Thursday, December 26, 2019

British Petroleum ( Bp ) - 2547 Words

BP is a British multinational oil and gas company; whose headquarters is on London. BP developed its reach in America by buying up companies like Standard Oil of Ohio, ARCO and Amoco (Tharoor). â€Å"Twenty years ago, BP was nothing like the powerful multinational corporation it is today† (PBS: Frontline). BP became this powerful company by using an ideology known as â€Å"run to failure.† In other words, use things until they break in order to save money (PBS: Frontline). Over the years, many oil companies have faced legal problems regarding the meeting of environmental standards, most notably was British Petroleum (BP). In recent memory, British Petroleum (BP) has been facing troubles year in and year out. In 2005, an explosion in Texas City†¦show more content†¦It brought BP a lot of assets† (PBS: Frontline). The BP refinery in Texas City extends over â€Å"two square miles on the outskirts of Galveston† (Schorn). The BP refinery in Texas City is the third largest refinery in the United States. The Texas City refinery had been known to have significant problems and was known to be a dangerous place to work. In other words the refinery was falling apart (PBS: Frontline). On March 23, 2005, 15 people were killed and 170 were injured in an explosion at BP’s Texas City refinery (Schorn). â€Å"It was the worst workplace accident in this country since 1989† (Schorn). BP, like Amoco, considered replacing an antiquated blowdown drum used to collect gasoline. However, BP decided to bank a saving of $150,000 and just repair the blowdown drum, because â€Å"capital expenditure was very tight† (Schorn). According to many experts, this savings was the direct cause of the 2005 explosion. On March 23, 2005, BP employees began restarting a unit that had been down for repairs. The blowdown drum began to fill with gasoline, but it overflowed and sent a geyser of gasoline into the air (PBS: Frontline). The cloud of gas created from the drum was ignited by an idle truck. The blast that followed destroyed several office trailers full of workers parked nearby (Schorn). After the blast, several investigations were performed by Chemical Safety Board and Secretary of State James Baker to discover the cause of the explosion. The investigation

Friday, December 20, 2019

Bayesian Evidence Synthesis And Decision Modeling For...

Bayesian Evidence Synthesis and Decision Modeling for Non-Alcoholic Fatty Liver Disease Summary The World Gastroenterology Organization (WGO) has recently declared NALFD as most common cause of liver disease. Obesity is an increasing problem not only in the UK but worldwide. An estimated 26% of the adults in the UK are considered to be obese 1, 2. Obesity induced metabolic syndrome may lead to NAFLD, which can progress to Nonalcoholic Steatohepatitis (NASH), and in turn to advanced fibrosis and an increased risk of Hepatocellular Carcinoma (HCC) 2, 3. Background Recent increases in the prevalence of obesity induced metabolic syndrome (MetS) resulted in an upsurge in the global incidences of both Nonalcoholic fatty liver disease (NAFLD)†¦show more content†¦Apart from their clinical implications, the current economic burden of NAFLD/NASH on the health care system is substantial. A recent study analyzed outpatient resource utilization in the United States (US) observed an increase in annual inflation adjusted total NAFLD/NASH outpatient charges from $2,624 in 2005 to $5,132 in 2010 7. A simulation study estimated $103 billion ($1,613 per patient) annual direct medical cost attributed to NAFLD, which further increased to $189 billion upon including societal cost 8. In the UK, the total annual cost of NAFLD is estimated to be  £31.26 billion, of which,  £5.24 billion is in direct cost 8. With the manifold health consequences of metabolic syndrome are projected to considerably increase in the next decade, the clinical and economi c burdens of NAFLD/NASH are bound to surge in upcoming years. Research Problem NAFLD is the hepatic manifestation of the metabolic syndrome (MetS). However, little is known about the natural history of NAFLD. Furthermore, the pathophysiological relationships between MetS and hepatic steatosis is not fully understood. The diagnosis of the MetS involves the presence of three of the following five risk factors: 1) hyperglycemia (fasting glucose ≠¥ 100 mg/dL), 2) low concentrations of high-density lipoprotein (HDL) cholesterol ( (-- removed HTML --) than 150 mg/dL), 4) increased waist circumference (102 cm for men and 89

