Friday, November 29, 2019

Sphinx Essay Research Paper BullheadedDuring this great free essay sample

Sphinx Essay, Research Paper Bull-headed During this great age of information and transit, in a universe traveling so fast that our contemplations are nil salvage a fuzz on the cosmic mirror, who has the clip logically challenge the dating of ancient memorial. Egyptologists have done the research and concluded that the memorials located in the Giza tableland can be attributed to the 4th dynasty ( 2900-2750 BC ) . Why should we blow our limited clip reinvestigating what appears to be a closed instance? Egyptologists have conclude that the constructions located at the Giza tableland can be attributed to forth dynasty Pharaoh Khufu ( big pyramid ) , Menkaure ( little pyramid ) , and latter Khafre ( sphinx and medium pyramid. ) The rock quarried to construct these buildings were brought from as far off as Tura ( casing rocks ) which is located five stat mis east, Aswan ( granite ) , and the bulk of the rock used was from the tableland itself. Egyptologists say that a bulk of the rock taken from the tableland for Khufu s pyramid originated around the current site of the Sphinx. We will write a custom essay sample on Sphinx Essay Research Paper BullheadedDuring this great or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The pyramids entombed their several Pharaoh organic structures, yet the sphinx and its next edifices have no evident intent. These memorials have changed in visual aspect since building, the pyramids holding lost their extremely polished casing s ( pilfered by Arabs after thirteenth century temblor ) , and both the pyramids and sphinx have sustained significant conditions harm. The conditions eroding nevertheless is non consistent in all constructions ; the pyramids have horizontal weathering as a consequence of drawn-out exposure to strong air currents and dust storms, while the sphinx and its next constructions have both horizontal and perpendicular harm. What could do both horizontal and perpendicular weathering? Egyptologists attribute the uneven weathering to come up groundwater motion, chemical weathering, and exfoliation. The Giza tableland has a southeasterly contour, with the Sphinx busying a place at the low prevarication, easterly border of the tableland. A figure of Egyptologists suggest that Sphinx was carved from a block left over from the quarrying undertaken by Khufu, therefore the south-easterly dip in terrain. Topographical research has proven this claim false, showing grounds that the topography of the Giza tableland was a consequence of natural procedure. The Giza country was inundated by a rush of the Mediterranean Sea during the Pliocene epoch ( 2 to 7 million old ages ago ) , ensuing in the tableland and the North and due east facing drops that surround it. Although waterless conditions have dominated most of the dynastic period of Egyptian history, wetter periods are known to hold existed, with current waterless conditions non to the full established until the terminal of the 5th dynasty. During the passage period nevertheless, waterless conditions were interrupted by seasonal rain. G ive the small flora or sub-soil screen, sporadic heavy rainfall would rapidly saturate the tableland, seeing how under the sand is stone. The H2O would flux down the sloping topography E and hit the Sphinx on the western side doing eroding. Although both western and eastern exposures of the Sphinx are the same age, eroding on the West is significantly more sever. As both archeological and climate indicate, Giza was capable to rain and rain run-off during the Forth and portion of the 5th dynasty. So this fact entirely does non, in itself, necessitate a alteration of the Sphinx s birthday. Located to the West ( acclivitous ) of the Sphinx an archeological digging revealed a 480-foot long ( twice every bit long as Sphinx ) prey filled by windblown sand. Upon entire digging, quarry letterings were found imputing it to Khufu. This big hole consisted of extremely permeable unconsolid ated sand that would hold certainly intercepted all the run-off H2O from its West, that would hold antecedently raced towards the Sphinx. This, nevertheless, lies in contradiction to the Sphinx s terrible H2O eroding on the western side. I feel this means that the building of the Sphinx pre-dates Khufu s quarrying, and subsequent pyramid. I do, nevertheless, feel that the 4th dynasty played a partial manus in the present visual aspect of the Sphinx. Khufu s replacement Djedfe, was the first Pharaoh to integrate the name Re into royal rubric. Djedfe taught that Pharaoh were populating illustrations of Gods, peculiarly Re, the Sun God. This instruction is maintained throughout all of the undermentioned dynasties. Surely by the clip Khafre, the tenet of the Pharaoh as the earthly manifestation of the Sun God had developed farther. To strengthen his correlativity with Re, he commissioned Masons and sculpturers transform the king of beasts caput to that of his ain similitude. This theory has given the recognition of the Sphinx to Khafre, and surely explains why the caput is proportionately much smaller in relation to the organic structure and significantly more preserved. Egyptologist refute that the caput was re-carved by Khafre, but concede that the caput was re-sculpted at some point in its being to resemble a Pharaoh. One such Egyptologist is Ahmed Fayed who believes that the well-known Tutankhamen ordered the face lift. If the builders where non ancient Egyptians, than who built it, and what was its intent. A cosmopolitan lingua that transcends all cultural and linguistics boundaries is the stars, or uranology and star divination. The emanation of the equinox tells us that the universe, in relation to us, invariably alterations in a expansive rhythm of 26,000 old ages. Why did these cryptic builders carve a king of beasts in the terrain confronting east? Astrologers have noted that the age of Leo began at 10,500 BC, and uranologists have calculated that a coinciding heavenly event would besides go on that twelvemonth. At morning before dawn on the twenty-four hours of the spring ( youthful ) equinox, the age of Leo would be ushered in by the heavenly king of beasts resting due east merely above the skyline, in perfect alliance with the Sphinx. Egyptologist confronted with these facts brush them off as coincidental and irrelevant, seeing as they believe the Sphinx was constructed in the Fourth dynast y. Pharaohs who build memorials expected and received congratulations for their creative activities. To continue their reign and remind people of the hereafter merely how power-full and almighty they were they adorned practically every inch of their creative activities with hieroglyphics. These hieroglyphics are found throughout all of the dynasties and on the 100s of pyramids and constructions found in Egypt, except for one. Throughout the Sphinx and its next temples non a individual in lettering, carving, or any other hieroglyphics identified Khafre, our anyone else for that affair as the Godhead. Egyptologist # 8217 ; s, true have no account for this phenomena. I feel that the field of Egyptology has a fatal defect. When confronted with grounds that does non neatly fit into their pre-conceived constructs or tenet of history, they attempt to de-bunk it. The alternate to disregarding grounds, is the prostration of a bulk of theories that they, and infinite others before them, have regarded as sacred truth. I feel that this pattern slaughters the virtuousness of objectiveness in the name of heritage and tenet. To accept the grounds above would in fact repositing this major memorial off from the Egyptian people and confer it upon a cryptic and ancient civilization. Egyptologist claim there is no grounds of this ancient civilization ; to them I present exhibit 1, the Sphinx. . 314

