Thursday, November 28, 2019

Trail Of Tears Essays - Cherokee Nation, Trail Of Tears, Choctaw

Trail Of Tears Within United States History, there has been some horrible discrimination upon certain races of people. At the trail of tears native Americans were persecuted against heavily. Until 1828 the federal government had Cherokee rights to their land and in that same year Andrew Jackson was elected president and this all ended. On September 15, 1830, at Little Dancing Rabbit Creek, the Chiefs of tribes and representatives of the United States met to discuss a bill recently passed by the Congress. This day started with all the same good intentions of those today but ended with only a few Native Americans signing the treaty which allowing for the removal of all Indian peoples to the west of the Mississippi River. ( Brill, The Trail of tears: The Cherokee journey from home.) The Choctaw were told that the Americans in Washington cared little for the situation. They wanted the Choctaw moved on their own, or by military force. The Indians were believed to be ignorant savages, but they were industrious farmers, merchants, and businessmen of all types. Some were educated people, many were Christians. They even had an organized system of government and a codified body of law. Some of these people were not even Indians, some were strangers and orphans had been taken in over the years. These were people who did not deserve what they went through. When the Chiefs and Warriors signed the treaty, they had come to the realization that they had no option. For doing this the government officials guaranteed to the Indians the body of the treaty, safe conveyance to our new homes. (You cannot forget that in this treaty, the Choctaw traded 10.3 million acres of land east of the Mississippi for 10.3 acres in Oklahoma and Arkansas that we already owned under previous treaties.) Further, it included provisions and monetary annuities, to assist the people to make a new start. One half of the people were to depart almost immediately, the rest the next year. On March 27, 1838, congress did not accept the request for the relief of the Cherokee. Many then saw their land and property sold before their own eyes. The conveyances promised turn out to be a forced march. it was said that ...seven thousand soldiers swooped over the nation causing the Cherokees to suffer greatly and also the troops were ordered To use guns and swords if necessary to punish any Cherokee who tried to hide. (Brill, 43) At the point of a gun, the pace killed many of the old, exposure and bad food killed most. Spoiled beef and vegetables are poor provisions, Many walked the entire distance without shoes, barely clothed. It is told that, Hateful soldiers prodded and kicked the old and sick on their march to the camps. Those who were too weak to keep up were left by the road without food to recover or die. Soldiers pricked friends and family with bayonets to keep them from turning back to help (Brill, 45). These horrid conditions are what the Indians had to deal with. Th e supplies that were given had been rejected by the Americans. One person complained my feet are blistered and on my back is a read and blue backpack of fifty pounds (Ellis). The government cannot be blamed fully, nearly all of this was done by men that were interested only in making profits. They government's really is just wrong for not watching over the whole deal. Many of the old and the children died on the road. At each allowed stop, the dead were buried. Hearing of this many escaped. They knew that as they signed the rolls, to be removed, that they were signing their own death warrants( Brill, 42) . They hid in places that no one would travel to look for them (i.e., Swamps, hills). But as this horror occurred those in charge just reported their peaceful progress. (Ellis, walking the trial: one man's journey along the Cherokee trail of tears.) Some marching claimed to be Black Dutch, Spanish, Creole, or Black. These people were accepted by neither the Americans or the papered. Many others who had to march fled to Illinois, Missouri, Arkansas, and Louisiana. The fertile

Monday, November 25, 2019

Free Essays on One Flew Over The Cuckoo´s Nest

Violeta Galera Alba Literature and Film Professor: Rodney Stephens Intemsive Summer Session One flew over the cuckoo ´s nest In this paper I am going to explore how the main characters of the book work as symbols. To study this issue, I will focus on Nurse Ratched, Randle McMurphy and Billy Bibbit because I think that these characters represents the main symbols in the novel. In this essay I am going to study also the evolution of Chief Bromdem, the narrative voice of the novel. Nurse Ratched a middle-aged former army nurse, controls the hospital ward with an iron hand and masks her humanity and femininity side. She represents a machine that demands complete control and perfect order from everyone, represents the oppressive mechanization, dehumanization, and emasculation of modern society "A huge organization that aims to adjust the outside as well as she has the inside...like a watchful robot, tend her network with mechanical insectskill, she dreams of there in the centre of those wires is a world of precision efficiency and tidiness, a place where the schedule is unbreakable and all the patients who aren ´t outside, obedient under her beam" (26). So powerful are the Chief ´s descriptions of the Nurse as a mechanism of terror, able to control the hospital with beams of hate,with these descriptions is easy to see the Nurse as the pure image of the evil which is another symbol. "She nods once to each. Precise, automatic gesture. Her face is smooth, calculated, and precision-made, like an expensive baby doll, like a machine."(5) Nurse Ratched represents a desire for efficincy order, control at all costs, she has convinced herself that if some control is good, complete control is better. Ratched has complete control over every aspect of the ward, the black boys, the nurses and even the doctors are completely submissive to Nurse Ratched authority, she selects her staff for their submissiveness, an... Free Essays on One Flew Over The Cuckoo ´s Nest Free Essays on One Flew Over The Cuckoo ´s Nest Violeta Galera Alba Literature and Film Professor: Rodney Stephens Intemsive Summer Session One flew over the cuckoo ´s nest In this paper I am going to explore how the main characters of the book work as symbols. To study this issue, I will focus on Nurse Ratched, Randle McMurphy and Billy Bibbit because I think that these characters represents the main symbols in the novel. In this essay I am going to study also the evolution of Chief Bromdem, the narrative voice of the novel. Nurse Ratched a middle-aged former army nurse, controls the hospital ward with an iron hand and masks her humanity and femininity side. She represents a machine that demands complete control and perfect order from everyone, represents the oppressive mechanization, dehumanization, and emasculation of modern society "A huge organization that aims to adjust the outside as well as she has the inside...like a watchful robot, tend her network with mechanical insectskill, she dreams of there in the centre of those wires is a world of precision efficiency and tidiness, a place where the schedule is unbreakable and all the patients who aren ´t outside, obedient under her beam" (26). So powerful are the Chief ´s descriptions of the Nurse as a mechanism of terror, able to control the hospital with beams of hate,with these descriptions is easy to see the Nurse as the pure image of the evil which is another symbol. "She nods once to each. Precise, automatic gesture. Her face is smooth, calculated, and precision-made, like an expensive baby doll, like a machine."(5) Nurse Ratched represents a desire for efficincy order, control at all costs, she has convinced herself that if some control is good, complete control is better. Ratched has complete control over every aspect of the ward, the black boys, the nurses and even the doctors are completely submissive to Nurse Ratched authority, she selects her staff for their submissiveness, an...

