Saturday, August 31, 2019

Analysis of the Unforgiven

Analysis of Unforgiven Brenda J. Thompson ENG 225: Introduction to Film Nathaniel Millard October 5, 2009 Summary While the movie Unforgiven (1992) directed and starring Clint Eastwood, as William Munny, is in the genre of a western in the late 1800’s. It has a basic theme that we are still making movies about today, justice and what is acceptable and what is not acceptable in our search for it. It is a story of a journey that one man has to make in order for him to care for his children but it ends up being so much more of a journey than he anticipates. This movie is the ultimate of good versus evil on a couple of different levels. It is good guy versus bad guy and it is the evil within fighting the good within and the constant battles that both of these different levels bring to the main character and the other characters of this film. Does justice prevail in this film? Level of Ambition This movie’s level of ambition was that of a typical Clint Eastwood film, straightforward, deep and controversial. Clint Eastwood is known through his characters as the hard, smart talking, no nonsense, afraid of nothing type casted actor and so his films that are directed by him bring a whole new level to that type of character. He brings the softer side to these characters that we do not expect to see. He reveals the inner dilemma within his character to show that just because someone has done some really horrible things in their lives that does not mean that they do not have internal struggles between what is right and what is wrong. The consciousness of the guilt, the validation, and the justification of what he is doing, eats at him and his inner struggles that come with knowing what he has done but seems to diminish over the length of the movie. It seems to get easier for him to accept what needs to be done and just does it even though he no longer wants to do it. Thematic Elements The central idea of this film is injustice and what can happen when an injustice is made right in the eye of the beholder. This movie had hit on several different perspectives regarding its focus and was dependent upon which character it was highlighting at the time. One of those perspectives being from that of the main character William and his constant battle within himself to stay true to his goodness and not to allow the old evil side out. Another perspective is that of the working women who just want to be respected and not feel as though they are personal property. The Sheriff, Little Bill, who was played by Gene Hackman had of course another perspective on the whole situation which was to play off the entire ordeal by fining the two culprits instead of arresting them. With that being said, this film covered several categories regarding a central idea and subordinate ideas. Although I found injustice to be the central idea, I also felt that there were other categories that were touched on. Truth of human nature (Boggs & Petrie, 2008, pg. 26) and how even though this took place in 1880 you could still feel the injustice today and feel those feelings that were portrayed by the characters wanting to make this right although not all the characters wanted to make it right for the same reasons. The social problems that were in this film, which were the crimes against women, social acceptance and the draw that money has always and forever will have on us as a society are still prevalent today therefore we can understand and appreciate what is happening. We know now as a society that we cannot take the law into our own hands but in 1880 it was prevalent and more acceptable therefore we can relate as maybe we wish he could sometimes take the law into our own hands and make an injustice right when one has been wronged. Setting and Set Design The filming took place in the wilderness of Alberta, Canada and one scene (the train scene) in California. The majority of the scenes were either out in the wilderness or within the small town of Big Whiskey’s saloon and the adjacent main street during the fall and winter season of 1880. The buildings were dark, small and gloomy on the inside and due to the fact that the majority of the movie took place in the nighttime hours and it was stormy more than not, the outside was just as gloomy as the inside. The lighting was minimal as it would have been back then bringing mood with it. The foreshadowing of the stormy weather worked in making this movie what it was, the rain seemed to let you know when something was coming. As much as the wilderness scenery was beautiful, I found it downplayed by the drab colors of the costumes and the non use of color throughout the entire film. It seemed as though the only time color was used was determined by what that particular scene was about. For instance, as English Bob came into town the only item of color was the drab red of the stagecoach, so we knew whoever was in that stagecoach was going to become an important character to a scene coming up, everything else was a muted earth tone of tan, brown, green and blue. As stated in our text a director may simply let their settings just be a backdrop and let the action of that scene take over. (Boggs & Petrie, 2008, pg. 74) This was exactly how this movie was told; it focused on the story instead of glamorizing it with colorful costumes and scenery. We needed to see the drabness of the subject in the muted colors of the movie. Another scene that showed a pop of color was that of William (Eastwood) and Ned (Freeman) were having a conversation where William was trying to make himself and his friend believe that he was no longer an evil person, he no longer drank and no long er killed and at that point their horses walked past some very bright yellow colored trees which just brought a sense of hopefulness to that section of the movie. As if by justifying his goodness it truly made him a good man, the validation from his friend was needed by him as a reminder that he really was a good man, that this couldn’t make him a bad man again because he had been good for so long. Sound and Score The first scene of the movie was that of William Munny in the distance tending to his farming as the sun set on the other side of him. The only sound at that time was that of a very soft playing guitar that had the feeling of a ballad, soft and gentle. For the remainder of the movie the sound and scores were very minimal. Natural outdoor sounds, animals, the breeze, rain were the sounds heard most of the time. Music was minimal and was used for dramatic pauses when no words were necessary and the message needed to sink in or to build up to an upcoming scene. The softness of the music was calming and not too overbearing especially in the action parts of the movie when some directors scream music. Clint Eastwood in this movie chose to use music to â€Å"reinforce the rhythms of the action† (Boggs & Petrie, 2008, pg. 375) instead of making it a priority. He used music the same way he used his colors. I found that during the soft reflective moments of the movie that the music was that of a sole guitar or very soft music and when it involved a little more action an orchestra was involved. The most profound sound of all was that of the rain. Depending upon the message coming through made the difference between how hard it was raining and how loud it was heard. Not only was the rain foreshadowing but also the sound of the thunder and lightning that was used. It was letting us know that something was coming, something was going to happen and it was an integral part of the film. Casting and Acting Performances As it is explained in (Boggs & Petrie, 2008, Introduction to Film) â€Å"In the choice of actors, one director may take the safe, sure way by casting established stars in roles very similar to roles they have played before. † Clint Eastwood is well known for his hardened characters and his experience in westerns. I could not imagine any other actor portraying William Munny. Clint Eastwood brings to the table a hardened character that transforms himself from an uncaring murderer to a loving husband and father back to his hardened man that has to make justice where there was none. Little Bill (Hackman) was a typical sheriff of the time where he laid that law with an iron fist and was going to lay that law any way that he could. In the film you want to believe that Little Bill is one of the good guys but in the end he is no better than the men he was trying to run off. In one scene Hackman was explaining that he did not like men of no character or assassins but in true life really was no better than them but justified it to himself with his badge. Morgan Freeman played Ned, William Munny’s old partner in crime. He had also retired from the killing fields and was now a farmer married to his Indian wife, Sally Two Trees. Ned truly believed he could help his old partner but by the end of the film had realized that he could no longer kill someone and chose to return to his wife but not before being captured by Little Bill’s crew and ultimately killed. Freeman brings a sense of calmness, stability and outright warmth to the film and breaks up the stark harshness of William Munny’s character and the haracter of Scolfield Kid, played by Jaimz Woolvett, a young man looking to make some money but has no experience with that of a paid assassin or of life experiences in general. He was a simple character but one that grew throughout the film to make a realization that his view point on a glorified act has sharply turned and took another route. As the characters seem to complement each other and all of the actors seemed to fit each character to a tee, there are not too many actors in my m ind that could have lived up to the actors that were chosen for these roles. I found one character flat but only because she was written that way, I do not blame the actress as I think she did a great job, it was the character as a whole. Screenplay and Narrative Structure Clint Eastwood, as the director, chose to tell this story very simply by filling the audience in with a written narrative in the first scene. It tells you about the main character prior to this time in his life without taking up more time than was needed. It was straightforward and simple. It was not told through any one character but you could feel the story through each of the characters it was focusing on in that scene. As there is no way of knowing how the screenplay was written it is hard to tell if Eastwood followed what the screenwriter had envisioned or what he envisioned but for what it is worth, Eastwood brought himself to this film in a way that shows not only the hard side of a prior life of killing but the softer side of a man that chose the good of a woman and wanting to please her. There is also a narrative at the end of the film that lets us know that William Munny chose in the end, his children and his wife’s goodness. He chose to leave and moved himself and children to Los Angeles and works productively in dry goods. We know that not only did he make it through that darkness but came full circle twice. He started out killing, bettered himself with the help of his late wife, killed again when his friend was killed because of the act that he committed and then went back to the goodness when he felt as though justice had been served. Once his friend was killed and he took a drink of the alcohol, he lost himself in his old ways as the anger and guilt came bubbling out. Once he felt as though he had righted a wrong, he took his children away from all of the bad and started anew. Objective Evaluation Overall this film was successful in bringing to an audience a western drama with compassion, with ignorance, with greed, with honesty. It showed the softer side of a killer, one side we don’t normally see in a film, we saw the journey of a man trying to find who he is without being defined as an assassin and the struggles within that journey. By suppressing the colors and tones of the film and leaving the lighting at a minimal it really focuses on the feelings and the story as a whole. It wasn’t about the actions but about how people react to certain situations (especially when information is misconstrued) for an example, this all started by a whore getting cut in the face but by the time the information was received by William Munny, the crime had more than doubled in severity. If the story of the cutting had stayed true would this story ever had happened? Would the characters have wanted to kill those men if they had known she still had her fingers and such? Maybe that was what William Munny’s inner struggle was about once he had met the cut woman. The story was easy to follow and William Munny’s character was easy to like, he had been trying to live right for 11 years but when he realized he couldn’t provide for his children because the pigs were getting sick, he had to resort to what he knew he was good at. Only problem was that he found that he was extremely rusty at it, from his shooting skills to his eyesight, he wasn’t the same at it and it didn’t feel good to do. The emotions in this film were portrayed wonderfully from Alice the fiery working girl to the laid back calm character of Ned. You could feel their emotions and understand them and connect with them as people. Final Analysis In closing, the movie Unforgiven was a great movie filled with emotion and heroism. Although this movie was about injustice and human nature, it was also about healing, renewing and hope. As gloomy as the subject matter was, it was also about hope and realizing that no matter what you have done in the past you can make a choice or choices and make a new life that doesn’t have to involve criminal behavior. People like to think that justice always prevails so this movie provides that. It provides justice for the girls but at the same time caused a ripple effect and they got more than what they had bargained for, not expecting as much bloodshed as this one incident had caused. Clint Eastwood and the other cast members made this story a believable one. Not only is Munny (Eastwood) a somewhat cold type of character you end up seeing sides to him that make you like him as a person. Not only are we willing to forgive his past, we want to see him succeed whereas Little Bill (Hackman) was in a position of superiority and used it to intimidate and manipulate his way of running things. I found this character to be arrogant which showed when in building his home, asked no one to help him. Clearly it was needed. The only character I found to be flat was that of Delilah (Anna Levine), victim of the cutting. I can understand that her character might be a little timid after the ordeal but found her to be flat throughout the rest of the film and wish she had more of an impact. Overall this movie was a nice movie to watch. Not only was it easy to follow it made you want to continue watching to see what happens. The characters are believable and the storyline tells an entire story. The use of muted colors and natural sounds lent to the mood and tone of the entire movie. The focus is of the story neither the scenery nor the costumes but was strong enough to stand on its own without going over the top. Not only was this film a western but a drama as well, great for men and women as it touches emotions and evokes emotions on both sides of the gender box. References Boggs, J. , & Petrie, D. (2008). The Art of Watching Films (7th Ed. ) with tutorial CD-ROM. Mountain View, CA: Mayfield. ISBN: 9780077282301   Peoples, D. W. & Eastwood, C. (Writer/Director). (1992). Unforgiven [Motion Picture]. Hollywood: Warner Bros. Pictures

