Thursday, October 31, 2019

Argument on the Proposal about Prison Education Research Paper

Argument on the Proposal about Prison Education - Research Paper Example Emergent trends indicate that education greatly influences the attitudes as well as behaviors of the learners. The decision of the government to take away from 3000 student’s financial aid in order to provide education for the willing and able prisoners is a positive development that should be embraced. This can go a long way in addressing the problem of crime in a sustainable manner. A society that is educated tends to report less cases of crime. This is because most members of that society tend to follow the rules and regulations that govern that society. Educated individuals also tend to have a good grasp of the moral responsibility that the society thrusts upon them/ To begin with, a demographic review of the financial wellbeing of college students ascertains that most of them can afford the fundamental tuition fees (Freeman and Robbi 96). Thus they use the aid they receive from the government for their sustenance and other leisure needs such as entertainment. In this resp ect, it is certain that their basic needs are already catered for. For this reason, the extra financial help that they get from the government can be employed for other important purpose of educating the prisoners. Nothing is as elemental as providing education to the prisoners. To ensure optimal and satisfactory results, the government should undertake screening exercise to ensure that students benefiting from the relative funds actually deserve the help. Those students who deserve the financial aid from the government should not be denied the same as this can be counterproductive. The extra resources should then be channeled to educating willing prisoners. When the prisoners are educated, they are likely to walk out of the prisons changed people and this is the main aim of correctional institutions such as prisons. In his research, Clements posits that inmates who undergo education programs while in prison are unlikely to assume criminal activities upon completion (Clements 1477). Educating the inmates is vital in eradicating inmates and keeping them informed about the law. Statistical evidence ascertains that ignorance is the root cause of crime and criminal activities in the society. Through education, the inmates are also able to acquire good work habits, learn various skills and finally master professions. When these inmates come out of the prison they are able to engage in meaningful income generating activities, thereby contributing immensely towards the development of the society. Attainment of all these attributes eases the social integration process especially upon completion of their sentence. Although not all of them undergo the positive change, Williford contends that the percentage that attains the positive status is satisfactory (Williford 59). Financial statistics indicate that the government employs a significant percentage of resources on correctional measures and institutions. Indirectly, the tax payer contributes a great deal to the respec tive expenditure. Quality educational programs for inmates according to Vacca can be able to reduce and even reverse the aforementioned trends. Although the initial and running costs would be high, the ultimate results would be positive and lasting (Vacca 299). In particular, reduction of recidivism, rates of crimes and tax contributions would be more rewarding. Comparatively, this would be better than continuing to spend on college students who can afford their basic

Tuesday, October 29, 2019

Country Selection and Initial Analysis Essay Example | Topics and Well Written Essays - 500 words

Country Selection and Initial Analysis - Essay Example The services sector has the largest contribution of 51% approximately (estimated 2010). The population growth rate is just over 1%, which should be viewed as reasonably well for a Muslim majority emerging nation. The currency is known as Moroccan Dirham (MAD) that fluctuates against US dollar because of changes in global economy. However, the exchange rate prevails between 8 – 9 Dirham / US dollar at present. The GDP per capita was around $4,900 according to 2010 statistics (CIA Fact Book, 2010) It should also be highlighted that the recent floods in Morocco damaged its agricultural crops as the area under cultivation reduced by significant 25 – 30%. As a result, the production of wheat, barley, vegetables and other grains reduced considerably whereas the demand increased due to rise in population. Nonetheless, the government authorities were left with no other option but to increase imports from self-sufficient nations so that they could stabilize wheat prices across M orocco (Reuters Africa, 2010). It should be noted that domestic wheat consumption in Morocco has been estimated to be nearly 8.3 million tons and the shortages resulted in 47% hike in wheat prices (Weisenthal, 2011). The price surge was mainly the outcome of shortage amid price inelastic demand of food products as they are necessities.

