Wednesday, August 26, 2020

Reaction paper of Departures Essay Example

Response paper of Departures Essay Example Response paper of Departures Essay Response paper of Departures Essay Demise possibly It was a certain something or perhaps it was another. Yet, everything tumbles down to one man (or one lady) lying, holding up to approachably having themselves burled while their friends and family grieve, lament, or even significantly go about as if steal influenced as the commendation or the last gift is conveyed. In any case, that one relies upon culture, and perhaps the foundation of the expired. Yet at the same time the festival of somebody who died is viewed as heavenly birthday celebration. Demise is commended as if it was birth. In this manner, planning is required and is as needs be applied. The conversation about the film Departures about the readiness of the expired would be expounded through this, or my, response paper. The film Departures, grasps the social estimation of Japanese society In understanding about their dead. Flights was shrewd into its delineation of the numerous aspects of life and demise. In spite of the fact that this film about a man who lost his Job being a cello player in symphonic gathering and wound up with the act of setting up the dead, it is increasingly centered around indicating the novel internment process in Japans culture. The hero named Adagio had a contention tit his companion and his significant other In the selection of his new position. I comprehended why his companion, alongside his better half had question about his work, in light of the fact that, by and by, I likewise concur that It is exceptionally abnormal to work with the perished particularly help them in anticipation of their movement. Yet he remained in his ground and sought after his new position, always remembering his adoration and energy for cello playing. At the point when he is discouraged after his better half left him, he made as his passionate outlet driving him to endure each spending day with the solidarity to work more diligently and push ahead, Before I watched this film, I had no Clue cap the bodies were arranged straightforwardly before the family; sort of unpleasant In my conclusion. This film is very vivacious regardless of Its concentration upon death. It Is an exceptionally charming film, you can gain proficiency with a great deal of good exercises, as, consistently be set up concerning what will occur and appreciate each second with your friends and family before they are no more. This film has educated as, by and by, not to trust that any individual will go before really cherishing and acknowledging that they are so critical to us. It had a striking storyline that indicated the uniqueness of Japans culture. In the film, I saw customs cap are just trailed by not many, yet are enormously esteemed since It speaks to the sendoff of an individual that was once living and breathing with us. In the wake of watching this film, I felt that I regarded for those individuals who are engaged with burial service forms, more than previously. It is an occupation that is frequently viewed as dull, discouraging and negative. In any case, this film likewise depicts this calling in a constructive light that permits us to regard the conventional memorial service process that remaining parts existent on account of the exertion these individuals. Distaffs shopping center Job can be called inadequate, the film portrayed the specific importance of the term: custom of setting up the expired led before lamenting relatives. This perplexing procedure includes a nearly radicalized washing, fastidious preparing and cautious uncovering and attire, again, of the perished. This done while uncovering an almost no skin to save the nobility of the dead. The aura or finish of this film is my top pick, when Mike, Adagios spouse, returned following a couple of months with the news that she was pregnant, trusting her unsound would change Into another Jon. Be that as it may, seen was addle to acknowledge close to boa constrictors inversion when she handedly saw the Job Adagio had. She stood, an overseer of her significant other as he prepped a family companion and a proprietor of the shower house. It additionally demoralize me on the grounds that the proprietor commended her last Christmas Just with a companion and not with her family. Simultaneously it drove me mad with her child that consistently constrained her to sell the shower house so he can construct a townhouse on the spot. At the point when his mom passed on he atoned and said sorry to his mom, however it was at that point past the point of no return, can't hear her pardoning. Be that as it may, the most contacting part was when Adagio observed his dad once and for all. He recollected the overlooked essence of his man, since he was as yet youthful when his dad fled with their server. He Just kept it himself that he was so irate to his dad. His mom was the one in particular who endeavored to raise him. In any case, when he saw him once more, he recovered his adoration for his dad, particularly when he notice the stone that the man were kept on his hands. The stone represents their vows to one another however not truly, because of the explanation his dad fled with another young lady. Adagio, when he still youthful, he gave a little white stone and represents how unadulterated and cherished his dad He was the person who arranged his ether for his flight and pardoned him for what he had done before. I truly like this film. The plot was conceivable and the subject was one of a kind however engaging. It is a sort of film that portrays culture, life and furthermore demise. Acknowledgment, lamenting and proceeding onward. It additionally convey the significance of time and importance. That piece of human obliviousness and pomposity that we ought to maintain a strategic distance from so as to disregard lament and to live joyfully, mollified and calmly before death really smacks us in face and gives of how we are more unjustifiable than the real world. In this manner, I infer that this film is really a film worth watching and gaining from.

Saturday, August 22, 2020

The Double Helix Essay Example | Topics and Well Written Essays - 250 words

The Double Helix - Essay Example Accordingly, a replication of the first DNA is accomplished with the parent and girl atoms having the very same properties. The twofold helix in the integral based blending accordingly guarantees that girl atoms infer the very same attributes as the parent particles (Teerikorpi, Valtonen, Lehto, Byrd and Chernin, 2008). The expression, ‘two strands of DNA in the twofold helix are antiparallel,’ implies that the strands run in inverse ways. This is a result of properties of the various structures of the strands that guarantee the contrary headings for holding in the twofold helix strands (Strachan, 2003). On the off chance that the strands were equal, the parts of the bargains helix strands would have comparable properties. This would result from the strands blending with the two strands adjusted a similar way instead of the inverse directional abandoning of the ‘antiparallel’ twofold helix strands (Behr,

Friday, August 21, 2020

The Benefits of Anxiety and Nervousness

The Benefits of Anxiety and Nervousness Panic Disorder Coping Print The Benefits of Anxiety and Nervousness By Katharina Star, PhD facebook linkedin Katharina Star, PhD, is an expert on anxiety and panic disorder. Dr. Star is a professional counselor, and she is trained in creative art therapies and mindfulness. Learn about our editorial policy Katharina Star, PhD Updated on September 29, 2019 Jose Luis Palaez/Getty Images More in Panic Disorder Coping Symptoms Diagnosis Treatment Related Conditions In This Article Table of Contents Expand Feeling of Anxiety Positive Effects Warning Sign Motivation Built-In Warning System Character Trait in Friendship Leadership Bottom Line View All Back To Top We often hear about the negative aspects of anxiety, but could there be any advantages or benefits that come from living with anxiety? The Feeling of Anxiety Anxiety is a feeling that is often characterized by intense fear, worry, and apprehension. Many anxiety sufferers describe it as a feeling of nervousness and dread that can be distracting at best and all-consuming at worst. Anxiety is typically experienced on many levels, affecting one’s emotions, leading to uncomfortable physical sensations, and contributing to negative thoughts. Positive Effects of Anxiety These symptoms of anxiety are a common problem for people who have been diagnosed with any type of anxiety disorder, including panic disorder.  As a panic disorder sufferer, you may be well aware of how anxiety can hinder your life. However, have you ever considered some of the possible positive effects that may come with having anxiety? Scientists have learned that some degree of stress or anxiety isnt necessarily a bad thing. Good stress, something now referred to now as eustress, keeps us motivated and excited about life.?? It appears that some degree of anxiety may have similar silver linings. Lets take a look at what theyve been learning. Anxiety as a Warning Sign Anxiety may be just the warning sign you need to bring awareness to your current situation and make some necessary changes in your life.  Recurrent worry and nervousness can be an indication that some areas of your life are off track and need adjusting. For example, you may find that you have a relationship that is no longer working, perhaps your job is causing a great deal of stress, or maybe financial issues have you losing sleep and feeling anxious. Your symptoms can be difficult to manage, but exploring and coping with your anxiety can be a real opportunity for self-growth. The next time anxiety strikes, consider what message it has for you and the possible adjustments you may need to make in your life. Anxiety as Motivation Rather than always being considered a hindrance, anxiety may actually help you feel more motivated and prepared when faced with challenges. Research has shown that students and athletes who experienced some anxiety actually displayed improved performance on tests or while participating in competitive sports.?? Likewise, some degree of anxiety in those who have a good working memory may actually enhance performance on cognitive tests.?? Consider ways that your anxiety creates an incentive for you to be successful in some areas of your life. For instance, perhaps your anxiety assists you in putting extra effort into work or personal tasks, making a good impression, or moving towards your goals. When considering your own anxiety, try to think of ways that you can use it to inspire your growth and self-improvement. Anxiety as a Built-In Warning System Even though it may seem useless at times, there is a purpose for anxiety. These feelings and symptoms are a part of our innate way of dealing with stress. Known as the fight-or-flight response, anxiety is meant to protect us from danger and allow us to react faster to emergencies. When it came to our ancestors, the fight-or-flight stress response prepared humans to either attack back or flee from a life-threatening risk in the environment, such as a dangerous animal or climate condition. In modern times, anxiety may be a symptom that helps you to quickly react to avoid an accident while driving a car or prevent you from entering an unsafe place or circumstance. One study found in the U.K. found that adolescents who suffered from anxiety had fewer accidents and accidental deaths in early adulthood than those who did not have anxiety.?? In this sense, anxiety may be a sign to help keep you safe. A Positive Character Trait in Friendship People who have dealt with anxiety may be more empathetic and understanding to the issues that others face.?? Having gone through personal struggles yourself, you may be more sensitive, loving, and accepting when friends and family members are dealing with personal challenges. Its been shown that people with anxiety are more concerned about how they interact with others. Have you noticed that you sometimes appear to be just that friend someone needs? Anxiety as a Plus in Leadership People with anxiety may also be  skilled in leadership roles, as they take careful consideration of  the possibility of multiple outcomes. For instance, many anxiety sufferers are highly aware of what can potentially go wrong, making them more cautious thinkers, careful decision-makers, and great problem-solvers. Bottom Line Even though there can be some potential benefits to experiencing anxiety, and it is worthwhile to point these out to yourself, it can also become a real hindrance to many aspects of your life. Your career, relationships, and personal aspirations may be negatively affected by your struggle with anxiety. If anxiety is preventing you from living the life you desire, then it may be time to get professional help. Your doctor or therapist will be able to determine if your symptoms meet the criteria of an anxiety disorder, such as panic disorder, post-traumatic stress disorder (PTSD), or social anxiety disorder (SAD). Additionally, she will be able to assist in creating a treatment plan that can help you better cope with your anxiety.

