ORDER NOW
Essay Writing Sample: Informed Consent
Posted by: Write My Essay on: May 2, 2019

 

Sample by My Essay Writer

Introduction

Informed consent is a process where a patient understands the risks and benefits of medication or a test and willingly chooses to undergo the medication that the doctor has put forward. Informed consent is based on the legal and moral premise of the patient’s autonomy. A patient has the right to make a decision about his health and medical condition. A patient must give informed concept of treatment for most tests, and if the physician fails to obtain it before a procedure or tests, he is said to have committed battery; a type of assault. However, when a patient interacts with his doctor during a physical examination implied consent is implied. More complicated and risky tests require a patient to give the doctor a written concept (Blease et.al, 2016). However, the informed consent rule has exceptions in the case of situations where emergency medical care is needed urgently to prevent serious harm, or the patient is incompetent and is not in a position to give permission for treatment or testing.

Informed Consent

Informed consent has four necessary components: the patient must have the ability to make a decision regarding his treatment. The medical provider must disclose information on tests and treatment, which includes the probability that expected risks and benefits, occur; the patient must understand relevant information; and voluntary grant the doctor consent without duress or coercion. The decision-making capacity of the patient, also known as competency, requires that the patient can understand treatment options, consequences of choosing each option, and personal costs and benefits alongside personal priorities and values (Drazen et.al, 2013). If a patient is not able to meet the competency requirements, a court appointed guardians or family members to act as surrogate decision-makers on behalf of the parent.  [“Write my essay for me?” Get help here.]

An ethical decision-making process entails bringing the moral values of people to bear on the reasoning that leads to a particular choice. Healthcare professionals have the responsibility of balancing the interests of the organization and an individual since decision-making is an essential part of the health care system. There are questions on the best and ethical system for protecting the patients from harm or negligence. For example, a patient rationality is compromised or absent when he is in his late stages of dementia. In such cases, most people believe that a family should step in as a decision maker because a relative protects incompetent members (Burkhardt & Nathaniel, 2013). However, the system dictates that the nurse should play a vital role in assessing the patient’s treatment and care. On occasions when patients are incapacitated to make sound decisions regarding their health, a nurse can make the choices on behalf patient and make such a decision to the patient’s best interest.[Need an essay writing service? Find help here.]

Conclusion

Nurses should participate in the informed consent process to offer the patients with the best treatment options by sharing decision-making and limit any probability for liabilities. A registered nurse is personally responsible for her practice and adherence to medical guidelines that protect the patient and the nurse. Nurses must consider the patient’s beliefs, preference, and values when making a medical decision on their behalf. Nurses should respect autonomy, avoid causing harm and seek to be just in their practice while at the same time uphold privacy, veracity, fidelity and confidentiality. Informed consent is, however, an important aspect of medicine as it enables the avoidance of complications that could have otherwise arisen if the patient had not consented. [Click Essay Writer to order your essay]

 

References

Blease, C. R., Lilienfeld, S. O., & Kelley, J. M. (2016). Evidence-Based Practice and Psychological Treatments: The Imperatives of Informed Consent. Frontiers in Psychology, 7.

Burkhardt, M. A., & Nathaniel, A. (2013). Ethics and issues in contemporary nursing. Cengage Learning.

Drazen, J. M., Solomon, C. G., & Greene, M. F. (2013). Informed consent and SUPPORT. New England Journal of Medicine, 368(20), 1929-1931.

Essay Writing Sample: Cyber Intrusion
Posted by: Write My Essay on: May 1, 2019

Sample by My Essay Writer

 

Contents

 

Executive Summary                                                                                                  

The Response of the Intelligence Community During Such Attack                                                 

Top Priorities for the Intelligence Collection and Analysis                                                              

What to Tell the American Public About the Attackers                                                                   

Ordering a Counter Cyber Attack                                                                                                     

Conclusion and Recommendations                                                                                                   

 

Executive Summary

Cyber intrusion within the banking system presents a significant level of threat towards operations in various spaces of national interests. In the American setting, the issue of intrusion and DDoS (Distributed Denial-of-Service) towards the local financial transactions on a large scale is not only a threat towards the bankers; it targets the entire financial industry and the national economy by extension (De Borchgrave 2001). Within this intrusion, the immobilization of five of the larger institutions in this space occurred within a malicious cyber-attack. In this setting, the functionality ideally targets a computer functioning online with the interest of interrupting its service to the users. The usability of cyber security elements in this setting is cut short and the sabotage that can target citizens’ financial data and abilities. Through the denial of service, such persons cannot interact with financials such as ATMs, account data, use of bank credit, and debit cards. The business implications are larger than the physical banking attributes that are directly affected, and the impact is felt across financially reliant services and websites that are exposed to these attacks (Clark and Hakim 2016). It is, therefore, necessary to appreciate the significance of the impact of these disruptions on standard operations within the government and towards American lives. The result of such attacks that encompass larger scales have long-lasting ripple effects on the capacity of the government to operate and towards the interest of businesses and individuals to interact financially.

 The Response of the Intelligence Community during Such Attack

In the initial assessment towards the implications of the attack, several consequences, and influences towards the aspects of security are expected. In response to these changes, it is imperative that the FBI take charge of a formal investigation in an attempt to explore the channels within which the events transpired (Tucker 2012). During this inquiry, there is a necessity to attempt to break down, understand, and identify all aspects that facilitated and allowed for the attack to take place. In a similar motion, the Department of Homeland Security should raise the crisis level while the country attempts to recover and adapt to the changes due to the occurrence. In light of the degree of impact anticipated, the crisis level should change from “considerable” to “caution” within which the preparation level is raised in a similar capacity (Tucker 2012). For the Defense Department, such aspects of preparations are in similar measure as the preparation for the aftereffects due to financial changes. As a defensive approach, the intelligence available is applicable in the attack DDoS technology, which forms the possibility of creating a limited bandwidth for the flooding technique (Kovacich 2016). This approach, as an option for the DDoS, presents the possibility of a larger number of attacks entering the DDoS as an aftereffect of the initial assault. Such flooding increases the possibility of the gap to be exploited further, which necessitates that defensive intelligence positions to be adopted by the intelligence community.

On the one hand, as the situation continues to evolve, it is possible that IT-related personnel is limited in the initial stages in countering similar aspects. For the FBI, this necessitates a better consideration of the situation to facilitate the understanding of the issues that acted within the attack in intelligence circles. With the increasing widening of the bandwidth over time, it became possible for hackers to modify their attacks within the current supply of information that can be collected and analyzed in cyberspace (Kovacich 2016). Therefore, this form of DDoS attack attempted to interrupt and paralyze the bandwidth, resulting in some secondary effects.

The consideration of the aspects presented by low-speed connections such as HTTP Post Attack and Slowloris are within the nature of attack observed in this setting. Since this kind of approach was not in violation of HTTP connection protocol, it is possible to consider that the low speed that the connection used facilitated the overlook by security monitoring equipment. The low-speed connection, therefore, falls within 10 seconds to complete, which was however overextended to achieve a longer period to avoid detection. The Slowloris attack, therefore, can occupy Session by taking advantage of this vulnerability within most systems (Kovacich 2016). The necessity of this information for an intelligent appreciation of the protocols occurring within cyberspace is essential for observing abnormal activity. Among the other possible aspects that present vulnerabilities include applications with the capacity to launch scripts when no updating is carried out (Kovacich 2016). [“Write my essay for me?” Get help here.]

 

Applications and utilities such as SSL Renegotiation DoS take advantage of the possibilities of reusing a link to paralyze a device within the network. Inasmuch as there is a possibility of engaging server protection services, the denial of service is eventually targeted to keeping operations online without their original usability to the end user (Clark and Hakim 2016). In this attack, therefore, it was possible to carry out an unidentified interaction with devices since the operations were still continuing while end users could not use these services. Paying attention to each of these aspects not only facilitates a better understanding of the aspects of cyber intrusion and DDoS attack but it also makes it possible to use these technologies to trace potential attacks or thwart attacks in progress (Bronk 2016). The possibility of mitigation of these attacks exists where the damage of an attack can be delayed or reduced on varying scales.

For the interest of facilitating DDoS protection and mitigation technologies, there is a need for the usage of the security information and fusing it with more precise DDoS extenuation measures:

  • A firewall – inasmuch as this may not directly save the entire system, it prevents the occurrence of simpler flood attacks that are softer in effort and are limited in resource (Galliott and Reed 2016).
  • Security patches – these should be installed periodically, such that the underlying defense of a network is maintained and is combined with the overall security facilities available. This form of central protection is essential in preventing updated attacks from becoming successful with emerging vulnerabilities (Galliott and Reed 2016).
  • IP Hopping – within a modified address, it is less likely that the active server limits the interest of the hackers with each attacking front (Kovacich 2016).

The mitigation techniques form the secondary defense which is more targeted towards specific vulnerabilities of a network. In this regard, they create a more complex protocol and can be classified and considered on varying threat levels and circumstances.

DDoS mitigation strategies (depending on varying factors) comprise of the following:

  • Abnormal recognition as a mitigation approach integrates detection of headers, states, and rates. Such detection can filter out attack packets – and thus is considerably able to bypass a firewall (Kovacich 2016).
  • Active Tuning Time – uses idle connections and removes such connection from the table of the server. Such tuning saves the firewall by avoiding the consumption of network resources (Kovacich 2016).
  • Source rate limiting becomes necessary in situations when there is an attack on a limited number of IP addresses. Through an analysis of the behavior of each of these addresses, it is possible to identify those that are not aligned to the behavioral specification (Tucker 2012). Through identification, it is possible to reject access to network bandwidth.
  • Blacklist and Whitelists mitigate the impact by allowing the network admin to permit or block IP addresses (Kovacich 2016).
  • Dark Address Prevention uses an identification of dark addresses through the usage of a flag that has not been assigned by the IANA IP. Such packets that interact in such dark addresses can be blocked, and during these attempts, it becomes possible to prevent users from copied DDoS packets (Tucker 2012).[Need an essay writing service? Find help here.]
  • SYN proxies try to detect SYN flood attacks which are considered in comparison to the connection requests made. When comparing the SYN proxy requests, it addresses all requests identified in an ACK response (Bronk 2016).

