Saturday, August 31, 2019

10 Schedule Management Plan Essay

The pilot project schedule is the roadmap for how the project will be executed. This part of our project as it provides the project team, sponsor, and sponsor, and stakeholders a picture of the project’s status at any given time. The purpose of the schedule management plan is to define the approach the project team will use in creating the project schedule. This plan also includes how the team will monitor the project schedule and manage changes after the baseline schedule has been approved. This includes identifying, analyzing, documenting, prioritizing, approving or rejecting and publishing all schedules-related changes. Schedule Management Approach Project schedules for the pilot project will be created using MS Project 2010 starting with the deliverables indentified in the project’s Work Breakdown Structure (WBS). Activity definition will identify the specific work packages which must be performed to complete each deliverable. Activity sequencing will be used to determine the order of work packages and assign relationships between project activities. The duration of activity estimating will be used to calculate the number of work periods required to complete work packages. Resource estimating will be used to assign resources to work packages in order to complete schedule development. See more: My Writing Process Essay Once a preliminary schedule has been developed, it will be reviewed by the project team and any resources tentatively assigned to project tasks. The project team and resources must agree to the proposed work package assignments, durations and schedule. Once this is achieved the project sponsor will review and approve the schedule and it will then be baselined. The following will be designates as milestones for the project schedule: – Completion of scope statement and WBS – Baselined project schedules – Approval of final project budget – Project kick-off – Approval of roles and responsibilities – Requirements definition approval – Completion of data mapping – Project implementation – Acceptance of final deliverables Roles and responsibilities for schedule development are following: The project manager Richard will be responsible for facilitating work package definition, sequencing, and estimating duration and resources with the project team. The project manage will also create the project schedule using MS Project 2010 and validate the schedule with the project team, stakeholders and the sponsors of the project. The project manager will obtain schedule approval from the project sponsor and baseline the schedule. The project team is responsible for participating in work package definition, sequencing and duration and resource estimating. The project team will also review and validate the proposed schedule and perform assigned activities once the schedule is approved. The project sponsor will participate in reviews of the proposed schedule and approve the final schedule before it is baselined. The project stakeholders will participate in reviews of the proposed schedule and assist in its validation.

Friday, August 30, 2019

The Effects of Wolf Predation

Abstract: This paper discusses four hypotheses to explain the effects of wolf predation on prey populations of large ungulates. The four proposed hypotheses examined are the predation limiting hypothesis, the predation regulating hypothesis, the predator pit hypothesis, and the stable limit cycle hypothesis. There is much research literature that discusses how these hypotheses can be used to interpret various data sets obtained from field studies. It was concluded that the predation limiting hypothesis fit most study cases, but that more research is necessary to account for multiple predator – multiple prey relationships. The effects of predation can have an enormous impact on the ecological organization and structure of communities. The processes of predation affect virtually every species to some degree or another. Predation can be defined as when members of one species eat (and/or kill) those of another species. The specific type of predation between wolves and large ungulates involves carnivores preying on herbivores. Predation can have many possible effects on the interrelations of populations. To draw any correlations between the effects of these predator-prey interactions requires studies of a long duration, and statistical analysis of large data sets representative of the populations as a whole. Predation could limit the prey distribution and decrease abundance. Such limitation may be desirable in the case of pest species, or undesirable to some individuals as with game animals or endangered species. Predation may also act as a major selective force. The effects of predator prey coevolution can explain many evolutionary adaptations in both predator and prey species. The effects of wolf predation on species of large ungulates have proven to be controversial and elusive. There have been many different models proposed to describe the processes operating on populations influenced by wolf predation. Some of the proposed mechanisms include the predation limiting hypothesis, the predation regulating hypothesis, the predator pit hypothesis, and the stable limit cycle hypothesis (Boutin 1992). The purpose of this paper is to assess the empirical data on population dynamics and attempt to determine if one of the four hypotheses is a better model of the effects of wolf predation on ungulate population densities. The predation limiting hypothesis proposes that predation is the primary factor that limits prey density. In this non- equilibrium model recurrent fluctuations occur in the prey population. This implies that the prey population does not return to some particular equilibrium after deviation. The predation limiting hypothesis involves a density independent mechanism. The mechanism might apply to one prey – one predator systems (Boutin 1992). This hypothesis predicts that losses of prey due to predation will be large enough to halt prey population increase. Many studies support the hypothesis that predation limits prey density. Bergerud et al. (1983) concluded from their study of the interrelations of wolves and moose in the Pukaskwa National Park that wolf predation limited, and may have caused a decline in, the moose population, and that if wolves were eliminated, the moose population would increase until limited by some other regulatory factor, such as food availability. However, they go on to point out that this upper limit will not be sustainable, but will eventually lead to resource depletion and population decline. Seip (1992) found that high wolf predation on caribou in the Quesnel Lake area resulted in a decline in the population, while low wolf predation in the Wells Gray Provincial Park resulted in a slowly increasing population. Wolf predation at the Quesnel Lake area remained high despite a fifty percent decline in the caribou population, indicating that mortality due to predation was not density-dependent within this range of population densities. Dale et al. (1994), in their study of wolves and caribou in Gates National Park and Preserve, showed that wolf predation can be an important limiting factor at low caribou population densities, and may have an anti-regulatory effect. They also state that wolf predation may affect the distribution and abundance of caribou populations. Bergerud and Ballard (1988), in their interpretation of the Nelchina caribou herd case history, said that during and immediately following a reduction in the wolf population, calf recruitment increased, which should result in a future caribou population increase. Gasaway et al. (1983) also indicated that wolf predation can sufficiently increase the rate of mortality in a prey population to preventthe population's increase. Even though there has been much support of this hypothesis, Boutin (1992) suggests that â€Å"there is little doubt that predation is a limiting factor, but in cases where its magnitude has been measured, it is no greater than other factors such as hunting.† A second hypothesis about the effects of wolf predation is the predation regulating hypothesis, which proposes that predation regulates prey densities around a low-density equilibrium. This hypothesis fits an equilibrium model, and assumes that following deviation, prey populations return to their pre-existing equilibrium levels. This predator regulating hypothesis proposes that predation is a density-dependent mechanism affecting low to intermediate prey densities, and a density-independent mechanism at high prey densities. Some research supports predation as a regulating mechanism. Messier (1985), in a study of moose near Quebec, Canada, draws the conclusion that wolf-ungulate systems, if regulated naturally, stabilize at low prey and low predator population densities. In Messier's (1994) later analysis, based on twenty-seven studies where moose were the dominant prey species of wolves, he determined that wolf predation can be density-dependent at the lower range of moose densities. This result demonstrates that predation is capable of regulating ungulate populations. Even so, according to Boutin (1992) more studies are necessary, particularly at high moose densities, to determine if predation is regulatory. A third proposal to model the effects of wolf predation on prey populations is the predator pit hypothesis. This hypothesis is a multiple equilibria model. It proposes that predation regulates prey densities around a low-density equilibrium. The prey population can then escape this regulation once prey densities pass a certain threshold. Once this takes place, the population reaches an upper equilibrium. At this upper equilibrium, the prey population densities are regulated by competition for (and or availability of) food. This predator pit hypothesis assumes that predator losses are density-dependent at low prey densities, but inversely density-dependent at high prey densities. Van Ballenberghe (1985) states that wolf population regulation is needed when a caribou herd population declines and becomes trapped in a predator pit, wherein predators are able to prevent caribou populations from increasing. The final model that attempts to describe the effects of predation on prey populations is the stable limit cycle hypothesis. This hypothesis proposes that vulnerability of prey to predation depends on past environmental conditions. According to this theory, individuals of a prey population born under unfavorable conditions are more vulnerable to predation throughout their adult lives than those born under favorable conditions. This model would produce time lags between the proliferation of the predator and the prey populations, in effect generating recurring cycles. Boutin (1992) states that if this hypothesis is correct, the effects of food availability (or the lack of) should be more subtle than outright starvation. Relatively severe winters could have long- term effects by altering growth, production, and vulnerability. Thompson and Peterson (1988) reported that there are no documented cases of wolf predation imposing a long-term limit on ungulate populations independent of environmental influences. They also point out that summer moose calf mortality was high whether predators were present or not, and that snow conditions during the winter affected the vulnerability of calves to predation. Messier (1994) asserts that snow accumulation during consecutive winters does not create a cumulative impact on the nutritional status of deer and moose. All of the four proposed theories mentioned above could describe the interrelationships between the predation of wolves and their usual north american prey of large ungulate species. There has been ample evidence presented in the primary research literature to support any one of the four potential models. The predation limiting hypothesis seems to enjoy wide popular support, and seems to most accurately describe most of the trends observed in predator-prey populations. Most researchers seem to think that more specific studies need to be conducted to find an ideal model of the effects of predation. Bergerud and Ballard (1988) stated â€Å"A simple numbers argument regarding prey:predator ratios overlooks the complexities in multi-predator-prey systems that can involve surplus killing, additive predation between predators, enhancement and interference between predator species, switch over between prey species, and a three-fold variation in food consumption rates by wolves.† Dale et al. (1994) stated that further knowledge of the factors affecting prey switching, such as density-dependent changes in vulnerability within and between prey species, and further knowledge of wolf population response is needed to draw any firm conclusions. Boutin (1992) also proposed that the full impact of predation has seldom been measured because researchers have concentrated on measuring losses of prey to wolves only. Recently, bear predation on moose calves has been found to be substantial, but there are few studies which examine this phenomenon (Boutin 1992). Messier (1994) also pointed out that grizzly and black bears may be important predators of moose calves during the summer. Seip (1992), too, states that bear predation was a significant cause of adult caribou mortality. These points emphasize that multiple-predator and multiple-prey systems are probably at work in the natural environment, and we must not over generalize a one predator – one prey hypothesis in the attempt to interpret the overall trends of the effects of predation of wolves on large ungulate populations.

