Thursday, October 31, 2019

Free to explore topics and thesis of your choice, but paper has to Research

Free to explore topics and thesis of your choice, but has to have very strong thesis - Research Paper Example To aid in this analysis, focus will be drawn on three films that have undertones of criticism of this particular educational system. These series are collectively known as the Yeogo Goedam I,II and III. Whispering Corridors is a series containing five movies that was first released on the 30th of May, in the year 1998. Being horror by genre, it came at a time when horror was not exactly popular and the teen films had dwindled to non-existence. The cast consisted of new actresses and actors save for a single who actor who played the part of a teacher. Whispering Corridors took a different turn from the conventions of serried films. This is because all of the each of the series is independent from the previous ones and the characters are new in all of them. The common thing between them all is that they are all horror and they are all casted in an all-girls boarding school. Despite the fact that it came as a far cry from the popular genres at the time, the audience’s response to it especially the teenage response, was very great. It was not released during the summer vacation as per the norms of teen movies, the reaction then had something to do with the context of the film. It did well in the box office having reached 2.5 million admissions. This success came after the producer, OH Ki-Min, had been turned down by over en production companies who did not see the place of horror in the Korean Film industry. It was finally accepted by Cine 2000 and Cinema Services who went against the odds of the industry and produced what turned out to be a benchmark for subsequent horror films in Korea. Notable though is the film’s lack of extreme emphasis on horror itself much as it is presented as a horror movie. What they do is employ the horror undertones as a channel of conveying various issues that affect the Korean society. This paper will focus on the first three of the series, that is, Whispering Corridors 1 (Yogo Kwedam I), Memento Mori (Yogo Kwedam II) an d Whispering Stairs (Yogo Kwedam II). Whispering Corridors 1, also known as Yeogo Goedam, touches on important social and cultural issues in its storyline, especially issues that border the unique South Korean educational system. The fact that it depicted the educational system in negative light made the film be subjected to rigorous censorship. After the ban on the censorship it was released for public viewing. It of course caused a stir upon its release but at the end of the day the message that was intended had been put across. The plot of the movie focuses on three platonic relationships between the girls who have some affiliation with the school, Jookran High School For Girls. The first friendship ties are between Hur and Jin-Ju. The second bunch of friends is Ji-Oh and Jae-Yi. The other one is between So-Young and Jung-Sook. So-Young and Jung-Sook, however, have such a strained relationship that they are not in speaking terms with each other. The movie opens with a female teac her at the school, Park, is talking on phone with another teacher about a discovery she has made on a former student of the school, Jin-Ju. Mrs Park has been nicknamed Old Fox due to her unkind treatment of the students who attended the school. She says that Jin-Ju, apparently dead, is back. She however gets killed before she gives a full statement of her discovery. Her body is discovered by three students, Jae-Yi, Jung-Sook and Ji-Oh, the following day. The administration

Tuesday, October 29, 2019

Explain the Impact of the Stanford Prison Experiment on Psychology and Behaviour Essay Example for Free

