Tuesday, October 29, 2019

Euthanasia in Australia Essay Example | Topics and Well Written Essays - 1750 words

Euthanasia in Australia - Essay Example Presently, in Queensland, the only two laws that deal with end of life are Advance Health Directive and the Power of Attorney Act 1998. In fact, both the laws are insufficient to seek the help of others for assistance. Compared to other states in Australia, Queensland has more restrictions on the use of Advance Health Directive, which result in hindering individual freedom to healthcare. While other states use Advance Health Directive to overcome the restrictive statutory regime, Queensland uses the statutory regime to restrict the freedom under Advance Health Directive. Thus, Queensland authorities are more orthodox about the sanctity of human life than other states are. However, the mere fact is that through the amendment to the Queensland Criminal Code 1899, the territory has unofficially allowed room for euthanasia. It becomes evident that the existing laws in Queensland show double standard. On the one hand, it stands totally against the right to end ones own life unlike other s tates in Australia. This is evident from the fact that it has imposed greater restrictions on Advance Health Directive. On the other hand, it introduced amendments to Criminal Code to help health practitioners escape prosecution by allowing palliative care to the extent of foreseeable death but not intended death. However, the mere fact is that these rules and regulations are not water-tight. In other words, there arise a lot of legal issues associated with the present day stance of the authorities in this regard. It becomes evident that the Criminal Code of 1899 as amended in 2003 gives room for euthanasia on one hand, and punishes the ones who help in the same on the other. The Advance Health Directive and statutory regime- a failed purpose Admittedly, the only purpose of Advance Health Directive (AHD) is to allow individuals to decide their future course of treatment if they are incapable of taking independent decisions in future. As Willmott (2007) points out, unlike other state s, Queensland has more rules and regulations regarding the applicability of AHD. The Power of Attorney Act (1998) (QLD) declares that in order to proceed with the AHD to remove life-sustaining measures; one of the four conditions should be met: the patient has a terminal illness from which death is certain; the patient is in a vegetative state; the patient is permanently unconscious; or the patient has such an illness or injury from which patient is highly unlikely to recover. Thus, the Queensland regulation evidently kills an adult’s right to self-determination as the legislation shows more attachment towards the medical principle of sanctity of life. Davis (2009) argues that a look into the English law proves that the right to self-determination is given more importance than the principle of sanctity of life. In the case, Bland was in a vegetative state and the court allowed removal of life-supporting treatments to facilitate his death (ibid). However, in Queensland, an adu lt can fill advance health directive but it will operate only if it is in harmony with the common law. That means, in Queensland, for an advance health directive to operate, it should meet criteria like a sufficiently poor state of health, lack of prospects of recovery, and consistency with good medical practice. However, in other states, it is irrelevant to consider the fact that the adult would have lived for an extended period of time and made a full recovery if life-sustaining measures were given. In other words, if there is a valid AHD, the medical practitioner would not legally be allowed to provide such good medical practices which could prolong or save the life of the patient. Another important limitation, according to Willmott et al (2006) is that in Queensland, self-determination

