Saturday, August 31, 2019

Domestic and Community Violence Essay

Domestic abuse and child abuse cases have been on the rise in the recent past causing child and human rights activists to seek for ways of containing the situation. Previous studies have concluded that the cases of child abuse and domestic violence have risen in America and the world at large because of poor approaches used to contain them. In addition, the shocking news that more than 1,200 children die each year due to child abuse and a good percentage of them are girls less than 16years is worrying both parents and teachers. The rise in violence prevalence has been attributed to; poor child upbringing, poverty, modernization, lack of knowledge and neglect because studies have proved that abused ‘children’ will abuse their children in future etc (Nocav and Bourbonnais, 2002) The following issues indicate different stories; First, the U. S Advisory Board on Child Abuse has suggested that both child abuse and domestic violence may be the single major precursor to the main fatalities in the country hence the seriousness of the matter. This has come at a time when a survey conducted early this year found out that school age children who witness and exhibit violence of any form not only in their families but also in the churches, towns or schools suffer from problems such as; anxiety, depression and violence towards their peers. This calls for urgent strategies to prevent and address them at once. The best of them is the use of teachers to counsel the abused children, report suspected cases or take any necessary action that will be suitable. Teachers and domestic violence initiative program It has been noticed that more and more cases of child and domestic violence go unnoticed because of stigmatization or fear of retaliation especially by children. The main solution according to this program is to use the interactive ability of our teachers in schools to strictly follow any cases of suspected child abuse either directed to the child or to the parents. Children are very talkative especially with good interaction with their teachers are golden opportunities that can be used to assist those fighting the vice to get access to unreported cases. The objective of this program is to improve system and community responses of abuse of children and their families. All people today face the challenge of developing enhanced policies and programs to meet the increased need for curbing child abuse cases. This program will therefore ensure that members of the community respond immediately to allegations of child and women abuse. This report will deal with a program suitable for teachers in our schools to be in the front line in preventing domestic violence in our society. (Lupton and Power, 2002) The program considers the motivational tactics of getting teachers interact with their children outside the classroom and that they get the opportunity of knowing the problems children undergo while in class. It is obvious that children’s performance while in class reduce especially for abused children. In this program, teachers especially those teachers who teach children in lower grade classes will be taken through training sessions on how to interact more effectively with their students in class. The training sessions will also include learning the signs of domestically abused of sexually abused children The program will involve the utilization of services from survivors and activists who will keep the tracers well informed and properly equipped with the skills to handle, report and discuss cases of violence through the children. In that case, the children will be able to inform their teachers that their parents were quarrelling last night, they were raped last week or even misused over the weekend. These and other reporting tactics will be fundamental in helping the police to further investigate the allegations. As long as they will be funds to help schools identify troubled and troubled children at an early stage, it will be possible to rectify any impacts that might have been created by the abuses children go through. This program will therefore go a long way in boosting reconciliation and cutting incidences of crime and violence in our schools and society. When children are troubled and very disruptive in schools and at home, that is a sign of warning that children are either not being taken care of or they are experiencing some bad habits at home. It is then that teachers, parents and counselors come to look for causes of the wearied behaviors. The program described above will help in ensuring that such kind of strategies is achieved. (Nocav and Bourbonnais, 2002) Conclusion Teachers have a role to play in eradication domestic violence and child abuse in our society. They can do so by creating close interactions with their students who will then reveal what happens behind the curtains either to themselves or the house-help or any of their parents. Since the teachers will be given the opportunity to learn more about social and domestic violence, then it will be possible to change social and institutional norms that perpetuate family violence in the future. Together with other domestic violence programs, child welfare agencies and community organizers everybody can take part in forming effective collaborations and build partnership that will at the long run promote safe and health families. References Nocav, S. and Bourbonnais, C. (2002): No Room of Her Own. A Literature Review on â€Å"Women and Homelessness† CMHC Ottawa Lupton, R and Power, A. (2002): Social Exclusion & Neighborhoods. In Understanding Social Exclusion† Hills J, Le Grand J. & Piachaud D. Edn pp. 118- 140: Oxford: Oxford University Press.

Friday, August 30, 2019

Software Licensing Over Software Piracy

In 1993 worldwide illegal copying of domestic and international software cost $12. 5 billion to the software industry, with a loss of $2. 2 billion in the United States alone. Estimates show that over 40 percent of U. S. software company revenues are generated overseas, yet nearly 85 percent of the software industry's piracy losses occurred outside of the United States borders. The Software Publishers Association indicated that approximately 35 percent of the business software in the United States was obtained illegally, which 30 percent of the piracy occurs in corporate settings. In a corporate etting or business, every computer must have its own set of original software and the appropriate number of manuals. It is illegal for a corporation or business to purchase a single set of original software and then load that software onto more than one computer, or lend, copy or distribute software for any reason without the prior written consent of the software manufacturer. Many software managers are concerned with the legal compliance, along with asset management and costs at their organizations. Many firms involve their legal departments and human resources in regards to software distribution Information can qualify to be property in two ways; patent law and copyright laws which are creations of federal statutes, pursuant to Constitutional grant of legislative authority. In order for the government to prosecute the unauthorized copying of computerized information as theft, it must first rely on other theories of information-as-property. Trade secret laws are created by state law, and most jurisdictions have laws that criminalize the violations of a trade-secret holder's rights in the secret. The definition of a trade secret varies somewhat from state to state, but commonly have the same elements. For example, AThe information must be secret, Anot of public knowledge or of general knowledge in the trade or business, a court will allow a trade secret to be used by someone who discovered or developed the trade secret independently or if the holder does not take adequate precautions to protect the secret. In 1964 the United States Copyright Office began to register software as a form of literary expression. The office based its decision on White-Smith Music Co. v. Apollo , where the Supreme Court determined that a piano roll used in a player piano did not infringe upon copyrighted music because the roll was part of a mechanical evice. Since a computer program is textual, like a book, yet also mechanical, like the piano roll in White-Smith, the Copyright Office granted copyright protection under the rule of doubt. In 1974, Congress created the Natural Commission on New Technological Uses (CONTU) to investigate whether the evolving computer technology field outpaced the existing copyright laws and also to determine the extent of copyright protection for computer programs. CONTU concluded that while copyright protection should extend beyond the literal source code of a computer program, evolving case law should determine the extent of protection. The commission also felt copyright was the best alternative among existing intellectual property protective mechanisms, and CONTU rejected trade secret and patents as viable protective mechanisms. The CONTU report resulted in the 1980 Computer Software Act, and the report acts as informal legislative history to aid the courts in interpreting the In 1980 The Copyright Act was amended to explicitly include computer programs. Title 17 to the United States Code states that it is illegal to make or to distribute copies of copyrighted material without authorization, except for the user's right to make a single ackup copy for archival purposes. Any written material (including computer programs) fixed in a tangible form (written somewhere i. e. printout) is considered copyrighted without any additional action on the part of the author. Therefore, it is not necessary that a copy of the software program be deposited with the Copyright Office in Washington, D. C. for the program to be protected as copyrighted. With that in mind then a copyright is a property right only. In order to prevent anyone from selling your software programs, you must ask a court (federal) to stop that person by an injunction and to give you amages for the injury they have done to you by selling the program. The Software Rental Amendments Act Public Law 101-650) was approved by Congress in 1990, this Act prohibits the commercial rental, leasing or lending of software without the express written permission of the copyright holder. An amendment to Title 18 to the United States Code was passed by Congress in 1992. This amendment. Known as Public Law 102-561 made software piracy a federal offense, and instituted criminal penalties for copyright infringement of software. The penalties can include imprisonment of up to five years, ines up to $250,000 or both for unauthorized reproduction or distribution of 10 or more copies of software with a total retail Under United States law duplicating software for profit, making multiple copies for use by different users within an organization, and giving an unauthorized copy to someone else – is prohibited. Under this law if anyone is caught with the pirated software, an individual or the individual's company can be tried under both civil and criminal law. A Civil action may be established for injunction, actual damages (which includes the infringer=s profits) or statutory damages up to $100,000 per infringement. The criminal penalties for copyright infringement can result in fines up to $250,000 and a jail term up to five years for the first offense and ten years for a second offense or both. When software is counterfeit or copied, the software developer loses their revenue and the whole software industry feels the effect of piracy. All software developers spend a lot of time and money in developing software for public use. A portion of every dollar spent in purchasing original software is funneled back into research and development of new software. Software piracy can be found in three forms: software counterfeiting, which is he illegal duplication and sale of copyrighted software in a form that is designed to make it appear to be a legitimate program; Hard disk loading, whereby computer dealers load unauthorized copies of software onto the hard disks of personal computers, which acts as an incentive for the end user to buy the hardware from that particular dealer; and downloading of copyrighted software to users connected by modem to electronic bulletin boards and/or the Internet. When software is pirated the consumer pays for that cost by new software and/or upgrade version being very expensive. Federal appellate courts in the U. S. have determined that operating systems, object code and software cotained in ROMs are protected by copyright, and some lower federal courts have also determined that microcode (the instructions set on microprocessor chips), and the look and feel of computer screens is subject to copyright protection. Which leads to the problems of the widespread development of multimedia applications that has brought out major problems in clearing copyright for small elements of text, The United States Government has been an active participant in protecting the rights of the software industry. When the Business Software Alliance (BSA) conducts a raid, Federal Marshals or local law enforcement officials participate also. An organization known as the Software Publishers Association (SPA) is the principal trade association of the PC software industry. SPA works closely with the FBI and has also an written enforcement manual for the FBI to help them investigate pirate bulletin board systems and organizations (audits). With the help of the FBI, the result of enforcement actions resulted in recoveries from anti-piracy actions totaling $16 million The Software Publishers Association (SPA) funds a educational rogram to inform individuals and corporations about software use and the law. This program provides all PC users with the tools needed to comply with copyright law and become software legal. The SPA also publishes brochures free of charge about the legal use of software for individuals and businesses. Also available to help corporations understand the copyright law is a 12-minute videotape, which is composed of the most commonly asked questions and answers to them. The video tape is available in French and Spanish and all together over 35,000 copies of the tape had been sold. SPA has also compiled a free Self-Audit Kit with which organizations can examine their software use practices. Included in the kit, is a software inventory management program designed to help an organization track their commercial software programs that are on all hard disks. The program searches PC hard disks for more than 1300 of the most common programs used in Also available is the SPA Software Management Guide which helps companies audit their current software policies, educate employees about the legal use of software, and establish procedures to purchase, register, upgrade and backup computing systems. The guide in ddition also provides an Internal Controls Analysis and Questionnaire. The guide also contains all of the SPA's current anti-piracy materials. The U. S. software industry is facing the challenges of more sophisticated network environments, greater competition among software companies along with hardware manufacturers. At this moment more software than ever before is distributed on a high volume, mass marketed basis. There are many types of software out on the market and increasing every day. They range from graphical user interfaces for application programs such as mass-market spreadsheets, to more sophisticated technical software sed to design integrated circuits. The use of software plays a more vital role daily in our lives such as embedded software, which is critical to equipment in locations as a doctor=s office or an automotive shop. The instrument and devices found there depend more and more on software, because software provides the flexibility to meet the many different needs to the end user. As our lives our shaped and enhanced more by technology, there is already a greater demand One of the main concerns of the software industry is how to deal with the issues of Asoftware licensing. More and more customers ant customized software suited for their business or personal need, and expect the software development firms to accommodate to their wishes. The other side of this issue is that software development firms are concerned with unrealized revenue and excess costs in the form of software piracy, unauthorized use, excess discounts and lengthened sales cycles. For the customer and the software development firm, both have high administrative costs in regards to software programs. Software licensing policies were originally a result of software developers' need to protect their revenue base in the face of otential piracy. Product delivery for software is made up of a number of different components, which are referred to as ‘software licensing'. The following factors are taken into consideration when determining a cost for a ‘software license'; physical delivery pricing, metric discounts, license periods support and maintenance, license management Tech support, change in use bug fixes and Platform Migration Product enhancements. The most commonly found type of software license found in business is known as a, ‘Network license'. There are four types of categories that are classified as a network Concurrent use licenses authorized a specified number of users to access and execute licensed software at any time. Site licenses authorize use at a single site, but are slowly being phased out and replaced by enterprise licenses. Enterprise licenses cover all sites within a corporation because of more virtual computing environments. Node licenses are also slowly being phased out because they are mainly used in a client/server environment, since the licensed software may be used only on a specified workstation in which a user must log on to in order to access and execute the software application. Currently the rend in a network system is to use measurement software, which allows vendors to be more flexible in licensing arrangements. This management software monitors and restricts the number of users or clients who may access and execute the application software at any one time. This is significant because a user pays only for needed use and a vendor can monitor such use to protect intellectual property. A new type of license that is emerging is known as a, ‘currency-based license'. This type of license work on the basis that it provides to the end user a specified dollar amount of software licenses. For example, licenses or different business application software, so long as the total value in use at a given time is less than dollars. Another type of license emerging is known as a ‘platform-independent' licensing, which one license permits software to be used on a variety of different computer systems within a business, instead of buying a different license for each version of the same software used by different systems. The most common type of licensing is known as ‘Shrink-wrap', the concept behind this that the licenses terms are deemed accepted once the end user breaks a shrink-wrap seal or opens a sealed envelope ontaining the software. A reason for these new types of licensing emerging is that when software licensing was first introduced, the software development firms assumed that most businesses would use the software for a 8 to 10 hour period. Yet, did not take into consideration that with the advancement of technology, more businesses would want a ‘floating license' across the world for 24 hours – thus it was not cost effective for the software development firm. A floating license is a license that is made available to anyone on a network. The licenses are not ‘locked' to particular workstations, nstead they Afloat to modes on the network. Shareware, freeware and public domain are different type of software available to the end user, and are distinguished by different rules about how programs may be distributed, copied, used and modified. The term ‘shareware' refers to software that is distributed at a low cost, but which requires usually a payment after a certain time period and registration for full use. Copies of this software are offered on a trial basis, the end user is free to try a scaled down version of the program. If the end user wants the shareware program, ncluded in the program is information specifying how to register the program and what fee is required. Once registered the end user will typically receive a printed manual, an updated copy of the software (often with additional features), and the legal right to use the program in their home or business. The advantage that shareware has is that it lets the end user thoroughly test a program to see if it=s useful before making a purchase. The authors of shareware programs retain their copyright on the contents, and as other copyrighted Freeware is also distributed at a very low cost and like hareware is found mainly on the Internet. The authors of the freeware program do not expect payment for their software. Typically, freeware programs are small utilities or incomplete programs that are released by authors for the potential benefit to others, but the drawback to this is that there is no technical support. Public domain software is generally found on the Internet and is released without any condition upon its use. It may be copied, modified and distributed as the end user wishes to do. A license manager is a system utility-like application that controls or monitors the use of another end-user pplication. It is generally implemented to protect intellectual property (meaning to stop illegal copying) and/or to become more competitive by offering new ways in which to evaluate, purchase and pay for software. Since the license manager controls the number of application users, there is not a need to control the number of application copies. This process lets the end user run one or more applications between machines, without violating the terms of the SPA has created a program that companies can use to help discover and correct problems before they result in legal actions, fines and also negative publicity.

