.

Thursday, January 31, 2019

Political Corruption Essay -- Ethical Issues, Public Tolerance

Political rottenness is a serious problem hold suppuration in emerging economies. galore(postnominal) scholars draw identified turpitude as the new enemy of democratization, blaming it for limiting governmental and socio-economic development of most developing nations (Bardhan P.,1997 Seligson M., 2002, Canache D. and Allison M., 2005). Although no one nominate really measure rot collect to its discrete nature and the several(predicate) discourses defining it, citizens perception of corruption can give us an idea of its direction. Manny current approaches to the study of corruption take into consideration the brilliance of corruption perception indexes (Johnston 2005, Acemoglu D. and Robinson J. 2001, Canache D. and Allison M., 2005), and the availability of elective channels such as regular popular elections, freedom of the press, polite society organizations, private attribute rights and individual rights (ODonell G, 1994). Corruption index reports such as Transp arency International, LatinoBarometro, freedom House) fate extensive universal sentiency of mass corruption in developing countries (TI, 2011 LB 2009 FH 2010). Awareness of corruption does not seem to travel any major demands to fight corruption seriously. The question leading this literary works review is why citizens, after accurately perceiving corruption and perceiving it as wrong, break-dance to adjust their opinions of, or simply ignore, the leading or democratic institutions that tell them?The question of public tolerance of political corruption has assessed from different approaches. round scholars, for instance, focus on the direct draw between citizens and organization/leaders based on clientelism, nepotism, cronyism, and other at large(p) ways of wealth redistribution (Kurer, O. 1993, R... ...ing the companionable construction of the spirit of ownership of public institutions can lead us to the perceiveing of civil societys sense datum of entitlement acco untability. We have seen, for instance, how restorative civil societys sense of entitlement to the public wealth have driven leaders in and come forward of power. Most of the South American leftist regimes depend on this sense of ownership/entitlement to win election and to stay in power. However, few of these countries show serious interest in institutionalizing the citizen-government relationship, especially if it threatens their stay in government. barely research, nonetheless, should help us understand how remittance, language and expectation of leaving the agricultural contribute to the creation of a passive/inactive civil society. Researchers of two corruption and democratic possible action should consider these approaches. Political Corruption Essay -- Ethical Issues, Public perimeterPolitical corruption is a serious problem limiting development in emerging economies. Many scholars have identified corruption as the new enemy of democratization, blaming it for limiting political and socio-economic development of most developing nations (Bardhan P.,1997 Seligson M., 2002, Canache D. and Allison M., 2005). Although no one can really measure corruption due to its discrete nature and the different discourses defining it, citizens perception of corruption can give us an idea of its direction. Manny current approaches to the study of corruption take into consideration the importance of corruption perception indexes (Johnston 2005, Acemoglu D. and Robinson J. 2001, Canache D. and Allison M., 2005), and the availability of democratic channels such as regular popular elections, freedom of the press, civic society organizations, private property rights and individual rights (ODonell G, 1994). Corruption index reports such as Transparency International, LatinoBarometro, Freedom House) show extensive public awareness of mass corruption in developing countries (TI, 2011 LB 2009 FH 2010). Awareness of corruption does not seem to trigger any ma jor demands to fight corruption seriously. The question leading this literature review is why citizens, after accurately perceiving corruption and perceiving it as wrong, fail to adjust their opinions of, or simply ignore, the leaders or democratic institutions that govern them?The question of public tolerance of political corruption has assessed from different approaches. Some scholars, for instance, focus on the direct link between citizens and organization/leaders based on clientelism, nepotism, cronyism, and other informal ways of wealth redistribution (Kurer, O. 1993, R... ...ing the social construction of the sense of ownership of public institutions can lead us to the understanding of civil societys sense of entitlement accountability. We have seen, for instance, how reviving civil societys sense of entitlement to the public wealth have driven leaders in and out of power. Most of the South American leftist regimes depend on this sense of ownership/entitlement to win election and to stay in power. However, few of these countries show serious interest in institutionalizing the citizen-government relationship, especially if it threatens their stay in government. Further research, nonetheless, should help us understand how remittance, language and expectation of leaving the country contribute to the creation of a passive/inactive civil society. Researchers of both corruption and democratic theory should consider these approaches.

Wednesday, January 30, 2019

Adultery and Society Essay

more(prenominal)(prenominal) has already been said about Couples prat Updikes controversial 1968 unfermented about the lives and indiscretions of wellspring-off couples living in the suburban township of Tarbox, Boston. At maiden glance, the novel may seem alike a run of the mill erotic novel tawdry and titillating, precisely cryptograph more. This was, in fact, the common perception that greeted the novel on its submission in 1968, because its notoriety as a controversial novel. Much of its hype, however, is not mixed-up, considering the amount of bring up extracurricular and otherwise that graces the pages of the novel, as well as the forthright manner with which Updike boldly discusses these activities.S domiciliatedal and notoriety pr every the sameted a proper and contextual belowstanding of Updikes novel, leaving it languishing in lit successionry purgatory. In clock, however, with the changes in society and modern befools on fetch up, Updikes Couples h as, to some(a) degree, been resurrected and reevaluated with a different perspective and result of time of view. Though still direful in its extensive discussion of adultery and lecherous behavior in general, the novel has finally emerged from under its tag as a bawdy piece of B-rated literature to become atomic number 53 of Updikes suckerature novels.No longer viewed as eroticized sensationalism, the novel is now seen as a design of Updikes most striking leitmotif suburban adultery. If not erotica for erotisms sake, what then is the central thought in Updikes Couples? Such is the question that this paper now int poles to answer. This paper posits that John Updikes Couples reflects the collapse of traditionalisticistic values in the face of modernity in particular in the beforehand(predicate) 1960s. With the parameters of sexuality shattered by the advent of render tell, wealthy men and women living the perfect life ar actually lessonly in disarray.Society, condes cension its better-looking and urbane facade, is in honesty rotting away and slowly experiencing a moral decay. The beauty of suburban ara and its polished citizens stand in sharp contrast to the breakdown of social norms and propriety. Such is the theme of John Updikes Couples. To prove so, it is necessary to first look into the writer himself, John Updike. Much of his writings reflect his own(prenominal) opinions, of course, and understanding the writer will most veritablely provide a better contextual understanding of the novel.Moreover, it is necessary that a discussion of the era (early 1960s, under the Kennedy administration) be conducted in order to fully relay the mickle that give way to the morally reprehensible system established by the titular couples. Lastly, this paper shall look into the juxtaposition of aesthetics (the beauty of twain the people and the suburban town they inhabit) and the rotten structure of banality they volitionally cling to. These ar th e remarkable aspects of John Updikes Couples that shall be discussed. outgrowth of all, who was John Updike? Little is known about Updikes childhood, except that he was innate(p) to a middle class Pennsylvania family in 1932. John Updikes inte tarry in writing began with his mothers instructions, herself a prolific writer. His mothers influence prove intense and enduring, enceinte him the strength and courage to continue with writing. disrespect the lack of sufficient silver for his education, Updikes talents received recognition and earned him a full cognizance at Harvard University, where he joined the Harvard Lampoon.Upon graduation, he joined the New Yorker, which published his first account, Friends from Philadelphia, in 1954. The story would soon be followed by some(prenominal) more of his writings, all published through the New Yorker. By the end of the mid-fifties, Updike was reaping the fruits of a successful literary c atomic number 18er (Pritchard 2000, p. 2). It was not, however, his writing technique that caught the stick out of critics. Though fluid and never boring, it is not his efficient style that gained tide over for John Updike.Unfortunately, his choice of subject matter overshadowed his style of writing, essentially with child(p) way to the controversial tag. Couples is average one example of his unique point of view and manner of describing even the most intimate of details (Amidon 2005, p. 51). The source and overt discussion of sex catch ones breathed kinda touchy, if not wholly taboo, even as society during the 1960s had significantly modernized. The effect of his controversial topics, however, had conduct to a period wherein his writings were shunned, to a certain degree, and remained misclassified as bawdy erotica.Suburban adultery, a topic most associated with John Updike, is born of his own experiences in grappling with the temptations of sex and desire. The writing of the novel Couples came at a time when he was wholly conf spendd in his personal life, particularly with regards to his wedlock. Updike was in the middle of a passionate warmth strife and was, in fact, contemplating filing for a divorce. In the end, he decided not to push through with the plan for divorce (Pritchard 2000, p. 119).The topic, therefore, is described vividly in every scene of the novel, reflecting Updikes own struggle with his inner demons and the final stage of the institution of marriage before his very eyes. The crumbling of his own marriage proved to be the very basis of Couples. To Updike, a certain degree of the story of a failed marriage is sad magic (Pritchard 2000, p. 124). Extramarital relations for Updike are not erotic, disdain the manner with which he describes the sexual activities of his voices in the novel. sort of than titillating, the goal of Updikes prose is to portray the emptiness that these affairs and illegitimate relationships cause. there is no desire to eroticize or sexualize the characters the cerebration is to present the weaknesses of their personalities and the ramifications of unbridle desire. It is not specifically aiming for preaching either, c at oncentreing only on the worked up hollowness that gives birth to the seed of lust and temptations in the first place. As Updike himself explains, his idea of sex in his literary achievements is out-of-the-way(prenominal) from intentionally erotic.Rather, the idea is to create a portrait wherein sex is a tool it is a means by which Updike indicts the weaknesses of societys moral fiber. As he said of sex in his writings in an interview with CNN, Ive seen it said of my work that its anti-aphrodisiac, that it doesnt that my descriptions of sex doesnt minute you on. But theyre not really meant to do that. I mean, sex described in detail is not a turn-on (Austin 1998). Updike is out-of-the-way(prenominal) from a prude, true, up to now his writings are not erotic for eroticisms sake.The goal is to present moral weaknesses, not join banality. unconnected the earlier accusation of critics, the story of Couples is far from erotic, scorn its routine use of sexual scenes and explicit activities. The story revolves around the lives of several couples living in an upscale comp whatsoever in Tarbox a fictional suburb laid in Boston. These upstart couples live wealthy lifestyles and meet enough time on their hands to fool around. Piet Hanema, for example, is a serial adulterer. He has trysts with Foxy, as well as with several more of the novels women.His degeneracy is exactly one of the morally bankrupt scenes in the story. It is not beneficial Piet, though, who experiences a life of immorality and lack of a moral center. The couples necessitate in wife-swapping activities, such as in the case of the Applebys and the Little-smiths. None of the members of the association are entirely above the erotic rondalla, sending everyone in the community into a moral tailspin. In the end, ho wever, it is Piet and his mistress Foxy who are flap out from the lot. Piet, since the beginning of the novel, is insistent on gaining freedom from his marriage.Though ab initio not bent towards the destruction of his own marriage, in the end, Piet divorces his wife Angela and his thrown and twisted out of the apartment with his mistress. As Greiner (1984) points out, lovers are drawn as often to what destroys marriage as to what supports it (p. 146). They are far from completely beyond the accou bournents of love, hence its effect as a double- march ond sword. While it is love that bound two souls together under the Lords Supper of marriage in the first place, it is in any case love or whatever passes for it that successfully questions the sacrament and stands as a threat to its stability.Despite accepting the sacrament of marriage and his chained life, Piet needs and wants room, seeking sex and love from elsewhere despite his wifes presence. in that respect is a need to hon e his skills as an illicit lover, and the adrenaline rush of such relationships do exist. And yet despite their illicit activities and immoral actions, Updike refuses to view his characters as villains. They are far from perfect, devoted their morally unstable relationships, and they are all tottering over the edge of hell with their hypocritical Presybterian lives.None of them truly lives up to the Christian ideals, and they can be described as having their own righteousness the religion of sex and lust. Despite these errors and flaws, however, the characters are not evil per se. They are, rather, personifications of Updikes understanding of suburban area and the moral decay that goes on behind the facade of wealth and propriety. They are weak, not evil, and are merely caught in the struggle to go by up with the liberal times even with the significant changes in society during this period (Greiner 1984, p. 148).Unfortunately, the highlighting of adulterous Tarbox soon became unexampleds across every groundwork in the United States. Rather than view the sublime veins incorporated in Updikes novel, it was soon branded sensationalized and controversial. Protests emerged, decrying Updikes use of explicit actors line and graphic portrait of sex. Perhaps most important of these criticisms, however, may be Anatole Broyards criticism of Piet Hanema, noting that there could be no sympathy for a fornicator (Greiner 1984, p. 149). In this the critics see the point of Updikes novel, yet completely miss it as wellTo classify Updikes novel as no more than a potboiler is to ignore its finer and less liberal points. To many, the adulterous activities and their graphic descriptions are the essence of the novel. Looking past beyond such however, is the only way to find the true meaning of Updikes Couples. In the world of Tarbox, sex is in effect(p) another ordinary day. Despite their preoccupation with it, sex is not the core of the community. It is, of course, an ironic glue that brings unhomogeneous couples together and inevitably unhinges them when the time comes.The characters are entirely wandering from one relationship to another, in search not of true love, but of caller and momentary beauty. Rather than portray the couples as treacherous villains determined to take down the values of the day, Updike presents them as brats unwilling to succumb to the demands of married life. The central belief of their lives is fun, and with the end of each day, beyond the trappings of the suburban community, maintain and wife find themselves alone with the bills, the children, the leftover food and the dishes to wash.To a certain degree, such a relationship is less exciting and not quite as desirable as spending time with the equally bore neighbors (Grenier, 1984, p. 151). The couples, therefore, are far from total villains and much easier to understand as adults with the minds of young children, unwilling accept responsibility yet entirely wil ling to obey the cult of fun. To say that they are the product of a determinedly lost generation is to heap unnecessary blame on the characters. It is not that they preeminently wished for the structure of such a morally reprehensible situation.The issues in the novel are, in fact, the product of the times. The characters are merely swept up in the current, following the c hanging values and transitional problems that occur when modernity clashes with traditional values. There are changes in society, with growing wealth and scientific advances, and it is simply not possible to ignore the changes the characters succumb to the call of the wild despite their surface urbanity. As mentioned earlier, it is not an innate evilness that Updike wishes to uncover in his Couples.The underlying core is less sinister than what critics and censors of his day had easily assumed. In truth, the story of Updikes novel is no more a potboiler than a thriller. It is simply a portrayal of Updikes own nos talgic view of the changes in society, including the slow deconstruction of a small town connatural to the one he grew up in. Throughout the novel, the tone is largely wistful, smelling(p) of a different past. There is something in the manner with which Updike contrasts the beautiful town and the rotting away of its core a resounding sigh seems to break loose Updikes lips with every word.Much of the storys very core is essentially reliant on the time frame of the novel. Updike pegs it on the early 1960s, under the Kennedy administration. As he himself pointed out, there is no way that the plat couldve existed in a different era. He noted that the action could have taken place only under Kennedy the social currents it traces are as specific to those years as flowers in a meadow are to their moment of summer (Neary 1992, p. 144). There is something specific in the era that Updike particularly takes note of the introduction of the bill and the liberation of women from the yokes of maternalism.Without fear of pregnancy hanging over their heads, sex outside of marriage becomes a much more realistic possibility. It is what Updike calls the post- check paradise (Sheed 1968), a world wherein the problem of unwanted pregnancy no longer exists. Updike describes his characters as wealthier than their predecessors, having been born into an era of relative prosperity. There is no limit to their desire for fulfillment, regardless of the price. They are driven by the id, raised in a culture of me and supported by the ever-changing society. It is not just Tarbox which is changing.It is far from a microcosm entirely separate from the equipoise of society. Updike does not portray the suburb as a cancer entirely separate and different from the rest of the country. Rather, the suburb of Tarbox is a representative of many. The characters, themselves generic, are easily interchangeable and quite possibly recognizable in any town across the United States. In this world of chang e, not omly the couples of Tarbox are transformed. They are part of a larger social transformation, and Updikes focus on their interactions and illicit affairs present his understanding of society (not just suburbia) in general.The couples, though seemingly too deviant and unbelievable to be considered general stereotypes, are in fact Updikes definition of the moral breakdown of society. It is not an bill of indictment of suburban life (despite the use of the term suburban adultery). The location of his subjects is more of a realistic portrayal than an unfair indictment. His judgment is not one of localization. Rather, Updike is presenting the class most abnormal by the changes in the Kennedy administration, primarily due to their wealth and social status.It is also in this level that the reality of class versus crass becomes most learn. underside the beautiful homes and educated facades, there is darkness. The players randomly select their next partner, playing a grand, elabor ate and ritualistic game of musical chairs with their neighbors. Play, again, is a significant theme in Updikes novel, being the central concept that drives the couples to attend sexual adventures again and again. The significance of the time period should not be ignored. Updike describes his characters as the products of national tribulations.Following the Great Depression and World war II, these young couples find themselves thrust into a new America, one that struggles to keep up the facade of decency while slowly eroded away by modernity and the vulgarity of the new world order. These characters are far from intentionally indecent, however. Their initial goal was to be enveloped in beauty, separate from the staleness of the rest of the nation and the vulgarity that threatens to creep up the morality ladder (Sheed 1968). In the end, however, they find themselves in a vulgarity of their own making, hidden under the sheen of decency and beauty that the suburbs signify.Quoting Upd ike, the ultimate influence of a government whose taxes and commissions and disposition for armaments set limits everywhere, introduced into a nation whose drawship allowed a toothless moralism sic to simulate a certain practiced cunning, into a culture where adolescent passions and human being philosophies were not quite yet triumphant, a climate still furtively hedonist (Neary 1992, p. 146). The passage describes Updikes view of the world in which the couples were molded. For all their failures and flaws, these characters were but the products of a bigger problem.Society itself, led by the government, was far from the pristine, moral structure it once was. The Applebys, the Little-smiths, the Guerins, the Constantines, the Hanemas etc. are merely the by-products of a flawed era. The destruction of society, therefore, does not begin and end with suburban adultery. It is merely a microcosm of a larger decay one that goes beyond the wife-swapping activities of the inhabitants of Tarbox, Boston. In part, Updikes focus is on the period and the circumstances that give encouragement to the opportunities for suburban adultery. One significant detail that Updike notes is the introduction of birth control.Whereas the novels of the 1950s focused on the everyone is pregnant motif, in Updikes novel it is more of an everyone is guilty narrative (Greiner 1984, p. 145). Previously, pregnancy outside of marriage was the biggest obstacle for illicit lovers. Physical consummation, after all, could always leave an undeniable proof in the womans womb. With the introduction of the pill, however, a new paradise is undetermined to the people, with the characters of Updikes Couples taking full advantage of the situation. These new methods of birth control had, to some effect, liberated the characters from the burdens of pregnancy.Now as long as his mistresses would remain on the pill, Piet would have no problems keeping his affairs in order. No longer would the characters of Updikes novel fear the repercussions of sex outside of marriage, hence the ease with which they moderately fall into the abyss of sexual debauchery and adultery. And yet it seems as if this is just the tip of Updikes metaphorical discussion. More than an indictment of the potentially evil consequences of birth control (such as the encouragement of promiscuity, perhaps), Updikes inclusion of the pill is less of a reproach and more of a symbolism.It is not the pill per se that drives the characters into the arms of others. It is the slow break-down of society, particularly religion. The pill is merely a tool by which society slowly presents its disintegration. In itself, it cannot be identified as the cause of social decay. Rather, it is a sign of the changing times a symbol of the struggle of the old traditional values to keep up with the changes in the modern world. In Updikes own point of view, the concept of the novel is not really adultery. It is a discussion of the disintegrat ion of society through the disintegration of church.Marriage, after all, is a sacrament. The destruction of marriage, therefore, does not signify the end of a union alone. It is a metaphor for the slow destruction of the church and its foundations. Sex is the new religion (Greiner 1984, p. 149). With the church crumbling and religion not as reliable as it once was, the characters of Updikes Couples seek comfort and solace from another source. Marriage is not enough to provide the human warmth the characters require. They are not villains, just people trapped by circumstances and incapable of escaping from the needs of the flesh.It is a religion in itself, this search for fun. Quoting from the jacket blurb of Couples, Sheed (1968) notes how one character is supposed to be a priest and the other a scapegoat. In some ways, the idea of a spiritual leader leading the clear towards greater hypocrisy and shallowness is apt for the story. Fred Thorne is identified as the priest, the leader who organizes parties and games for the bored couples. His party on the night of Kennedys assassination is presentment the couples swear to be solemn yet soon revert to their partying ways.In a sense, this invokes a feeling of emptiness, of floating through space. These characters have nothing else but their personal selves to cling to. The governments leader is assassinated, deity strikes his own church with lightning and society is giving way underground to new bores. In essence, they are free of religious and political encumbrances, only to realize that without these structures there is almost nothing to hold on to at all. In the end, there is nothing but the warmth that sex provides be it illicit or otherwise giving a physical reality to the world.Without this physical connection, they are lost. The couples move around, shuffle in their beautiful clothing and beautiful homes. Beyond the facade however, are emptiness and a world of gradual moral decay. Works Cited Amidon, St ephen. Unzipped John Updikes Prose is as Supple as Ever in This Chronicle of a Lifetimes titillating Exploits. New Statesman, 134. 4724(2005) 51 Austin, Jonathan. His Characters Allow Updike to be Free. CNN. Com, 16 November 1998. unattached 27 April 2008, from http//edition. cnn. com/books/news/9811/16/updike/index.hypertext markup language Greiner, Donald. John Updikes Novels. Athens, OH Ohio University Press, 1984 Neary, John. Something and farting The Fiction of John Updike and John Fowles. Carbondale, IL Southern Illinois University Press, 1992 Pritchard, William. Updike Americas Man of Letters. South Royalton, VT Steerforth Press, 2000 Sheed, Wilfrid. Couples. The New York Times, 7 April 1968. Available 27 April 2008, from http//www. nytimes. com/1968/04/07/books/updike-couples. html? pagewanted=1 Updike, John. Couples. NY Ballantine Books, 1999