Sunday, May 24, 2020

The Salem Witch Trials And The Witch Hunts Of 1692

Robert Calef was a merchant in Massachusetts during the witch hunts of 1692. The primary source that is being analyzed isn’t about him but is from many stories that he collected and put them together in a manuscript. This manuscript that contains true accounts about the trial and it included the attempted escape of Mrs. Cary of Charlestown Massachusetts told from her husband Nathaniel Cary’s viewpoint. I believe that Nathaniel Cary wanted this account to be written in order to highlight and expose how the puritans handled the witch trials and specifically the trial against his wife and to inform people of what was truly happening in New England at the time. In this primary source analysis, I will be discussing what this document tells us†¦show more content†¦Any action that contradicted their code was considered immoral and a sin and was punished harshly. The religious and strict moral rules created fear of being punished and created great tension in the commun ity. This explains why they jumped to conclusions about the witch accusations. Above all else puritans feared God and everything bad that happened to the puritans was recognized as Gods punishment. It can be said that the main tension in the puritan society was being accused of witchcraft, but there are also other notable tensions too. A notable tension that was written about in this document was the cruel and harsh treatment of the accused by the justices. Cary relays that his wife’s treatment was inhumane, physically abusive and demeaning. During testimony, she was asked to stand for a long period with her arms stretched out. Cary’s wife was crying and afraid that she might faint. When Cary asked if he could help support her, â€Å"Justice Hathorne replied, she had strength enough to torment those persons, and she should have strength enough to stand.† When Cary spoke out against this treatment, he was told to be silent or that he would be removed from the room. Cary’s wife was later taken down on the floor by one of the witnesses. Cary spoke out on â€Å"their inhumane dealings, uttered a hasty speech (that God would take vengeance on them, and desired that God would deliver us out of the hands of unmerciful men)†.Show MoreRelatedWitch Hunts : The Salem Witch Trials Of 1692938 Words   |  4 PagesWitch Hunts Essay â€Å"Its funny how everyone hates witch hunts†¦ until they see a witch† - Jon Stewart Even though The Salem Witch Trials of 1692 was one of the most well-known witchcraft trials over the world, the idea of witchcraft stretches over a long period of time and spreads throughout the world. One of the earliest known witch hunts according to (witchcraftandwitches.com) were in the mid 15th century, where Pope Innocent VII claimed that Satanists in Germany were meeting with demonsRead MoreAbdeali Dalal. Dr. Jenkins. History 1301. February 13,1541 Words   |  7 Pagesâ€Å"Escaping Salem; The Other Witch Hunt of 1692† â€Å"Escaping Salem; The Other Witch hunt of 1692† was penned and published by Richard Godbeer in 2005. Godbeer expressed his views on what he called basic witch trials in Salem and more importantly, in Stamford, Connecticut Massachusetts. The same year that Salem witch hunt and trials began in 1692, another witch hunt took place in Stamford, the Western Connecticut to when a woman (Elizabeth Clawson) from there was also accused of Witchcraft. These witch huntRead MoreThe Crucible By Arthur Miller1358 Words   |  6 PagesArthur Miller in 1953. The movie story deals with the Salem, Massachusetts hysteria in 1692 with an irrational fear of the devil. Witch hunts and false accusations resulted. Trials took place and resulted in the hanging and associated death of more than 20 people and the false imprisonment of many others. B. The Salem witch trials were a series of hearings and prosecutions of people accused of witchcraft. â€Å"From June through September of 1692, nineteen men and women, all having been convicted ofRead MoreThe Causes Of The Salem Witch Trials Of 1692700 Words   |  3 PagesSalem Witch Trials DBQ   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   How would you feel if your life was ruined just because you were considered unfit for society? This is exactly what was going on during the Salem Witch Trials of 1692. Prior to the trials, there were witch hunts that caused global unease mainly to Protestant societies. King Philip’s War also contributed to this unease by pushing people from the east coast and into Puritan towns. These towns had misogynistic male leadership, depriving many people of humanity becauseRead MoreFear And Its Effect On The Way People Act Toward One Another849 Words   |  4 Pageseternal life. Religion is organized in a way that unites people of common faith through social gatherings such as church, as well as through every-day conversational talk with other members a community. In the past, whole cities such as Plymouth and Salem were created to allow those with the same faith to live near one another. This unity through faith is another aspect that aids in the condemnation of people, innocent or otherwise. Those that are bound to the church, and through that one another, areRead MoreThe Salem Witch Trials Essay1349 Words   |  6 PagesBefore 1692, the supernatural was a part of people’s everyday normal life. This is so as people strongly believed that Satan was present and active on earth. Men and women in Salem Village believed that all the misfortunes that befell them were the work of the devil. For example, when things like infant death, crop failures or friction among the congregation occurred, people were quick to blame the supernatural. This concept first emerged in Europe around the fifteenth century and then spread toRead MoreSalem Witch Trials : The Witch Trial Hysteria920 Words   |  4 PagesSalem Witch Trial Hysteria In 1692 the actions of three girls quickly launched Salem onto the path of committing one of the largest witch hunts the New World has ever known. The witch hunt was fueled by a mass hysteria among the townspeople, this hysteria was the result of the strictness of their society and a number of internal and external stressors. The initial wave of panic when rumors of witchcraft arose gave way to compete hysteria when accusations began. Salem massachusetts was the perfectRead MoreThe Causes of the Salem Witch Hunt Essay925 Words   |  4 PagesThe Causes of the Salem Witch Hunt Many American colonists brought with them from Europe a notion in witches and an intrigue with alleged manipulation with the devil. During the seventeenth century, people were executed for witchcraft all over the colonies, chiefly in Massachusetts. Various of the accused were women, inducing some recent historians to recommend that charges of witchcraft were a way of dominating women who endangered the present economic and social orderRead MoreSimilarities Between The Salem Witch Hunt And The Holocaust993 Words   |  4 PagesA modern day Witch Hunt that can relate to the Salem Witch Hunt and the Crucible due to condemnation of members of society, instinctual prejudice, estrangement of members of society, and mass hysteria is the Holocaust. To estrange members in society means to push people in society out of it. In the Salem Witch Trials, the people in society pushed the Witches out, and even pushed away the women and men they felt were going to be witches, so that they could look more like witches. In the HolocaustRead MoreThroughout The Time Of Human History, People Have Written1282 Words   |  6 Pagesin these stories years ago, and now know them as the fantasy that you read in books and see on tv. With this being said, in 17th century Salem, this was not the case. Witchcraft became a living nightmare for people during this time, and was feared to even think about. Th e reason for this fear was due to the events that occurred during the Salem witch trials of 1692 and 1693 in Massachusetts, which have been the focus of speculation and curiosity for many years. This belief in the supernatural, and

Wednesday, May 6, 2020

Kids, Work and Essay Writing Samples Free

Kids, Work and Essay Writing Samples Free Because many exams need you to write persuasive essays, it can be a great concept to begin your practice with one. Knowing the most usual IELTS essay topics gives you the ability to revolve around the most crucial vocabulary. Bear in mind you want to capture the experience of taking a real essay exam. It's important to select debatable argumentative essay topics since you need opposing points you could counter to your own points. No matter the mission of the essay, be sure that you're interested in your topic. Scholarship Essay Examples are supplied for insight on how best to write a scholarship essay. Essay writing can be rather a challenge. It is commonly practiced is schools. Thanks to the correct option of presentation style and a thorough understanding of the goals you need to attain in your essay, there are many categories essay themes may be broken into. Try out another topic and do the exact 5-minute writing test till you locate a topic you know it is simple to write on. You could have your topic assigned, or you can be given free reign to write on the topic of your pick. Each topic is broken up into subtopics that you should prepare. The main aim of topic choice for a proposal essay is to show the idea can be put into place in practice. There are two major means by which you can use the most typical IELTS essay topics to your benefit. For instance, if you'll have to compose a persuasive essay, consider the fundamental building blocks that would go inside that essay's structure. You may continue to keep your argumentative essays for your upcoming job portfolio in case they're highly graded. While an essay is a sizable project, there are numerous steps a student can take which will help break down the task into manageable pieces. On our site you'll find considerably more useful exceptional information that is certain to be practical for junior and higher school kids from, like common home task essay about Hamlet, and, for instance, application essays for college for future students. On the flip side, in the event that you made a fantastic choice, focus on what influenced you to make that decision and the way it has changed you. Very often it becomes tough to choose a single topic either on account of the many ideas in the student's head, or due to their complete absence. The prices of our very best essay writing service aren't the highest and not the lowest on the marketplace. Also, make sure your paragraph order is logical. So you don't have anything to be concerned about as they possess all the essential skills to compose the ideal research paper. On-time shipping guarantee You are going to receive your research paper even before you're the essential moment. It is possible to surely start your practice for the exact same! If you've taken the IELTS test recently, then you're able to post your question for different students to check at. A lot of students put on a uniform. Attempt to consider what age is excellent for students to date with one another. The Basic Facts of Essay Writing Samples Free Make certain you give clear explanations of the things on your list also. A far better thing to do is to begin a vocabulary notebook. The topic has to be interesting, the topic has to be essential and finally the topic has to be informative. S electing an emotional topic is also a great idea. Textbooks are obsolete and must be replaced by iPads. Education scholars are continuously evolving the way that they think about how we learn and what's taught. Students need to be careful about posting on social networking.