Monday, November 25, 2019

Business Networks Homework Assignment

Business Networks Homework Assignment Free Online Research Papers 1. A key problem when designing data communications networks is how to adapt to new technologies while organizations change. [True; p. 336] Easy 2. A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. [True; p. 336] Easy 3. The traditional network design approach works very well for rapidly changing networks. [False, it is best for static or slowly evolving networks; p. 336] Easy 4. Today, most network designers use a three-year planning horizon. [True; p. 337] Easy 5. Today, the most expensive part of the network is the hardware. [False, it is the staff who design, operate, and maintain it; p. 337] Easy 6. Today, many organizations design networks using the building-block approach. [True; p. 337] Easy 7. Needs analysis is the final step in the building block approach to network design. [False, it is the first step; p. 339] Moderate 8. In technology design, a network designer looks at available technologies to see which options will satisfy users’ needs. [True; p. 339] Easy 9. Cost assessment is used to look at the relative cost of technologies used in a network design. [True; p. 339] Easy 10. The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs. [False, they are slightly different; p. 340] Easy 11. The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared. [True; p. 341] Easy 12. The goal of the needs analysis step in network design is to develop a physical network design. [False, a logical network design is produced; p. 341] Easy 13. The technology that is closest to a user in a network design is the core layer. [False, it is the access layer; p. 341] Easy 14. The core layer of the network is usually the busiest. [True; p. 341] Easy 15. Today, all network traffic is due to traffic from internal application systems. [False, use of the Internet accounts for a significant portion of network traffic; p. 343] Easy 16. Desirable requirements are those that have the highest priority. [False, they come after mandatory requirements in terms of priority; p. 344] Moderate 17. Capacity planning is used to design circuit capacity. [True; p. 346] Easy 18. The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed. [False, it results from higher use; p. 346] Moderate 19. Simulation is a tool that can be used in designing networks. [True; p. 347] 20. Cost assessment is the step in the network design in which user requirements are documented. [False, this step is used to understand the costs of various network alternatives produced from the Technology Design stage; p. 349] Moderate 21. When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible. [False, it is important to speak to senior management in language they understand and can relate to; p. 350-351] Easy MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, moderate, or difficult) and the page(s) relevant to the topic are also furnished. 1. Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth. Answer: b, Moderate, p. 336-338 2. The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing Answer: b, Easy, p. 336 3. Which of the following is not making the traditional design approach less appropriate for today’s networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware Answer: e, Moderate, p. 336-338 4. Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Most client computers today have 4 meg of RAM, a 40 meg hard drive, and an 8Mhz386 processor. e. Multimedia applications on networks are becoming common. Answer: d, Easy, p. 336-338 5. Which of the following is not true about an overlay network? a. It is a way that interexchange networks are trying to keep up with demand. b. It co-exists with primary voice networks. c. It supports separate services such as Internet traffic for an interexchange network. d. It was part of the traditional planning for interexchange networks to handle voice, data, and video on the same circuits. e. It is designed to handle ‘special’ traffic such as WAN traffic for an interexchange network. Answer: d, Moderate, p. 337 6. Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities Answer: e, Moderate, p. 337 7. The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat Answer: b, Easy, p. 338 8. Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network Answer: a, Easy, p. 338 9. Which of the following is not a step that is used in newer type of network design process? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer Answer: c, Easy; p. 339 10. In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: b, Easy, p. 339 11. In __________, the network designer examines the available technologies and assesses which options will meet the users’ needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: a, Easy, p. 339 12. In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: d, Easy, p. 339 13. Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network Answer: d, Moderate, p. 340-341 14. In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue Answer: b, Easy, p. 341 15. Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP Answer: b, Easy, p. 341 16. The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design Answer: e, Easy, p. 341 17. Which of the following is not a conceptual part, or layer, of the geographic scope of the network? a. core layer b. application layer c. access layer d. distribution layer e. the layer that connects the different distribution layers to each other Answer: b, Moderate, p. 341-342 18. Which of the following is not a basic level of the geographic scope of the network? a. local area network b. focused area network c. backbone network d. metropolitan area network e. wide area network Answer: b, Moderate; p. 341-342 19. Which of the following would not be collected by a designer, working in the needs analysis phase, who was documenting general information and characteristics of the environment in which the network must operate? a. local laws that could affect the network b. international laws that could affect the network c. federal laws that could affect the network d. building codes that could affect the network e. traffic laws that could affect the network Answer: e, Moderate, p. 342 20. __________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization’s possible changes in product mix c. Understanding the organization’s strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization’s projections of sales Answer: a, Easy; p. 342-343 21. Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices Answer: e, Easy, p. 342-343 22. Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer Answer: a, Easy; p. 344 23. Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network Answer: d, Moderate, p. 344 24. Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center Answer: e, Easy, p. 346 25. Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. physical network design d. turnpike design e. backplane design Answer: c, Easy, p. 348 26. Which of the following would not be a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. TCP/IP d. ATM e. SNA Answer: b, Easy, p. 346 27. Estimating the size and type of the â€Å"standard† and â€Å"advanced† network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs Answer: d, Easy, p. 346 28. Which of the following would not be a type of circuit capacity that needs to be considered in technology design? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps Answer: b, Easy, p. 346 29. In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage Answer: d, Moderate, p. 346-348 30. ___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation Answer: a, Easy, p. 346 31. __________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer Answer: c, Easy, p. 346 32. To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node Answer: a, Moderate, p. 346 33. According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20 Answer: c, Easy, p. 346 34. A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan Answer: c, Moderate; p. 346 35. There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement Answer: a, Moderate, p. 347 36. ________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users Answer: d, Moderate; p. 347 37. Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system Answer: a, Moderate; p. 349 38. Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers Answer: d, Easy, p. 349 39. To estimate costs for large network purchases, organizations often: a. purchase all network purchases ‘off the shelf’ b. obtain ‘book value’ information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors Answer: e, Moderate, p. 349 40. RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol Answer: a, Easy; p. 349 41. Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more Answer: a, Easy; p. 349 42. Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on network reliability e. discuss SNA architecture Answer: d, Easy, p. 350-351 43. Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice Answer: b, Easy; p. 351 44. The physical network diagram is done: a. before the vendors are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendors are selected d. after the vendors are selected e. after the network has been implemented Answer: d, Easy, p. 351 Short Answer Questions 1. What is a RFP and why do companies use them? Answer: A request for proposal is a way that organizations can get vendors to provide their best prices for specific equipment, software, and/or services. These products and/or services often cannot be purchased â€Å"off the shelf†, so organizations cannot go to a retail store to comparison shop. By permitting vendors to compete, organizations can find out the cost of products and services for which pricing is not readily available. Once all vendors have submitted their proposals, the organization evaluates them against predetermined criteria and selects the winner(s). 2. What is a network baseline and when is it established? Answer: A network baseline is part of the needs analysis. At this step, it is important to gain an understanding of the current operations (applications and messages). Future design requirements can be compared to this baseline. The designers must review the list of applications that will use the network and identify the location of each. 3. Why is it important to analyze needs in terms of both applications and users? Answer: In the past, application systems accounted for the majority of network traffic. Today, much network traffic is produced by the discretionary use of the Internet by users. In order to understand how a network will grow and change, network designers need to assess the number and type of users that will generate and receive network traffic and identify their location on the emerging network diagram. It is important to understand current applications and proposed changes to the organization’s applications. 4. What issues are important to consider when explaining a network design to senior management? Answer: The key to gaining senior management acceptance lies in speaking their language (cost, network growth, and reliability). Using ‘jargon’ will not be effective. Tying the technical needs to business goals and using business language will be far more compelling. 5. What is the turnpike effect and why is it important in network design? Answer: The turnpike effect results when the network is used to a greater extent than was anticipated because it is available, is very efficient, and provides new services. 6. Under what circumstances would the use of the building block approach be less appropriate than the â€Å"traditional† approach to network design? Answer: The use of the building block approach would be less appropriate than the â€Å"traditional† approach to network design for those applications for which hardware or network circuits are unusually expensive (e.g., WANs that cover long distances through many different countries). 7. What are the three major steps in current network design? Answer: Needs analysis (the designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications; Technology Design (the designer examines the available technologies and assesses which options will meet the users’ needs); and, Cost Assessment (the relative costs of the network are considered). 8. How can a network design tool help in network design? Answer: Some network tools help the designers â€Å"discover† the existing network so that they can document the current network very well. Then, the user can change it to reflect a new design. A tool like this is most helpful when the network that is being designed is an upgrade to an existing network, and when the network is very complex. Research Papers on Business Networks Homework AssignmentOpen Architechture a white paperThe Project Managment Office SystemBionic Assembly System: A New Concept of SelfIncorporating Risk and Uncertainty Factor in CapitalRiordan Manufacturing Production PlanAnalysis of Ebay Expanding into AsiaInfluences of Socio-Economic Status of Married MalesPETSTEL analysis of IndiaMoral and Ethical Issues in Hiring New EmployeesResearch Process Part One

