Wednesday, November 27, 2019

Determining the concentration of a limewater solution Essay Example

Determining the concentration of a limewater solution Essay This procedure will require a titration of an unknown concentration of limewater using a precisely known concentration of hydrochloric acid. Using equations the exact concentration of the limewater can be determined. This is useful as when an indicator such as phenolphthalein indicates the titration is complete, the known number of moles within the acid can be used to determine the concentration of the limewater.Equipment list:50.0 ml Burette1.00ml of HCl 2.00mol dm-3250cm3 Limewater of approximately 1.00g dm-399.0ml Distilled waterPhenolphthalein indicator100ml Measuring cylinder250ml Conical flaskWhite tilePipetteClampBossStandSafety:In regards to safety when working with any hydrochloric acid, at 2M it is a classed as an irritant so gloves must be worn throughout. Also regardless of the concentration, lab goggles must be worn. Calcium hydroxide is also an irritant so gloves must be worn.Method:Firstly add 25.0ml of the sample limewater to a conical flask.Place the flask on a white tile, to make the change in colour more noticeable.Add 5 drops of indicator to the flask any appropriate indicator could be used in this titration such as ?-naphtholbenzein or thymol blue, I am going to use phenolphthalein . This will be the indicator to tell me when the titration is complete.Fill the burette with the dilute HCl. I will talk about the dilution later.Firstly carry out a rough titration and record the hydrochloric acid level at which the indicator turns colourless. Record this result.Set up the experiment again and carry out a more precise titration. Repeating the titration is important as it removes the impact which abnormalities have on the experiment. Repeat this twice more and record these results.Preparation calculationsCa(OH)2 + 2 HCl CaCl2 + 2H2OThis shows that one mole of limewater reacts with two moles of hydrochloric acid.The limewater is approximately 1.00g dm-3 this is 0.0135mol dm-3 as the molecular weight of calcium hydroxide is 74g dm-3 ? mr = mol dm-3 1.00 ? 74 = 0.0135mol dm-3The concentration of the hydrochloric acid is at first too much, so we dilute the acid.This is quite simple, first I need to calculate the desired concentration, then the dilution factor.It makes sense to have a concentration quite close to 0.0135mol dm-3 as this would mean I would theoretically need just over double the volume of Ca(OH)2 than HCl as one mole of Ca(OH)2 reacts with two moles of HCl.I will try and get 0.02mol dm-3 as it is close to 0.0135mol dm-3 yet will be easier to measure.Dilution:The equation for finding the dilution factor of something is:Quoted from: http://dl.clackamas.cc.or.us/ch105-04/dilution.htmM = Molarity V = Volume con = Referring to the concentrate dil = Referring to the dilution(M con) (V con) = (M dil) (V dil)(2.00) (V con) = (0.02) (100)(2.00) (V con) = 2.00?2.00(V con) = 1.00I want 100ml as I will put 25.0ml in the conical flask each of the four times I carry out the experiment. So I will use 1.00ml in my dilution with 99 .0ml of distilled water as this is not involved in the reaction it is ok. This is a ratio of 1:99.Equipment for dilution:Glass pipettes (100ml 10.0ml)Using a glass pipette add 100ml of distilled water to a measuring cylinder.Remove 1.00ml of distilled water using the smaller pipette. (Using two pipettes and removing 1.00ml is more accurate than using many decreasing in size pipettes to add the same volume.)Using the smaller glass pipette add 1.00ml of HCl to the measuring cylinder.Put a bung on and gently shake to mix.The dilution of the acid seems of no use but it means it is possible to increase the degree of accuracy of the test as each drop of HCl has a smaller and more measurable effect in the reaction. A large concentration would complete the reaction too quickly.After carrying out the titration I got these results:* 34.6* 34.5* 34.45* 34.5Handling of results:Firstly using these values I intend to find the average number of moles within the volume of HCl I used in the titratio n. When calculating an average I get:(34.6 + 34.5 + 34.45 + 34.5) ? 4138.05 ? 4 = 34.5 (3s.f)HClNumber of moles = concentration (mol dm-3) x average volume (?).N = C x VN = 0.02 ? 0.0345N = 0.00069 molesCa(OH)2Number of moles = 0.000345 because of the ratio 2:1. 2 HCl to every Ca(OH)2.Concentration (mol dm-3) = number of moles ? volume (?)Concentration = 0.000345 ? 0.025Concentration = 0.0138mol dm-3This is the concentration in moles per decimetre cubed.In grams per decimetre cubed it is:g dm-3 ? mr = mol dm-3g dm-3 = 0.0138 x 74g dm-3 = 1.02 g dm-3 (to 3 s.f)Evaluation:The concentration of the limewater sample to my calculations is 1.02g dm-3 this is sensible as the value I was asked to prove was close was 1.00g dm-3, I still do not know the concentration exactly which the lab prepared but it is likely my answer though I think precise, is out. I think that though my results where fairly accurate but if I where asked for the worst, the first titration and third titration were most i mprecise. The first one was my roughest titration so possibly the least precise. The titration in this result possibly continued past the end point and more acid was going when the titration was already over. This is simply human error as I wasnt quite quick enough at stopping the acid from leaving the burette as I should have been.When doing my third titration I may have only put 4 drops in the flask because I thought I saw 2 drops go in, in one. This left the flask with less indicator and a slightly paler colour. This would have needed less acid to make the change in colour because the change would be less dramatic and happen easier.Apart from these errors my results were quite accurate because I did use the equipment I chose to use well. The glass pipettes are very accurate to a very fine margin of error. The burette is also a very precise piece of equipment.Overall my experiment worked well as I got a reasonable outcome and used all the equipment well, any mistakes I had made wo uld have been lessened by the repetition of my experiment.