Friday, August 30, 2019

Knowledge Organisation and Learning

1. Introduction The medical industry today has transformed in recent years as a result of the inclining demography scale. This has led the government to rethink of the country’s healthcare expenditures whether they are able to meet with the demand to the health and medical industry (Group 2011). Pinnacle hospital is structured with a holistic healthcare features that will be establish with the most advance technologies and high standard of service to patients, locals and overseas. Moving towards the growing ageing populations, the main emphasize will be on enforcing of the health awareness of the public. . Objective The team objective is to identify the future knowledge workers role and skills requirement so as to be a successful workers in future 2020. 3. PESTEL Analysis in year 2020 In analysing the external environment, the team has applied using the PESTEL tool to analyse each of the components of the external environment and identify the changes that will be establish in 2020. 3. 1) Political factors In 2020, the government will be spending approximately $10 million per year on healthcare. Higher subsidies granted to lower-income families with illness.Furthermore, the government have also planned to ramp up the infrastructure and manpower by recruiting 20,000 healthcare workers and 3,700 hospital beds, creating more jobs opening (HSA 2007-2011). Government will also look into working closely with private hospital on bed leasing (source: MOH healthcare 2020 Masterplan). 3. 2) Economic factors Population will increase, hence, the standard of living will increase as well. The government remains stable and provides strong support in funding capitals to healthcare sector that attracts more foreigners to opt for medical advice in Singapore and higher recruitment (Channelnewsasia, 2013). . 3) Social Issues such as more ageing population in 2020, with over 25% of its population above the age of 65 years old, parallel to several other developed countries aro und the world that has a distended grey population. As more foreigners are coming into Singapore, Singapore will be a multi racial country with English as a common language that is universally recognize. 3. 4) Technological In future, new invention will be coming in, thus, the technology will be advancing. There will be robotic system to assist in surgeon for effective and efficient surgery.Furthermore, there will be web-cam system installed for the patients to interact with their love ones. Patients may monitor their health condition simply with an affordable personal pocket size device consist of sensors, actuators and mechanisms. It also helps to alarm the hospital in any case of emergency instead of reaching a phone to dial for emergency. 3. 5) Ecology In 2020, solar panels will be able to substitute the usage of electricity. Implementing the solar energy system will be useful to conserve energy and save high cost of electrical maintenance for the hospital.Organics products will be use instead of chemical content to patients with allergy. 3. 6) Legal More Act to implement the control, licensing and inspection of private hospitals, medical clinics, clinical laboratories and healthcare establishments (Attorney General's Chambers, 2011). 4. Current Roles and Knowledge The team has selected four of the major roles in Pinnacle hospital to analyze their skill and knowledge acquired to comply with the duties they handle. They are: the Doctors, Nurses, Operation Manager and Customer Relation Executive. 4. 1) DoctorsThe doctors are expertise in their medical field as they are required to diagnose the patients’ illness and vital to make complex decisions. Moreover, doctors are trained and required to be skillful and knowledgeable in handling major/minor op surgery. 4. 2) Nurses Nurses have many multiple roles in the hospital. They are to perform the role of assisting the doctors in surgery, checking of patient’s records, being a caretaker and passing o f information to both doctors and patients. They also have to handle some minor cases of patients such as washing wounds and injection.Therefore, nurses have to obtain these basic skills in their medical practice. 4. 3) Operation Manager Operation manager are mainly in-charge on policy change and ensure effective communication and collaboration among departments. In addition, operation manager have to ensure there is enough resources in the hospital and make sure the hospital is running smoothly. 4. 4) Customer Relation Officer For a Customer Relation Officer, they are required to help to manage the front desk with various admin support and enquiries from the patients.They also have to collect information and data of the patient’s problems and concern. 5. Future Roles and Knowledge Acquiring skills for the following roles in the year 2020: 5. 1) Doctors Technology seems to be advanced in year 2020. Robots will be the doctors' assistants in operation theatre, which will enhanc e the efficiency of the surgeon. In any case of technical fault, the doctors will be the one to fix the problem. Therefore, the doctors are required to obtain new skills in technology so as to fix the minor problem of the robot if anything goes wrong.Basic knowledge in operating of the robot is necessary. It is to ensure that the robots are in good condition to assist the doctors in surgeon smoothly. 5. 2) Nurses Nurses are formerly assistance to doctor to retrieve patient’s record and in Op theater. In 2020, ?With centralized database, nurses are to train to use the system effectively to obtain patients’ record ? Cloud-based text messaging system that nurses will have to send out update the status of patient undergoing surgery to family or friends to reduce the waiting time. Nurses will learn to communicate with patients via online consultation web with patient’s family members who well-versed in IT to ensure correct details are conveyed and no error made. 5. 3 ) Operations Manager Currently, routine check will all be taken over with centralised method and will be fully automatic via sensors system. Mini tracking device will be issued to patients whom admitted to hospitals. Moreover, they will require maintaining and tracking the patients’ attendance and do arrangement for land transfers for overseas Patients. 5. ) Customer Relations Officer In Customer Relations Officer, most commonly the officers face with communication barrier. In 2020, these cases will be resolved via the following: ? officers has to be train to be more linguistic as more foreigners are expected to seek medical help ? Officers can be train to educate patients on the use of e-booking online as it reduce waiting time and crowding the holding area. 6. Conclusion In conclusion, the demographic graph is inclining towards ageing population as such it is necessary to create more health awareness.With advance technology implemented in hospital, each staff are required t o attend the training according to the skills they acquired to be hands-on with centralized database system and able to assist more patients from overseas whom are seeking medical advice in Singapore. It is hoped that Singapore could become a world-class originator of innovative, aged-friendly technology, products and devices. The ageing issue requires the integration and strategic alignment of new technologies, personal responsibility and public policy.

Thursday, August 29, 2019

Gothic Tales and Edgar Allan Poe Essay

Compare ‘The Tell-Tale Heart’ with ‘The Black Cat’. How, in these tales, does Poe draw on the Gothic tradition and take us into the tormented, diseased minds of his narrators In both ‘The Tell-Tale Heat’ and ‘The Black Cat’ there are many gothic effects used. For example, the gruesome concealment of the victims is described in a deadpan but detailed manner. In The Black Cat our narrator describes all of his options and then illustrates exactly how he carried it out, â€Å"†¦I easily dislodged the bricks, and, having carefully deposited the body†¦Having procured mortar, sand, and hair†¦I prepared a plaster which could not be distinguished from the old†¦Ã¢â‚¬  Then in The Tell-Tale Heart he describes this concealment procedure again, † I took up†¦ the flooring†¦then replaced the boards so cleverly so cunningly the no human eye†¦could have detected anything wrong†¦nothing to wash out†¦no blood-spot whatever.† Both narrators seem proud at their astute covering-up of the innocent victims. The gruesome lexis, mixed with the matter-of-fact tone gives off a horrifyingly insane, b ut calm feel to the passage. Also the motives for the killing seemed irrational and over emotional in both stories. This is another typical Gothic characteristic. In The Tell-Tale Heart he says â€Å"I loved the old man†¦never wronged me†¦never given me insult†¦One of his eyes resembled that of a vulture†¦take the life of the old mad, and thus rid myself of the eye forever.† His incentive was unreasonable; he states that there is no other reason than his eye. In The Black Cat his reason for the first killing of his cat Pluto was â€Å"perverseness†¦for no other reason than because he knows he should not?† In this part of the passage it seems strange as he seems to be excusing himself for the sin he is about to narrate to us. Then also at the end of the story when he kills his wife because she stopped him from killing the second cat he says, â€Å"†¦this blow was arrested by the hand of my wife. Goaded, by the interference, into a rage more than demoniacal †¦buried the axe in her brain. She fell dead upon the spot.† The lexis used here is brutal and infernal, typical of Gothic writers â€Å"rage more than demoniacal† references to the devil highlight the white hot anger surging inside the twisted narrator. The use of an unreliable, villainous storyteller was not a typical Gothic feature at the time but it has greatly influenced future authors who write in the Gothic style. In both tales the narrators give off an intensely nervous energy by using repetition and strong, unruly lexis. The first line of The Tell-Tale Heart sets the tone for the whole story instantly â€Å"TRUE!-nervous-very, very dreadfully nervous I had been and am; but why will you say that I a mad?† The dashes break up the sentences making them erratic; this is helped by the uneven sentence structure and the fusion of long and short clauses to make the whole pace of the story jerky and uneven. A typical Gothic feature that appears in only The Tell Tale Heart and not The Black Cat is the use of the night. The narrator describes how â€Å"†¦that every night, just at twelve, I looked in upon him while he slept.† Also the murder itself was committed at night and the use of the disguise of darkness gives an eerie feel to the piece and emphasis the Gothic tone of the story. However in The Black Cat the story was described through the day and the night and the murders of both the narrator’s wife and cat were during the day. Although this was not traditionally Gothic, and the description of the gruesome death caused some sections of the story to be more in the genre of horror. An element of Gothic literature that was in The Black Cat and not The Tell Tale Heart was the use of â€Å"omens†, obviously the title itself was a bad omen at the time and the other story had no omens, other than the heart beat motif that causes the narrator to confess his sins to the police. The title itself was not the only omen used in The Black Cat; Poe writes about two other obvious omens in this tale. Firstly the large imprint of â€Å"the figure of a gigantic cat†¦ There was a rope about the animal’s neck†, this was left on the wall the night after our narrator had killed his cat, this is not a figment of his imagination though as other people around can see it; later on however the narrator describes a mark of white hair, which shows â€Å"the image of a hideous -of a ghastly thing -of the GALLOWS!† This is more likely to be an illusion as the remorse builds up inside him. But he describes it as â€Å"†¦terrible engine of Horror and of Crime -of Agony and of Death!† The lexis used here is full of anger and is very strong. The capitalisation of the more significantly brutal words personifies these aspects and emphasises the narrator’s fear of the cat and of guilt. Poe uses many different techniques to suck the reader into the mind of his narrators. For example in the The Tell Tale Heart he describes his â€Å"disease† to the reader and excuses his actions. â€Å"The disease has sharpened my senses, not destroyed, not dulled them.† This line shows how the narrator is quite openely conceited. His insanity is revealed to us in a number of ways, firstly the deadpan tone of many parts of the passage give the reader an eery feeling of calm, that causes a disturbing sensation, such as when the narrator is describing his method of concealing his victim’s corpse, â€Å"I took up three planks†¦deposited all†¦then replaced the boards†¦Ã¢â‚¬  This use of everyday lexis â€Å"deposited† almost makes us forget that he is talking about a corpse, it makes the whole procedure sound mundane, which gives the impression of madness but also numbness to the narrator. Secondly, his lunacy is exposed to us as the character of the narrator is unravelled through the story. Throughout, hints are dropped as to the overconfidence of our narrator, repetition of various phrases. â€Å"†¦what had I now to fear?† and then again when the officers arrived, â€Å"for what had I to fear?† This reiteration of egotism makes us feel as if the narrator is reassuring himself that he is confident, and suggests to the reader that he has inexplicable insecurities lying beneath his cool exterior. Also in The Tell Tale Heart Poe uses many capitalised words and short, broken phrases to speed up the pace of parts of the account. â€Å"They heard! — they suspected! — they KNEW!† This shows how truly nervous and petrified the narrator is, and with the staggered, gaunt sentence structure makes the reader feel the same way, even if not to the same extent. A way in which The Black Cat’s method of pulling the reader into the mindset of a murderous narrator is near the beginning we are given some background about the narrator’s life. In The Tell Tale Heart we were given no information about setting or circumstance to help us detail our image. I find that this helps more as we have more pictures painted to us and these can then feed our imagination to produce a far more complex, but realistic understanding of the narrator’s mental situation. â€Å"I was especially fond of animals,† This line is quite ironic, as we learn from the rest of the story he seems to, infact, have a severe problem with cats. The way in which Poe implies the insanity of the narrator is in the language used to describe his cats. â€Å"†¦sagacious to an astnoishing degree† His strange attachment to the cat gave the narrator an untrustworthy and evil feel. Then when he describes his motives for hanging his first cat, Pluto, this insinuates utter, pschotic madness, â€Å"the spirit of PERVERSENESS†¦have we not a perpetual inclination†¦to violate that which is Law† This strange, confused motive gives the narrator a trace of humanity, but more of a childlike malevolence which emitts an air of wickedness. This infantile but wicked narrator, I find, is more chilling than the more simple, insane and evil narrator in The Tell Tale Heart, because of its uncanny likeness to reality. A similarity between The Black Cat and The Tell Tale Heart is that both narrators have a sense of superiority about them and this strong impression of narcissism makes the reader feel overwhelmed by malice and also builds up a strong feeling of resentment to their disagreeable characters. In both stories, the narrators end with a confession to their terrible deeds, both obviously caused by insolence and bravado. Another feature that is in The Black Cat but not The Tell Tale Heart is the sense of paranoia given off by the narrator, about the mark of white hair on his second cat’s chest, â€Å"†¦the mark†¦of which I have spoken†¦assumed a rigorous distinctness of outline†¦the image of a hideous- of a ghastly thing – of the GALLOWS!† This paranoia of an omen about the sadistic murder of Pluto blatently lays out the narrator’s madness and causes the reader to feel possibly more sympathetic, but more likely, to feel more estranged from the narrator. In conclusion I found the ways in which we were drawn into the psychotic mind of our killers were more effective in The Black Cat, as some were more subtle, but the more obvious one’s were easier to spot and gave a more definite and outlined picture of the narrator’s psyche. However, I found that the typical Gothic features used in The Tell Tale Heart made it more Gothic than in The Black Cat and also made the tale more chilling, even if not as gruesome or detailed as The Black Cat.

