Thursday, August 27, 2020

Whether Muslim-majority Kashmir Valley, should be separated from India Essay

Regardless of whether Muslim-dominant part Kashmir Valley, ought to be isolated from India or should the whole Jammu and Kashmir State of India be isolated from India, including no - Essay Example Also, this paper presents a portion of the potential arrangements that have been offered for the goals of this issue and endeavors to propose a potential answer for shut down this issue for the last time. Kashmir is situated in the Northwest of the sub landmass. Generally, the valley comprised of the territory lying between incredible Himalayas and the Pir Panjal go. Be that as it may, current Kashmir is alluded to the region controlled by India †Kashmir valley, Jammu and Ladakh; the zone managed by Pakistan †Azad Kashmir; and Aksai Chin, which is in China (Wikipedia.org, 2007). Kashmir has consistently been a Muslim lion's share zone. According to the 1901 evaluation that was completed by British Indian Empire, practically 75% of the populace comprised of Muslims, 24% were Hindus, and the others were Buddhists. The significant populace of Hindus was in Jammu which had practically half Hindus populace, while in Kashmir valley, Muslims were in predominant dominant part with roughly 94% of the complete populace and Hindus were just 5% (Imperial Gazetteer of India, 1908). According to the statistics of 1941, Muslim populace of Kashmir was 93.6% and Hindus were just 4% (Mridu, 2004). In 2003, the rate populace of Muslims in the Kashmir valley was 95% with Hindus just 4%. In Jammu, the rate populace of Hindus was 66% and Muslims 30% (BBC, 2003). These figures plainly show that Kashmir valley has been a Muslim prevailing zone as far as populace while the significant segment of populace in Jammu comprises of Hindus with Muslims as second greater part. According to the recipe for separating the sub landmass, concurred between both Hindu and Muslim pioneers, the province of Jammu and Kashmir was to be either connected with Pakistan because of its Muslim lion's share in populace, or must be related with India if the individuals of Kashmir need that. There was no goals or exhortation to make it a different state, liberated from both Indian and Pakistani limit. The individuals of

Saturday, August 22, 2020

American Home Products Corporation Essay

1. What amount of business chance does American Home Products face? What amount money related hazard would American Home Products face at every one of the proposed degrees of obligation appeared on the off chance that Exhibit 3? What amount of potential worth, if any would american be able to Home Products make for its investors at every one of the proposed degrees of obligation? A blend of business hazard and money related hazard shows the danger of an organization’s future profit for value. Business hazard is identified with make a firm’s activity with no obligation, though money related hazard requires that the firm’s normal investors settle on a choice to fund it with obligation. an) American Home Products has been working on four fundamental lines of business that are less vulnerability about item request; for instance, one of its business lines is food items in light of the fact that at whatever point individuals purchase nourishments. It implies that AHPâ €™s business hazard is low. As referenced above, if a firm does its activity exercises routinely without influence, it implies that its business hazard isn't noteworthy high. Hence, proportion of money to add up to resources is determined by following: As indicated by Figure 1, AHP’s money was about 23% of all out resources, rose continually since 1978 to 1981, and arrived at 28.2% in 1981; along these lines, it has enough income to back its every day operation. Also, return on resources can show that a firm’s capacity to take care of its working expense by producing salary. As indicated by the estimation underneath, American Home Products Corporation’s ROA was steady and roughly 19.2 % in 1981; thus, AHP earned adequate measure of salary to take care of its working expense. Figure 2 Return on Assets of Amercan Home Products Corporation, 1972-1981 ($ in millions) Add to these above clarifications, Exhibit 1 shows that AHP’s top yearly development in deals was 14.1% in 1978 and contrast with it, yearly development in deals diminished by 5.3% in 1981; accordingly, it became weakness to AHP in light of the fact that purchasers began to enthusiasm into competitors’ items. Hazard avoidance was the most essential part of AHP’s culture; therefore, they want to get or take permit of recently created merchandise or produce comparable items with its rivals instead of to grow new-items. In spite of the fact that it appears to spare R&D costs, securing cost or an expense of time reaction to take other’s development would be still showed up. In this way, AHP should attempt to improve its deals. b) Financial hazard is identified with business chance, so we estimated NOPAT, ROIC, ROE whose vulnerability future can decide a firm’s business chance in Figure 3. Figure 3 Pro Forma 1981 Results for Alternative Capital Struc tures ($ in millions aside from proportions) Above ace forma delineates that all out obligation and money related hazard have straight relationship with one another and AHP’s absolute obligation expanded, so its monetary hazard would rise. At that point if American Home Products Corporation couldn't pay its advance and enthusiasm by plan, it would meet the money related hazard and the danger of chapter 11. As indicated by Exhibit 4, AHP utilized abundance money of 233 million dollars on every one of the proposed levels to repurchase stocks and remaining sums were financed by obligation; in this way, its normal offers extraordinary would diminished by 19.8 million offers on 30% dept proportion and 36.6 million offers on 70% obligation proportion. It implies that value will goes down, so its arrival on value will rise. AHP ought to consider about money related hazard to change the capital structure. American Home Products Corporation can spare duties to pay by expanding obligation. Figure 4 delineates that its assessments reserve funds can be favorable position to AHP in the event that it utilizes heavier capital structure. Figure 4 Pro Forma 1981 Taxes Savings ($ in millions) As per Figure 4, if the company’s capital structure is 70% obligation to add up to capital, contrasting with 30 % obligation to add up to capital structure, it can spare around 1.9 occasions more prominent cash; accordingly, its investors would profit by it. 2. What capital structure would you suggest as fitting for AHP? What are the upsides of utilizing this organization? The hindrances? How might utilizing up influence the company’s charges? How might the capital markets respond to a choice by the organization to build the utilization of obligation in its capital structure? Most suitable capital structure for American Home Products is 30% obligation to add up to capital. A few reasons will clarify the motivation behind why this structure offers preferred position to AHP. The first, as utilizing 30% obligation proportion, the organization would have the option to be recapitalized; thus, regular offers exceptional of 19.8 million can be repurchased. The second, as indic ated by Figure 4, AHP would have bit of leeway to spare expenses of 37.8 million dollars and its investors advantage by getting more qualities. Display 2 shows that Warner Lambert company’s obligation proportion is roughly 32% and its bond rating is AAA or AA. It implies that if AHP utilizes 30% obligation and 70% value, its bond rating will be same as Warner Lambert; therefore, bond enthusiasm to pay won't increment much because of bond rating. Expansion to these reasons, AHP would confront less hazard to think about heavier capital structures. At long last, AHP’s yearly development in deals diminished in 1981 by 2.9% from earlier year, so getting obligation could be useful to deal with its activity viably and increment its business development. Other than above favorable circumstances, utilizing 30% obligation and 70% value capital structure has inconveniences. As a matter of first importance, if a firm has a credit, it must be capable to pay its standard and enthusiasm as a timetable; else, it would be motivation to chapter 11; hence, same guideline chips away at instance of AHP. Notwithstanding the danger o f liquidation, if the company’s day by day activity requires greater venture after recapitalization, getting new credit for it would be progressively troublesome. In conclusive, utilizing obligation can be motivation to build its monetary hazard, so it must be increasingly mindful so as to deal with its activity. As indicated by Figure 4, utilizing the organization by utilizing 30% obligation to capital structure would diminish its assessments of 37.8 million dollars to pay. The capital market would respond emphatically to a choice by the organization to utilization of 30% obligation in its capital structure. The organization had basically no obligation and had abundance of money or higher liquidity and Mr. Laborte who was CEO of the organization was close to give his position as a result of retirement, so most investigators anticipated that the organization should change its traditionalist capital structure. Additionally, Figure 5 shows the market positive response on the stock cost. Figure 5 Stock Price of AHP ($ in millions with the exception of per share pieces of information and proportions) As per Figure 5, AHP’s stock cost will increment to 31.5. So as to compute new stock value, we utilized normal value/profit proportion of both American Home Products Corporation and Warner Lambert Company in Exhibit 2 since show 2 delineates that while P/E proportion of AHP is 10.6%, 8% for Warner Lambert and not at all like Warner Lambert, AHP has less monetary hazard. All however AHP’s hazard will increment in the wake of getting influence and its P/E proportion will diminish, AHP would have preferred money related situation over Warner Lambert, so financial specialists would be intrigued to purchase AHP’s stock as opposed to load of Warner Lambert. 3. By what means may AHP actualize an increasingly forceful capital structure approach? What are the elective techniques for utilizing up? AHP should utilize heavier capital structure which implies that expansion to utilize more obligation rather than moderate capital structure; thus, AHP’s capital structure may be increasingly compelling and forceful. The elective techniques for utilizing up are advancing new items, utilizing better innovation, and persuading work. 4. Considering AHP’s one of a kind corporate culture, what contentions would you advance to convince Mr. Laporte or his replacement to receive your suggestion? As indicated by Mr. Laporte, his organization works so as to expand investors riches, so as utilizing 30% obligation to capital would offer chance to spare 37.8 million dollars from charges; in this way, its investors would profit getting higher profits per share. Despite the fact that in the wake of utilizing obligation, its cost/profit proportion may be diminished, its fascination of financial specialists will be still ground-breaking due to stock cost increment. Additionally, if the organization utilizes more obligation to the activity, it will be conceivable to repurchase normal supplies of 19.8 a large number of offers from advertise.