Saturday, November 23, 2019

Are You Distracted by Technology essayEssay Writing Service

Are You Distracted by Technology essayEssay Writing Service Are You Distracted by Technology? essay Are You Distracted by Technology? essayNowadays technology entered all spheres of human life and contributed to significant changes in these spheres. Communications were dramatically reshaped by technology: the availability of social networks, video games and various smartphone and computer applications allows to stay connected 24/7 and to construct own virtual world in the most convenient way. Despite numerous advantages, active use of technology also has some notable disadvantages such as excess flow of information and frequent distractions damaging the ability to concentrate. Multitasking which is so common for all technology-related activities also alters the ability to focus on particular tasks and reinforces patterns of brain activity which are different from less technology-involved generations. The purpose of this paper is to discuss the distracting impact of technology and long-term consequences of this impact.The role of technology in educational sphere and in information p rocessing is invaluable; for example, technology changed the way of conducting research for students, made research findings more accessible and comprehensive for students and eased access to information in general. At the same time, mental habits of multitasking and staying online in social networks and messengers have a negative impact on the ability of students to process information, to concentrate on particular sources and to establish analytical connections between different sources of information. According to Prakash (2012), 87% of teachers note that students of the wired generation have shorter attention spans and 64% of teachers admit that technology is rather distracting students than helping their academic success.The way how information is presented and shared nowadays encourages people to focus on key concepts and sentences and skim the meaning of the messages. These skills are needed in order to navigate through multiple sources of information and multiple messages re ceived from these sources. Communications in social networks and messengers are also brief and are restrained either to sharing some information (links, photos, videos, etc.) or to exchanging short messages. Twitter actually embodies the essence of current communications 140 symbols might be enough for average information exchange activities. Furthermore, the availability of internet connection almost anywhere allows to stay online and receive updates at any time.The specifics of technology described above leads to shortening of attention spans; frequent checks of updates in various networks create distractions, and the need to stay updated and to know all the latest news hinders long-term concentration and affects the quality of activities which require thoughtful approach. Furthermore, kids who grow up in the conditions of information overload have difficulties in mastering time management and attention management. While for older adults who already have mastered time management it is easier to avoid distractions when needed, kids might not be able to develop the right skills and traits due to challenging environment.According to Rosen (2012), observation of the ability to concentrate of students of various age (middle school, high school and university) revealed alarming trends. The students had to study something important for 15 minutes, and their behaviors and distractions were observed during that time. The average time span that students spent on the task without distracting was 3 minutes (Rosen n.d.). This result was similar for all age categories of students. The major sources of distraction were technology sources such as laptops and smartphones (Rosen n.d.). These results show that the impact of technology is similar on all age categories. Furthermore, the researchers explored the relationship between academic performance and distractions, and it turned out that students who consumed more information and media every day and were prone to multitask ing had worse results. Students who were able to work longer on a specific task and developed focused study strategies showed better results (Rosen n.d.).Another study focused on the types of distractions which have the most impact on young people. It appeared that the choice of favorite distraction depended on psychosocial characteristics of an individual (Richtel n.d.). The students with a need for socializing tended to engage in texting, communicating in social networks and sending instant messages; the students who wanted to escape from the society chose video games and those students who had a tendency to procrastinate surfed various websites, watched videos and sometimes shared links with others (Richtel n.d.). Therefore, technology allows to choose the types of distractions that are most appropriate for an individual. In any case, the results of the research show that technology is a universal distraction and that active use of technology for entertainment can affect academic or working performance.Evidence shows that technology is a powerful distraction for most people. Active use of telecommunications leads to multitasking, reduces performance and attentiveness, affects attention spans and the ability to concentrate. While working with multiple sources of information might develop flexibility and short-term involvement, it is necessary to avoid excess multitasking and being distracted by technology since it can reduce the efficiency of in-depth thinking activities. In this context, it is important to remain focused in the modern world and to train the ability to concentrate on important things instead of switching between various distractions.

Thursday, November 21, 2019

Smoking in public Research Paper Example | Topics and Well Written Essays - 1000 words

Smoking in public - Research Paper Example But the topic here leaves no room for debate for the opposite side. How come there are any ‘pros’ of smoking in public? A simple search on Google is enough to make one realize, smoking doesn’t really have a pro. Alright, a smoker might argue; the beautiful roll (cigarette) provides the necessary escape from problems (life). But dear smoker, no one asked you to drag everyone sitting at the bus stop to your beautiful fantasy world. Just let them stay in real life and not in the smoke world. ScienceDaily is a popular source of research based news and in one of their post (2009), research shows that among younger individuals and nonsmokers, risk of heart attacks is considerably reduced when they don’t inhale passive smoke (public smoke from someone else sitting at a public place and having that ‘escape’ and insisting others to go on that roller coaster ride for free which reduces life by 11 minutes in a single ride). ScienceDaily’s source for that news is American College of Cardiology. So ban on public smoking reduces heart attacks is a fact not some blogger’s hunch. This needs to be taken seriously by ‘smokriminals’ (short for smoker criminal). The purpose for this thesis is not convince people or authorities through scientific data because there is plenty of that available from every credible/academic ‘.com’. Public smoking is a crime, and if a logical ground is established for that ‘fact’, it would have a better impact on everyone concerned. A logical nugget in favor of the thesis statement; innocent bystanders, the nonsmokers never asked for that ‘free candy’, public-smokers need not to give the free samples. The logic is that every (almost every) smoker agrees that smoking has harmful effect on the body, they know it for a fact. And no matter how hardcore a smoker, he would never smoke near his own infant. ‘Your freedom ends where your nose ends’, and smoke from a cigarette extends to the nose of

