Thursday, October 31, 2019

Improving Pharmacy Services Essay Example | Topics and Well Written Essays - 750 words

Improving Pharmacy Services - Essay Example The second issue, sustainability is equally important in securing the quality of products and services in pharmacy. One way of achieving sustainability is through keeping indicators which can be used for predicting future trends of the industry. These may include new drugs or practices which outdo the existing methods. This would, for instance, ensure that patients get the best treatments when they become available. Again, sustainability can be achieved by being connected to the global pharmacy community through which innovations and emerging issues can be shared. In so doing, the pharmacy can be interconnected, informed, and universal (Lesko & Anderson 16). The advantage in this is that relevancy and effectiveness would be assured.The final means of improving pharmacy is by having well-structured organizational layouts. Layout covers all the areas from when a patient goes through a health center to the time they emerge, having received treatment. Pharmacies should ensure that their staff receives optimum working conditions, free from distraction, stress, or any negative influences. For instance, there should be training to sensitize staff on proper (good) health habits. Healthy and happy staff is likely to be best in disseminating services to the people than stressed, underpaid, or sickly staff. Concisely, the comfort of the workforce determines the quality of services and products.As the above findings state, there are many channels through which pharmacy can be improved.

Tuesday, October 29, 2019

Date Rape Essay Example for Free

Date Rape Essay Introduction Popular views on commital of rape are confined on the idea that a stranger, the supposed perpetrator settles on a secluded or dark area and forcibly attacking someone, before inflicting sexual contact. While this may appear to be true, it is now a basic reality that rapists aren’t just strangers. Even people we know: friends, acquaintances, relatives and co-workers are possible suspects. In fact, about half of the victims of rape know their perpetrators. Incidences of commital of the crime seemed to be alarmingly high as it comprised fifty to seventy-five percent of all accounted rape cases. But even these data do not speak of the actual figures. The University of Buffalo’s Student Affairs cited a conservative FBI statistics which provided that only three and a half percent of all forms of rape are reported. By examining and analyzing available results, this paper tries to answer questions surrounding date rape, which as follows: a) What is date rape?, b) How did it evolve?, c) What are its causes?, d) What are the risks factors?, and e) What are the necessary interventions? Anwering these questions would enable us to provide the necessary information regarding date rape. Definition and history of date rape Of the cases reported, majority of it appears that the perpetrator is a victims’s acquaintance. While it is assumed that most of this acquaintances, ranging from friends and acquaintances to dates, romantic partners, and spouses or domestic partners do not necessarily end up in violence, in certain instances and causes, rape happens. For this study, when forced sexual intercourcourse takes place between two acquaintances, it is called date rape or acquaintance rape (Homeier, et al., 2006). Date rape, on an initial public sense, is defined to be a subset of acquaintance rape where two people involved in a romantic relationship engage in nonconsensual sex. But in the case of acquaintance rape, relationship (romantic or professional) has no bearing of the situation; hence, it can be described as plain and pure sexual assault or unwanted sexual contact. The law refers sexual assault to include the commital of rape (oral, anal, or vaginal intercourse) or the force penetration of any foreign objects in the genitalia (dildo, vibrator, including finger) without consent from the victim. Meanwhile, one of the early advocacy movements on date rape in the US was pioneered way back in the 70’s in Delaware. The realization of an organization called Support Group for Victims of Sexual Offense (S.O.S.) founded by then Director of the Health Service Dr. Majorie McKusick was a driving force behind the idea to provide services to survivors of sexual assault. In 1988, SOS produced a brochure dedicated to date rape. At present, bearing a new name, the organization is continuing its efforts to raise awareness on date rape. III. Hypothesis But as to why many people fall on the verge of date rape and as to why individuals commit this crime, remains a broad subject open for discussion. Basing on facts and scientific studies though, leading experts and institutions underwent a series of researches about the topic, some of which have produced fair but contradicting results.   Given the extensive scope of this issue, this paper assumes that risk factors: perceived dating behaviors, external factors (drugs, alcohol), and attitudes of supposed victims and perpetrators constitute likelihood of dating violence and rape. Gravity of the crime Meanwhile, depending on the gravity of the case, non-penetration actions such as touching the private parts of the victim (e.g. buttocks, breasts, genitalia), naked or through clothing constitute an assault but not necessarily rape, albeit, these are detterent to the rape itself. Forcing another individual to touch another person’s private parts even against his/her will also constitute the same.   