The use of wireless remote controls facilitates the reaction of the departments under consideration in situations necessitating combat. The discussed management and specialized techniques facilitate the activation and protection of the network systems within internal systems. On a national security level, it is possible for hackers to use other tools to circumvent certain protocols, but on a limited scale (Tucker 2012). Such limited attack protocols are more easily identified. In this regard, the engagement of these broadly applicable tools makes it possible to determine intelligence within cyberspace and act on it in real-time depending on the attack models being employed within DoS.

Top Priorities for the Intelligence Collection and Analysis

In response to intrusion, it is necessary for intelligence collection to prioritize the comprehension of all processes involved. Such effort would facilitate a functional approach towards issuing emergency statements and varying the level of action to the most suitable setting (Tucker 2012). In this respect, it is necessary for the president to executively order a joint investigation into the attack. Such interest in investigation may be varied to match the threat level expressed in the most significant cyber security threats towards the nation. In this regard, it is essential that each of these actions is fashioned towards the establishment of evidence between foreign military and companies initially posing these threats (Tucker 2012). Such parties can then be considered and monitored. Accessing of intelligence on various communications might facilitate the understanding of the interests of the attack and use of advanced protection criteria in future based on this attack to solve emerging issues.

The intelligence agencies have the capacity to interact with the governments and use similarly oriented attacks in gathering information on the tactical interests of denial of service during the attack. With an emphasis on these aspects, it is possible that the combat weapon, in this case, can be easily controlled. Since each of these efforts comes after the successful engagement and launch of cyber warfare, there is the necessity to ultimately put an end to the enemy strategic resources (Clark and Hakim 2016). In this regard, the victory of such scenarios of cyber warfare requires that the US military adopts a more tactical position. These efforts demand that the advancement of intelligence collection and analysis capabilities place more prominence on some offensive aptitude, including the following (Clark and Hakim 2016);

  • The ability for the exploration of the enemy’s command and control – it becomes possible for the military intelligence cyber systems to use offense to prevent the extension of an attack targeting denial of service.
  • To explore and identify an enemy’s network vulnerabilities where information can be accessed
  • Subtly disrupt, paralyze, and take complete control of the enemy’s cyber systems where intelligence for the government can be extended during such offenses.
  • Through the usage of the available media network, it is possible for intelligence networks to contrive information and sabotage the enemy’s approach during an attack on internal systems.

What to Tell the American Public about the Attackers

Communication on the basis of this attack should be approached on a restrained level, whereby there is the understanding that the attack cannot be eliminated. In this regard, the address should capture a number of the following aspects: at the moment, the attack by the hackers is formed in a combined level of industrial and economic interests. The attack, however, should not be described as a directed diplomatic or corporate issue since it may interfere with the intelligence gathering and analysis process. In similar measure, it is necessary for the president to express the efforts undertaken by the intelligence community in responding to the issues. Such aspects may also be integrated into communication as a push by the president for counter-measures (Galliott and Reed 2016). [Click Essay Writer to order your essay]

It would be ideally formed in encouraging the other government departments to share information on the cyber attacks. This response should integrate the interests of the intelligence community in digital identification analysis program. In this setting, such aspects can promote the dissemination of awareness and understanding, which is necessary for the stabilization of activities in response to the aftereffects of the attack (Galliott and Reed 2016). Also, it is essential for the overall government response to work closely with private companies affected by the offensive in the mitigation efforts. The recommendation in furthering and developing cyber defense capabilities relies on the capacity of the response that the president and his government offers to the sector (Bronk 2016). As such, the government has to fulfill its obligations towards the citizens and the private sector. Such effort, as captured by the president’s response, is included in clarifying the conflict in this cyberspace war.

Ordering a Counter Cyber Attack

The US President may be duty-bound to order a counter cyberattack due to the social pressure. However, some aspects should be integrated into facilitating such counter-attacks, with a variety interacting with diplomacy. Primarily, it is essential for intelligence agencies to adequately categorize the attackers’ IP address. This function of the intelligence experts and the agencies is necessary for pointing out the source of the hack. Therefore, inasmuch as the response is appropriate, to launch the cyber attacks, the agencies should use diplomatic sets (Galliott and Reed 2016). As such, the NSA, CIA, and FBI are tasked in the joint implementation action discovered in the interrogation of the attack and identify vulnerabilities in enemy’s network. The NSA carries the capacity within cyberspace to intervene within counter tactics in assaulting large-scale mobile cyber activities which form the basis for the initial attack (Galliott and Reed 2016). As such, it is essential that the response is in similar measure to the original attack, which limits the abilities of the enemy.

Conclusion and Recommendations

In the overall understanding of the aspects surrounding this attack, it is essential that some aspects change in response. After the consideration of the issues surrounding intelligence and the concerned government agencies, it emerges that the influence of the preparedness level is significant in mitigating impact. The issues assessed in the discussion considered what DDoS attacks integrate, the protocols that are attacked in the process and the effort that is included in the further prevention of the attack. Aspects such as brute force attacks and the use of web applications to circumvent checks also present limitations to the data attack in consistently overloading a network until it crashes. DDoS protection and mitigation tactics given above as a recommendation can be attained by decreasing the sensitivity of the entire system. Also, it is possible to separate authentic requests from harmful to filtering methods and overrides.

It is feasible to forward a number of recommendations in response to the attributes of these attacks, within which the hackers’ technical point of view is integrated. Based on intelligent control of cloud security, it is possible to phase the security level that some loopholes offer to the network. Similarly, based on the products that exist, the gaps that firmware and networks present on a national level simply within the interest of intelligence and defense of the internal system. There are a number of ways to respond, within which combat operations are based on the Internet protocols that act in offensive attack or the real-time flow as a security protocol in each of the web application discussed. Combat unit network operates as a unit within network security flexibility and adaptability.

In a similar effect, in the interest of furthering security protocols and layers of security against similar attacks, it is necessary for additional protocols to be used. Through the fusion of the discussed intelligence tactics, it becomes possible to respond to threats in real time and to engage preemptive assaults against the enemy. Inasmuch as DDoS attacks take the most rudimentary approach in development, as a form of cyber threats, their mitigation still necessitates a significant level of preparedness. Since DDoS mitigation is more problematic, there is a need for the discussed strategic approaches by intelligence to shift focus to the application layer. Such strategic modification is targeted at making protection more functional. All other interests by the government informing solutions and mitigation procedures should align with the security interests expressed in the discussion.

 

Bibliography

Bronk, Chris. 2016. Cyber Threat: The Rise of Information Geopolitics in U.S. National Security. 1st ed. Santa Barbara: Praeger.

Clark, Robert M, and Simon Hakim. Eds. 2016. Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level. Berlin: Springer.

De Borchgrave, Arnaud. Ed. 2001. Cyber Threats and Information Security: Meeting the 21St Century Challenge. Washington, DC: CSIS Press.

Galliott, Jai, and Warren Reed. Eds. 2016. Ethics and the Future of Spying: Technology, National Security and Intelligence Collection. Oxfordshire: Routledge.

Kovacich, Gerald L. 2016. The Information Systems Security Officer’s Guide: Establishing and Managing a Cyber Security Program. 3rd ed. Waltham: Butterworth-Heinemann.

Tucker, David. 2012. Illuminating the Dark Arts of War: Terrorism, Sabotage, and Subversion in Homeland Security and the New Conflict. London: Continuum International.

Write My Essay Sample: Alpha Female
Posted by: Write My Essay on: April 30, 2019

Sample by My Essay Writer

Inferential Statistics in Nursing

The quantitative problem statement in the article by Ward, Popson and DiPaolo (2010) is whether it is possible to measure the concept of the alpha female in society. The quantitative purpose statement is to develop a short theoretically sound measure of being an alpha female. The quantitative research question is whether it is possible to prove the existence of an alpha female in society through the development of a test specifically to test this outcome. The hypothesis of the study is that the measure will present a constellation of behaviors that are associated with being an alpha female (Ward, Popson & DiPaolo, 2010).

The data was collected by a survey in which 637 women from a total of 12 small and medium-sized Universities from the Midwest and Northern United States. A total of 500 email addresses were randomly retrieved from the university databases in addition to 137 signing up or the survey online. The data was analyzed by randomly splitting the sample using SPSS 15.0.

[Click Essay Writer to order your essay] Thereafter, the analysis was conducted through the explanatory and confirmatory factor analyses, and the structural equation models. There were different scales used to determine the interrelationships in the data set. [“Write my essay for me?” Get help here.]

The benefit of using the selected statistical test is that it allowed for a comprehensive measurement of the corresponding statistical results from each data set. The statistical test allowed for the data to be split in order for a more accurate analysis to be conducted with ease. The outcome of the study was that the AFI measure can be used to identify alpha females in society. The results indicate that an individual must score highly on the three scales for them to be considered an alpha female (Ward, Popson & DiPaolo, 2010). Therefore, the opportunities for personal development, skill enhancement and self-awareness have been enhanced as a result of the outcome of this study.[Need an essay writing service? Find help here.]

References

Ward, R. M., Popson, H. C. & DiPaolo, D. G. (2010). Defining the Alpha Female: A Female Leadership Measure. Journal of Leadership & Organizational Studies, 17(3), 309-320.