Thursday, August 29, 2019

Management information system project Essay Example | Topics and Well Written Essays - 750 words

Management information system project - Essay Example Ellebeare has very few links. Although these links are working which are mainly for the year and month of production or sale of the products, they are not enough. The site is not very interesting when you consider that you will have to scroll down to the different items. It could use some subtopics or subtitles for the different items. 11) How objective is the website? Is a particular viewpoint presented in the website? If so, what is the viewpoint? If not, give evidence of how the website covers more than one viewpoint. Be sure to state what viewpoints are covered. The objectivity of the Net-a-porter website is well noted in its structure and design and also the content. The website is all about selling luxurious fashion items and from the vision statement on the home page â€Å"The worlds premier online luxury fashion destination," it has not gone off that view point at any instance. The ASOS website is also quite. The different products presented are quite real items that would interest the average person as a baseball cap, denim jackets, etc. The site has several viewpoints. It also quite advocates for different fashion trends some that are classy while others are just normal and not classy. Ellebeare is not quite objective. The portrayed view point is that of classy and outgoing fashion. This is well depicted in the fashion posters that are on the website. It is very classy and colorful too. It is quite catchy especially when you scroll down and get to see the beautiful ladies modeling the different items. Fact means a true piece of data or information while opinion means a belief, way of thinking or judgment. With these in mind, it is evident that ASOS presents both facts and opinions. The facts are expressed in the website as they state the prices of different items. They also express facts about different products in detail as they categorize the different items according to type. Net-a-porter presents

Wednesday, August 28, 2019

Merchants of Cool Essay Example | Topics and Well Written Essays - 500 words

Merchants of Cool - Essay Example This film discovers the contemporary teenagers’ culture and their standpoints on themselves and their parents. In order to target the teenagers, companies explore the teenager’s tastes and preferences, perspectives, and their aspirations to identify what they desire. Needless to say, as according to the film â€Å"Merchants of Cool†, companies survey the symbiotic association between the present day teenagers and the media, as they depend on the other for their identity (Merchants of Cool, 2001). Marketing happens to all people at all time, and no individual is invulnerable from its influence and free from its reach (Ewen, 1976, p. 36). The absolute size and purchasing power of the contemporary teenagers creates a windfall of inexorably insistent brand messaging that is both omnipresent and goes to extraordinary lengths to hold on to the most significant canon in convincing this demographic segment. The â€Å"Merchants of Cool† notes that teenagers are the hottest demographic in United States. Marketing to the youth is a challenging task and not as easy as it sounds. Marketers have to seek ways to seem real: authentic to the lives and perspectives of teens and to be cool to themselves (Ewen, 1976, p. 1118). In essence, they seek the next trendy thing and have implemented approximately anthropological strategy to examine the youth and their every move. Ewen (1976, p. 124) notes that the creation of a fancied desire is significant to the contemporary marketer. The youths have the need to experience self-conscious perspective and a marketer should focus on this. A marketer can identify this need through examining the youths’ behavior and ways of life (Ewen, 1976, p. 128). The â€Å"Merchants of Cool† (2001) delineates a response circle in which marketers carry out comprehensive ethnographic studies of teens to identify what’s fashionable, and then augment it and nosh it back to them through media managed by fewer

Tuesday, August 27, 2019

Contiuum of Care Bibliography Annotated Example | Topics and Well Written Essays - 250 words

Contiuum of Care - Annotated Bibliography Example There is a description of the various stakeholders and the components of the continuum of care, therefore, making it relevant to use when making the presentation. They also discuss how the component contributes to or detracts from the general administration of health care resources. They also depicts that at the community level, combination of medical and supportive services is the best way of enhancing continuum of care. Wilson, A., Whitaker, N., & Whitford, D. (2012, May 31). Rising to the Challenge of Health Care Reform with Entrepreneurial and Intrapreneurial Nursing Initiatives. The Online Journal of Issues in Nursing, p. 2. It is another reliable source of information about the continuum of health care especially in U.S The reason being that Wilson, Whitaker and Whitford (2012), explicitly describes the three dimensions of healthcare and the contribution of each to the continuum of care i.e. primary, secondary and tertiary. Wilson, Whitaker and Whitford (2012), discusses the services provided and how these services fit the continuum of care. Wilson, Whitaker and Whitford (2012), shows how this delivery component and services need to change to meet future trends and labels the characteristics of an integrated delivery system making it relevant to the study of this topic. According to Haggerty et al. (2003), the perception and veracity of continuity of care cut across both organizational and disciplinary boundaries. The collective definitions delivered here should assist healthcare providers appraise continuity more meticulously and enhance communication. Policy charters and reports in the whole world urge a strenuous effort to boost continuum of care. The presentation would not be complete without the use of this article. Best (2010), outlines educational advances for adaptive work roles and aspects of educational research to lighten issues for the future geriatric well-being and oral