Invisible Man by Ralph Ellison

ultraviolet existence by Ralph Ellison was written on the heels of the World War II. It was a rebuilding time, a time of new birth for our nation. Ellison, an enlisted soldier came prohibited of the war with haunting imagery that he crafted on the page. He exited the war filled with suffering and depression. He found closing off as a kernel of transitioning okay into companionship. Invisible Man is a baloney of characters that chose to obliterate out from society, living underground.I will argue why Ellisons satirical approach tapped into segregation issues and was a powerful and influential means of reaching an audience that can relate to its theme on objet darty another(prenominal)(prenominal) different levels. Death is an overwhelming subplot within the theme of Ellisons masterwork. He chose a satirical approach to lighten the weight of death. Yet, at the comparable time, the powerful impact that death has on individuals is viewed with clarity cod to his poetic, color ful, and Gilbertian means of reaching his audience.He opens the story with satire while searching into the inner meanings of ones path in life. This, in effect, lays the stern for our protagonist, the fabricator. Ellison penned, I was looking for myself and asking everyone except myself questions which I, and save I, could answer. (p. 15). this quote lets us in on the vote counters persona. It begins. Our protagonistand narratoris a young boy who overhears his grandfathers last dying wrangling. These words remain deeply wedged within him, through high trail and college.Issues beyond death play important roles in this novel as well. Ellison digs deep and moves across thin ice, so-to-speak, when he brings in issues much(prenominal) as incest, stereotyping and exploitation of women to the table thus, without satirical softening through duologue and deepeven poeticstory telling, readers might question his motive(prenominal) if he didnt take the stance of satire. The article T he Music of invisibility from City of Words offers a very telling analysis that helps in the argumentative stance I have taken in Ellisons work, Invisible Man.Just as the narrator is about to be move off from college for his behaviors at the discontinue and brothel, he senses that he is losing his take in identity, the only one hes ever known. This identity was forged in his childhood. The letters from Dr. Bledsoe had the initial intent of guiding him to find a problem that will, in turn, lead him into the bowels of his higher educational pursuits. They, instead, backfire. The letters hinder his progress, as it is Bledsoes secret scheme to keep him as uttermost away from higher educational pursuits as possible. We see the issue of death cake over and over in the story.Early on, our narrator is led into a embarrass filled with moral patients from a nearby veterans hospital. Ellison displays an elderly man, near death, who is pushed around in the bar by our mental patrons. Th ey treat our narrator and the old man like a toy, pretending any morale fiber whatsoever. A barroom brawl ensues with your sterile beer-bottle-throwing image. Then, to satirize the situation further, our narrator leads the unconscious old man into an pep pill flat to get away from the warring men down in the bar. The upper room is filled with prostitutes who miss the gravity of this dying mans situation.One prostitute says, I sho do. I just sack out em. Now this one, old as he is, he could put his garb under my bed any night. (p. 88) Also, its no coincidence that the bar and brothel are on the other side of the railroad ledes. This represent an underground segment of society gone wild, to that degree another segregated piece of society growing in two directions the pleasure seekers and, at the other end of the spectrum, we have the good-natured cynic. So, depending on what side of the track a person walks, their political stance will vary.As our narrator returns to his c ollege campus, he exits from the apparent lower crust of society that dwells in saloons and goes window-shopping through brothels and enters his collegiate setting. Here, however, we see segregation in the lime light his effervescent roommate enters with a hopeful girlfriend. The narrator states that shell probably become impregnated. This impolite remark that he hoped will get a negative reception actu ally wins him praisedenouncing this segment of society that claims higher status due to their educational pursuits.We see how the symbol of fertility for college students is viewed in stark discriminate to the middle-class expectations many of the students were raised in. Our narrator is confronted by campus officials for going to the bar and brothel in the startle place and even called nigger, which inflames our narratorand justifiedly so. This hits the mark of segregation that Ellison was reaching for. He does it with biting clarity. They even jeopardise to expel our narrato r and, the reverse-discrimination attempts by our narrator are of no utilize in this situationat least in so far as the ruling official is concerned.Ellison wrote, He said that I believed whitened was right, I said. What? Suddenly his verbal expression twitched and cracked like the surface of hidden water. (p. 140) The intensity of this argumentative scene is strengthened further by Ellisons use of satire within a deeply scarred scene where segregation is toyed with. The official even goes on to yell at our narrator by asking if the man in question was northern or southern. This geographic tip is almost a slap in the face and could only b softened, again, with Ellisons satire-like plotting and character development. Then, our narrator is staged into a scene of isolation by Ellison.It is in this very state of isolation that the narrator begins to gain confidence. He wants to represent his school with pride. He goes to Harlem. aboard a subway, our narrator is pushed into a whit e woman. She gives little, if any notice, of him. Even her lack of concern over the narrators close proximity adds dismal intensity to the scene as centuries of racial focus are virtually impossible to ignore. He, then, meets up with a huge contingent of blacks from Harlem. A riot is brewing yet, the police lead him to the Mens House. Eventually, our narrators agitation surrounding all this racial tension and segregation issues gets to him.As the scene unfold Ralph Ellison weaves sarcastic wit into the story by mixing rage into his thoughts with memories of our narrators childhood. A seller is seen buttering a yam which swells him with nostalgia. He is beyond tonusing homesick as he is drown in rage. He becomes vengeful over his own past. He attacks Bledsoe and is laughing at the same time. The yam becomes a convention of life insurance, or a life policy. Why should he feel embarrassment of his youth? Instead, he chooses to eat them whenever he wants, and hell be more than ple ased. Ellison describes this satire in the following, These here is real, sweet, yaller yams.How many? One, I said. If theyre that good, one should be enough. (p. 263) Ellison creates more satireagain with death. Here, the satire is the demand writerly factor that creates impact without losing the reader. I cut through a embarrass in which there were a dozen dramaeral parlors, each decked out with neon signs, all set up in old brownstone buildings (p. 286). This satirical segment of the novel creates the humor necessary to softens the blow regarding respecting the dead and families in mourning. Rinehart is another key player in the storyline that is heavily tainted in satirical prose.Rinehart is a very suspicious and distrustful member of the Harlem alliance who holds his share of power. Rinehart is also a manipulator. The narrator never meets up with Rinehart. He wears dark green shades an a big hat for a disguiseanother agent of mockery crafted by Ellison that make fun of h ow society tries to hide from one another, yet they are always apparent to someone in the crowd of life for the people walking the streets screw him. According to the narrator, Rinehart has taken on many roles zoot suit wearer, Reverend, and player.He uses his exalted stature to manipulate others to believe in him and follow his requests. Rinehart is the poster-child manipulator of his culture. As the novel nears its end, our narrator makes a leap of faith, so to speak. He is tossed back into his own past and life experiences. Now he envisions his past as a unified whole. He believes in his Brotherhood experiences for they have shown how blind he was in his youth. He sees all the liars and hypocrites in society. He discovers that he can make them feel happy when he preaches what they want to hear.This is yet another satirical slant taken by Ellison that wraps up his delineation and thematic nature. In closing, it is clear that the impact of Ellisons Invisible Man was so persuasi ve due to his knack for mixing satire into his storyline. With all the issues that he brought to light segregation, racism, and gender inequalitysatire was the lightening element that helped keep the story moving as our narrator discovered himself, first in isolation and finally as a member of this society filled with hypocrites and those yearning for equality.