Essay Writing Service Sample: Price Elasticity
Posted by: Write My Essay on: April 29, 2019

Sample by My Essay Writer

The elasticity of demand is the responsiveness of demand to changes in the price of a commodity. Price elasticity of demand is the measure of the relationship between the change in quantity demanded of a given good and change in its price (Pauly, 2013). Factors that affect price elasticity of demand include the availability of substitutes for the good, the proportion of income spent on the commodity, the number of uses the commodity has, the durability of the product and whether the commodity is a necessity or a luxury. A commodity may be termed as having inelastic demand if changes in quantity demanded are not affected by variations in the price. Demand can be termed as elastic when PED ›1.This can be illustrated as below:

Change in price of a laptop: increase by 20%

Change in quantity demanded: 40%

Price elasticity of demand= Change in quantity demanded/Change in price of the good

=40%/20%= 2

This shows that the demand for laptops is price elastic.

Change in price of a packet of cigarettes: increase by 10%

Change in quantity demanded: drop by 5%

Price elasticity of demand= 5%/10% = 0.5

This shows that demand for a packet of cigarettes is elastic.

Of the two examples, the demand for laptops is more price elastic than that of cigarettes as it has a higher value for its price elasticity. [Click Essay Writer to order your essay]

The importance of elasticity in a business can be divided into business decisions and production decisions. For the business, knowledge on the elasticity of demand for a product can enable them to predict sales revenue (Pauly, 2013). This would be substantial for budgeting and other organizational purposes. Knowledge on the elasticity of demand enables a business to plan a tax shifting strategy, i.e., if a commodity has elastic demand, the tax will be shifted back to suppliers while a product with inelastic demand will have the burden of tax shifted to the consumer. Finally, the most critical need for knowledge on pricing is to inform a business’ pricing strategy. Overpricing of goods with elastic demand will lead to a fall of the application for the good while inelastic demand allows management to increase the price of the good (Tellis, 2014).[“Write my essay for me?” Get help here.]

The best time of the year to raise flower prices would be that time when demand for flowers is high. This would include festive seasons, public holidays and romantic holidays such as Valentines. This is because raising flower prices at a time when demand is low would lower the demand even further. Flowers are perishable goods and therefore cannot be stored for extended periods of time in anticipation of an increase in prices (Tellis, 2014). The business would benefit most from periods of high demand; losses due to spoilage would be decreased.

The elasticities in the flower business are income and cross elasticities. Cross-elasticity is the degree of responsiveness of the demand of the quantity demanded of one good to changes in the price of another good (Tellis, 2014). Income elasticity, on the other hand, is variations in the request of a right that is influenced by changes in income of consumers; because flowers can be classified as luxuries as opposed to necessities, the income consumers are willing to spend have a significant influence on the total demand for flowers at a given time.[Need an essay writing service? Find help here.]

References

Pauly, M. V., & National Bureau of Economic Research. (2013). Price elasticity of demand for term life insurance and adverse selection. Cambridge, MA: National Bureau of Economic Research.

Tellis, G. J. (2014). The price elasticity of selective demand: A meta-analysis of sales response models. Cambridge, MA: Marketing Science Institute.

Essay Writing Sample: Ludwig van Beethoven
Posted by: Write My Essay on: April 26, 2019

Essay Writing Sample: Ludwig van Beethoven – Symphony No. 5 by Gustavo Dudamel

Sample by My Essay Writer

 

Gustavo Dudamel is a Venezuelan violinist and conductor who is the music director of the Los Angeles Philarmonic and the OrquestaSinfónicaSimón Bolívar (Simón Bolívar Youth Orchestra). Dudamel is well known for his advocacy for social development through music and his commitment to working with young people in his Venezuela. Conducting the Simón Bolívar Symphony Orchestra at the Philharmonie de Paris in 2015, Dudamel delivers a sterling performance of Ludwig van Beethoven’s Symphony No. 5 in C minor, Op. 67

The Philharmonie de Paris is expensive and was surprisingly full with lovers of Beethoven’s work apparently anticipating the performance. The dimmed lights on the sections where the audience sat contrasted with a brightly lit stage ensured the focus of the audience was solely in the performance. The members of the orchestra seemed rather pensive, dressed in the traditional attire; black tuxedos and white bow ties that presented a neat picture and alluded to the skillfulness expected of the performance of such a legendary piece. Each member played his or her instrument with an intensity that matched that of the conductor. Dudamel appeared to be rather at ease, often seeming gleeful at certain points in the symphony. His dramatic style was evident in his motions as he was conducting the symphony, often leaning to the side with dramatic flair at the crescendos and climatic parts of the movement. While hugely entertaining, his movements had a precision that spoke of a seasoned conductor. [Write my essay for me?” Get help here]

The audience present for the performance was as responsive as it was completely consumed by the performance. The silence that signaled the beginning of the symphony was alternated with brief episodes of reactions from the audience. The most noticeable reaction was that of extreme silence during the transmission from the third to the fourth movement, the theater became so quiet one would be tempted to think the entire audience had held their breath for the two minutes the silence lasted. By the end of the performance, the audience looked eager for the final note so that they could stand up and give the raucous applause that followed the exemplary performance.

The symphony which was composed by Beethoven during his most productive years (1804-1805) was scored in this performance for two trumpets, piccolo (fourth movement only). Three trombones (alto, tenor, and bass, fourth movement only), two flutes, timpani (in G-C), two oboes, two clarinets in B? and C, two bassoons, double bassoon (fourth movement only), two horns in E? and Cand strings. The symphony has the following four movements:[Need an essay writing service? Find help here.]
Allegro con brio which is the first movement, opens with a four-note motif famous in Western music. It starts with two dramatic fortissimo phases that command the listener’s attention. After the first four bars, imitations and sequences expand the theme by following each other in a rhythmic regularity. A short fortissimo played by horns follows soon after before the introduction of the E?major theme which is more lyrical and makes use of the piano and the string accompaniment featuring the four-note motif. The bridge and a brief solo passage of the oboe precede the end of the first movement.

Andante con moto is the second movement which is a lyrical bit in double variation form. It is in A? major that presents two themes and varies their alteration. They are followed by an extended coda which ends the movement.

Scherzo Allegro is the ternary form which makes up the third movement. It contains the central scherzo, the contrasting trio section, the return of the scherzo, and a coda. This movement goes back to the opening C minor key that is played by the cello and double basses. The horns then introduce the main theme of motion.

Allegro, the fourth movement presents an exhilarating finale and begins without a pause from the transition. The music resounds in C major instead of C minor which is expected to finish this key. This triumphant finale is an unusual variant as the music halts and continues after a pause with a reprise of the horn. A crescendo similar to that introduced at the opening of the movement signals the completion of the piece.

The concert leaves one with the feeling that comes with having witnessed something so great that it cannot possibly be adequately described with words. This performance not only reminds one of the reasons Beethoven is a musical legend but also the ability of modern composers to give his works the exemplary performance that it deserves. [Click Essay Writer to order your essay]

 

Work Cited

“Ludwig Van Beethoven – Symphony No. 5 | Gustavo Dudamel [HD].”YouTube, 15 Mar. 2015,

Write My Essay Sample: Deviant Behavior
Posted by: Write My Essay on: April 25, 2019

Sample by My Essay Writer

 

Deviant Behavior: Homosexuality

In the societal realm, deviance or deviant behavior is an action that is considered to deviate or violate the social norms that are believed and held by the people. In any culture or society, there are certain codes and norms that each member of the society is expected to follow. Any violation from these norms may on many occasions lead to breaking of certain rules and may call for the personal prosecution of an individual who breaks these norms. In this deviant behavior paper, I chose homosexuality as a deviant behavior that is considered criminal in one society and normal in other societies. The behavior is considered to be deviant since it is accepted in some societies or countries whereas it is not in other countries. [“Write my essay for me?” Get help here.]

Homosexuality is defined as a romantic association, sexual behavior or sexual attraction between members of the same sex (Dallas, 2015). It may be between two males or between two females. In the past, homosexuality was seen as an evil and a sin by many societies across the globe. However, the effects of civilization and liberalization of societies have made people moiré lenient and some societies have allowed such individuals to enjoy their freedom. However, there are other societies that do not consider such actions or associations to be lawful. As a result, in some countries or societies, individuals who are suspected to have such associations may be personally persecuted since the association is considered to be a crime and thereby ought to be punishable.

Global Significance of Homosexuality

In the past few decades, there have been many movements that have had significant impacts on the lives of millions of people across the globe. Since the women suffrage movement in the United States to the civil rights movements, numerous debates have often risen across the societies on the rights that should be accorded to various individuals within a given nation. These campaigns have on many occasions focused on the family and the rights of each individual as guarded by the constitution within a given jurisdiction. In the past twenty years, one of the topics that have on many occasions hit global headlines is the marriage equality. However, a recent survey suggested that there is a surprising divide that seems to be growing on the notion of acceptance of homosexuals and homosexuality across the globe (Vasey-Saunders, 2015). Such a change makes it important to address the issue of homosexuality as a deviant behavior.

This has led to heightened debates across many leaders in both the society level and on the political realm.  As many countries continue to accept people who are gay, some other countries have strict laws that call for the death penalty, imprisonment, and on some occasions may lead to life imprisonment when an individual is caught or suspected to be involved in activities that suggest that they are attracted to individuals who are of the same sex. From an assessment of the level of acceptance to homosexuality across the globe, I came to a conclusion that most of North America, Latin America, and Europe have a higher level of acceptance than in other regions across the globe. The regions that I identified to have the least level of acceptance to homosexuals included Africa and most parts of Asia.

Most of the nations in Asia, more so the Middle East, that are predominantly Muslim have a very strict guideline in relation to individuals who are homosexuals or participate in homosexual activities. This is mainly because Islam has strict guidelines and laws that are expected to be followed by every individual within the society. On the other hand, Western Nations have in the past adopted liberal policies that assert that the freedom of an individual ought to be the most paramount thing to any individual and not what the religion or government places upon the people. From the research, the nations that had the highest level of acceptance to homosexuals included Germany, Spain, Canada, and the United States.

