Thursday, December 26, 2019

Notes On Autism Spectrum Disorder - 1656 Words

Lydia Chludil Personal Special Education Teaching Philosophy Paper TE 434: Introduction to Autism Spectrum Disorder David Rose 4/15/2016 What are the historical theories, who are the major contributors, and what are the relevant federal laws underlying the field of ASD? The historical theories that are in the field of ASD all originated with Leo Kanner. His work was started in 1943 where he identified â€Å"autism† using common descriptions. The descriptions lead to a certain criterion that was then used to identify those with ASD. The criteria included, but is not limited to, rare communication behaviors, as well as restricted and repetitive patterns of behaviors. Kanner worked to portray autism instead of define it.†¦show more content†¦The federal laws underlying the field of ASD are the Individuals with Disabilities Act 2004 and Section 504 of the Rehabilitation Act; both were created to protect the rights of individual with disabilities. Individual Disabilities Act is focused on the implementation of educational needs and services to students up to 21 years of age. It also entitles every student t o a free public education. Section 504 provides a free public education and each student receives services in the same manner as those who do not have a disability. Both of these federal laws were created to contribute to the education and development of every individual that would need an IEP. How do these theories interact with the dynamic development of the ASD definitions over time? According to dictionary.com â€Å"Autism spectrum disorder is a serious neurodevelopmental disorder that impairs a child s ability to communicate and interact with others. It also includes restricted repetitive behaviors, interests and activities. These issues cause significant impairment in social, occupational and other areas of functioning.† When ASD is googled, there are many possible definitions as a result, and not a single one is 100% comprehensive. There have been various theories to the development and definitions of ASD. These theories are dynamic to the development of the definition of ASD over time because the theories began targeting simple behaviors and labelling

Wednesday, December 18, 2019

The Immigration Law Of 140 Years - 925 Words

Throughout the years we have gone through various achievements; the election of the first â€Å"Black† President; the release of enslavement; the approval of â€Å"Gay† marriage and more, yet immigration still remains untouched. Now that is clearly an exaggerated statement, but The fact that the immigration law of 140 years ago is still not seen as a type of repression and the American current civilization is still in denial of it, is what makes it ever so severe. From the first immigration policy: the Page Act of 1875, to the Immigration reform and Control Act of 1986 the immigration policies have remained the same. Both acts, among others are not written for the safety of one country but for the racial discrimination of one specific group of immigrants, now especially to Latin Americans. Because of this discrimination is why it is so essential to understand how the immigrants have continued to exclude people and have not changed over time. The Page Act determined whether the immigration of any subject of China, Japan, or any Oriental country, to the United States, is free and voluntary. Further the importation into the United States of women for the purposes of prostitution was forbidden and deemed a conviction of no more than five years of prison time (Included in Chapter 141 Section 3 and 5 session 2). This act was incredibly specific in its exclusion, it deliberately targeted a particular group and limited their entrance for example by adding one characteristic (prostitution)Show MoreRelatedU.s. Department Of Homeland Security Essay778 Words   |  4 Pagesform I-140, employer petition. Unfortunately, eligibility for this immigration benefit under the proposal is highly restrictive and therefore will aid a far narrower group of foreign national workers than had been hoped. Background on I-140 EAD Rule The proposed rule includes a discussion that acknowledges the problems created by the lack of employment flexibility in the current immigration system. Accordingly, the I-140 EAD rule would apply to qualifying beneficiaries of approved I-140 petitionsRead MoreSample Essay1211 Words   |  5 Pagesresearch, real estate law, civil procedure, personal injury, immigration law, intellectual property, business law, wills, family law, trusts, probate and corporate law. Alief Hastings High School -- 2002 to 2006 High School Diploma †¢ Graduated among top quarter of a class of 800 †¢ Participated in extra-curricular activities including: Soccer, Track, Cross-Country, Baseball, JETS Club, Yearbook and Debate. Employment History Foster LLP August 2015 to Present Immigration Paralegal: Provide assistanceRead MoreBiography Of Donald J. Trump845 Words   |  4 Pagesfederal court order. Joseph Michael Arpaio was born in June 14, 1932, and is still a former law enforcer in the state of Arizona. He is known for his stances on illegal immigration and leading an investigation on the validity of Barack Obamas birth certificate. He has been accused of abusing power, misuse of funding, failure in researching on sexual crimes, unlawful enforcement on illegal immigration, election law violations, and racial profiling (especially targeting Hispanics). Not only has he committedRead MoreTexas 85th Legislative Session1630 Words   |  7 PagesTexas’ 85th Legislative Session Texas has a legislative session every two years. Currently the legislature is in session from January 10, 2017 to May 29 2017, a total of 140 days. During these 140 days the legislators have to work fast to try to get through all the bills. A bill is written and proposed by a Representative from the House of Representatives or from a Senator from the Senate. Once it is filed the bill goes to the Senate or House Committee, if it was filed in the senate than it wouldRead MoreImmigration in USA Essay1363 Words   |  6 Pagesplace for immigration. The history proved that the United States was the dream land, the place of chances. That started when Europeans escaped form their countries because there were no jobs and no safe places to live. America became the best choice for people who were looking for political asylum, jobs, or freedom, but after a few generations something changed the Americans look to immigrants as strangers and they forgot where they are from because America is mul ticultural place and immigration movementRead MoreCitizenship by Birthright Essay941 Words   |  4 Pagesadvocate is Senator Lindsey Graham, a representative from the state of South Carolina. In summation, Mr. Graham believes the United States made â€Å"a mistake† in granting said citizenship and that the birthright practice only serves to encourage illegal immigration (Preston, 2010). This senator is one of many who believe illegal immigrants are not under jurisdiction of the United States, as outlined in the fourteenth amendment. Furthermore, he shares a belief immigrants cross United States borders with theRead MoreImpact Of Immigration On The United States1017 Words   |  5 Pagespassed during that time that affected immigrants. America’s view at this time reflected that of strong Nativism. Several anti-immigration groups had their fair share of influence in political affairs that had a negative affect on certain groups. This paper will outline the events t hat led to three pieces of legislation. This paper will also highlight the impact on immigration and how the chosen pieces of legislation contributed to future legislation (if at all). The first piece of legislation highlightedRead MoreThe Constitution And The United States1483 Words   |  6 Pageshas been searched. There are fifty states in United States. Each state has constitutions, laws and government. There are some similarities and differences between the states. Although Texas is one of the biggest states in the United States, the question is Texas is the strongest state. There will be three areas that will be discussed, the constitution, the style of government and the immigration laws of both states. The first topic is the constitution, in order to understand the each stateRead MoreImmigration Reforms Domino Effect 1347 Words   |  6 Pagesaffect those situations immediately at hand, but also those for generations to come. This paper will be delving into immigration reform in Arizona, and more specifically the negative effects that the border surge has had on the socio-economic status of the Grand Canyon state. The motivation for choosing this to pic comes from the time spent personally living in Arizona for 12 years and seeing it as one of the most dynamic states having to solve problems for a multitude of issues that arouse withinRead MoreIllegal Immigrants in Lebanon Essays1564 Words   |  7 Pagesemployers prefer these low salaries, non-insurant workers on Lebanese ones. This situation of illegal immigration has led to negative impacts on Lebanon. First, it gives bad reputation to the country when it serves as a bridge to EU. Second, the immigration drives down wages and conditions to the detriment of Lebanese workers. Third, many illegal immigrants are involved in activities prohibited by Lebanese law such as arms, drugs traffic, car lifting and others. Finally, these clandestine do not pay income