Tuesday, May 5, 2020

Abortion Essay Example For Students

Abortion Essay Modern medical technology has made it possible to extend the lives of many beyond the point of death. Death in recent times, often esures a long painful fall where on looses control both physically and emotionally. Some people accept that modern technology buys them time. While others find the loss of control frightening. They want their relatives to remember them as they were and not as a life prolonged by machines. Some people rather die than to live in pain. The demand for assisted suicides and euthanasia is increasing(kass 17). These issue raises many questions, legal and ethical. Although neither assisted suicides and euthanasia are legal, many people believe that it should be. A great number of people may never face this decision,but knowing that you have this option would be comforting. For those who will face this situation of love ones on medication, being treated by doctors, sometimes rely on the technical means of staying alive. Through self identification people evaluate their own lives and its quality through their morals and values. In order to maintain dignity the public has to report these evaluations and allow people to act in accordance to their own beliefs. The arguments aginst making euthanasia legal has to center points. The first is the fear that mercy killing will open the door to abuse, allowing a way to kill unwanted people.The second is the hippocratic oath, Physicans must not kill. On the other hand, death in three of four days throught starvation and dehydration- passive euthanasia, which is both legal and ethical and is a standard way of easing a termanially ill patient out of the world at his or her request is not the most pleasant way to die We will write a custom essay on Abortion specifically for you for only $16.38 $13.9/page Order now Abortion Essay Example For Students Abortion Essay Abstract: Religions, myths, rituals and theologies are understood by many scholars somehow to possess or transmit essential truths or values that magically transcend their particular setting. In a word, things religious are presumed from the outset to be extraordinary, thus requiring special interpretive methods for their study. This essay attempts to reverse this penchant in modern scholarship on religion by presuming instead that those observable activities we name as religion are an ordinary component of social formations and, as such, can be sufficiently studied by drawing on the methods commonly used throughout the human sciences. Using the problem of evil as a test case, the essay argues that seemingly privileged or unique discourses on evil are but ordinary efforts at establishing cognitive intelligibility and overt political justification. We will write a custom essay on Abortion specifically for you for only $16.38 $13.9/page Order now There is nothing more difficult to convey than reality in all its ordinariness. Flaubert was fond of saying that it takes a lot of hard work to portray mediocrity. Sociologists run into this problem all the time: How can we make the ordinary extraordinary and evoke ordinariness in such a way that people will see just how extraordinary it is? (Bourdieu 1998: 21)Theology as Ordinary Human DataWhen I first read Pierre Bourdieus above comment on the surprising effort it takes to represent ordinariness as extraordinary, I was struck by the importance of his seemingly subtle point. It is important for three reasons. First, it takes seriously the insiders unreflective understanding of their own social worlds after all, the object of study throughout the human sciences is people simply doing what they happen to be doing. Second, Bourdieu helps scholars to focus their attention on the techniques whereby people represent a subset of their behaviors (i.e., what they happen to be doing) as impor tant, meaningful, and worthy of reproduction and transmission (i.e., what they must or ought to be doing). Finally, both of these points reinforce the notion that scholars are not in the business of merely paraphrasing a groups own articulate or reflective understanding of themselves; instead, we bring our own curiosities, value systems, and sets of anticipations (i.e., theories) to bear on our human data, leaving us responsible for making this or that cultural act significant in a whole new way. For scholars concerned with studying those assorted cultural practices easily understood by most everyone in society to be obviously important Im talking here about those things we call religion, by the way Bourdieus comment has profound implications. If we presume those beliefs, behaviors, and institutions usually classified as religious to be nothing more or less than instances of completely ordinary social-formative behavior, then the trick would be to develop an interest in the ways that such routine social acts come to stand out as privileged in the first place. The trick, then, is not simply to reproduce the classification scheme, value system, and hence sociopolitical world, of ones informants (i.e., the so-called religious people themselves), but to bring a new language to bear, a language capable of redescribing the indigenous accounts of extraordinariness, privilege, and authority as being ordinary rhetorical efforts that make extraordinariness, privilege, and authority p ossible. In a word, the trick would be to make participant rhetorics and indigenous self-reflection on religion ones data. I am therefore part of a scholarly tradition that sees theology and its practitioners as nothing more or less than native informants1; they are but one more group whose reports and actions are in need of study and theorization. For instance, I recall that the Protestant process theologian and advocate of liberal religious pluralism, John Cobb, once spoke at a university where I was teaching; I found it rather odd attending his talk for I did not see myself there as Cobbs colleague or dialogue partner. Rather, I attended the lecture much as an anthropologist might attend a ritual ceremony as a participant-observer gathering descriptive data for later theoretical reworking. .u2e0e09697d02042a5a5ca428dd90cbd3 , .u2e0e09697d02042a5a5ca428dd90cbd3 .postImageUrl , .u2e0e09697d02042a5a5ca428dd90cbd3 .centered-text-area { min-height: 80px; position: relative; } .u2e0e09697d02042a5a5ca428dd90cbd3 , .u2e0e09697d02042a5a5ca428dd90cbd3:hover , .u2e0e09697d02042a5a5ca428dd90cbd3:visited , .u2e0e09697d02042a5a5ca428dd90cbd3:active { border:0!important; } .u2e0e09697d02042a5a5ca428dd90cbd3 .clearfix:after { content: ""; display: table; clear: both; } .u2e0e09697d02042a5a5ca428dd90cbd3 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2e0e09697d02042a5a5ca428dd90cbd3:active , .u2e0e09697d02042a5a5ca428dd90cbd3:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2e0e09697d02042a5a5ca428dd90cbd3 .centered-text-area { width: 100%; position: relative ; } .u2e0e09697d02042a5a5ca428dd90cbd3 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2e0e09697d02042a5a5ca428dd90cbd3 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2e0e09697d02042a5a5ca428dd90cbd3 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2e0e09697d02042a5a5ca428dd90cbd3:hover .ctaButton { background-color: #34495E!important; } .u2e0e09697d02042a5a5ca428dd90cbd3 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2e0e09697d02042a5a5ca428dd90cbd3 .u2e0e09697d02042a5a5ca428dd90cbd3-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2e0e09697d02042a5a5ca428dd90cbd3:after { content: ""; display: block; clear: both; } READ: Shakespeares Views On Love EssayScholars of religion, such as myself, therefore conceive of and study theologians as elite social practitioners, as generally privileged, influential mythmakers.2 Although not all of the scholars of religions data will come from the ranks of theologians (after all, not all of the people and groups we study are involved in the articulate, systematic reflection and rational expression

Friday, April 3, 2020

Away Michael Gow Character Analysis Essay Example

Away Michael Gow Character Analysis Paper Meet the Character Tom: Tom is a very talented actor with the potential to go far with his acting. â€Å"You’ll be our next Chips Rafferty eh, son†. He and his family moved to Australia from England 8 years ago and there not the wealthiest family but there certainly the happiest family. His acting and certainly his family are important to him. Tom is quite defensive, and criticism towards his family concerns him and doesn’t make him happy. Tom has a great relationship with his parents as he gets on great with them, he gets on well with Meg but he cares for her more than he lets on. â€Å"It’s from the bottom of my heart, actually† Tom doesn’t really get along with Megs mum Gwen. She’s quite rude towards Tom and his family and that makes Tom really defensive. [Tom runs back in. He has heard this] â€Å"I hope you have a rotten holiday†. We will write a custom essay sample on Away Michael Gow Character Analysis specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Away Michael Gow Character Analysis specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Away Michael Gow Character Analysis specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Meg: Meg is an open minded and smart young girl; she is very accepting of others and is also very appreciative of what she has ‘That’s really nice. That’s really nice of you’. Meg values her family, but doesn’t understand why her mother acts in certain ways or makes certain comments ‘You were awful’ , she highly values her father and cares about Tom, but not as much as he does about her ‘Well†¦ I still wish I got you something’ Gwen: Gwen is married to Jim and is Meg’s mother, her and her family are better off than most and she isn’t afraid to show it as she is quite a snob. She likes to live and have a more luxurious life than others and likes to point it out as well. â€Å"We got a new caravan. Everything in it you could want† Gwen seems to care about herself more than anyone else. Gwen and Jim come in] â€Å"You were supposed to hurry, not stand round yapping. There are a million things to do. I’ll have to do it all, I expect† Gwen’s only real relationship is with Jim. Meg and Gwen seem to be quite annoyed with each other and there seems to be a lot tension between them. Gwen doesn’t get along with most people as she rubs them the wrong way but she cares about her family most. â€Å"Have a lovely time in your†¦tent† Jim: Jim is a positive person always praising others when they do well ‘You’ll be our next Chips Rafferty, eh, son? ’, he also tries to keep everything calm and under control ‘We’ll find them. Don’t get upset’. He is dedicated to his wife Gwen and daughter Meg, he gives us the impression that he wants to give them the best lives they could have. Jim is friendly and kind to everyone and seems always supportive in what others do, ‘You look lovely though, Mags’. Vic: Vic is a very supportive and happy person ‘But we did enjoy it. Very much. You should be proud Mr Baker’. She and her family and not the wealthiest but she appreciates everything that she has ‘Oh†¦ no. Not exactly. We’ve got a tent’. Vic is proud of her son Tom and happily married to her husband Harry, she is friendly to everyone and see’s the good in them, ‘You were marvellous’. Harry: Harry and his family came out to Australia 8 years ago and haven’t seen much of the country, ‘8 years. Not a lot of it, no, not yet’. Him and his family aren’t the wealthiest ‘A lean-to? ’ and can’t compete with other families but they still appreciate everything they have. Harry values his family and does his best job at giving them the best lives he can give them; he’s appreciative of them which makes them a much happier family. Harry is kind to others in every situation and tries to keep peace, ‘Congratulations, son’. Coral: Coral is a mysteries character who keeps to herself’ [Coral doesn’t respond]’. It appears she is suffering from a case of depression, ‘She looks awful, poor women’ while overcoming something that has happened to her son. She is supported by her husband Roy, but Roy is not the best supporter at times. Coral is quiet and hasn’t built many strong relationships with others as others are trying to with her ‘Did you enjoy the play? [Coral stares at her for a moment then looks away’. ] Roy: Roy is the principal at Meg and Tom’s school. He is a very well-spoken man who seems to be quite successful. â€Å"So what do you think of our little Chips Rafferties, eh? Proud mums and dads? He’s married to his wife Coral who is a very mysterious woman who is quite withdrawn but Roy sticks by her like a loyal husband. His job and his wife seem to be very important to him. â€Å"Oh yes, yes. It has been a successful evening†. His main challenge or concern is his wife who is still grieving over the loss of what we assume is her son. Although he sometimes struggles with his wife he still cares about her and her feelings. â€Å"I thought I told you to get it the car†. He seems to get along well with pretty much everyone and everyone gets along well with him. Turning Points Tom: Toms turning in the script is when he is talking with Meg on the beach; he is open to her about his terminal condition. Tom is very sick and cannot survive. When Tom finally tells Meg about his condition it brings him to tears ‘Why are you crying? ’ showing Tom’s emotional side and that he is actually scared of what is happening to him and that fact that he doesn’t have much longer to live. Harry: Harry’s turning point in the script is when he is talking to Jim on the beach, Harry opens up to Jim about their life in England after the war and about his son terminal condition. Harry and his family left England for Australia after the living conditions, rationing and destruction after the war. Every day Harry keeps the burden of his son dying and the secret of this away from his son. We see that Harry struggles every day from these problems and that he looks strong on the outside but he is really dying on the inside ‘Even while we’re very, very sad. We have no regrets, but we have no hopes. Not any more’. Jim: Jim is just like Gwen with holding to the past though he is just masking the struggling relationship in the family in fear of his past life. He does not however approach the problem of Gwen directly hence slowing the what would of been inevitable if it wasnt for Vics intervention. Jim never faced this burden but yet is acting strong ‘Let’s all relax and calm down’, he never really had a turning point or confronted change for better in the script. Vic: Vic faces the same challenges as her husband Harry, leaving her home in seek of a better life for her and her family and the everyday challenges she faces with the terminal condition of her son. After her and Gwen’s talk on the beach we see them both come back in tears, so we only can assume what their conversation was about. We see the change in Vic in an emotional state where we see her and Gwen crying and supporting each other ‘[The women come back. They have been crying and supporting each other]’. Meg: Meg’s turning point is when she realises that her mum is a person to and they have been through a lot to care for her and worked hard for her to have a better life than she did. She realises that even though her mum can be rude she’s her mum and she accepts it. Im sorry†. This changes Meg for the better, it gives her an insight into what her mum and dad faced. It was caused by Meg when she was mad at her mum for purposely not packing Jim’s presents for her so they would feel guilt for her but Meg figured it out and was really annoyed with her. She asked her what she had done or been through and Gwen said exactly what she had been through which made Meg realise that she was just trying to do everything she could to ensure Meg had a better life than her mum. Coral: Corals turning point is when she meets a man named Rick. Rick was looking for his wife when he stumbled upon Coral. Rick is on his honeymoon and made his wife embarrassed at lunch and is trying to find her, while Coral slipped out of the room that she and Roy are staying in. Rick and Coral become too attached to each other, especially Rick. â€Å"But I get excited when I know it’s time to see you†. Coral isn’t so withdrawn anymore although she still can’t get over the loss of her son. Roy is still worried about her but Coral claims she’ll be fine; Coral decides to leave the hotel and her old life and start over. Roy: Roy’s turning point is when he just can’t take Corals behaviour anymore and just cracks it. †Im going to have to do something, see someone’. This change makes Roy very frustrated and he just doesn’t know what to do anymore or how to handle it. Corals annoying behaviour causes frustration for Roy and when he finds that Coral and Rick are spending all this time together it really gets to him and that’s when Roy has had enough. Gwen: Gwen’s turning point is when she and Vic go off for a walk along the beach after Gwen was talking about how she doesn’t understand how people wouldn’t want to fight for a better life. They came back and they had both been crying but Gwen seemed to have changed and realised some things. â€Å"What do you think of me? You must hate me? Why do you still bother? Im sorry†¦Ã¢â‚¬  Gwen realises that her life and her family’s life’s are very good compared to some others which brings her back to earth a bit. Beyond the text Tom: Tom is scared of what the future holds, not only does he face into certain death but also faces the sickness and pain that will come before hand. Tom will try to amend and build on all the relationships that he has before his passing leaving as a good memory and relation to who he cares about and care about him. Coral: Coral has gone off to start over, she will still wonder about and miss her son everyday but day by day she will worry less and less until he becomes a memory of what she did have with him instead of what she never got a chance to. She will have a happier life with more enjoyment without Roy controlling her. Roy: Roy’s relationship with Coral is over and he will realise where he went wrong by trying to over control her and threatening her. Since he is now along he will focus on his career as a principal and try and build new relationships and learn from his mistakes. Vic: Vic will cherish every moment she has left with Tom and become even closer to her husband through hard times. Vic will get a better riendship with Gwen as she will support her in the hardship of grief of the loss of her son and by losing something gain something else. Meg: I think that Meg’s change will make her life a lot easier and better for her. I think it makes her realise that she has a really good life and she will never have to face the things that her parents and her mum in particular faced. I think that it will make it easier for her to have a better relationship with her mum now seeing she understands why she can get angry and upset. I think that her relationship with her dad was good and always will, but now it will make sure that she has an even better relationship with both of her parents. Jim: I think that Jim will never really change; I think that Jim is a really nice guy but will never really confront his problems. I think he was too afraid to confront Gwen about her attitude and behaviour towards everything. I think that if Vic had never had a talk with her she would still be her old self so I think that Jim was lucky Vic talked to her. I think that Gwen’s change will help out their relationship a lot, and will make family life a lot easier. Gwen: I think that Gwen’s change is a massive one; I think that she had the biggest change in the book. After the talk with Vic it makes her realise that she has a wonderful family and an amazing life which is better than most. Gwen’s change will make it a lot easier to have a good relationship with her daughter Meg. Gwen’s change will allow her and Jim to have a better relationship aswell; it will make it easier for them to talk and to just be with each other. I also think that it will change her outlook onto life and make her appreciate everything she’s got. Harry: I think that Harrys change will benefit all his family especially Tom. I think he will cherish every moment with his family, I think that his relationship with Tom is great, and I think it will always be like that. Harry and Vic will be able to enjoy their lives with their son, as they are more willing to talk about Tom’s condition, it shows that he understands what’s going to happen one day and it shows that Harry loves his son and will make every day amazing for him.