As a result, discussing the issue is an important step towards understanding why different countries have various levels of acceptance for homosexuals and homosexuality. I chose to focus between the Western Nations and Asian countries that are predominantly Muslim States due to the fact that there have been numerous rights violations that have happened in these Muslim States due to the lack by the society to allow individuals who are gay to enjoy their life as they wish. Choosing these different societies allows an individual to understand in close detail the repercussions that may befall an individual who is a homosexual in one society and what they would face in a different society. Focusing on these two different societies also helps point out to the notions that different people have over a given matter and how changes can be made in the future to correct these differences.

Why Homosexuality is considered Criminal in one Society

There are a total of seventy three countries across the globe that have criminal laws that relate to sexual activity that is considered to be homosexual in nature. These activities may either involve gays, lesbians, bisexual, transgender, and intersex. These laws range from imprisonment, punishment, and even the death penalty. In many Muslim nations, the death penalty is applied to any individual who is suspected or caught performing activities that are considered or said to be homosexual in nature. There are several reasons that are given by various societies on why homosexuality is a criminal offence and individuals ought to be punished if caught in the act. The first reason is based on the fact that the institution of marriage has since time in memorial been defined as a relationship between a man and a woman and not between people of the same sex.

This idea is supported by most religious leaders across the globe and societal leaders especially in nations that have criminal laws against homosexuality. The second reason is due to the perception that marriage ought to be for procreation purposes and thereby homosexuals cannot bring forth children. Sex is seen by many people in these countries as an activity that should bring forth children. However, homosexuals cannot bring forth children since they belong to the same sex.  This has been an idea that has been brought forward by many religious leaders across the various religions since no religion allows homosexuality. In Muslim Nations, Islam states that homosexuals need to be punished through the worst punishment possible and this further explains why homosexuality is considered to be a criminal offence in these nations in parts of Asia.

Some of the countries where homosexuality is considered to be a criminal offence often state that it denies a child the chance to have a mother or a father. This is due to the fact that it creates an association that cannot bring forth children and thereby it is legalized. There has also been a huge risk in same-sex associations than in normal associations. In the United States, for example, the rate of HIV transmission is higher among homosexuals than to other members of the population. This means that these countries make homosexuality illegal or a criminal act since it increases the chances of HIV transmission and thus ruining the health of millions of people across the jurisdiction that they govern.

Homosexuality is also perceived to promote sexual promiscuity. This is based on recent studies that suggest that homosexuals are more likely to cheat on their partners than other people in the society. Such promiscuity is seen as a social vice in the countries where homosexuality is considered to be a criminal offence and thereby these countries have set up measures that mean that any individual who is caught to be performing such acts may be subjected to the relevant punishment by the authorities. Banning homosexuality also tends to close the door to more social vices that may be observed within any society in the future. Homosexuality is in itself an instance of moral decay and this can only be stopped when the vice is made illegal across the globe. It would be unimaginable centuries ago if people of the same sex were allowed to have sex. As a result, it would be unimaginable if it is made legal since it may open the door tro other social vices such as bestiality.

Why Homosexuality is not considered Criminal in one Society

In the Western Nations, homosexuality is seen to be normal and not criminal for several reasons. The first is that making such an activity or orientation would mean that some people would be discriminated against and this would create a second class of citizens who do not deserve the same level of rights as others within the society. Such a scenario would over time create animosity between these two different groups. It is also perceived that everyone within the society ought to have the same level of benefits as are enjoyed by others within the society. This means that the differences that exist between us should not be used to determine the benefits that one receives.

Some of the differences include sex, age, skin color, and race. There is also the idea that the traditional concept of a man and a woman has changed over time. This change has been as a result of civilization and most Western Nations have accepted such changes and embraced them (Chitando, & Van Klinken, 2016). As a result, many people see homosexuality as something that we all should accept while at the same time allowing all people to enjoy the life that they would like to lead. There has also been a mixing of cultures between people from all walks of life. Such mixing of cultures has led to a huge increase in diversity not only at the workplace but also at the society level.[Click Essay Writer to order your essay]

People have over time lost their identity to a given culture and this has created a society that is very liberal and one that is open to changes that take place on a daily basis. Such acceptance has increased the likelihood of people in Western Nations to view homosexuality as something that is a basis right for every individual. In the United States, for example, gay marriages and associations are protected by the constitution (Spahiu, 2016). Such protection means that liberty and equality can only be enhanced at the societal level when the rights of homosexuals and other people who have varying sexual orientations are protected. When such protection is removed, many people in the country who identify as homosexual may come under the wrath of the public.

There have also been perceptions that allowing individuals to live their lives the way they choose also enhances their welfare and well-being. This means that when individuals who are homosexuals are allowed to lead their lives the way they want, they are more likely to have imported health and well-being. In regions where homosexuality is outlawed, these individuals often suffer from depression due to the stigma that is brought about by realizing that one is different from the others. Such a realization may also lead to fear and uncertainty and may over time lead to suicidal thoughts among the individuals who identify themselves to be homosexuals or gay. Such acceptance also reduces the instances of such an individual from developing mental illnesses that may affect their health. As a result, homosexuality is not considered to be criminal offence in these countries.

Conclusion

Theories Explaining Homosexuality

There are several theories that have over time been used by psychologists to explain homosexuality and why people turn into the behavior. The best theory that best explains homosexuality is a regression to the earliest stage of development among children. In the Western Nations, there are more homosexuals than in the Muslim states in Asia. This is due to the fact that children are exposed to various cultures and this stimulates a desire in them to be different from other people. This desire over time leads to homosexuality since children are pushed to be different from others.

It has also been observed that homosexuals are often characterized by an overprotective parent or where one of the parents is absent during the initial stages of development of the child (Meyers, 2015). This can be used to explain why in Asian nations especially those that are Muslim States, there is a lower number of people who are homosexuals. This is due to the fact that children are brought up in normal families where the mother or father is always present. In the Western Nations, the high rate of divorce coupled by social and economic pressures mean that there is a high chance that a child may be brought up without their mother or father or when the parents divorce or separate.

These theories are an important step that can be used by different societies to bring to an end to the deviant behavior of homosexuality. These theories explain the roots of the deviant behavior and how parents together with the society in general can develop more acceptances to people who are born as homosexuals or develop such sexual orientation as they grow up. They can also be used to help homosexuals to accept themselves as they are since they are human just like everyone in the society. Such acceptance can lead to improved welfare and well-being and this could go a long way to enhance their health especially mental health. Countries which have criminal laws against homosexuality can also learn from these theories through the assertion that being homosexual is not a criminal offence but a thing of sexual orientation (Cheng, Wu, & Adamczyk, 2016).

Response

From an analysis of the deviant behavior of homosexuality that is discussed in this paper, I came to a conclusion that the Western Nations’ perspective towards the behavior is the best policy and one that should be upheld by all nations across the globe. My assertion is based on the fact that sexual orientation ought to be a personal freedom of an individual and not something that should be interfered with by the state or the society. The idea of offering people with the same rights and freedoms ought to be preserved and the criminal laws that are set up against homosexuality ought to be forgotten in the past.

In my opinion, homosexuals do not harm anyone within the society and thereby need to be allowed to do what pleases them most and not be forced to live by the guidelines that are set up by the society in general. Looking at the four pressures that surround any deviant behavior, it is clear that each ought to be involved in bringing an end to the strict homosexual policies that are in place within the countries that have made the behavior illegal. The political realm can be involved through developing policies that protect the rights and freedoms of every individual within the country.[Need an essay writing service? Find help here.]

These laws lead to oppression of people who languish in jails instead of living their normal lives and allowing the country to be more successful in the economic realm. The social pressures associated with homosexuality have also over time led to increased anxiety and depression across the societies. This has increased the susceptibility of individuals to suffer from mental illnesses across the various societies. In my opinion, homosexuality needs to be legalized across the world since the behavior does not harm others within the society.

 

References

Cheng, Y. A., Wu, F. F., & Adamczyk, A. (2016). Changing Attitudes Toward Homosexuality in

Taiwan, 1995–2012. Chinese Sociological Review, 48(4), 317-345.

Chitando, E., & Van Klinken, A. S. (2016). Christianity and Controversies Over Homosexuality

in Contemporary Africa. London: Routledge.

Dallas, J. (2015). When Homosexuality Hits Home. Eugene, Oregon: Harvest House Publishers.

Meyers, C. (2015). The Moral Defense of Homosexuality : Why Every Argument Against Gay

Rights Fails. Lanham, MD: Rowman & Littlefield Publishers.

Spahiu, D. (2016). The Constructions of Attitudes about Homosexuality based on Contacts with

Gays and Lesbians. Academic Journal Of Business, Administration, Law & Social Sciences, 2(3), 142-147.

Vasey-Saunders, M. (2015). The Scandal of Evangelicals and Homosexuality : English

Evangelical Texts, 1960–2010. Farnham, Surrey: Routledge.

Essay Writing Service Sample: Observing The Sky
Posted by: Write My Essay on: April 24, 2019

Sample by My Essay Writer

 

Observing the sky

What is an ellipse? Define it and discuss its properties.

Ellipse refers to the curve part on a plane that surrounds the two focal points which are equidistant in such a way that the summation of the distance to the focal point is equal from the origin. An ellipse is symmetrical about two perpendicular axes (Solberg 1998). The length of the minor axis of an ellipse is found by propping perpendicular to the axis from the focal points.

What causes the phases of the moon? Consider the model of the solar system while writing your answer?

The phases of the moon are triggered by the motions of the earth and moon in relation to the sun. Often, the phases occur while the earth’s surface is facing the sides of the moon and it changes over the period of 29.5days as the moon revolves around the planet earth (Cowen 2008). The figure below shows these phases (Cowen 2008).

