Write My Essay Sample: Personality Tests
Posted by: Write My Essay on: November 7, 2018

Sample by My Essay Writer


Personality tests are also referred to as psychological tests. A psychological test is a measure of an individual’s character based on how he/she answers a set number of questions. In the past, people tried to measure personalities using different methods. There is the Enneagram test which is understood as nine personality traits that are linked together. The Myers-Briggs is another personality test which was first introduced in 1962, Based on Carl Jung’s theory on personality traits, it still remains the most taken by people. Lastly, there is The Big Five test. Researchers analyze how individuals respond to personality questionnaires and come up with a way of summing up a person’s character. These tests can be useful at the workplace. This paper will discuss how each of these three methods captures a person’s personality; it will also describe the criticism of each method.

The Enneagram method of measure divides human personalities into nine behavioral types.  After taking the Enneagram test, the score is as follows:

  • Orderly 26%
  • Helpful 10%
  • Focussed 14%
  • Selfishness 14%
  • Intelligent 30%
  • Security concerns 58%
  • Full of adventure 30%
  • Aggressive 26%
  • Calm 46%

According to the Enneagram test that I took, my main type is 6 which I scored 14 marks which amounts to 58%. [“Write my essay for me?” Get help here.]

According to the research undertaken by Savich (2005) in the field of neuroscience, he explored the Enneagram into detail specifically on the functions of the brain. The research took him to a hypothesis connecting the Enneagram to patterns of asymmetric movements in the brain. People are put in a box for description purposes only, before undertaking the test.

The Myers Briggs is another personality test that I conducted. The results were as follows:

  • Extrovert 6%
  • Intuition 6%
  • Thinking levels 59%
  • Judgement 19%

Savich (2005) agrees that the Myers Briggs test indicator (MBTI) has mistakes. The psychometric test developed on Jung’s theory of the many types of personalities there are globally; you are placed in one on the 16 types of personalities. This is based on some of its categories such as being an introvert or an extrovert (2005). Savich (2005) asserts that one of the main problems with the (MBTI) is that it shows what is known as ”test-retest reliability”. I f you take the test after a month, you have a 50% chance of falling into a different personality category; therefore lacking credibility.

The last personality test that I took is the Big Five and here are the results:

  • Extrovert- 84%
  • Being in agreement with others- 3%
  • Conscientiousness- 62%
  • Neuroticism- 66%
  • Being open- 0%

The big five rankings change over time, Savich (2005) reports that any of the big five factor can’t stand alone as a variable (2005). Birth-order and gender can be connected to traits of being open. Extroversion generally decreases a person ages. There seems to be a connection between cultural factors in certain countries. Savich (2005) concludes by saying that the big five method is based on theory and it cannot accurately point to a specific behavior (2005).[Click Essay Writer to order your essay]

Finally, the outcomes of these personality tests have been found to be unreliable over a period of time. It is of utmost importance to remember that personality tests do have their limitations just like other forms of tests. However, these tests can have a positive response in the workplace while selecting employees. Further research needs to be conducted to show the reliability of the tests. [Need an essay writing service? Find help here.]


Savich, P. (2005) Personality and the brain: A hackers journey through the enneagram and the emerging brain research.,NewYork, NY: Perennial.

Essay Writing Sample: Research Proposal Achieving Energy Sustainability through Solar Power Technology
Posted by: Write My Essay on: November 6, 2018

Sample by My Essay Writer

Achieving Energy Sustainability through Solar Power Technology


In the past decade, there have been serious concerns about the impact of human activities on the environment and whether there is a possibility to adopt better ways of doing things that could create sustainability in the future. It is common knowledge that climate change has been around for some time and has been discussed highly within the political circles, the academia fraternity and in the media for a long time. In most of the instances, these discussions have attempted to project what impact this change may have in the future. However, climate change has already started hitting us hard in various ways. The icebergs on the poles are quickly melting. This has slowly led to the destruction of ecosystems that we ought to protect. It has led to rising sea lvels and acidification of water in the oceans. Pollution has also increased as the earth continues to feel the pressures of globalization and its effects in the future.

Greenhouse gases have led to global warming.  This has brought huge risks not only to our health but also to the health of animals in various ecosystems. It is time to act and develop sustainable solutions that can reverse the whole process and restore the ecosystem. This brings us to the idea of developing sustainable energy sources that are both renewable and easily available in our environment. The research proposal aims at developing a clear and well-articulated project that can be used to develop strategies that can be used to develop solar power as a major source of energy in the coming years. It also borrows the ideas of Elon Musk on why solar power technology is the next being thing in the modern world (Kannan & Vakeesan, 2016).

Research Purpose

Today, many companies in the automobile industry have developed car models that utilize electric energy. This is a move that is seen by many as one that will reduce the amount of fuel that is spent on vehicles in the future. An example is the Tesla Motor Company that uses electronic engines for its wide range of automobiles. These vehicles will in the future demand a lot of energy and solar power technology is seen as the best source of energy. It is preferably better as compared to wind energy which tends to be expensive and may at times not be available due to varying weather patterns within a given region. Elon Musk suggests that improving the technology that is used to make the lithium-ion batteries could be a huge step in understanding how various industries can take advantage of solar energy.[Click Essay Writer to order your essay]

Research Rationale

The debate that arises from the best source of renewable energy to be integrated into the energy sector, one must consider the various characteristics of the currently available energy sources. The study will thereby delve into explaining why solar energy is better than wind energy. Solar energy is available as a free source from the sun. It only requires the setting up of solar panels so as to capture the sun rays and convert this into electricity. On the other hand, wind turbines tend to be expensive and often noisy thus making it difficult to be stationed at numerous places within a given jurisdiction. Some of the major issues to be addressed in the research include the design of solar panels and how solar power technology has evolved over time. Understanding these concepts would offer a reader significant information on the needs that must be implemented in the future so as to reduce climate change.

A concern that needs to be addressed in solar power technology is the length and life of these batteries. Today, many people do not see solar power technology as a sustainable resource since it has low potential and lasts for shorter times. Modern technology needs to be integrated into these batteries since many people would prefer to use other sources of energy such as fuel instead of electric energy.  This has been a concern observed in Tesla Motors that have a small range before they require charging. Adoption of appropriate technology would be the most appropriate route towards making these batteries stronger and offer significant energy for their operation.  [“Write my essay for me?” Get help here.]

So as to integrate solar power energy technology in the modern era, the research also aims at coming up with strategies that can be used to create awareness on the need to move to renewable energy sources. This can be done through involvement of the media in sensitizing the need to use solar energy so as to protect the environment. Innovators must also ensure that only appropriate changes are made in the development and implementation of solar power technology in our modern lives. The research also aims at identifying the clear boundaries that must exist in the developments of solar energy in the future. Integrating solar power energy could also require sufficient goodwill from the government and authorities so as to create a situation that brings about such sustained success.[Need an essay writing service? Find help here.]

If I am successful in undertaking this study, there are several implications that it may have in the future and on the energy sector. Energy needs have been on the rise with each increase in the world population. As a result, power bills have been consistently rising in our homes and in various industries that utilize considerable amounts of energy. The research study will clearly point out on how firms and even homes can cut down on their energy costs through the adoption of solar power technology. Today, billions of dollars are spent paying electricity bills in our homes, organizations, and within the industries (Gillingham et al, 2016). The research tends to propose how these units could develop easy solutions that could be implemented from the societal level up to the national level by the federal and state governments. Doing so could not only reduce the cost of energy, it could also lead to environmental protection. Such protection could lead to sustainability of both the society and the different corporations that are purported to contribute to the highest percentages of pollution. It could also lead to reduction in the rate of global warming that is currently observable across the globe.[Click Essay Writer to order your essay]

Proposed Research Methodology

The proposed research methodology will utilize both primary and secondary sources of data and information.  In the primary sources of data, a number of interviews will be conducted and relevant questionnaires administered with an aim of unearthing current economic trends related to solar energy and solar panels. Mainly, this will focus on analyzing the future of renewable energy, specifically relating to Elon Musk. On the other hand, secondary sources will utilize both scholarly and non-scholarly articles. This proposed research will explore the initial stages of developing the proposed idea, the contemporary situation in the industry as well as the future endeavors and expectations.


Gillingham, K., Hao, D., Wiser, R., Darghouth, N. R., Nemet, G., Barbose, G., & … Changgui,

  1. (2016). Deconstructing Solar Photovoltaic Pricing: The Role of Market Structure, Technology, and Policy. Energy Journal, 37(3), 231-250.

Kannan, N., & Vakeesan, D. (2016). Solar energy for future world: – A review. Renewable &

Sustainable Energy Reviews, 621092-1105.