Wednesday, November 20, 2019

Critical evaluation of Freemark Abbey Winery Essay

Critical evaluation of Freemark Abbey Winery - Essay Example The best quality wine is produced only when the fruit has been ripened to a level where it reaches a perfect balance of acidity and sweetness. The ripeness of grapes is influenced by the existing weather conditions as well. In order to produce the right type of wine it is crucial that everything from the level of ripeness the grapes have achieved to the existing weather are all in a perfect balance. Most of all the fermentation process is accelerated by a certain type of bacteria known as botrytis mold. The latter part of the case takes an elaborate look at the different factors which impact its owner’s decisions regarding whether or not to harvest the grapes based on the weather predictions of an approaching storm. It discusses the ways in which the storm could affect the quality of wine and in turn its market price. If the wine was perfectly botrytised the wine would be significantly superior in quality but its quantity would be reduced. This kind could produce fewer bottles but they could easily be priced relatively high at a price of $8.00. The case study revolves around discussing all these factors which influence William Jaeger about deciding whether or not he should harvest the grapes prior to the approaching storm or wait for luck to strike. This is a critical decision to make and all possible options should be evaluated before taking a decision. There are several predictors of decision and various factors which have to be taken into consideration in order to decide whether the grapes should be harvested immediately or at a later stage. The biggest problem is that Jaeger’s decisions are all based on assumptions about the weather forecast. Incase the assumptions fail, the consequential strategy will also be unsuccessful. Freemark Abbey can rent a weather detector to maximize surety. In case the storm does not strike, early harvest can lead to a

Sunday, November 17, 2019

Rise of Consumer Culture Essay Example | Topics and Well Written Essays - 2500 words

Rise of Consumer Culture - Essay Example This linking culture Snow suggested in the second edition of his book in 1963, calling it a "third culture" where literary intellectuals lived in harmony with scientists, communicating ideas among each other and with the public. Brockman borrowed Snow's terminology of the third culture in his book (1995) of the same title as he daringly predicted that scientists and engineers at the cusp of what would soon become the dot.com boom will dominate this third culture. The boom came, but soon after followed the bust, and Brockman's third culture never materialised as he had hoped. What Snow and Brockman never realised was that a third culture had been moving quietly alongside these two cultures over the last half of the 20th century, one that combined the power of postmodernist intellectual thought and the energy of scientific innovation, helped along by the emergence of a capitalist society of excess wealth and prosperity. This third culture is the consumer culture, characterised by what we can describe as a body-centric attitude of consumption, where almost every conceivable commercial product is available to satisfy every craving or desire, fulfil any dream, and where reality can be reduced to one's identification with ideals created and circulated by the mass media. Essentially a perfect combination of Snow's two cultures - the romantic and the scientific - the consumer culture now defines who and what we are. The Marketable Self This is the scenario where Featherstone and other sociologists situate the body, the consuming subject, which is nothing more than the agent responsible for capturing and defining reality. Straddling the romantic-idealistic literary and the sensual-measurable scientific worlds, the consumer culture entices the human body to know and love it, to be a part of it, and to recognise that that is where its happiness and fulfilment lie. As the consuming subject (the body) attempts to capture - buying, eating, dressing up, or simply experiencing - reality in this consumer culture, it is the body that ends up becoming captive. It is in this context that we can analyse Featherstone's words (1991) that "the consumer culture constructs the marketable self." A main feature of this culture is a powerful popular media that helps in defining who and what we are. In his book (1999) Selling Dreams: How to Make Any Product Irresistible, Ferrari CEO Gian Luigi Longinotti-Buitoni (p. 193) describes the people of the consumer culture as bodies where product creators create a masterpiece the way a Picasso creates a painting on canvas, and where the media play the role of the artist's brush and oil. The body as a canvas Yes. In the consumer culture, "every instrument of the popular media - advertisements, television, and film to the press - provides a proliferation of stylised images of the body and emphasises the cosmetic benefits of body maintenance" (Featherstone, 1991). This strategy makes good business sense. After all, the physical perfection of the body or its idea of eternal youth has been one of our most cherished dreams. Beauty being a subjective judgment of a state of perfection, and the natural forces of aging, weight gain, and biological deterioration seemingly designed to halt our achieving that state, the possibilities for its definition are endless. The

