Wednesday, November 27, 2019

Never back down free essay sample

As a society, we recognize a wide variety of disabilities. Over the years people who have them have been called many things from disabled to handicapped and today are more often identified as challenged. Some of these medical conditions are detected and others are not, but nearly every person in his, or her, life will deal with one personally, or will know someone who does. Dyslexia is one that is very common and one that many people do not understand. Those who understand it best have had to deal with it themselves because it can be unique to each person that is diagnosed. Being diagnosed at the age of nine, and through my struggles I have learned a lot about this common condition. I believe the areas where people struggle most is when we are faced with the most difficult challenge that makes us have to search deep within ourselves to determine if we want to overcome what seems like an impossible situation. We will write a custom essay sample on Never back down or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page It is as if a concrete wall has been constructed in the in the middle of the road we are going down. When this happens we can choose to back down from the fight of getting past it by turning and running, or you can take the bull by the horns and face the obstacle head on by climbing over or smashing through that concrete wall to keep going down the road to where you eventually find your dreams. Since I was very young I have dreamed about going to play football at a Division I University. The first step to get into a University is to have a great education and good grades from your high school. Several years ago, this situation caused a concrete wall to get dropped onto the road that my dreams are on. When I started school in the first grade, I was the best in my class in Math, but I never did well on the reading and writing, and it was not because of a lack of effort, because I tried very hard. I went through my first and second grades struggles, having to put at least twice as much time and effort as anyone else in my class to try to figure out how to correctly read and write. When I got into third grade, my parents finally had enough of dealing with my frustrations that I was tested for dyslexia at Scottish Rite Children Hospital in Dallas. The test came back positive that not only was I dyslexic, but that my case was more severe than most other cases. The doctors at the hospital said that the results proved that my disability was the reason for my struggles in reading and writing, and recommended that for my dyslexia I would require some classroom modifications that would help me in the classroom as well as some specific training. I was immediately put into a dyslexia program outside of my regular class which I did not care for. I did not care for it because I had to read and write even more then I already had to do in my class. I had to use an overlay on my papers, I spent many extra hours having assignments read out loud to me, I was assigned a peer tutor to help me, I was taught by a dyslexic coordinator how to understand how my brain processed information, and eventually I developed an ability to learn outside of reading which takes twice as long as most students. It took me a long time to realize that this program was the only way for me to be able to continue on my path to be able to reach my dreams. Once I figured out that the class was the only way to get me in the best situation to prepare and get into college, I took my class very serious, and my dedication to my reading and writing increased more than ever before, because I was determined to overcome any and all obstacles that would stand in my way , or in the middle of the road I was choosing to go down. I eventually graduated from the dyslexia program when I finished six grade, and I took on the challenge to make all A’s through middle school. I was able to make all A’s through middle school with a lot of hard work, and I continued to keep pushing on by trying to get the best grade out of anyone in my class even being dyslexic as I continued into high school. After my freshman year I was in the top ten percent of my class. I carried a grade point average of over 4.0. I kept my class rank through my sophomore year by finishing 18th in my class and having a 4.16 GPA. I am continuing my efforts which are resulting in maintaining my high expectation, although because I moved to a school that is much more demanding academically has presented me with an even bigger challenge due to my modifications being removed. My journey to this point would have been impossible without all of my hard work into my dyslexia program back when I was going up, and without my commitment to nev er back down I would have never been in the top 10 percent. In many circumstances throughout our life we will be faced with difficult moments and situations that may discourage us from pressing forward and continuing down the road we are on. I believe that dedication and determination will help us all overcome those challenges when they jump in front of you, and the desire to keep your eyes focused on your dreams is very important. I have applied this philosophy to all that I do, and I have learned to never back down from even the most difficult challenge. Life is a journey, and nobody said it was going to be easy.

Sunday, November 24, 2019

Definition of a Post-Industrial Society

Definition of a Post-Industrial Society A post-industrial society is a stage in a societys evolution when the economy shifts from producing and providing goods and products to one that mainly offers services. A manufacturing society is comprised of people working in construction, textiles, mills and production workers whereas, in the service sector, people work as teachers, doctors, lawyers, and retail workers. In a post-industrial society, technology, information, and services are more important than manufacturing actual goods. Post-Industrial Society: Timeline A post-industrial society is born on the heels of an industrialized society during which time goods were mass-produced utilizing machinery. Post-industrialization exists in Europe, Japan, and the United States, and the U.S. was the first country with more than 50 percent of its workers employed in service sector jobs. A post-industrial society not only transforms the economy; it alters society as a whole. Characteristics of Post-Industrial Societies Sociologist Daniel Bell made the term post-industrial popular  in 1973 after discussing the concept in his book The Coming of Post-Industrial Society: A Venture in Social Forecasting. He described the following shifts associated with post-industrial societies: Production of goods (like clothing) declines and the production of services (like restaurants)  goes up.Manual labor jobs and blue collar jobs are replaced with technical and professional jobs.Society experiences a shift from focusing on practical knowledge to theoretical knowledge. The latter involves the creation of new, invention solutions.There is a focus on new technologies, how to create and utilize them as well as harness them.New technologies foster the need for new scientific approaches like IT and cybersecurity.Society needs more college graduates with advanced knowledge who can help develop and advance technological change. Post-Industrial Societal Shifts in the U.S. About 15 percent of the labor force (only 18.8 million Americans out of a workforce of 126 million) now works in manufacturing compared to 26 percent 25 years ago.Traditionally, people earned status and gained and privilege in their society through inheritance which could be a family farm or business. Today education is the currency for social mobility, particularly with the proliferation of professional and technical jobs. Entrepreneurship, which is highly valued, generally requires a more advanced education.The concept of capital was, until fairly recently, considered mainly to be financial capital gained through money or land. Human capital is now the more important element in determining the strength of a society. Today, thats evolved into the concept of social capital the extent to which people have access to social networks and subsequent opportunities.Intellectual technology (based on math and linguistics) is at the forefront, utilizing algorithms, software programming, simul ations and models to run new high technology. The infrastructure of a post-industrial society is based on communication whereas the infrastructure of industrial society was transportation.An industrial society features a labor theory based on value, and industry develops proceeds with the creation of labor-saving devices which substitute capital for labor. In a post-industrial society, knowledge is the basis for invention and innovation. It creates added value, increases returns and saves capital.

