Monday, December 16, 2019
How Does of Mice and Men Present the Life of a Migrant Worker Free Essays
John Steinbeck did represent the lives of migrant workers in his novel Of Mice and Men. The lives of migrant workers were hard, challenging and unrewarding. Migrant workers suffered from poverty because they were low-wage workers. We will write a custom essay sample on How Does of Mice and Men Present the Life of a Migrant Worker or any similar topic only for you Order Now They were forced to travel between American states in search of seasonal work . In the novel; John Steinbeck shows the harsh reality of their lives. During the Great Depression most men were forced to move around on their own to make money to send home to their families. Most felt isolated and found it hard to make friends as they moved around so much because of the nature of their work. Loneliness is a theme in this novel that is reflective of the time period in which the novel was written. Steinbeck shows the loneliness of the migrant ranch workers through Curley when one of the characters says ââ¬Å"Curley ainââ¬â¢t giving no-one a chance,â⬠this shows how reserved the workers become as a result of constantly being on their own and having no stable relationships. George and Lennie are different however, and do have someone they can talk to and throughout the novella most characters are suspicious of their close relationship. During the time when the book is set The American Dream was very much alive. During the time of The Great Depression many people packed up their families and headed for LA as that seemed to be the best place to go. Each individual had their own interpretation of their ideal situation for life. For many this would be fame or fortune but George and Lennie had their own idea. George and Lenny both shared ââ¬Å"The American. Dreamâ⬠of owning their own small farm house. This is what keeps both of the characters motivated throughout the novel. ââ¬ËSome day ââ¬â weââ¬â¢re gonna get the jack together and weââ¬â¢re gonna have a little house and a couple of acres anââ¬â¢ a cow and some pigs and ââ¬âââ¬Ë, George and Lennie constantly repeat this phrase continuously throughout the novella. When George talks about the dream ranch Lennie gets really excited about it even though he has heard it a thousand times. Lennie finds that having the ââ¬Å"dream ranchâ⬠repeated to him, soothes his mind and makes him feel happy. Also, it allows him to have something to look forward to. Many times during the book Lennie mentions taking care of rabbits. Lennie likes the fact that he will be able to have something to take care of and that they will be his own. Also, letting him know that he will tend the rabbits works as an incentive for him not to get in trouble, the quote ââ¬Å"But you ainââ¬â¢t going to get in no trouble, because if you do, I wonââ¬â¢t let you tend the rabbitsâ⬠proves that Lennie will try to stay out of trouble as much as he can. How to cite How Does of Mice and Men Present the Life of a Migrant Worker, Essays
Sunday, December 8, 2019
My Health Record Project Vision Document â⬠Myassignmenthelp.Com
Question: Discuss About The Health Record Project Vision Document? Answer: Introduction Headspace is an organization that provides support and assistance to the youth in the age group of 12 to 25 years suffering from mental illness. There are increasing cases of depression, anxiety and other mental illnesses that are been recorded amongst the youth. The diagnosis and management is largely based upon the information provided by the patients in most of such cases. It is, therefore, necessary to have a strong and efficient information recording and processing system in place. The document is a vision document that covers the details of one such project initiated by Headspace named as My Health Record. Project Vision Problem Statement Headspace primarily works with the patients in the age group of 12-25 years suffering from mental illness. In the process of diagnosis and treatment, there are several professionals that the patients are required to interact with such as case worker, medical staff member, nurse, doctor, and psychiatrist and so on. The repetition of the story in front of every such identity leads to the loss in the depth and coverage of the required information (Cadle, 2010). The medical professionals and the other members working with the patient are required to have a complete account of information to provide the necessary recommendations and suggestions. However, due to the incomplete coverage of information, it becomes extremely