Write My Essay Sample: Discussion Assignment
Posted by: Write My Essay on: November 5, 2018

Sample by My Essay Writer


Families are now changing, and people are forced to adapt to such changes to face the challenges that come with failure to do the same. Households with both parents working are now facing the challenging of modifying the domestic roles. In many cases, men have maintained their roles as providers but then the pressure is increased on women, who have to engage in their professional jobs and then resume their domestic roles at home. This is likely to place immense pressure on the women and ultimately the family. My pastoral care approach would include improving the communication between Grace and Brandon.

Improving communication would guarantee transparency, in which Grace will share with Brandon on how she finds it difficult to manage both roles. In many disputes, communication is often the determining factor, and that could easily apply in this situation. Poor communication has failed to make Grace share with her husband that she finds it challenging to be a full-time homemaker and full-time worker. However, I do admire Grace for trying to balance these two roles. The fact that she has tried to balance the two roles for some time should make Brandon notice how difficult it has become. My approach would involve counseling these two to propose solutions on how to improve this situation. [“Write my essay for me?” Get help here.]

Relying on spiritual leaders would not be a good idea for such an issue. Most spiritual leaders are known to have a rigid understanding of gender roles. I would expect a spiritual person to advice Grace to quit her job and devote her life towards serving her husband. Such advice would fail to consider the importance of her financial contribution in the house (Piterman, 2008). Should Grace fail to consider communication, then she risks a mental breakdown, and that could affect Brandon and their children. Therefore, Grace and Brandon have to discuss on how to share the domestic roles in the house. One proposal would be they get a house help to reduce the workload in the house.[Need an essay writing service? Find help here.]

Response 1

I would also propose that Grace discusses with her female friends on how they manage to balance their work and house roles. Obviously, she will find other female workers in her place of work. Such inquiries could provide her with insight on how to balance the two. She is likely to find different responses from her female colleagues. She should use her intellectual ability to weigh her options and consider the ones likely to work. For instance, if a colleague tells her that she shares the domestic roles with her husband then she has to consider the fact that Brandon is also a full-time worker. This option could be used before she approaches Brandon on the increased pressure. Therefore, this approach provides Grace with the chance to resolve the issue without involving Brandon by proposing a solution.

Response 2

Also, Grace and Brandon should consider the modern times and find an ideal way to solve such an issue. Finding a house help could be considered ideal since they are likely to increase their household income. Even though this seems to be the best solution, she will need to communicate with Brandon on why they stand to benefit from this arrangement. Even if they were to meet a professional to guide them through this challenge, it would be more convenient to find a professional rather than a religious person. Seeking help from spiritual leaders is likely to provide a solution that fails to comply with the modern times. People should learn to adapt to societal changes, and this now includes women getting active roles in management and even politics. [Click Essay Writer to order your essay]


Piterman, H. (2008). Women in management. The Leadership Challenge, 1-90.

Essay Writing Service Sample: Cyber Security
Posted by: Write My Essay on: October 31, 2018

Sample by My Essay Writer

Cyber Security


The Sony Playstation Network Hack of 2011 that affected 77 million people, the December 2015 hack of Valve’s Steam platform that impacted 34,000 subscribers and the September 2016 Yahoo hack that compromised the personal information of 500 million users show that major corporations, even those with supposedly “impenetrable systems” are not immune to being penetrated by a determined hacker or hacking group. The problem stems from the programming arms race between corporations and hackers with one group constantly looking for flaws in program architecture and the other patching the identified flaws in the system (Ferdinand, 2015). [“Write my essay for me?” Get help here.]

Company databases are valuable since they can contain personal information and credit card numbers which would enable whoever obtains them to accomplish identity theft (Jenab & Moslehpour, 2016). In fact, there is an underground market on the dark web (sites that can only be accessed via TOR browsers) that enable people to buy and sell information that has been obtained by hackers. Companies attempt to safeguard their databases through continuous investment into better systems, more robust programming architectures, elaborate anti-virus programs and other methods of preventing their accumulated data from being stolen by unscrupulous individuals. Unfortunately, there is no such thing as a truly secure system when it is connected to the internet. Programs follow, by their very design, a set of rules when it comes to their implementation within a system. Understanding these rules and knowing their different vulnerabilities based on research and experimentation is the very essence of what hackers do.       Through this paper, the concepts of security by design, present day security measures and the process of vulnerability management will be examined to showcases how each method contributes towards methods of safeguarding data. It is anticipated that this process will reveal that, no matter how advanced the method of database protection, there is always a means of circumventing it.  [Need an essay writing service? Find help here.]

Security by Design

The phrase “security by design” is a blanket terminology used to describe systems that have been developed based on the security needs of a company. In essence, a system is built with the idea of securing it from potential vulnerabilities and attacks and making it potentially “impenetrable” to hackers (El-Hajj, Ben Brahim, Hajj, Safa, & Adaimy, 2016). However, going along the line of thought that there is no such thing as a completely secure system, there are some caveats to the concept of security by design. Not all companies have the resources to fund their own dedicated I.T. department and, as such, they generally hire external service providers for their security needs.

The problem with this strategy is the potential for hacking groups to specifically target the systems from such a vendor due to the number of companies utilizing it. For example, the Denuvo copyright protection system is used by many businesses to prevent their digital games from being copied and distributed online via torrent sites. It utilizes a combination of encryption, serial number identification and online referencing to prevent a copied game from working. This has made it the “go-to” method of copyright protection for many game companies due to its supposed “impenetrability.”

Unfortunately, as of August 2016, multiple news sources have reported that Denuvo has been successfully hacked resulting in potentially hundreds of games being vulnerable to illegal online distribution via torrents. This example shows that relying on a readily available platform for your security needs may be the most cost-effective solution, but it does leave a company vulnerable to potential breaches given the focus that hackers would have on penetrating such a system due to its widespread use.

Since generic security systems bought from a vendor utilize the same open ports, they would all have the same port vulnerabilities which enable hackers to readily know how to attack a system, what route they should take and the potential success they would have (El-Hajj et al., 2016). The same vulnerability also extends to the use of generic firewalls that have similarly been bought from a provider. This does not mean though that only large corporations have the potential to safeguard their system.

This indicates that smaller businesses should hire external providers for a more expensive but more secure custom designed system for their needs rather than one that is generic and sold to multiple companies. The logic behind this for businesses is that it is better to have multiple systems with different protocols than a single one that ‘s hard to penetrate but affects multiple systems. This ensures that even if the system of one company is penetrated, this does not impact other businesses that have used the same systems provider.

Security Measures

Aside from designing a system from the ground up, there are other methods that companies implement when it comes to safeguarding their systems. These practices consist of the following:

a.) Access Control Methods

This method involves limiting the capacity of people or external entities from interacting with specific parts of a company’s system through control compartmentalization. The basic principles of this method focus on giving access only to specific aspects of a system based on that individual’s role within the company. For example, a Customer Service Representative (CSR) for AT&T’s mobile phone division would only have access to the company’s customer management system (it’s CARE platform), its mobile phone activation and maintenance program (the Telegence system) and its payment processing program which is connected to the Vesta payment system (Van Staalduinen, Khan, & Gadag, 2016). However, the CSR would not be given access to the company’s mobile network platform which controls signals within specific areas, nor would the CSR be given the capability to access more private aspects of a customer’s data (ex: their call and text records). Access to these systems is restricted only to personnel that handle cases that are limited to those systems (Van Staalduinen et al., 2016).

By implementing a compartmentalized approach, this prevents a potentially malicious employee within the company from affecting systems that could cause millions of dollars in damage. Not only that, access control helps businesses to track potential anomalies that appear in the system by tracking which department was in charge of that system. Methods like this contribute to preventing malicious access to systems and ensures the continued integrity of stored data.

However, the problem with access control methods is that it can also work against systems by making sure that only select people within an organization can modify or control them. This was seen in 2008 when a disgruntled network administrator in San Franciso shut access to the FiberWAN network for the city administration due to a clash in belief about network security protocols and granting access to people he deemed as unfit and potentially incapable of correctly handling the system.[Click Essay Writer to order your essay]

Safety and competency aside, this situation shows the inherent issues when it comes to access control limitations since, if the person with access to a particular aspect of a system intends to commit malicious behavior, they can implement it with the compartmentalized limitations preventing others from potentially undoing what they did. There is no readily available solution to this particular issue since access control has become a standard practice in most corporations.

b.) Hardware Protection

This method refers to the methods used in protecting a system by preventing unauthorized modification of system protocols via preventive methods on the hardware (Khatri & Brown, 2010). This can come in the form of write protection being utilized on the hard disks of a system, implementing methods of memory protection, and even installing devices on computers to monitor current activities and to prevent unauthorized access. For example, one of the most common methods of hardware protection in companies is to block off access to external read/write ports for desktop computers.