Sunday, October 27, 2019

The Struggle Between Presidential And Congressional Powers

The Struggle Between Presidential And Congressional Powers The process of passing legislation in the United States starts at with Congress and has to ultimately be approved by the president unless bypassed by with a two-thirds veto. The ability of an administration to pass or prevent legislation is one of the things that form the basis for an evaluation of a terms efficiency. However, what must be considered when evaluating a presidents efficiency is the ability to influence Congress, the makeup of Congress itself, and the issue at hand. Another responsibility that both Congress and the Presidency both share is the making of foreign policy. A president dealing with having to pass legislation and dealing with war demonstrates how a president deals with a pressurized situation. These aspects of the government and the ongoing conflicts that occurred will be analyzed in this paper. Analyzing the influence that the president has over Congress gives more information on how the president has to push past the limitations of his office in order to push a political agenda. The role of presidency and Congress regarding to the making of foreign policy illustrates whether the President or Congress truly has authority to act during times of conflict. Gaining a better understanding of these issues gives insight into which office better contemplates the long term welfare of our country, which has more understanding of the power of the U.S. military, and the statement it sends around the world when the military engages in conflict. I was personally interested in this topic because of my own interest and lack of understanding of foreign policy procedure. This research project provided me with an opportunity to understand the authority and the history in foreign policy making. In this paper, I hope to gain the knowledge I desire in this topic to ensure issues of war or foreign policy will be much clearer to me in the next presidential election. Literature Review Separation of Powers: According to American Government: Power and Purpose, the colonies needed to create a government in opposition to the tyrannical rule of King George after declaring their independence. The Articles of Confederation and Perpetual Union were the first written American Constitution as well as the weakest. Under the Articles of Confederation, there was no executive branch or judicial branch and Congress was the entire basis for central government. Congress at this time was given the power to declare war, make peace, treaties, alliances, and appoint the senior officers of the U.S Army, but the execution of those powers were diminished by the fact that the appointed army officers had no army they were in direct command of because the military was made up of state militias. With each state being in charge of their territory, this made the process of collective action that much harder (Lowi, 2002). To strengthen the central government, and in turn strengthen the United States, the delegates met to initially reform the Articles of Confederation, but this would latter convene in Philadelphia in May 1787 to create a more efficient and effective government. The convention eventually led to the creation of the current U.S. constitution. Under this U.S Constitution, the government would utilize a constitutional principle known as the separation of powers to divide the government into three branches in an effort to ensure that the new government wouldnt infringe the rights of the people, The judicial branch was created to guard against infringement of the rights of the people, legislative to make the laws that the people abide by, and the executive branch was created to counter the impasse formed by the other constitutional principles used to prevent excessive democracy (Lowi, 2002) Unlike the Congress under the Articles of Confederation, Congress was made up of two chambers; the House of Representatives to be directly responsible for the people and the Senate to check the House and make it easier for the House not to completely conform to popular preferences (Lowi, 2002). Article I Section 8 of the U.S Constitution list the expressed powers of Congress, such as declaring war and maintaining military services (Lowi, 2002). Article II of the U.S Constitution states that the Executive Branchs power resides in the president. It also states that the president is indirectly elected, and how he is the Commander-in-Chief of the U.S Army and Navy (Lowi, 2002). The separation of powers was established to ensure that three branches would be equal, but the struggle is most apparent between Congress and the Presidency (Lowi, 2002). Out of all the powers the president has, his job as Commander-in-Chief of the U.S Armed Services is one of the most important, yet the president is not solely responsible for the military in times of conflict. This power of military authority is a similar power to that of Congress to maintain military services and to declare war. It is these military powers that cause foreign policy to fluctuate and impacts how the executive branch influences congress to get their way. Presidents Influence On Congress A common misconception with the relationship between Congress and the Executive branch is that the president and Congress deal with each other directly on a constant basis, when in actuality, the president getting personally involved only occurs as a last resort (Collier, 1997). The center of Congress and President relations in the White House is the White House Office of Legislative Affairs whose role is to send administration lobbyist to Congress to gain information about legislation, persuading the reluctant, and to relay the information theyve gathered back to the executive branch (Collier, 1997). The role of the executive office in regards to Congressional influence is demonstrated by both the George H.W. Bush and Clinton Administration. As a former congressman, President George H.W. Bush understood the need for working with Congress to pass legislation and choose a staff with good congressional experience and welcomed members of Congress like friends and family. Bush said that he planned to Reagans legislative strategy, but lacked in that regard because of his friendliness towards them (Collier, 1997). He was often criticized for not going over the heads of his friends and by the end of his administration Bush was frustrating to both parties because of his interest in foreign policy which wasnt shared by the people or lawmakers. He lacked both a strong domestic agenda and the Republican majority, yet he still chooses to focus on foreign policy (Collier, 1997). This would ultimately drive home the point of his lack of connection to the public and caused both the lost of public respect and his lack of respect of authority by Congress. Rather than being authoritative, Bush relied merely on the friendships he establishe d versus his position as president. President Bushs biggest foreign policy dilemma stemmed from the Persian Gulf War which compelled Iraq to withdraw from Kuwait (Peterson, 1994) which would ultimately lead to a victory. President Bill Clinton was willing to associate with Congress, but after personally rallying bargaining for votes on his stimulus package, he had to learn how to not get too involved so as to nor appear desperate. The presidents communications skills in his 1996 state of the Union Address allowed him to convey his position and place the Republican congressman at a disadvantage (Collier, 1997). As the Republicans tried to implement their own plan to fix the economy, they underestimated Clinton and ultimately made it easier for him to implement his version of the plan to fix the economy. Regarding foreign policy, Clinton had to deal with the interest group campaign against the ratification of the North American Free Trade Agreement (NAFTA) which Congress disagreed with until the President implemented clauses that would protect American Jobs. Another foreign policy issue that would not be further evaluated until the terrorist attacks on September 11 was the threat of terrorism Osama Bin Laden that Clinton faced during his administration. During August 7, 1998, Bin Ladens forces struck the United States embassies in Kenya and Tanzania; this would cause Clinton to respond with seventy nine missile strikes on Bin Ladens outposts. Clinton would also send a letter to Congress stating that his actions were justified by his authority in U.S. foreign relations and as the Commander-in-Chief (Hendrickson, 2002). Rather than simply ignoring Congress altogether, he started to pull them into the decision making process more which ultimately helped him to not only gain support from the majority of Congressman, but cause Newt Gingrich to help garner support through his Republican allies. It was President Clintons decision to include Congress in the decision making that gained the trust of Congress, who in turn allowed President Clinton some leeway in making military decisions (Hendrickson, 2002). After the terrorist attacks of September 11, President George W. Bush declared war on terror and was regarded as an American response when compared to the European perception that the attacks were matters of law enforcement (Ball, 2007). This assertion in the war on terror served to prove what both Bush and Dick Cheney believed; the powers of the U.S. President are limitless in the war on terror. This would also be reinforced by Congress passing a joint resolution drafted by the White House which allowed Bush to battle any nation, organization, or person he determined to have been involved in 9/11. This would also lead Congress passing the Iraq Joint Resolution which falsely claimed that Iraq was involved in 9/11 and that they were in possession of weapons of mass destruction (Ball, 2007). Foreign Policy Powers The foreign Policy Powers of the United States stem from the U.S. Constitution. Although the president is the Commander-in-Chief of the U.S military, the Constitution was set up to prevent the president from being the sole authority on U.S foreign policy issues (Peterson, 1994). The president only has the exclusive power to receive ambassadors, execute the laws that Congress passes, and to grant pardons (Lowi, 2002). The title of Commander-in-Chief doesnt actually grant any specific powers. The expressed powers of foreign policy that lie with Congress are the authority to raise an army, prepare for the common defense, and to declare war. Aside from the control already established, Congress has the ability to hinder the presidents power by their control over the budget which is referred to as the power of the purse. One of the things included in the budget is the military funding; meaning the president needs both the approval of Congress to go to war and the proper budget to go to war (Lowi, 2002). Even though it would appear that most if the control in foreign policy making is given to Congress, Congress rarely exercises these powers. The norm seems to be for Congress to just conform to the demands of the President. This is especially apparent when examining the legislation that was passed under the George W. Bush Administration. The President also has its ways of circumventing Congress in terms of foreign policy by executive agreements. Of the two chambers of Congress, The Senate has the authority of forming treaties and alliances and if the President wishes to implement a treaty he must have it approved by Senate with a two-thirds majority vote, but executive agreements allow the president to make an agreement with another country that has the same effectiveness as a treaty, but doesnt need the Senates approval. Statement of Research There are multitudes of ways in which Congress and the Executive branch can override each other and are forced to compromise. Making foreign policy is the issue that theses two branches seem to struggle with the most. The powers they have give them the potential to outrank each other in that regard. The president is the Commander-in-Chief of the U.S. and because of the broadness of this title, has no expressed powers he is bound to. Congress has the expressed power and the authority to raise an army, prepare for the common defense, and to declare war. In times of crisis such as 9/11 and the Iraq war, the power of the U.S President tends to increase as Congress conforms to the Presidents agenda in an effort to make a stance for the country. This time of unity between the two branches of government appears to be at its best when regarding the war on terror. The inquiry addresses the following: How has the evolution of presidential influence correlated to the making of foreign policy during the Bush-Clinton Era? How has the war on terror correlated to the foreign policy power balance between the Presidency and Congress? These two questions are significant because they address the issues of divided government and the making of foreign policy. These two elements of our government are the most crucial aspects that can either encourage or strain relations between the White House and Capitol Hill. The two questions not only provide insight into the foreign policy, but an analysis of the events that led up to the Iraq invasion and the war on terror. Research Findings Inquiry Question #1 The making of foreign policy is one of the main subjects in which Capitol Hill and the White House struggle to reach middle ground. As presidential administrations have passed, the executive branchs influence seems to fluctuate depending on the type of president and the different political parties that the president is a part of and whether or not Congress is of the same party. This fact leads back to the question of how the evolution of presidential influence correlated to the making of foreign policy during the Bush-Clinton Era. In order to find out how the evolution of presidential influence correlated to the making of foreign policy during the Bush-Clinton Era, the answer must come from an analysis of the three presidencies in question; George H.W. Bush, Bill Clinton, and George W. Bush. President George H.W. Bush, who could have directly launched an attack on Iraq to deal with the Iraq invasion of Kuwait, went to Congress for authorization to use military force against Iraq (Tushnet, 2005). This political behavior was contrary to the quiet, behind the scenes approach to leading Congress which was ultimately was done not by the President himself, who as a former Congressman was very friendly in Congress, but by the staff (Collier, 1997). The Iraq war that President George W. Bush declared in 2002 stemmed from the basis of the congressional authorization of the Gulf War in 1991 (Peterson, 1994). The Gulf War finds similarities to the military actions of President Clinton in his use of the War Powers Resolution in Somalia Bosnia. The first foreign policy challenge under the Clinton administration came at the hands of the incident that was arising in Somalia with the chaos caused by wide-scale dissatisfaction with the leadership of Siad Barre and the clan violence that was increasing under men like Mohammed Aideed (Hendrickson, 2002). President Clinton and Congress supported Operation Restore Hope to use American forces abroad to restore order to the Somalia which Clinton did with both congressional approval and the U.N.s approval as well. The situation in Haiti came from the oppressive rule of Lt. General Raoul Cedras who came into power by staging a coup against Catholic priest Jean Bertrand Aristide (Hendrickson, 2002). President responded by arguing that the instability that was occurring in Haiti was a direct threat to the national security interest of the U.S. This led to the U.N. authorizing the U.S. to end the dictatorship occurring in Haiti, but was initiated by President Clinton who made an effort to inform congress of the developing situation (Hendrickson, 2002). President George W. Bush faced no greater foreign policy in his administration than he did after the terrorist attacks of September 11, 2001. In the face of the attacks by Al-Qaeda, President Bush announced a war on terrorism that sought not only to bring those responsible for the 9/11 terrorist attacks to justice, but demonstrated a very broad government action that would allow Bush to pass and enforce questionable legislation such as the Iraq Joint Resolution and The Authorization for Use of Military Force (AUMF) which gave President Bush the authority to fight anyone he thought was involved in the terrorists attacks of 9/11 (Ball, 2007). After review this information, the only answer that can be concluded is that the presidents influence on Congress has greatly affected the making of foreign policy as well as the tendency of Congress to give power to the president during the Bush-Clinton Era, even when the presidents claims of threats of national security do not pan out, such as the example with the Iraq Joint Resolution which would later be very unnecessary and even a blatant case of mistaken identity regarding those who were involved with the terrorist attacks of 9/11. Whenever there is an issue regarding foreign policy involving military action, the president is given the power to do what he wishes within reason. However, this does not apply when the country has to make a stance on a subject such as terrorism. Inquiry Question #2 Whenever the U.S. has to deal with acts of terrorism that threaten our safety as citizens, the presidents and Congress have been known to work together and pass legislation that at times of peace would take a much longer time to process and contemplate. Legislation like the Iraq Joint Resolution and AUMF would not have been passed in a time of peace. This one incident questions not only what America is willing to do bring terrorist organizations to justice, but how the war on terror correlated to the foreign policy power balance between the Presidency and Congress. This can only be analyzed by an in-depth look in the events that lead to the war on terror, but what was done after the war on terror was declared. The problem with terrorism finds their beginnings in the George W. Bush administration, but the what lead to that were the terrorist attacks of 9/11 which were spearheaded by the leader of Al-Qaeda; Osama Bin Laden. President Clinton dealt with the terrorist attacks of Osama Bin Laden when they struck the embassies in Kenya and Tanzania. President Clinton would then strike Bin Ladens outpost with missiles and would work to gain more intelligence on Bin Ladens actions as well as authorizing the CIA to apprehend and interrogate Bin Laden or to kill him if capture was impossible (Hendrickson, 2002). Congress supported his ideas in all instances in his efforts to stop Bin Laden and was especially supportive of him when he justified his initial actions as the commander-and-chief of the United States, yet still chose to include Congress in their decisions regarding him. Of course at the time, Osama Bin Laden and terrorism in general, was not regarded as one of the central threats to the U.S. (Hendrickson, 2002). President George W. Bush responded to the 9/11 terrorists attacks with the declaration of the War on terror. The broad term would be followed by the AUMF which gave the president free reign to make any attack on anyone he perceived to be connected to the terrorist attacks of 9/11 (Ball, 2007). This idea of terrorist striking at anytime also allowed him to do things that could only be done with court approval like intercepting international calls and emails between people who were allegedly connected to Al-Qaeda, which is unconstitutional without a court order (Ball, 2007). Congress initially agreed to majority of the bills that Bush wanted to sign into law to combat the terrorist threat. However, when this began to conflict with some of the rights of the people, both Congress tried to step in only to be usurped by Vice-President Cheney, who was the 1st president to use his ability to expand theory of presidential authority by saying that Congress cannot limit the power the president has over the military nor can they pass laws that give government officials of the executive branch the power to act independently of the president (Ball, 2007). Upon reviewing the information presented, it can only be concluded that the war on terror has shifted the power of foreign policy to the president. President George W. Bush used the war on terror to not only attack all those who were allegedly involved with 9/11 but to expand it into a war that had nothing to do with the terrorist attacks of 9/11. The same power was also experience by President Clinton when he used his title as commander-and-chief to his advantage and tried his best to eliminate the threat that Osama Bin Laden posed towards the U.S.