Thursday, January 24, 2019

Population Explosion in India Essay

universe of discourse explosion is a riddle which is faced by the clownish at an alarming state. The bearing at which the nation of the country is change magnitude is a cause of appertain and so me of the causes of race explosion be High birth charge per unit which is caused by Universal wedding system where every 1 necessarily needs to hold back marital in the country. Early marriage where the average age of marriage is extremely dispirited as compared to other countries of the world. Illiteracy is a problem which is facing the country and the low literacy rates lead to traditional, superstitious and unconditioned population.P everyplacety is other issue which faces the country and needs to be solved. forgetful people are illiterate and see a child as a gift of God which indirectly leads to population explosion. Tropical mood of the country leads to girls and boys attaining puberty at an early age which is as well one of the reasons for a huge population. The joint family system in equal manner leads to a social class of socio- economic responsibilities among everyone in the family which leads to Women are given a low status in the society and are seen as a person for cooking and begetting and are non free to speak up for their rights.Along with this the decreasing demise rate is as well as one of the reasons for population explosion. Indias population has already crossed the billion marks. Thus, the country having only on 2. 4 per pennyime of globes area has come to hold 16 per cent of globes human beings. Its current annual increment at 16 million is the gamy-pitchedest in the world. Soon we may turn over the dubious distinction of becoming the most populous country in the world. The reckon about population explosion in India is now over half(prenominal) a century old. It acquired a new perspective when the 2000 topic Population Policy (NPP) was drafted.There was a marked shift from the target-oriented approach of the 70? s a nd 80? s to the one that envisioned the teaching is the crush pill outlook. The demographics experts, womens groups, health organisations, social activists and academicians were competent to convince the policy appointrs that in order to achieve the socio- demographic goals of the reduction of inequalities, provision of education, services and human race of awareness were to be taken on a priority. The main causes of con side of meatrable size and high growth of population fecal matter be loosely categorised into social and economic causes which are as belowi) brotherhood is almost inevitable among men and women (ii) Motherhood is nearly universal among married women (iii) The custom of early marriage followed since m some(prenominal) centuries has facilitated a wider range of generative period (iv) The Net Production Rate (NPR) is greater than one, which inwardness that women alternate themselves by giving birth to to a greater extent than one daughter which leads to in variant rise in birth rate (v) Widespread illiteracy among people, especially woman is also a major contributor. It has been proved that thither is a direct relation between illiteracy and fertility (vi) irrational beliefs and myths that a male child is a must for salvation, social protection and continuation of the family tree and (vii) Misconceptions that the use of birth control measures lead to diseases, defects or general weakness.The economic causes include (i) Children are considered to be an as throttle not a liability by the poor who look at them as source of income (ii) Statistics also prove that the cost benefit ratio for a child is favourable to the poor (iii) Lack of proper medical facilities and high mortality rate of infant to want more children and (iv) There is also total lack of economic security for widows and elderly people which makes people go for children as economic security.There are other reasons which cannot be classified as either social or economi c reasons the like lack of proper family planning techniques and facilities, high birth rate and low death rate. Overpopulation has far-reaching consequences on every aspect of life of a country. These consequences volition have to be studied in length before we can find appropriate measures to stem the root. Overpopulation not only leads to but also perpetuates poverty. The economists are of the opinion that there are four main cyphers that make a country rich or poor1. National factors like location features and mineral resources available in the country. 2. Historical factors, i. e. whether a country has resideed a colony of some other country and has suffered long economic exploitation, e. g. India under British rule. 3. Demographic factors, i. e. the size and growth of population. 4. Economic factors, i. e. handiness of capital, technology, infrastructure, etc. The demographic factors assume greater importance because natural factors remain constant and history cannot be c hanged. The large size of population heart and soul employment of lions share of the resources for the production of goods for the satisfaction of the sanctioned needs of food, clothing and shelter.The high rate of growth of population mover continuing additional core on these resources. It is only due to negative demographic factors that poor countries remain in perpetual poverty. The per capita income which is the indicator of fertility of a country does not join on even with an increase in total income because the population which is a divisor in this equation also increases. The economists affirm that the sure way for a poor country is to increase its productive capacity by producing more capital goods like machinery. just now as the overpopulated countries need consumer goods in large quantities to satisfy peoples wants it becomes difficult for them to employ their resources for the producing producer goods and thus they remain under the brute(a) circle of poverty. Anot her drawback of population explosion is that it makes all plans made for development of the country go haywire. Our own country created an autonomous Planning care and started a series of Five-Year Plans from the year 1951-52.But we have not been able to bring rapid development because our population which was 36. 1 crore in 1951 has full-grown about three times today at approx. 108 crores. Naturally any development plan made for one person cannot be fitting for three. The age composition of our population is also not favourable. It has been found that the organise age group constitutes 60% of the total population give-up the ghosts in the dependent age groups of a high dependency ratio of 67% calculated as follows If we take into account the unemployment disguised unemployment and quasi unemployment into factor this would present a gloomier picture of our economy.Still further, if we consider that a high portion of those who are engaged in some type of work or the other are n ot technically trained and fall in the category of unskilled labour, we shall realise that our productive capacity is quite a low. Under such conditions a high growth of population adds to the burden of our economy. The large size of population also has an adverse impact on our natural resources. Coal, petroleum, natural gas, minerals and forests are being excessively used to set up more industries to manufacture various consumable articles to satisfy ever- increasing wants.As these resources are limited and exhaustible, they have been dwindling so drastically that soon they would exhaust completely. Forests are being cleared to bring more land under cultivation to provide food for increasing population and to make more settlements for their living. Burning of fossil fuels in factories, vehicles and households has created another adventure of environmental pollution. Injudisions use of water resources like rivers like, ponds, wells, streams and even oceans has caused water polluti on. galore(postnominal) diseases have arisen to afflict human beings and affect vegetation as it is, the disforestation is likely to continue unabated which would further aggravate the problem. Yet another problem is the migration of rural people to urban areas in search of fail earning opportunities. The statistics show an alarming increase of 57% from 34% after independence. The move of urban localities demand more infrastructure, civic services, transport, health, sanitation and educational facilities providing which is not only a challenging task but also means an additional burden on the already inadequate economic resources.As the stabilisation of population is the most significant task ahead of us, squiffy measures are required in this direction. Some countries have sought to give legal remedies for this chronic malady. For example, China has applied the one child norm lay law. Some Indian states have barred the candidates having more than two children from any election . Such strict measures may work but their side effects may outweigh their benefit to society and country.We need to wrap up the problem of overpopulation in the broader sense and in a socially controlled way. This an be done by creating awareness among people and providing them the required means. Indias population has already crossed the billion marks. Thus, the country having only on 2. 4 per cent of globes area has come to hold 16 per cent of globes human beings. Its current annual increase at 16 million is the highest in the world. Soon we may achieve the dubious distinction of becoming the most populous country in the world. The debate about population explosion in India is now over half a century old. It acquired a new perspective when the 2000 National Population Policy (NPP) was drafted.

Wednesday, January 23, 2019

Mahatma Gandhi’s Death

What are we to make of Gandhis life? How should we judge this homespun-wearing politician-saint, the man who brought pile an empire by preaching brotherhood and nonviolence? At the very end, with his beloved India reaping its witness destruction, Gandhi considered himself a failure. But his place in account is secure, and it does not diminish his greatness to point out that in nigh respects, he had failed. He had spent his life working toward the action of independency for India without violence or divisionyou can subvert me in 2 if you wish, he famously told Muhammed Jinnah, except dont cut India in two. Yet in the end, he was forced to watch as his newborn country was disunite by one of the great human calamities of the century. Gandhi had made India ungovernable for the British, further in the autumn of 1947, it became ungovernable for anyone. If his policy-making dream was in close to sense a failure, so too was his dream of an India cleansed of the age-old inequitie s of grade and prejudice, and yet uncorrupted by modern technology and industry. He imagined a country where countless Indian peasants wove their own clothes and tilled their own land, without what he considered the ruinous effects of modernity.But after his death, history passed him by his great disciple, Jawaharlal Nehru, was an ardent socialist, and by the 1950s Nehrus five-year plans were turning India into an industrial secernateand as yettually, a nuclear state. Meanwhile, the iniquities of class and gender that he had so loathed persisted, even into the 21st century. Yet Gandhi had to aspire as high as he did to achieve what he did indeed he won triumphs for India that less reverend leaders would never have dreamed possible.No one did more than than Gandhi to improve the lot of poor Indians, and if his dreams fell short of authenticity, it was not because the dreams were flawed, but because the human race, which he loved so much, could not rise to the precedent he set . It is true that India split after independence, but without Gandhis labor, without the power of his person, thither would have been no India at all. The peoplealists of the Indian National Congress fought for independence, but they were, and al elbow rooms would be, a Westernized elite, out of touch with the vast masses inhabiting the real India.It was Gandhi, the Mahatma, who made the people of the subcontinent believe in the brain of an Indian nation indeed, it was he, the frail, bespectacled figure with the simple clothes and the ready smile, who embodied this idea throughout the long decades of engagement. To the Indian people, Gandhi gave a nation. To the world, he gave satyagraha, arguably the some revolutionary idea of a long and ravaged century. He showed that political change could be affected by renouncing violence that unjust laws could be defied peacefully and with a readiness to accept punishment that soul-force, as much as armed force, could bring down an empire. He drew this lesson from his readings of the parole and Tolstoy and the Bhagavad-Gita, and he taught it to Martin Luther King Jr. , Nelson Mandela, and countless other political protestors who would dramatize his example in the years to come. In some sense, Gandhis greatest achievement lay in his legacy for his ideals, and the example he provided in support them out, inspired, and continue to inspire, people of all nations to take up the peaceful struggle for freedom from oppression.India won independence in 1947, followed by the Indo-Pakistani War of 1947, and district of India. Gandhi said, Before partitioning India, my body will have to be cut into two pieces. About one million people died in the flaming(a) riots until partition was reluctantly asserted by Gandhi as the only way to stop the Civil War. He urged the Congress adjourny to accept partition, and launched his farthest fast-into-death campaign in Delhi, calling for a stop to all violence.Gandhi too called to give Pakistan the 550,000,000 rupees in honor of the partition agreement. He tried to keep back instability and anger against India. Gandhi was shot three times in the agency and died while on his way to a prayer meeting, on January 30, 1948. His assassins were convicted and put to death a year later. The ashes of Mahatma Gandhi were split in portions and sent to all states of India to be scattered in rivers. Part of Gandhis ashes rest in Raj Ghat, near Delhi, India. Part of Mahatma Gandhis ashes are at the Lake Shrine in Los Angeles.

Monday, January 21, 2019

Reasons Why I Want to be an RN Essay

There are some reasons why I would give care to be an RN, and there are some reasons of why I should be accompany an RN, ever since I was a child I have had the idea of creation a nurse deep-rooted in my head. Then as time went by other ideas came into play, interchangeable being a teacher or being a guard officer, but being a nurse always stayed in my brainpower as a great career for me. I got this idea of being a nurse from my mother when I was a little kid, becharm my mom is a nurse, in reality she is at a time the coach of nursing at Bakersfield Heart. But when I was a kid, she went from floor nurse, to charge nurse, to director of her floor, to fellowship supervisor, to assistant director, and now director. I can easily happen upon her past(a) as the CEO of this hospital. Now I do not go through if I would want to do alone of that, but I decidedly see myself going from floor nurse to charge nurse, and maybe the director of the floor. The upper management just does not sound as gambol to me.So originally I did not pursue the idea of nursing, I actually went into college thinking I was going to be a local high school teacher and w suspireling coach, so I went and got my percentage point in Art Education, but while I was in college, I started working as a transport orderly at San Jose medical checkup Center before it closed, then went to Regional Medical Center of San Jose, where I started working as an pinch Room clerk, and moved up to an Emergency Room Technician and loved the hands on with the patients. This is where I decided that teaching method may wait till I retire from nursing, and nursing lead become my career.Soon as I started working side by side with our nurses in the ER I saw that this is what I should be doing, and this is what I want to be doing, so I started working on the prerequisites right then and there. I loved the compassion the nurses had for their patients, and to see the smiles that would come from these pat ients when they felt better. There was something ab out being bedside that just pushed me to want to be more. Being a tech was and is amazing, but I want more, I want to be running the code, not just a articulation of the code, when a trauma victim comes in, or a coded patient comes in. I love the feeling of bring back a patient in a code, even though I know right now by doing just CPR I am the one that is base the medication through the body, I want to be the one that is button epinephrine, to bring that patient back.In this world today, I feel like there are less and less state that are actually trying to improve todays society, and are looking out only for themselves, or their family. And I do not want to be one of those people. I want to be destiny the community whether it is to disrobe up a homeless man, or save the life of a kid that was shot, you never know what that person can do for the rest of their lives to improve someone elses life.I know that not all nursing is emergency nursing, but it all has its parts to the community and serving others. And I am ok with that, but I truly see myself in emergency nursing. If you notice that all of my jobs I was looking at while I was growing up, nursing, teaching, police officer, they are all helping commerces, they are all improving the world around us, and ultimately that is what I really want to do, is improve the community, and improve the well being of the people around me. And I believe nursing is the right form of profession for me to do that.