Monday, August 26, 2019

Between Self expression and commercialization - the sixth generation Essay

Between Self expression and commercialization - the sixth generation - Essay Example Many of the Fifth Generation filmmakers also felt this†¦.self-sufficiency and commercialization, and had to reconsider their positions† (13). From an ideology-centered position, the directors were moving toward to a more individual centered stance. Individuals’ well and woe, as the subject, began to occupy the central place more and more in a movie. Referring to this new orientation, Peterson says, â€Å"The so called 5th generation – included Chen Kaige and Zhang Yimou, the filmmakers we now associate with China’s cinematic revival† (Peterson 3). Though they felt the impulse to explore their ‘self’ as a nation, they, unlike the Sixth Generation Film directors, carefully avoid any direct collision with the dominant political culture. Struggle between Self-expression and Commercialization Choosing to follow their own ways posed a number of risks for these film makers in the 1990s. First, they had to depend on private finance, since d epending on the governmental budget necessarily would bind them to follow the political guidance that often appeared to be contradictory to their free self-expressive zeal, as Peisa says, â€Å"For the cinema, the beginning of the 1990’s was, on the one hand a time of ever intensifying commercialism and on the other hand a politically sensitive time.† (13) Also depending on private financing was not that easy since it often was not as sufficient as the governmental allowances were. Second, commercializing posed to be a potential challenge for them. Shifting from the government fund to private sponsorship necessarily demanded a significant return from the making cost. There were challenges too for the self-expressionist film makers of the 1990s. The most common challenge was to win a market that had already been overly saturated with the supply of ideological but cheaply popular movies in that decade. Movies enriched with elegant theme and taste needed to be fully self- expressionist and self exploring in order to be popular among the majority of the moviegoers: a strategy that was bound to go against the political interests and culture of the era. Therefore avoiding the political wrath, these directors â€Å"began, for the first time in China, to realize their movies with private capital and without submitting the work for the censorship approval; hence they had to find alternative ways to show those works† (Gagliardi). In the beginning of the 1990s, one of crucial alternatives for the moviemakers was to enter into international market, as Gagliardi says, â€Å"One of these ways was the international film festival circuit where the movies found positive criticism and foreign producers† (Gagliardi). In spite of the government’s ban and censorship, the Sixth Generation movies that were critically appraised by the West made a massive infiltration into the country through mostly piracy. With the modernization of

Sunday, August 25, 2019

Social learning theory by Albert Bandura Essay Example | Topics and Well Written Essays - 3500 words

Social learning theory by Albert Bandura - Essay Example The behaviors acquired by individuals usually learned to use observation through modeling. People observe other people’s actions and activities, and then the behaviors performed. Resulting to coding of information, this serves as a guide for their actions. Learning, therefore, becomes the critical issue to be considered. Realization of effective learning has been made possible through the availability of learning theories. Learning theories are framework describing different ways of absorbing information, processing, and how this information is normally retained during the process of learning. Learning is significant in bringing out cognitive, environmental influences, emotional and experience for acquiring different qualities. These qualities include values; effecting changes in the individual’s knowledge and how they view the world learning theories have of significance in the definition of personal philosophies especially to teachers. Learning theories normally categ orized into different categories, which include behaviorism, constructivism and cognitive. Behaviorism learning put emphasis on aspects, which can be observed, cognitive learning, on the other hand, cognitive learning theories not only looks at the observable behaviors, but also tries to explain learning, which are mainly becoming brain-based. Constructivism, however, looks learning as a process where the learner builds new concepts and ideas. Albert Bandura is one of the known theorists who contributed significantly in learning theories; he came up with the social learning theory (McLeod, 2011). The social learning theory is a class of behaviorism theory; the theory is most significant in criminology. Albert Bandura believed that aggression in learning, which normally learned through behavior modeling. The theorist hold a believe that violent tendencies by individuals usually not inherited but rather modeled through various principles. He argued that persons acquire responses throu gh observing other people’s behavior, by means of media, environment or observing personally. He then stated that individuals holds a believe that aggression mainly accompanied by reinforcements. The reinforcements usually formulated into tension reduction, building of self-esteem, acquiring financial rewards and gaining praise from others. Albert Bandura in his Bobo doll experiment, find out how children would imitate the adults when they are aggressive when they gain rewards, his interest was largely in development of a child. He believed that early diagnosis of aggression in children would lead to children reframing from becoming adult criminals. He then argued children aggression normally influenced by the reinforcement they acquire from their family members, environment and the media. Albert Bandura’s experiment, the Bobo doll experiment, t is significant because it triggers several studies to be conducted concerning the effects of social learning theory. The topi c was significant in that it will determine the extent of aggression among children, in relation to observational learning. Albert Bandura the father of social learning theory was born in 1925, in Mundare Canada. In his early stages of life, Bandura was raised in a small farming community, in his hometown, in Canada. In 1949, Bandura received a Bachelor of Arts degree from the University of British Colombia he also obtains his Ph.D in 1952 from the Universi

Saturday, August 24, 2019

Am I a Constructivist Teacher Essay Example | Topics and Well Written Essays - 250 words

Am I a Constructivist Teacher - Essay Example I also have group activities once a day. Reading to each other, playing math games, and other activities are encouraged. Every lesson also has an open discussion. I allow all students to participate with answers, questions, and even stories. I am at the middle of the constructivist spectrum due to my views on individual teaching. I feel that children can play around or distract when grouped together too often. Interspersing constructivist activities with traditional assignments seem to keep the children focused better. A child does not automatically understand self-control, autonomous behavior, and self-reliance without doing traditional assignments by themselves. On the other hand, after doing a traditional assignment constructivist activities about the traditional assignment are handy. This helps the children do the assignment on their own merits while learning from their and others’ mistakes and successes. My current teaching habits do reflect my constructivist-based views. I like to mix both traditional and constructivist views. Children cannot be programmed like computers. It is essential to use constructivist-based activities to help the child learn. Upon learning a skill a student can then reproduce the skill alone. For example, creative writing is a test given in the 5th grade. All year descriptive writing is examined by the students. Papers are written and shared by the entire 5th grade. Students bounce ideas off of each other in groups and through open discussion, however when taking the writing test the student must perform on their own. This is why I prefer both methods. Discipline is another reason I am in the middle on constructivist views. Some students cannot handle group interaction. Often these children have rough backgrounds. These children need a more traditional approach. This is especially true when speaking about emotionally disturbed (ED) children. Every child is different. If a

Friday, August 23, 2019

The Fiscal and Monetary Policy and Economic Fluctuations Essay

The Fiscal and Monetary Policy and Economic Fluctuations - Essay Example It is estimated to be a fifth of the universal total. The country also has a mixed economy and has sustained a steady Gross Domestic Product rate of growth, high levels of research and capital investment, and moderate rate of unemployment. The current economic situation in America is evidently different from the economic situation five years ago. The present Federal Reserve interest rate is between 0 and 0.25% and the Federal Reserve aims to maintain it until 2015. The Federal Reserve decreased the interest rate by half point in December, 2008. Also, the rate of inflation in the United States as of October 2012 was 2.16%. The current rate of inflation is 2.1% in comparison to the 3.8% rate of inflation recorded in 2008. The American inflation estimate constitutes transportation, apparel, recreation, education and communication, medical care, energy, housing, and food and beverages. Finally, the rate of unemployment as of March 2013 was 7.6%. This is equivalent to 11.7 million individ uals. On the other hand, the administration’s larger U-6 rate of unemployment, which incorporates those who are unemployed, was 13.9%. In contrast, the unemployment rate in America five years ago was 4.6% (Wallison, 2013). Question 2 The changes in interest rates, rates of inflation, and rates of unemployment can be attributed to several reasons. The changes in interest rates have been largely influenced by the activities of the Federal Reserve. The Federal Reverse has had an impact on the interest rates through altering the rate at which it loans out fund to financial institutions, altering reserve requirements of financial institutions, and by influencing the supply of funds through open market activities. Also, the Federal Reverse’s Board of Governors have largely contributed to the changes in interest rates by making decisions on changes in discount rates after receiving recommendations from one or more regional Federal Reverse Banks. The changes in rates of inflat ion have been facilitated by the activities of policymakers. The rate of inflation has changed because the law makers have assessed a wide range of fundamental inflation measures to assist in recognizing inflation tendencies. The most conventional forms of inflation measures leaves out commodities that tend to fluctuate in worth often or dramatically, for example, energy and food items. The rate of inflation has decreased because law makers have attempted to steady general consumer costs (LeRoy, 2011). Finally, the rate of unemployment has also changed due to a number of factors, one of them being employment by educational attainment. University educated individuals with a degree or higher educational qualification make up the most significant employment rate with approximately 44,648,000 of them having full time employment. In addition, this group makes up the least rate of unemployment of 4.6%. The highest numbers of unemployment are made up of people who do not have high school d iplomas. These people are followed by high school graduates who do not possess college degrees. Also, people with less than a diploma constitute the least number of people who are employed, at more than 10 million. Question 3 The strategies include encouraging entrepreneurship and small businesses and lowering taxes. Small businesses in America are the base of the United States economy providing employment to a large number of people. Encouraging business startups will encourage

Financial Cost of Corporate Fraud in United States Essay

Financial Cost of Corporate Fraud in United States - Essay Example However, the study reveals that fraud training for employees and managers reduces the risk of fraud by 52% and 56% respectively (ACFE, 2009, p.37). Thus, ethical training may be employed as a control against fraud. However, this may not be adequate and other controls must be put in place for early detection of fraudulent activities. Financial statement fraud is the biggest category of frauds and the one associated with highest losses. Financial statements from different periods can be used to identify red flags, which may provide an idea that fraud may be occurring or a deviation from normal routine. Some of these components from financial statements are described below: Receivables can be booked fictitiously or increased without underlying trade/ transaction to show an overstated balance sheet and asset position. The management may want to show better results for the year, and thus may be tempted to overstate receivables. This was carried out recently by the CEO of Satyam, an Indian IT outsourcing company. He recorded receivables against selling to fictitious companies, and thus inflated the balance sheet. This type of fraud can be identified by carrying out the year to year analysis of changes in receivables, and their collection days.