Wednesday, August 28, 2019

Macroeconomics-long run effect on budget cutting in the uk Essay

Macroeconomics-long run effect on budget cutting in the uk - Essay Example One of the primary concerns of the governments in UK, both the previous Labour Government and the present government, has been to reduce the public borrowing to sponsor the expenditure of the government (Giudice, Kuenzel and Springbett, 2012). The agenda behind the reduction in the public spending is that it is believed that the economy will grow faster in the medium-term. The simple economics behind the fact is that if business corporations believe that the economy will grow in the medium-term then the confidence in them increases which raises their present level of investment. On the other hand the consumers increase their spending with the belief that the economy will grow in the future. However, the standard component of GDP can be represented as (Mankiw, 2011): This implies that with reducing in spending by the government the total output of the economy falls. However, it is now an established economic convention that the level of output will increase up to a certain point with rise in government spending after which it tends to fall (Lilico, 2012). If the government follows a contractionary fiscal policy, which implies a reduction in spending by the government then the magnitude of impacts of the same is different in case of an open economy and closed economy. A closed economy structure is one that can be described as an economy which involves in no trading activity. A closed economy is assumed to be self-sufficient and all the needs of the consumers are met from inside which eliminates the need of the economy to have any trading relations with the outside world. An open economy on the other hand is the one which has sufficient treading relations with the other countries in the world and there are no barriers to the development of the free market forces. An ideal open economy is the one that is characterized by

Tuesday, August 27, 2019

Financial Mangement Decisions Essay Example | Topics and Well Written Essays - 750 words

Financial Mangement Decisions - Essay Example With an interest of capital at 10% seeing from the NPV table we multiply the values with the respective year cash flow. Then we add all the present values and subtract the initial investment to reach the NPV. The NPV is $1,021,901. The NPV shows a huge and positive value of $1.2 million. The accounting theory says that any project with a positive NPV should be accepted. This criterion is met and it is the most important criteria since it keeps the time value of money into consideration for the whole stream of the cash flows. Any changes done in the above cash flows can and cannot change the decision. However this depends on the value of the change at the end of the project. The additional building would have to be further depreciated and this may cause the change in decision. And depending on the amount of money invested the NPV could also become negative leading to a change in decision. Also it needs to be noted that the payback period is very close to the 3 year policy of the company. If the payback period changes and goes over the 3 year mark, then the project would be rejected. Question - Many corporate acquisitions result in losses to the acquiring firms' stockholders. Accordingly, why do firms purchase other corporations Are they simply paying too much for the acquired corporation A co-worker asks your opinion. Specifically state the reasons for your argument. According to a research done by Sara Moeller, Frederik ... 1,021,901 3) Based on your answer for question 2, do you think the project should be accepted Why Assume Superior has a P/B (payback) policy of not accepting projects with life of over three years. Yes, the project should be accepted based on the calculations done above. The NPV shows a huge and positive value of $1.2 million. The accounting theory says that any project with a positive NPV should be accepted. This criterion is met and it is the most important criteria since it keeps the time value of money into consideration for the whole stream of the cash flows. The criterion set by Superior is also met as the payback is less than three years (2 years 11 months). Since both criterions are met, it is advised that this project should be accepted. 4) If the project required additional investment in land and building, how would this affect your decision Explain. Any changes done in the above cash flows can and cannot change the decision. However this depends on the value of the change at the end of the project. The additional building would have to be further depreciated and this may cause the change in decision. And depending on the amount of money invested the NPV could also become negative leading to a change in decision. Also it needs to be noted that the payback period is very close to the 3 year policy of the company. If the payback period changes and goes over the 3 year mark, then the project would be rejected. Part Two Question - Many corporate acquisitions result in losses to the acquiring firms' stockholders. Accordingly, why do firms purchase other corporations Are they simply paying too much for the acquired corporation A co-worker asks your opinion. Specifically state the reasons for your argument. In your own words, please provide a

Select a grand nursing theory.Explain how application of this theory Essay

Select a grand nursing theory.Explain how application of this theory by nurse leaders and nurse managers can influence outcomes from two of the following areas - Essay Example This theory is grounded on the supposition that the founding principle of nursing is bound in caring as the root of nursing (Burtson & Stichler, 2010). Nurse leaders can use the theory of human caring in patient care delivery and increase patient satisfaction. This theory offers a structure that nurse leaders can use to reinstate the profession’s vision of care that permits care to flow from the nurse leader to other nurses and eventually to the patients (Douglas, 2011). This promotes wholeness and healing among the patients and the nurses (Boykin et al., 2003) By being caring to the staff members, the nurse leaders can rest assured that the nurses will show the same care and compassion to the patients (Burtson & Stichler, 2010). When a leader adopts and demonstrates this theory he or she then opens the door for the nurse staff to start incorporating care in a more thoughtful manner and impact on their interactions with clients (McEwen & Wills, 2014). This then improves delivery of care and the levels of patient satisfaction (Douglas,

Monday, August 26, 2019

A Matrix of Functions under the Umbrella Company Essay - 1

A Matrix of Functions under the Umbrella Company - Essay Example The company has heavily invested in cutting-edge technology that has enabled it greatly improve its level of customer engagement and satisfaction. It keeps on top of business trends through engaging the best in all fields that are relevant to its day to day operations. It is constantly on the lookout for innovative methods of doing business so that it can deliver its services to its clientele as well as improve its service delivery. Â  The process of doing business is a learned art and a science in itself and Accenture offers these services to its clientele. This is ensured first though the companies own performance in business and translated into services of better improving and providing the same services to clients. Â  Customer engagement and customer satisfaction are taken very seriously at Accenture with measures put in place to ensure that these two functions are closely monitored and controlled to achieve optimum levels. Surveys, consultants, and other professionals are engaged to ensure that both internal, as well as external research into these functions, is achieved. Â  Accenture has finance at its heart and its proper management in order to make a profit is a top priority as evidenced by its performance in the New York Stock Exchange. It also endeavors to ensure confidence in investors as well as clients through sound financial management and adherence to international accounting standards for all its transactions. It publishes its accounts in all the relevant mediums for this express purpose. Â  The fact that the company stretches across the world makes it able to offer services, products of the same high quality around the world.