Friday, January 18, 2019

Role of Urbanization in the Aegean

The Aegean civilizations, the Assyrians, and the Israelites, though in the same hemisphere, were three distinct mightinessdoms. Each authentic into its ingest kingdom with its own set of rules, beliefs, religion, and political concepts. Ultimately, each had its own culture. Yet, in that location was something that underlied these three cultures that connected them in a subtle manner. whole three of these civilizations underwent urbanization. Though the specific cultures of each civilization developed differently, the case of urbanization affected each in roughly the same way.During this period of time of the Late Bronze Age, commerce and communication boomed exponentially. No longer would kingdoms claim their isolationist beliefs. They had to trade and interact with other cultures in show to increase opportunity cost and obtain as many foreign goods as possible. This inevitably resulted in shargond cultures and assimilated beliefs. Along the Aegean Sea, the Minoans had wide spread connections to Egypt, Syria, and Mesopotamia. Similarly, Mycenaean Greece traded with many civilizations, including its neighbor the Minoans.The early Greeks were most likely influenced by Minoan architecture and pottery. Its sudden wealth in any case came from trade with Minoan. In the Assyrian kingdom, they excessively developed trade centers. They imported goods like metals, fine textiles, dyes, gems, ivory, and silver. Because of trade centers, speciality arose, creating jobs like artisans and merchants. In the Israel kingdom, King Solomon created alliances with the Phoenicians and thus developed a craft partner. Together, the Phoenicians and the Israelites explored the Red Sea to find any hidden treasures.The creation of urban centers helped promote this trade, and thus, combusted the perspectives of these cultures. Through interaction with other civilizations, cultures were shared and ideas, on with goods, were traded. Because of an influx of commerce and communi cation, a powerful legions must in addition be kept. Urban centers helped control the military in order to facilitate trade. The Minoans and Mycenaeans developed strong seafaring skills and created wooden vessels to help them trade almost the Mediterranean.They exported wine, olive oil, and textiles, and in return imported amber, ivory, and most importantly, metals. In the Assyrian kingdom, there was a superior military organization with professional soldiers. The Assyrians developed constrict weapons, dug tunnels, and built mobile towers for archers. Not only did they develop military tactics for conquest, but they also used terror tactics to strugglen resistance and rebellion and ultimately maintain control. As for the Israelites, David became the first king and he united the tribes into a monarchy.These urban centers established stronger royal authorization and led to an army in order to expand borders in depend of natural resources. Stronger militaries meant stronger civ ilizations, so urbanization helped strengthen the power of nobility and expand borders. Last but not least, urbanization helped develop societal structures, unearthly ideals, and art and technology. Unlike other civilizations, Minoans did not have strong, aristocratic leaders. In Mycenaean Greece, an elite class did develop.Shaft graves, burial sites for the elite, were filled with gold, weapons, and utensils, revealing that the antique Greeks believed in some form of after feel. The cities also had fortification walls and palaces filled with paintings from war and daily life. In contrast, the Assyrians used terror to maintain order in nine. The king was the center of the Assyrian universe. Everything he did was mandated by the god Ashur. Through presidential term propaganda, royal inscriptions, and ruthless punishments, the king maintained power in the kingdom.The subroutine library of Ashurbanipal gives insight into official documents and literary texts to help portray the da ily life of the elite members of Assyrian society. As for the Israelites, monotheism became the crux of Israelite society. They built temples as sanctuaries in order to link religious and political power. Priests became a wealthy class, thus creating a gap between the urban and the rural, the rich and the poor. In families, there were also gender gaps. Male heirs were critical. While women were respected, they could not own property. As society urbanized, their roles became more and more limited and specialized.While these little bits and pieces of everyday life in these ancient civilizations may seem insignificant, they are like pieces of an infinitely vainglorious puzzle. If we can uncover as many pieces as we can and drop them together, we can approximate a picture of what life was like in these ancient civilizations. We can figure out how urbanization was important to the festering of these kingdoms, and use these cultural artifacts to uncover what daily life was like. After all, artifacts are the key to our past. Without them, our past would be an elusive enigma.

Thursday, January 17, 2019

Guilded Age Dbq

The Gilded Age lasted from the post-Civil War industrial expansion to the Progressive Era. During the Gilded Age, the country experienced both rapid stinting expansion as well as social turmoil. The American farmer experienced economic hard bucks ca employ by several factors. During this time the prices of commodities were going downwardly as the cost of money was going up. Foreigners and western farmers were moving to the cities, thereby making apartments and work places extremely populated. The presidency enacted what were known as the granger Laws in an attempt to regain control.Some may argue that the three chief(prenominal) factors negatively impacting farmers were the appreciating dollar, the overproduction or surplus of intellectual nourishment (for example wheat, edible corn and cotton) and the railroads. The effects of the appreciating dollar on the farmer can be seen in the following areas. The appreciating dollar had a significant impact on prices and the farmers be to do business. For example, in the years 1870-1873 the market cost of wheat was $106. 7 and from 1894-1897 the market cost of wheat was $63. 3 (Document A).This decrease in prices unploughed farmers from making a profit, which oblige many of them into bankruptcy. In many instances, farmers were forced to pay higher freight rates to ship their goods to market than they could lead selling their goods (Document F). The appreciating dollar also caused banks and mortgage companies to trounce their interest rates. owe rates climbed from between 7% and 8% to 40% or more during the Gilded Age (Documents E & G). This rapid change in rates increased the famers costs tremendously.The overproduction and over supply of food also depressed prices in the markets for the farmers. Good growing weather and the government contributed to the overproduction on the farms. The government encouraged farmers to plant more crops and raise more livestock. This processed result in $0. 08 corn, $0 . 10 oats, $0. 02 beef, $0. 00 butter, and $0. 00 eggs (Document B). Farmers could not profess enough money selling their goods at these prices to survive. The government did not help the farmers deal with the problem instead, it blamed them for overproducing.The railroads were the one of the biggest source of trouble for the farmers during this period. The railroads controlled the tape drive of the farmers crops and livestock to the markets. The railroads also controlled the silos and warehouses the farmers used to house their goods before sending them to the markets (Document H). The railroads used this control to set exorbitantly high rates to store and ship the goods (Document F). The farmers lobbied the government through Granger parties, which were third parties formed by members of the Patrons of horticulture.The Patrons of Husbandry were an organization for farmers commonly called the Grange. The farmers wanted the government to help them with the railroads (Document C). The lobbying initially resulted in the passage of the Granger Laws which regulated the freight and storage rates the railroads could charge the farmers. Current farmers face similar problems as the Gilded Age farmers did. rising prices and deflation effect todays farmers and anyone who makes investments. The competition in transportation keeps prices reject for farmers and the mortgage rates are stable thus allowing land to be more affordable.

Wednesday, January 16, 2019

Human Resource Management and East Midlands Ambulance Essay

1. Executive epitomeThe purpose of this report is to investigate the human resource management (HRM) problems that the atomic number 99 Midlands Ambulance Service (EMAS) is experiencing. One of the issues EMAS is experiencing is paramedics possess a lack of motif and cargo to the job consequently create a rise in absence. This is caused by the virgin com preparees cuts enforced on the NHS and is impacting on the paramedics functional life such as, grasscellation of al cardinalocated set off eras. Another problem they ar veneer is the human resource subdivision has been downsized therefor there is one HR manager and adviser covering 3 counties.This is causing cipher dealings between HR and line managers to rest down due to not enough HR staff to support e truly individual station. It is recommended that HR should allocate time to each station to support managers and employees and directors come to an compact to give employees their breaks. There is additional web inf ormation to support the concepts chosen to analyse the problem. These are www.telegraph.co.uk/article/absenteeism and www.thefreelibaray.com/psycologicalcontacts.2. Problem identification and analysisThe new compute cuts to the National Health Service (NHS) are causing more changes throughout the government one sector of the organisation being extremely effected is the Ambulance service. Throughout the East Midlands Ambulance Service many cost efficient changes are taking place, however they still shit to meet the resembling standards of performance to meet their annual targets so that they will receive the same(p) budget for the service next year if the targets are not met the budget each year will decrease. Major changes to EMAS include* No allocated break times and lunch times. The directors say paramedics are to learn their breaks and lunch on board the ambulance between jobs when they get a minute however due to the annex in emergency calls, reports revealed that some paramedics were not having lunch at all throughout a 12 hour shift. This is a breach of not only their written employment deal but their mental contract as well. * Human resources has been downsized, there were HR managers and advisers for every county over the east midlands. The new change saw one HR manager and one HR adviser covering 3 counties and researched showed that employees felt like they had no one to turn to for advise as there HR department was far too busy for individual employee needs.This is making it very thorny for the HR department to focus on what is demotivating the employees causing absenteeism. Even though there have been many other changes to EMAS these are the priority because the endpoint of these changes has had an immense impact on absence and sick leave, as employees are not satisfied with the new conditions to their job description. The new changes to EMAS are causing a vast chain reaction throughout the organisation in the first place becaus e most of the changes are hugely breaching employees psychological contract. The terms they were expecting to have when they were first employed by EMAS has now been removed for example if a paramedic were to smoke there breaks they used to get off the ambulance for refreshments etc. have now been removed they are expected to remain on board the ambulance.Such a breach would have a broad impact on their commitment to the job as they would get that the employer has been un-American to them and not having care for the job would lead them to take unnecessary time off. The HR department cutbacks have had a big impact to not only employees but their line mangers to. HR are finding it trying to attain any spare time to meet with the managers to discuss late(a) problems/procedures therefore all the contact is being made thought documents and earn leaving the managers confused about dealing with their team. The managers are being put under a great deal of stress as their employee expectations have been disregarded. Managers expect to have the HR department at hand for advice on employee problems and procedure. Not having this is not the job expectation they had when they first started.3. RecommendationsSolutions to these problems are very complex and the most obvious solutions are obstructed by the budget cuts. Yes the HR department need more advisers covering each county but unfortunately that cannot occur, instead propose a new system as to where the HR department travels to each station, maybe 1 district a day, to assist the line managers and provide them with up to date policies and procedures. They could likewise sign up employee time to discuss and problems they are facing and offer advice. This could help to make up the relationships that are currently being strained. Also arranging for back to work interviews and help schemes for absentees could help to make them feel more empowered and feel the organisation really needs them back to work giving t he employee a sense of purpose.As for the impractical break times for paramedics, give them a designated time to eat their lunch and have their breaks in a capable environment, whilst one team is having a break have another stand in but make sure that whether on a break or not they must always make themselves available should they be needed. A breach in written/psychological contracts like this is out of the question for the organisation to enforce upon the employees. The research carried out by Steers and Rhodes (1978) on absenteeism is what this organisation should follow because the employees ability to do the job is becoming complicated by a breach in job expectation, not resting on break creating character reference stress etc. therefor rescinding the employees motivation to work. Studying this research could open up compromises for the managers and their employees.InformationThe web rapscallion studied to back up the concept of absenteeism is www.telegraph.co.uk/article/ absenteesim on the 26/11/2012 showed that the main cause for absenteeism was work related stress. This web rascal has been selected to back up the concept of absenteeism because work related stress can be through unsatisfied job expectation and losing commitment to the role maybe through breaking of a psychological contract. This information was also backed up by the web page www.ukessays.co.uk 26/11/2012 which proves the information is a safe source. The second concept chosen in this report is psychological contracts and web page chosen is www.thefreelibrary.com/psycologicalcontracts 26/11/2012. This page studied what would be a breach of a psychological contract. This information came from an article written by Pittensburg State University and has been back up by other sources mentioned in the article therefore is a reliable source.ReferencesPittensburg State University. (2010). Psychological contracts. www.thefreelibrary.com/psychologicalcontracts. extend accessed 26 Nov 2 012. Preston, D (2012). Book 2 An introduction to human resource management in business. p9-22. Steers, R. M. and Rhodes, S. R. (1978) Major influences on employee attendance a process model Journal of Applied Psychology, Vol. 63, No4, pp. 391-407 The Telegraph. (2011). Absenteeism. www.telegraph.co.uk/absenteeism. Last accessed 26 Nov 2012. UK essays. (2003). concepts of absenteeism. www.ukessays.co.uk. Last accessed 26 Nov 2012.

Tuesday, January 15, 2019

Did Microsoft Violate Antitrust Policy?

The US complaint has been commitd by a topaz, a sensitive Burlingame, California-based hardware vendor that says it is a Microsoft dependent phonationner, but has still been caused world-shattering harm by Microsofts exclusionary and restrictive practices1The Northern California Company Tangent, who is also a Microsoft Certified Partner, has claimed that Microsoft has caused them significant harm through exclusionary and restrictive practices.2In its complaint, Tangent describes patterns of anti rivalrous practices by Microsoft. The activities listed by Tangent incorporate the procedure of no-option bundling of sentinel (electronic mail software) with Office (a suite of word processing, financial, media and various business software) and active agent Directory (Lightweight Directory Access Protocol which provide central authentication and authorization run for Windows based computers) with Windows Server (host integration).The forced process under the bundling formation al so includes the Windows Media Player (a software application player and library for digital media) and Windows Media Server (advanced live video and audio streaming functionality) along with the screen background personal computer and the server operating system, e.g. XP, Vista, etc.Tangent attorneys stated in the virtue suit, Microsofts exclusionary and restrictive practiceshave caused significant harm to (Tangent) by increasing, maintaining or stabilize the price it salaried for Microsofts operating system software above competitive levels, 3In a filing with the US territory Court for the Northern District of California, Tangents resident territory and the right of the plaintiff to file locally, is in the clear supportive position to show cause of how Microsoft has historically continued to engage in anticompetitive conduct and practices. Thereby cavictimization irreparable financial and market damages by directly manipulating by opposite means in a anatomy of forms the pr ice Tangent has paid for Microsofts operating system software. Clearly upon comparison and review the prices are openly above competitive degrees.Tangent has been able to list in the detail the historical relation of the personal computer and the Microsoft factor. They contend that Microsoft, in the letter of the rightfulness as well as the spirit, has still failed to operate at heart number of instruction guidelines and continues to violate Section 2 of the Sherman Act, 15 U.S.C., 2.Tangent has taken on the interesting position of requesting a jury to hear the case sort of of a judge. Clearly, the intent is to bring up to peers or citizens who will hear tribute as to the unfair practices of Microsoft. There is the grave risk on the part of the Tangent argument that the youngs are very complicated and so technically that only engineers or legally trained experts can decided on the case. It can be equally promised that Microsoft lawyers will attempt to convolute the issue to a level of complicate techno speak in order to project the jury and possible deadlock or mistrial. Either way, the path for appeal is being paved.Without the normal constraint of frank competition in the marketplace and also because of exclusionary practices invoked by Microsoft as a standard practice, Microsoft has been able to fare in a way that the increases the playing field edge in its favor. Additionally, this method active by Microsoft works to preserve or artificially maintain prices at anti-competitive conditions that cause harm to vendors and business partners. 4In essence, Tangent has supercharged that Microsoft has artificially inflated prices for the cost of the operating system software for certified partners who have no other choice in the matter thusly injuring Tangent.One of the strongest positions taken by Tangent against Microsoft is that the Microsoft server OS (operation system) includes specific, unique, undocumented programs and screens (interfaces) acce ssed and employed by its servers to communicate seamlessly and tacitly with one another. Primarily, the use of several servers (server farm) is wi sharp a multiple network server community.Tangent alleged elevate that Microsoft entered into restrictive agreements with OEMs (Original Equipment Manufacturer) and system builders, limiting or eliminating their ability to feature non-Microsoft products. 5Cleary, the or so important aspect of the Tangents argument, which in this case can be take a firm stand by any plaintiff, is for Microsoft to cease marketing products under the guise that the uniformity of its software is standardize and practical. This is not the case nor has it been in kind of a while. The position by Microsoft does not give rise to a supportive community of certified partners. Candidly, it causes a minor panic.Microsofts secretive and clandestine modus operand lends it self to a sense of obvious guilt. The resistance to the drop out of the source code for any of its of its operating systems underlies its non-competitive practices.Demonstrating no miss of indignation, Microsoft has chosen not to respond to any comments on this complaint or that fact any other. Their practice has been to only to acknowledge that the case is being reviewed.Tangent is based in the San Francisco Bay Area city of Burlingame and builds custom configured-to-order desktops, notebooks, thin clients and servers primarily for educational institutions, government agencies, business markets and proprietary enterprises. The company is using the Microsoft Operating Systems. 1 -Microsoft faces fresh US and EU antitrust complaints 23rd February 2006 2 http//wowtechminute.com/93/antitrust-lawsuit-antithesis/ Antitrust Lawsuit Antithesis Posted by Brent Norris Technology tidings March 2006 3 http//news.com.com/Computer+maker+files+antitrust+suit+against+Microsoft/2100-1014_3-6041788.html By Ina fry Staff Writer, CNET News.com Published February 21, 2006, 4 http//www.thei nquirer.net/default.aspx? term=29797 Off at a topaz By INQUIRER staff Monday 20 February 2006, 1010 5 http//www.channelinsider.com/article/Tangent+Suit+Claims+Microsoft+Soaked+Partners/171923_1.aspx Tangent Suit Claims Microsoft Soaked Partners encounter 21-FEB-2006 By John Hazard

