Friday, November 29, 2019

The Gospel Of Mark Analysis Essay Example For Students

The Gospel Of Mark Analysis Essay Jesus Christ lived a very full, if short, life. He did and accomplished more in his thirty years than many men do in twice that. The gospels each tell their versions of his life. Of the four, I found the gospel of Mark to be the most interesting. I enjoy the style of writing in this gospel more than the others. I feel it gives a better summary of the events in Christs life. Whereas the other gospels tend to get bogged down with parables or spend too much time on specific events, the gospel of Mark moves along at a good pace and adequately gets the message across. We will write a custom essay on The Gospel Of Mark Analysis specifically for you for only $16.38 $13.9/page Order now A majority of Mark deals with Christs travels throughout the area around the Sea of Galilee and the various miracles he performed during that time. Most of these involved healing those with leprosy or other plagues, exorcising demons, or curing the blind/deaf/dumb. The stories of Christ feeding thousands with but a few loaves of bread and a couple of fish are also told, as is the story of Jesus walking on water. All of the miracles are described well, without getting too wordy. The style of writing also makes them believable. Only a handful of Christs parables are included in Mark. One speaks of how the sower soweth the word. In this parable, Jesus speaks of himself as a sower and compares spreading the Word of God to planting seeds (the Word being the seeds). He also compares people to the different types of ground you can plant seeds in. At the end of the parable, Christ says that any man who spreads the seed also spreads the kingdom of God, and any man that withholds the seed shall see the kingdom of God withheld from him (Mark 4:24-26). This is a beautifully written passage. Without coming out and saying, it, Christ makes it apparent that its not enough to merely worship; one must also go out and preach to the unsaved and try to help them see the light. Another parable tells of the rich young man who asks Christ how he may attain the kingdom of God. Christ asks if he as followed the Ten Commandments, and the young man says he has. Then Christ tells him that he has to give all his possessions to the poor because he will have no need of such things in Heaven. This saddens the young man because he has many possessions. After the young man left, Christ told his disciples that it is difficult for the rich to get into Heaven because they put too much faith into their riches. It is easier for a camel to go through the eye of a needle, than for a rich man to enter into the kingdom of God, (Mark 10:25). This is a poignant message. Christ then says that a man who gives up everything for his faith will be well rewarded in Heaven. This parable is timeless. It speaks of the downfall greed can force upon you. In the end, no matter how much you have, you cant take it with you. One of the most widely told stories of Jesus is written in Mark. Upon visiting the Temple in Jerusalem, Christ finds it is overrun with merchants and moneychangers. Enraged, Jesus overturns the tables and calls the temple a den of thieves. This angered the priests and scribes of the city, and they sought to destroy Jesus. Perhaps it was this act, above all others, that truly set the priests in motion to bring about Christs death. The last two chapters of Mark tell of Christs trial before Pilate, his crucifixion, and his resurrection. This was perhaps the only part of the gospel that I felt was rushed. Surprisingly little (in this gospel) is written about such an important series of events, especially where the resurrection was concerned. I feel this takes away from the importance and overall effect of Christs return. .u178099b151d785e18b0305c98d1a4aef , .u178099b151d785e18b0305c98d1a4aef .postImageUrl , .u178099b151d785e18b0305c98d1a4aef .centered-text-area { min-height: 80px; position: relative; } .u178099b151d785e18b0305c98d1a4aef , .u178099b151d785e18b0305c98d1a4aef:hover , .u178099b151d785e18b0305c98d1a4aef:visited , .u178099b151d785e18b0305c98d1a4aef:active { border:0!important; } .u178099b151d785e18b0305c98d1a4aef .clearfix:after { content: ""; display: table; clear: both; } .u178099b151d785e18b0305c98d1a4aef { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u178099b151d785e18b0305c98d1a4aef:active , .u178099b151d785e18b0305c98d1a4aef:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u178099b151d785e18b0305c98d1a4aef .centered-text-area { width: 100%; position: relative ; } .u178099b151d785e18b0305c98d1a4aef .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u178099b151d785e18b0305c98d1a4aef .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u178099b151d785e18b0305c98d1a4aef .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u178099b151d785e18b0305c98d1a4aef:hover .ctaButton { background-color: #34495E!important; } .u178099b151d785e18b0305c98d1a4aef .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u178099b151d785e18b0305c98d1a4aef .u178099b151d785e18b0305c98d1a4aef-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u178099b151d785e18b0305c98d1a4aef:after { content: ""; display: block; clear: both; } READ: Marriage And Aging EssayI look at the gospel of Mark more as a biographical sketch than anything else. While there is some dogma involved, it is held in check in favor of telling about the life of Jesus Christ. Because of a heavier emphasis on biography, I find that Mark is more believable then the other gospels. Words/ Pages : 744 / 24