Monday, December 9, 2019

Management Practice and Theory Competitive Business

Question: Describe about Management Practice and Theory for Competitive Business. Answer: Introduction: In present competitive business environment, the phrase teamwork has able to enhance its significance greatly. Since, teamwork plays a crucial role in achieving organizational goals and objectives (West 2012). Therefore, several modules and theories are developed on the teamwork operation and its impact on the organizational success. Many studies have found that when employees have to work on their own, they often feel reluctant towards their responsibilities. As a result, they do not give their full effort in order to fulfill organizational goals and objectives. Therefore, management in organizations has to play a crucial role in developing effective team for the organizational success. However, managers have to consider several things at the time of developing effective teamwork in the organizational atmosphere. The major issue of developing establishing an effective teamwork is that it does not follow any specific rules. In fact, managers of different organizations have deal with different problem at the time of developing a strong foundation for implementing effective teamwork. In this assignment, the focus will be on different perspectives of teamwork establishment in order to identify the kind of challenges that organizations have to face at the time of developing effective team. Main body: Current business environment induces organizations to face with several types of internal and external factors that also have its impact on the employee performances. As a result, different organizations implement different rules in order to counter these factors and remain competitive in the market. For instance, organizational environment or economic environment is a major external factor that can affect business of an organization (Ulrich 2014). On the other hand, structure of an organization also has greater impact on the operational effectiveness. Since, these two factors create difficulties for the employees in managing their responsibilities. Therefore, modules and theories that describe organizational structure emphasizes on the teamwork operation that will include each and every employees of the organization. Many studies have also describes the way for organizations in developing an effective structure. It also highlighted that organizational structure heavily depends on bo th managers and employees effort. As a result, implementing effective teamwork is necessary for maintaining an effective organizational structure. On the other hand, organizational environment or economical environment is the external factor that organizations face in maintaining effective operational responsibilities. As per the article by Galegher, Kraut and Egido (2014) economical environment has two categories namely macroeconomic environment and microeconomic environment. The article highlighted that macroeconomic environment can affect entire business operation. On the other hand, microeconomic environment include the factors that affect organizational decision-making. Studies have established the fact that these factors have great impact on the effectiveness of the teamwork. Therefore, organizations have to consider elements like group composition, cohesiveness and motivation level of the employed staff so that the organization can able to maintain proper teamwork atmosphere. It also influences managers to utilize promoting effective team meetings, leading by examples, appraising achievements of any employee and developi ng proper work atmosphere so that employees can able to work together for the achievement of the organizational goal and objectives. As mentioned by Walzer et al. (2014) teamwork is necessary for the as it provides the opportunity for the maximum achievement of the organization. Therefore, collaboration among employees is a prime key for the success of the organization. However, the article also highlighted the fact that organizations also have to provide the atmosphere where employees can able to fulfill their individual goals. Since, higher probability of achieving individual goals allows employees to work more efficiently in a team environment. For instance, Ford automobile that considered among the top automobile manufacturer in the world, utilize well-organized work structuring in USA. The company follows a well-structured mechanism that is applicable for the top-level managers as well as for the ground level employees. Well-defined team objective is another prime factor that organizations have to consider at the time of developing effective teamwork environment. Since, it acts as a guideline for the employees to move towards the right direction, which eventually creates positive impact on the organizational goals and objectives. In this situation, practices of Google management can be highlighted. Since, Google utilize a unique OKR technique for tracking and defining objectives and evaluates outcomes (Lantz Friedrich, Sjberg and Friedrich 2016). It also describes the progress of an organizational objective with measurable results. The great significance of this technique is that it describes how an individual managers expectation varies with the possible level of achievement. Many studies have highlighted the significance of individual achievement appraisal and efficient team meeting on the utilization of effective teamwork. Since, ensures that all the employees of the organization are in right track. It also helps organization to implement regular planning procedure so that it can reduce the possibility of organizational failure (Schultz, Vitton and Butz 2015). Many successful organizations like Microsoft Corporation conduct staff meeting regularly in order to keep the mind of the employees in right shape. Microsoft also utilizes individual achievement appraisal in order to ensure that the employees are going in the right direction so that they can able to adjust to the new innovative and competitive environment. As per the article by Mintrom and Salisbury (2014) team working should not be regarded as an obligation but have to be considered as one of the prime responsibilities of the organization. Since, teamwork increases the possibility of developing healthy work environment. Teamwork creates humors in the work environments that eventually create positive impact on the cohesiveness of the employees. The article also highlighted that the prime responsibilities of the managers is to oversee the organizational approach in starting and fulfilling a particular task effectively. In enhances interaction and socialization among the employees. Over the years, many management theories have been developed in order to explain how managers should work so that they can able to handle teamwork of the employees in an effective manner. In the book The Function of Executive, Chester Barnard has developed; a model that describes that organization operates as a cooperative system (Farh, Seo and Tesluk 2012). As per this theory, an organization is developed only when an individual can fulfill his own task effectively. The theory also highlighted that organizations have to utilize all its internal resources in order to remain competitive in this hostile business environment. Thus, it has to utilize its capital, equipment and labor in order to succeed in the market. Therefore, the theory highlighted the significance of teamwork for an organization in order to remain competitive in the market. Since, effective utilization of teamwork allows organization to utilize all its resources in a much more effective way. In fact, the theory highli ghted the fact that organizations are developed so that a group of individual can able to work towards a particular objective so that the businesses can able to taste success in the market. The organizational complexity leads to develop many others managerial theories that describes the significance of teamwork in order to gain success in the market. As per the system equilibrium theory, every organization has to achieve a balance in their system (Davidson 2013). The theory highlighted that organization need a balance between two equilibriums process that describes balance between the environment, organizational characters and its members. The theory also highlighted that both the equilibrium try to balance either its members or environment. Thus, it highlighted the fact that utilization of effective teamwork helps organization to achieve both the equilibriums. The inducement contribution theory is relatively complicated as it may argue about circulating in the motivation theory. In the present complex managerial environment, managers are often involved in different types of brain storming process to come up with a solution for the several challenges that organization is facing right now. Bureaucratic model of organization describes the way to develop individuals within the workplace. As mentioned by Maxwell (2013) bureaucratic model describes a well defined way for the organizations that will help to move in the right direction. The article also highlighted that every organization have to follow the chain of command where command will implemented from the top level management to bottom level management. Since, it allows employees to understand the command of the higher authority in a much effective way. As a result, it reduces the possibility of any confusion in the workplace. Therefore, it helps organizations to improve the cohesiveness a mong the employees that eventually help to develop effective teamwork. The bureaucracy model also highlighted that organizations have to perform employment in a well-demonstrated competencies so that it can protect all the employees from any types of arbitrary dismissals. Organizations also have to provide a well-organized way for training the employees so that they can able to work together for the success of the organization. On the other hand, Crawford and Lepine (2013) mentioned that bureaucracy model also have some disadvantages as well. The demerits of bureaucracy model include excessive dependency on the organizational rules and regulations. Since, it induces employees to work in a mechanical way. This model also makes the employees more resistance whenever organization will introduce new techniques and systems. As per the article by Siassakos et al. (2013) leadership is another crucial factor that play key role in utilizing teamwork at the organizational workplace. The article highlighted Kurt Lewins force field theory that describes the significance of leadership skill in decision making process. The theory also highlighted the impact of the democratic in a company. The article also highlighted that Kurt Lewin also mentioned different style of leadership namely autocratic, democratic and laissez-faire that organization can utilize for the effective utilization of the operational process. However, the theory also highlighted that democratic leader always able to get more cooperation from the employees. Since, democratic leadership style allows employees to share their opinion and also provides the freedom to work freely within the organizational structure. On the other hand, autocratic leadership style increases the frustration level among the employees, as they do not able to share their v iews and thoughts to the management (Long and Fang 2013). Therefore, the article mentioned that organizations are more likely to utilize teamwork by introducing democratic leadership style in the organizational workplace. Kozlowski et al. (2015) mentioned Lewins theory of Force Field Analysis that describes that activities of the employees are affected by the surrounding environment. The theory mentioned that environment is mutually interacting characters that are completely independent from each other. The Force Field Analysis also utilizes three principles that include mathematic presentation of concentric stations. It also highlighted the behavior as the key function of the field where the company is laid and the beginning of analyses in a complete situation. The prime objective of this theory is to determine when the company is progressing or to identify whether the company is static in its position. This analysis is crucial, as it allows organizations to implement necessary changes so that the company can able to fulfill its objective in an appropriate manner. The Force Field Analysis highlighted many factors including individual goals, employee ambition and the overall objectives of the organiza tion. As per the article by Chuang, Jackson and Jiang (2016) group decision theory is another important theory that highlighted the importance of teamwork in the organizational workplace. The theory highlighted the significance of sharing ideas in the workplace so that every individual can agree in a common idea so that organization can able to fulfill its operational requirements effectively. The theory also highlighted two prime ideas of group dynamics. This includes task interdependence and interdependence of fate. The interdependence of fate highlighted the fact that every individual in the group has different characters. The presence of different types of character is an advantage for the group. Since, a member who has already achieved a particular objective will always be ready to take on new challenges. Therefore, that particular member will induce other individuals to take on the objective. As a result, organization will able to increase its level of efficiency. On the other hand, task interdependence reflects that interdependency of a group in achieving a particular goal will help organization to create strong group dynamisms. Therefore, it will help organization to fulfill all their objectives in an appropriate way. In addition, Stashevsky and Levy (2014) mentioned that effectiveness of the group heavily depends on the level of interdependence. If an organization holds very low level of interdependency then it will saturate the growth of the organization. However, the theory highlighted that if all the member of the group share common objective then it is more likely to have a strong team bonding. This eventually will create positive impact on the overall effectiveness of the organization. Conclusion: From the above discussion, it can be assess that organizations have to consider many factors that can have affect on the teamwork. The above discussed theories and examples highlighted that organizations have to summarize the entire ideology for improving the effectiveness of the teamwork. However, it is evident that developing an effective teamwork environment is not an easy task. In the present business context, every organization utilizes complex operational system that operates at several levels to fulfill common organizational goal. Now, every system is implemented by different set of people who possess different characters. In order to keep them on the same page, managers of the organization have to take greater responsibility to show the right way for the employees to move forward. Managers also have to understand the kind of external and internal challenges that employees are facing in the work environment. Therefore, managers also have to motivate all the employees so that t he cohesiveness of the group does not get affected. Thus, it can be mentioned that developing effective teamwork is not an easy process but organizations have to utilize it in an appropriate way to remain competitive in the market. References: Chuang, C.H., Jackson, S.E. and Jiang, Y., 2016. Can knowledge-intensive teamwork be managed? Examining the roles of HRM systems, leadership, and tacit knowledge.Journal of management,42(2), pp.524-554. Crawford, E.R. and Lepine, J.A., 2013. A configural theory of team processes: Accounting for the structure of taskwork and teamwork.Academy of Management Review,38(1), pp.32-48. Davidson, H., 2013. An exploratory study into attitudes towards teamwork in the workplace and in the academic environment. Farh, C.I., Seo, M.G. and Tesluk, P.E., 2012. Emotional intelligence, teamwork effectiveness, and job performance: the moderating role of job context.Journal of Applied Psychology,97(4), p.890. Galegher, J., Kraut, R.E. and Egido, C., 2014.Intellectual teamwork: Social and technological foundations of cooperative work. Psychology Press. Kozlowski, S.W., Grand, J.A., Baard, S.K. and Pearce, M., 2015. Teams, Teamwork, and Team Effectiveness: Implications for Human Systems Integration.APA handbook of human systems integration. Washington, DC, US: American Psychological Association. Lantz Friedrich, A., Sjberg, A. and Friedrich, P., 2016. Leaned teamwork fattens workplace innovation: the relationship between task complexity, team learning and team proactivity.European Journal of Work and Organizational Psychology, pp.1-9. Long, R.J. and Fang, T., 2013. Profit sharing and workplace productivity: Does teamwork play a role?. Maxwell, J.C., 2013.The 17 indisputable laws of teamwork: Embrace them and empower your team. Thomas Nelson Inc. Mintrom, M. and Salisbury, C., 2014. 8 Policy entrepreneurs, creative teamwork, and policy change.Making Public Policy Decisions: Expertise, Skills and Experience, p.129. Schultz, P.L., Vitton, J.J. and Butz, N.T., 2015. The Race to the South Pole: Lessons in Problem Solving, Planning, and Teamwork.Journal of Critical Incidents,8, p.120. Siassakos, D., Fox, R., Bristowe, K., Angouri, J., Hambly, H., Robson, L. and Draycott, T.J., 2013. What makes maternity teams effective and safe? Lessons from a series of research on teamwork, leadership and team training.Acta obstetricia et gynecologica Scandinavica,92(11), pp.1239-1243. Stashevsky, S. and Levy, S., 2014. The effects of teamwork quality on team objective and subjective outcomes.Values in Shock The role of contrasting management, economic, and religious paradigms in the workplace,44. Ulrich, D., 2014. The future targets or outcomes of HR work: Individuals, organizations and leadership.Human Resource Development International,17(1), pp.1-9. Walzer, T., Simon, R., Berry, W., Cooper, J., de Moya, M., Dwyer, K., Hemingway, M., Kissane, N., Nadelberg, R., Palaganas, J. and Pawlowski, J., 2014. Board# 254-Program Innovation A Perioperative Teamwork Instructor Training Program for Supporting Perioperative Teamwork Training (Submission# 10164).Simulation in Healthcare,9(6), p.473. West, M.A., 2012.Effective teamwork: Practical lessons from organizational research. John Wiley Sons.