Sunday, March 8, 2020

Cloning for Perfection or Damnation †English Essay

Cloning for Perfection or Damnation – English Essay Free Online Research Papers Cloning for Perfection or Damnation English Essay Cloning has been a debate for years and is still a big question today. It is a very complicated process that many people believe is us playing god. People who support cloning believe it is a good way to perfect the human race. Although I feel both sides are extreme, I think that cloning should be allowed but only if the government approves it so we can satisfy both sides. To understand why cloning is important to scientists; you must understand the origins of where the idea of cloning came from. It is said that that it was started in 1952 when geneticists removed a nucleus from an embryonic frog, placed it into an egg cell, and a frog was hatched from the egg cell with the embryonic nucleus. (Human Cloning) First glimpse the world had of cloning is with the sheep named Dolly who was the first live animal to be cloned. Common question asked is what is cloning? Well the answer is quite simple; it is an asexual process that replicates genetic makeup to the youth brought from the womb. The result is an animal that looks exactly like the original. A common myth for people who don’t know much about cloning is that the clone will be exactly like the individual whose genetic code it came from. The only similarities are the genetic makeup. Everything else in the organism is different. Say if I were to be cloned, my clone would be completely different than I because he would have a different upbringing. He would not have the same childhood experiences I had. So in other words, you are creating another person that looks like you but may be completely different. It would be like raising a child, they may share some genetic code with you but they are not exactly like you. Psychology has a pr ofound effect on cloning. Environmental factors play a huge role in how someone turns out. You may be a completely calm individual who is always courteous and believes in chivalry. If certain aspects of your clones upbringing brought him to feel anxiety, then he or she would be a completely different person. Your clone may become a promiscuous crude person that only believes in satisfying themselves rather than serve the common good. Arguments among the debate of cloning are quite simple. The argument for those against cloning is how we know that the clone’s life will be as long as ours. Simple answer is that we do not know. How can we know if protestors do not let us try doing so? The only way to be sure is to of course let us try it. Experiments are the only way of letting us know if something works. If it does work, then we will the public decide. Debates will still rage on but if we decide on whether or not to legalize cloning, then it will mark a new era for our country. Another common nemesis to the cloning of certain things is that the cloning could not be healthy for the world. Certain cloned fruit or vegetables could carry very negative effects on us if we eat them. They could cause us to have new diseases that doctors would never know the cure to. So this means that cloning could cause certain illnesses to outbreak through the world. The last thing the world needs is an epidemic that could spread throughout the world. I guess people feel that the world does not need any more incurable diseases. Religious views that oppose closing are many. One of the views that believe cloning violates god is that when men creates a child through genetics, we are violating the image of god. It also makes children an object or manipulate but not a gift from god. The church also feels that if we are able to make clones, that we would treat them less than equal and we would sacrifice them so we could transplant organs and such.† The church argues that just ends do not justify immoral means.† (Human Cloning: Religious and Ethical Debate) Another common argument is that we as humans have distinct souls and they do not believe that we could clone the human soul with the human. â€Å"Jewish people think that man has a partnership with god and that we as men must care for mankind as it grows to nurture it like Adam and Eve did with the garden.† (Human Cloning: Religious and Ethical Debate) Ethical concerns are also not helping the argument against cloning. People believe that with our technology of today does not allow us to securely clone someone and that there will be harm to the embryo and the clone will age faster. There are also the psychological factors that come into play. People believe that the child will feel constrained to the future of their gene donors’ life. The quality of parenting and family life may be degraded because instead of parents loving their children merely for the fact that they are their child will not be enough for the parents. Instead, the parents will love them for how well they meet expectations. All ethical concerns are understandable. I feel that cloning would benefit the world. I believe leaders that could have done well for the world could be cloned and possibly could continue their past-life’s legacy. Maybe if we cloned Martin Luther King, we would know his potential influence on society. Many people in history could have done such great things if they had not died, maybe cloning would reawaken the potential will they would bring upon the world. If we were to clone Albert Einstein, I believe we could create something that would terrify the rest of the world and we would be in power because of the fact that the world would be terrified by our power. Although clones would have a stigmatization by society, the worth of their presence would be far greater. One of the many things that certain people back cloning with is that we could control whether or not our offspring would have certain diseases or recessive genes. I guess you could look at it with the angle that we could perfect the human race. We could very well get rid of disease and certain common ailments brought by certain genes like baldness. Scientists believe that we could create the ideal race for the future. â€Å"At the current time the risks associated with the cloning of humans are so great that virtually all people agree that there should be a prohibition on such experimentation at the moment.† (Religious and Ethical Debate) This of course makes a lot of sense because we don’t know the harm that cloning could have on a child. It was 277 tries before the scientists who cloned the lamb named Dolly before they had a healthy lamb. This experiment made it a point to the scientists that there would be more birth defects and failures would be expected during experimentation. This doesn’t help the argument of the people that want us to be able to clone humans. Arguments against ethical concerns are quite formidable. â€Å"Supporters may also argue that human clones will have the advantage of knowing what they are good at early in life.† (Human Cloning: Religious and Ethical Debate) With the argument of children not being loved by their parents for the child’s sake is contended with the argument that the child will be loved unconditionally. For infertile couples, the child that they will attain through cloning will be loved as warmly as if they had the baby themselves. All ethical arguments do not seem so strong now. With both debates in mind, government control over cloning sounds like a good idea, so we as the public could have a glimpse of the potential of cloning. We could see how cloning would benefit the world. The public would find out which side of the argument was true on certain debates. Maybe there is a chance that we could get rid of aids or other types of diseases that cannot be cured. By doing this, we would find out if by eliminating certain diseases, cloning would bring even more dangerous illnesses than we got rid of. Government regulation of cloning I think would benefit society because I believe the curiosity that we humans have for what could come is too great for us to ban cloning forever. Knowledge that we could attain about our race is unlimited. We could find new things about the human race that no one has ever discovered. We could tap into certain brain potentials that otherwise could not be manipulated. We could make people have higher brain activity and IQ, so they can help benefit the world through other sciences and make discoveries that we haven’t. Cloning can open so many windows for us and many people believe that pioneering into this branch of science is the right thing to do. Both sides are really extreme, and to allow government to regulate cloning experiments is the right thing to do to satisfy everybody. Cloning I think at the moment is a very sensitive issue for many people because people are so entwined with their religious beliefs that they do not see the potential cloning has for us. Although cloning isn’t really going anywhere at the moment, in a few years I believe that we will see more successful experiments in the future. Dolly is the most recent success of the cloning team around the world but soon we will find more groundbreaking experiments. â€Å"Human Cloning: Religious and Ethical Debate.† 04. Mar. 2005. â€Å"Human Cloning.’ Bradford, Jenny. 04. March. 2005. Research Papers on Cloning for Perfection or Damnation - English EssayGenetic EngineeringEffects of Television Violence on ChildrenCapital PunishmentHip-Hop is ArtComparison: Letter from Birmingham and CritoStandardized TestingNever Been Kicked Out of a Place This NiceArguments for Physician-Assisted Suicide (PAS)19 Century Society: A Deeply Divided EraThe Relationship Between Delinquency and Drug Use