Wednesday, December 18, 2019

Othello Essay - 629 Words

â€Å"Othello†, by William Shakespeare, is a story of jealousy’s potential to manipulate thoughts and eventually lead to ultimate demise. The key to extremely detrimental jealousy lies within one’s ability to recognize it or deny it. It seems that the important theme of â€Å"Othello† is that if jealousy is not recognized and immediately dealt with, it receives a head start to commence the process of rotting away all normal human reason. Othello’s speech in Act III scene iii beginning with line 178 is the first and most important indicator of the trouble ominously looming on Othello’s horizon. His immediate response to Iago’s accusations is that of total denial. By depriving himself of that initial venting process, Othello gives his jealousy the†¦show more content†¦He goes from one end to the other and back again. One must ask them self how Othello could possibly go between such extreme views. He does this as an overview of t he entire act. Doubting himself in the beginning, Desdimona in the middle, and both in the end. Through this speech, he also allows us to see the magnitude of the mental stress that Othello is undergoing, which is essential in qualifying Othello as a tragic tale and not just that of an imbecile. Without understanding the inner mechanics of Othello’s mind, one could never hope to fully understand the level of stress that he underwent. Following is the essential connection between this speech, the act, and the whole of the play: Othello finds something out, doubts Desdimona, doubts the information, and then finally coming to rest at a place that is just slightly more confused than the position in which he began. As a rule, Iago tells Othello some juicy little tidbit. Othello then becomes unimaginably stressed and vents his rage. Luckily, Iago is always present to comfort him with the intent to not get beaten up while further increasing Othello’s doubt. Once he has calmed Othello down externally, he drops another bomb on him further pushing him to the edge of reason. It is a vicious cycle that produces intensifying degrees of fear, doubt, and confusion with each loop. Even the times during which Iago has Othello calmed at the surface, the scale of doubt is always beingShow MoreRelatedOthello: Othello a Tragic Hero1478 Words   |  6 PagesOthello: Othello A Tragic Hero If one reads Shakespeares Othello, they can come to the conclusion that it might be one of the his most tragic plays ever written by Shakespeare. Romeo and Juliet, is probably the most famous of his tragic plays, but Othello, has characteristics that, I think make it even more tragic then his other plays, and therefore for that reason, you can say that Othello is the most tragic hero. Othello is a noble man, one who has grace with the ladies but also possessesRead MoreOthello And Othello By William Shakespeare Essay1304 Words   |  6 PagesDesdemona?† they ask. The differences that separate Othello and Desdemona do not perturb them, but are starkly obvious and unnerving to the judgmental citizens of Venice. While it was certainly rare in the 16th century for couples to have such disparities in age, social position and race, none of these differences diminished how Othello and Desdemona felt for each other, yet each spurred external obstacles that threatened their relationship. While Othello and Desdemona are separated by a considerable ageRead MoreEssay General Othello in Othello1267 Words   |  6 Pages   Ã‚  Ã‚   William Shakespeare gave us a most moving drama in Othello. In this play we witness the demise of a â€Å"paragon† of a wife and a â€Å"valiant Moor†, Othello. Let us consider the Moor in detail, with professional critical input, in this essay. From the text of the play a number of clues can be gleaned which round out the description of the general. In William Shakespeare: The Tragedies, Paul A. Jorgensen describes the general in Othello: Though scarcely the â€Å"barbarian† (1.3.353) he is calledRead MoreOthello s Othello By William Shakespeare848 Words   |  4 Pages Desdemona’s Passivity [In the Shakespeare’s play â€Å"Othello†] Desdemona is a passive character in the Shakespeare play â€Å"Othello†. We can identify this as a fault in Desdemona, in various acts and scenes throughout the play. A critic had stated that â€Å"Desdemona is passive, acted upon rather than acting.† This is a valid statement which is noticeable in Desdemona’s character. When Desdemona argues Cassio’s position that Othello stripped from him. We see from this that she could have actedRead MoreOthello s Othello By William Shakespeare897 Words   |  4 PagesIago’s main reason to denigrate Desdemona’s character is his love for Othello. Consequently, he will do anything to gain Othello’s admiration. When Iago is putting his plan into action and planting in Othello’s mind that Desdemona is not faithful to him, Iago says: Othello kneels .............................................................................................. IAGO: Do not rise yet. Iago kneels Witness, you ever-burning lights above, You elements that clip us round above, Witness thatRead MoreWilliam Shakespeare s Othello And Othello Essay1282 Words   |  6 PagesOthello speaks to Iago in Act Three of the play saying, â€Å"certain, men should be what they seem† (3.3.131). This excerpt foreshadow events in which Othello will begin to question the actions and morality of Cassio and Desdemona, all orchestrated by Iago’s scheming nature. This is a very important concept to showcase because Othello devoutly loves Desdemona and trusts Cassio until conniving language from Iago causes him to think otherwise. Drawing on Shakespeare’s source story by Cinthio and otherRead MoreOthello By William Shakespeare s Othello1209 Words   |  5 PagesOthello Down Shakespeare s Othello comprises of the subjects betrayal, affection and dishonesty. At the focal point of this play is the lamentable ruin of Othello because of his so-called friend Iago. In this paper I will be examining the explanations behind and against Othello being in charge of his defeat through taking a gander at critical interpretations of his character and activities. Othello was profoundly in charge to his own destruction as Iago demonstrating to him to be gullible andRead MoreOthello By William Shakespeare s Othello Essay1230 Words   |  5 Pages Previously, in Act 3.4, Othello begins to suspect Desdemona’s loyalty, as he continuously asks Desdemona for the handkerchief, yet she keeps on changing the topic. In Act 4.1, Iago continues to convince Othello of Desdemona’s faithfulness. In Act 3.4, Othello defended Desdemona when Iago accused her; but in Act 4.1, their position is switched. Othello becomes more aware of what Iago is saying and the anger that he has towards Iago has significantly reduced, while he begins to doubt Desdemona.Read More Free Othello Essay: The Disintegration of Othello590 Words   |  3 PagesDisintegration of Othello nbsp; nbsp;nbsp; Shakespeares Othello is a play with unique characters. One such character is the one for which Shakespeare names his play. In the play, Othello disintegrates from a confident leader to a homicidal murderer. Linguistic changes throughout the play attest to this theory. nbsp; In the opening scenes, Shakespeare portrays Othello as a noble character. When Brabantio seeks vengeance (for stealing his daughter) on Othello, Othello expresses his actionsRead MoreMusical Characterization For Othello s Othello997 Words   |  4 Pages Musical Characterization for Othello In Verdi’s Othello, the music is used by Verdi to characterize each character in the opera. It is the music who describes the audience the personality traits of each character. Moreover, music accompanies every scene in the opera. In many cases, we can know what is happening or what the character is feeling through the music the orchestra is playing. This is an innovative way to characterize the characters in an opera used by Verdi that do not fit into the