On the otherhand, the infliction of physical hostility, threats of aggression, or perform sexual contact with an unconscious, asleep, or intoxicated individual describe the force or advantage. Coercion, without the aid of force or hostility is also used such as grave threats, reaveling secrets, put the victim to shame, sack an employee or fail a student are forms of sexual harassment. The Crime scene Actions pertaining to date rapes are reported in strategic areas or venues, depending on the status and preferences of the supposed victim. As the name suggests, the crime usually pointed to locations related to the place of the date or meeting. The assault usually happens in secluded, dark, and private or even public and busy places (e.g. hotels, garden, beach, comfort rooms, cars or club houses). Some cases were reportedly committed in bushy, dark areas away from the human settlements. In the case of college students, date related violence was recorded within the university premises. This is proof to the fact that even the school is not even safe nowadays, more so, it has become a favorite venue for this crime. Commission of rape happens usually in a predictable and definite instance. This can be observed if the prospect is conscious of what is happening around him/her. But in most cases, the motives are already predisposed; hence, timing is of great consideration for the suspects to pursue with the aided or unaided sexual assault and for victims to escape the trap. Even in a promenade or a fair, where people are busy, perpetrators find a leeway to commit rape if not harassment. The targets While many people often think that rape only happens typically to women, this is not always the case. Even men also have experiences of sexual assault. Some even lead to rape, although it occurs frequently within heterosexual dating relationships. This scenario showed that date rape transcends gender, as in the case of people of every ethnicity, age, culture, religion, economic background, or sexual orientation. Just like the opposite sex sexual assault, the majority of same-sex cases occur between people who have close relationships. However, perpetrators as well as the survivors are not always gay or lesbian. Moreover, sexual assault can also be part of a bias crime against someone perceived to be gay, lesbian, bisexual, or transgendered the perpetrator in this instance can be either the same or opposite sex as the survivor. Although girls and women are the most often victims of rape one in three women will be sexually assaulted in her life, men is also vulnerable to be raped. A study revealed that seven to ten percent of rape victims are male. Meanwhile, teenagers and young adults are four times more likely to be sexually assaulted than women in all other age groups. A USF-Counseling Center for Human Development report showed: that 52% of women students have experienced some form of sexual victimization, 1 in 8 college women have been raped; 1 in 12 college men admitted to sexually abusing women but did not consider themselves rapists; of the women raped, almost 75% didnt identify it as such; 47% of rapes were by first or casual dates or by romantic acquaintances; and over 1/3 of the women didnt discuss the rape with anyone, and over 90% didnt report it to the police. Moreover, in a 1998 Minnesota Student Survey, approximately 9% of girls and 6% of boys had experienced date violence or rape. On the other hand, lifetime prevalence of date or acquaintance rape ranges from thirteen percent to twenty seven percent among college-age women and 20% to a high of 68% among adolescents. VII. Causes and Tendencies As to the cause of becoming a victim and becoming a rapist, an array of results from researches in the last decade revealed that behavior, perception, and external factors confronts both the victim and the perpetrator. On a study conducted on perceived causes of date rape, 142 undergraduates were presented with grids containing 9 causes listed by column and row. They were asked to indicate if they believed there was a causal link between each of the 72 causal pairings. The result placed emphasis on drunkenness, norms of dating, and societys attitude to date rape. Misunderstanding of men’s behavior, male attitude on the unimportance of date rape, and need by males for dominance were seen as prime causes (Bostwick DeLucia, 1992). Demographic characteristics that increase vulnerability to date rape include younger age at first date, early sexual activity, earlier age of menarche, history of sexual abuse or prior sexual victimization, and being more acceptable of rape myths and violence towards women.   Ackard Neumark-Sztainer (2002) on the other hand associated date rape with the higher rates of eating disorder behaviors and suicidal tendencies, and lower scores on emotional well-being and self-esteem scales.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Teenage girls intentionally hurt by a date in the previous date are more likely to experience sexual health risks, including vulnerability to human immunodeficiency virus infection (HIV) and other sexually transmitted infections, or getting pregnant. Dating violence should also be included in reproductive health programs, and greater efforts to identify women experiencing violence while on date are needed among those providing care related to adolescent reproductive health (Silverman, 2004). Other risk factors include date-specific behaviors such as who paid the expenses, who drove, date, location and activity, as well as the use of alcohol or take drugs such as flunitrazepam (Rohypnol) (Rickert Wiemann, 1998). A benzodiazepine with pharmacologic actions is similar to those of diazepam that can cause anterograde amnesia. Some reports showed that it is used as a date rape drug and suggest that it may cause violent behavior. The US government has already banned the importation of this drug which was introduced in 1984. Alcohol consumption that occurs within the context of the date can lead to: the misinterpretation of friendly gestures or cues