Thursday, November 21, 2019

Egyptian political history( Prehistory-1500) Research Paper

Egyptian political history( Prehistory-1500) - Research Paper Example It established a political organization structure early in time to serve its people and delegated roles for its future prosperity. Military force protected the empires and performed the orders of the kings. Records also show that Egypt expanded its authority over the empires it conquered and made certain alliances with other empires to fight their enemies. The political power was initially inherited by the royal family, which formed the sequence of establishing a monarchy based government that controlled the economic activities of the empire. Monarchical Governments The ancient Egyptian government was a form of monarchy and theocracy. Precisely, the kings were said to rule by divine decree and if lucky to keep the empire together, the power to rule was inherited by members with the royal blood. However, there are instances where the women became queens and situations where the leadership was taken away by the conquering dynasties. According to the ICR (6), for about three millennia, that is 3150 to 31BCE when the Roman Empire took the territories of Egypt, Pharaohs ruled ancient Egypt. Pharaohs occupied the top position of the social hierarchies and ruled with absolute power. Pharaohs as political and religious leaders would rule till their death, when their heirs inherited the throne. Some heirs would take the responsibility quite early in age, and sometimes where there were no princes, the royal women could be married off to a royal person in the linage, to make bear heirs of the throne and ensure no power was spilled outside the royal family. Some of the lady Pharaohs comprised of Hatshepsut and CleopatraVII, while male rulers were Akhenaten who passed down the thrown to his son king Tun (Tunankhamun at age 9). They exercised their powers without hardship, because the people had already accepted them as their gods, or mediators to the gods, as well as their associated immeasurable power that they used to command the people, head their military, and make crit ical decisions when required. The reign of the Pharaohs can be divided into 3 kingdoms according to the periods (2700 to 2200 BCE) Old Kingdom, (2052 to 1786 BCE) Middle Kingdom, and (1575 to 1087 BCE) the new Kingdom, in which the numerous Egyptian dynasties were established (Connors et al 22). Some rulers strived to accomplish the objectives of their former rulers as they defended their dynasties through the militaries, brought political and economic stability and prosperity, unified the Egyptians after the conquests, unrests, and riots. Political Structure The political organization and command of power was centered with the supreme authority that rested on the Pharaohs. Although there were subordinates to the royal power, the kings’ decision was final at any required situation. Some kings ruled through their heirs, making it possible to oversee and maintain order within the entire Egypt territory. According to Kaplan, the government of ancient Egypt looked like the struct ure of a pyramid with respect to the division of power; such that the king was at the top, and beneath him a pool of workers that varied in the ranks (13). The king, though an individual with enough power to make a decision that would affect the lives of the people, had a team of elite or royal people who acted as his advice council and could at times influence his decisions. The viziers as the executive heads of bureaucracy occupied the powerful

Wednesday, November 20, 2019

Theories relevant to my study Assignment Example | Topics and Well Written Essays - 250 words

Theories relevant to my study - Assignment Example This mode of teaching advocates for acknowledgement of cultural heritages. Thus, it provides the students with a wide range of instructional strategies which support their different learning habits (Lynch, 2011). There are various theories that are associated with culturally responsive pedagogy. These include Maslow’s hierarchy of need theory, McClellan Acquired Needs Theory and the Self-Determination theory by Richard Ryan. Maslow’s hierarchy of need theory bases its arguments on self-actualization, esteem, belongingness, safety and psychological needs of a person. Acquired needs theory focus on the need for achievement, affiliation and power (Analytitech, n.d). On the other hand, the self-determination theory focuses on human motivation and personality (Intime, 2002). Therefore, it is evident that these theories illustrate that students should be provided with conducive condition for them to learn. They provide a basis whereby teachers can understand the diverse learning needs of the students so that they can improve their performance in class (Analytitech, n.d). In this perspective therefore, it is important for the administration of schools to re-evaluate and re-shape the school curriculum so that the diverse academic needs of the students can be addressed in an appropriate

Monday, November 18, 2019

Business and Financial Environment 2 Essay Example | Topics and Well Written Essays - 2000 words

Business and Financial Environment 2 - Essay Example (Moles and Terry, 1997). A firm faces finances risk if there is a high probability that it might be unable to meet its fixed financial obligations or prior chares such as interest, principal repayments, lease payments, or preferred stock dividends. Financial risk is therefore risk arising from the use of debt finance, which requires periodic payments of interest and principal and may not be covered by the firm's operating cash flows. (Moles and Terry, 1997). The capital structure of a firm is made up of both debt and equity components. Although the use of debt in financing part of the firm's operations is advantageous to the firm, these advantages tend to disappear when too much debt is used. In effect when debt is used above the optimum level, the result is financial distress. (Ross et al, 1999). Ross et al (1999) asserts that debt puts pressure on the firm, since interest and principal repayments as well as short-term payables are financial obligations. In the event where these obligations are not met, the firm may risk some sort of financial distress. (Ross et al, 1999). Debt obligations are fundamentally different from stock obligations in that bondholders are legally entitled to interest and principal repayments more than stockholders are legally entitled to dividends. (Ross et al, 1999). ... (Ross et al, 1999). Although debt carries a tax advantage, the costs of financial distress tend to offset this advantage when debt is used above the optimal level. (Ross et al, 1999). The optimal level of debt can be referred to as the debt level that provides the maximum firm value. the value of the firm begins to disappear once this debt level is exceeded. (Ross et al, 1999). The firm should therefore adopt a debt-to-equity ratio that maximizes the value of the firm. (Ross et al, 1999). Question (ii) WCOA Ltd Ordinary Shareholders' Required Rate of Return. Under this section, the required rate of return is calculated under the assumption that the risk class of the new investment remains the same as the risk of the original investment. This calculation is done before and after the issue of the new debentures. Having said this we now calculate the required rate of return before the issue of the new debentures and we later calculate the return after the issue of the new debentures. a) Required Rate of Return for WCOA Ordinary Shareholders Before the issue of the New Debentures.1 Earnings from original investments 64.000 Earnings from new investment 8.000 Total Earnings before interest 72.000 Interest (8% of 320,000) 25.600 Earnings after interest 46.400 Number of shares outstanding 130.000 Earnings per share (EPS) 0,3569 Book Value 260.000 Book Value per share 2 Expected Return on ordinary equity shares (ROE) 17,85% b) Required Rate of Return for WCOA Ordinary Shareholders after the issue of the New Debentures.2 Earnings from original investments 64.000 Earnings from new investment 8.000 Total Earnings before interest 72.000 Interest (8% of 400,000)