Communication Barriers Essay

So the whole war is be character we tin batht talk to each other, Orson Scott Card. In powerful confabulation is a study risk when working in health c ar. Both speaker unit and meeter need to be in agreement about the heart and soul contractable between each other. There argon military m some(prenominal) actors that submit the way we fade, and the intended content may non be understood. A some wholenesss gender, sexual orientation, race and ethnicity, age, husbandry, verbiage, economic status, stereotypes, regional differences and noise ar several obstructions to effective conversation. For communication to be effective, everyone require to be accountable for clear communication, endeavoring to send and receive clear capacitys with as little anguish as possible. What is communication?Communication is a process involving several steps, among both or much quite a little, for the primary purpose of exever-changing information. It takes place when sight act in both verbal and nonverbal colloquys. To get the point across to a mortal that is going to be involved in the conversation the information must pass by versatile convey. There ar variant steps required to get every information across. The inaugural step is to transmit your idea or message. This begins with the mention or the source of an idea.The source takes this idea and puts it into a code and then transmits this message by means of a channel. The channel is a means by which the message is expressed, and thither is a physical body of channels that privy be used. Various channels include phone, face to face, text messages, emails, and even Twitter. Next the pass receiver takes the message and interprets the code, or decodes it. Once this is done the receiver responds or gives feedback. The message or code can be misinterpreted due to noise or barriers. Communication barrier is what makes communication complex, difficult, and sometimes frustrating.Communication ba rriers can pack a large impact on acquiring the message across. bulk tend to erect barriers hindering their ability to communicate. Physical barriers argon be as the specific atomic number 18a of transmission of communication. There are motley kinds of physical barriers handle the presence of closed office doors, separator screens, contract cabins, cubes, workstations, sections for people of different status and task or anything that physically separates people from one another. In governing bodys, physical barriers can be effective in the overall spread of the message.With a variety of checks and a strong platform, they can avoid encroachment of strangers and work cohesive teams. Emotional barriers are relate to the emotions of both the source and receiver. A mortals emotions can swallow a great effect on their message. When confused emotions are involved, the message could be no more(prenominal) than an emotional outburst. People result cogitate on these emoti ons rather than focus on the message. The challenge is to examine and quantify emotional barriers in communication and focus on what the other someone is saying.Cultural barriers are created when people of a different culture communicate. When they communicate there is a tendency to share less information than those of our heathen heritage. Translating messages into rule books and behaviors is based on a persons cultural background and is not the aforesaid(prenominal) for each person. Culture is a combination of unhomogeneous formative influences placed on us as we grow up. The major(ip) factors in this development of culture are religion, caste, creed, nationality, tender status, values, beliefs and many such(prenominal) elements. Cultural elements have their big role to fulfill when a person erupticipates in communication. When someone becomes a part of a group and become attached to it, sooner or later, they get alter to that group in terms of the cultural code of the g roup. Intercultural communication occurs when people who have different cultural traditions start a conversation. In revision for you to have an error-free communication, you need to study and understand the cultural differences of your receiver as well. Technological advancements have made the communication process far more speedy, correct and smooth.The development of smart phones and computers has made communication more well accessible. All barter practitioners and modern managers understand the importance of multidimensional locomote of communication at multi-location stations traveling through innumerous ways of channels and mediums. In the circumstances, when the whole social-networking and business functioning depends on technical tools of communication, it becomes passing significant to operate these tools ensuring that they 14 The IUP Journal of Soft Skills, Vol. VI, nary(prenominal) 3, 2012 are error-free. On the contrary, devices are electronic systems and the y keep facing errors at a time and then, cause unpredictable communication errors in terms of its delivery to the in demand(p) end. Sometimes even the accuracy of these gadgets is questioned. The more we depend on these scientific tools, the higher the chances are of getting error harms involved in the process.Sometimes, misfortunate signals or unreceivable frequency of the transmitted messages cause trouble in getting those downloaded or decoded, effecting and clearing to the failure of accurate message delivery, and sometimes it becomes tougher to batten even its partial delivery to anyhow run the activity. Devices like cell phones, Internet and various other technological applications keep facing such errors depriving us of comfortable transaction and transmission of messages. Such system failures and its non-competing transaction as desired by the sender or receiver lead to technological noises. The world of linguistic communication is full of variety and pleasing cho ices.In a country of various languages like India, language keeps slightly changing every fifty miles. In the southern part of India, organizations prefer the regional language of communication, while this practice is not found in the Union region of India. Language is a highly important tool to expound our opinion, likes and dislikeness, preferences, thoughts, and ideas while communicating. It is always important to ensure that the language of the sender and the receiver is the same for a successful transmission of communication, but just about of the time, language proves to be a potential barrier in the course of communication. sex BarriersGender has its own specified impact on the pattern of communication. As has been observed by the researchers, a woman uses approximately 25,000 words a day while talking, whereas a man uses around 10,000 words. As per the various medical reports, the speech ability of girls begins far earlier than boys. There are certain things that the girl s cannot express due to gender barrier what boys can do and vise versa. The physiognomy of the boy and girl is creditworthy for language ability differences. The reason for this lies in the neuronal wiring of a mans and womans brains. The communication model of man remains linear, logical and sectioned, while womans expression is a combination of logic and emotion. no(prenominal)mally, during an interaction, woman uses different types of words while explaining any incident, and man uses a different set of words while explaining and describing the same incident. This difference is majorly because of the gender barrier.Interpersonal BarriersInterpersonal barriers comprise differences between the source and the receiver. There may be multiple differences between the encoder and decoder which result either in failure or partial delivery of signification or content. The success ratio of communication is far higher when the person who communicates and the person who receives it are C omprehensive Modeling of Communication Barriers A abstract Framework 15 on similar wavelength in terms of language, concord and both ensure alike interpretation of the message in question. The lesser the interpersonal gap, the stronger the chances of communication success.Noise BarrierNoise is an external factor which causes interruption in the meld of communication. There are various types of noises acquirable in the environment blocking the communication flow fully or partially. The major types of noises are discussed in detail in Figure 3. exposition of Components of the ModelCommunication NoiseCommunication is an involved process which encompasses various ideal conditions for the message to pass through successfully from the sender to the receiver. The factor of noise is very important, as it has been given due representation in almost all the communication models propounded by various researchers. In communication models, noise interference occurs during the decoding proce ss of messages transmitted over a channel by an encoder. There are many examples of noise, and some major noise problems have been discussed in the comprehensive model of noise barriers in Figure 3.Environmental NoiseAccording to Adler (1991), since we are constantly bombarded with more stimuli than we can absorb and more perceptions than we can keep track of, we still perceive those images that may be meaningful. We group perceived images into familiar categories that ease to simplify our environment, which become the basis for our interpretations and allow us to function in an otherwise overly complex world.Environmental noise majorly springs from physical disturbances cause disruptions and creating problems in the smooth flow of communication from one point to another. For example, it is highly difficult to listen or understand the message if the speaker transmits communication from a noisy place like near the loud speaker during party/celebration. Sometimes, it becomes very d ifficult to respond over the phone or to a person nearby communicating with you if you are at the railway platform or a bus stand as these places are known for high decibels.Physiological NoisePhysiological reasons are excessively effective noise barriers in the communication process. In this category, biological reasons like physical maladies that prevent effective communication, such as actual hearing loss or blindness are also taken into account. Sometimes intricate problems in clear utterance also cause physiological barriers in the process of communication. In this category, all those physical deficiencies or impairment causing obstruction to clear and smooth flow of communication are taken into account.Psychological NoiseThe psychology of the source communicator and receiver has its inevitable influence on the process of communication. The final shape of a thought or opinion does undergo structural changes based on the psychology of the person who communicates. The psychol ogy is such an important factor that it sometimes makes the opinion of one person appear differently to the others. Our psychology consists of perception, attitude, vision, experiences, feelings and emotions, including various experiential amalgamations pile up from our childhood to adulthood.The psychological metamorphosis is an ongoing process. The communication pattern and the stage settingual value of it are very much demonstrations of ones psychology. likeness of a psychological approach solves this noise barrier to some extent. deviation in psychology between the sender and receiver magnifies the complexity of psychological noise. Specific mental condition can influence communication. For example, the mood of communicator or receiver naturally influences psychological noise and sometimes severely hampers effective communication.Cultural NoiseAs we are different from others in various areas so is our culture. While language and communication systems are part of the cult ure, and language has often been used as a proxy for culture, the overlap between language and culture is only partial. For example, Comprehensive Modeling of Communication Barriers A Conceptual Framework 17 Spanish speakers come from a variety of countries with distinct cultures (Del Pinal and Singer, 1997). Cultural differences cause cultural noises. Taken-for-granted assumptions most of the time cause misunderstanding. Stereotypical assumptions can be potential contributors of cultural noise. Diversity of culture and cultural background is the mother source of noises of this category.Organizational NoiseThe most significant activity of any organization is a constant flow of communication in multi-directed locations internally and externally. Communication is a constant casualty in organizations in various structures, formats and modes channelized at various hierarchical levels. The possibility of lapses in communication always remains very high and needs to be given due care an d attention through incessant monitoring. The most common directional flow of communication in the organization is upward and downward. But the horizontal flow is also the integral part of the process. In the cross-functional movement of communication, the poorly structured messages do create a lot of troubles. If a message is poorly crafted by the higher-ups, it force create confusion and improper decoding of the intended meaning. Such types of instances are considered as organizational noise.Syntactical NoiseGrammar of any language is the base example to provide a structure to our thoughts and expressions. But converting thoughts at a fast(a) pace and applying suitable grammatical structure to it and ensuring correctness while cursorily interacting and exchanging sentences, whether verbal or written, may be difficult at times. stamp thoughts into sentences and at once following the appropriate grammatical pattern is a very intricate process, and sometimes the user of a la nguage does not have the efficiency or dexterity required to do so effectively. For example, when any incident is described by a communicator, he might commit mistakes in altering tenses at a fast pace, which results in syntactical noise. Mistakes in grammar can disrupt communication, leading to syntactical noise.semantic NoiseMost of the times, words have more than one meaning. The context of the interaction also prefixes the preciseness of the meaning of a particular word. apiece one of us, as a communicator, has got his own style of using different words in different contexts. Sometimes the meaning of a word is presumed but it is not the intended meaning. Adler (1991) commented that misinterpretation can be caused by inaccurate perceptions of a person or situation that arise when what real exists is not seen. It can be caused by an inaccurate interpretation of what is seen that is, by using my meanings to make sense out of your reality. Thus, the variety of interpretations caus es semantic noise in the communication process. 18 The IUP Journal of Soft Skills, Vol. VI, No. 3, 2012ConclusionCommunication is an integral and underlying element in any relation, whether personal, social, professional, global or business. Communication is the key factor that helps any business to progress substantially. The advent of new technologies has ensured the availability of efficient tools of communication through which the percolation of message, sending and receiving, has become much faster. Even then, dependence on electronic gadgets begets new system errors, either haulting the communication process or transmitting it inaccurately or after much delay. There are innumerable factors which may disrupt the communication flow, and these disruptions are known as potential barriers or various types of noises causing unexpected interruptions.The models displayed in the composition are rich resources to monitor the active zones where the barriers might occur and can cause difficulty in the delivery of the message intended. The proposed models describe the barriers in the overall communication process and the respective points at which the probabilities of such disruptions are higher. No doubt, the barriers create complexity, difficulty and interruptions in communication, but the suggested model will naturally help in understanding such undesired occurrences. The abstract framework does provide an exhaustive understanding of such complex situations caused by barriers and noises and shows how to remove them from the path of communication flow to enjoy constant and accurate flow of communication from one to another or many.Hahn Gail (2007), The Communication carriage II, Coloring Outside the Lines. Palazzolo Sam (September 2008), Influential Communication, available at http/ /findarticles.com/p/articles/mi_qa5286/is_20080901/ai_n28118653. Accessed on November 1, 2014. Sanchez Nick (September 2008), Communications Process, available at http// web.njit. edu/lipuma/352comproc/comproc.htm. Accessed on November 2, 2014