difficult for the professionals to help the patients (Ammenwerth, 2002). Solution My Health Record is a system that has been recommended to overcome the problem as stated above. The system will have the mechanisms to capture the story of the patient on the first go and will also analyze and store the same. It will be an automated system that will include information recording, storage, retrieval, analysis and processing. Capabilities My Health Record will be extremely usable in nature as it will provide the staff members of Headspace along with the medical professionals with the ability to easily work with the patients. The following set of capabilities will be included in the system. The system will include the mechanism to record and store the story of the patient as stated in the first meeting with any of the case worker or medical professional (Livchits, 2005). The recorded information will be stored in the database linked with the system to allow the authenticated members working on the case to easily access the information. The system will allow easy retrieval of the information with the aid of the authorized credentials and the case number to access the same. There will be information analytics tools synced in with the system to ensure that the relevant trends and patterns are identified and highlighted from the information that is provided and recorded in the system (Abraham, 2011). There may be scenarios that there are newer points stated by the patients in the further discussions with the medical team and case workers. The system will record the same and the common and distinguished points will be highlighted. Benefits There are currently numerous problems associated with the initiative that is taken by Headspace to help and work with the patients of mental illness. With the development and deployment of My Health Record, a number of benefits will be provided to the patients as well as the professionals working with the patients. The patients will not be required to repeat the story in front of every professional and case worker (Brock, 2014). New professionals joining the case will be able to receive the complete case background through the information recorded in the system providing them with ability to connect with the patients in a better manner. The system will automatically store and analyze the information which will bring forward the patterns and specific points which will allow the medical team to easily identify the type of illness along with the necessary details. The information recorded by the system will be easily stored in the database connected with the system and will be protected by the security codes and protocols. The information will, therefore, be kept safe and secure at all times (Muller, 2016). Conclusion Technology is being actively used and applied in the healthcare sector and My Healthcare Record is an example of the same. It is necessary to make sure that the system incorporates the latest elements of technology so that the patients are provided with the accurate care and support. There shall be attention paid to the planning and analysis phases of the project so that the project objectives can be achieved easily. References Abraham, C. (2011). Systems Analysis and Design for Service Oriented Architecture Projects: A Case Study at the Federal Financial Institutions Examinations Council (FFIEC). Retrieved 8 August 2017, from https://pdfs.semanticscholar.org/5a94/68fa888e293593817b5e44bcb11c269a464e.pdf Ammenwerth, E. (2002). Systems Analysis in Health Care: Framework and Example. Retrieved 8 August 2017, from https://www.lina-schwab.de/Publikationen/z10.pdf Brock, S. (2014). Project Design Proposal Writing. Retrieved 8 August 2017, from https://www.iyfnet.org/sites/default/files/P4L_ProjDesign_PropWritGuide.pdf Cadle, J. (2010). Business Analysis Techniques. Retrieved 8 August 2017, from https://www.bcs.org/upload/pdf/business-analysis-techniques.pdf Livchits, V. (2005). System Analysis of Investment Project Efficiency Evaluation. Retrieved 8 August 2017, from https://www.eolss.net/sample-chapters/C15/E1-26-04-05.pdf Muller, G. (2016). System Modeling and Analysis: a Practical Approach. Retrieved 8 August 2017, from https://www.gaudisite.nl/SystemModelingAndAnalysisBook.pdf
Sunday, December 1, 2019
Senator John D. Rockefeller IV of West Virginia