Due to the potential presence of viruses on thumb drives and CD, these ports are usually blocked off since, no matter how secure a company’s firewalls are, it cannot protect itself from viruses being introduced directly into the system via USB terminal. This particular practice is the most feasible when it comes to preventing access to systems since, by physically blocking the ports to a system, an ordinary employee cannot gain access to it.

c.) Encryption of Data

Aside from limiting access to data, there are other methods that can be implemented if unauthorized access is achieved. Data encryption is the process of utilizing a series of symbols, jumbled letters, and symbols to represent the original content of data. The data can only be unencrypted if the correct encryption key is placed thereby enabling the program to unscramble the information.

This method of data protection is utilized in a wide variety of different systems since it adds an added layer of safety over the safety protocols that are already in place. However, it should be noted that data encryption should not be considered as a 100 percent effective means of safeguarding data. Encryption keys can be solved via a wide variety of different methods (ex: brute forcing encryption through a program specifically designed to solve encryptions). This is why methods of data encryption are always evolving alongside current processes meant to circumvent them.

d.) Authentication

The process behind authentication is very straightforward, if you use a system and provide a username or access the system via a company provided laptop with a built-in network access program, a “handshake” occurs between your access of the system and the database of users within the system. Once your network credentials have been examined, the system will then compare it to the database of users that exist within the system and will grant access if authentication server finds the necessary credentials.

e.) Passwords

The use of passwords involves the creation of a unique identifying key that is used to access a network, system or file. It is was one of the first methods used in data protection and continues to be used to this day. Unfortunately, as seen in numerous publicized cases (ex: Mark Zuckerberg’s Facebook account being hacked) passwords can be guessed and, as such, people should practice proper password management and creation strategies to prevent this from happening.

Vulnerability Management

The concept behind vulnerability management is acknowledging the fact that there is no such thing as a 100 percent secure system and having the necessary vigilance to anticipate potential threats before they become a serious issue. There are hundreds of new viruses, trojans, and malware that are created each year with the express purpose of penetrating computer systems. One of the ways vulnerability management practices help to prevent such threats from affecting computer systems is through constant security updates and testing the present day security measures in the system (Chua & Storey, 2016).

Security updates come from database updates from various government and non-government organizations that identify potential virus threats and release data on how to counter them. System admins then implement these solutions into the system and test the security measures that have been implemented to ensure continued system integrity. Aside from this, there is also application and network security protocols to take into consideration. Application protocols limit the ability of installed programs to influence a system’s program. This ensures that applications only work within a pre-defined environment which helps to limit the potential damage they cause (Bamrara, 2015).

Network security measures are used in the same context; however, they involve isolating systems and preventing one system from affecting the other. For example, a system that a CSR operates in is kept on a separate server and network infrastructure than other critical systems. This ensures that if a virus were to compromise the CSR system, it would not affect critical systems in other parts of the company. The last practice involving vulnerability management are password management practices which often means changing passwords on a bi-weekly basis. Exercises like this help to lower potential network break-ins by ensuring that methods that can be used to gain access to the system (ex: a stolen password) are changed (Wei, Murugesan, Kuo, Naik, & Krizanc, 2013).[Need an essay writing service? Find help here.]


Overall, what this paper has shown is that there is no such thing as a system that cannot be penetrated so long as it is connected to the internet. Even systems that are not directly connected to the net can be breached via human incompetency or through malicious actions by an employee within the company. This is why companies should practice constant vigilance when it comes to the actions they take when safeguarding their databases.


Reference List

Bamrara, A. (2015). Evaluating Database Security and Cyber Attacks: A Relational Approach.    Journal Of Internet Banking & Commerce, 20(2), 1.

Chua, C. H., & Storey, V. C. (2016). Dealing with Dangerous Data: Part-Whole Validation for    Low Incident, High Risk Data. Journal Of Database Management, 27(1), 29-57.

El-Hajj, W., Ben Brahim, G., Hajj, H., Safa, H., & Adaimy, R. (2016). Security-by-construction in web applications development via database annotations. Computers & Security,            59151-165.

Ferdinand, J. (2015). Building organisational cyber resilience: A strategic knowledge-based view            of cyber security management. Journal Of Business Continuity & Emergency Planning,        9(2), 185.

Jenab, K., & Moslehpour, S. (2016). Cyber Security Management: A Review. Business    Management Dynamics, 5(11), 16-39.

Khatri, V., & Brown, C. V. (2010). Designing Data Governance. Communications Of The            ACM, 53(1), 148-152.

Van Staalduinen, M. A., Khan, F., & Gadag, V. (2016). SVAPP methodology: A predictive         security vulnerability assessment modeling method. Journal Of Loss Prevention In The      Process Industries, 43397-413.

Wei, D. S., Murugesan, S., Kuo, S., Naik, K., & Krizanc, D. (2013). Enhancing Data Integrity     and Privacy in the Cloud: An Agenda. Computer, 46(11), 87-90.

Essay Writing Sample: Nutrition and Behavior Tracking
Posted by: Write My Essay on: October 31, 2018

Sample by My Essay Writer

Nutrition and Habit Tracking

           Nutrition and exercise are vital in determining the health status of an individual. There are certain activities and kinds of food that when included in one’s daily nutrition and behaviors, can likely lead to certain illnesses. On the other hand, certain types of food and behaviors can help to prevent given diseases. Thus, it is important to analyze some of the foods, behaviors, exercises, rest and sleep patterns, and their possible impacts on an individual’s health.

Table 1: Nutrition, Behavior, Sleep and Exercise Log

Nutrition     Behavior Sleep Exercise Stress Management
Daily calorie intake – 1,600 calories  Food


Day Target Actual        
Monday 2 cups fruits 3 cups of orange juice with sugar Eating lunch at my desk 10 hours 2 hours walking No stress issues
  3 cups of vegetables 1 cup cooked spinach        
  7 ounces of grain 12 slices of brown bread        
  6 ounces of protein 7 eggs        
  3 cups of dairy 5 cups of milk with sugar        
Tuesday 2 cups fruits 4 cups mango juice with sugar Playing a video game at lunch on my phone 12 hours 1.5 hours walking Loneliness and eating snacks
  3 cups of vegetables 1 cup leafy salad green        
  7 ounces of grain 8 slices of bread        
  6 ounces of protein 8 table spoons of peanut butter        
  3 cups of dairy 4 cups of milk        
Wednesday 2 cups fruits 3 peeled oranges Drinking juice instead of water 9 hours 2 hours walking Staying quiet and eating snacks at  every opportunity
  3 cups of vegetables 2 cups cooked spinach        
  7 ounces of grain 9 cups cooked rice        
  6 ounces of protein 10 ounces chicken with 1 table spoon salt        
  3 cups of dairy 6 cups of yoghurt with sugar        



I currently weigh 180 lbs and my goal is to attain 150 lbs. My calorie consumption is about 16,000 units. To achieve this, I have to achieve a certain target of nutrition, limit consumption of food late at night, be serious with my lunch, and exercise regularly. As an adult, I am required to be active at least two and half hours every day. I am also required to limit my consumption of sugar and salt. However, I often end up with unhealthy choices. At the end of a 4 week log, I ended up gaining 3 lbs instead of losing.[“Write my essay for me?” Get help here.]

I walk a lot each day, as my job requires me to do so quite often. I believe helps me keep fit and thus maintain my health. Also, I exercise for a short while each day, which I also believe helps improve my life by burning excess calories and keep my body strong (Casey, Benson & MacDonald, 2004). Ensuring that I vary what I eat each day helps in regulating the amounts of calories I consume on a daily basis. Thus, according to Schulherr (2008), I must monitor and regulate what I take to ensure that my diet is balanced every day. [Need an essay writing service? Find help here.]

Adding sugar and salt to my food may not help in improving my health. Too much of these may increase my risks of suffering from diabetes. Being dormant or lonely whenever I am stressed up never helps improve my health. It may end up complicating my stress levels. On the same note, eating snacks each and every time I am stressed up can result to obesity. I have a tendency of taking my supper very late at night and I often wake up at night to eat some snacks. According to Lister (2009), eating late at night may lead to indigestion and may work against my dream of losing weight. This has placed me at risk of developing stomach and health complications (Lister, 2009). My other habits that are not beneficial to my health include; taking lunch at my desk while playing video games. In most cases, I end up feeling hungry more quickly than normal. Consequently, this forces me to eat snacks so as to elevate the level of hunger pangs.

I tend to take too much calories on Wednesdays. On other days, my consumption is relatively constant. I sleep for longer than 12 hours on weekends and do not exercise at all. This is because I have no engagements on weekends to remind me that I need to wake up, get ready and attend to. This inconsistency is due to my habit of generally staying indoors on weekends. This also implies that I do not exercise on weekends. However, it is worth noting that I am sometimes keener on my diet whenever I have appointments to attend to. Those are also the times I get to remember to exercise. That is why there is a variation between week days and weekends on my food consumption patterns and behavior.