Describe (you do not need to use numbers, the most common orbital eccentricities for planets? What about other objects in the solar system?

Eccentricity is the deviation of the revolving orbits away from the perfect circle. As described by Thales (2016), orbital eccentricity refers to the parameter by which a body that is in rotation about another has deviated from the perfect circle. Regarding the same, the value of zero is assigned to the perfect circle observed while the body makes rotation about another while the value of one is an elliptical orbit.  The orbiting body with only one is described as parabolic escape orbit while the body that has a figure greater than one is then said to be hyperbola. The orbital eccentricity parameters derive the term from the conic sections since all the Kepler orbits forms the conic sections (Thales 2016). Further, the orbital eccentricity is mostly used for the two body problems but the provision is extended to the objects that follow the rosette orbit that is described in the galaxy. [“Write my essay for me?” Get help here.]

In the same context, the radical trajectories are therefore described as orbital eccentricities which are hyperbolic, parabolic or elliptic, depending on the energy involved. To elucidate, it is worth noting that radial orbits have zero angular momentum. When the elliptical arcsine results to projections of significant angles it makes a perfect ellipse eccentricity characterized by the hyperbolic or parabolic.

Write an essay discussing satellites. What is a satellite, in the sense of Kepler’s laws? Define them, and discuss their motion. Describe several different kinds of satellites in the solar system. What do they consist of? Name several specific satellites. How can natural satellites be detected?

From Kepler’s principles for satellite circular motion, a satellite can be described as an object that is in orbit, rotating about the other. For instance, the moon is a satellite that orbits around the earth. However, there are two different types of satellites, the natural and the terrestrial or the human-made satellites. One of the natural satellites is the moon, but there are other artificial satellites above the earth launched by human beings.  Taking into account the Kepler’s first law, planets are said to be moving around the sun in an ellipse, and thus they are satellites (Stevens 2013). On the other hand, the moon is ever in motions about the earth and thus the moon is a satellite, too. Below is the description of the moon.

The moon is a sphere that is in constant motion around the earth, the ration that takes 29.5 days while doing so; the moon gives different illations at varied angles assumed by the sun. An implication the side facing the earth receives no light from the sun, but the brightness of the moon is merely but a reflection of light from the sun.  , starting from the first shape of the moon, the new moon, it happens when the moon is in a direct line between the sun and the earth.  That means completely the side facing Earth receives no light but only a dim reflection at the side of the moon.  Gradually is it keeps in the rotation, the more reflection from the sun begins reaching the earth. In one week’s time, the moon has drifted 90 degrees from the sun, and thus the first quarter of the moon appears.  A week later, the moon is 180 degrees away from the sun making the half of the reflection on the surface of the earth? Thus a complete sphere what is called the full moon, a week later the moon has taken another quarter way from the earth to the third quarter position  Hence only a quarter reflect on the earth. One week later, the moon is back to the original position and passes directly under the sun and what is experienced is the lunar eclipse.[Need an essay writing service? Find help here.]

The solar system contains 240 known moons; where tens of them orbit small heavenly bodies; four orbits dwarf planets and 163 orbits planets. Also, there are moons that orbit other moons known as moon of moons. These are typically satellites orbiting other satellites which in turn orbit a natural heavenly body. However, it is doubtful if such objects are sustainable in the long run. We also have Trojan satellites. These are satellites which occur in pairs and tend to have companion moons at their Lagragian points; about 60 degrees behind and ahead of the orbited body. Examples of these satellites include Calypso and Telesto which are the leading and following companions of Tethys.  Finally, we have the asteroid moons which typically orbit around asteroids. For instance, asteroid 87 Sylvia is orbited by two moons. Majorly, all these satellites are composed of rocks. On the other hand, humans, in the quest to keep watch of all the happenings on earth, they have sent their man-made satellites in space to keep watch of the phenomena on earth. Taking Kepler’s law of gravity famously known to relate to the newton’s law of motion, it explains about the gravity and why the earth is centrally revolving about the sun.

In particular, there are several individual satellites within the solar system; around 240 as explored above. These can be categorized into 3; satellites of planets, satellites of dwarf planets and others. Satellites of satellites include the moon that orbits the earth, Ganymede, Callisto, lo and Europa that orbits planet Jupiter. The planet also has other satellites which include; Almathea, Himalia, Thebe, Elara, Pasiphae, Carme, Metis, among others. It has at least 47 moons. Mars has two moons; Deimos and Phobos. Saturn has at least 21 moons among them being Siarnaq, Albiorix, Helene, Pan, Atlas, Telesto, Calypso, Paaliaq, Kiviuq, Ymir, Tarvos, Erriapo and Ijiraq. Dwarf planet satellites include; Charon, Dysnomia, Hydra and Nix.

The disturbance that moons usually create in the surrounding ring materials is what is usually and commonly used to detect them. Some, like the moon, can be detected by the light they reflect from their surface.

Describe the difficulties to human life in space caused by resource usage. What methods can be used to overcome these issues?

Human life in space has been made harder because of the influx of the greenhouse gasses that are lighter than oxygen hence rises to space. The gasses, apart from being poisonous, hold the infrared rays from the sun instead of allowing it to be deflected back as done by the earth.  This increases global warming. [“Write my essay for me?” Get help here.]

Describe comets and asteroids. What are their features? What do their orbits look like?

Asteroids are icy snowballs that are in constant motion in the solar system and burn up when they reach the sun to display what looks like snow (Easterbrook, 2008).  Comets are large bodies that look like a burning mass towards the earth’s surface and have heads and tail (Easterbrook, 2008).  Both the comets and the asteroids orbit the sun.

When a very massive star dies, what types of objects can it leave behind? What are the properties of these objects?

Stars after burning up all their hydrogen fuel, they expand and then become what is famously called ‘red giants.’ After that, they degenerate and get extinct.

What is the importance of learning about celestial bodies?

Learning about the celestial bodies helps understand and explain the natural phenomena in the solar system like the lunar and solar eclipse and the moon shapes. It also helps explain the truth about the existence of the solar system and the events that led to that to eliminate the myths and theories surrounding it.

The extra-solar planets we have discovered are mostly what type of planets. Why?

Extrasolar planets are those planets that orbit other stars apart from the sun and are considered habitable planets as seen through the Kepler’s microscope. Others that do not orbit the earth are called rogue planets.

Describe some (at least two) of the laboratory facilities available on the International Space Station.

Columbus laboratory and the Skylab are some of the international laboratories found in the international space. They are far high in space although can be seen by naked eyes. The laboratories have all the facilities including the cooling facilities and telephone like booths that can be used for communication.

Describe the partnership that resulted in the International Space Station. What countries participate in running the station?

International space laboratory is owned by over fifteen nations that amalgamate together on basis of the political, economic and financial agreements. The United Kingdom, United States, Japan, Germany and France are some of the countries in the corporation.[Click Essay Writer to order your essay]

What is a planetarium? What would a planetarium show consist of?

A planetary is a theater constructed majorly to avail astronomy information, give training regarding celestial navigation and offers entertainment shows with regard to celestial (NASA selects global best in class winners for the international space apps challenge 2013).

 

References

NASA selects global best in class winners for the international space apps challenge. (2013). Professional Services Close – Up, 

Patents; researchers submit patent application, “texture analysis of a coated surface using kepler’S planetary motion laws”, for approval. (2015). Politics & Government Week, , 11401.

Cowen, R. (2008, Jul 05). ExtraSolar. Science News, 174, 16-21. Retrieved from Easterbrook, G. (2008, 06). The sky is falling. The Atlantic Monthly, 301, 74-78,80,82-84.

Solberg, D., & Lekkas, V. P. (1998). Drawing an ellipse around risks. Secondary Mortgage Markets, 15(1), 39-42. Retrieved from

Stevenson, B. C., & Millar, R. B. (2013). Promising the moon? evaluation of indigenous and lunar fishing calendars using semiparametric generalized mixed models of recreational catch data. Environmental and Ecological Statistics, 20(4), 591-608.

Thales; patent issued for propulsion system with four modules for satellite orbit control and attitude control (USPTO 9387942). (2016). Telecommunications Weekly, Retrieved from

 

Write My Essay Sample: Whether Evil Exists
Posted by: Write My Essay on: April 23, 2019

Sample by My Essay Writer

THESIS STATEMENT: Whether Evil Exists

ESSAY OUTLINE

  1. Good vs. Evil
  • Different positions for the same argument
  1. Three conflicting positions
  • God is omnipotent
  • God is wholly good
  • Evil exists
  1. The quasi- logical assumptions
  • The dilemma posed by good omnipotence
  1. The first solution to the dilemma
  • A limit to omnipotence
  • Changing the definition of omnipotence
  1. The second solution to the dilemma
  • The two supreme goods
  • Creation
  • Free will
  1. Evil as a subject
  • Endless possibilities
  • Choices
  1. Evil as an object
  • A categorization of human experiences
  • A result of human action
  1. Solution to evil
  • As a subject
  • As an object
  1. Leibniz’s propositions
  • Evil as universal good
  • Pre-determined harmony
  1. Relevance of proposed solutions to evil
  • Evil Exists
  • God is wholly good
  • Limits of omnipresence
  1. Objections to solutions
  • The power of God to stop Evil
  • The question of omnipotence.
  1. Conclusions
  • Dismissive use of evil to explain cruelty.

“There is no good and evil; there is only power and those too weak to seek it”(Rowling 211). The argument for or against the existence of evil is one that is as old as time, finding its roots in the concurrent belief in religious propositions that contradict. The religious person is faced with the repulsive choice of giving up their faith for the sake of logic while the atheist is confronted with the choice of giving up logical consistency for the interests of belief. While both these people may be on the same side of this argument, i.e., against evil, their approach draws a divide that polarizes humanity.