Sunday, August 25, 2019

Peer review assesment Assignment Example | Topics and Well Written Essays - 1500 words

Peer review assesment - Assignment Example A high quality product is a product that has been proven to retain its high quality product status for years (Cinzkota, 2007). Second, Sony Corporation focuses on selling the company’s products at reasonable prices. The strong demand for the Sony products indicate the products are sold at reasonable prices. People would normally shy away from products that are normally overpriced. A high demand for the product indicates that the average person has no objections to the current prevailing prices of the Sony products and services. Third, Sony Corporation sells its products in stores that are strategically located. Sony Corporation has retail outlets in all the countries located in American, European Union, and Asian. Each major city of the Asian, American, and European nation sells the Sony Corporation products. The customers can easily buy a Sony Corporation product by visiting the Sony Corporation retail stores within the customer’s reach. Fourth, Sony Corporation alloca tes a large budget for the promotion and advertising of the Sony Corporation products and services. The company does not spare a significant amount of money when it comes to advertising the many advantages of the Sony Corporation products and services. Advertising involves money. Advertising involves time budget. ... By selling only high quality products, a strong relationship between the current and prospective customers and Sony Corporation crop up. By selling the Sony Corporation products at reasonable prices, a strong marketing relationship between the current and prospective customers and Sony Corporation can be seen. By selling the Sony Corporation products in strategically located retail outlets, more relationships are created between the current and prospective customers and Sony Corporation. By advertising the many benefits of choosing the Sony Corporation brand over the competitors, a strong relationship between the current and prospective customers and the Sony Corporation products is crystal clear (McDonald, 2007). Both blogs show that Sony Corporation constructs integrated marketing programs that deliver superior quality. Setting up retail outlets in the United States, European Union member states, and Asia indicate the company is implementing a profitable marketing strategy. By sell ing only high quality products and services, the company is on the right track in implementing a profitable marketing program. By advertising the many benefits of buying a Sony Corporation product, Sony Corporation’s marketing strategy process is viable. By selling only high quality products, Sony Corporation’s current marketing strategy will rake in very high net profits. Both blogs show that the current Sony Corporation marketing strategy is geared towards designing of a customer driven marketing strategy (Czinkota, 1998). Selling at reasonable prices is a customer driven marketing strategy. Sony Corporation focuses on selling the Sony Corporation products at a price that the customers are willing to pay. Sony Corporation can sell the

Saturday, August 24, 2019

Internet Marketing Strategy Amazon Essay Example | Topics and Well Written Essays - 3500 words

Internet Marketing Strategy Amazon - Essay Example Amazon.com opened his virtual doors in 1995, and restructured all the retail sector. It was the beginning of a new way of retail transactions. This essay aims to present an analysis of the Amazon’s internet marketing strategy. This analysis will be focused on an evaluation market, an analysis of the competitors and how the internet strategy relates to the overall marketing strategy of the company. Internet Marketing Strategy – Amazon.com Amazon.com is one of the largest online retail stores in the world. They open their virtual doors in 1995 and nowadays have net sales of $ 48,077 millions per year, growing 33% per year. Amazon.com begins their business selling books. Nowadays they still sell books, but also technology, clothes, shoes, ebooks. Additionally they improve their e-services with the Amazon Web Services ( AWS). It seems like Amazon.com is always one step ahead. The purpose of this essay is to analyze their Internet Marketing Strategy. In order to analyze the Amazon internet marketing strategy, first will be present an evaluation of their online market: size and growth, online marketing segmentation, sales and e-service. The retail sector is a very competitive sector. Amazon.com has many competitors include other online retail stores. In this essay eBay market will be studied. The internet is a powerful tool in a company's business. ... The first amazon.com website was opened in July 1995. Nowadays Amazon has 56,200 full-time and part-time employees ( data from December 31, 2011). Amazon focusses their strategy in the customers. They attempt to â€Å"seek to be Earth’s most customer-centric company for four primary customer sets: consumers, sellers, enterprises, and content creators.† Amazon is a retail online. They generate revenues from the online sales. Recently they invested in another source of revenues as marketing and promotional services (online advertising, and co-branded credit card agreements). In general they are organized into two principal market segments: North America and International. The main communication channel is the website. Amazon reaches their consumers through their retail websites. Amazon has a very competitive business. Examples of competitors in this sector are: â€Å"Our (1) physical-world retailers, publishers, vendors, distributors, manufacturers, and producers of our products; (2) other online e-commerce and mobile e-commerce sites, including sites that sell or distribute digital content; (3) a number of indirect competitors, including media companies, web portals, comparison shopping websites, and web search engines, either directly or in collaboration with other retailers; (4) companies that provide e-commerce services, including website development, fulfillment, and customer service; (5) companies that provide infrastructure web services or other information storage or computing services or products; and (6) companies that design, manufacture, market, or sell digital media devices. â€Å" The principal competitive factors are: . Retail business: retail selection and convenience; . Seller and enterprise services: quality,

Friday, August 23, 2019

Perioperative practice Essay Example | Topics and Well Written Essays - 1000 words

Perioperative practice - Essay Example times the patient is not in a position to take decisions regarding health care for reasons such as being under medication, labor, mental illness, so in that case ‘Consent is not needed when patients are incompetent to give it (young children, unconscious patients, etc (Len Doyal, 1997) Research studies have shown that ‘there might be language/literacy problems in obtaining informed consent.’ (Lloyd, Cathy E. and Johnson, et al., 2008) In such cases, the medical faculty gives a thorough explanation of the best procedures to the patient based on her other health related problems. By informing our patient completely on the nature of all the decisions and procedures, in addition to the alternatives and interventions available, she was in a better position to participate in the decision-making process by weighing the pros and cons and finally giving consent because of the legal and ethical right at her disposal. According to (Campbell, et al., 1998) â€Å"Integrated care pathways are structured multidisciplinary care plans which detail essential steps in the care of patients with a specific clinical problem and describe the expected progress of the patient† Understanding on the part of the patient as well as the doctor about the Care planning pathway, puts them in a better position to make preparations before the actual operation can take place. (Scott I, 1999) explains that integrated care pathways â€Å"are an opportunity to identify good practice, remove bad practice, identify and apply evidence, identify education and training needs and appreciate the skills and contributions of all professionals and care sectors.† This step is very important because it helps the patient to understand all the risks and benefits involved in the process and also the areas of ambiguity. After a clear discussion the physician got the consent of our patient on a written document and explained to her that she was not a mere spectator but played a vital role in the decision making