Friday, November 15, 2019

Importance of Border Security Measures in National Security

Importance of Border Security Measures in National Security ABSTRACT Border security contains continuously evolving policies due to the evolution of threats and terrorism. Since the US Border Patrol was created in 1924, their challenges and threats have changed, driving them to adapt their methods in order to maintain national security. National security experts continuously contend that indecisiveness and ineffectiveness within immigration concerns and border vulnerability leaves the country susceptible to even greater national security challenges. This study analyzes the US border security policies implemented in the past, the various measures used, and if they were considered successful. Focusing on the Clinton, Bush, and Obama Administration, this study outlines the threats and challenges during that time and what successful measures were implemented. This paper will then analyze the threats posed and impact of breaches in border security, the action taken in response, and the effectiveness. INTRODUCTION This paper will analyze the measureable relationship between successful measures implemented, challenges, and effectiveness. The United States government has attempted to apply border control policies since the 1990s, however the emphasis placed on US border security has increased heavily in the past20 years. Globalization has amplified cross-border flow of goods, people, and money, further increasing the challenge of maintaining a states territorial sovereignty. To combat this rising challenge, there have been vast increases in border security funding, staffing and technology deployments. There are many challenges that each Presidential Administration has faced while addressing the question of border security. The sheer size of the border between the US and Mexico is a task all in its own. President Clinton inherited a war on the trafficking of illegal narcotics and organized crime, President Bush was left with the outrage and sheer shock after the 9/11 attack and President Obama dealt with the evolving terrorist threats by transnational actors and the continuous flow of illegal migrants into the United States. In response to these evolving challenges, each administration has implemented various measures in order to successfully combat threats to border security. This study will focus on the challenges of securing US borders and the successful measures implemented by each administration that has led to a more cohesive border security policy. METHODOLOGY Research Question What successful measures have successive US Administrations taken on the issue of border security? How effective have these measures been? Thesis Statement Each Administration has taken continuous measures to protect and secure borders and increase national security effectively. They have done this by adapting to continuously changing threats due to globalization. Data Collection This paper will rely on qualitative research to examine the measures successive US Presidential Administrations have taken on the issue of border security. This study will utilize the public White House Archives and peer reviewed articles to analyze the Clinton, Bush and Obama Administrations to further compare the measures used and challenges faced. This paper focuses on the last three administrations because this is when the US began increasing border control agents and INS/DHS budgets. Literature has discovered that there are flaws within border security, but they often fail to see how far each administration has come in terms of effectiveness. LITERATURE REVIEW There is a 2,000 mile geo-political divide between the United States and Mexico, and it has become one of the most frequently crossed borders in the world. Border security provides safety for a country and is an important mean through which national security is implemented. It is essential to economic prosperity, national sovereignty, and homeland security (DHS, 2017). Border security is responsible for the control and examination of what enters and leaves a country. This aspect is especially important due to current terrorist threats and organized crime. Not only does border security deal with the movement and control of citizens in and out of a country, but they also control the spread of disease and prevent smuggling of weapons, drugs, and endangered animals. The data provided in the literature is mainly focused on the lack of cohesiveness within border security, but they fail to show what progress has been made. Each presidential administration is faced with evolving immigration issues due to globalization. This study will look specifically at the Clinton, Bush, and Obama Administration focusing on their policies on border security and what successful measures were taken. This constantly evolving issue has resulted in literature seeking to explain this phenomenon based on the Organizational Design Theory (ODT). ODT contains the contingency theory school of thought. This theory is based on the concept that each situation is different and, in order to be effective, emphasis needs to be placed on the relationship between the environmental variable and the design. (Mintzberg, 1980). A flexible and adaptable adhocracy structure must be created in order to sufficiently address border security (Lunenburg, 2012). This coincides with the current border security issues the United States faces. The threats and challenges are evolving, therefore, the measures used to effectively address them should be developed based on each different situation. Although border security has been an important aspect of national security since the US Border Controls creation in 1942, it still remains a vague area of study with very little literature within International Relations. Overall, there was a substantial lack in coordination, information sharing, and synchronization within the border security logistics system (Nieto-Gomez, 2011). Also, due to the lack of consensus among policy makers and law enforcement agencies, policies have been historically inefficient. Very little literature has been written on the actual level of effectiveness in comparison to the growing list of challenges. The Migration Policy Institute created a report in 2011 on the challenges of effective border control in the US. This report highlights one of the major issues within border security by stating that 30-40 percent of the unauthorized immigrants in the United States entered legally, however, they overstay their visas due to poor monitoring (Koslowski, 2011). Another issue is one of practicality; objects of border control are not static (Koslowski, 2011). This paper will look at Edward Aldens research on the attempted overhaul of the visa system and the benefits we have seen (2012). Alden also delves into the challenge of securing a border with a sensible immigration system without weakening the US economy (2012). However, Aldens research focuses on immigration reform rather than preventative infrastructure (fencing). This study will also look at Josiah Heymans analysis on the US-Mexico border and the alternative