Thursday, August 29, 2019

A House on Fire Essay Sample

Soon I was at the topographic point. Already a big crowd of people had gathered near a large edifice which was on fire. Fires were lifting high. Peoples were running approximately confused. The calls of kids got assorted with the scream of adult females. It was truly a heart-rending scene. Soon the intelligence spread. Some male child lookouts arrived at the scene. They at one time set to work. They brought buckets of H2O from the pat nearby and threw it on the fires. Some of them brought bags of sand. I. excessively joined in the work. Person rang the fire brigade. Soon it came down the street. doing a loud noise. The sound of its bell pealing tardily at dark served as an dismay to the people of the vicinity. They all rushed to the topographic point. Many came at that place to function the panic afflicted inmates of the house. The brass-helmeted work forces of the fire brigade at one time started their work. They took out their hose pipes and directed H2O towards the fires. It was after an. hour’s difficult labor that the fire began to decease out: At last it was extinguished. The edifice now presented a ghastly visual aspect. It was all charred and in ruins. The valuable furniture and dearly-won points of the house lay scattered on the route. The lookouts formed a cordon round the things and did non allow anyone come near them. The proprietor of the house was all but a destroyed adult male. He looked really sad. His married woman. an old lady. was crying bitterly. The kids. excessively. were terror stricken. They barely knew what catastrophe had overtaken the household. The fire brigade went back. The crowd besides melted off. Soon the topographic point was every bit deserted as earlier. No one knew the cause of the fire. It was rumoured that it was all the consequence of smoke. It was estimated that belongings worth one hundred thousand had been destroyed in the fire. Fortunately there was no loss of life. I. excessively. went back place. It was past midnight. I was tired out but happy that I had been of some aid.

Wednesday, August 28, 2019

Economic Repercussions of the Clean Air Act Essay

Economic Repercussions of the Clean Air Act - Essay Example In the public discussion over legal obligations versus economic rewards, there is a very limited knowledge of the fundamental economics concerned. If the goal is to regulate the discharge to an accurate, predictable level, direct quantitative regulations are apt to be most successful in attaining the social objective. If they can be checked and implemented, direct regulations will be effective in lessening pollution to a predictable level. It is far from evident that legislators must aspire for a definite pollution level. Being aware or predicting the right pollution level demands costs and benefits information that could be indecisive at best. Devoid of this particular knowledge legislators might prefer a technique that reduces the social costs stemming from the inaccurate costs or benefits information. This is likely to entail economic rewards instead of obligatory standards. While there are various views regarding the suitable objective of environmental policy, this paper supposes that environmental legislators pursue to take full advantage of the economic interests emerging from their policy decisions. The problem is that they are trying to exploit an indecisive ‘net benefit stream’, which is identified as the â€Å"difference between the health, aesthetic and material benefits of reducing air pollution and the costs of achieving this reduction† (Crandall, 1983, 59). There are critical setbacks of indecisiveness in approximating the costs of benefits of regulation. The importance of future health effects, the link between ambient quality of air and discharges from point-sources, the significance of reduced mortality or morbidity rates, and the regulation costs across various sources are the primary providers of this indecisiveness (Freedman & Jaggi, 1993). For each of these important connections, subjective or objective approximations should be performed by

Tuesday, August 27, 2019

A comparison of cultural literacies Essay Example | Topics and Well Written Essays - 3750 words

A comparison of cultural literacies - Essay Example They discovered a worldwide problem with regards to the access of the people to education. Base on their reports, there from non-western countries, there is an estimated 130 million children who are about to go to school will not be able to get any basic education based on the questions of poverty and their access to schools. A systematic comparison in educational system is the bottomline to first understand how an educational system caters to the need of the greater public. The essential function of providing education for people is for them to be literate and be globally competent. This might be dependent on how education has been deviced and presented to them since the younger age up to collage and how they or they do not benefit from it. There are considerable factors that are needed to be tackled in understanding this, such as the socio-demographic condition of a particular country, cultural upbringing and religious backgrounds, technological aspect and economic factors. Clear comparison between two different two educational system in divers cultural backgrounds, economic factors etcetera is imperative.There might be strong points to show comparison between the qualities of education to locations where poverty is high than those places with lower poverty. There is also a demographic considerations that is needed to be understood to visualize an effective comparisons to the present educational system (both tradional and innovative) and to the educational system of other non-western countries. First there is already the question about traditional and innovative education and how can or cannot be effective to cater the learner’s need. Both of them has the core goal of educating the public but perspective and approaches are not similar. The concern of traditional and non-traditional of innovative education can be rooted up from the ideas of people who claimed traditional education as too conservative and therefore not

Monday, August 26, 2019

Should goverments be responsible for homeless people Essay

Should goverments be responsible for homeless people - Essay Example Again, the government is responsible for the policies that are made, which result to high costs of living. These costs make people fail to afford homes. Governments are responsible for aiding their people, where the homeless are part of the people that should be helped. Many constitutions state that the government is for the people. Therefore, if the government is not able to support its own people, it shows a failure in its responsibilities. There are some countries like Scotland that support the homeless by providing them with housing facilities. This is a clear indication that it is very possible for other governments to support their citizens who are homeless. Another way of providing homes for the homeless is creating jobs for them. When the government introduces automated technology in the workplaces, which result to most of the workers being retrenched, it should provide alternative means for these people to get income. In conclusion, governments should be responsible for their own people. They should be in a position to offer homes and other needs because that is the main reason they are in existence; to serve their

The History of Technology of the Colt Revolver Essay

The History of Technology of the Colt Revolver - Essay Example Amongst the two distinguished firearms that helped in conquering the west are the 1873 model Winchister rifle and colt single action army model revolver. The Colt revolver revolutionized the entire firearms industry and how was war going to be fought on frontier from that time. The following pages illustrates the history of the revolver, the history of its inventor and how the revolver changed the way in which wars would be fought for ever. Prior the invention of the colt revolver the guns at that time required to be reloaded after every single shot was fired. This resulted in loss of plenty of lives in wars. The revolver that had a mechanically rotating cylinder so that it would not require to be reloaded after every single shot was fired was the goal of the gunsmiths for several centuries. It was in the year 1831 that 16 year old Samuel Colt made the first prototype model of a revolver with a mechanical cylinder. The Colt revolver was the fire arm that used a revolving cylinder and thus it need not require reloading after every single shot was fired1. The Samuel Colt worked with several gunsmiths in order to manufacture the prototype of the gun. The invention by Colt was patented over the course of several months in the year 1935 and 1936. The revolver mechanism that was designed by Colt is considered in some sense to more of an innovation than invention. The mechanism was originally used in muskets and rifles and wa s patented by a Boston based inventor named Elisha Collier. The mechanism was referred to as revolving flintlock. Colt’s mechanism which was an improved version of the earlier one developed by Elisha was patented by him in the year 1835 in UK. The American patent for the same was received by Colt was developed in the year 1836. The company started by Samuel Colt thus started manufacturing the revolver through the manufacturing facility that was based in Paterson in New Jersey. The ability of the revolver in firing 6 shots without the need