To further illustrate the conflict innate to this age old argument, J.L Mackie aptly states in his essay titled “Evil and Omnipotence” that the problem lies in the description of God as ‘omnipotent,’ and ‘wholly good,’ yet there is the existence of evil. This provides a precarious position where if any two of the three facts were true, the third one would be false. Further, there is a need for some basic assumptions regarding the three propositions, to make some sense of the obvious paradox. These “quasi-logical” assumptions are that; right contradicts evil and that there are no limits to omnipotence (Mackie, 34).

The first assumption implies that good will always eliminate evil as much as it can, together with the second assumption we get the message that a good omnipotent thing cannot allow the existence of evil (Dahl & Pares, 12). This now defines the set problem, and while it may be impossible for one to settle for one of the three propositions entirely, it may be an achievable task to eliminate the existing contradiction, as this paper will attempt to do.[“Write my essay for me?” Get help here.]

The first approach to solving this contradiction would involve a conclusion that God cannot create a different world. While this now goes against his omnipotent nature (why would an omnipotent be unable to create contradiction? Is there a limit to omnipotence?) It is safe to argue that if God indeed could create such a world, then evil would be his creation as well and therefore have no possible solution. Going back to the first argument; if God is truly good and truly omnipotent, then he cannot allow the existence of evil. This now implies that there could be a different definition of omnipotence (Genesis, Cp. 2). It would be defined as having no limits only within the existing boundaries of logical possibility. In this way, one can safely conclude that God can do all else apart from creating a contradiction.[Need an essay writing service? Find help here.]

The second possible solution is the existence of two goods. Creation and free will are two supreme goods whose absence would mean the world devoid of any good and significantly depleted. Creation entails change and being made anew that is inherent to life. The blossoming of flowers, sprouting of buds, and the rivers and other wonders of nature are all instances of creation. The goodness of this principle is reaffirmed in the first chapter of the first book of the Bible. After each act of creation, God “saw that it was good”(Genesis ch.1) Creation, of course, did not cease with the first day but continues daily. Free will is also portrayed in the book of Genesis when Adam and Eve are forbidden from eating the fruit of the tree but proceed to eat it and hence committing the first act of evil. Free will is thus the manifestation of one’s ability to choose a given course of action that is available to them at a particular time.

How then is evil manifested?  From the conclusion on the subject of evil this far, it is obvious that evil is not only a phenomenon that finds its basis in humanity but is also dependent on the nature of the human being as having free will. In this way, evil can be analyzed either as a subject or an object. As a matter, evil thrives on human knowledge of the world as one big possibility. The knowledge of the many opportunities available to one brings with it an awareness of the freedom to commit various actions. Martin Buber, a writer on the matters of good and evil, explains this as the conversion of happenings around man into the desire to act (Buber, 26). While there are a myriad of possibilities, the chaos they cause translates into a chaos of action. Faced with endless possibilities, one may just open themselves up to any random possibility available to them, or decide to carry out self-unification, finding a specific direction that aligns itself with a particular goal. Both paths are different, with the former on being indecisive and almost always evil while the latter is decisive and almost always good (Buber, 24). While indecision might lead to evil, the decision may not always eliminate the possibility of evil. Through the process of self-unification, one decides to focus on a particular potential out of the millions accorded to him. Once this choice is made, certain values are accepted as being right for the individual making this conscious choice. From the acceptance of these values comes the second type of evil (Buber, 26).

Evil as an object arises from the various hindrances one may encounter upon choosing to follow a particular path. These obstacles oppose the previously mentioned values that one accepts as good upon self-unification. These hindrances may be negative experiences with one’s environment that deny the human being the affirmation they so desire. Evil here is portrayed as something out there that opposes the free will inherent in man. What is common between these two forms of evil? There is evil as a subject that presents itself in the shape of indecision and evil as an object which, despite decisiveness stands in the way of one taking the path towards their desired goal. Both these forms of evil depend on human recognition and particular human experience that is then branded as evil (Lemke & Campos, 19). Evil does not exist as an independent force but as a way of categorizing the experiences people face. Evil is also a direct result of the implications of free will. (Evil as a subject is the random choice of some possibilities while evil as an object is the consequence of a choice in pursuit of a goal)[Click Essay Writer to order your essay]

Now that we have determined the existence of evil; it is necessary to propose potential solutions to this problem. First, addressing evil as a subject, with the knowledge that God gave man the ability of free choice, man must be able to see his situation as one encumbered with chaotic possibilities. Man is faced with a myriad of options, and the easiest option would be to pick the nearest available one simply. This random option chosen, referred to by Buber as “undirected reality” comes naturally with the human freedom (it is the nature of humanity to experience indecision or undirected reality at some point in life) (Lemke & Campos, 41). Thus, it is a huge contradiction for God to make the world that has freedom of choice but not evil as a subject because evil as a subject is the consequence of freedom of choice.

Addressing evil as an object one is faced with natural disasters like hurricanes, floods, and earthquakes. In as far as these phenomena occur; they become deterrents to achieving one’s goals. The irony in this is that such events are what is described as good in the ideal of creation. An example is the flood in Noah’s ark which was destructive, but at the same time creative because from it came to the ‘new world.’ When God allowed the good of creation, he also allowed for the world to become a hindrance to objective evil. Creation and free will are supreme goods, and this only emphasizes the fact that the absence of these two would mean the world with much less good. By giving these two goods to a creative world, God ultimately created the best world he possibly could, as the option of a world without evil was not open to him and God cannot create a different world.

Leibniz argues that the world as is the best possible world disclosed to God in his wisdom. However, two aspects of his argument seem contrary to the argument fronted in this paper thus far; that the evil is seen in this world, I good, once the larger picture of the whole universe is put in view. This means that what we see and the term as evil, when fitted into the larger puzzle is good (Leibniz, 280). A smaller revealed portion of the painting that is an individual life looks confused but gets whole meaning once fitted into the bigger picture that is life. Leibniz takes the position that one’s small and chaotic corner of the universe becomes useful when looked at from the whole world as a point of view. The position contemplated in this paper does not accommodate such an argument. Evil from man’s perspective or God’s perspective is still evil, and it cannot be said that what seems evil to man is good to God. Evil cannot be avoided due to the inclusion of creation and free will as the central supreme goods in the world. [“Write my essay for me?” Get help here.]

Leibniz introduces the concept of pre-established harmony. This concept implies that each component of life only has the power to affect itself; however, the causal interaction that is witnessed in daily living is only as a result of God’s intentional programming for them to “harmonize”. An interpretation of this theory as put forward by Leibniz would be made clear using an example of an apple falling on a person’s head, causing some pain, in this argument the pain is not caused by the Apple but by some state of this person’s mind. Any reaction to the fall of this Apple would not be as a result of the fall but some already pre-established mental state (Leibniz, 281). This paper, however, does not ascribe to Leibniz’s argument and takes the position of human freedom of action and thought, which is the opposite of the concept of pre-determined harmonious society.

The relevance of this proposed solution lies in the problem initially highlighted at the beginning of the paper; that God is all good and omnipotent but at the same time, evil does exist. The proposed solution first admits to the existence of evil that cannot possibly be translated into good. The admission of the existence of evil is the basis for solving the question, as one cannot find a solution to something that does not exist. The solution also proposes that God is wholly good as he has created the best possible world in his ability (Kiraz, 45). While it was necessary to put limits on his omnipotence as God cannot create a world characterized with contradictions, this problem was justified by the argument that the problem brought about by evil would have no solution without God’s qualification. By redefining omnipotence, we have introduced the meaning that God can do all that is logically possible.

Despite these seeming fool proof solutions, two objections can be raised against them. The strongest one would be why God does not interrupt actions of human beings which are headed in a direction that I evil or likely to cause evil. The best rebuttal for this would be that God’s intervention would be a contravention of free will inherent to human life. The very definition of freedom can select any course of action that is humanly possible and available to one at a given time. For God to interrupt, he would have suspended the supreme good of free will. This seems to be an accepted explanation, as even the writers of the Old Testament felt that God would not interrupt Adam and Eve’s free will when they chose to eat the forbidden fruit as this would mean God had opted to suspend a supreme good (free will). By referring to the choice towards a particular direction, “the path, for there is only one” Buber implies that if one is to choose from many ways, there is only on which is good and the rest are random and evil. Buber’s essay also implies that the path selected as opposed to randomness only would be spoiled by God’s interruption as instead of choosing between randomness and self-unification, the human being would have only one path to follow and only one destiny (Buber, 23). This would amount to determinism. God, in his endeavors to eradicate evil, would deny the world of supreme good of free will.

Another possible objection would be that if God’s limitation of human being’s freedom of choice would deny the world of good, then God is not omnipotent. First, the question here would not be about evil as it brings into question God’s consistency and omnipotence. The best rebuttal would be that simply because God choose to interfere and prevent evil actions consistently does not mean that this is his only choice. It does not speak to the extent of his powers, only his preference for action. While God can choose to render himself as less good by depleting the world of supreme good, rather unnecessarily, the mere reason that he has this possibility does not have any effect on hi all good nature, and if anything, serves to illustrate his omnipotence better.[Need an essay writing service? Find help here.]

Despite the in-depth analysis contained in this paper of evil and its depiction of humanity, and extensive debate on the role God has to play in the existence of evil. As said at the beginning of the essay; it is impossible to find a single answer to the age-old question of the existence of evil. Many questions still remain unanswered. The major one among them is whether creation and free will are good and whether the world without the two principles would be any less good. These two propositions form the basis for the argument of the above paper, but the fact that they work so well in providing a solution does not imply their plain truth. The answer to this question thus lies in a broader analysis.