vision of quality (dangerous entrants) over quantity (mass migration enforcement) (2013). However, this author argued that law enforcement at the ports should be border securitys main concern, rather than the areas in between port cities. This study focuses heavily on the vetting of migrants instead of the issue of illegal immigration. FINDINGS AND ANALYSIS Importance of Border Security Border security is an essential component of national security. It is more than just restricting territorial access through immigration reform. It also protects states against illegal movement of drugs, weapons, and contraband. Since the formation of sovereign nations, this has been a core action within states, and is seen as one of the most ambitious expansion of power in modern history. According to the Department of Homeland Security, border security is, the act of protecting our borders from illegal movement of weapons, drugs, contraband, and people, while promoting lawful entry and exit, is essential to homeland security, economic prosperity, and national sovereignty (2015). Due to growing violence by nonstate groups and transnational terrorism, there has been an overwhelming increase of focus on border security to combat recent national security issues. Weak and porous borders permit easy entrance into the US for terrorists and smugglers. While completely sealing the border is not feasible at this time, the ultimate goal is to reduce the possibility of dangerous people crossing the border (Koslowski, 2011). Threats The concept of border security has evolved greatly due to the threat of terrorism. The US federal government combats a variety of threats to their border. The main threats include illegal immigrants, organized crime, and terrorism. Illegal immigrants aiming to work and live in the US illegally creates a border security concern. Along with illegal entry offences, some unauthorized immigrants become involved in transnational crime during their migration. Organized crimes are criminal activities that are planned and controlled by powerful groups and carried out on a large scale (Organized Crime, 2017). These traffickers smuggle drugs, counterfeit goods, people, and firearms into the US. Their crimes included prostitution, commercialized vice, and money laundering. This has been identified as a threat to national security and border security (Ilias, 2011). These individuals are predominately non-ideological and are driven by the pursuit of profit. Transnational Terrorist is someone who illegally crosses the border with transformational goals that may include the destruction of a political or economic system. They are motivated by particular grievances about aspects of the society and they articulate their views on moral grounds (Rosenblum, 2013). Although the DHS has no credible information on terrorist groups operating along the US and Mexico border, the threat is still there. The Clinton Administration (1993-2001) This is when the US sees the first initial crackdown on border control. The main concern during this time was the threat of illegal drug smuggling across the Mexico and US border.   To combat these challenges, President Clintons strategy included the buildup of the Border Patrol and implementing Operation Gatekeeper and Safeguards 1993 (OIG, 1998). He allocated funds for 700 new border control agents, deployed underground sensors, infrared night scope, and began the progressive building of the wall between Mexico and the United States. The first formal national border control strategy was created in 1994 (Meissner, 2013). In 1996, Congress executed the Illegal Immigration Reform and Immigrant Responsibility Act (IIRAIRA). This Act was created to combat the abundance of fraudulent immigration-related documents, alien smugglers, and increased criminal penalties for racketeering (Meissner, 2013). It further expressed the need for more patrollers, better procedures, and more advan ced technology. In addition, Clinton implemented the National Drug Control Strategy to block drugs at the border and cut off drugs at the source. This strategy increased drug enforcement agents for border and customs control of illegal drug trafficking. Their budget for 2000 included almost $18 billion to further prevent drugs from crossing the US border. We can measure the effectiveness of this Administration by looking at statistics and the progress it has made. This Administration was the first to place a high priority on the removal of criminal aliens. It introduced US governments commitment to allocate more funds for border resources and enforcement infrastructure. The Immigration Enforcement budget rose from less than $3 billion in 1993 to over $6 billion in 2001 (Meissner, 2013). Overall, this Administration made a noticeable effort to restrain illegal immigration and prevent drugs from crossing the border. There was a 2.5% decrease in drug relation crimes between 1993 and 2000 (Farley, 2016). The Bush Administration (2001-2009) The Bush Administration was subject to one of the biggest threats to national security. The terrorist attack on September 11, 2001 sparked a transformation in the approaches traditionally used to secure borders and combat terrorism. This Administration strove to create a smart border that incorporated advanced tracking technology and extensive prescreening of low-risk traffic (Koslowski, 2011). This Administration implemented many new border security measures after the terrorist attack. One of the biggest changes was the Homeland Security Act of 2002. The Department of Homeland Security (DHS) was created in order to streamline and improve the governments ability to protect their nations infrastructure and borders. It replaced 22 separate agencies to reduce the disconnected nature and create one strong mission. The Bush Administration also implemented the Secure Fence Act of 2006. This authorized the construction of almost 700 miles of additional fencing along the southern border (White House, 2008). It also approved more vehicle barriers, checkpoints, and lighting. In conjunction with the DHS, this Act also increased the use of advanced technology like cameras, satellites, and unmanned aerial vehicles to reinforce the infrastructure at the border. Additionally in 2006, President Bush approved Operation Jump Start. This two year support mission called for 6,000 National Guar d members to assist with surveillance, training, and installing fences (Rosenblum, 2013). Lastly, in 2008, all cross-border travelers were required to present further documents to establish their identity and citizenship preventing further illegal immigration. To fund these new implementations, the budget for border security and immigration enforcement increased by 159 percent. The budget rose from $4.8 Billion in 2001 to $12.3 Billion in 2008 (White House, 2008). The effectiveness of the measures taken by this administration can be show with statistics. Operation Jump Start apprehended over 5,000 aliens, seized 28,000 pounds of marijuana, and almost 1,500 pounds of cocaine (Operation Jump Start, 2015). The DHS saw a 20% reduction in apprehension of illegal aliens at the Southern border