Friday, August 21, 2020

Successful Entrepreneurs Reveal the Best Advice They Ever Got

Successful Entrepreneurs Reveal the Best Advice They Ever Got Make Money Online Queries? Struggling To Get Traffic To Your Blog? Sign Up On (HBB) Forum Now!Successful Entrepreneurs Reveal the Best Advice They Ever GotUpdated On 18/08/2017Author : Pradeep KumarTopic : BusinessShort URL : https://hbb.me/2uNOkst CONNECT WITH HBB ON SOCIAL MEDIA Follow @HellBoundBlogSuccessful entrepreneurs are in a class by themselves. It takes guts, instinct, determination, curiosity and often a little bit of luck to turn an idea into a viable long-term business. How do they do it? It turns out many of them received valuable advice from a variety of different sources when they were starting out that set them on the path toward success. Here are their stories.Stay Hungry, At Least in the BeginningSara Rotman, the founder of MODCo, an in-demand ad agency with high profile clients, including Vera Wang and Tory Burch, clearly remembers the best advice she received before her companys launch. She and her then accountant were discussing how much money Rotman needed t o borrow. The accountant looked Rotman in the eyes and said, Only have enough cash on hand to barely survive; never so much youre comfortable. In other words, stay scared, particularly in the beginning.Its a sentiment also voiced by Scott Vollero, founder of Autocats. When you know you have a successful business model, being hungry makes you reach out in ways you wouldnt have otherwise.Theres No Such Thing as a ShortcutMark Cuban, the owner of the Dallas Mavericks, entrepreneur, and billionaire investor credits his father for teaching him how to succeed. His dad, a car upholsterer, bluntly said, There are no shortcuts. In other words, do more than you think youre capable of. Out-think, out-sell, and out-work yourself and everybody else.Cuban says of his father, He was always very encouraging but also realistic.Surround Yourself With Great PeopleBusiness advise from a wrestling coach? Thats exactly where the writer and entrepreneur Tim Ferrisss best advice came from. The advice? Your e the average of the five people you associate with most. Whether youre looking for investors, hiring a support team or choosing business partners, if your associates are the best of the best, your average can only get better.READHow Going Viral Transforms Your BusinessSeek Out MentorsMarcus Lemonis credits highly successful entrepreneur, Lee Iacocca, with the best advice he ever received. The famous automobile exec who spearheaded the development of Fords Mustang and revived the ailing Chrysler Corporation in the 1980s became an early influence for Lemonis. Iacocca told Lemonis to get into a business where he could make a difference and become a catalyst for change. In other words, dont follow the crowd. Create a crowd of your own.Simplicity Through StudyDan Horan, the founder of 5 Acre Farm, believes in keeping it simple. How does he do it? By studying everything about his ventures, from business cards to complex financials. The goal, Horan explains, is to present it simply, parti cularly when it comes to people: when people buy something, they dont want a lecture. The same is true whether youre dealing with customers, investors, business partners or staff.Value Your Time â€" No One Else WillEntrepreneur David Lais best advice came from his father. His dad said, We all only have 24 hours a day. Its what we choose to do with that time that defines us. Lai adds, Its the one thing you can never get back. Although the philosophy fits life as well as business, it has an added importance for the entrepreneur. Your time is precious. Make every minute count.Ask, Then ListenElon Musk advises budding entrepreneurs to get as much feedback as possible about their ideas and then listen, think and analyze. You dont have to agree with the feedback, he explains, but often youll get valuable information that makes your business model stronger. And that, of course, is what being an entrepreneur is all about.

Thursday, May 14, 2020

Code of Ethics for United States Government Service

In general, rules of ethical conduct for persons serving the U.S. federal government are divided into two categories: elected members of Congress, and government employees. Note that in the context of ethical conduct, â€Å"employees† includes persons hired or appointed to work for the Legislative Branch or on the staffs of individual Senators or Representatives, as well as those executive branch employees appointed by the President of the United States. Active duty members of the U.S. military are covered by the codes of conduct for their specific branch of the military. Members of Congress The ethical conduct of the elected members of Congress is prescribed by either the House Ethics Manual or the Senate Ethics Manual, as created and revised by the House and Senate committees on ethics. Executive Branch Employees For the first 200 years of the U.S. government, each agency maintained its own code of ethical conduct. But in 1989, the Presidents Commission on Federal Ethics Law Reform recommended that individual agency standards of conduct be replaced with a single regulation applicable to all employees of the executive branch. In response, President George H.W. Bush signed Executive Order 12674 on April 12, 1989, setting out the following fourteen basic principles of ethical conduct for executive branch personnel: Public service is a public trust, requiring employees to place loyalty to the Constitution, the laws and ethical principles above private gain.Employees shall not hold financial interests that conflict with the conscientious performance of duty.Employees shall not engage in financial transactions using nonpublic Government information or allow the improper use of such information to further any private interest.An employee shall not, except as permitted ... solicit or accept any gift or other items of monetary value from any person or entity seeking official action from, doing business with, or conducting activities regulated by the employees agency, or whose interests may be substantially affected by the performance or nonperformance of the employees duties.Employees shall put forth honest effort in the performance of their duties.Employees shall not knowingly make unauthorized commitments or promises of any kind purporting to bind the Government.Employees shall not use public offic e for private gain.Employees shall act impartially and not give preferential treatment to any private organization or individual.Employees shall protect and conserve Federal property and shall not use it for other than authorized activities.Employees shall not engage in outside employment or activities, including seeking or negotiating for employment, that conflict with official Government duties and responsibilities.Employees shall disclose waste, fraud, abuse, and corruption to appropriate authorities.Employees shall satisfy in good faith their obligations as citizens, including all just financial obligations, especially those—such as Federal, State, or local taxes—that are imposed by law.Employees shall adhere to all laws and regulations that provide equal opportunity for all Americans regardless of race, color, religion, sex, national origin, age, or handicap.Employees shall endeavor to avoid any actions creating the appearance that they are violating the law or th e ethical standards set forth in this part. Whether particular circumstances create an appearance that the law or these standards have been violated shall be determined from the perspective of a reasonable person with knowledge of the relevant facts. The federal regulation enforcing these 14 rules of conduct (as amended) is now codified and fully explained in the Code of Federal Regulations at 5 C.F.R. Part 2635. Over the years since 1989, some agencies have created supplemental regulations that modify or supplement the 14 rules of conduct to better apply to the specific duties and responsibilities of their employees. Established by the Ethics in Government Act of 1978, the U.S. Office of Government Ethics provides overall leadership and oversight of the executive branch ethics program designed to prevent and resolve conflicts of interest. The Overarching Rules of Ethical Conduct In addition to the above 14 rules of conduct for executive branch employees, Congress, on June 27, 1980, unanimously passed a law establishing the followinggeneral Code of Ethics for Government Service. Signed by President Jimmy Carter on July 3, 1980, Public Law 96-303 requires that, â€Å"Any person in Government service should:† Put loyalty to the highest moral principles and to country above loyalty to persons, party, or Government department.Uphold the Constitution, laws, and regulations of the United States and of all governments therein and never be a party to their evasion.Give a full days labor for a full days pay; giving earnest effort and best thought to the performance of duties.Seek to find and employ more efficient and economical ways of getting tasks accomplished.Never discriminate unfairly by the dispensing of special favors or privileges to anyone, whether for remuneration or not; and never accept, for himself or herself or for family members, favors or benefits under circumstances which might be construed by reasonable persons as influencing the performance of governmental duties.Make no private promises of any kind binding upon the duties of the office, since a Government employee has no private word which can be binding on public duty.Engage in no business with the Government, either directl y or indirectly, which is inconsistent with the conscientious performance of governmental duties.Never use any information gained confidentially in the performance of governmental duties as a means of making private profit.Expose corruption wherever discovered.Uphold these principles, ever conscious that public office is a public trust. Is There a Presidential Code of Ethics? While the elected members of Congress have chosen to adopt their own code of ethics, the President of the United States, as an elected rather than hired or appointed representatives of the people, is not subject to any specific statute or rule governing his or her ethical conduct. While they are subject to a civil suit and criminal prosecution for violations of common laws, presidents are generally immune from punishment for conduct related to their official acts. In other words, presidents are generally free to lie or misrepresent facts, as long as they do not intentionally defame any specific person or persons in doing so. In fact, the only practical remedies to unethical conduct on the part of the president are the constant vigilance of a well-informed public, congressional oversight, and ultimately the threat of impeachment for â€Å"high crimes and misdemeanors.†