In order to address my weaknesses, I intend to increase my daily water consumption to at least 8 cups. I also plan to reduce my sugar and salt consumption as much as possible. I intend to implement this by ensuring that I take dairy products and fruit juices in their natural form. Also, plans are underway aimed at increasing the amount of time I take during exercises to more than two hours every day. To achieve this, I intend to join a gym club and maintain a fixed schedule of two hours in the morning and another hour in the evening. To increase my active hours, I will also walk to the places that are at walking distances. For long distances, I will use a bicycle as opposed to a car. When stressed up, I will try to talk to my close friends about it instead of being dormant and lonely (Duppong et al., 2007).

To improve on my strengths, I will ensure that I do not exceed the target quantity of each type of food and vary them as much as possible. I will also ensure I stay away from foods that have too much cholesterol and fat. An excess of red meat may lead to undesired health conditions. Thus, my plan is to avoid red meat as much as I can. Currently, I get enough sleep, though sometimes I sleep abnormally longer. This will be adjusted to no more than 10 hours of daily sleep.

Now that I have joined a graduate school, I expect my hours of sleep to change. I also expect to be very busy. To keep up with my plan, I will ensure that I complete my daily activities at 9.00 pm or earlier and retire to bed. I will then wake up at 5.00 am and go to the gym, exercise for an hour before going to my classes. After classes, I will go to the gym for one hour prior to settling down to work on my homework. After the homework, I will take my supper and go to bed (Casey, Benson & MacDonald, 2004).


Assuming I was advising a patient with the same health log as mine, I would emphasize on more exercise.  I would also advise him or her to limit his or her consumption of sugar and salt. Besides, it is important to limit the consumption of sugar in order to avoid becoming diabetic in the future. The patient should also find alternative stress management techniques rather than staying indoors indulging in eating snacks. This is because eating while stressed up increases the likelihood of being obese (Gibson et al., 2004). If one does not exercise regularly, it is easier for him or her to gain weight. Thus, it is important for the individual to exercise more and to cut down excess calories (Casey, Benson & MacDonald, 2004). The individual must learn to eat early and without any distractions.[Click Essay Writer to order your essay]



Casey, A., Benson, H., & MacDonald, A. (2004). Mind your heart: A mind/body approach to stress management, exercise, and nutrition for heart health. New York: Free Press.

Duppong, J., Costin, C., Broome, K., Smeltzer, D., & Truitt, B. (2007). You can’t just eat a cheeseburger: How to thrive through eating disorder recovery.

Gibson, A., Heyward, V., Mermier, C., Janot, J., & Wilmerding, M. (2004). Comparison of DXA, Siri’s 2C, and Lohman’s Db-Mineral Models for Estimating the Body Fat of Physically Active Adults.International Journal Of Sport Nutrition And Exercise Metabolism14(6), 657-672.

Lister, B. (2009). Importance of Nutrition and Health Education. Nutrition And Health,20(1), 11-20.

Schulherr, S. (2008). Eating disorders for dummies. Hoboken, NJ: Wiley Pub.

Write My Essay Sample: Quebec Immigration Policies
Posted by: Write My Essay on: October 30, 2018

Sample by My Essay Writer

Quebec Immigration Policies: How the Provincial Policies Shape Multiculturalism in the Province and Contribute to Quebec Ethnic Nationalism


The new immigration reform has been dubbed “Together, we are Quebec” is undergoing serious deliberations.  At the core of this immigration reform policy is to match immigrants with regional economic profiles. The reform aims at increasing economic immigration by 70% of the current annual intake (Canadian Citizenship & Immigration Resource Center, 2015). The new system essentially will do away with the present immigration policy of “first come, first served” concept that is prevalent in Australia and New Zealand. The following paper explores the proposed Quebec immigration policy, especially in regards to how this provincial policy will shape multiculturalism in the province and contribute to ethnic nationalism in Quebec.[“Write my essay for me?” Get help here.]

1.The new policy reform takes into account the current challenges in the immigration process and the need to recognize the current and changing nature of labor trends. One of the ways that the new policy will contribute towards that agenda is through making the system faster (FW Canada Inc, 2015).

2.The need to speedily give access to new immigrants who are specialized in industries that the workforce in Quebec needs. This strategy will increase multiculturalism in the workplace, making the economy take the best of the labor force out there to enrich its workforce portfolio. One of the requirements in the new reform will be the need by immigrants to have an adequate level of the French language (Solymon, 2016).

3.Immigrants will be placed in places outside of the greater Montreal (CBS News, 2016). The new settlement procedure will now build a truly modern Quebec ethnic nationalism where the immigrants and the indigenous people feel a new sense of belonging to a new-face Quebec.

This policy will bring in more cultures from all around the world and will contribute greatly to the creation of a true multicultural system in Quebec. It also significantly alters the traditional ethnic nationalism because a lot of people who are coming to stay will bring their ideas of nationalism to Quebec especially one based on global nationalism. Quebec’s society will undergo a significant change because a good fraction will have to be based on the need to accommodate a wider variety of views on many social aspects of Quebec and a wider ethnic nationalism platform that it already is.


            Kathleen, the Quebec Immigration Minister recently confirmed the intention of the government to undertake an ambitious immigration reform- the first major reform in a quarter of a century. This reform has been dubbed “Together, we are Quebec.” At the core of this immigration reform policy is to match immigrants with regional economic profiles. The reform aims at increasing economic immigration by 70% of the current annual intake (Canadian Citizenship & Immigration Resource Center, 2015). The new system essentially will do away with the present immigration policy of “first come, first served” concept that is prevalent in Australia and New Zealand. The following paper explores the proposed Quebec immigration policy, especially in regards to how this provincial policy will shape multiculturalism in the province and contribute to ethnic nationalism in Quebec.


            The new policy reform takes into account the current challenges in the immigration process and the need to recognize the current and changing nature of labor trends. One of the problems with the old provincial immigration policies has been its inability to retain foreign talent. The new policy’s objective is to retain immigrants who are temporary workers or students on temporary visas. The policy aims at keeping this important resource just like other countries such as the United States of America and Europe. As the minister observed at the launch of the reform, workers and students now have a wide variety of choices because the US and many European states are interesting to the potential immigrants and Quebec wants to do better that its competitors. One of the ways that the new policy will contribute towards that agenda is through making the system faster (Solymon, 2016). Weil observes that the present provincial system takes an average of four years for a potential immigrant to be approved and by the time that one arrives to Quebec, the labor market often has undergone fundamental changes. The introduction of digital technology to the immigration process is expected to quicken the immigration process. This strategy is going to increase multiculturalism in the province as immigrants from the rest of the world will enter Quebec, fundamentally altering ethnic nationalism in the province.

Another issue that the policy emphasizes on is the need to speedily give access to new immigrants who are specialized in industries that the workforce in Quebec needs. Quebec will borrow heavily on Ottawa because Ottawa was able to find candidates who matched their job requirements in 2015. The need to speedily usher immigrants into the job market is important because finding a job is a big challenge for Quebec immigrants. This strategy will increase multiculturalism in the workplace, making the economy take the best of the labor force out there to enrich its workforce portfolio. To achieve that, employers from various industries will be encouraged to outline their requirements and professional associations will also be required to recognize foreign diplomas (FW Canada Inc, 2015). One of the requirements in the new reform will be the need by immigrants to have an adequate level of the French language. Without the ability to use French, the process of integrating immigrants into the Quebec society has been rather slow. The new requirement will ensure that immigrants are quickly and seamlessly integrated into Quebec society, thereby expanding the current multicultural platform that Quebec enjoys. It will also increase the level of nationalism amongst the immigrants because language is an important concept in building nationalism not only in Quebec but in other parts of the world. [Need an essay writing service? Find help here.]

According to the new proposed reform, immigrants will be placed in places outside of the greater Montreal. This is essential because currently, three quarters of all new immigrants have settled in the greater Montreal area. This strategy is also going to significantly affect the process of building a multicultural society in Quebec. The current settlement pattern has not significantly affected the traditional ethnic nationalism pattern because multiculturalism has only been built around the greater Montreal (CBS News, 2016). The new settlement procedure will now build a truly modern Quebec ethnic nationalism where the immigrants and the indigenous people feel a new sense of belonging to a new-face Quebec. In a few years, Quebec’s nationalism will come to be characterized by multiculturalism rather than the present one distinguished by a vast majority of indigenous Quebec and a few immigrants who do not consider themselves as part of the nation.