in 2007 (White House, 2008). This indicates that stronger security has deterred aliens from attempting to cross. Also in 2007, the US Customs and Border Protection and ICE returned or removed almost 1.2 million illegal aliens from the US and arrested over 3,300 gang members (CBP, 2011). The Obama Administration (2009-2017) The Obama Administration saw a decrease in illegal border crossing. This was mostly due to lack of jobs in US resulting from the housing market decline. During the first year of his term, Obama spent time reexamining current programs and prospective options for increased border security (Koslowski, 2011). In 2010, President Obama signed the Southwest Border Security Act. This allocated $600 million in supplemental funds to support an additional 1,200 National Guard troops and unmanned aircraft drones (Koslowski, 2011). President Obama was given credit for most border security deployed. This is referring to fences or technological and infrastructure improvements. In 2011, the United States Border Patrol reached their highest number of border patrol agents with 21,444, and the border patrol budget increased significantly from $5.9 billion in 2003 to $11.9 billion in 2013 (Koslowski, 2011). This study measures the effectiveness by looking at statistics. The Obama Administration deported 2.5 million undocumented people during his eight year term. This was more than any other Administration. In 2013, there was an increase of over 27% more apprehensions at the southwest border (414,000) compared to 2011 (Koslowski, 2011). CONCLUSION The security of the border between the United States and Mexico has become a concern of national security due to the massive increase of cross-border flows of goods, people and money. Each US Presidential Administration has made great effort to secure this border and fight the new and evolving threats. Overall, there have been many successful measures implemented by the Clinton, Bush, and Obama Administration. President Clintons Administration inherited a war on the trafficking of drugs and organized crime and combated that with the first large increase of border control agents. The Bush Administration was subject to one of the most historical terrorist attacks in US history and responded by creating the DHS and implemented an overwhelming increase to the border security budget. Bush also built 700 miles of the borders fence. The Obama Administration saw a further increase of the border security budget, growth in immigration enforcement patrollers, and lengthened the border fence. In order to fully understand how successful these measures were, this study analyzed statistics. More than 4 million deportations of noncitizens have occurred since 1990 (Meissner, 2013).   Due to increased border security, the cities along the border that were once plagued with criminal activity have become some of the safest in the United States. Looking at crime rates systematically shows that crimes associated with illegal immigration, like breaking and entering and car theft are down substantially (Meissner, 2013). This indicates that illegal immigration is down. Since 9/11, there have been no publicly known instances of a terrorist smuggling Weapons of Mass Destruction to commit a violent act of terrorism via the US-Mexico border (Customs and Border Protection, 2011). THE USBP made 18,074 drug seizures in 2011 and seized more than $8.4 billion worth of narcotics along the southwest border in 2014 (CBP Security Report, 2014). Finally, illegal crossing from Mexico has fallen near the lowest level since the early 1970s and hiring a smugger to cross the border is now almost eight times more costly than it was in the 1990s. The data above shows that US Administrations have repeatedly implemented successful measures and have effectively increased border security. REFERENCES Alden, E. (2012). Immigration and Border Control CIAO, 32(1). Retrieved from http://www.ciaonet.org.library3.webster.edu/record/24456?search=1 Background to the Office of Inspector General Investigation Operation Gatekeeper (1998). U.S. Department of Justice. Retrieved March 7, 2017, from https://oig.justice.gov/special/9807/gkp01.htm Border Security: Comprehensive Immigration Reform (2008). White House Archives. Retrieved  March 6, 2017, from https://georgewbush-whitehouse.archives.gov/infocus/immigration/html Border Security | Homeland Security. (2015). Retrieved February 18, 2017, from https://www.dhs.gov/border-security Department of Homeland Security (2015). Yearbook if Immigration Statistics. Retrieved March 7, 2017, from https://www.dhs.gov/immigration-statistics/yearbook/2015/table33 Farley, Robert. Bill Clinton and the 1994 Crime Bill. Fact Check. N.p., Apr. 2016. Web. 11 Mar. 2017. Heyman, J. M. (2013). A Voice of the US Southwestern Border: The 2012 We the Border: Envisioning a Narrative for Our Future Conference CIAO, 1(2). Retrieved from http://www.ciaonet.org.library3.webster.edu/record/32914?search=1 Koslowski, R. (2011). The Evolution of Border Controls as a Mechanism to Prevent Illegal Immigration (pp. 1-33). Migration Policy Institute. Retrieved from http://www.migrationpolicy.org/research/evolution-US-border-controls-illegal-immigration Kostro, Stephanie Sanok and Scott F. Mann (2013).CIIS: Innovative Immigration and Border Control Reform. Retreived from http://www.ciaonet.org.library3.webster.edu/record/29251?search=1 Lunenberg, F. (2012). Organizational Structure: Mintzbergs Framework. Journal of Scholarly, Academic, Intellectual Diversity, 14(1). Retrieved from http://www.jstor.org.library3.webster.edu/stable/425256 Meissner, Doris, Donald M. Kerwin, Muzaffar Chishti, and Claire Bergeron (2013). Immigration Enforecement in the United States: The Rise of a Formidable Machinery (pp.1-182) Migration Policy Institute. Retrieved from http://www.migrationpolicy.org/research/immigration-enforcement-US Mintzberg, H. (1980). Structure in 5s: A Synthesis of the Research on Organization Design. Management Science, 26(3), 322-341. Retrieved from http://www.jstor.org.library3.webster.edu/stable/423910 Nieto-Gomez, R. (2011). The Power of the Few: A Key Strategic Challenge for the Permanently Disrupted High-Tech Homeland Security Environment. Homeland Security Affairs, (1-21). Operation Jump Start CBP Border Patrol and the National Guard. (2015). Retrieved March 7,  2017, from https://help.cbp.gov/app/answers/detail/a_id/1021/~/operation-jump-startcbp-border-patrol-and-the-national-guard Organized Crime. (2017). The Federal Bureau of Investigation. Retrieved March 6, 2017, from  https://www.fbi.gov/investigate/organized-crime Rosenblum, Marc R., Jerome P. Bjelopera, Kristin M. Finklea (2013). Border Security: Understanding Threats at U.S. Borders. (CRS Report for Congress No. R42969) (pp. 1-33). Retrieved from http://www.au.af.mil.AU/awc/awcgate/crs/r42969.pdf Shayerah Ilias, Ian F. Fergusson. (2011). Intellectual Property Rights and International Trade  (CRS Report for Congress No. R134292) (pp. 1-42). Retrieved from  http://www.au.af.mil/AU/awc/awcgate/crs/rl34292.pdf US Customs and Border Protection. (2014). CBP Border Security Report (pp. 1-7). Homeland  Security.