Thursday, November 21, 2019

Law for non-lawyer Case Study Example | Topics and Well Written Essays - 2000 words

Law for non-lawyer - Case Study Example Essentially, there are laws governing criminal offences as well as civil offences. In addition to underscoring the punishment that the offenders should be accorded, the laws offer principles that need to be put in consideration before the suspects are justified to have committed the alleged offences. In this consideration, law is an instrument of furthering justice and ensuring that all individuals are treated equally. Offences related to assault are defined to be criminal by the law. This is due to the fact that they expose the individual to harm or danger that compromises their life. Put differently, assault is a criminal offence that compromises the life of a victim. It exposes the victim to danger and/or instils a demeaning sense of fright. Usually, the legal implications of assault are immense. For this reason, it is important for the prosecutors to weigh the options and establish that the offense actually occurred. It would be unfair to prosecute a person if it has not been cle arly established that the offense actually happened. It is against this background that this paper explores the guidance and general principles that need to be put in consideration when making the decisions regarding whether to prosecute Billy for the alleged assault. Generally, assault is defined as any act, as opposed to a simple omission, in which an individual recklessly or intentionally causes the other to apprehend unlawful and immediate violence. As in R v Burstow; R v Ireland (1998) 1 AC 147, fear is an inherent factor of assault. In addition, assault does not necessarily constitute physical contact with an individual that alleges to have been assaulted. In light of Barwick CJ in The Queen v Phillips (1971) 45 ALJR 467 at 472, the mere instillation of fear amounts to assault (Loveless 42). With reference to the case study, Billy assaulted the youngsters psychologically. Arguably, the two children were filled with fear when their mother was hit in their presence. In this sens e, Billy is liable for the offence of assault. The principle of recklessness is also important in establishing the charge of assault. In instances where the crown relies on recklessness to make the vital decisions and where physical force is not applied, Monaghan indicates that it is essential for one to prove that the accused was aware that the complaint is likely to fear that s/he would at that particular point in time be subjected to unlawful and immediate force (64). Regardless of this knowledge, the accused went ahead to take the respective risk. In instances where physical force is applied, the crown needs to prove that the accused was sure that the complaint would actually be exposed to unlawful force, however minimal, as a result of what he was just about to do, but still took the risk that the respective incident might happen. A classic exemplification of this is by R v Savage; DPP v Parmenter [1992] 1 AC 699 (Monaghan 65). With reference to the case study, Billy clearly kn ew the implications of hitting his wife with a leg of a chair on her head. It has not been indicated whether he was under the influence of alcoho

Wednesday, November 20, 2019

Shangrila Hotel Singapore Assignment Example | Topics and Well Written Essays - 1000 words

Shangrila Hotel Singapore - Assignment Example   Luxurious hotels were only visited by designated group of people in a given class. Shangrila Hotel has evolved into the most viable and profitable hotel in Singapore due to the presence of major changes in the hotel management. Shangrila Hotel has provided services available to people in all classes irrespective of income levels. In 2009, Shangrila Hotel acquired several hotels in Malasyia a step that made the organization increase the number of customers. In addition, the hotel management owned 80% of the hotel in Puteri Harbour, Johor a strategy that allowed Shangrila Hotel to increase its share stakes by 20% (Yeap 2013). Secondly, Shangrila Hotel had a significant change with her managerial roles. According to Tracy (2008), the hotel industry is undergoing rapid change in management through hiring technologically advanced and socially responsible managers. In an effort to cope with the global competition, Shangrila Hotel hired new managers who were proficient and competent in the hotel industry. In addition, the organization hired managers in charge of finance, marketing, and human resources in order to ensure accountability of all employees and company revenues. Customers are the source of profit for an industry, which means their environment should be well viewed at carefully to avoid certain incidences, which might be of risk to them. In the present environment, hotel customers seek humble and human places where people have respect for visitors irrespective of backgrounds. (Kotler and Armstrong 2011). The hotel has practiced a strong corporate culture and personnel that ensured visitors from all corners of the earth receive quality treatment irrespective of culture, race, or denomination. Holding a strong corporate cultural responsibility has increased Shangrila Hotel competence through contributing to the high achievement. Shangrila Hotel is ranked among the top hotels in Hong Kong for quality hospitality. Moroever, the hotel has undetaken employees training programs to educate them about corporate culture and how to maintain loyalty towards customers. Relevant changes and trends in the macroenvironment  (PESTEL Analysis) Organizations undergo significant changes and trends in the macroenvironment that assist in wining the competitive advantage. The following changes have taken place in Shangrila Hotel macroenvironment. Political The hotel has changed from the older strategies and adapted the newly acceptable methods in line with Singapore constitution. In addition, Shangrila Hotel has many tributary hotels aroung the globe and the management ensures every hotel operates accoring to the country’s political requirements. Economical Shangrila Hotel has changed its economic climate has changed into a more economic methods of operations. The company has a group of economic experts who provide the necessary information on the expected risks in the economic world. The hotle managment has resulted into a new

Sunday, November 17, 2019

Hightlight the similarities and differences in conducting selection, Essay

Hightlight the similarities and differences in conducting selection, performance appraisal, and disciplinary interviews - Essay Example opment, organization development, performance appraisal, employee rewards, employee selection and recruitment, man power handling and communication across the organization. Human resources also handle issues such as employee grievances, employee motivation, career counseling etc. Here, we are concerned with special areas of human resources i.e. employee selection, performance evaluation of employees and also any disciplinary problems that the employees might be involved in.1 Selection is a process of screening applicants after the applicants have been called in for a job; the selection process is based on the job description and the nature of the job. The hiring manager first need to define a detailed description of the job and then HR profiling should be done in the process to see whether the candidate fits the job. Then further, selection tools such as interviewing, role playing techniques etc are used to judge the individual’s suitability with the job. The process is required to judge the applicants on the claims that they write in their resumes. The screening process begins with preparing and publication of the advertisement for the applicants, or the due diligence for any references that might be available for potential candidate. The important point is to make authorized and reliable approaches. Then as applications are received they are screened and applicants are short listed for the step by step screening process.2 Today, as business strategies are being linked to the overall organization human resources also become a part of the strategic management process where employees at all level of organization participate in to formulate strategy and thus it becomes easy to implement without any fear of resistance from the employees. Thus today for organizations manual dexterity is far less important and knowledge, decision making skills, analytical abilities are the important criterion to select the employees. Especially since the selection of the wrong