Friday, November 22, 2019

The Graduate Essay Example | Topics and Well Written Essays - 1250 words

The Graduate - Essay Example The Graduate supports these arguments by ignoring all the political upheavals and concentrating on the topics of adultery and sex as the major themes of his work. The Graduate movie ignored the political movements that were taking place in the1960s. This was a time when many of the European wars were coming to an end. There were many political activists, civil rights advocates, feminist movements among others. Example of these movements included the Vietnam anti-war movements. The Graduate focuses on issues other than the political culture. It concerns with the generational gap while ignoring the counterculture movements. It attacks the film race by applying the Hollywood style; thus, causing the youth of a generation to re-examine their future by altering their course of lives. The Graduate also ignored the activist movements such as anti-racism; this indicates that the author was explicitly interested in issues of sex and adultery (Schuth 47). Dr. Benjamin argued that America had entered into a period of middle-class affluence that gave parents a chance to raise their children with greater permissiveness than before. The Graduate movie focused on the adult race. Its main focus is to criticize the adult insensitivity to the graduate. The adults are portrayed as vulgar and crass. It condemns the parents’ inability to raise their children in a pervasive way. The upper social class is portrayed as stereotyped and corrupt beyond their understanding of the meaning of true love. This is further illustrated in the movie by the character of Mrs. Robinson. When Benjamin runs away with Ms. Robinson on the wedding day, Mrs. Robinson is cross with her and openly tells her daughter that her decision is wrong. However, the love that Elaine is big enough to blind her from her mother’s arguments. This argument results in Mrs. Robinson’s slap on her daughter. On the

Wednesday, November 20, 2019

Homeland Security Case Study Example | Topics and Well Written Essays - 1250 words

Homeland Security - Case Study Example The actions of this department are what are amalgamated into the term Homeland security. The main focus of this formation is to deal with issues of the domestic population, building the necessary infrastructure to deal with both internal and the external aggressions and threats, sovereignty and the protection of the U.S territory. Inside the United States of America, the â€Å"Homeland Security† concept recombines and extends to the state agencies’ entities and responsibilities. The Homeland security research lays down the composition and formation of the Homeland Defense and the Homeland Security. These include the Transportation Security Administration, the Secret Service of the United States, United States Citizenship and Immigration Services, Americas Immigration and Customs Enforcement, Border and Customs Protection and the United States Coast Guard. Others Include the Federal Emergency Management Agency, the United States National Guard, among other departments adding up to one hundred and eighty-seven companies. The functions of the Homeland security are a major responsibility of the state (Berman & Flint, 2003). There have been several issues that affect the United States of America and that the Department Of Homeland Security has been grappling to deal with over years and presently. These issues include terror attack threats, immigration, capabilities, resource allocation, civil liberties, incident response, transportation security, intelligence, biotechnology, cyber security, infrastructure, funding allocation, border control among other issues. This paper will focus on cyber security threat that has been a challenge to the United States of America’s Homeland security. Cyber threats have been a challenge, both in past and present, to the United States. The policy makers and the Department of Homeland Security have been working hard to deal with issues relating to cyber security. The fight has been backed up by the use of

Monday, November 18, 2019

Tuskegee Airmen History Research Paper Example | Topics and Well Written Essays - 1250 words