Tuesday, November 12, 2019

Social Media Is Good or Bad?

Children can gain social confidence from interacting with other people online, which may help them feel more secure in new situations. Some Children can help people in the social networking websites like Facebook and Twitter. Some knowledge that they do not know, they can ask them. While some of the knowledge he/she does not know, he/she can ask his social networking’s friends. Friends should help each other, so that they can build a strong bond in our friendship. What Happened to quality relationships?While social networking sites can aid to online relationships, real life relationships can become weak or even non existent. While your cooped up in your room on your laptop, you are spending less time with real life and legitimate relationships and spending more time on a false friendship with some one online. What ever happened to a good old phone call or meet up? Is this really where my generation is headed? We are in trouble. the brain cannot complete the learning process It is not yet known as to the affects that a combination of hard copy books and reading off the internet will have on young people.But there is evidence for older people that suggests they are finding it more difficult to stay focused and even actually read something more than 3 pages and this evidence is from a previous columnist for the guardian and executive editor of the harvard business review author Nicholas Carr. Furthermore, the information we read on the internet minimizes the amount of thinking our brains have to do this is not a good sign if anything, the analyzing process of the text is more important, this process is there to help us remember information as opposed to just finding the answer.

Sunday, November 10, 2019

Life Span Perspective on Human Development Essay

In this essay I will touch on several different theories of human development and growth as well as their theorist. I will show how hereditary and environment play a vital role in human development and identify a few aspects of life span perspectives. Psychosexual Theory One theorist was Sigmund Freud who believed that the development of sexual personality or libido was the development of personality. Freud beliefs were that every individual goes through five stages that further form your personality. The first stage or the earliest is the oral stage which includes sucking and drinking, sexual drive is focus around the mouth, later on leading to more aggressive biting, chewing, sucking of thumb and later years of possible cigarette smoking. The second stage is the anal stage or the toddler stage. His stage is actually broken down into two parts; the first part is called the expressive period in which the child takes pleasure in having a bowel movement. The other part to the second stage is the retentive stage where they will store their feces. The Phallic stage is where children gain pleasure from stimulation there private area, this also is a time were the child will begin to identify with either mother or father depending on the sex of the child. This will help to identify gender roles. The latency stage is the puberty stage where teens find a more acceptable way channeling their sexual aggression. The last stage is the Genital stage in which the adult has reach sexual and emotional maturity. Ego Development Ego development theory was created by Erik Erikson. Erikson believed our personality is formed from opposites such as dependant or independent, aggressive person or passive person, are just an example of a few. Erikson stated that some of these traits you are born with others are learned. Erikson based his theory off the study of the Sioux Indians during this study he learned that behavior and the Indians culture played a great part in there world. Erikson organized life in stages from birth to death, in this theory Erikson theorized that children who had a difficult childhood, versus a child who did not have so many challenges. First stage birth to 18 months trust versus mistrust in this stage we as babies will either learn to trust and have confidence or mistrust and have a feel of worthlessness. Early childhood stage 18 months to 3 years Autonomy versus shame, in this stage children start to master some of the skills on their own their independency kicks in and it also at this stage they may be easily shamed. Ex. (toilet training). 3 years to five years is the intuitive versus guilt, 6 years to 12 years is the industry versus inferiority, 12 to 18 years identity versus role and then there are three more stages after that. Environmentalist Theory John Watson, Skinner believed that a child environment shapes what they learn and environment. Depending on how and where you were raised will determine how you react to things. It was believed that be more stable learning environment will help develop normal stages of growing up. Children seem to learn best through rote activities were the recite colors, alphabet, numbers their address and telephone. When children don’t take to this form of learning they are said to have a learning problem or disability such as ADD. Conclusion In conclusion I agree with every theory except for Sigmund Freud psychosexual theory, I felt a little uncomfortable with some of the points, I do not believe that any part of the sucking, drinking, or chewing as a infant has anything to do with sexual drive. I think it all had to do with surrounding to your environment weather you be an adult of infant. The Theory that I agree with the most is John Watson, Skinner the environmentalist theory, I believed that children learns through things being repetitive, I feel that a good environment breeds a stable child then there are the exceptions. Carlson, Neil R. Psychology: The Science of Behavior. Boston: Allyn, 1990 Gleitman, Henery. Psychology. New York: Norton, 1991 Western, Drew. Psychology: Mind, Brain, Culture. New York, 1999.

Friday, November 8, 2019

World War II Speech

World War II Speech I. World War II was the most devastating war in world history. The war resulted in horrific property damage as well as about 17 million military deaths and even more civilian deaths.(click) The devastation of the war was mainly due to the advanced military weapons used, from the infantry on the front line to the ships in the sea and the planes in the sky, these weapons destroyed lives and property in nearly every part of the world. The United States became involved in the war in 1939. (Click) a. The government is constantly coming up with more efficient ways to win wars through technology. World War II was the most devastating war in history. It resulted in major property damage and about 17 million military deaths and more civilian deaths. (click) b. The devastation of the war was due to the advanced technology, from the infantry on the front line to the ships in the sea and the planes in the sky, these weapons destroyed lives and property in nearly every part of the world.(Click)A U.S. Navy Grumman F6F-3 Hellcat of fighter squad...c. First I will talk about new technologies that the troops on the ground used, next I will discuss the implementation of armored tanks that were used, and finally I talk about the advancements the Navy made during World War II. (Click) II. World War II was a war of the infantry. Hundreds of thousands of allied soldiers fought and died on the front line due to theses following weapons. The allied forces used many different types of firearms throughout the war. The GI's on the front line used rifles, shotguns, machine guns, automatic rifles, mortars, bazookas, recoilless rifles, grenades, sub machine guns, knives, pistols, flamethrowers, armored vehicles and tanks to achieve their objectives. World War II was the introduction for the bazooka, flamethrower,