Wednesday, May 6, 2020

Music, Dancing, And Family Honor - 1472 Words

Some social and cultural issues that are presented throughout the film include music, dancing, and family honor. Music was included as a transition between scenes in order to add dimension to Devdas. In Indian culture, music and dancing are not only meant to be a form of entertainment, but are also a way to worship gods. This form of art is commonly accepted by both Hinduism and Buddhism communities because it is viewed by many to be a gift from the gods. Traditional Indian music is often accompanied by intricate dancing to show how much Indians value the use of communication through the use of a medium. Indians are able to have a sense of unity without the barriers of a caste system or education when they communicate with body movements. This developed form of communication was seen when Chandramukhi, a courtesan, was able to dance on equal footing with Paro, someone of higher class. Through this, Bhansali conveys that when humans are deprived of wealth and status, they have no dis tinguishing features besides that of which Brahma intended for them to have. It is only when individuals give up their materialistic possessions will they be able to see what is truly important to them. Similarly, Hinduism stresses that happiness comes from peace, not materialistic possessions. As seen with Chandramukhi, fulfillments of life should derive from giving up all of one’s materialistic possessions. Although expectations of honor differ between males and females, the Indian cultureShow MoreRelatedDance Paper1652 Words   |  7 PagesDance Paper ARTS/100 February 28, 2011 Dance Paper Dance is used as a form of expressing how you feel through the movement of your body through music. Through the different styles of dancing, it can be slow paced, fast paced, mellow, seductive, fun and enjoyable at the same time. The different styles discussed in this paper will show that jazz, ballet, folk, ritual and modern dance are different but similar. Whatever style of dance you choose they all have repetition, form and rhythmRead MoreNarrative of Quinceanera910 Words   |  4 Pagesdama’s to be a part of my â€Å"court of honor†. All 14 girls wore beautiful hot pink dresses and had polished hairstyles. The girls looked like beautiful dolls. When my mother was a little girl she had two Quinceanera’s. One celebration took place in Mexico and the other here in California. Looking back at my moms photo’s, I could see that both celebrations were huge and costly. I was the first of all my cousins to have a Quinceanera. My mother and other family mem bers worked for over a year to planRead MoreA Study On Evolution Of Dance1399 Words   |  6 PagesJordan Laughlin December 5, 2015 Honors- Final Paper Dr. O’Leary Evolution Of Dance â€Å"People dance because dance can change things. One move can bring people together. One move can make you believe like there’s something more. One move can set a whole generation free.†- Adam Sevani Over the generations, the style and interpretation of dance has changed tremendously. Dance is greatly influenced by societal or cultural issues or advancement. Choreographers express their feelings through dance justRead MoreMusic in the Middle Ages733 Words   |  3 PagesMusic during the middle ages was part of everyday life. It was played at weddings, parties, birthdays, holidays, festivals, christmas, and mayday.There were many types of music for example chivaree this was played on Valentine’s day where there would be romantic music. There were many types of instruments played. Most of the instruments were peacefully played like the harp, flute, the lute, and the lyre. In the middle ages there were many types of music. There was plainchant, polyphony, and secularRead MoreDancing Is The Cradle Of Civilization : How It Has Made A Great Impact On Human History1458 Words   |  6 PagesThere is a young woman dancing to the beat of the drums. She is toned, tanned, and talented. She moves her hips like one would believe impossible, she holds a silk veil which covers her face showing nothing but her eyes making her look mysterious. Her hand movements are those resembling a snake, her outfit is glamorous and shows off her body. Every movement is precise, enticing, and sensual. Her body acts so fluidly that it all appears to be one move itself. She is so confident and sexy, she looksRead MoreThe Ritual Of Marriage Essay1419 Words   |  6 Pagesanother, while to others marriage is a secular contract. This particular ritual has fluctuated between the two throughout generations and cultures. Historically, these matrimonial contracts solidified alliances an d were frequently arranged by entire families or even nations. While these matrimonial alliances are still widely practiced throughout the world today, a majority of marriages in western countries espouse for other reasons. Whether Americans marry for procreation, wealth, or love, the ritualsRead MoreLion Dancing1393 Words   |  6 PagesLion Dancing Every time when you see youth swiftly glistening over the rampaging ungodly Earth accompanied with the blistering heated wonder of the orb-like sun, it can take you back to your exhilarating days with no headaches, worries, or obligations also known as, childhood. Worries, headaches, obligations, these are enemies within ourselves that we must overcome. These flea-like worries are infesting everyone. We are being overwhelmed by these creatures. The only ways to fight off suchRead MoreThe Life of Bruce Springsteen1001 Words   |  5 Pagesa all around food middle-class family, no on in that house hold even Bruce, didn’t realize that within fifty years he would reach living legend status. Also have a title of one of the best musicians to every live. After working hard at what he loves, Bruce has become known as a musical hero and inspiration to his fans and fellow musicians. With his deep lyrics, amazing stage presence, incredible guitar skills, and his passion, he is an untouchable force in the music industry. Using his lyrics toRead MoreChronicle of a Death Foretold Reflective1503 Words   |  7 Pagestrial, in any courthouse, under any judge would it be allowed for a murder to be justified so that one could restore a relative’s honor. However, this is not true in the location of Chronicle of a Death Foretold, as the Vicario twins were found innocent due to â€Å"legitimate case of honor, which was by the court upheld in good faith† (Marquez 48). The reason that this honor is upheld is because the Vicario twins live in a different culture. The story Chronicle of a Death Foretold allows a reader to lookRead MoreThe Treatment Of Cystic Fibrosis1292 Words   |  6 Pages This is a two week, sometimes longer, hospital stay where she is monitored, given antibiotics, and does at least four breathing treatments a day. I have visited Amanda many times during her â€Å"tune ups†, and her family plays a huge role in making the best of the situation. Amanda’s family brings games to play, movies to watch, and they bring decorations to brighten up the hospital room. Because most of the antibiotics are given through an IV, Amanda has what is called a port; a means of delivering

Tuesday, May 5, 2020

Difference Between Computer Literacy free essay sample

To be clearer, with information literacy one is taking what has been read and learned and applying it. With computer literacy one can have the knowledge but not necessarily know how to use it or apply it. Basically, with information literacy one will take the knowledge to the next step by using the access to organize, use and evaluate what has been found. With computer literacy one has the technology to manipulate the computer, but they may not have the information to continue on through the process and derive a conclusion based on evaluations and organization. Computer literacy, if you want to think of it in steps, is the literacy before information literacy in which the person is on their way to gaining the extra knowledge they need in order to apply what is currently known. Information literacy also requires one to have awareness in how information systems work and the link between information need, sources and channels. An example would explain this easier. You can know how to use Google search, but unless you take it a step further such as knowing what you need, the sources and the channels to gain what you need you will be stuck with unhelpful answers. Certainly, you know you need keywords in a search engine, but unless you know what keywords you are stuck. This is the relationship between the two concepts. 2. Discuss the three elements of an information system (hardware, software and persware) that managers must consider. Which of the three do you consider the most important? Hardware: Is the physical aspect of computers, telecommunications, and other devices. The term arose as a way to distinguish the box and the electronic circuitry and components of a computer from the program you put in it to make it do things. Software: Software is a term for a set of instructions, which makes a computer to perform a task. The set of instructions are commonly known as a program, without which computers cannot do any operations. A software is classified broadly in to two groups, application software, which includes normal utility applications like Microsoft word, PowerPoint etc. that interacts and performs user specific tasks and system software, such as operating systems, which interacts directly with hardware to make the system work and also provide a platform for other applications to work. Persware: Defined as the people aspect of an information system, without this aspect of an information system the hardware and software components become computer literacy. The people who drive and run the information system also help to determine which types of data to collect, store and disseminate for reporting and analysis purposes. The three Components of information system talked about the input, processing, output and feedback processes. Most important is the feedback process; unfortunately its the one most often overlooked. Just as in the triangle above, the hardware (input and output) and the software (processing) receive the most attention. With those two alone, you have computer literacy. But if you dont use the persware side of the triangle to complete the feedback loop, you dont accomplish much. Add the persware angle with good feedback and you have the beginnings of information literacy. 3. Which of the six business objectives do you think is the most important? How can information systems help a business meet these objectives? The Six Important Business Objectives of Information Technology Product Development Information technology can speed up the time it takes new products to reach the market. Companies can write product requirement documents by gathering market intelligence from proprietary databases, customers and sales representatives. Computer-assisted design and manufacturing software speed up decision making, while collaborative technologies allow global teams to work on different components of a product simultaneously. From innovations in microprocessors to efficient drug delivery systems, information technology helps businesses respond quickly to changing customer requirements. Stakeholder Integration Stakeholder integration is another important objective of information technology. Using global 24/7 interconnectivity, a customer service call originating in Des Moines, Iowa, ends up in a call center in Manila, Philippines, where a service agent could look up the relevant information on severs based in corporate headquarters in Dallas, Texas, or in Frankfurt, Germany. Public companies use their investor relations websites to communicate with shareholders, research analysts and other market participants. Process Improvement Process improvement is another key IT business objective. Enterprise resource planning (ERP) systems allow managers to review sales, costs and other operating metrics on one integrated software platform, usually in real time. An ERP system may replace dozens of legacy systems for finance, human resources and other functional areas, thus making internal processes more efficient and cost-effective. Cost Efficiencies Although the initial IT implementation costs can be substantial, the resulting long-term cost savings are usually worth the investment. IT allows companies to reduce transaction and implementation costs. For example, the cost of a desktop computer today is a fraction of what it was in the early 1980s, and yet the computers are considerably more powerful. IT-based productivity solutions, from word processing to email, have allowed companies to save on the costs of duplication and postage, while maintaining and improving product quality and customer service. Competitive Advantage Cost savings, rapid product development and process improvements help companies gain and maintain a competitive advantage in the marketplace. If a smartphone competitor announces a new device with innovative touch-screen features, the competitors must quickly follow suit with similar products or risk losing market share. Companies can use rapid prototyping, software simulations and other IT-based systems to bring a product to market cost effectively and quickly. Globalization Companies that survive in a competitive environment usually have the operational and financial flexibility to grow locally and then internationally. IT is at the core of operating models essential for globalization, such as telecommuting and outsourcing. A company can outsource most of its noncore functions, such as human resources and finances, to offshore companies and use network technologies to stay in contact with its overseas employees, customers and suppliers.

Saturday, April 11, 2020

Why are our brains so big an Example by

Why are our brains so big? Introduction It is true that humans have a darn big brain in relation to the body weight. The human brain is larger than any other primate which walked this planet. In comparison to the earliest human relatives, we have twice the brain size. Most of the neuroscientists such as Stephen Cunnane have implied that the diet of humans is primarily responsible for the size of brain. Since the evolutionary days of human beings, they have consumed food that was rich in iron, iodine and other minerals that help develop brain. This caused the process of brain expansion of human beings to be initiated. There are more pros of a larger brain size than the cons. Need essay sample on "Why are our brains so big?" topic? We will write a custom essay sample specifically for you Proceed Advantages of Large Human Brain Being the most complex organ of the body, the large human brain does not only provide us with a balance while walking, swimming, driving and running, but also plays other roles. The primary role of the human brain is to house the neurons their communication in the neural network. As many as 15 million neurons interact with each other and exchange information in the form of electrical signals (The Franklin Institute Online). Other scientists have also argued that larger brain size allows better control of the body, limbs and makes the senses work better. Larger brain size has also allows the humans to make the decision between right and wrong. Other animals with smaller brain sizes depend upon instincts to make their decisions, whereas, the human brain conducts a cost-benefit analysis of the situation and then decides how to react. The other big advantage of large brain size is the gift of consciousness. Although the word consciousness has many different meanings and there are many controversies about consciousness, but science has proved that only living beings possess the attribute of consciousness. And the bigger the brain size is, the larger the neural network is and hence the consciousness is also highly developed. Another proposed advantage of a brain larger in size is that the species with larger brain sizes can live longer lives and can reproduce more number of times. The human brain size is large and hence the brain allows humans to live longer lives and produce more number of times (E Science News). Disadvantages of a Bigger Brain A large brain size involves the cost of higher energy consumption which in turn increases the level of metabolism in the human body. Higher energy requirements also involve greater requirement of food intakes because of which the humans have to eat frequently throughout the day to keep energetic. When a human child is born, the body consists of 14% fat. A human child is the healthiest amongst all the primates newborns. According to a theory, the fat of the body is used in the development of the brain. The disadvantage here is that the development and training of the brain in human child takes a lot of time. Another obvious disadvantage of a large sized brain is that it is not easy to protect it from damage as egg-headedness makes our brain delicate and susceptible to injuries. It is difficult to avoid injuries as the size is bigger and the probability of hitting it to another object is also higher. Conclusion Brain is the most important part of the human body and is the only organ that makes us unique and distinct from other animals and primates. The large brain size is responsible for our long lives and our consciousness but it is more difficult to protect the brain from damage as the chances of hitting external objects is higher. Works Cited E Science News. The protective brain hypothesis is confirmed. The Franklin Institute Online. The Human Brain.