Sunday, August 25, 2019

The effects of alcohol drinking Essay Example | Topics and Well Written Essays - 750 words

The effects of alcohol drinking - Essay Example This paper will elaborate on the noxious effects of drinking on physical health, mental and psychological well-being and education that later lead to adverse consequences to society as a whole. Effects of Drinking It should be pointed out that alcohol drinking among youths has increased tremendously in last 15 – 20 years primarily due to peer influence, excessive drinking of family members, portrayal of exaggerated images of fortitude / bravery of actors in movies, continuous persuasive and reminder advertising of alcohol beverages. Kremer and Levy (2008) have highlighted that frequent / occasional alcohol drinking is common among students who share similar rooms with other alcohol drinkers. Nevertheless, the academic performance of such drinkers is significantly lower in comparison to non-drinkers. Usually, students end up with poor grades and low CGPAs as an outcome of their drinking habit (addiction to alcohol). Drinkers are found addicted to life-threatening drugs and narc otics. The second most dangerous effect of alcohol drinking on youths is behavioral misconduct and aggravation of thinking and understanding abilities (Snyder et al, 2006). ... As a result, unwanted pregnancies and sexually transmitted diseases take place, which negatively affects health of male and female students. For instance, the situation becomes grave when male students get indulged in sexual harassment, ‘dating violence’ and physical abuse to their female counterparts, which then lead to disciplinary violations and lack of harmony within premises of educational institutions (Miller et al, 2006). Other serious behavioral issues with youth drinkers include carelessness / recklessness / wildness in driving and aggressive moves towards other students; the outcomes of which are nothing but grisly accidents (life-long disabilities and financial losses) and unnecessary (baseless and avoidable) combats between / among rival individuals / groups. The worst outcomes of frequent alcohol drinking (especially the case with addicts) include lack of emotional stability / control and obvious personality weaknesses, which then leads to ‘suicides an d homicides’ as highlighted by Duncan et al (2005). For instance, emotionally unstable (and drunk) youths when become hopeless at a certain point in their life then they commit suicides, thereby considering any unfavorable outcomes and events as an end of the world. Similarly, when drunk youths are unable to satisfy themselves through aggression and physically torture towards their rivals, they select homicide as an appropriate option and assassinate their enemies. Conclusion I would now like to end up this analysis by summarizing the facts that alcohol drinking is not only detrimental for a drinker’s mental and physical health but also may lead to conflicts among people, suicides and murders. Society, as a whole, is affected because emotionally

Saturday, August 24, 2019

Risk incidence occurrence solution Article Example | Topics and Well Written Essays - 750 words

Risk incidence occurrence solution - Article Example Inadequate flow of information is one of the major incidences that pose a major risk in the provision of quality health care.Inadequate information flow impairs reliable and timely communication of important test results, hinders coordination of treatment or medication orders at points of transfer of care, and impedes the availability of critical information or data when required to influence the physician’s prescription decisions.In addition, poor information flow may result in improper patient identification, inadequate control and organization of the workforce, and improper documentation.Information flow is important in any health care facility because it ensure smooth communication between different departments and between patients and service providers. Lack of adequate information flow may result in numerous medical errors that may jeopardize the provision of quality health care. As such, there should be an appropriate system design that would ensure optimal and smooth f low of information between persons and departments within the health care institution.Solution In order to reduce medical error as a result of inadequate flow of information, the best solution is to develop an anonymous database that de-identifies datasets of identifiable health data and altering or removing specific elements of given information.In addition, anonymous database is aimed at enhancing information security ... The anonymous database system, which is based on administration database and reporting system, ensures successful daily management of data reviews, collection and coding. The web management tool deals with complex tasks of directing data, communicating work assignments and tracking each report or relayed information. The follow up process for private and confidential information is guided by a browser based data collection screens that provide for direct data entry and direct data collection (Hoffer &McFadden, 2002). Breakdown of responsibility The overall head of information system and database management will be the information systems manager. Although the information systems and database management policies will be developed by the top management of the health care institution, the operation policies and criteria for running the system will be conducted by the information system manager. The information system and database management will be controlled by the information manageme nt department (Bommel,2005). The information systems department will coordinate the communication of critical information between different departments. The main departments of the health care institutions are the finance department, sales and marketing department, procurement department, security department, pharmacy, healthcare management department, and the top management. All information will pass through the information systems department to ensure that they are stored securely in the database and adhere to HIPAA (The health insurance portability and accountability act).All members of staff in the information management department will have access to all information and will provide both physical and technical assistance to the Information

Friday, August 23, 2019

Financial Management Essay Example | Topics and Well Written Essays - 4000 words

Financial Management - Essay Example The companys fortunes have improved since the launch of a recovery programme by CEO Justin King in 2004. It is apparently closing in on ASDA with its improving market share of 16.22 per cent (ASDA:16.6 per cent). One of the three leading distributors of consumer goods in the UK, the Sainsbury group runs 350 supermarkets and 300 shops branded Sainsburys Local and Bells Stores, offering a range of articles from food to health care products, of which under half are sold under the companys own brand. The company also owns real estate and a bank, Sainsburys Bank, which offers such services as loans, insurance, fund management, and credit cards. It is headquartered in London, England. This paper shall discuss the financial management policies of Sainsbury PLC with regard to three aspects of its operations: Capital Asset Pricing Model, the Weighted Average Cost of Capital, and Dividend Policy. In order to apply the Capital Asset Pricing Model, it is necessary to find a method to estimate the future beta, a component of a security’s risk which cannot be eliminated through diversification, which can applied in estimation of future returns. The least squares regression can be used to develop a linear equation to explain the relationship between return on the stock and return on the market. The characteristic line is usually used to describe the relationship between the rate of return of a market portfolio and the rate of return of a security. It is derived by using regression analysis that summarizes a particular security or portfolios systematic risk and rate of return. The rate of return is dependent on the standard deviation of the assets returns and the slope of the characteristic line, which is represented by the assets beta. A characteristic line of a stock is the same as the security market line. The slope of the line, which is a measure of systematic risk, determines the risk-return trade-off. According to this metric, the more risk you take on -