Sunday, October 27, 2019

Forensic Analysis Of A Playstation 3 Console Information Technology Essay

Forensic Analysis Of A Playstation 3 Console Information Technology Essay researching all the information that is available to me about the playstation 3 gaming system, from what the console connects to, the file structure of the hard disk, what features the system has e.g. internet, chat, email, online gaming. The deliverable that will be present at the end of this would be detailed research about the gaming system with everything that is needed to know to progress with the project. 2.2 Analysis the objective that I have for my analysis is to perform all the tasks that I have talked about (playing online games etc) then after each of these stages will then make an image of the hard disk of the system and look at the image in FTK to see if any changes have been made to the disk after the task has been completed. To illustrate an example of this would be to start a chat message with someone, then turn off the system remove the hard disk, image the hard disk, then load the image into FTK and look to see if any traces of the chat are present on the hard disk (date/time stamps). When writing up the findings of the investigation a document will be presented with all the processes went through, what tools used. The deliverable that I expect to have at the end of this objective would be disk images of the various tasks with a detailed report of my findings and a document showing all processes and tools used, and also a set of guidelines of how I found the evidence on t he system. If no evidence can be found on the HDD of the console then other areas of analysis will have to be explored from using different tools such as scalpel and photorec and also using different types of hardware like Bus Doctor. 2.3 Evaluation the objective for the evaluation is to forensically wipe the hard disk to the Playstation 3 system that was used, then giving this along with my guidelines and tasks completed to another person. The other person will go ahead and complete the series of tasks that were previously performed on the system, follow the guidelines and see if the they can find the same evidence as previously found, if the person can find the evidence that is in my guidelines then this proves that the guidelines created are correct. The deliverable at the end of this objective would be the test data of the other person which will then be written up, to show whether my guidelines are correct/incorrect. 3. Why gaming systems are an issue. In the recent years games systems have evolved immensely allowing the gamer to experience more realistic graphics and sound quality. This is because the systems have been updated to such a high standard some of what like a standalone computer, giving the user a lot more gigabyte/terabyte storage space, because of this the user has more room to store data on the disk whether it be images, videos or music. In relation to this the old Ps3 systems that were first released had the option to add another OS (operating system) on the hard drive so you could have Linux running on the system this means that the system can be used as a normal machine, Sony have no disabled this feature on the most current firmware of the console. A news report that was found on the ABC news website (http://abcnews.go.com/technology/story?id=7009977page=1) describes of how a user used his Playstation 3 system to get a young girl aged 11 to send dirty pictures of herself from her Playstation to his. It also says how the criminal threw his computer out as he didnt need it anymore. Using this example that has been found shows how criminals are adapting to the new technology and using it to their advantage to commit crimes. The growth of these gaming consoles means that they are more like a standalone computer coming standard with massive hard drives and encryption on the disks meaning that as forensics examiners it makes it harder to retrieve data from some of these devices and takes longer for the imaging process to complete. In regard to a forensic examiner the game systems are a big problem because the development of the consoles have evolved over the years and now contain multiple CPUs and graphics cards, and with the onboard storage that the same of a desktop computer users are able to save their pictures, music and video to these devices. Also using the features of the console from downloading and install the most current firmware and streaming media from a different network location. With the Playstation 3 you create a user/s for use with machine, so when the system is turned on it asks which user you would like to sign in as. With relation to the Xbox 360 console where hacking communities have found loopholes which allow the Xbox console to run unsigned code which means that the Linux OS can be booted up onto the machine allowing this console to be used just like a desktop PC. If Linux can be booted up onto the machine then this means it could be used for illegal usage example (file storage), although the first release of the Playstation 3 allowed this feature Sony have now stopped the boot of Linux and other Operating systems on its machines, but if a hack or loophole was found in their security then this would mean that this system could be used for malicious ways just like and Xbox or standalone PC. A post from January 26th, 2010 explains how hacker George Hotz has hacked the PS3 he revealed on his blog that he has achieved read/write access to the entire system memory and HV level access to the processor. If this is true then this means that the playstation can be used to run unsigned code and other o perating systems can be loaded onto the device, meaning that full desktop usage can be applied storing all kinds of information on the system. Also the Jailbreak that was leaked online was able to fool the system into thinking that a game was being played from a Blu-ray disc, but it was actually playing from the HDD, this could only be the start, people are making small but beneficial steps into fully hacking the Playstation 3 console. 4. Research 4.1 About the Playstation 3 The project that will be created will be about the analysis of the hard disk drive of a Playstation 3 console which is the most up to date console alongside the Xbox 360 and the Nintendo Wii. The Sony Playstation which is the next step in the gaming world provides the gamer with a new console to experience the most up to date graphics and high definition games and movies with the help of the consoles Blu ray drive. Since the console release in November 2006 the unit has sold over 38.1 million worldwide according to (http://www.eurogamer.net/articles/ps3-has-sold-38-1m-units-worldwide). Since the release of the console there have been many different models of the system from USB ports, Flash card readers and hard drive support, this means that the system and its components are always changing. All the games and movies that the console play are in the format of Blu ray this mean that the content that you are playing or watching are in the high definition format giving a more crystal clear picture and sound. 4.2 Online gaming. DSCI0056.JPG FIGURE 1 Picture of Playstation Store menu. The Playstaion 3 system offers the use of the internet whether it is a wired or wireless connection, because of this it is giving the user full access to the World Wide Web meaning they can access all the information that they would access on a standalone computer from social networking sites, videos, pictures etc. While playing games on the console you have the option on many games to play online this gives the user the capability to play the game of choice with other users of the game all over the world. To be able to do this you need to have a multiplayer capable of online game play, you must also have a Playstation network account which will give you access to other users and also need the Playstation to be connected to the wired/wireless internet. You can also create a Playstation network account where users are able to play online games with any person/s all over the world, they can add buddies and stay in close contact with the people they meet online either by email or chat. Because of the email and chat facilities available on the console it is just like a social networking site where people are able to exchange information with each other and possible pictures and other bits of material that can be deemed as illegal or offensive. The console also comes with full internet access via the browser the user can access any website that he/she wishes from the console and even downloading images, videos to the consoles hard disk drive. 4.3 The Hard disk. The hard disk in the Playstation 3 can come in various sizes from 40gb all the way up to a massive 320gb (factory), but there is an option to easily remove and replace the hard disk of the system, this can be done by purchasing a 2.5 5400rpm SATA hard drive which is the same hard disk used in laptop computers. To replace the hard drive of the system photocopies of the instruction manual are below. img013.jpg img014.jpg img015.jpg After these steps have been completed you then have a new HDD in your system whether it is a higher or lower capacity. Because the hard disk of the console is the same as the ones that they store in laptop computers the capacity of these disks can be great allowing a great deal of information such as images, videos or music to be stored on the disk to view with the console. A website was found (http://dcemu.co.uk/psgroove-payload-released-that-decrypts-firmware-files-by-graf_chokolo-346424.html) Where Graf_Chokolo has released a version of PSGroove payload, this allows the developers to see full details of the PS3 system firmware complete with decrypted contents. Graf_Chokolo goes onto to explain how to put the source code onto the system, he goes onto explain that my payload has two stages. The 1st stage is actually a PSGroove payload, which initializes the gelic device and allocates memory needed for the 2nd stage. Compile the 1st stage binary, convert it to C hex array and replace the PSGroove payload. (Appendix 16) Graf_Chokolo goes on to explain the second stage, this stage decrypts the CORE_OS_PACKAGE.pkg from a PUP file, it then runs some isolated SPU module or dumps FLASH, the binary of the file is then sent over the Ethernet with sendfile. The 1st stage receives the data and then stores it in a memory region of size 64kb, after the upload is complete, the 1st stage code jumps to the 2nd stage code and executes it. (Appendix 16) Another piece of information from this website is to be able to decrypt packages from a PUP file, first you need to extract a revoke list for the packages from PUP file 3.41 e.g. (RL_FOR_PACKAGE.pkg), then extract it convert it to C hex array and paste it into rvk_pkg_341.c. (Appendix 16) 4.4 Playstation 3 system updates With the use of the internet in the Playstation there is an option to keep the software of the system up to date this will provide you with the latest security updates, parental controls and the display options. By updating to the latest update you will enhance what the console is capable of. If you would like to find out the current software that your system is currently running you go to the settings category and then from there select system settings then system information within this the current system software will be displayed. You can update the current software of the system in a number of ways this is shown by the following methods. System update if the ps3 is connected to the internet got to settings then system update then click update via the internet the console will then check to see if there is an update available for the console if there is an update available it will download and install the update for you. There is also another option to update via the pc this is done by visiting the website eu.playstation.com you then follow the on screen instructions to download to the pc. After the download has finished you will then need to save the update to a ps3 compatible device either a memory stick/duo, USB drive or even a PSP console. Before putting the update into the system you will have to create a folder called PS3 then a folder called UPDATE once it has then been connected to the system you then navigate to system update then update via storage media. By allowing or accepting the system update new security can be put in place on the system, because Sony regularly release new firmware updates for the console the security of the device is constantly being updated. 4.5 Specifications Below are the specifications of the Playstation console. CPU Cell Broadband Engine GPU RSX Audio Output LPCM 7.1ch, Dolby Digital, Dolby Digital Plus, Dolby True HD, DTS, DTS-HD, AAC Memory 256MB XDR Main RAM, 256MB GDDR3 VRAM Hard disk 2.5 serial ATA 320GB Inputs/Outputs Hi-speed USB, USB 2.0 Networking Ethernet (10BASE-T, 100BASE-TX, 100BASE-T) x 1 IEEE 802.11 b/g Bluetooth 2.0 (EDR) Controller Wireless controller Bluetooth Resolution 1080p, 1080i, 720p, 576p, 576i HDMI OUT connector 1 AV MILTI OUT connector 1 DIGITAL OUT connector 1 BD/DVD/CD drive Read rate BD x 2 (BD-ROM) DVD x 8 (DVD-ROM) CD x 24 (CD-ROM) Power AC 200 -240 v, 50 / 60 HHHHz Power consumption Approx 230w External Dimensions Approx 290 x 65 x 290mm Mass Approx 3.0kg Operating temperature 5 35 degrees The Playstation 3 Console also includes RSA BSAFE Cryptographic software from RSA security Inc. RSA BSAFE software provides the security functionality necessary to allow developers to meet the stringent FIPS 140 and Suite Requirements for offering products to the U.S. government agencies. (Appendix 18) Many leading companies including Adobe, Oracle, Hypercom, Skyworks, Sony and Nintendo rely on RSA BSAFE software to provide the foundational security functionality by their respective software and device applications. (Appendix 18) RSA security protects the integrity and confidentiality of information throughout his lifecycle, RSA offers industry leading solutions in identity assurance and access control, encryption key management, compliance and security information management and fraud protection. (Appendix 18) http://www.rsa.com/node.aspx?id=1204 4.6 File Sharing The Playstation 3 console also allows the ability for you to share files via the console and your desktop computer, to be able to do this you need to make sure that both your computer and console are connected to the same network. If you would like to stream all the media from your windows media player like music, videos and pictures. You can do this by going into tools and options of windows media player and selecting library, then configure sharing you then check the box that says share my media to and your Playstation 3 will be in the list. In the settings tab of this you can then select which media that you wish to share music, pictures, video you then click ok. If you then turn on the console you will then see thumbnails of the compatible media that can be played on the system. http://www.wirelesshdadapter.com/wp-content/uploads/Media%20Server%20Ps3%20Software_2.jpg (Appendix 17) 4.7 previous work While completing research to find out if any other analysis of the Playstation console was carried out a paper was found published by the University of Central Florida where they conducted a Forensic Analysis of a Sony Playstation 3 Console, where they conducted a number of tests on the machine to see if any of the data could be extracted from the console. The tests that they completed where the following; An encryption test this test was to determine if it was possible to locate a picture once it had been copied to the console. The steps they took in completing this were to copy a image to a removable media, then plug this into the console and copy the image to the hard drive of the system, shut the console down and the image the hard drive. The next stage was to analyse the hard drive in FTK using its use of a data carving feature to see if the picture could be carved out of the image, although stated that FTK was unsuccessful in identifying files and folders on the partition (Appendix 6), even though only one tool was used while completing this task if other tools were used then maybe a different outcome would be found the tools that could be used alongside FTK to find the image could be scalpel or Photorec which are both data carving tools. The paper also talks about a write blocker test, where the hard drive was placed behind a write blocker before connecting the hard disk to the console, the consoles hard disk was then removed then placed behind a write blocker, then plugged into the console, the console was then turned on and they found that the console would power up but not boot up, by replacing the write blocker with a bridge the console was to power and boot up as normal. (Appendix 6) The test result then explains that the console must be able to write to the hard drive before it will boot up, though it also shows that the hard drive does not have to be directly connected to the console (Appendix 6) regarding the result of this test a write blocker cannot be placed between the hard drive and the console or the console will not boot up. Although many other tests were performed on the console all the test results were inconclusive or negative form this paper, they concluded in the end that Sony has successfully locked-down the PS3 By using other tools that are an alternative to FTK, these tools might be able to identify something that FTK is unable to do thus providing more information to data on the HDD of the console. Another paper called Xbox 360: A digital forensic investigation of the hard disk drive (Appendix 4) was written with details and findings of the hard disk drive of the Xbox 360, where a USB drive was plugged into the machine and using Bus Doctor to analyse what was being written between the Xbox console are the hard disk drive. And states that it is seamless and not as intrusive as mod chipping or installing other operating systems (Appendix 4). This method could be applied to the Playstation 3 console to see what is being written between the console and the hard disk drive of the Sony console. 4.8 Playstation 3 security architecture A pdf file was found that detailed the security architecture of the Playstation console, http://www.ps3news.com/PS3-Dev/playstation-3-security-architecture-pdf-released/ , the paper details that the system controller for the console if CXD2973GB and this is the hardware that is responsible for powering up the CBEA processor and it is directly connected via BIO/IF hardware bus. The console also contains a secure boot the secure boot of the CBEA includes random selected SPE in order to avoid sniffing per boot, a fake encryption/decryption state in all other SPE during secure boot to add fake sequence, a root key which is used to then decrypt the key vault and or the boot code (Appendix 15). The key vault of the Playstation 3 is an encrypted file containing all the keys to trust devices and processes, hard disk AES keys (Appendix 15). 5. Summary The research that has taken place shows all the relevant information about the Playstation 3 console, explaining what the machine allows you to do and how to update the firmware of the system. Although the system seems to be very secure, the images taken will be analysed to see if any relevant data can be taken from the disk these will be the objectives previously proposed, failing finding anything on the images of the HDD the console will be connected up to Bus Doctor a protocol analyser to see what is happening when the system is booted up and what data can be captured. Although a paper has been written on the analysis of the Playstation 3 console (appendix 6) new hardware and software have come to market since the paper was written in 2009, the PS3 Jailbreak has made its way by being able to run unsigned code on the console and giving the user power to copy games to the hard drive of the console. 6. Future Work/Where next After and image of the Playstation HDD was taken, it was then loaded into FTK forensic toolkit where the contents of the disk was looked at. After loading it into the software immediately it could be noticed that the hard disk was encrypted, searches were completed to see if any string of text and data carved items could be found on the disk the result was negative. More images of the hard disk will be taken when performing tasks then loaded into the FTK toolkit program if no strings of text can be found another approach will have to take place, the use of other programs that are available Scalpel and Photorec can be used to identify any interesting information on the HDD of the console. Another approach would be to try and capture what is going on with the system when it is booted up because the encryption must be deactivated when the system is booted up to allow the system access to the hard disk. The other data carving tools that could be used in combination with FTK will be scalpel and photorec. Scalpel which reads the database of the header and the footer definitions and extracts matching files from a set of image files or raw device. Scalpel will carve files from FATx, NTFS, ext2/3 or raw partitions. (Appendix 12) Photorec which is a data recovery tool to recover lost files on hard disks and other media, Photorec ignores the file system of the media and goes after the underlying data, so the software will still work if the medias file system has been severely damaged or reformatted.(Appendix 13). Bus Doctor which allows to capture what is being called/written to the hard disk when the console has been turned on this can provide good information to find out what is happening when the console is turned on. during the research a website was found that describes how the psjailbreak now supports 3.42 and 3.50, which allows the user to run unapproved content on the system (pirated games), and also allows for the running of the Linux OS on the system. They sister site of this company (www.psdowngrade.com) allows the downgrading of the firmware of the system, if the psjailbreak is applied to the console maybe the decryption key can be found and then lead to the decryption of the HDD of the system. This could be done by plugging in the psjailbreak and finding out what calls it makes to the system and possibly the decryption can be found from this method. Another method would be to connect the Playstation system up to a protocol analyser (busdoctor) this will capture what data is written when the system is booted up.