Monday, December 2, 2019

Lady Macbeth In The Tragedy Of Macbeth; The Iron Butterfly Essays

Lady Macbeth in The Tragedy of Macbeth; the "Iron Butterfly" In William Shakespeare's, The Tragedy of Macbeth, Lady Macbeth is the dominator of the play. Lady Macbeth's character is not as eclectic as her husband's but it is just as dramatic. Lady Macbeth has a rich and fascinating combination of qualities. She is not a monster without feeling; her husband adores her, for example, "Be innocent of the knowledge, dearest chuck," (III, ii, 45). Macbeth also refers to Lady Macbeth as his dear partner. Lady Macbeth is horrified by blood and during her sleepwalking soliloquy she refers to her little hand suggesting a delicate nature and stature by uttering this: "All the perfumes / of Arabia will not sweeten this little hand." (V, i, 43-44). All of this, however, does very little to soften her true nature. She is sly and artful as she urges Macbeth to kill Duncan and she is particularly treacherous when she continually urges him to shake off his torments. For example, in this scene from the play, Shakespeare gives the reader an idea of the twist that he gives her personality and how ruthless she can be: I have given suck, and know How tender 'tis to love the babe that milks me: I would, while it was smiling in my face, Have plucked my nipple from his boneless gums, And dashed the brains out, had I so sworn as you Have done to this. (I, vii, 54-59). In the next examples you can see how she persuades Macbeth to ignore his torments of his guilt of the murder: "These deeds must not be thought / After these ways; so, it will make us mad. " (II, ii, 33-34), and "Why, worthy thane, / You do unbend your noble strength, to think / So brainsickly of things?" (II, ii, 43-45). Seemingly, she suffers no pangs of conscience. It is easy for her to be "bright" and "merry" and it seems second nature for her to play at being the most gracious of hostesses. Duncan is completely deceived by her "thoughtfulness." Also, take in consideration that in the midst of her chaotic dinner party, she retains her composure and saves her husband from added embarrassment. In today's vernacular, she might accurately be characterized as being an "iron butterfly"-delicate but invincible. She is impatient and absolute when her husband cannot carry out the details of their assassination plot. Although it is Macbeth who commits the actual deed of murder, it is Lady Macbeth who returns to Duncan's chamber and smears the blood upon the grooms. Her self-control is superhuman; in fact, Macbeth is terrified of it and her unfailing resourcefulness. In this example, Shakespeare demonstrates how much self control she has over the evil deed: "A little water clears us of this deed: / How easy it is then!" (II, ii, 66-67). In fact, Lady Macbeth tried to murder Duncan herself, but he appeared to look like her father while he was sleeping so she could not. Selfishly, she fastens her husband's attention on the throne of Scotland. It is she who sees to the details of the crime: "Only look up clear. / To alter favor ever is to fear. / Leave all the rest to me." (I, vi, 69-71). It is she who is more concerned that Macbeth has failed to kill Duncan, when he reconsiders the murder, than the possibility that their plans have been exposed. It is she, rather than Macbeth, who says, Go get some water, And wash this filthy witness from your hand. Why did you bring these daggers from the place? They must lie there: go carry them, and smear The sleepy grooms with blood. (II, ii, 45-49). She immediately perceives that the blood and the daggers are incriminating and admonishes Macbeth for being so foolish. Throughout the play, her courage and her practicality work together successfully. It is only in private that Lady Macbeth shows her weariness. Almost naively, she urges Macbeth to sleep and, here, her faith in sleep is deeply ironical. It is only after she has suffered a mental breakdown, that you realize how deeply her crimes have haunted her. This is an quotation from the play from the

Wednesday, November 27, 2019

Affirmative Action Essays (2272 words) - Social Inequality

Affirmative Action Essays (2272 words) - Social Inequality Affirmative Action Affirmative Action Affirmative action has been the subject of increasing debate and tension in American society. Affirmative action is the nations most ambitious attempt to redress the issues of racial and sexual discrimination. According to the University of Rhode Island, Affirmative action is defined as, the specific actions in recruitment, hiring, upgrading and other areas designed and taken for the purpose of eliminating the present effects of past discrimination, or present discrimination (www.riuniversity.edu , 8). This allows minorities and women to be given special consideration in education and many other areas. The need for affirmative action is essential to college admissions credentials. Institutions with affirmative action policies generally set goals for increased diversity and equal opportunity among minority students. Our society is not one of equality, but affirmative action provides a way that problems with inequality can be address to the public. Minorities such as African-Americans, Asians, and Hispanics live mostly in urban areas that have large populations. Therefore, many minorities normally attend lower quality schools. Colleges usually do not take into account that students come from different backgrounds and different quality schools. The students that have better intermediate and secondary schools have an advantage in college admissions, which exclude many minorities. Affirmative action helps students who come from a lower quality secondary school to have a chance to prove themselves in accredited college. Another advantage of affirmative action is that it provides an environment of diversity. Diversity is essential to colleges and students. As part of higher education, students learn from face-to-face interaction with faculty member and other students to work productively inside and outside the classroom. Racial diversity can enhance college atmosphere by improving communications. It can also develop understanding among individuals of different races. Affirmative action can help students overcome prejudices when students discover just how much they have in common with their peers from other races. The educational benefit of affirmative action is that majority of the students who has previously lack significant direct exposure to minorities, frequently have the most to gain from interaction with individuals. Diversity on college and university campuses may be something that helps people expand their mind, or be open to new opportunities. In the article Needed documentation of how affirmative action benefits all students, it discusses how it is essential t colleges and students to have minorities on the campuses (6). In the section, The Evidence for Diversity: Then and Now, it states: In Justice Powells opinion, Baake relied heavily on the Harvard Plan. The admissions policy of Harvard College include justification for considering race as one of many factors used in deciding whom to admit. The plan stated that of Harvard College is to continue to offer first rate education to its students, minority representation in the undergraduate body would be ignored (2). Justice Powell went on to support diversity plan, which was in 1978. I the seventies, the same things were happening as it is today. People were fighting to have their race or someone elses as a factor in college admissions. Although this happened at Harvard in 1978, it continues today all over the United States. The article goes on to state that twenty years later much has changed, yet we still rely on anecdotal evidence to support the claim that a racially diverse student body is essential to quality education (2). Affirmative action dealing with college is still trying to make campuses a more diverse place with a racially diverse student body. Admitting someone into college or a university because they are smart, not only gives them a chance to be someone, but it also allows that campus to be diversified. In the article, Diversity Fades on Campus, it says schools routinely make exceptions for jocks, the children of big donors and alumni, and friends of power brokers. So why shouldnt these same schools be allowed to make exceptions for minority students. Minority students need the same advantages as jocks or students of big donors to have an equal opportunity in school. Affirmative action gives the same exceptions that some students who arent minorities receive t get into college. According to Jackie Snow in the article The Positive Aspects of Affirmative Action the author states that minority and women remain economically disadvantage.