Thursday, August 22, 2019

Women Development, Dowry Act Essay Example for Free

Women Development, Dowry Act Essay Be it enacted by Parliament in the Twelfth Year of the Republic of India as follows: 1. Short title, extent and commencement.-(1) This Act may be called the Dowry Prohibition Act, 1961. It extends to the whole of India except the State of Jammu and Kashmir. It shall come into force on such date as the Central Government may, by notification in the official Gazette, appoint. 2. Definition of `dowry’.-In this act, `dowry’ means any property or valuable security given or agreed to be given either directly or indirectly- (a) by one party to a marriage to the other party to the marriage; or (b) by the parents of either party to a marriage or by any other person, to either party to the marriage or to any other person; at or before or any time after the marriage in connection with the marriage of said parties but does not include dower or mahr in the case of persons to whom the Muslim Personal Law (Shariat) applies. Explanation II.-The expression `valuable security’ has the same meaning as in Sec. 30 of the Indian Penal Code (45 of 1860). 3. Penalty for giving or taking dowry.-(1) If any person, after the commencement of this Act, gives or takes or abets the giving or taking of dowry, he shall be punishable with imprisonment for a term which shall not be less than five years, and with the fine which shall not be less than fifteen thousand rupees or the amount of the value of such dowry, whichever is more: Provided that the Court may, for adequate and special reasons to be recorded in the judgment, impose a sentence of imprisonment for a term of less than five years. * * * Explanation I omitted by Sec.2 w.e.f 2nd October, 1985 (2)Nothing in sub-section (1) shall apply to or, in relation to,- presents which are given at the time of a marriage to the bride (without nay demand having been made in that behalf): Provided that such presents are entered in list maintained in accordance with rule made under this Act; presents which are given at the time of marriage to the bridegroom (without any demand having been made in that behalf): Provided that such presents are  entered in a list maintained in accordance with rules made under this Act; Provided further that where such presents are made by or on behalf of the bride or any person related to the bride, such presents are of a customary nature and the value thereof is not excessive having regard to the financial status of the person by whom, or on whose behalf, such presents are given. 4. Penalty for demanding dowry.- If any person demands directly or indirectly, from the parents or other relatives or guardian of a bride or bridegroom as the case may be, any dowry, he shall be punishable with imprisonment for a term which shall not be less than six months but which may extend to two years and with fine which may extend to ten thousand rupees: Provided that the Court may, for adequate and special reasons to be mentioned in the judgment, impose a sentence of imprisonment for a term of less than six months. 4-A. Ban on advertisement.- If any person- (a) offers, through any advertisement in any newspaper, periodical, journal or through any other media any share in his property or of any money or both as a share in any business or other interest as consideration for the marriage of his son or daughter or any other relative, (b) prints or publishes or circulates any advertisement referred to Cl. (a), he shall be punishable with imprisonment for a term which shall not be less than six months, but which may extend to five years , or with fine which may extend to fifteen thousand rupees: Provided that the Court may, for adequate and special reasons to be recorded in the judgment, impose a sentence of imprisonment for a term of less than six months. 5. Agreement for giving or taking dowry to be void.- Any agreement for the giving or taking of dowry shall be void. 6. Dowry to be for the benefit of the wife or heirs.- (1) Where any dowry is received by any person other than the woman in connection with whose marriage it is given, that person shall transfer it to the woman – (a) if the dowry was received before marriage, within three months after the date of marriage; or (b) if the dowry was received at the time of or after the marriage within three months after the date of its receipt; or (c) if the dowry was received when the woman was a minor, within three months after she has attained the age of eighteen years, and pending such transfer, shall  hold it in trust for the benefit of the woman. (2) If any person fails to transfer any property as required by sub-section (1) within the time limit specified therefor or as required by sub-section(3), he shall be punishable with imprisonment for a term which shall not be less than six months, but which may extend two years or with fine which shall not be less than five thousand rupees, but which may extend to ten thousand rupees or with both. (3) Where the woman entitled to any property under sub-section (1) dies before receiving it, the heirs of the woman shall be entitled to claim it from the person holding it for the time being: Provided that where such woman dies within seven years of her marriage, otherwise than due to natural causes, such property shall- if she has no children, be transferred to her parents, or  if she has children, be transferred to such children and pending such transfer, be held in trust for such children. (3-A) Where a person convicted under sub-section (2) for failure to transfer any property as required by sub-section (1)or sub-section (3) has not, before his conviction under that sub-section, transferred such property to the women entitled thereto or, as the case may be, her heirs, parents or children, the Court shall, in addition to awarding punishment under that sub-section, direct, by order in writing, that such person shall transfer the property to such woman, or as the case may be, her heirs, parents or children within such period as may be specified in the order, and if such person fails to comply with the direction within the period so specified, an amount equal to the value of the property may be recovered from him as if it were a fine imposed by such Court and paid to such woman, as the case may be, her heirs, parents or children. (4)Nothing contained in this section shall affect provisions of Sec. 3 or Sec. 4. 7. Cognisance of offences.- (1) Notwithstanding anything contained in the Code of Criminal Procedure, 1973 (2of 1974),- no Court inferior to that of a Metropolitan magistrate or a Judicial Magistrate of the first class shall try any offence under this Act; no Court shall take cognizance of an offence under this Act except upon – (i) its own knowledge or a police report of the facts which constitute such offence, or (ii) a complaint by the person aggrieved by offence or a parent or other relative of such person, or by any recognized welfare institution or organization: it  shall be lawful for a Metropolitan Magistrate or a Judicial Magistrate of the first class to pass any sentence authorized by this Act on any person convicted of any offence under this Act. Explanation.- For the purposes of this sub-section, recognised welfare institution or organization means a social welfare institution or organization recognized in this behalf by the Central or State Government. (2) Nothing in Chapter XXXVI of the Code of Criminal Procedure, 1973 (2of 1974), shall apply to any offence punishable under this Act.) Notwithstanding anything contained in any law for the time being in force, a statement made by the person aggrieved by the offence shall not subject such person to a prosecution under this Act. 8. Offences to be congnizable for certain purposes and to be bailable and non-compoundable.- (1) The Code of Criminal Procedure, 1973 (2 of 1974) shall apply to offences under this Act as of they were cognizable offences- (a) for the purpose of investigation of such offences; and  (b) for the purpose of matters other than-  (i) matters referred to in Sec. 42 of that Code, and  (ii) the arrest of person without a warrant or without an order of a Magistrate. (2) Every offence under this Act shall be non-bailable and non-compoundable. 8-A. Burden of proof in certain cases.- Where any person is prosecuted for taking or abetting the taking of any dowry under Sec. 3, or the demanding of dowry under Sec.4, the burden of proving that he had not committed an offence under those sections shall be on him. 8-B. Dowry Prohibition Officers.-(1) The State Government may appoint as many Dowry Prohibition Officers as it thinks fit and specify the areas in respect of which they shall exercise their jurisdiction and powers under this Act. (2) Every Dowry Prohibition Officer shall exercise and perform the following powers and functions, namely, (a) to see that the provisions of this Act are complied with; (b) to prevent, as far as possible, the taking or abetting the taking of, of the demanding of, dowry; (c) to collect such evidence as may be necessary for the prosecution of persons committing offences under the Act; and (d) to perform such additional functions as may be assigned to him by the State Government, or as may be specified in the rules made under this Act. (3) The State Government may, by notification in the official Gazette, confer such powers of a police officer as may be  specified in the notification, the Dowry Prohibition Officer who shall exercise such powers subject to su ch limitations and conditions as may be specified by rules made under this Act. (4) The State Government may, for the purpose of advising and assisting the Dowry Prohibition Officers in the efficient performance of their functions under this Act, appoint an advisory board consisting of not more than five social welfare workers (out of whom at least two shall be women) from the area in respect of which such Dowry Prohibition Officer exercises jurisdiction under sub-section (1). 9. Power to make rules.- (1) The Central Government may, by notification in the official Gazettee, make rules for carrying out the purposes of this Act. (2) In particular, and without prejudice to the generality of the foregoing power, such rules may provide for- (a) the form and manner in which, and the persons by whom, any list of presents referred to in sub-section (2) of Sec. 3 shall be maintained and all other matters connected therewith; and (b) the better co-ordination of policy and action with respect to the administration of this Act. (3)Every rules made under this section shall be laid as soon as may be after it is made before each House of Parliament while it is in session for a total period of thirty days which may be comprised in one session or in two or more successive sessions, and if, before the expiry of the session immediately following the session or the successive sessions aforesaid both Houses agree in making any modification in the rule or both Houses agree that the rule should not be made, the rule shall thereafter have effect only in such modified form or be; of no effect, as the case may be, so, however, that any such modification or annulment shall be without prejudice to the validity of anything previously done under that rule. 10. Power of the State Government to make rules.- The State Government may, by notification in the official Gazette, make rules for carrying out the purposes of this Act. (2) In particular, and without prejudice to the generality of the foregoing power, such rules may provide for all or any of the following matters, namely: (a) the additional functions to be performed by the Dowry Prohibition Officers under sub-section(2) of Sec. 8-B; (b) limitations and conditions subject to which a Dowry Prohibition Officer may exercise his functions under sub-section (3) of Sec. 8-B. (3) Every rule made by the State Government under this section shall be laid as soon as may be after it is made before the State Legislature.