Friday, October 25, 2019

Human Resource Management Essay -- Business Resource Managing Essays

Human Resource Management Effective human resource management is undoubtedly critical to the success of virtually all firms. Thus its importance is huge in the study of business strategy; which is the system of the firm’s important choices that are critical to the firm’s survival and relative success (Boxall and Purcell 2003). Getting more specific, strategic human resource management as a field of study is concerned with the strategic choices associated with the use of labour in firms and with explaining why some firms manage them more effectively than others (Boxall and Purcell 2003). Traditionally there has been much debate in the field of strategic HRM over two main schools of thought; â€Å"best fit† (contingency theory), and â€Å"best practice† (universalism). The â€Å"best fit† school of thought argues that HR strategy will be more effective when it is appropriately integrated with its specific organizational and broader environmental context (Boxall and Purcell 2003). This proposes questions about which are the most critical contingencies in this context and how they are best connected. The ‘best practice’ school of thought argues that all firms will see performance improvements if only they identify and implement best practice. This perspective requires top management to commit themselves to key HR practices. Basically, the idea is that a particular bundle of HR practices has the potential to contribute improved employee attitudes and behaviours, lower levels of absenteeism and labour turnover, and higher levels of productivity, quality and customer service. This has the ultimate effect of generating higher levels of profitability (Boxall and Purcell 2003). Both of the aforementioned â€Å"best theory† approaches to strategic HRM place emphasis on critical choices associated with competitive strategy; such as which industry to enter and what competitive position to seek in it (Boxall and Purcell 2003). However, these models make some serious assumptions of the firms HRM. They assume that the firm already has a clever leadership team that makes the competitive strategy choices effectively. They also assume that human resource issues such as hiring and training a capable workforce are straightforward and basic. The resource-based view (RBV) of strategy, a modern school of thought in the field of strategic HRM, sees these issues as strategic rather than stra... ... over time, and their importance to sustained competitive advantage (Boxall and Purcell, 2003). Works Cited Boxall, Peter and Purcell, John. Strategy and Human Resource Management. Palgrave  Ã‚  Ã‚  Ã‚  Ã‚  Macmillan. 2003. Deephouse D. ‘To be different, or to be the same? It’s a question (and theory) of   Ã‚  Ã‚  Ã‚  Ã‚  strategic balance’ , Strategic Management Journal, Vol. 20, 1999. pp147-166 Mabey, Christopher and Salaman, Graeme and Storey, John. Human Resource   Ã‚  Ã‚  Ã‚  Ã‚  Management: A Strategic Introduction. Blackwell Business. 1998. Marchington, Mick and Wilkinson, Adrian. People Management and Development:   Ã‚  Ã‚  Ã‚  Ã‚  Human Resource Management at Work. CIPD Enterprises Ltd. 2002. Purcell, John. â€Å"Business Strategies and Human Resource Management: Uneasy   Ã‚  Ã‚  Ã‚  Ã‚  Bedfellows or Strategic Partners?† University of Bath. April 27, 2005   Ã‚  Ã‚  Ã‚  Ã‚  [http://www.bath.ac.uk/werc/pdf/business_strategies_and_HRM.pdf] Sisson, Kieth and Storey, John. The Realities of Human Resource Management:   Ã‚  Ã‚  Ã‚  Ã‚  Managing the Employment Relatoinship. Open University Press:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Buckingham.   Ã‚  Ã‚  Ã‚  Ã‚  2000. Schuler, Randall S. and Jackson, Susan E. Strategic Human Resource Management.   Ã‚  Ã‚  Ã‚  Ã‚  Blackwell Publishers Ltd. 1999.

Thursday, October 24, 2019

Breaking DES (Data Encryption Systems)