as sexual invitations and the females inability to ward off a potential attack. Kanin (1985) proposed that perpetrators’ deviant sexual behavior has often been portrayed as the result of frustrated but legitimate sexual exhaustion. This study of the perpetrators reveals that as a product of a hypersexual socialization process, these men are sexually active, aspiring, and successful. Due to an exaggerated desire levels viewed as responsible for instituting a high degree of sexual disappointment, this acute relative deficit is a significant process reponsible for the rape episodes. VIII. Interventions   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dating violence happens among teemagers which bears common and unique risk factors for dating violence found across adolescents grouped by sex, race/ethnicity, and prior victimization. Rickert, et. al., (2002) described that efforts to lessen dating violence should (1) increase the use of screening tools that measure victimization as well as contextual parameters that will promote promote dating violence; (2) increase self-efficacy to promote safer sex; (3) reduce the use/abuse of alcohol and other drugs that facilitate dating violence; and (4) eliminate the influence of negative peer behavior. Interventions to prevent dating violence will likely also lower unwanted pregnancy rates, HIV-AIDS, and sexually transmitted diseases (STD’s)among young people.. Old town beliefs of a woman being unable to rape another woman and a man with another man these make survivors hard to find someone to talk to, avail services, or even believe themselves that they were raped. Survivors of assault by a same-sex partner or date may face various fears such as homophobia and heterosexist attitudes when disclosing the sexual ordeal or receive medical or psychologicalinterventions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Van Wie’s 1995 study on resistance to rape showed that participants in the category with perceived resistance conditions took a longer time to identify when the subject should abstain from pursuing sexual contact, thereby exposing them more to be raped.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Results of this study could be used to promote level of awareness on date rape, educate people about the risks and responses with date rape, and to strengthen rules regarding proper sexual behavior. Conclusion   Research designs and materials are needed to advance our our knowledge and understanding of sexual violence among teenagers and the most effective ways to eliminate it. Understanding and comparing research findings would be easier if consensus regarding the definitions of date rape, sexual aggression, and sexual assault was obtained. Finally, prevention programs on primary and secondary date and acquaintance rape must be enhanced and be subjected to systematic evaluation (Rickert Wiemann, 1998) Almost sixty percent of victims who experienced rape and attempted rape disclosed this information to one or more individuals, whereas only 47% of those who experienced verbally coerced sex told another person. Rickert, et. al., (2005) observed that alcohol addiction and a shorter dating history are important variables related with disclosure of rape/attempted rape as well as the time for disclosure. Meanwhile, factors affecting the disclosure of verbally coerced sex and the latency associated with it are less well defined A present survey based on 70% returns of a random sample of 200 women at one college indicated that, although 5% had been date raped, none reported the rapes to authorities due to feelings of self-blame and embarrassment. Rape scenarios that were not reported could perpetuate a self-fulfilling prophecy that rapes do not occur. A victim of rape may feel she is the only one against the world and is reluctant to exclude one’s self who will report. However, this denial by both victims and authorities does not encourage programs for prevention and treatment (Finkelson Oswalt, 1995). Increasing identification of the incidence of date/acquaintance rape (DAR) in the US, especially among women in college, has led to an understanding that the techniques needed to ward off attacks from acquaintances differ from the techniques used to prevent rape by strangers. This study proved and validated the following DAR constructs: perceived vulnerability, self-efficacy, relational priority which is neglecting self-interest to save a relationship, rape myth acceptance (believing myths about rape which makes women avoid facing their own vulnerability), and commitment to self-defense. These constructs were also correlated with scales for masculinity, self-esteem, and degree of belief in a just world. Finally, date and acquaintance rape is not only a womans issue. Men must also be actively aware of this issue, as they can help minimize rape by educating themselves and others. â€Å"Healthy relationships involve respect including respect for the feelings of others. Someone who really cares about you will respect your wishes and not force or pressure you to have sex.†          References:    Finkelson, L., Oswalt, R. (1995). College date rape: incidence and reporting. Psychol Rep, 77(2), 526. Kanin, E. J. (1985). Date rapists: differential sexual socialization and relative deprivation. Arch Sex Behav, 14(3), 219-231. Rickert, V. I., Wiemann, C. M., Vaughan, R. D. (2005). Disclosure of date/acquaintance rape: who reports and when. J Pediatr Adolesc Gynecol, 18(1), 17-24. Silverman, J. G., Raj, A., Clements, K. (2004). Dating violence and associated sexual risk and pregnancy among adolescent girls in the United States. Pediatrics, 114(2), e220-225. Walsh, J. F., Devellis, B. M., Devellis, R. F. (1997). Date and acquaintance rape. Development and validation of a set of scales. Violence Against Women, 3(1), 46-58.