Friday, November 15, 2019

Risk Management In Construction Contracts

Risk Management In Construction Contracts Risk management is vital when tendering for construction contracts. Risk is described by Atkinson (2001) as the probability of an occurrence of a hazard and the magnitude of the consequences. Consequently risk can be considered as the likelihood of an experience occurring and the resultant effect of that experience if it takes place. As defined by RICS (2009) risk management is a means of processes where risks are identified, analysed and managed. It is a constant cycle that begins at the pre-tender stage; this means that risk can be priced into the bid and continues after post contract stage. During the different phases of a project, new risks will emerge throughout the contract. Identifying in advance allows quicker mitigation; to reduce impact risk has on the project. This study has examined the inaccuracy of pre-tender risk management by using both pre-tender and post contract risk registers. As well as risks there were opportunities and these were also recognised in the processes of risk management. This subject area was chosen to be researched after discussion with line managers and work colleagues, during my 2010 placement year with Sir Robert McAlpine (SRM). This topic was considered as an ideal subject area for a research project because SRM were improving their risk management procedures. Therefore the plan of the study was to feedback findings, to further enhance the Tender risk management process. The line manager gave me risk registers for two different project types, and explained how SRM assess risk at all stages of a job. The emphasis being on highway construction, as this information was available from my placement and SRM. 1.2 Rationale The subject of what to research developed from consultations with colleagues and the line manager at SRM. The line manager was involved in risk management and was working to improve SRMs pre-tender risk process to make it replicate the post contract phase. This therefore illustrated a requirement in the business and indeed construction for research in to this topic area. The main reason for eventually electing the subject area of risk was the open access of information provided by SRM and the contact with knowledgeable personnel in my placement. This gave a better understanding of the processes currently used, which allowed me to gain a greater grasp of the subject area. Also access was gained during placement to potential data in the form of contract and tender risk registers from various Highway works undertaken by SRM. The aim, objectives and hypothesis came about from carrying out the literary research, it wasnt until that point that the information was collected, and a plan formulated of how to use it. The research aimed to understand how the pre-tender risk process may be inaccurate. After that considering how it could be improved and whether it was possible to do so. Subsequently, recording any conclusions of pre-tender process in order to develop and better it. 1.3 Aim, Objectives and Hypothesis 1.3.1 Aim To see whether the post contract risk process identifies significant additional risks that the pre-tender risk process failed to identify and thus determine how inaccurate the pre-tender risk process is. 1.3.2 Objectives Identify processes currently used to manage risks at post contract and pre tender stage in recognising and measuring risks. Analyse whether the key additional post contract risks identified were included at pre-tender stage. Compare SRMs risk management processes with other contractors and analyse to find the best solution. If possible, note any resulting conclusions and input results into the pre-tender risk process to produce a new accurate tender risk management. 1.3.3 Hypothesis The post contract risk process in Highway construction successfully identifies additional risks and as a result pre-tender appraisal is inaccurate. 1.4 Overview of work done / Methodology 1.4.1 Literature Review In order to understand the processes used to manage risk in the industry a literary review was embarked on. This meant the research would gain an appreciation of how risk is perceived by the industry, as prior to this my personal experience had only come from SRMs perspective and the processes they use. In order to gain real understanding and to funnel clearly on what my hypothesis stated, it was decided to split the literature review into two sections. One section, comprising of processes used by industry, taken from an assortment of books. The second section being that of SRMs highways process and accompanying documents. This makes it possible for an assessment to be conducted between SRM and the other contractors, so as to gain a better view of how Risk management at different stages of a contract work in Highway works. 1.4.2 SRM Projects The 3 SRM projects looked at were M1 J25-28, A19 upgrade (both Highways Agency) and M74 Glasgow council, they were all Highway maintenance contracts although they differ slightly. A19 was Term Maintenance Contract (TMC) whereas M1 J25-28 and M74 upgrade were (MAC) contracts. When examining the A19 upgrade the contract risk register was acquired but the tender risk register for this contract was not. However the contract risk register for this project was compared with a tender risk register from another contract. Not ideal but the only solution at the time. The majority of the risks are common and on most projects registers, so comparable/related risks were drawn from the tender register, and included in the A19 contract risk register. An evaluation was done involving the contract risk costs, and tender risks. This was done by incorporating the maximum, minimum, most likely costs and the probabilities from contract and tender appraisals. A total assessment for each risk occurred via averaging the maximum, minimum and most likely costs then multiplied by probability of risk occurrence. All risks types were identified, in order to distinguish trends in risks identified at pre-tender stage and found at post-contract stage or were not found at all. The M74 contract risk register was distinctive to M1 J25-28 and A19 upgrade registers as it didnt contain costs. Every risk was divided by its probability and impact, whether that was high, medium or low assessment. Having a pre-tender risk register for this project, meant risks were matched up with the contract risks. Assessing if each risk was covered was done by assigning costs and probabilities to every risk. To find the overall assessment, the probability and cost were multiplied. These costs were then evaluated against the overall pre-tender costs, as with the A19 upgrade. 1.4.3 Interviews Interviews via telephone were conducted with a few companies to really see what processes are used at post contract and pre-tender. Also to find out how precise these methods are. Companies interviewed were: Morgan EST. Vinci Balfour Beatty May Guerney 1.5 Overview of main conclusions The data and analysis carried out imply there is data to sustain in part the hypothesis. This is due to a large number of risks being identified in contract stage that were not previously seen at pre-tender. Even though assessments for any one risk were fairly inaccurate, the overall assessments for pre-tender and post-contract stage were close. Showing that the pre-tender risk process is inaccurate and needed improving if assessments and risk management is to become more reliable. 1.6 Guide to the report Chapter by Chapter overview of report: 1 Introduction An opening on risk management in relation to the project and validates the basis for choosing the subject area. It also states the aims, objectives and hypothesis which the project is established upon, as well as outlining the work done and an overview of the Conclusions. 2 Methodology Explains the methods used to investigate my hypothesis, from Literature review, approaches used data collection, analysis and interpretation of results. This describes the reasons for using the methods chosen and any research boundaries/ limitations. 3 Literature Review This chapter contains my understanding and background reading for the subject area. This was done by, studying the risk process used in management. Allowing a greater comprehension of risk in Highways work, and how its viewed and used. 4 Results and Analysis Confirms the results of the research, and the subsequent analysis for the SRM projects and other contractors interviews. It outlines the assessment made concerning the pre-tender risk register and the post contract risk registers. From this it then cross-examines the data so as to be able to test the hypothesis. 6 Conclusions and Recommendations This analyses all the results in relation to the hypothesis and whether they support it or not. It details any limitations that affected the project, while also imparting proposals for both industry and any future dissertations. 2 Methodology 2.1 Introduction The methodology was vital to the accomplishments of research and was dealt with care in order for the most appropriate research methods to be chosen (Fellows and Liu, 2008). The methodology outcome depended on the subject area, research aims and amount of literature review obtained. For data collection and analysis, the methods employed ought to be realising the aims and objectives so as to continually test the hypothesis and validate the research. The information that was obtainable and available played a huge role, as work on the dissertation could not be done if the information wasnt relevant. The information therefore can be decided by the hypothesis, as if the information is not on hand then one cant trial the hypothesis. Due to these factors, risk management was identified as an appropriate topic from the beginning, but it wasnt until the research was started that defining the hypothesis was possible, yet having an impression of the aims and objectives that were to be accomplished. From the off, the aim was to gauge how precise pre-tender risk management was, even if unsure of the data and information existing prior to consulting SRM team. Ultimately this section highlights the research methods utilised in the research, and the close association that has been made when doing so between the methods and Aim, hypothesis and objectives. 