A lot of the opponents of the policy have often questioned the 42.5 million Canadian Dollars that have been allocated and have argued that that is a large sum allocated to a single ambitious project. However, what their argument fails to see is that the sum will go to various sectors of the economy and can potentially bring benefits in the short, medium and long term. For example, it will go into the technology needed to quicken the visa approval list, eradication of job discrimination and reduction of waiting list for French classes. All these measures are effective in ensuring an inclusive society and social harmony that is important in the long run. [Click Essay Writer to order your essay]


This ambitious policy proposal will greatly impact on many sectors in Quebec, but one area that will greatly be affected is the culture. This policy will bring in more cultures from all around the world and will contribute greatly to the creation of a true multicultural system in Quebec. It also significantly alters the traditional ethnic nationalism because a lot of people who are coming to stay will bring their ideas of nationalism to Quebec especially one based on global nationalism. With about 1.4 billion jobs to be filled by immigrants, Quebec’s society will undergo a significant change because a good fraction will have to be based on the need to accommodate a wider variety of views on many social aspects of Quebec and a wider ethnic nationalism platform that it already is.


Canadian Citizenship & Immigration Resource Center. (2015, October 21). Quebec to Reform Immigration Policy in 2017 Featuring Declaration of Intent Immigration System. Immigration News Articles .

CBS News. (2016, March 7). New Quebec immigration policy aimed at attracting, retaining foreign talent. CBS News .

FW Canada Inc. (2015, August 20). Canada: Quebec Talks Immigration Reform. FWCanada Inc

Solymon, C. (2016, March 7). Quebec immigration reform to match applicants to jobs. Montreal Gazette

Essay Writing Service Sample: Patient Case Description
Posted by: Write My Essay on: October 29, 2018

Sample by My Essay Writer


The following is a case description of male patient suffering from multiple progressive myositis ossification. The patient is an Italian aged 37 years old and a catholic. Hi case was diagnosed in his childhood and was admitted at the facility six years ago. He has been hospitalized at the facility for the whole of his life. He was the last child in the family and one of his parents died recently.

Multiple progressive myositis ossification is a subtype of myositis ossification which is has been found to be hereditary. Progressive myositis ossification is an autosomal dominant disorder and is a very rare disease. According to Talbi et.al (2016) article “Myositis ossificans progressive: Case report” published on Pan African Medical Journal Pan Afr Med, this disease is associated with progressive ectopic ossification and skeletal malformation in connective tissues of muscles of the body.  Progressive myositis ossification usually affects mainly brachialis, quadriceps femoris and the adductor muscles of the thigh. For cases of multiple myositis ossification, it also affects other muscles of the body, for instance muscles of mastication such as the pterygoids.  This illness is characterized with skeletal malformations, limited joint movements, tendon weakness and muscle weaknesses (Rowlands, 2014).  [“Write my essay for me?” Get help here.]

According to Spinzia et al. (2014) article: “A rare isolated unilateral myositis ossificans traumatica of the lateral pterygoid muscle: A case report”, published on J Med Case Reports Journal of Medical Case Reports, progressive myositis ossification occurs without any injury involvements since it is inherited affliction. This condition has been known to progress in a predictable manner among many patients. The disorder is an autosomal dominant trait which can be passed over to offsprings in case parents have the same condition. Some cases of progressive myositis however could be viewed as being non hereditary since they occur as a result spontaneous genetic mutation at the time of conception (Frontera, 2008).

Case presentation

The 37 year old patient presented with a case of multiple progressive myositis ossification which was diagnosed while he was a child. He relied very much on his wheel chair for support and movement. The patient has also been diagnosed with a chronic pressure. This patient has problems with normal feeding through the oral cavity, his muscles of mastication have failed and as a result he takes liquefied meals only and through a straw. The patient was admitted six years ago after the parents could no longer manage him and his condition at home since he is very stiff and rigid. [Need an essay writing service? Find help here.]

The patient also has a liking for sexy photos which has made his parents provide the sexy posters he wanted in his room. He has also extended the same towards the female staff at the hospital and he talks sexually to them. The patient is fully dependent on the facility staff for everything.

Plan, Management and Outcome

Patients of multiple progressive myositis ossification have been found to develop complications such as eating disorders due to impaired muscles of the mouth and pressure ulcers on their skins. The two mentioned above could result into cases of gastric ulcers and constipation for the case of feeding disorders and peripheral pain resulting from the pressure sores. The above cases were considered and the patient was put on the following regimen.

The patient is currently on vitamin D and prevacid. The vitamin D supplements are for regulating bone metabolism which would ease the situation.  Prevacid on the other hand is to help regulate the amount of acid produced in the patient’s stomach. Since the patient has problems with feeding, there is a high possibility of over secretion of gastric acids that could result to the ulceration of the gastrointestinal tract (Rowlands, 2014).[Click Essay Writer to order your essay]

The patient is also on medical directives such as Tylenol and laxatives. Tylenol is a painkiller and so could be used in relieving headaches and any other kind of pain. Tylenol was also to relieve pains from the pressure ulcers the patient has developed. Laxatives have a fundamental role in improving the gastrointestinal motility of the patient. The patient has problems with his gastrointestinal functionality and so there are chances of constipation presenting.

The nursing staffs at the facility were advised to seek for ways of discouraging and handling the patient’s weird liking for sexy information and content through guidance and counseling. Since they could not provide sexy posters in the hospital, there was need to try and train his mind on liking some other content.


The patient presented with multiple progressive myositis ossification which had been diagnosed in his childhood. No history the patient showed he had been involved in any accident. It was therefore clear that this was the heritable subtype of myositis ossification. However none of the parents or any of his siblings had the same case. It was therefore hypothesized that the cause of the illness could be mutations that occurred during his conception.


Nurses play a fundamental role in the education and medical management of people with disorders such as myositis ossification. The partnership between nurses and patients improve care offered to the patient and also helping the patient become a self-manager. It is therefore their mandate to combine skills and expertise in teaching and counseling their patients to allow quicker recovery.

From the above information, the following questions can be asked. Is the medical care offered to the patient sufficient, given that he is only on vitamin D and prevacid. Are the medical officers of the facility right to have Tylenol and laxatives as the medical directives to the patient? And lastly is healthcare offered to the patient sufficient, since we see that he has ended up developing a pressure ulcer.


Frontera, W. R., Silver, J. K., & Rizzo, T. D. (2008). Essentials of physical medicine and rehabilitation: Musculoskeletal disorders, pain, and rehabilitation. Philadelphia, PA: Saunders/Elsevier.

Rowlands, D. J., & Clarke, B. (2014). Recent advances in cardiology.

Spinzia, A., Moscato, G., Broccardo, E., Castelletti, L., Maglitto, F., Orabona, G. D., & Piombino, P. (2014). A rare isolated unilateral myositis ossificans traumatica of the lateral pterygoid muscle: A case report. J Med Case Reports Journal of Medical Case Reports, 8(1).

Talbi, S., Aradoini, N., Mezouar, I. E., Abourazzak, F. E., & Harzy, T. (2016). Myositis ossificans progressive: Case report. Pan African Medical Journal Pan Afr Med J, 24.

Essay Writing Service Sample: Patient Safety
Posted by: Write My Essay on: October 25, 2018

Sample by My Essay Writer

Increasing Participation in Patient Safety Initiatives


Importance Statement:

The primary purpose of any healthcare center, is the provision of patient safety and care. Ensuring that all nurses and doctors participate actively in enhancing patient safety is thus the duty of every leader in any hospital. In this project, the researcher proposes some of the best practices that can help in increasing participation in patient safety initiatives. To help patients receive the best and safest care, it is important to involve the patient. Also, to ensure a high quality health care, the patients, the practitioners, the providers and families must collaborate and work together. All parties must participate in ensuring that quality care and patient safety is achieved. When patients know their part in the treatment process and participate actively in ensuring compliance, they are more likely to heal quicker and save costs. When practitioners do their best to ensure a safe and quick care to patients, the families know their roles in the treatment process of the patient; all is bound to go smoothly. However, this has not been the case in many hospitals. The participation of, especially patients and their families, has not been significantly achieved.

Purpose Statement

In this project, some of the best ways of ensuring that patients and families work together with the healthcare providers to ensure safe care are discussed. The proposed project aims at promoting knowledge of the patient safety issues among all stakeholders including patients, practitioners and administrators. Through the promotion of this knowledge, the researcher is optimistic that the participation in patient safety will be enhanced. [“Write my essay for me?” Get help here.]


Some of the best practices include training family members from the patient side on some of the nursing care activities including dressing, washing the patient and feeding the patient. Patients should also be trained on some of the safest practices that can help speed up their recovery. Explaining to patients the kinds of foods they should eat to ensure they heal properly and safely should also help in improving patient safety (Blaney-Koen, 2009). To ensure these activities are effectively implemented, it is important to consult the relevant stakeholders including the ministry of health, the healthcare providers, the community members, the faith-based healthcare providers, school administrators and community health workers (Barone, 2015). In the next section of this paper, these practices are explained in detail.