Saturday, November 23, 2019

Building an Effective Plan of Improvement for Teachers

Building an Effective Plan of Improvement for Teachers A plan of improvement can be written for any teacher who performs unsatisfactorily or has a deficiency in one or more areas. This plan can be stand-alone in nature or in conjunction with an observation or evaluation. The plan highlights their area(s) of deficiency, offers suggestions for improvement, and gives a timeline in which they must meet the goals set in the plan of improvement. In many cases, the teacher and administrator have already had conversations regarding the areas that need improvement. Those conversations have yielded little to no results, and a plan of improvement is the next step.  A plan of improvement is intended to provide the teacher with detailed steps to improve and will also provide critical documentation should it become necessary to terminate the teacher. The following is a sample plan of improvement for teachers. Sample Plan of Improvement for Teachers Teacher: Any Teacher, Any Grade, Any Public School Administrator: Any Principal, Principal, Any Public School Date: Friday, January 4, 2019 Reasons for Action: Performance Deficiencies and Insubordination Purpose of the Plan: The purpose of this plan is to provide goals and suggestions to help the teacher improve in areas of deficiencies. Admonishment: Area of Deficiency Instructional IneffectivenessUnsatisfactory Teaching PerformanceWillful Neglect of Duty Description of Conduct or Performance: I have formally and informally visited Mrs. Teacher’s classroom several times since the beginning of the school year. Most every time Mrs. Teacher has been sitting at her desk, students have been working on worksheets, writing spelling words, etc. I have seen very little teacher instruction occurring and when I have seen instruction it has been a review of previously learned concepts, rather than new information.During my observations, I have noticed that the students are not involved in learning. Most seem disinterested in the classroom proceedings, and many of them hardly bother to go through the motions of responding when called upon by Mrs. Teacher.On Wednesday, December 19, 2018, I walked into Mrs. Teacher’s classroom and noticed the students were left in there unattended. Mrs. Teacher left the classroom to grab a cup of coffee and to use the bathroom and did not have anyone watch her classroom.On, Friday, December 21, 2018, I visited Mrs. Teacher’s classroo m three times throughout the day with the visits lasting about 10-15 minutes each time. When I entered the classroom all three times, Mrs. Teacher was at her desk, and the students were working on worksheets. Many of the students seemed bored and disinterested with their work. On occasion, a student would go up to her desk for help, and she did get up on one occasion and walk around the room monitoring the students’ progress. Assistance: Mrs. Teacher must receive prior administrator approval before leaving her classroom while students are in the classroom.Mrs. Teacher will be given several articles that provide successful tips for classroom management, motivation techniques, and instructional strategies.Mrs. Teacher will be required to observe another designated teachers classroom for one hour on Monday, January 7, 2019, from 8:30 – 9:30 a.m. and again on Thursday, January 10, 2019, from 1:15 p.m. – 2:15 p.m. The other teacher is a veteran teacher and does a fantastic job motivating and instructing students.Mrs. Teacher must not leave any students without adult supervision during any part of the school day. Timeline: This plan of improvement will remain in effect for three weeks, beginning Friday, January 4, 2019, and ending Friday, January 25, 2019. Consequences: This is a plan of improvement that highlights your deficiencies as a professional educator. These are serious enough to admonish you and give notice of deficiencies in the areas listed above. Failure to correct these deficiencies will result in a recommendation for your suspension, demotion, non-reemployment, or dismissal. Delivery Time to Respond: This plan of improvement was delivered in a meeting with Mrs. Teacher on Friday, January 4, 2019. She has until Friday, January 11, 2019, to sign and return a copy of the plan of improvement. Formative Conferences: The initial conference to go over this plan of improvement will be on Friday, January 4, 2019. We will have a review conference on Friday, January 25, 2019. This conference will be used to review and discuss the progress Mrs. Teacher has made towards the provisions listed in this letter of admonishment and plan of improvement. Signatures: ______________________________________________________________________  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Any Principal, Principal, Any Public Schools/Date ______________________________________________________________________  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Any Teacher, Teacher, Any Public School/Date I have read the information outlined in this letter of admonishment and plan of improvement. Although I may not agree with the assessment of my supervisor, I understand that if I do not make improvements in the areas of deficiency and follow the suggestions listed within this letter that I may be recommended for suspension, demotion, non-reemployment, or dismissal.

Thursday, November 21, 2019

Damas Jewellery Coursework Example | Topics and Well Written Essays - 1500 words

Damas Jewellery - Coursework Example The prime objective behind implementation of the strategies is to amplify the productivity and market share of Damas Jewellery as compared to many other rival players. In addition, by evaluating the upcoming opportunities, the organization might plan its approaches in an efficient way so as to enhance its customer base and position that may restrict the entrance of other new players. Damas Jewellery has positioned itself as one of the reputed international Jewellery and watch retailer, being headquartered in the region of Dubai of United Arab Emirates. The organization came into existence in the year 1907 and within few years, it expanded itself in more than six countries such as UAE, Bahrain, Qatar, Kuwait, Oman, Saudi Arabia and others. It mainly specializes in artistic jewellery of gold, diamond and pearls as well as designed watches. Damas Jewellery includes various brands such as Ananya, Farasha, Hayati, Mira, spring, Farfasha, Fior, Legacy, Navaratna, Rangoli, as well as many international brands like Baraka, Givori, Utopia, Garrard and others. All the above mentioned brands are available in all the 300 stores of Damas Jewellery and it tries to offer them at best prices. Moreover, the organization also tries to design, develop as well as distribute gold and diamond jewelleries to different parts of the world and as the organization desires to sell the jewelleries directly to the customers with the help of jewellery galleries, art fairs, shows as well as online sites so its rate of accessibility is extremely high as compared to many others jewellery retailers. The company also tries to sell its designed goods through B2B retailer, franchises as well as distributors. Therefore, these types of selling strategies provide highest advantage to the organization that amplifies its total sales and profitability as compared to other rival players. Damas Jewellery became successful in amplifying its customer base as it

Tuesday, November 19, 2019

Motivation and job satisfaction Literature review

Motivation and job satisfaction - Literature review Example Pizam (2005) noted that process theories are based on certain theories that include expectancy theory (1964), goal-setting theory (1990), cognitive evaluation theory, equity theory and reinforcement theory (1974). The process theories assist in having adequate understanding about the factors accountable for motivations and determining cognitive processes of an individual (Pizam, 2005). The definition of motivation has been identified to be explained by different authors in different context. According to Singh & Tiwari (2013), term motivation is defined as a method, which accounts the intensity, direction along with determination of practices of an individual towards a postulated goal. According to the study, it has been perceived that the degree of motivation of any individual or group varies in accordance with various influencing factors such as type of practices and time. Theory of motivation comprehensively includes three key determinants, including intensity, direction and persistence (Singh & Tiwari, 2013). Moreover, the study of Brown & Sargeant (2007) also suggests that term motivation is often characterised into two major categories such as extrinsic and intrinsic motivation. The concept of extrinsic motivation denotes the rewards that are tangible, including monetary benefits, promotion, security and conditions among others. On the other hand, the concep t of intrinsic motivation significantly defines the intangible rewards such as psychological appreciation, promotional rewards along with various types of approvals and admirations among others (Singh & Tiwari, 2013; Brown & Sargeant, 2007). In a sociological context, the theory of motivation is defined differently than the other area of interest. In this context, Zalenski & Raspa (2006), motivation is defined as a way where an individual is satisfied by addressing his/her different types of basic needs in his/her day-to-day life. The