Friday, October 25, 2019

Comparing Pain in Dr. Faustus and Oroonoko :: comparison compare contrast essays

Pain in Dr. Faustus and Oroonoko  Ã‚     Ã‚   In almost every piece of writing there is reference to some sort of pain, whether it be physical pain or emotional pain. In a story like Aphra Behn’s Oroonoko, the physical pain stands out above any other grief or misery. However, Christopher Marlowe’s Dr. Faustus exhibits just as much pain, but in an emotional sense. This poses an interesting question: Is one pain worse than the other? Can pain be measured? Pain, whether it be physical or emotional, is an unpleasant sensation. However, something like being poked with a safety pin or feeling sad would not be considered true pain. Physical pain is sent to the brain from other parts of the body, and when the brain recognizes the pain, the body feels it as well. There is no scientific evidence on where emotional pain comes from, but most people agree with Stanley Schachter’s analysis of emotions in the late 1950’s. Schachter said that emotional pain "begins when a person encounters an important event or thought. The person then interprets the meaning of the encounter, and the interpretation determines the feeling that is likely to follow. (Black 22)" Throughout history, people have documented their encounters with physical and emotional pain in works such as stories or poems. Neither pain was extensively researched until the late 19th century, so neither Marlowe nor Behn had any documentation on the causes and effects of physical and emotional pain. But both were able to take painful elements from their environment and put them into their texts. Marlowe wrote Dr. Faustus in 1592, in the middle of the Elizabethian era. The story revolves around a man who sells his soul to the devil in exchange for several years of "forbidden knowledge." Dr. Faustus is written in theatrical form (to be staged), a genre popularized during Elizabeth’s reign by writers such as Marlowe and Shakespeare. This form allowed authors to develop characters and experiment with emotion through dialogue, something authors were unable to do in poetry and had yet to do in stories. Dr. Faustus reads like a commentary on religion intended for the more affluent members of society: Don’t ask for things outside of your means or status. The story could also be a warning to monarchs who believe they are superhuman or divine. Because of the nature of the story, the pain expressed in Dr.

Thursday, October 24, 2019

Explain Possible Influences On Dietary Intake Essay

Health Factors There are many health conditions that end in specific nutrient needs, and influence what people can and cannot eat. It is important that people have a healthy diet, and get the needed nutrients, nut it can be complicated when you have to stay away from certain foods like junk food to maintain a balanced diet. Diabetes mellitus Diabetes mellitus is a condition where the hormone insulin is not being naturally made by the pancreas, is being made in small amounts or is not being used properly by the body. If left untreated, the most sever type of diabetes would lead to certain death because of the lack of glucose in the cells and vital organs. Type 1 Diabetes is the less severe form of diabetes which is NIDDM (insulin dependent diabetes mellitus). Type 2 Diabetes IDDM is treated with insulin which can be treated with insulin injections, unlike NIDDM which can be treated either just by the individual’s diet or with diet and tablets. Coeliac disease This is having intolerance to gluten, which can be found in wheat, barley and rye. Gluten causes the immune system to make antibodies, which attack the lining of the bowel. E This can have an effect on the body’s ability to absorb nutrients from food, and can lead to anaemia and osteoporosis. It also can increase the risk of bowel cancer. The symptoms: Abdominal pain Diarrhoea Constipation Bloating Failure to gain weight in adulthood Anaemia People who suffer from coeliac disease need to eliminate all foods that have wheat, rye, and barley in them from their diet. Gluten-free products are  sold but they are quite expensive. If a person has been medically diagnosed with coeliac disease some gluten-free products can be obtained on prescription. Food lists can be obtained from Coeliac UK. Irritable Bowel syndrome Irritable bowel syndrome (IBS) is a condition where the function of the bowel is disturbed, causing abdominal pain, flatulence, bloating and either constipation or diarrhoea, or both. However, through examination there is no found problem in the bowel. The cause of it is unknown, but the nerves in the gut has been found to be overacting, and some individuals can find certain foods that cause their symptoms. Sometimes IBS can lead to diarrhoea caused an infection. Some people discover that they have these symptoms after taking antibiotics, which kill the normal unharmed bacteria that is in the bowel. There is a lot of varied advice that has been given to people with IBS, but the best thing to do is experiment with the diet to try and find out which foods will make the condition worse, and stay away from them. Lactose intolerance Lactose is the natural sugar that is in milk. This tolerance is very common and can be mild or severer. Children who are lactose intolerant do not produce lactase, which is an enzyme that breaks down lactose into glucose and galactose before it is absorbed during digestion. Children who suffer from the server form of this condition find it hard to put on weight and suffer from diarrhoea. This happens because the lactose ferments inside the bowel, which causes bloating. Food allergy Some people are allergic to certain foods. A food allergy is sometimes confused with food intolerance but it is a lot more serious. An allergic reaction can be severe and life-threatening. Nuts, eggs, soya, and wheat are common allergies in adults. However any food can cause allergies. Symptoms Having contact with the food that you are allergic to, can lead you to show the following signs and symptoms within minutes/hours: Itchy mouth Swollen lips, mouth tongue and/or throat Rash Wheezing Vomiting and/or diarrhoea Red itchy eyes Some people can develop a severe reaction called anaphylactic shock, which is rare but can be fatal. The symptoms can develop all over the body, causing swelling, a rash (hives), loss of consciousness, low blood pressure and breathing problems. It is vital that every effort is made to prevent the person from being given the food that causes this reaction. Anyone who is known to have a severe food allergy should be prescribed an Epipen, which they should carry with them at all times. Loss of ability to feed independently Sadly some people are unable to independently feed themselves, either throughout their lives, or following and accident, leading to paralysis, or the development of a debilitating condition. Another reason could be that they cannot consume food through the mouth and have to be fed through a tube. If some degree of a patients independence can be maintained then it should be, because there are a wide range of tools that can used to aid people who are struggling to feed themselves. Some of these tools include a wide range of handled cutlery, plate guards and non-slip mats. Another way of maintaining a service user’s independence would be to cut their food up into manageable proportions. Sometimes it is impossible for an individual to feed themselves. Which may be due to a cognitive impairment, like advanced dementia, where the person cannot recognise that there meal has arrived. Whatever the reason may be for requiring full support when eating and drinking, it is vital that the service user’s meals are served while they are still hot. The service users should not feel like they are a burden or feel like they are being a pain, so you should create a relaxed situation, where they can enjoy the meal. Some people need to be fed through a tube. This is usually due to problems with digestive system. Swallowing issues, known as dysphasia, can cause a person to frequently choke, or find in difficult to maintain a healthy nutritious diet. A stroke or cancer of the oesophagus can cause this dysphasia. Dietary habits Meal patterns ‘Meal patterns’ are about the way a person takes their food made. Some people prefer to have three meals a day. However, there are many different variations. Some families eat together, but in the busy world that we live in people are eating fast food, and microwave meals. Snaking Eating in between meals, which was once opposed, is now the norm in the UK. If the snacks were healthy foods like fruits. However, snacks and sweets usually are usually high in fat, salt and sugar. Those who eat a lot of junk food significantly increase their risk of obesity, high blood pressure and heart disease as they get older. Personal tastes Most people have a preference when it comes to food and very few people like every food that if offered to them. Some people believe that eating animals is wrong and prefer become vegetarians. Some people go even further and become vegans who don’t eat any products that come from animals. Food availability Another influence on the diet is the food can be purchased. It is important that healthy food is available or you would just start to eat junk food simply because it is in the house. People who live in their own houses, which are unable to cook or shop by themselves, would need to make sure that the food and drinks that they would need to buy are available when they are needed and wanted. Lunchtime can usually be provided by the local meals. Hot meals are delivered daily. The food should be kept above 63 °C to prevent food poisoning. It is less of a risk to keep the food hot than to reheat it, however if the food is being reheated after cooling down is still must be hot in the middle of it. For other meals the service users may be able to manage them by themselves as long as the food is in the house. A home care assistant or a relative or a neighbour for help. Lifestyle Eating at home Eating at home means that you can have complete control over what you eat. Cooking with from raw ingredients will highlight the bad things that you are putting into your body which may make you want to eat healthier. Research that was carried out in 2006 which stated that the British public spent  £1.9 billion on ready meals and 30% of adults in the UK eat at least one ready meal a week. In 2008 a Tesco survey was carried out in 2008 on home cooking, which was then reported to The Daily Telegraph, discovered that people in the UK were cooking more foreign foods than traditional British foods. Social eating and drinking According to the Office of National Statistics (ONS), the amount of money that is spent on eating outside the home has doubled between 1992 and 2004. The risk of regularly eating out is that the temptation to eat fatty and salty foods is there, which can be eaten in moderation. The Food Standards Agency website give advice and information on making healthy choices. Exercise/activity levels People who take part in demanding actives will have different needs regarding their dietary needs. Athletes usually have their own personal dieticians to give them advice on what diet is appropriate for them to stick to. The international Conference on Foods, Nutrition and Sports in Lausanne (1991) decided that the following nutrient intakes for most sports: 60% -70% of calories in the diet form carbohydrates. 12% from protein The remainder (19-23 per cent) from fat Meaning that eating a diet that is high in carbohydrates, and is low in fat and protein, than the average. Carbohydrates are important for athletes, because it gives them fuel. Carbohydrates are stored as glycogen in the liver and muscles, and are released slowly during exorcise. It can be broken down easily to give the athlete energy, but in small amounts. The other  important element of the diet for athletes is fluids. Water would usually suffice, however for heavy amounts of activity isotonic and hypotonic drinks are useful to help speed up the process of the transportation of water to the bloodstream. Bibliography: Level 3 Health and Social care

