Tuesday, December 31, 2019

Messuds Career as an Author Free Essay Example, 2500 words

Messud s life has significantly influenced her interest to explore various cultures through writing like the multiculturalism they portrayed in most of her novels. In the works by Messud, three major themes run through her novels: multiculturalism, exile, and displacement (Amoia and Knapp 346). Throughout her novels, female protagonists grapple with finding their niche and cultural identity in the midst of historical injustices and family problems. This aspect is specifically a part of the author s life since she has to identify herself with either of the three cultures; American, Canadian, or French. In When the World was Steady, the sisters have been brought up to value the security that the family has to offer (Amoia and Knapp 346). However, unexpected events disrupt that security. As a result, they embark on an emotional journey to adapt to the new realities. Following a bitter divorce, Emmy, the younger sister is forced to leave Australia for Bali. Virginia goes through a serie s of devastating events that cause her to question her faith. Together with her mother, Virginia travels from London back to their rural home in Scotland. We will write a custom essay sample on Messuds Career as an Author or any topic specifically for you Only $17.96 $11.86/page

Sunday, December 22, 2019

To Kill a Mockingto Kill a Mockingbird Prejudicebird...

To Kill A Mockingbird Prejudice has caused the pain and suffering of others for many centuries. Some examples of this include the Holocaust and slavery in the United States. In to Kill a Mockingbird, by Harper Lee racism was the cause of much agony to the blacks of a segregated South. Along with blacks, other groups of people are judged unfairly just because of their difference from others. The prejudice and bigotry of society causes the victimization of people with differences. Some who are discriminated against are those who are born differently than the majority. One person that is treated unfairly is Calpurnia, as you can see when Aunt Alexandra tried to get Atticus to fire Calpurnia, because in her eyes, Calpurnia wasnt a good enough†¦show more content†¦They are given obstacles that they have to overcome in order to survive. Some people in the world can survive these obstacles, and there are some that just give up. By fighting for your rights, people start to realize t hat character is the important attribute to a person. To Kill a Mockingbird, by Harper Lee showed me that the people with differences are not always doing things the wrong way. It is the majority that may be going at it all

Saturday, December 14, 2019

Measuring academic proficiency under the NCLB. Free Essays

The No Child Left Behind (NCLB) Act was designed to close the achievement gap between high and low performing children, especially the achievement gap between minority and non-minority students and between disadvantaged children and their more advantaged peers (NCLB, 2001). The key components of the act are the adequate yearly programs (AYP), and the annual measurable objectives (AMO). The AYP is the working principle of the act and it is seen as the mechanism for which all schools and all students meet the same academic standards in reading and mathematics by school year 2013-2014. We will write a custom essay sample on Measuring academic proficiency under the NCLB. or any similar topic only for you Order Now The AMO indicates the performance of the school in terms of proficiency in reading and mathematics tests. Moreover, the law identifies student subgroups like economically disadvantaged students, students form major racial and ethnic groups, students with disabilities and students with limited English proficiency. The law also specifically requires that 95% of the total number of students in a school and 95% of each subgroup to take the reading and math standardized tests, while the state is tasked to determine its own AMO targets and the minimum number of students in each subgroup who are required to meet or surpass the AMO targets (NCLB, 2001). The AYP requirements apply to Title 1 and non-title 1 school that receive federal funding. Schools that do not reach AYP for two or more years will be labeled as in need of improvement and are sanctioned. The NCLB employs a conjunctive accountability system wherein each subgroup of students are required to reach the minimum levels of proficiency in math and reading regardless of their previous proficiency levels, thus within 12 years, all students should reach 100% proficiency. NCLB is based on the idea that high expectations for achievement would result to higher actual achievement levels. By requiring each school to reach a uniform level of proficiency  would mean that in a given period, all schools and all students would have mastered the same skills and learned the same knowledge in reading and mathematics. The NCLB measures progress through a single mean proficiency score across levels and subgroup.   However, this frame of mind does not consider the diversity of American students and their backgrounds. For example, requiring each subgroup to meet the minimum mean proficiency score would ensure that the school would not reach the AYP. Using a single mean proficiency score to measure performance is not a true measure of school improvement nor student performance. Although, NCLB have positive visions, its method of attaining its objectives undermines what it is supposed to do. The law treats each school and each student as a single and uniform entity when our society is composed of different races and backgrounds, not even taking into account the difference between the rich and the poor. Even if the law identified the subgroup of students, it still however assess each group in terms of the single mean proficiency score which is the same as implementing a one size fits all policy. The problem with NCLB is that it asks schools to be assessed against a single mean proficiency score, wherein if a school fails to reach this score, would indicate that the school is not performing as it should be in accordance with federal and state rules. The use of a single mean proficiency score says that each school is treated as equals, however the reality is differences in each school is present. For example, different districts cater to different students and since education have been the purview of the state; they have also different standards on accountability and accreditation. The schools seek to attain the level of performance required by the state and in cases where measures of school performance differ from the NCLB would say that schools are making progress in the state level but is not up to standard in the national level. Students also would be burdened by being pitted against a single score that may or may not be realistically attainable, and if they fail to reach the mark they would have caused the failure of the entire school. Another problem with the NCLB is that by identifying subgroup of students and requiring them to achieve the mean proficiency score puts them in a bind. The subgroups identified by the law in some cases could be an unnecessary repetition of the groups, for example most Blacks and Latinos are economically disadvantaged, and that most of these groups also have lower mean proficiency scores. Thus if a school is composed of many poor students, of different racial groups, of students with limited English proficiency, then this school will surely not reach that mean proficiency score. The NCLB is not friendly to racial groups, economically disadvantaged children, children with disabilities and children with limited English proficiency. It is common knowledge and even supported by statistics that those who are identified as economically disadvantaged are those who belong to a minority racial group. In which case they will be asked to reach the same proficiency score twice, then they will be labeled as under performing and the school as needing improvement. It will compromise what the students have accomplished in a school year, because failing to reach the mark is not equal to no improvement or no learning. As for the parents, they would probably think that NCLB is good for their children as it ensures equality between groups in terms of academic achievement. However, if their state certifies that their children are performing to expectations like in Virginia and California, but the federal government says otherwise would saw confusion and distraught among parents. Schools and districts complain that using a single mean proficiency score to measure performance is not realistic and appropriate. It does not take into consideration that high-poverty schools have students with less academic preparation than those with low-poverty schools. Moreover, by using a system of conjunctive accountability dooms schools from reaching AYP. The short term effects of NCLB on low-income students and of color is that thy will b subjected to more requirements in school or additional interventions that would enable them to reach the desired improvement of scores as well as being pressured to make that mark. The long-term effect is that when they fail to reach AYP and cause the school to lose out on the AYP race, then they will be blamed for it and probably will be faced with angry members of the community. When schools still fail to make the mark and is identified as needs improvement and probably would be given less funding the more the low-income and racial groups become more disadvantaged, instead of closing the academic achievement gap, the NCLB does not even consider what academic achievement is. I think that NCLB was born out of the sincere desire to make sure that our students have the same level of academic proficiency even for math and English only. Whoever drafted the bill however did not have a clear understanding of achievement, intelligence and environmental factors that are part and parcel of learning and education. It is also funny to think that as diverse a population as we have we want to be pitted against a single score when what is more important than the grade or score is actual learning and the evidence of improvement across the years. Thus, as a law that seeks to close the achievement gap between groups of students, the NCLB divides and places the minority groups in a more difficult situation and at a more disadvantaged position.    How to cite Measuring academic proficiency under the NCLB., Essay examples

Friday, December 6, 2019

Risk Of Implementing Block Chain In The Finance Industry - Samples

Question: Discuss about the Risk Of Implementing Block Chain In The Finance Industry. Answer: Introduction Blockchain technologies are the emerging technologies in the word. The market of the blockchain technology has been rising in the market at a decent speed. However, there are various risks involved in the technology. This report focuses on identifying the risk involved in the blockchain technologies in the finance industry. The report outlines the risks assessment procedure in the finance industry. A risk assessment procedure has been discussed in the report for mitigating these issues in the finance industry due to blockchain technology. Blockchain technology According to Zheng, Xie and Wang (2016), blockchain is a digital innovation in the market that is using the concept of the cryptography, networking, data management and incentive mechanism in order to maintain the financial database of different companies in the market. This technology has helped in initiating digital currency transfer between parties. Blockchain has been originated from the bitcoins digital currency. This technology has been implemented in the finance industry in recent years. Figure 1: Blockchain Market in 2017 (Source: Lindman, Tuunainen and Rossi 2017) The market of the blockchain has been rising all over the world due to its capability of digital transfer of virtual currency. As commented by Guo and Liang (2016), blockchain has been regarded as the distributed ledger technology (DLT) that helps in distributing financial assets between parties. As argued by Crosby et al. (2016), this technology has been credited with the highest risks involvement of the finance industry. The virtual currency has no record in the database and a third party vendor to store the information of the parties. According to a survey, over 90 corporations have implemented filed more than 2500 patents against blockchain technology all over the world. Risks and Threats: Regulatory and governance As commented by Lindman, Tuunainen and Rossi (2017), there is a lack of regulatory clarity in the blockchain technology. The regulatory framework of the block Chain technology has been weak including the private network of the parties. The privacy of the parties included in the blockchain technology has been facing various security breaches over the internet. The hackers all over the world are targeting these online transfers of digital currency among the parties. The counter Clearing house and Product (CCP) has been regulating these transaction al over the world. However, these organizations are not safe for the online transaction of digital currency. Privacy and Security As commented by Swan (2015), the use of the block chains haes been emerging all over the world. The privacy and security of the financial documents and assets have not been maintained by the technology. There have been numerous cases of hacking and data breaching over the internet that has been reported. Blockchain uses a shared database that contains all data and information of various parties. As commented by Mougayar (2016), this technology provides a high-speed transfer of digital currency. Crosby et al. (2016) argued that, this concept has minimized privacy and security of data and information of the parties involved in the contract. Therefore, this technology has high-level risks in the finance industry. Behavioural and transactional risks As commented by Lindman, Tuunainen and Rossi (2017), transactions in the blockchain technology have been a huge risks for the investors. The finance industry has been facing a lot of loss in the market due not the technology. However, According to me, blockchain need to use a centralized database instead of the shared database. The firewall of the technology has been weak. This has caused the variety of cyber-attacks in the database. The lack of the third party investors has created problems for the investors, as there is no part for tracking their financial assets. As commented by Guo and Liang (2016), blockchain is not storing the Big Data technology. According to me, adoption of Big Data technology might help in minimizing these risks and threats in the blockchain. The massive redundancy of the technology has been creating issues in the security of financial data and information of the companies. As commented by Swan (2015), instead of storing data on the blockchain, a metadata can be created for maintaining the record of the parties involved. As commented by Guo and Liang (2016), this can ensure an integrity checking if the data and information provided in the metadata. Conclusion It can be concluded that the use of the blockchain technology has helped in increasing the speed of transaction all over the world. However, it has created various risks and threats in the transaction that have been discussed in the report. The use of blockchain technology has been originated from the bitcoins. The market of the Bitcoins has been adopted by various financial companies in the world. References Crosby, M., Pattanayak, P., Verma, S. and Kalyanaraman, V., 2016. Blockchain technology: Beyond bitcoin.Applied Innovation,2, pp.6-10. Guo, Y. and Liang, C., 2016. Blockchain application and outlook in the banking industry.Financial Innovation,2(1), p.24. Lindman, J., Tuunainen, V.K. and Rossi, M., 2017. Opportunities and risks of Blockchain Technologiesa research agenda. Mougayar, W., 2016.The business blockchain: promise, practice, and application of the next Internet technology. John Wiley Sons. Swan, M., 2015.Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.". Zheng, Z., Xie, S., Dai, H.N. and Wang, H., 2016. Blockchain challenges and opportunities: A survey.Work Pap.2016.