Sunday, November 17, 2019

Shark evolution Essay Example for Free

Shark evolution Essay Sharks, commonly referred to as fish are in fact quite different from the regular bony fish. Sharks have a cartilaginous skeleton, which is does not fossilize well, but despite this sharks have left a considerable fossil record. Shark evolution is in fact one of the most successful cases of phylogenic development. The evidence of sharks dates back to over 400 million years ago, almost 200 million years before the first dinosaurs, and before the evolution of any land vertebrates, in the Ordovician period, at the start of the Palezoic era. The only fossils of the oldest sharks are the scales and teeth, the teeth being quite durable and easily mineralized. The teeth in particular reveal that the oldest sharks were quite different from their modern descendants. And even through vertebrates like dinosaurs were eliminated centuries ago, sharks continue to exist today, with almost 1100 species. Among the most primitive sharks was the Cretaceous, discovered in Texas. The Cretaceous is believed to be about 65 million years old. The earliest life on earth dates back to almost 4 billion years ago, to a group called the prokaryotes, which includes the first bacteria. The prokaryotes did not even have a defined nucleus. The oldest eukaryotes, which were more advanced, and had specialized organelles evolved about 2 billion years ago. These included the famous amoeba. But the first multicelluar life form dates back to about 600 million years ago, to the â€Å"Edicarian assemblage† in Australia. Jawless fishes are believed to be the first vertebrates to have evolved, and date back to about 500 million years ago. Sharks then appeared about 450 million years ago. But even though paleontologists have considerable evidence, shark evolution posed many problems because of the fossils. With time, most of the evidence was eliminated. The scales are mostly very small in size, and have many impressions of soft tissues. But despite these drawbacks, studies reveal a rich history. The oldest shark scales go back to about 455 million years ago. But since they are quite different from those in modern sharks, most paleontologists agree that they are not from sharks. The first acknowledged fossil dates back to 420 million years ago in Siberia. These have been classified under the genus of Elegestolepis. Others, discovered from Mongolia have been classified in the genera Mongolepis and Polymerolepis. But apart for these almost classifications, little is actually known about these primitive sharks. But with the beginning of the Devonian period, shark record becomes quite varied. The first teeth of about 400 million years ago were discovered from Europe. These teeth belong to the ancient Leonodus. Leonodus had characteristic double cusped teeth. The oldest shark cranium was discovered in Australia, and dates back to about 380 million years ago, and is believed to be from a shark specie xenacanth. Earlier in fact the Leonodus and xenacanth were thought to be related because of their similar crown shaped teeth. The first partially fossilized shark shark was discovered by a geologist Gavin Young in Antarctica. But this fossil displayed an odd mix of features. Possibility exists that this too may be a xenacanth, but Young named it Antarctilamna. The Antarctilamna was 16-inches long, and was a diplodont, resembling the xenacanth. Antarctilamna’s fin though was directed dorsally. The xenacanth in contrast was exclusively a freshwater shark, and had a long fin directed rearward, just behind the cranium. But with the passage of time, sharks have endured tremendous changes of environment, and yet, have managed to survive. But like all other creatures, the species had to either adapt to the change, or end. Each time a large scale shift occurred; a number of species found the new environment incompatible and became extinct. Sharks though displayed immense diversity, and helping then expand into new habitats. â€Å"Such explosive increases in variety are termed ‘adaptive radiations[1]. ’† Over such a huge span of geologic time, sharks have has two adaptive radiations, and have survived up to five mass extinctions. Many also agree that since most shark fossils have been found either from Australia, or Antarctica, sharks may have originated in the southern hemisphere. The first radiation was in the Carboniferous period, roughly 30 million years ago. This was characterized by the flourishing of the stethacanthids. The second major radiation occurred in the Jurassic Period, about 170 million years ago. During this time both land and air was dominated by reptiles. This was the time when the hybodonts developed. Many believe that the hybodonts were the ancestors of all modern sharks, but evidence is scanty. While the hybodonts shows many obvious similarities to the modern shark, it has characteristic features not found in sharks today. One of these includes the horns behind the eyes. But now, the earliest known modern shark is believed to be the Mcmurdodus from the mid-Devonian time. The basis for this is the Mcmurdodus tooth. The tooth shows is of the same type found in modern sharks, but not in the ancient ones. But â€Å"there is a 190-million-year gap in the fossil record between the last Mcmurdodus and the first unquestionable cowshark [1]. † Even though research continues to unveil the evolution of this epic animal, a complete evolutionary record is difficult to draw. The earliest known sharks in fact were quite different from the modern counterparts. But in some respects they were very close to the modern sharks of today, having the same cartilaginous skeletons, replaceable teeth and multiple gill slits. And with time sharks have endured great geologic change, adapting to different environments, evolving to change, and have thus survived as one the most durable animals on the planet. References 1. Martin, R. Aidan. ReefQuest Centre for Shark Research. Biology of Sharks and Rays. Retrieved from (http://www. elasmo-research. org/education/evolution/evol_s_predator. htm)

Thursday, November 14, 2019

steves tees :: essays research papers

Steve decided to open his own tee- shirt shop, near a local university. He felt it was the perfect time to start his own business, due to the location and the fact that the summer Olympics were being held 55 miles away in Atlanta. Wow! What a great opportunity it was, for him to take initiative to become his own boss, gain exposure, and become profitable. The only problem was that Steve did not take into consideration any concerns with starting a business, which include: geography, a market for this product, competition/ who are the major competitors, uniqueness, etc. This all could have been done through generating information to aid in making marketing decisions. This process includes specifying what information is required, designing the method for collecting information, managing and implementing the collection of data, analyzing the results, and communicating the findings of their implications. In order to reduce the likelihood of failure, marketing research would provide the n ecessary information to reduce uncertainty. It helps to focus on decision making. So, prior to Steve opening the business, he should conducted exploratory research. Steve needed to acknowledge the situation, screen any and all alternatives, and discover new ideas to make his business stand apart from the competition. This research could have been conducted through focus groups, surveys, questionnaires, etc. The purpose of this marketing research is to narrow the scope of the research topic and to refine the problem into researchable form. Therefore, Steve would have been able to answer who, what, when, where, and how questions; identify the channels of distribution; and to target the market for advertising and promotions.   Ã‚  Ã‚  Ã‚  Ã‚  Promotion is one of the four elements of the marketing mix. It increases company sales by communicating product information to potential customers. Unfortunately, the advertising route Steve took did not help to generate sales. Steve should have recognized the four basic parts of any promotional effort, which include personal selling, advertising, publicity, and sales promotion. Steve solely focused on advertising in selected newspapers, but he failed to realize that everyone does not read the newspaper. If he wanted the business to appeal both to the college students and to the people of the town, he should have done several different types of promotions. He could have done direct promotions, where he and an employee would go into the community and pass out flyers to gain better exposure for the business.