Thursday, August 22, 2019

University Thrust Essay Example for Free

University Thrust Essay A Thrust is a broad statement of intended strategic actions. The statement should provide a â€Å"compelling theme that knits together otherwise independent activities and focuses the energies of functional groups on things that matter in the market. † A thrust is intended to create a broad, sharedunderstanding of what strategic actions are intended in planning. Universities around the world must maintain their focus in providing quality education. The institutions’ programs and activities are embedded in its thrust to achieve their vision- mission and objective. A Thrust, when referred to an institution, means as the powerful force in leading the institution in its desired disposition. According to Prof. Edwin L. Apawan, a faculty of College of Education in Notre Dame University, University Thrust is embedded in its philosophy translated to its vision-mission and articulated in its goals and paradigms. In an educational institution, Thrust is very much important for it is the reason why it runs. Everything that the institution does is anchored from its thrust. In Notre Dame University, being an educational institution has cited its University Thrust namely: Formation, Instruction, Research and Extension (FIRE). The focus of the study is to know the Thrust specifically in the field of Instruction and Extension and whether if it is running in the Teachers Education Program in Notre Dame University. Instruction is defined by Saylor and his colleagues as â€Å"the actual engagements of learners with planned learning opportunities; thus, instruction can be thought as the implementation of the curriculum plan† cited by Aquino, 1986. The higher education institution must exhibit a continuing quest for excellence in instruction through the quality of its educational programs, outstanding achievements of its students, and above national average performance in the majority of the programs offered requiring government instructions. While each constituent units may have its own thrust in extension that responds to their service area, it may institute mechanisms for the coordination and integration of these activities for more effective use of resource and in order to achieve bigger goals (Sarmiento III, 2009). The University, being a storage, generator, and disseminator of knowledge, should make an impact on the community within its reach. Although its graduates will naturally be involved in the development of the community where they work and live, there are a lot more people who were not able to have formal university training, and the need outside help to make them productive members of the community. The higher education institution must have credible outreach programs which may take the form of continuing education, application of the research results community services, and many others. The study aims to assess the operation of the Notre Dame University Thrust if it is being worked out in the Teachers Education Program of the said institution among its students. Statement of the Problem The study aims to determine if the University Thrust, particularly in the field of Instruction and Extension are really working in the Teachers Education Program as assessed by the third and fourth year students of the College of Education, Notre Dame University in the School Year 2012- 2013. Specifically, this aims to answer the following questions: 1. What is the profile of the students as to their age, sex and year level? 2. How will the respondents assess if the University Thrust, particularly Instruction and Extension arein reality operating in the Teachers Education Program in terms of: a. ) Instruction delivery by the College Faculty; b. ) Community extension Programs initiated by the College; and c. ) Involvement of the College to community exposures? 3. How is University Thrust been able to run in Teachers Education Program? Significance of the Study The study will tell if the University Thrust is working in the College. The assessment of the University Thrust in the Teachers Education Program is important among the Administrator, Faculty, and the Students of theCollege of Education. Administrator Knowing the Thrust runs in the college or not, may help the Administrators become aware of the college’s needs and problems regarding the implementation of the programs and activities that fulfill the operations of the University Thrust especially in the field of Instruction and Extension. As a result, the Administrators will be able to plan programs and activities for the College that will be anchored from the two specific University Thrusts. Faculty The result of the study will help the teaching staff be aware if their instruction is anchored to the desired criteria suggested by the University Thrust in the area of Instruction. This would help them whetherthey will espouse, amend, and seek new ways in delivering their instruction that would fit and reach the expected outcome attached from the criteria. The study will also help the teaching staff in incorporating and integrating Community Extension related activitiesin their teaching approach, strategy, method, and technique. This will help them achieve the criteria recommended by the Community Extension. Students The students’ assessment will indicate certain strengths and weaknesses in the variables considered in the study. This would help in the improvement of the programs and activities in developing them accordingly, especially driven by the University Thrust. Scope and Limitation The study is concerned with the assessment of the University Thrust, FORMATION, INSTRUCTION, RESEARCH, and EXTENSION (FIRE), if it is conveyed in the Teachers Education Program in Notre Dame University. Its focus is specifically in the field of INSTRUCTION and EXTENSION. This would tell if these two Thrusts are actively operating in the College: if students are aware of the University Thrust (FIRE); if the programs and activities conducted in the College are attached with these specific Thrusts (FIRE); and if the teaching staff’s delivery of their instruction, as perceived by the students, is anchored in the desired outcome suggested by the Thrust. Furthermore, the respondents are limited only among the third and fourth year students enrolled in the College of Education for the School Year 2012-2013. Definition of Terms To process the understanding of discussion in this study, the following terms are herewith defined operationally: University refers to Notre Dame University as an educational institution. University Thrust refers to the FIRE (Formation, Instruction, Research, Extension); the driving force of Notre Dame University as an educational institution which is embedded from its objectives and paradigms; it intends to create a broad, shared understanding of what strategic actions are intended in planning; it is where the university’s programs and activities are inclined. Administration refers to those who organizes and operates activities, programs, educational planning and curriculum in the Teachers Education Program. Faculty refers to the teaching staff who implements and supervises the University Thrust, specifically the Instruction and Extension. Students refers to the third and fourth year students of the College of Education; the ones who will simplify the realization and utilization of the University Thrust that was being translated by the Administrators and Faculty. Instruction refers as one of the University Thrust which is focused on the Curriculum and other learning opportunities involved; as the word itself defines, it is the programs of studies done. Extension refers also as one of the University Thrust which is concerned with the activities held outside the Institution; also refers to the community involvement and community service. Chapter II Review on Related Literature This chapter contains the summary of relevant concepts, ideas, and research findings as well as conceptual framework. Related Literature. Topics discussed include the following: Thrust as the driving force of an institution; Instruction and Extension as Thrust of an educational institution; Administration and Faculty’s role in the operation of Thrust in the Teachers Education Program. Thrust as the driving force of an institution Business, government, educational, and many other institutions run because of a driving force that enables to do. In an interview, Dr. Joel Genzon of Notre Dame of Cotabato, Inc. , said that â€Å"Thrust is a driving force that provides the meaning why an institution carries out a certain action or   work. This action or work is commonly known as the one that strengthens its foundation that enables an institution fulfill its Vision-Mission. † In an interview with Prof. Elsa C. Tamse, the Executive Assistant to the President of Notre Dame University, she defined Thrust as the direction and guide of the school for a particular school year that will help in the attainment of the vision of the school. It is anchored with the vision and mission of the school or university. This is being reviewed and changed to meet the particular vision the school wants to attain. It is also in the Thrust that the strategies are crafted so that the mission will operate to achieve the school’s vision for the year. Instruction Instruction is defined by Saylor and his colleagues as â€Å"the actual engagements of learners with planned learning opportunities; thus, instruction can be thought as the implementation of the curriculum plan (Aquino, 1986). The program of studies required and implemented by the university should have well defined and clearly stated objectives and learning outcomes and should meet prescribed standards. The teaching and learning process used in instruction should be appropriate, varied, and should facilitate the wholistic development of the students. The process should reflect to the institutions’ teaching learning framework. Learning should be available inside and outside the classroom. Variety of teaching-learning strategies should be used. For an effective instruction the teaching-learning environment should be conducive. It should be well-equipped and can offer comfort and can accommodate a number of students per session. The learning outcomes of the academic program should be well-defined. Instructional supervision program should exist that includes practical measures: requirement of syllabi, informal dialogues with students and faculty, class visitations, and evaluation of text examinations. Faculty should encourage students to join activities such seminars and educational associations that would help them in developing their instruction. Students should be oriented on the availability of academic guidance and counseling. This is for them to be guided by their instructors if there are some difficulties they are encountering with the delivery of instruction by their teachers (PAASCU). Extension One of the important functions of a higher education institution is to have an Extension program. Vis-a-vis instruction and in light of recent technology advancement, extension complements and fills in the gaps left by instruction especially for those who, for multifarious reasons, cannot access formal instruction to gain individual information (Wakat, 2010). The university being storage, generator, and disseminator of knowledge, should make an impact on the community within its reach. Although its graduates will naturally be involved in the development of the community where they work and live, there are a lot more people who were not able to have formal university training, and the need outside help to make them productive members of the community. It is in this light that the university has the Community Involvement. This acts as the university’s arm in directly reaching out to the people in the community who need help – technical, financial and moral- to improve their living conditions. This mandate is carried out by means of programs like: training and non-formal education. This is done through non-degree training programs, extending financial assistance, if possible. Through Extension the university shall contribute to the development of empowered citizenry capable of making the rational decisions pertaining to the improvement of their livelihood, work productively and efficiently, and be confident part of the mainstream society in their community. Generally, Extension service is the process by which technology and innovation are transferred to an identified clientele with ultimate objective of improving the way of life of the people. Then Senate President Marcelo B. Fernan defined extension service as a concept that encompasses people empowerment and human resource development geared towards human capital enhancement, and technology and facilities diffusion among the â€Å"masang† Pilipino, if not, the poorest of the poor. (www. mseuf. edu. ph, 2012) Community involvement should be one of the basic aspects of the University. This is accurate and true, most especially in a progressing country like the Philippines, where community involvement may be matched to the total effort whereby the university relates itself to national, regional and local imperatives of development. The university, in educating citizenship, should implement not just through academic and professional programs through the pursuit of the fundamental objective of total human formation. It should also include a necessary social aspect. In so applying, it should maintain the focus on the academic, the professional and the personal development. A university that is exposed to community involvement actually enhances pride, dignity, and integrity, extends its identity and achieves greater and larger goal. In the attainment of this goal, such services will take place in the community through programs conducted in the expansion of the university. The community involvement of the university must consist not only about building community awareness and producing graduates in the professions or vocations where they can serve their communities competently and they may achieve personal upliftment. It must also include guiding and motivating students, faculty and staff towards community service and give them chance to be exposed to the community and actual service and to make them more sensitive to extension as an integral part of instruction and research; to establish the structure that will ensure coordination, communication, planning, linkages and monitoring of extension programs; To establish necessary infrastructure to sustain the extension program of the University; to integrate extension into both curricular and co-curricular activities; to formulate clear-cut policies on extension among the various sectors/colleges in the University: and to strengthen coordination and cooperation between and among sectors. The university’s commitment to community service and development should be carried out through projects and activities, which are well planned, organized, implemented, evaluated and supported by the school (PAASCU). Community involvement is an institutional community extension program whose commitment is towards community service and development. It works hard to the conscientization of men and women, equitable distribution of benefits and provision of equal access to opportunities through the optimal use of resources and human expertise in organized cooperative effort. It achieves such through giving of technical assistance in the form of functional education, community organizing, health programs, cooperative formation, capability building, women in development, income generating project and technical assistance. The role of Administrators and Faculty in the operation of Thrust in the Teachers Education Program Administration The Administration of a certain institution plays a very important and has specific roles. It undertakes to be accountable to be efficient and effective when it comes in managing and facilitating the institution especially in administering the instruction and extension as the two of the University Thrust, to its constituents. For an