Improving participation in patient safety is important to the nursing profession since it is the right of patients to receive the safest and highest quality care. In the nursing code of ethics, nurses have the responsibility of ensuring that patients are kept safe from any form of harm. Thus, the initiative to improve participation in patient care is relevant and important to all people in the nursing profession. Nurses receive their job satisfaction when they see their patients happily recovering. Patients can only be happy when, among other things, they are kept safe at all times. It is important, thus, to obtain the participation of both the patients, their families and that of the nurses in ensuring the safety of the patients (Kalra, 2011). [Need an essay writing service? Find help here.]

Steps to Be Taken in Determining the Need for the Initiative

To ascertain that there is actually a need to improve participation in patient safety, the researcher intends to carry out surveys in 5 different healthcare centers, selected at random. The researcher will identify ways in which patient safety has been ignored or overlooked and how patients have suffered from neglect. The researcher will also interview 100 randomly selected patients and come up with solid evidence that the safety of the patients is at stake and there is a need for action. 100 nurses will also be interviewed to obtain their views on the need for the initiative. The next step will be to analyze the obtained information and come up with accurate information that is conclusive and reliable.

Steps to Determining the Readiness of the Organization to Implement the Initiative

The first step will be to approach the administrators of the organization and ask them whether it will be prudent to implement the proposed initiative and whether the organization has the necessary resources. Next, the researcher would interview the nursing practitioners within the organization on their perception on whether the initiative can be useful when implemented. Their response will help to determine the readiness of the organization to implement the initiative.

The barriers will be identified by looking at the things that can hinder the implementation of the policy to train nurses, patients and family members on patient safety. Some of the barriers that may be encountered include the tight schedule of nurses and nursing students, the poor health of some patients and the indifference of some family members. Reviewing the time tables for all nurses can help in identifying the free time when the training can be offered to the nursing practitioners. The patients can be selected on the basis of their health conditions whereby the critically ill will not be disturbed, but will be trained one by one on their bedsides. However, this move may proof to be time-consuming and fruitless since some patients can barely concentrate. [Click Essay Writer to order your essay]

Some of the enablers that may be obtained include aggressive nurses and family members who are ready to learn more about patient safety. This will potentially help in boosting support for the initiative among the patients, nursing practitioners and other key stakeholders (Sanchez, 2012). The availability of resources to facilitate the initiative can also act as an enabler to the proposed project.

Steps to Determine the Necessary Strategies to Implement the Initiative

The strategies that will be necessary in implementing the proposed idea will be identified through consultation with the relevant stakeholders including the administrators of the healthcare centers, the nursing practitioners and the patients. These will be achieved through interviews and surveys. A thorough review of relevant literature will also be done to identify some of the most effective strategies.

Strategy to Implement the Initiative

To enhance participation of nurses in patient safety, the proposed strategy is to offer safety training to the nurses and put in place a reward scheme for best practice. When nurses are trained on safety issues and on how to handle them, they will have the required know-how on how to handle patients in a safe way and keep them from harm. For instance, if nurses know that patients can only be kept safe if they are dealt with utmost honesty and trust, then they will begin to exercise honesty and develop trust with their patients. After recovery, feedback can be taken from them to determine the quality of care they received. The nurses whose patients give excellent feedbacks can then be rewarded accordingly. Leadership by example can be very important in ensuring that this is achieved (Clancy, 2007).

The best way to get nurses interested in learning about patient safety is by informing them about the key benefits of the initiative. When they learn that they can be more successful as nurses by making the safety of their patients the major concern, they can get interested in learning how this is done. After their interest is aroused, the researcher will ask the nursing practitioners to group themselves according to their shifts and the time they are available so that classes can be organized according to the times when are free.

To offer training to patients on their safety and how they can enhance it, patients who are strong enough to attend an organized forum will be asked to attend the forum and learn on how they can participate in ensuring their safety and quick recovery. When patients learn that they can actually play a part in their recovery process and their safety, they will most probably become interested in learning how they can participate (Vincent, 2010). Family members will also be asked to attend the forums where they will learn how they can ensure that their sick relatives remain safe as they recover.[Need an essay writing service? Find help here.]

First Few Steps in Implementing the Initiative

If the proposal was to be implemented, the first few steps in implementation would include approaching the nurses and nursing practitioners and asking them what they think about patient safety. The next step would be to request them if they would be willing to participate in a training program that would help in improving their participation in patient safety. After that, the researcher would approach a qualified and professional nursing practitioner who has knowledge and experience in patient safety and ask him/her to train the nursing practitioners on patient safety. In conjunction with the administration, the researcher would then institute a reward scheme for the best practicing nurses. The scheme would then be made known to the nurses after completion of the training.

After the nurses have been duly trained, the researcher would approach the patients one by one and ask them whether they would be willing to participate in a patient safety improvement forum. The details of the forum and expectations would then be explained to the patients one by one and their consent obtained. The researcher does not expect any hardships in acquiring the consent of the nurses and the patients.


Barone, J. (2015). Patient Safety in Surgery. Patient Saf Surg, 9(1), 10.

Blaney-Koen, L. (2009). Patient Education: Improving Patient Safety. Journal Of Patient Safety, 5(3), 197.

Clancy, C. (2007). Putting the Patient in Patient Safety. Journal Of Patient Safety, 3(2),

Kalra, J. (2011). Medical errors and patient safety. Berlin: De Gruyter.

Sanchez, J. (2012). Patient safety. Philadelphia, Pa.: Saunders.

Vincent, C. (2010). Patient safety. Chichester, West Sussex: Wiley-Blackwell.

Write My Essay Sample: Diabetes in Older Adults
Posted by: Write My Essay on: October 24, 2018

Sample by My Essay Writer


Diabetes is considered the oldest disease in human history. It affects the way the human body handles glucose. Despite the disease having prevalence in any age group, research indicates that older people, for long excluded from control trials regarding its treatment and the associated conditions, are more prone to it than younger ones. According to the American Diabetes Association (ADA) (2014) report, about 25% of Americans aged 60 years and above live with the disease. The report further acknowledges that aging is the primary cause of the epidemic. Older adults with the disease are more prone to both acute and chronic cardiovascular and micro-vascular complications. Due to the heterogeneity of the health status of the older adults, it is difficult to ascertain a standard intervention approach that fits the entire population range. Thus, this research paper explores and designs an exercise program and prescription for older adults with diabetes. However, a brief overview of the types of diabetes causes, and symptoms would all be necessary for this research and as such are briefly discussed.

Causes of Diabetes Mellitus

Usually, the pancreases secrete a hormone known as insulin. It converts glucose in the body that is available in the foods we consume into energy. Whenever the cells fail to use the hormone as required, a medical phenomenon referred to as insulin incidence sets in. Initially, the pancreas secretes more insulin in an attempt to get the glucose into the concerned cells. However, it eventually fails to stand it, and as a result, sugar starts to accumulate in the blood stream instead as is the case with type II diabetes. [“Write my essay for me?” Get help here.]

It is worth noting, however, that the condition arises as a result of a combination of causes. These include Genes, extra weight, and metabolic syndrome to name a few. According to Joslin Diabetes Center (JDC) (2016), genetic history makes some people more susceptible to the disease than others. The different bits that DNA contains explain why some people in a certain family lineage stand at a more risk of getting the disease than others. Overweight is another possible cause of the disease. It stems from the fact that it leads to conditions that result in resistance to insulin. This is the reason attributed as to why type II diabetes affects both adults and children with obesity.  Moreover, diabetes can also result from metabolic syndrome. Those people that sustain insulin resistance happen to live with several conditions such as extra fats, high blood pressure, high glucose levels in the blood and high cholesterol.

Research has also established that too much of glucose from the liver causes diabetes. When the blood sugar is low, the liver responds by secreting more glucose to counterbalance the condition. After meals, particularly containing high levels of carbohydrates, the blood sugar level escalates, necessitating the liver to reduce the secretion of glucose (Postic et al., 1999). In the case where people experience a breakdown in the communication between cells, the process of insulin secretion is affected giving rise to diabetes. It could be as a result of wrong signals or failure to pick messages correctly.  Additionally, if the there is a breakdown in the beta cells, they send out the wrong amount of the hormone throwing off blood sugar, thus, predisposing people into getting the disease. In the entire analysis above, it should be noted that high blood glucose (that is characteristic of Diabetes Mellitus) is detrimental to cells.

Diabetes Mellitus Types

Diabetes is categorized into two; type I diabetes and type II diabetes. In the first case, the body immune system damages the cells responsible for the secretion of insulin, and ultimately, eliminating the production of the hormone in the body. It accounts for about 5% of the people living with diabetes.