Explain the Impact of the Stanford Prison Experiment on Psychology and Behaviour Essay The Stanford prison experiment ,led by professor Philip Zimbardo, was aimed at seeing the effect on people on becoming prisoners or prison guards. The idea was to see what happens to people when they are put in relatively ‘evil’ places. Do the people themselves become evil or is there no net effect? The results indicated that in fact people adapt to their role exceptionally well. It was observed that the prison guards became overly tyrannical to the level of sadism. In consequence the prisoners were seen to be under severe stress to the extent that they became crazy or depressed. 24 volunteers were selected that had no psychological problems, health issues or any past crime accounts. They were brought to a mock prison set up in the basement of the Stanford university’s psychology building where they were randomly assigned to be prisoners or guards. 3 prisoners each were given rooms that they had to live in for 24 hours of the day and the guards were given 8 hour shifts to work in. The study was observed upon using cameras and microphones. They study was supposed to last for 14 days but had to be halted after 6 days due to extreme unethical practices in the prison. The Stanford prison experiment showed us that human beings alter to the situation they are put in. The guards won total control over the prisoners who blindly followed orders. All of this in just 5 days of experimental conditions. Zimbardo said that the prisoners had internalised their roles and thus continued to participate in the experiment on their own will. One example of this is when they introduced themselves to the priest with their serial number rather than their real name. Another example would be of the prison consultant who took on the role of an autocratic head of the parole board. After the experiment was over he was said to be disgusted at the person he had become. In essence there were two groups created among the volunteers, therefore, according to social identity theory ,people in the in-group would exhibit in-group favouritism and a sense of discrimination of the out-group. This can explain the unanimity between the guards themselves and their certain dislike towards the inmates. To further build on this ,the idea of the prison guards being a group may evoke the feeling of anonymity, which would allow the guards to be more free and aggressive as they could shake off responsibility for their actions. This is called deindividuation theory. It may be a cause of the violence occurred on the prisoners by the guards as there is a diffusion of responsibility. The Self-fulfilling prophecy states that when a person is given a label we often live up to that expectation. In the same way ,as the volunteers were given labels, they tried to live up to that expectation and thus acted in the way they thought they should. Furthermore it can be said that the volunteers had set stereotypes on the idea of a prison guard and prisoner. It can be assumed that these stereotypes illustrated the prison guards to be strong and authoritative. It could also be an illusionary correlation made by them through watching films or through media (which means that they attribute the behaviour of the prison guards to their disposition rather than situation :FAE). The theory of cognitive dissonance can also be used to understand why the prisoners and guards acted this way. They had to alter their mind-set(attitudes) to match with their behaviours so that there was no tension in their self identity. The situation put the prisoners in certain set roles that they tried to live up to and thus they changed their behaviour. This experiment along with Milligram’s shock experiment demonstrates the fundamental attribution error which says that there is a overestimation of dispositional factors and under-estimation of situational factors when we attribute. It changed the way we looked at psychology in a socio-cultural aspect. This experiment has helped us understand how good people do bad things such as the torture of Iraqi prisoners in the Abu Gharib prison, which was a real life example of the same results obtained by Zimabardo. It was also used to investigate matters such as prison riots and abuse of juveniles in many prisons. Young adults are also known to be power hungry. Their lust for power might have changed the way they would have normally behaved. The prisoners were made powerless and thus started to behave in such a way. They became depressed ,helpless and unstable. Thus it can be said that power also affected their behaviour. In relation to gender I believe that there would not have been much difference in the experiment as people, male or female, tend to have similar schematic processing when it comes to social perceptions of a certain group or individuals. If conducted with only females it is more likely that there would have been lesser violence as it has been researched that testosterone, which is much more predominating in males, is a cause of sexual arousal and aggression. Culture would not affect the behaviour as everybody needs some power in their life and if power is stolen from us we tend to become unstable. Lastly, it can be argued that all the volunteers of the experiment were college students. These students are more likely to be aggressive, as they would have higher testosterone levels compared to older guards in regular prisons. The volunteers were mostly white males who were on average ,financially stable, which when compared to regular prisoners would not equate well as people in prisons are usually financially unstable. It goes without saying that this experiment was extremely unethical. It did harmed the volunteers both physically and mentally as they were put under severe stress as well as physical torture. Their consent forms were not complete as it id not involve the details of the experiment. The volunteers did not know what they were getting themselves into , for example strip searched which is a violation itself. They were also ,without prior knowledge ,arrested. Zimbardo himself became the super-intendant and did not abide by his role as a psychologist ,which should have been the case to have an unbiased study. The experiment had no controls and thus is therefore severely criticised. Therefore the validity and ethics of this experiment, relating to its method are questioned. In conclusion, the experiment was a path breaking exercise that opened our eyes to show us the vulnerability of our race in terms of conformity and how we adapt to our situations especially when it comes to the fight for power.