Senator John D. Rockefeller IV of West Virginia is a senior US Senator. Rockefeller was first elected in 1984 and for over 40 years he ââ¬Å"has proudly served the people of West Virginiaâ⬠(About Jay n. p.). He is a chairman of the Senate Committee on Science, Commerce and Transportation. As a chairman for the Intelligence committee, he was a critique about the Presidentââ¬â¢s Bush politics in Iraq, provided the ideas of controlling the television violence by the FFC and granting the ââ¬Å"retroactive immunity to telecommunications companiesâ⬠.Advertising We will write a custom research paper sample on Senator John D. Rockefeller IV of West Virginia specifically for you for only $16.05 $11/page Learn More He also provided the Cybersecurity Act of 2009 ââ¬â S.773 and supported Barack Obamaââ¬â¢s health reform. In this paper, we are going to provide the information on Senator John D. Rockefeller IV of West Virginia, his biography and political activities, such as explore the committees on which he sits and his position on major issues confronting Congress this section. Senator John D. Rockefeller IV of West Virginia was born on June 18, 1937 in New York several days after his great-grand father death. He graduated from Harvard University with a Bachelor of Arts degree in Far Eastern Languages and History. He came to Virginia in 1964 as a volunteer at the community of Emmons. In 1966 he began his political career at the he West Virginia House of Delegates and office of West Virginia Secretary of State. In 1976, he was elected Governor of West Virginia and later, in 1984, he was elected to the United States Senate (About Jay n. p.). He is known for his health care reforms and his national security letters of credence: ââ¬Å"The five-term senator from West Virginia has long been a leading advocate for health-care reform. He is chairman of the Senate Finance subcommittee on Health Care, and played a pivotal role i n the debate over health-care reform in the Obama administrationâ⬠(Why He Matters n. p.) Apart from being a chairman for the Committee on Commerce, Science, and Transportation, he also a chairman for the Subcommittee on Health Care, Subcommittee on International Trade, and Global Competitiveness, Subcommittee on Social Security, Pensions, and Family Policy, Committee on Finance, Committee on Veteransââ¬â¢ Affairs, Joint Committee on Taxation. The committee he leads holds such affairs as, communications, highways, aviation, rail, shipping, transportation security, merchant marine, the Coast Guard, oceans, fisheries, climate change, disasters, science, space, interstate commerce, tourism, consumer issues, economic development, technology, competitiveness, product safety, and insurance (Senate Commerce, Science and Transportation Committee n. p.)Advertising Looking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Lea rn More At the 111th United State Congress Rockefeller held a strong position on such issues as Health Care, National Security and Cybersecurity. He supported Barack Obamaââ¬â¢s Health Care Reform, He said, ââ¬Å"I represent a state that really needs health care reform, and I want it to be goodâ⬠(Calmes n. p.). He fights to increase the access to the health care for small business, rural population and children. Speaking about National Security, senator ââ¬Å"has focused his efforts on improving and reforming the nationââ¬â¢s intelligence capabilities while providing aggressive oversight of the nationââ¬â¢s intelligence and counterterrorism programsâ⬠(Why He Matters n. p.). He confronted the Bushââ¬â¢s politics in Iraq and claimed that involvement into the war with this country was a mistake that increased the threat of terrorism. In April 2009, he offered the Cybersecurity Act of 2009 ââ¬â S.773 in which he emphasized the possibility of cyber-attack and suggested creation of the ââ¬Å"cyber-emergencyâ⬠that would be allowed to ââ¬Å"shutâ⬠any suspicious traffic in spite of any law. Thus, the Senator of West Virginia is one of the most active members of Senate. He has a strong position with respect to Health Care, Cyber and National Security. He supports the reforms of the current president Barack Obama and currently focuses on such issues as jobs and retention, deficit reduction and mine safety (ââ¬Å"About Jayâ⬠n. p.) Works Cited About Jay. United States Senator Jay Rockefeller for West Virginia. Web. Calmes, Jackie. Rockefeller Stands Up for Liberals on Health Care. New York Times. 17 Sept. 2009. Web. Senate Commerce, Science and Transportation Committee. Who Runs Gov from The Washington Post. Web.Advertising We will write a custom research paper sample on Senator John D. Rockefeller IV of West Virginia specifically for you for only $16.05 $11/page Learn More Why He Matters. W ho Runs Gov from The Washington Post. Web. This research paper on Senator John D. Rockefeller IV of West Virginia was written and submitted by user Sloan Stanton to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Tuesday, November 26, 2019