Tuskegee Airmen History - Research Paper Example From the days approaching he first world war onwards, African American men had tried to become involved in the emerging discipline of air training, but the path was initially blocked by the planning bureaucrats when they tried to apply. The reason given in 1917 was that â€Å"No colored aero squadrons were being formed at the present time,... but, if later on, it was decided to form colored squadrons, recruiting officers would be notified to that effect.† Francis and Caso, 1997, p. 37) The uncomfortable truth of that era was that the War Department simply did not believe that African American men had the talent and ability to benefit from training as pilots. Besides this wholly unjustified prejudice concerning the qualities of African Americans, there was also a deep-seated commitment to segregation of white and African American people in all walks of life. The military could not conceive of an inter-racial force combining these different groups, as we have today in the modern navy, airforce and army, and so the only possible idea in their minds was a segregated unit for non-white groups. From the beginning of its existence, the U.S. Air Force was considered a profession only for the brightest and best students. It combined a highly technical training in all the skills needed for flight, with a demand for courage and exceptionally good judgement in difficult circumstances. Most airmen were graduates of respected colleges, and of course the general exclusion of African American students from most white colleges and universities made it difficult for this group to obtain even the basic prerequisites for entry. The Tuskegee Institute filled this gap by designing the first advanced courses specially tailored to prepare African American students for a career in flying. Civilian pilots and other trainees were recruited, and the types of training provided covered quite a range, including preparation for roles as airplane mechanic, aircraft armorer, aircraft sup ply and technical clerk, instrument and weather forecasting. (Francis and Caso, 1997, p. 55) One of the reasons for this expansion into African American training institues was the increasing need for qualified staff, but another was the efforts of teaching staff and potential trainees, especially in the Southern States to be allowed to take up an equal position along with other groups in defending their country in the case of war. The Second World War made it abundantly clear that the country needed to be equipped for defence and action in Europe and elsewhere, and this is perhaps what encouraged the planners to provide the resources for training. Despite the logical reasons for the Tuskegee programs, many people in government and in society at large remained to be convinced that African Americans could take up such vitally complex and difficult roles as flying in combat. A significant factor in overcoming these reservations was a visit by the President’s wife, Mrs Eleanor Ro osevelt, to fly with Charles Alfred Anderson. â€Å"Thanks to his skill and obvious abilities, the First Lady returned to the White House convinced about the Blacks’ capabilities not only to fight in the Air Corps, but to fight as well in the Army and in the Navy.† (Francis and Caso, 1997, p. 31) While permission to train for the Air Corps was pushing ahead, things were not quite so positive in