Monday, November 25, 2019

How to handle your money if you know youre getting fired

How to handle your money if you know youre getting fired Sometimes firings or layoffs come out of the blue- you go into work one morning, thinking everything is fine, and then†¦blammo. Other times, you kinda know it’s coming. Maybe things aren’t going so well with your company or your industry, making layoffs a painful inevitability. Or maybe things just haven’t been going well for you personally, and you know it’s just a matter of time. Whatever the case may be, if you can see the writing on the wall and you want to make sure you’re preparing yourself, how do you tackle your immediate financial future? Don’t make huge purchases if you can avoid it.If you’re thinking of buying a house, investing in a friend’s startup, getting a new car, or whatever, reconsider your timeline. If you lose your job tomorrow and have to spend months on a job hunt, will you be able to afford this big extra expense? If this is something you can put off for at least a few months while you regroup profes sionally and financially, defer the investment.Know your state’s unemployment policies.Knowing what you’re going to get, unemployment-wise, will help you stay on top of your bills in the aftermath of getting fired.Come up with several different budgets.You probably already have some kind of a general budget in your life, but this is a crisis budget. Identify absolute necessities (like food, utilities, rent/mortgage), and make sure you have enough money to cover those first. The most important thing in your crisis budget is being realistic.It’s also helpful to come up with a few different scenarios for your budgets. For example, Budget A is the on you use if you’re unemployed for two months, with severance and unemployment. Budget B is the one where you’re unemployed for six months or longer, with severance and unemployment. Budget C can be the wildcard, if you’re unemployed longer, or don’t have severance or unemployment. If the axe h asn’t fallen yet, it’s important to consider all the different scenarios you might be facing, and plan accordingly to make sure your bills are covered.Get rid of unnecessary expenses and bills.Think about what you actually need in your life, and what are the â€Å"nice to have†s. Do you need cable, or could you get by for a few months with some kind of Netflix + Hulu combo? Do you go out to dinner or do takeout several times a week, when you could just as easily cook? It’s time to put serious thought into the costs that can be reduced or canceled.See if you can modify your bill payments.Some of your bills are likely non-negotiable, like electricity or food. Others may allow you to modify your payments based on financial hardship, like student loans. For any bills you’re currently paying, it’s worth the research to see if you can modify your payments on a short-term basis, if possible.Don’t panic and stop paying bills.The instinct can be to stop and hoard all the money, because the future is uncertain. And while you may be able to ride out the short-term pain of being late on bills, you’re seriously endangering the financial health of Future You. If you can make payments on schedule, do. You want to avoid future repercussions for your credit and finances if at all possible.Getting fired is traumatic and scary, but even if you know it’s coming, it’s essential to keep calm and prioritize your personal finances so that you can help yourself get back on track (or stay on track) as quickly as possible.

Friday, November 22, 2019

Choose a narrow topic of Public Relations within marketing Assignment

Choose a narrow topic of Public Relations within marketing communication, then write a critical review of theory relating to tha - Assignment Example According to various observations from different scholars, it has been identified that PR is regarded as one of the major, effective as well as versatile tools of marketing communication that enables to enhance as well as to develop the efficiency of each marketing activity. It can be executed by taking into concern both internal as well as external business environment of a specific organisation (Zerfass & Duhring, 2012; Xifra & Huertas, 2008). Based on the various literatures concerning determining the role and the significance of PR in the arena of marketing communication, the paper intends to critically analyse the contribution of public relation to the efficiency of marketing communication. The discussion of this report will mainly focus on critically reviewing different literatures concerning the role and the influences of PR in the field of marketing communication process. Moreover, different theories or models concerning the function of PR in marketing communication will also be critically reviewed throughout this discussion. With this concern, the description in this report will further focus on identifying the importance and oversights of conducting PR practices in the segment of marketing communication, especially concerning the events industry. Critical Review of the Literatures The emergence of modern trends that are followed by the global organisations has been found to be highly focused on enhancing the capability of the marketing communication through involving an effective PR process. With regard to the notion of marketing communication efficiency, Stroh (2007) revealed that PR is one of the major and widely used approaches for the modern organisations. According to the observation of the study made by Zerfass and Duhring (2012), it has been viewed that both marketing communication and PR simultaneously have been passing through a dramatic and evolutionary growth during the past few decades. Both these aspects have been noted to experience amaz ing developments in the global business world. PR can be recognised as one of the major independent functions of the modern business organisations. The concept of PR, being an element of marketing communication, insists the global organisations should practice different strategies to effectively develop the significant concern of PR in the marketing process (Cochrane & Hazou, 2012). Moreover, Arnoldi (2012), Prindle (2011), and Grunig and Grunig (1998) stated that PR is recognised to be one of the major contributory factors for an organisation to efficiently perform its broad assortment of marketing activities. According to Grunig and Grunig (1998), it has been apparently observed that PR offers two major benefits to different organisations that include increasing sales and raising business reputation that in turn could lead the organisations towards accomplishing their predetermined business targets to a greater extent. Watson (2011) and Grunig and Grunig (1998) noted that PR canno t be considered as a sales tool; rather, it can be viewed as an extensively effective approach that enables an organisation to

Wednesday, November 20, 2019

Nonverbal Listening Patterns exercise Essay Example | Topics and Well Written Essays - 750 words

Nonverbal Listening Patterns exercise - Essay Example There are both positive and negative non-verbal behavioral patterns. Leaning towards the speaker, nodding in acknowledgement and making meaningful eye contact are regarded as positive signals whereas non-verbal signals like blinking, biting the lip or nails, playing with the hair or jewelry, and glancing at the watch display negative non-verbal behavioral patterns (Linder, p. 8). The essay makes a probe into the two Nonverbal Listening Patterns exercises that I had with my aunt (with whom I enjoy spending time) and one of my classmates named Joe (with whom I feel less comfortable). It took almost three days for me to complete the review of each of the exercise and no doubt, these exercises provided me with the necessary improvements that I need to display in my non verbal communication. The first non verbal listening exercise reviewed here is my conversation with my aunt who never failed to show motherly affection, love and concern for me. She was always considerate for me and showed great eagerness to know how I performed in my studies. During the conversation I could maintain direct eye contact with her, which very often lasted for more than 10 seconds and this convinced me of the intimacy, interest and honesty of my conversation with her. When she enquired about my studies, I noticed that I was easily making use of spontaneous and natural emphatic gestures and facial expressions with a lot of enthusiasm. At times, I smiled at her showing my pleasure and leant towards her to display my honest interest in her advices.