2.2 Aim Employed to help concentrate the methodology in choosing the right methods, also to clarify to the person who reads the dissertation what precisely is being investigated. So this shall be done by recalling the Aim set out: To see whether the post contract risk process identifies key additional risks that the pre-tender risk process failed to identify and thus determine how inaccurate pre-tender risk process is. 2.3 Quantitative and Qualitative methods In Data collection there are two key styles; quantitative and qualitative forms of research. Quantitative being the collection of data measured with figures and analysed with statistical trials in order to to test the hypothesis (Creswell, 1994). While Qualitative research is quite different, it is a method that uses meanings, experiences and descriptions (Naoum, 2007). Quantitative research can be easier to examine as it creates measurable/quantified outcomes that can create analytical arithmetical results. While, qualitative information from research has a tendency to be complicated as it often requires researcher input and manipulation to ensure its appropriate for investigative procedures (Fellows and Liu, 2008). The research methods depend on the information obtainable and the aim of the research. In carrying out good piece of research, its generally required and essential to use both quantitative and qualitative. A combination of methods was used, to enable the correct and more reliable conclusions; more is detailed further in this section. 2.4 Literature Review A literature review was undertaken; to provide the core subject knowledge of risk management in construction. The idea was to comprehend how risk is analysed in the construction sector, and the procedures used in controlling it. Next research was done to discover how risk is managed, by using literature in form of books and journals. Then see SRMs risk management process from their risk management documentation. Dividing the literature review in two sections meant that one of the objectives could be fulfilled by comparing SRMs risk management approach with other construction companies. Overall the literature review gave a greater understanding of the chosen topic of risk, and illustrated the problems and successes in risk management. While also showing the diverse and numerous ways in managing risk, and how the approach identified and selected can depend on many factors such as project size, contract used and size of companies involved in the managing of the project. The list literature sources below were used in delivering the dissertation: Textbooks -were very useful in gaining the relevant knowledge of risk management, and procedures used. Books were found by searching Loughborough Universitys library database. Chapters needed or thought appropriate were studied, and compared against searches that had been made on the internet. A check system, which assessed the validity of both sources of information against each other. With much of the research it became apparent that information in books available werent current especially in the older series of books. Despite this it wasnt a predicament for Risk management as texts of up to ten years old were and are significant and applicable now, with some techniques having improved. The books allowed for great comparison for up to date information on the internet. Journals were again located on the Loughborough University library database, which with the relevant buzz words located material of use. Finding journals proved difficult in comparison to textbook numbers, yet the sources were helpful. Internet supplied a platform for research of literature. Being easy to use and handy, collating information could be done at speed and with relative ease. It allowed greater understanding of what type of book would be needed from the library. Information from the internet was important but it had its limits and it was vital to know that it can be inaccurate and cause misguidance, research can be more guaranteed with text and journals. This way of thinking about limitations in using the internet was in mind when searching websites on risk in the construction. Finding various helpful websites any information was compared other websites in order to increase reliability, but most importantly against book and journals. As with all research appropriate sources of reliability were identified and used like the RICS website. Two editorials from RICS site provided constructive, and were used in the literature review. In finding books the internet was most useful as many articles on websites h ighlighted book of particular relevance and use. SRMs Risk Management Procedures document SRMs risk management procedure document was used as section two of the literature review. Reading through the document and important information was used in the literature review, particularly, on the processes used by SRM in risk management. A comparison was made between SRMs procedures and with those found in the first half of the literature review. 2.5 Data Collection When actually collecting the data for the research the collection was again split into two parts. The initial data collection was from SRM projects, other data collection was associated to other contractors. The intention was to compare the risk procedures, and attempt at analysing which was the superior one. The next section shows how all the data collection was collected and prepared. 2.5.1 SRM Projects The data for SRM projects was collected during a placement year, when working in the relevant packages and job roles. Prior to any data collection, discussions with line managers and seniors took place in order to help formulate and aid the research as what would be required in terms of data. At this stage no hypothesis had been decided, the idea was to assess the accuracy of pre-tender risk assessments. It was therefore recommended that the applicable information in the form pre-tender and post contract risk registers could be provided. The contracts that would be made available were the M1 J25-28 scheme, A19 upgrade and M74 Glasgow project. Three similar Motorway/road maintenance projects that differ from each other contractually. A19 upgrade is a TMC to maintain, operate a network of strategic roads in the North East. M1 J25-28 and M74 are both MAC contracts for similar maintenance one in the midlands and the latter in Glasgow. A19 upgrade and M1 J25-28 are HA run, while M74 is for the Glasgow city council. The HA run their contracts by splitting their contracts into 13 sections in the UK, and in these projects cases offer for the extension and maintenance of the roads within these sections. The reason that A19 upgrade was a TMC but M1 J25-28 and M74 MAC contracts is previous to the MAC HA projects were also run with the TMC contract, but now all is done under MAC style. The contracts run for 5 years with optional extensions. Different sections of maintenance start and end at different areas on the motorway in question over a 5 year cycle, meaning that when MAC contracts were first used, some sections werent using them and using TMC etc A19 upgrade was a TMCs completed in 2009, whereas M1 J25-28 scheme was a mew MAC contracts just seeing completion in late 2010. The difference in TMCs and MAC contracts is TMCs two separate companies, one as managing agent the other as main contractor. MAC contracts are one company, who runs as both the contractor and managing agent. Using the three contracts as the basis for the research the risk manager on the placement at SRM started off by providing a tender risk register for the M1 J25-28 and A19 contract, projects he had involvement on. Trying to find tender risk registers for M74 was problematic but couldnt find any. In order to have a full complete analysis, it was decided that for M74 to use another MAC contract tender risk register. This was exactly the same as M74 except the location geographically. For sure this would create limitations but it was decided, it would possible to use the risk register as SRM tend to re-use the risk register from preceding bids for specific contracts. So similarities would be high and that as long as it was noted in the dissertation as to its use and reasons why. Due to the generic nature of the risks they were deemed suitable as with what SRM do in practice. While on placement working on the M1 J25-28 contract meant developing contacts with people in the relevant field of risk management. Therefore requesting the use of the risk register on M1 job was easier than the other projects. The A19 contract risk register was also obtained contracts at work so. Finally also getting the M74 contract risk register, because although never having worked on this contract the line manager on my placement gave contact details of relevant personnel to enquire with and the registers were duly emailed. 2.5.2 Other Contractors Obtaining data via contractors in the sector of road maintenance was much more difficult than from SRM sources, as they were very protective of information they gave out. All the projects obtained so far from SRM contracts were Highways related, so the focus was on trying to collect data from Highway contractors. By doing this it would allow for a honest comparison between SRM and other contractors. Processes to manage risk are expected to be similar involving different construction projects; the data was likely to be different. The plan was to send questionnaires to the chosen contractors, but after unsuccessful returns it became apparent that another route would be needed, so interviews via telephone were deemed suitable. It seemed with written questionnaires, companies were more likely to ignore them, whereas on the phone they would respond to the questions asked immediately, with no real confusion of what the question was asking as myself in person could explain. The Highway contractors contacted were: Morgan est. Vinci Balfour Beatty May Guerney A semi-structured set of questions was planned in order to gain the information required but also allowed telephone participant to elaborate and discuss the subject in a friendly professional manner. Contractors in Highways works were contacted, the dissertation of Risk Management was explained with the aims and objectives that needed to be achieved and the following questions were asked: Do you have a pre-tender risk management method? How do you detect risks in the pre-tender phase? How do you calculate risks to arrive at a total risk pot? Do you undertake risk management post-contract phase? Could I obtain a pre-tender risk analysis and post contract risk analysis for my research use (for the Highways project you are on)? To each conversation it was explained that my aim was; compare the risks types at tender stage with contract stage as well as assessments made. The questions were supposed to identify the processes companies used in managing risks. Overall the different companies were helpful in answering these questions. The Fifth and final question was done to get registers like that gained from SRM. It was the only difficult part as many refused to hand registers over from live projects due to the sensitivity of their data and company policies. However some registers were received but didnt really contain the crucial information required just a formatted company risk register. Throughout the interviews, notes were made on the first four questions and the results put into a table at the time of the interview showing the company and their response to each question. Thus, making analysis easier when looking at the responses later in the dissertation. 