Wednesday, October 23, 2019

Auditing Introduction Letter

Dear Mr. Lancaster, I understand that Apollo Shoes, Incorporated is concerned about acquiring certain auditing and assurance services. In today’s business world a company needs to stay ahead by operating more successfully and proficiently than its competition. Stromsodt can help Apollo Shoes to gain this advantage by offering auditing and assurance services designed for the company needs. Stromsodt is a company with certification in Service Auditor Assessments as well as provides specialization of auditing in areas of superior athletic podiatric products. Stromsodt has been providing auditing and assurance services to businesses just like yours for more than 30 years. With more than three decades of experience, Stromsodt has helped over hundreds of companies to achieve their company objectives and run more proficiently. Stromsodt is a company that is more productive and cost-effective than any other auditing and assurance service company. The company provides timely, experienced services at reasonable fees. The Auditing and Assurance services Stromsodt offers are as follows 1. Statutory Audits 2. Internal Audits 3. Risk Management. Corporate Governance 5. Tax Audit 6. Management Audits 7. Review of Accounts 8. Special Audits 9. Due diligence 10. Restatement as according to International Accounting Standards (IAS)/ General Accepted Accounting Principles (GAAP) These services will benefit Apollo Shoes by 1. Ascertain whether the presentation of accounts are fair and true 2. Timely detection of errors and fraud in the company 3. Timely identification of risks of material misstatements 4. Validation of accuracy, validity, and authenticity of account information 5. Improvement of profitability . Maximization of revenue recovery 7. Preparation of documents on a timely basis What other firms fail to deliver, Stromsodt delivers. Stromsodt brings value to a company by focusing on a company’s objectives. Part of Stromsodt’s core philosophy is to provide and perform services that add only value to a client to reach set objectives. The company abides by five essential principles when performing services for a client. These principles are integrity, objectivity, professional competence along with due care, confidentiality, and professional behavior. The roles I perform at Stromsodt vary depending upon the service. Some general tasks I perform include 1. Reviewing financial statements to determine conformity to GAAP 2. Attesting the effectiveness of internal controls over financial reporting 3. Reviewing previous financial report. Reviewing financial statements to determine conformity to GAAP helps a company by establishing to external users the assurance of a company’s financial statements. Attesting the effectiveness of internal controls over financial reporting helps to ensure no potential material misstatements or raudulent activities have occurred. This helps to lessen the likelihood of occurrence of these activities as well. Reviewing previous reports can provide assurance to a company in knowing that its previous reports are accurate. In providing these services I would make sure that Apollo Shoes has the necessary information to achieve the objectives of the company by abiding by the five principles set forth by Stromsodt. I will also adhere to the 10 general accepted accounting standards an accountant or CPA is required to adhere by. These standards are as follows 1. Display adequate training and proficiency. 2. Maintain independence from the audited company. 3. Display professionalism in performance and planning the report. 4. Adequately plan the fieldwork and supervise assistants. 5. Sufficiently understand the internal control of the company as well as determine the tests to test these controls. 6. Provide sufficient information to back up opinion formed on the financial statements. 7. State and report if the financial statements represented are in accordance with GAAP. 8. State and report circumst ances of company not consistently using principles 9. Recommend additional information for disclosures expected to be in financial statements. 10. Provide opinion on the financial statements. In conclusion, I look forward to talking further about Apollo Shoes auditing and assurance needs and about how much Stromsodt can provide Apollo Shoes with these services. Please feel free to contact me anytime regarding this proposal. Thank you for the opportunity to submit the proposal, and I, along with the entire staff at Stromsodt, are looking forward to working with Apollo Shoes in the near future.

Tuesday, October 22, 2019

Where to Get a Writing Critique

Where to Get a Writing Critique Where to Get a Writing Critique Where to Get a Writing Critique By Maeve Maddox From time to time, I receive emails from writers, asking me to critique attached poems or short stories. In the early days, I would send a polite reply, explaining that I hadn’t time to critique their work. Now I simply delete the email and attachments and get back to my own writing. The DWT Contact page states the policy that our writers don’t answer questions via email. Critiquing a manuscript of any length is time-consuming. Time is the most precious possession of a working writer. Asking another writer, especially one with whom you have no personal acquaintance, for a free critique is the equivalent of asking a stranger for a gift costing anywhere from $300 up. I have arrived at this figure by browsing the sites of professional critiquing services. Rates are based on word-count, number of pages, or some combination of the two. One service that specializes in science fiction, fantasy, and horror charges $300 for the first 20,000 words and $15 per every 1,000 words thereafter. Another service offers a flat rate of $260 for the first 50 pages, but applies a per-page rate thereafter. A manuscript of 100-199 pages is priced at $6 per page; from 100-199 pages, $4 per page. A manuscript of 200 pages is priced at $3.75 per page. Paid critiquing is neither a practical nor sensible solution for the beginning writer. Such services are for writers who have already done everything they can to improve their drafts with whatever help is available to them without an outlay of cash. On the other hand, writers need the feedback of other writers. What’s the solution? Where can beginners find suitable readers for their early drafts without an outlay of cash? First, they must be willing to critique the work of others in exchange for critiques of their own writing. Ideally, they will find another writer or writers in their own vicinity. For example, I belong to a writer’s critique group whose members live within a radius of about thirty miles. We meet weekly, varying the meeting place so that no one has to drive the farthest distance every week. Not every group is a good fit for every writer. In approaching an established group, writers need to evaluate the writing level and interests of the members. Some groups specialize in different genres. Not every group critiques poetry or illustrated children’s books. Not every group is made up of beginners. A group of published writers may not be the best choice for an unpublished writer who is still struggling with basics. A good place to find kindred writing spirits is your local public library. Browse the bulletin board. Ask the reference librarians if they know of authors in the area. Writers who can’t find other writers locally can look for critique partners on the Web. Here is a starter list of five sites that offer help in finding a partner: Kingdom Writers An email critique and fellowship group for Christian writers. Ladies Who Critique Ladies Who Critique  is a critique partner-matching site for writers of all levels – â€Å"published, unpublished, aspiring, hobbyists, even closet writers or complete newbies!† Nathan Bransford This free writing forum offers a thread devoted to connecting with a critique partner. Poetry-Free-For-All This site boasts 23,000 members â€Å"of all skill levels† and is described as â€Å"a non-stop online poetry workshop for beginners and experts alike.† Participants must agree to offer at least three critiques of others’ work for each poem submitted. Quantum Muse This site is for writers of â€Å"science fiction, fantasy and alternative writing and artwork.† It offers the opportunity of publication. Membership is free, but participants must complete three critiques of the work of others before receiving permission to submit. Scribophile This free site is for writers of all skill levels. Members exchange detailed critiques. Reciprocity is a must. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:15 Terms for Those Who Tell the FutureLatin Plural Endings6 Foreign Expressions You Should Know

Monday, October 21, 2019

Technology as a Macro

Technology as a Macro Introduction It is evident that macro-environment forces have had an impact on the way organizations behave; this is because of their uncontrollable significance to business environment. Technological change is one of the macro-environment; almost all organizations in the world are affected by changes in technology.Advertising We will write a custom assessment sample on Technology as a Macro-environmental force that affect marketing related decision specifically for you for only $16.05 $11/page Learn More The influence of macro-environment is normally beyond the controlling capacity of organizations especially in the market perspective. Technology has enhanced dissemination of information more than ever imagined; today’s buyers have a wide range of information at their disposal unlike in the past. It is with this respect that technology as one of the greatest macro-environment forces will be explicitly discussed. Technology as a Macro-environmental fo rce In order to comprehend the significance of technology in the market, it is imperative to fully understand the meaning of macro-environment forces. In this sense, macro-environment simply means the environmental forces or factors that indirectly alter the operations of an organization. Organizations cannot change these forces since they are external, some of the common macro-environment force includes but not limited to the following factors; economic changes, political changes technological, and socio-cultural changes. In the modern world, one of the leading forces in the macro-environment sense is technology. The rationale for this is because of its influence on the buyer’s choices. In essence, a buyer today has a range of choices unlike before the development of technology. The internet is the world hub of information that can either benefit or disadvantage an organization. Leveraging on information can make a small firm appear larger. More so, it creates a balanced com peting environment for all the firms involved. In this sense, considering that consumer have adequate information about different products and the expected quality which includes the manufacturing materials and their effects with respect to health, consumers are more cautious as compared to the past. This is the reason why the effects of technological changes cannot be over-emphasised. With the ever increasing globalization, technology is a pertinent of strategic alignment of many organizations. Since globalization creates both opportunities for new market venture and also increases the number of competitors, the products and services of a company are easily threatened. In this perspective, technology has the ability to change consumption rate of consumers and therefore imperative in market decisions of the firm. A firm can use the information acquired from the customer’s opinion to improve their services and products. The internet is also an imperative marketing tool that ca n increase the market of a product or service globally. The strategies chosen by an organization are therefore critical for the success of the marketing process. More so, it is worth noting that technology has created a global village and hence a global market, most organizations that do not adapt to this vital marketing tool are easily eliminated.Advertising Looking for assessment on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Conclusion As discussed in this analysis, it has been clearly shown that technology is pertinent to market decisions in the modern world because of its inevitable significance. Technology can therefore be considered to be one of the most vital macro-environment forces in the modern world. As also discussed, the consumers buying ways have been significantly shaped by technological changes due to the information provided to them. This means that the modern consumers are cautious on what they purchase and make more informed decision on their buying habits unlike in the past. With this perspective, it is important to note that market decision of many organizations are influenced by technological development as a one of the macro-environment forces more than other forces because of the technological significance in the market.