Sunday, October 27, 2019

Risks and Benefits of Modern Technology

Risks and Benefits of Modern Technology The Internet and other emerging technologies have been a source of help to organisations in the modern time. It could be argued that having a form of modern technology is inevitable in the bid to remain competitive. Information Technology industry and media commentators claim that businesses stand to gain many benefits from use of the Internet. There is no doubt that the internet has transformed the way organizations operate at present, not only do these improve processes, financial benefits are also increased. While successful examples of companies using the net have been widely reported, few studies have seriously examined the issues involved. However, there is always a flip side of the coin in everything, as the internet and the other emerging technologies have their benefits to organizations. There are also the disadvantages. This paper will seek to analyze both sides in detail and put forward possible solutions backed up by research which will reduce the risk of digital business. George (1988) defined Emerging Technology as science based innovations that have the potential to create a new industry or transform an existing one. They include discontinuous technologies derived from radical innovations. Examples are bio therapeutics, high-temperature super conductors, MRI imaging, Touch screen kiosk and the Internet. The Touch Screen Kiosk is a new java-enabled technology. Touch-screen kiosks go beyond the capabilities of a traditional time clock in that they are true information appliances. They provide a bridge between the organization and the workforce, both capturing workforce information and extending organizational information back to the employee. A kiosk-based solution for time, attendance, and labour tracking also offers organizations a tool for empowering employees with self-service. With the touch of a finger, employees can view Internet-enabled applications that display their schedules, vacation balances, and corporate messages or allow time and labou r data entry. Workforce management can now be a two way street. (Rizzo, 2001) The Internet started in the 80s and since then it has had a drastic impact on culture, commerce and business and due to the speed, litheness, and effectiveness that it offers, it has become the means for accomplishing a growing amount of business between suppliers and large international companies. With this, the Internet has created new business to developing countries and has hastened the distribution of knowledge throughout the world of business. It thus creates unprecedented opportunities for developing countries because it can remove barriers thereby fostering full participation in the new global economy. Some organisations use the internet for almost every part of their organization such as buying and delivery of goods, stock control, manufacture arrangement, communications plans, sales programs, service departments and support programs. The change from traditional communication channels such as salespeople, telephone and snail mail to the internet and e-mail happened quickly i n some companies. However, this transition took place slowly in others. (McKenna and Bargh, 2000) Emerging Technologies have instigated a new transaction method that decrease costs, hastens the pace at which transactions are carried out, and supply acces to new markets, new customers, and new business relationships of all kinds. Even with all these benefits that the internet has brought to the business world, there are still a lot of risks involved such as fraudulent transactions, scams and more. This research would explain all these risks and benefits in detail. The Internet has enabled business to go far beyond previously set or imagined boundaries. Today, change is constant, its speed is accelerating, and its global impact is felt everywhere. While the Internet offers many potential benefits, there are a number of unresolved issues in conducting business on it. Despite recent advances, security remains the most fundamental concern and the main reason why companies hold back from full use of the net (van Kirk, 1994; Baron, 1995). Iver (2003) explains that online business is an infinite term about the different business procedures that plan to assimilate the merchants with the consumers and suppliers using the Internet. The whole procedure of putting up a website, helping the potential customer steer through the site, showing them the accessible products, offering cut rate and coupons and doing everything possible to persuade the potential customers and changing them into customers, comes under the process of e-business. He further went to discuss about Electonic commerce which is a compartment of e-business and is defined as online business that can be accounted for in financial terms. For instance, paying for goods and products with credit card by the consumers or shopping and paying online are examples of electronic-commerce. E-commerce could be explained as the last phase of e-business which involves the payments of the products sold by the organisation. The use of the internet has several disadvantages when conducting business transactions. According to Iver (2003), the main disadvantage of online business is the poor growth rate in certain segment on account of goods. For example, the food sector has not profited in terms of expansion of sales and resulting profits generation due to some certain reasons like food products being an unpreserved item. Customers hardly search for food products and items on the Internet because they rather go to the stores to purchase the required product when it is needed. It is also very easy to go into the online business as almost everyone has a laptop and is connected to the internet. This gives room for fraudulent activities since there isnt proper security in place to monitor the number of people that develop shopping websites. Trust is also a major issue in online business because any problems with your business website will be immediately be obvious to the world and the customers typically have little loyalty. Due to competition, once your website is unavailable, customers will simply move on to one of your competitors. In addition, technical failure can also have a significant impact on a companys key trading partners. Sid (2007) also discussed about the disadvantages of online business based on internet services and trust issues. Internet Technology According to Sid (2007), he discussed about the disadvantages of practising online business. The first point is that the website of the business must keep functioning at all times; this is the equivalent to a physical store staying open. If