Wednesday, October 30, 2019

Kite Runner (Write Hassan's Story) Essay Example | Topics and Well Written Essays - 500 words

Kite Runner (Write Hassan's Story) - Essay Example This showed the harassment and troubles that the ethnic minorities faced in Afghanistan at the hands of the pathans. After the incident with Hassan, Amir and Hassan moved apart when Amir put some money under Hassan’s pillow and blamed Hassan for stealing. Hassan took the blame and went away with his father while Amir moved to Pakistan, and eventually to America (Hosseini 295). Ali went with Hassan to a mountainous region which was isolated in central Afghanistan and was inhabited by their ethnic race. Hassan has always been loyal and good-natured. He is rather an innocent child who became a victim of the sexual desires of the rapist who raped him. The story unfolds to the fact that Amir and Hassan have been separated. While Amir is in America living a peaceful life, Hassan spends his whole life and death in Afghanistan in the country which is the focal point of the Soviet invasion and wars, and later the centre of violence of Taliban. Hassan’s father Ali dies due to the violence and Hassan gets married and has a son who is soon sent to orphanage after Hassan and his wife are killed by the Taliban (Hosseini 316). Hassan’s life has been tragic and innocent throughout and he has seen very less of good things just because he was an ethnic minority living in a violent country like Afghanistan. He spent his best time while he was with Amir in his house as they both played kite running and spent a lot of time together. It was after the rape which leads the change in Hassan’s life and shaped Amir’s guilt of not helping him throughout the story. This shows the ugliest picture of the injustice that the ethnic minorities had to face in Afghanistan. After Hassan leaves Amir’s house, he is forced to serve his rapist who belonged to a rich and powerful family. Hassan cannot take any action against his rape and instead has to dutifully serve the rapist just because he

Monday, October 28, 2019

Enforcement Directorate Essay Example for Free

Enforcement Directorate Essay Enforcement Directorate ‡Pertains to the establishment of Directorate of Enforcement and the powers to investigate the violation of any provisions of Act, rule, regulation, notifications, directions or order issued in exercise of the powers under this Act. The Director have been empowered to take up investigations. Enforcement Directorate ‡ The Directorate of Enforcement is mainly concerned with the enforcement of the provisions of the FEMA to prevent leakage of foreign exchange which generally occurs through the following malpractices. 2.Remittances of Indians abroad otherwise than through normal banking channels, i. e. through compensatory payments. 3.Acquisition of foreign currency illegally by person in India. 4.Unauthorized maintenance of accounts in foreign countries. 5.Illegal acquisition of foreign exchange through Hawala. 6.Secreting of commission abroad. Organizational Set-Up *The Enforcement directorate, with its HQs at New Delhi has seven zonal offices at Bombay, Calcutta, Delhi, Jalandhar, Madras, Ahmedabad and Bangalore. The zonal offices are headed by the Dy. Directors * The Directorate has 9 sub zonal offices at Agra,Srinagar, Jaipur, Varanasi, Trivendrum, Calicut, Hyderabad, Guwahati and Goa, which are headed by the Asstt. Directors. FEMA 1999 ENFORCEMENT DIRECTORATE Established by Central Govt to investigate due adherence to the provisions of the Act by market participants. Concerned with enforcement of the provisions of the Act to prevent leakage of foreign exchange occurring through various malpractices. Directorate of Enforcement is responsible for detection of cases relating to violation and performance of adjudicatory functions to curb malpractices FUNCTIONS To collect and develop intelligence relating to violation of provisions of FEMA. To conduct searches of suspected persons, conveyances and premises for seizing incriminating materials. To enquire into and investigate suspected violations or provisions of FEMA. To adjudicate cases of violations of FEMA for levying penalties and also for confiscating the amounts involved in contraventions. To realise penalties in departmental adjudication. The Parliament has enacted the Foreign Exchange Management Act,1999 to replace the Foreign Exchange Regulation Act, 1973. This Act came into force on the 1st day of June,2000. To investigate provisions of the Act, the Central Govt. have established the Directorate of Enforcement with Director and other officers as officers of the Enforcement. ROLE OF ENFORCEMENT DIRECTORATE The Directorate of Enforcement is mainly concerned with the enforcement of the provisions of the Foreign Exchange Management Act to prevent leakage of foreign exchange which generally occurs through the following malpractices 1) Remittances of Indians abroad otherwise than through normal banking channels, i.e. through compensatory payments. Acquisition of foreign currency illegally by person in India. Non ²repatriation of the proceeds of the exported goods. Unauthorised maintenance of accounts in foreign countries. Under ²invoicing of exports and over ²invoicing of imports and any other type of invoice manipulation. Siphoning off of foreign exchange against fictitious and bogus imports land by Illegal acquisition of foreign exchange through Hawala. Secreting of commission abroad. 2) 3) 4) 5) 6) 7) 8) Directorate has to detect cases of violation and also perform substantial adjudicatory functions to curb such malpract ices. ORGANISATION SET-UP The Enforcement Directorate, with its Headquarters at New Delhi has seven zonal offices at Bombay, Calcutta, Delhi, Jalandhar, Madras, Ahmedabad and Bangalore. The zonal offices are headed by the Deputy Directors. The Directorate has nine sub ²zonal offices at Agra, Srinagar, Jaipur, Varanasi, Trivandrum, Calicut, Hyderabad, Guwahati and Goa, which are headed by the Assistant Directors. The Directorate has also a Unit at Madurai, which is headed by a Chief Enforcement Officer. Besides, there are three Special Directors of Enforcement and one Additional Director of Enforcement, FUNCTIONS The main functions of the Directorate are as under: ² The main functions of the Directorate are as under 1 2 3 4 5 6 7 8 9 To enforce Foreign Exchange Management Act 1999 and Prevention of money Laundering Act 2002. To collect and develop intelligence relating to violation of the provisions of Foreign Exchange Management Act and Prevention of money Laundering Act 2002. To conduct searches of suspected persons, conveyances and premises and seize incriminating materials (including Indian and foreign currencies involved) To enquire into and investigate suspected violations of provisions of Foreign Exchange Management Act and Prevention of money Laundering Act 2002. To adjudicate cases of violations of Foreign Exchange Management Act penalties departmentally and also for confiscating the amounts involved in violations. To realize the penalties imposed in departmental adjudication; To attach and confiscate properties involved in the act of Money laundering. To arrest the pers on suspected to be involved in the act of money laundering. To prosecute the person involved in the act of money laundering. In addition to the above functions relating to the Foreign Exchange Management Act. Directorate also processes and recommends cases for detention of habitual offender under the Conservation of Foreign Exchange and Prevention of Smuggling Activities Act,1974 (COFEPOSA), which provides interalia for detention of a person with a intention of preventing him from acting in a manner prejudicial to the conservation and augmentation of exchange. PROCEDURAL PROVISIONS For enforcing the provisions of various sections of FEMA,l999, the officers of Enforcement Directorate of the level of Assistant Director and above will have to undertake the following functions: 1) 2) 3) 4) Collection and development of intelligence/information. Keeping surveillance over suspects. Searches of persons/vehicles as per provisions of Income ²tax Act,1961. Searches of premises as per provisions of Income ²tax Act,1961. 5) Summoning of persons for giving evidence and producing of documents as per provisions of Income ²tax Act,l96l. Power to examine persons as per provisions of Income ²tax Act,196l. Power to lcall for any information/document as per provisions of Income ²tax Act , 1961. Power to seize documents etc. as per provisions of Income ²tax Act,196l. Custody of documents as per Income ²tax Act,196l. Adjudication and appeals- Officers of and above the rank of Dy Director of Enforcement, are empowered to adjudicate cases of contravention of the provisions of the Act; these proceedings which are quasi ²judicial in nature, start with the issuance of show cause notice; in the event of cause tshown by the Notice ²not being found satisfactory, further proceedings are held, vis. personal hearing, in which the noticee has a further right to present his defence, either in person or through any authorised representative; on conclusion of these proceedings, the adjudicating authority has to examine and consider the evidence on record, in its entirety and in case the charges not being found proved, the noticee is acquitted, and in the e vent of charges being found substantiated, such penalty, as is considered appropriate as per provisions of section 13 of the Act can be imposed, besides confiscation of amount involved in these contraventions. The penalty imposed has to be deposited in the concerned office of the Dy. Director within 45 days of the date of receipt of the Adjudication order. In case the party feels aggrieved by the orders of the adjudicating authority, he/she/they can refer appeal, before the Appellate Tribunal/Special Director (Appeal), Foreign Exchange. Whereas, another appeal lies to the High Court, against the order of the Appellate Tribunal, however, only in the matters involving question/points of Law. PUBLIC GRIEVANCES MACHINERY The Directorate keeps a constant vigil over its officers/staff and strict action is taken against anybody found/suspected to be involved in any undesirable activity. The Vigilance Cell of the Directorate works under the direct supervision of the Director of Enforcement, and, at present, it includes two very senior officers.

Saturday, October 26, 2019

Essay on Fate and Human Responsibility in the Aeneid -- Aeneid Essays

Fate and Human Responsibility in the Aeneid  Ã‚  Ã‚  Ã‚  Ã‚               If you're going to write an epic about great heroism, don't use the Aeneid as your primary guide. It's not that heroism can't be found in the Aeneid, it's just hard to prove. First off, Virgil writes a story in a fatalistic universe, wherein every action and every event is under Jupiter's divine thumb .   Fatalism "is all-pervading in Virgil . . . in it [the Aeneid] the words fatum and fata occur some 120 times" (Bailey 204). And in the first three books alone "the word 'Fatum' or 'Fata' occurs more than forty times" (Sellar 334).    Venus praises Jupiter as one who: "command[s] and govern[s] the events of gods and men . . ." (1:321-21). Furthermore, Phoebus tells Aeneas that "the king of gods allot the fates, revolving every happening . . ." (3:484-87).   So whenever Aeneas wins a battle, whenever Aeneas needs help, whenever Aeneas catches a cold, Jupiter has control.   And though not all events are fated (e.g. Dido's suicide), most events are under the contr ol of the gods .   Aeneas even admits that he doesn't have a free will (4:491-92), because he is bound for Latium.   If a universe is fated, how can anybody be responsible for his or her actions?   The very idea of fatalism obliterates any notion of heroism because it removes the potential for human responsibility .            Ã‚   Why should Aeneas be praised for conquering Latium? Why should Aeneas be called a hero?   The interesting paradox within the Aeneid is the idea of human responsibility interwoven with fatalism.   Though Aeneas knows that "fate has promised" his settlement in Latium (1:286-87), he doesn't sit around waiting for Jupiter to zap them all into Latium; he is on a constant quest to settle there.   And t... ...he Aeneid. L'ERMA, di BRETDCHNEIDER, ROMA, 1983.    Henry, Elisabeth.   The Vigour of Prophecy, A Study of Virgil's Aeneid. Bristol Classical Press, Great Britain, 1989.    Lyne, R.O.A.M. Further Voices in Vergil's Aeneid. Clarendon Press, Oxford, 1987.    Poschl, Viktor. The Art of Vergil, Image and Symbol in the Aeneid. Trans. Gerda Seligson, Greenwood Press, Connecticut 1986.    Paschalis, Michael. Virgil's Aeneid: Semantic Relations and Proper Names. Clarendon Press, Oxford, 1997.    Sellar, W.Y. The Roman Poets of the Augustan Age. Clarendon Press, Oxford, 1877.    Silvestris, Bernardus. Commentary on the First Six Books of Virgil's Aeneid. Translated by Schreiber and Maresca. University of Nebraska Press. London, 1979.    Quinn, Kenneth. Vergil's Aeneid, A Critical Description. Routledge & Kegan Paul, London. 1968.