Tuesday, March 10, 2020

How the Forest and Court Are Shown in As You Like It

How the Forest and Court Are Shown in As You Like It As You Like It is set in a forest, but it is difficult to be clear about the As You Like It setting. Some argue that it is the Forest of Arden that once surrounded Shakespeare’s hometown of Stratford-upon-Avon; others believe that the As You Like It setting is in Ardennes, France. Forest vs. Court The forest is presented in a more favorable light in that the â€Å"goodies†, Duke Senior and his court, reside there. All of the good characters in the court are banished or exiled to the forest at the start of the play. Duke Senior describes the court as â€Å"painted pomp†¦the envious court†. He goes on to say that in the forest the dangers are real but natural and are preferable to those in the court â€Å"The †¦churlish chiding of the winter’s wind†¦ even till I shrink with cold, I smile and say This is no flattery† (Act 2, Scene 1). He suggests the harsh conditions of the forest are preferable to the pomp and false flattery in the court: That at least in the forest, things are honest. This could be compared to the courtly love between Orlando and Rosalind and the bawdy, primitive but honest love between Touchstone and Audrey. There are also reflections of Robin Hood and his merry men in the lives of Duke Senior and his supporters: â€Å"†¦there they live like the old Robin Hood of England† (Charles; Act 1, Scene 1). This reinforces the positive depiction of the forest as opposed to the negative portrayal of the court. When the evil characters enter the forest they have a sudden change of heart as discussed – suggesting the forest has healing properties. There is, therefore, a sense of foreboding at the end of the play when the characters are to be restored to the court†¦we hope that they will bring some of the natural qualities of forest life with them when they return. In this, Shakespeare may be suggesting that there needs to be a balance between forest and court; living with nature and using your senses should be balanced with living in an ordered, political world where education and social politeness is necessary. If one is too close to nature they may turn out like Touchstone and Audrey but if they are too political, they may become more like Duke Frederick. Duke Senior has struck a happy balance – being educated and gentlemanly having the ability to manage people but also appreciating nature and its offerings. Class and Social Structures The struggle between forest and court also sheds light on the class struggle at the core of the play. Celia disguises her nobility to become a poor woman,  Aliena, in the forest. She does this in order to protect herself, presumably from those who would try and steal from her. This gives her freedom she has never enjoyed. Oliver falls for her dressed as Aliena and we know as a result, that his motives are honorable – he is not after her money. This is important in that previously, Oliver’s motives have been questionable. Touchstone and Audrey are seen as more lowly characters but as discussed, are possibly perceived as more honest as a result, they are unable to social climb and therefore don’t need to flatter and lie their way to the top. Duke Senior is happier in the forest without the trappings of his dukedom. Shakespeare may be suggesting that just because you are considered to be ‘high class’ it is not necessarily reflected in your nature – or that in order to social climb one needs to lie and flatter and therefore people at the top of society are the worst kind of people. However, at the end of the play when the Duke is restored to the court we are led to believe that the court will be a better place, perhaps because he has witnessed firsthand what it is like to be poor. He is compared to Robin Hood and as such is considered ‘of the people.’

Saturday, February 22, 2020

Mobile phone technology Case Study Example | Topics and Well Written Essays - 5250 words

Mobile phone technology - Case Study Example (Language, Learning & Technology, 2002, 6) Furthermore, according to Kodama (2005, 22) 'technological innovation and changes in market structures are extremely swift in high-tech fields such as IT, multimedia, and biotechnology; the question of what sort of strategies or organization corporations should adopt in this rapidly changing environment is a major topic of research and practical study. In particular, for various large, leading-edge businesses like ICT (Information and Communication Technology), recent years have brought increasingly intense pressure to leverage the strategic community (SC) through partnership-based inter-organizational collaboration for the purpose of developing strategic enterprises, expanding the market shares of their products and services, and creating new businesses'. It should be noticed here that the new 3G technology is 'just the latest in a series of developments since the first generation of phones became available in the 1980s, but it is certainly one of the most hyped; With more bandwidth than earlier services, 3G can handle more information, faster, and is thus able to offer its users a richer experience through a plethora of new gadgets and features; Instead of just text-messaging and voice calls, 3G makes it possible to take and receive live video, to watch recorded video and live TV images, and to access the internet, all without wires' (Sheridan, 2003, 28). It is estimated that there are 'about 60 3G networks in 25 countries around the world. In Asia, Europe and the USA, telecommunication companies use WCDMA technology with the support of around 100 terminal designs to operate 3G mobile networks' [5] II. Vodafone - Company Overview Vodafone is the 'largest mobile telecommunications network company in the world, with equity interests in 27 countries and Partner Networks in a further 33 countries. At 30 June 2006, Vodafone had approximately 186.8 million proportionate customers worldwide'[1] Although the company has achieved a high performance the previous years, the amount of money spent in the research sector is really impressive showing that the continuous development and the customer satisfaction are among the priorities of the company. In recent years, one of the most significant developments of the firm has been the introduction and the application of the 3G technology which is based on the use of advanced electronic systems in order to offer very high speeds on the transfer of voice, text and image. III. 3G technology - Description and advantages IIIa. 3G technology and the mobile industry 3G (or 3-G) is 'short for third-generation technology. It is usually used in the context of cell phones; The services associated with 3G provide the ability to transfer both voice data (a telephone call) and non-voice data (such as downloading information, exchanging email, and instant messaging); The first country which introduced 3G on a large commercial scale was Japan. In 2005

Thursday, February 6, 2020

Is the U.S. Winning the Drug War in Latin America Essay

Is the U.S. Winning the Drug War in Latin America - Essay Example CON: U.S is losing the drug war in Latin America 1. U.S government has failed to re-evaluate her strategy to fight the drug menace. 2. The war fight largely focuses on the users and therefore leaves the other partners in the trade to thrive well in the trade. 3. There is no concrete drug enforcement mechanism to restrict the production of drugs. 4. The affordability and cheap processing makes it difficulty to wipe drugs out of Latin America. 5. A lot of resistance from human rights organization derails the efforts to do away with the drugs. The U.S will to control drug trafficking and abuse in Latin America confirms that it is very committed to wipe the drugs from these region. To begin with, since 1960s, the government has invested a lot of her efforts and attention to wage war on drug trade in Latin America. Regan and Bush declared war on drugs in U.S and Latin America when they occupied their presidential offices. The Bush successor; Bin Clinton continued with the worth fight on d rugs when he came into power in 19931. Since then, the U.S government has been strong on the war on drugs in Latin America. The U.S government recently got a support from Latin countries such as Mexico, Cuba, and Columbia. For instance, president of Mexico, Calderon has been in the forefront to combat drugs in the country2. Since he took office in 2006, he has made leaps towards the drugs war. For example, his government has formulated policies to deal with the consumers and traders of illicit drugs. These efforts have paid handsomely because the consumption of drugs has subsided. Obama’s government is in talks with Latin America Governments. Biden’s trip in 2012 to Latin America shows that the government has given negotiations a favorable chance. Biden was seeking to discuss on how leaders in that region can decriminalize drugs with an aim to stop its trade. Second, the new laws are in formulation stages. Policy analyst have advocated for a change in the current polic ies to allow U.S to win war on drugs. Arguably, their insights will provide new strategies to curb drugs trafficking in Latin America and U.S. The medical professionals have suggested programs to treat the drug victims. In addition, the social advocates suggests, that creation of awareness about dangers of engaging in drugs is the way to go. All these concerted efforts promise a win in the war on drugs in Latin America3. Third, the debates on drugs have attracted a lot of public interest. The Latin and the U.S population feel that drug consumption is not socially acceptable. They propose tough punishments for the growers, manufacturers, suppliers, and sellers. The public warns of the dangers of permitting drugs to get into the society. They provide a procedure, which can deter the abuse of drugs. The public suggests that, through identification, imprisonment, and persecution, the war can yield fruits4. Moreover, the drug user will be accountable for their actions. Implementation is now happening in the Latin America. This is a huge step towards gaining victory in the drug war. The increase of funds through budgetary allocation to fight drug abuse demonstrates U.S readiness to see the better end of the war. There has been a significant attention on the budget to allocate enough money in the drug war. In 1990, U.S budget on drugs was at $ 9.7 billion. This almost doubled in 2000 when it hit $ 17.7 billion mark. On top of this, the Drug Enforcement Administration department staffed