Wednesday, December 11, 2019

Professional Report Criminalizing Hacking

Questions: Discuss about the Professional Report Criminalizing Hacking Should be Encouraged to Enhance their skills. Answers: Introduction The following topic deals with how Hacking can be used as a medium to help others rather than destroying the lives of others. The world today is fully digitalized. The most frightening thing that anyone can dream of in this world is someone stealing away all his/her data with a blink of an eye over the internet. Hacking is defined as breaking into the personal space of individual without their consent. It can be used either to help humankind or to bring the world to its knees (Taylor et al. 2014). There are many forms of hacking but the most common are the White Hats and Black Hats which are basically two sides of a coin. Ethical hackers are the ones who work for government and maintain their sites and protect others from sniffing (Trabelsi and Ibrahim 2013) (Behera and Dash 2015). Black hats are the ones who try to get into the system to steal the data like banks and government sites. Hacking was first used to find the flaws or vulnerabilities, while setting up a system but later it tuned to harm others (Berger and Jones 2016). There are many instances where hacking is meant to destroy an organization but also there are many instances where hacking is used to counterpart that. Hacking Hacking is a process in which someone tries to access computers or networks without any authorization. Hacking is the attempt to coup a computer system or a private network (Behera and Dash 2015). The term Hacker is referred to a person who is having a deep knowledge about computers and who uses this skill to commit any crime which often damages organizations or spread viruses or even can cause financial loss (Taylor et al. 2014). They are highly skilled people as it takes a lot of talent to cease a system than to create it. A hacker tries to get inside a system by using that systems vulnerabilities as its main course of weapon. Figure: Classifications of Hackings (Source: Berger, H. and Jones, A., 2016) Ethical Hacking Ethical Hacking is usually performed by an individual or group of people who helps the government or an organization to find the flaws or limitations which could have been bypassed (Berger and Jones 2016). Ethical hackers help the government or any organization to protect its data from any outer source (Prasad 2014). Reasons to Enhance Ethical Hacking Ethical hacking can be advantageous in various forms. The advantages of ethical hacking are- Hackers are defined as the person, who digs out information in a form or the other (Behera and Dash 2015). The most advantageous factor of hacking is that it helps us to get great protection form thefts. Thefts are very common now a day and they can happen online as well as offline. Hackers steal information (Regalad et al. 2015). If an organization is planning to be secure from the theft of their information then they can schedule regular ethical hacking exercise to find out whether there is any flaw in their system. This reduces the vulnerability of their system and makes it secure form the outside hackers (Prasad 2014). Hacking is responsible for the growth of bugs in the software thus making the software weak (Verma and Pathak 2014). This in turn, can be used to make the software even more powerful and less relevant to bugs and viruses. Thus, an organization can ask a professional hacker to test hacking the software to test if the software is strong enough. Hacking can help a nation to be secure. A nation can spy or monitor the activities of other nation to be ready for any type of ill- action by the opponent nation (Juneja 2013). This way hacking can be helpful to get early information about the activities of any country and thus it can be very helpful to increase the security of any nation (Engebretson 2013). Today we have so many anti-virus applications to fix our pc, laptop and various other devices if viruses or worms (Trabelsi and Ibrahim 2013) attack them. This is the result of hacking as the companies today are aware of the level of hacking and thus they manufacture even strong anti-viruses to keep the device secured from the attack of viruses (Juneja 2013). Being good at hacking can help a person be excellent at programming as hackers are said to be outstanding programmers. If a person or a student is aware of the security threats and weakness, that hacking can cause to the system then it will be very helpful to enhance his/her programming skills (Verma and Pathak 2014). Hacking can be helpful to get protection from the lawsuits. Lawsuit is a claim brought to law for adjudication. With the help of ethical hacking, such lawsuits can be prevented. The advancements of computers has increased due to hacking as the softwares are made powerful enough to kill the bugs and thus they are more useful (Regalad et al. 2015). Hacking is stealing sensitive information from an organization. A country can make its information more secure and safe if regular hacking test is done to check whether the information is safe from the hackers and attackers of other nations (Trabelsi 2016). Ethical hackers who work as the security professionals, they keep on checking their system and network using the same tool that a hacker may use against the network or to compromise the network (Jones 2015). Unethical Hacking Unethical hacking is the type of hacking done with malicious intentions. Hackers often use this tier of hacking to break into systems or networks to steal confidential data, money or to plant a virus or worm, which can seriously affect the system and in extreme cases. It may collapse the whole system or network (Behera and Dash 2015). The person who performs this act is often called the Cracker who is described as the malicious meddlers who sniffs into the computer to steal the data. Types of Hackers There are seven categories of hackers. They are Figure: Classifications of Hackers (Source: Prasad 2014). Script Kiddie Script kiddies are the ones who have less information about hacking, all they do is just copy a used code and make a virus out of it or and SQL injection. They do not code from their own, they just download the used code or software (Metasploit) and refer to some YouTube video on how to use that. They are mainly famous for doing DoS or DDos attacks which floods an IP with numerous request, which collapses a server (Prasad 2014). White Hat These are known as Ethical Hackers who usually work for an organization or government and help them find any flaws (Chowdappa, Lakshmi and Kumar 2014). Black Hat They are known as Crackers and they hack into the computer systems or networks to make the lives of common people more difficult. Their main intention is to steal money, data or even some confidential data. Grey Hat These are the type of hackers, who are not black hats but still they do not work with any government or organization (Regalado et al. 2015). Green Hat These are the hackers who are in their beginning stage where they care about hacking and even dream of becoming a renowned hacker. They mostly spend their time in the community learning from the professionals. Red Hat These are similar to white hats as they try to put an end on the black hats but they are too frightened to do as on those who are in this field for a long time. Instead of reporting, they shut down the computers by uploading a virus or by the means of DoS. They cannot perform any penetration testing on any computers (Chowdappa, Lakshmi and Kumar 2014). Blue Hat Unlike the script kiddie, they are only focused on taking revenge on those who means harm to them (Prasad 2014). Unethical Hacking example Twenty thousand internal emails were leaked due to an attack in the Democratic National Committees server on the eve of Democratic convention. In a separate attack, Democratic Lawmakers mobile phone number and other personal information was leaked from the committee of Democratic Congressional Campaign (Ft.com 2017). A group goes by the name Hackappcom breached the security of Apple iCloud and leaked all the sensitive photos of celebrities and spreading it all over the internet. It was performed by using a key which all users had to enter that and by entering that, they were made victims and the hackers gained their access to all the Apple products like the iCloud, iBook and many more (Ft.com 2017). Another instance is the hacking of the European Commission where they all got the mail that they are under attack and after that for several hours; the internet was down (Eder and Eder 2017). The biggest of threats that have been reported till date is that attack of Mirai malware. It spreads to all the unprotected devices if any like the web cameras, routers, phones and modems and turn them into bots which can do anything the hacker wishes to. The hack conducted was the DDoS attack. In this type of attack, the server is flooded with multiple requests hence it forces to shut it down. The attack conducted took 620 gigabytes of data every second from all parts of the world (Mail Online 2017). The first appearance of ZeroAccess rootkit made its way in the year 2011 infecting about ten million computer systems worldwide. The main purpose of the root kit was to target a computer system remotely, infecting it with the virus in order to control them from far away. It was designed so cleverly that the trace of the attack is still unknown. After the rootkit affected it, botnet would have been installed on that system. About 1.9 millions computers were affected by the year 2013. The main way of attacking using the botnet was by DDoS attacks in which the victim computer is flooded with several requests, which put the system out of service. Still some components of the rootkit are operational