Saturday, November 16, 2019

Entrepreneurs Personal Characteristics And Influence On Growth Commerce Essay

Entrepreneurs Personal Characteristics And Influence On Growth Commerce Essay Barons (2002) definition of entrepreneurship indicates that entrepreneurship involves a complex process in which specific individuals recognize opportunities and then act to convert them into tangible economic benefits by setting up a new business. This corresponds with Schumpeters (1934, from: Elliot, 1983) early definition of entrepreneurship and entrepreneurs. He states that an enterprise is a carrying out of new combinations and entrepreneurs are the individuals whose function it is to carry them out. According to Schumpeter everyone is an entrepreneur only when he is actually carrying out new combinations, and he loses that character as soon as he built up his business. The entrepreneur then becomes only a small business owner (Carland et al., 1984). In this report I use Schumpeters definition of entrepreneurs and with that focus on entrepreneurs that started a business recently. Several meta-analyses have shown that entrepreneurs differ from other groups in terms of a broad range of personality (Zhao et al., 2010). The five-factor model (FFM) of personality provides a meaningful and generalizable taxonomy for studying these differences. The FFM consists of five relatively independent dimensions: Extraversion, Neuroticism, Conscientiousness, Agreeableness, and Openness to Experience (Wang and Erdheim, 2007). Each dimension reflects certain personal characteristics. Small businesses are different from large organizations. Their characteristics are that they are reactive, fire-fighting mentality, have resource limitations, informal strategies and flexible structures (Terziovski, 2010). While small firms opportunity-seeking skills may be strong, their limited knowledge stocks and lack of market power inhibit their ability to enact the competitive advantages necessary to appropriate value from opportunities the firms choose to pursue (Ketchen et al., 2007). This paper consists of a literature study on the personal characteristics of entrepreneurs and their influence on small business growth. Scientific literature will be consulted to study this relationship. I have chosen to investigate the relationship between an entrepreneurs personal characteristics and their influence on small business growth because I am interested in entrepreneurship and because I am working on setting up my own small business. It is an interesting topic because there are not many articles written about it and I think it can give entrepreneurs insights in how to use certain personal characteristics to make a positive contribution to the growth of their small business. The research question of the paper is: To what extent are an entrepreneurs personal characteristics of influence on small business growth? The sub questions are: How can personality be defined? Which personal characteristics are according to the literature specific for an entrepreneur? What are the characteristics of the small business sector? What kind of challenges will an entrepreneur face after starting up a business? The paper will be structured as follows. In the next section I will put up a definition of personality and review the Five Factor Model. Some insights about personal characteristics of entrepreneurs that are written about in the literature are also being discussed. After that a section is dedicated to the characteristics of the small business sector and what kind of challenges entrepreneurs face after starting up their business. Section 4 consists of an analysis where the insights from the foregoing two sections are combined. I will also analyze and discuss the results of an interview with an entrepreneur in this section. In the last section a conclusion will be given with a concrete answer to the sub questions and the research question. I will also discuss the limitations of this study and some recommendations for future studies. Figure 1 summarizes the paper structure. Figure 1: Paper structure An entrepreneurs personal characteristics In this section an overview is given of an entrepreneurs personal characteristics that are elaborated on in the literature. First a definition of personality will be given. In the same section The Five Factor personality Model (FFM) is explored because in this model certain personal characteristics are grouped together into five different personality dimensions. After that other personal characteristics that are quoted in the literature are being discussed. The goal of this section is to derive a set of personal characteristics from the literature that are typical for entrepreneurs and match them to the dimensions of the FFM. Personality and the Five Factor Model This paragraph starts with a definition of personality. After that I will explain the FFM model and specify an amount of personal characteristics that are typical for the five dimensions of the model. Personality can be defined as enduring dispositions that cause characteristics patterns of interaction with the environment (Parks and Guay, 2009). Personality consists of personality traits that are endogenous basic tendencies tied to underlying biophysiological response systems. They are strongly heritable, immune to social and parental influences and quite stable throughout maturity (Olver and Mooradian, 2003). In the 1990s consensus was reached about five broad categories of personality. These five categories together are called the Five Factor personality Model. The five FFM dimensions are: Conscientiousness, Emotional Stability/Neuroticism, Extraversion, Agreeableness, and Openness to experience (Parks and Guay, 2009; Wang and Erdheim, 2007; Zhao et al., 2010). Conscientiousness refers to making deliberate choices and being reliable. The personal characteristics that belong to this dimension are being careful, thorough, responsible, motivated, organized and efficient. Emotional stability/neuroticism represents the individual differences in the tendency to experience distress and the typical behaviors that are associated with it. According to Parks and Guay (2009) emotional stability refers to the characteristics self-confident, resilient and well-adjusted. According to Wang and Erdheim (2007) neuroticism is the opposite of emotional stability and is being anxious, depressed, emotional, worried and