Friday, February 21, 2020

Megaloblastic anaemias Essay Example | Topics and Well Written Essays - 750 words

Megaloblastic anaemias - Essay Example An absence of this factor is the most cause of pernicious (megaloblastic anemia).Children inherits this condition, when this condition happens low level of factors produce symptom of juvenile pernicious anemia in the children's less than age of 10. (Intelihealth). Nyhans syndrome or Lesch-Nhyan syndrome is a disroder that is caused the deficiency of an enzyme hypoxanthine-guanine phophoribosyltransferase(HGPRT). Lack of this enzyme, the human body to restrict the utilization of vitamin B12 leading to megaloblastic anemia. (Lesch-Nyhan Syndrome). Apart from cobalamin and folate deficiency, the molecular basis for the megaloblastic anemia is in the failure in the syntheisis and assembly of DNA. (Megaloblastic anemia). Other causes unclude cytotoxic drugs that interfere with DNA synthesis. Alcoholosim, preganancy, fish tapeworm infestation, faliure to replicate chromosomes due to lack of the nucletide thymidine and the disrution of intestinal flora due to antibiotic uses are some of the other causes of megaloblastic anemia. (Megaloblastic anemia). Anecdotal evidence suggests that in all cases of megaloblastic anaemia caused by deficiency of Vitamin B12 or folate, the patients will have an elevated MCV and a high HDW (Siemens, 2007). In cases of chemotherapy induced macrocytosis, the patients should have a normal or raised HDW (Siemens, 2007). ... The tests that are used to diagnose megaloblastic anemia primarily are routine tests like a blood test which included both complete blood count (hemoglobin and hemocrit) (Perinicous anemia). Very large oval blood cells and the presence of abnormally shaped neutrophils are indication of megaloblastic anemia. The physician enquires about complete medical history and physical examination, diagnostic procedure for the disorder. The physical exam include: 1) checking for pale or yellowish skin and a red and smooth tongue; 2) Listening of the heart to check the rapid heartbeat or murmur; 3) feeling the abdomen to check the size of the liver. (Pernicous anemia) Vital tests are also done to check the vitamin B12 level, folic acid. Homocysteine is high in anemia due to lack of cobalamin. The level of methymalonic acid is also high in anemia due to lack of vitamin B12 or folate. Other blood tests include the presence of intrinsic factor antibodies and parietal cell antibodies. The levels of bilirubin, potassium or cholesterol in the blood are also confirmed. The serum iron and the iron binding capacity are also checked. Reticulocytes count is also checked to conform if the bone marrow is producing RBCs at a proper rate. The reticulocyte number is low in patients suffering from Pernicious anemia. (Pernicous anemia) A schilling test is one of the very important tests that are being carried out in patients with this disorder. This test is done to detect the vitamin B12 absorption. Cobalamin levels are measured after the ingestion of radioactive Vitamin B12. In a normal scenario, the ileum absorbs more than the body and excreted out in urine but when a patient has megaloblastic anemia, he

Wednesday, February 5, 2020

Slide Presentation, Plastic Bags Assignment Example | Topics and Well Written Essays - 250 words

Slide Presentation, Plastic Bags - Assignment Example The second noteworthy facet was the insurmountable difference in the cost of recycling plastic bags and creating new bags. Jared Blumefeld noted that the cost of recycling is more that 125% the cost of creating new bags. Certainly, the government as well as private individuals cannot maintain the recycling drive for plastic bags at this ridiculous rate. If recycling then is not the answer what is? The third feature emphasizes a glimmer of hope for the stoppage and subsequent eradication of the dangers of the use of plastic. The creators of the presentation suggest that we can stop the use of plastic bags and replace the plastic with cloth. Besides the obvious advantage of being particularly recyclable one individual utilizing one cloth bag can replace the use of 288 plastic bags in one year. Therefore if every member of the population utilized cloth instead of plastic there would be a phenomenal removal of the dangers of plastic consumption in our lives. From the foregoing arguments one can conclude that the continued use of plastic bags are indeed detrimental to our lives as a consequence life as we know it today would be full of poison in the very near future unless we take the bull by the horn and make significant steps to removing the plastic from our daily lives. Thus, consistent with the findings as presented in the power point I recommend a complete 360 degrees turning from the use of plastic bags to a more positive alternative. Like the authors of this presentation I would like to reiterate the use of cloth instead of plastic and an outright ban of its use by the government. The author of this paper believes that in addition to the recommendations already made we as individuals and as a nation can plant trees to not only replenish the earth with positive substances but also to be used as material to create