Sunday, October 20, 2019

Why Teachers Need Plot, Emotion and Story

Why Teachers Need Plot, Emotion and Story Why Teachers Need Plot, Emotion and Story Why Teachers Need Plot, Emotion and Story By Michael Students like stories. Teachers know that stories keep their interest. But plot, emotion, character, conflict and theme the tools of a fiction writer can be power tools for educators as well. Having an attitude in class Learning theorists have taught that students learn when they feel the need to; that in a sense, they create their own learning. Because emotion and character come from who we are, a lesson with a story motivates students to learn. When a problem is part of a story when it involves people finding a solution feels more urgent. When a California textbook talks about California earthquakes, California students pay attention. When two geological plates slip past each other and the earth quakes under the ocean, thats interesting to some students. But when it causes a tsunami and destroys peoples homes, that introduces conflict, plot, and emotion. Students remember information better in a story form. It helps me remember that Napoleons 1812 invasion of Russia was unsuccessful when I imagine how he must have felt afterwards. For one thing, he must have felt cold which helps me remember the invasion ended in winter. Even math teachers need plot, emotion, and story. Children can understand a word problem better when there is a story line to it. I may not remember the exact answer to a mathematical word problem about John preparing dinner in the kitchen, but I might remember or estimate whether John ends up with too much or too little. Will John get his fill with two cups of food, or must he squeeze by on only half a cup? When the plot (and a hungry boy) depend on the answer, children are more likely to want to understand it. The story makes the problem more interesting to the student. If the teacher or textbook takes no attitude toward the subject, students may not bother to take one either, or even pay any attention. The lecturer ends up sounding like a washing machine, and students can tell he or she is probably not trying very hard. Using emotion to get into college I remember new vocabulary words because I categorize them according to how they make me feel. I may not know the exact definition of equanimity but I know its a happy word. Im not sure I can define opprobrium either, but I know its not a happy word. I didnt learn either word from a dictionary but from my reading, where I have gathered their general meaning by repeatedly seeing them either in happy or unhappy contexts. This technique of finding emotion is at the center of the strategy I teach for taking standardized college entrance exams such as the SAT. It works because many verbal test questions are little stories, with plot and emotion. 14. Though many Americans in late 1864 viewed Lincolns Emancipation Proclamation with opprobrium, they greeted the capture of Atlanta with _______________. a. indifference b. elation c. derision d. trepidation As long as I have the feeling that opprobrium is not a happy word, I can answer that question correctly even if I hardly understand anything else. I dont have to know the history of the American Civil War, the role of President Abraham Lincoln, what the Emancipation Proclamation was, or even what, who, or where Atlanta is. I just need to imagine a crowd of Americans in 1864 hearing the latest news. The key to understanding this class of question is the conjunctive adverb though, which always tells us that the second clause carries a different emotion than the first clause. Now I know that the answer in the second clause must be a happy word, because the first clause has an unhappy word. So to answer the question correctly, I simply need to choose the happy word from the list. Again, I dont need to be able to define any of the words in the list, only to recognize whether they are happy words or not. To make the process simple, I mentally translate the question into: Though the first thingamabob was [not happy], the second thingamabob was __________. a. not happy b. happy c. not happy d. not happy I could use the same simplification technique with the conjunction but, as in The first thingamabob was [attractive, safe, whatever], but the second thingamabob was [the opposite]. The construction not only but tells us the opposite of though, that the second clause is giving us more of the same emotion as in the first clause: Not only was the thingamabob [useful], but it was [very useful, essential]. I use the slang word thingamabob to mean that it doesnt even matter what the thing actually is. What matters is the emotion in the clauses. It may sound like a vague technique, but by using it, I have achieved almost perfect scores on similar test sections in the PSAT, SAT, and GRE. Why tell stories? History is one of my favorite subjects. Even in elementary school, I would read ahead in my history book it had stories, after all. But at an earlier point in my life, I didnt appreciate history. History can be boring when teachers dont relate facts to human nature. I remember asking a teacher why we needed to study it. I wondered why we needed to learn about events that happened to other people long ago. My teacher explained that the stories of others can help us when were in similar situations. I read about a doctor who never expected to use what he had learned in his History of Medicine class, until he found himself in a prison camp without modern tools and treatments. In times of prosperity, we can draw lessons from other prosperous societies. When hard times come, its useful to know how other generations weathered hard times before us. A story is not just a way to make a lesson more interesting. A story can be the lesson itself. In December 1948, Israeli troops found the main road blocked to the central Egyptian garrison in the Negev desert. But Israeli general Yigael Yadin, an archaeologist by training, knew where a second road was. It had been abandoned thousands of years before, but with a little work, his troops made it through because their general knew old stories. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Business Writing category, check our popular posts, or choose a related post below:50 Synonyms for â€Å"Leader†Awoken or Awakened?50 Plain-Language Substitutions for Wordy Phrases

Saturday, October 19, 2019

Should gambling be illegal Essay Example | Topics and Well Written Essays - 750 words

Should gambling be illegal - Essay Example It is not surprising that 51 percent of American adults consider casino gambling â€Å"acceptable for anyone,† (Popkin and Hetter 1994), as the proliferation of sports books and new casinos on virtually every Indian reservation continues unabated. Adding gambling addictions, scams, the drain on taxes, and the unchecked expansion of Internet gambling to the mix, this lucrative industry is draining much of the life out of families and the economy to the point that its illegalization is the only answer. With America’s continued economic downturn, gambling is exacerbating society’s financial woes, as it also reported to feed into costly collateral damage seen in alcoholism, prostitution, drug abuse, destroyed families and various criminal behaviors. But compared to the revenues generated by other segments of the entertainment industry, does gambling really take that big of a bite out of America’s pocketbook? To get an idea, a government report stated that in 1 997, Americans spent some $50 billion on gambling, which was more than all the money spent on movie tickets, theme parks, recorded music, and video games combined, which generated a substantially lower $39.9 billion (Campbell 1999). The government has even gotten into the gambling business through seemingly harmless state lotteries, which are often touted as â€Å"supporting our schools,† yet many taxpayer dollars go into funding gambling winnings. And even though it is noted that â€Å"Legal gambling operations in the U.S. pay millions of dollars in taxes annually to the local and federal governments,† (Hammer 2001), it is also contended that gambling throws away a great deal our federal government’s money. Yet it is argued that shutting down the gambling industry could have disastrous effects, â€Å"What happened with alcohol [prohibition] was a disaster . . . Nobody wants this business, which is flourishing offshore, being pushed back onto the streets and th e back alleys of the U.S. . . . there’s a huge opportunity here [for the government to collect revenue],†(Carruthers 2004). But legal experts assert that legalized gambling has never been on the scale to resolve any social issues, as â€Å"States frequently overestimate the financial impact of gambling revenues,† (Popkin and Hetter 1994). Consequently, it is hard to argue that keeping gambling legal will outweigh the harmful financial and social ramifications that this frivolous pastime carries with it. Feeding into the burgeoning gambling industry with its lotteries, casinos and sports books is the expansion of Internet gambling, which has ensnared Americans in the dangerous privacy and comfort of their own homes. To give a perspective of its growth, it is estimated that worldwide Internet gambling accounted for $300 million in 1997 (Campbell 1999), $2.2 billion in 2000 (Bedell 2011), and the projected amount for 2006 came to $100 billion (Baker 1999). In additi on, â€Å"It is reported that more than 4.5 million Americans have gambled online at least once,† (Bedell 2001) and it is also reported that online sports books take in more money from the Super Bowl than all Las Vegas sports bookies combined (Any Given Sunday). And with increased Internet gambling, there has been a proliferation in criminals scamming gamblers by illegally obtaining personal information, including credit card, social security and pass code data. To curb the wide-scale online scams, much legislation has been