Friday, November 15, 2019

The Prevention Of Computer Viruses Computer Science Essay

The Prevention Of Computer Viruses Computer Science Essay What is a computer virus? A computer virus is a computer program that can copy itself[1] and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. How are viruses transmitted can be transmitted person to individual by bodily fluids like HIV. Viruses approaching the common cold can be transported through the upper air we breathe. Viruses can also be transferred from your pets to you. Fortunately our body has an immunodefense workings that is intricately designed to row these pathogens. How do you prevent viruses? List the softwareà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s name. The internet is an amazing place that allows each and every one of us easy access to a wide variety of resources. Unfortunately, there is an increasing amount of viruses, worms, spyware and spam that can easily infect your computer. Your computer in fact may already be infected and you may not even know it. If your computer is unusually slow or crashes periodically, it may be infected. In fact, if you do not address the problem with this computer it may in fact infect other computers on your network. The result of a virus or worm attack can include an inability to access the internet, missing icons on your desktop, missing files and many other potential problems. There are ways, however, that you can fight back. Of course before making any changes to your computer, it is always a good idea to make a backup. FIGHT BACK 1. Run Microsoft Windows Update often. With new viruses and worms constantly being created, it is important to keep the Microsoft Windows operating system up to date. Go to http://windowsupdate.microsoft.com and follow the instructions on screen. By installing the critical updates found on the Windows Update website, you are greatly reducing the chances of your computer from becoming infected. 2. Update the virus pattern of your Anti-Virus software frequently. Almost all Anti-Virus software programs update automatically, but you will want to check to make sure that this process is taking place. If a new virus is introduced and your pattern file is out of date, you will not be adequately protected against this new threat. I highly recommend the use of Trend Micro PC-Cillin. Unlike other antivirus software programs, it does not tap your system resources by taking up a lot of memory. It also works in a very transparent fashion with continuous pattern updates. 3. Remove Spyware and Adware. When you visit websites or install new software, you may be inadvertently installing Spyware and Adware onto your computer. Spyware and Adware allows third parties to: (a) monitor the use of your computer over the internet and (b) market specific products to you on the internet based upon the use of your computer. Go to http://www.download.com in order to download and install: (1) Ad-aware and (2) Spybot Search Destroy. Properly updated, both of these programs will remove all known Spyware and Adware. 4. Prevent Spam. A large number of worms and viruses are distributed through spam email. The first step in preventing spam is to not post your email address on a website. If you need to provide a means for contacting you via email, you will want to create a submission form that does not display your MAILTO in the code/page source of your webpage. You may need to contact a web designer in order to properly implement this process into your website. Another method is to use the Master Spambot Buster which works just like a MAILTO link but without displaying your email address in the code for bots to pick up. In addition, you should always use Private Registration when registering a domain name for a website. If you go to http://www.netsol.com and do a WHOIS on your website, you do not want to see your email address publicly displayed in your domain record. Automated programs called robots regularly crawl websites such as this looking to pick up email addresses for use by companies that spam. If robots on the internet have already picked up your email address, you will of course want to use some form of spam prevention. Many web based mail programs already allow you the ability to prevent spam. However, many mail clients on business networks do not have this functionality. There are a variety of products in the marketplace to address this problem, but one of the most popular is http://www.spamarrest.com. By using Spamarrest.com, you manage who you allow or do not allow to receive email from. When someone sends you an email for the first time, they must verify that they sent you an email. If they do not, the email is placed in your unverified folder on Spamarrest.coms web servers. All blocked mail is then placed in Spamarrest.coms spam folder. Meanwhile all approved mail is sent as it normally would directly to your computers Inbox. CONSULT A PROFESSIONAL Although the software described here is easily used, different hardware and software configurations can lead to unexpected results that may damage your computer. If you are experiencing difficulties with viruses, worms, spyware or spam, you may want to consult a professional. How do you know that your computer is infected by a virus? If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected: The computer runs slower than usual. The computer stops responding, or it locks up frequently. The computer crashes, and then it restarts every few minutes. The computer restarts on its own. Additionally, the computer does not run as usual. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. You cannot print items correctly. You see unusual error messages. You see distorted menus and dialog boxes. There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension. An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted. An antivirus program cannot be installed on the computer, or the antivirus program will not run. New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs. Strange sounds or music plays from the speakers unexpectedly. A program disappears from the computer even though you did not intentionally remove the program Why virus-scanning software needs to be updated regularly ? computer virus is a computer program that can copy itself[1] and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.[2] Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[3][4] As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. The Academic Integrity and Plagiarism Policy: You should be ready to prove the authenticity of your work. If any form of plagiarism/reproduction of answers/work discovered, you will be awarded zero mark. Late submission of the assignment: If any late submission of your work, mark will be reduced. Your are expected to cover the following outcomes Outcome 4. You are expected to practice the skills that are related to the following graduate attribute: Recognize the importance of lifelong learning and are committed to self development Declaration by student (Hand written) TO MY LECTURER Mr. Sheik Mohammed I CERTIFY THAT ALL OF THIS WORK IS: (a) DONE BY MYSELF (b) PRINTED BY MYSELF Students signatureMahmood Khalfan Ali.. Submit ion Date: ..22j1047

Tuesday, November 12, 2019

Discuss the causes of the Civil War Essay

The Civil War, also known as the â€Å"War between the States†, was fight from 1861 to 1865 between the Union (or the North) and the Confederacy (the South). There were many causes such as economic disparity between north and south, slavery, and the election of Abraham Lincoln. The North had an industrial based economy whereas the South was a predominantly agricultural economy. One of the major reasons of the outburst of the Civil War was two different labor systems – free labor in the north and slavery in the south. In the Northern America, as the machines took place of laborers in the rise of big factories, they needed free labor instead of slavery, so the slaves became no longer important. On the other hand, the South was based on agricultural and relied upon the labor of the slaves. This economic disparity has given rise to a debate over slavery. The North wanted to end up the spread of slavery, since it was a major obstacle in the development of Northern economy, but at the same time, it would cause big loss of benefit in the South. The conflict was intensified by the election of Lincoln of 1840, because the Southerners thought Lincoln was anti-slavery and would be in favor of Northern interests. After the election of Lincoln, South Carolina, Mississippi, Florida and some other southern states seceded from the Union and formed the Confederacy. On April 12, 1861, the Confederates oped fire at Ft. Sumter, which was the first battle of the Civil War. Conflict between the North and the South could not have been avoided. The industrial capitalistic economy in the North and plantation economy in the South had increasingly conflicts in raw materials, markets, tariffs, labor force and other aspects. The core problem was the slavery. In economy, it has hindered the development of capitalistic economy in the United States. In politics, it has become a risk factor that caused Federal division. After  the Industrial Revolution in Britain, the cotton textile industry developed rapidly, so did the Northern America. The demand for cotton was highly increased. In this case, mass production of cotton was profitable, which meant large amount of cheap labor – slaves – was needed. What’s more, whether slavery was legal in the newly gained territories from westward expansion, has been the most acute problems, because the creation of a slave or free state was directly related to which side could control the Senate. Thus, with the development of two types of economy, the conflict between the North and the South was unavoidable. In conclusion, although the Civil War was one of the most tragic wars in American history and unavoidable, the nation was reunited and strengthened as a whole country, not just a collection of states.