Friday, November 29, 2019

Nikki Stone Essay Example

Nikki Stone Paper When Turtles Fly The Secret of Success Nikkei Stones is definitely one of the most memorable speaker I have ever had a chance to meet. She is incredible in term of her experience, presentation skills, and inspiration. I feel really honor to meet her in person, listen to her lessons, and learn one of the most interesting theory that could help anyone who tries successful in life: the Turtle Effect. The Turtle Effect, according to Nikkei Stone, is that you have to be soft inside, hard outside, and dare to stick your neck out in needed situations. Soft Inside implies we have to have big dream, big inspiration, and determination to do something. Hard shell means despite that soft side we have, we need to be able to hard enough to react to whatever hardships and obstacles that life will bring to us. And dare to stick your neck out implies that we need to step up, win over our fears ND try to overcome the impossible. She also gave us many good advices about passion, focus, commitment, overcoming adversities, confidence, risk, and teamwork. To me, those are almost everything that four years of college have educated me. It Is lessons for life and will help anyone In any aspects In life. She made me think about who I am and where I am In a way that Ignites my drive to chase my big dreams and fulfill my goals. We will write a custom essay sample on Nikki Stone specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Nikki Stone specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Nikki Stone specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Monday, November 25, 2019

Stag Beetles, Family Lucanidae

Stag Beetles, Family Lucanidae Stag beetles are some of the biggest, worst bugs on the planet (at least they look bad!). These beetles are so named for their antler-like mandibles. In Japan, enthusiasts collect and rear stag beetles, and even stage battles between the males. Description Stag beetles (family Lucanidae) do get quite large, which is why they are so popular with beetle collectors. In North America, the largest species measures just over 2 inches, but tropical stag beetles can easily top 3 inches. These sexually dimorphic beetles also go by the name pinch bugs. Male stag beetles sport impressive mandibles, sometimes as long as half their body, which they use to spar with competing males in battles over territory. Though they may look threatening, you dont need to fear these enormous beetles. Theyre generally harmless but may give you a good nip if you try to handle them carelessly. Stag beetles are typically reddish-brown to black in color. Beetles in the family Lucanidae possess antennae with 10 segments, with the end segments often enlarged and appearing clubbed. Many, but not all, have elbowed antennae as well.​ Classification Kingdom – Animalia Phylum – Arthropoda Class – Insecta Order – Coleoptera Family - Lucanidae Diet Stag beetle larvae are important decomposers of wood. They live in dead or decaying logs and stumps. Adult stag beetles may feed on leaves, sap, or even honeydew from aphids. Life Cycle Like all beetles, stag beetles undergo complete metamorphosis with four stages of development: egg, larva, pupa, and adult. Females usually lay their eggs under the bark on fallen, rotting logs. The white, c-shaped stag beetle larvae develop over one or more years. Adults emerge in late spring or early summer in most areas. Special Adaptations and Defenses Stag beetles will use their impressive size and massive mandibles to defend themselves if needed. When it feels threatened, a male stag beetle may lift its head and open its mandibles, as if to say, Go ahead, try me. In many parts of the world, stag beetle numbers have declined due to forest defragmentation and the removal of dead trees in populated areas. Your best chance of seeing one may be observing one near your porch light on a summer evening. Stag beetles do come to artificial light sources, including light traps. Range and Distribution: Worldwide, stag beetles number around 800 species. Just 24-30 species of stag beetles inhabit mostly forested areas of North America. The largest species live in tropical habitats. Sources Borror and Delongs Introduction to the Study of Insects, 7th Edition, by Charles A. Triplehorn and Norman F. JohnsonInsects: Their Natural History and Diversity, by Stephen A. MarshallStag Beetles of Kentucky, University of Kentucky Entomology Department

Thursday, November 21, 2019

SOFTWARE USABILITY SLP Essay Example | Topics and Well Written Essays - 500 words

SOFTWARE USABILITY SLP - Essay Example Operations tell the performance levels of the software for certain tasks. A breakthrough in software usability evaluation came from Shackel (1991). It defines usability as the capability of artifact in terms of human functions. These human functions will enable the softwares easy, satisfactory and effective use by its users. It places the usability to the level of interaction between artifact and users. When the criteria of software usability are set, the approach supports the process of evaluation and the interpretation of results. Usability thus is not limited to features of the interface, but it is a measure of "interaction" between human and computer. There exist different methods to evaluate software usability. It depends on time, labor, evaluator – experience, development stage, preference, and facilities. In wider terms, the distinction in evaluation methods is user based, expert-based and model-based. The user-based methods are more realistic in estimation of usability and give a very concise record of significant problems. But this method is time-consuming and expensive for larger samples. The expert based models are cheap and fast. But here, there is a risk of overestimation of the actual number of problems. The model-based method gives a laborious estimate of the standard of software usability. The main disadvantage is it has a limited applicability in task. Hence, after that HCI came into existence. The four approaches are Eberts (1994) describes the user interface designs to be user-friendly, intuitive and efficient. He defines four approaches to HCI. Anthropomorphic, Cognitive, Empirical and predictive. The anthropomorphic way designs a user interface that possesses human-like qualities, for example, in interface error messaging, avatars or sounds. The cognitive approach considers the potential of human brain and senses, in order to develop the interface to support the user. A metaphoric design is one such example

Wednesday, November 20, 2019

Tiny Little Pieces Fiction pretending to be non-firction Essay

Tiny Little Pieces Fiction pretending to be non-firction - Essay Example Another thing that should be noted is the ability of writers to think about things that could likely take place in some years to come and compile these as works of fiction. Some writers even produce science fictions that are futuristic in nature and while some of these are not happening at the moment, they could be closely related to reality in years to come. These set of science fiction writers produce works based on the scientific developments on ground and try to use their works of fiction to predict what could likely take place in the nearest future. Thus, the closeness of fiction to reality is largely dependent on the writers’ imaginative strength and their ability to think outside the box. It is really very difficult to decide whether or not to call works of literature non-fiction when they are closely related to reality. As explained above, works of fiction are borne out of the imaginative power of the writer and they are works that describe make-believe people and even ts. Non-fictional works are writings that contain facts about the events that take place in reality and are not primarily based on the imaginative ability of the writer. According to Marcus, the differences between non-fictional and fictional narratives are illogical, because â€Å"fact or reality shares the same form as fiction or narrative† (244). There are actually some works of fiction that the fictional elements are used as symbols to represent the events that take place in reality and this means that these so called, ‘works of fiction’ have some elements of reality embedded in them. Though, the people and the events in these works of fiction could be closely related to the ones in reality, this does not necessarily mean that they could be called non-fictional works. As long as these works have some elements of imagination in them and the writers have not claimed that they are based on reality, they should still be termed as works of fiction. Hence, works of literature should not be called non-fiction, even though there are some elements of reality in these messages of fiction. There are some liberty authors that have tried to convert works of fiction into non-fiction and one of them is James Frey in his Million Little Pieces work. Several critics condemned James Frey for converting a fictional work into non-fiction in his Million Little Pieces. Though, Frey has claimed that he did this in order to present a compelling account of the things that he saw around him, but the fact that Frey made it look like he was the one that experienced the things that were presented in his book leaves little to be desired. It is clear that Frey did these in order to arouse the emotions of the readers, but this is actually against the ethics of writing. Frey’s inability or refusal to acknowledge the real source represents another dimension of plagiarism, which is an abuse against writing ethics. It was even after the book had received wide acclai m that it was discovered that Frey invented the major events in the book and he never really experienced them. The fact that Frey tried to convert a work of fiction into n

Monday, November 18, 2019

Administrative law Essay Example | Topics and Well Written Essays - 1000 words - 1

Administrative law - Essay Example Law Administration falls under as a set of laws for the people (Nyberg, 2013). The set of laws that fall under the agencies in administration having certain powers to be executed can be regarded in Administrative Laws of United States of America (USA). The Administrative Law is also called regulatory law. These administrative bodies serve the function to use their finite powers to bring peace and demolish injustice in complicated situations on public level. The role of Law Administrative Agencies is not only unique but precise in terms of its application. The Administrative authority is given by the Congress (HG, 2014). The agencies of the law administration publish their hearings of regulations that can be accessed by the common man which is commonly available on print and electronic media. The Law Administration is considered to be the basic model to shape up and enforce regulations in any society. It has certain hearings and briefings consisting of rules, orders, regulations, laws, that are held together in proper compilation which are later published which can be easily accessed from print media and electronic media (DL, 2014). This deals in amending the already existing rules and regulations that are found in favor of mankind. The masses are to be provided rights that can be enjoyed from grass root level. An existing law that had been terminated its implementation formerly can be introduced once again which falls under Rule Making. This deals in formulating new set of laws and regulations that are to be presented and shaped in such a way that are in favour of people. Agencies aim to ensure the common man to enjoy huge amount of benefits and work day in and day out to make it a reality for the people present in society. Administrative Laws that are governed by the states have their own set of rules and regulations to be implemented. An example can be considered where State governments would be appealing the