Friday, October 18, 2019

Security Plan Essay Example | Topics and Well Written Essays - 2000 words

Security Plan - Essay Example This plan was not meant for specifics but rather the whole fraternity (Maiwald & Sieglein, 2002). The plan outlined different elements that were important in ensuring its success and efficiency. Regulations on the usage of the computers were formulated. This plan was also geared towards promoting confidentiality in its operating systems. Different individuals were therefore given different responsibilities that would help in ensuring that security is promoted. Responsibility of users North Carolina agricultural and technical state university decided to share responsibilities of ensuring security. Privacy of one’s information or an organization can easily be intruded through hacking therefore, the technology department appealed to all users of computers to be vigilant and ensure that this vice is not promoted. One of the duties of account holders is to ensure that they maintain privacy by not letting others aware of their account detail. Some people do not think it is very impo rtant to keep account information secret; they therefore carelessly display information about their accounts (North Carolina Agricultural and Technical State University, 2008 ) When accessing account users were advised not to go for those that anyone can access, different methods can be applied to ensure security of one’s account. A password is vital it does not mean having a password guarantees one security. They are those accounts with complicated password that cannot be easily accessed. Try to mix different characters in a password for instance use of letters and numbers. Through this method, it will be hard for anyone with ill motives to access your account. This method cannot only be applied in a school situation but also financial institutions. Institutions can take this method so that cases of fraud can be reduced. Banks for instance, use this method when providing ATM cards to their clients; this promotes security to a client’s bank account. Phone holders use t his strategy in protecting their information. When formulating this password, users were advised to use figures they can easily remember even after a long period. Remembering your password is important because, it will reduce issues like blocking of an account. Forgetting ones account can lead to great loses, for instance a student using an account for saving his documents will lose his information because he is not to access his account. In a bank situation, clients who forget their ATM pin numbers are force to apply for other cards. This leads to great delays and additional costs that would otherwise be avoided if the password were mastered. Computer users are to ensure that they do not access accounts that do not belong to them and logging off after every session is important. This will ensure that the next user will not be able to access your information. Working or accessing an account in a public place can sometimes is tricky but users are to be careful about those around them and ensure that they are not intruding their privacy. Some students can decide to access their account while in a public place like the field; they should ensure that, when doing this their privacy is guaranteed. Users were further advised to be vigilant and ensure that actions that lead to insecurity are reported to

A History of American Currency Essay Example | Topics and Well Written Essays - 1750 words

A History of American Currency - Essay Example The specific paper focuses on the presentation of the history of currency in America for the years 1000 up to 1877; however not sufficient information exists for the whole period mentioned above. More specifically, America is a continent the history of which is clearly known only after a particular point of time: the establishment of the first colonies in various regions across the continent. Before the specific period of time just a few hypotheses can be made regarding the currency (referring to the various ‘means’ of exchanging goods of a specific value) used by natives, especially Indians in their daily transactions. After the entrance of people from Europe (especially English but also Spanish and French) in America, a specific monetary system began to be created in the continent; this system had many of the characteristics of the one used previously by Indians while several changes were made (in accordance with the economy of the colonists involved) in order for the various transactions with the mother – country to be completed successfully. The reference specifically to England when describing the monetary history of America is unavoidable; the specific country represented the majority of people that entered America and for this reason the monetary system of England has been considered to be the basis for the American economy – although it was rather a gradual development. As for natives (Indians or Amerindians) they gradually lost their right to intervene in the financial development of their region and had to be adapted to the new monetary standards implemented by colonists. In this context, the monetary history of America (referring to the currency in its form that is similar with its current one) could be regarded as beginning in the 17th century. Regarding this issue, it is noticed by Delage et al. (1993, 141) that ‘in the years that followed 1650 the Amerindians found themselves losing control of their

Major Topic in Juvenile Delinquency Essay Example | Topics and Well Written Essays - 3000 words

Major Topic in Juvenile Delinquency - Essay Example However, it can be said that the system has been fairy effective in controlling juvenile crimes and rehabilitating youths. The juvenile justice system comprises of formal and informal institutions, while the juvenile justice process consists of the procedures that are followed in processing juvenile cases. This paper discusses the history of juvenile justice, the juvenile justice system, which collaborates with the juvenile justice process to administer justice to juveniles, and the juvenile justice process. Keywords: Juvenile, Youth, Child, Justice, Juvenile Justice, Juvenile Justice System, Juvenile Justice Process Introduction Youth crime is a very serious problem to the society. Early youth crimes included runaways, loitering, bullying, and other minor offenses. This has however changed with youths turning violent and committing crimes as serious as assault, robbery, murder, rape, and drug trafficking. In recent years, youth crime has been on the rise affecting many nations world wide. In the United States, millions of juvenile arrests are conducted each year for crimes ranging from violence to minor crimes. According to Cole and Smith, â€Å"in a nation with 74 million people younger than age 18, about 1.6 million arrests of juveniles occur each year , 74,000 of which (just over 4.5 percent) are for violent crimes† (2010, p. 604). ... Institutions and procedures were thus established, in order to conduct justice for juveniles with focus on their welfare. The institutions and procedures established are referred to as the juvenile justice system and the juvenile justice process respectively. The juvenile justice process is therefore a philosophy that underlies the juvenile justice system. From this, it is clear that both institutions and procedures collaborate to administer juvenile justice, and no entity can exist on its own. Martin points out that â€Å"the juvenile justice system is composed of institutions that have been organized to manage established procedures as a way to achieve justice for all juveniles† (2005, p. 4). The institutions are divided into formal and informal organizations, and constitute of community-based programs and agencies, juvenile corrections, juvenile courts, and the police. The juvenile justice process on the other hand, â€Å"refers to distinct procedures established to assure the fair administration of youths under the law† (Martin, 2005, p. 4). These procedures have to conform to the institutions established to administer juvenile justice. The juvenile justice process in conducted in a friendly way, with the primary aims of identifying the youth’s problem and seeking a treatment plan to control and ultimately eliminate the problem. The juvenile justice process involves the police interface, intake and screening at the court, pretrial procedures, transfer to adult court, adjudication, disposition, and corrections (Cole & Smith, 2010). History of Juvenile Justice The issue of juvenile justice has been around for many

Thursday, October 17, 2019

Outline Plot from Journal Essay Example | Topics and Well Written Essays - 250 words

Outline Plot from Journal - Essay Example We ended up eating some pizza together because he said he wanted to make up for what he did. It was graduation day and Fitsum was neatly dressed. He waved at me with a bright smile as he held his diploma. It’s been seven months since we’ve first met and now we have been together for four months. Days passed without my knowledge because we were so in love. Fitsum seemed to be the ideal man, the best I could ever have. He introduced me to his parents and his family was lovely. Mom had known Fitsum all along as he usually hanged out at our house every weekend. We promised to communicate as often as we could. Fitsum was taking up Engineering at ---- School while I decided to take up ----. The distance between us was never an issue because we always found time to be together. My friends knew him well as he always escorted me in school activities. Fitsum, as they said, was an ideal guy. I felt proud whenever I heard this comment. Fitsum was still a varsity player in his college. Every girl in school adored him and it sometimes felt awkward for me to see girls flirting with him while he tried to get rid of them. There came a time when I got tired of his popularity and so avoided watching his games. I would see him after the game and that was how we celebrated. Things got complicated because he wanted me to watch all his games, saying I was his inspiration. I made alibis every now and then, which made things complicated. He did the same to me and never showed up when I invited him to our school activities. My friends asked why they did not see Fitsum anymore and I told them he was too busy w ith his games. Deep inside, I was hurting and could feel the end of our relationship. I have not seen Fitsum for two weeks and he did not have any new posts in his Facebook or Twitter account. I missed him so much but did not know what to do. Alas, I decided to

Joy Essay Example | Topics and Well Written Essays - 500 words

Joy - Essay Example The translation also took some improvement as other authors also tackled the complicity of its meaning. As one author puts it, â€Å"joy is a trickier thing to talk about . . . because it is a responsive state or disposition often defined by category of stimulus - there is for example, spiritual joy, erotic joy, leaving for London joy (Potkay, 2010). â€Å"Joys are modifiable in a way that "happiness," a noun without plural, is not (Potkay, 2010). But regardless of how others define joy, their description can only account so much of that state or feeling of delightful bliss. The description of that agreeable emotion or that delight of the mind can only say so much of that state when I want to open up to the world out of joy; when everything feels so good that the heavens seem to be bluer and the grass seems to be greener. Joy is a feeling that is very personal to me. Such that it would be very difficult for me to rationalize it for it defeats the very purpose and intent of the word. Because joy appeals to my emotion; of how I feel, not to what I think. I experience joy, not think about it. Joy is not only the opposite of grief or dejection. Nor a transient state of mind that ratifies and approve something amiable. Joy is what life is; of how should I live my life. Joy is an expression of that appreciation of the chance that I exist and â€Å"enjoy† my existence. Above all, it is joy that makes me a complete human being. It is that experience of joy in my everyday life that affirms my humanity. Perhaps, there are no other creatures that can experience that same bliss and rapture than I do. The beast may satisfy its hunger and be moved by its instinct to procreate, but there is no joy in that. It was moved by the instinct to survive. It is just nature taking its natural course. But I am moved by motives that go far beyond the instinct. I do things because I â€Å"enjoy† doing it. I, as a human being, experience joy whether

Wednesday, October 16, 2019

Outline Plot from Journal Essay Example | Topics and Well Written Essays - 250 words