Wednesday, August 21, 2019

Paracetamol Synthesis Experiment

Paracetamol Synthesis Experiment N-(4-hydroxyphenyl)ethanamide, otherwise known as Paracetamol or acetaminophen depending on where you live in the world, is one of the most widely used over the counter drugs. It has the molecular formula C8H9NO2. It is an analgesic (pain reliever) and also an antipyretic (fever reliever). For these reasons it is used to relieve a person of mild to moderate pain, for example; toothache, headaches or symptoms of a cold and to control fever (high temperature, also known as pyrexia). For pain relief it works by interfering with certain chemicals in the body called prostaglandins. Prostaglandins were first discovered in the 1930’s from human semen, thinking the chemicals had come from the prostate gland he named them prostaglandins, but it’s since been established they are synthesised in every cell in the body. They act as chemical messengers like hormones but do not move to other sites, they stay in the cell that they were synthesised in. Prostaglandins have a variety of p hysiological effects, one being that they are released in response to pain or injury, paracetamol works by inhibiting the production of prostaglandins making the body less aware of the pain or injury. Paracetamol reduces temperature by acting on an area of the brain called the hypothalamus, responsible for regulating body temperature. The history of paracetamol is an interesting one, at the approach of the 20th century, the discovery and synthesis of medicines was rather arbitrary, with scientists generally just testing new compounds on humans straight away and then observing if it had positive (or negative) effects. The story of paracetamol starts with the first aniline (also known as phenylamine or aminobenzene) derivative to be found to possess analgesic and antipyretic properties, acetanilide. Aniline is an organic compound with the molecular formula Aniline (1) C6H5NH2, shown above, consists of a phenyl group attached to an amino group. The new potential medicine acetanilide had been synthesised simply by the aniline gaining a secondary amide group, by reacting the aniline with ethanoic anhydride, ethanoic acid would also be produced. The reaction is shown below. C6H5NH2 + (CH3CO)2O → C6H5NHCOCH3 + CH3COOH Acetanilide (2) The discovery was soon published and acetanilide medication was soon in production in 1886, remaining in use for several years due to how cheap it was to produce. But although acetanilide was shown to act as being effective in reducing fever and relieving mild pain, a search for less toxic aniline derivatives started because of some of the awful side effects acetanilide had, for instance cyanosis (appearance of blue or purple coloration of the skin due to tissues near the skin being low in oxygen) caused by it deactivating haemoglobin in erythrocytes. The search led to a new derivative that was antipyretic and analgesic and was less toxic than acetanilide called N-(4-Ethoxyphenyl)ethanamide. Marketed in 1887 under the name phenacetin, it has remained in use ever since but has declined in its use due to its adverse affects on the liver. It has the chemical formula C10 H13NO2. N-(4-Ethoxyphenyl)ethanamide (3) In 1893 Joseph von Mering improved on phenacetin producing paracetamol, but mistakenly thought it had the same adverse effects as acetanilide. In the 1940’s it was realised that paracetamol was a major metabolite of phenacetin, it was then considered to quite possibly be the component that caused phenacetin to have the desired effects and that the negative effects were caused by a minor metabolite released. Then in 1953 paracetamol hit the markets, being promoted as superior to aspirin in that it was safe for children and with people with ulcers. Structural equation showing Phenacitin being turned into its metabolites in the body, as you can see from the diagram, the main metabolite is paracetamol. (4) Paracetamol is made by many different pharmaceutical manufacturers, each giving their products different brand names. In the UK currently there are more than ninety over the counter products containing paracetamol. Different brands may contain different amounts of paracetamol per dose, it will be stated on the packaging, usually in milligrams. Sometimes it may be combined with other medicines such as decongestants (a type of medicine that provides short term relief for a blocked nose). While it is a very effective medicine, even small overdoses can be fatal, because it is metabolised into non-toxic and toxic products in the liver. The recommended single dose for adults is 1000mg and up to 4000mg in a day. Paracetamol is hepatoxic, meaning that even in the therapeutic dosages stated previously, it can still harm hepatocytes (liver cells) and in combination with other drugs like alcohol the harmful effects are multiplied. Prolonged daily usage can result in upper gastrointestinal complications such as stomach bleeding. Untreated paracetamol overdoses (which would usually involve taking over the therapeutic dosages for several days) results in a lengthy and painful illness. People who overdose often wrongly assume it will render them unconscious, however this doesn’t happen, rather the process of dying takes around three to five days due to acute liver failure. Aims: To synthesise paracetamol in one step, starting from 4-aminophenol i.e. amide synthesis To try synthesise paracetamol in a microwave using a similar method to how aspirin is synthesised To recrystallise about half of my samples of paracetamol, leaving the other half crude To calculate the percentage yields of paracetamol, in both methods and compare them To perform analysis of my synthesised samples of paracetamol, both recrystallised and crude using analytical techniques such as Melting point test Thin layer chromatography Back Titration (which will give a quantitative analysis, concentrations) Infra-red spectroscopy 6) To then use the results of these analytical techniques to determine which method of synthesis produces The most pure paracetamol sample, The greatest percentage yield by comparing the percentage yields and purities of both the crude and recrystallised samples of both methods. To extract paracetamol from commercial tablets and compare the purity to my synthesised samples To then use the aims 6 and 7 to finally determine which method of synthesis of an amide, paracetamol, is most efficient. Chemical theory: Amines: (5) Amines are the organic chemistry relatives of Ammonia, they are derive by replacing one, two or all three of the hydrogen atoms with alkyl groups and this determines which type of amine it is. Replacing one of the hydrogen atoms gives a primary amine, replacing two a secondary amine and all three a tertiary amine. Below shows a primary amine being made from a halogenoalkane with bromine as the halogen, the alkyl group would vary depending on the specific primary amine desired. It is a substitution reaction, with the hydrogen on the ammonia being substituted for the alkyl group on the halogenoalkane. NH3 + RBr →RNH2 + HBr A primary amine (6) A secondary amine (7) Amines with low relative molecular masses are gases or volatile liquids, similarly to ammonia they also have strong smells, amines have a â€Å"fishy† smell. The properties of amines are quite similar to ammonia due to the fact both have the lone pair of electrons that open up a range of opportunities. Their properties are only slightly modified by their alkyl groups such as the state at room temperature. 4-Aminophenol, the building block of paracetamol (reacting 4-aminophenol with ethanoic anhydride gives paracetamol) is a primary amine. 4-Aminophenol (8) 4-Aminophenol is made by reacting phenol with sulphuric acid and sodium nitrate which gives two products, 1- nitrophenol and 2-nitrophenol. The 2-nitrophenol is then reacted with sodium borohyride, which produces 4-aminophenol. Step one in synthesis of 4-aminophenol (4) Step two in synthesis of 4-aminophenol (4) Very soluble in water Similarly to Ammonia, amines can form hydrogen bonds with water due to the highly electronegative nitrogen being bonded to the hydrogen atom; these are attracted to water molecules and vice versa. Amines with small alkyl groups are soluble but those with larger alkyl groups are insoluble because the alkyl groups disrupt the hydrogen bonding in the water. This is significant because 4-aminophenol being a building block of paracetamol it is a common impurity, therefore with the recrystallisation, it should in theory be removed very effectively as it should be very soluble and not reach its limit of solubility. This will be discussed later on. Act as a base Again similarly to ammonia, the lone pair of electrons on the nitrogen can form a dative covalent bond with hydrogen atoms, meaning it acts as a base. In water the presence of hydroxide ions causes it to turn alkaline. If the ammonia/amine is placed with acid, then the acid will donate more protons than water, so the reaction will go on until completion, and therefore many ammonium ions/amine ions are formed and therefore the fishy smell is lost. This can impact on the effectiveness of a chromatogram in thin layer chromatography. Acting as a nucleophile: Ammonia as well as amines can act as nucleophiles, which is why they can form an amide when reacted with an acylating agent like ethanoic anhydride. When ammonia acts as a nucleophile it can react with a halogenoalkane or acylating agent to form an primary amide, the lone pair of electrons on the nitrogen atom attack the positively polarised carbon atom and via a substitution reaction will replace the halogen (e.g. chlorine) or functional group of the acylating agent (e.g. HCL from ethanoyl chloride). This occurs by the electrons in the bond being donated to the halogen or specific functional group of the acylating agent. This breaks off with both electrons and therefore leaves the carbon with a high positive charge, allowing the negative nitrogen to form a dative covalent bond with the carbon. Amines also have a lone pair of electrons on the nitrogen atom and so can also attack electrophiles, such as the delta positive carbon atom on the acylating agent. Similarly to the ammonia rea ction, a nucleophillic substitution reaction occurs with the electron movements described above and the appropriate functional group is removed and replaced by the R-N-H forming the secondary amide, with the second hydrogen atom being removed from the primary amine along with the functional group. (9) Reaction of an primary amine with ethanoyl chloride an acylating agent, as can be seen the chlorine atom from the ethanoyl chloride is removed as well the hydrogen from the primary amine, producing HCL. This would’ve occurred as result of the nitrogen lone pair attacking the central carbon. The resulting secondary amide is produced when the R-N-H bonds to the carbon. Synthesis and hydrolysis of an Amide: (10) All amides contain the functional group CONH All amides contain this functional group (11) An amide can either be primary or secondary, primary amides have the general formula R-CONH2, the Nitrogen atom is bonded to two hydrogen atoms and then a carbon atom, which is double bonded to an oxygen, the fourth bond of the carbon is to the R group which can either be an alkyl group (methyl, ethyl etc.) or a benzene. These can be made by reacting Ammonia with an acylating agent such as an acyl chloride like Ethanoyl chloride. These are carboxylic acid derivatives that are reactive enough to form an amide. Hydrogen from the ammonia breaks off as well as the chlorine of the acyl chloride, forming HCL (g). The first carbon (with the double bond oxygen) then bonds with the Nitrogen this forms the functional group. The general formula for a primary amide Secondary amides differ in that the Nitrogen is only bonded to one hydrogen and the third bond goes to another R group, giving secondary amides the general formula R-CONH-R’. The R groups may be the same, or may differ. Paracetamol (N-(4-hydroxyphenyl)ethanamide) as stated earlier has the molecular formula C6H9NO2, by looking at its structural formula shown below, it can be seen that it comprises of three main parts, starting from the left, in the box is the phenol group, one of the R groups of the amide, this explains the â€Å"hydroxyphenyl† part of paracetamols systematic name as it was originally part of the 4-aminophenol amine. Next in the oval, is the actual amide functional group, finally on the far right in the triangle is the other R group (R’) which in paracetamol is simply a methyl group. From all this we can determine that paracetamol is a secondary amide. (4) Secondary amides are made by reacting a primary amine with an acylating agent like Ethanoic anhydride, in my investigation, I will use ethanoic anhydride as my acylating agent. This occurs by the reaction mechanism of nucleophillic substitution, which is shown below in a curly arrow diagram, with ammonia being used as the nucleophile, attacking the carbon atom. Steps in Nucleophillic substitution: (12) The first thing to note is that, as explained earlier, ammonia (which is acting as the nucleophile in the example above) as well as amines can act as nucleophiles, due to the fact they have the lone pair of electrons on the nitrogen atom, they have a partial negative charge which is attracted to an electrophile (has a partial positive charge), in this case the polarised carbon atom (as it is bonded to the highly electronegative oxygen atom) on the ethanoic anhydride. The first thing that happens is that the Nitrogen begins its â€Å"attack† on the partially positive, also known as delta positive, carbon. Because of the lone pair, it forms a dative covalent bond with the carbon Because it is dative, the carbon atom has gained an electron therefore at has been reduced, so it then donates an electron within the double bond with oxygen to the oxygen atom, this makes the already partially negatively charged oxygen to become negatively charged. There is now only a single bond between the carbon and oxygen. The carbon atom then donates an electron to the oxygen below it that it is also singly bonded to, releasing an ethanoate ion (CH3COO), this has given the carbon atom that donated the electron a positive charge as it has now had a net loss of one electron from its original electron configuration. This is now a carbocation. The reaction then goes back to the negatively charged oxygen that the central carbon donated its electron to earlier, what occurs now is that the oxygen donates the electron back, now that the central carbon is positively charged, this reforms the double bond between the now partially negative oxygen and partially positive carbon. The nitrogen that has bonded to the carbon then loses the third hydrogen atom as nitrogen can only form three bonds in a neutral organic compound, this happens by the hydrogen donating its electron to the nitrogen. The hydrogen then bonds to the ethanoate ion, forming ethanoic acid (CH3COOH) and ethanamide, ethan- the prefix coming from the two carbon atoms present and the suffix –amide due to the CONH functional group. The ethanoic acid produced then will react with any excess ammonia to form ammonium ethanoate, this is because ammonia and amines can act as bases due to the reasons stated earlier, the hydrogen on the ethanoic acid breaks off and bonds to the nitrogen atom. The â€Å"curly arrow† diagram of this reaction is shown below, the stage number relates to the mechanism diagram shown above it and described above, step 1 is omitted because it is an introduction, the first step of the reaction mechanism, is step 2 i.e. shown below step 2 is the attacking of the nitrogen nucleophile to the