Thursday, October 24, 2019

Rogerian Essay: Same Sex Schools vs. Co-Ed School

Samantha Finocchio English 211 Mrs. Plummer March 5th, 2o13 Rogerian Essay Same Sex Schools vs. Co-ed Schools People everywhere have different beliefs. In this case, trying to decide whether schools should be the same gender or mixed gender is the problem. This predicament is affecting how our children of the future will learn and succeed in life. There are pros and cons for both co-ed and same sex schooling. Some say co-ed schools should remain the way they are; others strongly disagree and believe that schools should consist of one sex only. Same sex schools can be down right awful for some students.Depending on how you look at it, the co-ed interaction could be great. Some students need the socialization to live. These types of students thrive on it. They want to be able to learn about the other sex so later in life they will not feel vulnerable when they enter the real world. The real world is clearly full of both men and women. Job atmospheres are almost always co-ed nowadays. W ithout growing up in that type of environment young adults from same sex schools may not know how to react when they get there. Being stuck in a same gender school your whole life can be boring and drab.There is no personal expression, style, flirting, or even any drama. People live for these things and they are not accessible in same sex schools they will be distressed. Another reason co-ed schools tower over private same sex schools is because private schools are too strict. One way they are is because they often require uniforms. Uniforms are no fun when you cannot express your own style. They do not give individuals the opportunity to express themselves by being different. Another reason co-ed schools are better is because they are often easier on their students when it comes to discipline.A lot of parents feel that the discipline should be learned at home. The education facility is a place to learn about school matters, not etiquette. Although, co-ed schools may be more fun and entertaining, are the students actually learning anything? Evidently, co-ed schools do have their positive effects on students but same sex schools are ultimately better. Co-ed schools cannot compete with private same sex schools because the same sex schools are much better environments for focus and learning purposes. That is the main importance of this problem. A greater amount of work will get done if it is only girls and only boys.Schools that are same gender are generally private schools. This means the students would be wearing uniforms. Uniforms stand for unity and equality. They make it so that everyone is equal and clothes will not be an indicator of popularity or wealth. No one will be compared to others because of what they are wearing since they will all be dressed the same. Flirting and sexual activity will be cut down extremely. When boys and girls are together they often tend to get distracted and in trouble by talking, giggling or caught up in each other and not get their school work done. This would also cut back on the drama.Girls tend to fight and cause drama but when you take boys out of the picture a majority of the problems will dissolve. Often, children, teens, and young adults who are misbehaved have parents that cannot handle them and end up sending them away to boarding schools to learn discipline. Every school will be same sex/private so parents will not have to worry about sending their child away because they will get the same discipline in every single school. It was proven in 2000 by ACER that â€Å"boys and girls in single-sex schools were more likely to be better behaved and to find learning more enjoyable and the curriculum more relevant. This being said, with only of the genders in the classroom, class sizes would be cut in half. Smaller classes will allow each teacher to better focus on each student individually. Although people have views on same sex and co-ed schools that differ drastically, they can come to a compromise by doing a little of both. This consensus will be that schools will be same sex from kindergarten to eighth grade. This will give children the to chance to learn the fundamentals of their studies with no interruptions. They will be able to learn discipline in their younger years so when they get older they will already have the skills to use in life.Compromising for the people who are for co-ed schools, all of high school and higher education co-ed schooling will be a choice. Being in a co-ed environment as a young adult will give them enough experience for the real world while already have the superior essentials from same sex private schools in their childhood. These same gender schools at an elementary and middle school level will then turn into co-ed school for high school and benefit both sides of the problem. WORK CITED â€Å"NASSPE: Research Single-Sex vs. Coed: The Evidence. † NASSPE: Research Single-Sex vs. Coed: The Evidence. N. p. , n. d. Web. 06 Mar. 2013.

Wednesday, October 23, 2019

Packet Sniffing

Sniffing In short, packet sniffing is the method used to see all kinds of information as is passes over the network it is linked to, but how does a packet sniffer work? A packet sniffer is a piece of software or hardware capable of monitoring all network traffic. It is able to capture all incoming and outgoing traffic for example clear-text passwords, user names and other private or sensitive details. Packet sniffing is a form of wire-tap applied to computer networks instead of phone networks. It came into vogue with Ethernet, which is known as a â€Å"shared medium† network.This means that traffic on a segment passes by all hosts attached to that segment. Ethernet hardware contained a filter that prevented the host machine from actually seeing any other traffic than that belonging to the host. Sniffing programs turn off the filter, and thus see everyones traffic. In the scheme of things, a computer usually only examines a packet of data that corresponds to the computerâ€℠¢s address but with a packet sniffer you are able to set the network interface to ‘promiscuous mode’. In this case it examines ALL available information passing through it.As the data passes through the system it is copied and stored in memory or on a hard drive. The copies are then able to be studied and the information analyzed. The captured information is decoded from raw digital form into a  human-readable  format that permits users of the protocol analyzer to easily review the exchanged information As soon as you connect to the internet, you ‘sign on’ to a network that is under the watch of your ISP. This network can communicate with other networks and in short forms the basis of the internet.If a packet sniffer is located at a server owned by your ISP, it has the potential to gain access to: * The web sites visited. * What is searched for on the site. * Your e-mail recipients. * The contents of your mail. * Any files you download. * A list of your audio, video and telephony options. * A list of visitors to your website. Switched vs. Non-Switched In a non-switched network environment packet sniffing is an easy thing to do. This is because network traffic is sent to a hub which broadcasts it to everyone. Switched networks are completely different in the way they operate.Switches work by sending traffic to the destination host only. This happens because switches have CAM tables. These tables store information like MAC addresses, switch ports, and VLAN information [1]. Before sending traffic from one host to another on the same local area network, the host ARP cache is first checked. The ARP cache is a table that stores both Layer 2 (MAC) addresses and Layer 3 (IP) addresses of hosts on the local network. If the destination host isn’t in the ARP cache, the source host sends a broadcast ARP request looking for the host. When the host replies,the traffic can be sent to it.The traffic goes from the source host to the switch, and then directly to the destination host. This description shows that traffic isn’t broadcast out to every host, but only to the destination host, therefore it’s harder to sniff traffic. Passive Vs. Active Sniffing Sniffers are a powerful piece of software. They have the capability to place the hosting system’s network card into promiscuous mode. A network card in promiscuous mode can receive all the data it can see, not just packets addressed to it. Passive Sniffing If you are on a hub, a lot of traffic can potentially be affected.Hubs see all the traffic in that particular collision domain. Sniffing performed on a hub is known as passive sniffing. Passive sniffing is performed when the user is on a hub. Because the user is on a hub, all traffic is sent to all ports. All the attacker must do is to start the sniffer and just wait for someone on the same collision domain to start sending or receiving data. Collision domain is a logical area of the network in wh ich one or more data packets can collide with each other. Passive sniffing worked well during the days that hubs were used.The problem is that there are few of these devices left. Most modern networks use switches. That is where active sniffing comes in. Active Sniffing When sniffing is performed on a switched network, it is known as active sniffing. Active sniffing relies on injecting packets into the network that causes traffic. Active sniffing is required to bypass the segmentation that switches provided. Switches maintain their own ARP cache in a special type of memory known as Content Addressable Memory (CAM), keeping track of which host is connected to which port.Sniffers operate at the Data Link layer of the OSI model. This means that they do not have to play by the same rules as applications and services that reside further up the stack. Sniffers can grab whatever they see on the wire and record it for later review. They allow the user to see all the data contained in the pa cket, even information that should remain hidden. The terms active and passive sniffing has also been used to describe  wireless network sniffing. They have analogous meaning. Passive wireless sniffing involves sending no packets, and monitoring the packets send by the others.Active sniffing involves sending out multiple network probes to identify APs. How Does a Packet Sniffer Work? A packet sniffer works by viewing every packet sent in the network. This includes packets not intended for itself. How does it do this? Three types of sniffing methods are used. Methods may work in non-switched networks or in switched networks. These methods are: IP-based sniffing I. P -based sniffing works by putting the network card into promiscuous mode and sniffing all packets matching the IP address filter and is the original type of packet sniffing.The IP address filtering isn’t switched on so the sniffing program is able to capture all the packets. This method will only function in non-s witched networks. MAC-based sniffing MAC-based sniffing works by putting the network card into promiscuous mode and sniffing all packets that match the MAC address filter. ARP-based sniffing ————————————————- ARP-based sniffing doesn’t put the network card into promiscuous mode because ARP packets are sent to its administrators. This is because the ARP protocol is stateless.This means that sniffing can be done on a switched network. Once a hacker has found possible networks to attack, one of their first tasks is to identify the target. Many organizations are nice enough to include their names or addresses in the network name. The Sniffer program works by asking a computer, specifically its Network Interface Card (NIC), to stop ignoring all the traffic headed to other computers and pay attention to them. It does this by placing the NIC in a state known as promiscuous mode.Once a NIC is promiscuous mode, a machine can see all the data transmitted on its segment. The program then begins to constantly read all information entering the PC through the network card. Data traveling along the network comes as frames, or packets, bursts of bits formatted to specific protocols. Because of this strict formatting, the sniffer peels away the layers of encapsulation and decodes the relevant information stored in the packet sent, including the identity of the source computer, that of the targeted computer, and every piece of information exchanged between the two computer.Even if the network administrator has configured his equipment in such a way as to hide information, there are tools available that can determine this information. Utilizing any well known network sniffing tools, an attacker can easily monitor the unencrypted networks. Modes: On wired broadcast and wireless LANs, to capture traffic other than  unicast  traffic sent to the machine running the sniffer software,  multicast  traffic sent to a multicast group to which that machine is listening, and  broadcast  traffic, the  network adapter  being used to apture the traffic must be put into  promiscuous mode; some sniffers support this, others don't. On wireless LANs, even if the adapter is in promiscuous mode, packets not for the  service set  for which the adapter is configured will usually be ignored. To see those packets, the adapter must be in  monitor mode. Who Uses a Packet Sniffer? Packet sniffers are often used by ISP’s as a diagnostic tool for their back-up systems, so it is in fact a well-utilized form of technology. Packet sniffing is also sometimes used to investigate the habits and actions of criminals, for example in the FBI’s Carnivore System.As I am sure you will appreciate from the above, packet sniffers can be a useful, relatively harmless tool or a potentially dangerous invasion of privacy. Packet sniffers are a perfec t example of how technology may be used to help or to harm. USES: The versatility of packet sniffers means they can be used to: * Analyze network problems * Detect  network intrusion  attempts * Detect network misuse by internal and external users * Documenting regulatory compliance through logging all perimeter and endpoint traffic * Gain information for effecting a network intrusion * Isolate exploited systems * Monitor WAN bandwidth utilization Monitor network usage (including internal and external users and systems) * Monitor data-in-motion * Monitor WAN and endpoint security status * Gather and report network statistics * Filter suspect content from network traffic * Serve as primary data source for day-to-day network monitoring and management * Spy on other network users and collect sensitive information such as passwords (depending on any content  encryption  methods which may be in use) * Reverse engineer  proprietary protocols  used over the network * Debug clie nt/server communications * Debug network protocol implementations Verify adds, moves and changes * Verify internal control system effectiveness (firewalls, access control, Web filter, Spam filter, proxy) DEFENSE Detection Protection Conclusion Having looked at what they are, why they work and how they are used, it is easy to view sniffers as both dangerous threats and powerful tools. Every user should understand they are vulnerable to these types of attacks and their best defense lies in encryption. Administrators and professionals need to know that these programs are superb diagnostic utilities that can, unfortunately, be used with malicious intent on any network.