2.6 Data Analysis Prior to data analysis, the research had assessed how SRM price risks because of the literature review and looking at the risk registers. It was crucial to identify this before undertaking the data analysis as it established what type of analysis would be carried out, and therefore detailed below. Upon formulating the risks that have been identified each risk will be categorised with minimum, maximum, most likely value and probability. Done for all of the risks, the information is put into a piece of simulation software called @ RISK which does hundreds to thousands of simulations, and creates a graph with a bell-shaped curve. The 75th percentile is put in the bid as the risk potential. SRM do this for all of their projects. For this dissertation we were concerned in the risks were identified and the individual costing of each risk as shown in paragraph above with min, max etc. The focal point being what was keyed in to @ RISK as opposed to what it produces. For the Data analysis the SRM contracts have been split into their individual projects and the Other Highway contractors. The reason for splitting the SRMs projects is that the analysis varied in parts by way it had been collected as mentioned earlier (some with full risk registers some in part). 2.6.1 M1 J25-28s scheme and M74 Glasgow Analysis for M1 and M74 projects were pretty much the same. The M1 contract and tender risk register could be compared with the contract and tender risk register for the M74 contract, due to them both being Macs. To evaluate the accuracy of the risk assessments, comparable risks to the contract register, were removed from the tender register, put against the matching risk in the contract register. When comparing values in matching risks, it was vital to have a total cost for risks in both the contract and pre-tender register. The best and most impartial way to do this for the pre-tender risk register was to take the average from the maximum, minimum and most likely figures and multiply the probability. The maximum, minimum and most likely values are the range of potential expenses that could be incurred by the risk, and any total cost was decided to be an average of these, as all projects had them. As its unknown as to its actually occurrence the average should be multiplied by the probability, which gives a total potential cost to the risk. While the contract risk registers should be considered by severity and possibility by scale of 1-5, and then an assessment of the risk is undertaken, figuring out the minimum, maximum and most likely values of each risk. Mitigation measures are identified for each risk, and then assessment is done again as before the mitigation. The M74 contract risk register did not have minimum cost of the risks, so all risks were assumed to be zero. Without any minimum values any overall assessments of the risk would not have been made. The reason for not using the likely value instead was so the data would use a range of values. It was decided greater accuracy would be found in setting the minimum as zero and range of values than the most likely. By setting all its risks as zero means they are an unimportant minimum value or a risk/event that doesnt happen. The M1 contract register had all the necessary values so no intervention was needed. Both contract risk registers failed to show any probability, just a likelihood scale from 1-5. Therefore it was assumed, giving the scale a percentage as would normally be done: 1 10% 2 30% 3 50% 4 70% 5 90% These percentages were used because they provided a suitable range, as risks with low likelihoods (1) are unlikely to occur but not impossible so 10% seemed a reasonable percentage. Similarly 90% seemed a reasonable percentage for high likelihoods (5) as they are likely to occur but not certain. The other values were then evenly distributed between 10% and 90%. Having made these assumptions the overall assessment for contract risks was made in the same way as the tender risks, finding the average of the maximum, minimum and most likely and multiplying this by the probability. Where the same tender risk was identified as being applicable to more than one contract risk the overall assessment was divided by the number of contract risks it was applicable to. This was because when these values were totalled there would be double counting of these tender risks if this was not done. To show this information a table was created showing; a list of contract risks, the corresponding tender risks, raw data inputted into the risk registers, and the overall assessments. I then split the contract risks into one of the following categories: Not identified but covered (No cost). Not identified and not covered should be identified. Not identified cannot be identified. Identified and covered. Identified but not covered. Each risk was grouped by colour to state which category from above it fell in. 2.6.2 A19 upgrade The analysis for the A19 contract was started off in the same way as had been done for the M1 J25-28 and M74 contracts, going through the contract risk register and identifying any similar risks from the tender risk register. The assessments for the overall cost for the tender risks were made in exactly the same way, by taking the average of the maximum, minimum and most likely values and multiplying this by the probability. This was because the tender risk registers were in exactly the same format. However the differences came when the assessments of the overall cost for the contract risks were made. This was because for this project, the contract risk register assessed the risks in a different way to the Area 6 and Area 13 contract risk registers. This difference was that there were no costs in the A19 risk register. Instead the risks identified at contract stage were assessed in terms of likelihood and impact on a scale of high, medium and low. This meant that assessing the overall cost for the contract risks were harder because there was no costs given. Therefore the only way to assess the overall cost of the risk was to give the risk a cost and a probability based on whether it was high, medium or low and then multiply these two figures together. This means that deciding what costs and probabilities to assign to each level of risk was important, as the overall assessment was dependent upon these assumptions. In terms of what costs to give for each level of impact, the risk matrix that SRM use for prioritising risks was referred to. They assess the impact and probability of each risk using a 1-5 scale and they give the parameters for impact as being: 1 under  £1,000 2  £1,000  £10,000 3  £10,000  £100,000 4  £100,000  £1,000,000 5 Over  £1,000,000 As this was a 1-5 scale and the risks and the contract risks were only divided into high medium and low, the figures for 1 and 5 was as too extreme both ways. For low risks I decided to take the high point of a risk impact of 2 ( £10,000) and for high risks I took the low point of a risk impact of 4 ( £100,000). For medium risks I took the midpoint between these two values ( £55,000). Using these figures seemed reasonable based upon this scale, as it created enough of a range without a too big range. For the probabilities, the likelihood scale they use was based on descriptions rather than probabilities. From knowledge in research the probabilities for low were set at 10%, medium risks 50% and high risks 90%. These percentages were used because they provided a suitable range, as risks with low likelihoods are unlikely to occur but not impossible, so 10% seemed a reasonable percentage. Similarly 90% seemed a reasonable percentage for high risks, as they are likely to occur but not certain. For medium risks the midpoint between these two percentages (50%) was used, because they are possible to occur. The cost was then multiplied by the probability to give an overall value for each risk. Following this, the rest of my analysis was exactly the same as the M1 J25-28 and M74 contracts 2.6.3 Further Analysis Explanation This section so far details how the risk registers were compared, which was the first step in terms of analysing the data, and these tables are included in the appendices at the end of this dissertation. However on there own, these tables did not give sufficient information to be able to test my hypothesis. Firstly, to interrogate how accurate the identification of the risks was, the risks that were identified, and were not identified and not commercially covered, were filtered out, and lists were made of these risks. As this was done, each risk was put into a category to see if there were particular categories that are, and are not identified at tender stage. To analyse this, tables were created for risks identified and not identified, detailing the categories of risks, and the number of risks in each category. From these tables, two pie charts were drawn to show this information graphically. To analyse the assessment of the risks, a summary table was firstly drawn to show the number of contract risks in the following categories, and the total assessments relating to these risks: Not identified but covered (No cost). Not identified and not covered should be identified. Not identified cannot be identified. Identified and covered.