Monday, November 18, 2019

Book report Essay Example | Topics and Well Written Essays - 1000 words - 2

Book report - Essay Example HeLa succeeded where all other human samples failed. The cells were continuously multiplying and Gey gave away the laboratory grown cells to his colleagues. Soon Henreitta Lacks died of aggressive cervical cancer. However, her cells taken without knowledge multiplied onto a scale, they would weight more than 50 million metric tons. HeLa cells were used for developing vaccines, to understand the behavior cancer cells, viruses and used in the research of gene mapping and to find and the effects of nuclear bombs on human cells. The Hela cells were commercialized and built multimillion dollar industries. Thousands of careers were built on the Hela cells. The Henriatha Lacks's family did not know about all these things until 1970. While Lacks's world changing cells were minting money on commercial scale, Henreitha Lacks's children and their children lived in poverty and could not afford medicare and health insurance, Instead they were also unethically recruited into HeLa research without their informed consent. In the words of Lacks's youngest daughter Deborah "If my mother's cells done so much for medicine, how come her family can't afford to see no doctors?" The story's main theme is about bad medical ethics and social wrong committed by medical establishment. The main theme raises question about racism and accessibility to health care. It also raises important question about medical compensation to patients and their families. Henreitta Lacks, the 31 years old African- American woman who had once been a tobacco farmer is the main character of the story. She comes fully alive in the pages of book. According to Gey's lab assistant Mary Kubicek when "I saw those toenails, I nearly fainted. I thought, of jeez, she is a real person" The story deals with the complex emotional, scientific and legal issues the main character's family faced. The other primary character is Deborah, Henreitta Lack's youngest daughter. She is the main driving force of the story. She travelle d to many places with Skloot in pursuit of her mother's legacy, which led her to believe that her mother was eternally suffering from all the research conducted on her cells. She is a spiritual person believing in the immortality of her mother both literally and spiritually. George Gay plays on important role in the story. Without him the world would not have known about Henreitta Lack's immortal life. Without him the science and medical care would not have found care for many diseases and without him the questions about bioethics would not have been raised. Rebekka Skloot, the science journalist is also a primary character whose decade of research took her to Lacks's family. Her vivid account about the life of Henritta Lacks's family unravels the story behind the cell research. She narrates lucidly the racial politics of medicine, poverty and science behind the important medical discoveries. The book is entwined with the implications of ethical leadership. The ethical leadership in medicare is involved in a manner that respects the right and dignity of others. Leaders who are ethical are people oriented and responsive to the needs of people If the leaders are ethical, they can ensure that ethical practices are carried out throughout the organization. Henreitta Lacks was never asked for her consent for removing her tissues. At present, the dignity is an important issue for medical researchers. It has been invoked in bioethics of human genetic engineering. The Declaration