Thursday, August 22, 2019

Health Care Communication Methods Essay Example for Free

Health Care Communication Methods Essay This notice is part of an information package I, as the administrator of the Shady Pines Nursing Home, will be sending out to both the staff here at the center and to the administrative staff of the Rolling Hills Corporation. This information will help facilitate the transfer of those residents here at Shady Pines that no longer fall under the prevue of the new corporate guidelines. As some of the residents have communication issues or have no local family support, we as their caregivers need to ensure that all methods of communication are utilized to ensure a smooth relocation situation. Some of these methods will include the more traditional types, such as letters or phone calls to the guardians of those affected by the relocation (Du Prà ©, 2005). Other methods available for our use will be electronic in nature. One type of electronic communication is email (Du Prà ©, 2005). Social media communication types, such as texts to the guardians, will be used when all other types of communication has failed. Each of these types of communication will also be used within the Shady Pines facility, to keep all staff updated on any changes that indubitably occur and to help ease the transition as well. Communication between the staff at Shady Pines and Rolling Hills is vital also, so that any conflicts can be handled efficiently. As I mentioned before, one of the different types of communication we have available to us is what many consider the traditional format. This type includes such methods as phone calls and letters to the guardians of the residents who are on the list to be moved (Du Prà ©, 2005). Please make sure to verify all contact information before releasing the minimal details in either the letters or phone calls. The team needs to make all conscious effort to follow all HIPAA regulations with these  communications. Contact your department manager if you have questions before sending out the written correspondences. We need to make the letters as easy to understand as possibl e. Letters are more secure than some other types of interaction in that the letter is addressed to the corresponding person. We will be using interdepartmental memos for the various correspondences within the Shady Pines facility. I see more phone conversations between our center and the Rolling Hills staff as this is a faster method of staying in touch with our new sister agency. Another method we will make use of will be emailed communication. Some of the residents’ guardians will have left their contact information, but there again, please be sure to follow all HIPAA regulations when including personal health information in said emails. This type of communication is sometimes quicker than letters, depending on the person’s access to a computer network. Email may not be the most secure method of communication. If a person uses a Smartphone as their access point and it is lost or stolen, then the emails and all personal health information (PHI) can be accessed by unauthor ized people. The last method I mentioned falls under the social media category. Methods such as texting, or posting any type of PHI on a social media site is strictly against all HIPAA policies, both state and federal. The best our contact staff can use the text messages for is to encourage the guardian to make contact with the center on an important matter. I have plans in the works to create a specific department to handle the details of contact between both the guardians, as well as the residents affected by the potential move. I plan to follow the same guidelines that the Health Resources and Services Administration (HRSA) have in place to manage the many different departments under the Department of Health and Human Services (HHS) umbrella. According to Draper (2014), â€Å"These communication mechanisms include the agency’s operational planning process; crosscutting workgroups and meetings; and regular communications among the Office of the Administrator, leaders in the bureaus and offices, and agency staff† (p. 18). Using these different processes will help keep everyone in the communication loop and give everyone the support needed during this merger of our two agencies. I have plans to continue this method of communication after the merger is complete to help insure the continuation of efficient interaction between both centers. As most of our residents are in the  older age category, we need to take particular interest in how we pass along the transfer information to those who require it. We should not discriminate on the resident’s ages and assume that all the affected residents will feel the same about the move to a new location (Du Prà ©, 2005). Every person is an individual and should be treated as such. Be considerate with those affected, as this will be a very traumatic experience for them. According to Du Prà ©, â€Å"patients interpret their health within the arena most familiar to them everyday life† (p. 116). That being said; it is important to be as empathic as possible, giving the resident as much information as he or she can handle to be able to understand the changing situation. Keep in mind that many of the residents have low health literacy and will not be able to understand some types of medical terminology in context. Be attentive to any stress indicators and be attentive to the feelings of those affected. I have mentioned the merger of our center with that of the Rolling Hills center. Good communication is needed to ensure that the transition from our center to the new one is a smooth one. We will be using such communication methods like phone calls, letters, email, and fax to keep all merger information up to date. Contact with the guardians of the affected residents will fall under all HIPAA regulations in the matter of the PHI given out. Keep in mind the medical literacy level of the residents involved in the move. Using the new department to keep all matters of contact organized and flowing will help increase our efficiency during this transitional period. Other information will follow listing the people who are in charge of in the transitional unit and what sections they cover. Again, if you have and questions or if any difficulties arise, please notify your department immediately. References: Draper, D. A. (2014). Review of Internal Communication Mechanisms, Staffing, and Use of Contracts. Washington DC, Maryland: GAO Reports. Retrieved from the University of Phoenix Library. Du Prà ©, A. (2005). Communicating about health: Current issues and perspectives (2nd ed). Boston, MA: McGraw Hill.

Wednesday, August 21, 2019

Internet security Essay Example for Free

Internet security Essay In the developed and developing world, the use of the internet has increased in popularity. The use of the internet has become the preferred mode of communication and resources for various players like industries, corporations, telecommunications, and governments and in business. In business, the internet has facilitated financial transactions that have greatly changed the face of business making it fast and simple and in conformation to the global village the technology has created. With the increased use of the internet, there has been a corresponding increase in cyber crime from criminals who are seeking either financial gains or other advantages for example military. The frequency of these attacks is very high and the levels of sophistication used are great . This makes it difficult for many organizations to determine new threats, their risk factors and ways of dealing with the menace (Cetron, et al, 2009). Many times it is difficult for the organizations to determine which attacks to deal with first and how to allocate resources to deal with them. In the commercial sector, attacks on electronic financial transactions have resulted in great financial losses and corresponding reductions in user confidence. Electronic transactions consist of funds transfers, data interchange, trade confirmations and benefits transfers. Many crimes that occur have plagued the industry for years like theft, service denial, extortion demands or fraud. Technology has however; greatly magnified the ability of major crimes to be committed in a matter of seconds. Electronic security is an industry that is growing and becoming globalised. This industry offers services in the categories of assessment, access and utilization. To demonstrate the severity of attacks on April, 2009, Chinese and Russian spies managed to infiltrate the United States of America electrical grid and inserted disruptive software into the system (Cetron, et al, 2009). An attack which occurred prior to this one on September 2008 would have caused the collapse of the global economy were it not for intervention. Unidentified hackers robbed the lucrative American financial market accounts a total of five hundred and fifty million dollars in a little less than two hours. If the accounts would not have been closed by the Treasury Department they would have lost almost six trillion dollars. This would have caused the global economy to collapse in approximately twenty four hours. One security threat is phishing. Phishing involves the acquisition of sensitive information like passwords, credit card details, usernames and pin numbers. It makes its presentation as being a legal entity. The unsuspecting victims are lured by receiving communications which purport to be from a popular website or payment processors. It is usually done through instant messaging services or emails (Shu-Min Shann-Bin, 2006). These communications directs the users to enter their details at a fraudulent website which bears a great semblance to the authentic one. Phishing attacks were observed on two popular brands which provide payment services for banks globally in the United