It is not uncommon to witness the struggle between Good and Evil every day. Society has grouped people into two distinct group; good people and bad/evil people. These judgments are usually based on the outer appearances or actions of people, leaving one to wonder about the inner self. Do people not battle within themselves, faced with both good and evil? An affirmative answer to this question would mean that each has both sides to them. This would then divide people into two; the mentally, psychologically and spiritually able individuals who have the will to control their bad sides and give more life to the good in their person. And the mentally disabled, psychologically challenged or spiritually weak individuals who gravitate, intentionally or unintentionally towards feeding their more selfish pleasures and end up giving the world more of their bad side, to the extent that they have no more good left in them. This way of thinking leaves society hungry for someone to blame. Who do people blame when they lose loved ones to acts of human cruelty? Do they sit down and analyze the innate human qualities that come with being part of an equally cruel world? Do their anger and grief allow them the rationality of having to contemplate this age old question in the hope of finding some solace?

Blaming a higher being for the cruel ways of human beings always seems like the most convenient explanation that assuages the emotional devastation brought about by these cruelties. The acts of dictators such as Adolf Hitler who mercilessly gassed innocent children and killed adults simply on the basis of religion, Osama Bin Laden whose terror group cruelty was unfounded all over the world, and Pol Pot;  leaders responsible for the unwarranted death of millions of innocents, are all easily dismissed as evil (Lemke & Campos, 25). One does not realize that by doing so, one ignores the motivation and beliefs that lie behind the commission of these inhumane acts. Also, such crimes against humanity cannot be blamed on a single person as they required the collaboration of many people in the forms of army generals and the common citizen who turns against their neighbor, all people who are termed as “normal” and not having characteristics normally dismissed an evil. It is for these reasons that the debate on the existence of evil is not only a necessary but also a relevant discussion.

 

Works Cited

Buber, Martin. Images of Good and Evil.Routledge & Paul, 1952.

Dahl, M., & Pares, R. (2012). Good vs. evil. Mankato, Minn: Stone Arch Books.

Genesis.Holy Bible: New International Version. Zondervan, 2011.

Kiraz, Tabetha. (2011). Good Vs. Evil. Gorgias Pr Llc.

Lemke, D. B., & Campos, C. (2012). Good vs. evil: The awakening. Mankato, Minn: Stone Arch Books.

Leibniz, G. W. “Monadology and Other Philosophical Essays. By G. W. Leibniz.Translated by Paul Schrecker and Anne Martin Schrecker. “Library of Liberal Arts,” Indianapolis: Bobbs-Merrill Co., Inc., 1965. Pp. 163.Paperback Dialogue, vol. 5, no. 02, 1966, pp. 278-280.

Mackie, J L. The Miracle of Theism: Arguments for and against the Existence of God. Clarendon P, 1982.

Rowling, J K. “The man with the two faces.” Harry Potter and the Sorcerer’s Stone, 1998, p. 211.

Essay Writing Sample: Critique On Medical Article
Posted by: Write My Essay on: April 17, 2019

 

Sample by My Essay Writer

Critique of a Journal Article: “Color of Bile Vomiting in Intestinal Obstruction in the Newborn”

Introduction

In this critique,  Walker’s (2006) article “Color of bile vomiting in intestinal obstruction in the newborn: Questionnaire study” that was published in BMJ journal is critically analyzed. The critical Analysis explores the article’s hypotheses, subjects chosen, sampling method, data collection method, statistical analysis, study design and finally the discussion.

 

Hypotheses

A case of bilious vomiting is an indicator of intestinal obstruction in newborns. Cases of bilious vomiting require urgent referral and intervention of pediatricians and neonatologists before any operation maneuverer can be organized. It is characterized by green or yellow color and initial detection is through the color of vomit observed by nurses, mothers to the baby’s, medical practitioners and midwives. It has however been noted that there is no clear-cut response on the color of bilious vomit. At Glasgow, it was noted that recent referrals cases of intestinal obstruction had a history of green vomitus as opposed to yellow. Yellow vomitus was largely associated with mechanical obstruction in newborns, though it could be as a result of intestinal obstruction. The study tested the hypotheses on which color represented bile in vomit of newborns as perceived by different groups.[“Write my essay for me?” Get help here.]

Comments: Purpose of the study was in line with the problem. Purpose of the study was also limited to researchers’ capabilities and resources available for the study. Findings from the study could be used in hypotheses testing on perceptions on the color in bilious vomit.

Study Design

This was a qualitative study that involved case reports design during the research. There was no involvement of controls during the study. Questionnaire was the only tool for data collection used during the study. These questionnaires basically comprised of 8 colors, ranging from yellow through to dark green, that were numbered and from which respondents were to choose from.

Comments: There was no pilot study conducted. Testing of instruments to be used in data collection was not performed, something that resulted in some questionnaires not being returned from some general practitioners.

Sampling Method

General practitioners, nurses, midwives and mothers of babies and infants were purposively selected for the study due their experience with newborns. Convenience sampling technique was then used in the distribution of questionnaires among individuals in the different sample groups selected. Individuals taking part in the study were therefore chosen on their availability during the study.

Comments: There is no clear sampling technique illustrated in sample selection. Information about how they arrived at their sample sizes is also missing.

Subject Chosen

Subjects used in the study included general practitioners at Glasgow, specialist nurses from the baby unit department, mothers who had infants and babies and midwives. Practitioners, nurses and midwives were obtained from the staff at Glasgow. Mothers to babies and infants were obtained from the local society. A total of 165 respondents comprising, of 29 nurses, 41 mothers, 48 midwives and 47 (although 80 questionnaires had been administered) practitioners, took part in the study.[Need an essay writing service? Find help here.]

Comments: Selection of respondents is not provided. We only see questionnaires being administered. Information about the subject as a representation of the bigger community is also missing.

Data Collection Method

Questionnaires were administered to the respondents.  80 questionnaires were given to the general practitioners, 48 to midwives, 29 to nurses and 48 to mothers. Questionnaires for the general practitioners clinics were delivered by hand while in stamped envelopes with addresses. Mothers, nurses and postnatal midwives received their letters through hand. A large envelope was however left behind for collection to ensure anonymity. Respondents were expected to choose a color that represented a newborn’s vomit with bile. Respondents were allowed to choose more than one color for this. The next task involved respondents choosing only one color matching that of bile.

Comments: The study did maintain consistency in the method of study used, for instance all participants were given a large envelope for collecting questionnaires except for those from general practitioners. This resulted into 42 % of general practitioners failing to return their questionnaires. Questions on the questionnaires were limited, there was need to include questions on any history of bilious vomiting and what solution was provided.

Statistical Analysis

Responses obtained from returned questionnaires were grouped into two categories of green and yellow. Percentages of responses about the color of a newborn’s vomit with bile and those for responses on a color similar to bile were calculated. Information obtained was then tabulated.  Percentage for the number of questionnaires returned from the different groups of participants was also obtained.

Comment: Analysis in percentage form is given for each finding in the study, however descriptive statistics was missing as it was the case with inferential statistics. Hypothesis testing was not done after analysis of findings.

Discussion

Relationship between the anatomy of the small intestine at the duodenum and bile duct is well illustrated in the discussion. The mechanism for the presence of bile in the vomit is attributed to the obstruction below the level of bile duct into the duodenum. Conditions associated with intestinal obstruction are also provided.

Conclusion on the findings of the study is also provided. General practitioners and nurses did not match the expectation of the researchers during the study. A significant number showed their uncertainty when it came to matters of the best color for bilious vomit. A summary on already known information about bilious vomit and additional information provided by the study is also provided.  Recommendations were also included in the discussion; it was recommended that yellow vomitus should not be ruled out as an indicator of intestinal obstruction and a study including newborns found to have had yellow vomitus should be conducted.

Comments: The discussion was based on findings and was stated logically. Theoretical information about bilious vomiting was also provided.

 

References

Walker, G. M. (2006). Colour of bile vomiting in intestinal obstruction in the newborn:

Questionnaire study. Bmj, 332(7554), 1363-0.

 

Posted by: Write My Essay on: April 16, 2019

Essay Writing Service Sample: Comcast Xfinity and Verizon Fios Internet Services

Sample by My Essay Writer

Abstract

As technology is growing, consumer demand for connected home security solutions is evolving, and the services are becoming user-friendly as well as less costly. Fiber optic technology has been the backbone of the internet for quite some time. However, residential consumers have had a chance to use it for a few years.  Internet services are available globally, and most companies are expanding their markets beyond their current geographical locations. The Internet is a marketing medium where businesses that offer goods, services, as well as information on online services, compete with other organization worldwide. [Need an essay writing service? Find help here.] Website marketing is ideally relevant in the sense that both small and medium-sized enterprises gain more visibility in the market (Addison, Haig & Kearny, 2009, p 66). It is beneficial to every company since it allows the company to present itself and the good and services it offers to the external world at a very low cost. Through internet services, it is no doubt, businesses have achieved their goals and objectives. For instance, Comcast XFINITY and Verizon Fios companies are the major players of internet services. Both companies offer Internet access, television programming, and residential telephone services. Evidently, the companies truly offer the best deals to the cable customers due to the development of new options and more competition.  The companies invest in an innovative business that represents the next generation of digital technology, entertainment, and communications. It is evident that most of the investments of these enterprises are in the advertising, enterprise, and consumer as well as infrastructure sectors. The companies use the newer and fastest technologies to convey some of the best ever internet speeds in some countries at a rate that is still amazingly cost effectual. Therefore, these companies are the best in light of customer satisfaction in the industry based on the speeds of the many of their services along with the underlying technology behind their services.[“Write my essay for me?” Get help here.]