Saturday, November 16, 2019

Criminology Essays Policing Future Criminal

Criminology Essays Policing Future Criminal Policing Future Criminal Policing in the future Introduction Terrorism as defined by the Federal Emergency Management Agency (FEMA),† is the use of force or violence against persons or property in violation of the criminal laws of the United States for purposes of intimidation, coercion, or ransom.† (August, 2007). The group of people committing this act often use threats to create fear among the public. These people try to convince citizens that their government is powerless to prevent terrorism. The Acts of terrorism include threats of terrorism; assassinations; kidnappings; hijackings; bomb scares and bombings; cyber attacks (computer-based); and the use of chemical, biological, nuclear and radiological weapons. (FEMA, 2007). In the future the act of terrorism would be even worst because of new technologies and inventions. The question is who will protect the people? What can the law enforcement do in the future to stop terrorism? On going studies and researches are being done by the police department to create a strategic move to stop or interrupt any act of terrorism. This essay will include issues that may arise in the future of policing from the perspective of individual police personnel, police management and the community. The focus of this essay is on the law enforcement its strategy and plans in the future in policing the community. Law Enforcement New Challenges – Police Personnel In the future police officer would play the role as the keepers of the peace, antiterrorism specialists or community outreach agents. (Stephens,2005). Gene Stephen is a noted criminal justice futurist and has surveyed police experts and found out that a better educated police officers with improved people skills and a stronger understanding on emerging technologies will be crucial to successful policing in the future. Police officers are being addressed in the past as â€Å"peace officers,† and define public policing as the â€Å"absence of crime.† This has been change as the time goes by and as the crime committed becomes even more complicated. In the 21st century policing has become even more challenging for the police personnel, wherein causes of crimes and disorder often lie outside their community, demanding new and innovative approaches from police. Today offenders are usually thousands miles away while committing the crimes. Terrorists act may takes place in a certain place without the physically presence of the criminals. Such act includes chemical and biological mayhem, community hackers and crackers wherein they can manipulate data’s in the system even if they are thousand miles away. In the United States the most prevalent crime committed is the identity theft often assisted by Internet scams. How can police personnel cope up with this technology? Probably the best way to treat criminals committing such crime should be counteracted by the same act that they committed it. Due to the increasing crime committed brought by the new technologies international conventions involving different countries was held last November 2007. The convention was entitled â€Å"International Policing Toward 2020.† Future of policing depends on what type of the society being policed. The ability of the police personnel to identify the society that needs to be policed is important. Whether the police will need to use harsh type of policing or you need to ask the cooperation of the society. The key to an effective policing in the future is that police personnel must have a deeper understanding of what he was up to. This mean police personnel must be knowledgeable enough to handle crimes in the future. Trainings and seminars are being conducted on various areas in the United States. One organization who’s been handling researches, teaching and training police is the Society of Police Futurists International (PIF). The PIF consists of men and women who are most likely to understand the path ahead and be able to predict the threats and promises to expect in the next few years. Since we are living in the 21st century wherein criminals just can place a chip on anything and then destroy everything, PIF focuses on the new technology. The police futurist focuses on the high tech communication and state of the art technology. Police personnel can adjust in this kind of situation by proper training and education. The government can increase the fund in the education that can be given to the police. To be able to attend to crimes like cyber crime police personnel must know what he is up to. One of the problem concerning the trainings and education of police personnel is the financial fund. In the article written by Jeremy Wilson the director of the Center on Quality Policing at the RAND Corporation (a non profit research corporation), he identifies that the United States are having a hard time meeting the new challenges in policing. Based on his analysis they need the support of the federal government to go far beyond traditional local crime-fighting duties. As a result of the September 11, 2001 terrorist attacks, police today and in the future have a major new homeland security responsibility. Because of what happened the country need an extra hand from its community by recruiting enough number of police personnel to handle surveillance of airports, government building, mass transit systems and other potential terrorists’ target. They also have additional duties to foil terrorist’s attacks before they occur. The law enforcement agencies must be ready anytime to respond the possibility of other complicated attack such as chemical, biological and other unconventional weapons. Police Management Managing police force is much more complicated than handling an organization. It is not just hiring someone because you like him. Today recruiting is even harder after the Sept 11, 2001 bombing. People who want to join the force should be checked carefully for you might hire a terrorist undercover. Today the organization needs to require more officers, with more skills at a higher cost. Now the problem will be the financial availability. Before the police management focuses only on the daily needs of the organization such staffing needs and mandatory training requirements. But to adapt in the new security duties and changing labor force, police department will need to develop a long term plans for recruiting the right officers with the right skills. Unfortunately the police department is not equipped enough to check every person who wants to join the department. Aside from the lack of equipment the department also lacks on funds. Federal assistance to police departments has dropped in 2007. The chiefs of police reacted on the cutting of funds for the law enforcement nationwide. The role of the police personnel and the department is important not only during this time of terrorism but in the future as well. Trainings and education on the new technologies is important. How can police personnel fight terrorists attacking the system of a government agency if he doesn’t know how to fight it? Technologies nowadays are very much complicated as compared before and in the early 90’s. To fight these high tech attacks the police department should be very much aware of the new technologies to become effective. A five year plan is suggested in fighting the terrorists starting from the community, city, nationwide and then internationally. The department should show the government how important is the additional funds in policing the future. Funds will be allocated to chosen personnel trainings and education. They will be the one who will forefront the department during the time of terrorists act either biologically, chemically and technologically. Focusing on their needs such as proper compensation, additional incentives and other benefits is important to help them become more dedicated not only on their job but in the department as well. It is therefore best to plan, present and proves to the government that the planning for the future of police management needs the federal support especially in funding. Proper planning is the main key for an effective policing in the future. The planning has to start with the police officer, the department and then the government. Community Policing â€Å"Community policing† is the term given to describe the wide range of policing reforms. (Columbian Journalism Review, 1999) In as early as 1980’s the liberal police executives and academics have been advocating the notion that police work directly, in an equal partnership, with community groups on prevention strategies appropriate to a particular community’s problems. Community policing includes an aggressive police presence in high-crime areas. In the September 11, 2001 attack of terrorist, the police visibility is seen not only on the city where the attack happened but nationwide as well. The question might be if the crimes committed are getting more complicated and now the identity theft and hackers are very much rampant how can community policing act on this crimes? As mentioned in the police management training and education is important, and then if a police force is equipped with advance technology as well as educated on the new technologies then this will not be a problem. The U.S. Justice Departments Community Oriented Policing Services (COPS) defines the term broadly as any policing aimed more at crime prevention than on chasing and catching bad guys; those tactics can include working with the community, decentralizing command, or simply increasing the number of beat police officers in a community. All these approaches have their defenders and critics, and all can point to some sort of research showing that they help make neighbourhoods safer, but they are not the same thing. The approach in community policing has become popular and has gained support from the government because of what they might have seen as effective in policing in the future. Community policing is the new approach to public safety. It combines the best aspects of several time-proven policing techniques in order to combat not only crime and disorder, but also the fear of crime and the likelihood of crime. It is both a philosophical approach and a set of practical steps to carry out that approach. It a police work with the community and other organizations, both public and private, to address local concerns and move towards long-term solutions to crime related problems. Community policing is the involvement of the community it requires more than just involving the citizens but it also requires the inclusion of other governmental agencies, the educational system, public and private social service providers and many local business. Also included are the criminal justice system, human rights groups, religious-based resources, and any other groups that can help find and maintain solutions to the communitys needs. In addition, the family unit must again become a major player in the crime prevention arena. It is therefore literally means that involving everybody to fight against criminals who wants to destroy peace and order not only in one location but worldwide as well. Community policing also includes preventive measures. The goal of community policing includes the following: To empower the people to resist crime and unsafe conditions by resolving the root issues instead of acting on the same act again and again. Preventive measure is important than acting on the crimes. Provide an adequate response to street-level, quality-of-life complaints in the community without reducing the departments capability to continue to respond appropriately to emergencies. To partner with different organizations such as schools, social service agencies, citizen groups, and others with one purpose to developed effective preventive strategies. Reduce the demand for future police by addressing the cause of public safety problems Reduce the fear of crime. To encourage the citizens and community groups in solving the day to day problem solving and prevention activities, while maintaining full response capabilities and relieving certified personnel from tasks not requiring their particular training or expertise. Furnish the township with quality essential police services; subscribe and conform to the highest professional standards in an effort to protect the constitutional rights, lives, and property of the citizens consistent with community goals and policies. The best approach in community policing especially in fighting terrorism it is best to first identify the cause and work cooperatively by creating a plan that can be useful not only today but in the coming years. It is effective to balance the approach one that relies equally on law enforcement, crime prevention, and community involvement in issues about crimes and terrorism. Conclusion The future of policing lies on the people involved on it. A plan is important in dealing with criminals and terrorism. Nowadays you are not sure who you are dealing with. You might be hiring a terrorist without knowing it. Your plan maybe effective but without proper funding and cooperation from the different department and organization of the community and the government then the plan will not be successful. As mentioned above the following factors are important education, training, community cooperation and funds. To achieve the foresee future of policing the combination of the above factors should be present in planning. Since terrorism is an international concern it is best to be up dated on convention and seminars on new preventive measures that the different countries are doing to fight and stop the increasing number of terrorism. Prevention is better than battling with these terrorist. If the police force where able to prevent such act before it will take place then million of people will be safe. As what medical personnel would say â€Å"Prevention is better than cure.† Police force can also adopt this phrase. Since United States are among the nation who is being attacked by terrorist it is best for them to plan policing not only today but in the future as well. Reference: Embracing the Future of Law Enforcement, Platypus Magazine, December 2007, http://www.metafuture.org/afp%20newsletter%202007.pdf Policing, Columbia Journalism Review, February 15, 1999, http://www.allbusiness.com/information/publishing-industries/166642-1.html Scheider,M., Chapman,R., April 2003, Community Policing and Terrorism http://www.homelandsecurity.org/journal/Articles/Scheider-Chapman.html Wilson, J.,May 23, 2006, Police Personnel Crisis Needs Federal Leadership http://www.washingtonpost.com/wp dyn/content/article/2006/05/22/AR2006052200886.html www.fema.gov

Wednesday, November 13, 2019

Chasing Amy: A Disregard for Societal Norm Essays -- Chasing Amy Essa

You know, I didn't just heed what I was taught, men and women should be together, it's the natural way, that kind of thing. I'm not with you because of what family, society, life tried to instill in me from day one. The way the world is, how seldom it is that you meet that one person who just gets you - it's so rare. My parents didn't really have it. There were no examples set for me in the world of male-female relationships. And to cut oneself off from finding that person, to immediately halve your options by eliminating the possibility of finding that one person within your own gender, that just seemed stupid to me. Alyssa Jones, the heroine of Chasing Amy, calmly explains this in order to reaffirm her love for her boyfriend, Holden. In this quote, Alyssa exudes that she has always felt that individuals mustn’t falter to societal heteronormativity. In society, there is an accepted standard, and that standard is heterosexuality; anything that falls outside of that social norm is seen as wrong. Alyssa was adamant about not allowing herself to fall under the ideal that a male partner was the only acceptable end goal in life. The particular agenda that Alyssa set for herself, along with other characters dealing with promiscuity, homosexuality, and homophobia are the reason that I have chosen to analyze Kevin Smith’s film, Chasing Amy. In this essay, I aim to establish that Chasing Amy serves as a positive stride for gays and lesbians within a heteronormative culture. Chasing Amy centers around two freelance comic book writers/best friends, Holden and Banky. A homosexual acquaintance, Hooper, introduces Holden to a fellow comic book writer, Alyssa. Holden immediately falls for Alyssa and strikes up a close relationship with ... ...iewers from making the same sort of mistakes. Chasing Amy serves as a milestone for all those who choose to work against what they are taught as being socially acceptable and opens the door to social change. WORKS CITED Â ¨ Pharr, Suzanne. "Homophobia and Sexism." The Differences Among Us: Division and Connections (1988): 416. Â ¨ Ochs, Robyn. "Bisexuality, Feminism, Men and Me." Sexuality and Relationships (1992): 165. Â ¨ Zimmerman, Bonnie. "What Has Never Been: An Overview of Lesbian Feminist." Making a Difference: Feminist Literary Criticism 179. Â ¨ Kehoe, Monica. "Historical, Literary, and Erotic Aspects of Lesbianism." Journals of Homosexuality 1. Â ¨ Rust, Paula C. Rodriguez, Paula C. Rust, and "Bisexuality in the United States: A Social Science Reader." Criticisms of the Scholarly Literature on Sexuality for its Neglects of Bisexuality 1. Chasing Amy: A Disregard for Societal Norm Essays -- Chasing Amy Essa You know, I didn't just heed what I was taught, men and women should be together, it's the natural way, that kind of thing. I'm not with you because of what family, society, life tried to instill in me from day one. The way the world is, how seldom it is that you meet that one person who just gets you - it's so rare. My parents didn't really have it. There were no examples set for me in the world of male-female relationships. And to cut oneself off from finding that person, to immediately halve your options by eliminating the possibility of finding that one person within your own gender, that just seemed stupid to me. Alyssa Jones, the heroine of Chasing Amy, calmly explains this in order to reaffirm her love for her boyfriend, Holden. In this quote, Alyssa exudes that she has always felt that individuals mustn’t falter to societal heteronormativity. In society, there is an accepted standard, and that standard is heterosexuality; anything that falls outside of that social norm is seen as wrong. Alyssa was adamant about not allowing herself to fall under the ideal that a male partner was the only acceptable end goal in life. The particular agenda that Alyssa set for herself, along with other characters dealing with promiscuity, homosexuality, and homophobia are the reason that I have chosen to analyze Kevin Smith’s film, Chasing Amy. In this essay, I aim to establish that Chasing Amy serves as a positive stride for gays and lesbians within a heteronormative culture. Chasing Amy centers around two freelance comic book writers/best friends, Holden and Banky. A homosexual acquaintance, Hooper, introduces Holden to a fellow comic book writer, Alyssa. Holden immediately falls for Alyssa and strikes up a close relationship with ... ...iewers from making the same sort of mistakes. Chasing Amy serves as a milestone for all those who choose to work against what they are taught as being socially acceptable and opens the door to social change. WORKS CITED Â ¨ Pharr, Suzanne. "Homophobia and Sexism." The Differences Among Us: Division and Connections (1988): 416. Â ¨ Ochs, Robyn. "Bisexuality, Feminism, Men and Me." Sexuality and Relationships (1992): 165. Â ¨ Zimmerman, Bonnie. "What Has Never Been: An Overview of Lesbian Feminist." Making a Difference: Feminist Literary Criticism 179. Â ¨ Kehoe, Monica. "Historical, Literary, and Erotic Aspects of Lesbianism." Journals of Homosexuality 1. Â ¨ Rust, Paula C. Rodriguez, Paula C. Rust, and "Bisexuality in the United States: A Social Science Reader." Criticisms of the Scholarly Literature on Sexuality for its Neglects of Bisexuality 1.