and are still affecting many computers worldwide. Live example There are numerous examples where ethical hacking was of great help in enhancement of the security. Such examples are- The United States Air Pressure used ethical hacking and conducted a security analysis of an operating system. In that process, they were to check the flaws in the software such as faulty software program, vulnerable program and procedural security. It was kept in mind that even a relatively low degree of attempt, the intruder might fly away with the precious information and their security might get bypassed. Moral hacking could stop such thing. The person who was in-charge of this job (a hacker), treated the system as if he was the actual enemy of the organization and he tried every possible way he could to break the systems security and to interrupt the system. This way the systems security could be judged. At Philadelphedia U.S.A, in the year 2014, Heartbleed flaw was a defect in the openSSC cryptography, which was discovered by an ethical hacker Neel Metha who worked for Googles security team. Jack Whittion of U.K, in the year 2013 found out a bug in the system of facebook that would let any generous hacker with a phone to take over users account. He discovered it when facebook invited him to find the flaws in their system. Jared DeMott of Michigan, U.S.A was awarded third in the blue hat competition arranged by Microsoft. He was rewarded because he found out bugs in the coding done by Microsoft experts and also bypassed all of their security measures. This is a great task done by him as it asks a lot of talent to bypass the coding done by experts. Conclusion Hence, from the above discussion it can be said that enriching ethical hacking can be very fruitful if chances are given. Hacking is very powerful tool if used positively as it can help an organization know about the flaws and limitations in their security systems and to secure the system. Hacking must not be treated as a criminal offense but it should be brought up positively and hackers should be encouraged to become the white hat hackers as they can be of great help to a particular organization as well as the whole nation. Several examples have come up which prove that hacking can be beneficial and it should not be treated as a criminal activity. References: Behera, M.P.C. and Dash, M.C., 2015. Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System. Berger, H. and Jones, A., 2016, July. Cyber Security Ethical Hacking For SMEs. InProceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society(p. 12). ACM. Chowdappa, K.B., Lakshmi, S.S. and Kumar, P.P., 2014. Ethical hacking techniques with penetration testing.International journal of computer science and information technologies,5(3), pp.3389-3393. Coleman, E.G., 2013.Coding freedom: The ethics and aesthetics of hacking. Princeton University Press. Eder, F. and Eder, F. (2017). Hackers attack European Commission. [online] POLITICO. Available at: https://www.politico.eu/article/hackers-attack-european-commission/ [Accessed 6 Feb. 2017]. Engebretson, P., 2013.The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier. Ft.com. (2017). US confident that Russia directed hacking attacks. [online] Available at: https://www.ft.com/content/ab3c8610-8cc6-11e6-8cb7-e7ada1d123b1 [Accessed 6 Feb. 2017]. Jones, D.A., 2015.An Examination of Penetration Testing (Ethical Hacking) and Delivering(Doctoral dissertation, Cardiff Metropolitan University). Juneja, G.K., 2013. Ethical hacking: A technique to enhance information security.International Journal of Innovative Research in Science, Engineering and Technology,2(12), pp.7575-7580. Mail Online. (2017). Security experts warn of online attacks after hackers publish bot code. [online] Available at: https://www.dailymail.co.uk/sciencetech/article-3819882/Are-risk-Experts-fear-spike-hacking-code-used-one-largest-cyber-attacks-history-released.html [Accessed 6 Feb. 2017]. Prasad, S.T., 2014. Ethical hacking and types of hackers.International Journal of Emerging Technology in Computer Science Electronics (IJETCSE),11, pp.24-27. Regalado, D., Harris, S., Harper, A., Eagle, C., Ness, J., Spasojevic, B., Linn, R. and Sims, S., 2015.Gray Hat Hacking the Ethical Hacker's Handbook. McGraw-Hill Education Group. Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014.Digital crime and digital terrorism. Prentice Hall Press. Trabelsi, Z. and Ibrahim, W., 2013, March. Teaching ethical hacking in information security curriculum: A case study. InGlobal Engineering Education Conference (EDUCON), 2013 IEEE(pp. 130-137). IEEE. Trabelsi, Z. and McCoey, M., 2016. Ethical hacking in information security curricula.International Journal of Information and Communication Technology Education (IJICTE),12(1), pp.1-10. Verma, V., Pathak, A.A., Bathini, D.R. and Pereira, A., 2014. EnterAll InfoSec Solutions: Growing an Ethical Hacking Business.