States of America in February 2010. The fraudsters created phishing sites in English and other languages, the most popular being French. These websites targeted customers by sending spam mails with the subject proving the card number and claiming that there was a risk of fraudulent transactions taking place. This attack was created using two types of phishing websites. The first utilised Uniform Resource Locators which were created with domain names with many top level domain variants. The most popular domain which was utilised was . cz which represented the Czech Republic. Upon entering their sensitive information into a card holder page for the false verification, the page redirected to the real website. The second attack utilised Uniform Resource Locators with Internet Protocol domains which were hosted on servers based in the United States (Glaessner, 2002). The Uniform Resource Locators’ strings were very long, typically with more than seven hundred characters. The pages asked for sensitive data but had an auto signed debit card or credit card number. This auto signing was done by placing stolen numbers of cards obtained from earlier attacks on the form. Upon receipt of information the page was redirected to a blank page. Cross site scripting is a form of phishing that occurs in programs or websites that allow user input. If the input data is not properly sanitized the program may then process thee input or execute the codes which the original program was not to do. This has been used to redirect users to fake websites. Users are advised not to click on suspicious links in emails and to check the Uniform Resource Locator’s of the website to authenticate brands. It is also advised that one should type the brand domain name directly into the browser address instead of following links. The use of security software has also been recommended. Pharming involves redirecting the redirection of websites traffic and taking it to a false website. Pharming is done by either converting the hosts file on the victims’ computer or exploiting Domain Name Systems servers’ software (Basu, 2009). These Domain Names Systems servers main task is to convert internet names to their real addresses. A compromised server therefore does not direct traffic to legitimate websites. Highly vulnerable sites of compromised are near internet leaves. If wrong entries on a computer’s host file are made it results in circumvention of name lookup using its own name to Internet Protocol mapping, this makes it a popular target for malware. Once it is rewritten a user can be redirected to a fake copy. The better targets for pharming are desktop computers as they receive poor administration in comparison to most other internet services. Host file compromises can compromise the network router. Many routers specify Domain Name Systems to clients on the network and wrong information here spoils the entire local area network. A compromise in routers is very hard to detect. Pharming also occurs by infecting the victim’s computer with malware or a virus. This causes the redirection of a website to a fake one. An unsuspecting user may enter information site unaware. To avoid pharming, users are advised to search for details that prove that the website is authentic. Typing the sites address into the browser bar also offers some protection. Use of an antivirus to reduce virus infiltration into the computers is also recommended. Vigilance is important in warding off attacks. Trojan horses are also a great threat to internet security. Trojan horses present themselves as valuable software which is available for downloading on the internet. This fools many people into downloading the virus in the presumption that it is another application. A Trojan horse is usually separated into parts which are the client and the server. The client is usually disguised as important software and is situated in some sharing networks like peer to peer or uncertified websites for downloads. As soon as the client Trojan is executed in the computer, the attacker who is the person operating the server has great control over the computer and can destroy it depending on his purpose. The spread of the Trojan horse virus can occur through email attachments using various spamming techniques. Malware creators spread the virus through chat software like Skype and Yahoo Messenger. The virus may also infect other machines by distributing copies of itself to those in the address book of the infected computer. There are many types of Trojan horses. Remote access Trojans give attackers complete control of he victim’s computer and access to any information stored in the files. Password Trojans copy all passwords and look for passwords as they are keyed into a computer and send them to a certain email address. Key loggers log the keystrokes used by victims and send the log information to the attacker and can be configured to online and offline modes of recording. Destructive Trojans cause destructions to files and deletes them completely from infected computers. They are able to delete all system files of a computer (Basu, 2009). While there are other types of Trojans not mentioned here, it should be noted that a Trojan may work with a combination of some of the functionalities explained. To best avoid a Trojan hose virus attack, one should open email attachments or files received from strange senders. Installing and updating an antivirus program is also helpful. For secure electronic online transactions certain criteria have to be addressed and met. There must be secure access control which determines who has access to a system and be able to deny access to intruders. Proper authentication of users and message integrity must also be established. Privacy of the parties involved must also be safeguarded and maintained (Shu-Min Shann-Bin, 2006). Non-repudiation must be ensured where the sender cannot deny (falsely) sending a message. The use of online signatures has also been manipulated to commit fraud. Electronic signatures are a recognized electronic way of showing that a person has accepted the contents of a message sent electronically. These signatures are increasingly being used in electronic commerce and have evolved into digitized signatures which are encrypted and more secure than a simple electronic signature. While they are themselves subject to fraud the purpose of their creation was to combat fraud (Hansen, 1995). Electronic signatures are based on legal principles which have to be understood by the institutions which wish to use it. The use of digital signatures is a code that authenticates the origins of a document. A well done electronic signature causes the signer to be uniquely identified. It also causes the document to be locked using encryption technology and is electronically stamped throughout the process with time and date. It also stores the document for access without fear of being lost or its existence denied. The security of electronic financial transactions can also be enhanced by the use of digital certificates against phishing and pharming. To avoid manipulation of transactions in signature based online banking, utility of Class-3 electronic card readers should be explored. Virus scanners should be used to protect from Trojan horses. Care when downloading software should be exercised. With the mass adoption of technology, countries around the world are increasingly using technological based solutions to address their needs and carry out their functions. The use of the internet has created a highly competitive market. While cyber crime has not infiltrated or integrated itself equally in many countries it is an industry that is growing very fast and deserves much global attention (Shu-Min Shann-Bin, 2006). As earlier discussed, it has the potential of destroying whole markets and creating great havoc. Attempts to control cyber crime have not been concerted. Many challenges have arisen in trying to control this threat. Technology is a fast changing and cyber crime has achieved very high levels of sophistication. Cyber criminals have designed malware which are virtually undetectable and are difficult to diagnose. It has proved challenging to design and keep up with these creations (Glaessner, 2002). Due to the high levels of vulnerability to cyber attacks there is an urgent need to formulate clear policies. These policies should include guidelines on how to cyber crime is to be dealt with. This should include coming up with laws that will outline prosecution of cyber criminals due to the potential of these criminals to create damage and go unpunished and detected. Users of the internet and the various services it offers should also assume personal responsibility for their own safety (Cetron, et al, 2009). Studies have shown that the ‘human factor’ is largely the cause of the success of cyber crime rather than advancements in technology. In the United States, despite various public campaigns on internet security, people continue to be reckless with their personal information. This leaves them very vulnerable to attacks by cyber criminals. Predictions have been made that incidences of cyber crime will continue to increase. Users should therefore be very vigilant in monitoring their information. Software to combat cyber crime is available and users should take the initiative to acquire this software to alert them of suspicious websites or claims. They should also regularly update their software like antivirus which is highly dynamic due to the creation of new viruses and malware that occurs at a very high rate (almost daily). In conclusion, electronic financial transactions have created great savings in terms of financial savings for both providers and users and reduced the wastage of time. The use of this technology has correspondingly exposed its users newer forms of crime and every effort must be made to combat cyber crime.