Saturday, November 16, 2019

Viruses And Antivirus Computer Science Essay

Viruses And Antivirus Computer Science Essay In this report, you will find the important things that needed about viruses and antivirus. It covers the different type of viruses. For instance, file viruses and Macro virus. These can affect any organization data. Furthermore, it covered the history of viruses, how do viruses spread? and latest viruses prevalent in the world . The computers network has become very wide interconnecting to any part in the global. Therefore, any networks connected to the Internet and without any security infrastructure becomes vulnerable to any attack from people who attempt to damage them by sending viruses. Computer Virus is small software programs that can infect or attack a computer and networks by making copies of itself or by executing , replicate itself without knowledge .It is called Computer Virus because it shares some of the features of biological viruses .The dangers of this virus that it can be modification or deletion data and attach itself by using software, documents and files to access in your computer. It creates a lot of problems: The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971. Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called Rother J was the first computer virus to appear in the wild  ¿Ã‚ ½ that is, outside the single computer or lab where it was created.[citation needed] Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.[6] This virus was created as a practical joke when Richard Skrenta was still in high school. It was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displa ying a short poem beginning Elk Cloner: The program with a personality. http://en.wikipedia.org/wiki/Computer_virus#History The first computer virus called Brain which created by two brothers who were running a computer store in Pakistan in 1986. They weaned a program that could spread form PC to another. Brain was harm less because it doesnt delete the files in the computer and move on . In addition it is too easy to be discovered by the infected users by noticing the changed volume label .After Brain, there were many other viruses developed such as Cascade, Alameda , Jerusalem and Lehigh . These viruses were more dangerous than Brain because they were able to infect .COM and .EXE files while Brain can infect the boot sector .In 1992, the first virus came to infect documents and spreadsheets throughout Microsoft Office which is called Macro virus . The Macro is a group of user commands that can be stored and run to gather . It can infect Microsoft Word or Excel on a PC and also spread to another operation system such as Macintosh. It can be also repetitive tasks within one application, and it is very spe eded to share documents between users . When the internet became more people used this is a technology and also became more advanced but unfortunately , it is also helping these viruses to spread more and infect more users are used the internet through the emails such as Melisse virus . The Melisse virus is one of the document viruses that forward itself by emails. It is used the Outlook program to send an e-mail attachment such as Microsoft Word document to anyone . After that lots of viruses are spreading through emails in the world such as Love Bug , Love Letter, I Love You  ¿Ã‚ ½etc. 3.0. Type of viruses: Recently, most of the viruses are increased through the internet. People who create them, they may attached viruses to email and distribute them everywhere. There are more than one virus that can replicate itself and destroy data or computer. They are different in shape and functionality. Below are the type of virus: Boot Virus: This type of virus can infect floppy disk. Also, it infect boot records or master boot records in computer hard disks. Examples of boot viruses include: Disk Killer and Stone virus. Program viruses: These kind of viruses infect executable program files running in the computer such extensions like (.BIN , .COM , .EXE and .SYS) files. Example of program viruses: Sunday and Cascade. FAT Virus: This virus attack section of the hard disc where essential files are stored and it can be deleting files system. Parasitic Viruses or File viruses: When you first run a program infected with a Parasitic virus, the virus is started first. The computer operating system sees the virus as part of the program you running and gives the virus the same right as the program. This right let the virus to copy itself. Macro virus: This virus attack Microsoft Word documents. It is easily increase for any PC just by email. Example of macro viruses: Relax, Melissa.A and Bablas. Worm: it is a program similar to a virus. It is able to replicate itself and deployed across the computer network. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson. 4.0 How Do Viruses Spread? Computer viruses are programs that must be triggered or somehow executed before they can infect your computer system and spread to others. Examples include opening a document infected with a macro virus, booting with a diskette infected with a boot sector virus, or double-clicking on an infected program file. Viruses can then be spread by sharing infected files on a diskette, network drive, or other media, by exchanging infected files over the Internet via e-mail attachments, or by downloading questionable files from the Internet. http://www.hawaii.edu/itsdocs/gen/virus/#Spread 5.0 Latest viruses : 6.0 Anti-virus software Anti-virus Software is a program installed onto your computer. It helps protect your computer from viruses and also can scan, detect and remove the viruses. It is supported by firewall software (which protects against hackers and some viruses) and can do several functions to protect your computer from viruses such as  ¿Ã‚ ½ It protects against Viruses ,Spyware , Trojan horses and Warms.  ¿Ã‚ ½ It protects against web based attacks and latest threats.  ¿Ã‚ ½ It helps secure and monitory your network.  ¿Ã‚ ½ It prevents others from taking control of your computer and using it to attack other computers .  ¿Ã‚ ½ And there are other functions  ¿Ã‚ ½etc . 