Monday, January 27, 2020

Components Of A Good Password Computer Science Essay

Components Of A Good Password Computer Science Essay Computer manufacturer and OS developers often build and deliver systems in default modes to secure the system from external attacks. From developers view this is the most efficient mode of product delivery. As per the organisation or a user, they require more protected and secured system before it is placed into service. Security baselines are standards which defines a minimum set of security controls for organisations. Security baselines typically address both technical issues such as software configuration and operational issues such as keeping applications up to date with vendor patches. In the security baselines, if hardware, OS, network and application followed the recommended minimum set of security settings then it will significantly decrease its vulnerability to security threats. The process of securing and preparing the system against the internal and external threats and system vulnerabilities is called hardening. Reduce the main reasons of attack that includes the removal of unnecessary services, software and unnecessary usernames or logins. It makes the system more secure, reliable, efficient and gives optimised performance. 12.2 Password Selection Password selection is one of the critical activities that often get neglected as part of a good security baseline. Currently most systems are protected by a user ID and password. If an attacker discovers the correct user ID and password by guessing or by using freely available password cracker tools, then they can gain access to the system. By following basic guidelines and principles in choosing passwords, the passwords used on the system will protect the assets. 12.2.1 Selecting a Password Users should consider a few basic requirements while choosing the password. Set a minimum number of characters and never accept shorter password. Do not use dictionary words and mix of lowercase and uppercase letters with usually one or two numbers. Randomly created passwords are strong passwords and they are difficult to guess and will defeat most password-cracking utilities. However, randomly generated passwords are difficult to remember and users often write down these passwords usually in a location close to the machine. Thus it defeats the purpose of the password. 12.2.2 Components of a Good Password User should create their own easy to remember passwords. Password is meant to protect access and resources from hackers. It should not be easy for them to guess or crack through password cracking tools. Common guidelines to make the password more difficult to guess or obtain are as follows: It should be at least eight characters long. It should include uppercase and lowercase letters, numbers, special characters or punctuation marks. It should not contain dictionary words. It should not contain the users personal information such as their name, family members name, birth date, pet name, phone number or any other detail that can easily be identified. It should not be the same as the users login name. It should not be the default passwords as supplied by the system vendor such as password, guest, admin and so on. 12.2.3 Password Aging Password aging is technique used by system administrators and it forces the user to change their passwords after specified period of time. If it is not changed within a specific period of time, it expires and must be reset. Password aging can also force a user to keep a password for a certain number of weeks before changing it. Changing passwords periodically will protect against brute-force attacks because when password is changed the attacker must restart the attack from the beginning. If password is changed periodically, an attacker will never be able to cycle through all the possible combinations before the password is changed again. Most operating systems have options that allow system administrators to apply password aging and prevent password reuse. Common guidelines are as follows: User must change their passwords in every 60 to 90 days. A very secured service requires to change passwords every 30 to 45 days. System must remember each users last five to ten passwords and should not allow the user to reuse those passwords. 12.3 Hardening Most computers provide network security features to control outside access to the system. All nonessential softwares such as spyware blockers and antivirus programs prevent malicious software to run on the system. Even with all these security measures, systems are still vulnerable to outside access. System hardening is a step by step process of securely configuring a system to protect it against unauthorised access. It also helps to minimise the security vulnerabilities. The three basic areas of hardening are as follows: Operating system-based hardening It includes information about securing and hardening various operating system. It also includes methods to secure file systems. Network-based hardening It examines the methods and procedures of hardening network devices, services and protocols. Application-based hardening It includes security of client-side user applications and services such as Domain Name Service (DNS), Dynamic Host Configuration Protocol (DHCP) and Web servers. 12.3.1 Operating System-Based Hardening Operating system hardening is the first step towards safeguarding systems from intrusion. Systems received from the vendors have preinstalled development tools and utilities which are beneficial to the new user as well as it also provide back-door access to an organisations systems. Operating system hardening includes the removal of all non essential tools, utilities and other systems administration options through which hackers can easily access the system. Hardening process will ensure that all security features are activated and configured correctly. This process makes the system secure, efficient, reliable and gives optimised performance. Some of the security tips to harden the OS include the following: Disable all unnecessary protocols. Disable all unnecessary services. Disable all unnecessary programs and processes. Verify and then install all vendor patches. Install all product updates. Use vulnerability scanner to identify potential security weaknesses. Configure file system security according to the least privilege rule. Note: Least privilege rule states that, allow access to those individuals who require it and allow only as much access required to complete the task. File System Controlling access to the resources is an important factor in maintaining system security. The most secure environment follows the rule of least privilege. The network administrator receives more complaints from users after following this rule as they are unable to access resources. However, receiving complaints from unauthorised users is more beneficial than suffering access violations that damage the organisations capability to conduct business. The least privileged environment can use the user groups to assign the same access to the resources instead of assigning individual access controls. However, in some cases individual users need more or less access than other group members. To maintain security, network administrator provides greater control over what each user can and cannot access. Updates OS updates are provided by the manufacturer of the specific component. Updates contain improvements to the OS and hence, will make the product more secure, efficient and stable to the users. For example, Microsoft updates are labelled with security updates. These updates address security concerns recognised by Microsoft and install them if required. In addition, updates enhance the capability of a specific function that was underdeveloped at the time the system or application was released. Updates should be thoroughly tested in non-production environments before implementation. Since this new and improved function has more security breaches than the original components, it requires complete testing. Hotfixes, security packs and patches are product updates to resolve a known issue. Hotfixes Hotfixes are components that are designed to fix a particular critical system fault. Hotfixes are created by the vendor when a number of client systems indicate that there is compatibility or functional problem with a manufacturers products used on a particular platform. These are fixes for reported or known problems. Hence, hotfixes should only be installed to correct a specific problem. Service Packs Service packs are collection of updates or hotfixes. It correct known issues and provide drivers, updates and system administration tools that extends product functionality that include enhancements developed after the product is released. Service packs are tested on different hardware and applications to ensure compatibility of existing patches and updates. Service packs must be thoroughly tested and verified in non-production environment before it installed on working systems. Patches Patches are used to prevent hackers from invading the system with virus and other malware that exploits the operating systems vulnerabilities. This improves the usability and performance of the system. OS patches are available on the vendor Website that supplies the product. Since patches are issued at unpredictable intervals, it is important to configure the system to automatically connect with the latest security patch updates. When the new update is released, the OS will prompt to install. While preparing clean installation it is advisable to download and install all known patches before introducing the system to the network. 12.3.2 Network-Based Hardening The tremendous growth of the Internet allows to openly access any system on a network. Hence, proper control over network access must be established on systems by controlling the services that are running and the ports that are opened for network access. In addition to the systems, network devices such as hub, routers, switches and modems must be examined for any security vulnerability. Any flaws in the coding of the OS can be exploited to gain access to the network components. These components should be configured with very strict parameters to maintain network security. The softwares of these components require to be updated regularly. By taking necessary steps, network administrator should limit or reduce attacks, accidental damage through their networks. In addition, network hardening also recommend the correct configuration of network devices and the requirement to enable and disable the services and protocols within a network. Firmware Updates Updating the firmware of the hardware device is provided by the manufacturers. These updates fix incompatibility problems or device operation problems. These updates should be applied if the update includes fixes for an existing condition or if it will make the device more secure and more functional or extends its operational life. It is recommended to install and test the firmware updates in a non-production environment to verify if the update contains the necessary fixes and benefits that are required. Device Configuration Network devices such as routers and switches configured with default installation settings. These default settings leave a system extremely vulnerable as it is set for convenience and not for security. Choosing a good password and limiting access to any open ports is very important in maintaining security of the devices. Good passwords are one of the most effective security tools because a good password can be resistant to several forms of attack. Determining the minimum set of services that the devices are running and good passwords is important for maintaining security of those devices. Apply patches and updates that are released by the product vendor in a regular interval. Enabling and Disabling Services and Protocols It is important to measure the current requirements and conditions of the network and infrastructure and then disable the unnecessary services and protocols. This leads to network infrastructure that is less vulnerable to attack. Access Control Lists Configure access list at the network devices to control access to a network. Access list can prevent certain traffic from entering and exiting a network. Access control lists are controlled by an administrator. 12.3.3 Application-Based Hardening Application hardening is the process to prevent exploitation of various types of vulnerabilities in software application by implementing the latest updates. Applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, File Transfer Protocol (FTP), DNS servers and DHCP servers on a network require regular updates to provide protection against newly developed threats. Web Servers At present most of the organisations have a Web presence on the Internet for numerous business advantages. Due to Internet popularity, Web servers have become extremely popular targets for attackers. Original content on the Websites are replaced with hackers data. E-commerce sites are attacked and users personal account information is stolen. Microsofts Internet Information Server (IIS) or Apache server are most popular Web servers applications in use today. To secure Web servers from hackers, administrator must apply updates and patches, remove unnecessary protocols and services and properly configured all native controls. It is also recommended to place the Web server behind a firewall or a reverse proxy. Microsoft has developed URLScan and IIS Lockdown tools which are designed to secure IIS servers from attacks and exploits. URLScan is a monitoring utility that examines all incoming URLs and rejects any requests for files, directories or services outside the intended scope of the Website. The IIS Lockdown tool turns off unnecessary functions which reduces the attack surface available to an attacker. E-mail Servers E-mail servers and clients are vulnerable to different attacks such as Denial of Service (DoS) attacks, virus attacks, relay and spoofing attacks. There are numerous deficiencies in the different versions of e-mail server software such as Sendmail for Linux and UNIX and the Exchange or Outlook for Microsoft. E-mail servers are constant potential sources of virus attacks and therefore must have the strongest possible protection for scanning incoming and outgoing messages. E-mail servers should not have non-essential services and applications installed. Administrative and system access should also be securely controlled to block installation or execution of unauthorised programs and trojans. The following attack points should be considered while hardening an e-mail server: Open mail relay allows unauthorised users to send e-mail through an e-mail server. Storage limitation, to limit DoS attacks based on message size. Spamming includes identical messages sent to numerous clients by e-mail. Virus propagation, ensure the anti-virus programs and applications are performing correctly. FTP Servers FTP allows number of users to access and download remotely stored data. It distributes application updates, device drivers and free software to users. Users access this data anonymously. This anonymous access to FTP servers becomes a problem as administrator does not provide anonymous access or does not properly secure the FTP service. This involves setting the appropriate permissions, not allowing the FTP process to be run by an unprivileged user and not allowing users to upload or modify files. Some FTP servers allow upload and download service for authorised users and hence, in that case anonymous access should be completely removed. To overcome buffer overflow problem ensure that FTP server software is up to date and patched. DNS Servers DNS server converts systems host names into IP addresses so that the communication can be correctly routed through the network. Client systems use DNS to locate Web servers, e-mail servers, FTP servers and number of other servers and network services. DNS can be major target for an attacker. The DNS server can be exploited by the following ways: Stealing zone transfers DNS servers are configured to provide information such as list of hosts and routers with IP addresses to other secondary DNS servers. This secondary DNS server is used to maintain a backup copy of the DNS database and to provide name resolution services for client systems. An attacker can receive a zone transfer and use it to track victims network and search for potential targets. Zone update spoofing An attacker can spoof the address of the primary DNS server and send a bogus update to a secondary DNS server. Client systems receive incorrect information and network communication from this bogus server and redirects users to a location controlled by the attacker. DNS cache poisoning Some DNS servers allow attackers to insert bogus information into a DNS cache. To secure and harden the DNS server from various types of exploits, actions to be taken are as follows: Do not place any information on publicly accessible DNS server to avoid snooping around the DNS server. Do not provide additional host information in Host Information (HINFO) records of DNS. HINFO record contains descriptive information about the OS and features of particular system and attacker could use this information to gain access. Configure the DNS servers to only allow zone transfers to specific secondary servers. Berkeley Internet Name Domain (BIND) allows zone transfer to be signed. Zone transfer signing allows secondary servers to verify the credentials of the primary server before accepting data. Ensure that DNS software is patched and up to date to avoid DNS cache poisoning. NNTP Servers Network News Transfer Protocol (NNTP) servers allow news clients to connect to news servers to share information privately or to post articles to a public NNTP server. NNTP servers are vulnerable to DoS attacks, buffer overflows. To exploit server, attackers connect to a private NNTP server to gain any information to compromise network. Sometimes users post accurate diagrams of their network to ask a technical question and attacker can use this information to find ways to exploit a network. They can even offer bogus advice to create a hole in the networks defences. To protect the organisation from NNTP server exploits, block the NNTP port at the firewall to make NNTP server inaccessible to external users. To protect posted private information, authenticate user to prevent anonymous logins to the NNTP server. Also encrypt communications using SSL/TLS to prevent packet sniffing of confidential data. Do not allow users to post confidential information to the public which will compromise their network. File and Print Servers Files and print servers in a network are used to share resources but it is a common way in which hackers can gain information and unauthorised access. When sharing is enabled to share the resources with a trusted internal network over a NIC, the system is also sharing those resources with the entire untrusted external network over the external interface connection. Attackers attempt to make unauthenticated connections to shared resources on the network. If sharing permissions are configured incorrectly for an easily exploited user account, attackers can gain access to resources and alter them. To secure the file and printer shares block access to shares and related information at the firewall. Use the rule of least privilege to secure shares from external attacker. Virtual Private Network (VPN) is also used to encrypt communications between clients and servers to secure data transmission. Data Repositories Data repositories are locations that hold information about networks, applications and users. Attackers can use the information stored in data repositories to formulate attacks against organisation. Hence, ensure that this information is limited and restricted for external users. As well as authentication and encryption of the data is necessary to protect them from external attacks. Directory Services A directory service is used to store, organise and provide access to information in a directory. The information in a directory services can include system accounts, user accounts, mail accounts, service locations and shared resource information. The Lightweight Directory Access Protocol (LDAP) is a common directory service that organises data in a hierarchical manner. The top entry in a LDAP directory information tree is called root and this LDAP root server creates the hierarchy. The directory service hierarchy and the information it stores provide a good map of network infrastructure. This is convenient for authorised users in a network as well as for attacker. Attacker can use numerous ways to compromise LDAP servers such as attacker can use network resources information stored at directory service to examine network structure, resources and potential targets. Attacker can gain victims network information that is transferred over LDAP through eavesdropping. Some of the ways to protect LDAP hierarchy are as follows: Protect LDAP hierarchy by configuring the strongest authentication to the different versions of LDAP. Both LADP v2 and LDAP v3 support anonymous and simple authentication which are not very secure. Anonymous authentication does not require password and simple authentication uses a password in unencrypted format which attacker can easily hack. Strong authentication over LDAP v2 and LDAP v3 is provided through Kerberos version 4 authentication and Simple Authentication and Security Layer (SASL) communications respectively. Use Secure LDAP (LDAPS) that allows encrypting communications using SSL/TLS. Block access to LDAP ports from the Internet so that attackers cannot make connections using these ports. Databases Database servers are used to store data. Both the data and the database server can be target for an attacker. An attacker can steal the data or take over the database server to exploit it. Some of the ways that the database servers can be exploited are as follows: Unexpected data queries or commands Numerous database servers use Structured Query Language (SQL) which allows for the querying and posting of data. An attacker can use SQL commands to do unexpected things is called SQL injection. Unauthenticated access If unauthenticated access to database server is allowed then the attackers can easily connect and exploit the database server. To secure database servers consider the following points: Test the database by running irrelevant queries and attempt to access unauthorised information. Do not allow unauthenticated connections to the database server. While transferring confidential data to and from database server, use SSL/TLS or VPN connection to protect data. To avoid database server to be queried by external users, block access to it at the firewall. 12.4 Chapter Review Questions 1. How an individual should secure a password? (A) Selecting a password with at least eight characters, at least one change in case and at least one number or special character (C) Storing the password in wallet or purse (B) Using the same password on every system (D) Changing passwords at least once a year Ans: A 2. Which of the following steps is part of the hardening process for OS? (A) Remove unnecessary programs and processes (C) Setting appropriate permissions on files (B) Disable unnecessary services (D) All of these Ans: D 3. Which amongst the following is the correct step to overcome buffer overflow problems? (A) Select strong passwords (C) Install the latest patches (B) Remove sample files (D) Set appropriate permissions on files Ans: C 4. Which of the following requires software up to date and patched? (A) Operating systems (C) Applications (B) Network devices (D) All of these Ans: D 5. Rule of least privilege states that ____. (A) allow access to users who requires it (C) allow limited access (B) allow access to everyone (D) allow full access Ans: A and C 6. Which of the following is designed to fix a particular critical system fault? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: A 7. Which of the following extends product functionality after the release of product? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: B 8. Which of the following fixes incompatibility problems or device operation problems? (A) Hotfixes (C) Firmware update (B) Service packs (D) None of these Ans: C 9. Which of the following steps are used to secure Web servers? (A) Apply patches and updates (C) Place the web server behind a firewall (B) Remove unnecessary protocols and services (D) All of these Ans: D 10. BIND stands for _______. (A) Berkeley Internet Network Domain (C) Berkeley Intranet Name Domain (B) Berkeley Internet Name Domain (D) Business Internet Network Domain Ans: B 12.4.1 Answers 1. A 2. D 3. C 4. D 5. A and C 6. A 7. B 8. C 9. D 10. B Summary In the chapter, Security Baselines, you learnt about: Components of a good password and password aging. Different ways to harden the OS. Different ways to harden the network and its devices. Different ways to harden applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, E-mail servers, FTP servers, DNS servers, NNTP servers, file and print servers, directory services and databases.