Sunday, November 10, 2019

The Free Soil Party

Buchanan30. In 1848, the Free Soil party platform advocated all of the following except [A] free government homesteads for settlers. [B] internal improvements. [C] an end to slavery in the District of Columbia. [D] support of the Wilmot Proviso. [E] opposition to slavery in the territories. 31. According to the principle of â€Å"popular sovereignty,† the question of slavery in the territories would be determined by [A] the most popular national leaders. [B] a Supreme Court decision. [C] congressional legislation. [D] the vote of the people in any given territory. [E] a national referendum. 2. The key issue for the major parties in the 1848 presidential election was [A] expansion. [B] personalities. [C] Indian removal. [D] slavery.[E] the economy. 33. The Free Soilers condemned slavery because [A] of moral principles. [B] it damaged the national economy. [C] of the harm it did to blacks. [D] it destroyed the chances of free white workers to rise to self-employment. [E] it was the only way they had of combating the appeal of the Democratic party. 34. Harriet Tubman gained fame [A] as an African-American antislavery novelist. [B] in the gold fields of California. C] by urging white women to oppose slavery. [D] as an advocate of the Fugitive Slave Law. [E] by helping slaves to escape to Canada. 35. Daniel Webster’s famed Seventh of March speech in 1850 resulted in [A] a shift toward compromise in the North. [B] Senate rejection of a fugitive-slave law. [C] a movement to draft him for the presidency. [D] condemnation by northern commercial interests. [E] charges of accepting bribes. 36. In the debates of 1850, Senator William H. Seward, as a representative of the northern Young Guard, argued that [A] John C.Calhoun’s compromise plan must be adopted to preserve the Union. [B] Christian legislators must obey God’s moral law. [C] the Constitution must be obeyed. [D] compromise must be achieved to preserve the Union. [E] African-Americans sh ould be granted their own territory. 37. In the Compromise of 1850, Congress determined that slavery in the New Mexico and Utah territories was [A] to be decided by popular sovereignty. [B] to be banned. [C] protected by federal law.[D] to be ignored until either territory applied for admission to statehood. E] to be decided by the Mormon Church. 38. The Fugitive Slave Law included all of the following provisions except [A] denial of fleeing slaves’ right to testify on their own behalf. [B] denial of a jury trial to runaway slaves. [C] a higher payment if officials determined blacks to be runaways. [D] the requirement that fugitive slaves be returned from Canada. [E] the penalty of imprisonment for northerners who helped slaves to escape. 39. The election of 1852 was significant because it [A] saw the rise of purely national parties. [B] saw the victory of a pro-South northerner. C] marked the return of issues-oriented campaigning. [D] saw the emergence of an antislavery thir d party. [E] marked the end of the Whig party. 40. The prime objective of Manifest Destiny in the 1850s was [A] Nicaragua. [B] Panama. [C] Hawaii. [D] Cuba. [E] the Dominican Republic. 41. The prime objective of Manifest Destiny in the 1850s was [A] Nicaragua. [B] Panama. [C] Hawaii.[D] Cuba. [E] the Dominican Republic. 42. Stephen A. Douglas’s plans for deciding the slavery question in the Kansas-Nebraska scheme required repeal of the [A] Northwest Ordinance. [B] Missouri Compromise. C] Compromise of 1850. [D] Fugitive Slave Act. [E] Wilmot Proviso. 43. One of Stephen Douglas’s mistakes in proposing the Kansas-Nebraska Act was [A] allowing slavery to spread into new territory. [B] underestimating the depth of northern opposition to the spread of slavery. [C] believing that slavery could not survive in Kansas. [D] overestimating the protest to the bill. [E] not securing the transcontinental railroad for the North. 44. The clash between Preston S. Brooks and Charles Sum ner revealed [A] the division between the House and the Senate over slavery. B] the fact that, despite divisions over slavery, the House of Representatives would unite to expel a member for bad conduct. [C] the seriousness of political divisions in the North. [D] the fact that passions over slavery were becoming dangerously inflamed in both North and South. [E] the importance of honor to northerners. 45. Match each candidate in the 1856 election below with the correct party. ___ A. John C. Fremont ___ B. Millard Fillmore ___ C. Martin Van Buren ___ D. James Buchanan 1. Democratic 2. Republican 3. Know-Nothing [A] A-2, B-3, D-1 [B] A-3, C-1, D-2 C] A-1, B-3, C-2 [D] B-1, C-2, D-3 [E] A-2, B-3, C-1 46. In ruling on the Dred Scott case, the United States Supreme Court [A] held that slaveowners could not take slaves into free territories.[B] expected to lay to rest the issue of slavery in the territories. [C] hoped to stimulate further debate on the slavery issue. [D] supported the conc ept of popular sovereignty. [E] reunited the Democratic party. 47. The political career of Abraham Lincoln could best be described as [A] marred by early political opportunism. [B] hurt by the Kansas-Nebraska Act. [C] hurt by his marriage. D] characterized by a rapid rise to power. [E] slow to get off the ground. 48. As a result of the Lincoln-Douglas debates, [A] Lincoln’s national stature was diminished. [B] Lincoln was elected to the Senate. [C] Douglas defeated Lincoln for the Senate. [D] Illinois rejected the concept of popular sovereignty.[E] Douglas increased his chances of winning the presidency. 49. Match each presidential candidate in the 1860 election below with his party’s position on the slavery question. ___ A. Abraham Lincoln ___ B. Stephen Douglas ___ C. John Breckenridge ___ D. John Bell 1. xtend slavery into the territories 2. ban slavery from the territories 3. preserve the Union by compromise 4. enforce popular sovereignty [A] A-3, B-2, C-1, D-4 [B] A-3, B-4, C-1, D-2 [C] A-2, B-1, C-4, D-3 [D] A-4, B-3, C-2, D-1 [E] A-2, B-4, C-1, D-3 50. When Abraham Lincoln won the 1860 presidential election, people in South Carolina [A] waited to see how other southern states would act. [B] vowed to give their loyalty to Stephen Douglas. [C] were very upset because they would have to secede from the Union. [D] rejoiced because it gave them an excuse to secede. [E] none of these.