Sunday, October 27, 2019

The bluetooth technology

The bluetooth technology Abstract: Bluetooth Technology has been widely spreading every single day due to its availability in most of the electronic devices that are dominant nowadays. As any other technology, when widespread, will have a huge impact on the users and societies. In our study, we will search the impact of Bluetooth technology on the society. To get a realistic knowledge, a survey contains 10 questions on our topic was conducted. 100 people from Multimedia University and Limkokwing University were randomly chosen to participate in our survey. In addition, we relied on other sources such as the internet to collect information regarding our topic. From our study we have found that, the spreading of the Bluetooth technology has made life easier. As any other technology Bluetooth is, sometimes, used in a negative way and consequently has a negative influence. Acknowledgement: We would, firstly, like to thank our God who gave us the ability to accomplish this research. Secondly, many thanks to our EHM 3066, Engineers and society, subject lecturers who have been giving us a very good example of diligence and hard work. We send our gratitude to the participants who have participated in our questionnaire and given us from their precious time. Thanks to our families, friends and all our beloved people who has always given us the inspiration to be successful. We would finally thank our institution, the Faculty of Engineering (FOE), Multimedia University. 1.0 Introduction: Technology is considered to be the mount to climb up and attain the desired degree of development of a society. Man has been trying to facilitate his life through inventions and innovation. He first invented the â€Å"wheel† and hasnt stopped so far. He lately invaded other planets. Telecommunication means, when computerized, played a very important role in spreading data which enabled scientists utilize the outcome of other scientistsresearches and that lead to more and more advancement in various fields of science and thus more technical devices. These devices didnt have the present shape. A lot of effort was exerted in the process of betterment with regard to performance, size and ease of use. This trial is to have a clear idea of how Bluetooth technology is affecting the society and our lives. 1.1 Overview of Bluetooth: In the striving for reduction of cables between computers and their connected units, Ericson Mobile Communication, in 1994, started the project named and named it Bluetooth. What is Bluetooth? Bluetooth is the name of a new technology that is now becoming widespread on a commercial basis. It promises to change significantly the way we use machines. Instead of using cables to transmit data between components of a PC,for example, the printer, the mouse and so on, a small and cheap radio chip to be plugged into these components will do the job. In short it is a Cable-replacement technology. The name was first used as a code name, but it stuck as time passed. It is named after the 10th Danish King, Herald Bluetooth, who had united Scandinavian Europe at a time it was severely divided. The founders of the Bluetooth technology found the name fitting as the Bluetooth technology is able to unite various industries like cellphone, computing and automotive markets. By Bluetooth technology one is able to simplify and combine several forms of wireless communication into a single, safe, power-saver, inexpensive, globally available radio frequency. 2.0 Bluetooth Mechanism: By embedding short-range transceivers that are inexpensive and tiny, into new electronic devices that are available nowadays, Bluetooth achieves its goal. In addition to three voice channels, Bluetooth can transfer data at data transferring speed up to 721 Kbps. As Bluetooth operates on radio band, at frequency of 2.45 GHz, that is unlicensed and globally available, people or â€Å"international travelers† have no obstructions to use Bluetooth-enabled equipment. Moreover, Bluetooth units might be either externally adapted or built into electronics devices. E.g. in a personal computer, Bluetooth devices can be built into the motherboard as a PC card or on the other hand it can be used as an external Bluetooth adaptor through connecting it to a USB port. From the IEEE 802 standard, each Bluetooth device has its own 48-bit address. One feature is that connections are not only point to point, but they can also be multipoint connections. Usually, Bluetooth devices have a maximum ra nge of connection up to 10 meters. However, by increasing the power, the range of connection might be extended to 100 meters. Bluetooth devices have a technique called frequency hopping. The main purpose of this technique is to protect the devices from radio interference. The mechanism of the technique is that Bluetooth devices change arbitrarily their frequency maximally 1600 times/s. when an error occurs, it will be immediately corrected by the three complimentary error correction schemes that any Bluetooth device has. Bluetooth devices are also provided with built in verification and encryption. When Bluetooth devices are in a â€Å"hold† mode they consume approximately 30 micro Amperes from the battery of the electronic devices, such as cell phones and laptops, while they consume a range of 8 to 30 milliamps, less than one tenth of a watt, when they are in the active transmission mode. Moreover, only 0.3 mA are consumed by the radio chip, when in a standby mode, which means that its less than 3 % of the power that is used by a mobile phone. Also, the radio chip has an excellent power-saving feature that is as soon as the traffic volume lessens, the chip shifts automatically to a low-power mode. The above indicates that Bluetooth devices do not drain precious battery life. But beyond un-tethering devices by replacing the cables, Bluetooth devices can form a small and private ad hoc grouping of devices that are away from fixed network infrastructures by providing universal bridges. These bridges are to connect between a device, data networks and a peripheral interface. Furthermore, noisy radio frequency environment does not affect Bluetooth devices since they are designed to use