an Internet business goes offline due to technical issues, it can cost them profit; therefore, it’s essential to either have the technical skills or have someone in the company that possesses the technical skills to keep the company functional at all times. Trust Sid (2007) also explained about the behaviour of people shopping online. In many people’s minds, purchasing products over the Internet is still not as safe as purchasing products in stores. Since people cannot see the person on the other end of the computer, they might have issues purchasing products. This is also dependent upon the products and the sector. Lacking consumer’s trust can significantly impact sales and overall success. According to Lewis (2002), internal network protection will be a big issue for the organizations that wish to offer their services to Internet-using customers around the world. Hackers and other internet criminals can infiltrate company files and infect them with a virus, which is then sent to other computers to infect them. If the networks are not secured such people could also find important information about the company. Newly publicized weaknesses in the basic structure of the Internet indicate that the worldwide computer network may need a time-consuming redesign before it can be safely used as a commercial medium. Lewis (2002) further went to explain about how hackers can easily get access to different companies and can cover their traces without any major concerns. They like to trade data illegally and sell data to the hacker community. Calling-card numbers from long distance telephone service providers, cellular service activation codes, stolen credit-card numbers, security-p enetrating algorithms and pirated software codes are among the data most frequently traded on the Internet. Hackers might also bombard a company with thousands of mail messages using automatic remailer tools. The posting of messages can knock out communications at a critical time in a competitive situation and even firewalls cannot protect a company well against these attacks. Jerkins (1995) explained about Information security which is based on three foundations: Data integrity A company must be sure that its data have not been changed. Confidentiality of data Companies have to be able to keep to themselves what they do not want others to know, such as their customer database, credit card numbers, etc. Authenticity Companies need to be sure that messages they receive from the Net are from the people they claim to be. If any of these factors can be infiltrated by hackers, the company is no longer secure.Another risk is the increasing number of information brokers who use online communications to match buyers and sellers. Criminals always seem to always have an edge over law enforcement agencies.An online Internet organization also faces other challenging risks. Cafasso (1996) explains the case of staff members that always download adult material from the internet and go further to show them around in the work environment. This can create a hostile working environment and employees that view the adult material might feel sexually harassed within the company and could press charges. The company will have to ensure that employees cannot download such media files or other offensive materials from the Internet. It will have to develop strict guidelines to protect its own interests and the uncontrolled surfing habits of its employees.To do business on the Internet successfully, companies will have to en sure that the customer is indeed the person he or she claims to be. Verification and confirmation, written with an e-mail system, will work well enough for the time being. The advantages of using the internet or emerging technologies were explained by Iver in 2003. Worldwide Presence According to Iver, 2003, this is the major benefit of transacting dealings online. An organization using e-business can have a countrywide or a global presence. For example, IBM was one of the first firms to start practicing e-business to service customers and work in partnership with business associates all over the globe. Dell Inc. also had a prosperous business selling computers all over the US, through the telephone and the Internet till 2007. Amazon.com is also an accomplishment story that assists customers buy globally from third parties. Hence, global presence is guaranteed if organizations reorganize their business by using the Internet. Cost Effective Marketing and Promotions The use of the web to advertise products ensures global reach at a small price. Advertising techniques like pay per click advertising guarantees that the promoter only pays for the advertisements that are really watched. Affiliate marketing, where customers are directed to a business portal because of the efforts of the affiliate who in turn receive compensation for their efforts meeting with success, have emerged on account of e-business. Associated marketing has assisted both the business and the associates. Organizations making use of e-business have handled to use cost effective online advertising strategies to their advantage. Developing a Competitive Strategy Organizations need to have a competitive strategy over their rivals because without an effective strategy, it will be difficult to sustain the advantage and make proceeds. The strategy, that the organization can chase, can be a price strategy or a differentiation strategy. For instance, till the year 2007, Dell Inc. was selling PCs only through the Internet and the phone. It took up a differentiation strategy by selling its PCs through the internet and personalizing its laptops to meet up with the requirements of the customers and it really helped their profits. Thus, engaging business online resulted in Dell Inc. being able to acquire a large sector of the market by making use of the differentiation strategy. Better Customer Service Iver (2002) explained that doing business online has produced an improvement in customer service. Occasionally, when going through a website, the customer is always met by a pop-up chat window. Readily available customer service may assist in encouraging the customer to know more about the product or service. Furthermore, the products can be paid for online and can be shipped to the customers home. Internet services allow for asynchronous interaction and provide convenience for the client. The Web also makes access to people in remote areas feasible. This assistance, says Snow (2001), is able to bridge distances and help overcome a wide assortment of isolation economic, physical, emotional, geographical. Doing business on the Internet will become even more essential in the future. More organizations will have the right to use to the