Tuesday, November 12, 2019

Effect of supply and demand and gas in our lifetime Essay

Oil has been an integral socio-economic vehicle which within the corporate scene remains a highly competitive socio-economic driver. Due to vast uses and demand, oil has become controversial and elastic in socio-politics. Here we see it causing socio constraints in oil producing countries and collapsing political institutions. Socially oil has a significant contribution in our general lifestyle. It has a comparative role within the context of mobility and industrial function where it is used in factories as well as in institutions which use combustive machinery. It is a determinant of economic prowess of a country. It plays a major role in research and advancement of power generation and use of bio fuels to ease environmental pollution. Gas is valuable in our lives based on the fact that it eases the burden of power use in cooking and within many socio institutions especially within our families. Gas also has been highly competitive and still remains so with many countries seeking to sustain demand. Recently European countries grappled with Russian company Gazprom over supply of gas when the company threatened to cut supplies. This paper reflects on the major effects of oil and gas on our lives in various aspects of socio-economics and its profundity. This profundity establishes the oil and gas use and contribution to socio-economics and politics. This analytical review covers environmental, political and research contributions, so as to keep sustenance of the same at per with developments in the technological trends within our lives which drain energy resources and adversely effect socio-economic stability. Contribution to socio economics Economic growth is dependent on energy resources. Energy supply within the development perspectives of a nation deplete economic recession and create more apertures for industrial progression in the nation. The distribution of resources within this economic perspective contributes to social –economic growth due to the dissemination of the resources made and gained from the industrial progression. Socio-economic progress is what supports the constituents of the society, namely the family. Most families own vehicles, machinery and combustive equipment that require oil to run them. They own various oil consuming devices like generators which they use to get power and run their daily activities. This perspective of integrating resources based on oil based contribution and importance is indicative of the pivotal role oil plays in the economic progression of a nation and a community. On the negative aspect, oil has very diverse negative effects on social economic gains and has led to the disintegration of economic stability within the units of the society. Increase in oil prices leads to stifling of social economics due to constrained spending so as to meet the higher cost of fuel. This constraint forces individuals to over spend and increased prices of goods and services. The effect spreads within the society to the most unfortunate and stirs unrest due to the high prices. On the same aspect oil has been a very competitive socially owned natural resources which in as many countries has caused political divisions and social disintegration. Communities in developing nations have been embroiled in long civil wars like in Nigeria. Nations with superior industrial needs have sought after taking advantage of lesser nations to establish forced oil drilling concessions so as to have a monopoly in the production of oil and directly befit their economic needs while hurting that of the producing country. The performance of the portfolio might be measured by the effects of changes in energy costs and availability of energy on the economy. Another portfolio measure might be the effects of the mix of energy sources on the diversity and vulnerability of the supply. Generating Electric Power in the Pacific Northwest: Implications of Alternative Technologies Christopher G. Pernin, Mark A. Bernstein, Andrea Mejia, Howard Shih, Fred Rueter, Wilbur Steger 2002. p 15 Effect on Resources Drilling oil has led to dilapidation of natural resources like forested land, marine resources and agricultural land. The effect on these natural resources is basically destruction of their existence so as to create sufficient exploration and drilling acreage. To excavate gas or oil, exploration and seismic survey has to be conducted on very significant area of acreage which completely reduces this area to a wasteful land for many years. The long term effect is that, the existing resources and land itself becomes wasted and polluted due to activities involved to get the gas or oil out. However there are positive attributes that come along with oil and gas production. There creation of jobs on these areas benefits local and professionals who have relevant experience and knowledge on the activities related to drilling and producing oil and gas. Creation of infrastructure and connection to electricity grids become the positive effects on the resources which can be utilized within the region the drilling or production is on going. The resources, like agricultural activities directly benefit from these changes and developments. Existing coffee factories get a boost to revert from using diesel engines to electricity. Communities are connected to the electric grid and can access electricity. Industries come up and processing of natural resources become easier. Proved reserves are both drilled and un-drilled. The proved drilled reserves, in any pool, include oil estimated to be recoverable by the production systems now in operation, whether with or without fluid injection, and from the area actually drilled up on the spacing pattern in effect in that pool. The proved un-drilled reserves, in any pool, include reserves under un-drilled spacing units which are so close, and so related, to the drilled units that there is every reasonable probability that they will produce when drilled. Bruce C.  Netschert The Future Supply of Oil and Gas: A Study of the Availability of Crude Oil, Natural Gas, and Natural Gas Liquids in the United States in the Period through 1975: 1958. p 7 Development of alternative fuels Oil and gas have led to positive research on energy needs globally. Companies and researchers have been seeking best solutions to the waning supplies and deposits of gas and oil to curb the eminent collapse of the supply and demand. Discovery of coal mines, use of electric car and trains development of alternative oil are diverse developments all based on the oil and gas supply and demand agenda. According to arguments based on the global perspective on demand and supply of gas and oil, it is questionable and much worrisome ‘Are resources likely to be available during the next fifty years in the quantities necessary to satisfy projected demands without substantial increases in prices? If not, what price in- creases are likely to be necessary to close the gap between supply and demand, and what are the effects of those increases likely to be? Ronald G. Ridker & William D. Watson: To Choose a Future: Resource and Environmental Consequences of Alternative Growth Paths. 980. p 96. Negative effects of the demand and supply is mainly seen within the oil curtails and supply context. International oil curtails have a stranglehold on the oil and gas prices and the effect of alternative oils becomes less dynamic and progressive stifling efforts to stipulate best policies to use to achieve the required progress in alternatives is slow. Implementation of development of alternative oils and energy resources has been ongoing. Creation of biodegradable oils has resolved much of the fears that demand would become elastic. Environmental effects Global warming and environmental degradation consequences on the flora are as a result of a lot of oil and gas exploration activities. Secondly the use of oil and gas in industries and within the concepts of combustion has led to degradation of the environmental. Industrial effluent related to oil has destroyed the flora while gaseous emission like carbon emissions from vehicles and industrial machinery has destroyed the ozone layer resulting to global warming. There are literally no positive implications on the environment by oil and gas. However on the profound aspect of research advancing of technology to improve on the air and to maintain a level of complacency within the ozone layer has led to discovery and global use of green houses and introduction of policies which reflect on addressing how to stop global warming. Governmental and geo-political effects A lot of the current crisis within the global fronts is based on escalation of demand of oil and gas by major world like the United States. The demand for energy, especially based on oil supplies has become un-foreseeable, as such the need to have vast reserves of oil within proximity as insulation to the critical point of demand and elasticity of demand is important. Non-Marxist social science, needless to say, had to contend with the reality, where incidents of collective violence were taking place all around. Facing this contradiction between their theory and reality, a compromise was reached by which it was hypothesized that anti-systemic conflict was only a temporary situation. This situation, they argued, would be symptomatic of the Third World nations going through a structural change. Structural change caused by the introduction of â€Å"economic development† and a new production relationship calls for the end to the traditional social and economic relationship. Dipak K. Gupta: The Economics of Political Violence: The Effect of Political Instability on Economic Growth. 1990 p 31 The issue here is that political prowess has influenced a lot of political inclinations in various nations within the world. On the same context, government policies to curb oil prices and to have reserves for future use have become null and wavering. The community within these jurisdictions suffer fluctuating oil prices and there is no consistency in the pricing hence the problem of constantly adjusting to the new prices due to lack of legislation. Political problems have emanated from this point with extremist policies on invasion of natural resources and barrel prices becoming tools of stifling economic progress in the communities.