Sunday, January 19, 2020

Essay --

Latin American countries should provide free birth control devices to all its citizens. Giving free birth control devices will cause a cascade effect that will help these countries that are in poverty. Since many of these Latin American countries are in poverty such as Brazil, Colombia and Guatemala it will make these countries have less deaths, crime and drug trafficking. In many of these countries there are huge amounts of drug trafficking and gang violence happening in these same countries that have a huge poverty and high amount of children born. Since many of these children are born with poverty they struggle to eat. Providing birth control devices for the Latin American countries would allow a lesser birth rate in these countries allowing these family to afford a living rather than having to survive whether it be legal or not. Since these countries are not providing birth control devices there is a high birth rate that far exceeds the income that one can provide. However there are many different ways that are birth control such as pills, condoms, etc.; since none of these devi...

Saturday, January 11, 2020

Part a Critical Analysis of Project Management Plan

Part A Critical Analysis of Project Management Plan Executive Summary Table of Contents 1 Introduction This report will present the critical analysis about humanities financial services review project management plan. The purpose of the report is to apply the different theories and ideas regarding the project management plan. The main purpose of the critical analysis is to critique as well as evaluate somebody’s work based on the opinion, idea and perspective of someone. It is an academic report that contains a description of the project plan (part B) as well as its content.This report will also express the opinion of the author with regards to the different part of the project management plan that has chosen. It will analyze the whole project plan by breaking down the project into parts and then studying and evaluating each and every part using the support and help of different references from different books, journals and other related studies. This report will also show the importance of a project plan and who will be benefited from its use and implementation. The structure of the report will follow the structure of the chosen project plan.It will individually analyze the different part or aspect of the project plan based on the project management body of knowledge. The main focus of the report is to give analysis about the different important aspect of the project management plan such as the time or schedule, money or cost, human resource or work breakdown structure as well as different risk that can be encountered by the project during the implementation of the plan. 2 Project Background 2. 1 Information about the Work 2. 1. 1 Title: Humanities Financial Services Review Project Management Plan . 1. 2 Author: Craig Medley 2. 1. 3 Publication Information: Project Id HUM-PR-P1, v. 04 Draft, August 30, 2007, from http://edo. humanities. curtin. edu. au/pdf/Project_Managem ent_Plan_2007. pdf 2. 2 Project Description The chosen document focuses on the pla n for the management of the humanities financial services review project. It was written in order to show or review the different areas or aspects of the newly implemented new transactional systems in November 2007, with an upgrade to the finance one to the Concur and BPI in Humanities only.It can help to know the different processes and flow of data and information of its accounting and purchasing transactions across each and every division (Medley 2007, p. 4). The Faculty of the Humanities of the Curtin University of the Technology offers different courses in Media, Communications, Built Environment, Art and Design, Education, Languages, Human Services as well as Social Sciences. All f the said courses are only few of the courses that the said department of the Curtin University is offering (Faculty of Humanities 2008).The project plan focuses on the implementation of the finance and accounting system of the department that focuses on the needs of the users of the system like invo icing, ordering, approving, reconciling, access to the system, structure of the outputs, skills and request and access for the different outputs (Medley 2007, p. 4). The project management plan will help the current system to improve its operations and increase the security that will eventually help to meet the demands and needs of the different stakeholders or users. Structure and contents of the Project Plan 3. 1 Project Management Plan and Its Purpose 3. 1. 1 What is Project Plan? Project management plan or simply project plan is a document that corresponds to the overall purposes or objectives, responsibilities, resource requirements and agenda for the project (Baker & Baker 2003, p. 29). It is considered as more than a playbook that determine what are the different works or task that are need to done and accomplish (Phillips 2004, p. 32). It is a fluid document that controls the following elements: Provide structure – project plan is developed in order to present a struc ture or composition in order to get the project to its completion. It must be methodical and systematical but brief and short, compilation of different documents that serves as a point of references in the course of the project implementation (Phillips 2004, p. 32). ? Provide Documentation – documented project plan is needed in order for the project to be a successful one. This is due to the fact that it must present historical references and the different reasons behind the decisions that have been made (Phillips 2004, p. 32). Provide Baselines – a project plan includes a number of baselines. As the project shift towards the finishing point, the management together with the stakeholders and the project managers can use the project plan in order to see what was predicted for the costs, schedules, qualities and scopes – and compare it to the present condition (Phillips 2004, p. 32). Project plan is the output or result of the planning phase that confines the diff erent information that has been observed and fulfilled with the team and lays out the different activities and processes about how the project will be carried out.It also represents the projected reality (Martin & Tate 2001, p. 155). 3. 1. 2 Purposes and Importance of the Project Plan The major function of the project plan is to provide a step-by-step insight into what it takes in order to satisfy the requirements or the needs of the system (Frame 2002, p. 97). An inclusive and fittingly comprehensive project plan is essential to a successful completion of any project. It can help to direct the project itself.Without the aid or help of a project plan, it will hard and even impossible to lead a group to carry out their different responsibilities in order achieves their common goal (Baker & Baker 2003, p. 29). It is a directing document of the project management that serves up as a storage area for all of the supplementary plans. It is a guiding document for the project and it’ s intrinsically needs to replicate all of the information that is critical or crucial to the project manager, project team, customer as well as management sponsor. It offers broad direction as to the cost, schedule and requirements baselines.In its thorough and comprehensive form, it provides much more exact and precise guidance on the nature of the components of the different supporting plans (Pritchard 2004, p. 100). 3. 2 Stakeholder of the Humanities Financial Services Review Project Management Plan The main audience or target of the humanities of the financial services review project management are the higher officials who are involved in the overall process and management of the different financial and accounting activities in the humanities department of the   Curtin University of the Technology.The plan will focus on the review of the different areas of the current system of the humanities of the Curtin University of the Technology such as the different internal process flo ws such as invoicing, ordering, approving as well as reconciling; the number of the people or the user that can access the systems of the Concur and the Finance One; the structure of the invoicing as well as procurement function as well as the different responsibilities and functions of each and every users; the different skills of every users; the different uses and what they are used for such as the request for the Curtin tax invoice and its different uses and the different types of transactions that are involved with the credit card or purchase request (Medley 2007, p. 4).All of the said information together with other result of the review will be helpful for the management in order for them to improve the current system of the Humanities department that will ensure competitive advantage for their part because it can make the life of their stakeholders a lot easier. It can also help them to excel in their different operations as well as to ensure or add their financial security. 3. 3 Structure of   Ã‚  Ã‚  Ã‚  Ã‚   the Humanities Financial Services Review Project Management Plan 3. 4 Different Sections of the Humanities Financial Services Review Project Management Plan 4 Conclusions 5 Recommendations Part B Humanities Financial Services Review Project Management Plan 1 Introduction 1. 1 About this Document This document provides a plan for the management of the Humanities Financial Services Review Project. 1. 2 BackgroundNew transactional systems and processes have been implemented recently, being Concur and BPI (Humanities only) with an upgrade to Finance One to occur in November 2007. In addition, the Division is looking at ways in which to best undertake support activities including purchasing and accounting to ensure that efficiencies are obtained. A Financial Services Office is already operational and undertakes some financial processes i. e. electronic processing of credit card transactions. Based on the above, it is now timely to review current sys tems, processes and structures which accounting and purchasing transactions operate under across the Division.The areas that would be reviewed include but are not limited to; internal process flows (including invoicing, ordering, approving and reconciling), the number of people with access to systems (both Concur and Finance One), the structure of the invoicing and procurement function (who does what), skills, and how systems are used and what they are used for (e. g. request for Curtin tax invoice, what are allonges used for, what type of transactions are going through credit cards / purchase request). 1. 3 Project Sponsor The Project Sponsor is Ken McCluskey 1. 4 Project Manager The Project Manager is Craig Medley. 1. 5 Project Team The Project team is comprised of Raymond Seah and Craig Medley 1. 6 Key StakeholdersThe key stakeholders (Humanities only) of this project include: Executive Dean Deans Review Panel 2 Project Scope 2. 1 Strategic Link This project specifically contribu tes towards to the following strategic objective(s):  §Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Excellence in operations  §Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Financial security 2. 2 Project Benefits The expected benefits and impacts of the project deliverables are: ? Improved definition and understanding of the role / scope of work of the Financial Service Office in Humanities, ? Roadmap and high level implementation plan for the agreed changes, ? Improved efficiencies and effectiveness of processes within Humanities through standardization and centralization where identified, Potential cost savings and risk reduction in procurement and credit cards processes / systems. 2. 