Data Encryption Standard (DES) is an algorithm for decrypting and encrypting unstipulated information in the United States administration standard. DES is derived from IBM’s Lucifer code and is depicted by the Federal Information Processing Standards (FIPS) 46, with its current modification being FIDS 46-3 (Conrad, 2007). DES is a mass code that takes a plaintext sequence as a key in and generates a code transcript wording of the same measurement lengthwise.The mass of the DES obstruct is 64 bits which is also the same for the input dimension even though the 8 bits of the key are for the recognition of faults making the efficient DES input amount 56 bits. Because of the progressions in the authority of dispensation in workstations there are weaknesses in the 56-bit key extent presently (Conrad, 2007). In the company of proper hardware, there is a best chance assault on methodical efforts to all the 72 quadrillion hence, there is a possibility of dissimilar inputs.Advanced Encr yption Standard (AES) developed into an innovative FIPS-standard encryption average in 2001, 26th November to replace DES. Statistics Encryption Algorithm explains the definite algorithm as contested to the average. In such circumstances, TDEA is a short form for Triple DES. At the same time, there is a description of Triple Data Encryption Algorithm Modes of Operation ANSI X9. 52-1998 (Clayton & Bond, 2002). History of DES DES was proposed in 1975 and approved in 1977 as a federal information processing standard. It was criticized by the people who felt that it’s 56 key lengths to be insecure.In spite of this, DES remained a strong encryption algorithm until mid 1990. In the year 1998 summer, the insecurity of DES was demonstrated when a $ 250,000 computer which was built by the electronic frontier foundation decrypted a DES-encoded message in 56 hours. This was improved in the 1999 to 2002 hours through a combination of 100,000 networked personal computers and the EFF machi ne. DES remains a de facto standard unless a substitute is found (Landau, 2000, p. 341). A certified DES is obtained from the National Institute of Standards and Technology (NIST).This Advanced Encryption Standard (AES) works in three key lengths: 128, 192, and 256 bits. The publication of DES indicated a new era in cryptography. The development in the community of public cryptographers was enhanced by having an algorithm availability of study that the national security agent certified to be secure (Landau, 2000, p. 341). The (DES) Data Encryption Standard A system that encrypts quickly but is essentially what is impossible to break is all what cryptographers have always wanted. Public key systems have captured the imagination of mathematicians because of their reliance on elementary number theory.Public key algorithms are used for establishing a key because they are too slow to be used for most data transmissions. Private key system does the encryption because they are typically fa ster than public key ones (Landau, 2000, p. 341). The data Encryption Standard (DES) workhorse uses private key algorithm besides relying on cryptographic design principles that predate public key. The RC4 in web browsers and the relatively insecure cable TV signal encryption are an exception to DES. DES is the most widely used public cryptosystem in the world. It is the cryptographic algorithm which is used by banks for electronic funds transfer.It is also used for the protection of civilian satellite communications. Still, a variant of DES is used for UNIX password protection. There are three operation of the DES which involves XOR, substitution and permutation. The DES is an interrelated block cipher and a cryptosystem on a block of symbols that sequentially repeats an internal function which is called a round. It encrypts data by the use of a primitive that operates on a block of symptoms of moderate size. Self invert ability is also essential to enable one of the objects to enc rypt and decrypt. When encrypting ordinary text, DES begins by grouping the text into 64 bit block.A number of operations are performed by the DES on each block (Landau, 2000, p. 343). The transformation of how the block is to be carried out is determined by a single key of 56 bits. DES iterates sixteen identical rounds of mixing; each round of DES uses a 48-bit sub key. The DES begins with an initial permutation P and ends with its inverse. The permutations are of minor cryptographic implications but forms part of the official algorithm. The selection of sub keys starts by splitting the 56-bit key into two 28-bit halves and rotating each half one or two bits; either one bit in rounds 1, 2, 9, and 16 or two bits otherwise.The two halves are put back together and then 48 particular bits are chosen and put in order (Landau, 2000, p. 343). Attacks of DES The selection of DES was followed by protests in which case some of the researchers appeared to object to the algorithm small key spa ce. Investors in the key public cryptography claimed that a DES encoded message could be broken in about a day by a $ 20 million machine made up of a million specially designed VLSI capable of searching one key per microsecond while working in parallel.The use of a meet in the middle attack to break a four round version of DES did not extend past seven rounds (Landau, 2000, p. 345). This is evidence that, for all these attacks none of them posed a serious threat to the DES. Other attacks on the DES were performed to poke harder to the innards of DES. This brought anomalies which led to the first attacks that were seen to be more theoretically better than exhaustive search. The attacks were against the block structure system and the need of all block-structured cryptosystems needed to be designed to be secure against differential and linear cryptanalysis.There is a strong attack to DES which is differential cryptanalysis. This is apparently known to the algorithms designers. In order to design a secure cryptosystems, there is a need for a mixture of well known principles, some theorems and the presence of some magic. Attacks on a cryptosystem fall into two categories which are passive attacks and active attacks. The passive attacks are the ones which adversely monitors the communication channel. They are usually easier to mount although they yield less. The active attacks have the adversary transmitting messages to obtain information (Landau, 2000, p.342). The aim of the attackers is to determine the plaintext from the cipher text which they capture. A more successful attack will determine the key and thus compromise a whole set of messages. By designing their algorithms, cryptographer’s help to resist attacks such as cipher text only attack whose adversary has access to the encrypted communications. The known plain text attack which has its adversary has some plain text and its corresponding cipher text. The third attack which can be avoided is the chos en text attack and its adversary chooses the plain text for encryption or decryption.The plain text chosen by the adversary depends on the cipher text received from the previous requests (Landau, 2000, p. 342). Observations about DES The simplicity found in the DES amounts to some fully desirable properties. To start with it is the complementation. To illustrate, allow X to denote the bitwise complement of X. If C is the DES encryption of the plaintext P with key K, then P is the DES encryption of P with key K. In some cases the complementation can simplify DES cryptanalysis by basically cutting the investigating space in half.These properties do not cause serious weakness in the algorithm. The set generated by the DES permutations do not form a group. The group may have at least 102499 elements. There is strength in the DES when it lacks a group structure. It appears to be double encryption where this is twice by two different keys, EK2 (EK1 (P) and is not stronger than single encr yption. The reason is that when meeting in the middle attacks for a given plaintext cipher text pair, an adversary will compute all 256 possible enciphering of the plaintext i. e.EKi (P), and indexes the same. The adversary will then compute all possible deciphering of the cipher text (Landau, 2000, p. 345). Models of DES There are four forms of DES, which are accepted by FIPS 81. They include (ECB) Electronic Codebook form, code mass sequence form (CFB), productivity reaction form (OFB) and system response (CFB). The forms are used to with both DES and Triple DES. Within each form, there are main dissimilarities which are based on the fault proliferation and obstruct vs. tributary codes (Conrad, 2007). Electronic Codebook (ECB) ModeIn this form of encryption, there is sovereign encryption into respective blocks of codes text. It is done by means of Feistel code which generates 16 sub-inputs derived from the symmetric input and also encrypts the plaintext using 16 surroundings of co nversion. Similarly, the development is used in the conversion of code text reverse into simple text with the dissimilarity that, 16 sub inputs are contributed in overturn arrangement. The result of repeated blocks of identical plaintext is the repeated blocks of cipher text which is capable of assisting in the vault investigation of the code wording.In Appendix 1 there is an illustration of the result (Conrad, 2007). The first picture of SANS symbol is the bitmap layout. The second picture is the encrypted logo of SANS bitmap via DES ECB form. The visibility of the model is due to the recurring of masses of the simple wording pixels in the bitmap which are encrypted into masses which are repeated and are of particular code pixels. In this form, faults do not proliferate due to the autonomous encryption of each obstruct. Cipher Block Chaining (CBC) ModeThe CBC form is an obstruct code which XORs every original obstruct of simple wording with the previous block of code wording. This indicates that repeated obstructs of simple wording do not give rise to repeated obstructs of code wording. CBC uses a vector of initialization which is an arbitrary original obstructs used to make sure that two simple wordings result in different code wordings. In figure 2 of the Appendix there is a clear illustration of the same SANS symbol bitmap data, encrypted with DES CBC form. There is no visibility of any prototype which is true for all DES forms apart from ECB.Therefore, in this mode, there is proliferation of faults as each prior step’s encrypted output is XORed with the original obstructing of simple wording (Conrad, 2007). Cipher Feedback (CFB) Mode The Cipher Feedback Mode is a tributary code that encrypts simple wording by breaking into X (1-64) bits. This permits encryption of the level of byte or bits. This mode uses an arbitrary vector of initialization. The preceding elements of code wording are XORed with consequent components of code wording. Therefore, in this mode of CBC there is proliferation of faults (Conrad, 2007).Output Feedback (OFB) Mode Similar to CFB form, the productivity reaction form makes use of the vector of random initialization and also encrypts simple wording by shattering downward into a tributary by encrypting components of X (1-64) bits of simple wording. This form fluctuates from CFB form by generating a simulated-arbitrary tributary of productivity which is XORed with the plaintext during every step. Therefore, the productivity is fed back to the simple wording and because the output is XORed to the simple wording, faults there is no proliferation of mistakes (Conrad, 2007).Counter (CTR) Mode The oppose form is a tributary code similar to OFB form. The main disparity is the accumulation of contradict obstructs. The offset can be supplementary to an arbitrary importance that is used only once and then increased for each component of simple wording that is encrypted. The initial counter obstructs acts as a vecto r of initialization. Therefore, in each surrounding there is XORing of the offset obstructs with simple wording. Accumulation of offset obstructs permits disintegration of encryption into equivalent phases, improving presentation on a suitable hardware.There is no proliferation of mistakes (Clayton & Bond, 2002). (Table 1 in the Appendix summarizes the Data Encryption Standard). Triple DES (T DES) In anticipation of 2030, TDES can be used as FIPS encryption algorithm which is permitted in order to allow conversion to AES. There are three surroundings of DES which are used by TDES which have an input extent of 168 bits (56 * 3). There is a possibility of reduced effective key length of TDES to roughly 12 bits though beast might assaults against TDES re not realistic at present (Conrad, 2007).Architecture for Cryptanalysis All modern day practical ciphers both symmetrical and asymmetrical make use of security apparatus depending on their key length. In so doing, they provide a margin of security to cover from computational attacks with present computers. Depending on the level of security which is chosen for any software application, many ciphers are prone to attacks which unique machines having for instance a cost-performance ratio (Guneysu, 2006).Reconfigurable computing has been recognized as way of reducing costs while also acting as an alternative to a variety of applications which need the power of a custom hardware and the flexibility of software based design such as the case of rapid prototyping (Diffie & Hellman, 1977, pp. 74-84). What this means is that cryptanalysis of today’s cryptographic algorithms need a lot of computation efforts. Such applications map by nature to hardware based design, which require repetitive mapping of the main block, and is easy to extend by putting in place additional chips as is needed.However, it should be noted that the mere presence of resources for computation is not the main problem. The main problem is availab ility of affordable massive computational resources. The non-recurring engineering costs have enabled hardware meant for special purpose cryptanalysis in virtually all practicable situations unreachable. This has been unreachable to either commercial or research institutions, which has only been taken by government agencies as feasible (Diffie & Hellman, 1977, pp. 74-84).The other alternative to distributed computing with loosely coupled processors finds its base on the idle circles of the large number of computers connected through the internet. This method has considerably been successful for some applications. However, the verified detection of extraterrestrial life is considerably still a problem more so for unviable problems with power of computing in a particular organization (Guneysu, 2006). In cryptanalysis some algorithms are very suitable for special-purpose hardware.One main example for this is the search for the data encryption standard (DES) (FIPS, 1977). What this mean s is that a brute- force attack is more than twice the magnitude faster when put in place on FPGA’s as opposed to in software on computers meant for general purposes at relatively the same costs (FIPS, 1977). That notwithstanding, for many crypto algorithms the advantages due to cost-performance of hardware meant for special purposes over those meant for ordinary purposes is not really as dramatic as is usually the case of DES, more so for public-key algorithms (Guneysu, 2006).Arising from the advent of low-cost FPGA families with much logic approaches recently, field programmable gate arrays offer a very interesting way for the thorough computational effort which cryptanalysis needs (Lesnsta & Verheul, 2001, pp. 255-293). Many algorithms dealing with the most important problems in cryptanalysis is capable of being put in place on FPGAs. Code breaking though, requires more additional efforts as opposed to just programming a single FPGA with a certain algorithm (Electronic Fro ntier Foundation, 1998).Owing to the enormous perspectives of cryptanalysis problems, many more resources as opposed to FPGA are needed. This implies that the main need is massively powerful parallel machinery suited to the requirements of targeted algorithms. Many problems are capable of being put in parallel and are perfectly suited for an architecture distributed. Conventional parallel architectures for computing can theoretically be used for applications of cryptanalysis (Guneysu, 2006). An optical Architecture to Break Ciphers The targeted DES brute force attack has several characteristics.To begin with, expensive computational operations which are put in parallel. Next, there is no need of communication between single parallel instances. The next characteristic is the fact that the general expense for communication is not high owing to the fact that the stage of computation strongly outweighs the data input and output stages. According to Blaze et al, (1996), communication is almost entirely used for results reporting as well as initialization. A central control instance with regards to communication is capable of being accomplished by a conventional low cost personal computer, connected simply by an interface.This would imply that there is no need for a high-speed communication interface. The fourth characteristic is the fact that a DES brute-force attack and its following implementation require little memory. The final consequence of the above is the fact that the available memory on present day low cost FPGAs is sufficient (Guneysu, 2006). What this implies is that by making use of low-cost FPGAs, it is possible to develop a cost effective dynamic architecture which is capable of being reprogrammed which would be able to accommodate all the targeted architectures (Blaze et al, 1996).Realization of COPACOBANA Drawing back, the Cost-Optimized Parallel Code Breaker (COPACOBANA) meeting the needs available comprise of several independent-low prized FPGAs, connected to a hosting PC by way of a standard interface such as a USB. Moreover, such a standard interface permits to extend a host-PC with more than one device of COPACOBANA. The initialization of FPGAs, the control as well as the process of results accumulation is carried out by the host. Critical computations are carried out by the FPGAs, which meet the actual cryptanalytical architecture (Schleiffer, 2006).Developing a system of the above speculations with FPGA boards which are commercially available is certainly possible but at a cost. Therefore it is important to put into considerations the design and layout among others in coming up with the above kind of system (Schleiffer, 2006). This would therefore mean that our cost-performance design meant for cost optimization is only capable of being achieved if all functionalities are restricted to those required for code breaking. Arty the same time, many designs choices should be based on components and interfaces which are readi ly available (Guneysu, 2006).Conclusion In conclusion, cryptanalysis of symmetric and asymmetric ciphers is extremely demanding in terms of computations. It would be fair to hold the belief that breaking codes with conventional PCs as well as super-computers is very much costly. Bit-sizes of keys should be chosen in a way that traditional methods of code breaking do not succeed (Rouvroy et al 2003, pp. 181-193). This would mean that the only way to go through ciphers is to develop special-purpose hardware purposely meant for suitable algorithms.In the final analysis, traditional parallel architecture in the end equally appears to be too complicated and therefore not cost saving in finding solutions to cryptanalytical problems. As earlier observed, many of these problems can easily be put in parallel implying that the algorithms which correspond to them are equally capable of being parameterized to lower communication costs (Guneysu, 2006). A hardware architecture which is cost effec tive (COPACOBANA) is the end product of the algorithmic requirements of the intended problems of cryptanalysis.This work represents not only the design but also the first prototype of an effective design which meets the demands of the request. In the final analysis, COPACOBANA would be able to accommodate as many as 120 FPGAs which are less costly. At the same time, it is possible to break data encryption standard (DES) within a period of nine days. This would require a hardware design comprising of reprogrammable logic which could be adopted to accommodate any task, even those not necessarily in line with code breaking (Rouvroy et al 2003, pp. 181-193). References Blaze, M.. , Diffie, W. , Rivest, R. L., Scheiner, B. , Shimomura, E. , and Weiner, M (1996). Minimal Key Lengths for Symmetry Ciphers to Provide Adequate Commercial Security. Ad Hoc Group of Cryptographers and Computer Scientists. Retrieved from December, 13, 2008 from http://www. counterpane. com/keylength. html. Clayto n, R. and Bond, M. (2002). Experience Using a Low-Cost FPGA Design to Crack DES Keys. In B. S. Kaliski, C. K. Koc Cetin, and C. Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2002, 4th International Workshop, Redwood Shores, CA, USA,volume 2523 of series, pages 579 – 592. Springer-Verlag. Conrad, E. (2007).Data Encryption Standard, The SANS Institute Diffie, W & Hellman, M. E. (1977). Exhaustive cryptanalysis of the NBS Data Encryption Standard. Computer, 10(6): 74-84 Electronic Frontier Foundation. (1998). Cracking DES: Secrets of Encryption Research, Wiretap Poolitics & Chip Design. O’Reilly & Associates Inc. Federal Information Processing Standard. (1977). Data Encryption Standard, U. S Department of Commerce. Guneysu, T. E. (2006). Efficient Hardware Architecture for Solving the Discrete Logarithm Problem on Elliptic Curves. AAmasters thesis, Horst Gortz Institute, Ruhr University of Bochum. Landau, S.(2000). Standing the Test of Time: The Data Encryption Standard vol. 47, 3, pp. 341-349. Lenstra, A and Verheul, E. (2001). Selecting Cryptographic Key Sizes. Journal of Cryptology, 14(4):255–293. Rouvroy, G. , Standaert, F. X. , Quisquater, J. , and Legat, D. (2003). Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. In Field-Programmable Logic and Applications- FPL, pp. 181-193 Schleiffer, C. (2006). Design of Host Interface for COPACOBANA. Technical report, Studienarbeit, Host Gortz Institute, Ruhr University Bochum