Sunday, November 10, 2019

An Introduction to the Im Profession and Ethics Paper

De La Salle University – Manila An Introduction to the IM Profession and Ethics Paper Presented to The Faculty of the College of Computer Studies De La University – Manila In Partial Fulfillment Of the Requirements for the Degree of Bachelor of Science of Information Systems By: Changcoco, Amos Dimla, Ysabel Nicole Ramchand, Pavan Tanchuling, Bianca Denise Tibayan, Jan Michael 1. 0 COMPUTER AND INTERNET CRIME 1. 1 Types of Exploits 1. 1. 1Virus It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files.The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikac hu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region.The virus was an email titled, â€Å"Pikachu Pokemon† with the message, â€Å"Pikachu is your friend. † The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokemon, with the message, â€Å"Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND. † The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser.The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1. 1. 2Worm A worm is a malicious code that is used for bringing down the computer system. A worm do es not infect files, however, it monopolies the computer’s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer.It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable.The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the cre ator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects. 1. 1. 3Trojan HorseNamed after the Trojan horse from Troy which was used to infiltrate the enemy’s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the victim’s software.Trojan horses are also used to create a ‘back door’ in the operating system so that the hackers can access the system. However, the Trojan horse cannot duplicate itself nor it can self-replicate. It would need the user to spread to other computers. An example of a Trojan horse would be from the pirated version of Apple’s suite of software, iWork. iServices was the Trojan horse part of the pirated version of iWork, which would signal the hackers that the Mac is infected and the hacker has access to the system.This is an ethical dilemma because the people who buy pirated software such as the iWork do not know that there is a Trojan horse in the software. It was unethical of the sellers to place a Trojan horse in the software without the consent of their customers’ because deontology theory states that it was not the duty of the vendors to hack into the systems of their customers in th e first place. Another reason why it was unethical because of the theory of altruism because the interest of others was not thought about since many people will suffer due to the actions of the vendors.This is another reason why it is unethical, because of the utilitarianism, which is consequences-based. Lastly, the social contract theory states that the actions of the vendors were unethical because it is against the law to hack and infiltrate private property. Logic bomb is a type of Trojan horse that is triggered only by a series of specific events such as a specific sequence of keystrokes or a change in a file. 1. 1. 4Botnets A botnet is a network of infected computers that are controlled by bots.Named after the word ‘robot’, a bot is a type of malware that allows an attacker to take control of an affected computer. Criminal can take over the controlled computer such as sending out spam, spread viruses, attack computer and can even cause crime and fraud, without the owner knowing it. Bots are also called computer zombie because the computer has no control over its actions since hackers are in charge of its actions. 1. 1. 5Distributed Denial-Of-Service Attacks (DDoS Attacks) A Distributed Denial-of-Service Attack is when a malicious hacker controls computers through the Internet.It is an attempt in preventing the computer owner to use network resource or machine. It is composed of one or more people trying to disenable a certain host from being connected to the Internet. 1. 1. 6Rootkits The name rootkit comes from the two words ‘root’, which pertains to the point it attacks, which would be the administrator or the source or the root, and ‘kit’ because of the set of programs. A rootkit is a set of programs that enables its user to gain administrator level access to a computer without the user’s consent or knowledge.The owner of the rootkit is capable of executing files and changing system configurations on the tar get machine, as well as accessing log files or monitoring activity to covertly spy on the user's computer usage. It is hard to detect if a computer system has a rootkit malware. 1. 1. 7Spam E-mail spam is when e-mail systems send unsolicited e-mail to large numbers of people. Spam mostly comes off as cheap advertisements of strange products such as pornography, ‘get-rich-quick’ schemes and the like. Spam can also be used to deliver harmful worms or other malware. . 1. 8Phishing Phishing is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site. 1. 2Types of Perpetrators 1. 2. 1Hackers and Crackers Hackers are people who test the limits of the system, find the â€Å"holes†, and check which data they could access. The knowledge that they get is actually obtainable in various media, usually the internet. They are not usually considered bad; but due to many of them who used such knowledge to cause harm to syst ems, the term became negative.A more appropriate term for these kinds of people is actually called crackers. 1. 2. 2 Malicious Insiders Malicious insiders are people who obtain goods, services, or property through deception or trickery, also known as fraud. In other words they lie to gain. 1. 2. 3 Industrial Spies Industrial spies are people who illegally obtain information from competitors for the benefit of their sponsor. The act is called industrial espionage and the opposite which is to obtain information legally is called competitive intelligence.In 1993, Opel accused the rival Volkswagen of industrial espionage after the former’s chief of production and seven executives moved to the latter company due to missing documents. (Julian, 2011) 1. 2. 4 Cybercriminals These perpetrators hack to the company’s system and will do anything with the information just to gain money. One of the most famous hackers of the world is Albert Gonzalez, who used hacking to steal and re sell millions of card and ATM numbers in a span of three years. He did this by attacking many systems which would eventually give him the information needed to steal the card numbers. Verini, 2010) Albert Gonzalez is in ethical dilemma because he used his skills to steal the information for money. Based on the deontological theory, it’s unethical because it is not the duty of hackers to steal information. Based on hedonism under the utilitarian theory, it is ethical because he found pleasure from the act. Social contract theory, however, makes this act unethical, and so does virtue theory. 1. 2. 5 Hacktivists and Cyberterrorists Hacktivists, combining the words â€Å"hacking† and â€Å"activist†, are people who hack to promote political ideology.Cyberterrorists attack to get the attention of the government as part of their political objectives. Anonymous is one of the most famous hacktivist groups due to their appearance on various media in which members appear wearing the Guy Fawkes mask. Their advocacy is to oppose the Internet censorship and surveillance, government corruption and homophobia. This is why they attacked several government sites. (Katich, 2013) The ethical dilemma the group faces is that they use hacking skills to infiltrate the systems yet they belong to the side of the people as their objective is to make the government hear their voice.This is ethical based on deontology because it is their duty to make the government listen to them their voice. This is also ethical based on the altruistic approach as more will benefit from their act. However, social contract theory states that it is unethical since this act has violated the law. 1. 3Laws for Prosecuting Computer Attacks 1. 3. 1Electronic Commerce Act of 2000 (RA 8792) 1. 3. 1. 1E-Commerce in Society The process of buying and selling goods electronically by consumers and from company to company through computerized business transactions.This act has the purpose of prote cting those who pursue business in electronic means through multiple communication networks through the Internet. 1. 3. 1. 2 Elements in the Law Electronic data messages – these are generally the information that is in every transaction of the business. Electronic document – these are the type of information specified with text, symbols, or other modes of written expression yet similar in nature with the electronic data messages. Electronic Signature – these are any distinctive marks that approve a transaction which are done by a person or an entity using electronic means. . 3. 1. 3Relation to other Laws Such laws that are affected with this are the Intellectual Property Rights, Copyrights Protection. These laws give protection to the parties involved in any business activities through electronic means. Fraud is also related as the government can charge you when you make accept payment illegally by disguising your site as a reliable option for payment. 1. 3. 1. 4 CASE in E-Commerce Censorship is very an essential tool to distinguish the moralities of websites and the cooperation of companies to acknowledge said moralities.In China, Google's operations created a storm of criticism when the company agreed to comply with the government's wishes and censor pro-democracy and other websites. In 2010, Google relocated its Chinese operations to Hong Kong, putting it outside China's censorship regime. Supporters of the decision say Google shouldn't cooperate with China's repressive policies, while critics say Google's withdrawal cut off millions of Chinese citizens from the company's services and weakens its presence in one of the world's largest markets. This case has very evident ethical issues including the move of Google to relocate its operations to Hong Kong.This made the jurisdiction of China’s censorship policy not reachable so that they can use their assets more freely. These however made the citizens of China that is inside the jur isdiction of the censorship policy long for their beneficial search engine. If seen in Google’s benefits this is a rather good trade for them to maximize the use of their services in a commercial area such as Hong Kong yet they could’ve served the citizens so they can keep up their reputation of improving life in the world and be consistent of the famous line â€Å"Don’t be evil†.I generally disagree with their decision to relocate as they could’ve followed the updated utilitarianism and give their services to those who would need them the most. Still they acted the ethical egoism to censor pro – democracy sites which are morally good to their perspective. 1. 3. 1. 5Another Example Including Google Google gathers incredible amounts of data on people who use its search engine. As of 2011, the company's website states that although it stores records of your searches as a tool to improve corporate efficiency, it renders them anonymous after nin e months and deletes cookies used to track visitors after two years.Governments could use Google's information to investigate individuals visiting particular websites, however, and Google Earth's photo collection also has raised privacy questions: In 2008, a couple sued on the grounds the online photos of their home violated their privacy, but a judge threw out the lawsuit the next year. This case is provides insight to how Google can be of every use to our society as they can help the government catch fugitives, suspects and criminals with their records of the searches of the every person using their search engines yet this leaves them to violate certain privacy issues when they abuse that kind of power.The lawsuit of the couple may be dismissed by a judge but their lawsuit are supported by ethical theories namely the rights – based theories which states that there are social contracts that should be acknowledged and that includes their right for privacy. They may be legal t o store records such as the photo from their Google Earth but they should have to limit their power to exercise their duty as they are also supported by the duty – based theories due to their daily or continual task of improving corporate efficiency as well as giving us access to unlimited knowledge. 1. 3. 2 Cybercrime Prevention Act of 2012 (RA 10175) 1. . 3. 1 Preliminary Provisions 1. 3. 3. 2. 1. 1 Brief History of RA 10175 Cybercrime Prevention Act of 2012 or also known as Republic Act No. 10175 was approved on September 12, 2012. This is first law in the Philippines which specifically criminalizes computer-related crimes. The Cybercrime Prevention Act in its current form is the product of House Bill No. 5808, authored by Representative Susan Tap-Sulit of the second district of Tarlac and 36 other co-authors. The final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012. 1. 3. 2. 1. 1 Declaration of PolicyThe main objective o f this Act is to protect the people from cybercrimes and also from the harmful effects associated with it. The state also aims to recognize the vital roles of information and communications industries in the country. The state also recognizes the need to protect and safeguard the citizens of the state, and also to protect the integrity of computers and its users. The state also wants to recognize the importance of providing an environment conducive to the development acceleration, and rational application and exploitation of information and communications technology. . 3. 3. 2. 1 General Provisions 1. 3. 3. 2. 2. 2. 1 Punishable Acts In this Act, there are 10 punishable acts indicated in the bill, and those punishable acts each have penalties that are associated. In the next sentences, the punishable acts will be discussed briefly. Offenses against the confidentiality, integrity, and availability of computer data and systems: A. Illegal Access – accessing a computer or a part of a computer without any right B.Illegal Interception – the interception made by the use of any technical device without any right of non-public transmission of datum to or from any computer system including electromagnetic emissions from a computer system carrying such data C. Data Interference – the intentional or any reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without any right including the transmission or transferring viruses into a system. One example is the ILOVEYOU message transmitted through electronic mail way back in the year 2000.D. System Interference – the intentional or any reckless hindering or interference with a functioning computer system, or a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering, or supressing computer data or computer program without any right or authority in doing so. E. Misuse of Devices – the use of any material without any right of it. Acts like producing, manufacturing, selling, and distribution. F. Cyber-squatting – the simplest way is identity theft, using another individual’s identity to gain profit or scam other people in the internet.G. Computer-related Forgery – the illegal use of a computer into copying one’s work, and gaining illegal access to a computer to copy the content of a system or database. H. Computer-related Fraud – the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system. I. Computer-related Identity Theft – the intentional acquisition, use, transfer, or possession of any identifying information belonging to another person, whether natural of juridical. Under these are Cybersex and Child Pornography. J.Libel –    defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any acts, omission , condition, status or circumstance tending to discredit or cause the dishonour or contempt of a natural or juridical person committed through a computer system or any other similar means which may be devised in the future. The above stated are the punishable acts by the law enforced and written in the bill, and these acts have corresponding penalties if have been proven to the court. The penalties include: imprisonment or a fine of at least two hundred thousand pesos (Php. 00,000. 00) up to a maximum amount commensurate to the damage incurred or both. Prison mayor is equivalent to imprisonment from 6 years and one day to twelve years. 1. 3. 3 Ethical/ Moral Dilemmas 1. 3. 4. 2 Situation A 16-year old male named â€Å"Josh Evans† was registered on the account used for bullying messages to a girl named Megan Mier. Lori Drew, the mother of Sarah, a former friend Mier, later admitted creating the MySpace account. She was aided by Sarah and Ashley Grills, an 18-year-old employee of the elder Drew.The senior Drew and several others ran the fake account, with an aim to get information about Megan and use that information against her and also for her to be humiliated. This caused spreading gossips about Megan, and thus creating a traumatic experience not only for her but also to her family. 1. 3. 4. 3 Analysing using the Four Major Ethical Theories A. Duty-based Theory According to the Duty-based theory, an act is considered ethical if it has good intentions. Given the situation, I can clearly state that it is not an ethical thing to do. Creating or spreading false rumours is not even close to be called as a good intention.Also, gathering information about a certain person is not ethical if it will be used against or be held against to a person. Using the Duty-Based Theory, I can clearly state that the situation of gathering information of Megan is not ethical because it does not serve a good intention. B. Utilitarianism According to the Utilitarianism Theory an act is only to be considered ethical if it produces desirable consequences or outcomes. The outcome of the situation stated earlier is that the experience Megan was traumatic not only for herself, but it also affected her family.Just by looking at this outcome, we can say that it is not also considered ethical in this theory, because of the outcomes that the actions of the group had caused not only their target but also the relationship of other people to Megan. C. Social Contract Theory According to the social contract theory an act is considered ethical if the act does not violate any rules or laws; according to the Civil Code of the Philippines: Persons and Family Relations, under Chapter 2 which is Human Relations the Articles 19, 20 and 21 discusses the different rights a person possesses and how a person should exercise his or her rights.Chapter 2 Article 19 presents the basic principles that are to be observed for the rightful relationship between human beings and the stab ility of the social order. Chapter 2 Article 20 presents that you are liable for any damage that you have caused to another person, whether wilfully or negligently. Chapter 2 Article 26 presents that right must never abused, the moment that it is abused, the moment rights are abused they ceased to right. D. Virtue According to the Virtue theory, the action that is considered to be ethical is when the action is came from a good moral principle.Looking to the situation, it is not an ethical thing to do because it does only harm the person involved but also the moral principles of the suspect is to be questioned. 1. 3 Trustworthy Computing 1. 4. 1 Microsoft’s 4 Pillars of trustworthy Computing The 4 Pillars of trustworthy computing help identify the key elements in computing especially in an organization with numerous employees to manage. Guidance is a key to help implement a good and stable system such as how the pillars guide not just Microsoft employees but users alike. 1. 4. . 1 Security Creation of a trust worthy environment for a safe computing environment 1. 4. 2. 2 Privacy The protection and confidentiality of design, development and testing in any organization is essential as to be part of the competitive market today. 1. 4. 2. 3 Reliability Working as expected or promised by the developers and their entity 1. 4. 2. 4 Business Integrity Being responsible and transparent in you duties and expectation as part of a work force that strives to be excellent a mistake is bound to happen.Admitting a mistake is the 1st step to a growing process of learning new things to come. 1. 4. 2 Risk Assessment It is the process of assessing security related risks to an organization’s computers and networks from both internal and external (Reynolds, 2011) A risk assessment is a process to identify potential hazards and analyse what could happen if a hazard occurs. (Federal Emergency Management Agency, 2013) The assessment would assure the IT security team that they will be ready when an attack comes because of the determined risk assessment they perform. 1. 4. 1 General Security Risk Assessment ProcessStep 1: Identify IT assets and prioritize ones that are of most importance Step 2: Identify the threats/risks that could occur Step 3: Assess the likelihood of threats Step 4: Determine the impact of each threat, how large to small is the impact if affected Step 5: Determine how each threat can be prevented/blocked Step 6: Which is the most effective prevention method Step 7: Perform cost benefit analysis before taking any action Step 8: Make the decision to implement or not to implement the decided risk prevention found through thorough research and development 1. 4. 3 Establishing a security policyDefines an organization’s security requirements, as well as controls and sanctions needed to meet those requirements. (Reynolds, 2011) A good security policy can possibly improve and provide a smooth flow of operations within an organizati on. NIST (National Institute of Standards and Technology) is a non-regulatory federal agency within the US department of commerce. The computer security division creates security standards for organizations to implement in their own system. 1. 4. 4 Educating the Employees, Contractor and Part-Time Workers Surveys show that most security problems come from negligence and unawareness of the security policies.Teaching good security practices like not giving out your passwords, making sure you do not meddle in different departments. Knowing the Dos and DONTs of everyday computing will help guide any workplace and direct them to the good ways of being a good user. 1. 4. 5 Threat Prevention The key to a threat prevention system are layers of security systems that challenge the perpetrator to hack into the system. Firewall – stands guard between an organization’s internal network and the internet Intrusion Prevention Systems – prevents an attack by blocking viruses, ma lformed packets and other threats from getting into a protected network.Antivirus software – should be installed on each user’s personal computer to scan a computer’s disk drives and memory regularly for viruses. User accounts that remain active after employees leave cause an uncertain threat to the company, IT staff must promptly delete and make sure to wipe out all the privileges of the former employee. The US-CERT (United States Computer Emergency Network Team) and SANS(SysAdmin, Audit, Network,System) Institute – regularly update a summary of the most frequent and high impact threats to a computer system specifically viruses and worms. . 4. 6 Security Audit An important prevention tool that evaluates whether an organization has a good security policy and if it is being followed. An example would be a requirement to change passwords every week or month with this in place a security for companies are much more protected compared to others without this r equirement. Basically to test, check and review the system’s security and look for loop holes and easy targets. 1. 4. 7 Detection The preventive measures made for a computer system is not always enough to protect important data.Intrusion detection system – is a software/hardware that monitors system and network resources, notifies a system admin when an intrusion occurs Knowledge based intrusion system – contains information about attacks and system vulnerabilities, then trigger an alarm (ex. Repeated login, repeated data events) Behaviour based intrusion system – compares users system behaviour with an admin created model that detects when a user is not following the required model, this would trigger an alarm. (Example: Unusual activity with an account in the HR department accessing the IT department’s data. 1. 4. 8 ResponseAn organization should be prepared for the worst, like a system attack that stops all operations and steals data from the co mpany. The top priority during an attack is not to catch the perpetrator but to regain control and save what is left. Who needs to be informed? And who not to notify? Reputation and credibility is at stake in any security breach. A company should document all details of a security breach and be able to review it after to assess and further study. Eradication of the damaged/breached information is essential but before everything a log is required to keep track 1. . 9 Ethical Moral Dilemmas You are a member of a large IT security support group of a large manufacturing company. You have been awakened late at night and informed that someone has defaced your organization’s website and also attempted to gain access to computer files containing a new product under development. What are your next steps? How much time would you spend tracking down the hacker? -Deontological 1. 5 References * (1999, 10). Electronic Commerce. StudyMode. com. Retrieved 10, 1999, from http://www. studymod e. com/essays/Electronic-Commerce-731. tml * THE ELECTRONIC COMMERCE ACT (R. A. 8792) AN OVERVIEW OF IT? S (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). ‘www. ustlawreview. com/pdf/vol. L/Articles/The_Electronic_Commerce_Act_RA_8792. pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? – Cisco Systems. (n. d. ). Cisco Systems, Inc. Retrieved from http://www. cisco. com/web/about/security/intelligence/virus-worm-diffs. html * What Is A Rootkit? (n. d. ). Internet / Network Security – Tips, Advice and Tutorials About Internet Security and Network Security.Retrieved from http://netsecurity. about. com/od/frequentlyaskedquestions/f/faq_rootkit. htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www. businesspundit. com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive. wordpress. com/2013/02/25/anonymous-annie- katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www. nytimes. com/2010/11/14/magazine/14Hacker-t. html/