Wednesday, November 13, 2019

Pollution and Culture in Greenland :: Greenland Environment Ecology Pollute Essays

Greenland is contaminated with considerable amounts of pollution, caused by large-scale atmospheric circulations, especially in winter. The pollutants in the Arctic are primarily sulfur, which is highly acidic, in both gas and aerosol form. Most of these pollutants are from anthropogenic sources deriving mainly from industrialized areas in the Eurasian continent. In addition to threatening environmental stability, pollution is speeding the unraveling of traditional Inuit culture in Greenland. Climate change is affecting the entire world, yet Greenland is especially sensitive to slight fluctuations due to its dependency of the natives’ traditional lifestyles on the environment. Melting ice and permafrost restrict access to hunting grounds making a traditional way of life consisting of hunting seal and caribou more difficult.2 Every four years, the Inuit living in Greenland, Canada, Alaska, and Siberia convene the Inuit Circumpolar Conference (ICC) to discuss issues of concern. The ICC lobbied successfully to ban a dozen organic pollutants, carried north by winds, that do not evaporate in the Arctic cold. These pollutants were infecting meat and berries, staples of the Inuit diet, as well as the breast milk of nursing mothers.3 There are many more problems facing the sustainability of Greenland, such as trans-boundary pollution and the fact that the Inuit are not an effective lobbying group due to differences in culture, dialect, and lack of communication. In November of 2004, a report by 250 scientists warned that the Arctic is warming twice as fast as the global average, which threatens to wipe out several species including polar bears, and melt summer ice around the North Pole by 2100.4 One of the reasons for the increased warming is that the dark water and ground in the arctic soak up more heat from the atmosphere than ice or snow. The levels of carbon dioxide today are about 379ppm and increasing, a comparable level to 55 million years ago when there was no ice on the planet due to the warmth of the atmosphere.5 If the Greenland ice cap melts, the sea level will rise six or seven meters. Although this is a worst-case scenario, it seems clear that steps must be taken to reduce the concentration of carbon dioxide and other pollutants in our atmosphere. Investigations of pollutants in Greenland during the past fifteen years show that the troposphere is burdened with high levels of trans-boundary pollution. The major anthropogenic contributors to this â€Å"Arctic haze† are central Europe, and northern Russia.