Monday, January 14, 2019

Cisa

1. A benefit of open brass architecture is that it A. facilitates interoperability. B. facilitates the consolidation of proprietary comp atomic number 53nts. C. get out be a basis for volume discounts from equipment marketers. D. all in allows for the pass awaying of more(prenominal) economies of scale for equipment. upshot A occupation Open administrations atomic number 18 those for which suppliers post comp iodinents whose interfaces atomic number 18 defined by prevalent quantitys, thus facilitating interoperability mingled with systems made by different sellers. In contrast, closed system components be built to proprietary standards so that some other suppliers systems suffer non or leave non interface with existing systems. . An IS great dealvasor discovers that developers yield operator greet shot to the restraint line of a payoff surroundings operating system. Which of the future(a) look intos would stovepipe mitigate the jeopardize of un n onice and illegitimate chopine mixtures to the production environment? A. Commands typed on the command line argon lumberged B. Hash let onstones be metric periodically for programs and matched against chop up discovers calculated for the virtually recent authorized versions of the programs C. entrance fee to the operating system command line is granted through an gateway restriction tool with preapproved rights D.Softw ar teaching tools and compilers engage been removed from the production environment resultant B credit line The matching of hash keys over age would allow divulgeion of alterations to files. election A is anomalous beca make economic consumption of having a logarithm is non a pull wires, studying the log is a realize. Choice C is incorrect because the doorway was al avery grantedit does non matter how. Choice D is wrong because files enkindle be copied to and from the production environment. 3. In the context of good information suret y politics, the aboriginal exceptt of value throw in the towely is to A. perfect security investments in support of seam musical arrangement object glasss.B. implement a standard set of security commits. C. institute a standards- found antecedent. D. implement a round-the-clock improvement culture. dissolvent A greenback In the context of give-up the ghost information security boldness, value speech communication is implemented to curb optimisation of security investments in support of military control objectives. The tools and techniques for implementing value delivery accommo envision instruction execution of a standard set of security pr turningices, institutionalization and commoditization of standards-based solutions, and implementation of a continuous improvement culture considering security as a a notwithstanding, non an cause. 4.During a review of a pileiness persistency scheme, an IS heargonr detect that the tiptop at which a situation is decl argond to be a crisis has non been defined. The MAJOR venture associated with this is that A. mind of the situation whitethorn be delayed. B. execution of the catastrophe recovery fancy could be extend to. C. nonification of the teams top executive non occur. D. potential crisis recognition might be in in movement(p). upshot B billhook Execution of the trading perseverance excogitation would be wedge if the presidential term does non know when to declargon a crisis. Choices A, C and D be steps that must be performed to know whether to declargon a crisis.Problem and severity assessment would provide information necessity in declaring a disaster. Once a potential crisis is recognized, the teams responsible for crisis forethought pick up to be nonified. Delaying this step until a disaster has been declared would negate the effect of having solvent teams. Potential crisis recognition is the first step in responding to a disaster. 5. When implementing an IT i nstitution framework in an institution the roughly master(prenominal) objective is A. IT fusion with the argumentation. B. line of work. C. value realization with IT. D. enhancing the return on IT investments. help A peak The goals of IT brass are to improve IT writ of execution, to deliver optimum trading value and to chink regulatory compliance. The key practice in support of these goals is the strategical continuative of IT with the telephone line (choice A). To achieve line upment, all other choices need to be even to business practices and strategies. 6. When reviewing an implementation of a VoIP system over a unified WAN, an IS tender should expect to find A. an integrated aids digital meshing (ISDN) information link. B. duty engineering. C. wired equivalent privacy (WEP) figureion of info.D. analog phone terminals. supply B descent To examine that quality of improvement requirements are achieved, the Voice-over IP (VoIP) service over the wide are a entanglement (WAN) should be protected from packet liberationes, latency or jitter. To reach this objective, the profit performance can be get outd utilize statistical techniques much(prenominal) as profession engineering. The standard bandwidth of an integrated services digital earnings (ISDN) entropy link would non provide the quality of services inevitable for bodied VoIP services. WEP is an encryption scheme related to wireless entanglementing.The VoIP phones are usually attached to a incarnate local area net income (LAN) and are not analog. 7. An IS listener selects a maker for a penetration running play that provide be carried out by a technical specialist. Which of the quest is most(prenominal) important? A. The tools use to conduct the canvass B. Certifications held by the IS hearer C. chest from the selective information possessor of the waiter D. An intrusion espial system (IDS) is enabled make out C differentiate The data owner should be informed of the take chancess associated with a penetration test, what types of tests are to be conducted and other pertinent details. all other choices are not as important as the data owners responsibility for the security of the data assets. 8. Which of the following is a risk of cross-training? A. Increases the dependence on one employee B. Does not assist in succession planning C. unitary employee whitethorn know all images of a system D. Does not tending in achieving a persistency of operations adjudicate C strain When cross-training, it would be prudent to first assess the risk of any soul knowing all parts of a system and what exposures this may cause. Cross-training has the profit of decreasing dependence on one employee and, hence, can be part of succession planning.It also provides al class for effect in the event of absence for any intellectual and on that pointby facilitates the persistence of operations. 9. The use of digital tinges A. requires the u se of a one- quantify countersign generator. B. provides encryption to a subject. C. soundates the man-made lake of a gist. D. ensures mental object secretity. manage C line of descent The use of a digital signature verifies the identity of the vector, moreover does not encrypt the whole message, and hence is not enough to ensure confidentiality. A one-time countersign generator is an option, that is not a requirement for employ digital signatures. 0. A retail sacking has introduced radio frequency appellative (RFID) tags to create unique serial numbers racket for all products. Which of the following is the PRIMARY fearfulness associated with this initiative? A. Issues of privacy B. Wavelength can be absorbed by the gentleman body C. RFID tags may not be removable D. RFID eliminates line-of-sight reading ANSWER A utterance The buyer of an item will not necessarily be aware of the figurehead of the tag. If a tagged item is paid for by credit card, it would be possi ble to tie the unique ID of that item to the identity of the purchaser.Privacy violations are a significant concern because RFID can carry unique identifier numbers. If desired it would be possible for a firm to track individuals who purchase an item containing an RFID. Choices B and C are concerns of less importance. Choice D is not a concern. 11. A overturn recovery time objective (RTO) results in A. higher(prenominal) disaster tolerance. B. higher cost. C. wider interruption windows. D. more permissive data loss. ANSWER B NOTE A recovery time objective (RTO) is based on the possessable downtime in role of a flicker of operations. The lower the RTO, the higher the cost of recovery strategies.The lower the disaster tolerance, the narrower the interruption windows, and the lesser the permissive data loss. 12. During the requirements definition cast of a software education vomit, the aspects of software interrogation that should be overcompensateed are growth A. test data covering unfavourable lotions. B. detailed test plans. C. quality self-confidence test specifications. D. exploiter acceptance interrogatory specifications. ANSWER D NOTE A key objective in any software ripening stomach is to ensure that the create software will meet the business objectives and the requirements of the user.The users should be involved in the requirements definition phase of a nurture purpose and user acceptance test specification should be developed during this phase. The other choices are generally performed during the system testing phase. 13. The demote drool rule for protecting a ne devilrk from world utilise as an amplifier in a denial of service (DoS) attack is to deny all A. outgoing traffic with IP source verbalisees external to the ne dickensrk. B. entryway traffic with discernible spoofed IP source addresses. C. incoming traffic with IP options set.D. incoming traffic to detailed hosts. ANSWER A NOTE Outgoing traffic with an IP source add ress different than the IP range in the communicate is in well-grounded. In most of the eludings, it signals a DoS attack originated by an essential user or by a previously compromised internal machine in both cases, applying this filter will stop the attack. 14. What is the BEST succour dodge for a large database with data supporting online gross sales? A. periodical full stomachup with daily incremental backup B. unremarkable full backup C. Clustered servers D. Mirrored hard records ANSWER ANOTE Weekly full backup and daily incremental backup is the best backup strategy it ensures the ability to recover the database and yet reduces the daily backup time requirements. A full backup ordinarily requires a couple of hours, and accordingly it can be impractical to conduct a full backup every day. Clustered servers provide a spare touch capability, but are not a backup. Mirrored hard disks will not help in case of disaster. 15. Which of the following is a feature of Wi-Fi protected Access (WPA) in wireless networks? A. Session keys are dynamicB. Private bilaterally symmetrical keys are used C. Keys are static and shared D. Source addresses are not encrypted or au pastticated ANSWER A NOTE WPA uses dynamic session keys, achieving stronger encryption than wireless encryption privacy (WEP), which operates with static keys ( said(prenominal) key is used for everyone in the wireless network). All other choices are weaknesses of WEP. 16. The ultimate purpose of IT governance is to A. encourage optimal use of IT. B. reduce IT costs. C. modify IT resources across the governing body. D. centralize control of IT. ANSWER ANOTE IT governance is intended to ready the combination of decision rights and accountability that is best for the enterprise. It is different for every enterprise. step-down IT costs may not be the best IT governance effect for an enterprise. Decentralizing IT resources across the brass instrument is not always desired, although it ma y be desired in a decentralized environment. Centralizing control of IT is not always desired. An example of where it might be desired is an enterprise desiring a single(a) point of customer contact. 17. The of import purpose of a transaction examine trail is toA. reduce the use of repositing media. B. determine accountability and responsibility for processed transactions. C. help an IS tender examine transactions. D. provide useable information for capacity planning. ANSWER B NOTE Enabling audit trails aids in establishing the accountability and responsibility for processed transactions by tracing them through the information system. Enabling audit trails increases the use of disk space. A transaction log file would be used to trace transactions, but would not aid in determining accountability and responsibility.The objective of capacity planning is the efficient and good use of IT resources and requires information such as CPU utilization, bandwidth, number of users, etc. 18. An IS attender invited to a breeding view meeting notes that no bulge risks birth been documented. When the IS attendee raises this skip, the tolerate conductor responds that it is too early to identify risks and that, if risks do start cushioning the control, a risk manager will be hired. The appropriate reception of the IS attendee would be to A. tress the importance of spending time at this point in the attend to consider and document risks, and to develop contingency plans. B. accept the disgorge managers position as the interpret manager is accountable for the force of the project. C. offer to work with the risk manager when one is appointed. D. inform the project manager that the IS attendant will conduct a review of the risks at the completion of the requirements definition phase of the project. ANSWER A NOTE The volume of project risks can typically be set originally a project begins, allowing mitigation/avoidance plans to be post in outer space to deal with these risks.A project should subscribe a clear link back to embodied strategy and tactical plans to support this strategy. The process of setting merged strategy, setting objectives and developing tactical plans should include the consideration of risks. Appointing a risk manager is a good practice but waiting until the project has been force by risks is misguided. Risk wariness necessitate to be foregoing looking allowing risks to evolve into issues that adversely impact the project represents a bereavement of risk attention.With or without a risk manager, persons within and outside of the project team need to be gossiped and encouraged to comment when they believe sunrise(prenominal) risks study emerged or risk priorities incur revisiond. The IS attendant has an obligation to the project sponsor and the organization to advise on appropriate project management practices. Waiting for the possible appointment of a risk manager represents an supererogatory and dangerous delay to implementing risk management. 19. A data sharpen has a badge-entry system. Which of the following is approximately important to protect the computing assets in the nerve centre?A. Badge commentators are installed in locations where tampering would be noticed B. The ready reckoner that controls the badge system is backed up frequently C. A process for promptly deactivating mixed-up or stolen badges exists D. All badge entry attempts are logged ANSWER C NOTE Tampering with a badge reader cannot open the door, so this is irrelevant. Logging the entry attempts may be of extra value. The biggest risk is from unauthorized individuals who can enter the data center, whether they are employees or not. Thus, a process of deactivating lost or stolen badges is important.The configuration of the system does not flip-flop frequently, therefore frequent backup is not required. 20. Which of the following would baby the independence of a quality assurance team? A. Ensur ing compliance with discipline modes B. Checking the testing assumptions C. Correcting coding errors during the testing process D. Checking the reckon to ensure straight-laced documentation ANSWER C NOTE Correction of enter should not be a responsibility of the quality assurance team as it would not ensure segregation of duties and would impair the teams independence. The other choices are valid quality assurance employments. 1. Which of the following is the BEST type of program for an organization to implement to aggregate, correlate and store different log and event files, and then produce weekly and monthly scores for IS auditors? A. A security information event management (SIEM) product B. An open-source correlation engine C. A log management tool D. An extract, transform, load (ETL) system ANSWER C NOTE A log management tool is a product intentional to aggregate events from many log files (with distinct formats and from different sources), store them and typically corre late them offline to produce many reports (e. . , exception reports showing different statistics including anomalies and mirthful activities), and to answer time-based queries (e. g. , how many users strike entered the system between 2 a. m. and 4 a. m. over the past three weeks? ). A SIEM product has some equal features. It correlates events from log files, but does it online and normally is not oriented to storing many weeks of historic information and producing audit reports. A correlation engine is part of a SIEM product. It is oriented to making an online correlation of events.An extract, transform, load (ETL) is part of a business intelligence system, dedicated to extracting operational or production data, transforming that data and fill them to a central repository (data warehouse or data mart) an ETL does not correlate data or produce reports, and normally it does not have extractors to read log file formats. 22. To ensure stylemark, confidentiality and integrity of a m essage, the sender should encrypt the hash of the message with the senders A. in the public eye(predicate) key and then encrypt the message with the receivers private key. B. private key and then encrypt the message with the receivers public key.C. public key and then encrypt the message with the receivers public key. D. private key and then encrypt the message with the receivers private key. ANSWER B NOTE Obtaining the hash of the message ensures integrity signing the hash of the message with the senders private key ensures the authenticity of the origin, and encrypting the resulting message with the receivers public key ensures confidentiality. The other choices are incorrect. 23. An IS auditor observes a weakness in the memorialise management system at a data center in that some parameters are set to bypass or ignore tape header records.Which of the following is the virtually utile compensating control for this weakness? A. scaffolding and job set up B. Supervisory review of logs C. Regular back-up of tapes D. Offsite warehousing of tapes ANSWER A NOTE If the IS auditor finds that there are effective staging and job set up processes, this can be recognised as a compensating control. Choice B is a detective control while choices C and D are corrective controls, none of which would serve as good compensating controls. 24. What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) door to its network?A. cattish compute could be spread across the network B. VPN logon could be spoofed C. transaction could be sniffed and decrypted D. VPN gateway could be compromised ANSWER A NOTE VPN is a mature technology VPN devices are hard to break. However, when remote irritate is enabled, malevolent enrol in a remote client could spread to the organizations network. though choices B, C and D are security risks, VPN technology largely mitigates these risks. 25. The activation of an enterprises business continui ty plan should be based on influence criteria that address the A. duration of the outage. B. ype of outage. C. probability of the outage. D. cause of the outage. ANSWER A NOTE The insertion of a business continuity plan (action) should in general be based on the maximum period for which a business function can be disrupted before the disruption threatens the achievement of organisational objectives. 26. later on observing suspicious activities in a server, a manager requests a forensic analysis. Which of the following findings should be of MOST concern to the police detective? A. Server is a member of a workgroup and not part of the server domain B. Guest account is enabled on the server C.Recently, 100 users were created in the server D. Audit logs are not enabled for the server ANSWER D NOTE Audit logs can provide prove which is required to proceed with an investigating and should not be disabled. For business needs, a server can be a member of a workgroup and, therefore, n ot a concern. Having a guest account enabled on a system is a misfortunate security practice but not a forensic probe concern. Recently creating 100 users in the server may have been required to meet business needs and should not be a concern. 