Tuesday, January 28, 2020

The California Education in budget cut Essay Example for Free

The California Education in budget cut Essay Save our children, save our education: The California Education in budget cut Considering that the majority of the population of California is dominated by those who can only afford public school education, it is almost going to be useless for parents to send their children to school. They might think about what they would gain from being at the school. Instead they would just allow their children to work, which is the gravest type of exploitation that a child could experience, being just young. There has been school demonstrations in several districts of California participated in by the teachers, parents and school administrators shouting in anger against the governor. Cutting of the educational budget is fast approaching and realization of this upon enforcement in 2008-2009 shall be the peak at which the protesters and the â€Å"accused† should be a lot more prepared . The proposed budget cut rooted from the governor’s 10% across-the-board cuts to provide venue for state social programs. $4. 8 billion is to be deprived from the secondary education, whereas $1. 3 billion from the higher education will be harvested by him. This will save the governor from the deficit when he declared fiscal emergency to account for the state project shortage of funds, which was actually $16 billion turning $14. 5 dollars (Conway Martinez, 2008). Education is the most important possession parents can leave to their children as a gift. From childhood, every parent is excited on the first day of school that they buy their children’s uniform and prepare for the very first experience of their children to formally hold their pencils and receive their marks, whether excellent or not, they still accept it. What matters is they get the right education and it only depends upon how their children are going to take advantage of the opportunity. The preschool level is just a foretaste, when their children are already at the higher level, which I more crucial, and expensive, that is the time they need to support their children more. They will have to work really hard. Sometimes, when they want their children to get the best education, they send them to an exclusive school because they are confident enough of the training teachers get to be qualified in that school. Preschool and lower school levels are somewhat less in effect, what is usually more important is the college level, wherein students are really shaped as professionals. At some point, whatever type of character the youth will have will basically be under the custody of the biological parents, and of course the secondary ones, the teachers. Academically speaking, this qualifies the children from entering the real world, the better the education gets, the easier it is to go beyond interviews and usually the companies look at the aspect of educational foundation that will serve the professional goals of their company. For Californians, especially the business executives of the top companies, education is ranked as the most important component of their companies in public policy concerns. But then, according to their professional assessment, this can only be achieved when subsequent reforms are done in the educational system. The more competitive is the curriculum in a school and the teachers’ competitiveness on a parallel then what will be achieved is a powerful tool to building up the necessary foundation. They insist that even in high schools this must be already implemented. They claim that this will affect the academic and vocational issues in the future, especially on the race of choosing their future leaders. The government of the United States provides the education of the people from on the federal, state or local levels of provision and control. This makes attending classes really mandatory (till the age of 8) to come up with the most valuable use of time and funds specifically in the primary and secondary level. The school boards are responsible for the monitoring, funding, and setting of policies within their respective districts, which are independent from other local jurisdictions. The catch here is that the education is free for all; it is just an option not to go to public schools and spend big money the private ones. Funding of public education is done by putting on the taxes they are able to get from their districts from the property taxes from each family, side from the funds that the government still subsidizes. Public schools follow the policy set forth by the national government to prevent the inefficient use of the district funds. To maintain the level of academic standards, teachers within them form plans in developing supplementary materials. Education is not mentioned in the constitution of the United States. The government has no control over the schools ran by the district boards. Bush administration initiated the NCLB act or ‘No Child Left Behind Act’ to somehow centralize the educational system. The current Governor of California, Arnold Schwarzenegger is one of the government official patronizing the budget cut, stating that this would cause no harm to the educational system and classrooms of Californian schools. He cut $4 billion from the educational fund, from the country’s 47th in rank in the per-pupil spending. This has significantly negative impact on the educational working force, because doing this drops 57,000 teachers. Other side effects are eliminating 4 weeks of the school year, or increasing the class size by about 23%, making the population in the classroom bigger (Perata, 2008). Ninety-seven percent of the school districts were not able to meet the demands of NCLB. This move of the governor is much of negative impact on him as a political figure because people will think that this is the most illogical thing to do. They believe that cutting the budget will definitely send the remaining three percent to the same situation ang aggravating the performance of the lower majority. How would this affect the future of the children in California? How would this provision affect the learning of the future adult society of America? Shamefully, the truth is obvious to us that it will ruin the educational freedom. Children will suffer from under-education because they will not get the necessary level of knowledge that must be translated to them through proper attention. A classroom blown up in number will be a dilemma; the topics might be taught very slowly in pacing because barriers in effective communication will be magnified, especially when students have a lot to join conversations with, instead of listening to their teacher. Teacher might also lose their teaching capacities because they cannot shoulder themselves the materials needed to effectively deliver their subject matter. Entering school will just become a responsibility, nobody will enjoy it both sides. The young minds which are in fact the easiest to shape shall be blocked with these incapacitating budget cut-off. The ineffectiveness of learning strategies can accumulate and may make the movement of knowledge stagnant, because from the start, they are no longer learning anything. It is very surprising: what we could only think of is that the governor did not really consider the present situation of the struggling population of children hungry for educational support. Its is very alarming that students need to attend extra classes in learning centers just to cope up, with what should have been actually supplied by the school. What should have been implemented about the NCLB policy is no longer met. Isn’t it already a violation of the government policies, and merely the violation of human rights? How possible is it that he claims of the good performance of the students when the current situation is disgusting? Now, how do we think of the future of California having these students under-educated? These children we look at now might find it misty to follow their dreams, to find their positions in the globally competitive industries. What they might have thought of as the only key to save their families from poverty will actually stop them from getting to what they want to reach out for. Their expected growth in terms of spending power shall be hindered because they will not be able to get into the top companies of really good pay, because of the lack of competitiveness. They might be lost and be left behind in the fast changing world, and in exaggerated sense be trapped and die without having to reach what they thought proper education might lead them to. Reference Conway, D. , Martinez, K. (2008). The California budget and the crisis of public education. News and Analysis Retrieved May 21, 2008 Perata, D. (2008). The California Budget Update [Electronic Version]. California Progress Report. Retrieved May 21, 2008, from http://www. californiaprogressreport. com/2008/02/california_educ_1. html

Monday, January 20, 2020

Two Empires In Japan :: English Literature Essays

Two Empires In Japan Two Empires In Japan by John M.L. Young and The Christian Confrontation with Shinto Nationalism by Kun Sam Lee were the two books I used for this topic. The former, an intimate 100 year chronicle of the persecution by the Asian government with their demands that all people bow in Kyujo-yohai, ( worshipping the Imperial House from afar); and the struggle of the Japanese Christians in times of compromise and triumph under such totalitarian pressure. The latter a more detailed historical account of old Shinto and the earliest Christian missionaries. The following essay will focus on the conflicting ideologies within Japan between the Shinto militarists and the Protestant mission effort from it ¹s germination in 1859 until 1957. Dr. Young cites the entrance of Christianity into Japan at 1542 when a ferocious storm found two Portuguese sailors shipwrecked on the southern island of Tanegashima. The Japanese accepted the Romish syncretism of the gospel, but were more interested in the goods and technology that came with later Roman Catholic missionaries who arrived in 1549. The priests ¹ attempts at proselytization were not very difficult; the spirit in which their efforts were received is aptly demonstrated :  ³The images of Buddha, with slight application of the chisel, served as images for Christ. Each Buddhist saint found his counterpart in Roman Christianity; and the road- side shrines of Kannon, the Goddess of Mercy, were rededi- cated to Mary. Temples, altars, bells, holy water vessels, censers, and rosaries were all ready and could be easily adapted to the needs of the new religion. ( Young, pp. 12 ) Oda Noyabunga welcomed the Roman missionaries, for he needed their advanced weaponry to successfully defeat the Ashikaga Shogunate. Shortly after his victory, Noyabunga was assassinated and all priests were driven out of Japan in 1587 vis a vie a decree from Hideyoshi the Great. Sadly, Japan went more than 400 years without the influence of true religion in the entire land. Until the arrival of two Presbyterian missionaries, Dr. and Mrs. J.C. Hepburn in 1859. As the new missionaries became established they began starting mission schools for the children in which could become trained in the way of the gospel. However, after the Meiji Restoration of 1868 ( which consisted of the demotion of 270 Daimyo and over 2 million samurai giving up thier sword and status ), the indigenous religion of Japan, Shintoism, took a revitalized grip on the masses.