Tuesday, October 22, 2019

Trajan, the Roman Empire and Soldier

Trajan, the Roman Empire and Soldier Born Marcus Ulpius Traianus, Trajan was a soldier who spent most of his life involved in campaigns. When delivered the news that he was adopted by Roman Emperor Nerva, and even after Nerva died, Trajan remained in Germany until he had completed his campaign. His major campaigns as emperor were against the Dacians, in 106, which vastly increased the Roman imperial coffers, and against the Parthians, beginning in 113, which was not a clear and decisive victory. His imperial name was Imperator Caesar Divi Nervae filius Nerva Traianus Optimus Augustus Germanicus Dacicus Parthicus. He reigned as Roman emperor from A.D. 98-117. Although we dont know the details, Trajan set up cash subsidies to help raise poor children. He is well known for his building projects. Trajan also built an artificial harbor at Ostia. Birth and Death Future Roman emperor, Marcus Ulpius Traianus or Trajan was born at Italica, in Spain, on September 18, A.D. 53. After having appointed Hadrian his successor, Trajan died while returning to Italy from the east. Trajan died on 9 August A.D. 117, after suffering a stroke, in the Cilician town of Selinus. Family of Origin His family came from Italica, in Spanish Baetica. His father was Ulpius Trajanaus and his mother was named Marcia. Trajan had a 5 year  older sister named Ulpia Marciana. Trajan was adopted by the Roman Emperor Nerva and made his heir, which entitled him to call himself the son of Nerva: CAESARI DIVI NERVAE F, literally, the son of the divine Caesar Nerva. Titles and Honors Trajan was officially designated optimus best or optimus princeps best chief in 114. He provided 123 days of public celebration for his Dacian triumph and had his Dacian and Germanic successes recorded in his official title. He was posthumously made divine (divus) as had his predecessor (Caesar Divus Nerva). Tacitus refers to the beginning of Trajans reign as a most blessed age (beatissimum saeculum). He was also made Pontifex Maximus. Sources Literary sources on Trajan include Pliny the Younger, Tacitus, Cassius Dio, Dio of Prusa, Aurelius Victor and Eutropius. Despite their number, there is little reliable written information about Trajans reign. Since Trajan sponsored building projects, there is archaeological and epigraphical (from inscriptions) testimony. Trajan Optimus Princeps - A Life and Times, by Julian Bennett. Indiana University Press, 1997. ISBN 0253332168. 318 Pages.

Monday, October 21, 2019

La Dee US History Assignment 3 Essay

La Dee US History Assignment 3 Essay La Dee US History Assignment 3 Essay The Makeup of a Woman: THE STRUGGLE TO ESTABLISH GENDER EQUALITY FOR AMERICAN WOMEN FROM 1865 TO PRESENT Ursurla Waller American History Since 1865 Instructor Jessica Schmidt 2014 Jan 14 The role of women in American society changed from the traditional homemaker to modern-day breadwinners owing to the outcomes of various events that occurred from the end of the Civil War in 1865 through 1920. While America was at war, the existing industries opted to invite women into the labor force because men went to war. Women had to multitask because they still had their homemaker duties while also playing an important role in supporting the war by working for agricultural and war industries. During the war, women began to take on the role of a man in their homes and elsewhere in society. The 19th Amendment’s ratification in 1920 granted a form of equality to women and a newfound freedom of expression, which they took to new and daring heights. Although many women lost their husbands during the war, they suffered together, and societal events changed them together, creating independent, strong, courageous women, whom some refer to as the â€Å"New Woman.† Women in Post-Civil War America faced three unique challenges in their fight to ensure equal rights. The struggle to overcome suffrage, the effort to break the professional barrier held by their male counterparts, and the fight against societal discrimination were the wars women fought in America. Notable events, which helped in the struggle for suffrage, included the formation of the National Women’s Suffrage Association (NWSM) by Susan B. Anthony and Elizabeth Stanton in 1869. The organization was instrumental in fighting for the right of women to participate in the elective process. The fight against discrimination through legal mechanisms, established through the enactment of State laws that illegalized wife battery, was another feat. Another major legal milestone was the decision by the Supreme Court to allow Belva Lockwood to be the first women to testify before it in 1879. The struggle for equal gender rights continued after World War II. Decades of activism for equal right to vote culminated in the enactment of the 19th amendment in 1920 that granted women the right to participate in the elective process. This event inspired women to advance their ambitions at breaking the professional barrier. In 1932, Emilia Earhart became the first women to make a solo flight across the Atlantic. By doing so, she inspired millions of women across America in believing that they could venture in competitive male-dominated careers. Establish equal job rights for women, made a significant achievement with the enactment of the Equal Pay Act of 1963. The law directed the payment of fair remuneration for both men and women. The six events selected can be used to discuss the struggle and achievements made by women in establishing equal gender rights that they enjoy today. Ratified Amendments, 1795-1992 (1919). â€Å"Joint Resolution of Congress proposing a constitutional amendment extending the right of suffrage to women†: General Records of the United States Government; Record Group 11: National Archives. This document is a comprehensive primary source that offers an accurate and detailed description of the statutes contained in the 19th amendment to the constitution. It provides a first-hand view of the document that granted women the right to vote. It can be, therefore, relied upon as a primary source on the current topic. The Associated Press. (1932, June 20). Amelia Shuns ‘Over-Praise’. Atchison Daily Globe. This newspaper article highlights the story of Emilia Earhart’s conquest of the Atlantic. It offers a description of the humility to which Emilia portrayed after she completed her landmark flight. The article can be relied upon as a primary source in depicting the remarkable feat achieved by Emilia Earhart that went on to spur women to engage in male-dominated careers. Norgren, J.

Sunday, October 20, 2019

How to Easily Make Edible Fake Barf

How to Easily Make Edible Fake Barf Making a simulant is a form of chemistry, right? Here are instructions for making your own edible fake barf. Ick! Yet, you might need fake vomit for a gag or costume, right? Edible Fake Barf Ingredients As you can see from the list of ingredients, theres nothing nasty or inedible in this recipe. In fact, its downright nutritious! Feel free to add food coloring if you need a special effect or other ingredients. 1 pkg unflavored gelatinapplesaucepowdered cocoaoatmealraisin bran cerealfrying pankitchen utensils How To Make Fake Barf Heat 1/4 cup of applesauce in the frying pan over low to medium heat.Stir in 1 packet of unflavored gelatin.Add a pinch or two of cocoa powder. Mix thoroughly and remove from heat.Sprinkle oatmeal over the mixture into an aesthetically-pleasing chunky pattern. You can stir it in a bit, but dont mix too much.Repeat the oatmeal procedure with some raisin bran cereal.Spread the barf mixture onto a plate so that it resembles vomit, adding extra raisins or cereal bits, as desired.Allow the barf to cool completely (a couple of hours). Remove it from the plate with a spatula.Have fun! Useful Tips You may wish to spray your plate with nonstick cooking spray to keep the vomit from sticking.Adult supervision is recommended since heat is involved.Please let me know if you come up with alterations to this recipe that make it even more realistic.

Saturday, October 19, 2019

City life Assignment Example | Topics and Well Written Essays - 1250 words

City life - Assignment Example How specifically they tend to relate to society is of significant concerns and thus discussed fully in the essay. The essay tries to answer some questions on how the elderly relate with the society. The essay gives a conclusion relating with popular theorists on city life and planning concerning the elderly homes. The first area of concern is how the elderly are taken care of by the community in relation to their needs. As a responsibility to take care of the elderly, it is vital that we get a critical understanding of the needs and requirements of the elderly. The requirement for the elderly will involve the following; financial needs, housing, health care, nursing, social and other needs. Having a good awareness about the various needs and requirement of the elders as listed above, is necessary for care takers of retirement homes as they are vital for quality care to the elderly. Financial needs, just as regarded in the community, are a basic need for the elderly as it enables them to pay for their requirements such as up-keep at the retirement homes, food, groceries, medicine and other basic necessities. Thus, a source of income or savings is necessary for the senior citizens. Housing is a necessity for everyone as well as for the elderly; this is because everyone desires to live in areas where he or she is comfortable. The design of a retirement home should be able to accommodate changes that may arise with time as well as consider the comfort of the dwellers. The retirement home should be such that it is a safe place with helpful neighborhood in case of an emergency. A place where there is well developed infrastructure service; clean and reliable water supply, electricity, schools, telecommunication and well-connected public transport. Health care is the most beneficial when it comes to the elderly needs as they are prone to sickness. With the ageing trend, their body tends to weaken by slowing down and as a result becoming

Strategic Marketing Audit for Marks and Spencer UK Essay

Strategic Marketing Audit for Marks and Spencer UK - Essay Example The report will also offer recommendations according to the findings with a purpose of assisting the company to maintain and increase market share in the world. Marks and Spencer is one of the leading retailers of clothes, home wares, financial services, and food in the United Kingdom. The company owns over 700 stores in the United Kingdom and 300 across 40 countries in the world. Marks and Spencer has been operational since the year 1884. The company offers high quality, stylish, home products, and exceptional value clothing. Marks and Spencer employ over 75,000 people in the United Kingdom and abroad. The company is the leading provider of women’s lingerie and wear in the United Kingdom, and it is rapidly growing worldwide. Marks and Spencer home wares and clothing account for 49% and the other 51% is in fresh produce, groceries, and food. Marks and Spencer  is listed on the London stock exchange, and it is a constituent of the FTSE 100 index. The company, which is colloquially known as â€Å"Marks and Spencer †,â€Å" M&S or â€Å"Markies†, was characterized in the early 20th century of selling British made goods giving it a reputation. For the purpose, of the study the company in last few faced with economic turmoil’s hence moving towards â€Å" back to basics† strategic while trying to survive the competitive market. The company’s back to basic strategies has not been successful in solving the problems thus necessitating an overhaul in their marketing and strategic audit (Gordon, 2009). In so doing the company will be able to gain a broader understanding of market structures while setting standards in values quality, innovation, customer trust and value services. Through strategy audit, the company will be able to answer financial crisis and the economic recessions. For marketing mix, Marks and Spencer is just in place in that their mix conforms to the products, place, price, and promotion. The company is averse to marketing because of convection