27. minimum password length and password compl consequencey verification are examples of A. etection controls. B. control objectives. C. audit objectives. D. control mental processs. ANSWER D NOTE Control procedures are practices established by management to achieve specific control objectives. give-and-take controls are tour of duty controls, not detective controls. Control objectives are declarations of judge results from implementing controls and audit objectives are the specific goals of an audit. 28. Which of the following is an advantage of the top-down court to software testing? A. Interface errors are identified early B. examination can be started before all programs are go off C.It is more effective than other testing approac hes D. Errors in critical modules are detected sooner ANSWER A NOTE The advantage of the top-down approach is that tests of major functions are conducted early, thus enabling the detection of interface errors sooner. The most effective testing approach is dependent on the environment organism tested. Choices B and D are advantages of the bottom-up approach to system testing. 29. After initial investigation, an IS auditor has reasons to believe that postiche may be present. The IS auditor should A. expand activities to determine whether an investigation is warranted.B. report the matter to the audit committee. C. report the possibility of fraud to top management and ask how they would like to proceed. D. consult with external well-grounded counsel to determine the course of action to be taken. ANSWER A NOTE An IS auditors responsibilities for detecting fraud include evaluating fraud indicators and deciding whether any additive action is necessary or whether an investigation should be pep uped. The IS auditor should notify the appropriate authorities within the organization unaccompanied if it has determined that the indicators of fraud are fitted to advocate an investigation.Normally, the IS auditor does not have authority to consult with external legal counsel. 30. As a driftr of IT governance, transparency of ITs cost, value and risks is primarily achieved through A. performance amount. B. strategic alignment. C. value delivery. D. resource management. ANSWER A NOTE death penalty measurement includes setting and monitoring measurable objectives of what the IT processes need to deliver (process outcome) and how they deliver it (process capability and performance). Strategic alignment primarily focuses on ensuring linkage of business and IT plans.Value delivery is well-nigh executing the value proposition throughout the delivery cycle. Resource management is intimately the optimal investment in and becoming management of critical IT resources. Trans parency is primarily achieved through performance measurement as it provides information to the stake carriers on how well the enterprise is performing when compared to objectives. 31. A technical virtuoso who was workings on a major project has left the organization. The project manager reports suspicious system activities on one of the servers that is doorwayible to the whole team.What would be of GREATEST concern if discovered during a forensic investigation? A. Audit logs are not enabled for the system B. A logon ID for the technical lead exempt exists C. Spyware is installed on the system D. A trojan is installed on the system ANSWER A NOTE Audit logs are critical to the investigation of the event however, if not enabled, damage of the logon ID of the technical lead and the guest account could not be established. The logon ID of the technical lead should have been deleted as soon as the employee left the organization but, without audit logs, misuse of the ID is difficult to prove.Spyware installed on the system is a concern but could have been installed by any user and, again, without the straw man of logs, discovering who installed the spyware is difficult. A Trojan installed on the system is a concern, but it can be done by any user as it is chafeible to the whole group and, without the social movement of logs, investigation would be difficult. 32. When development a universal storage bus (USB) photoflash drive to transport confidential collective data to an offsite location, an effective control would be to A. carry the flash drive in a portable unafraid. B. see to it management that you will not lose the flash drive. C. equest that management deliver the flash drive by courier. D. encrypt the folder containing the data with a strong key. ANSWER D NOTE Encryption, with a strong key, is the most secure method for protecting the information on the flash drive. Carrying the flash drive in a portable safe does not guarantee the safety of th e information in the event that the safe is stolen or lost. No matter what measures you take, the chance of losing the flash drive still exists. It is possible that a courier might lose the flash drive or that it might be stolen. 33. The FIRST step in a booming attack to a system would be A. gathering information. B. aining rise to power. C. denying services. D. evading detection. ANSWER A NOTE Successful attacks start by gathering information about the target system. This is done in advance so that the assailant gets to know the target systems and their vulnerabilities. All of the other choices are based on the information gathered. 34. An IS auditor finds that conference dwells have active network ports. Which of the following is MOST important to ensure? A. The corporate network is using an intrusion saloon system (IPS) B. This part of the network is isolated from the corporate network C. A single sign-on has been implemented in the corporate network D.Antivirus software is in place to protect the corporate network ANSWER B NOTE If the conference rooms have bother to the corporate network, unauthorized users may be able to connect to the corporate network therefore, both networks should be isolated either via a firewall or being physically shed light ond. An IPS would detect possible attacks, but only after they have occurred. A single sign-on would ease authentication management. Antivirus software would reduce the impact of possible viruses however, unauthorized users would still be able to access the corporate network, which is the biggest risk. 5. While observing a full dissembling of the business continuity plan, an IS auditor notices that the posting systems within the organizational facilities could be severely impacted by infrastructural damage. The BEST recommendation the IS auditor can provide to the organization is to ensure A. the salvage team is trained to use the telling system. B. the notification system provides for the recovery of the backup. C. redundancies are built into the notification system. D. the notification systems are stored in a vault. ANSWER CNOTE If the notification system has been severely impacted by the damage, redundancy would be the best control. The salvage team would not be able to use a severely damaged notification system, even if they are trained to use it. The recovery of the backups has no intention on the notification system and storing the notification system in a vault would be of little value if the building is damaged. 36. The human resources (HR) subdivision has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet. Which of the following would protect the confidentiality of the data?A. SSL encryption B. Two-factor authentication C. Encrypted session cookies D. IP address verification ANSWER A NOTE The main risk in this scenario is confidentiality, therefore the only option which would provide confidentiality is Secure Socket La yer (SSL) encryption. The remaining options deal with authentication issues. 37. Regarding a disaster recovery plan, the role of an IS auditor should include A. identifying critical coatings. B. determining the external service providers involved in a recovery test. C. observing the tests of the disaster recovery plan. D. etermining the criteria for establishing a recovery time objective (RTO). ANSWER C NOTE The IS auditor should be present when disaster recovery plans are tested, to ensure that the test meets the targets for restoration, and the recovery procedures are effective and efficient. As appropriate, the auditor should provide a report of the test results. All other choices are a responsibility of management. 38. Which of the following is the BEST practice to ensure that access authorizations are still valid? A. Information owner provides authorization for users to gain access B. Identity management is integrated with human resource processes C.Information owners periodic ally review the access controls D. An authorization matrix is used to establish validity of access ANSWER B NOTE military group and departmental changes can result in authorization creep and can impact the effectiveness of access controls. Many times when personnel come out an organization, or employees are promoted, transferred or demoted, their system access is not richly removed, which increases the risk of unauthorized access. The best practices for ensuring access authorization is still valid is to integrate identity management with human resources processes.When an employee transfers to a different function, access rights are ad excepted at the same time. 39. The act systems of an organization using open-source software have no single recognized developer producing patches. Which of the following would be the MOST secure way of updating open-source software? A. Rewrite the patches and apply them B. grave review and application of getable patches C. contract in-house pat ches D. Identify and test suitable patches before applying them ANSWER D NOTE Suitable patches from the existing developers should be selected and tested before applying them.Rewriting the patches and applying them is not a correct answer because it would require skilled resources and time to rewrite the patches. Code review could be possible but tests need to be performed before applying the patches. Since the system was developed outside the organization, the IT department may not have the necessary skills and resources to develop patches. 40. Which of the following is a prevalent risk in the ontogenesis of end-user computing (EUC) applications? A. Applications may not be subject to testing and IT general controls B. Increased development and maintenance costsC. Increased application development time D. Decision-making may be impaired due to diminished re bodily process to requests for information ANSWER A NOTE End-user developed applications may not be subjected to an independen t outside review by systems analysts and frequently are not created in the context of a formal development methodology. These applications may lack appropriate standards, controls, quality assurance procedures, and documentation. A risk of end-user applications is that management may rely on them as much as traditionalistic applications.End-user computing (EUC) systems typically result in reduced application development and maintenance costs, and a reduced development cycle time. EUC systems normally increase flexibility and responsiveness to managements information requests. 41. The MAJOR consideration for an IS auditor reviewing an organizations IT project portfolio is the A. IT budget. B. existing IT environment. C. business plan. D. investment plan. ANSWER C NOTE One of the most important reasons for which projects get funded is how well a project meets an organizations strategic objectives.Portfolio management takes a holistic view of a companys overall IT strategy. IT strateg y should be aligned with the business strategy and, hence, reviewing the business plan should be the major consideration. Choices A, B and D are important but unoriginal to the importance of reviewing the business plan. 42. Which of the following is an attribute of the control self-assessment (CSA) approach? A. bighearted stakeholder involvement B. Auditors are the primary control analysts C. Limited employee lodge D. indemnity driven ANSWER ANOTE The control self-assessment (CSA) approach emphasizes management of and accountability for developing and monitoring the controls of an organizations business processes. The attributes of CSA include empowered employees, continuous improvement, extensive employee participation and training, all of which are representations of broad stakeholder involvement. Choices B, C and D are attributes of a traditional audit approach. 43. The BEST method for assessing the effectiveness of a business continuity plan is to review the A. plans and com pare them to appropriate standards. B. results from previous tests.C. apprehension procedures and employee training. D. offsite storage and environmental controls. ANSWER B NOTE Previous test results will provide evidence of the effectiveness of the business continuity plan. Comparisons to standards will give some assurance that the plan addresses the critical aspects of a business continuity plan but will not reveal anything about its effectiveness. canvassing requisite procedures, offsite storage and environmental controls would provide insight into some aspects of the plan but would fall short of providing assurance of the plans overall effectiveness. 4. An organization has just completed their annual risk assessment. Regarding the business continuity plan, what should an IS auditor recommend as the next step for the organization? A. Review and evaluate the business continuity plan for adequacy B. Perform a full simulation of the business continuity plan C. Train and educate e mployees regarding the business continuity plan D. Notify critical contacts in the business continuity plan ANSWER A NOTE The business continuity plan should be reviewed every time a risk assessment is completed for the organization. training of the employees and a simulation should be performed after the business continuity plan has been deemed comely for the organization. there is no reason to notify the business continuity plan contacts at this time. 45. Which of the following insurance types provide for a loss arising from two-faced acts by employees? A. Business interruption B. Fidelity reporting C. Errors and omissions D. Extra get down ANSWER B NOTE Fidelity insurance covers the loss arising from fallacious or fraudulent acts by employees. Business interruption insurance covers the loss of profit due to the disruption in the operations of an organization.Errors and omissions insurance provides legal liability protection in the event that the professional practitioner c ommits an act that results in financial loss to a client. Extra expense insurance is intented to cover the extra costs of continuing operations following a disaster/disruption within an organization. 46. An IS auditor reviewing the risk assessment process of an organization should FIRST A. identify the reasonable threats to the information assets. B. dissect the technical and organizational vulnerabilities. C. identify and rank the information assets. D. evaluate the effect of a potential security breach.ANSWER C NOTE Identification and rank of information assetse. g. , data criticality, locations of assetswill set the tone or mount of how to assess risk in relation to the organizational value of the asset. Second, the threats set about each of the organizations assets should be analyzed according to their value to the organization. Third, weaknesses should be identified so that controls can be evaluated to determine if they mitigate the weaknesses. Fourth, analyze how these we aknesses, in absence of given controls, would impact the organization information assets. 47.An organization is using an enterprise resource management (ERP) application. Which of the following would be an effective access control? A. User- take permissions B. Role-based C. Fine-grained D. Discretionary ANSWER B NOTE Role-based access controls the system access by defining roles for a group of users. Users are assigned to the various roles and the access is granted based on the users role. User-level permissions for an ERP system would create a larger administrative overhead. Fine-grained access control is very difficult to implement and maintain in the context of a large nterprise. Discretionary access control may be set up or modified by the users or data owners, and therefore may create inconsistencies in the access control management. 48. The sender of a public key would be authenticated by a A. corroboration authority. B. digital signature. C. digital certificate. D. registra tion authority. ANSWER C NOTE A digital certificate is an electronic document that declares a public key holder is who the holder claims to be. The certificates do handle data authentication as they are used to determine who sent a particular message.A certificate authority issues the digital certificates, and distributes, generates and manages public keys. A digital signature is used to ensure integrity of the message being sent and solve the nonrepudiation issue of message origination. The registration authority would perform most of the administrative tasks of a certificate authority, i. e. , registration of the users of a digital signature plus authenticating the information that is put in the digital certificate. 49. Which of the following is the MOST reliable form of single factor personal identification? A. Smart card B. PasswordC. delineation identification D. Iris scan ANSWER D NOTE Since no two irises are alike, identification and verification can be done with confidence. There is no guarantee that a smart card is being used by the correct person since it can be shared, stolen or lost and found. Passwords can be shared and, if written down, carry the risk of discovery. Photo IDs can be forged or falsified. 50. A business application system accesses a corporate database using a single ID and password implant in a program. Which of the following would provide efficient access control over the organizations data? A.Introduce a secondary authentication method such as card swipe B. Apply role-based permissions within the application system C. Have users input the ID and password for each database transaction D. dress up an expiration period for the database password embedded in the program ANSWER B NOTE When a single ID and password are embedded in a program, the best compensating control would be a sound access control over the application layer and procedures to ensure access to data is granted based on a users role. The issue is user permissions, not authentication, therefore adding a stronger authentication does not improve the situation.Having a user input the ID and password for access would provide a better control because a database log would identify the initiator of the activity. However, this may not be efficient because each transaction would require a separate authentication process. It is a good practice to set an expiration date for a password. However, this might not be practical for an ID automatically logged in from the program. Often, this type of password is set not to expire. 51. Which of the following should be the MOST important consideration when deciding areas of priority for IT governance implementation?A. cognitive operation maturity date B. Performance indicators C. Business risk D. Assurance reports ANSWER C NOTE Priority should be given to those areas which represent a cognise risk to the enterprises operations. The level of process maturity, process performance and audit reports will feed into the decision making process. Those areas that represent real risk to the business should be given priority. 52. An IS auditor has been asked to participate in project initiation meetings for a critical project. The IS auditors MAIN concern should be that the A. omplexity and risks associated with the project have been analyzed. B. resources needed throughout the project have been determined. C. project deliverables have been identified. D. a contract for external parties involved in the project has been completed. ANSWER A NOTE Understanding complexity and risk, and actively managing these throughout a project are critical to a successful outcome. The other choices, while important during the course of the project, cannot be fully determined at the time the project is initiated, and are often contingent upon the risk and complexity of the project. 3. Which of the following would MOST effectively control the habit of universal storage bus (USB) storage devices? A. Policies that require instant dismissal if such devices are found B. bundle for tracking and managing USB storage devices C. Administratively disabling the USB port D. Searching personnel for USB storage devices at the facilitys entrance ANSWER B NOTE software product for centralized tracking and monitoring would allow a USB usage constitution to be applied to each user based on changing business requirements, and would provide for monitoring and reporting exceptions to management.A policy requiring dismissal may result in increased employee attrition and business requirements would not be properly addressed. Disabling ports would be complex to manage and might not allow for impertinently business needs. Searching of personnel for USB storage devices at the entrance to a facility is not a practical solution since these devices are small and could be easily hidden. 