Monday, December 9, 2019

Document Question The Russian Revolution And The free essay sample

Document Question: The Russian Revolution And The New Soviet State 1917-1929 Essay, Research Paper 1 ) a ) Document A refers to the grain ictuss of 1918. ? The term? radical enthusiasm and subject? refers to the manner in which Lenin and his Bolsheviks wish the actions to be carried out. ? He expects his fellow companions to be enthusiastic about working for the good of the province and to be disciplined and focussed on their task. ? However, this order was given shortly after the revolution and hence, the Bolsheviks are naming a political commissar ( a Bolshevik ) to guarantee that his chap? companions? who are non yet used to the communist manner, execute their actions in the right mode. ? The order therefore expects the requisitioning squad non to transport out their actions with? radical enthusiasm and subject? and therefore the assignment of a political commissar. B ) Document C refers to the jobs of War Communism. ? The infusion? Trotsky was the first prominent Bolshevik to accept publically the demand to abandon requisition? refers to manner in which Trotsky in February 1920 was willing to travel against the party and Lenin? s policies in order to accomplish the best for Russia. Trotsky realised before many other Bolsheviks that the policy of War Communism was neglecting although he was non the first to make so. ? His prominence within the party and his function in the civil war gave his word weight when he spoke up against the policy. ? It was a realization on his portion that the state needed Reconstruction and War Communism was non the best manner to supply this. ? Trotsky, ever the radical, wanted alteration in order to accomplish improvement.c ) Document D refers to the replacing of War Communism with the New Economic Policy. ? The phrase? in order to beef up the peasant economic system? refers to one of the key purposes of the policy. ? The thought of the new revenue enhancement in sort was that the authorities received income in order to better the state, nevertheless, the Bolsheviks had realised that the provincials were motivated to work merely when working improved their existence. ? For this ground, they were allowed to work every bit small or every bit much as they wanted provided revenue enhancements were paid to the government. ? This debut of capitalist economy into a communist society was designed in such a manner as to convey about betterment in the provincial economy. ? The thought was that the more money the person provincial made, the more economically comfortable the peasant category as a whole would go taking to an betterment in the Russian economic state of affairs as a whole and hence, organizing a critical portion of the station 1920 reconstruction.2 ) ? War Communism was clearly an unpopular policy in contrast to the relatively successful New Economic Policy. Documents A and B trade with the panic and force used by the requisitioning squads in obtaining grain from the alleged greedy Kulak category which was supposed to be keeping back grain from the people. ? Similarly, Document C attempts to explicate in depth the features of War Communism. ? This beginning is peculiarly valuable to us in measuring the jobs with War Communism in comparing with? Lenin? s New Economic Policy ( NEP ) . ? It is clear from the first three beginnings that the Bolshevik? s, fresh to authorities as the rubric of these paperss tells us they were, began by implementing really idealistic Communist ideals. ? Document C shows us that non merely did the new Bolshevik authorities effort to censor all private endeavor and nationalize all industry but they besides attempted to take money from the new communist system altogether. ? However, Lenin? s claim that such steps were necessary for the civil war in Document E is non wholly undue as much of the province industry was wholly geared towards contending a successful war. ? Furthermore, the panic under War Communism was necessary whilst contending the war in order to stamp down all possible rebellions against the Bolsheviks from within Bolshevik controlled district whilst the war was being fought. ? On the other manus, by February 1920, as Document C tells us, a new and contrasting policy was being thought up. ? The policy of War Communism, partly necessary for the war and partly due to the idealistic and partly na # 207 ; ve policies of the new Bolshevist authorities, was replaced by the NEP in order to be the? footing on which Reconstruction could be achieved? ? as Document C says. It is clear from Document E that Lenin? s determination to change his policy was due to the fact that War Communism was non a policy that could be pursued during peacetime. We besides learn in Document D that Lenin realises that economic prosperity could non be achieved under the idealistic values of War Communism. ? ? ? ? ? ? ? ? ? ? ? ? The first three beginnings are concerned chiefly with the mistakes of War Communism although Document C subdivisions briefly into the NEP. ? These show some of the attitudes that came with War Communism. ? The Kulak category, a category of wealthy, greedy provincials was ruthlessly persecuted under War Communism and all signifiers of Capitalism was discouraged, whereas in the concluding two beginnings we see that under NEP capitalist economy was actively encouraged in order to promote economic prosperity. ? Furthermore, the attitude towards larning from other capitalist provinces has changed, it is clear from the foremost three beginnings that War Communism was a policy interrupting off from convention whereas in Document E, Lenin actively encourages larning from others: ? ? ? ? ? ? ? ? ? ? ? ? We must non be afraid of larning from businessperson specializers, merchandisers and capitalists. ? ? ? ? ? ? ? ? ? ? ? ? However, even in the NEP we see a continuation of some of the War Communism manner policies. ? In Documents C and D, the aggregation of a revenue enhancement in sort suggests that much of the green goods will travel to the State and the State will still play an indispensable function in the twenty-four hours to twenty-four hours running of the state but to a lesser extent. 