Monday, November 11, 2019

United Kingdom Political System

The United Kingdom is a unitary democracy governed within the framework of a constitutional monarchy, in which the Monarch is the head of state and the Prime Minister of the United Kingdom is the head of government. Executive power is exercised by Her Majesty's Government, on behalf of and by the consent of the Monarch, as well as by the devolved Governments of Scotland and Wales, and the Northern Ireland Executive.Legislative power is vested in the two chambers of the Parliament of the United Kingdom, the House of Commons and the House of Lords, as well as in the Scottish parliament and Welsh and Northern Ireland assemblies. The judiciary is independent of the executive and the legislature. The highest national court is the Supreme Court of the United Kingdom. The UK political system is a multi-party system. Since the 1920s, the two largest political parties have been the Conservative Party and the Labor Party.Before the Labor Party rose in British politics the Liberal Party was the other major political party along with the Conservatives. Though coalition and minority governments have been an occasional feature of parliamentary politics, the first-past-the-post electoral system used for general elections tends to maintain the dominance of these two parties, though each has in the past century relied upon a third party to deliver a working majority in Parliament. The current Conservative-Liberal Democrat coalition government is the first coalition since 1974.With the partition of Ireland, Northern Ireland received home rule in 1920, though civil unrest meant direct rule was restored in 1972. Support for nationalist parties in Scotland and Wales led to proposals for devolution in the 1970s though only in the 1990s did devolution actually happen. Today, Scotland, Wales and Northern Ireland each possess a legislature and executive, with devolution in Northern Ireland being conditional on participation in certain all-Ireland institutions.The United Kingdom remains responsible for non-devolved matters and, in the case of Northern Ireland, co-operates with the Republic of Ireland. It is a matter of dispute as to whether increased autonomy and devolution of executive and legislative powers has contributed to a reduction in support for independence. The principal pro-independence party, the Scottish National Party, won an overall majority of MSPs at the 2011 Scottish parliament elections and now forms the Scottish Government administration, with plans to hold a referendum on negotiating for independence. In Northern Ireland,the largest Pro-Belfast Agreement party, Sinn Fà ©in, not only advocates Northern Ireland's unification with the Republic of Ireland, but also abstains from taking their elected seats in the Westminster government, as this would entail taking a pledge of allegiance to the British monarch. The constitution of the United Kingdom is uncodified, being made up of constitutional conventions, statutes and other elements such as EU law. This system of government, known as the Westminster system, has been adopted by other countries, especially those that were formerly parts of the British Empire.The United Kingdom is also responsible for several dependencies, which fall into two categories: the Crown dependencies, in the immediate vicinity of the UK, and British Overseas Territories, which originated as colonies of the British Empire. The British Monarch, currently Queen Elizabeth II, is the Chief of State of the United Kingdom. Though she takes little direct part in government, the Crown remains the fount in which ultimate executive power over Government lies.These powers are known as Royal Prerogative and can be used for a vast amount of things, such as the issue or withdrawal of passports, to the dismissal of the Prime Minister or even the Declaration of War. The powers are delegated from the Monarch personally, in the name of the Crown, and can be handed to various ministers, or other Officers of the Crown, and can purposely bypass the consent of Parliament. The head of Her Majesty's Government; the Prime Minister, also has weekly meetings with the sovereign, where she may express her feelings, warn, or advise the Prime Minister in the Government's work.According to the uncodified constitution of the United Kingdom, the monarch has the following powers: Domestic Powers The monarch appoints a Prime Minister as the head of Her Majesty's Government in the United Kingdom, guided by the strict convention that the Prime Minister should be the member of the House of Commons most likely to be able to form a Government with the support of that House. In practice, this means that the leader of the political party with an absolute majority of seats in the House of Commons is chosen to be the Prime Minister.If no party has an absolute majority, the leader of the largest party is given the first opportunity to form a coalition. The Prime Minister then selects the other Ministers which make up the Government and act as political heads of the various Government Departments. About twenty of the most senior government ministers make up the Cabinet and approximately 100 ministers in total comprise the government. In accordance with constitutional convention, all ministers within the government are either Members of Parliament or peers in the House of Lords.As in some other parliamentary systems of government (especially those based upon the Westminster System), the executive (called â€Å"the government†) is drawn from and is answerable to Parliament – a successful vote of no confidence will force the government either to resign or to seek a parliamentary dissolution and a general election. In practice, members of parliament of all major parties are strictly controlled by whips who try to ensure they vote according to party policy. If the government has a large majority, then they are very unlikely to lose enough votes to be unable to pass legislation.The Prime Mini ster and the Cabinet David Cameron, Prime Minister of the United Kingdom (2010) The Prime Minister is the most senior minister in the Cabinet. She/he is responsible for chairing Cabinet meetings, selecting Cabinet ministers (and all other positions in Her Majesty's government), and formulating government policy. The Prime Minister is the de facto leader of the UK government, since s/he exercises executive functions that are nominally vested in the sovereign (by way of the Royal Prerogatives). Historically, the British monarch was the sole source of executive powers in the government.However, following the rule of the Hanoverian monarchs, an arrangement of a â€Å"Prime Minister† chairing and leading the Cabinet began to emerge. Over time, this arrangement became the effective executive branch of government, as it assumed the day-to-day functioning of the British government away from the sovereign. Theoretically, the Prime Minister is primus inter pares (Latin for â€Å"first among equals†) among his/her Cabinet colleagues. While the Prime Minister is the senior Cabinet Minister, s/he is theoretically bound to make executive decisions in a collective fashion with the other Cabinet ministers.The Cabinet, along with the PM, consists of Secretaries of State from the various government departments, the Lord High Chancellor, the Lord Privy Seal, the President of the Board of Trade, the Chancellor of the Duchy of Lancaster and Ministers without portfolio. Cabinet meetings are typically held weekly, while Parliament is in session Government departments and the Civil Service The Government of the United Kingdom contains a number of ministries known mainly, though not exclusively as departments, Ministry of Defense.These are politically led by a Government Minister who is often a Secretary of State and member of the Cabinet. He or she may also be supported by a number of junior Ministers. In practice, several government departments and Ministers have respo nsibilities that cover England alone, with devolved bodies having responsibility for Scotland, Wales and Northern Ireland, (for example – the Department of Health), or responsibilities that mainly focus on England (such as the Department for Education). Implementation of the Minister's decisions is carried out by a permanent politically neutral organization known as the civil service.Its constitutional role is to support the Government of the day regardless of which political party is in power. Unlike some other democracies, senior civil servants remain in post upon a change of Government. Administrative management of the Department is led by a head civil servant known in most Departments as a Permanent Secretary. The majority of the civil service staff in fact work in executive agencies, which are separate operational organizations reporting to Departments of State. â€Å"Whitehall† is often used as a metonym for the central core of the Civil Service.This is because m ost Government Departments have headquarters in and around the former Royal Palace Whitehall. Legislatures The UK Parliament is the supreme legislative body in the United Kingdom (i. e. , there is parliamentary sovereignty), and Government is drawn from and answerable to it. Parliament is bicameral, consisting of the House of Commons and the House of Lords. There is also a devolved Scottish Parliament and devolved Assemblies in Wales and Northern Ireland, with varying degrees of legislative authority. UK ParliamentHouse of Commons It is a Sand-colored building of Gothic design with large clock-tower. Parliament meets at the Palace of Westminster British House of Commons The Countries of the United Kingdom are divided into parliamentary constituencies of broadly equal population by the four Boundary Commissions. Each constituency elects a Member of Parliament (MP) to the House of Commons at General Elections and, if required, at by-elections. As of 2010 there are 650 constituencies ( there were 646 before that year's general election.Of the 650 MPs, all but one – Lady Sylvia Hermon – belong to a political party. In modern times, all Prime Ministers and Leaders of the Opposition have been drawn from the Commons, not the Lords. Alec Douglas-Home resigned from his peerages days after becoming Prime Minister in 1963, and the last Prime Minister before him from the Lords left in 1902 (the Marquis of Salisbury). One party usually has a majority in Parliament, because of the use of the First Past the Post electoral system, which has been conducive in creating the current two party system.The monarch normally asks a person commissioned to form a government simply whether it can survive in the House of Commons, something which majority governments are expected to be able to do. In exceptional circumstances the monarch asks someone to ‘form a government' with a parliamentary minority which in the event of no party having a majority requires the formati on of a coalition government. This option is only ever taken at a time of national emergency, such as war-time. It was given in 1916 to Andrew Bonar Law, and when he declined, to David Lloyd George and in 1940 to Winston Churchill.A government is not formed by a vote of the House of Commons; it is a commission from the monarch. The House of Commons gets its first chance to indicate confidence in the new government when it votes on the Speech from the Throne (the legislative program proposed by the new government). House of Lords The House of Lords was previously a largely hereditary aristocratic chamber, although including life peers, and Lords Spiritual. It is currently mid-way through extensive reforms, the most recent of these being enacted in the House of Lords Act 1999.The house consists of two very different types of member, the Lords Temporal and Lords Spiritual. Lords Temporal include appointed members (life peers with no hereditary right for their descendants to sit in the house) and ninety-two remaining hereditary peers, elected from among, and by, the holders of titles which previously gave a seat in the House of Lords. The Lords Spiritual represent the established Church of England and number twenty-six: the Five Ancient Sees (Canterbury, York, London, Winchester and Durham), and the 21 next-most senior bishops.The House of Lords currently acts to review legislation initiated by the House of Commons, with the power to propose amendments, and can exercise a suspensive veto. This allows it to delay legislation if it does not approve it for twelve months. However, the use of vetoes is limited by convention and by the operation of the Parliament Acts 1911 and 1949: the Lords may not veto the â€Å"money bills† or major manifesto promises (see Salisbury convention). Persistent use of the veto can also be overturned by the Commons, under a provision of the Parliament Act 1911.Often governments will accept changes in legislation in order to avoid b oth the time delay, and the negative publicity of being seen to clash with the Lords. However the Lords still retain a full veto in acts which would extend the life of Parliament beyond the 5 year term limit introduced by the Parliament Act 1911. The Constitutional Reform Act 2005 outlined plans for a Supreme Court of the United Kingdom to replace the role of the Law Lords. The House of Lords was replaced as the final court of appeal on civil cases within the United Kingdom on 1 October 2009, by the Supreme Court of the United Kingdom.Devolved national legislatures Though the UK parliament remains the sovereign parliament, Scotland has a parliament and Wales and Northern Ireland have assemblies. De jure, each could have its powers broadened, narrowed or changed by an Act of the UK Parliament. However, Scotland has a tradition of popular sovereignty as opposed to parliamentary sovereignty and the fact that the Scottish parliament was established following a referendum would make it p olitically difficult to significantly alter its powers without popular consent.The UK is therefore a unitary state with a devolved system of government. This contrasts with a federal system, in which sub-parliaments or state parliaments and assemblies have a clearly defined constitutional right to exist and a right to exercise certain constitutionally guaranteed and defined functions and cannot be unilaterally abolished by Acts of the central parliament. All three devolved institutions are elected by proportional representation: the Additional Member System is used in Scotland and Wales, and Single Transferable Vote is used in Northern Ireland.England, therefore, is the only country in the UK not to have a devolved English parliament. However, senior politicians of all main parties have voiced concerns in regard to the West Lothian Question, which is raised where certain policies for England are set by MPs from all four constituent nations whereas similar policies for Scotland or Wa les might be decided in the devolved assemblies by legislators from those countries alone.Alternative proposals for English regional government have stalled, following a poorly received referendum on devolved government for the North East of England, which had hitherto been considered the region most in favor of the idea, with the exception of Cornwall, where there is widespread support for a Cornish Assembly, including all five Cornish MPs. England is therefore governed according to the balance of parties across the whole of the United Kingdom. The government has no plans to establish an English parliament or assembly although several pressure groups are calling for one.One of their main arguments is that