administration shall: * Develop and maintain a school atmosphere conducive to the promotion and preservation of academic freedom and effective teaching and learning to harmonious and progressive school-personnel relationship; * Assume and maintain professional behavior in his work and in his dealings with students, teachers, academic non-teaching personnel and administrative staff; * Render adequate report to teachers, academic non-teaching personnel, and non-academic staff on their actual performance in relation to their expected performance and counsel them on ways to improve the same; * Understand the curriculum and instructional processes of the institution (Aquino, 1986); * And conduct public services where it can be the training ground for young men and women to develop leadership qualities, civic involvement, community participation, training in management and other non- academic areas (Franco, 1994). The following are stated as the expected roles and responsibilities that the Administration should execute in order to pertain and deliver ‘what is due to them’. Litchfield (1956) has identified three broad, functional areas of administration: (1) policy, (2) resources, and (3) execution. These functional areas are applicable to the three fields of administration, including educational administration. A policy is defined as a statement of those objectives that guide the actions of a substantial portion of the total organization. The resources of administration are composed of people, money authority, and materials. Execution is a function of integration and synthesis of resources and policies that are intended to achieve a purposeful organization (Aquino, 1986). Faculty The roles and responsibilities of a faculty member are closely confined to the main functions of higher education. Their roles as an individual supports to the vision-mission of the University. Faculty members, however have similarities on their responsibilities to commit themselves fully to their teaching obligations, to participate in the development of the programs imparted by the institution as a whole, to engage scholarly activities, and as appropriate to support the University in its goal to render public services. One aboriginal formal description of these functions was pertained in the 1915 â€Å"Declaration of Principles† produced by the American Association of University Professors (AAUP). According to the declaration, the colleges’ and universities’ functions are â€Å"to promote inquiry and advance the sum of human knowledge, to provide general instructions to the students, and to develop experts for various branches of the public service† (Joughin, pp. 163-164) cited by Aquino, 1986. A faculty member shall also play the role of facilitating and processing of influencing their students towards setting and achieving goals. They should help the group to decide on its goal, able to tolerate uncertainty without anxiety or angry, reconciles conflicts and turns confusion into order, exhibits good judgment and conviction, able to create a climate for creativity and innovation and emphasizes productivity and promotes the growth of students. Theoretical Consideration Social psychologist Douglas McGregor of MIT expounded two contrasting theories on human motivation and management in the 1960s: The X Theory and the Y Theory. (Theory X and Theory Y- Leadership Training from MindTools. com, 2013) The Theory Y behavioral pattern states that: * Employees under this pattern believe that expenditure of physical and mental effort in work is natural as play or rest. * Workers will exercise self-direction and self control in the service of attaining goals and objectives. * They believe that rewards are associated with individual achievements and contribution to group goals. * The average human being learns under proper condition. They seek responsibility to grow and develop as responsible person. The work groups have different values that influence the managerial pattern of leadership. A work group that value independence and unilateral decision making can influence the managers style to be one involvement and participation. On the other hand, the manager should adjust his style when the employee displays an opposite value. The Manager, therefore, must know when to ring the bell to change his course of action. (Pereda, 2011) On our study which focuses on the Notre Dame University Thrust as seen in the teacher education program of the College of Education, the Theory Y Behavioral Pattern visualizes the pattern in which the board of administration processes the crafting and developing of the strategic plans and they have the capability and talents to increase production and develop better services by means of making a direction to reach a particular vision the school wants to attain for a particular school year. This will be translated among the lower sectors/department heads (colleges) that will translate it among the students to see the effectiveness of the developed thrust if it supported the mission in attaining the vision of the school. Chapter III METHODOLOGY This chapter contains research design, respondents, research instruments, sampling design, and data gathering procedure. Research Design The researcher employs the descriptive research design. It describes the perceived effectiveness of the Notre Dame University Thrust, especially in the field of Instruction and Extension, as operated in the College of Education; profile of the College of Education Third and Fourth Year students; and programs and activities being conducted in the College anchored in the University Thrust. Respondents There are 105 third year students, composed of 17 males and 88 females, and 91 fourth year students, composed of 27 males and 64 females who are the respondents of the study with the total number of 196 students. The respondents came from the Notre Dame University College of Education, enrolled during the School Year 2012- 2013. Research Instrument The researchers will use a Key Informant Interview questionnaire and a survey questionnaire instruments in order to gather the data needed in the study. The Key Informant Interview is conducted to the Notre Dame University College of Education Dean and Program Head. The interview is composed of questions that intend to get further information about the programs and activities that the College is conducting. The information is compared to the result of the survey to see if it will coincide with each other making the result of the study reliable. The survey questionnaire will cover two (2) parts: Part I, it’s the profile of the students, specifically the name, gender, and age; Part II are the questions regarding the programs and activities operating in the College of Education that are anchored from the Notre Dame University Thrust (Instruction and Extension). Sampling Design Using the census method, the data will be collected from every member of the total population of the respondents. The respondents will be identified by getting the whole number of population of the Third and Fourth Year students enrolled in the College of Education during the Second Semester of the School Year 2012-2013. Data Gathering Procedure. The activities to be undertaken in the process of gathering relevant data which the study requires: The instruments ready, researchers’ sent letters of permission to the Dean of the College of Education to administer the survey questionnaire. Upon the approval of the letters, the researchers will personally distribute the questionnaire to the respondents. APPENDIX October 18, 2012 DR. MA. CORAZON C. NATANO Dean. College of Education Notre Dame University Cotabato City Dear Dr. Natano: Greetings of peace and love! We, the students of Notre Dame University taking up Bachelor in Secondary Education major in English are currently enrolled in Educ 314B with the descriptive title Thesis Writing. In line with this, may we ask permission from your good office to get a list and conduct a survey for our thesis entitled â€Å"An Assessment of the University Thrust as Translated in the Teacher Education Program in Notre Dame University†. The data will be helpful to us in the completion of our study. We are hoping for your positive response towards our humble request. Very truly yours, MA. CHARIS ELLA AMANDO BUTCH PASCUAL RACHEL ANNE NUNEZ ResearcherResearcherResearcher Noted by: CHARLITO K. CORTEL, JR. Research Adviser January 16, 2013 DR. MA. CORAZON C. NATANO Dean, College of Education Notre Dame University Cotabato City Dear Dr. Natano: Greetings of peace! We are in the process of formulating our survey questionnaire in relation to the study â€Å"An Assessment of the University Thrusts as Translated in the Teacher Education Program of Notre Dame University†. We thought of looking into the Annual Programs and Services of the College of Education as one of the vital documents related to the implementation of the University Thrusts. Hence, we would like to ask permission to have a copy of such documents with the assurance to keep it confidential. Our sincerest thanks for being a helping factor to our research. Respectfully yours, MA. CHARIS ELLA AMANDO BUTCH PASCUAL RACHEL ANNE NUNEZ ResearcherResearcherResearcher Noted by: CHARLITO K. CORTEL, JR. Adviser January 9, 2013 DR. DOLORES S. DAGUINO Vice President for Academic Affairs Notre Dame University Dear Dr. Daguino: Greetings of peace and love. We are third year students of the College of Education and working on a research trying to assess whether the University Thrust (Formation, Instruction, Research, and Extension) are evident/functional in the programs and services in the Teacher Education Program in our own department. We feel that we need help from people who can best enlighten us about it. Hence, we seek your help. We would like appreciate much it you can lend us some documents that will lead us to better understanding of the NDU Thrust. Thank you very much for your kindness. Respectfully yours, MA. CHARIS ELLA AMANDO BUTCH PASCUAL RACHEL ANNE NUNEZ ResearcherResearcherResearcher Noted by: CHARLITO K. CORTEL, JR. Adviser DR. MA. CORAZON C. NATANO Dean, College of Education January 9, 2013 PROF. ELSA C. TAMSE. Executive Assistant to the President Notre Dame University Dear Prof. Tamse: Greetings of peace and love. We are third year students of the College of Education and working on a research trying to assess whether the University Thrust (Formation, Instruction, Research, and Extension) are evident/functional in the programs and services in the Teacher Education Program in our own department. We feel that we need help from people who can best enlighten us about it. Hence, we seek your help. We would like appreciate much it you can lend us some documents that will lead us to better understanding of the NDU Thrust. Thank you very much for your kindness. Respectfully yours, MA. CHARIS ELLA AMANDO BUTCH PASCUAL RACHEL ANNE NUNEZ ResearcherResearcherResearcher Noted by: CHARLITO K. CORTEL, JR. Adviser DR. MA. CORAZON C. NATANO Dean, College of Education Key Informant Interview Questionnaire: 1. What is University Thrust? 2. How important it is especially to be run in the College of Education? 3. How is this University Thrust being translated to the college and to the students? 4. What are the specific programs and activities conducted in the College of Education that are anchored in the University Thrust? 5. Why it is those activities/programs are done? For what reason/s? 6. Are those activities/programs enough? Is it appropriate? 7. Do the activities/programs conducted for the students really helpful? And meet the prescribed standards? 8. What are the efforts done by the faculty and staff of the College of Education for these activities/programs to be successfully implemented? 9. Are those efforts enough? Why? And why not? 10. Are those activities/ programs enough to tell if the university Thrust is really operating in the college? 11. Do you think the college already met the prescribed standards of the University Thrust? Survey Questionnaire: Part I: Students’ Profile Name: _________________________________Sex: ________ Age: ________Year Level: _________ Part II: Survey questions Instruction: Rate the following questions according to what you have observed in the College. Scale:4- Strongly Agree (SA)2- Disagree (D) 3- Agree (A)1- Strongly Disagree (SD) Instruction: 1. The objectives and learning1234 outcomes are well-defined and clearly stated. 2. The given objectives meet1234 the prescribed standards. 3. The learning objectives reflect 1234 to the institution’s teaching learning framework. 4. The teaching and learning1234 process used in the class is appropriate and varied. 5. The teaching- learning strategies 1234 used by the teachers varied depending of students’ learning styles and multiple intelligences. 6. The strategies used in1234 the class facilitate the holistic development of the students. 7. The use of Learning Teams are being1234 facilitated well in the class 8. The instructions used1234 in the class are useful inside and outside the classroom. 9. The teachers practice research-oriented1234 Instruction. 10. The teachers require students with 1234 research-based assignments, projects and assessment tasks. 11. The teachers provide for1234 Collaborative activities that encourage Students to work with learning teams. 12. The teachers provide for 1234 individual tasks that develop students communication skills and promote students HOTS and critical thinking. 13. The teachers conduct activities 1234 that develop students to become problem solvers, creative thinkers and independent learners. 14. The teachers integrate current issues1234 in the course to develop students to become sensitive and responsible of their roles in social transformation in Mindanao. 15. The teachers integrate multi-cultural1234 issues in the course to develop among students respect of diverse culture and faith. 16. The teachers design academic tasks1234 that requires students to develop their ICT skills and utilize technology resources. 17. The faculty in the college1234 encourages the students to join activities such as seminars and educational associations. 18. The teacher is using seat plan1234 and checks the attendance. 19. The learning environment1234 is conducive for the students. 20. The learning environment1234 is well- equipped and offers comfort and accommodates a number of students per session. 21. The learning outcomes1234 of every academic program held in the College are well- defined. 22. The students are well- oriented 1234 on the availability of academic guidance and counseling. 23. The Academic Support Programs in the College are wellconducted and facilitated: * Enhancement program in English1234 * Tutorial Class in Mathematics1234 * Faculty-Student Consultation1234 (eg. tutorial, thesis consultation). Extension: 1. The college has an adopted community. 1234 2. The college has programs involving 1234 Community extension. 3. The students in the College of Education are1234 exposed to community. 4. The college is developing students by 1234 allowing them to be exposed in the community to achievecommunity awareness and personal upliftment. 5. The teachers in the college give activities1234 whereincommunity extension involved. Specify what kind of activity/ies: __________ 6. The college also gives technical assistance1234 in formof functional education, community organizing, health programs and other community programs. 7. The college includes: a.Guiding and motivating students, 1234 Faculty and staff toward community service andgives them chance to be exposed to the community and actual service to make them more sensitive to extension as an integral part of instruction and research. b. Establishes the structure that 1234 will ensure coordination, communication, planning, linkages and monitoring of extension programs. c. Establishes necessary infrastructure1234 To sustain the extension program of theUniversity. d. Integrates extension into both 1234 curricularand co- curricular activities. e. Strengthens coordination and 1234 cooperation between and among students. 8. The college’s commitment to1234 co.