Tuesday, August 20, 2019

The Effects Of Plastic Waste Environmental Sciences Essay

The Effects Of Plastic Waste Environmental Sciences Essay Plastic is the general common term for a wide range of synthetic or semi synthetic organic solid materials suitable for the manufacture of industrial products. Millions of plastic products are manufactured each year throughout the world. As the technology for their production increases, even more products will enter the plastic age. The major chemicals that go into the making of plastic are highly toxic and pose serious threat to living beings of all species on earth .So, there are many aspects that affect the plastic: the environmental and include human, plants and animals and in economic terms. All of this cost a lot of money because finding alternatives require a lot of researches and studies which is expensive either.. We have many solutions for this problem such as recycling and we introduce the step of recycling and the effect of recycling .Finally how can we reduce using of plastic? Introduction almost certainly you will see plastic. Our homes, offices, schools, hospitals, factories -indeed, our entire surroundings are dominated by products made from this material. We live in the age of plastics; bright, attractive, colorful, long-lasting, relatively inexpensive substances whose invention has revolutionized the manufacturing industry. Plastic certainly have advantages. Unfortunately, they also bring problems to our world, not the least among these being the generation of vast quantities of waste material. This report will speak about : The definition of plastic History of the plastic Chemical structure Types of plastics and their uses: Good plastic Bad plastic Damage of the plastic The Effects of Plastic on environmental The Effects of Plastic on Human The Effects of Plastic on plant The Effects of Plastic on animals The Effects of Plastic on economy Solutions to avoid plastic problems Plastic Recycling Solution to avoid using of plastic. Definition of plastic: We must know When plastic invent?. Also where it use in that time ?. All this question we will answer it in this part of report. In addition, we will tell you about chemical structure for plastic to know why it does not Degrad? History of the plastic : Plastic is a term of a polymeric material. In 1855 Alexander parkes invent the plastic and he called it parkesine but later it called celluloid. The plastic was revealed in London at 1862 Great International Exhibition. However, some polymers which can occur naturally like rubber wasnt known until 1910 when was the development of synthetic polymers. In 1909 Leo Baekeland invented phenolics or Bakelite a plastic material. Little would he have realized then what a profound effect this and other plastics would have upon ourselves and our earth. His invention marked the beginning of a new plastic age that has transformed many aspects of industry and our lives. Great enthusiasm greeted the discovery, and plastic was labeled the manufacturing material of the future. When those polymers appears,people thought that it is suitable to the engineers needs. Bakelite was one of the first developed commercial plastics and they used as a cover of early radios. Later on, in the second world war plastic like nylon and polyethylene used as replacement material for other materials in short time. Because the early plastics were not complete chemically stable, it become popular as a unreliable and cheap material. Nevertheless, the plastic technology was developed which let the plastics to be very useful and reliable as a material to design product. The plastic characterized by its light-weight , the possibility to colored when manufacturing. Plastics are used widely for products packaging and other applications where mechanical strength is not conceder premium. And plastic can model complex shapes in an easy way. à ¢Ã¢â€š ¬Ã†â€™ Chemical structure Thermosets assumed to have unaccounted of molecular weight. But in fact its common range around 20,000 and 50,000 amu . these chains are composed of a sequence of molecular units are called repeating units. The majority of plastics have polemers of hydrogen, carbon, nitrogen, chlorine and oxygen or sulfur for the backbone. The backbone of the chain is the part that function as a linking of a big number of repeating units. But what gives the plastic its qualities are the molecular groups that connect the backbone. This set of polymer properties of repeating molecular structure units allowed plastic to be an important part of the twenty first century. Plastics are organic liquids which dissolve in big qualities into solid polymers. This effect the the chain to be regardless of the disappearance by a liquid of oil. This lisette them to make them slide over each other easier . this what makes plastic very flexible and reduced its tensile strength the plasticier should not own a vapour pressure or it will leave the plastic brittle again when it is evaporates. It proved to be clean, inexpensive, long-lasting, strong, and able to be produced in a wide range of bright and attractive colours.The irony is that their strength and durability are two of the factors which make plastics cause serious disposal problems. Types of plastics and their uses: There are around 30 different types of plastic in regular use. We will tell you about four kinds of plastic that people use it and it some time we can say it is good for use, Also we will write some kinds of them. Then we will write about bad plastics that human use. Good plastic: Probably the easiest to identify is Polyethylene Terephthalate, or( PET). It is used for the clear plastic bottles which we find in supermarkets, containing fizzy drinks such as lemonade and cola. PET soft drink bottles make up about 20 per cent of all moulded plastic containers. Seventy per cent are soft drink bottles made of another type of plastic.it was known as the safest and as a well known plastic and easy to be recycled. However, recently they found that traces of DEHP in a water bottles kept in PET bottle for over 9 months. . Called high-density polyethylene or (HDPE). Scrap from PET is used to make fibre fill, a lining material for jackets, pillows and sleeping bags. It is also used as lining in the upholstery of furniture and as a fiber in the construction of carpets. HDPE plastic is used in the manufacture of garden furniture, flower pots, toys, dustbins and various other sorts of plastic containers. HDPE is considered safe and easy to recycle. (LDPE) Low density polyethylene, used in gro ­cery plastic bags , some bottle and most of the plastic wraps. So now can you guess the number of plastic bags used in the world per year? 500 billion per year !!. In other words, thats almost 1 million plastic bags used per minute it is popular by its safety but difficult to recycle. polypropylene (PP) used in most deli, syrup, rubber maid, yogurt and soup containers, and some straws besides baby bottles. Bad plastic: (PVC) or (V) or (DEHA) : Polyvinyl chloride used for wrap, , some types of plastic compress cooking oil, peanut butter jars and bottle like, window cleaner bottles and detergent. (PVC) is famous to be connected with liver cancer. (DEHA) is related to the harmful effects on bone structure, spleen, body weight , liver and kidney. And this is recyclable the least. (ps) polydtyrene used to make eggs cartons, bowls, not reusable cups and plastic plates and styofoam food trays. Styrene is filtered from polystyrene and it conceder toxic to the nervous system and the brain .PS also known to affect liver, red blood, kidneys and stomach in animals studies . and it is not easy to recycle this type of plastic. Polycarbonate used in sports water bottles, metal food , clear plastic cups, body bottles, water bottle of 5- gallon and plain plastic dishes. The new plastic with bio- base can be labeled number 7. It has the ability to leak Biphenyle A, the material that the hormone estrogen. It is known to increase prostate cancer, produce ovarian dysfunction, genetic damage , etc . Millions of plastic products are manufactured each year throughout the world. As the technology for their production increases, even more products will enter the plastic age. Many of the plastic products around you are made by a process known as injection moulding. Molten plastic is squirted into a mould, where it quickly cools and reproduces the shape and form of the mould itself. When the plastic has cooled, the mould is opened to revel the finishing product. This amazingly quick and accurate process is used for a variety of goods, from dustbins to high-precision watch parts, and including items such as kettles, irons and cookware. Almost no labour cost are involved, and therefore plastic products are inexpensive compared to those made from the materials. They are also colorful, attractive and easily cleaned. We are living in plastic age, with its many advantages. Unfortunately, it is an age which brings inevitable and serious problems for our earth. And as support for information we put a Pie chart to see the Percentage of different types of plastics found in Egypt. Also a picture show the important types of plastics and in what it use? Damage of the plastic The Effects of Plastic on environment: There are many of the damage caused by the plastic of living organisms (human, animal and plant). Plastic contains some chemicals that are difficult to Nhalilha and constitute a threat to the ocean environment and living organisms. plastic factories produce a great amount of green house gases and carbon dioxide . which lead to significant increase in global warming that can change many species habitats therefore their numbers will decrease. another fact that most kind of plastic diffuse toxic pollutants to the atmosphere, besides burning plastic generate toxic fumes fuse with the air. In addition these toxics can leak to the soil and groundwater and cause contamination of soil and groundwater which makes it impossible to grow the plants . these harmful chemicals have the ability to conflict with hormones in the body which is a major reason of many disease and faultiest in cells functions. The Effects of Plastic on Human: Plastic contains chemicals that cause damage to the nervous system and immune system and some genetic diseases. If the plastic exposed to high temperature is produced from the melt poisonous substances called dioxins, causing this article some tumors, birth defects, genetic mutations, and cause gas and vehicles Alheidrockeropponip liquid resulting from plastics pollution in the air and the earth, as well as causing chemicals resulting from the manufacture of plastics, such as oxide, ethylene, gasoline and Alaakslin destruction of the nervous system and immune system and certain types of cancers, kidney disease, and this chemical pollution dangerous resulting in poisoning of food and causing health problems are complex, most important of which increase the chance of infertility and disease cancer and hormonal imbalance in the body and disturbances in the nervous system and imbalance in the mental capacity. Prevents heating food in the microwave using plastic containers, especially tho se of food containing fat, which leads to the food poisoning which affects the body and human health. The Effects of Plastic on the plants: Bags and volumes of plastic if stabilized volumes and bags on the plants to prevent the arrival of sufficient light to also prevent them from breathing at night and hinder its growth, if you reach this material to the soil to prevent it from breathing and ventilation, may reach hundreds of years, because most microorganisms can not analysis of plastic materials, plastic bags that need to be 1000 years to decompose in the soil. because they contain chemical analysis difficult. The Effects of Plastic on animals: The plastic is a danger to marine animals, when you get these materials to the seas and oceans is destroying the marine environment. When you get to work on the dam fish gills and prevent them from breathing and cause death. As well as causing damage to wildlife that may be addressed, causing blockage of the gastrointestinal tract and lead to death. Furthermore, around 100,000 animals like dolphins ,penguins and turtle whales are killed because of the plastic bags. Many animals eat the plastic bags by mistake this problem doesnt end in here because later when these animals died , the animal body will decompose but the plastic will not decompose and it will kill another victim. The Effects of Plastic on economy: Plastic types are vary , some of them are petroleum -based plastic . which need more than 12 million barrels of petrol in its industry ,this type of plastic has a sharp increase in its price because of the petrol price . So scientists tried to find alternative materials for the petrol so they suggested to use oil shale and tar oil but it still expensive .besides people use plastic in big amount which can affect the economy of the individuals and country for example many people in the countries where water cannot be consume ,they buy bottled water which cost a lot yearly and increase the amount of plastic waste ,for that environmental groups like Clean Up the world suggest to find places of the good water to let the people use them instead of the bottled water. However ,all of this cost a lot of money because finding alternatives require a lot of researches and studies which is expensive either. Solutions to avoid plastic problems Plastic Recycling There are many studies try to solve plastic problems in earth. But we didn`t wrote about all this studies. We will talk about the most effect solution. Then we will take about some proposals can help to less a damage of plastic.

Monday, August 19, 2019

Robert E. Lee :: essays research papers

Condi Rice: the Warrior Princess Condi Rice is the top leading female African-American politician to hold a high-ranking and influential position in the United States government today. From her lengthy and experienced background, Rice has established herself among the elite in Washington, D.C. Her commitment to the foreign policy of this great nation has proven very strong over the many years that she has worked for the government. With the confidence of President Bush behind her, Rice has and will continue to lead the front for peaceful relations with different nations to spread democracy and human rights. In 1954, Rice was born in Birmingham, Alabama the year before the civil rights movement would take place. Going up in a brutally racist environment, little Condi, who enjoyed reading books and playing the piano, didn’t let the violence affect her. Even though the pain and suffering that surrounded her was immense, she did not let it prevent her from making her dreams come true. For Condi Rice, her best area in government is dealing with foreign relations. A perfect example of Condi Rice’s keen intellect of foreign policy would be her knowledge of the Soviet Union during the final years of the Cold War. When the Soviet Union collapsed, human rights in that region were to be changed forever. People gained the freedom of speech, freedom of religion, and the right to vote. Rice firmly believes â€Å"nothing improved human rights as much as the collapse of Soviet power.† With the fall of the Soviet Union, the United States had now become the world’s only superpower. We benefited greatly in this peaceful victory. â€Å"American values are universal. Their triumph is most assuredly easier when the international balance of power favors those who believe in them. But sometimes that favorable balance of power takes time to achieve, both internationally and within a country,† said best by Rice. She is referring to strong countries that do n ot need to isolate themselves such as the Soviet Union did during the Cold War. Other powerful states need to join the peaceful global community.   Ã‚  Ã‚  Ã‚  Ã‚  After her successful term in office as the National Security Advisor for the first Bush administration, Rice was nominated to become the Secretary of State for the second Bush administration. During the ceremony when she was sworn in, â€Å"the new secretary spoke of the need to work in partnership with allies and others around the world ‘putting the tools of diplomacy to work to unite, strengthen and widen the community of democracies.