Sunday, January 12, 2020

Ethical Perspective on Assisted Suicide Essay

Moral and ethical debates attempted to resolves controversial issues but never seem to end with everyone agreeing. Often these ethical and moral debates are complex and involve opinions persuaded by religion or customs and have legal implications to consider. Physician assisted death is one of these very complex and controversial issues that all people will never agree on. Many questions arise in the debate of physician assisted death such as patients’ rights, physicians controlling the right if someone lives or dies, a patience’s mental state, a family member’s rights, religious beliefs of the parties involved and the law. Philosophers attempt to explain the different theories that people will use to argue their belief systems in terms of logic and reasoning. For example, some people may take the position of a deontologist who would argue that it is our moral duty to support and sustain life therefore assisted suicide should not be allowed. Unfortunately, this very emotional thought provoking debate is not a â€Å"black and white issue,† as most ethical arguments are not. In the situation of physician assisted death I disagree with the deontologist point of view that it is immoral for a physician to assist a patient in suicide. I believe as some relativist due, that as long as the patient is fully capable of making this decision and the patient is in a constant state of agony, then the patient has the right to make the choice to live or die. A relativist believes that morals are only relative to that particular society and if physician assisted death was considered moral in that group then it would be considered a moral act. Neither theory is without flaws as some deontologist even share my point of view and some relativist can be very extreme in what they feel is relative to being morally right or wrong. The bottom line is that people will probably never completely agree on this subject. Ethical Perspective on Physician Assisted Death Physician assisted death is also referred to as PAD. Physician assisted death is the more politically and ethical term versus physician assisted suicide. There is also a difference that should be made known between euthanasia and PAD. In a situation of euthanasia the physician administers the lethal does by injection to the patient ending the patient’s life. In physician assisted death the doctor write a prescription for a pill that the patient oluntarily administers themselves that will end their own life. Physician assisted death is now legal in two states, where Organ passed the law in 1994 and Washington state passed the law in 2008. That means in forty eight states it is against the law to assist the patient either directly or indirectly in ending the patient’s life. If a physician even provides information to the patient that would f acilitate their death the doctor can face criminal charges and lose their medical license. Many people are familiar with the radical doctor Dr. Jack Kevorkian who used the method of euthanasia. Dr. Kevorkian is responsible for euthanatizing over 130 people some of which were either clinically depressed or terminally ill. Dr. Kevorkian created a huge debate across the United States that gave rise to many questions such as to the legality of the constitutional laws and ethical perspectives. Laws that are passed don’t not always represent a societies ethical views and vice versus a, some ethical standards are against the law. If everyone had the perspective of relativists, then the laws would vary from city to city. For example, every other city could be for physician assisted death or against it creating a checkered board effect of laws that very from city to city. This because the relativist believes that morals are only relative to what the society believes. Dr. Kevorkian was tried in a Michigan court on four of assisting suicide and was convicted of one count which has videotaped and released to the popular television show â€Å"60 Ethical Perspective on Physician Assisted Death Minutes. † Another doctor by the name of Derek Humphry’s whose wife died a slow agonizing death by cancer started a foundation in his wife’s memory, called the Hemlock Society to provide information to dying patients on how to take the â€Å"final exit. † (Howard Ball 2012) Medical technology has advanced over the years and has allowed us to live healthier and more active life styles. However, with medical advancement came the ability to prolong life and at times keeping patients alive beyond what I feel God has called them to live. At the point in life when a person is being kept alive by a machine breathing for them and intravenous nutrition being given, one has to ask themselves is this â€Å"has medical treatment gone too far by interfering with a natural part of dying. † It seems medical technology has crossed the line at times because it is no longer a matter of improving the quality of life but prolong a natural death. There is a moral dilemma that is taken place where doctors are making billions of dollars by providing long term health care to patients beyond what nature has called for. During the twenty century medical technology advance to point of creating an epidemic where people could live longer lives but it didn’t always guarantee a quality life. Without being able to take care of oneself or enjoy the life they worked hard to create many people feel they don’t want to live a life of suffering. Many people feel they have lost their dignity and don’t want their friends and family to remember them in a feeble state of being. This brings up the question of what is happiness and considered quality of life. I believe the deontologist perspective takes away a human beings right to choose how a person wants to live. A deontologist will argue that life must be sustained because it is our moral duty but isn’t it our moral duty to end a human beings suffering or to let people die a natural Ethical Perspective on Physician Assisted Death death? In fact some deontologists do believe that morals are obligations based on religious beliefs and they don’t support sustaining life in every situation. For example, if a woman was pregnant and the baby was going to cause the death of the mother then they may believe it is acceptable to terminate the pregnancy to sustain the life of the mother. Yet others could argue â€Å"who is to say what is natural,† and when someone should die. Many people who support legalizing patient assisted suicide believe it is the patient’s right to die with dignity but other would insist that society has a moral obligation to preserve life. The relativist would state if the society believes it is moral to condone patient assisted suicide then for the society it is morally correct. â€Å"The view of ethical relativism regards values as determined by one’s own ethical standards, often those provided by one’s own culture and background. Rather than insisting that there are moral absolutes, moral claims must be interpreted in terms of how they reflect a person’s viewpoint; moral claims are then said to be â€Å"right in a given culture† or â€Å"wrong for a given society. (Mosser, K 2010) Those that argue against physician assisted death will argue it is our duty to protect and preserve all life. People will argue their points of views using logic, reasoning and provide supporting evidence. However, in the case of ethical debates there often is not any evidence to support a claim on either side of the issue. Consequently, as much as people will try to argue their point of view with reasoning an d logic their emotions can get in the way and make it difficult to persuade the other person. Many times the family is involved in the case of physician assisted death and each family member may have different ethical beliefs then the patient. This can make the decision even more painful as we taken into consideration the effects our decisions Ethical Perspective on Physician Assisted Death have on other people. Philosophers attempt to explain how people will argue their point of view by providing different ethical theories as with relativism and deontology. The deontologist believes that it is our moral duty to protect and preserve life and that physician assisted suicide is an immoral act. Rather than looking at the consequences of an act, deontology looks at the reason for which an act is done, and the rule according to which one choose to act. Deontology doesn’t deny that acts have consequences; rather, insists that those consequences should not play a role in our moral evaluation of such acts. †(Mosser K 2010) Under the deontology theory a person would claim that it is wrong for a physician to assist a patient in committing suicide because the result is death and we are to preserve life not assisting in taking their life. Deontology and Ethics 2013) This theory would provide that there is no reason good enough to go against ones moral and civic duty even if it means allowing someone to suffer in pain, which ignores the patients’ rights. The terminally ill patient not only wants to live with having their quality of life and having dignity but they also want to die with dignity. The terminally ill patient has few options such as suicide or living in extreme pain. Some patients are too ill to even get out of bed to be able to commit suicide. Terminally ill patients that are suffering should not be made to feel demoralized for wanting to end their suffering. If the patient has paid into a life insurance fund all their life the company mostly likely will not pay their loved ones death benefits if they commit such an act. The problem is patient assisted death is not recognized as a medically necessary procedure. There is also a great stigma that comes along with committing suicide that the families have to live with after their loved one has died. I belief in the individual autonomy Ethical Perspective on Physician Assisted Death Many family members feel disgraced that their loved one acted against their religious beliefs. (Lois Snyder, JD, and Daniel P. Sulmasy 2001) Family members can find themselves in court fighting again other members of their family to keep their loved ones alive. Going to court can be an emotionally painful process and doing so puts the patient through more emotional agony. Many families will break apartment because their ethical views differ so greatly. Roman Catholic Church has been the one biggest contesters of physician assisted death. Ethical arguments are based on beliefs systems that are learned through culture and religion therefore are only relative to that person or society. The One of the issues with relativism is that is a person’s beliefs can be too extreme and farfetched. Under the law of relativism any belief system relevant to that person would be considered ethical even murdering someone. Many doctors and nurses struggle with their feeling on patient assisted death because their morals and ethical views tell them it is wrong to assist a patient in death but they have great sympathy seeing their patients in pain and they want to help. Also, doctors take the Hippocratic Oath which states that doctors will never harm their patients but I argue the facts that prolonging death is harming the patient and takes away their constitutional right to choose death. Many religions believe as deontologist do in that is against their religion to assist someone in procuring their own death but that is exactly it the issue that it their belief system and not everyone’s. The constitutional represents the Liberty Due process clause that says it is a fundamental right for terminally ill patients to die with dignity by the assistance of a medical professional. Lawyers have argued the fourteenth amendment which allows a doctor to remove life support as the last dying will and testament of the patient yet a physician cannot medically assist a patient in ending the life of a terminally ill person who is verbally requesting it. (Howard Ball 2012) Ethical Perspective on Physician Assisted Death Moral and ethical debates spark heated debates and cause controversial issues and never seem to end with everyone agreeing. These ethical and moral debates are complex and involve opinions persuaded by religion or customs nd have legal implications that must be consider. Physician assisted death a very complex and controversial issues that all people will never agree on. There are a lot questions that arise in the debate over physician assisted death such as patients’ rights, physicians controlling the right if someone lives or dies, a patience’s mental state, a family member’s rights, religious beliefs of the parties involved and th e law. It seems that both theories have their flaws. The relativist can be too extreme in their view points because anything can be considered moral if the society feels it is relative. While the deontologist view point is too constrictive and only takes into consideration that a person’s morals are their obligation and a duty to others. The deontologist would ignore the right of the patients even if they were suffering to conform to their obligations and moral duties. I am partial to believing that the patient has a right to choose if they want to live or die under certain circumstances. I believe that morals and ethics are not built on one theory alone but on many parts of theories that consist of logic and reasoning. People will continue to understand the different ethical theories that explain why certain societies believe the way they do. Some people may take the position of a deontologist who would argue that it is our moral duty to support and sustain life therefore assisted suicide should not be allowed. Unfortunately, this very emotional debate has many dynamics, as most ethical arguments do. In the situation of physician assisted death I disagree with the deontologist point of view and feel it is immoral to take away a patients right to end their own suffering. I believe to a certain extent as some relativist believe, that as long as the patient is fully capable of making Ethical Perspective on Physician Assisted Death this decision and the patient is in a constant state of agony, then the patient has the right to make the choice to live or die. The relativist believes that morals are only relative to that particular society and if physician assisted death was considered moral in that group then it would be considered a moral act. Each theory has flaws. Some deontologist share my point of view and some relativist can be very extreme in what they feel is relative to being morally right or wrong. The bottom line is people will probably never completely agree on this subject. As our society evolves and continues to become more liberal in their ethical views on controversial topics such as gay marriage, abortion and personal liberties more states will continue to pass laws support physician assisted death.