3 ) ? ? ? ? ? ? ? ? Document Bacillus as a pictural papers can be considered as art and therefore is, to a limited extent in this instance, open to the reading of the viewer. ? Different persons may see this beginning in a different light. ? It is clear that this beginning is a piece of propaganda used by the Bolshevik authorities to present a negative image of the Kulak category. ? The simpleness of the graphics is designed specifically so that everyone can understand what the Kulaks are making i.e. stashing up grain and acquiring fat and rich. ? This beginning is evidently highly biased towards the communist authorities and against the Kulak category of peasants. ? The beginning as a piece of grounds is limited in its historical value in so far as it is an inaccurate artistic feeling of what the authorities wanted its people to believe. However, it is an interesting piece of historical authorities as it shows that attitude of the Bolshevik authorities under Lenin towards the greedy billboard of the Kulak class. ? It is unknown whether the Kulak category did in fact exist in Russia, and we can non state whether Lenin and the Bolsheviks really saw that Kulaks as the kind of people portrayed in this picture. ? However, we can state that this is how they wanted them to be portrayed and this is the value of Document B as a piece of historical grounds. ? ? ? ? ? ? ? ? ? ? ? Document D is likewise a piece of historical grounds necessitating careful analysis. ? As a edict published by the All-Russian Soviet Executive Committee published in Pravda, the Bolshevik party newspaper it is clearly valuable in so far as it is a directing direct from the government. ? It is clearly a directing explaining and pardoning authorities policy and therefore must be taken as a colored piece of historical propaganda and it must be realised that anything published in Pravda will hold been censored and it will take the authorities line on an issue such as the NEP. ? The decree clearly pigments the NEP in a really positive visible radiation and it is hard to judge its relation virtues from this article. ? However, some facts sing the NEP can be ascertained such as the fact that limited sums of capitalist economy are to be reintroduced. ? Therefore, as a historical beginning it can be utile in so far as it nowadayss some of the facts sing the debut of NEP into the new Bolshevik government. ? However, it must be weighed up carefully as it places the NEP in a really positive visible radiation and will surely refer to none of the possible jobs or harmful side effects that the new policy may bring. ? In this manner once more, Document D is a utile beginning in so far as it is a piece of colored writing. ? 4 ) The policy of War Communism was introduced by Lenin one time power was seized in 1917. ? The policy was captive upon the debut of an idealistic Communist manner authorities into Russia at the same clip as contending a war. ? The ground forces drained the resources and were it non for the effectual repression of the Cheka, the new authorities would about surely have been overthrown. ? The jobs with the new system were twofold. ? First, War Communism was an idealistic policy based upon Marxist teachings. ? When these thoughts were put into practise, Lenin and his Bolsheviks found that they led to the prostration of industry and agribusiness due to a deficit of production as there was no inducement for people to work. ? Ideal thoughts such as the abolishment of currency were unsuccessful in practise. ? It was the passage between being an idealistic, radical resistance party and being a successful authorities that, in portion, caused the jobs with War Communism. ? In short the Bolshevik party had no experience and no thoughts of how to run a state, they turned to their cardinal beliefs in Marxist political orientations merely to happen that in practise these excessively were impractical and failed to take into history human nature. ? However, there naivete can non be blamed wholly for all the jobs of War Communism. ? The famishment of the people owed more to the civil war than to uneffective government. ? The civil war meant that productive countries were lost, many husbandmans and workers were conscripted to contend and so in 1919 two tierces of all the on the job yearss available were lost. ? The towns depopulated as people went hungry and as the ground forces drained the state of supplies, those who were non contending found endurance was tough. ? War Communism was designed partly as a agencies to prolong the Bolsheviks whilst contending the civil war and in this regard it was successful, nevertheless, from its abysmal failure, the Bolsheviks learnt much about communism and its mistakes in practical government. ? It is unsurprising so that Lenin, purpose upon care of power instead than prolonging ideological authorities changed his thoughts to let a limited sum of capitalist economy into his system. Lenin, as shown in Document E, realised that his policy had been an low failure, he acknowledges in this beginning that the war has ruined Russia and for this ground he is willing to let a limited sum of capitalist economy and is willing to larn from other more experient systems in order to retrace Russia under Communist rule. ? The Kronstadt Sailors originating against the Bolsheviks, of whom they had antecedently been passionate protagonists, in 1921 was the concluding straw that forced Lenin to gain the harm War Communism was causing. ? Despite the bloody repression of this and other rebellions, the loss of loyal protagonists forced Lenin to do the realization expressed in Documents D and E. ? It was in fact Trotsky who foremost realised the obvious jobs with War Communism in February 1920 as shown in Document C. ? It was a presentation of Trotsky? s powers of persuasion that within a twelvemonth the New Economic Policy had been introduced. ? ? ? ? ? ? ? ? ? ? ? ? The NEP was introduced because of the failure of War Communism. ? It was a realization on Lenin? s portion that it would take clip for a Communist system to be introduced and the people must first acquire used to socialism before communism could be brought about. ? Lenin here continued the procedure of forging Marxist theory into his ain system of practical authorities. ? Lenin was far more concerned about the care of power than the rigorous application of Marxist doctrine. ? In his measure allowance of limited capitalist economy he showed is willingness to adapt in order to accomplish betterment. ? As Document C says: ? ? ? ? ? ? ? ? ? ? ? ? By the beginning of 1920 the clip had come to see the footing on which Reconstruction could be achieved. ? ? ? ? ? ? ? ? ? ? ? ? It was for the good of the state and for the care of power that Lenin abandoned War Communism and replaced it with the NEP. ? Lenin was willing to abandon his communist political orientations to let the state a limited sum of take a breathing infinite and to do economic recovery possible.