Outline Plot from Journal - Essay Example We ended up eating some pizza together because he said he wanted to make up for what he did. It was graduation day and Fitsum was neatly dressed. He waved at me with a bright smile as he held his diploma. It’s been seven months since we’ve first met and now we have been together for four months. Days passed without my knowledge because we were so in love. Fitsum seemed to be the ideal man, the best I could ever have. He introduced me to his parents and his family was lovely. Mom had known Fitsum all along as he usually hanged out at our house every weekend. We promised to communicate as often as we could. Fitsum was taking up Engineering at ---- School while I decided to take up ----. The distance between us was never an issue because we always found time to be together. My friends knew him well as he always escorted me in school activities. Fitsum, as they said, was an ideal guy. I felt proud whenever I heard this comment. Fitsum was still a varsity player in his college. Every girl in school adored him and it sometimes felt awkward for me to see girls flirting with him while he tried to get rid of them. There came a time when I got tired of his popularity and so avoided watching his games. I would see him after the game and that was how we celebrated. Things got complicated because he wanted me to watch all his games, saying I was his inspiration. I made alibis every now and then, which made things complicated. He did the same to me and never showed up when I invited him to our school activities. My friends asked why they did not see Fitsum anymore and I told them he was too busy w ith his games. Deep inside, I was hurting and could feel the end of our relationship. I have not seen Fitsum for two weeks and he did not have any new posts in his Facebook or Twitter account. I missed him so much but did not know what to do. Alas, I decided to

Tuesday, October 15, 2019

Integrating software applications in cloud-Enabled Enterprises Research Proposal

Integrating software applications in cloud-Enabled Enterprises methodology - Research Proposal Example 2. To implement software applications that enabled BYOD in the Enterprise domain. 3. To implement security protocols for BYOD devices that meet the needs of Enterprise frame working This chapter develops a research methodology for pursuing the objectives. The chapter includes research methods section that identifies the proposed methods for implementing the study, research design, and role of the researchers, the study’s facilitators, research participants, and instrumentation for the study. The section also discusses validity and reliability of the selected data collection instruments, data collection procedure, proposed data analysis approach and pilot study for the research. Research method The descriptive study proposes a mixed research approach for investigating its objectives. The method will be explored through field study. It integrates qualitative and quantitative techniques and has the advantages of minimizing weaknesses of each of the techniques and optimizing the t echniques’ strengths. Its advantages and its correspondence to the scope of the research justify its source. Data that is collected in quantitative techniques reflect on the actual value in an occurrence and not a researcher’s perception. ... Such data will inform needs in organizations’ computing systems and consequences of such needs towards development of optimal integrated systems with suitable software applications and desirable security measures. Research design Experimental design is proposed for the study’s quantitative approach. Blocked design will be used. It involves observation of data from partitioned sample space and suits the scope of the study that seeks data on features of integrated computing systems that can co-exist with an enterprise’s network, information on software applications are compatible with BYOD in an organization’s network, and security protocols that are suitable for BYOD in an enterprise’s network. Qualitative data will be collected based on participants’ experiences. The research design is predetermined and is therefore fixed. Role of the group members The group members will assume active roles in the research process. The group’s roles be gan with identification of the research’s title and scope, investigations into the study’s background information, and development of the research problem and research objectives. The groupalso assume the role of developing and implementing the research methodology. After data collection, the group will analyze the data and document research findings and recommendations to stakeholders to the study. Facilitators The group will also be facilitators of the study, will facilitate data collection processes, and technical aspects of data analysis and documentation of the study’s findings. Participants The study will involve three categories of participants, employees of

Monday, October 14, 2019

The Analysis Of Leadership Theories Management Essay

The Analysis Of Leadership Theories Management Essay This journal is related to the analysis of Leadership Theories. In this paper, there are four theories that will be discusses, there are the leader-member exchange theory (LMX), path-goal theory, transactional-transformational theory, and the full-range leadership theory (FRLT). Before we started to discuss the analysis of Leadership Theories, the writer felt that is often difficult to separate leadership theories and models. He also informed that the reason of this study of theory and model will be used interchangeable except there is a very clear difference between them. Firstly, the journal is discussed about the leader-member exchange theory. Leader-Member Exchange Theory, also called LMX or Vertical Dyad Linkage Theory, describes how leaders in groups maintain their position through a series of tacit exchange agreements with their members. A leaders approach is addressed by the theories to the business environment and the followers perception of a leaders performance. The direct relationship between a leader and a follower and theoretical context for their interactions is the dyadic relationship. So that, there are 3 quality of the leader-follower interaction were determined by the LMX such as locus of control, need for power, and self esteem. A size of how a person know his control over his life and environment is locus of control. A person feels a sense of control over his life and activities is called has a high internal locus of control. These type of person also are positive correlate with job satisfaction. The need of power is that employees who understand that need by asking for feedback on performance, compete more visibility jobs and leadership opportunities at their work and career. Another is the self esteem, employees have a sense of their value to the company which typically manifests as more job satisfaction and more emotional resilience. Besides that, the path-goal theory of leadership was developed to describe the way that leaders encourage and support their followers in achieving the goals they have been set by making the path that they should take clear and easy. Path-goal theory describe a leaders activity in leading followers within the context of the organizations environment in a highly structured environment followers do not need a good deal of guidance to perform their works. Unless in an unstructured environment they may need more. Another is the core of the transactional-transformational theory revolves around the alignment of personal and organizational goals, which the theory states benefits both the leader and the follower. The transactional-transformational theory is composed of four transformational components, the four Is such as idealized influence, intellectual stimulation, individualized consideration and inspirational motivation and three transactional components such as contingent reward, passive management by exception and active management by exception. Lastly is the full range leadership theory (FRLT). An extension of transformational leadership theory to nine dimensions of leader behavior is called FRLT. The emotional part of leadership is isolated by idealized influence and is a view of the followers emotional engagement with the leader. According to the writer, the full range leadership theory is also closely associated with the multifactor leadership questionnaire. From this journal, the measure of the success of a theory is based on a number of reasons, that is all the theories are considered in a business environment where success is linked to measurable business criteria. Success has many meaning, but at here will mean that there is a good fit between the leaders behavior and the theory. The writer specially remember this does not necessarily mean that a theories success implies a leaders success because some of the measures will be negatively related to leader performance. Each of the theories under consideration has explained modes of leader behavior, considered both the leaders effect on followers and the interaction between leader and follower. An leader-member exchange scale assesses the degree to which leaders and followers have mutual respect for one anothers capabilities, feel a deepening sense of mutual trust and have a strong sense of obligation to one another. Another way to analysis is the dimensions of measurement for LMX are focused on the follower and his/her job satisfaction and feeling of control. Transformational leadership is defined as a leadership approach that creates valuable and positive change in the followers with the end goal of developing followers into leaders. A transformational leader focuses on transforming others to help each other, to look out for each other, to be encouraging and harmonious, and to look out for the organization as a whole. With this leadership, the leader enhances the motivation, morale and performance of his followers through a variety of mechanisms. These include connecting the followers sense of identity and self to the mission and the collective identity of the organization; being a role model for followers that inspires them; challenging followers to take greater ownership for their work, and understanding the strengths and weaknesses of followers, so the leader can align followers with tasks that optimizes their performance. An example, Sagie and Koslowski (1994) state that employees involved in tactical decision making, participation i n decision making, feel more empowered and involve in the company in future pay and assignment. A person who is practicing active management by expection is called a transactional leader who can use a path-goal and leader-member exchange. The factor for this is the outcome, the transactional leader sees as the total output of the exchange and the transformational leader sees as a stage in the growth of the follower. An action to motive follower, the transactional leader appeals to both the followers intellect and emotions. He will use the best approach at his disposal to move followers forward in achieving his vision. In addition, a leader a full toolkit of capabilities to control his relationship with subordinates is given by the full-range leadership theory. According to this journal, the full range leadership theory can explain most leadership activity simply and leadership-member exchange theory directly addresses the varying relationship between leaders and their subordinates in a context. But since this happens at a higher level, leadership-member exchange does not address the dissemination of vision. Besides, the ability of a leader to direct the activities of subordinates had been addressed by the path-goal theory. Bases on these, the writer feel that transactional-transformational theory is more complete than the prior two theories. The reason of his feeling is it includes their activities, by implication, and expands on the basis for leader actions. Otherwise, this leader also retains the ability to function in a transactional mode in more stable situations. The superior to transactional-transformational theory is full range leadership theory which is an attempt to complete them with the addition of components. Humphreys (2001) found that transformational leaders were more likely to grasp the implication of technology adoption than transactional leaders. Leaders can grow in many ways like educational environments, extending their knowledge of leadership and the world around them. A leader can temper his decisions with wisdom although some would contend that philosophy is useless. Leadership theories are  a relatively recent phenomena that have been advanced by the sudden interest in historical leaders and the desire to identify the characteristics and behaviors that these leaders exhibited.   By understanding the characteristics of the leader, their successes and failures, as well as the political and work environment they faced, the modern day worker can hope to replicate this success. All lie in a multi-dimensional continuum were considered by the leadership theories that considers the emotional, intellectual, physical, and value structure of leaders and followers. Charismatic leadership is leadership based on the leaders ability to communicate and behave in ways that reach followers on a basic, emotional way, to inspire and motivate. Its difficult to identify the characteristics that make a leader charismatic, but they certainly include the ability to communicate on a very powerful emotional level, and probably include some personality traits. Developing charisma is difficult, if not impossible for many people, but luckily charismatic leadership is not essential to be an effective leader. Many other characteristics are involved in leading effectively, and there is significant evidence to indicate that it simply is not necessary to have this elusive charisma to lead others well. Finally, the writers conclusion is between these four theories it appears that none of them are counterproductive. He felt that a leader can pursue them in a balanced manner and expect reasonable results. So the full range leadership theory is the most complete of the theories. The reason is it includes too more activities.