Wednesday, October 23, 2019

Foundations of Behavior Essay

The field of psychology is expanding and credit is due to the numerous research studies being conducted. These research studies utilize different methods and each method has its own advantages and disadvantages. In this paper, five popular research methods will be compared based on their characteristics, objectives, strengths and weaknesses, research techniques, validity, and reliability. These research methods are case study, naturalistic observation, survey research, correlational research, and the experimental method. The case study is a focused study on a person or a specific group or a particular situation. Its research design involves five components, which are the study questions, the propositions, the units of analysis, the logic linking the data to the propositions, and the criteria for interpreting the findings (Tellis, 1997). Case studies have varying purposes. Some case studies are conducted to either confirm or challenge an existing theory, while others are carried out to describe either a special or an extreme case. A case study obtains information from documents (letters and newspapers), archival records (service records, survey data), interviews, direct observation (done when field visits are needed), participant-observation, and physical artifacts (instruments and tools). One of the most established techniques in case studies is called pattern-matching, in which the data is linked to propositions. The reliability of case studies is relatively high, especially when protocols are established. However, validity, especially construct validity, sometimes becomes questionable because the researcher might be subjective in his decisions and interpretations. This can be minimized by utilizing multiple sources, by setting up a chain of evidence, and by asking major informants to review a draft of the case study. The common criticism against case studies is that its results cannot be used to arrive at generalizations. But the greatest strength of case studies is that it can present an in-depth and holistic knowledge about a particular situation, group, or person. The naturalistic observation is unique from all other types of observation in that the researcher does not hinder, interrupt or influence the environment being studied. One of the vital things to consider in conducting naturalistic observation is to record as much detail as possible, which includes smell, sound, taste, time, place, number of participants, and feelings. This is why journals and a variety of writing materials are utilized. But the use of any recording device, such as video cameras, is not allowed because it violates the privacy of the observed individual. The reliability of this research method relies on the accuracy of observation. One technique of increasing reliability is to have several observers (Hesse, 2003). The greatest advantage of naturalistic observation is that it is considerably less expensive than other methods. But, the subjects being studied may act differently because of their awareness of the presence of the observer. This will significantly reduce the validity of the results (Piercy, 2007). The survey research is characterized by its major means of collecting information. The researcher usually goes out and asks questions. The questions can be oral or in written form. And the respondents can be chosen in many ways. Some respondents are chosen at random while others must possess certain characteristics. For example, if a survey research is about elementary teachers, then a high school teacher will not be asked to answer the questionnaire. The techniques involved in survey research lie in the analysis of the collected data. The reliability and validity of survey research are affected by several factors, such as the quality of the sets of questions or the questionnaire, the amount of data collected, and the accuracy in using measures of central tendencies and variability. Ideally, the questionnaire must be standardized. Greater reliability and validity is achieved if the sample represents a greater part of the total population. One advantage of the survey method is that it is relatively cheap and easy. Unfortunately, it is also subject to human error and biases (Government of Saskatchewan, 2002). The correlational research is essentially the discovery of a relationship between two variables. Unlike the previously described methods, correlational research is quantitative in nature. The different techniques used in a correlational research are regression and prediction, multiple regression, factor analysis, and systems analysis (Davis, 2004). The greatest advantage of using this method is that its results can be used to formulate predictions and generalizations. This is due to the nature of the research techniques. But the greatest danger of this method is to over-generalize. It must be remembered that an established relationship between two variables does not mean a cause-effect relationship between them. If a researcher wanted to establish a cause-effect relationship, then the research method to use is the experimental method. Similar to the correlational research, it is concerned with variables, which can be either independent or dependent variables. The independent variables are usually manipulated so that there will be two groups being studied, the experimental group and the control group. These two groups have the same characteristics except for that one variable which is being tested. The difference between these two groups can be found in the dependent variable. The reliability of this method is increased by conducting the same experiment for several times. Its validity lies in the accuracy of the procedures and the careful handling and analysis of results. The greatest advantage of the experimental method is that it can present an explanation to a certain phenomenon. But it takes great skill and experience on the part of the researcher in order to conduct a good research experiment. One problem of experimental method is the issue of ethics in conducting experiments using human subjects. Any of these research methods can be utilized to examine an issue or phenomenon in psychology. The basis of choice usually depends on the goal of the research. The task of the researcher is to maximize the advantages and minimize the disadvantages of the chosen method. Bibliography Davis, J. (2004). Correlational research methods. Retrieved October 12, 2007 at http://clem. mscd. edu/~davisj/prm2/correl1. html Government of Saskatchewan. (2002). Psychology 20: Social Psychology: A Curriculum Guide for the Secondary Level. Retrieved October 12, 2007 at http://www. sasked. gov. sk. ca/docs/social/psych20/support_materials/faqnaturalistic_observation. htm Hesse, B. E. (2003). Issues in naturalistic observation. Retrieved October 12, 2007 at http://psyc. csustan. edu/bhesse/psy2020/Lectures/Fall03/p2020U2L5. pdf Piercy, J. (2007). Research methods. Retrieved October 12, 2007 at http://courses. cvcc. vccs. edu/Psychology_Piercy/research_methods1. htm Tellis, W. (1997). Introduction to case study. The Qualitative Report. 3(2). Retrieved October 12, 2007 at http://www. nova. edu/ssss/QR/QR3-2/tellis1. html

Tuesday, October 22, 2019

Ruby Bridges essays

Ruby Bridges essays Ruby Bridges was the first black child to cross an invisible line and enter an all white school. She was just six years old when she first arrived at that school in New Orleans on November 14, 1960. On Rubys first day, a large crowd of angry white people gathered outside the Franz Elementary School. The people carried signs that said they didnt want black children in a white school. People called Ruby names; some wanted to hurt her. She stuck through a year of injustices and at the end, there were more. The lesson she wanted us to learn, when she spoke to us, was that there are always going to be injustices, but if we just get to know people, prejudices will no longer exist. Now, Ruby has established The Ruby Bridges Foundation. She has a website that you can visit at www.rubybridges.net. I think that Ruby Bridges is a truly amazing person. She was a very courageous girl, walking into that school and facing that mob. And, even more, she prayed forthem! "Please, God, try to forgive those people Because even if they say those bad things, Just like You did those folks a long time ago When they said terrible things about You." Ruby Bridges was a huge part of the history of the civil rights movement. What she did was an inspiration to many kids, parents, and teachers. She inspired integration of blacks and whites in the schools in the South. Today she is 45 years old, and she gives speeches at schools. She has even established a foundation to help underprivileged children become successful students. So, in conclusion, I think Ruby Bridges is a great inspiration to all children everywhere. ...