Tuesday, August 20, 2019

New Zealand Political Values

New Zealand Political Values Things generally influence one another even in small ways. The relationship among these matters can be just simple that have little impact on people. However, there are things which affect considerable number of individuals, a locality, a country or even the international community as well. Health is one of those things. A person, family, society, and nations are all involved when discussing this topic. There are factors that have direct and indirect effects which relate to planning, implementation and evaluation of healthcare mechanisms and interventions. These are the demographic distribution of populations, religious beliefs, political values, ethnicity, traditions, and human values. New Zealand has a small population with an estimated resident of 4,531,400 as of 30 September 2014 (Statistics New Zealand). Data from the year 2013 show that males are greater from children to middle age but the female numbers are greater during the latter part of life. The median age is 37.4 years; population growth rate is 0.85 per cent; birth rate is almost double compare to death rate but is relative low. Migration rate is 2.24 in a thousand people. Infant mortality rate is low with only 4.65 in a thousand live births. Life expectancy is higher among women with 82.94 and men with 78.79 years. Literacy has a very high rate overall. Data related to health have generally positive trends. Information like this is significant on how to make better intervention. The government has to scrutinize the details in order to give appropriate solutions to the issues, in relation particularly to the declining numbers of men during old age compare to women who live several years more. Programmes such as lifestyle modification and more education that improve the life span of men should be given more emphasis. Men are usually more exposed to health risks such as alcohol drinking, cigarette smoking and hazardous working environment. These can be attributed to the fast deterioration of health condition due to the accumulated damage on the body. Political values are acquired by the people through â€Å"political socialisation†. It can be from the family first, then schools, friends, work, travel, life experiences and media such as televisions, radio, and social networking sites via the internet. The present situation is related to the history of a certain nation in terms of how they experienced it. New Zealand had the British concept and ideas from a long time and up until now. There were important changes as time went by. As of today, people are empowered that they are able to participate in policy making in relation to health. For instance, the legislations are being passed after the involvement of different sectors during formulation. Groups and organisations are being asked to impart their opinions regarding a specific policy which can affect their interests. So in this way, it can have impact on the health interventions being formulated by the authorities. The citizens are able to see the government as their prot ector that takes care of their well-being. And also, this shows that the people are recognized, equality is evident, and the honesty on part of the government that it should serve its people. Another thing about New Zealand is citizens do not want any corruption from their public officials. They are not expecting that elected officials will use their positions to do illegal activities for personal interests. Religion affects health in terms of practices and beliefs. A country can have many classifications as far as faith is concerned. There are varieties of religion within New Zealand, majority are Christians that includes Catholic, Anglican, Methodist and Presbyterian. There are also growing numbers of people associated with Sikh, Hindu and Islam respectively. Since the migration is going up, people from other countries with different faith come in, along with them are diverse practices and beliefs as well that can be an issue one way or another in relevance to health. One good example is the prohibition of blood transfusion in other religion. Another is the food restrictions like not eating pork or beef, during fasting period, and many others. The government should recognize these situations thus providing necessary measures to deal with it. A way to address it is to review the existing policies to make it appropriate to the present circumstances. Human values refer to the behaviours of men that are correct in every aspect. These are the basis of legislations, guided by the concept of doing the right thing. Usually it starts in the family, parents being as the model showing values to their children then eventually learning from outside environment thru teachers at school, friends, and the community. Human values are significant part of the society because they provide identity and pride as well to the people living within a community. And leaders with human values can produce a direct impact in dealing with the problems of the nation particularly in making health interventions. The virtue of selflessness must be present in all elected and public officials. Every nation has distinct traits when it comes to health and human values. New Zealand is a country that is striving to put these standards into a higher level so that people will benefit in the long term up to the next generation. Ethnicity and traditions are interrelated factors that influence health interventions. New Zealand has a growing ethnic background which in connection to the entry of migrants from various parts of the world. It is undeniably adding to the list and starting to be part of the system. While health interventions are focused on European, Maori, and Pacific people, Asians have considerable numbers already living and settling in this country; also people from the Central and Latin Americas. Since the government chose to open their doors to foreign people, it should provide policies emphasizing the status of migrants in respect to health. Although, Maori health status has been recognized and being pushed to produce positive outcome for the natives of New Zealand after years of experiencing low health services and inequalities, the authorities should not take aside the large number of migrants currently living on their land. The presence of the aforementioned determinants provides an array of information to plan, implement and evaluate health interventions. These factors serve as guide to come up with the needed mechanisms, to improve services and to promote equality in health status of affected groups. REFERENCES Levine, Stephen. (2012). ‘Political values – New Zealand politics and political values’, Te Ara – the Encyclopedia of New Zealand. Retrieved from http://www.teara.govt.nz/en/political-values/page-1 Levine, Stephen. (2012). ‘Political values – New Zealand politics and political values’, Te Ara – the Encyclopedia of New Zealand. Retrieved from http://www.teara.govt.nz/en/political-values/page-4 Statistics New Zealand. (2014). Top Statistics. Retrieved from http://www.stats.govt.nz/browse_for_stats/snapshots-of-nz/top-statistics.aspx

Monday, August 19, 2019

Women in the STEM Fields Essay -- Career Women Essays

In early American history, society believed that women did not have a place in education and high-level learning. They were told not to bother their brains with such advanced thinking. Middle and upper class women learned to read and write, but their education ended there. A woman’s place was said to be in the home, cooking, sewing, and taking care of the children. In the case of upper class women, their â€Å"to-do† list was cut even shorter with the servants present to do the work. However, women desired a higher education. Elizabeth Blackwell is a prime example of women’s fight for a medical degree, one of the first STEM environments available to women. In order to kick-start her education she wrote to all of the doctors that she knew, requesting advice and help. However, most of the doctors replied that they thought it impossible, that a woman would not be able to endure the rigors of a medical education, and that they feared the competition that women doctors would bring. Elizabeth persisted, finally making her way to Philadelphia, a city famous for its study in medicine, to stay with Dr. Elder, one of the few supporters of her education. Once here she continued writing letters and actually found many friends who agreed to support her cause, but unfortunately universities were not included in this list of friends. Elizabeth then pursued an education at the University of Geneva in New York where the Medical Faculty and students agreed to accept her. Wh ile at first the university cared about the press coverage that Elizabeth’s spot would bring, she eventually established her rightful place as a student there. Although she encountered some resentment among the wives of doctors and other people living in the small town, Elizabeth ... ...cLeer, Anne. â€Å"Practical Perfection? The Nanny Negotiates Gender, Class, and Family Contradictions in 1960s Popular Culture.† NWSA Journal 14.2 (2002): 80-83. JSTOR. Web. 09 Feb. 2014. Pollack, Eileen. â€Å"Why Are There Still So Few Women in Science?† The New York Times. The New York Times, 05 Oct. 2013. Web. 05 Mar. 2014. Rosch, Amelia. â€Å"WISP Increases Female Participation in the Sciences.† The Dartmouth. The Dartmouth, 07 Nov. 2013. Web. 05 Mar. 2014. Rupp, Leila J. â€Å"Eleanor Flexner’s â€Å"Century of Struggle†: Women’s History and the Women’s Movement.† NWSA Journal 4.2 (1992): 157-69. JSTOR. Web. 09 Feb. 2014. â€Å"Scientists Not Immune from Gender Bias, Yale Study Shows.† Yale News. Yale University, 24 Sept. 2012. Web. 05 Mar. 2014. Smith, Michelle R. â€Å"Giving Female Scientists Their Due.† Philly.com. The Philadelphia Inquirer, 17 Oct. 2013. Web. 05 Mar. 2014.