a scheme called frequency hopping scheme and as well as a fast acknowledgment in order to make the link active and strong. After sending or receiving a packet, Bluetooth radio modules keep away from interference from other radio signals by jumping â€Å"hopping† to a new frequency. The Bluetooth radio uses shorter packets and jumps â€Å"hops† faster than other systems that are operating in the identical frequency band the thing that makes the Bluetooth radio more active and stronger than other systems. In addition, these fast hopping from a frequency to another an d the short packages decrease the impact of domestic microwave ovens. Random noise may affect long-distance links. However, Forward Error Correction (FEC) is used to eliminate this impact. The encoding is, then ideal for an uncoordinated environment. At the bit level, Bluetooth security is guaranteed. Users can control the authentication by using a 128 bit key where radio signals are coded with 8 to 128 bits. The Bluetooth radio transmissions match the safety standards that are required by the countries where the technology is used with respect to the effects of radio transmissions on the human body. Bluetooth enabled devices emissions are less than those from industry-standard cordless phones. Also, Bluetooth module do not interfere, cause harm or even affect public or private telecommunications network. 2.1 Bluetooth Operation Modes: A feature of Bluetooth technology is that, once the Bluetooth devices come in range of each other, they will instantly form networks between each other.Another feature is that a number of devices can be connected together via Bluetooth in an ad hoc form. This feature is technically known as â€Å"Piconet†. In a piconet two or more devices can be connected together. A scatter net can be formed by multiple independent and non-synchronized piconets. Moreover, any device that is in a piconet can be a member of another piconet through a technique called time multiplexing. This techniques mechanism is to share the time suitably, thus a device can be a member of two or more piconets. As Bluetooth system supports multi-point connections as well as point to point connections, Bluetooth devices can be connected to a maximum of another 7 points, a point to multipoint connection. Every piconet has different frequency hopping sequence and hence a number of piconets may be created and linked together. All users that are sharing onepiconet are synchronized piconets hopping sequence. A Bluetooth device uses different hopping sequence when the device is connected to two or more piconets where a piconet starts with 2 connected devices, e.g a laptop and a mobile phone, and may grow to 8 connected devices . All Bluetooth devices have the same implementations. However, there are two types of unites in a piconet which are master units and slave units.A master unit is the unit which synchronizes the other devices by its clock and hopping sequence, where the other devices in the piconet are called slave units. In order to differentiate between units participating in the piconet, a 3-bit MAC address is used. When a unit does not have a MAC address, it is called a park unit. Park units are usually synchronized. Anyway, since parked units have an 8 bit address, a maximum of 256 parked units may be existed. 3.0 Bluetooths positive impact: 3.1 Huge Impact: What could the practical use of Bluetooth be on Society? Well, it is unlimited and depends on the way it is used. From a practical viewpoint, we can adapt all computerized Have a look at the list below! Printers Desktop and laptop computers Modems LAN access units http://www.sysopt.com/img/icons/war_ex.jpghttp://www.sysopt.com/img/icons/log_v450.jpgFax devices Phones and pagers Headsets Keyboards joysticks Notebook computers Practically, most of the digital devices can be a part of the system of Bluetooth. The dynamic of Bluetooths connectivity nature has the ability to replace USB (Universal Serial Bus). A Bluetooth-mouse can be in existence by using the improved plug-and-play-systems. The installation can take effect after the operating system is rebooted. 3.2 Bluetooths Applications 3.2.1Bluetooth and the Internet One of the most important advantages of Bluetooth is that it enables you to connect a device provided with internet connectivity to another device that is not. E.g. you might connect your hand phone that has a built-in Bluetooth to your laptop that has a Wi-Fi via Bluetooth connection. Then, via you laptops Wi-Fi, if exists, to a Wi-Fi router. Once your laptop is connected to the internet you can enable your hand phone to be connected to the internet as well. Moreover, this example goes correctly to most of the devices that have Bluetooth technology not only hand phones.   Ã‚  Ã‚  Ã‚  Ã‚  Buying a device that has a Wi-Fi or buying another that has a Bluetooth technology is sometimes a confusing choice. One may think that by choosing Bluetooth he/she will not be able to connect to the internet and in this case choosing a Wi-Fi would be better.   Ã‚  Ã‚  Ã‚  Ã‚  However, this is not such a really correct choice. Since, from the above example, you can modify your device to get connected to the internet via the Bluetooth technology purchasing a device that has a Bluetooth technology is a better choice as you can get two technologies in one ; internet connectivity (the function of Wi-Fi is achieved) and Bluetooth technology. 