Monday, October 21, 2019

Best Private Schools in Texas

Best Private Schools in Texas Looking for the best private school in Texas for your child? Check out some of these top institutions in around the Dallas/Fort Worth area of the Lone Star State. Presented in alphabetical order, this list of college prep schools has been generated by considering several key assessment factors, including student and parent reviews on multiple sites, class sizes, college graduation and placement, as well as testing scores. Please contact each school directly for the most updated information about each institution listed. Cistercian Preparatory School Founded in 1962 by monks escaping communist Hungary,  Cistercian Preparatory School  is a Catholic school for boys in grades 5-12.   349 students enrolled6:1 student teacher ratio66% of faculty hold masters degrees and 13% hold doctoral degrees24% students of color20% of families receive financial aid The Episcopal School of Dallas Educating students from different faiths, The Episcopal School of Dallas is a strong co-ed college-prep school with students in pre-school through 12th grade. 1,150 students enrolled20% students of color28% Episcopalian students52% boys 48% girls$3.5 million awarded to students for financial aid20% of students receive financial assistance7:1 student teacher ratioAverage class size of 16 Greenhill School In Addison,  Greenhill School  is an independent co-ed PK-12 school whose mission is to encourage excellence and openness in learning. 1,292 students enrolledAverage class size of 16 (Preschool is 15)44% students of color61% of faculty hold advanced degrees15% of students receive financial aidMore than $5 million in financial aid available to qualified families The Hockaday School The Hockaday School  for girls in pre-kindergarten through 12th grade, and sends 100% of its graduates on to college. With a 9:1 student to teacher ratio, this school provides an educational experience that promotes success.   486 students enrolled74 boarding school students enrolled36% students of color16% of students receive financial aid Parish Episcopal School Parish Episcopal School is a pre-K through 12th co-ed school for students of all faiths. Parish graduated its first class of seniors in 2007. 1,100 students enrolled8:1 student teacher ratio in PK-K, 14:1 in grades 1 and 2, 17:1 in all other grades22% diversity23 faith backgrounds100% of graduates are accepted at four-year colleges and/or universities St. Marks School of Texas Dallas, Texas boasts a number of single-sex schools, including St. Marks School of Texas, a non-sectarian, college-preparatory independent day school for boys in grades 1-12. 865 students enrolled8:1 Student Teacher RatioAverage Class Size: 1571% of faculty with advanced degrees100% of seniors attend a 4-year college or universityAdmits 22% of applicants annually46% students of color$2,400,000 budget for financial aid awards to qualified families Trinity Valley School Trinity Valley School is a K-12, independent, coeducational, college-preparatory school that has remained committed to a broad liberal education in the arts and sciences, culminating in the knowledge, skills, and wisdom to enable our students to excel at an appropriate college or university.  Ã‚  Ã‚  Ã‚  Ã‚   970 students enrolled10:1 student to teacher ratioApproximately 20 students per class Ursuline Academy Ursuline Academy is a Catholic college-prep high school for girls in grades 9-12. The alma mater of philanthropist Melinda French Gates (who has given millions of dollars to the school to build a state-of-the-art science, math, and technology center), Ursuline Academy is also the oldest Dallas school in continuous operation. More than 800 girls enrolled30% students of colorMore than $1.2 million in financial assistance and merit scholarship awards given26% of students receive some form of financial assistance Yavneh Academy Founded in 1993 for Jewish students of all affiliations, Yavneh Academy is a modern Orthodox high school for girls and boys. 120 students enrolled3:1 student teacher ratioAverage class size of 10Less than 10% students of color Click here for a full list of​ Private Schools in Texas Article edited by  Stacy Jagodowski

Sunday, October 20, 2019

FTC Warns of Check Overpayment Scams

FTC Warns of 'Check Overpayment' Scams The Federal Trade Commission (FTC) is warning consumers of a dangerous and growing swindle called the â€Å"check overpayment† scam, now the fifth most common telemarketing fraud and the fourth most common Internet scam ever reported. In the check overpayment scam, the person you are doing business with sends you a check for more than the amount they owe you, and then instructs you to wire the balance back to them. Or, they send a check and tell you to deposit it, keep part of the amount for your own compensation, and then wire the rest back for one reason or another. The results are the same: the check eventually bounces, and you’re stuck, responsible for the full amount, including what you wired to the scammer. Typical victims include persons selling something over the Internet, being paid to do work at home, or being sent â€Å"advance winnings† in a bogus sweepstakes. The checks in this scam are fake but they look real enough to fool most bankers. Look Out! The FTC offers the following tips for avoiding the check overpayment scam: Know who you’re dealing with – independently confirm your buyer’s name, street address, and telephone number.Never agree to wire back funds to a buyer a legitimate buyer will not pressure you to do so, and you have limited recourse if there is a problem with a wire transfer.If you’re selling something over the Internet, say â€Å"no† to a check for more than your selling price, no matter how tempting the plea or convincing the story.Resist pressure to â€Å"act now.† If the buyer’s offer is good now, it should be good when the check clears.If you accept payment by check, ask for a check drawn on a local bank or a bank with a local branch. You can visit that bank branch to determine if the check is legitimate.There is no legitimate reason for someone who is giving you money to ask you to wire money back.Consider an alternative method of payment, such as an escrow service or online payment service. If the buyer wants to use a service yo u have not heard of, be sure to check it out to be sure it is reliable – check its website, call its customer service hotline, and read its terms of agreement and privacy policy. If you do not feel comfortable with the service, do not use it. The Lottery Winner Version In another version of this scam, the victim is sent a fake check for â€Å"foreign lottery winnings,† but is told they need to wire the sender the required foreign government’s taxes or fees on the prize before they can cash the check. After sending the fees, the consumer tries to cash the check, only to be told the sender is trapped in a foreign nation with no way to produce the cash. The FTC warns consumers to â€Å"throw away any offer that asks you to pay for a prize or free gift; and do not enter foreign lotteries – most solicitations for them are fraudulent, and it is illegal to play a foreign lottery through the mail or by telephone.† Resources More advice on how to be on guard against Internet fraud is available at OnGuardOnline.gov . Consumers are asked to report check overpayment scams to their state Attorney General, the National Fraud Information Center/Internet Fraud Watch, a service of the National Consumers League  or 1-800-876-7060, or the FTC at www.ftc.gov or 1-877-FTC-HELP.

Saturday, October 19, 2019

No Child Left Behind and the Effects on Children with Special Needs Research Proposal

No Child Left Behind and the Effects on Children with Special Needs - Research Proposal Example No Child Left Behind makes it compulsory that the schools across the United should track the improvement and progress of all children with special education needs and students whose first language is not English. The Act advocates the schools to devise strategies so that such students attain similar score as their peers by the year 2014 (Harper, 2005). No Child Left behind Act advocates space and provisions for students with special education needs because not all children who are limited in English proficiency and have some kind of learning disability have the capability to take tests that are similar to those of other students in their standard. The allowances comprise of one-on-one testing periods, expanded test sessions, test booklets with large fonts, helping students to structure their answers and sign language translators (George & Margaret, 2007). The No Child Left Behind Act of 2001 (NCLB) has advantages for the students with special needs or learning disabilities but it als o includes certain barriers that might prevent these students from exercising all of the opportunities stated in the law (Cortiella, 2010). In the lieu of this paper we will be discussing the impact of NCLB on such students and assess its usefulness for children that require extra attention due to any kind of learning disability. This stipulation in the act helps the school administration; lawmakers, parents and the Education Department assess the improvement in the progress of students who are usually left behind in better academic attainment. NCLB with all its apparent advantages has initiated heated debates over the efficacy of standardized tests for the two groups that are the normal students and the students with special needs, and... This essay stresses that according to the review of literature on the topic, it has been highlighted that the NCLB Act has immensely affected students with special needs. The motivation that is provided for the low-performing students has decreased the level of expectations instead of increasing it. This is so because of the fact that the reaction of the law when the school fails to make adequate progress is not just providing extra help for students but also punishing the school. This report makes a conclusion that NCLB aims at reducing racial and class discrepancies in academic performance through establishing common expectation for all students. The Act also requires that the schools to pay consideration to academic performance of the underprivileged students; students with special requirements, students from low income groups as well as students of different ethnicities. Conventional systems that were employed by the states considered only the mean school performance. This allowed the schools to be rated highly even in cases where there ware broad achievement discrepancies between underprivileged and privileged students. Extensive research in this area of acceleration shows that it is an effective and low cost educational intervention for students with high abilities. 18 types of accelerations have been identified. Dual credit programs, ability grouping, Advanced Placement, and International Baccalaureate are some other posted suggestions for meeting the n eeds of the gifted students.

Friday, October 18, 2019

You choose a topic Essay Example | Topics and Well Written Essays - 1000 words

You choose a topic - Essay Example But studies in the recent few years have associated the mobile phone with undesirable behavior especially among the youth and college students who are found to be on their phones for at least nine hours in a single day. This raises the question especially among behavioral scientists of whether mobile phone usage can become addictive. Even with the numerous advantages, mobile phone usage increasingly being associated with behaviors which are harmful to health and with the potential of being disturbing. Research for instance has associated the use of cell phones while driving with accidents. A wide of body of information is available to suggest the use of cell phones while on the wheel reduces ones capacity to be attentive even in cases there are hands-free devices. Many countries have even gone ahead to ban the use of phones while driving but many people still continue with the habit. In an ironic turn there is evidence of phones turning from their important role of supporting social exchanges to an object obstructing the same. Just many people have found themselves in instances where their mobile phone usage has disturbed their good social exchange. As such, just like smoking the use of mobile phones is increasingly receiving bans in public places e.g. in libraries. On the overall cell phone usage is increasingly becoming associated with antisocial and potentially dangerous behaviors as well as the uncontrollable usage and signs of dependence. it is for these reasons that researchers and clinical practitioners must be aware of the availability of instruments to measure problematic use, socio-demographic and psychological factors thought to play a significant role in mobile phone addiction. Phones were initially solely for communities purposes in terms of calls but the emergence of smart phones allows wider usage of the gadgets. People can now access the internet

WHEN sTORIES sHAPE lIVES Essay Example | Topics and Well Written Essays - 500 words

WHEN sTORIES sHAPE lIVES - Essay Example d when she met Carson Gueye, the first time her mother allowed her to go the market alone, and love blossomed since then, though they knew it was doomed love. Carson was a market worker. He did anything he could for people inside it, like carrying boxes and cleaning stalls. He was an orphan, but an old man, Chan Mo-wan, took him in. In the market, the noise and nauseating odors of men and butchered animals that Shiniang used to hate were gone. Instead, she saw human life and freedom. More than that, she saw Carson. He was sixteen, but already he hovered over others with his 5’11 height and large frame. Shiniang blushed, for he caught her staring at him. Shiniang ran, or rather, stumbled away, nearly falling on women on the floor selling dried fish. She dared look back, and Carson was still there, with a smile on his dark brown eyes. Shiniang was about to go home, hardly able to carry what she bought, when Carson helped her. Their arms brushed and their eyes met. What they saw inside each other’s eyes married their souls. Afterwards, Shiniang and Carson found ways to be together. Young love was not assuring, however. Shiniang once confided to Carson that her cousin, Li-Wang, committed suicide to avoid arranged marriage. It was not new news for many young women killed themselves to oppose arranged marriages (Man 123). Carson asked Shiniang to never do the same thing. Shiniang shook her head: â€Å"I’d rather die than marry a stranger.† Carson kissed Shiniang for the first time on the lips. Their love was doomed, but loyal nonetheless. Shiniang raked her mind, trying to find a solution to her problem, until one story gave her a fitting solution. Uncle Chow Li-Bao was angry when he came to their house years ago. His daughter, Hsien-Hsien, was supposed to be married to a rich trader, when her lover kidnapped her. Marriage by kidnapping was looked down in their community, but it was effective (Zhongyi 58). Risking her own life, Shiniang escaped and found Carson.