The Gold Card :: Dialog Essays

" I always told you kids don’t buy it unless ya got the money." "Hey let’s go grab a bite to eat." "Yeah! that sounds good. I heard there is a new restaurant down on Grand that’s suppose to be good." "Okay", said my friend Shannon. We arrived at the restaurant and sat down. The waiter brought our menus. "I’m gonna get the broiled salmon in creamy herb sauce" "I’m gonna have the vegi ravioli" Shannon said. "MMMM that sounds good." I replied. The server brought our food and we enjoyed catching up with each other. "Wow that was so delicious wasn’t it?" "Yeah, hey this one is on me because I think you treated last time." "Thanks" Shannon replied. Then I whipped out my shiny Gold Platinum card at 3.9%. The waiter came by with that little black waiter case thing and a couple of mints. We paid and then we left. "Say do you mind if we go by the mall real quick I just want to check a new store that’s opened up?" Shannon replied, "sure that’s cool." "I just gotta pull into the Super America for some gas." I said. "I’ll pump you pay?" Shannon said. "Sure." I responded. I dashed in to the SA and headed to pay. I noticed an article about alien babies that I had heard about. " I read that one" a voice came from behind. I turned around and it was a short bald guy with a bag of cheetos in his hand. "Really, how was it ? Worth $1.95?" "Yeah" he said. So I grabbed it. Then I remembered that I needed some oil for my car. I grabbed some Valvoline and got back in line. "That will be $27.09 please." "Shoot, I don’t have enough cash." So I whipped out the gold again and zooooom we were off to the mall. " Let’s check out that new clothing store on the second floor. It’s supposed to be really cheep. I’d also like to go to that CD shop." "O.K., but I need to go to the cash machine first," Shannon said. "Great," I said, "I’ll meet you in the chocolate factory." There I was in the chocolate shop waiting for Shannon, when I remembered that my mother’s birthday was coming up. So I thought I’d buy her some nice chocolates. The coffee beans looked tempting as well. "I’ll have a pound of the french roast chocolate coffee and these chocolates as well.

Sunday, August 18, 2019

Sexual Empowerment of Women in Behns The Willing Mistress and The Disa

Sexual Empowerment of Women in Behn's The Willing Mistress and The Disappointment     Ã‚   "All women together ought to let flowers fall upon the tomb of Aphra Behn, . . . for it was she who earned them the right to speak their minds." (Woolf 91) Born in 1640, Aphra Behn broke gender stereotypes when she undertook a thrilling (if unrewarded) life as a spy for the Crown, but it was her scandalous career as an author which truly achieved many firsts for women. She was the first woman to support hereself financially by solely relying on the profession of writing, and many readers argue that Oroonoko--her passionate tale about the institution of slavery--was the first English novel. She was certainly one of the first female authors to write candidly about sexuality: in fact, she both broke new ground and challenged conceptions of patriarchal power when she wrote about women's empowerment through sexuality. In her poems "The Willing Mistress" (from her play The Dutch Lover, 1673) and "The Disappointment" (1680), Behn creates situations of bold sexual mischief in which female characters are aware of, comfortable with, and even thrive off their sexuality. Not only was it virtually unheard of for a woman of Behn's time to express herself openly as a sexual being, but it was also explicitly forbidden by cultural precepts for a woman to so aggressively take charge of her own physical desires and satisfaction, as Behn's characters do. Previously, men were in control of most sexual situations--both in real life and in literature. Behn, however, creates a playing field where the traditional roles not only do not apply but are subverted. Urged to seize the day, Behn's willing mistress does so, following her lover into the bushes and co... ...dent women created from Behn's mind refute her era's consensus that ... Behn conveys that women can control their own destiny; they can hold the power. Although these sentiments were certainly ahead of their time, they did help pave the way for future generations of women to express themselves honestly, sexually or otherwise. For that, all women are indeed eternally indebted to Aphra Behn. Works Cited Behn, Aphra. "The Disappointment." The Norton Anthology of Literature by Women. 2nd ed. Eds. Sandra Gilbert and Susan Gubar. New York: Norton, 1996. 112-115. ---. "The Willing Mistress." Norton. 111. Bradstreet, Anne. "A Letter to Her Husband, Absent Upon Public Employment." Norton. 89. Woolf, Virginia. "Aphra Behn." Excerpted from A Room of One's Own. Reprinted in Virginia Woolf: Women and Writing. Ed. Michele Barrett. New York: Harvest, 1979. 89-91.

Saturday, August 17, 2019

“Coming of Age”