Solutions to Computer Viruses
Solutions to Computer Viruses Introduction As much as technology is useful to human beings, it comes with its challenges. One of such challenge that has troubled technology users for a long period of time is computer viruses. They refer to computer programs that are created by malicious software developers or computer programmers to harm other peopleââ¬â¢s computers.Advertising We will write a custom essay sample on Solutions to Computer Viruses specifically for you for only $16.05 $11/page Learn More Computer viruses are a great problem as they cause damage to data and they can potentially lead to system malfunction (Brain 1). Other viruses can be used by hackers to get information from other peopleââ¬â¢s computers without permission. Solutions to computer viruses The best solution for the problem of computer viruses is installation of antivirus software on computer systems. Once antivirus software is installed in a computer system, it protects the computer system from such malici ous software and ensures that any program that runs in the computer system is authorized. Examples of antivirus software include Kaspersky, McAfee, Norton, Avast etcetera. The only down side of antivirus software is that they are also programs and thus they are not intrinsically perfect. The antivirus software is thus frequently updated in order for it to efficiently protect a computer system (Brain 1). This may prove to be expensive to the user although the cost of updating antivirus software is not as high as the initial cost of acquiring the antivirus software. The computer system user should also be extra careful while using his/her computer. This is especially crucial when the user is working with online application since the World Wide Web has many viruses. Sometimes hackers and virus developers may even develop an application that will ask the user to click on a window to see what it contains. On clicking the window, the virus is permitted to run in the users computer systems and, this way, it may lead to performance bottlenecks or cause serious loss of data. It is thus of essence for users to ensure that they do not run applications that they are not sure about.Advertising Looking for essay on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Users should also avoid being gullible while viewing high risk sites like entertainment sites in which such applications are found. Other links and images that may be sent as spam messages by hackers and virus developers should also be avoided. This is because most computers get infected with viruses though the use of the internet. Conclusion With the continued use of, and advancement in, technology, a lot of technology-related problems have arisen. Viruses are more destructive than ever. Organizations are continually losing important and costly information. This calls for keener and greater care of our computer systems against the effects of virus es. Other measures that people can take to mitigate the effects of viruses are ensuring that files are properly backed-up so that once information is lost the organization does not go back to the drawing board. Efforts should also be made to ensure that once a computer system is infected with viruses, the information saved in it is salvaged. For instance, files and information in a computer system operating a Windows Operating System can be salvaged by running a live CD of the Linux OS. This is done by booting the computer system from the Linux OS CD and finding the files that are not part of the Windows System files, and are not created by the user. The only disadvantage of this kind of operation is that it requires a highly intelligent IT (Information Technology) professional. Brain, Marshall. ââ¬Å"How Computer Viruses Workâ⬠. 2010 ââ¬â January 13, 2010, https://computer.howstuffworks.com/virus.htm.Advertising We will write a custom essay sample on Solutions to Computer Viruses specifically for you for only $16.05 $11/page Learn More
Friday, November 22, 2019
Word Choice Assume vs. Presume - Proofread My Paper