insecure. The third dimension, extraversion, refers to being ambitious, talkative, assertive, and sociable. Agreeableness consists of the social aspect of personality, that is being friendly, cooperative, loyal, courteous, good-natured and tolerant. Finally, openness to experience refers to the characteristics curious, imaginative, open-minded and artistically sensitive. This dimension reflects the creative side of personality. According to Zhao et al. (2010) these five dimensions do not cover all personality traits, so they expanded the model with the dimension Risk propensity. Risk propensity can be defined as the willingness to pursue decisions or courses of action involving uncertainty regarding success or failure outcomes. This was a short explanation about personality and the FFM. In the next paragraph I will discuss several personality traits of entrepreneurs that were elaborated on in literature. An entrepreneurs personal characteristics In this paragraph I will start with Schumpeters theory about the psychology of the entrepreneur. After that several personal characteristics of an entrepreneur that are reviewed in the literature will be discussed. Schumpeter (1934, from: Elliot, 1983) was one of the first to discuss the personal characteristics of the entrepreneur. He argues that there is the dream and the will to found a private kingdom, usually, though not necessarily, also a dynasty. Then there is the will to conquer: the impulse to fight, to prove oneself superior to others, to succeed for the sake, not of the fruits of success, but of success itself. Finally, there is the joy of creating, of getting things done, or simply of exercising ones energy and ingenuity (p. 93). After Schumpeter several other researchers investigated the psychology of the entrepreneur. Entrepreneurs differ from the rest of the population in a number of ways (Beugelsdijk and Noorderhaven, 2005; Brandstà ¤tter, 1997; Zhao et al., 2010). Entrepreneurs can be characterized by an incentive structure based on individual responsibility and effort, and a strong work ethic (Beugelsdijk and Noorderhaven, 2005). This means that they think that the state should not take more responsibility, private ownership should be increased, that unemployed should not have the right to refuse a job and success is not a matter of luck and connections but of hard work. Brandstà ¤tter (1997) attaches an entrepreneurs personal characteristics to some situational characteristics that are common to all entrepreneurs. First, it is the absence of people who give orders, set goals and control the outcome. This means that entrepreneurs are more individually oriented than other people (Beugelsdijk and Noorderhaven, 2005). A second aspect is the insecurity. There is always the risk of economic failure that entrepreneurs have to deal with. They dont need to be upset or worried very easily, so emotional stability is a prerequisite for entrepreneurs. This corresponds with the vision of Zhang et al. (2009). They mention that the level of neuroticism was a key predictor of centrality in advice and friendship networks. People that score low on the level of neuroticism tend to obtain central positions in advice and friendship networks and people high in neuroticism tended to become the center of adversarial networks. Because social networks are very important for entrepreneurs, these results suggest that entrepreneurs have to be emotional stable. The third characteristic Brandstà ¤tter (1997) defines is the demand for social contact. Entrepreneurs have to convince their customers of the usefulness of their product and they have to keep in touch with them to fulfill their needs. Finally, entrepreneurs have to be ready to try out new ideas and respond quickly to changes around them. This means that entrepreneurs have to be more innovative than others. Another characteristic of entrepreneurs is that they score high on the extraversion dimension (Zhang et al., 2009). This seems logical because extraverted people tend to have more social skills and this is important for entrepreneurs because they have to persuade different stakeholders. Baron (2002) supports this vision. He states that entrepreneurs who are successful in generating enthusiasm in others, may be significantly more successful than those who are not. Smith-Hunter et al. (2003) defined the most researched personal characteristics from the traditional school, that is a group of researchers who focused on the personality characteristics of the individual. These characteristics are locus of control (Poon et al., 2006), risk-taking (Zhao et al., 2010), achievement motivation (Poon et al., 2006), and problem solving style and innovativeness (Beugelsdijk and Noorderhaven, 2005; Schumpeter, 1934, from: Elliot, 1983). Locus of control can be defined as peoples perception of their ability to exercise control over the environment (Poon et al., 2006). People with an internal locus of control believe that their own effort determines certain outcomes in life, whereas people with an external locus of control believe that outcomes are determined by external factors they cant influence. Locus of control is one of the classical themes in the entrepreneurial trait research that differentiate entrepreneurs from non-entrepreneurs (Beugelsdijk and Noorderhaven, 2005; Poon et al., 2006). Entrepreneurs are characterized by a more internal locus of control (Dvir et al., 2010). Many recent studies have focused on the relationship between the locus of control and an entrepreneurs level of self-efficacy (Smith-Hunter et al., 2003). Entrepreneurial self-efficacy is the degree to which people perceive themselves as having the ability to successfully perform the various roles and tasks of entrepreneurship (Hmieleski and Baron, 2008). Hmieleski and Baron (2008) investigated that self-efficacy is moderated by the degree of optimism and the industry conditions. The results of their study indicate that (1) in dynamic environments, entrepreneurial self-efficacy exerts positive effects on performance for firms led by moderately optimistic entrepreneurs, but exerts negative effects on performance for firms led by entrepreneurs who are highly optimistic and (2) in stable environments, the effects of entrepreneurial self-efficacy on firm performance are less clear and not moderated by the degree of optimism. The opinions about the characteristic risk-taking are