Saturday, January 4, 2020

Computer Network Data

Sample details Pages: 15 Words: 4422 Downloads: 2 Date added: 2017/06/26 Category Information Systems Essay Type Essay any type Did you like this example? Networking and Management Introduction A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include devices like printers and other resources like electronic mail, internet access, and file sharing. A computer network can also be seen as a collection of Personal computers and other related devices which are connected together, either with cables or wirelessly, so that they can share information and communicate with one another. Don’t waste time! Our writers will create an original "Computer Network Data | Information Systems Dissertations" essay for you Create order Computer networks vary in size. Some networks are needed for areas within a single office, while others are vast or even span the globe. Network management has grown as a career that requires specialized training, and comes with management of important responsibilities, thus creating future opportunities for employment. The resulting expected increase in opportunities should be a determining and persuasive factor for graduates to consider going into network management. Computer networking is a discipline of engineering that involves communication between various computer devices and systems. In computer networking, protocols, routers, routing, and networking across the public internet have specifications that are defined in RFC documents. Computer networking can be seen as a sub-category of computer science, telecommunications, IT and/or computer engineering. Computer networks also depend largely upon the practical and theoretical applications of these engineering and scientifi c disciplines. In the vastly technological environment of today, most organisations have some kind of network that is used every day. It is essential that the day-to-day operations in such a company or organisation are carried out on a network that runs smoothly. Most companies employ a network administrator or manager to oversee this very important aspect of the company’s business. This is a significant position, as it comes with great responsibilities because an organisation will experience significant operational losses if problems arise within its network. Computer networking also involves the setting up of any set of computers or computer devices and enabling them to exchange information and data. Some examples of computer networks include: Local area networks (LANs) that are made up of small networks which are constrained to a relatively small geographic area. Wide area networks (WANs) which are usually bigger than local area networks, and cover a large geographic area. Wireless LANs and WANs (WLAN WWAN). These represent the wireless equivalent of the Local Area Network and Wide Area Networks Networks involve interconnection to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet. (https://en.wikipedia.org/wiki/Computer_networking) TASK 1 TCP connection congestion control Every application, whether it is a small or large application, should perform adaptive congestion control because applications that perform congestion control use a network more efficiently and are generally of better performance. Congestion control algorithms prevent the network from entering Congestive Collapse. Congestive Collapse is a situation where, although the network links are being heavily utilized, very little useful work is being done. The network will soon begin to require applications to perform congestion control, and those applications which do not perform congestion control will be harshly penalized by the network, probably in the form of preferentially dropping their packets during times of congestion (https://www.psc.edu/networking/projects/tcpfriendly/) Principles of Congestion Control Informally, congestion entails that too many sources are sending too much data, and sending them too fast for the network to handle. TCP Congestion Control is not the same as flow control, as there are several differences between TCP Congestion Control and flow control. Other principles of congestion control include Global versus point-2-point, and orthogonal issues. Congestion manifests itself by causing loss of packets (buffer overflow at routers), and long delays (queuing in router buffers). Also, during congestion, there is no explicit feedback from network routers, and there is congestion inferred from end-system observed loss. In network-assisted congestion control, routers provide feedback to end systems, and the explicit rate sender sends at –Choke Packet. Below are some other characteristics and principles of congestion control: When CongWin is below Threshold, sender in slow-start phase, window grows exponentially. When CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold. When timeout occurs, Threshold set to CongWin/2 and CongWin is set to 1 MSS. Avoidance of Congestion It is necessary for the TCP sender to use congestion avoidance and slow start algorithms in controlling the amount of outstanding data that is injected into a network. In order to implement these algorithms, two variables are added to the TCP per-connection state. The congestion window (cwnd) is a sender-side limit on the amount of data the sender can transmit into the network before receiving an acknowledgment (ACK), while the receivers advertised window (rwnd) is a receiver-side limit on the amount of outstanding data. The minimum of cwnd and rwnd governs data transmission. (Stevens, W. and Allman, M. 1998) TCP Flow Control In TCP flow control, the receiving side of the TCP connection possesses a receive buffer, and a speed-matching service which matches the send rate to the receiving application’s drain rate. During flow control, Rcvr advertises any spare room by including value of RcvWindow in segments, and the sender limits unACKed data to RcvWindow. TCP flow control also ensures that there is no overflow of the receive buffer. Round-trip Time Estimation and Timeout TCP Round Trip Time and Timeout are usually longer than RTT, but RTT varies, and has a slow reaction to segment loss. SampleRTT is measured time from segment transmission until ACK receipt, ignore retransmissions, and will vary, want estimated RTT â€Å"smoother† Round-trip time samples arrive with new ACKs. The RTT sample is computed as the difference between the current time and a time echo field in the ACK packet. When the first sample is taken, its value is used as the initial value for srtt. Half the first sample is used as the initial value for rttvar. (Round-Trip Time Estimation and RTO Timeout Selection) There are often problems due to timeouts, including the restriction of the sender that is compelled to wait until a timeout, and is able to do nothing during this period. Also, the first segment in the sliding window is often not acked, and retransmission becomes necessary, waiting again one RTT before the segment flow continues. It should be noted that on rece iving the later segments, the receiver sends back ACKs. Estimated RTT EstimatedRTT = 0.875 * EstimatedRTT + 0.125 * SampleRTT DevRTT DevRTT = (1 0.25) * DevRTT + | SampleRTT – EstimatedRTT Timeout interval TimeoutInterval = EstimatedRTT + 4 * DevRTT The integrated services (IntServ) and DiffServ (Differentiated Services) architecture are two architectures that have been proposed for the provision of and guaranteeing of quality of service (QoS) over the internet. Whereas the Intserv framework is developed within the IETF to provide individualized QoS guarantees to individual application sessions, Diffserv is geared towards enabling the handling of different classes of traffic in various ways on the internet. These two architectures represent the IETF’s current standards for provision of QoS guarantees, although neither Intserv nor Diffserv have taken off or found widespread acceptance on the web. (a) Integrated Service Architecture In compute r networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network. For instance, IntServ can be used to allow sound and video to be sent over a network to the receiver without getting interrupted. IntServ specifies a fine-grained Quality of service system, in contrast to DiffServs coarse-grained system of control. In the IntServ architecture, the idea is that each router inside a system implements IntServ, and applications which require various types of guarantees have to make individual reservations. Flow Specs are used to describe the purpose of the reservation, and the underlying mechanism that signals it across the network is called RSVP. TSPECs include token bucket algorithm parameters. The idea is that there is a token bucket which slowly fills up with tokens, arriving at a constant rate. Every packet which is sent requires a token, and if there are no tokens, then i t cannot be sent. Thus, the rate at which tokens arrive dictates the average rate of traffic flow, while the depth of the bucket dictates how large the traffic is allowed to be. TSPECs typically just specify the token rate and the bucket depth. For example, a video with a refresh rate of 75 frames per second, with each frame taking 10 packets, might specify a token rate of 750Hz, and a bucket depth of only 10. The bucket depth would be sufficient to accommodate the burst associated with sending an entire frame all at once. On the other hand, a conversation would need a lower token rate, but a much higher bucket depth. This is because there are often pauses in conversations, so they can make do with fewer tokens by not sending the gaps between words and sentences. However, this means the bucket depth needs to be increased to compensate for the traffic being larger. (https://en.wikipedia.org/wiki/Integrated_services) (b) Differentiated Service Architecture The RFC 2475 (An Architecture for Differentiated Services) was published In 1998, by the IETF. Presently, DiffServ has widely replaced other Layer 3 Quality of Service mechanisms (such as IntServ), as the basic protocol that routers use to provide different service levels. DiffServ (Differentiated Services) architecture is a computer networking architecture which specifies a scalable, less complex, coarse-grained mechanism for the classification, management of network traffic and for provision of QoS (Quality of Service) guarantees on modern IP networks. For instance, DiffServ can be used for providing low-latency, guaranteed service (GS) to video, voice or other critical network traffic, while ensuring simple best-effort traffic guarantees to non-critical network services like file transfers and web traffic. Most of the proposed Quality of Service mechanisms which allowed these services to co-exist were complicated and did not adequately meet the demands Internet users because modern data ne tworks carry various kinds of services like streaming music, video, voice, email and also web pages. It would probably be difficult to implement Intserv in the core of the internet because most of the communication between computers connected to the Internet is based on a client/server structural design. This Client/server describes a structure involving the connection of one computer to another for the purpose of giving work instructions or asking it questions. In an arrangement like this, the particular computer that questions and gives out instructions is the client, while the computer that provides answers to the asked questions and responds to the work instructions is the server. The same terms are used to describe the software programs that facilitate the asking and answering. A client application, for instance, presents an on-screen interface for the user to work with at the client computer; the server application welcomes the client and knows how to respond correctly t o the clients commands. Any file server or PC can be adapted for use as an Internet server, however a dedicated computer should be chosen. Anyone with a computer and modem can join this network by using a standard phone. Dedicating the server that is, using a computer as a server only helps avoid some security and basic problems that result from sharing the functions of the server. To gain access to the Internet you will require an engineer to install the broadband modem. Then you will be able to use the server to network the Internet on all machines on a network. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) TASK 5 Network security These days, computers are used for everything from shopping and communication to banking and investment. Intruders into a network system (or hackers) do not care about the privacy or identity of network users. Their aim is to gain control of computers on the network so that they can use these systems to launch attacks on other computer systems. Therefore people who use the network for these purposes must be protected from unknown strangers who try to read their sensitive documents, or use their computer to attack other systems, and send forged email, or access their personal information (such as their bank or other financial statements) Security Clauses The International Organisation for Standardizations (ISOs) 17799: 2005 Standard is a code of practice for information security management which provides a broad, non-technical framework for establishing efficient IT controls. The ISO 17799 Standard consists of 11 clauses that are divided into one or more security categories for a total of 39 security categories The security clauses of the ISO standard 17799:2005- code of practice for Information Security Management include: The security Policy clause Organizing Information Security Asset Management. Human Resources Security. Physical and Environmental Security. Communications and Operations. Access Control. Information Systems Acquisition, Development, and Maintenance. Information Security Incident Management. Business Continuity Management. Compliance. (https://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.printiiid=467aid=2209) Here is a brief description of the more recent version of these security clauses: Security Policy: Security policies are the foundation of the security framework and provide direction and information on the companys security posture. This clause states that support for information security should be done in accordance with the companys security policy. Organizing Information Security: This clause addresses the establishment and organizational structure of the security program, including the appropriate management framework for security policy, how information assets should be secured from third parties, and how information security is maintained when processing is outsourced. Asset Management: This clause describes best practices for classifying and protecting assets, including data, software, hardware, and utilities. The clause also provides information on how to classify data, how data should be handled, and how to protect data assets adequately. Human Resources Secur ity: This clause describes best practices for personnel management, including hiring practices, termination procedures, employee training on security controls, dissemination of security policies, and use of incident response procedures. Physical and Environmental Security: As the name implies, this clause addresses the different physical and environmental aspects of security, including best practices organizations can use to mitigate service interruptions, prevent unauthorized physical access, or minimize theft of corporate resources. Communications and Operations: This clause discusses the requirements pertaining to the management and operation of systems and electronic information. Examples of controls to audit in this area include system planning, network management, and e-mail and e-commerce security. Access Control: This security clause describes how access to corporate assets should be managed, including access to digital and nondigital information, as well as network resources. Information Systems Acquisitions, Development, and Maintenance: This section discusses the development of IT systems, including applications created by third-parties, and how security should be incorporated during the development phase. Information Security Incident Management: This clause identifies best practices for communicating information security issues and weaknesses, such as reporting and escalation procedures. Once established, auditors can review existing controls to determine if the company has adequate procedures in place to handle security incidents. Business Continuity Management: The 10th security clause provides information on disaster recovery and business continuity planning. Actions auditors should review include how plans are developed, maintained, tested, and validated, and whether or not the plans address critical business operation components. Compliance: The final clause provides valuable information auditors can use when identifying the compliance level of systems and controls with internal security policies, industry-specific regulations, and government legislation. (Edmead, M. T. 2006 retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) The standard, which was updated in June 2005 to reflect changes in the field of information security, provides a high-level view of information security from different angles and a comprehensive set of information security best practices. More specifically, ISO 17799 is designed for companies that wish to develop effective information security management practices and enhance their IT security efforts. Control Objectives The ISO 17799 Standard contains 11 clauses which are split into security categories, with each category having a clear control objective. There are a total of 39 security categories in the standard. The control objectives in the clauses are designed to meet the risk assessment requirements and they can serve as a practical guideline or common basis for development of effective security management practices and organisational security standards. Therefore, if a company is compliant with the ISO/IEC 17799 Standard, it will most likely meet IT management requirements found in other laws and regulations. However, because different standards strive for different overall objectives, auditors should point out that compliance with 17799 alone will not meet all of the requirements needed for compliance with other laws and regulations. Establishing an ISO/IEC 17799 compliance program could enhance a companys information security controls and IT environment greatly. Conducting an audit evaluation of the standard provides organizations with a quick snapshot of the security infrastructure. Based on this snapshot, senior managers can obtain a high-level view of how well information security is being implemented across the IT environment. In fact, the evaluation can highlight gaps present in security controls and identify areas for improvement. In addition, organizations looking to enhance their IT and security controls could keep in mind other ISO standards, especially current and future standards from the 27000 series, which the ISO has set aside for guidance on security best practices. (Edmead, M. T. 2006 retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) Tree Topology Tree topologies bind multiple star topologies together onto a bus. In its most simple form, only hub devices are directly connected to the tree bus and the hubs function as the root of the device tree. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub ports) alone. Topologies remain an important part of network design theory. It is very simple to build a home or small business network without understanding the difference between a bus design and a star design, but understanding the concepts behind these gives you a deeper understanding of important elements like hubs, broadcasts, ports, and routes. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Use of the ring topology should be considered for use in medium sized companies, and the ring topology would also be the best topology for small companies because it is ensures ease of data transfer. Ring Topology In a ring network, there are two neighbors for each device, so as to enable communication. Messages are passed in the same direction, through a ring which is effectively either counterclockwise or clockwise. If any cable or device fails, this will break the loop and could disable the entire network. Bus Topology Bus networks utilize a common backbone to connect various devices. This backbone, which is a single cable, functions as a shared medium of communication which the devices tap into or attach to, with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Star Topology The star topology is used in a lot of home networks. A star network consists of a central connection point or hub that can be in the form of an actual hub, or a switch. Usually, devices will connect to the switch or hub by an Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computers network access and not the entire LAN. If the hub fails, however, the entire network also fails. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Relating the security clauses and control objectives to an organisation In an organisation like the Nurht’s Institute of Information Technology (NIIT), the above mentioned security clauses and control objectives provide a high-level view of information security from different angles and a comprehensive set of information best security practices. Also, the ISO 17799 is designed for companies like NIIT, which aim to enhance their IT security, and to develop effective information security management practices. At NIIT, the local network relies to a considerable degree, on the correct implementation of these security practices and other algorithms so as to avoid congestion collapse, and preserve network stability. An attacker or hacker on the network can cause TCP endpoints to react in a more aggressive way in the face of congestion, by the forging of excessive data acknowledgments, or excess duplicate acknowledgments. Such an attack could possibly cause a portion of the network to go into congestion collapse. The Security Policy clause states that â€Å"support for information security should be done in accordance with the companys security policy.† (Edmead, M. T. 2006). This provides a foundation of the security framework at NIIT, and also provides information and direction on the organisation’s security posture. For instance, this clause helps the company auditors to determine whether the security policy of the company is properly maintained, and also if indeed it is to be disseminated to every employee. The Organizing Information Security clause stipulates that there should be appropriate management framework for the organisation’s security policy. This takes care of the organizational structure of NIIT’s security program, including the right security policy management framework, the securing of information assets from third parties, and the maintenance of information security during outsourced processing. At NIIT, the Security clauses and control objectives define the companyâ€℠¢s stand on security and also help to identify the vital areas considered when implementing IT controls. The ISO/IEC 17799s 11 security clauses enable NIIT to accomplish its security objectives by providing a comprehensive set of information security best practices for the company to utilize for enhancement of its IT infrastructure. Conclusion Different businesses require different computer networks, because the type of network utilized in an organisation must be suitable for the organisation. It is advisable for smaller businesses to use the LAN type of network because it is more reliable. The WAN and MAN would be ideal for larger companies, but if an organisation decides to expand, they can then change the type of network they have in use. If an organisation decides to go international, then a Wireless Area Network can be very useful Also, small companies should endeavor to set up their network by using a client/server approach. This would help the company to be more secure and enable them to keep in touch with the activities of others are doing. The client/server would be much better than a peer-to-peer network, it would be more cost-effective. On the average, most organisations have to spend a good amount of money and resources to procure and maintain a reliable and successful network that will be and easy to m aintain in the long run. For TCP Congestion Control, when CongWin is below Threshold, sender in slow-start phase, window grows exponentially. If CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold, and threshold set to CongWin/2 and CongWin is set to 1 MSS when a timeout occurs. For a Small Office/Home Office (SOHO), networks such as wireless networks are very suitable. In such a network, there won’t be any need to run wires through walls and under carpets for connectivity. The SOHO user need not worry about plugging their laptop into docking stations every time they come into the office or fumble for clumsy and unattractive network cabling. Wireless networking provides connectivity without the hassle and cost of wiring and expensive docking stations. Also, as the business or home office grows or shrinks, the need for wiring new computer s to the network is nonexistent. If the business moves, the network is ready for use as soon as the computers are moved. For the wired impossible networks such as those that might be found in warehouses, wireless will always be the only attractive alternative. As wireless speeds increase, these users have only brighter days in their future. (https://www.nextstep.ir/network.shtml) It is essential to note that the computer network installed in an organisation represents more than just a simple change in the method by which employees communicate. The impact of a particular computer network may dramatically affect the way employees in an organisation work and also affect the way they think. Bibliography Business Editors High-Tech Writers. (2003, July 22). International VoIP Council Launches Fax-Over-IP Working Group. Business Wire. Retrieved July 28, 2003 from ProQuest database. Career Directions (2001 October). Tech Directions, 61(3), 28 Retrieved July 21, 2003 from EBSCOhost database Edmead, M. T. (2006) Are You Familiar with the Most Recent ISO/IEC 17799 Changes? (Retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) FitzGerald, J. (1999), Business Data Communications And Networking Pub: John Wiley Sons Forouzan, B. (1998), Introduction To Data Communications And Networking Pub: Mc- Graw Hill https://www.theiia.org/itaudit https://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.printiiid=467aid=2209 https://www.psc.edu/networking/projects/tcpfriendly/ ISO/IEC 17799:2000 – Code of practice for information security management Published by ISO and the British Standards Institute [https://www.iso.org/] I SO/IEC 17799:2005, Information technology – Security techniques – Code of practice for information security management. Published by ISO [https://www.iso.org/iso/en/prods-services/popstds/informationsecurity.html] Kurose, J. F. Ross, K. W. 2002. Computer Networking A Top-Down Approach Featuring the Internet, 2nd Edition, ISBN: 0-321-17644-8 (the international edition), ISBN: 0-201-97699-4, published by Addison-Wesley, 2002 www.awl.com/cs Ming, D. R. Sudama (1992) NETWORK MONITORING EXPLAINED: DESIGN AND APPLICATION Pub: Ellis Horwood Rigney, S. (1995) NETWORK PLANNING AND MANAGMENT YOUR PERSONAL CONSALTANT Round-Trip Time Estimation and RTO Timeout Selection (retrieved from https://netlab.cse.yzu.edu.tw/ns2/html/doc/node368.html) Shafer, M. (2001, June 11). Careers not so secure? Network Computing, 12(12), 130- Retrieved July 22, 2003 from EBSCOhost database Stevens, W. and Allman, M. (1998) TCP Implementation Working Group (retrieved from https://www.ietf.org/proceedings/98aug/I-D/draft-ietf-tcpimpl-cong-control-00.txt) Watson, S (2002). The Network Troubleshooters. Computerworld 36(38), 54. (Retrieved July 21, 2003 from EBSCOhost database) Wesley, A. (2000), Internet Users Guide to Network Resource Tools 1st Ed, Pub: Netskils www.microsoft.co.uk www.apple.com www.apple.co.uk www.bized.com https://www.nextstep.ir/network.shtml www.novell.com www.apple.com/business www.microsoft.com/networking/e-mails www.engin.umich.edu www.microsoft.com