Word Choice Assume vs. Presume - Proofread My Paper Word Choice: Assume vs. Presume When people mix up the words ââ¬Å"assumeâ⬠and ââ¬Å"presume,â⬠itââ¬â¢s not because theyââ¬â¢re similarly spelled. Rather, itââ¬â¢s because theyââ¬â¢re close in meaning, since both can mean ââ¬Å"suppose.â⬠But thereââ¬â¢s a subtle difference in how these terms are defined, so you should be careful not to confuse them in academic writing or other situations where precision is important. Assume (Take for Granted) If we ââ¬Å"assumeâ⬠something, we are supposing it to be true without evidence. For example, if we help ourselves to something at a deli counter in a shop because we think itââ¬â¢s a free sample, only to then get the shop owner asking us if we plan to pay for it, we might say: Sorry! I assumed it was a sample! Weââ¬â¢d then probably buy twice as much as we need of said product, because weââ¬â¢re prone to overcompensation. Regardless, the word ââ¬Å"assumeâ⬠implies jumping to a conclusion. Quick, grab a free sample while hes not looking!(Photo: Unsplash) A second meaning of ââ¬Å"assumeâ⬠is to ââ¬Å"take upâ⬠or ââ¬Å"adoptâ⬠something, such as a duty at work: When Boris retires, I will assume his responsibilities. Or a physical position, like when police frisk a suspect: As they made the arrest, the police told him to ââ¬Å"assume the position.â⬠This use of ââ¬Å"assumeâ⬠is less common, but itââ¬â¢s worth keeping in mind in case you come across it anywhere (especially in professional settings). Presume (Guess Based Upon Evidence) The word ââ¬Å"presumeâ⬠means to make a guess based on available evidence. The most famous example of this is probably when the explorer Henry Morton finally found David Livingstone in the African jungle. As a greeting, Morton then said: Dr. Livingstone, I presume? ââ¬Å"Presumeâ⬠is the correct term here because David Livingstone was the only white European known to be in that part of Africa at the time, so Henry Morton could be fairly sure that heââ¬â¢d found the right person when he came across a white man other than himself! This also made him an easy target for wildlife.(Image: Wellcome Images/wikimedia) A secondary meaning of ââ¬Å"presumeâ⬠is to do something without permission, such as in: Do not presume to tell me what I know about grammar! This use is related to the word ââ¬Å"presumptuous,â⬠which describes failing to observe the limits of acceptable behavior. Assume or Presume? Since the secondary meanings of these words are very different, it should be easy to avoid confusions. Itââ¬â¢s when theyââ¬â¢re used to mean ââ¬Å"guessâ⬠or ââ¬Å"supposeâ⬠that it gets tricky. One helpful memory aid is the joke that ââ¬Å"assumeâ⬠makes an ââ¬Å"assâ⬠out of ââ¬Å"uâ⬠and ââ¬Å"me,â⬠since this spells ââ¬Å"assumeâ⬠as well as warning against the hazard of making assumptions! Remember: Assume = Take for granted without evidence Presume = Guess to be true based upon what is known
Thursday, November 21, 2019
Risk Assessment For nonprofit hospital Essay Example | Topics and Well Written Essays - 1750 words
Risk Assessment For nonprofit hospital - Essay Example Evidently, the industry is highly vulnerable to information theft more than ever before. In modern healthcare settings, risk factors are impulsive and hence comprehensive risk assessment programs are essential to meet the challenges. According to the current day concept, risk assessment is not simply a precaution but a preventive healthcare approach that mitigates the impacts of a number of risk factors (The National Patient Safety Agency, 2007). Why Risk Assessment It has been stated that ââ¬Å"each technical advance brings new security holesâ⬠(Rogers, 2011, p. 2). According to the writer, storing data over the internet involves incessant threat from hackers and malware. Burger (2010) describes the Kern medical centerââ¬â¢s intense struggle with computer virus to regain its data, for the virus had downloaded ââ¬Ëtons of porn documentsââ¬â¢ and crashed all computers causing great dilemma. The incident has been cited by many experts to show that hospital data is always vulnerable to identity theft. For instance, Fell (2010) also points out that hospital computer systems are under the threat of information theft referring to the mayhem caused by virus at Kern Medical Center. According to the officials of UC Davis Police Department, the author says that "Hospitals are a soft target where a cyber attack can cause a lot of damage quite easilyâ⬠(as cited in Fell, 2010). ... 