Friday, October 18, 2019

James Nachtwey Research Paper Example | Topics and Well Written Essays - 500 words

James Nachtwey - Research Paper Example I have chosen to research about James Nachtwey because he is a war photographer, which is also my career path after successfully accomplishing my studies (Fussman 206). In addition, this will equip me with the necessary and adequate information concerning his work besides knowing what makes him appear unique compared to other global photographers. Figure 2: Kosovo 1999; Picture showing a mans imprint after Serbs exterminated him. Accessed on 29Th Otcober 2012 from Figure 3: The picture reveals the utter reality of a new weapon of "mass extermination" - Famine experienced by South Sudans citizens and other people residing in wore torn states. Accessed on 29Th October 2012 from All the above images exemplify the same thing and none alters their readings. Mainly, the overriding theme entails the reality of human injustices, which characterize war torn states globally despite their location. There are certain similarities found between my images and those of James Nachtwey’s, since I am taking after him. The significant similarity is the preference of utilizing black and white colors meant to mild the images’ horrific effects as a war photographer (Webb 64). Since, viewing images especially to some audiences it may be uncomfortable besides influencing others opting not to view them. Photographer by utilizing this image intended to convey to his viewers the downright reality of famine experienced by the southern Sudanese. This is evident from the victim’s emancipated body where he is unable to walk but crawl from the tent behind him. Hence, this creates a mood of despair, which is evident from the person’s condition, temporary worn out tent and the absence of any vegetation in the

Economic Growth Essay Example | Topics and Well Written Essays - 2000 words

Economic Growth - Essay Example The economic growth of Singapore is not that strong and sustaining. This is because, Singapore’s population is growing at a slow rate that the current economic plan cannot sustain. The available productive population is not enough to produce goods and services that can support the large old and unproductive population. More to that is Singapore had is limited in terms of land availability and has limited supply of water. This makes it hard to sustain its economy as a lot revenue earned is spend in purchasing this resources rather than developing the economy of that nation (Abeysinghe & Choy, 7). However, it has to be concluded that, though Singapore’s economic growth has not attained a level in which it can be referred to us strong and sustaining, its economy has grown tremendously since 2013. The Economic Development Board of Singapore is committed to achieve better and better investment strategies every year while striving to generate jobs for citizens of Singapore. In order for Singapore to grow economically, it should focus on ensuring that it records a high level of GDP and GNI. This is because these are the indicators of performance of a nation. Therefore, in order for Singapore to increase its GDP per capita. This is well attained by ensuring that Singaporeans are advised to consume the locally produced commodities. Consumption of foreign commodities should be limited since purchase involving such commodities lead to loss of local income. Moreover, Singaporeans should be encouraged to make investments. Investments are a way of ensuring that the local currency circulates appropriately within the economy and therefore reduces the imbalance between the poor and the rich (Koh, 2). In addition to that, government of Singapore is advised to increases its expenditure in generating job opportunities and establishment of social amenities like hospitals, schools, road networks, that will

Thursday, October 17, 2019

Ethics Project Case Study Example | Topics and Well Written Essays - 500 words

Ethics Project - Case Study Example This is because the company might not be able to establish the efficacy of the other levels of the client’s security system that were done by another or other computer network security companies (George 45). The risk aversion principle supports my recommendation because the event of liability for a security breach would tarnish the reputation of the company making it lose the trust of its many clients when it would easily borne the loss of one potential client. When declining to grant the client’s request, the CEO would need to provide the client with sufficient information on all potential risks involved for both the company and the client. This would comply with the guiding principle of the Association of Information Technology Professionals’ ideal of upholding honesty. Finally, my recommendation to decline the client’s request would be to benefit the many clients of the company by reassuring them of the company’s accountability. Based on the utilitarian principle, it would be better for the company to lose this potential client and safeguard the trust of its many clients (George 45). Snapchat’s actions were not ethical because they would have caused serious damages to its subscribers. As such, the first specific action that Snapchat should have taken would have been to verify whether the security vulnerability was genuine or not in order to be sure of the plan of action. Another specific action for Snapchat would have been to initiate containment measures based on the extent of the vulnerability or the accrued damages in order to attend to its corporate duty of taking care of its clients. The final action would have been to notify its clients about the security vulnerability and reassure them that it has contained it in order to demonstrate its accountability to its clients (Perlroth & Wortham p8). The actions of

Approaches to Psychology and Ethics Essay Example | Topics and Well Written Essays - 2250 words

Approaches to Psychology and Ethics - Essay Example This is one of those areas of studies which receives much attention from scholars and researchers and is evolving rapidly. There different approaches of the psychological studies such as cognitive approach, evolutionary approach, socio-cultural approaches, humanistic approach, behavioural approach, psychoanalytic/psychodynamic approach and others (Walker et al, 2007). All the approaches of psychology can be linked with each other as these study different aspects of feelings and emotion within a social context of an individual. Social psychological research studies the psychological aspects in social settings. Social cognitive studies are amalgamation of the social psychological research and cognitive approach wherein beliefs of an individual is studied within his social world. Cognitive approach is based on beliefs of individuals whereas cognitive behavioural approaches study behaviours and beliefs together. Humanistic and narrative approaches are based on lived experience of individ uals in different settings. Psychodynamic approaches are based on feelings of individuals. All the approaches can be explained individually or with respect to each other. In the treatment of mental illness, behavioural processes and other psychological disorders, professionals can use one approach or mix of tow or three approaches for the best treatment of the client. Figure 1: Approaches of Psychology Source: Walker et al, 2007:5 Psychoanalytic Approach This approach originated through the disagreements psychologists had over the behavioural theories. One of the prominent contributors in this approach is Sigmund Freud. Freud treated various patients suffering from mental disorders by the use of conversation methods over a period of time. This is based on the assumption of â€Å"unconscious conflicts, motives, and defences† of the client which is not otherwise expressed in normal social circumstances. In the same process patient's self-knowledge also got improved. Freudâ€⠄¢s theories are based on the psychoanalytical concepts that focus on the ‘unconscious internal conflicts’ of the clients. Freud argues that the unconscious awareness of the client consists of his desires, thoughts and memories of lifetime particularly the early life experiences. There are various contributors who expanded psychoanalytical approach like Carl Jung, Alfred Adler, Karen Horney, Heinz Kohut, and others (Maitland & Hannah, 2008, p. 45). According to Maitland & Hannah (2008) this brought changes in thought and process of psychoanalytical approaches. These are also described as psychodynamic approach.   Behaviourist Approach Behaviourist approach roots back from the time of Aristotle, Locke Thorndike, Skinner and many others. This theory ignores the genetics theories and determines behaviour of an individual purely on the based on assumptions of his environment and experience. According to Maitland & Hannah (2008), â€Å"The behavioural approach focuses on measuring and recording observable behaviour in relation to the environment. Behaviourists think behaviour results from learning. Russian physiologist Ivan Pavlov trained dogs to salivate in response to the sound of a tone, demon- strating stimulus-response learning.  (Maitland & Hannah, 2008, p. 45)† Maslow’s Hierarchy of needs are used in understanding human behaviour in various stages of his life. This hierarchy consists of

Wednesday, October 16, 2019

Ethics Project Case Study Example | Topics and Well Written Essays - 500 words

Ethics Project - Case Study Example This is because the company might not be able to establish the efficacy of the other levels of the client’s security system that were done by another or other computer network security companies (George 45). The risk aversion principle supports my recommendation because the event of liability for a security breach would tarnish the reputation of the company making it lose the trust of its many clients when it would easily borne the loss of one potential client. When declining to grant the client’s request, the CEO would need to provide the client with sufficient information on all potential risks involved for both the company and the client. This would comply with the guiding principle of the Association of Information Technology Professionals’ ideal of upholding honesty. Finally, my recommendation to decline the client’s request would be to benefit the many clients of the company by reassuring them of the company’s accountability. Based on the utilitarian principle, it would be better for the company to lose this potential client and safeguard the trust of its many clients (George 45). Snapchat’s actions were not ethical because they would have caused serious damages to its subscribers. As such, the first specific action that Snapchat should have taken would have been to verify whether the security vulnerability was genuine or not in order to be sure of the plan of action. Another specific action for Snapchat would have been to initiate containment measures based on the extent of the vulnerability or the accrued damages in order to attend to its corporate duty of taking care of its clients. The final action would have been to notify its clients about the security vulnerability and reassure them that it has contained it in order to demonstrate its accountability to its clients (Perlroth & Wortham p8). The actions of

Tuesday, October 15, 2019

History of architecture Essay Example | Topics and Well Written Essays - 250 words - 2

History of architecture - Essay Example The plans did not contain all the elements in the actual buildings, which were requisite of the architectural drawings. The separation between technology and architecture was achieved by the gross structure and physical plants of the sectional drawings. This implies that architecture focused on the structure of a construction while technology handled the rest of the physical plant. The modern practice combines all the technological and structural requirements of buildings by including every aspect in the plans (Banham 14). I think ancient architectural designs were just concentrated on the complete finishing of buildings. This gave the engineers the freedom to add new concepts pertaining to the preference of the home owners. The article indicates that some of the olden features of a building were not included in the plans, but revealed the skills of the builders. This implies that the principles guiding modernists did not apply then and this was risky to the welfare of the home owners. It is evident that the article highlights the milestones that architectural works have surpassed to give modern designs and inspirations (Banham 16). The article also gives examples of ancient architects who inspired designs and plans that contributed to the developments in the

Monday, October 14, 2019

International Trade Essay Example for Free

International Trade Essay International trade is a complex process that involves both physical and abstract components. Its physical aspects include the goods that are traded such as textiles, raw materials for automobiles and manpower or human resources to name a few. Some of its abstract components include the trading policies of governments from every nation and the trading agreements between the trading parties. Issues surrounding international trade vary in terms of complexity and nature, usually involving not only the direct physical and abstract components of international trade but also other areas of concern such as geography of trading locations and the insurance of the traded goods. Since international trade involves two or more traders situated in different countries, there is the issue of trading policies. Governments usually create trading policies that international traders should adhere to. Otherwise, trade compromises will be arranged. Like typical trading activities, there is also the issue of trade agreements between the trading parties specifying what kind and what amount of goods are to be traded for a specified duration. Prior to the actual trade, trading parties from across the world first arranges the payment and financial transaction details that are compatible with the existing laws of the receiving country. Each trading party will also have to ensure sufficient manpower to handle the actual transportation of the goods which, in effect, entails the secured transfer of goods from the supplier to the receiving client. The geography between the trading countries also gives rise to several issues such as determining and agreeing which route to take and what transportation equipments should be used. The security of the trading parties especially the receiving client is another issue in international trade as smuggling of prohibited products remains a big concern.