Monday, November 11, 2019

Women in the War

1. In Britain in 1914 and before, women were thought of as second class citizens. Women had few privileges that men had; they were down upon by men. Women's employment opportunities were limited and their pay was considerably less than a man's. All this was due to strong discrimination about women being of less importance and intelligence, the general view was traditional one which inferred that women should be housewives. Only one third of women were in paid employment. However there were differences between the jobs they did because of their class. Middle class and Working class women did very different jobs. Working class women worked in more manual, and labour intensive jobs. Whilst Middle class did more intellectual jobs. So we already know that there were clear distinctions between the jobs the women of different classes did. Working class women mostly did domestic services such as cleaning or being servants for the rich. They had to work in poor conditions and were subjected to long working hours. On top of this they received criticism, low wages and got little time off. A major employer was the textiles industry in which women could supervise, yet men often get these jobs. Women also made clothes and dresses, or jewellery or painted ornaments. Middle class women experienced better working conditions. These women were more likely to work as teachers, nurses, secretaries and shop assistants. Women had no political vote and were looked down on as inferior to men. Before 1914 jobs for women were limited and discouraged due to traditional beliefs about the role of women. Within this discrimination there was further discrimination between the classes of women. They were expected to manage the house. People were aware of this and a group called the Suffragettes voiced the opinion that equality should be imposed. This all changed when war broke out. 2. When war broke out the men went to war, this meant that they left their vacant jobs behind. The country was behind the war effort and all came together. Women were at first not allowed to fill the men's jobs, they were only allowed to knit and fundraise. People, including Emmeline Pankhurst, a leading Suffragette realised that women could help more. Pankhurst in July 1915 organised a ‘Right to Serve' march in which 60 000 women took part. There was also an increasing demand for shells due to shortages on the front line. Lloyd George, the Minister of Munitions had to negotiate with trade unions to let women work. They came to a deal known as the ‘Treasury Agreements'. Women began to work in industrial employment; they began manufacturing munitions and shells. The government backed Pankhurst further by giving them à ¯Ã‚ ¿Ã‚ ½3000 to organise processions. Also the women war register was established; it contained all the names of women wanting to help. Also more jobs needed filling when, in early 1916 the government introduced conscription as they realised they were in for the long slog. The war wouldn't be over any time soon. Vigorous campaigning ensued with extensive propaganda encouraging women to work instead of men in industry, farming and the armed services. As a result of increased levels of women working birth rates were falling, this was because women were worried about raising children during wartime. So to ease worries, the government increased the number of child welfare centres so that children and babies had a place where they could be cared for. Female employment levels rose massively due to encouragement, campaigning and thanks to the women's will to help the country win the war. Another reason is because men had to go fight on the frontlines so in order to keep up the production of munitions and shells, the women had to fill in the men's jobs. 3. Before the war women were limited to working in textiles even though they were paid at a fraction of the money that men were. Only a third of women were in paid employment. There were strict traditional rules in society which made it clear that some jobs were purely a certain gender. Women of a lower class had to generally work as domestic services for the rich and middle class women worked doing clerical work and teaching. Women were seen as 2nd class citizens. When the war broke out the men left to go to war meaning that there were vacant jobs that needed to be filled. At first the government were reluctant, but later they realised that women could make a big difference. Protests organised by the Suffragettes encouraged women to work. Women worked in industry, medical and many new areas of employment now. Women though were still treated badly, underpaid and overworked. Some men resented the women and say them as inferior. More positively though is that women became freer and some women over 30 could vote. After 4 years of war, it was over; the allies had won and the men returned home. Women were pressured to leave their jobs for the men and go back to their old jobs, mostly housekeeping. Women did leave work and female employment levels returned to what they were before 1914. The jobs that women worked in changed slightly though as more women worked in areas such as law and medicine, pay did also improve. In the short term it looked like not much had changed, things were back to normal. Women were still paid less and weren't promoted above men. However in the long run World War 1 changed the role of women and had a massive impact as they earned the respect and privileges that they deserved for their contributions. It had been made clear that women were capable of many things that men could do and over time the mood changed regarding what women could and should do.

Friday, November 8, 2019

Free Essays on Creation

"The Creation" by James Weldon Johnson is poetry about God almighty created what we know as life. As, God stepped out onto space he said he was "lonely". Next, he said to himself that he would make him a world. So, god started putting the pieces together to make his perfect world. Secondly, God smiled then light appeared. Then, God reached out and grabbed the light and rolled it up in his hand until he made the sun. "After he sent the sun to the heavens, the light that was remaining he gathered into a ball, and threw it at the darkness and made night with moon and stars." Next, "God created many things such as lightning, thunder, rain, grass, flowers, rivers, sea, birds, beasts, forests, and woods." After all of Gods creation he was still lonely in his New World. So, God decided to create man. Then, he sat down and scooped up some clay and shaped it in his own image. Next, he blew his breath of life onto the clay and man became a living thing soul. We all know that the book of "Genesis" is the first sign of creation and it also describes the creation of the world like the poem by James Weldon Johnson. Basically, it's the same, but a little different. The only things that are different to me is that god was more vocal in the book of "Genesis". When God wanted something or he wanted something to happen he just spoke upon it. For example, when he said "let there be light", and there was light. And in the poem by James Weldon Johnson the lord seem to do everything by hand.... Free Essays on Creation Free Essays on Creation "The Creation" by James Weldon Johnson is poetry about God almighty created what we know as life. As, God stepped out onto space he said he was "lonely". Next, he said to himself that he would make him a world. So, god started putting the pieces together to make his perfect world. Secondly, God smiled then light appeared. Then, God reached out and grabbed the light and rolled it up in his hand until he made the sun. "After he sent the sun to the heavens, the light that was remaining he gathered into a ball, and threw it at the darkness and made night with moon and stars." Next, "God created many things such as lightning, thunder, rain, grass, flowers, rivers, sea, birds, beasts, forests, and woods." After all of Gods creation he was still lonely in his New World. So, God decided to create man. Then, he sat down and scooped up some clay and shaped it in his own image. Next, he blew his breath of life onto the clay and man became a living thing soul. We all know that the book of "Genesis" is the first sign of creation and it also describes the creation of the world like the poem by James Weldon Johnson. Basically, it's the same, but a little different. The only things that are different to me is that god was more vocal in the book of "Genesis". When God wanted something or he wanted something to happen he just spoke upon it. For example, when he said "let there be light", and there was light. And in the poem by James Weldon Johnson the lord seem to do everything by hand.... Free Essays on Creation Outline Title: Creation vs. Evolution or Scientific Creation Thesis: Creation vs. Evolution has been a hot topic with society for centuries. Just recently, in the mid-1980’s an new kid came on the block, Scientific Creation. Purpose: The following will show the main ideas of Creation, Evolution, and Scientific Creation. I will also show why I believe in Creation and what aspects of Evolution and Scientific Creation help me to confirm this belief. Creation vs. Evolution or Scientific Creation The cosmos, whether you believe in Creation, Evolution, or Scientific Creation is a very interesting subject. Creation, as documented in the Bible in Genesis 1:1 states that â€Å"In the beginning God created the heavens and the earth.† It shows that God created the universe and all living things out of love, in a particular order, and with a particular purpose. Evolution portrays the origin of life as starting out with the â€Å"big bang†. The collision of two atmospheres, b oth atmospheres having the ability to create life as we know it. Scientific Creation is not based on Genesis or any religious teaching. Scientific Creation is based on the scientific data, which supports Creation. According to Henry M. Morris, the difference between Scientific Creation and Biblical Creation is â€Å"the first is based solely on scientific evidence, from such sciences as genetics, geology, thermodynamics and paleontology; the second is based on Biblical teachings.† In examining the above beliefs, Creation, Evolution and Scientific Creation, I view Scientific Creation as an attempt to make a lateral connection between Evolution and Creation. The theory that all living creatures came out of the â€Å"big bang† (according to Evolution) is too far of a stretch to the imagination for me. If all animals, insects and human beings were created due this collision and through an evolutionary process, then one would think that we would all be related genetically. Where does o... Free Essays on Creation A Comparison of the Creation Stories of Hindu, Greek, and Norse Mythology There are many different creation stories from around the world. I’m going to describe three stories from different beliefs. The first is the story of the Hindu religion. Then I’ll tell you about the Greek myths. The Norse myths are also very interesting. They all have different creation stories, but share same elements. The Hindu religion is a very interesting one, and its creation story only makes it more so. According to the Rig-Veda, creation begins in a state of hollow darkness; nothingness does not even exist. There is only one, one who breathes without air, and lives without tangible nourishment. He is Brahman, â€Å"that one,† and he is the essence of all beings. Desire came to him to produce new creatures, and he wanted to make them out of his own body. He created the waters, put his seed in them, and the seed swelled into a golden egg from which he himself was born. The upper half of the seed became the heavens, and the lower half became the earth. That is how the Hindu beginning began. In Judaism, creation begins with God. He alone created the heaven and earth. The earth was like that of the Hindus, a dark, shapeless void. Then God created light, which he separated from the dark, and from these he created day and night. He then made a firmament that he named Heaven. He brought dry land, fruitful plants, and two great lights to rule over day and night. He then brought forth moving creatures of land and sea. Finally, he made man in his own image to rule over the beasts. That is how the Genesis tells of this beginning....