Wednesday, December 4, 2019

Selling Coffee on Sundays for Adam and Virginia - myassignmenthelp

Question: Discuss about theSelling Coffee on Sundays for Adam and Virginia. Answer: Introduction The given case deals with the business of a coffee shop named as Cartagena which has been opened by Adam and Virginia. The various financial details of the business are provided. In the wake of the same, one of the objectives is to compute the accounting profit and economic profit. Accounting profit refers to the profit which is computed by taking only the explicit costs i.e. the cash outflows which have actually been incurred as a result of the business activity. However, economic profit refers to the profit which takes into consideration not only the explicit costs but also the implicit costs particularly opportunity costs. Further, the above profits need to be determined before and after the penalty cut rates. The penalty rates refer to the higher than normal rates which need to be provided to employees which tend to work on public holidays and weekends. Additionally, sunk cost refers to the cost which has already been incurred and cannot be recovered irrespective of the decision made. Further, another useful concept is the price elasticity of demand which essentially captures the percentage change in quantity demanded when the percentage change is price is one. For elastic goods, the price elasticity is higher while for inelastic goods, the price elasticity is lower. Based on the above concepts, the given business has been analysed to highlight the underlying profit and underlying dynamics particularly related to product demand and average cost. The findings of this are presented as part of this report. Analytical Development The first objective is to compute the accounting and economic profit before and after the penalty rates are cut in accordance with the various costs that have been outlined in the given case. From Table 1 (Appendix 1), it is apparent that accounting profit for each Sunday before the penalty rates are cut amounts to $ 8,100. Further, Table 2 in Appendix 1 highlight that the economic profit before the penalty rate cut is lower at $ 5,800. This is because the opportunity cost associated with loss of salary by Adam and Virginia coupled with loss of rent from shop has also been taken into consideration. Further, in accordance with Table 3, it is apparent that the accounting profit remains the same even when the penalty rates are decreased as the increased savings in employee costs worth $ 1,000 is spent in the form of celebration, thus implying that the profit remains the same. Further, Table 4 highlights the economic profit after decrease of penalty rates and it has increased to $ 6,200 primarily due to lower opportunity cost associated with Adam and Virginia not working at another coffee shop on Sunday. The average cost can be computed by dividing the total expenses with regards to coffee by the number of cups of coffee produced each Sunday. Before, the penalty rates are cuts, the total expense on copy including machine rent, employee cost, other expenditure and cost of selling coffee, the total expense amounts to $ 3,900. Hence, the average cost of coffee comes out as $ 0.975[1]. However, when the penalty rates are cut, there is a decrease in the employee cost by $1,000 and hence the total coffee expense would be reduced to $ 2,900. It is noteworthy that the amount spent on celebration to the tune of $ 1,000 would not be considered as a coffee related expense. Thus, the average cost of coffee comes out as $ 0.725[2] The sunk cost relates to their own salary which they made by working on Sundays. Before the penalty rates are cut, the sunk cost attributed to each of the two partners would be $ 400[3] each assuming 10 hour work shifts. However, after the penalty rates are cut, the sunk cost for each of the partners i.e. Adam and Virginia would get reduced to $ 200[4] each. Based on the information provided in the case, it is known that if the price is increased from the current price of $ 3, the quantity demanded for coffee from that particular case would become zero. As a result, the price elasticity of demand would be (- ) infinity as the sales are extremely sensitive to price. If a particular shop intends to sell it at a price more than $ 3, no customer would buy the same. Clearly, there is no incentive to lower the price and hence the demand elasticity for coffee is (-) infinity indicating. Adam and Virginia are not irrational since if they increase the coffee production, then owing to the increased supply and constant demand there would be a decrease in the market price which would lead to lower prices being charged by the coffee shop. This would not be in the best interest of the business. Conclusion Based on the above discussion, it may be fair to conclude that since the total cost remain the same before and after the cut in penalty rates, hence accounting profit does not alter but the economic profit increases after the penalty rate cut. Further, the business incurs less average cost after the decrease in penalty cost which leads to higher margins. Besides, the demand for coffee in the context of the Cartagena caf is highly elastic which is reflected from the very high magnitude of price elasticity i.e. infinity. Also, it is noteworthy that the decision taken by Adam and Virginia to limit the supply to 4000 cups a day is a rational one as with the increase of supply and lack of commensurate increase of demand to absorb this extra supply, there would be lowering of coffee prices which would not be positive for the coffee business. Also, the difference between the economic and accounting profit has been clearly inferred considering the importance of implied cost (such as opportun ity cost) for the former which ensures that former would never exceed the latter.

Monday, December 2, 2019

The Constitution Of The United States Was Written To Correct Weaknesse

The constitution of the United States was written to correct weaknesses in the Articles of Confederation. The articles were introduced in 1777 and this gave the power to individual states. The problem of the Articles of Confederation was that it limited the power to central government. This meant that the congress had no power to tax. The congress gave all the authority to the states over and left it with no power over the nations economic affairs. The main weaknesses of the Articles of Confederation are that it legislated for states but not for individuals. Congress had no power to tax or regulate trade. It lacked power to control commerce. And it was too difficult to change any of the articles. Then the Constitution was put into place 1787 to overthrow the Articles of Confederation. The Constitution put far more powers into Congress. It gave the congress power to tax, borrow coin money, regulate commerce and raise armed forces that were needed. Most of the power came in the expense of the states, which were no longer allowed to pass tariffs or issue money. The government got the right to declare state laws unconstitutional. But the Constitution did not leave the central government too powerful. They put internal and external restraints on the government. The Constitution divided the government into three branches the executive, legislative and judicial. This was set so that no one part of the government can have too much powe r. It was a system of checks and balances where one branch can check on the other. The Constitution granted power on taxes and armed forces, gave the power to states and government instead of just to the states. Changed from a bicameral from a unicameral system. Originally every state had equal representation but the bicameral system sets up two houses. The Senate and the House of Representatives. The Senate gives representation to the states and the House of Representatives gives membership that depends on population in interest to people. And to the amendment process under the Articles of Confederation it was almost impossible to change anything. But it was changed to a three-fourths vote by the states. Which makes the amendment process easier. The Constitution establishes an office for the president and establishes a Supreme Court. There have been times were people have contested the Constitution and it has proven to be successful. Amendment two says that we have the right to bear arms. And our individual rights as people we are guaranteed it by the Constitution and it cannot be taken away from us. In 1973 a court case Roe vs. Wade protected the women's right to have abortion. There are many examples where people who oppose them have put the rights we are given to the test. Our Constitution has withheld and that is why it has been so successful. The Supreme Court has enforced the Constitution for over two hundred years. It guarantee's us to life, liberty, and the pursuit of happiness. It says that the government does not control itself, that the people control the government. If government becomes destructive to the rights that we are entitled to we as the people can alter or abolish it.