Friday, November 8, 2019

Critical study of software copyright and piracy in China The WritePass Journal

Critical study of software copyright and piracy in China Chapter I Critical study of software copyright and piracy in China ABSTRACTChapter IIntroductionCHAPTER IILiterature review2.1 China`s background in copyright law2.2   Globalization and software piracy2.3   Culture and software piracy2.4 The Chinese government, Communist ideology in software piracyCHAPTER IIIMethodologyCHAPTER IVFinding and Discussion4.1 Finding 4.1.1 Software products: cost, usability and accessibility Thirdly, they cited that the copyright software`s are not valuable comparing to their price, for instance, by installing WINDOWS XP, it requires anti-virus as well to protect is and this will cost an extra money and pirated software`s functions are same as original one`s. Thus, it is not valuable. It can assume that there is another side to disagree with their thought in terms of cost, if comparing the price of software product with other spending. Since they can tolerate with others spending, there is no reason to reject software prices.4.2 Discussion CHAPTER VI5 CONCLUSIONReferences:Related ABSTRACT This study aim to demonstrate Chinese students’ attitude towards software copyright and piracy in China. This paper has selected a small group of Chinese student to evaluate their presumption and data were collected by using interview among this group. There are some factors which has a significant impact on piracy. Therefore, for finding out the validity and add extra elements in finding and discussion chapter will present new items which has a role in software piracy. Thus, this research has some limitation such as the number of sample and the matter of time. Hence, the result of this research cannot be valid. Chapter I Introduction In the past few years, there has been a doubt among the Chinese software users regarding the use of pirated software from the legal point of view. In addition to software users, anyone who is involved in the software copyright and piracy issues, is confronted with this question that if the pirate act is illegal or not (Croix Konan, 2002). Answering this question requires to consider the perception of each individual Chinese software users regarding the software copyright and piracy. Whereby, awareness of Chinese users in decision-making has a direct impact on their piracy behaviour in terms of using pirated software (Liang Yan, 2005). To explore how Chinese software users recognize the matter of software copyright and piracy it is crucial to understand the function of copyright and piracy protection law, In fact, copyright and piracy protection law are the subset of the intellectual property law (IP) which has been considerably enhanced in the recent years.   According to a definition provided by World Intellectual Property (WIPO, 2006) â€Å"intellectual property can be anything which creates by human mind such as, inventions, literary and artistic works†. On the other side, software piracy is opposite of the copyright law in which has increased along with the extension in popularity of internet in 1999 (Katz, 2005). Currently, China is under the World Trade Organisation (WTO) agreement, which compels China to have transparency on intellectual property protection in terms of laws, regulations, administrative rules and judicial decisions (Panitchpakdi Clifford, 2002). Hence, this study places emphasis on Chinese student various perceptions regarding the software copyright and piracy. The next chapter will review the existing literature review and evaluate different point of views. Furthermore, it will emphasize on methodology chapter to illustrate the method of collecting data. Moreover, in finding and discussion chapter will demonstrate and analyse the information towards answering research question and finally will present conclusion. CHAPTER II Literature review 2.1 China`s background in copyright law From the historical point of view, for the first time, copy right law came into existence in ancient China and the creation of copyright in China was initiated by the innovation of printing by Bi Sheng in AD 1042. Moreover, compared to European countries the technique of printing had developed centuries earlier in China (Mertha, 2005). According to Martha (2005), in 1910, the first draft of author`s right was published and a number of punishments for unapproved use were established. WIPO (2006) state thatAfter the Cultural Revolution,in 1979 China entered into a new stage of modern legal system which contained the copyright structure and was an important step to connect to the outside world. Subsequently, as WIPO (2006) assert that â€Å"China has joined the world intellectual property organization in 1980†. Bently Sherman (2001) explained that copyright was originally intended primarily for the protection of authors, artists and composers to provide a legal foundation for the innumerable transactions by which they are paid for their work. Croix Konan (2002) explained that the first aim of copyright law is to provide the security for author`s right from abusing in illegal way.   World intellectual property organization (WIPO, 2006) defines â€Å"copyright† as legal point of view in order to maintaining creator’s right and securing his/her â€Å"work†. In addition, the term â€Å"work† is used by intellectual property law in various aspects such as; novels, poems, plays, databases and computer programs. Generally, copyright laws are executed diversely in different countries around the world (Marron Steel, 2000). For instance, The European Countries and North America have tough copyright laws and enforce them determinedly. Meanwhile, there are some countries which have determined copyright laws but their courts are unwilling to enforce them. Furthermore, there are developing countries in which their principles are based on Islamic patterns and do not have adequate laws in terms of copy right ( Marron Steel, 2000). From worldwide viewpoint, entering China to the global network has generated a massive capability in order to share and observe information through new approaches, especially byInternet (Croix Konan, 2002). However, in recent years, the international business society has mentioned that there has been a doubt regarding China`s malfunction towards limiting international property infringement (Mertha, 2005). 2.2   Globalization and software piracy Bently and Sherman (2001) assert that, the original concept of copyright is surrounded by boundaries’ inside of the state, Thus, the security of copyright protection will be in danger if it operates beyond the country and goes through the national world. Therefore, the fence would be break down by the development of globalization and establish copyright as boundless subject in international trade. Consequently, developed countries realize that it is crucial to make some alteration in enforcement of copyright protection across the national borders. Therefore, due to unexpected economic growth in China, it has become the main target of whole global copyright enforcement, such as US and the European Union (Halbert, 1997). IIPA (2006) declared that the progression of globalization transforms software copyright and piracy from internal issue to universal matter among countries. Furthermore, due to the fact that China has been faced with a huge amount of piracy, it has been constantly criticized by other countries regarding the lack of enforcement and ability to protect software copyright. 2.3   Culture and software piracy Mum (2003) argued that cultural differences is one of the most significant aspects that should be considered in China`s software copyright and piracy and has a main role on development copyright in China. From western perspective, individual’s freedom and benefits often put emphasis on public shared benefits. In contrast, as a traditional Chinese point of view, individuals are part of society and are obliged to present their creation and innovation to the community (Mum, 2003).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Considering the two mentioned viewpoints, it can state that the eastern minds are totally different from western minds, regarding that in western society intellectual theft is not appreciated, meanwhile, it is a new concept to many Chinese. In addition, Yu (2001) pointed out that in traditional Chinese culture copying regarded as honourable and necessary fact. Husted (2000) stated that the rate of piracy in China has a great connection with cultural dichotomy of individualism and collectivism.   