Type II diabetes is not limited to age as it can set in at any stage of human development cycle. However, it becomes more prevalent as one transit from adulthood to old age. In children, this kind of diabetes seems to be on the rise too of late. It accounts of up to 95% of the people suffering from the disease. Here the body fails to use insulin correctly as required resulting into insulin resistance. As the condition worsens, the pancreases secrete a decreasing amount of insulin, resulting into insulin deficiency in the body. According to Olokoba et al. (2012), the type II diabetes mellitus is solely due to genetics and lifestyle factors. The later factors include sedentary lifestyle, physical inactivity, generous consumption of alcohol and cigarette smoking. Notably, obesity contributes 55% of type 2 diabetes incidences.

These types of diabetes differ from symptom manifestation. In type I diabetes, it starts either at childhood or at intermediate stages just before adulthood. The sudden symptoms compel the sufferers to seek medical attention because of an abrupt manifestation of high blood sugar symptoms. On the converse, in the type II diabetes, an individual may not necessarily portray symptoms before diagnosis. The disease shows up in mostly in adulthood. However, there are increasing cases of children diagnosed with the disease currently.

The two types of diabetes are similar in the manner that they both increase the sufferers’ chances of experiencing serious complications. However, it is much easier to monitor and manage the disease if the resultant complications can be prevented and contained. If this is not the case, diabetes can lead to kidney failure and blindness. As well, the disease continues to be the critical risking factor of heart disease, foot amputations and stroke. The type II diabetes predisposes patients to the risks of other complications long-term and short-term, often leading to premature deaths. The increase in mortality and morbidity rates in type II diabetes is due to the commonness of this kind of disease. This is because the disease has insidious onset coupled with late manifestation of the accompanying symptoms. As Olokoba et al. (2012) points out, it is even worse in low-income countries such as those in Africa, Latin America and some parts of Asia. According to JDC (2016), diabetes mellitus affects approximately 20.8 million Americans annually. While 1.5 million of them are diagnosed and are in total awareness of the disease, 6.2 million represent undiagnosed cases, hence unaware of their situation regarding the disease.

The Role Physical Exercises Play in Decreasing Medical Conditions

Overall, physical activities have several benefits to the skeletal health in the entire age spectrum, besides the general benefits to the body. Regular exercise is a vital part of managing diabetes when it is coupled with proper diet, taking medications according to prescriptions, and handling stress adequately according to Haskell et al. (2007). While the human body remains active, it increases the cells’ sensitivity to insulin, making it work more efficiently. These cells help in removing the glucose from the bloodstream leveraging a mechanism that is independent to that of insulin as one engages in physical excises. In other words, exercising regularly helps the body in lowering the blood glucose and hence, improving the body’s ability to handle sugar levels. Regular physical activities assist in reducing blood pressure as well as cholesterol levels in the body, burning calories necessary in either losing or maintaining body weight among a myriad of other benefits.

The contemporary research asserts that consistent decrease in muscle and strength fitness with age can be preventable in part if individuals always engage in regular physical activities. As people grow older, insulin sensitivity decreases partly due to lack of physical exercises. Lowering the rate at which one participates in physical activities predispose a significant number of people to the type II diabetes. Recent surveys regarding physical exercises training are involving older patients to identify whether this can improve their fitness conditions (ADA, 2004). The report indicates that patients do well with adequate training which as well boosts their metabolic responses. Additionally, maintaining quality levels of fitness leads to less cases of chronic vascular diseases, hence improving the quality of life.

Pre-exercise Evaluation

The structured approach, as described by ASCM, gives particular recommendation regarding the frequency, type, duration and intensity of the necessary physical activities (Haskell et al., 2007). This approach currently captures lifestyle to enhance healthy lives. However, it recommends that diabetes mellitus patients should participate in a thorough evaluation using appropriate diagnostic survey. While doing this, the examination should examine for the possibilities of both macrovascular and microvascular to isolate compromising situations that can aggregate while engaging in an exercise program. As a result, this would necessitate the establishment of areas of concern, allowing one in designing an exercise prescription at individualized levels, which can help in minimizing risk to the patient.

Mainly, for older adult diabetes, they need to engage in several counseling sessions since there are some factors to be considered in implementing an exercise prescription. Patients are supposed to attend at least twice in such meetings and fill the activity assessment form as required in that matter. ASCM recommends that it is important to identify the physical status of the patient (Haskell et al., 2007). Then, the patient should be assessed for the potential necessity and cardiovascular pre-exercise testing to avoid mishaps while one engages in the program. The first counselling should seek to review the assessment form, with more focus on physical examination and the history of the patient. Equally, important, it should give room for identifying the performance goals of the person. The second session would help in reviewing the exercise prescription at an individualized level. [Need an essay writing service? Find help here.]

By examining an exercise assessment form, it would be easier to identify the levels of the physical activity. They include pre-contemplator, contemplator and active people. The first case categorizes people who do not have the intention of starting and do not necessarily exercise. The second instance identifies them as either to have considered beginning participating in the program or they have infrequently attend it. The active individual, on the other hand, has either achieved or near achieving the activity standards.

ACSM Recommendations for Old Adults

As ACSM recommends that both muscle-strengthening and aerobic activity are vital for healthy aging. It suggests that older adults can at the minimum achieve the best health benefits by engaging in the activity for two and half hours of aerobic activity at moderate intensity (for example brisk walking) every week on top of muscle-strengthening activities minimum two days a week. If the action involves aerobic activity of vigorous intensity, then old adults should engage in the program for 75 minutes. Additionally, they should participate in muscle-strengthening activities minimum two days per week. Alternatively, ACSM suggests that one can have the combination of the above discussed activity in addition of at least four days per week (Haskell et al., 2007).

Furthermore, for increased activity with an aim of obtaining additional health benefits, ACSM recommends that five hours of aerobic activity of moderate intensity is ideal if done weekly on top of muscle-strengthening activities done in two days every week. A patient can achieve this through a two-hour-and-half engagement in an aerobic activity of vigorous intensity weekly coupled with two-day muscle strengthening activities every week. Alternatively, one can obtain maximum benefits of physical activity by a combination of the two approaches plus two-day muscle-strengthening activities weekly.

Activity Plan

Each recommended activity has specific requirements that one has to conform. With that in mind, creating an activity plan helps in addressing each activity. That would ensure that patients of different levels of diagnosis use the recommended physical activity that may not end up causing more harm. For instance, patients sustaining chronic conditions need a plan that incorporates prevention and treatment. Additionally, the exercise program should help them in gradually and progressively increasing physical activity as it may seem necessary as time advances as particular conditions of ACSM recommends (Haskell et al., 2007).. During the counselling session, physicians should encourage older adults to engage in sufficient physical activity on a weekly basis, ensuring they meet additional exercises as required regarding the specific goals and needs. For example, old adults can achieve the recommended minimum level of activity if they participate in several but short-lived physical activity.  Patients should individualize their functional abilities through participation in a combination of different approaches as long as right the recommendation for a particular activity prevails.

Examples of muscle-strengthening and aerobic activities include callisthenic exercises, bicycle riding, dancing, swimming, walking and jogging among others. Intercepting warm-up and cool-down activities allow muscles to regain energy. Patients should self-monitor their activities regularly coupled with re-evaluation of the activity plan in analyzing improvement in their abilities. With that, they could be able to predicate if they should reduce or increase the physical activities so as not to overwhelm body abilities. Moreover, the old adults should be able to tell if they can increase their activity level or modify their diet as an approach to maintaining a healthy body weight (Buchner, 2009).[Click Essay Writer to order your essay]



Physical activity plays a significant role in promoting health and disease prevention. ACSM recommends that the time, frequency and intensity of the exercise entirely depend on the pre-exercise evaluation results. The previous discussions have shown that type II diabetes epidemic has a close association with the decreased activity levels, leading to increased obesity prevalence. Engaging in physical activity, thus, is a critical component of preventing and managing type II diabetes. Frequent exercising lowers the chances of the disease by improving the metabolic abnormalities as it could be easier to count an earlier progression of insulin resistance that leads to impaired sugar tolerance (ADA, 2004). For type I diabetes more emphasis should be focused on therapeutic remedies adjustments. This allows participating in physical activity safely in line with the patient’s goals and desires.



American Diabetes Association. (2003). Physical Activity/Exercise and Diabetes. Diabetes Care, 27(Supplement 1), S58-S62.

American Diabetes Association. (2014). Older Adults. Retrieved 5 October 2016, from

Buchner, D. M. (2009). Physical activity and prevention of cardiovascular disease in older adults. Clinics in geriatric medicine, 25(4), 661-675.

Haskell, W. L., Lee, I. M., Pate, R. R., Powell, K. E., Blair, S. N., Franklin, B. A., … & Bauman, A. (2007). Physical activity and public health: updated recommendation for adults from the American College of Sports Medicine and the American Heart Association. Circulation, 116(9), 1081.