Internet and, with the price of communication reducing; more customers will come to the Internet as well. The Internet offers remarkable possibilities and could, in the long run, surpass conventional distribution channels. It is very simple to get connected to the Internet and people can browse and shop on the Internet 24 hours a day, if they want to. The Internet offers an exceptional way to get in touch with the customers on a one-to-one basis. Better emerging technologies will help organizations to represent themselves better and sell more products. So for people to keep enjoying the benefits on the Internet, it is important that the security issues must be addressed. Security on the Internet is a very vital issue, and some good solutions are beginning to form. Organizations that use the internet often need to protect themselves in three major areas: data integrity, confidentiality of data and authenticity. It becomes more and more key to avoid hackers from stealing or tampering with data stored in organisations systems. This can be done by installing firewalls or routers. When data travels on the Net, it is normally intended to be read only by sender and recipient, which can be ensured with encryption systems. Finally, an organization wants to be sure that the parties it is communicating with are really who they claim to be. Authenticity can be obtained with digital signatures. Doing business online involves some risks, like any other business transaction. But if attention is devoted to installing secure procedures, it is no more risky than other business practices. Since security is essential in online business because of all the risk involved, one of the major organizations that provide such security for banks and other large organizations that deal with online business is Panda Security. It is one of the major leading IT security providers and an antifraud service for doing business online to guard against identity theft through malware attacks targeting banks that operate online, platforms for payment and electronic-commerce. This procedure advises companies when there is a targeted attack and provides the gears to spot and obstruct affected users which reduce any possibility of online fraud. This solution allows banks and organizations providing online services to ensure that customers initiating businesses on their websites are not contaminated by any malevolent code that affects the service. They can see the security status of their customers and efficiently supervise the danger involved in online business. This radically reduces the poss ibility of fraudulent actions. The benefits that this service offers organizations include: Reduction of online fraud Panda Security for Internet Transactions provides tools and information to stop fraudulent activity. Organizations are instantly notified whenever there is a new malware attack targeting their customers, and delivered the information needed to respond in time. Organizations will see how the malware operates and how they can protect themselves. They can prevent infected customers from accessing their website, reducing the effects of online fraud. Control and management of threats to online transactions This is the only service on the market offering information about the security status of clients. This can be used by an organization to create risk profiles, meaning the service can be configured to restrict the permission to carry out transactions to those clients that meet pre-determined security requirements. Expanding business thanks to improved security Users lack of confidence in online security is one of the prime reasons for their reticence to use Web services. This tool reduces online fraud and allows companies to offer clients a secure environment for online transactions For the business community, the Internet is a new limit, offering matchless prospects for development and growth. Organizations can provide their services throughout the world, with the variety of services multiplying daily. It is also obvious that the advantages of using the internet and other emerging technologies for business is by far more than the disadvantages so organizations would continue to use them and keep trying to find ways to reduce online fraud and scams. Practising online business involves some threats just like any other business deal. But if concentration is dedicated to installing secure measures, it is no more dangerous than other business practices. As a matter of fact, it is not safe for your organization not to be represented on the Web if you are related to the technology industry in any way: the Web will be the first place prospective customers will look for you, expecting to find you there. There are unique opportunities on the Web for marketing a companys services, selling products and gathering information. References BBC (1999), â€Å"Internet scam file†, BBC On-line Network, 7 April,news.bbc.co.uk/hi/english/business/your_ Brewer E. (15), â€Å"Internet flaws a setback for commerce†, New York Times Personal Technology. Cafasso, R., When security isnt what it seems, Enterprise Systems Network Management, March 1996, pp. 72-84 Cyber-Smut: Regulating Obscenity on the Internet; Kaplan, Rebecca Dawn Stan. L. Pol’y Rev.; 1998 Vol. 9, p189, Edward Rizzo 2001 Emerging Technologies and the Internet Enable Todays E-Workforce http://community.19actionnews.com/_zhangyan-has-added-Advantages-of-E-Business/BLOG/2275620/2165.html http://www.abestweb.com/forums/showthread.php?goto=lastpostt=103922 http://www.buzzle.com/articles/advantages-and-disadvantages-of-e-business.html http://www.ehow.com/list_6023059_disadvantages-e_business.html http://www.marketingservicestalk.com/news/pan/pan113.html http://www.pandasecurity.com/virus_info/exports/rss/pandaes.xml Jenkins, L., Doing business in a global marketplace: secure electronic commerce, Ciphertext The RSA newsletter, Vol. 3 No. 1, Winter 1995, pp. 1, 8. Jim Drinkhill, 2001, Journal of Financial Crime, Computer Fraud, Vol. 4 No. 3 Lewis, P. (22), â€Å"Security of personal data is lost in cyberspace†, Computer Information Systems. McKenna, K. Y. A. and Bargh, J. A. (2000) Plan 9 from cyberspace: The implications of the Internet for personality and social psychology, Personality and Social Psychology Review, Vol. 4, pp. 57-75. money/newsid_313000/313051.stm. SEC (1998), Internet Fraud: How to Avoid Internet Investment Scams, US Securities and Exchange Commission, Washington, DC, October, www.sec.gov/consumer/cyberfr.htm Sid, J. (2007), World Wide Web Marketing – Integrating the Internet into Your Marketing Strategy, John Wiley, New York. NY Snow, S. (2001) Is Online Counseling Ethical? Available: http://www.commcure.ethicsonline.html. Accessed Aug. 26 2003.