3 Project Deliverables The project’s key deliverables are: Document / s covering: ? Matrix of processes and systems under Humanities Financial Services Office and respective Teaching Areas, ? Services identified for improvement via end to end processing / procurement arrangements / invoicing, ? Recommended proces s flow for identified services, ? List of service deliverables (with the resource requirement) of the Humanities Financial Services Office, ? Policies to support recommended services, ? High level implementation plan 2. 4 Out of Scope The following items are considered out of the scope: ? Implementation of recommendations Expenditure incurred whilst traveling (this may be included at a later date) 2. 5 Work Breakdown Structure (WBS) The project tasks to produce the project deliverables are listed in the Gantt chart at Appendix B1. 2. 6 Constraints The following key project constraints were identified: ? Availability and willingness of staff to contribute ? Data quality 2. 7 Assumptions The following key assumptions influenced the development of this Project Management Plan: ? All staff will be available as required 3 Project Time Schedule 3. 1 Schedule The detailed project schedule is provided in the Gantt chart at Appendix B1 4 Project Costs 4. 1 Budget summary The budget breakdown is summarized as follows: Resource Type |Total Cost ($) |Hours | |Human resources |$30,000 | |Equipment and products | |Consumables | |Totals |$30,000 | |   |   |   |   | The Communication Plan examines the key contacts, frequency of communications, and communication medium to be deployed.It is used to ensure adequate consideration has been given to consultation and information dissemination. It is attached as Appendix D. 5 Project Accountabilities 5. 1 Project Organizational Chart The Project Organizational Chart provides a visual representation of the project team and project reporting structure. It is attached as Appendix B. 5. 2 Responsibility Assignment Matrix The Responsibility Assignment Matrix outlines responsibilities allocated to individuals for each task. It is attached as Appendix C. 5. 3 Project Sponsor The roles and responsibilities of the Project Sponsor include: Responsibility to senior management for the project;Endorsing this document to confirm that proj ect scope and deliverables are correct; Approving changes to scope, schedule, and quality; Reviewing progress and providing strategic direction; Resolving issues beyond the Project Manager’s authority; Providing the resources and sponsorship for the project; and Examining the project at completion2 and completing a Project Sign-off form. 5. 4 Project Manager The roles and responsibilities of the Project Manager include: Managing the day-to-day operations of the project to ensure the project deliverables are produced to scope, schedule, and quality; Monitoring and controlling the Project Management Plan;Providing status reports to the Project Sponsor; Leading the project teams to meet the project objectives; Undertaking the tasks assigned, as specified in the Responsibility Assignment Matrix (refer Appendix C); and Consulting with the Project Sponsor and key stakeholders to maintain communications and keep parties up to date on project progress. 6 Communications Plan 6. 1 Plan The Communication Plan examines the key contacts, frequency of communications, and communication medium to be deployed. It is used to ensure adequate consideration has been given to consultation and information dissemination. It is attached as Appendix B4. 7 Risk Management Plan 7. 1 Risk AssessmentThe Risk Management Plan, attached as Appendix B5, examines risks, rates those risks and identifies potential treatment strategies. 8 Project Control 8. 1 Progress Reporting The Project Management Plan will be controlled on a regular basis, by means of completing Project Status Report to the Project Sponsor on a fortnightly basis. The key elements are scope, schedule, and risk, with the control process comprising: †¢ Monitoring and measuring performance; †¢ Comparing performance to this plan; †¢ Reporting on deviations and issues; and †¢ Taking corrective action (where necessary). 8. 2 Change Management Any proposed changes to the scope or quality will be processed as follows: Proposed changes will be evaluated on the basis of their impact on the project process and outcome, and in light of reasonable alternatives; ? Proposed changes will be formally recorded on a Project Change Control report and submitted to the Project Sponsor; ? The Project Sponsor will review proposed changes, and either accept or reject them; and ? Accepted changes will be communicated to all concerned stakeholders, and project documentation will be amended accordingly. Appendices Appendix A1 Project Management Areas of Knowledge and Its Process ? Appendix B1 Task, Schedule & Gantt Chart Adapted from (PMI Standards & Duncan 1996, p. 7) Appendix B1 Timeline/ Gantt Chart Appendix B2 Project Organizational Chart Appendix B3 – Responsibility Assignment Matrix ID |WBS TASKS |Project |Team Member |Review Committee |Sponsor | | | |Manager | | | | | | |Craig |Raymond |Ken |   | |1 |Policy review |R |I |N |I | |2 |Purchase to Pay Stream |R |I |N, C |A | |2. 1 |Data analysi s |R |I |N, C |C | |2. 2 |Data modelling |R |I |N |N | |3 |Invoicing Stream |N, I |R |I, C |I, C | |3. |Invoice profiling |N, I |R |N |N | |3. 2 |Develop process documentation |N, I |R |N |N | |3. 3 |Present P2P and Invoice data |R |I |N |N | |4 |Interviews |R |I |I, C |C | |4. 1 |Define questions |R |R |C |I | |4. 2 |Agree on questions |R |I |C |A | |4. |Conduct interviews |R |R |I, C |N | |4. 4 |Collate information |R |I |N |N | |4. 5 |Develop activity lists / |R |R |I |N | | |matrices | | | | | |4. 6 |Develop process maps |R |R |N |N | |4. 7 |Review process maps with users|R |R |I |I | |4. |Present findings |R |I |N |C, I | |5 |Recommendations development |R |R |I |I, A | |5. 1 |Analyze prior findings |R |I |N |N, I | |5. 2 |Brainstorm options |R |I |I |I | |5. 3 |Develop recommendations |R |I |I |I | |5. 4 |Review recommendations |R |I |I |I | |5. 5 |Finalize ecommendations |R |I |A |A | |   | |LEGEND | |R – Responsible for executing activity A – Approval author ity | |I – Provides input C – Consulted | |N – Notified | APPENDIX B4 – Communication Plan Stakeholder |Information To Be Communicated|Frequency |Medium |Responsible |Timing | |Faculty/Area Administration staff affected by this review | |Review Panel |Request for feedback on the |Once before the |Meeting |Project Sponsor, |31st August | | |draft project plan and |project is | |Chair of panel & | | | |outlining next steps |officially kicked| |Project Manager | | | | |off | | | | |Executive Dean |Presentation of the draft |Once before the |Meeting |Project Sponsor and |Beginning of Sept 07 | | |project plan. The purpose of |project is | |Project manager | | | |the project; next stage on |officially | | | | | |from previous financial |kicked-off | | | | |services review project | | | | | | |looking at financial | | | | | | |transactional processes & | | | | | | |where these could be improved | | | | | | |& additional services that may| | | | | | |then res ide within the | | | | | | |division’s financial Services | | | | | | |office in the future. | | | | | |Representative from |Outline of Humanities |Prior to project |Meeting & Emails |Project Sponsor and |1st meeting end of August | |Price Waterhouse looking|Financial Services Review |kick-off | |Project Manager | | |at standardization of |project and the Project Team’s| | | | | |processes & systems |approach.Also to gain input | | | | | |across the organization |into the project depending on | | | | | | |some of the objectives that | | | | | | |Price Waterhouse have been | | | | | | |tasked with. | | | | | |Executive Dean and Deans|Kick-off Project, Project plan|At start of Presentation at HMB |Project Sponsor & |10th Sept | | |- main project objectives, |Project | |Project Manager | | | |communications plan, risks & | | | | | | |key areas being covered in the| | | | | | |project | | | | | |Project Sponsor |Project Status updates – |Fortnightly |Meeting |Projec t Manager |Starting 5th September | | |activities, key findings and | | | | | | |issues | | | | | |Financial Services |Introduce the new Associate |Once |Meeting |Project Sponsor, |Approx 3rd week in Sept | | |Director Transaction services | | |Project Team, & | | | |to the project and go through | | |Chair of Review | | | |project plan & request his | | |Committee | | | |involvement on the review | | | | | | |committee | | | | | |Review Committee |Introduction of the new |One of three |Committee meeting |Chair of Review |Towards end of September | | |Associate Director Transaction| | |Committee & Project | | | |services to the review | | |Manager | | | committee as a new member, | | | | | | |Also Summarization of | | | | | | |activities, findings at end of| | | | | | |Purchase to Pay Stream Phase | | | | | | |plus next steps | | | | | |Faculty/Area |General communication to staff|One of three |One on One meetings |Review Panel Members|Towards end of Sept | |Administration staff |in their area about the 1st | | | | | |affected by this review |phase i. e.P2P & Invoicing | | | | | | |quantitative analysis | | | | | |Review Committee |Summarization of activities, |Two of Three |Committee meeting |Project Manager |Towards end of October | | |findings at end of Invoice | | | | | | |Phase plus next steps | | | | | |Faculty/Area |General communication to staff|Two of Three |One on One meetings |Review Panel Members|Towards end of October | |Administration staff |in their area about the 2nd | | | | | |affected by this review |phase i. e. Interviews | | | | | |Review Committee |Review of draft |Three of Three |Committee meeting |Project Manager |Mid November | | |recommendations and gather | | | | | |feedback for inclusion in | | | | | | |final report | | | | | |Faculty/Area |General communication to staff|Two of Three |One on One meetings |Review Panel Members|Mid November | |Administration staff |in their area about the | | | | | |affected by this review |‘draf t’ recommendations | | | | | |Executive Dean and Deans|Project Outcomes and |Conclusion |Presentation at HMB |Project Sponsor and |Early December | | |Recommendations | | |Manager | | Appendix B5 Communication Plan Calendar *Note – Meeting dates with exception of HMB are indicative and subject to change Appendix B6 Risk Management Plan Legend for the Risk Management Plan Defining Likelihood Ratings The following table outlines the definition of likelihood rating as applied to the risk assessment. Descriptor |Definition | |Almost certain |Expected to occur in most circumstances | |Likely |Will probably occur in most circumstances | |Possible |Might occur at some time | |Unlikely |Could occur at some time | |Rare |May only occur in exceptional circumstances | Defining Consequence Ratings The following table outlines the definition of consequence rating as applied to the risk assessment. Consequence |Project Consequence | |Catastrophic |Unacceptable effect on project ob jectives | |Major |Major effects on project objectives, requiring significant effort to rectify. | |Moderate |Moderate effects on project objectives, requiring management effort to rectify | |Minor |Some difficulties experienced, but these are easily managed. | |Insignificant |No noticeable effect on project management objectives | Defining Risk Rankings The following table outlines the definition of risk categorizes, determined by combining the likelihood and consequence of a risk. RISK FACTOR |Insignificant |Minor |Moderate |Major |Catastrophic | |Almost |Low |High |High |Extreme |Extreme | |certain | | | | | | |Likely |Low |Moderate |High |Extreme |Extreme | |Possible |Low |Moderate |High |High |Extreme | |Unlikely |Low |Low |Moderate |High |High | |Rare |Low |Low |Low |Moderate |High |