Olokoba, A. B., Obateru, O. A., & Olokoba, L. B. (2012). Type 2 diabetes mellitus: a review of current trends. Oman Med J, 27(4), 269-273.

Joslin Diabetes Center. (2016). Genetics and Diabetes: Are you at risk? | Joslin.org. Retrieved 5 October 2016,

Postic, C., Shiota, M., Niswender, K. D., Jetton, T. L., Chen, Y., Moates, J. M., … & Magnuson, M. A. (1999). Dual roles for glucokinase in glucose homeostasis as determined by liver and pancreatic ? cell-specific gene knock-outs using Cre recombinase. Journal of Biological Chemistry, 274(1), 305-315.

Essay Writing Sample: Creating a Team Building Culture
Posted by: Write My Essay on: October 23, 2018

Sample by My Essay Writer

            The need for teamwork in an organizational setting cannot be overstated. It is common knowledge that individuals who work in a team tend to achieve more than individuals who act alone. Team building entails the ability to identify, recruit, influence, and empower a group of individuals towards specific, pre-established goals. The team building process begins with the recruiting process to the employee development phase. The leader of the team plays an indispensable in determining the outcomes of the team initiatives. An inefficient leader is defined as the one who risks curtailing the progress of the team and an entire organization.

            Team leaders are tasked with the duty of identifying, vetting, and recruiting individuals with diverse skills, talents, and heritages. This process comprises the first step in building an effective team. The next step in the team building entails the communication of the team goals. The team players should be aware of the objectives the team hopes to achieve at the end of the day. This enables them to align their initiatives towards the achievement of the stated goals. Also, there is a need for the indication of the rewards that the team players stand to achieve at the end of their efforts. Rewards act as motivational influences that encourage dexterity and initiative. To succeed in building my team, I will need to engage several skills. The skills will address the need for dissemination of information. They will also reinforce the operational dynamics to which the team is subjected.[“Write my essay for me?” Get help here.]

            To build an efficient team, I will make hiring a team effort. I will reinforce the need for collective effort in the identification and processes in the recruitment process (Corporate Challenge International, 2014). I will assign the prevailing employees to different segments of the hiring process. In one segment, I will determine that they identify and forward the names of individuals who have been shortlisted in the recruitment process. After the identification process, I will prevail that the present employees participate in interviewing the employees. This will allow the identification of the requisite qualities. It will further the recruitment process given that the current employees will be able to determine weaknesses in the potential employees. Individuals with such weaknesses can then be channeled to other segments of the organization where they will be more productive. The recruitment process comprises the initial step in building the ultimate team. After the recruitment process, I will employ several skills to influence the choices of the team players.


            Communication is the transmission of information from one individual to another. I will reinforce an open and continuous of communication. Essentially, I will create meetings that will serve as communication forums where the team members can forward their opinion. In these forums, I will encourage the team players to forward their ideas on ways through which the team can enhance the efficiency of their initiatives (Corporate Challenge International, 2014). The meetings will deliberate over ways through which the efficiency of the collective team effort can be reinforced. Each member will be encouraged to participate actively in the initiative. This will serve as a motivational factor to the employees as it reinforces their significance in the organization.

            I will remain open to suggestions from the employees to encourage their opinionating (Slezak, 2012). Likewise, I will persistently ask questions which will serve to identify the loopholes in the team efforts. In an open communication system, the team members will not be afraid to voice their opinions in matters that appertain to the teamwork. Alternatively, communication preempts occurrences of distortion on the messages forwarded by the team members. Open communication mitigates instances of transmission of doctored information which greatly hampers team efforts.

Goal Setting

            I will clearly determine the goals of the team. In determining the goals of the team, I will engage the SMART framework. The SMART strategy will enable me to identify and reinforce goals that are specific, measurable, attainable, relevant, and time-bound. To begin with, I will ensure that the team goals are specific. I will avoid general statements that may greatly hamper the efficiency of the team initiatives (Slezak, 2012). Specific goals allow the early determination of resources that will be needed to attain the specific goals. The goal should also be measurable. Therefore, I will align my goals towards measurability. I will strive to ensure that the goals have a timeline. In every stage of the teamwork initiatives, I should be able to establish the degree of improvement over time. The goals of the team, other than being specific, should be attainable. They should project a possibility of being manifested if particular actions are engaged. Goal setting serves to influence the choices of the team players.

Definition of Roles

            In the creation of the different teams within the organization, I will reinforce the definition of roles for each employee. Definition of roles greatly enhances accountability and pre-empts cases of overlapping. Overlapping and confusion on member roles may lead to the ultimate disintegration of the entire team. Alternatively, defining roles enables the team members to define the goals that will serve to augment the goals of the team (Skuza, 2013). It further serves to identify the skills, talents, and knowledge, which is required in the team initiative. Defining roles further allow the determination of all the resources that may be required in the execution of team duties.[Need an essay writing service? Find help here.]

Trust and Confidence

            Through my engagements with the team players, I will reinforce the need for trust and confidence. To inspire trust in the team players, I will ensure that I deliver on the promises that I commit to concerning the team initiatives. I will align all the efforts of the team players towards the attainment of these goals. Furthermore, to reinforce the trust of the employees, I will ensure that I engage only a modicum of supervision. This will be a projection of the trust that I extend to the team players. Minimal supervision further reinforces the confidence of the subject team players (Corporate Challenge International, 2014). The lesser the supervision, the more likely it is that the team members will be motivated to perform their duties. Minimal supervision inspires confidence in the employees, which is an essential influence in the propagation of the team initiatives.

Cooperation and Integration

            As the leader of the team, I will engage frameworks that promote cooperation and integration. The success of the team is largely dependent on how well the team players can integrate with each other. An integrated team shares information more readily supports each other repeatedly and is more willing to solve problems amicably (Skuza, 2013). To reinforce team, work I will engage several frameworks and processes. To begin with, I will engage a team charter. A team charter is a document that defines the priorities of the team. I will solicit the counsel of the entire team members in the creation of the team charter. The team charter will include the purpose of the team, the duration that the project will take the scope of our team projects, the available resources, and the planning.

            To reinforce cooperation, I will further enhance the communication between the team members. Effective teams are those that are aligned towards frameworks that encourage the exchange of ideas (Corporate Challenge International, 2014). Likewise, cooperation, through communication is achieved through the valuing of each team player’s personal expressions. Communication will play a great role in influencing consensus decision-making, creative problem solving, and feedback. These components are essential for the enhancement of the cooperation among the team members. I will further engage collective efforts in soliciting conflict resolution responses. This will ensure that every team member participates succinctly in the identification of solutions that mitigate the situation. [Click Essay Writer to order your essay]

Performance Rewards Program

            Rewards and compensation are necessary aspects in the reinforcement of collective team efforts. It is the right of every team member to be compensated for the efforts they extend to the team. In my performance rewards program, I will stress the need for rewards based on the inputs and involvements of the team members. This will serve to preempt instances of lethargy, which hampers the ultimate productivity of the team. In the program, each team member will be subject to a share of the profits that are secured from the team initiatives. Essentially, each team member will be allowed a portion of all the revenues that are drawn from the team efforts (Corporate Challenge International, 2014). Furthermore, when one excels in their duties, the program indicates that they will be promoted to new leadership positions in the team. One’s promotion will be determined by personal excellence and the degree of association with other members of the team.

            Likewise, I will encourage the determination of the best monetary remuneration to the employees. Monetary rewards will depend on one’s position and authority in the team. It will further be determined by the level of experience one exudes in their initiatives. The more experienced one is, the more salary they will be extended. Furthermore, the rewards program reinforces the need for the development of the individuals that form part of the team (Slezak, 2012). Individuals who are talented will be identified and will be empowered to undertake courses and academic initiatives that will augment their skills. Development of the member careers communicates the concern with which the organization has towards their well-being. Academic and professional development serves as a motivational input. It encourages positive competition and leads to innovations, which may improve the outcomes of the team efforts.

            In conclusion, team building constitutes several strategies and frameworks. The need for teamwork is in an organizational setting cannot be overstated. Both the leader and members of a team determine the success of a team. As a leader, there is a need for the engagement of several skills that will serve to influence the priorities and outcomes of the team efforts. There is a need for the reinforcement of open channels of communication, the enhancement of team members’ cooperation, the determination of goals of the team and the development of appropriate rewards programs. Rewards programs should be inclined towards fairness. Every person should be rewarded based on his/her inputs. Essentially, everyone in the team should be extended compensation that reflects their efforts they have extended to the team.


Corporate Challenge Events. (2014, June 18). How to build an effective workplace team.

Skuza, A. (2013, June 7). Five Ways to Build an Effective Team. Retrieved October 8, 2016,

Slezak, P. (2012, June 24). Building a Dream Team in 7 Simple Steps. Retrieved October 8, 2016,

Page 3 of 1012345...10...Last »