3.2.2 Some Other Applications: A Bluetooth-mouse could be used at a further distance from a monitor, and while moving about in the room. A Bluetooth-keyboard could be used further away from the monitor. This would reduce eye-strain for persons who are long-sighted. Increasing the distance would also reduce exposure to electromagnetic radiation from the monitor. A Bluetooth-keyboard could also be used to address more than one computer, in a dynamic, switchless manner. You can use your e-mail while your laptop lies in a briefcase; when your laptop receives an E-mail your mobile phone will immediately alert you and then, you can read the received e-mails in your mobile phones display. A businessman may enable his laptop to find a suitable printer once he enters a company.As soon as a suitable printer is found, data will be sent from the laptop to that printer via Bluetooth connection to print it out. Make a connection to printers and faxes without messy cables. Wireless connection to video projectors and digital cameras. An easy and elegance connection from cell phone to handsfree headset. A useful connection between Bluetooth interface to office private branch exchange (PBX). Smooth creating of dial up networks and automatic e-mail. Use mobile phones as office wireless phones. Use of personal computers or PDAs (Personal Digital Assistants) as hands-free phone. Automatic transferring and swapping of files, software, electronic business cards, calendars etc. Dancing couples at a dance hall could receive the music through their headsets and pick the dance of their choice Not to mention many more to come. 3.3The influence of the Bluetooth technology on Society: Thanks to the Bluetooth technology, a wireless LAN (Local Area Network) can be implemented without wires. This means that all the functions of a conventional fixed LAN are available in a WLAN including file sharing, peripheral sharing, Internet access and many more. 3.3.1 Mobility and low cost: Mobility and cost-saving installation are the main advantages of wireless networks in society. Most of the application scenarios of wireless are related to these two features. Mobility enables users to roam on while being connected to backbone networks. Many jobs require wandering workers. Portable computers are indispensable for people like inventory clerks, healthcare workers, police officers, and emergency-care specialists. Wireless networking provides important cost savings in the areas where cables cannot be easily installed, such as historical buildings and residential houses. In distant sites, branch offices and other situations where on-site networking expertise might not be available or fast networking is needed, computers equipped with wireless LANs can be pre-configured and shipped ready to use. 3.3.2 Circulation of Information: The wireless local area network business has been focused on offices since the industry began. But recently, home networking is seen to be a fast growing market. The personal computer has become a powerful platform for education, entertainment, information access and personal finance applications. At home, with the wide use of PCs and the Internet becoming the main way to access information, the role of the PCs has expanded and will continue to expand especially in the area of education. On the social side, this means that wireless networks is the easy way to access internet, find information and at the same time the users gain more knowledge through browsing the internet. 3.3.3Avoiding wire tangle Bluetooth is also one of the examples of using wireless range other than PDA and etc. The objective of Bluetooth technology is to replace cables and infrared links used to connect unrelated electronic devices with one universal short-range radio link. 3.4 Industrial boom Bluetooth applications reflect the mobile phone industry background of the inventors of some famous phone models for example Nokia, Sony Ericsson, Motorola and many more. There are many useful things that Bluetooth had given to our society. 3.5 Information Interchange In meetings and conferences, users can share information instantly with all participants without any wired connections. 3.6 Convenience: A user can also cordlessly run and control, for instance, a projector, or can connect his headset to his laptop or any wired connection to keep hands free for more important tasks while in the office, home or in the car. When laptop receives an email, the user will get an alert on mobile phone. Users can also browse all incoming emails and read those selected on the mobile phones display. Public Bluetooth wireless access points could enable free or charged access to information and services through laptop computers and PDAs. For example, imagine being able to browse the catalog of a public library on your handheld PC as soon as you enter the building. Or, imagine how helpful it would be to have instant PDA access to a building map and to customized real-time flight arrival and departure data as you make your way through a busy airport. Consider the convenience of having automatic, wireless access to a shared hotel printer as you make last-minute changes to a presentation in your hote l room. 3.7 Productive and Time saver: In a Bluetooth-enabled business world, the cellular phone could provide a link to everything beyond the 10-meter range limitation. Without even removing their Bluetooth-enabled cell phone from their briefcase or luggage, mobile professionals would be able to check voice mail, send a fax, receive email, verify inventory levels, and surf the Internet through their laptop computers. This would extend the concept of anytime, anywhere data access well beyond the current standard of cell phones and beepers. 3.8More Freedom: In considering the above scenarios, some may argue that the access of Wireless LAN would increase our freedoms and improve our professional lives because it allowing us to decide when and where we do our work. Wireless certainly has the potential to improve society, and our personal and professional lives in various ways. It gave us many advantages. 4.0 Negative Impact: The convenience of Bluetooth technology cannot be denied, but neither can the way they have negatively impacted daily living. Some of the effects can be dispensed with if boundaries are set. Here we will discuss some negative impact of Bluetooth. 4.1 Violation of Privacy: Mobile phones and PCs usually contain private stuff such as family pictures, bank account numbers, passwords and so on. Unfortunately, these devices are able to be hacked by Bluetooth. The hacker sends a user a file (lets say an image), when received, it will be opened as a usual image where actually it has a built in hacking software. Once the user opens the image, the hacker will be able to control the users device. 4.2 Sabotage: In the same way as downloading from the internet, transferring data via Bluetooth may harm your device if the data contain viruses. The strength of the viruses varies from one to another; some viruses are easy to be removed while some viruses totally damage the device once they reach the device. 