7.0 Best antivirus prevalent in the world McAfee Antivirus . ESET NOD32 Antivirus . Norton 360 . Avira Antivirus . Kaspersky Internet Security . AVG Antivirus . Trend micro Antivirus . Note : You can see the classification of the ten best anti-virus programs in 2009 by http://anti-virus-software-review.toptenreviews.com/ 8.0 Prevention of virus infection 1- Check all the disks( CDs,HDD,Floppy ¿Ã‚ ½etc) that were used in other PCs before using them. 2- Non-implementation of any program is taken from public networks such as the Internet before the examination. 3- The use of original software, or licensed. 4- Use a password to prevent hackers to access in your PC or copy important data . 5- To keep multiple backup copies of all your files before installing any new programs. 6- Processing computer with an anti-virus and always updated to ensure that detect new viruses. 7- Always updated operating system and support it by the windows defender . 8- Do not open any Email does not know the sender . 9.0 Literature Review There are a lot of researchers have written about computer virus and antivirus : 1- Ferbrache, David. Pathology of Computer Viruses. Germany: Springer-Verlag, 1992.Fites, Philip, Peter Johnston, and Martin Kratz. The Computer Virus Crisis. New York: Van Nostrand Reinhold 1992. http://www.answers.com/topic/computer-virus 2- See F. B. Cohen, A Short Course on Computer Viruses (2d ed. 1994); G. Smith, The Virus Creation Labs: A Journey into the Underground (1994); W. T. Polk et al., Anti-Virus Tools and Techniques for Computer Systems (1995); M. A. Ludwig. The Giant Black Book of Computer Viruses (2d ed. 1998); P. E. Fites, P. Johnston, and M. P. J. Kratz, The Computer Virus Crisis (1999). http://www.answers.com/topic/computer-virus 3- Naming and Classifying Computer Viruses in 1996 by David B. Hull, Ph.D. http://home.earthlink.net/~colobus/vclassif.htm 4- Open Problems in Computer Virus Research Steve R. White IBM Thomas J. Watson Research Center Yorktown Heights, NY USA Presented at Virus Bulletin Conference, Munich, Germany, October 1998 http://www.research.ibm.com/antivirus/SciPapers/White/Problems/Problems.html 5- A history of computer viruses  ¿Ã‚ ½ Introduction Harold Joseph Highland FICS, FACM, Editor-in-Chief Emeritus Available online 10 June 1998. http://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6V8G-3SX269W-2P_user=10_rdoc=1_fmt=_orig=search_sort=d_docanchor=view=c_searchStrId=1130622556_rerunOrigin=google_acct=C000050221_version=1_urlVersion=0_userid=10md5=21efd2423b0eb4ebd32af5040db0252e 10.0 Methodology 10.1 The questionnaire: The questionnaire for this survey was making to find out about virus and antivirus . Usually it is distributed among the large number of people to know to find out the result and their attitude on the virus and antivirus . There were 13 questions were printed and distributed for people to know what they think about virus and antivirus . 10.2 Finding: This questionnaire contains a series of questions about the virus and antivirus .I asked public of people and taking their views on this subject. So, I found the following results: 1- Do you have any idea about Computer Virus? All the public of people knew very well what is the computer virus? Around 100% have the idea about computer virus. 2- Is your PC infected by virus ? Most of the people their computers infected by the virus . 3- Do you make backup copies of your files ? The majority of the people are doing backup copies between monthly and other days .Furthermore, there is less of people doing backup copies through daily or never doing . 4- Which is antivirus do you use ? Around 33.37% of the people are using McAfee antivirus and the same percentage using another antivirus .In addition,26.65 % their using Kaspersk Internet Security and 6.61% using ESET NOD32 . 5- Do you buy the original anti-virus? Around 80% of the people are buying the original copy of antivirus and unfortunately , percentage of the remaining people are buying non-licensed versions. 6- How often do you update your anti-virus ? There are high percentages in terms of update antivirus between daily and weekly. On other hands , around 20% of people are updated antivirus . 7- Do you perform virus scan for the CD or Flash disc before you use it? Most people perform virus scan for the CD or Flash disc before use it in computers and About 13% of people ignore virus scan for the CD or Flash disc . 8- Do you use the Internet service daily ? There is a large percentage of people use the Internet service on a daily and depend on it. 9- Are you protecting your files by using a password ? 54% protecting files by using a password and less percentage not protecting files . 10- Do you get any virus while you read any Email? 53% of people infected through the virus while read Email . 11- Would you like to create viruses? Most people do not tend to create viruses and less than 27% of people tend to create viruses . 12- Do you think that antivirus companies create computer viruses? It was found that 73% of the people think antivirus companies are created computer viruses because get to a lot of money through buy antivirus and using it to protect their files from a virus . 13- Would you like to use more than one anti-virus in your PC? It was found that 93% of the people do not want to use more than one antivirus in the same PC because make delay for performance PC and reduce of speed . 11.0 Conclusions This report discussed about Virus an Antivirus . I gathered information through Internet ,some books and my colleagues. According to the survey, I Found that the viruses grow and spread very quickly, but peoples awareness and knowledge of the risk of viruses make them eager to stop the spread of viruses through using antivirus software and making backup copies of the files .Furthermore, Using security programs such as firewall or windows defiance are helping to protect your computer from viruses . In addition, this report covered the types of viruses and dangerous on the PC. Every day more and more viruses, but in the end is getting rid of them. 12.0 Recommendations I recommend all to use antivirus software and make updating on the daily through an internet. Moreover, do not open any Email does not know the sender and perform virus scan for CD or Flash memory before use it in your computer. And also to be safe, use the original copy of your software. 13.0 Bibliography