Wednesday, August 21, 2019

The United States economic Essay Example for Free

The United States economic Essay In trying to rescue the United States economic financial system there is a possibility of the economy to be affect by massive hangovers from the effort of the government to prevent the accumulation of debt. The government instead has found a swift way of stimulating the economy through the financial bailout. The government wishes to take a mountain of accumulated debts due to bad loans caused by financial institution as a result of subprime mortgage lending. The debt is worth $700 billion of money. To have this debt clear under the bailout bill so that the economy can be stimulated to grow, the united government had no other option other than borrowing. For the borrowing to be successful, it had be done when the there is soaring of the federal budget deficit. The deficit for the year 2008 was expected to increase by $407 billion which was double the imbalance for year 2007 worth $161. 5 which indicated a slowdown in the economy. However, as from 2008 up to now, $168 billion programs of economic stimulus are already doing in the books of government. The passed congress legislation gave authority to have the Fannie and Freddie be rescued which resulted into the boosting of national debt. The legislation the administration late authorized the bailout financial system (Bernanke, 2008, 1). The implementation of the financial bailout as an economic stimulus has caused a lot of concern on what long term affects it poses to the United States economy. The issue here is, as the government is borrowing to offset the already existing debt, the debt instead is expanding from time to time. To pay the national debt interest the government is spending not less that $400 billion each year. As the debt increases, the cost of government borrowing also goes up and therefore leading to some of the indented programs in settling that existing debt to be awarded less money. Due to financial crises of the year 2008 the Federal Open Market Committee (FOMC) has eased the stance of the monetary policy. The FOMC has consistently relaxed the monetary policy which has stabilized the prices giving hopes to increase of economic slack and flattering-out of the energy prices. FOMC after the implementation of the monetary policy anticipates the economic strengthening over this quarter as the previous lagged monetary policy action effects, amid improvement of the conditions of financial market has starts to provide extra spending and stabilization of the housing activities. Despite the implementation of the monetary policy in the year 2007 and up to the early 2008 the economic growth slowed sharply. In 2007 the restrain on activities concentrated on the housing sector, where as in year 2008 the other sectors of economy began to experience this. The prices of commodities have remained high for the whole year causing consumer price inflation (Bernanke, 2008, 23). The demand on houses, construction of residential home and prices of homes have fallen sharply in the year 2008. In the first few months of 2008 the delinquency rate continued to go down across all mortgage loans. New subprime mortgage loans has been highly unavailable for that year making the borrowers to experience high risk of credit which had to go for the guarantee programs offered by the government. Due to this, the Federal Reserve with the other stakeholders is now committed to come up with a solution that will prevent the foreclosure of the houses. The Federal Reserve is committed to offer an environment that gives support to goals of the homeownership of giving loans to borrowers who are creditworthy with ideal protection of the consumer and responsible practices of lending. On the issue of consumer spending has been going down for the whole of 2008 which is an indication of restrained influence. The real labor income growth rate has gone down ass the prices of energy and food, and conditions of labor market continue to weaken. This has affected the consumer purchasing power. In addition to this, it has been difficult for consumers to borrow as the standards and the terms have been tightened. This has led to deterioration of the quality of the overall credit of consumer loans (Bernanke, 2008, 30). On the side of business sector, the financial and economic conditions that influence spending of capital have appreciably deteriorated. During the months of 2008 the real outlay for business software and equipments were flat. The inventories have decreases irrespective of sluggish final sales making the firms to act promptly to prevent the imbalances of inventory from arising. The United States corporate profit during the same time was very low. The weakening of corporate profit and tight conditions of credit has resulted to slow down of business investment. Loans of Commercial and Industrial at banks in the firs months of 2008 briskly expanded. In the same period the quality of credit in nonfinancial corporations remained solid. As a result of this banks tightened the standards of credit on commercial loans of real estates. To conclude, the economic stimulus act is approximated to result to rebates worth $115 billion which will be sent to the households by the end of 2009 (Bernanke, 2008, 35). Work cited Bernanke Ben. Monetary Policy Report to the Congress. Washington, D. C. , July 15, 2008, pp. 1-42