Thursday, November 7, 2019

Facts of Prayer in School essays

Facts of Prayer in School essays According to the First Amendment of the Constitution, Congress shall make no law respecting an establishment of religion or prohibiting the free exercise there of...(Patterson A-11). The writers of the constitution made it an important point in protecting freedom of religion. The writers then even stressed the importance of being able to be any religion that suited a person. The First Amendment removes government from the realm of religious belief and practice so that the state can neither subvert nor manipulate religion to serve secular, public ends(Keynes and Miller 177). It is pure ignorance for someone to think that one religion is accepted throughout the world. This very reason is why prayer should not be in school. When saying a prayer in an organized group at school, it is impossible to not discriminate against a persons religion. Allowing prayer in school is like losing a precious jewel that can never be found again. Prayer in school results in students losing their r ights, losing their sense of unity, and losing their strong beliefs of their faith. These are all things that once lost are difficult to find again. Students lose their religious rights when prayer is introduced in public schools. Many people dont understand the complexity of this issue and that it is not just about taking God out of school. As U.S. citizens, the First Amendment gives the freedom to believe in what people choose to believe in without being punished for their belief. The First Amendment was proposed to keep such occurrences such as prayer in school from happening. The Supreme Court has declared that the states can either compose a prayer or require school children to recite passages from the Bible or the Lords Prayer during the regular school day. Why should a Jewish child feel uncomfortable and humiliated in a school environment because of prayer? On June 20, 2000 the Supreme Court r...

Tuesday, November 5, 2019

Quotes for Thanking a Special Teacher

Quotes for Thanking a Special Teacher Just about everyone remembers some teachers more than others, and maybe one above all, who made an impact on not just what you learned, but who you are. Whether you see your favorite teacher every day or youve been out of school for many years, that teacher would for sure love to hear from you and know she is making or has made a contribution to your life. So go ahead, make a contribution to her life that is the verbal equivalent of an apple for your teacher. These quotes provide some inspiration, and at least one will fit the bill for your teacher and you.   Quotes for a Special Teacher Maya AngelouWhen you learn, teach. When you get, give. William Arthur WardFeeling gratitude and not expressing it is like wrapping a present and not giving it. Dan RatherThe dream begins with a teacher who believes in you, who tugs and pushes and leads you to the next plateau, sometimes poking you with a sharp stick called truth. Alexander the GreatI am indebted to my father for living, but to my teacher for living well. David O. McKayThankfulness is the beginning of gratitude. Gratitude is the completion of thankfulness. Thankfulness may consist merely of words. Gratitude is shown in acts. Henry AdamsA teacher affects eternity; he can never tell where his influence stops. Thornton WilderWe can only be said to be alive in those moments when our hearts are conscious of our treasures. Carl JungOne looks back with appreciation to the brilliant teachers, but with gratitude to those who touched our human feelings. The curriculum is so much necessary raw material, but warmth is the vital element for the growing plant and for the soul of the child. Charles KuraltGood teachers know how to bring out the best in students. Benjamin DisraeliI feel a very unusual sensation if it is not indigestion, I think it must be gratitude. Colleen WilcoxTeaching is the greatest act of optimism. Albert SchweitzerWe should all be thankful for those people who rekindle the inner spirit. Charles DickensNo one is useless in this world who lightens the burden of another. Marcel ProustLet us be grateful to people who make us happy; they are the charming gardeners who make our souls blossom. Victor HugoHe who opens a school door closes a prison. Marva CollinsThe good teacher makes the poor student good and the good student superior. William Arthur WardThe mediocre teacher tells. The good teacher explains.The superior teacher demonstrates. The great teacher inspires. Albert EinsteinIt is the supreme art of the teacher to awaken joy in creative expression and knowledge. Christa McAuliffe I touch the future. I teach.