Comcast Xfinity and Verizon Fios Internet Services

Introduction

Comcast XFINITY is the largest cable provider globally. It brings together the best media and technology by creating the world’s best online experiences. It is located in Center City in the United States.  According to the company website, it operates in 39 states and covers over 113 million people. For decades, the internet of most enterprises, if not all,  have been based on wired connections. To solve this, the company delivers the simplest, most complete and fastest way to access the best entertainment experience. XFINITY Internet provides the most reliable and fastest in-home Wi-Fi for all devices and rooms at all times (Nadler, 1992, p 45). This is the best way to connect with friends and family members through XFINITY Voice which provides unlimited nationwide texting, enhanced calling features and reliable home phone service with the best call clarity. Comcast XFINITY offices are in the 19th tallest structure in the United States. Moreover, the house features retail and cafeteria space designed to be environmentally friendly. The innovation, along with development center, was intended to be a collaboration as well as development space to build products that change on how people connect to internet, entertainment and information by bringing together the best in media and technology. Comcast XFINITY creates a space that carries projects for themes of open office space along with interactive, collaborative zones while creating a unique space for the development teams. Each floor in the Comcast XFINITY offices has a signature color and unique design. The angular soffit hangs an intimate and residential experience and a variety of seating bar height tables along with island stools provide places for people to work as well as grab a cup of coffee.

On the other hand, Fios is a new fiber optics communication network company from Verizon. Verizon has been rolling some services such as Bundled pricing, television, internet and voice services.  Fios has undergone the largest infrastructure projects globally to build a premier fiber network. The company has made a 21st Century network to keep up with the latest technology. Experts across the globe have the same opinion that Verizon Fios network know-how is the Gold Set for Internet as well as amusement delivery. Fios offers fast upload and download speeds which are available to more than 15 million homes in the Northeast and Mid-Atlantic U.S. The company is expanding its base allowing customers to access widgets for localized content. Verizon services are delivered using passive optical network technology. The fiber optic technology which the company uses has an inherently higher capacity. Verizon gives customers the freedom to cancel the services it offers at any time. This is one of the biggest advantages that give Verizon Company a chance to access to services. Services and technology have given this company a boost for fighting market share and have negotiating power. Substantially, Verizon has better terms and more attractive deals since new customers are driven to search for more cost-effective home service options to make the switch from one of the bigger cable companies. The company has offices which are facing windows with harbor views. The firm has a newly renovated reception area, fully furnished and equipped office space. Some of the facilities within the company include shared conference room with video conferencing, shared kitchen, shared receptionist, telephone and the internet, utilities and access to state of the art printing, faxing and copying machine. Therefore, this study explores Comcast XFINITY and Verizon Fios the major internet service providers based on their architecture, inner space, artifacts, floors, offices and meeting places within their premises.

Statement of the problem

The internet services of Comcast XFINITY and Verizon Fios are set to be judged through their fast and reliable fiber. XFINITY is a complete way to access entertainment on any screen. For instance, cable broadband technology is the most common means of providing services to homes and business (Jamil et…al, 2016, p 23).  The main pathways for broadband communications for homes and business include cable networks, subscriber wireless and hybrid fiber-coaxial for the foreseeable future. As demand for data capacity increases, Comcast XFINITY is one of the few technologies that can legitimately provide customers with better as well as faster services to accommodate the growing demand. From the technological point of view, the innovations in the development of fiber optics have enabled manufacturing of high-quality signals. [Click Essay Writer to order your essay]

The architecture and artifacts of Comcast XFINITY Company comprise of the process as well as the product of designing, planning along with constructing buildings and other physical structures (Null, & Lobur, 2012, p 67). Historically, architecture requires creative coordination of material and technology. The structure of this company stimulates as well as influences social life which in other hand promoting social development. Rationalism, phenomenology, and structuralism are some of the philosophies that influence the modern architects and their approach to building design. This aspect of architecture and artifacts are entirely the subject of functionality.

On the other hand, the inner space, architecture, and artifacts of Verizon Fios are planned with a range of shape alongside color varying from the open white space of the upper administrative center to the multicolored walls of the meeting room. The structure of Verizon Company consists of a central material with metallic framed floors. The rest of the room within the company is used for content and training teams as well as shopper service. Additionally, the company contains two works of installation art designed by Nile Creative Group and Jonathon Borofsky’s Civilization in Motion. Therefore, the rise of new materials and technology enables both companies to concentrate on aesthetics and humanist aspects.

Purpose statement of the research

This study explores Comcast XFINITY and Verizon Fios companies based on their architecture, inner space, and artifacts. Further, the study accesses the available documents such as the books and their titles, banners on the walls, websites and the implicit themes within the organization. From the review, Senses are physiological abilities of organisms that make available data for sensitivity. Human beings have a huge number of senses but from the case study the senses used include sight, hearing, and touch.

Literature Review

Companies involved in the creation of multimedia content play a vital role in capturing multimedia data and software tools. Some companies fully utilize public Internet and public cloud infrastructure (Govindarajalu, 2014, p 44). The growing ubiquity of cloud computing and the internet services have a significant impact on businesses that provide media related services. It is evident that there are several variations of devices that can be used in learning systems and can be successfully applied to teach theoretical knowledge presented in the structured multimedia content.

The artifacts of companies can be read out through offices of most successful persons in the organization. However, essentially, the offices and meeting places of these companies are full of artifacts and real clues about what the team values. Ideally, every company has stories based on the founders, memorable photos of employees and other precious subjects. The author of this article examines the information that an organization values. First, companies have only two functions which are marketing and innovation. According to the author of this article, innovation helps the company to generate new products and business model. On the other hand, marketing lets the world to know about those innovations. Creating a creative culture help the organization to execute on marketing and innovation properly. Understanding the dynamics of culture typically enable the company to learn all opportunities by allowing limited risk taking.

This article takes advantage of the recent developments to enforce standardization across service implementations. The author of the article develops as well as demonstrates a sophisticated content management services within organizations. Developing and supporting collaborative workflows help companies to manage complex multimedia context. Moreover, Fiber is one of the few technologies that can legitimately provide customers with better and faster service offering so that to accommodate the growing demands. Bandwidth is the biggest advantage fiber holds.

In the past few decades, the rapid evolution of technologies surrounding telecommunications and computing has reached a threshold of providing returns of continued investments. Communication infrastructure is one of the new value simple concepts leveraged through technological innovation. Further, this article explores how new technologies in most companies have been able to provide a breakthrough in transmission technology over copper lines as well as upgrading the existing copper lines.  For the business to be efficient concerning providing internet services, it requires significantly greater densities of antennas and placing powerful devices which must accept as well as cope with all existing along with potential future interference from other users (Lerner, 2012, p 34). The company should be able to apply a technique that ensures sufficient data bandwidth. Given that internet services provided by most companies are relatively high cost and low capacity, the services are best suited for scenarios in which other connectivity options are unavailable.

Research questions

(i)    What cues within the organizations that support the implicit themes?

(ii)    What are the values expressed in the physical location of these teams based on floors, offices and meeting places?

(iii)     How the available documents in these companies furbished based on their architecture, inner space and artifacts?

Research methodology

Like any other study, research methodology collection is a significant criterion here. Suitable research methodology helps out to present the study work in a comprehensive way. This section of the investigation explains the move and endeavor in research work to collect helpful information about Comcast XFINITY and Verizon Fios companies based on the available documents such inner space, architecture and artifacts that are expressed in the physical locations. The organizations had implicit themes which helped to collect every relevant piece of data and to validate the validity of the study topic. The most important objective of this business study is to investigate about the possible perception observed within the premises of the companies and identify the architecture, inner space and artifacts of the firms. This study strategy ideally utilized non-experimental method of exploration, which for the most part focuses on the logical examination of known information as well as facts in a methodical way.

Sample population and participants

A sample size of 50 employees from each company will be selected to give precise information about the artifacts, inner space, architecture and meeting places of Comcast XFINITY and Verizon Fios.

Plan for data collection

The research is just depicting an enhanced situation of underlying resources and focused expression of qualitative study methods. The inceptions of this data are positioned to online materials and other related direct examination of the situation in a variety of areas. This will express the relativity of diverse aspects that are placed in the point of understanding the two companies based on their offices, floors, architecture, inner space, and artifacts. Therefore, the study will cover up data from earlier researchers that have already been done and the online materials such as articles, books, journals and websites that hold information pertinent to the study topic. [Click Essay Writer to order your essay]

Conclusion

Comcast XFINITY and Verizon Fios companies operate to facilitate the internet and deliver a range of services. As rapid innovation in Internet-related services continues, the existence of these services provides the consumer with some benefits. However, the underlying technical methods used by both companies are significantly different with various benefits along with limitations (Costas & Grey, 2016, p 56). The alternatives of these methods provide competition and consumer choice in the market. Evidently, both Comcast XFINITY and Verizon Fios companies support innovation and make higher assurance of delivery of quality services by offering different pricing packages. Therefore, different technologies combined with other improvements exercised by both companies create multiple services to customers in the market.

 

References

Addison, Haig & Kearny, (2009). Performance Architecture: The Art and Science of Improving

Organizations. New York, NY: John Wiley & Sons.

Costas  & Grey,  (2016). Secrecy at work: The hidden architecture of organizational life.

Govindarajalu,  (2014). Computer architecture and organization: Design principles and

applications. New Delhi: Tata McGraw-Hill.

Garud, Kumaraswamy, & Langlois, (2013). Managing in the modular age: Architectures,

networks, and organizations. Malden, MA: Blackwell Pub.

Lerner,  (2012). The architecture of innovation: The economics of creative organizations.

Null, & Lobur, (2012). The essentials of computer organization and architecture. Sudbury, Mass.

[u.a.: Jones and Bartlett.

Nadler, (1992). Organizational architecture: Designs for changing organizations. San Francisco,

Calif: Jossey-Bass.

Jamil, In Rascao, Ribeiro, & Silva, (2016). Handbook of research on information architecture

and management in modern organizations.

 

Page 4 of 19« First...23456...10...Last »