Sunday, October 13, 2019

The Good, the Bad, and the Apathetic Essay -- Voting Election Voter Vo

The Good, the Bad, and the Apathetic Another presidential election year rolls around for America and what will the vote decide? Sometimes equally debated and foretold, another issue exists that does not appear on the ballot. How many people will turnout at the polls to cast their vote for their governmental representatives? The patterns of American history would say that not very many will show up. â€Å"Indeed, voter turnout has fallen from its peak of 63 percent in 1960 to just below half during the last presidential election, in 1996. As a result, the world's leading democracy ranks 140th in voter turnout among democratically elected governments (Cooper).† They make this point at what seems like every election in recent years and the problem has existed off and on for the entire history of the United States. No easy solution exists to lead more people to the polls without enacting a law requiring the vote, but a few things could help in a small way. Some of the influence for addressing this problem stems from my own personal experience with trying to register for voting in my first presidential election. Complicating my situation is the fact that I go to school in Pennsylvania, but am an Ohio resident. I found it very difficult to complete my registration forms. My first trouble encountered appeared when I found out that no matter what I looked up on the internet, I still had to send away for a registration form and then send it back in. It said that I could print out a form, but that it required me to print the form on number 40 cardstock. What a hassle? This seemed like a lot of effort for such a simple form. Secondly, I have to vote by absentee ballot and thus am required to let the el... ...ection." Encyclopà ¦dia Britannica. 2004. Encyclopà ¦dia Britannica Online. 22 Mar. 2004 <http://search.eb.com/eb/article?eu=115182>. Hobby, Bill. â€Å"So maybe low voter turnout isn't always a bad thing?† The Houston Chronicle. (7 Dec. 1997). 22 March 2004 < http://www.swt.edu/cpm/hobbyscorner/voter.html>. Removing obstacles to voting. (2001). In Moore J. L., Preimesberger J. P., & Tarr D. R. (Eds.), Guide to U.S. elections (Vol. 1). Washington: CQ Press. Retrieved March 31, 2004, from CQ Electronic Library, CQ Voting and Elections Collection: gusel1-152-7218-392799. Shesgreen, Deirdre. â€Å"Internet Could Upend Michigan Race.† St. Louis Post – Dispatch. 9 Nov. 2003, pg. A.7. Utley, Garrick. â€Å"Low voter turnout expected on Election Day.† CNN.com. (3 Nov. 2000). 22 March 2004 < http://www.cnn.com/2000/ALLPOLITICS/stories/11/02/voter.turnout/>.

Saturday, October 12, 2019

The Government Denial of Agent Orange Claims Essay -- Vietnam Governme

The Government Reaction to Agent Orange Claims PREFACE United States involvement in Vietnam has been surrounded by controversy since the 1960s. Many felt that controversy would end with the withdrawal of US troops in the 1970s. The troops came home and were not welcomed with the fanfare that surrounded veterans of previous wars. Was the controversy surrounding Vietnam a â€Å"dead† issue now that the troops were home? The answer is no. The controversy continues to this very day. The issue of whether or not the US should have gotten involved with Vietnam is still undecided. The even larger issue, on the other hand, is that of exposure to Agent Orange. I have been interested in the controversy surrounding Agent Orange since I was in 10th grade. I knew nothing of the topic before that. In 1997, my uncle died of lung cancer. When he was first diagnosed with the disease, I had thought that it was because he owned a bar. I believed that the cause of his cancer was due to all the second- hand smoke he inhaled over the years (he had quit smoking in the 1970s, after 6 years of being addicted). However, I realized that this might not be the case when I overheard him talking to a doctor. My uncle wanted his disability benefits from the Army to go to his son while he was sick and after he died. So, I asked him about his and he started to tell me about Agent Orange. He was drafted in the Army and stationed in Vietnam from 1966 to 1967. His job was to deliver and clean the buckets that Agent Orange was stored in. He attributed his illness to his exposure to Agent Orange. The story of my uncle has motivated me to learn more on the topic of Agent Orange. However, because of the story of my uncle, I am bias in the way... ...mber 1993. New York State Temporary Commission on Dioxin Exposure, Dioxin Agent Orange: Findings, Conclusions, and Recommendations. Albany: September 1983. Scheim, Rich, â€Å"VA to Take Vets’ Word on Agent Orange Exposure,† Courier- Express, November 3, 1981. U.S. Congress, Senate, Committee on Veterans Affairs, Statement of John. F. Sommer, Jr., Director National Veterans Affairs and Rehabilitation Commission Before the Committee on Veterans Affairs, 14 July 1988. Veterans Administration, Worried About Agent Orange? Washington D.C., July 1, 1980 pamphlet. Vietnam Veterans of America, Agent Orange, â€Å"VVA Sues VA Over AO Comp. Rules†. Washington, D.C., December 1986. VVA Legal Services, â€Å"Agent Orange Settlement Upheld†, Agent Orange Claim forms, July 1983. Wolff, Leslie Patten, â€Å"Defoliant Manufactures Launch Counter-suit,† Buffalo Veteran, 1980.

Friday, October 11, 2019

Financial Service and Industry

Asset Transformation Purchase primary securities by selling financial claims (secondary securities) to households Secondary securities are more marketable BECAUSE Less information asymmetry Less monitoring costs More liquid Less risky Without financial intermediaries, households will find direct investments in corporate securities unattractive due to information/monitoring costs, liquidity cost and price risk.Thus flow was funds are less, little monitoring and risk of investments would increase.Specializes of financial institutions General areas (LIP TM) Liquidity services Information services Price- risk reduction services Transaction cost services Maturity intermediation services Institution- specific (McCall) Money supply transmission Credit allocation Denomination intermediation Intergenerational transfers Payment services Information costs Agency costs 0 costs relating to the risk that firm owners and managers use savers' ends not in the best interest of the savers Financial ins titutions collect funds from households in order to avoid free- rider problem (incentive for information collection and monitoring), reduce costs of information collection and monitoring and to develop new secondary securities to more effectively monitor borrows.Liquidity and price risk Financial intermediaries provide secondary claims to household savers – high liquidity and low price risk and invest in these illiquid and risky sectors Advantage of financial institutions managing liquidity and price risk Diversification (due to size of funds) Development of better risk management techniques Disadvantage of delegated institutions Intermediary services are not free Agency issues Risk management Monitoring financial institutions Other special services Reduced Transaction Cost, I. E. Economies of scale Maturity Intermediation 0 Ability to bear the risk of mismatched maturities of assets and liabilities.Credit Allocation (Depository Flu) – Financial intermediaries are the major source of finance in particular sectors of an economy: residential real estate (US and UK), farming (Australia) . Intergenerational Wealth Transfer or Time Intermediation (life insurance, superannuation and pension funds) Payment Services – IFS provide efficient payment services to the society. Denomination Intermediation – Give individuals indirect access to large denomination markets (Money market managed funds, Debt-equity managed funds, Unit trusts) The Transmission of Monetary Policy (Banks) Financial intermediaries are widely used medium of exchange in the economy.Intermediaries' liabilities play significant role in the transmission of monetary policy Money supply in Australia (Don't need to know these term 0) MI : currency + bank rent deposits by private non-bank sector MM: currency + all bank deposits by private non-bank sector Broad money: MM + net borrowing of Non-bank IFS from private sector Specializes and Regulation Financial institutions receive spe cial regulatory attention Negative externalities caused by IFS is costly to households and firms using financial services Special services provided by IFS Institution- specific functions Example: money supply transmission, credit allocations, payment services Australian Regulation System The traditional industry- based regulation entailed separate regulators for individual industry sectors – banking, insurance and security firms. Asses 0 Australia's current financial regulatory framework originated from ‘Financial System Enquiry (Wallis Committee), Australia switched from industry-based regulation to function- based regulation. This introduced 3 regulatory agencies, each in charge of specific functional responsibilities. This reform was necessary as the distinction between the activities of different types of financial institutions was becoming more vague and also because of the overlap in regulation and grey areas.Reserve Bank of Australia (ARAB) 0 Responsible for the development and implementation of monetary policy and for overall financial system stability Australian Prudential Regulation Commission (PARA) 0 Responsible for the prudential regulation and supervision of the financial services industry Regulation of deposit- taking institutions Life and general insurance Superannuation Australian Securities and Investments Commission (ASIA) 0 Responsible for market integrity, consumer protection across the financial system and ensures equal and fair access to financial services. Protects against abuses (example: insider trading), lack of disclosure, malfeasance, breach of fiduciary responsibility.Major types of regulation(Scale) Safety and soundness regulation Consumer protection regulation Credit allocation regulation Investor protection regulation Monetary policy regulation Entry and chartering regulation 1. Risk reduction Encouragement for intermediaries to diversify assets Disclosure of large credit exposure 2. Minimum capital requirements 3. Safety valve Central banks' open market operations to provide exchange settlement fund 4. Monitoring and surveillance The ARAB directly controls outside money and the bulk of the money supply is inside money (deposits). Regulators commonly impose a minimum level of cash reserves to be held against deposits. Cash reserves add to intermediaries' net regulatory burden. There is no explicit liquidly requirement in Australia but Flu' liquidity management policy need to be approved by PARA.Supports lending to socially important sector Example: US' Qualified Thrift Lender test (QUIT) set a minimum amount of loans made to residential mortgages to quality as Thrift Entry Regulation Regulations define scope of permitted activities under a given charter Increasing/ Decreasing entry barriers affect profitability of existing competitors. High direct/ indirect entry costs result in larger profits for existing companies Future of Regulation Implications of SGF questioned – more regulations or more efficient regulations The major provisions include expanding and centralizing powers for Federal agencies, more restrictions and disclosures about risk taking activities by financial institutions and enhancing protection of investors and consumers. The changing dynamics of specializes Potential secular trend away from intermediation by investing directly in primary securities Decline in the relative cost of direct securities investment Growing sophistication of investorsFalling costs of information acquisition and transaction Credit Risk: Individual Loan Risk Types of loans 1. Commercial and industrial loans Short term (1 year) – financing the purchase of real assets, new venture start up costs Syndicated loans 0 financing provided by a group of lenders, usually to finance large commercial and industrial loans Secured/Unsecured loans Fixed/Floating rate Spot loan 0 borrower takes down the entire loan amount immediately Loan commitment 0 can taken down anytime any amo unt, as long as within a maximum loan amount and a maximum period of time predetermined Commercial paper 0 unsecured short- term debt instrument 2. Real estate loans 3. Individual (consumer) loans 4.Other loans, such as, government loans, farms loans Calculating the gross return on a loan Factors affecting the promise loan return Loan interest rate = Base/Prime lending rate (BRB) + Credit risk premium (m) Direct fees (f), such as loan origination fee Indirect feeds, such as, compensating balance requirement (b), reserve requirement Credit Risk and the Expected Return on a Loan 1 -p = probability of default 0MAYBE there is a negative relationship between k and p, however k and p are not independent. As return (k) increases, the probability (p) that the borrower pays the promised return may decrease. Simply increasing k does not lead to a higher return (r). As a result, IFS usually have to control for credit risk – price/promised return and the quantity or credit availability d imensions. Retails Loans Size = Small Higher cost associated with collection of borrower's personal credit information Control credit risk through credit rationing – limit the total exposure/amount loaned Wholesale Loans Different interest rates to compensate for different levels of risks Credit rationing to limit credit exposure Measuring credit risk 1.Qualitative credit risk models Borrower- specific factors Example: reputation, leverage, volatility of earnings, collateral Market- specific factors Example: business cycle, level of interest rate 2. Credit scoring models Calculate a score as a proxy of borrower's default probability Sort borrowers into efferent default classes The scoring model should establish factors the help explain default risk and evaluate the relative importance of these factors Major models 1. Linear probability model 1 if default, otherwise Weakness: the estimated default probability Z may lie outside of [0,1] Employing linear probability model is not often used as superior statistical 2.Logic model Overcomes weakness of the linear probability model using a transformation that restricts the probability to the [0,1] interval 3. Linear discriminate models Altar's Z score model for manufacturing firms Z 2. 9, highly quality loans, low default risk Z Term structure based methods Under market equilibrium, expected return of a risky loan = risk- free rate (after accounting for probability of default (1 -p)) Assuming a zero default recovery rate 0 p(l+k) = 1+1 p: probability of repayment k: return on the corporate debt I: expect return on the risk- free treasury security Example: What is the default probability for a one- year corporate bond? 10% expected return on the risk- free treasury bond k= 15. 8% expected return on the risky corporate debt p = 0. 95 Therefore the probability of default is 0. 05 Realistically, the Fl lender can expect to receive some partial repayment even if the borrower becomes bankrupt. Alton and Ban estimated that when firms defaulted on their bonds in 2002, the investor loses 74. % on average. = recovery rate when default occurs (1 – p) y (1 + k) = payoff to Fl when default occur p (1 + k) = payoff when no default Marginal default probability 0 probability that a bond will default in any given year t Conditional on the fact that the default has not occurred earlier = Marginal probability of default in individual periods Example: 2-period bond Default probability in period 1 Marginal default probability in period 2 Cumulative probability of default over 2 periods We can extract from these yield curves the market's expectations of the multi- period default rates for corporate borrowers Example: Yield Yield Year 1 Year 2 T- Bonds Corporate Bonds 15. 8% One year forward rate on risk- free T-bonds One- year forward rate on corporate bonds 0 The expect probability of default in year 2 0 4.Mortality rate models Marginal mortality rate (MR.) Forward- looking 0 extract expected default r ates from the current term structure of interest rates Backward looking 0 analyses the historic or past default risk experience, the mortality rates, of bonds and loans of a similar quality Non- default probability in year 1 the probability of the loan surviving in the 2nd year given that default has not occurred during the firs year, I. E. Prop(default in year 2 | survive yearly) Cumulative mortality rate (CM) Cumulative probability of default MR. is based on historic or backward-looking data, and it is highly sensitive to the period over which the Fl calculates the Mars. 5. RAZOR models It is based on market data.ROAR concept – balanced expected interest income against expected loan risk Loan approval 0 RAZOR > benchmark return on capital, example: return on equity One year net income on a loan 0 (spread + fees) * dollar value of loans outstanding Loan risk 0 duration or loan default rate Method 1: Use Duration to estimate loan risk The percentage change in the market value of an asset such as a loan is related to the duration of the loan and the size of the interest rate shock Capital at risk (Vary approach) 0 the potential loan Los under adverse credit scenarios 0 Increase in risk premium under adverse credit scenarios Example: Suppose we want to evaluate the credit risk off $1 million loan with duration of 2.