MPs (and thus voters) from different parts of the UK have inconsistent powers. Currently an MP from Scotland can vote on legislation which affects only England but MPs from England (or indeed Scotland) cannot vote on matters devolved to the Scottish parliament. Indeed, the former Prime Minister Gordon Brown, who is an MP for a Scottish constituency, introduced some laws that only affect England and not his own constituency. This anomaly is known as the West Lothian question.The policy of the UK Government in England was to establish elected regional assemblies with no legislative powers. The London Assembly was the first of these, established in 2000, following a referendum in 1998, but further plans were abandoned following rejection of a proposal for an elected assembly in North East England in a referendum in 2004. Unelected regional assemblies remain in place in eight regions of England. There are two main parties in the United Kingdom: the Conservative Party, and the Labor Party.There is also a significant third party, the Liberal Democrats. The modern Conservative Party was founded in 1834 and is an outgrowth of the Tory movement or party, which began in 1678. Today it is still colloquially referred to as the Tory Party and its members as Tories. The L iberal Democrats were formed in 1988 by a merger of the Liberal Party and the Social Democratic Party (SDP), a Labor breakaway formed in 1981. The Liberals and SDP had contested elections together as the SDP–Liberal Alliance for seven years before.The modern Liberal Party had been founded in 1859 as an outgrowth of the Whig movement or party (which began at the same time as the Tory party and was its historical rival) as well as the Radical and Peelite tendencies. The Liberal Party was one of the two dominant parties (along with the Conservatives) from its founding until the 1920s, when it rapidly declined and was supplanted on the left by the Labor Party, which was founded in 1900 and formed its first government in 1924.Since that time, the Labor and Conservatives parties have been dominant, with the Liberal Democrats also holding a significant number of seats and increasing their share of the vote in parliamentary general elections in the four elections 1992. Conservatives; The Conservative Party won the largest number of seats at the 2010 general election, returning 307 MPs, though not enough to make an overall majority. As a result of negotiations following the election, they entered a formal coalition with the Liberal Democrats to form a majority government.The Conservative party can trace its origin back to 1662, with the Court Party and the Country Party being formed in the aftermath of the English Civil War. The Court Party soon became known as the Tories, a name that has stuck despite the official name being ‘Conservative'. The term â€Å"Tory † originates from the Exclusion Bill crisis of 1678-1681 – the Whigs were those who supported the exclusion of the Roman Catholic Duke of York from the thrones of England, Ireland and Scotland, and the Tories were those who opposed it.Both names were originally insults: a â€Å"whiggamore† was a horse drover (See Whiggamore Raid), and a â€Å"tory† (Tà ³raidhe) was an Ir ish term for an outlaw, later applied to Irish Confederates and Irish Royalists, during the Wars of the Three Kingdoms. Generally, the Tories were associated with lesser gentry and the Church of England, while Whigs were more associated with trade, money, larger land holders (or â€Å"land magnates†), expansion and tolerance of Catholicism.The Rochdale Radicals were a group of more extreme reformists who were also heavily involved in the cooperative movement. They sought to bring about a more equal society, and are considered by modern standards to be left-wing. After becoming associated with repression of popular discontent in the years after 1815, the Tories underwent a fundamental transformation under the influence of Robert Peel, himself an industrialist rather than a landowner, who in his 1834 â€Å"Tamworth Manifesto† outlined a new â€Å"Conservative† philosophy of reforming ills while conserving the good.Though Peel's supporters subsequently split from t heir colleagues over the issue of free trade in 1846, ultimately joining the Whigs and the Radicals to form what would become the Liberal Party, Peel's version of the party's underlying outlook was retained by the remaining Tories, who adopted his label of Conservative as the official name of their party. The crushing defeat of the 1997 election saw the Conservative Party lose over half their seats from 1992 and saw the party re-align with public perceptions of them.In 2008, the Conservative Party formed a pact with the Ulster Unionist Party to select joint candidates for European and House of Commons elections; this angered the DUP as by splitting the Unionist vote, republican parties will be elected in some areas. After thirteen years as the official opposition, the Party returned to power as part of a coalition with the Liberal Democrats in 2010. Historically, the party has been the mainland party most pre-occupied by British Unionism, as attested to by the party's full name, the Conservative & Unionist Party.This resulted in the merger between the Conservatives and Joseph Chamberlain's Liberal Unionist Party, composed of former Liberals who opposed Irish home rule. The unionist tendency is still in evidence today, manifesting sometimes as a skepticism or opposition to devolution, firm support for the continued existence of the United Kingdom in the face of separatist nationalism, and a historic link with the cultural unionism of Northern Ireland. Labor; The Labor Party won the second largest number of seats in the House of Commons at the 2010 general election, with 258 MPs.The history of the Labor party goes back to 1900 when a Labor Representation Committee was established which changed its name to â€Å" ­Ã‚ ­The Labor Party† in 1906. After the First World War, this led to the demise of the Liberal Party as the main reformist force in British politics. The existence of the Labor Party on the left of British politics led to a slow waning of energ y from the Liberal Party, which has consequently assumed third place in national politics.After performing poorly in the elections of 1922, 1923 and 1924, the Liberal Party was superseded by the Labor Party as the party of the left. Following two brief spells in minority governments in 1924 and 1929–1931, the Labor Party had its first true victory after World War II in the 1945 â€Å"khaki election†. Throughout the rest of the twentieth century, Labor governments alternated with Conservative governments. The Labor Party suffered the â€Å"wilderness years† of 1951-1964 (three straight General Election defeats) and 1979-1997 (four straight General Election defeats).During this second period, Margaret Thatcher, who became leader of the Conservative party in 1975, made a fundamental change to Conservative policies, turning the Conservative Party into an economic neoliberal party. In the General Election of 1979 she defeated James Callaghan's troubled Labor governme nt after the winter of discontent. For most of the 1980s and the 1990s, Conservative governments under Thatcher and her successor John Major pursued policies of privatization, anti-trade-unionism, and, for a time, monetarism, now known collectively as Thatcherism.The Labor Party elected left-winger Michael Foot as their leader after their 1979 election defeat, and he responded to dissatisfaction with the Labor Party by pursuing a number of radical policies developed by its grass-roots members. In 1981 several right-wing Labor MPs formed a breakaway group called the Social Democratic Party (SDP), a move which split Labor and is widely believed to have made Labor unelectable for a decade. The SDP formed an alliance with the Liberal Party which contested the 1983and 1987 general elections as a centrist alternative to Labor and the Conservatives. After some initial success, the SDP did not prosper (partly due to its unfavorable distribution of votes in the FPTP electoral system), and wa s accused by some of splitting the anti-Conservative vote. The SDP eventually merged with the Liberal Party to form the Liberal Democrats in 1988. Support for the new party has increased since then, and the Liberal Democrats (often referred to as LibDems) in 1997 and 2001 gained an increased number of seats in the House of Commons.The Labor Party was badly defeated in the Conservative landslide of the 1983 general election, and Michael Foot was replaced shortly thereafter by Neil Kinnock as leader. Kinnock expelled the far left Militant tendency group (now called the Socialist Party of England and Wales) and moderated many of the party's policies. Yet he was in turn replaced by John Smith after Labor defeats in the 1987 and 1992 general elections. Tony Blair became leader of the Labor party after John Smith's sudden death from a heart attack in 1994.He continued to move the Labor Party towards the ‘center' by loosening links with the unions and embracing many of Margaret Thatc her's liberal economic policies. This, coupled with the professionalizing of the party machine's approach to the media, helped Labor win a historic landslide in the 1997 General Election, after 18 years of Conservative government. Some observers say the Labor Party had by then morphed from a democratic socialist party to a social democratic party, a process which delivered three general election victories but alienated some of its core base – leading to the formation of the Socialist Labor Party (UK).Liberal Democrats; The Liberal Democrats won the third largest number of seats at the 2010 general election, returning 57 MPs. The Conservative Party failed to win an overall majority, and the Liberal Democrats entered government for the first time as part of a coalition. The Liberal Democrats were formed in 1988 by a merger of the Liberal Party with the Social Democratic Party, but can trace their origin back to the Whigs and the Rochdale Radicals who evolved into the Liberal Pa rty. The term ‘Liberal Party' was first used officially in 1868, though it had been in use colloquially for decades beforehand.The Liberal Party formed a government in 1868 and then alternated with the Conservative Party as the party of government throughout the late 19th century and early 20th century. The Liberal Democrats are heavily a party on Constitutional and Political Reforms, including changing the voting system for General Elections (UK Alternative Vote referendum, 2011), abolishing the House of Lords and replacing it with a 300 member elected Senate, introducing Fixed Five Year Parliaments, and introducing a National Register of Lobbyists.They also claim to champion of fairness and social mobility, notably in government where they have introduced legislation introducing a pupil premium – funding for schools directed at the poorest students to give them an equal chance in life – equal marriage for homosexual couples and increasing the income tax thresho ld so that no one will pay anything on the first  £10,000 they earn. Other parliamentary parties The Green Party of England and Wales gained its second MP, Caroline Lucas, in the 2010 General Election (the first MP was Cynog Dafis, Ceredigion 1992 who was elected on a joint Plaid Cyru/Green Party ticket).It also has seats in the European Parliament, two seats on the London Assembly and around 120 local councilors. The Respect party, a left-wing group that came out of the anti-war movement has one MP, George Galloway. It also has a small number of seats on local councils across the country. There are usually a small number of Independent politicians in parliament with no party allegiance. In modern times, this has usually occurred when a sitting member leaves their party, and some such MPs have been re-elected as independents.The only current Independent MP is Lady Hermon, previously of the Ulster Unionist Party. However, since 1950 only two new members have been elected as indepen dents without having ever stood for a major party: Martin Bell represented the Tatton constituency in Cheshire between 1997 and 2001. He was elected following a â€Å"sleaze† scandal involving the sitting Conservative MP, Neil Hamilton—Bell, a BBC journalist, stood as an anticorruption independent candidate, and the Labor and Liberal Democrat parties withdrew their candidates from the election.Dr. Richard Taylor MP was elected for the Wyre Forest constituency in the 2001 on a platform opposing the closure of Kidderminster hospital. He later established Health Concern, the party under which he ran in 2005. Current political landscape Since winning the largest number of seats and votes in the 2010 general election, the Conservatives under David Cameron are now behind the Labor Party now led by Ed Miliband. Their coalition partners have also experienced a decline in support in opinion polls.At the same time, support for the UK Independence Party has shown a considerable a dvance, with some polls now placing them in third place ahead of the Lib Dems. UKIP's growing strength was illustrated by the result of the Eastleigh by-election in which the party advanced by 24% to take second place from the Conservatives, less than 5% behind the Lib Dems who retained the seat. Local government The UK is divided into a variety of different types of Local Authorities, with different functions and responsibilities.England has a mix of two-tier and single-tier councils in different parts of the country. In Greater London, a unique two-tier system exists, with power shared between the London borough councils, and the Greater London Authority which is headed by an elected mayor. Unitary Authorities are used throughout Scotland, Wales and Northern Ireland. European Union Further information: European Movement UK, Euroskepticism in the United Kingdom, and Members of the European Parliament from the United Kingdom.The United Kingdom first joined the European Economic Comm unity in January 1973, and has remained a member of the European Union (EU) that it evolved into; UK citizens, and other EU citizens resident in the UK, elect 78 members to represent them in the European Parliament in Brussels and Strasbourg. The UK's membership in the Union has been objected to over questions of sovereignty,[27] and in recent years there have been divisions in both major parties over whether the UK should form greater ties within the EU, or reduce the EU's supranational powers.Opponents of greater European integration are known as â€Å"Euroskeptics†, while supporters are known as â€Å"Europhiles†. Division over Europe is prevalent in both major parties, although the Conservative Party is seen as most divided over the issue, both whilst in Government up to 1997 and after 2010, and between those dates as the opposition. However, the Labor Party is also divided, with conflicting views over UK adoption of the euro whilst in Government (1997–2010) , although the party is largely in favor of further integration where in the country's interest.UK nationalists have long campaigned against European integration. The strong showing of the euroskeptic United Kingdom Independence Party (UKIP) in the 2004 European Parliament elections has shifted the debate over UK relations with the EU. In March 2008, Parliament decided to not hold a referendum on the ratification of the Treaty of Lisbon, signed in December 2007. [28] This was despite the Labor government promising in 2004 to hold a referendum on the previously proposed Constitution for Europe.