In addition, Marron and Steel`s (2000) found out that countries in which their principles is based on individualistic culture have a lower piracy rates comparing to the countries which have collectivistic culture. According to Wang, Zhang, and Ouyang (2005a) the correlation between pirated software purchasing and cultural subject in China is more expected to be engaged in the theft of software programs or sharing intellectual property. In fact, collectivist culture can be one of the great factors that might be the cause of the prevalence of software piracy in China. 2.4 The Chinese government, Communist ideology in software piracy Croix Konan (2002) argued that China`s government has been considerably attempting to change the legislation and policy making process in terms of prevent pirating.   For instance, China government closed 9 factories from 18 which were producing pirated software’s and presenting illegal Cd`s in domestic market. However, despite the considerable reforms by China government regarding the implement of copyright enforcement, there are some domestic factors which make the matter worse (Mertha, 2005). Lu and Weber (2008) explored that China government should consider about the economical and political environments of public and private dimensions of software copyright to cover external and internal challenges. In addition, Communism philosophy in which its main principal is based on everything belongs to society and people, rather than private owners has been existed in China since 1949. Consequently, Communist thought of copyright are fundamentally well-matched with traditional Chinese culture, because they support each other to shape Chinese people`s attitude in the direction of decreasing copyright protection. Overall, the literature review includes variety of research areas and identifies a group of structural factors relating to software copyright and piracy in China. Meanwhile, the literature review has some limitation, for example, it uncovers the behaviour element which is crucial in act of piracy, but it will be covered in finding and discussion chapter by interviewing from Chinese student. CHAPTER III Methodology Generally speaking, the nature of human beings has been always concerned about what is happening surround them. In order to understand their surroundings they began to search regarding their requirements which at least named research. According to Cohen et al (2007) research is a process of planning, executing and investing in terms to find answer to our specific questions. In addition, getting reliable answers needs an investigation in a systematic manner and will be easier for reader to understand. Achieving these ends requires research methods. In this study, the research philosophy is examined by interpretivism. Bryman Bell (2003) defined it as an epistemological position that enquires the social scientist to grasp the subjective meaning of social action. Furthermore, the inductive approach has undertaken to this study in terms of understand the nature of problem, by which, it enables researcher to take more information about the research. (Bryman Bell, 2003). Evaluating about philosophy and approach, now it should consider that the research method is done by mono method meaning that is qualitative and by the nature of it, has a great advantages for this research. It was chosen because the research approach was based on inductive methods and it requires an exploration of detailed in depth about data. Denzin Lincoln (2000) believed that using this method able researcher to explain, translate and otherwise come to the terms with the meaning. This study will carry out both primary and secondary research. The primary research will be examined by doing an interview based on semi-structured type from a group of Chinese student which will be within an age group of 22-28. The semi-structured interview was designed by some relevant questions in order to answer the research question, further information will be on (appendix 1). An interview has chosen as a method for primary research for the reason that it is one of the methods by which the human world may be explored, although it is the world of beliefs and meanings, not of actions that is clarified by interview research. Bryman Bell (2003) pointed out that interviewing provide a wide range of data collection. Thus, it helps researcher to find out how people regard situations from their point of view. In this research, because the emphasize is basically based on the area of   intellectual property law and as far as everyone are concerned, this field is extremely complicated and cannot be expressed in closed questions. Hence, semi-structured interviews have chosen because it has a great benefit for conducting this research. Moreover, it is based on an open-ended question. In addition, Bryman Bell (2003) argued that this approach can be used to gain different comments and offers the interviewer the chance to investigate an issue or service. In addition, it gives the interviewee an opportunity to share general views or their opinions in details. Apart from the benefits of this method, it has some disadvantages such as: it requires interviewing skill and need to have the skill to analyse the data. Furthermore, it should be done on sufficient group of people in order to make general comparison. Moreover, it is really time consuming and researcher should be able to ensure confidentia lly ( Saunders et al, 2003). It is crucial to mentioned that ethical concerns will emerge as the research planning starts. As Blumberg et al cited in Saunders et al (2007) argued that â€Å"ethics refers to the moral principles, norms or standards of behaviour that guide moral choices about our relationship with other†. Furthermore, in order to ensure confidentiality, this research will only consider about the age of the Chinese students and will not emphasise on their name or their institute (see appendix 2). To answer the research question, Chinese student attitude is examined in order to explore how they perceive the issue of software copyright and piracy and with the aim of give the sense of security to interviewee at the first of interview it will mention that the process will be recorded to ensure the crucial information is not omitted from the note taking. Overall, in this study by using qualitative approach with semi-structured interview will prepare a suitable occasion in terms of collecting a great deal of information from Chinese student regarding their point of view about software copyright and piracy in their country. Furthermore, it is expected that 10 interviews will be conducted and the sample will just measured by their age and the interview will be carried out in person by the researcher on site at the University Of Sheffield. Moreover, information from interviews will be classified into coding and categories, which can be derived from research question and the literature. CHAPTER IV Finding and Discussion 4.1 Finding This chapter aims to answer the research question which was about Chinese student attitude towards software copyright and piracy. To answer this question, this research is carried out by choosing a smaller society of Chinese users, namely Chinese students, in which their perception in terms of software copyrights and piracy in China will be examined. As it mentioned in methodology, in order to analyze the data, this research will categorize and coding the data which has conducted from Chinese student attitude, then it will examine the findings and discussion and finally will demonstrate the conclusion. The findings will categorized and coded by what interviewees mentioned regarding software copyright and piracy, for example, some of people express that the price of the copyright software`s are too expensive. Meanwhile, others pointed out that the general income of people in China cannot afford copyright products and on quarter of participants said that copyright products actual value does not deserve that high price. Therefore, this category named as cost with three subcategorized; price, income, value and coded as a software products. Secondly, half of the interviewee mentioned that pirated software`s are accessible and it can used them without any limitation, whereby, original software`s has the restriction of usage. Moreover, this opinion categorized by usability and accessibility of software products. Thirdly, from findings it can find out 9 of 10 participants disagreed with the culture as an element which has an impact on a software copyright and piracy. By contrast, in literature review in culture and software piracy some author`s were explained that culture has a considerable relation with software copyright and piracy. Furthermore, some interviewees expressed that some issues, for example, education or gaining knowledge should not consider as piracy, additionally,   using software`s for a personal need without any intention of using   in illegal way is not piracy. Finally, the item that generally accepted by applicant was China`s government, which they state that the main power who can enforce the copyright law and prevent piracy is government. Thus the first section was categorized by social development and cultural affect and the later section was grouped as Chinese government, which these two parts coded as a china development. To clarify the structure the complete codi ng frame is established in (Appendix 3). 