Thursday, October 10, 2019

Great Gatsby Questions

The Great Gatsby Study GuideChapter 11. Explain what Fitzgerald achieved by using Nick’s point of view to tell Gatsby’s story? He achieves a wider look at things. 2. What do we learn about Nick Carraway in the introductory section of the novel? He is upper middle class and went to college. 3. In discussing East Egg and West Egg, Nick states, â€Å"To the wingless a more arresting phenomenon is their dissimilarity in every particular except shape and size. † Indicate what the dissimilarities† Attitude, east egg is traditional; west egg is the new rich. 4. might be. Compare the homes of Nick, Gatsby and the Buchanans. How does each home reflect the personality of its owners? Nick is not flashy and small; Gatsby is a show off of his big home and throws his money around. They just want to fit in. They are classic. 5. Fitzgerald’s description of Tom, Daisy, and Jordan creates not only an impression of physical appearance, but also contains added information. What do you learn about their history and interests, and from their gestures and mannerisms? Tom tends to be a show off and shows what he has. Daisy is a manipulated and whispers so people can bend close. Jordan plays golf and athletic and tom boy and very independent and not married and command’s attention.6. When Nick leaves the Buchanan’s house, he is â€Å"confused and a little disgusted. † Why? What does this suggest about his values? Because he knows Tom’s a player. He values. Friendship and people.7. Though we do not meet Gatsby until Chapter 3, we hear references to him in the conversations of others. Note each reference. What impression do you get? Snobby, stuck up, and flounder’s his money.Chapter 21. I what way is the description in the opening paragraphs of Chapter 2 appropriate to the t otal atmosphere of this chapter? What is symbolic about the â€Å"valley of ashes† and â€Å"the eyes of Dr. T. J. Eckleburg†? Void if life, depressing. (Grey) Lack of life.2. Evaluate Myrtle’s talk of her unhappy marriage. What does she seem to be trying to justify? How she is unhappy with her husband.3. How does Myrtle’s speech reveal her character? She wants to play the victim.4. What does the scene in this New York apartment reveal about Tom? About Myrtle? He does not care and slaps myrtle. She is desperate.5. Does Nick enjoy the afternoon at the apartment in New York? Why or why not? No, because of the incident between Tom and Myrtle. Socratic Seminar QuestionsChapter 31. Chapter 3 describes Gatsby’s â€Å"little party†. Enumerate details about the party itself, about the guests and about their conversation and behavior. He has caters, replaces dresses, has a buffet, serves two dinners.2. Describe the meeting between Nick and Gatsby. Comment on Fitzgerald’s skill in preparing for Gatsby’s entrance into the story. Very, Awkward. He uses hints.3. In what way are Nick and Gatsby similar at this point? Why are they paradoxical? He sounds just like Nick and have things in common. Had a normal conversation.4. What is the reason for Nick’s breaking the story at this point?Read the section beginning with â€Å"Reading over what I have written so far . . . † Proving that his normal. They are very similar5. At the end of Chapter 3, Nick meets Jordan again. The author includes several episodes that emphasize her carelessness and basic dishonesty. Discuss these instances. What do they reveal about Jordan? About Nick?6. Notice the last paragraph in Chapter 3. Is Nick being overly proud here? Discuss. He is thinking too much of himself, and not of others.Chapter 41. The introductory section of Chapter 4 gives a long roster of those who attended Gatsby’s parties. How do they behave toward their host? Why, then, do they accept his hospitality? They go to use Gatsby.2. Describe Gatsby’s car? It’s a cream color, Bright with nickel.3. Discuss the details that Gatsby shares with Nick about his past. He was in the war, and his family had passed away. He traveled to the big cities. He won a medal from war.4. Does Nick believe Gatsby’s story? Why or why not? No, because things don’t match up. Because Gatsby carries a picture and a medal.5. Who is Meyer Wolfsheim? What seems to be his connection with Gatsby? He is Gatsby Acquaintance. Because they’re both business associates.6. Jordan Baker tells Nick about Daisy, Gatsby, and Tom. S ummarize the story. When daisy meets a guy named Jay Gatsby who is a soldier and is engaged but he goes to war and she ends up and leaves the house and she gets caught but doesn’t speck her parents and still goes out with no soldiers. Gets engaged in February and marries. The night be for her wedding she gets smashed and gets drunk and throws away her pearls from tom then they take her a cold bath and make her hurry downstairs.7. Explain the epigraph on the title page of the novel. What does it reveal about Gatsby and his love for Daisy? He is willing to do anything for daisy.8. Do we know why Gatsby has so many parties? Why did he buy the house? Explain. For daisy because he likes her. He wants for daisy to show up.9. What new meaning do you see in the last two paragraphs of Chapter 1? What does Nick mean when he says, â€Å"Then it had not been merely the stars to which he had aspired on that June night†? He is trying to reach out for her. He is talking about daisy.1 0. When Gatsby spoke to Jordan in his library in Chapter 3, he had devised a plan involving Nick. What was it?Why did he not ask Nick directly? Because wanted nick to invite daisy to nicks and Gatsby would show up to nicks house.Chapter 51. Gatsby’s actions in preparing for Daisy’s arrival seem both flamboyant and absurd. What does he do? Why? He’s trembling and his hands are just weighed into his pockets.2. Discuss Gatsby’s actions once Daisy arrives. How do we know he is nervous? How does he try to impress her? He shows his house.3. Toward the end of the chapter, Nick attempts to explain â€Å"the expression of bewilderment that had come back into Gatsby’s face. † What explanation does Nick give? Why, in his opinion, is daisy not at fault? He has been building this up and now he has achieved his goal. Because he built her up too much.4. Describe Daisy’s reactions during the course of her meeting with Gatsby. She’s so emotiona l.5. Has Nick been affected by the meeting between Gatsby and Daisy? In what way? Yes, because he was disappointed for Gatsby.Chapter 61. What was Gatsby’s real name? Why and when had he changed it? James Gatz. He changed it at the age of 17 he changed it because of Dan cody.2. In what way was Dan Cody involved in Gatsby’s destiny?3. Why does Tom attend Gatsby’s party?How does this scene reveal that contrast between Gatsby and Tom? Because he was asked to and to keep an eye on his wife and he wants to know more about Gatsby. Gatsby is generous and Tom is not.4. What is deeply ironic in Tom’s statement, â€Å". . . I may be old-fashioned in my ideas, but women run around too much these days to suit me†? He is a hypocrite.5. Note the reactions of Tom and Daisy at different times during Gatsby’s party. Did they enjoy themselves? Explain. No, Tom did not enjoy himself and Daisy only liked the actress under the tree.6. What suspicions does Tom ha ve about Gatsby? What does he vow to do? His past where he got his money because thinks he’s a bootlegger. He will find out the truth about Gatsby and everything about Gatsby.7. What do Nick and Gatsby talk about after the party? How daisy didn’t like it.8. What is Gatsby expecting of Daisy that prompts Nick to warn him, â€Å"I wouldn’t ask too much of her . . . You can’t repeat the past†? For Daisy to tell Tom that she does not love him.Chapter 71. Note the use Fitzgerald makes of the weather as a background for significant events. Point out examples in this chapter and in previous chapters. It’s hot boiling. Points out its hot â€Å"It’s Hot† said by Daisy.2. Gatsby has made some changes in his lifestyle that so concerned Nick that he went to check on him. What changes do you note? Why did he make them? The staff was fired and he rehired new people except the gardener because daisy did not see him. To make it all about Daisy .3. Analyze daisy’s attitude toward her child as evidenced in this chapter and in Chapter 1. Is she a good mother? Explain why Gatsby looked â€Å"at the child with surprise. † She agreed to stay with her husband for her child. He didn’t think she was the women she was 5 years ago and the baby can‘t go away4. With whom does Tom talk on the telephone early in the chapter? About what? George about the car deal.5. What startling discovery does Tom make shortly after lunch? Daisy’s affair6. What does Gatsby mean when he says that Daisy’s voice is â€Å"full of money†? Why does Fitzgerald put those words in Gatsby’s mouth and not Nick’s? She has changed. It’s a way of Gatsby way of growing up.7. What arrangements are made regarding the passengers of each car on the trip to the city? Why? Tom, Jordan, Nick take the yellow car.Daisy and Gatsby ride in the white coupe. Tom had a plan going on.8. Eyes play a significant rol e in this chapter. Explain. Gods watching you and watches everything.9. Explain Nick’s statement paralleling Tom and Wilson. â€Å". . . it occurred to me that there was no difference between men, in intelligence or race, so profound as the difference between the sick and the well. † Refer to the text and explain what prompted Nick to say this. The both discovered that there wife’s are having affairs.10. What does Gatsby do that makes Nick want â€Å"to get up and slap him on the back†? Why does Nick feel this way? Because he said that he wife does not love him.11. Does Daisy know what love is? Whom does she really love? No. She loves Gatsby but Really loves Tom.12. In what way is each of the main characters involved in the tragedy that occurs at the end of this chapter?13. Is there any significance in the fact that the day is Nick’s birthday? Nick sees his 30th birthday as a significant entrance into a world of â€Å"loneliness, a thinning list o f single men to know, a thinning briefcase of enthusiasm, thinning hair. †14. Why is it necessary for the author to introduce a new character, Michaelis, at this point in the novel?15. Explain what Nick means when he says, â€Å". . . suddenly I guessed at the truth†?16. At the end of Chapter 7 Nick observes Gatsby, Tom, and Daisy after the accident. What conclusions does he reach? After observing Gatsby, Tom, and Daisy after the accident at the end of chapter 7 of the Great Gatsby, Nick comes to the conclusion that Myrtle must have been hit by Gatsby and Daisy, driving back from the city in Gatsby’s big yellow automobile.17. Explain the last paragraph of Chapter 7.Before the trip into the city and the accident, Gatsby was convinced that Daisy was in love with him and would without a doubt leave Tom for him. When he watches Daisy and Tom in the kitchen, the reality of the situation is starting to hit him. Ever since he and Daisy fell apart when she married Tom, h e has entirely devoted his life to acquiring wealth to impress Daisy and when her back. He has devoted his whole life and heart to this woman, and so as he watches her slipping away from him again, he knows nothing more than to return to his vigil over the woman that has controlled his life.Chapter 81. At the beginning of the chapter, the story is interrupted at its most dramatic point. What is the author’s purpose in breaking the story here? He had known what he was doing all along and justified his attentions.2. What had prompted Gatsby to talk freely to Nick now, when he was unwilling to do so in the past?3. What further information do we learn about Gatsby? He loved Daisy and wrote her.4. As Nick leaves Gatsby the morning after the accident, he remarks, â€Å"They’re a rotten crowd. † Enumerate the people â€Å"they† refers to. Why are they â€Å"rotten†?He refers to Tom, Daisy. Because they are hypocrites, Liars.5. What is the compliment that Nick pays to Gatsby? Why does Nick feel compelled to commend Gatsby? He only complimented them only once. He really wanted to give him a push.6. Explain Nick’s meaning when he balances Gatsby’s supposed â€Å"corruption† against his â€Å"incorruptible dream†. Nick means that Gatsby used an illegal and corrupt way of obtaining money all in the name of a pure uncorrupted dream of starting a life with the love of his life, Daisy.7. How does Wilson view the â€Å"eyes of Dr. T. J. Eckleburg†? Does Wilson’s statement have a symbolic level for the novel as a whole? Explain. They are the eyes of god. God is watching you.8. Trace the movements of Gatsby and Wilson at the end of Chapter 8. What Nick’s meaning when he says, â€Å". . . the holocaust was complete†? When George dies it’s the end of the Holocaust.Chapter 91. What makes Nick assume responsibility for the funeral arrangements? Specify the things he did. Because nobody comes thru. Calling people for the funeral. Trying to find Gatsby father to be there and getting Daisy to be there as well.2. What version of the tragedy appeared in the newspapers? How would your account for the fact that this version went unchallenged and uncorrected? Portraying George was crazy.3. Hos had Gatsby’s father learned of the tragedy? To what extent does the father know his son? The papers. That he was proud of his son he knows him as a figure not as a son.4. Discuss the significance of Gatsby’s boyhood program for self-improvement? It got him to change himself.5. What is the irony of Gatsby’s funeral? How nobody shows up to a funeral but to a party people showed up.6. What is the significance of including the scene with Jordan Baker? Jordan’s scene drives apart her relationship with Nick7. What moral judgment does Nick make about Tom and Daisy? Discuss. The moral judgment that Nick makes regarding Tom and Daisy is that they are self-centere d people who do not care whose lives they hurt as long they continue to have their luxurious lives.8. Explain the significance of the last page of the novel in relation to Gatsby’s dream and the American Dream. Nick's reflections at the end of Chapter Nine of The Great Gatsby bring the motif of geography to a conclusion as Nick philosophizes that the story of Gatsby is conclusively a story†¦