Friday, November 8, 2019

Mad Shadows essays

Mad Shadows essays This novel Mad Shadows is less fictional then it is authentic. In todays world, it is obvious how most people are influenced and admire others mostly because of their physical beauty. However this novel exaggerates this point to a great extent to be realized. Isabelle-Marie and Patrice who are excessively fond of beauty by their mother Louise nearly blinds them, thinking of it as a necessity like food and shelter. One of the main characters in the story, Louise is a perfect example of how someone loses their right sense of understanding. Excessively blinded by beauty, she denies the fact that her own son has mental problem. As long as she can still admire his gorgeous features, as she thinks that this beauty reflects back on her. Lost in her own world she forgets the fact that she also has a daughter to raise into a decent young woman. In actual fact, she rather detests Isabelle-Marie for not having such beauty as herself or Patrice. At a point in the story, Louise notices a vein bulging on her neck she makes a great commotion about such a small thing, referring it as a viper. After realising that it was a sign of aging and not being able to hide it with makeup, she tries to avoid it. After marrying to an attractive man Lanz, he takes advantage of her and takes over her wealth, which often left Patrice alone and heartbroken. Handsome Patrice, who was always admired by everyone, being perfect in every way had always left her sister jealousy. However, he lacked a normal beings mental ability, which was always meant to be ignored from his caretaker. His appearance and looks was the only thing thought by his mother. Since then Patrice cherishes this quality in the same manner as his mother. He often takes the time to stare at his body in the mirror or view his reflection in the water. This is one of the only things in which he possesses knowledge, and he devotes a lot of his time l ...

Wednesday, November 6, 2019

Predjudice essays

Predjudice essays Ever since I was a child I remember adults saying to me treat others as you would like to be treated. However you need only turn on your television to learn that so many people do not follow this golden rule. Prejudice should be eradicated from society because it only stands in the way of our worlds success. Prejudice should be eliminated because it slows advances in science, technology, and in our society. Prejudice halts progress in science because many scientists or hopeful scientists are not given the fair chance that they deserve. This happens because of their race of skin color. Often international progress is not achieved because one country may think it is better than another. Therefore, they do not want to attempt to combine their thoughts and ideas to perhaps form something that benefits everybody. Also, within our country sometimes ideas are not pursued because the person is of a different race. Prejudice presents a problem socially when people look down on others because of the way they look or talk. People often miss out on meeting new and interesting people because they have judged them even before they have met them. How is it possible to judge someone after just a moments glance? If contact and communication is not made between all races and ethnic backgrounds, some races will always believe they are superior to the others. Prejudice causes violent acts because if someone believes his race is superior to another he may wish to show the people of a different race that they are less superior by harassing them and imposing violence upon them. All people have the right to live no matter how they look or where they come from. If God put people on this earth who look different, than nobody can take that right away from them. Prejudice slows advances in technology because sometimes inventors who are not white will be reluctant to come forward with their ideas. They may believe th...

Monday, November 4, 2019

Communication to mitigate disasters Research Paper

Communication to mitigate disasters - Research Paper Example gger than 1.5 x 2 kilometres because we are unable to adequately control the focus of the map from http://webmap.city.burnaby.bc.ca/publicmap/viewer.htm. On the other hand, the vertical distance from 4788 Brentwood Drive is smaller than 1.5 kilometres whether northward or southward. The relatively short vertical distance attempts to offset the relatively bigger horizontal coverage of the map. On checking, however, the area covered by Figure 1 is about 6.9 square kilometres versus the 7.07 square kilometres implied by a 1.5-kilometres radius from 4788 Brentwood Drive. Based on the formula pi x radius-squared for area, a 1.5 kilometres radius implies 7.07 square kilometres. The website http://webmap.city.burnaby.bc.ca/publicmap/viewer.htm, which is controlled and managed by the Burnaby City government, is developing a menu for estimating the population of a sector of Burnaby. However, the author conducted several hours and days of attempts to estimate the population of the area covered by Figure 1 using the menu and failed. Possibly, the website is not yet ready to execute the population estimation function at the time of author’s attempt to access the website although the website was updated last 17 September 2010. However, if we use the latest edition of the Burnaby Quick Facts that was produced in 2008, the material documented that one square kilometre of Burnaby has a population density of 2,275.6 individuals as of 2006. Thus, it appears reasonable to estimate that the area covered by Figure 1 has a population of roughly 15,702 persons as of 2006. Of course, we can project the population up to 2010 based on the population growth figures but there is no need for us to do that. In a 2004 report, the United Nations Development Programme defined risk as â€Å"the probability of harmful consequences or expected loss of lives, people injured, property, livelihoods, economic activity disrupted (or environment damaged) resulting from interactions between natural or

Saturday, November 2, 2019

HR Assingment Essay Example | Topics and Well Written Essays - 2500 words

HR Assingment - Essay Example Human resource management is a way that a company or any other firm can use to manage its staff; in fact this aspect of organization has been identified as an academic theory of business functions which identifies workers or employees as resources with changing needs and ambitions. Workers are not just like other business resources like machinery, transport and raw materials as people ability to work depends on knowledge, training, and the processes set in place. The 21st century is a critical period in the growth of business departments especially the information and communications departments and the human resources departments as these have become every critical for the development of any organization (Fisher & Ashkanasy 2000). The following are major functions of the human resource department as identified many organizations with well developed department divisions; Human resource planning (keeping workers records, forecasting, career modelling and succession planning); employment (recruitment, training, selection, testing and orientation); training and development (primary and advanced skills training, devising working programs); labour relation (solving employee concerns, monitoring morale, labour management programs); compensation ( incentives, analyses of job performance, salary surveys and performance reviews); workforce benefits ( administration of policy, health insurance, designing vacation and sick benefits schemes) (Fisher & Ashkanasy 2000); safety (making sure that the workplace complies with safety regulations like Occupational Safety and Heath Act, supervising security, carrying out possible accident investigations, and evaluation of the physical environment); discipline ( policy formulation and coordination, conduction of disciplinary measures); and personnel research (conducting opinion surveys,

Thursday, October 31, 2019

Business portfolio. Company Google Term Paper Example | Topics and Well Written Essays - 2250 words

Business portfolio. Company Google - Term Paper Example Google was founded by Larry Page and Sergey Brin whilst studying for their doctorate Stanford University in 1995. However, the company was founded in 1998. The company mainly specializes in Internet-related products and services. These products and services include software, search, online advertising technologies, cloud computing. The company also derives a lot from returns from ads. The company also offers online productivity software including Gmail, as well as a social networking site. The other products offered by the company particularly in the desktop section include web browsing applications, instant messaging, and photo editing. Last but not least, the organization leads the development of the mobile operating system for Android.The mission of Google is mainly to organize the information and make it universally useful and accessible by every person. The company’s initial goal before it diversified to collect all global information and organize it.A good mission and vi sion statement should capture the aspirations of the company and should also indicate where the company wants to go, and along with its core products. In the case of Google, the mission and vision statement does not meet the criteria. This is because it aims to organize information and make it universally available to all people. This kind of mission does not even indicate which kind of information it wanted to organize and how people will access given that not everybody across the world has access to the Internet.

Tuesday, October 29, 2019

Dream Research Project Essay Example for Free

Dream Research Project Essay What is a dream? Dreams are a symbol and link to the inner core of the human subconscious. Dreams as scientist say are stories our brains create while we are sleeping at night. Every dream is not the same, and their qualities depend, at least in part, on the stage of sleep in which they occur. There are different stages of sleep, REM sleep is the one dreams most appear in. REM stands for rapid eye movement in which brain activity is high and signaled by rapid horizontal movements of the eyes. Like all movies, dreams have story lines. Dreams in light sleep, stages 1 and 2, are like children’s movies short and simple. Dreams can be for as long as 20 minutes, to a few seconds. They can vary from normal and mundane, to surreal and bizarre. Dreams can often times drive creative thought, or provoke a sense of inspiration. Scientists believe everybody dreams, but sometimes we forget. We tend to forget when we naturally pass out of sleep through the traditional cycle. If a person is awoken directly from REM sleep (by an alarm clock), they are much more likely remember the dream from that REM cycle. Psychologists have also concluded that our daily activities while we are awake can have an affect on our dreams. However, scientists are unsure of what degree of an impact this makes on us. In one study a group of people wore red-tinted goggles before they went to sleep and there was another group that did not wear the goggles before they went to sleep. Even though anyone did not know the purpose of the study, when group that wore the goggles before they slept had woken the next morning, they had reported seeing more red images in their dreams than the people without goggles. According to First magazine, the average person has about 1. 460 dreams a year. That is 4 dreams every single day. In average you spend 10 to 30 percent of your sleeping time dreaming. You may think that vision is the only â€Å"dream sense† but it is not the only one. Vision is the prominent one, at least for sighted people. About half of all dreams an average person has have sound in them, but only 1 percent has taste, touch, or smell. However, a third of men and 40 percent of women have experienced smell or taste in a dream at least once in there life. Why do dreams occur? There is no shortage of theories as to why we dream. Some see dreaming as an important process through which all species with complex brains analyze and consolidate information. This is supported by the fact that most mammals dream. Other theories conclude that dreaming is nothing more than random brain activity that has little to no logical relevance. Another theory is that dreams reveal wishes or desires we are not aware of during waking hours. Unrelated to that completely another theory is that the human brain contains an ample overload store of information, memories, and emotions. During sleep, nerve cells fire at random, throwing bits of all of them together in random, wild ways. One of the first theories regarding dreams and dreaming was that Sigmund Freud. According to Sigmund Freud, dreams were heavy in symbolism and often showed the true intent and emotions of a human being. Freud saw dreams as wish fulfillment: disguised ways to satisfy unconscious desires that are too upsetting to face consciously. Dreams might therefore offer clues to unconscious conflicts. Freud For instance, sexual desires might appear in a dream as the rhythmic motions of a horseback ride, or conflicting feelings about a parent might appear as a dream about a fight. Freud called dreams the royal road to the knowledge of the unconscious mind. Freuds analysis of dreams brought about much controversy, especially amongst contemporary psychologists. Psychologists of today believe that dreams do have meaning; however, meaning is based upon the individual, not a set logic or theory as proposed by Freud. A very popular theory today is that dreaming specifically through REM sleep is essential for making memories. Several observations support hypothesis. For one when learning a new skill, REM sleep episodes are more frequent and last longer. When the new skill is mastered, those measures drop back to the normal average. Also during REM sleep, areas in the brain’s memory forming regions appear to â€Å"replay† patterns of nerve firing associated with the new learning.