4.1.1 Software products: cost, usability and accessibility Cost, usability and accessibility play critical roles in decision-making whether to use pirated software or not among Chinese student attitudes. Among all of discussions cost is consistently mentioned as a reason to choose pirated software. Therefore, three subject matter illustrates from which will evaluate by participants viewpoints. Generally speaking, first of all, was the cost to buy copyright software. As they state that buying original WINDOWS XP in China is really expensive. Secondly, because of high prices for software products most of the people especially students and low-income earners are not able to afford the price. Thirdly, they cited that the copyright software`s are not valuable comparing to their price, for instance, by installing WINDOWS XP, it requires anti-virus as well to protect is and this will cost an extra money and pirated software`s functions are same as original one`s. Thus, it is not valuable. It can assume that there is another side to disagree with their thought in terms of cost, if comparing the price of software product with other spending. Since they can tolerate with others spending, there is no reason to reject software prices. 4.1.2 China development:   Social development and Chinese government As it mentioned in literature review chapter there were two factors which also found by evaluating  Ã‚   Chinese student presumption toward software   copyright and piracy which is constantly, government policy and culture. Furthermore, participant conflicting views about those items and stating short words or sentences; it cannot provide valuable information about significant issues such as government policy and cultural affect. Therefore, in order to generalize their viewpoint it can state that, after Cultural Revolution in China and joining to the World intellectual property organization there has been a significant changes in terms of education, technology and the level of science through out of China (WIPO, 2006). Generally speaking, interviewees pointed out that the China government has the main power in order to prevent software piracy and change the policy towards enforcement of copyright law. Moreover, it can maintain that in spite of the power to enforce, why Chinese government does not really want to stop piracy. Furthermore, participants discussed that because of the matter of population and as China is among developing countries, government and authorities really feels the lack of knowledge and because they want to increase their literacy and awareness, they are not as strict as developed countries. 4.2 Discussion With the establishment of coding frame, this study will applies axial coding to make a connection between categories and sub categories. First, the participant’s perception develops from the issue which coded as software products with three subcategories.   In the category of software product user`s resistance focused on copyright software`s high cost and poor usability and accessibility. In contrast, user`s are likely to use pirated software which low cost and good usability and accessibility. On the other hand, the interviewee which protects software copyright law, refuse to accept cost and excuses for piracy use. Second, in the category of China development which was generally analysed, it can mention that   government policy in China is trying to educated and boosts the knowledge within the people, but this cannot be the reason to use piracy software’s or make author`s work invaluable. In other world, participants believe that Chinese government does not really want to limit piracy. Form their discussion it can find out government has a great interest in piracy regarding market economy. This study has found that in general Chinese student attitude towards software copyright and piracy mainly suffers from the phenomena which so-called Cost and the accessibility of pirated software’s. Furthermore, this paper has some limitation which will decrease the validity of this research, such as; the number of sample was not that much great to evaluate and examine the other perceptions, another item was the limitation of time, which was considerable for this research. Furthermore, it is suggested that copyright owners should lower down their retail prices of their products to the lower degree, by which, Chinese user`s be able to afford it. CHAPTER VI 5 CONCLUSION This study set out to examine how Chinese student are aware of software copyright and piracy in China. A small sample of Chinese student was selected to illustrate extra elements a part form literature review, which has significant role on using pirated software’s. Furthermore, the data were analyzed by Bryman Bell (2003). Overall in can conclude that, the fact that China started to play a more and more important role in today’s world and its development cannot be easily stopped or reversed. Therefore, like developed countries, China should redesign and change the software copyright law in order to minimize the amount of piracy in world. References: Bently, L, Sherman, B. (2001). Intellectual property law. New York: Oxford University Press. Blaxter,L, Hughes, C, Tight, M. (2001). How to research. (2 edn). Buckingham: Open University Press. Bryman,A, Bell, E. (2003). Business Research Methods. New York: Oxford UniversityPress. Business Software Alliance. (2004). BSA and IDC global software piracy study. Retrieved January 28, 2005, from bsa.org/China/globalstudy Cohen, L, Manion, L, Morrison, K. (2007). Research Methodes In Education. ( 6 edn). London: Routledge. Croix, S. J., Konan, D. E. (2002). Intellectual property rights in China: The changing political economy of Chinese-American interests. The World Economy, 25, 759-788. Denzin, N. K., Lincoln, Y. S. (Eds.). (2000). Handbook of qualitative research (2nd ed.). Thousand Oaks, CA: Sage. Gubrium, J. F., Holstein, J. A. (1997). The new language of qualitative method. New York: Oxford University Press. Halbert, D. (1997). Intellectual property piracy: The narrative construction of deviance. International Journal for Semiotics of Law, X (28), 55-78. International Intellectual Property Alliance. (2006). The 2006 special 301 report: People’s Republic of China. Retrieved August 28, 2006, from IIPA Web site: iipa.com/rbc/2006/2006SPEC301PRC.pdf Katz, A. (2005). A network effects perspective: On software piracy. University of Toronto Law Journal, 55, 155-160. Lindlof, T. R., Taylor, B. C. (2002). Qualitative communication research methods (2nd ed.). London: Sage. Lu, J., Weber, I. (2008). Chinese government and software copyright: Manipulating the boundaries between public and private. International Journal of Communication, 1, 81-99. Marron, D. B., Steel, D. G. (2000). Which countries protect intellectual property? The case of software piracy. Economic Inquiry, 38 (2), 159-74. Mertha, A. (2005). The politics of piracy: Intellectual property in contemporary China. Ithaca, NY: Cornell University Press.   Mum, S. H. (2003). A new approach to U. S. copyright policy against piracy in China. Symposium conducted at the 53rd Annual Convention of the International Communication Association, San Diego, California, United States. Nicol, C. (Ed.). (2003). ICT policy: A beginners handbook. Johannesburg, South Africa: Association for Progressive Communication. Panitchpakdi, S., Clifford, M. L. (2002). China and the WTO: Changing China, changing world trade. Singapore: John Wiley Sons (Asia). Saunders, s. Lewis, P. And Thornhill, A. (2003). Research Methods for Business Students. Third edition. Pearson education limited. Wang, F., Zhang, H. Ouyang, M. (2005a). Software piracy and ethical decision making behaviour of Chinese consumers. Journal of Comparative International Management, 8(2), 43-56.   Wang, F., Zhang, H., Zang, H. Ouyang, M. (2005b). Purchasing pirated software: An initial examination of Chinese consumers. Journal of Consumer Marketing, 22(6),340-51 World Intellectual Property Organization. (n.d.). Copyright and related rights. Retrieved October 14, 2006, from World Intellectual Property Organization Web site: wipo.int/about-ip/en/copyright.html Yu, P.K. (2001). Piracy, prejudice, and perspectives: An attempt to use Shakespeare to reconfigure the U. S.-China intellectual property debate. Working Paper Series, 38, Jacob Burns Institute for Advanced Legal Studies. Retrieved,October13,2006fromhttp://papers.ssrn.com/paper.taf?abstract_id=262530