Thursday, October 17, 2019

Critical Journalism Studies Textual Analysis Assignment

Critical Journalism Studies Textual Analysis - Assignment Example Various journalism films often investigate specific features of the profession such as the ethical conduct of journalists, modern trends of the media and the history of the media. In doing this, either the films often portray journalists as heroes or villain depending on the angle of criticism a film adopts as portrayed in the discussion below. Media is one of the most powerful arms of the society. Also referred to as the fourth estate, the media informs, influences opinion and protects the vulnerable in the society. Such vital functions require the journalist to undertake their functions with fidelity both to the profession and to the society. Journalists have often behaved in ways that justify their portrayal either as heroes or as ant-heroes in the various journalism films. The role of the radio in the Rwandan genocide for example are some of the occurrences that validates the portrayal of journalists as anti-heroes thereby validating the themes some of the journalism films. The case of Rwanda is an example of the situations in which journalists act unethically and without objectivity. Additionally, journalists engage in various under dealings in their attempt to scoop new stories. Among the common types of unethical conduct, include bribing news sources and offering sexual favors especially by female journalists. In ot her cases, journalists are proactive and inquisitive individual who unearth numerous scandals in the society thus protecting the interest of the weak and vulnerable in the society. Journalism films often capture both sides depending on the plot of a story in a film (McNair, 2010). Films are cultural products that just as any other type of art always represent the prevailing social features. Developers of films observe the prevailing cultural and social features, which they represent artistically in films. On doing this, the developers enjoy the freedom and ability to criticize the society using fictional characters.

Incidents in the Life of a Slave Girl Essay Example | Topics and Well Written Essays - 2000 words

Incidents in the Life of a Slave Girl - Essay Example Yet, the polemic of the novel often distorts our perception of the heroine, driving the focuses from the multidimensional nature of a really existing human being to her reactions to the conditions of her slave life. It is preferable to analyze Harriet Jacobs’ (Linda Brent’) personality with the help of psychology. Linda’s childhood was happy and serene till she was six. Born in a family of beautiful and intelligent mulattoes, she â€Å"was so fondly shielded† that she never dreamed she was â€Å"a piece of merchandise, trusted to them for safe keeping, and liable to be demanded of them at any moment† (11-12). The death of her mother was the first blow. Then she learnt she was a slave. Yet, Linda did not realize the entire sense of the word for the following six years. She was taken to the house of her mistress, the foster sister of her mother, who treated the girl well and taught her to read and write, though it was forbidden by law. Though the mistress tried to replace the girl’s dead mother, she did not keep her promise to give freedom to the girl and her brother. This was a bitter truth poisoning the girl’s perception of the mistress. I would give much to blot out from my memory that one great wrong. As a child, I loved my mistress; and, looking back on t he happy days I spent with her, I try to think with less bitterness of this act of injustice. While I was with her, she taught me to read and spell; and for this privilege, which so rarely falls to the lot of a slave, I bless her memory (16). These lines convey the inner conflict, which Linda continued experiencing even as a grown-up. On the one hand, she understood that that her mistress behaved like most of whites, that she, Linda, was only a kind of a doll for the woman, who played with her without really caring of her. On the other hand, the mistress was Linda’s substitution of the dead mother, and Linda strove for happy recollections of her childhood,

Wednesday, October 16, 2019

Children's Rights and Participation Essay Example | Topics and Well Written Essays - 4000 words

Children's Rights and Participation - Essay Example The rights which are based on this include a question of how many rights children should have and whether this is applicable within society. While there are questions of children’s rights, others are also questioning the social structure of given areas which currently protects children who don’t have the rights. The dichotomy of children’s rights then becomes the main question between those who are looking at the place of children in society and the flexibility which should be included with the rights of children. This paper will explore the association between children’s rights within society as well as how this is related to the amount of children’s rights that should be distributed. The focus of protection and security, as well as the association with the development of children both has to be considered in regards to the needs of children in school, society and in the household. While equal participation can provide children with a stronger voic e for security, there is also the need to change this according to the specific levels of development among children. Sociology of Childhood The sociology of children is one which is known as a unique phenomena in society. Children are divided into a sub – group within society, specifically because of biological differences and age. ... From this perspective, the sociological components are based only on the understanding and definitions of society, as opposed to the capabilities and rights which children should have as citizens within society (Archard, 2004: 25). This creates the main difference between children and their rights, which shows a level of injustice over children and the abilities that they don’t have in terms of acting as responsible citizens within society because of social labels. The concept of childhood is one which has altered through sociological associations throughout time. Historical records note that the ideal of childhood has changed in different cultures and in various time frames. The idea of childhood is then implied throughout time and distinguishes rights based on the social needs of a given time frame. When a child is developed in a specific way, such as through education or work, then it becomes a reflection on what is needed within society as well as how this relates to the s pecific conditions of a given region. The idea of childhood then becomes related to a social construction which is based on age, gender, biological differences and the amount of knowledge which an individual has about the world. The social makeup of a child and the demographic differences then remain the only division in society, some which changes the roles which children play within society (Archard, 2004: 25). The differences associated with children and the social role which is taken is further implied with the expected participation in which children have within society. It is known that there are multidimensional participation processes that construct the role of a child in society and the expectations that are associated with this. The

Incidents in the Life of a Slave Girl Essay Example | Topics and Well Written Essays - 2000 words

Incidents in the Life of a Slave Girl - Essay Example Yet, the polemic of the novel often distorts our perception of the heroine, driving the focuses from the multidimensional nature of a really existing human being to her reactions to the conditions of her slave life. It is preferable to analyze Harriet Jacobs’ (Linda Brent’) personality with the help of psychology. Linda’s childhood was happy and serene till she was six. Born in a family of beautiful and intelligent mulattoes, she â€Å"was so fondly shielded† that she never dreamed she was â€Å"a piece of merchandise, trusted to them for safe keeping, and liable to be demanded of them at any moment† (11-12). The death of her mother was the first blow. Then she learnt she was a slave. Yet, Linda did not realize the entire sense of the word for the following six years. She was taken to the house of her mistress, the foster sister of her mother, who treated the girl well and taught her to read and write, though it was forbidden by law. Though the mistress tried to replace the girl’s dead mother, she did not keep her promise to give freedom to the girl and her brother. This was a bitter truth poisoning the girl’s perception of the mistress. I would give much to blot out from my memory that one great wrong. As a child, I loved my mistress; and, looking back on t he happy days I spent with her, I try to think with less bitterness of this act of injustice. While I was with her, she taught me to read and spell; and for this privilege, which so rarely falls to the lot of a slave, I bless her memory (16). These lines convey the inner conflict, which Linda continued experiencing even as a grown-up. On the one hand, she understood that that her mistress behaved like most of whites, that she, Linda, was only a kind of a doll for the woman, who played with her without really caring of her. On the other hand, the mistress was Linda’s substitution of the dead mother, and Linda strove for happy recollections of her childhood,