diverse. Some researchers found that entrepreneurs are high risk takers (Zhao et al., 2010), but others mention that entrepreneurs are moderate risk takers (Xu and Ruef, 2004). There are two forms of risk tolerance that may lead individuals to entrepreneurial activity, strategic and non-strategic (Xu and Ruef, 2004). In strategic risk tolerance rational actors actively prefer low-probability, high payoff outcomes. In non-strategic risk tolerance rational actors need not have active risk preferences, but only appear to prefer low-probability, high payoff outcomes because their information on the distribution of outcomes is based on conditions of imperfect knowledge. The need to achieve refers to a desire to do well in order to achieve a sense of personal accomplishment (Poon et al., 2006). The need to achieve can be related to the characteristics desire for independence (Dvir et al., 2010; Poon et al., 2006) and risk-taking propensity (Zhao et al., 2010). People who have a high need for achievement possess five critical attributes (Smith-Hunter et al., 2003). High achievers like situations where they can take responsibility. They like rapid feedback on their performance, so they can criticize their own improvements. They avoid very easy or very difficult tasks and they dislike succeeding by chance. They prefer striving to achieve targets and the last characteristic is that they are interested in concrete knowledge about the results of their decisions. Finally innovation and problem solving capabilities are expected to be the core of the entrepreneurial capability of an entrepreneur (Smith-Hunter et al., 2003). Schumpeter (1934, from: Elliott, 1983) mentioned that creative destruction, whereby new products and processes replace old ones, is more important than price competition among existing firms and products. This means that entrepreneurs are more innovative than non-entrepreneurs (Beugelsdijk and Noorderhaven, 2005). For this end the most important characteristics of an entrepreneur that were cited in literature were discussed. Dvir et al. (2010) mentioned the most frequently cited personality traits of entrepreneurs. These are the desire to be independent (Beugelsdijk and Noorderhaven, 2005), internal locus of control (Poon et al., 2006), creativity or innovativeness (Schumpeter, 1934, from: Elliott, 1983), risk-taking propensity (Xu and Ruef, 2004; Zhao et al., 2010), need for achievement (Poon et al., 2006), and credible role models. In the next paragraph the above mentioned characteristic will be related to the FFM dimensions. An entrepreneurs personality traits and their relation with the FFM dimensions The characteristics mentioned in the foregoing paragraph can be related to the dimensions of the FFM. The five dimensions were Conscientiousness, Emotional Stability/Neuroticism, Extraversion, Agreeableness, and Openness to experience. The extra dimension added by Zhao et al. (2010) was risk propensity. Because of the strong work ethic (Beugelsdijk and Noorderhaven, 2005) and the high need for achievement (Poon et al., 2006) entrepreneurs score high on the conscientiousness dimension. Conscientiousness has been found to be a consistent predictor of job performance across occupations involving managing others and sales performance (Ciavarella et al., 2004). Emotional stability is a prerequisite for entrepreneurs because of the insecurity they have to deal with (Brandstà ¤tter, 1997). People that score high on the level of emotional stability tend to obtain central positions in advice and friendship networks (Zhang et al., 2009). An internal locus of control (Poon et al., 2006) and mostly a high level of entrepreneurial self-efficacy (Hmieleski and Baron, 2009) are specific for an entrepreneurs emotional stability. Entrepreneurs also score high on the extraversion dimension (Zhao et al., 2010). The reason for this is that being extraverted should facilitate the development of social networks, ultimately resulting in stronger partnerships with suppliers and customers, which is very important for entrepreneurs (Ciavarella et al., 2004). The characteristics of extraversion are being ambitious, talkative, assertive, and sociable (Parks and Guay, 2009). According to Ciavarella et al. (2004) agreeableness is an interpersonal factor that focuses on the quality of relationships through cooperation and trust. Entrepreneurs who establish trusting, flexible, and courteous relationships with their customers should expect to reap the profits of repeat business. Zhao et al. (2010) expected that, given the limited margin for unselfish behavior and the high likelihood of guarded and even conflictual interpersonal relationships associated with entrepreneurship, there would be a negative relationship between agreeableness and entrepreneurial intentions. However their results have shown that this is not true and that entrepreneurs do score high on agreeableness and with that are highly cooperative and reliable. Openness to experience describes the extent to which individuals tend to be curious, creative, and open to new ideas, which relates to self-direction values, those are beliefs that individuals ought to be independent and self-directed (Parks and Guay, 2009). Successful entrepreneurship is likely to require constant information monitoring and learning to keep up with changing tastes and market trends, competitor behavior, and new Technologies (Zhao et al., 2010). This indicates that entrepreneurs are more innovative than non-entrepreneurs (Beugelsdijk and Noorderhaven, 2005) and that they score high on openness to experience. For the last dimension, risk propensity, the visions are not always the same. Zhao et al. (2010) argue that entrepreneurs are characterized by a high risk propensity, while Xu and Ruef (2004) argue that entrepreneurs are moderate risk-takers. The goal of this second section was to derive a set of personal characteristics for an entrepreneur from the literature and relate them to the FFM dimensions. After first discussing the FFM model and after that, reviewing the personal characteristics of an entrepreneur, I attached the personal characteristics to the dimensions of the FFM. With this the second section is finished. In the next section I will discuss the characteristics of the small business sector. Because of the focus on entrepreneurs that recently started their business, some challenges they face will also be reviewed.