Wednesday, November 13, 2019

Names and Titles in Gloria Naylors novel, Mommy, What Does Nigger Mean

Names and Titles in Gloria Naylor's novel, Mommy, What Does Nigger Mean    "Words themselves are innocuous; it is the consensus that gives them true power." (Naylor 344) A name is a mark of classification, a basis for self identity. Able to elevate or annihilate a persons' perception of herself and the surrounding society, these designations can uplift, joke, chide, mock, insult, degrade. "Society" implies the people and the atmosphere encompassing an individual in her daily life. "Culture" is closely tied to the society of a person--it is the aspects of her life which are directly influenced by such issues as race, color, nationality, religion, sexuality, and any other number of things that mark a person as distinct. Culture, though an integral part of everyone's lives, is frequently misunderstood or seen as threatening by people outside of the group in question. This ignorance of other people leads to judgments and assumptions, which frequently cloud daily issues. The most ignorant people stoop to name-calling, a painful slap of hatred. Stereotypical, racist, religious, and sexist name calling, especially, can affect the victim's views and opinions for life. Most vulnerable to these taunts are children, innocent and uncallused, who hear these names and know neither their true meanings nor the depth of senseless hatred behind them. As shown by Henry Louis Gates, Jr. and Gloria Naylor, these labels can be taken in and their meanings rendered harmless. By seizing and possessing these hateful words, a group can reshape the meaning of the slurs once wielded so forcefully against them. In Gloria Naylor's novel, "Mommy, What Does Nigger Mean?" she tells of her experience as a young child called a "ni... ...round the family. While terms such as "nigger" remain excruciatingly prevalent in today's society, victims of racist slurs have found healthy ways of dealing with the abuse. By projecting new meanings onto old words and focusing on the ever-changing names for African Americans for reassurance, the victims' strengths allow them to reroute hate, instead creating a more positive recognition of intelligence, beauty, and individuality. Works Cited Gates, Henry Louis, Jr. " 'What's in a Name?' Some Meanings of Blackness." American Mosaics: Multicultural Readings in Context. Eds. Barabara Roche and Sandra Mano. Boston: Houghton Milfflin. 1996. 424-38. Naylor, Gloria. "Mommy, What Does 'Nigger' Mean?" New World of Literature: Writings from America's Many Cultures, second edition. Eds. Jerome Beatty and J. Paul Hunter. New York: Norton. 1994. 344-7.

Monday, November 11, 2019

Although Gimpel Appeared to Be a Fool, He Is a Man of Wisdom Essay

Although Gimpel appeared to be a fool, he was really a wise man. Gimpel the fool through clever characterization, underlying symbolism, and an in-depth point of view, the short story â€Å"Gimpel the Fool†, written by Isaac Bashevis Singer, clearly reinforces the age-old concept that repentance, along with good deeds, will ultimately be rewarded in time. Gimpel’s whole-hearted yet gullible characterization weaves an important pattern in the story’s meaning. â€Å"Gimpel the Fool† is a story of laughter and sadness. Gimpel was a boy that had a reputation of being a fool since his early age. People were always playing tricks at him. Although Gimpel appeared to be a fool, he was really a wise man. He showed he was a wise man by loving the children that were not his, being a believer in his religion and by not taking advice from the Devil. There are many ways in which Gimpel appeared to be a fool. First the young men of the village spent a great deal of time m aking fun of poor Gimpel. It appeared that he was taken in by their stories to an extreme degree. Even as he went about his employment in the bakery, the townspeople continued to tell Gimpel fantastic tales that became more and more fantastic. An example of people making fun of him was the following: â€Å"Gimpel, there is a fair in heaven; Gimpel, the rabbi gave birth to a calf in the seventh month; Gimpel, a cow flew over the roof and laid brass eggs. Gimpel, while you stand here scraping with your baker’s shovel the Messiah has come. The death heaven arisen. What do you mean? Gimpel said. I heard no one blowing the ram’s horn! The kid said. Are you deaf? And all began to cry, We heard it, we heard! Gimpel, your father and mother have stood up from the grave. They are looking for you† (Singer 79). Because Gimpel believed everything that everyone told him he became the foolish boy of the town. The reason why Gimpel believed what people told him was that all of these stories were kind of real to him. Each story of each person would reveal any want and desires that they might have in their â€Å"psyche†. That was why the story was so easily to invent. The worst trick that the townspeople did to him was the marriage to Elka. Elka was the town’s slut. She already had a child that she said was her brother. Gimpel, being the fool that everyone knew, believed every word that she said. Then Gimpel marries Elka without knowing all her real story. Even though the people of the town knew the truth no one told him anything. In addition, on their wedding day a guy brought a crib because Elka was pregnant with another child from another man that was not Gimpel. When they started living together Elka did not allow Gimpel to use the same bed with her. After four month, Elka appears with another baby. She tells Gimpel that the baby was premature. Then Gimpel tells her â€Å"Is he not a little too premature.† However the thing was that Gimpel never slept with her so he must n ot have how babies were formed (Singer 82). Another thing was that Elka was always with other men instead of Gimpel. At one time Gimpel caught her with another man, but she denied everything. Elka â€Å"swore and cursed† him. But he continued with her even though she was not faithful to him. In many ways Gimpel was a wise man. The love of the children was very important to Gimpel. He always thought that there were his. When Elka became sick she told Gimpel the truth that the kids were not his and she was never faithful to Gimpel (Geimer850-851). This was Gimpel’s reaction: â€Å"What is there to forgive? You have been a good and faithful wife. Woe, Gimpel! She said. It was ugly how I deceived you all these years. I want to go clean to my Maker, and so I have to tell you that the children are not yours.† After he knew that the children were not his, he did not disown them. He continued to treat them the same. When he went to retire he took most of his money out of the bank and divided the money in to equal parts for each one of them (Singer 86-87). Furthermore Gimpel’s Religion beliefs are very strong. He was Jewish and his beliefs in the religion did not let him be a bad person. Even when he knew the truth of him being mocked by other, Gimpel does not care. The only thing he does is forgive everyone and continue his life. An example of this occurs when Gimpel find Elka with another man and he goes to the rabbi to tell him what happened: â€Å"I said to the rabbi, What shall I do? You must divorce her at once, said he. And what if she refuses? I asked. He said, You must serve the divorce, that is all you’ll have to do. I said, Well, all right, Rabbi. Let me think about it. There is nothing to think about, said he. You must not remain under the same roof with her.† This shows that he was a religious person, because he went directly to the rabbi did not go to anyone else. Because he was the fool, everyone knew he does not get upset; and he forgave Elka and he dropped the charges that he made of her cheating on him. He said that he saw a shadow and he was wrong about Elka being with another man (Singer 83-85). Gimpel shows his wisdom, too by rejecting the devil’s influence. At the end Gimpel gets a visit from the devil, and this is what happened: Devil: Gimpel, why do you sleep? Gimpel: What should I be doing? Eating replace? Devil: The whole world deceives you, and you ought to deceive the world in your turn. Gimpel: How can I deceive all the world? Devil: You might accumulate a bucket of urine every day and at night pour it into the dough. Let the sages of Frampol eat filth. Gimpel: What about judgment in the world to come? Devil: They have sold you a bill of goods and talked you into believing you carried a cat in your belly. What nonsense! Gimpel: Well then, and is there a God? Devil: There is no God either. Gimpel: What, is here, then? Devil: A thick mere. Then one night Elka appeared in Gimpel’s dream. She told him to do not do that, because the only person he was deceiving was himself. After all he did not take any advice from the devil (Singer 87). The story â€Å"Gimpel the Fool† was a wonderful and humorous story. This story presents a humorous psychological study as well as an analysis of the nature of reality. This kind of story can only be done by a â€Å"Jewish writer†. For Singer people do not have to be â€Å"insane† to make this kind of story. From the beginning, Gimpel was not sure why people treated him like a fool. His apparent foolishness consists in his taking the line of least resistance to avoid the â€Å"world† around him. The people around him mostly created the world that Gimpel lives. Gimpel the intelligent â€Å"or sainted fool† was an invention of â€Å"Yiddish fiction.† The way that Singer showed this character was in a different way that concludes that Gimpel was a creation of â€Å"irony† in way (Siegel 365). In conclusion Gimpel was a saint, he looked and acted like a fool because of his innocence. He showed that his foolishness was intelligence and because of his good heart he never let anyone suffer not even himself. The rejection of the devil showed his beliefs in God and the possession of a good and understanding heart. Forgiving everyone of what they did to him was a wise thing to do. Here on earth it does not matter much if you are a fool like Gimpel who forgives and forgets; it only means that people can pick on you and make fun of you. However, in God’s view it is the most important and amazing thing to do. Gimpel himself showed everyone that being a fool has some benefits.