Wednesday, November 6, 2019

Scope - Definition for the Java Term

Scope - Definition for the Java Term Scope refers to the lifetime and accessibility of a variable. How large the scope is depends on where a variable is declared. For example, if a variable is declared at the top of a class then it will accessible to all of the class methods. If it’s declared in a method then it can only be used in that method. For more information, have a look at the Understanding Variable Scope and Using Modifiers With Variables. Examples: For example, the scope of the variableNUMBER_OF_HOURS_IN_A_DAY is the whole class. Whereas the scope of NUMBER_OF_DAYS_IN_A_WEEK is just the calculateHoursInWeeks method: public class AllAboutHours{ private final int NUMBER_OF_HOURS_IN_A_DAY 24; public int calculateHoursInDays(int days) { return days * NUMBER_OF_HOURS_IN_A_DAY; } public int calculateHoursInWeeks(int weeks) { final int NUMBER_OF_DAYS_IN_A_WEEK 7; return weeks * NUMBER_OF_DAYS_IN_A_WEEK * NUMBER_OF_HOURS_IN_A_DAY; }}

Monday, November 4, 2019

Case study (Cost Analysis) Example | Topics and Well Written Essays - 750 words

(Cost Analysis) - Case Study Example It is essential for the Chief financial officer to develop a budget that retain and influence doctors input. Managing the physicians could be adequately done by proper management of time so that those who may seek to make more money do not do it at the expense of BCH. As a CFO, the management can be effected by converting hospital staff’s net paid days worked to a factor. BCH CFO Office is open and staffed seven days a week, per as a work agreement with a well managed care plans. The office manager prepares a worksheet, which displays 9 holidays, 15 vacation days, 7 sick days, and 3 education days, equaling thirty four paid days per year not worked. The physicians’ cluster allows 5 sick days, 8 holidays, and 1 education day. A physician must work one full year to receive 5 vacation days. An employee ought to have worked full time for 3 full years before getting 10 annual holiday days. This is a cost effective approach that can be implemented to allow physicians get comm itted (Nowicki, 2008). As a CFO, the iron triangle of health care must be implemented to cater for the physicians, patients and organization. Health policy analysts normally refer to an iron triangle of healthiness. The three edges of the triangle are the quality, cost, and accessibility of care. This means that, in equilibrium, improving the performance of the health care organization along any one of these perspective can compromise one or both of the other aspects, regardless of the quantity that is spent on health care (Zelman, McCue, & Glick, 2009). Such tradeoffs are not frequently required, of course. For instance, tying payments to physicians to the quality of services offered could improve providers’ enticement to contain costs and progress quality. As a CFO, cost effective programs implementation is essential. Dealing with hospitalist issues Hospitalist is the term applied for physicians who are specialized in the care of sick clients in the hospital. This movement was started about ten years ago and has transformed due to many factors. These factors include; convenience, cost-effectiveness for hospitals, financial strains on primary care doctors, efficiency, patient safety, and need for more dedicated and synchronized care for hospitalized patients. As a CFO, funds must be budgeted to enable implementation of the hospitalist. Financial costs Cost accounting system; Bobcat Community Hospital has a strong billing and collection constituents but a weak cost accounting coordination. Financial incentives have always maximized on reimbursement but not in controlling costs (Brent, 2003). The cost of implementing this would not change the 2010 budgetary

Friday, November 1, 2019

Social Media Essay Example | Topics and Well Written Essays - 250 words

Social Media - Essay Example Although seeing them in person is entirely different, pictures, posts and other information made available through social networks create a feeling of being physically present in another world. Of course, with the many benefits computers and the internet brought to modern living, there are also dangers that come along with them. Internet users usually worry about identity theft, scams and other threats that may endanger one’s self or even children. For every problem that is created though, it is comforting to know that there is always a weapon that can also be created to fight these dangers online. Antivirus is an example of which, also easily available online at a certain price. Although the most important weapon there could possibly be against internet crimes is being well informed and knowledgeable about the kinds of dangers, how to avoid them and how to escape them just in case one is already trapped in a scam. Since one cannot avoid the internet these days, with more activities perceived to be done online in the future, the best weapon indeed is to be at par with the changing world. Certainly, the demand to learn new things everyday is a challenge however, as f or this writer, it is a