Wednesday, November 6, 2019

Nations and Nationalism essays

Nations and Nationalism essays I. The most salient common theme, running through all three sections, is the divergence between the way colonial powers view nationalism, and the way the conquered nations view it, if they view it at all. A. For the first part of a colonial period, the indigenous population is often unaware it is being considered a nation; it is still operating under a more organic system in which things are not enumerated and particularizes; in which places are not located according to scientific principles, and; in which the artifacts' used by a conquering nation to display the national' character of the colony are reduced to logos. B. Later in the colonial period, the indigenous people may separate into two groups, the nationalists,' or those who militate against the colonizer and the colonizer's ways, and nationalists who have subscribed to the colonizer's ways and take pride in a new national identity, supplied by II. The second most common theme revolves around the way a colonizer creates' national identity by defining it, particularizing it, and then A. First, a colonizer attempts to define the characteristics of a nation' on the basis of ethnicity, but that ethnicity might be based on parameters of the colonizer's own, and not on any identity the colonized people would recognize. The colonizer might also mistake religious attributes for others, also leading to the result that the natives would B. Second, the colonizer creates maps. On these, he can locate the ethnic groups already identified. To the colonizer, this makes the area into a cohesive nation; very possibly the opposite could be said of the C. Third, the colonizer makes representations for show of artifacts that were, before colonization, very real and active parts of life to the ...

Sunday, November 3, 2019

Personal Statement Example | Topics and Well Written Essays - 1000 words - 1

Personal Statement Example One of the opportunities is the use of technology to make business processes run smoothly and in real time. Such information and inspiration can only be gotten from supportive lecturers and professors. On matters of relevant experience, I was a treasurer of the Hong Kong Student Association (HKSA). The position of the treasurer entailed getting all the financial and accounting information into book. Apart from keeping financial and accounting information up to date, I also represented the same information to the entire student association. The position has helped me to practice some of the financial principles taught in the class. It has given relevant experience in matters related to business. Apart from giving an exposure to business matters, the position has assisted me to become responsible. Responsibility is a key virtue in any business. Koestenbaum (7) states that for one to run a business today, exceptional levels of personal accountability and responsibility are required. The position as a treasurer of HKSA has made to become a â€Å"responsible business professional.† Being an official member (treasurer) of HKSA has molded my personality. Before joining HKSA, I had issues with my personality. First, I could not approach let alone speak to a crowd of people. I was very shy and talking to anyone made my palms wet. The courage to talk or even express myself was a major problem. Second and lastly, I did not know how to communicate with other people. This coupled by the fact that I could not express myself. However, all these negative personalities were turned into positive personalities through experience and the exposure I got in the association. I got enormous support from my fellow students and the association’s patron. After joining HKSA and through the experience and support I got. I am able to organize activities regardless of whether they are of business nature or not. I can approach anyone without hesitation. My communication skills h ave also improved. I have become more active in matters related to business and those not related to business. I have gained vast knowledge in business matters when I was at HKSA. Thus, my experiences at HKSA have made me a rounded person. Apart from the association, I have also participated in other extra-curricular activities. I believe they have prepared me well to venture into the business world. In other words, they have made me a reliable and responsible person. Transfer Applicant Prompt Brian Schweitzer once stated, â€Å"I challenge you to be dreamers; I challenge you to be doers and let us make the greatest place in the world even better.† My dream has been to excel in the field of business especially in accounting and economics. In the past few years, I have developed a big interest in finance management. The corporate world is growing at a dynamic rate and more opportunities have been created. I have found the right environment when I can thrive in an attempt to fu lfill my dreams. I have had vast knowledge and experience in matters of finance. I am interested in increasing my knowledge in the field of accounting and economics. Thus, I request to be considered as one of the prospective students in MSc in Economics, Accounting, and Finance. My dreams of excelling in business have been greatly influenced by Donald Trump, who I consider as a role model. Donald Trump is a famous American

Friday, November 1, 2019

Professional investment tear sheet for four companies (in my Essay

Professional investment tear sheet for four companies (in my dissertation) - Essay Example Being one of the biggest petrochemical companies in the world, the companty has done extremley well to be the most profitable company in the Middle East. It is also one of the leading suppliers of thermoplastics in the world. The Saudi Basic Industries Corporation is a pulic company headquartered in Riyadh. 70% of the company is owned by the government and 30% is owned by the public. The company has its operations spread over 40 countries and its main business segments are chemicals, plastics, fertilizers, metals and innovative plastic. The recommendation would be to buy the share of Dow Chemical. Even though the current price is $26.96, the targetted price is $42.35 and this is approxiamtely 60% more than the current price. Therefore it would be beneficial to buy the shares now. American based Dow Chemical is the biggest chemical corporation in the world. Dow Chemicals has a diverse range of products and services that include chemicals, plastic materials and agricultural products. With over 50,000 employees the company is operational in over 160 countries. The recommendation for DuPont shares would be to hold the shares. There is a slight difference (increase of 7%) from the current price to the targetted price. Therefore, it would make financial sense if the shares are held and not sold right now. America based, DuPont is a chemical company. With its operations spread over continenets: North America, South America, Europe and Asia Pacifc, it has around 60,000 employees world over. It has wide range of diverse products and services wich include electronics and communications, nutrition, safety and protection, agriculture, home and construction, apparel and