Saturday, November 9, 2019

Optical Camouflage

OPTICAL CAMOUFLAGE ABSTRACT: The advancement in science is making what we may have thought of as impossible, probable. Humans may become invisible as the extra terrestrials which are considered to be probably invisible. A new technology provides a way to this. In this paper a scientific technology that is used to implement this idea is presented. The optical camouflage technology is one of the famous scientific technologies which helps in the invention of a new type of cloak called the invisible cloak. This is one of the big revolutions created in the area of virtual reality.It is just a concept of reflection of light by the cloak. The person who wears this cloak will feel as just what he feels with the ordinary cloaks but the person will be invisible to the outside environment. This is the main advantage of this cloak. There are many other interesting features present in this paper about this cloak. CHAPTER 1 : INTRODUCTION: Chaitanya Institute of Engineering & Technology Page 1 OPT ICAL CAMOUFLAGE Although optical is a term that technically refers to all forms of light, most proposed forms of optical camouflage would only provide invisibility in the visible portion of the spectrum.The research on the concept of invisibility was started in 1977 and was very successfully accomplished in 2003. Initially Professor Tachi from the University of Tokyo said that he had first had the idea of developing something to make objects invisible in 1977. But the imag e was flat and unrealistic. He came up with retro-reflective material which causes the coat to act as a screen and gives a transparent – or invisible – effect. Similarly, Duke University is using microwave beam deflection, making it appear almost as if nothing were there at all. If you’ve seen the movie â€Å"Harry Potter† then you may recognize the idea of an invisibility cloak. CHAPTER 2 : OPTICAL CAMOUFLAGE: Optical camouflage is a hypothetical type of active camouflage currently onl y in a very primitive stage of development. The idea is relatively straightforward: to create the illusion of invisibility by covering an object with something that projects the scene directly behind that Chaitanya Institute of Engineering & Technology Page 2 OPTICAL CAMOUFLAGE object. Optical camouflage is a kind of active camouflage which completely envelopes the wearer.It displays an image of the scene on the side opposite the viewer on it, so that the viewer can â€Å"see through† the wearer, rendering the wearer invisible. Although optical is a term that technically refers to all forms of light, most proposed forms of optical camouflage would only provide invisibility in the visible portion of the spectrum. Prototype examples and proposed designs of optical camouflage devices range back to the late eighties at least, and the concept began to appear in fiction in the late nineties. CHAPTER 2. 1 : Components of the Optical Camouflage:Optical camouflage doesn't work by way of magic. It works by taking advantage of something called augmented-reality technology. Augmented-reality systems add computergenerated information to a user's sensory perceptions. Most augmented-reality systems require that users look through a special viewing apparatus to see a real-world scene enhanced with synthesized graphics. They also require a powerful computer. Optical camouflage requires these things, as well, but it also requires several other components. ? A garment made from highly reflective material A video camera ? A computer ? A projector ? A special, half-silvered mirror called a combiner; which is the viewing screen CHAPTER 2. 2 : The Cloak: Chaitanya Institute of Engineering & Technology Page 3 OPTICAL CAMOUFLAGE It is made up of retro-reflective material. It has an observer that receives more of the reflected light and therefore sees a brighter reflection. It can be seen far away and outside in bright sunlight. CHAPTER 2. 3 : Other components: †¢ The camer a captures the digital video behind the person with the cloak. †¢The computer synthesizes the graphics and superimposes them on a real-world image. †¢ The projector shines a light beam through an opening controlled by a device called an iris diaphragm. †¢ The combiner (special mirror) is used to both reflect the projected image toward the cloak and let light rays bouncing off the cloak to return to the viewer’s eye. Chaitanya Institute of Engineering & Technology Page 4 OPTICAL CAMOUFLAGE CHAPTER 3 : CONCEPT OF INVISIBILITY CLOAK: Chaitanya Institute of Engineering & Technology Page 5 OPTICAL CAMOUFLAGE 1.The cloak that enables optical camouflage to work is made from a special material known as retro-reflective material. 2. A retro-reflective material is covered with thousands and thousands of small beads. When light strikes one of these beads, the light rays bounce back exactly in the same direction from which they came. 3. To understand why this is unique, lo ok at how light reflects off of other types of surfaces. A rough surface creates a diffused reflection because the incident (incoming) light rays get scattered in many different directions.A perfectly smooth surface, like that of a mirror, creates what is known as a specular reflection — a reflection in which incident light rays and reflected light rays form the exact same angle with the mirror surface. In retroreflection, the glass beads act like prisms, bending the light rays by a process known as refraction. This causes the reflected light rays to travel back along the same path as the incident light rays. The result: An observer situated at the light source receives more of the reflected light and therefore sees a brighter reflection.Chaitanya Institute of Engineering & Technology Page 6 OPTICAL CAMOUFLAGE CHAPTER 4 : WORKING: Chaitanya Institute of Engineering & Technology Page 7 OPTICAL CAMOUFLAGE Once a person puts on the cloak made with the retro-reflective material, here's the sequence of events: †¢ A digital video camera captures the scene behind the person wearing the cloak. †¢ The computer processes the captured image and makes the calculations necessary to adjust the still image or video so it will look realistic when it is projected. The projector receives the enhanced image from the computer and shines the image through a pinhole-sized opening onto the combiner. †¢ The silvered half of the mirror, which is completely reflective, bounces the projected image toward the person wearing the cloak. Chaitanya Institute of Engineering & Technology Page 8 OPTICAL CAMOUFLAGE †¢ The cloak acts like a movie screen, reflecting light directly back to the source, which in this case is the mirror. †¢ Light rays bouncing off of the cloak pass through the transparent part of the mirror and fall on the user's eyes.Remember that the light rays bouncing off of the cloak contain the image of the scene that exists behind the person wear ing the cloak. †¢ The person wearing the cloak appears invisible because the background scene is being displayed onto the retro-reflective material. At the same time, light rays from the rest of the world are allowed reach the user's eyes, making it seem as if an invisible person exists in an otherwise normal-looking world. CHAPTER 4. 1 : Key Challenges: †¢ Practicality smaller computer integrated replacement of projector combiner. †¢ Purchase patent or license. †¢High costs. †¢ Very small cameras and projectors CHAPTER 5 : MUTUAL TELEXISTENCE: Chaitanya Institute of Engineering & Technology Page 9 OPTICAL CAMOUFLAGE CHAPTER 5. 1 :How mutual telexistence works: Chaitanya Institute of Engineering & Technology Page 10 OPTICAL CAMOUFLAGE †¢ Human user A is at one location while his telexistence robot A is at another location with human user B. †¢ Human user B is at one location while his telexistence robot B is at another location with human user A. à ¢â‚¬ ¢ Both telexistence robots are covered in retro-reflective material so that they act like screens. With video cameras and projectors at each location, the images of the two human users are projected onto their respective robots in the remote locations. †¢ This gives each human the perception that he is working with another human instead of a robot. †¢ Right now, mutual telexistence is science fiction, but it won't be for long as scientists continue to push the boundaries of the technology. CHAPTER 6 : REAL WORLD APPLICATIONS: Chaitanya Institute of Engineering & Technology Page 11 OPTICAL CAMOUFLAGE †¢ Doctors performing surgery could use optical camouflage to see through their hands and instruments to the underlying tissue. Providing a view of the outside in windowless rooms is one of the more fanciful applications of the technology, but one that might improve the psychological well-being of people in such environments. †¢ Pilots landing a plane could use t his technology to make cockpit floors transparent. This would enable them to see the runway and the landing gear simply by glancing down. †¢ Drivers backing up cars could benefit one day from optical camouflage. A quick glance backward through a transparent rear hatch or tailgate would make it easy to know when to stop.CHAPTER 7 : OPTICAL CAMOUFLAGE SEEN IN: ? Ghost in the Shell. ? 2000 video game Deus Ex. Chaitanya Institute of Engineering & Technology Page 12 OPTICAL CAMOUFLAGE ? 2002 James Bond movie Die Another Day ? Metal Gear Solid and Halo video game series. ? The video game Phantom Crash. ? The Predator movie. CHAPTER 8 : ADVANTAGES & DISADVANTAGES ADVANTAGES: Chaitanya Institute of Engineering & Technology Page 13 OPTICAL CAMOUFLAGE ? Optical Camouflage can be used on surgical globes or equipments so they don’t block surgeon’s view during delicate operations. ?In aviation, cockpit floors could become ‘invisible' to assist pilots during landing. DISA DVANTAGES: ? The weak point of this technique is that the observer needs to look through a half-mirror. ? The current system needs a half-mirror and projectors, which were fixed on the ground. CHAPTER 9 : CONCLUSION: Now all of us have had a small tour of the interesting world of optical camouflage. A lot of interesting thing have been done and already we have seen that anyone can be almost invisible Chaitanya Institute of Engineering & Technology Page 14 OPTICAL CAMOUFLAGE ith this technology. Though we are still facing challenges with practicality, licensing and high costs the future promises us a lot more. To make an object literally vanish before a person's eyes, a cloak would have to simultaneously interact with all of the wavelengths, or colours, that make up light. That technology would require much more intricate and tiny meta-material structures, which scientists have yet to devise. Research work is going on and soon we will have even more astonishing results. Chaitanya Ins titute of Engineering & Technology Page 15