Review of Related Literature and Studies Essay

The importance of the business educators is increasing as the business world becomes more complex. Through this program, the students are educated to become skilled individuals who can contribute meaningfully to the overall effectiveness in an office setting, teaching and learning in schools. According to Hornby (2006) he says, â€Å"Curriculum is a subject that is included in a course of study or taught in a school, college, etc.† On the other hand, Uwaifo (2006) stated that a close look at the current Vocational and Technical Education curriculum generally reveals some problems that border on inadequate course content. Uhumuavbi and Ebhomhen (2006) in their own vain statement, they said that irrespective of the level of education and training given during the pre-colonial days in Africa, it was functional because the curriculum was relevant to the needs of the society. Unemployment if it existed, at all was minimal and very few young men roamed the villages and towns with nothing to do. According to Snyder (2008), a flexible curriculum is important because there is no single curricular path to career success. We are giving students more flexibility; this is not a radical departure from our curriculum. While Robert and Booth (2008) stated that the curriculum changes allow students to increase the intensity of their studies. According to Hasan (2001) the current status of the Indonesians educational system is somehow affected by current academic performance, curriculum, and quality of teachers and level of education. The policy directions for curriculum development were very positive and there was a lot of challenge for the Ministry of National Education to follow-up in the implementation of policies formulated, design a curriculum that includes technological system and information system to uplift the academic  performance in every level of education. Updating of the physical facilities is needed to improve teaching and learning process. Wagan (2001) stressed that continuous evaluation of the school curriculum should not be overlooked. Time and development in the business call for change and modification. The suggestions of graduates maybe a rich source of information for authorities, curriculum makers and in-service training program coordinates for materials that need emphasis and innovations. The National Association for Business Teacher Education (NABTE) is the institutional division of NBEA. The primary purpose of the organization is to promote business teacher education by providing national leadership and services to its member institutions and business teacher educators. Membership is open only to such colleges and universities that offer business teacher education curriculums approved by their respective State Departments of Education for the certification of business teachers. NABTE highlighted the importance of professional development in its publication, Business Teacher Education Curriculum Guide & Program Standards (2011). It emphasizes that business teacher educators should be involved in continual professional development activities and highlighted the importance of the course itself for future reference. The education paradigm emphasized during the early part of the 21st Century clearly called for an emphasis on basic skills (No Child Left Behind, 2001). The term â€Å"basic skill† is widely recognized as skill in reading, writing, or math. In fact, the United States national assessment of educational achievement assesses students in two basic skill areas: mathematics and reading. The term reading refers to the ability of a subject to phonemically announce and comprehend written or symbolic material. A licensed teacher is even highly regarded, according to the No Child Left Behind Act 2001, â€Å"highly qualified means that teachers have passed the teacher licensing examination.† (Tileston, 2004, p. 8). Foreign Studies Earlier research studies into the professional development needs of business teacher educators felt they needed more preparation in the development of new teaching methods; it seemed to echo the same perception of practicing business teachers (Polkinghorne, 2006). As a result, Boatright (2005) reported that all teachers must receive â€Å"adequate preparation† to work with  an â€Å"integrated curriculum†. Most teacher education programs use students’ grade point average (GPA) as a criterion for admission (Mikotovics & Crehan, 2002). Some programs combine GPA with ratings of a written profile, which requires applicants to describe relevant experiences and why they are interested in teaching or with letters of reference (Caskey, Peterson, & Temple, 2001) or with ratings of applicants’ performance in an interview (Denner, Salzman, & Newsome, 2001). In the United States, standardized test results are commonly used. Results from specific pre-requisite education courses also may be utilized. Finally, for applicants intending to become high school teachers, most consecutive programs require university-level coursework in the subject areas to be taught. Grade Point Average. GPA is the most widely used criterion for admission to teacher education programs (Lawrence & Crehan, 2001; Mikitovics & Crehan, 2002). It is generally believed to measure academic ability and so is thought to predict success in the instructional parts of the programs. However, a more important reason for its popularity as a criterion is likely its ready availability from students’ transcripts and its use by other advanced degree programs. Written Profile. The second most widely used criterion for entrance into teacher education programs is an applicant profile, typically consisting of written responses to specific questions about relevant experiences and interest in teaching. Such a profile includes much of the same information that could be elicited in an individual interview. The responses may be reviewed by the teacher education program for evidence of appropriate preparation and genuine interest and for evidence of unsuitability for teaching (Caskey, Peterson & Temple, 2001). In Ontario, all but one teacher education program uses some form of profile or essay response for screening applicants (Teacher Education Application Services, TEAS, 2004). Interview. The interview provides a unique opportunity for the teacher education program to gather information about an applicant’s language proficiency, attitudes, and interpersonal skills, in addition to information similar to that which could be gleaned from a written profile (Denner et. al., 2001). Interview ratings have also been found to be of limited value for predicting student teaching performance (Byrnes et. al., 2000; Caskey et. al., 2001; Denner et. al., 2001). However, they found that ratings of applicants’ performance in a  group interview predicted student teaching performance and that this type of interview was a better predictor than academic criteria. More recently, Byrnes, Kiger, and Shechtman (2000) studied 65 pre-service teachers, comparing their university supervisors’ and supervising teachers’ ratings of their student teaching performance with their ratings from a group interview intended to assess applicants’ verbal, interpersonal, and leadership skills. The group interview ratings added significantly to the prediction of the university supervisors’ ratings of the pre-service teachers’ student teaching performance, after controlling for the contributions of GPA and ACT test scores, but not to the prediction of the supervising teachers’ ratings. Standardized Tests. Many teacher education programs in the U.S. use results from standardized tests in their selection processes. For example, 28 states and the District of Columbia require applicants to pass the Praxis I: Pre Professional Skills Assessments (Educational Testing Service, 2006), which tests basic skills in reading, writing, and mathematics knowledge. There does not appear to be a consistent protocol for the use of or selection of standardized tests in the United States, and none are used in Canada as the mandate for Education falls under the jurisdiction of provincial governments. Courses in Subject Area. Applicants for consecutive programs who wish to train to be elementary school teachers are often assumed to have adequate subject matter knowledge if they have a Bachelor’s degree (although some programs will require them to also pass tests of reading, writing, and mathematics). Applicants for preparation as high school teachers, however, typically must provide proof of adequate knowledge of the subject areas they intend to teach. Often, this requirement is met by providing a university transcript showing completion of the required numbers of courses in the specialization areas. More recently, Stotsky (2006) has suggested that the content of the course should be considered and that university academic departments should be held responsible for the content knowledge of elementary and high school teachers in their disciplines. Overall Success in a Teacher Education Program. A few studies have examined the ability of admission criteria to predict overall success in a teacher education program. Caskey, Peterson, and Temple (2001), for example, analyzed the admission data for 82 applicants who were subsequently admitted to a one-year consecutive teacher education program. They found  that ratings of reference letters and a writing test score were most highly correlated with overall program performance. The correlation has the GPA of: 11 with personal statements, 16 with the performance of problem-solving by group, and with a holistic rating of completion application with .03 GPA. Together, the six admission criteria accounted for 38% of the variance in program performance. Hamel and Merz (2005) indicated the potential positive impact on student achievement emphasized through legislation seemed â€Å"reasonable enough† (p. 158). In fact, they indicated that teacher education institutions should work with federal policy makers to find the best way to improve student achievement. A myriad of social science researchers indicated subject-matter knowledge is an important component of effective teaching (Draper, 2008; Kehe, 2003; Stone et. al., 2008). A teacher’s ability to contextualize abstract content-knowledge to authentic learning opportunities is essential to the student’s ability to retain and apply knowledge to unique situations. Contextualizing subject-matter knowledge in social context is supported in both content area reading and cognitive research. Early content area reading research focused on students’ ability to pronounce written materials. To achieve this, according to the National Policy on Education (2004), computer education was integrated into the primary school curriculum, a welcome development but sad to note that subjects like shorthand, typewriting, commerce, and book-keeping are integrated together to form business studies thereby losing their original identity. Local Literature In the growing demands of today’s modern world one should be aware of the striking challenges and complexities of life today. Being aware of these things can do a big contribution in terms of the development of the society as well as the citizen of the society. The test of the greatness of a nation lies on the quality of education of its people. Thus, education plays a vital role in developing and producing locally and globally competitive citizens. On the other hand, if