Wednesday, November 6, 2019

afghanistan karzai essays

afghanistan karzai essays Dear brothers and sisters, the representatives of the bereaved nation of Afghanistan; Dear guests, members of the diplomatic corps Assalamu alaikum, may peace be upon you. I have some wonderful news and some concerning regarding the status of your country through my leadership as your president. As you may have known in my past, I have loyally served my country through the Soviet attempt of occupation and have succeeding and assisting my compatriots in freeing our country. I left Kabul in 1994 for Qandahar, due to the internal strife among the various factions. While in Qandahar, I was approached by my former colleagues from the Afghan resistance against the Soviets, to free Qandahar from the menace of warlordism, factionalism, and oppression. Thus, with the assistance of the local inhabitants and the Taliban this objective was achieved. However, in mid 1995 I parted with the Taliban movement, since they were gravitating towards extremism and negative foreign influence. In 1996, with the Taliban in control of Kabul, I was offered the post of their representative to the United Nations. Hamid Karzai rejected the Talibans offer, and instead devoted all my efforts towards the convening of an Emergency Loya Jirga, under the auspices of His Majesty, Mohammed Zaher, the Former King of Afghanistan. With me as one of the principal organizers, the Loya Jirga movement received an important impetus and in October 1997, an Intra-Afghan Dialogue Process was launched in Istanbul, Turkey. The movement sought to provide the Afghan people the opportunity to determine their right to self-determination in accordance to their free will. Following meetings of the Intra-Afghan Dialogue Process in Frankfurt and Bonn, Germany in July 1998, the focus of activity was shifted to Rome, Italy in 1999. (embassyofafghanistan.org/main/bios/karzai_bio.cfm) During the next several years, I worked to introduce the Loya Jirga process as the on...

Sunday, November 3, 2019

ANY Coursework Example | Topics and Well Written Essays - 250 words - 1

ANY - Coursework Example However, proper tool selection is a critical and a difficult undertaking. The methodology defines specific deliverables and artifacts that are created for the purpose of maintaining an application. The programming languages also known as codes are used to instruct the computer to perform certain tasks. Therefore, the programmer must complete the objective of making the language easy to comprehend and efficient in the sense that few instructions are written to complete the required task. It is significant to note that the languages range from first-generation to fifth-generation languages. However, these languages are set by ANSI and ISO which guarantee program portability among operating systems and application programs (Systems Architecture Sixth Edition Chapter 10 25). In the compilation process, the program editor ensures that input is from the programmer, program, template or both. The output also referred to the source code should be partial or complete. The output is stored in a file and the file is named to indicate its functionality as well as the programming language. Therefore, the compiler checks syntax errors, translates code into instructions and generates CPU instructions among other instruction (Systems Architecture Sixth Edition Chapter 10). Most importantly, the compiler completes data declaration, data operation, control structures and functions which include subroutine calls. Link editing is also carried out by the link editor and searches for external function calls in the compiler library. Link editing is either dynamic or static. In addition, interpreters are part and puzzle of the software development lifecycle. They interleave source code translation, foresee link editing and execution. After interpreting, symbolic debugging is carried out. It refers to the use of an automated tool for testing executable programs. This is enhanced through the use of symbol

Friday, November 1, 2019

What Is Globalisation and How Does It Affect the Multinational Essay - 1

What Is Globalisation and How Does It Affect the Multinational Enterprises - Essay Example This research will begin with the definition of globalization as the process through which isolated regions of the world become more integrated as a result of increased international cooperation in the exchange of knowledge, cultural values, political ideas, and economics. This process has largely been made possible by technology advances with special attention to the internet. Indeed, as the world has become more connected to the internet, people across the world have increasingly become interdependent in such activities as political policy, travel, communications, and trade However, while contemporary assumptions are that globalization is a fairly modern phenomenon as a result of ICT inventions, it has actually been taking place for hundreds of years. For instance, the Silk Road that spanned from East Asia into Europe is early evidence of international trade and cultural exchange, as is the invention of railroads and steamships. What has made globalization especially salient in the last one hundred years is that the invention of road vehicles and airplanes has dramatically eased international trade and exchange? Moreover, digital communication tools invented in the late 20th century have made globalization in the modern sense a reality. One organization that owes much of its success to globalization is Wal-Mart, which has been able to take advantage of cheaper imports, cheaper labor, and improved logistics and ICT capabilities in previously isolated regions like East Asia to gain a comparative advantage. The term globalization is derived from the verb â€Å"globalize† that encompasses the aspect of international influence and interdependence between diverse economic and social systems. The concept of globalization has several definitions and interpretations, which range from such diverse disciplines as anthropology, philosophy, sociology, and business. According to Dehesa, there are four fundamental aspects from a business perspective that define the c oncept, which are trade and transactions, movement and migration of people, investment and capital movements, and knowledge dissemination. Globalization, in essence, is a natural phenomenon that enables for synergy in both markets and cultures through the process of specialization.