Saturday, October 26, 2019

Building A BJT Amplifier Engineering Essay

Building A BJT Amplifier Engineering Essay Students were required to research and design a BJT Amplifier. This amplifier was to be built in the laboratory and tested to verify specifications. Calculations for resistors and capacitors were done and theoretical values were obtained. The circuit was built using Multisim 7 and then simulated to obtain practical values for resistors and capacitors. This is called DC Analysis. When the circuit met the required specifications, building of the BJT Amplifier could begin. Testing of the BJT Amplifier was done using the Feedback FG601 Function Generator which provided an input and a Tektronix 2205 Oscilloscope which showed the output waveform. Also, the Fluke 177 Multi-meter was used when checking for quiescent voltages and currents. The voltage gain, maximum symmetrical swing and the lower cut-off frequency for the BJT Amplifier was tested. The results obtained during tested were compared with the simulated and theoretical results. Success of the BJT Amplifier can only be achieved when the tested values duplicate that of the given specifications. The report that follows records calculations performed, circuits designed and the results of the tests that was done on the BJT Amplifier. List of Abbreviations Voltage gain BJT Bipolar Junction Transistor Current gain Input Impedance Base current Collector current Current across resistor Current across resistor Current across the original emitter resistor Current across the new emitter resistor Current across the unbypassed resistor Resistor used in the potential divider Collector resistor Resistor used in the potential divider Original emitter resistor New emitter resistor (bypassed) Unbypassed resistor Load resistor Base emitter voltage Voltage across the collector and emitter Input voltage Output voltage Voltage across resistor Voltage across the collector resistor Voltage across resistor Voltage across the original emitter resistor Voltage across the new emitter resistor Voltage across the bypassed resistor Introduction It is known that transistors are widely used in electronic devices. This design project is ideal as it enables students to get practical experience in the designing of electrical devices. The practical and theoretical knowledge needed for this design project challenges students as they have to validate calculated values and explain why each process was done. Since the BJT Amplifier has to be designed theoretically, students will understand the limitations provided by the equipment. They will also grasp an appreciation of the simulated circuit model as it relates to the tests performed on the circuit. The theory from Electronics provided valuable knowledge in designing the BJT amplifier. Support was given from lectures based from Engineering Skills and Applications. The practical knowledge was covered in previous laboratory exercises which were designated to familiarizing students with the various equipments. Also, demonstrations were provided by the technicians on the use of the breadboard which is the core building block of the BJT amplifier. BACKGROUND INFORMATION Transistors are important components used in technological devices around the world. Computers, cell phones, and radios are some of the many devices that require transistors as part of their circuit. The transistor is a three terminal, solid state electronic device. In a three terminal device we can control electric current or voltage between two of the terminals by applying an electric current or voltage to the third terminal. This three terminal character of the transistor is what allows us to make an amplifier for electrical signals, like the one in our radio. (cited) The three terminals are the collector terminal, the base terminal and the emitter terminal. There are three possible configurations of a transistor; the common collector, common base and the common collector. In the common emitter amplifier configuration, the emitter terminal is common to both the input and output circuits. The current gain does not have any effect on the collector current , or the collector-emitter voltage . A quiescent point is the operating point of a device which when applied to a device, causes it to operate in a desired fashion. It also refers to the dc conditions of a circuit without an input signal. The Q-point is sometimes indicated on the output characteristics curves for a transistor amplifier. There are different biasing arrangements associated with transistor configurations. These include; simple bias, self stabilizing bias, and H-type bias. The simple bias circuit consists of a fixed bias resistor and a fixed load resistor. For this bias design, the transistor configuration being used is the common emitter. The dc current gain or beta, is the ratio of the dc collector current to the dc base current. This simple bias circuit is similar to the self bias circuit with one difference: the base resistor is returned to the transistor collector instead of the supply voltage. If the transistor used had a high current gain, then the collector voltage would fall. As is connected to the collector then the base current would be reduced to counter the effect. If the transistor had a low value of beta, then the collector voltage would rise. This in turn provides more base current for the transistor to conduct harder and stabilize the q-point. H-TYPE BIASING is the most widely used biasing scheme in general electronics. For a single stage amplifier this circuit offers the best resilience against changes in temperature and device characteristics. The disadvantage is that a couple of extra resistors are required, but this is outweighed by the advantage of excellent stability. The circuits below: The quiescent points are usually fixed for varying collector currents in H-type biasing. If increases, then this will result in an increase in . This increase in the emitter current will flow through the emitter resistor and from the equation V=IR, the voltage across the resistor will increase. This increase in voltage across the emitter resistor will reduce the effective base-emitter voltage resulting in an increase in the stability of the collector current. Also, this type of biasing introduces a potential divider situation, where resistors R1 and R2 fix the base potential of the transistor. With H-type bias, maximum symmetrical sw ing can be calculated. Design OBJECTIVES Various specifications for the design of the BJT Amplifier were given by the rubric. The specifications given are listed in the following; The Voltage Gain must be 50 The Lower Cut-off Frequency must be below 100Hz The BJT Amplifier must be capable of driving a 100KÃŽÂ © load A 15V supply voltage must be used as the source The output voltage must have maximum symmetrical swing A 2N3904 Transistor must be used CHOOSING CONFIGURATION The following transistor configuration comparison chart shows the different types of configurations; Common Emitter Common Base Common Collector (Sedra Smith, 2007) AMPLIFIER TYPE    COMMON BASE      COMMON EMITTER      COMMON EMITTER (Emitter Resistor)      COMMON COLLECTOR (Emitter Follower)   Ã‚  Ã‚   INPUT/OUTPUT PHASE RELATIONSHIP 0 ° 180 ° 180 ° 0 ° VOLTAGE GAIN HIGH MEDIUM MEDIUM LOW CURRENT GAIN LOW  Ã‚ ¡ MEDIUM MEDIUM  Ã‚ ¢ HIGH POWER GAIN LOW HIGH HIGH MEDIUM INPUT RESISTANCE LOW MEDIUM MEDIUM HIGH OUTPUT RESISTANCE HIGH MEDIUM MEDIUM LOW The common emitter transistor amplifier configuration was chosen and not the common base configuration as the common base configuration produces a voltage gain but generates no current gain between the input and the output signals. (Doug Gingrich, 1999) The following figure shows the general configuration of the common emitter transistor amplifier configuration; Figure 1: General configuration of the common emitter transistor amplifier configuration Methodology DC Analysis The function of the DC Analysis is to allow DC biasing of the design to be verified. The DC biasing does not involve capacitors as DC is not transmitted by capacitors. The DC design is mainly used to establish the Q-points in the circuit. Q-points are the operating points in the circuit for which the transistor will perform at optimum performance. The circuit used for the DC Analysis is shown in the following diagram; Figure 2: Circuit used for DC Analysis Choosing and Before DC Analysis could be done, the various components which will be used in the circuit need to be calculated. These components are; , , , . From the specifications given, the voltage supply has a value of 15V and this is used to power the circuit. Before the values of these components could be calculated, the quiescent currents must be known, as well as the current flowing through the potential divider resistor . The data sheet used is based on the 2N3904 transistor. A range for the collector current is given, within which the transistor will operate with optimum performance. Using the Base Emitter ON Voltage vs Collector Current graph found on the data sheet, a value of was read off. The graph used is shown in the following diagram; Figure 3: Graph used to find a collector current The transistor will be built in an environment where the temperature is approximately 25. Hence the 25 line on the graph was used a reference line. From the data sheet, the Base Emitter ON Voltage was given as 0.65V. Hence, using the 25 line and reading off a voltage of 0.65V, the collector current was found to be 1. The base voltage , of the transistor depends on the current flowing through the potential divider. i.e. the current sets the base of the transistor and hence the value of . Any change in the resistance or gain of the transistor would result in an unwanted change in the base current . Also, the potential divider resistors contribute to the input impedance of the amplifier. This input impedance needs to be much more than the output impedance of the function generator. Hence, this is another reason to keep small. was chosen as Calculating The emitter resistor voltage , must be chosen accordingly as this voltage will affect the stability, maximum symmetrical swing and the gain of the amplifier. This voltage should be chosen such that it is greater than the base emitter voltage of the transistor. As mentioned before, the base emitter voltage as taken from the data sheet is 0.65V. This is to ensure that the emitter resistor voltage will not be significantly affected by small changes in . This condition would increase the stability of the transistor. For maximum symmetrical voltage swing, the emitter resistor voltage should be as small as possible. The base current and the collector current will both flow out of the common emitter terminal. Hence, for to remain constant, the base current must be as small as possible to allow negligible current to flow through the base terminal. Assuming the variation possible across the emitter and collector resistors caused variations in is , is calculated using the following equation; (1) The emitter resistor was calculated using the following equation; (2) Calculating From previous statements, For maximum symmetrical swing, half of the remaining voltage should be dropped across the collector resistor . The maximum symmetrical output voltage is calculated using the following equation; (3) Therefore, the voltage across the collector emitter terminal and the collector resistor is 6.75V. From the data sheet, the maximum device dissipation for the NPN 2N3904 transistor is at 25. Since all the power dissipation occurs at the collector junction for the active region, the following equation must be satisfied; (4) This is the range for which the transistor will operate with optimum performance. The power dissipated in the transistor from equation (4) is; , which is well within the specified range. A value for the component was found using the following equation; (5) Calculating and The current flows through the resistor . The value of is calculated using the following equation; (6) Since the current approaches a junction, it splits into and . flows through the potential divider resistor and flows to the base terminal. As previously stated, the base current, must not affect the base voltage by much. Hence the base current is considered negligible and all the current from is assumed to flow through . Hence, is calculated using the following equation; (7) Since some of the component values calculated was not available in stores, the closest value had to be chosen. The standard value that was chosen for each component is shown in the following table; Resistor Calculated Value/ Standard Value/ 6.75 6.8 1.5 1.5 128.5 130 21.5 24 Table 1: Standard values chosen for resistors Calculation of Input Impedance of transistor From the design specifications listed above, the lower cut off frequency must be below 100Hz. Also, as a value for was found using a graph of Current Gain vs Collector Current from the data sheet, a value for was found. The graph used is shown in the following diagram; For a collector current of 1, a gain of 130 was read off from the graph. But since this gain is above the required voltage gain of 50, certain calculations had to be done to reduce this gain and these calculations will be shown in due course. The following equation is used to calculate the input impedance of the transistor; (8) Calculation of Voltage Gain in the Circuit The following equation was used to calculate the voltage gain of the circuit; (9) Calculation of The required voltage gain of the transistor is 50. Hence, in order to reduce this gain, resistors are usually bypassed with the aid of capacitors. In this particular case, the only resistor that needs to be bypassed is the emitter resistor. Using the AC equivalent circuit, the following equation