Friday, October 25, 2019

Use of Interpreters in Psychological Therapy with Deaf Patients Essay

The use of psychological therapy or what is sometimes called â€Å"talk-therapy† has proven to be an effective and worthwhile resource in countless lives in America. For most hearing people, once the decision to seek help is made, it’s a simple matter of showing up to a therapy appointment or walking into a clinic and asking for help. However, for the Deaf culture finding accessible and Deaf-friendly services, can be a challenge producing little results. One way this issue is currently addressed is through the use of interpreters who help facilitate communication between a hearing professional and Deaf person. Therefore, the ideas discussed, reviewed the benefits and challenges of using interpretation when a Deaf person seeks counseling. The objective was to examine what role an interpreter may play in the process, in addition to the communication aspect between the hearing and Deaf. The goal in any therapeutic setting is to assist a client with gaining effective tools to have a healthy, meaningful life, provide emotional support and offer advice. Therapy does involve â€Å"†¦transition and change, which can be anxiety producing for any client† (Williams and Abeles, p 645). In addition to expressing feelings, needs and experiences, communication can and is being expressed through non-verbal queues, whether the individual has the ability to speak or not. Examples of non-verbal queues could include: posture, strong emotions, and rate of breath. These language queues are common to people, however the use of sign language is not universal language. â€Å"While it would be ideal to be able to match deaf patients with therapists fluent in their preferred language mode, this is often not feasible in smaller centers† (Porter, 1999, 163). Counselors seek... ...he Deaf and hearing (Williams, Abeles, p 643). A common mistake in mental health is assuming deaf clients are poor candidates for psychotherapy. By understanding the specific issues and working with Deaf interpreters, this service can remain a powerful stepping-stone in the rehabilitation of the Deaf seeking help in mental health services. Works Cited McCay Vernon, APA for Deafness, American Psychologist, November 2006 Porter, A. (1999). Sign-language interpretation in psychotherapy with deaf patients. American Journal of Psychotherapy. 53, 2. Health Module. Pg. 163. Sheridan, M. (2009) Bookreview of Cognitive-Behavioral Therapy for Deaf and Hearing Persons with Language and Learning Challenges. Williams, C. and Abeles, N. (2004) Issues and Implications of Deaf Culture in Therapy. Professional Psychology: Research and Practice. Vol 35, No. 6 643-648.