Sunday, August 18, 2019

Attitude Towards Love in Valentine and The Flea Essay -- Poetry Poems

Through Close Analysis of Language, Structure and Theme, Compare and Contrast the Poet's Attitude Towards Love in Valentine and The Flea. The two poems "Valentine" and "The Flea" are about the two different ways in which the poets portray their views about love, however the poems are still linked in a few ways. "The Flea was published in the seventeenth century and was written by 'John Donne'. "Valentine" was published in 1983 and was written by 'Carol Ann Duffy'. Both poems are addressed to an unknown lover. The poem "Valentine" is written in free-verse form. Carol Ann Duffy could have used this irregular pattern because of the irregular present that she is giving to her lover. "Not a red rose or satin heart. I give you an onion." When you first read the poem you think that an onion is an absurd present to give to a lover but after analysis, you realise that she is trying to portray a message to us: It is not what is on the outside that counts. Duffy uses quite a lot of imagery in her poem to explain her message to the reader. "It is a moon wrapped in brown paper." This could be referring to the moon as a pure object that you first have to unwrap and explore before you can find the real meaning of it. It is also linking back to her point that it may look a bit unromantic from the outside but it is really what is inside that counts. She could be saying this because of her lover's attitude towards women. Maybe the lover only thinks about what the people look like, not what they really are is like inside. Duffy then comments on the emotional feelings that love could bring into a relationship. "It will blind you with tears like a lover." When you cut an onion it makes you cry, and usually... ...lood from his lover and that is what all fleas do. Donne then again emphasises the idea that now because of the flea's death some life has been taken from his lover. "Will waste, as this flea's death took life from thee." This puts forward the idea of some life being taken from his lover because part of her was contained inside the flea. At first the two poems appear very different but after close inspection links can be established between the two poems. I think Carol Ann Duffy's poem is the more serious of the two as she is using an unusual item to portray her feelings for her lover. John Donne is just worried about getting his lover into to bed using the idea of the flea instead of wanting to portray his feelings towards his lover. He is too overconfident with himself that he will get the girl into bed with him when in the end he doesn't succeed.

Saturday, August 17, 2019

Hawaiian Navigation Essay example -- Ancient History

Hawaiian Navigation How did the Polynesians find their way to Hawaii, over two thousand miles from any other land? Was it over population at home, or political turmoil? Whatever reason for leaving these people used amazing knowledge and skill of the ocean and of the sky to navigate them to this new land. They faced the unknown and braved into the wide-open ocean for long periods of time. The real focus in this paper is on the navigation techniques that they used in these voyages throughout the Pacific. It's impossible to teach someone the significance or the act of loving the stars and the ocean but that's what makes navigation without instruments (wayfinding) so beautiful. One can "give the heavens a meaning his own meaning" says Nainoa Thompson. Anyone can learn the aspects of navigation through personal observation and the study of charts and maps. Thus creative thinking and logic are two important skills in learning the ancient art of wayfinding. It is inspiring to think of how much water the Polynesians covered in the Pacific, over one million square miles, in a time frame of about 1000 years. Some members of the modern Hawaiian community were so impressed that they established the Polynesian Voyaging Society in 1973. They did some voyages throughout the Pacific without the help of instruments for scientific research and education. The topic was so interesting to so many people throughout the South Pacific that the voyages became more about recovering culture and about teaching the art of wayfinding so that it is not lost in time. Revival of Interest: A serious rebirth in Polynesian culture and traditions arouse after the voyages by the Hokule'a. In 1975 a replica of a Polynesian voyaging can... ... circumference. As long as people care about what's going on in the Polynesian revival of culture there will be growth. There will be energy left for people to search out the answers to our questions and the lost secrets of these amazing people who found these islands over 1,500 years ago. References: Baybayan, Chad, Kawaharada, Dennis. ( May 1996 ). Polynesian Voyaging Society Manuel. Honolulu, Hawaii: Polynesian Voyaging Society. Finney, Ben. (1994) Voyage Of Rediscovery. University of California Press. Kyselka, Will. (1987) An Ocean In Mind. Honolulu, Hawaii. University of Hawaii Press. http://leahi.kcc.hawaii.edu/org/pvs/buildloa/html http://leahi.kcc.hawaii.edu/org/pvs/ohanabackground.html