3-5), the business environment highly involves intense competition and technical complexity which raise considerable amount of vulnerability risk to organizations of every type. Hence it is important to have a reliable risk assessment program for every firm to ensure the security of their data and other areas of organizational functions. And risk assessment in the view of the writers is ââ¬Å"a systematic process for describing and quantifying the risks associated with hazardous substances, processes, action, or eventsâ⬠(Covello & Merkhoher 1993, p.3). Risk Assessment Tools There are certain effective free vulnerability scanning tools that can help non-profit organizations to address this issue. Nessus is one of the most important security vulnerability scanning tools. The website gives very detailed information about the vulnerability scanning tool-Nessus. The site has included several frequently asked questions and their answers along with the basic instructions for its user s. A close analysis of Nessusââ¬â¢ official website gives a clear picture of its total functions (Nessus). The relevance of Nessus has been well described in Rogers (2011). According to the author, tools like Nessus have been helping organizations to assess the vulnerability of their systems. It can also be used to check for misconfiguration vulnerabilities like open mail relay and missing patches (p.291). Evidently, Nessus is widely accepted as the most comprehensive vulnerability scanning program available today, for it helps clients to assess the level of their systemââ¬â¢s vulnerability to data theft or virus attack (Nessus: online encyclopedia). The website, SecTools.Org conducts regular surveys to identify and list the communityââ¬â¢s favorite software through multiple
Tuesday, November 19, 2019
Calcium as Second Messengers Essay Example | Topics and Well Written Essays - 1000 words
Calcium as Second Messengers - Essay Example Calcium ions are also important intracellular messengers. In fact, calcium ions are probably the most widely used intracellular messengers (Kimball, 2006). Calcium plays a fundamental role in a variety of cellular functions. It is involved in contraction, secretion, endocytosis, transport across membranes and in more general processes such as cell motility, cell growth and cell division (De Robertis & De Robertis, 1987). Calcium is one of the most important second messenger molecules, with a diverse array of effectors. The intracellular Ca2+ plays a role as the second messenger in the hypotonic stress-induced Na+ transport by stimulating the transcription of SGK1 and ENaC subunits (Taruno, Niisato, Marunaka, 2007). Calcium directly moderates electrical activity, on a relatively fast time scale, through its control of calcium-dependent potassium channels. Long term effects are mediated by various kinases and phosphatases. Calcium is one of the activators of protein kinase C, which pla ys a role in synaptic plasticity. In a complex with calmodulin56, calcium is an activator or regulator of several enzymes, including calcium-calmodulin dependent protein kinase, which plays a role in synaptic plasticity, and adenylate cyclase, which produces cAMP, another important second messenger. ... Once Ca2+ was recognized as a carrier of signals, it became important to understand how its concentration within cells was regulated. Reversible complexation to specific ligands soon emerged as the only reasonable means to perform the task. A number of small cell ligands bind Ca2+ with low affinity, but the process needed complex ligands able to complex Ca2+ with the specificity and affinity demanded by the intracellular ambient. A breakthrough in this direction was the solution of the crystal structure of parvalbumin by Kretsinger in 1972. This still functionally mysterious Ca2+ binding protein was to become the progenitor of a family of proteins known as EF hand proteins, which has now grown to nearly 600 members. EF hand proteins do buffer Ca2+ but also play another important role: They decode the information carried by Ca2+ and pass it on to targets. They do so by changing conformation after binding Ca2+ and after interacting with targets. Essentially, EF hand proteins become mor e hydrophobic on the surface after complexing Ca2+, approach the target, and collapse around its binding domain. Thus, these proteins are better defined as Ca2+ modulated proteins, or Ca2+ sensors (Carafoli, 2002). Second messenger pathways, and some mechanisms controlling calcium concentration, are modeled as a series of bimolecular reactions, enzymatic reactions, and diffusion. These processes occur both in compartments where the number of molecules are large enough to describe reactions deterministically (e.g. cell body), and in compartments where the number of molecules is small enough that reactions occur stochastically (e.g. spines). Thus, to model and simulate second messenger pathways in neurons requires algorithms for both diffusion and reactions, both
Subscribe to:
Posts (Atom)