Thursday, October 24, 2019

National and Global Finance Essay

1. Choose an example of a type of new company you could start, and then use this company idea to answer the questions below. You might choose a pet store, a restaurant, a tutoring business, or something else. This can be the same type of company you chose in assignment 8 or 9, or it can be different. a. Describe the type of business you chose. (1-2 sentences.) -A grocery store. b. Describe at least two ways in which the local, state, or federal government would have an impact on your business. (2-4 sentences.) -The state government would impact my business’s profit because we have to pay taxes for what we sell. -The federal government would impact my business because I would need to make sure that my store is up to safety standards by the CPSC. 2. Describe at least one advantage and one disadvantage of price ceilings and price floors. Do you think price ceilings and floors are more helpful or more harmful to consumers and the economy? Explain. (2-4 sentences. ) -One advantage of the price ceiling is that people won’t be paying outrageous prices for things they need, one disadvantage is that they could be set too low for the company to make enough money. I think that the floors and ceilings help the economy and are more helpful for the consumers, if there were none, then a company could charge 10 dollars for a gallon of gasoline, which would cause people to not want to buy gas, even though some people are paying that amount, a lot less people would be buying gas so the company, economy, and consumers would all be hurt. 3. Describe at least two negative outcomes of having too little money and credit in the economy. (2-4 sentences. ) -It makes it so that banks can’t lend out as much money, if there is no money to be lent out, entrepreneurs can’t make investments and people can’t buy things like houses as easily, this causes a cycle where  the economy grows slowly 4. Describe at least two negative outcomes of having too much money and credit in the economy. (2-4 sentences. ) – Inflation happens, that’s when the value of the dollar raises, not everyone gets higher wages when that happens, but things end up getting more expensive, causing consumers not to buy stuff. 5. Which Fed tool do you think is most important, and why? (2-4 sentences.) -Probably the Reserve Requirements, if they didn’t have that the bank would be able to screw the government and anyone who uses the bank. 6. Choose one of the following government agencies or laws: FTC, EPA, FDA, CPSC, OSHA, FLSA, EEOC, ADA, SEC, or Affirmative Action. Search online to learn more about the agency or law, and then describe three specific things the law or agency accomplishes. Make sure the information comes from a trustworthy website. Include a link to the website in your answer. (3-6 sentences.) -The EPA is all about helping and protecting nature and our selves, they have passed many laws to keep us safe. Some of these laws include: C.A.A., or the Clean Air Act. This is a Federal law they passed to make sure we’re not releasing too much emission into the air, or releasing really bad things. Another law they have passed is the C.W.A., or Clean Water Act, this is also a Federal law, it protects our water systems from getting infested with pollution and toxic chemicals, without this we could lose our fishing locations and fresh drinking water. The last law they have passed that I am going to share is the E.S.A., or better known as the Endangered Species Act, this is a lot like the other two acts, but specifically targets endangered species from going extinct. Whether they’re plants, animals, or aquatic life, this law protects species in low numbers from being hunted, destroyed, or sought after. 7. Describe  at least two products that are commonly imported into the United States. (1-2 sentences.) -Oil from the Middle East is often imported to the U.S., another product that is commonly imported from other counties is a lot of different foreign cars and car parts from companies like Toyota. 8. Describe at least two products that are commonly exported from the United States to other countries. (1-2 sentences. ) -Aircrafts, a lot of military and commercial planes & helicopters are exported from the U.S. to many different countries. 9. Why does the U.S. government encourage U.S. companies to sell their products in other countries? Explain how this helps the U.S. (2-4 sentences.) -It does so because the more U.S. products going to other continents and nations the more tax money comes in for the U.S.; the more tax money, the better our economy does. 10. Find the value of one U.S. dollar in a foreign currency. You might choose the Euro, the Japanese Yen, the Canadian dollar, or another currency. List the type of currency and the current value of the U.S. dollar in that country. – $1.00 USD has the buying power of â‚ ¹59.28 INR (Indian Rupee.) 11. Describe at least three exchange rate factors that are likely to attract foreign investors to a country’s currency. Explain why these factors are attractive for foreign investors. (3-6 sentences.) -Inflation, they want the inflation to be low so that the can sell their products for higher prices to the U.S.A. Another thing investors don’t want is an unstable country, whether that’s political or economic troubles. The last thing investors want is a high interest rate, if the interest rate in China is 15% and in the U.S. it’s 9%, then that company will probably want to invest with a company in China because they will receive more money in return for their loan.

Tuesday, October 22, 2019

Fahrenhiet 451 essays

Fahrenhiet 451 essays 1.Montag is a very easily influenced and changing person. Even such a seemingly insignificant person such as Clarisse had the most profound affect on him. One Second he his following the path of his society, and the next he his starting to doubt his ways after a few chats with a young girl. In the beginning of the book Montag is described in dark and gloomy tones, but at the same time is described with the fire symbols, which foreshadow the changes that will be taking place throughout the book in Montag. Montag starts out a very gloomy and thoughtless person that conceals his unhappiness with a mask just going through life like he has been told do all his life. As the story goes on and he talks to Clarisse he starts to change. He begins to drink the falling rain, which represents that he will be reborn in a sense that his views will change. He starts to look at the stars, not just for fun because he his becoming confused about what he needs to do and is looking for guidance which he finds in Faber. In the very end of the novel Montag jumps into the river not only for the obvious reason to escape the hound, but most importantly to show the reader that Montage is beginning a new life. He will never have the same securities, easiness, or comforts that he has experienced for his whole life until now. Montag, instead of being described in, is now realizing the darkness and chaos that everybody is consumed in. The whole book, from cover to back, is filled with changing symbols and colors that are used to represent Montag in that point in time of the book. He is never the same person at any time in the novel. ...