4.3 Health Damage: While the topic remains controversial, there are people who believe the microwave radiation the phones emit can cause such problems as cancer and Alzheimers disease from prolonged use. 4.4 Use in inappropriate places: Using Bluetooth to transfer data in inappropriate places is considered to be harmful and such behavior expresses a negative attitude. E.g. Students in a classroom may get busy transferring data via Bluetooth using their hand phones while their lecturer is giving a lecture. 4.5 Sleazy Contents: A child or a teen-ager may innocently receive a file that contains sexual or immoral contents which are not suitable for their age. 5.0 Conclusion and Recommendation: This project was done to assess the impact of Bluetooth technology on the society in the near future. We have investigated in how and why Bluetooth technology has widely spread and what impact that Bluetooth technology has been giving. In addition, we have explained in details the reasons of this impact. Mainly, the bases we had for this report are from a survey that we have done on 100 students and lecturers from the whole population of Multimedia University and Limkokwing University, Cyberjaya campuses. We used the collected data from this survey to explore the impact of Bluetooth technology on the society as we used MMU and Limkokwing Universities as small societies. We have heavily used the internet to collect information about Bluetooth technology and also to find out its impact on other societies. Why our survey was on only 100 people is that, making a survey on a bigger number of people would be expensive and time consuming. This report might be useful to social specialists to find out why some technologies have more interest on people, Bluetooth developers as they can decrease the negative impact of this technology, and to other people who are interested in the relationship between the technology and the society. Future researchers who are going to do a research on the same topic should keep this in mind, this research has been done based on a questionnaire that was made on people who have almost the same range of age as most of them are university students. Future researchers who have a wider research ranges can make their research on different age ranges. The results of the survey showed that 90 % of the people, who have answered the survey, have Bluetooth-enabled devices. The reason of this huge number of Bluetooth users is that, most of the new electronic devices that are available nowadays have Bluetooth technology. Moreover, about 25 % of the participants, who have Bluetooth-enabled devices, have faced negative impact of Bluetooth technology such as getting hacked or received viruses during data transfer. The reason is that most of them didnt know that Bluetooth may carry viruses or hacking software when data is transferred. Even though Bluetooth technology is widely spread so far, we think it will make life easier and more effective if it is spread on a wider range. For example, providing Bluetooth connection in universities laboratories would make data transferring between researchers, students or lecturers easier. However, care must be taken when using data transfers via Bluetooth since data may have viruses or hacking software. A good solution is to use anti-virus and anti-hacker software. Moreover, children and teenagers have to be watched when using Bluetooth-enabled devices. References: Book: Christian Gehrmann(2004), Bluetooth Security, Artech House Publishers Robert Morrow(2002), Bluetooth : Operation and Use, McGraw-Hill Professional (Telecommunications) Tom Siep (2000), An IEEE Guide: How to Find What You Need in the Bluetooth Spec, Institute of Electrical Online article: Pyramid Media Group, Inc Constantly Connected: Beyond WiFi and Bluetooth, http://www.findarticles.com/p/articles/mi_m0QXQ/is_2005_June_30/ai_n15341855 http://www.swedetrack.com/images/bluet00.htm Articles from magazines: Clive Akass (28 Jan, 2006), Bluetooth to hit 100Mbits/sec, Pc Magazine pp. 41-42 Michael Kwan (Thursday April 6, 2006), Jabra shows off Bluetooth goods at CTIA, Mobile Magazine pp. 23 Appendices: Appendix A: Survey on Bluetooth and its Impact on Society in the near future: Topic: Bluetooth and its impact on the society in the near future We are from EHM 3066 (Engineers and society) class. We are conducting a mini survey regarding the Bluetooth and its impact on society in the near future. Kindly spend a few minutes to answer this questionnaire. Your answers will be kept confidential. We would like to express our advanced gratitude for your co-operation. Instruction: Please TICK (v) in the appropriate boxes or write your responses in the given space: Survey on Bluetooth and its Impact on Society in the near future: We a group of students We would like to kindly invite you to participate in this survey to help us gain valuable information of the Blueooth and its impact on society in the near future. Please tick or write your responses in the given space. A- GENDER omale ofemale B- AGE o18-24 o25-30 o30-35 Other : ____ C- Occupation Do you have any Bluetooth-enabled device? oYes oNo If your answer is yes, what kind of device that you have is equipped with Bluetooth? oHand phone or Personal digital assistance (PDA) oLaptop oPersonal Computer o I dont have oOther : _________ how often do you use bluetooth? onever osometimes ooften oalways What kind of data/file that you use Bluetooth to transfer? oImage oMusic oDocument oSyncronisation Give your opinion on what impact of the Bluetooth on the societ is? Do you support the idea of installing Bluetooth devices in all computers in your company/university Computer Lab in order to increase the usage of Bluetooth? ?Yes ?No Have you known that Bluetooth-enabled devices are able to receive viruses and to get hacked? ?Yes ?No Have you ever got your Bluetooth-enabled device hacked by Bluetooth? ?Yes ?No Have you ever received unwanted data by unknown people ? ?Yes ?No How often do you get busy using Bluetooth to transfer data with another person in places such as classrooms or while you are driving? onever osometimes ooften oalways