Wednesday, November 13, 2019

And Then There Were None by Christie Agatha Essay -- Vera and Lombard,

Vera felt as though it was only right to follow the poem. Every time somebody died or disappeared a little china figure would break or disappear but at the end Vera toke the last one standing with her as a token saying that they made it to the end. While she was hanging herself the little figure broke, â€Å"The little china figure fell from her hand. It rolled unneeded and broke against the fender† (Christie 268). She also thought that’s what Hugo wanted her to because she was responsible for his nephew death. The antagonist of And Then There Were None is Judge Justice Wargrave. He was also known as Issac Morris to hide his real identity from all the other characters. He was the judge of all of the characters cases and he found them guilty and thought it was right for them to die. He knew almost everything about all of the characters, how they would think, how they would react to certain things, and some of the decisions they would make. Wargrave lead the characters to have both internal and external conflicts. For example external conflicts â€Å" They felt now like the people just awaking from a nightmare. There was danger, yes, but it was danger in daylight. That paralyzing atmosphere of fear that had wrapped them round like a blanket yesterday while the wind howled outside was gone† (Christie 243). These people are so terrified they are not getting sleep, barely eating, and hardly talking. They are living they worst nightmare. Not only that Wargrave is killing people but he is also scaring the people that is alive more and more which is causing them to have internal conflicts. For example Vera Claythorne ,the protagonist went through the deepest internal conflict â€Å"What was that-hung from the hook in the ceiling? A rope with a noose ... ...why. They all did a crime and thought they got away with it. In conclusion Agatha Christie wrote this very popular novel called And Then There Were None , to teach the readers that free or not you are never free from justice. By using both external and internal conflicts with the characters, symbolism with the poem Ten Little Soldiersand the china figures both symbolizing each character and irony of Justice Wargrave. This book is one of the reasons why Christie became the first grandmaster recognized by the mystery writers of America Works Cited â€Å"Christie, Agatha.† Literary Lifelines. 1998. Print. Christie, Agatha. And Then There Were None. New York: Harper Collins Publishers, 1939. Print. Kunitz, Stanley J., ed. Twentieth Century Authors. New York: The H.W. Wilson Company, 1973. Print. Stade, George and Karen, Karbiener., eds. British Writers. 2003. Print