Business Teacher Education program are aiming for quality education and successful teachers, they should consider the effectiveness of the courses and programs being offered as well as the competencies of the teachers in transferring the knowledge and skills to the  future educators of the country. While various schools and other institutions offering business teacher education are having difficulties on improving the performance rating of the graduates in the licensure examination for teachers, it is very interesting to know the admission policies of the schools and the quality of the business teacher education program in producing competitive educators of the country. On the article of Vea Reynaldo (2009) discussing about the World education news and reviews, she made mention about the Philippine educational system. She said that entrance to universities and other institutions of higher education is dependent on the possession of a high school Certificate of Graduation and in some cases on the results of the National Career Assessment Examination (NCAE), or in many colleges and universities the results of their own entrance examinations. The NCAE is administered to fourth-year high school students to gauge the quality of the individual institutions they are attending, it was not designed or intended as an admission test, but has nonetheless served that purpose for some institutions and helps students to choose their career paths. Privately administered testing programs through the Center for Educational Measurement (CEP) are also widely used by colleges for admissions purposes. The two most common ones are the College Scholastic Aptitude Test (CSAT) and the Admission Test for Colleges and Universities (ATCU). The Philippine Education Placement Test (PEPT) is a national examination designed to evaluate the grade level of students returning to the school system or seeking admission to college based on knowledge and skills gained through formal and non-formal methods. Paredes (2000) states that the task of universities, colleges, and other educational institutions engaged in teacher education is to produce teachers whose preparation allow them to possess not only a high degree of technical skills and a thorough education underlying the practice of teaching, but also to become persons qualified to assume the responsibilities of educational leadership in the communities in which they will work. Enriquez, (2000) gives importance on accepting students engaged in Teacher Education Program who would unselfishly devote their lives to the noble task of teaching, which the researchers think will do a great help in producing competent teachers that will help students to  become a productive citizen of the country. The admission policy at Polytechnic University of the Philippines on the year on school year 2011-2012 is on a FIRST-COME-FIRST-SERVED basis subject to the availability of slots. In addition to the general criteria set by the University, admission to an academic program depends on the satisfaction of the specific criteria such as PUPCET Score, High School General Weighted Average and High School final rating requirement in selected HS subjects.) In the College of Education, the specific criteria in admitting aspiring students should have a minimum PUPCET score of 99, on the high school general weighted average their minimum requirement is 82% and the final rating in the English subject should be 82%. The students should pass also in the final interview to be admitted at the College of Education. According to Basaen, et. al. (2005), he wrote about the results of licensure examinations have become measures of the quality of instruction, faculty, and students. Accrediting agencies as well as C.H.E.D. have used government board examination results as gauge in granting schools the university status, center of development, and center of excellence. Moreover, on the results of the licensure examination for teachers at the Polytechnic University of the Philippines from the year 2008-2013 the researchers had gathered. It had been showed from year 2008 that overall results were 63%, wherein 91 out of 144 passed the examination. While on the year 2009, the overall results were 56% wherein 267 out of 479 had passed. On the year 2010 there are 141 who passed out of 359 examinees equivalent to 39.25%. While on the year 2011, the overall results were 40.86 wherein 143 had passed out of 350. On the other hand, on year 2012 the overall results was 72.69% where in 330 out of 454 had passed the examination. Lastly, on the current year 2013, the results decreased from 72.69% to 60.33% wherein 146 had passed out of 242. Thus, there is varying results on the performance rating of the students at the Polytechnic University of the Philippines. It only goes to show that there is still a need of an improvement. Local Studies Licensure examination is a scholastic aptitude test designed to measure some intellectual abilities and skills and that will serve as a requirement for eligibility in the teaching profession. It is the last hurdle that a  candidate must face to acquire a license to work. A board has the ultimate responsibility to ensure that the examination meets the technical, professional, and legal standards, and protects the health, safety, and welfare of the public by assessing candidates’ abilities to practice competently in their chosen field. According to Ornstein and Levine (2006, p. 28) licensure and testing for teachers is one of the steps that improves public confidence in the teacher workplace. Panawidan (2000) found in her study of The Status of the Teacher Education Program of Higher Education Institutions in Region XII that the enrolment in Teacher Education was relatively high compared to other disciplines. She said that teacher education programs are found to be oversubscribed including courses in Business Education, Humanities, Social Sciences and Communication. There seemed to be resurgence in the demand for teachers here and abroad. She also said that teacher education program was well implemented by majority of the teacher education institutions because of compliance to CHED requirements. In addition, results showed that there were more LET passers in the elementary level than in the secondary level. There are several factors which could influence the performance of higher education institutions that are offering teacher education program. According to Tan C (2006) in her study of the Factors influencing the performance of teacher education program in selected state universities and colleges in Region IV-A, some faculty-related factors and dean-related factors influenced the performance of teacher education programs in terms of passing rate in the LET and employment rate of graduates. Supervision of the deans indicated by the dean’s activities towards the improvement of classroom instruction and dean’s supervisory practices for the development of better school and community relationship had significant and positive effect on the passing rate. The more often the deans did such activities, the higher was the passing rate in the LET. Another factor was the school climate since a good school climate results to higher passing rate in the LET, although this condition had a negative influence on the employment rate. The dean’s longer years of teaching resulted to lower passing rate in the LET but the dean’s education attainment positively influenced the employment of the graduates. Layba (2003) conducted his study on Evaluation  of the Quality Teacher Education Program in Higher Education Institutions in the Province of Laguna which consisted of 13 privates and public tertiary schools for school year 2002-2003. In his study, the researcher involves the administrators and teachers of selected tertiary schools as respondents. The results revealed several strengths and weaknesses of the education program among school respondents. According to Limo (2010) on his study about the Need-based Reviewer in Technology and Livelihood Education for the licensure examination for teachers, it is concluded that the reviewer in T.L.E. is a useful materials in preparing education graduates whose major are technology and livelihood education to take the LET. LET-T.L.E reviewer prepares graduates in the LET in the different components they are not trained in. It has a content update in each component or practice test items that guide the target user on how to identify the correct answer. Moreover, the reviewer was found highly valid as to objectives, contents, instructional materials and practice test items; hence they are expected to be able to assist the TLE graduates to pass the LET. Valenton and Dela Cruz (2007) found on their study about The â€Å"Performance in the Licensure Examination for Teachers (LET) of Bachelor of Secondary Education Major in Technology and Home Economics Graduates at Nueva Ecija University of Science and Technology†, the batch passing rates of LET takers from 2003-2006 were all lower than 30%. Also, the LET takers had a satisfactory performance only in the Field of Specialization and did not perform well in the General Education and Professional Subjects. It might be implied that the BSE Graduates major in T.H.E. did not perform well the LET given in years 2004 to 2006. BIBLIOGRAPHY FOREIGN LITERATURE Books Delta State University (2006). â€Å"Business Education Unit Academic Programme for B.S. Degree in Business Education.† Abraka, Delsu. Thesis F.O. Ohiwerei and N. Azih (2010). â€Å"Comparative Programmes of Business Education In Nigerian Universities (A Case Study of Ambrose Alli University, Ekpoma and Delta State University, Abraka)†. Polkinghorne, Frederick William (2009). â€Å"Reading Skill Integration in High School Business Courses: Perceptions of Business Teacher Educators in the United States† Journal Casey, Catherine E. et. al. (2007). â€Å"Teacher Education Program Admission Criteria and What Beginning Teachers Need to know to be Successful Teachers†. Webliography National Association for Business Teacher Education 2011, http://www.nabte.org/ http://www.nbea.org/newsite/curriculum/standards/ Red River College and the University of Winnipeg, http://me.rrc.mb.ca/Catalogue/ProgramInfo.aspx?RegionCode=WPG&ProgCode=BUSHF-DP Proquest, LLC, http://udini.proquest.com/view/reading-skill-integration-in-high-pqid:1879088921/ LOCAL LITERATURE Theses Paredes Enriquez Caseldo, Dante L. (2008). â€Å"Academic predictors of the licensure examination for teachers performance of the University of the Cordilleras BSED-MATH Graduates.† Webliogragphy Nick Clark, http://www.wes.org/ewenr/09jan/practical.htm LOCAL STUDIES Thesis Limo, Mark Raguindin (2010). â€Å"Need-Based Reviewer in Technology and Livelihood Education for the Licensure Exam for Teachers†. Valenton et. al. (2007). â€Å"Performance in the Licensure Examination for Teachers (LET) of Bachelor of Secondary Education Major in Technology and Home Economics Graduates at Nueva Ecija University of Science and Technology† Umali, Severino E. (2009). â€Å"An Evaluation of Technology and Livelihood Education Program among Selected Secondary Schools in the National Capital Region (NCR)† Pajarillo, Marcela Bartolome (2012). â€Å"Evaluation of Private Higher Education Institutions in Bicol Region Based on Baldrige Education Criteria for Performance Excellence: Basis for Planning Institutional Improvement† Webliogragphy Hanz, http://www.dearhq.org/licensure_examination.htm/August2008