Tuesday, August 20, 2019

Importance of Ethical Hacking

Importance of Ethical Hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avo id attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers are nothing but authorized users for the sensitive information or networks of an organization. Using hacking techniques for handling employees in organization and for solving critical judicial cases is not a crime. An ethical hacker use same tools and actions as performed by normal hacker. The main aspect in ethical hacking is that target permission is essential for performing hacking on the information. Ethical hacking can be used while performing security audits in the organization (Kevin Beaver, 2010). Thus, ethical hacking can help in testing the networks by finding out various vulnerabilities. In ethical hacking, a user will get permission to access the important data. Aims and Objectives Aim To investigate the importance of ethical hacking and its implementation in organizations Objectives Finding the importance of ethical hacking tools Understanding the ethical hacking process Implementing ethical hacking tools in an organization Purpose of Study The main of this research is to recognize ethical hacking tools that can be used in organizations and government agencies. Testing the networks is essential in order to maintain security for the organizational information. The difficulties in networks have to be recognized by the security professional so that they can be solved before effecting the organization operations (James S. Tiller, 2005). This research also focuses on carrying out the ethical hacking tools in a particular organization. The advantages of using ethical hacking in business firms can be evaluated by this study. Ethical hacking tools can be implemented in various fields of applications. Various security professionals can be efficient in ethical hacking tools by undergoing a training process. Another major intension of this research is to identify the importance of ethical hacking professionals in providing security to the networks. (Nina Godbole, 2008). Thus, this research entirely focuses on ethical hacking tools which can be implemented for testing the networks. Research Context This research on ethical hacking can be very useful to many organizations as it can provide clear idea about hacking tools. Security professionals and normal users have to be trained well in order to use hacking tools. The importance of ethical hacking while solving many judicial cases can be identified with the help of this research. Management of an organization can be benefited largely through implementing hacking tools. Hacking tools implementation process can be understood with the help of this research (Ronald L. Krutz and Russell Dean Vines, 2007). Network security or data security engineers in organization will come to know about new ethical hacking methods and techniques that are available in the present market by concentrating on this research. The concepts in this study provide knowledge related to security improvements. Business users can hack the data in order to use it for the purpose of evaluating a correct process. Management has to take precautionary measures while a llowing the professional to hack ethically because data may be misused (Rajat Khare, 2006). Scholars who concerned with information security can take the help of this study for attaining the knowledge on hacking systems. Many organizations are encouraging ethical hacking professionals in order to control their business operations effectively. Email systems, data bases and communication applications can avoid or identify attacks by adopting the hacking tools. Malicious attacks on the information or software can be prevented by implementing this research while using ethical hacking tools. The organizations that concerned with security in networks have to use ethical hacking tools (Greg Meyer and Steven Casco, 2002). Hence from the above discussion it can be understood that, business firms, investigating agencies, government systems and web users can make use of this research to achieve the important information in authorized manner. Chapter 2: Literature Review Ethical Hacking and its importance The word hacking is defined as an illegal use of the others computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. This is mostly found in the countries like United States and many other countries. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system (Rajat Khare, 2006). The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into others system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking (Kevin Beaver, 2010). In the types of hacking system one of the most common h acking is ethical hacking. This is defined as the services that provides the securities for the customers networks, information assets and identifies the vulnerabilities to maintain the reputation of the corporate sectors before it exploit the company. This type of the hacking system provides the high securities to the customers methodologies and techniques to yield high qualities of infrastructures. The ethical hacking system includes some of the service like: Application Testing War Dialing Network Testing Wireless Security System Hardening Application Testing This is an uncover design or the logic flaws which result in the compromising with the unauthorized accessing of the systems, networks, applications or the information regarding the systems. This application testing is used for investigating and identifying the extent and the criticality of the problems exposure to the thick client (Java) and thin client (web browsers) applications. This application testing includes the services like client-side application testing and web application testings (Joel Scambray, Mike Shema and Caleb Sima, 2006). The client-side application testing is the process of developing the software that is used for the measuring the integrated security into the client software constituents. In this system this testing application is based on the gathering of the information by observer using the reverse engineering system. War Dialing This is one of the services that are provided by ethical hacking. War dialing is a method of dialing a modem number to identify open modem connection that supplies access in a remote way to a network for targeting a particular system (Kimberly Graves, 2007). This word is originated from the day the when the internet has come into the existence in most of the companies. This follows the method of scanning to find the strength of the network connection. The tools of War dialing work on the concept that organizations do not pay attention to dial-in ports like they do towards the firewalls. Network Testing The networking testing services of the ethical hacking provides the information on the exposures of the network, services, and solutions on the convergence, protocols and system devices including the virtual private network technologies. This testing process includes a number of constitutes in external and internal devices. It also analyzes the applications of the voice over Internet protocol within the environment of the organization (Greg Meyer and Steven Casco, 2002). The main goal of the network testing application is to make obvious demonstration of the political effects on its development. By making use of this application into the organization, it provides a complete enlightenment to the work for determining the result in the organization. Wireless Security Wireless security services measures the security in the available architecture to provide a guidelines to ensure the system integrity and accessibility of the resources. The working of wireless security is based on the three phases. In the first phase of the operation it identifies the activeness of the wireless networks (Cyrus Peikari and Seth Fogie, 2003). The team of the ethical hacking demonstrates the exposure to the attackers with the space in the wireless network. In the seconds phase of this system it implements a normal users to evaluate the measures of the security that secures the infrastructures of the organization to control the accessing of the devices. During the third phase the team will try to utilize the discovered threats to gain access on other networks. This provides the security in wireless local area network, virtual private network, intrusion detection system and wireless public key infrastructure. System Hardening The system hardening stresses on the network vicinity. Security is the prime factor that determines the level of integrity of the information and resources used in the computing. Effective deployment of the security controls unauthorized, accidental disruption if resources in information technology (Kevin Beaver and Peter T. Davis, 2005). The system hardening assessment is complemented in three phases. The ethical hacking team will analyze the network to identify the loop holes in security updates and other frequent security defects. Scanning of the remote access devices is done for finding out the vulnerabilities. The configuration vulnerabilities and missing security updates are determined in the initial phase. In the second step the host operating system is examined to determine the services available for remote users and their level of impact. All the TCP/IP services and also the Telnet, FTP, Send-mail, DNS and others are tested (James S. Tiller, 2005). The packet fragmenting and loose source routing are used in an attempt to bypass filtering routers and firewalls. The last phase is complicated as the team uses the information gathered from the first two steps to mine the weaknesses and threats that were identified to gain access to the host system. Before the start of the three steps the boundaries for actions and events are determined. Hence from the above context it can be stated that ethical hacking is a methodology that is used for gathering the information on the hacker. The ethical hacker is the expert who is hired by an organization to solve the problems related to hacking in their network and computer system. Need for Ethical Hacking The process of employing someone to hack ones company is ethical hacking. Ethical hacking is one of the tools that are used to judge the security programs of the organizations. It is also referred as penetrating testing, red teaming, intrusion testing, vulnerability and even security judgments. Each one these has different meanings in different countries. Hacking is also described as new development of the existing programs, software and code. It makes them better and more efficient (James S. Tiller, 2005). Ethical hacker can know the details of computer while hacking and become the security professional. It involves in foot-printing, scanning, tacking all the secured information. Ethical means a philosophy with morality. Hackers hack systems to detect dangerous, unauthorized access and misuse (Shon Harris, Allen Harper, Chris Eagle and Jonathan Ness, 2007). Threat and vulnerability are the two dangers the hacker has to face. The hacking report must be confidential as it should face the organizations security risks. If this goes wrong in any way the organization results in fatal, penalties and loss. For example: computer crime is done by misuse of their hacking skills. The need to hack is for catching the thief. Ethical hacking is the correct method to make your computers work properly (Kevin Beaver, 2010). Ethical hacker needs higher level skills compared to penetration testing. Penetration testing is same as ethical hacking but the hacker uses the penetrating tools and tests the security danger. Ethical hacking is known as White Hat in some of the literature. It tests both the security and protective issues whereas penetrating test mainly leads with the security issues (Asoke K. Talukder and Manish Chaitanya, 2008). Some of the websites and companies offer the training, but they cannot be created they are self-made. Various types of testing need different types of softwares and tools. Game freaks use hacking technology in order to win the game. Hackers will d iscover many ways to hack like trial and error method, operating systems, online and determining the threats. Ethical hacking is done by hackers on behalf of the owners, and in normal hacking they use their skills for personal use (Debra Littlejohn Shinder and Micheal Cross, 2008). Cyber terrorism includes common hacking techniques such like viruses, email bombs and natural disasters. Thus ethical hacking is done by hackers on owners request. Mainly this is seen in corporate companies and organizations. Ethical hacking techniques are used for game cheat codes, hacking accounts and other for good result. Majorly used for fight against cyber terrorism and to take preventive action on hackers Types of ethical hackings Ethical hackers use various methods for breaking the security system in the organizations in the period of cyber attack. Various types of ethical hacks are: Remote Network: This process in especially utilized to recognize the attacks that are causing among the internet. Usually the ethical hacker always tries to identify the default and proxy information in the networks some of then are firewalls, proxy etc. Remote dial up network: Remote dial up network hack identify and try to protest from the attack that is causing among the client modern pool. For finding the open system the organizations will make use of the method called war dialing for the representative dialing. Open system is one of the examples for this type of attacks. Local Network: local network hack is the process which is used to access the illegal information by making use of someone with physical access gaining through the local network. To start on this procedure the ethical hacker should ready to access the local network directly. Stolen Equipment: By making use of the stolen equipment hack it is easy to identify the information of the thefts such as the laptops etc. the information secured by the owner of the laptop can be identified (Kimberly graves, 2007). Information like username, password and the security settings that are in the equipment are encoded by stealing the laptop. Social engineering: A social engineering attack is the process which is used to check the reliability of the organization; this can be done by making use of the telecommunication or face to face communication by collecting the data which can be used in the attacks (Bryan Foss and Merlin Stone, 2002). This method is especially utilized to know the security information that is used in the organizations. Physical Entry: This Physical entry organization is used in the organizations to control the attacks that are obtained through the physical premises (Ronald l. Krutz and russel dean Vines, 2007). By using the physical entire the ethical hacker can increase and can produce virus and other Trojans directly onto the network. Application network: the logic flaws present in the applications may result to the illegal access of the network and even in the application and the information that is provided in the applications. Network testing: In this process it mainly observes the unsafe data that is present in the internal and the external network, not only in the particular network also in the devices and including the virtual private network technologies Wireless network testing: In this process the wireless network reduces the network liability to the attacker by using the radio access to the given wireless network space. Code review: This process will observe the source code which is in the part of the verification system and will recognize the strengths and the weakness of the modules that are in the software. War dialing: it simply identifies the default information that is observed in the modem which is very dangerous to the corporate organizations. Techniques and tools required for ethical hacking Ethical hacker needs to understand how to find the network range and subnet mask of the target system. IP addresses are used to locate, scan and connect the target systems. Ethical hacker also should find out the geographical location of target system. This can be done by tracing the messages that are sent to destination and the tools used are traceroute, Visual route and NeoTrace to identify the route the target (Kimberly Graves, 2007). Ethical hacking should use right tools or else task accomplishment of task effectively is difficult. Many security assessment tools will produce false positive and negative or may they even miss susceptibility to attacks. In case of tests in case of physical security assessments they miss weakness. In order for ethical hacking specific tools have to be used for the task chosen. The easier the ethical hacking will become if many tools are used. The right tool must be used at right place. The characteristics in tools for ethical hacking is it should ha ve sufficient document, detailed reports should be there on the discovered attacks regarding their fixing and explosion, Updates and support. The general tools used for ethical hacking in case to find passwords are cracking tools such as LC4, John the Ripper and pwdump (Bragg, Mark Phodes Ousley and Keith Strassberg, 2004). The general tools like port scanner like SuperScan cannot be used to crack passwords. The Web-assessment tools such as Whisker or WebInspect tools are used for analysis of Web applications in depth. Whereas network analyzer tools such as ethereal cannot give good results. While using the tools for any particular task it is better to get feedback from the simple Google searches such as SecurityFocus.com, SearchSecurity.com and Itsecurity.com will give nice feedback from the other security experts which makes ethical hacking easy and to select the right tool. Some of the commercial, freeware and open source security tools are Nmap (Network Mapper), Etherpeek, Super Scan, QualysGuard, WebInspect and LC4, LANguard Network Security Scanner, Network Stumbler and ToneLoc. The capabilities of many security and hacking tools are often misunderstood, such as SATAN (Security Administrator Tool for Analyzing Networks) and Nmap. The other popular tools used in ethical hacking are Internet scanner, Ethreal, Nessus, Nikto, Kismet and THC-Scan (Kevin Beaver, 2007). Cain and able is a ethical tool used for recovery of windows UNIX problems. This is only password recovery tool handles an enormous variety of tasks. It can recover the password by sniffing the network, cracking the encrypted passwords using Dictionary and Cryptanalysis, recording VoIP conversations, decoding scrambled passwords, revealing the password boxes, uncovering cached passwords and analyzing routing protocols. Ethereal is a fantastic open source tool used as network protocol for UNIX and Windows. It allows examining the data which is present in disk or file and can capture the data. This is also known as Wire shark. It has many powerful features which have very rich display filter language and ability to view the TCP session. Another cracking tool Aircrack is the fastest available cracking tool (John Hyuk Park, Hsiao-Hwa Chen and Mohammed Atiquzzaman, 2009). Thus proper tools and techniques has to be used for better hacking and it will be easier by using more and more tools required. Hacking operating system Linux is the operating system which is most useful software that supports and will be helpful to identify the passwords and uses in detecting interruption there are many software tools are utilized for the hacking and security tools are used for the Linux. The tools which are using in this are not harmful tools this is especially used to protect. John the ripper: John the ripper is nothing but password hacking software technique which is usually used to develop for the UNIX operating system. This the most significant process which is used for password testing as it joins all password crackers into single package and the auto detects password hash types which involves the customizable cracker (Ryan, David R. Mirza Ahmad, 2002). It can be run among the different encrypted password methods which involves various crypt password hash forms where usually found on the different UNIX operating systems that is based on the DES, MD5 etc, Kerberos AFS and windows like XP, 200etc.Generally passwords are placed in the LDAP and other tools. Various types of components are used to expand the capability and for involving the MD4 related password hashes. The other one is the NMAP; Nmap is the used to protect the network. It is especially used to identify the network related services on the computer network by generating the map of the network . Nmap is having the ability to identify the services on the computer network instead of this it never advertises its service detection protocol (James turnbull, 2005). However the Nmap can collect many details regarding the remote computers. This will involve the operating system, and uptimes etc are the software products that are used to execute the service, and are used to involve on the local area networks and also on the dealer of the remote network card. Nmap can be run on the linux. Linux is the most important operating system and the windows are the second most important operating system. The other operating system used is Nessus, this software is used to scan the virus. The main aim of this software is used to identify the virus on the tested system such as; the virus will permit the data on to the network (Mark Carey, Russ Rogers, Paul Criscuolo and mike Petruzzi, 2008). Default passwords are utilized on the network accounts. This software is also called as the external to ol which is used to launch the attack. By making use of the mangled packets rejection of the service among the TCP/IP can be done. Nessus the best software used to scan the virus. Many organizations through out the world are using this software. The check Rootkit is the normal program which helps the administrator to check their system for the known rootkits ( James Turnbull, 2005). This program is the shell script by using the LINUX tools similar to the strings and the grep commands to seek out to carry out the core programs for the signatures with the executed process status command to look for inconsistency. This program alternatively use own commands to run. This tool will permit check rootkit to get confident the commands upon which it depend a bit more. Applications and resources Ethical hacking is nothing but the one which performs the hacks as security tests for their systems. Ethical hacking can be used in many applications in case of web applications which are often beaten down. This generally includes Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) applications are most frequently attacked because most of the firewalls and other security are things has complete access to these programs from the Internet. Malicious software includes viruses and Trojan horses which take down the system. Spam is a junk e-mail which causes violent and needless disturbance on system and storage space and carry the virus, so ethical hacking helps to reveal such attacks against in computer systems and provides the security of the system. The main application of this is to provide the security on wireless infrastructure which is the main purpose of present business organization (BT, 2008). Ethical hacking has become main stream in organizations which are wishing to test their intellectual and technical courage against the underworld. Ethical hacking plays important role in providing security. Resources are the computer related services that performs the tasks on behalf of user. In Ethical hacking the resources are the core services, objects code etc (James Tiller S, 2005). The ethical hacking has advantages of gaining access to an organizations network and information systems. This provides the security in the area of Information technology called as Infosec. This provides security to the high level attacks such as viruses and traffic trough a firewall. This has been providing the security for various applications which are even bypassing the firewalls, Intrusion-detection systems and antivirus software. This includes hacking specific applications including coverage of e-mails systems, instant messaging and VOIP (voice over IP). The resources i.e. devices, systems, and applications that are generally used while performing the ha cking process are Routers, Firewalls, Network infrastructure as a whole, wireless access points and bridges, web application and database servers, E-mail and file servers, workstations, laptops and tablet PCs, Mobile devices, client and server operating systems, client and server applications (Kevin Beaver, 2007). Ethical hacking tests both the safety and the security issues of the programs (Ashoke Talukder K and Manish Chaitanya, 2008). Hence from the above context it can be stated as the ethical hacking is important in the present scenario as providing security is very important now a day. This is very important in web applications as the hacking can be easily done in this case. Problems Ethical hacking is the backbone of network security. The basic problems with this is trustworthiness of the Ethical hacker because lets take an example if a person has been appointed to do Ethical hacking, to provide security for the bank financial issues if the person is not trust to believe this is not safe as the person only considered as thief. Sometimes the big organizations face any problem like there passwords has been hack, this case hiring professionals is very expensive and the organization need to spend a lot on this (Ethical Hacking, 2009). Ethical hacking is just the security to the problem it is not the ultimate solution to it. Ethical hacking report must be kept confidential because they highlight the organizations security risks and attacks. If this document has been falls into the wrong hand the result would be very disastrous for the organization, the main drawback here is the entire information of the organization will be in hands of wrong person and which leads to the loss of the company (Kimberly Graves, 2007). Ethical hacking generally involves breaking down the computer applications and by collecting specific information from the target the ethical hacker can successful to access the information and can reveal it. This results in that highly sensitive information about the targets security capabilities is collected and maintained far away from the owners control. If this information fall into wrong hands results in real attack on the company and another problem is if the information is leaked to the public or stockholders, the business will be in risk, which results in all types of disasters, including negative character by media, loss of customers and legal consequences (James Tiller S, 2005). Ethical hacking use tools while it performing the activity, if the methods and tools are used incorrectly they cause damage (Dr. Bruce Hartly V, 2003). Hence from the above context it can be stated as Ethical hacking provides security but behind th at it provides the disadvantages like the Ethical hacker should be trusted by the organization or business and in case sometimes highly professionals may cost the organization very much so that company has to provide from the unplanned budget and if it goes into the wrong persons hand the business will be in danger and loss of the organization will takes place. Chapter 3: Research Methodology of Hacking Data types: Data type is defined as the format of a data storage which is used to store different set of values. It tells about which type of data to be stored and where to be stored. Data is stored in computer memory. There are two types of data. They are primary data and secondary data. Both primary and secondary data illustrates the gathering of information and to satisfy the goals of business. Primary data is nothing but it is the data which is collected newly and for the first time. The primary data is original. It is the fresh data and is never gathered before. Secondary data is the data which is collected by others (Norman Blaikie, 2009). The data is collected from newspapers, magazines and journals. Secondary data is gathered before primary data since it is time consuming. Data is gathered newly in case of primary data so it takes much time. Secondary data consumes less time. Primary data is used in ethical hacking since the data gathered in this type of data is very efficient. Ethical h acking is used legally for the official purposes. Since primary data is unique and is not compared with any one, it is used in the process of ethical hacking (Rajat Khare, 2006) Hence from the above context it can be said that data types are useful in the ethical hacking. Case study: According to media and people the word hacking denotes misuse and collapse of computers. They describe it as unfair method of solving the problem. In the view of ethical hackers the word hacking refers to creative. One of the organization namely Amazon, it is not proposed to point out the lesser features but deals with tricks for working the company efficiently. Hackers and developers will create new characteristics for Amazon. They bring out the creative thinking and innovative ideas by their work in company (Paul Bausch, 2003). Mainly the ethical hacking is the good way to improve the existing methods and qualities. Many organizations follow these because one can know the administrative password of employees, can reach the behaviour of them and working performance. Employee performance and his project carryout can be studied through ethical hacking. These hackings look easy for them since they are engaged with the security firms to protect the Amazon fields. Not only in Amazon in e ach and every org