Foundation and Empire 14. The Mutant

The â€Å"hangar† on Kalgan is an institution peculiar unto itself, born of the need for the disposition of the vast number of ships brought in by the visitors from abroad, and the simultaneous and consequent vast need for living accommodations for the same. The original bright one who had thought of the obvious solution had quickly become a millionaire. His heirs – by birth or finance – were easily among the richest on Kalgan. The â€Å"hangar† spreads fatly over square miles of territory, and â€Å"hangar† does not describe it at all sufficiently. It is essentially a hotel – for ships. The traveler pays in advance and his ship is awarded a berth from which it can take off into space at any desired moment. The visitor then lives in his ship as always. The ordinary hotel services such as the replacement of food and medical supplies at special rates, simple servicing of the ship itself, special intra-Kalgan transportation for a nominal sum are to be had, of course. As a result, the visitor combines hangar space and hotel bill into one, at a saving. The owners sell temporary use of ground space at ample profits. The government collects huge taxes. Everyone has fun. Nobody loses. Simple! The man who made his way down the shadow-borders of the wide corridors that connected the multitudinous wings of the â€Å"hangar† had in the past speculated on the novelty and usefulness of the system described above, but these were reflections for idle moments – distinctly unsuitable at present. The ships hulked in their height and breadth down the long lines of carefully aligned cells, and the man discarded line after line. He was an expert at what he was doing now and if his preliminary study of the hangar registry had failed to give specific information beyond the doubtful indication of a specific wing – one containing hundreds of ships – his specialized knowledge could winnow those hundreds into one. There was the ghost of a sigh in the silence, as the man stopped and faded down one of the lines; a crawling insect beneath the notice of the arrogant metal monsters that rested there. Here and there the sparkling of light from a porthole would indicate the presence of an early returner from the organized pleasures to simpler – or more private – pleasures of his own. The man halted, and would have smiled if he ever smiled. Certainly the convolutions of his brain performed the mental equivalent of a smile. The ship he stopped at was sleek and obviously fast. The peculiarity of its design was what he wanted. It was not a usual model – and these days most of the ships of this quadrant of the Galaxy either imitated Foundation design or were built by Foundation technicians. But this was special. This was a Foundation ship – if only because of the tiny bulges in the skin that were the nodes of the protective screen that only a Foundation ship could possess. There were other indications, too. The man felt no hesitation. The electronic barrier strung across the line of the ships as a concession to privacy on the part of the management was not at all important to him. It parted easily, and without activating the alarm, at the use of the very special neutralizing force he had at his disposal. So the first knowledge within the ship of the intruder without was the casual and almost friendly signal of the muted buzzer in the ship's living room that was the result of a palm placed over the little photocell just one side of the main air lock. And while that successful search went on, Toran and Bayta felt only the most precarious security within the steel walls of the Bayta. The Mule's clown who had reported that within his narrow compass of body he held the lordly name of Magnifico Giganticus, sat hunched over the table and gobbled at the food set before him. His sad, brown eyes lifted from his meat only to follow Bayta's movements in the combined kitchen and larder where he ate. â€Å"The thanks of a weak one are of but little value,† he muttered, â€Å"but you have them, for truly, in this past week, little but scraps have come my way – and for all my body is small, yet is my appetite unseemly great.† â€Å"Well, then, eat!† said Bayta, with a smile. â€Å"Don't waste your time on thanks. Isn't there a Central Galaxy proverb about gratitude that I once heard?† â€Å"Truly there is, my lady. For a wise man, I have been told, once said, ‘Gratitude is best and most effective when it does not evaporate itself in empty phrases.' But alas, my lady, I am but a mass of empty phrases, it would seem. When my empty phrases pleased the Mule, it brought me a court dress, and a grand name – for, see you, it was originally simply Bobo, one that pleases him not – and then when my empty phrases pleased him not, it would bring upon my poor bones beatings and whippings.† Toran entered from the pilot room, â€Å"Nothing to do now but wait, Bay. I hope the Mule is capable of understanding that a Foundation ship is Foundation territory.† Magnifico Giganticus, once Bobo, opened his eyes wide and exclaimed, â€Å"How great is the Foundation before which even the cruel servants of the Mule tremble.† â€Å"Have you heard of the Foundation, too?† asked Bayta, with a little smile. â€Å"And who has not?† Magnifico's voice was a mysterious whisper. â€Å"There are those who say it is a world of great magic, of fires that can consume planets, and secrets of mighty strength. They say that not the highest nobility of the Galaxy could achieve the honor and deference considered only the natural due of a simple man who could say ‘I am a citizen of the Foundation,' – were he only a salvage miner of space, or a nothing like myself.† Bayta said, â€Å"Now, Magnifico, you'll never finish if you make speeches. Here, I'll get you a little flavored milk. It's good.† She placed a pitcher of it upon the table and motioned Toran out of the room. â€Å"Torie, what are we going to do now – about him?† and she motioned towards the kitchen. â€Å"How do you mean?† â€Å"If the Mule comes, are we going to give him up?† â€Å"Well, what else, Bay?† He sounded harassed, and the gesture with which he shoved back the moist curl upon his forehead testified to that. He continued impatiently, â€Å"Before I came here I had a sort of vague idea that all we had to do was to ask for the Mule, and then get down to business – just business, you know, nothing definite.† â€Å"I know what you mean, Torie. I wasn't much hoping to see the Mule myself, but I did think we could pick up some firsthand knowledge of the mess, and then pass it over to people who know a little more about this interstellar intrigue. I'm no storybook spy.† â€Å"You're not behind me, Bay.† He folded his arms and frowned. â€Å"What a situation! You'd never know there was a person like the Mule, except for this last queer break. Do you suppose he'll come for his clown?† Bayta looked up at him. â€Å"I don't know that I want him to. I don't know what to say or do. Do you?† The inner buzzer sounded with its intermittent burring noise. Bayta's lips moved wordlessly, â€Å"The Mule!† Magnifico was in the doorway, eyes wide, his voice a whimper, â€Å"The Mule?† Toran murmured, â€Å"I've got to let them in.† A contact opened the air lock and the outer door closed behind the newcomer. The scanner showed only a single shadowed figure. â€Å"It's only one person,† said Toran, with open relief, and his voice was almost shaky as he bent toward the signal tube, â€Å"Who are you?† â€Å"You'd better let me in and find out, hadn't you?† The words came thinly out the receiver. â€Å"I'll inform you that this is a Foundation ship and consequently Foundation territory by international treaty.† â€Å"I know that.† â€Å"Come with your arms free, or I'll shoot. I'm well-armed.† â€Å"Done!† Toran opened the inner door and closed contact on his blast pistol, thumb hovering over the pressure point. There was the sound of footsteps and then the door swung open, and Magnifico cried out, â€Å"It's not the Mule. It's but a man.† The â€Å"man† bowed to the clown somberly, â€Å"Very accurate. I'm not the Mule.† He held his hands apart, â€Å"I'm not armed, and I come on a peaceful errand. You might relax and put the blast pistol away. Your hand isn't steady enough for my peace of mind.† â€Å"Who are you?† asked Toran, brusquely. â€Å"I might ask you that,† said the stranger, coolly, â€Å"since you're the one under false pretenses, not I.† â€Å"How so?† â€Å"You're the one who claims to be a Foundation citizen when there's not an authorized Trader on the planet.† â€Å"That's not so. How would you know?† â€Å"Because I am a Foundation citizen, and have my papers to prove it. Where are yours?† â€Å"I think you'd better get out.† â€Å"I think not. If you know anything about Foundation methods, and despite your imposture you might, you'd know that if I don't return alive to my ship at a specified time, there'll be a signal at the nearest Foundation headquarters so I doubt if your weapons will have much effect, practically speaking.† There was an irresolute silence and then Bayta said, calmly, â€Å"Put the blaster away, Toran, and take him at face value. He sounds like the real thing.† â€Å"Thank you,† said the stranger. Toran put his gun on the chair beside him, â€Å"Suppose you explain all this now.† The stranger remained standing. He was long of bone and large of limb. His face consisted of hard flat planes and it was somehow evident that he never smiled. But his eyes lacked hardness. He said, â€Å"News travels quickly, especially when it is apparently beyond belief. I don't suppose there's a person on Kalgan who doesn't know that the Mule's men were kicked in the teeth today by two tourists from the Foundation. I knew of the important details before evening, and, as I said, there are no Foundation tourists aside from myself on the planet. We know about those things.† â€Å"Who are the ‘we'?† â€Å"‘We' are – ‘we'! Myself for one! I knew you were at the Hangar – you had been overheard to say so. I had my ways of checking the registry, and my ways of finding the ship.† He turned to Bayta suddenly, â€Å"You're from the Foundation – by birth, aren't you?† â€Å"Am I?† â€Å"You're a member of the democratic opposition – they call it ‘the underground.' I don't remember your name, but I do the face. You got out only recently – and wouldn't have if you were more important.† Bayta shrugged, â€Å"You know a lot.† â€Å"I do. You escaped with a man. That one?† â€Å"Does it matter what I say?† â€Å"No. I merely want a thorough mutual understanding. I believe that the password during the week you left so hastily was ‘Seldon, Hardin, and Freedom.' Porfirat Hart was your section leader. â€Å" â€Å"Where'd you get that?† Bayta was suddenly fierce. â€Å"Did the police get him?† Toran held her back, but she shook herself loose and advanced. The man from the Foundation said quietly, â€Å"Nobody has him. It's just that the underground spreads widely and in queer places. I'm Captain Han Pritcher of Information, and I'm a section leader myself – never mind under what name.† He waited, then said, â€Å"No, you don't have to believe me. In our business it is better to overdo suspicion than the opposite. But I'd better get past the preliminaries.† â€Å"Yes,† said Toran, â€Å"suppose you do.† â€Å"May I sit down? Thanks.† Captain Pritcher swung a long leg across his knee and let an arm swing loose over the back of the chair. â€Å"I'll start out by saying that I don't know what all this is about – from your angle. You two aren't from the Foundation, but it's not a hard guess that you're from one of the independent Trading worlds. That doesn't bother me overmuch. But out of curiosity, what do you want with that fellow, that clown you snatched to safety? You're risking your life to hold on to him.† â€Å"I can't tell you that.† â€Å"Hm-m-m. Well, I didn't think you would. But if you're waiting for the Mule himself to come behind a fanfarade of horns, drums, and electric organs – relax! The Mule doesn't work that way.† â€Å"What?† It came from both Toran and Bayta, and in the comer where Magnifico lurked with ears almost visibly expanded, there was a sudden joyful start. â€Å"That's right. I've been trying to contact him myself, and doing a rather more thorough job of it than you two amateurs can. It won't work. The man makes no personal appearance, does not allow himself to be photographed or simulated, and is seen only by his most intimate associates.† â€Å"Is that supposed to explain your interest in us, captain?† questioned Toran. â€Å"No. That clown is the key. That clown is one of the very few that have seen him. I want him. He may be the proof I need – and I need something, Galaxy knows – to awaken the Foundation.† â€Å"It needs awakening?† broke in Bayta with sudden sharpness. â€Å"Against what? And in what role do you act as alarm, that of rebel democrat or of secret police and provocateur?† The captain's face set in its hard lines. â€Å"When the entire Foundation is threatened, Madame Revolutionary, both democrats and tyrants perish. Let us save the tyrants from a greater, that we may overthrow them in their turn.† â€Å"Who's the greater tyrant you speak of?† flared Bayta. â€Å"The Mule! I know a bit about him, enough to have been my death several times over already, if I had moved less nimbly. Send the clown out of the room. This will require privacy.† â€Å"Magnifico,† said Bayta, with a gesture, and the clown left without a sound. The captain's voice was grave and intense, and low enough so that Toran and Bayta drew close. He said, â€Å"The Mule is a shrewd operator – far too shrewd not to realize the advantage of the magnetism and glamour of personal leadership. If he gives that up, it's for a reason. That reason must be the fact that personal contact would reveal something that is of overwhelming importance not to reveal.† He waved aside questions, and continued more quickly, â€Å"I went back to his birthplace for this, and questioned people who for their knowledge will not live long. Few enough are still alive. They remember the baby born thirty years before – the death of his mother – his strange youth. The Mule is not a human being!† And his two listeners drew back in horror at the misty implications. Neither understood, fully or clearly, but the menace of the phrase was definite. The captain continued, â€Å"He is a mutant, and obviously from his subsequent career, a highly successful one. I don't know his powers or the exact extent to which he is what our thrillers would call a ‘superman,' but the rise from nothing to the conqueror of Kalgan's warlord in two years is revealing. You see, don't you, the danger? Can a genetic accident of unpredictable biological properties be taken into account in the Seldon plan?† Slowly, Bayta spoke, â€Å"I don't believe it. This is some sort of complicated trickery. Why didn't the Mule's men kill us when they could have, if he's a superman?† â€Å"I told you that I don't know the extent of his mutation. He may not be ready, yet, for the Foundation, and it would be a sign of the greatest wisdom to resist provocation until ready. Now let me speak to the clown.† The captain faced the trembling Magnifico, who obviously distrusted this huge, hard man who faced him. The captain began slowly, â€Å"Have you seen the Mule with your own eyes?† â€Å"I have but too well, respected sir. And felt the weight of his arm with my own body as well.† â€Å"I have no doubt of that. Can you describe him?† â€Å"It is frightening to recall him, respected sir. He is a man of mighty frame. Against him, even you would be but a spindling. His hair is of a burning crimson, and with all my strength and weight I could not pull down his arm, once extended – not a hair's thickness.† Magnifico's thinness seemed to collapse upon itself in a huddle of arms and legs. â€Å"Often, to amuse his generals or to amuse only himself, he would suspend me by one finger in my belt from a fearful height, while I chattered poetry. It was only after the twentieth verse that I was withdrawn, and each improvised and each a perfect rhyme, or else start over. He is a man of overpowering might, respected sir, and cruel in the use of his power – and his eyes, respected sir, no one sees.† â€Å"What? What's that last?† â€Å"He wears spectacles, respected sir, of a curious nature. It is said that they are opaque and that he sees by a powerful magic that far transcends human powers. I have heard,† and his voice was small and mysterious, â€Å"that to see his eyes is to see death; that he kills with his eyes, respected sir.† Magnifico's eyes wheeled quickly from one watching face to another. He quavered, â€Å"It is true. As I live, it is true. â€Å" Bayta drew a long breath, â€Å"Sounds like you're right, captain. Do you want to take over?† â€Å"Well, let's look at the situation. You don't owe anything here? The hangar's barrier above is free?† â€Å"I can leave any time.† â€Å"Then leave. The Mule may not wish to antagonize the Foundation, but he runs a frightful risk in letting Magnifico get away. It probably accounts for the hue and cry after the poor devil in the first place. So there may be ships waiting for you upstairs. If you're lost in space, who's to pin the crime?† â€Å"You're right,† agreed Toran, bleakly. â€Å"However, you've got a shield and you're probably speedier than anything they've got, so as soon as you're clear of the atmosphere make the circle in neutral to the other hemisphere, then just cut a track outwards at top acceleration.† â€Å"Yes,† said Bayta coldly, â€Å"and when we are back on the Foundation, what then, captain?† â€Å"Why, you are then co-operative citizens of Kalgan, are you not? I know nothing to the contrary, do I?† Nothing was said. Toran turned to the controls. There was an imperceptible lurch. It was when Toran had left Kalgan sufficiently far in the rear to attempt his first interstellar jump, that Captain Pritcher's face first creased slightly – for no ship of the Mule had in any way attempted to bar their leaving. â€Å"Looks like he's letting us carry off Magnifico,† said Toran. â€Å"Not so good for your story.† â€Å"Unless,† corrected the captain, â€Å"he wants us to carry him off, in which case it's not so good for the Foundation.† It was after the last jump, when within neutral-flight distance of the Foundation, that the first hyperwave news broadcast reached the ship. And there was one news item barely mentioned. It seemed that a warlord – unidentified by the bored speaker – had made representations to the Foundation concerning the forceful abduction of a member of his court. The announcer went on to the sports news. Captain Pritcher said icily, â€Å"He's one step ahead of us after all.† Thoughtfully, he added, â€Å"He's ready for the Foundation, and he uses this as an excuse for action. It makes things more difficult for us. We will have to act before we are really ready.†