Tuesday, October 15, 2019

Acid Rain investigation Essay Example for Free

Acid Rain investigation Essay o There are many different kinds of erosion but acid rain or else wind erosion are the two main types which could have eroded the marble statue which was positioned in the garden close to the industrial site. o Acid rain is made up from of a cocktail of different acids e. g. sulphuric acid, nitric acid, carbonic acid. Sulphuric acid is released into the atmosphere from the burning of fossil fuels like coal and oil, nitric acid is given off from car exhaust fumes, These gases react with water vapour and oxygen from the atmosphere and with the help of sunlight turn to acids and fall to ground in the forms of precipitation with high acidity levels which are between pH 1. 5 and 5 (acid rain or acid snow). o Sulphur dioxide is harmful to humans and can led to bronchitis and other lung diseases. o Sulphur is released into the atmosphere through burning fossil fuels; most of the worlds air pollution is due to the smoke given off from burning things. o The increasing amount of acid rain, which falls each year, is due to the increasing amount factories and vehicles on our roads. o Lakes in Scandinavia are effected very badly by acid rain even though very little of it is actually produced there, it is carried mainly by prevailing winds from Germany, France, the UK and other large industrialised European countries. o Acid rain can destroy trees by removing vital minerals from the soil, buildings, metal work e. g. cars, bridges, it can also destroy lakes and rivers killing all fish and plants which live their, acid rain can also take effect on are health. o Nitric acid could be the main power in acid rain for it is the most corrosive of all the acids which make up acid rain. Calcium carbonate + sulphuric acid = calcium sulphate + water + carbon dioxide CaCO3+H2SO4= CaSO4+ H2O+CO2 This word is equation is not to blame for the erosion of the marble statue because calcium sulphate is an insoluble participate which means that when the calcium sulphate come into contact the statue will be coated preventing it from any further erosion. With sulphuric acid not the blame for eroding the statue that leaves nitric acid and carbonic acid, carbonic acid is very week and therefore it would not be possible for it to erode the statue in such a short time, so that means the acid which has eroded the marble statue is nitric acid Calcium carbonate + nitric acid = calcium nitrate + water + carbon dioxide CaCO3 + NH3 = Ca(NO3) 2+ H2 O+ CO2 What am i going to investigate? : I am going to find out how the concentration of nitric acid would effect the marble statue and would quickly it will erode depending on how high the concentration of acid is. With the results I gain from this experiment I will draw up a graph to show how the concentration has taken effect. Safety: Like all experiments safety is very important and everything should be done carefully, safety goggles should be worn at all times in this experiment, we are using acids which are very strong, especially nitric acid, and therefore can easily burn so extra care is needed. All rules for experiments should be fallowed, to prevent any unwanted accidents, e. g. chairs below tables, tie tucked in. Fair test: To make this experiment fair a number of things must remain the same through-out the investigation: 1. same volume of acid used through-out, will be 25cm3. 2. Same type of acid used in the testing, in this experiment it will be nitric acid which I will use. 3. Every investigation must be done in the same temperature, this will be room temperature. 4. Same weight of marble used which will be measured to two decimal places. 5. So my results are correct I will do each experiment twice and find the average from the two tries. Apparatus: 1. Electronic scales- will be used to weigh out the marble to an accuracy of two decimal places. 2. Measuring cylinder- this will be used to measure out the volume of the acid. 3. Stop clock- used to time how long the marble is reacting with the acid. 4. Marble chips- will be used to react with the acid; some of the marble will be in powder form to speed up the reaction. 5. Nitric acid- will be used to react with the marble chips. 6. Beaker- will be where the reaction will take place. 7. Safety goggles- used to protect your eyes in case of any spillages, should be wore at all times during the experiment. What affects the rate of reaction? There are three main factors which can effect the rate of reaction on the marble statue they are: The concentration of the acid- the higher the concentration the more collisions will take place therefore erosion occurs quicker. The pressure of the acid- the higher the pressure the more collisions due to the particles being closer together. Temperature- the higher the temperature the more energy the particles will have meaning they will more much quicker and cause more reactions. Light- the amount of light available can alter the rate of reaction for the light will give energy to the particles which will increase the number of collisions. The size of the solids surface- the larger the surface area the longer it will take to be broken down, so a reaction on a solid with a small surface area will take a less time. Variables: Controlled- what I will keep the same through out this whole investigation is the mass of the marble which I will be used, it will be measured accurately using electronic scales. The volume of the acid will also be the same and it will be measured out using a measuring cylinder. Independent-this is what will be changed through-out the experiment, I will change the concentration of the acid for each part of the investigation. Dependent- I will measure the length of time it takes for each concentration of acid to erode the marble pieces. This will be done using a stop clock. Prediction: I think that if the concentration of the acid is increased the speed of the reaction will increase, this is because with a small concentration of acid mixed with marble there is less acid particles to react with the marble meaning there are fewer successful collisions, with a much larger concentration of acid mixed with marble more collisions will take place because there are more acid particles which means that the reaction will take less time. Suitable range of readings: I will have to collect enough readings from my experiment to draw a graph, this means I will need more than 5 readings, so If I record a reading every minute I should have enough information. I will do each experiment two times and take the average results. From this I will draw a graph to show the concentration of acid against time taken.

Monday, October 14, 2019

Effective Communication for Enhancing Leadership

Effective Communication for Enhancing Leadership Main Title of Article Review : Role of Effective Communication for  Enhancing Leadership and Entrepreneurial Introduction Effective communication plays a vital role nowadays in affecting a person’s life whether in his working life or daily lifestyle. A person needs to master the effective communication skills so that he could succeed in his career or relationship with others. Effective communication helps us better understand a person or situation, so that we can resolve conflict. Besides, effective communication also can build trust and respect, and established creative environments and problem solving. An improper communication or ineffective communication will likely to cause misunderstanding and finally leads to frustration and conflict. One has to learn how to communicate effectively so that the information can be shared with his listener smoothly and to prevent unwanted negative feelings from others. We send, receive, and process an enormous amount of messages every day. But for effective communication, it is not merely exchanging information, it is also about understanding the emotions behind the conversations. Effective communication can at home, work, and in social situations to improve relationships, by deepening your connections to others, to improve teamwork, decision-making, and problem solving. It enables you to create no conflict or communication difficulties even negative news or threatening trust. However, effective communication often comes with a set of four primary skills, which are: reading, writing, listening, and speaking. One has to learn those four skills to fully master effective communication. There is one of the most important aspects for effective communication, which is listening. A successful listening means not just understanding the words or the information being communicated, but also need to understanding how the speaker feels when they communicate. However, speaking gives others the most significant impact. A person who is good at expressing, they have a better chance to succeed in his academic and professional career as he poses a more confident personality. Self-confidence leads to the development of the leadership and entrepreneurial qualities. Due to the leaders and entrepreneurs display the quality to implementation plans, it shows that they are good human resource managers. Besides, they also show that they are able to take their team forward to achieve goals in the right direction. In a nutshell, effective communication skill is very crucial in our daily lives nowadays. Many of our achievements depend on this skill. Therefore, as students, we must learn effective communication skill not only to foster relationship with other students, but also to secure our profession in the near future. Summary This review is about the role of effective communications for enhancing leadership and entrepreneurial skills is getting more important to every individual in today’s society. An excellent expression, the use of right words at the right time is the key in becoming a first-class leader. The four primary skills, reading, writing, listening and speaking have been now practiced by every individual throughout the world to enhance their inner potential. It is obvious that good communication skills are needed for everyone. Working in an organization, having a good leadership is more preferable than having a good managerial performance as it is easier to perform and accomplish tasks and objectives for the organization. A self-confidence person is able to come out with a qualified plan and lead his team towards the right direction to achieve the organization’s goals. Entrepreneurism is not a foreign concept to the academic world in this 21st Century. The development of knowledge is providing employability and entrepreneurship skills which is a logical expression for a university student. An excellent manager should consist of the listening, speaking, group contribution and interaction of information as most significant business students in this 21st Century. A manager should have the ability to bring up and motivate the members so that they will perform better and achieve the objectives. A manager should also have the psychomotor ability that involves in the communication competence. Listening and understanding are the ways of being a thoughtful communicator for manager. In the nutshell, the development of leadership qualities, speaking skills is the most important in development of leadership qualities effectively. Communication is the human connection and it is the key to personal and career success. Critique According to Manshoor Hussain Abbasi, Attiya Siddiqi and Rahat ul Ain Azim (2011), they have stated that people who want to success in their academic life, they need to have own communication, leadership and entrepreneurial skills together to generate the full potential of an individual. The authors had accomplished the article with their objectives and it is a useful article for university students. Through this article, we know that good communication skills had become very important in this 21st century. Students who are able to express themselves will gain a better chance to succeed in his or her career. They should take part in university events frequently to develop a good communication skill. For example, they can be event organizer or committee to gain some experience in order to train their entrepreneurial and leadership skills. Throughout the event, they may learn how to maintain a good interpersonal relationship and two-ways communication with each other. In this article, we found that there have several grammar and spelling errors. For example, Paragraph Errors Corrections Introduction ( paragraph 2 of line 7) N In Introduction ( paragraph 2 of line 8) Robe Role Introduction ( paragraph 4 of line 10) it obvious in it is obvious in Introduction (paragraph 7 of line 10) being an thoughtful a thoughtful Question 25 of first questionnaire as compare to as compared to Conclusion Question 11 of first questionnaire to built to build There are 22 references in this journal, indicating high accuracy. Although the citations are clear, there are plenty of citations causing the view of this article messy and crowded. Other than that, the level of language in the article is easy to understand for the university students. Moreover, the weakness of Methodology part is the questions were asked and analyzed without numbering it. Thus, this has caused trouble to the reader when they have to keep on referring back to the questions frequently while reading the article. From this article, have several ideas had been over emphasized. For instance, from paragraph 2 of the Introduction part, the paragraph had over emphasized the difference between the manager and the leader. It is irrelevance with the topic of this article. Moreover, the last paragraph of the Introduction part, which is discussing about the four skills that integrate with communication, entrepreneurial and leadership skills. Unfortunately, the paragraphs just focus on one of the four skills which are listening and without elaborate the other skills. For the Methodology part, these authors had implemented a good method of presenting the data analysis which related to entrepreneurship, leadership and students’ general responsibilities and integrity. There have 25 questions to show the result of five-pint Likert scale in percentages. Every question had interpreted that the recommendation to solve the particular affair. For example, the Question No. 25 had stated that we should provide environment in our educational institution to resolve the young entrepreneurs have many obstacles as compare to the experienced one. Therefore, young entrepreneurs will become a confident person and accomplish their goals easily. Other than that, the article used table to present the data analysis in Second Questionnaire is clearer than data analysis in Methodology. In our review, the method of data analysis in Methodology is complicated and it is time-consuming because we need to read the data word by word. On the contrary, reliability statist ics in second questionnaire is easy to understand by the reader and delivered the information to the audiences quickly without wasting of time as the table show the distribution of information separately. Conclusion In summary, we know that the author’s position that there are 3 important skills in leading an individual to a successful academic life. The authors have stated that a strong communication, leadership and entrepreneurial skills leading an individual to success in their academic life and it have been effectively supported. This article is successful although there are some flaws such as several grammars, spelling error, untidy references, omitting in numbering the questions, and also the over emphasizing some of the points but the author has elaborated the importance and integration of communication, leadership and entrepreneur skills by providing various of reference, making the article’s level of language is easy to be understood by university students, well prepared and analyzed questions, good method in presenting the data by showing the result of five-pint Likert scale in percentages and the information in articles are well delivered to the readers. The article has contributed in delivering an important message to the students that the keys of success in their academic life. Finally, the articles could help the university students and also working persons to have an idea how to get success in their academic life.Â