will be used to calculate the value of the unbypassed resistor; (10) where is the unbypassed emitter resistor is From the specification sheet given, is Calculation of new emitter resistor But Hence, if is split into two resistors and , then is found from the following; (11) As there are no standard 1.4kà °Ã‚ Ã…“ ´ resistor is the stores, was used as 1.5kà °Ã‚ Ã…“ ´. The following table illustrates the standard emitter resistors; Resistor Calculated Value/ Standard Value/ 100 100 1400 1500 Table 2: Standard values chosen for emitter resistors CIRCUIT CALCULATIONS Figure 4: Diagram showing circuit analyzed The following circuit calculations involve the standard component values and is based on the circuit in the above diagram.. These circuit calculations show the theoretical value of the quiescent currents and voltages. Theoretical values occur due to the circuit being under ideal conditions. The voltage gain of this circuit will be calculated as well as the maximum symmetrical output voltage across the transistor. The calculations are as follows; which flows through the collector resistor Using the potential divider rule; The voltage drop across is the same as, as both resistors are in parallel. was found on the data sheet as specified previously as . Under ideal conditions, it is assumed that is negligible when compared with as stated previously. for small changes in where is 130 since negligible current flows into the base terminal AC ANALYSIS The AC Analysis is used to calculate the components which would not have worked under DC biasing. These components are , and . If placed in the DC circuit, the capacitors would act as an open circuit, not allowing any current to flow. Also, the input and output impedance of the circuit was calculated. Circuits Used The following circuit was used in the AC Analysis; Figure 5: Circuit used for AC Analysis The following figure illustrates the AC equivalent of the above circuit; Zout Zin Figure 6: Ac equivalent of circuit shown in figure 5 Calculation of Capacitors The capacitor values can now be calculated using the following equation; (12) where is the reactance of the circuit f is the frequency C is the capacitance The capacitors behavior is defined in terms of reactance. The reactance of a capacitor is the ratio of the voltage to the current. The equation relating the reactance to the capacitance is given in equation (12). is the total input impedance of the capacitor (13) where is the input impedance , as the input is taken from the ground to the output terminals of the function generator. (14) Using equation 12; But from the specification sheet, f must be less than 100Hz. f 100 (15) Calculation of For the input coupling capacitor ; Calculation of For the output coupling capacitor ; Where is and Calculation of For the bypass capacitor ; where (16) But As stores does not have these calculated capacitor values, the following standard capacitors were used; Capacitor Calculated Value/ Standard Value/ 0.175 10 0.234 10 14.985 100 Table 3: Standard values chosen for capacitors CIRCUIT CALCULATIONS The following circuit calculations involve the standard component values and are based on the circuit shown in figure 3. These circuit calculations show the theoretical value of the quiescent currents and voltages. Theoretical values occur due to the circuit being under ideal conditions. The voltage gain of this circuit will be calculated as well as the maximum symmetrical output voltage across the transistor. The calculations are as follows; which flows through the collector resistor Using the potential divider rule; (17) The voltage drop across is the same as, as both resistors are in parallel. was found on the data sheet as specified previously as . (18) (19) Under ideal conditions, it is assumed that is negligible when compared with as stated previously. (20) for small changes in (21) where is 130 (22) (23) (24) (25) (26) (27) (28) (29) (30) (31) (32) since negligible current flows into the base terminal Figure 6 was used as a reference point to calculate the voltage gain and input impedance of the circuit. Equation (10) was used to calculate the voltage gain of the circuit; The maximum output voltage swing without clipping is calculated as using the following equation; (33) The following equation is used to calculate the input impedance of the circuit; (34) For simplification in calculation, (35) (36) COMPUTER SIMULATION DC Analysis This design was tested theoretically in the previous section and must now be tested on a computer simulation program. The simulation program used to simulate this circuit is Multisim 7. This software creates the circuit design and simulates the circuit practically and not theoretically. All quiescent voltages and currents were determined as well as the cut-off frequency, voltage gain and maximum symmetrical output voltage. The graph analyzer tool on the Multisim program was used to display these graphs. The following figure illustrates the simulation done for the DC Analysis; Voltage Gain The following circuit was used to observe the voltage gain of the BJT Amplifier; Figure 7: Showing circuit used for DC AnalysisThe voltage gain of the simulated circuit is the ratio of the maximum output voltage to the maximum input voltage. The voltage gain of the circuit is given by the equation; The following figure shows the settings used on the oscilloscope to obtain an input and output waveform; The maximum output and input signals was read off from the graph above using the Interpolator Line. Using the above equation, the voltage gain of the circuit was determined as follows; The following figure illustrates the bode plot obtained from the simulation; This graph was used to find the gain of the circuit using the following equation; From the above equation, the gain, in decibels is related to the above equation. Using the Interpolator Line, the gain, was determined to be 34.34. Hence the voltage gain was calculated as follows; The above calculation indicates that the design circuit would produce a satisfactory gain of approximately 50. Therefore the graph in figure 10 confirms that the design would produce a voltage gain of approximately 50. Cut-off Frequency The following bode plot was used to determine the lower cut-off frequency; The figure above was used to determine the lower-cut off frequency of the circuit. The lower-cut off frequency is the frequency at which the gain of the circuit decreases by 3 decibels. The Interpolator Line was placed at a gain of 30.861decibels, as this is the gain which corresponds to the lower-cut off frequency. The lower-cut off frequency was determined to be approximately . This lower cut-off frequency is much less than 100Hz and thus it meets the required specification. The following bode plot was used to determine the upper cut-off frequency; The figure above was used to determine the upper -cut off frequency of the circuit. The Interpolator Line was placed at a gain of 30.816 decibels, as this is the gain which corresponds to the upper-cut off frequency. The upper-cut off frequency was determined to be approximately . Lab Results The final test done on the designed circuit was done in the year 1 laboratory. The actual resistances and capacitances of the standard components used were measured using the LCR meter. The following table illustrates the measured resistances; Resistor Standard Resistance/ Measured Resistance/ Tolerance/% Lower Tolerance/ Upper Tolerance/ 6.8 6.7638 5 6.46 7.14 1.5 1.503 5 1.425 1.575 100 99.81 5 95 105 130 129.95 5 123.5 136.5 24 23.529 5 22.8 25.2 100 kÃŽÂ © 99.233 5 95 105 TABLE 6: Measured resistances AND THEIR TOLERANCE RANGE The following table illustrates the measured capacitances; Capacitor Standard Value/ Measured Value/ TABLE 8: Showing Measured capacitances used in the laboratory The BJT Amplifier was then built on the solder less breadboard. The DC LQD-421 dual power supply and the function generator were used to supply the input voltages. The following diagram shows the circuit built; As seen above, the capacitors were connected across their respective resistors and the Feedback FG 601 function generator was connected to the input capacitor. Before measuring the quiescent points of the circuit, tests had to be done to ensure that the required gain of 50 was achieved. This was done by connecting a Tektronix 2205 dual trace oscilloscope to the AC bias circuit. The channel 1 lead was connected to the input signal via the input capacitor and the channel 2 lead was connected across the output signal via the load. The settings on the Feedback FG 601 function generator were set to produce a 1kHz sine wave with an amplitude of . The channels on the Tektronix 2205 dual trace oscilloscope were grounded and the signals centered. The DC LQD-421 dual power supply was turned on and set to 15V and the Feedback FG 601 function generator and the Tektronix 2205 dual trace oscilloscope also turned on. The channels were switched to AC and the input and output sine waves appeared on the screen. To obtain a clear waveform on the screen, the following settings were used on the Tektronix 2205 dual trace oscilloscope; The Volts/Div setting was set at The channel 1 setting was set at The channel 2 setting was set at The two waveforms were then used to determine the voltage gain of the BJT Amplifier. Using the following equation; The upper and lower cut-off frequencies were found for the BJT Amplifier. This was done by varying the frequency on the Feedback FG 601 function generator and plotting a graph of Gain vs Frequency. The range used for the Feedback FG 601 function generator was; 10Hz 100Hz for lower cut-off frequency The following table illustrates the frequency and gain for lower cut-off frequency; Frequency/Hz Input/mV Output/V Gain 10 0.01 5 50 20 0.01 5 50 30 0.01 5 50 40 0.01 5 50 50 0.01 5 50 60 0.01 5 50 70 0.01 4.8 48 80 0.01 4.6 46 90 0.01 4.2 42 100 0.01 2.6 26 Table4: showing frequencies used to get varying gain The lower cut-off gain was calculated from the equation; The original setting on the Feedback FG 601 function generator was set so that the maximum symmetrical swing of the BJT Amplifier could be determined using the Tektronix 2205 dual trace oscilloscope. This was done by increasing the frequency of the Feedback FG 601 function generator until clipping of the output waveform was seen. It was noted that the BJT Amplifier did not have maximum symmetrical swing as the negative peak of the waveform started clipping after the positive peak waveform. Hence, the positive swing and negative swing was calculated as shown in the following; Positive swing; Negative swing; The maximum voltage swing was found to be; The original setting on the Feedback FG 601 function generator was set as the effect of removing the bypass capacitor was explored. The equipment was first turned off for safety purposes and the bypass capacitor removed. The equipments was then turned on and the settings on the Tektronix 2205 dual trace oscilloscope configured to obtain a measurable waveform. The gain was then calculated using equation (>>>>). Hence, it can be stated that the gain of the BJT Amplifier decreased considerably when the bypass capacitor was removed. The maximum symmetrical swing for the amplifier was then tested. This was done as follows; The frequency of the Feedback FG 601 function generator was increased until clipping occurred. It was seen that maximum symmetrical swing was not observed as the negative peak of the waveform started clipping before the positive waveform. Hence the swing was calculated for both the positive waveform and the negative waveform. The calculations are as follows; Positive swing; Negative swing; The maximum voltage swing was found to be; The Tektronix 2205 dual trace oscilloscope was disconnected from the circuit and the Fluke 177 Multi-meter was used to measure the quiescent points of the circuit. The probes were placed across the different points and their readings were recorded. The Fluke 177 Multi-meter was set at when measuring currents and at DC voltage when measuring voltages. The DC voltage setting was used as the AC would not yield measurable readings. To measure the quiescent currents, wires were stripped and attached to the leads of the probes. The circuit had to be broken at the quiescent current point being measured. Then the wire attached to the probe was inserted into the solder less breadboard so that the wire was in series with the component removed. The removed component was placed where it was originally to ensure continuity in the circuit. This was repeated at all quiescent points. The following table illustrates the measured currents; The following table illustrates the measured currents; Current Value/ TABLE 5: AC ANALYSIS OF CIRCUIT The following table illustrates the measured voltages; Voltage Value/ 0.676 TABLE 4: AC ANALYSIS Quiescent Values Currents I / mA Voltages V / V Calculated Simulated Measured Current I / mA Voltage V/V Current I / mA Voltage V/V Current I / mA Voltage V/V 0.65 0.663 0.676 DISCUSSION The BJT Amplifier was built using the common emitter configuration. It was H-type biased to increase the stability in the transistor. Also, as is affected with temperature a change, the H-type biasing configuration ensures that changes in is minimal. Also, the resistors used were made from carbon. This means that the resistors are not required to have high temperature stability. Without a biasing arrangement, the BJT amplifier will not turn on because it will not be in the operating region according to the specifications (Boylestad, Nashelsky, 1987). The differences in values for quiescent points obtained can be explained because the calculated and simulated values were found under ideal conditions. The component values used varied from the standard values