Friday, October 25, 2019

Favoritism in Schools :: Discrimination Athletes Classroom Essays

Favoritism in Schools When I think about discrimination, the one issue that sticks out in my mind is the favoritism shown towards athletes in school. Discrimination is the process in which two stimuli differing in some aspect are treated differently, and favoritism is the showing of being partial to. This type of discrimination could range from how their disciplined if they get into trouble compared to others, to how they receive special help in the classroom with there grades. The thing is athletes are no different than anyone else, they put there pants on the same way as everyone else, one leg at a time. In a survey done at Salem High School it showed that eighty six percent of 260 students questioned said that teachers showed favoritism by stereotyping, and all the students agreed that this favoritism was mostly regarded to the football team and privileges that they could receive outside the classroom. There was also the mention of all the extra help that the athletes would receive on there classroom work. At a case reported in Kamehameha Schools in Hawaii there is more of an issue of favoritism shown in the disciplinary issues for athletes. A seventeen year old girl had to file a suit with the U.S. District Courts because the school failed to do what was necessary with the problem. The people involved were football players and the only action taken was suspending them for one game. So the harassment continued. In some cases its not only the schools that show favoritism, in Detroit four football players allegedly raped a fourteen year old girl and the school took charge and removed them from regular classes and the team pending a hearing. At the hearing the judge ruled that the athletes should have been giving a fair warning and reinstated them, and they didn’t even miss one game. In an interview I condoned I found that favoritism towards athletes is pretty common. I talked to a couple of High School Football Players, and they said that in one case at the school they went to there had been five males charged with sexual harassment.

Thursday, October 24, 2019

Slave Narrative Sarah Garner

HIST 1301 April 13, 2013 Summary of Interview with Sarah Garner Mrs. Sarah was a slave in Westmoreland County, and conducted an interview with Archibald Hill. She describes that she did not have an overseer for her labor, in which he expected them to do good work. If they didn’t complete the work, he was at liberty to whip them. She also describes her first time getting whipped as very unpleasant when she didn’t know how to do the labor. Garner was born in Tennessee and her mother, Jula, was born in Virginia. Garner’s husband, Theodore, was born in Blackground, and married him when she was eighteen.Her master bought him and his mother when he was 8 years old. Garner also had two brothers. Next, she describes planting the farm as a child. She’d have to pick it off wit her feet. They had plows so all the work wasn’t done by hand. She explains that she could do as much work as any man could handle. You had to stake the land crossways and plow the open rows. The master had one plow but was having more made at the shops. They made the plows by hand. She was never a house person, which her mother was. She thought of herself as a farmer. She could do any gung; milked cows and hauled flowers.She never had to cook, iron, clean, or wash for the white people. She worked from the day she was born until the day she left. Her mother raised her to be strong. Garner worked outside while her mother stayed inside doing housework. Garner never talked about being able to read and write. Her mother cooked them all meals after the white family ate. At night her mother taught life lessons to all of her siblings. Her father usually worked from early mornings to late at night. On of the main reasons masters didn’t want their slaves to become Christians involved the Bible.This was one reason why most plantation owners did what they could to stop their slaves from learning to read. In the South, black people were not usually allowed to attend chu rch services. Black people in the North were more likely to attend church services. Drums, which were used in traditional religious ceremonies, where banned because overseers worried that they would be used to send messages. Garner raised 12 children. When her son got old enough to care for himself, she moved away. She had three sons. When her son died, she came back here.Her 12 children including her daughters all grew up to go elsewhere. Most of them went North. Some went to Philadelphia, New York or Virginia. Her youngest son died shortly after he was married. She believed that they were in God’s hands, and did what God wanted. They all went their own separate ways when the got old enough. They come back to see family sometimes. Garner becomes excited when asked about life up North, until she sees the labor involved, and she thinks about the work she used to do at home. She lived a healthy life and she enjoys being free.

Tuesday, October 22, 2019

Comparisons between medeval and modern life essays

Comparisons between medeval and modern life essays I would like to focus my response paper on the similarities, as well as some differences between the world of Cecilia, and the world today. I found that there are many similar aspects with slight twists. Farming was then, and is now one of the major aspects of daily life for many people. Like Brigstock, Montana, is an area dominated by an agricultural economy. The ownership of land is still today thought of as a symbol of wealth, or power. However just as in Brigstock, most people have no land. One similarity however for those who do own land, it is usually passed down to them by their fathers, and so on. The only reason there arent more farmers is because of the simple fact of changing times, and the necessity for other jobs. The idea of shared public lands for grazing, foraging, and gathering firewood, still exists today. The BLM or Borough of Land Management, controls state lands which are leased out to farmers, and can be used freely by the public. The National Forest Service lands are open to farmers who are allowed to let their livestock graze there during certain times. Cecelia, and her fellow townspeople were aloud use of the kings forest. The only difference between his forest, and ours is private, versus public ownership. However, both are managed and controlled by government officials. In Brigstock, the forest guards were the Foresters, today there Forest Rangers. Legally there are some very similar aspects of life then and now. As I understand it during Cecilias time if you did not report a crime that you witnessed by raising the Hue. Granted, today we dont go around reporting every minor offence, however it is today still illegal to not report a crime. Also, during that time if you were wronged, you could bring legal action against those that wronged you. The modern day equivalent is the law-suit. Also, the idea that people were selected randomly from the community when a jury was needed. Howe...