Wednesday, November 6, 2019

Free Essays on Shaikh Zayed

Shaikh Zayed Al-Nahyan Shaikh Zayed rose to power in 1971. He had orginally been the ruler of Al-Ain, which is part of the Buraimi Oasis complex. When his brother the eccentric shaikh shakhbut, was deposed by family agreement, Shaikh Zayed replaced him in 1966 in ruling the state of Abu-Dhabi. However it is only in 1971 when the Union of Arab Emirates was formed that Shaikh Zayed was chosen for the post he still holds today which is, the head of state of the United Arab Emirates. He also remained the ruler of Abu Dhabi. He united seven emirates under his rule in the form of a federation. The UAE consist of 7 sovereign states: Abu Dhabi, Ajman, Dubai, Fujaira, Ras al- Khaima, Sharja and umm al-qawani. Each emirate is ruled by a prince from the royal family. Shaikh Zayed created two councils, the supreme council, where all the rulers of the Emirates are represented and the second were all the advisors to the first council are represented. He was trying through this to form a parliamentary democracy in the UAE. He is concerned with several issues. First, he is concerned with the problem of unity internally and externally. He believes in maintaining the cohesion between all Emirates. The UAE has an advantage that promotes its internal unity, because none of its individual members can aspire to complete independence, because of their minuscule size of population. Federation is therefore necessary. Shaikh Zayed presides over all issues concerning the UAE. Moreover, his prime aim is to promote and encourage peace, solidarity and unity among all Arab countries. He is known among all Arab countries to have this role. He strongly opposes the UN sanctions against Iraq. He pleaded among the gulf states and other countries like Jordan, Kuwait and Saudi Arabia, to reconcile with Iraq and relieve its people from the sanctions imposed on them. Most of the states refused to deal with Iraq entirely. His strong belief in unity ... Free Essays on Shaikh Zayed Free Essays on Shaikh Zayed Shaikh Zayed Al-Nahyan Shaikh Zayed rose to power in 1971. He had orginally been the ruler of Al-Ain, which is part of the Buraimi Oasis complex. When his brother the eccentric shaikh shakhbut, was deposed by family agreement, Shaikh Zayed replaced him in 1966 in ruling the state of Abu-Dhabi. However it is only in 1971 when the Union of Arab Emirates was formed that Shaikh Zayed was chosen for the post he still holds today which is, the head of state of the United Arab Emirates. He also remained the ruler of Abu Dhabi. He united seven emirates under his rule in the form of a federation. The UAE consist of 7 sovereign states: Abu Dhabi, Ajman, Dubai, Fujaira, Ras al- Khaima, Sharja and umm al-qawani. Each emirate is ruled by a prince from the royal family. Shaikh Zayed created two councils, the supreme council, where all the rulers of the Emirates are represented and the second were all the advisors to the first council are represented. He was trying through this to form a parliamentary democracy in the UAE. He is concerned with several issues. First, he is concerned with the problem of unity internally and externally. He believes in maintaining the cohesion between all Emirates. The UAE has an advantage that promotes its internal unity, because none of its individual members can aspire to complete independence, because of their minuscule size of population. Federation is therefore necessary. Shaikh Zayed presides over all issues concerning the UAE. Moreover, his prime aim is to promote and encourage peace, solidarity and unity among all Arab countries. He is known among all Arab countries to have this role. He strongly opposes the UN sanctions against Iraq. He pleaded among the gulf states and other countries like Jordan, Kuwait and Saudi Arabia, to reconcile with Iraq and relieve its people from the sanctions imposed on them. Most of the states refused to deal with Iraq entirely. His strong belief in unity ...

Monday, November 4, 2019

Seminar in Criminology- classmate response 12 Essay

Seminar in Criminology- classmate response 12 - Essay Example The grouping of inmates according to their age, background and chances of being more violent was also seen to improve the situation according to the study results given by Fuller and Orsagh (Wooldredge & Thistlethwaite, 2014). Based on the recommendations that Maurice provides in his discussion, it is evident that they can easily be implemented even on a low-budget. Nonetheless, Maurice also says that re-organizing the prison populations would also be helpful in eliminating the cases of prisoners who get assaulted, whether it is based on age or a person’s race. Lastly, Maurice has not only discussed some of the most useful things that the prison staff could do to reduce cases of assault, but he has also organized his work in neat paragraphs. In addition, his sentences are well spaced and there is no paragraph that has inconsistently spaced paragraphs. The discussion is also not too lengthy, which makes the reading of each paragraph easy. Maurice also persuades the reader that more supervision in prisons is important when he uses illustrations that are simple. For example, he says that getting prisons to have more supervisors in each floor is not possible since the economy today is not too

Saturday, November 2, 2019

American Government Essay Example | Topics and Well Written Essays - 750 words

American Government - Essay Example An objective that was clearly lived up to as far as the cultural will of the people is concerned; in the way America has more races of people that reside in the country than any other nation in the world. It is through the constitution that every culture and religion on earth has found a place in America and then had the ability to flourish; with individuals from various backgrounds and religions and cultures finding a place for themselves in the American way of life and hence the formulation of an American identity. Today however we look at the numerous ways in which the American Government falls short as far as reflecting the will of the American people globally and socially is concerned. If we look closely in the past decade there has been wide spread public cynicism as far as established political institutions and the government is concerned. With the most frequently occurring theme in the American political system being pointed out by critics being the obvious dismay of the Amer ican citizen as far as the government’s inability to perform is concerned. ... One might wonder what causes all this discontent as far as the social needs of the people are concerned. A key push that has driven the public to formulate the negative opinion as far as their effectiveness to represent the people is concerned is that of the new health care bill which excludes certain state members from paying the same taxes as the other states. If equality is a social obligation which the government stands to promote the health care bill clearly does not authenticate that line of thought (Mcdonald, 1999). Unemployment, according to the Fortune is right now the No.1 issue in America, with the unavailability of jobs being a key concern along with employer’s inability to find workers they want. Even then the government fails to address this issue when presenting their jobs agenda to the nation. This was seen as a key missing element in the American Jobs Act. A shocking perspective of this situation roots from three key reasons due to which the Defense Department has found about 75% of American citizens between the ages of 17 and 24 who are not qualified even to serve in armed forces being; inadequate education, criminality and physical unfitness. Three shocking aspects that further signify the failure of the American government to come up with effective education reforms, social controls and providing adequate health facilities. A society in which the basic needs of each individual are not lived up to leads to social deterioration and unrest of the community as a whole. The Pentagon highlights the fact that there are 26 million young adults who are incompetent, unhealthy and undereducated individuals to be able to live up to professional and technologically advanced requirements (Colvin, 2011). How then can the government live up to its ‘We