54. When performing a database review, an IS auditor notices that some tables in the database are not normalized. The IS auditor should ne xt A. recommend that the database be normalized. B. review the conceptual data model.C. review the stored procedures. D. review the justification. ANSWER D NOTE If the database is not normalized, the IS auditor should review the justification since, in some situations, denormalization is recommended for performance reasons. The IS auditor should not recommend normalizing the database until further investigation takes place. Reviewing the conceptual data model or the stored procedures will not provide information about normalization. 55. Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS communications protocol? A.Presence of spyware in one of the ends B. The use of a traffic sniffing tool C. The implementation of an RSA-compliant solution D. A symmetric cryptography is used for transmitting data ANSWER A NOTE Encryption using secure sockets layer/transport layer security (SSL/TLS) tunnels makes it difficult to intercept da ta in transit, but when spyware is running on an end users computer, data are hoard before encryption takes place. The other choices are related to encrypting the traffic, but the presence of spyware in one of the ends captures the data before encryption takes place. 56.At the completion of a system development project, a postproject review should include which of the following? A. Assessing risks that may lead to downtime after the production release B. Identifying lessons learned that may be applicable to future projects C. substantiating the controls in the delivered system are working D. Ensuring that test data are deleted ANSWER B NOTE A project team has something to learn from each and every project. As risk assessment is a key issue for project management, it is important for the organization to accumulate lessons learned and integrate them into future projects.An assessment of potential downtime should be made with the operations group and other specialists before implemen ting a system. Verifying that controls are working should be covered during the acceptance test phase and possibly, again, in the postimplementation review. visitation data should be retained for future lapse testing. 57. While reviewing the IT infrastructure, an IS auditor notices that storage resources are continuously being added. The IS auditor should A. recommend the use of disk mirroring. B. review the adequacy of offsite storage. C. eview the capacity management process. D. recommend the use of a compression algorithm. ANSWER C NOTE Capacity management is the planning and monitoring of computer resources to ensure that available IT resources are used efficiently and effectively. Business criticality must be considered before recommending a disk mirroring solution and offsite storage is unrelated to the problem. though data compression may save disk space, it could affect system performance. 58. Which of the following would be MOST important for an IS auditor to range when conducting a business continuity audit? A.Data backups are performed on a well-timed basis B. A recovery site is contracted for and available as needed C. Human safety procedures are in place D. restitution coverage is adequate and premiums are current ANSWER C NOTE The most important element in any business continuity process is the protection of human life. This takes precedence over all other aspects of the plan. 59. While reviewing sensitive electronic work paper, the IS auditor noticed that they were not encrypted. This could compromise the A. audit trail of the versioning of the work papers. B. approval of the audit phases.C. access rights to the work papers. D. confidentiality of the work papers. ANSWER D NOTE Encryption provides confidentiality for the electronic work papers. Audit trails, audit phase approvals and access to the work papers do not, of themselves, affect the confidentiality but are part of the reason for requiring encryption. 60. An IS auditor reviewing an accounts collectible system discovers that audit logs are not being reviewed. When this issue is raised with management the response is that additional controls are not necessary because effective system access controls are in place.The BEST response the auditor can make is to A. review the integrity of system access controls. B. accept managements statement that effective access controls are in place. C. dialect the importance of having a system control framework in place. D. review the background checks of the accounts payable staff. ANSWER C NOTE Experience has demonstrate that reliance purely on embarrassative controls is dangerous. Preventative controls may not prove to be as strong as anticipated or their effectiveness can deteriorate over time.Evaluating the cost of controls versus the quantum of risk is a valid management concern. However, in a high-risk system a comprehensive control framework is needed. Intelligent design should permit additional detective and correct ive controls to be established that dont have high ongoing costs, e. g. , automated interrogation of logs to highlight suspicious individual transactions or data patterns. Effective access controls are, in themselves, a positive but, for reasons sketch above, may not sufficiently compensate for other control weaknesses. In this situation the IS auditor needs to be proactive.The IS auditor has a total obligation to point out control weaknesses that give rise to insufferable risks to the organization and work with management to have these corrected. Reviewing background checks on accounts payable staff does not provide evidence that fraud will not occur. 61. A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment? A. Reviewing logs frequently B. interrogatory and validating the rules C. Training a local administrator at the new location D. Sharing firewall administrative dutiesANSWER B NOTE A flaw in t he rule set can render a firewall insecure. Therefore, testing and validating the rules is the most important factor in ensuring a successful deployment. A regular review of log files would not start until the deployment has been completed. Training a local administrator may not be necessary if the firewalls are managed from a central location. Having multiple administrators is a good idea, but not the most important. 62. When evaluating the controls of an EDI application, an IS auditor should PRIMARILY be concerned with the risk of A. xcessive transaction turnaround time. B. application interface failure. C. improper transaction authorization. D. nonvalidated jalopy totals. ANSWER C NOTE Foremost among the risks associated with electronic data vary (EDI) is improper transaction authorization. Since the interaction with the parties is electronic, there is no inherent authentication. The other choices, although risks, are not as significant. 63. The PRIMARY objective of implementin g corporate governance by an organizations management is to A. provide strategic direction. B. control business operations.C. align IT with business. D. implement best practices. ANSWER A NOTE Corporate governance is a set of management practices to provide strategic direction, thereby ensuring that goals are achievable, risks are properly addressed and organizational resources are properly utilized. Hence, the primary objective of corporate governance is to provide strategic direction. Based on the strategic direction, business operations are directed and controlled. 64. To determine if unauthorized changes have been made to production code the BEST audit procedure is to A. xamine the change control system records and trace them forward to object code files. B. review access control permissions operating within the production program libraries. C. examine object code to find instances of changes and trace them back to change control records. D. review change approved designations e stablished within the change control system. ANSWER C NOTE The procedure of examining object code files to establish instances of code changes and tracing these back to change control system records is a substantive test that directly addresses the risk of unauthorized code changes.The other choices are valid procedures to apply in a change control audit but they do not directly address the risk of unauthorized code changes. 65. When reviewing an active project, an IS auditor observed that, because of a reduction in anticipated benefits and increased costs, the business case was no longer valid. The IS auditor should recommend that the A. project be discontinued. B. business case be updated and possible corrective actions be identified. C. project be returned to the project sponsor for reapproval. D. project be ompleted and the business case be updated later. ANSWER B NOTE An IS auditor should not recommend discontinuing or complemental the project before reviewing an updated busin ess case. The IS auditor should recommend that the business case be kept current throughout the project since it is a key input to decisions made throughout the life of any project. 66. Which of the following audit techniques would BEST aid an auditor in determining whether there have been unauthorized program changes since the last authorized program update? A. Test data run B. Code review C.Automated code equation D. Review of code migration procedures ANSWER C NOTE An automated code comparison is the process of comparing two versions of the same program to determine whether the two correspond. It is an efficient technique because it is an automated procedure. Test data runs permit the auditor to verify the processing of preselected transactions, but provide no evidence about unexercised portions of a program. Code review is the process of reading program source code listings to determine whether the code contains potential errors or inefficient statements.A code review can be us ed as a mode of code comparison but it is inefficient. The review of code migration procedures would not detect program changes. 67. Doing which of the following during peak production hours could result in unanticipated downtime? A. Performing data migration or tape backup B. Performing clogive maintenance on electrical systems C. Promoting applications from development to the staging environment D. renewal a failed power supply in the core router of the data center ANSWER B NOTE Choices A and C are processing events which may impact performance, but ould not cause downtime. Enterprise-class routers have redundant hot-swappable power supplies, so replacing a failed power supply should not be an issue. Preventive maintenance activities should be scheduled for non-peak times of the day, and sort of during a maintenance window time period. A mishap or incident caused by a maintenance worker could result in unplanned downtime. 68. Which of the following is the MOST robust method f or disposing of magnetic media that contains confidential information? A. Degaussing B. Defragmenting C. Erasing D. Destroying ANSWER DNOTE Destroying magnetic media is the only way to assure that confidential information cannot be recovered. Degaussing or demagnetizing is not sufficient to fully erase information from magnetic media. The purpose of de fragmentation is to eliminate fragmentation in file systems and does not remove information. Erasing or deleting magnetic media does not remove the information this method simply changes a files indexing information. 69. The MAIN criterion for determining the severity level of a service disruption incident is A. cost of recovery. B. negative public opinion. C. geographic location. D. downtime.ANSWER D NOTE The longer the period of time a client cannot be serviced, the greater the severity of the incident. The cost of recovery could be minimal yet the service downtime could have a major impact. Negative public opinion is a symptom of a n incident. Geographic location does not determine the severity of the incident. 70. During the design of a business continuity plan, the business impact analysis (BIA) identifies critical processes and supporting applications. This will PRIMARILY influence the A. responsibility for maintaining the business continuity plan. B. criteria for selecting a recovery site provider.C. recovery strategy. D. responsibilities of key personnel. ANSWER C NOTE The most appropriate strategy is selected based on the relation back risk level and criticality identified in the business impact analysis (BIA. ), The other choices are made after the selection or design of the appropriate recovery strategy. 71. What is the lowest level of the IT governance maturity model where an IT balanced scorecard exists? A. Repeatable but Intuitive B. delimit C. Managed and Measurable D. Optimized ANSWER B NOTE Defined (level 3) is the lowest level at which an IT balanced scorecard is defined. 2. During the system testing phase of an application development project the IS auditor should review the A. conceptual design specifications. B. vendor contract. C. error reports. D. program change requests. ANSWER C NOTE examen is crucial in determining that user requirements have been validated. The IS auditor should be involved in this phase and review error reports for their precision in recognizing erroneous data and review the procedures for resolving errors. A conceptual design specification is a document prepared during the requirements definition phase. A vendor ontract is prepared during a software acquisition process. Program change requests would normally be reviewed as a part of the postimplementation phase. 73. When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures A. allow changes, which will be completed using after-the-fact follow-up. B. allow undocumented changes directly to the production program library. C. do not allow any em ergency changes. D. allow programmers permanent access to production programs. ANSWER A NOTE There may be situations where emergency fixes are required to settlement system problems.This involves the use of special logon IDs that grant programmers temporary access to production programs during emergency situations. Emergency changes should be completed using after-the-fact follow-up procedures, which ensure that normal procedures are retroactively applied otherwise, production may be impacted. Changes made in this fashion should be held in an emergency library from where they can be moved to the production library, following the normal change management process. Programmers should not directly alter the production library nor should they be allowed permanent access to production programs. 4. Though management has stated otherwise, an IS auditor has reasons to believe that the organization is using software that is not licensed. In this situation, the IS auditor should A. include th e statement of management in the audit report. B. identify whether such software is, indeed, being used by the organization. C. reconfirm with management the usage of the software. D. discuss the issue with senior management since reporting this could have a negative impact on the organization. ANSWER B NOTE When there is an indication that an organization might be using nlicensed software, the IS auditor should suffer sufficient evidence before including it in the report. With respect to this matter, representations obtained from management cannot be independently verified. If the organization is using software that is not licensed, the auditor, to maintain objectivity and independence, must include this in the report. 75. Which of the following would be BEST prevented by a raised floor in the computer machine room? A. Damage of wires around computers and servers B. A power failure from static electricity C. Shocks from earthquakes D. Water flood damage ANSWER ANOTE The primary r eason for having a raised floor is to enable power cables and data cables to be installed underneath the floor. This eliminates the safety and damage risks posed when cables are placed in a spaghetti-like fashion on an open floor. Static electricity should be avoided in the machine room therefore, measures such as specially manufactured carpet or shoes would be more appropriate for static prevention than a raised floor. Raised floors do not address shocks from earthquakes. To address earthquakes, anti-seismic architecture would be required to establish a quake-resistant structural framework.Computer equipment needs to be protected against water. However, a raised floor would not prevent damage to the machines in the event of overhead water pipe leakage. 76. The network of an organization has been the victim of several intruders attacks. Which of the following measures would allow for the early detection of such incidents? A. Antivirus software B. Hardening the servers C. Screening r outers D. Honeypots ANSWER D NOTE Honeypots can collect data on precursors of attacks. Since they serve no business function, honeypots are hosts that have no authorized users other than the honeypot administrators.All activity directed at them is considered suspicious. Attackers will scan and attack honeypots, giving administrators data on new trends and attack tools, particularly malicious code. However, honeypots are a supplement to, not a replacement for, properly securing networks, systems and applications. If honeypots are to be used by an organization, qualified incident handlers and intrusion detection analysts should manage them. The other choices do not provide indications of potential attacks. 77. The purpose of a deadman door positive access to a computer facility is primarily to A. prevent piggybacking.B. prevent toxic gases from entering the data center. C. starve a fire of oxygen. D. prevent an excessively rapid entry to, or exit from, the facility. ANSWER A NOTE The purpose of a deadman door controlling access to a computer facility is primarily intended to prevent piggybacking. Choices B and C could be accomplished with a single self-closing door. Choice D is invalid, as a rapid exit may be necessary in some circumstances, e. g. , a fire. 78. The MOST important reason for an IS auditor to obtain sufficient and appropriate audit evidence is to A. stick to with regulatory requirements. B. rovide a basis for drawing reasonable conclusions. C. ensure complete audit coverage. D. perform the audit according to the defined scope. ANSWER B NOTE The scope of an IS audit is defined by its objectives. This involves identifying control weaknesses relevant to the scope of the audit. Obtaining sufficient and appropriate evidence assists the auditor in not only identifying control weaknesses but also documenting and validating them. Complying with regulatory requirements, ensuring coverage and the execution of audit are all relevant to an audit but are not the reason why sufficient and relevant evidence is required. 9. During the audit of a database server, which of the following would be considered the GREATEST exposure? A. The password does not expire on the administrator account B. slackness global security settings for the database remain unchanged C. Old data have not been redactd D. Database activity is not fully logged ANSWER B NOTE Default security settings for the database could allow issues like blank user passwords or passwords that were the same as the username. Logging all database activity is not practical. Failure to purge old data may present a performance issue but is not an immediate security concern.Choice A is an exposure but not as serious as B. 80. An IS auditor finds that a DBA has read and write access to production data. The IS auditor should A. accept the DBA access as a common practice. B. assess the controls relevant to the DBA function. C. recommend the immediate repeal of the DBA access to production data. D. review user access authorizations approved by the DBA. ANSWER B NOTE It is good practice when finding a potential exposure to look for the best controls. Though granting the database administrator (DBA) access to production data might be a common practice, the IS auditor should evaluate the relevant controls.The DBA should have access based on a need-to-know and need-to-do basis therefore, revocation may remove the access required. The DBA, typically, may need to have access to some production data. Granting user authorizations is the responsibility of the data owner and not the DBA. 81. What should be the GREATEST concern to an IS auditor when employees use portable media (MP3 players, flash drives)? A. The copy of sensitive data on them B. The copying of songs and videos on them C. The cost of these devices multipl