Sunday, October 13, 2019

Uncovering Worth Unknown: The Constancy of Love in Sonnet 116 Essay

Arguably the most famed writer of all time, William Shakespeare became famous for his plays and for his sonnets. These sonnets discuss everything from the importance of children to the troubles of rival poets, and have even been divided into two distinct subgroups—those of the â€Å"Fair Youth† and those of the â€Å"Dark Lady†Ã¢â‚¬â€because of the differences between the two. However, a common theme that runs throughout nearly all of them is that of love. Illustrating and exemplifying love, Shakespeare’s Sonnet 116 provides a classic example of this theme, as Shakespeare both defines love and holds it up as a paragon of all things good. In Sonnet 116, or â€Å"Let me not to the marriage of true minds,† Shakespeare uses personification and metaphors to convey his idea that true love is unchanging and thus never ends. William Shakespeare, the author of Sonnet 116, was born in April of 1564 in Stratford-upon-Avon, England. At the age of eighteen, he married Anne Hathaway, who was six years older than him, and then is recorded to have begun his acting and playwriting career in 1592 when Henry VI was first produced and performed (Branam). Most notably writing plays such as Romeo and Juliet, Hamlet, and A Midsummer Night’s Dream, Shakespeare wrote thirty-seven plays altogether, according to general consensus (Gibson). Also notable, though, were his sonnets. Shakespeare began writing his sonnets at approximately the same time as his completion of Romeo and Juliet. One such sonnet is Sonnet 116, or â€Å"Let me not to the marriage of true minds,† which is found in the â€Å"Fair Youth† section of his sonnets (Branam). Shakespeare’s famed Sonnet 116 opens with the phrase, â€Å"Let me not to the marriage of true minds admit impediments† (Shakespeare 1-2). This line ... .../login.aspx?direct=true&db=lkh&AN=103331CSD12390108000259&site=lrc-plus>. Gibson, Rex, ed. The Sonnets. Cambridge: Cambridge University Press, 1997. Print. Krieger, Murray. â€Å"Poetry as A Testament to Immortality.† Shakespeare’s Poems and Sonnets. N.p.: Chelsea House Publishers, 1999. 55-57. Print. Leone, Bruno, et al., eds. Readings on the Sonnets. San Diego: Greenhaven Press, 1997. Print. Livingston, James. â€Å"Sonnet 116.† Masterplots II: Poetry, Revised Edition. Ed. Phillip K. Jason and Tracy Irons-Georges. Revised ed. N.p.: Salem Press, 2002. N. pag. Literary Reference Center. Web. 6 Mar. 2012. . Vendler, Helen. The Art of Shakespeare’s Sonnets. Cambridge: Harvard University Press, 1997. Print.

Saturday, October 12, 2019

deviance Essay -- essays research papers

The difference between a deviant act and a deviant career is different in many ways. For one to start off by talking about a deviant career. A deviant career has phases that the people involved in it go through. The fist of those phases is entering the deviant career the second is being deviant and the third is exiting the deviant career. People involved in a deviant career also goes through "career cycles- entree, upward mobility, peaks, aging, burn out, and getting out". Also "Patterns for deviant careers are more flexible and varied". As for deviant acts there are different types of deviant acts. These acts consist of individual deviant acts, cooperative acts, and then there is a conflict that may occur. The entering a deviant career consist of a person becoming more acquainted with a deviant act usually changes the company that they keep. Changing the company could be any thing from making new friends or hanging out at different places. People often either shift into a deviant career by them selves or with other people. The type of deviant act is different from that of a career. The first type is called individual act. Individual acts are usually done by ones self with out the help of other people. One person usually does the act itself. Individual acts can also be self induced, thing like a person" taking their own life alcoholism" and a person with a compulsive gambling disorder...

Friday, October 11, 2019

Dental Fillings: A Threat to Your Health or Harmless?

According to the American Dental Association, dentists have been using amalgam fillings for over a century. â€Å"It’s the least expensive type of filling, used in roughly a third of procedures to replace tooth decay† (Southall 1). The amalgam fillings often called â€Å"silver† fillings consist of a mixture of metals: Fifty percent liquid mercury and a fifty percent mixture of silver, tin, and copper (Magner 1). In the 1970’s some of the first claims were made that the mercury in amalgam fillings could be responsible for many health problems (Magner 1).Since then, scientific studies and research on amalgam fillings have unveiled a wide range of health problems that come from mercury exposure, and groups are urging the F. D. A. to ban these so called â€Å"silver† fillings. However, the F. D. A. stills deems amalgam fillings safe for adults and children over six, leaving the general public with the question, â€Å"Do amalgam fillings pose a signifi cant threat to human health? † Since the F. D. A. eemed amalgam fillings safe for the public, many people hold the view that the mercury used in dental fillings is safe and poses no threat to human health. The F. D. A. has based its decision, to allow dentists to use amalgam fillings, on scientific evidence that proved there were no harmful effects from amalgam fillings. In Sharon Begley’s informative article â€Å"Mercury Tooth Fillings: F. D. A. Does an About Face,† she states in 2006 the Journal of the American Medical Association had come to a conclusion on the threats of amalgam fillings. The conclusion: after following just over 1,000 kids for five years in one study and seven years in the other, the scientists found no evidence of harmful effects† (1).In Begley’s article one of the science teams stated that, â€Å"No statistically significant differences were found between children in the amalgam and composite groups. In I. Q. , in memory abi lities, in visuomotor. In all, there were no statistically significant differences in adverse neuropsychological†¦effects observed† (1). Begley’s article offered strong cientific evidence supporting the FDA’s decision to uphold the use of amalgam fillings in America. Ashley Southall put forth an article in 2009 noting mercury levels safe in fillings. Southall mentions that the F. D. A. had stated, â€Å"while elemental mercury has been associated with adverse health effects at high exposures, the levels released by dental amalgam fillings are not high enough to cause harm in patients† (1). Although Southall did use some statements from the F. D. A. , she failed to use specific scientific studies to support the F. D. A. s claim of amalgam fillings being safe which made her article weak. Not only is there scientific evidence that amalgam fillings aren’t dangerous, there is also â€Å"the basic fact of chemistry: The mercury in dental amalgam che mically binds to other elements; the result is a substance that is hard, stable, and safe† (Magner 5). People who hold the view that the mercury used in dental fillings poses no threat are supporting their views with more scientific studies. According to Lois Magner some of the most compelling data has come from studies on dentists.Magner states, â€Å"studies have shown that dentists do tend to have higher levels of mercury in the urine than does the general population. Yet dentists still have no greater risk of illness or death. In other words, even dentists’ above-average mercury levels do not seem to be high enough to cause harm† (5). Magner fears that even though the risk posed by the mercury in amalgam fillings is minimal to none and even though it is cost effective, it can still be banned on unfounded fears (7).On the contrary, many hold the viewpoint that the mercury in amalgam fillings is dangerous and has adverse health effects. Supporters of this view may have based their decision of scientific evidence as well. In an article put forth by the Physicians for Social Responsibility it stated, â€Å"autopsy results have shown that methylmercury causes nerve cell death and scarring in selected areas of the brain† (2). Not only is the brain affected from methlymercury so is the cardiovascular system.There have been links between methlymercury and high blood pressure, heart-rate abnormalities, and heart disease (Physicians 2). The Physiciams also noted that â€Å"while several organ systems in the body can be affected by methylmercury, the major target system is the central nervous system, and the most vulnerable life stage is fetal† (1). There was also a study put forth by the Centers for Disease Control that found nearly 8% of women of childbearing ages had mercury levels to high to be considered safe for a fetus (Physicians 3).This could mean millions of children and women are at risk for adverse health effects associat ed with mercury poisoning. The article â€Å"Mercury Contamination Poses a Serious Health Threat†, offers strong scientific evidence supporting the claim of adverse health effects from mercury exposure, and could definitely change ones mind on the decision to keep or remove their amalgam fillings. I have come to the conclusion that amalgam fillings may be dangerous in large quantities. If I had the means to remove my amalgam fillings safely I would. I have watched many peoples’ testimonies on youtube. om supporting the claim that their amalgam fillings were the cause of several adverse health effects, and that once the fillings were removed many cancers and disease left the body. Many of these people were taking a holistic approach to health and had had their amalgam fillings removed in conjunction with a lifestyle freeing the body of intoxicants. Although I have found much evidence supporting the claim that amalgam fillings aren’t a threat to my health, I still fear they may be.A judge accused the FDA of dragging its feet when it came to the regulations of amalgam fillings (Begley 1), and the F. D. A. as classified amalgam fillings as a Class II or â€Å"moderate risk,† medical device (Southall 1). Still more research and scientific evidence in America needs to be put forth in order for the F. D. A. to put strict regulations on the use of mercury in fillings. I have also found in my research that working in the dental field may also be dangerous because of the high levels of mercury. Unfortunately these are not from credible sources. In this great country of Amercia we have the Freedom of the Press and it just sickens me that conglomerates have control of about two-thirds of our newspapers and can control what is printed (Burns 2).In order to get the truth on whether or not amalgam fillings can cause adverse health effects, one must evaluate why the F. D. A. is motivated to deem amalgam fillings safe, when so many individuals have come forth proving the contrary. Who pays the F. D. A. after all? Is a question I still need to answer myself. As for now the American Dental Association isn’t going to get rid of an affordable practical solution to tooth decay just because some individuals think their health issues were related to their amalgam fillings.