tough, try doing it in the remote, forbidding Arctic. But even greater than the immediate environmental danger posed by unconventional oil is the larger risk to the climate. â€Å"(Bryan, 2012). However, he fails to picture out how destructive the consequences and negative effe ct to the environmental. Instead, he provides saying like â€Å"There's enough carbon there to create a totally different planet,† says James Hansen, a NASA climatologist and activist (Bryan, 2012) without explaining how different planet would it be.At the last part of the article, author Bryan Walsh has clarified his view on the future of oil. He denotes that new coming sources and unconventional oil does not really help to solve the fundamental problem. He does need of oil. He includes some facts to show the effort of people to increase the efficiency in order to waste the energy sources. â€Å"Beam's push to increase corporate average fuel-efficiency standards for vehicles to 55 m. P. G. By 2025 is vital†(Bryan, 2012).

Friday, November 8, 2019

Whale Species That Migrate and the Distance Traveled

Whale Species That Migrate and the Distance Traveled Whales may migrate thousands of miles between breeding and feeding grounds. In this article, you can learn about how whales migrate and the longest distance a whale has migrated. About Migration Migration is the seasonal movement of animals from one place to another. Many species of whales migrate from feeding grounds to breeding grounds - some traveling long distances that may amount to thousands of miles. Some whales migrate latitudinally (north-south), some move between onshore and offshore areas, and some do both. Where Whales Migrate There are over 80 species of whales, and each has their own movement patterns, many of which are not yet fully understood. In general, whales migrate toward the colder poles in the summer and toward the more tropical waters of the equator in the winter. This pattern allows whales to take advantage of the productive feeding grounds in colder waters in the summer, and then when productivity lowers, to migrate to warmer waters and give birth to calves.   Do All Whales Migrate? All whales in a population may not migrate. For example, juvenile humpback whales may not travel as far as adults, since they are not mature enough to reproduce. They often stay in cooler waters and exploit the prey that occurs there during the winter. Some whale species with fairly well-known migration patterns include: Gray whales, which migrate between Alaska and Russia and Baja CaliforniaNorth Atlantic right whales, which appear to move between cold waters off the Northeastern US and Canada to waters off South Carolina, Georgia and Florida.Humpback whales, which move between northern feeding grounds and southern breeding grounds.  Blue whales. In the Pacific, blue whales migrate from California to Mexico and Costa Rica. What Is the Longest Whale Migration? Gray whales are thought to have the longest migrations of any marine mammal, traveling 10,000-12,000 miles round trip between their breeding grounds off Baja California to their feeding grounds in the Bering and Chukchi Seas off Alaska and Russia. A gray whale reported in 2015 broke all marine mammal migration records - she traveled from Russia to Mexico and back again. this was a distance of  13,988 miles in 172 days. Humpback whales also migrate far - one humpback was sighted off the Antarctic Peninsula in April 1986 and then resighted off Colombia in August 1986, which means it traveled over 5,100 miles. Whales are a wide-ranging species, and not all migrate as close to shore as gray whales and humpbacks. So the migration routes and distances of many whale species (the fin whale, for example) are still relatively unknown. Sources Clapham, Phil. 1999. ASK Archive: Whale Migrations (Online). Note: Accessed online October 5, 2009. As of October 17, 2011, link no longer active.Geggel, L. 2015. Gray Whale Breaks Mammal Migration Record. LiveScience. Accessed June 30, 2015.Journey North. 2009. Gray Whale Migration (Online). Accessed October 5, 2009.Mead, J.G. and J.P. Gold. 2002. Whales and Dolphins in Question. Smithsonian Institution Press: Washington and London.

Wednesday, November 6, 2019

sociological imagination essays

sociological imagination essays The "Sociological Imagination" was introduced by C. Wright Mills in 1959. Sociological imagination refers to the relationship between individual troubles and the large social forces that are the driving forces behind them. The intent of the sociological imagination is to see the bigger picture within which individuals live their lives; to recognize personal troubles and public issues as two aspects of a single process. Sociological imagination helps the individual to understand the society in which they live in by moving the individual away from reality and looking beyond the picture it self. By doing so it helps to show the strong link between an individual's personal life and the society in which they live. The sociological imagination requires us to engage in the study of an individuals biography; but to place that biography in the larger context of the history and tradition of the society in which that individual lives. By acknowledging the relation between history and biography we can see how personal troubles and social problems are connected. Many times people fail to see their own biographies as being correlated to the larger public of society. Mills wrote that we find troubles within the character of the individual and within the range of his immediate relations with others. The intermediate is the individuals social environment. Public issues, or social problems, exist in the impersonal structures, institutions, and processes of society. Mills suggests that with the sociological imagination we can see how troubles and issues are related, how troubles experienced privately can be connected to public issues located in the structure of society. Mills argued that in order to avoid becoming victims of a large, seemingly distant event; we must learn to understand the relationship between private troubles and social issues. For example if a small group of people in a society were unemployed, then o...

Sunday, November 3, 2019

Cultural Awareness on Iran Research Paper Example | Topics and Well Written Essays - 1750 words

Cultural Awareness on Iran - Research Paper Example Iran possesses a unique culture that traverses across several elements. Culture is an aspect that achieves definition from different entities. Iranian culture belongs to the larger Persian identity that defines most countries in the same region. Persian culture forms one of the richest compositions in the world. This relates to literature, architecture and live customs that date back to three thousand years ago in the Zoroastrian age. Throughout civilization, this culture transferred to the eastern and western nations. It is notable that many western celebrations achieve their articulation from Persian culture. Art is an imminent feature of Persian culture. Art and culture interweave to form a prominent civilization. This reveals in the form of exquisite carpets, distinct architecture, subtle soulful music, blue mosques and brilliant literary work. Notably, Farsi forms one of the richest languages in the world. ... Bakhtiaris and Lurs speak the Luri dialect. There are semi nomadic people who speak the Baluchi language. They live in the adjacent areas, of Pakistan and Afghanistan, in the southeastern Iran. Twenty eight percent, of the Iranians, speak various Turkish dialects. Arabs and Assyrians mostly speak Semitic languages. Islam defines the core of Iranian culture and life. Islam forms the religion that governs political economic, legal and personal lives of Iran. In this aspect, Prophet Muhammad is the last God emissary that brought revelation to mankind. Islam provides that this message belongs to the whole of mankind. As in the example, of the Bible, Quran is the basic guidance of their religious life. Unlike the provision of the Bible, Quran strongly dictates many aspects of Iranian lives. Muslims have notable obligations such as praying five times a day. Friday forms a holy day in the Muslim worship calendar. Islam is an influential religion that dictates closure of companies on Thursda ys. In the holy month, of Ramadan, all Muslims are mandated to fast. Notably, Iran forms the only Shi’ite state of all the Muslim countries. Sunnis believe that the successive leadership of the Muslims did not have to come from the Prophet Muhammad family. The Shi’ite believes that the Islam leadership should have been monarchial. Iran and Iraq possess the highest population of Shi’ites. In terms of family values, the family forms the core social unit. In an Iranian setting, a family forms a very private unit. This is a distinct aspect whereby female relatives face protection from outside influences. A clear manifestation, of this cultural aspect, pertains to the taboo of asking a question about female relatives and someone’s life.