In life most people just cannot wait for the chance of becoming a â€Å"grown up†. Anticipating the chance to have more independence and the opportunity to do things that were perceived as being mature and cool. While growing up, the people suffer through a set of changes as they develop a sexually mature adult body. While these changes are primarily physical in nature, profound mental, emotional and social, changes also occur as youth adapt to their maturing bodies. A young Jewish girl who had to go into hiding during the Second World War to escape from the persecution of the Nazis suffered a lot.Although rejected and isolated, she didn? t stop showing signs of coming of age as a normal girl such as having an imaginary friend, entering puberty and having sexual curiosity. First of all, Kitty, Anne? s diary, came to help to deal in the time of transition. Young children often have imaginary friends. Anne Frank, after she followed her family into hiding, never enjoyed this luxu ry. Her diary became Anne? s friend, her retreat from a microcosm imposed upon her and the seven other Jews imprisoned in the loft because of Hitler’s master plan of genocide against Jews and other groups.Even before the Franks entered the loft, Anne had named her diary â€Å"Kitty. †Ã‚   (Shuman). Kitty helps Anne deal with the huge change and the reader sees it when she writes to her about the Annex. â€Å"I’ve probably bored you with my long description of our house, but I still think you should know where I’ve ended up† (Frank 25) and when how her world turned upside down because of the sudden change. â€Å"It seems like years since Sunday morning. So much has happened it’s as if the whole world had suddenly turned upside down. But as you can see, Kitty, I’m still alive† (Frank 19).In these two quotes, Anne is telling Kitty that a lot have happened and she doesn’t feel comfortable being in hideout but at least she is still alive and has a friend who can tell everything. In writing to Kitty, Frank is trying to reach out to the normal world beyond her confined quarters. She misses school and her old friends. As the youngest in the secret annex, she is treated with condescension by the adults and sometimes scolded for her boisterousness. To overcome these feelings of isolation, she invents a friend in whom she can confide (Furst). I hope I will be able to confide everything to you, as I have never been able to confide in anyone† (Frank 1). During her time in the annex Anne feels that despite having her parents, it’s better to tell everything to Kitty. † Paper has more patience than people† (Frank 6). The Jewish girl feels that no one interested of what a thirteen year-old girl has to say and it’s better to write what she feels without fear of being judged and that was really hard for her because of being Jewish in times of the Holocaust. After Germany invaded Nether lands and the government began to persecute Jews.Anne dropped her studies and lost contact with all her Jewish friends. During hideout, Kitty acted as Anne’s trusted confident when there was no one else to tell her secrets to. Kitty provided comfort in times of stress and companionship when she was lonely. â€Å"I hope you will be a great source of comfort and support† (Frank 1). Anne Frank was a popular girl in the school but she felt like she didn’t have a lots of friends and that’s one of the reasons why she had such a strong relationship with Kitty. The reader later learns that neither Mrs.Frank nor Margot offered much to Anne in the way of emotional support and even though Anne’s father tried everything he could, he failed. â€Å"And yet for a long time I’ve felt extremely lonely, left out, neglected and misunderstood. Father did everything he could to curb my rebellious spirit, but it was no use†¦ Why didn’t father support me in my struggle? Why did he fall short when he tried to offer me a helping hand? The answer is: he used the wrong methods. He always talked to me as if I were a child going through a difficult phase† (Frank 329).Anne does realize that her father did try to help her but he failed; although Kitty didn’t. Kitty was always with her. † So far you truly have been a great source of comfort to me, and so has Kitty, whom I now write to regularly. This way of keeping a diary is much nicer, and now I can hardly wait for those moments when I’m able to write in you. Oh, I’m so glad I brought you along! † (Frank 1). Furthermore, during her concealment from the German soldiers, Anne started to show physical signs of growing up as her body started to change.Anne Frank? s puberty began when she was 13 years old. Her breasts started to developed and because of the change, she had a terrible urge to feel her breast at night in bed. In addition, hair began to g row, and at the end Anne finally got her period. â€Å"I think that what’s happening to me is so wonderful, and I don’t just mean the changes taking place on the outside of my body, but also those on the inside. I never discuss myself or any of these things with others, which is why I have to talk about them to myself.Whenever I have my period (and that’s only been three times), I have the feeling that in spite of all the pain, discomfort and mess, I’m carrying around a sweet secret† (Frank 160). At many points in her diary, the young girl expresses her desire to grow up so that her family take her seriously and she hopes to have her period thinking of it as physical sign of adulthood would make others respect her. When her period didn? t brought her family to respect her maturity, she continued to enjoy it as a â€Å"sweet secret†. At the time she made her first entries into her now-famous diary, she was pampered and immature (Shauman).Duri ng Anne’s changes, the reader feels that she is no longer a naive kid because she leaves her normal childhood behind and becomes more mature and thoughtful due to the unusual circumstances of the Holocaust. â€Å"I was suffering then (and still do) from moods that kept my head under water (figuratively speaking) and allowed me to see things only from my own perspective, without calmly considering what the others- those whom I, with my mercurial temperament, had hurt or offended- had said, and then acting as they would have done† (Frank 157-158).This quote shows that Anne began to grow up, reflecting more objectively on her own behaviour. Puberty is not only changes in the person body but it’s also a transition from childhood to adulthood. One cause of the sudden change in Anne was war. â€Å"The war is going to go on despite our quarrels and our longing for freedom and fresh air, so we should try to make the best to stay here. I’m preaching, but I also b elieve that if I live here much longer I’ll turn into dried-up old beanstalk. And all I really want is to be an honest-to-goodness teenager! † (Frank 169). Anne believes that war has made her grow old too quickly.She lost her chance to be a young person, enjoying life. As part of Anne’s development into a young adult, she started to develop an identity separated from her parents and a capacity of decision-making. She started to experience teenage rebellion mostly towards her mother. â€Å"Margot and Mother’s personalities are so alien to me. I understand my girlfriends better than my own mother. Isn’t that a shame? † (Frank 42). This is one of the first times that Anne expresses a typical adolescent sentiment that she can relate to her friends better than to her own family.Throughout the diary, Anne presents her mother in a negative and judgemental fashion. Anne sees her mother as an irritating figure of authority and she frequently wrote of her difficult relationship with her. One reason why Anne has problems with her mother is because Mrs. Frank sees Anne as a friend. †I’ve suddenly realized what’s wrong with her. Mother has said that she sees us more as friends than as daughters. That’s all very nice, of course, except that a friend can’t take the place of a mother.I need my mother to set a good example and be a person I can respect, but in most matters she’s an example of what not to do† (Frank 159). Anne tells Kitty that she needs a mother that possesses a great deal of tact, especially towards her adolescent children, and not one who pokes fun at her when she cries. Finally, as Anne continues to grow, she develops the sense of gender differences and also the curiosity of the body. During her hideout, Anne complains that it? s really easy to see exactly what a naked man looks like because of pictures, but it’s really hard to see a naked picture of a woman. Every time I see a female nude, such as the Venus in my history book, I go into ecstasy. Sometimes I find them so exquisite I have to struggle to hold back my tears. If I only had a girlfriend! † (Frank 161). That? s probably one of the reasons that she touched herself when she was in the annex. The reader also finds out that, before going into hiding, Anne had a sexual curiosity about the human body. â€Å"Unconsciously, I had these feelings even before I came here. Once when I was spending the night at Jacque’s, I could no longer restrain my curiosity about her body†¦I asked wether, as a proof of our friendship, we could touch each other’s breasts. Jacque refused. I also had a terrible desire to kiss her, which I did† (Frank 161). Through her thoughts expressed to Kitty, the reader appreciates that Anne was growing up really fast. The young girl was in the stage of trying to find love and have a relationship. When Anne talks about her love life, things g ets confusing because there were multiple Peters during Anne’s short life. When Anne was thirteen she already had boys on the brain and she had a lot of admirers. I have a throng of admirers who can’t keep their adoring eyes off me and who sometimes have to resort to using a broken pocket mirror to try and catch a glimpse of me in the classroom† (Frank 7). Anne does seem to be a male magnet and before going into the annex, she experienced a relationship with a sixteen-year-old guy named Peter Schiff; however their relationship soon ended because Anne was too young. After going into hiding, she met Peter Van Daan, a shy boy in the annex that Anne has no taste for at first. However later in the diary, Anne begins having dreams of Peter Schiff. I immediately remembered what I’d been dreaming about. I was sitting on a chair and across from me was Peter†¦ Peter Schiff† (Frank 162). Those dreams that Anne had, mark what she thinks to be a significant change in herself. â€Å"I (there I go again! ) don’t know what’s happened, but since my dream I keep noticing how I’ve changed† (Frank 170). Those changes are a result of increased interest in romantic love and sex. It seems that Anne started to realize that she wanted love and companionship so desperately that she blinded herself to who Peter Van Daan really was. No, I think about Peter much more than I do Father. I know very well that he was my conquest, and not the other way round. I created an image of him in my mind, pictured him as a quiet, sweet, sensitive boy badly in need of friendship and love! I needed to pour out my heart to a living person. When I finally got him to be my friend, it automatically developed into an intimacy that, when I think about it now, seems outrageous. (Frank 330). The fourteen-years-old girl initiates a healthy curiosity about a natural part of growing up. â€Å"A very strange thing has happened to me.Before I came her e, whenever anyone at home or at school talked about sex, they were either secretive or disgusting. Any words having to do with sex were spoken in a low whisper. That struck me as odd, and I often wondered why people were so mysterious or obnoxious when they talked about this subject† (Frank 172). The young girl is in a mature stage where she really doesn’t see why people laugh or get mysterious about the subject and she really wants to know about sex. Before going into hiding, she tried to ask her friends about the subject. â€Å"I said as little as possible or asked my girlfriends for information† (Frank 172-173).Also, Anne asked her parents, but they were not open about sex and sexuality and that’s why she decided to ask Peter about sex and later she talks to Margot in the bathroom. In the end, Anne Frank died in early March 1945, in a concentration camp. During hiding, Annelies Frank never could get use to the annex and she always felt lonely and misun derstood. Even though she had a horrific childhood, that didn’t stop the enthusiastic young girl to experience normal teenage phases such as having an imaginary companion, facing mental & physical changes, and possessing sexual curiosity.Work Cited ? Frank, Annelies Marie. THE DIARY OF A YOUNG GIRL ANNE FRANL. THE DEFINITIVE EDITION. United States of America: Penguin Books, 1995. 341. ? Shuman, R. Baird, . â€Å"The Diary of a Young Girl. †Ã‚  Literary Reference Center. EBSCO, n. d. Web. 29 May 2012. ? Furst, Lilian R. â€Å"The Diary of a Young Girl. †Ã‚  Literary Reference Center. EBSCO, n. d. Web. 30 May 2012. ? Shauman, R. Baird. â€Å"Anne Frank. †Ã‚  Literary Reference Center. EBSCO, n. d. Web. 30 May 2012. Coming of age Coming of age On January 1 9th, 2008 1 was the happiest person alive. It was very hot and sunny out.. I remember how nice of weather it was. My family and I had taken a vacation to Florida and it was one of the best experiences of my life. 7 years was a long time ago, but still remember every single detail about that trip. On that day, one of the best things ever in my life happened. Even though most people don't think this Is a big deal, It was a very big deal to me.When I was In Elementary school my friends would always ask me if I wanted to go biking around the neighborhood.. I would always have to say no because I did not know how to ride a bike. As much as I tried to learn how, I would always give up. Nothing would work. I was the last of my friends to learn how to ride a bike. It always made me sad watching people bike down the road.. Wishing I knew how to do that. Then one day, my cousin Lexis who Is 2 years younger than me decided she was going to teach me how to ride a bike. E Insisted on It. â€Å"Ally! You're missing out on so much You need to learn† The whole day I thought to myself how many people have tried to teach me how to ride a bike and failed. It was hopeless. I was positive I wasn't going to learn anytime soon.. Maybe even never. Later that day, Lexis came over with her bike, and I had mine. Every minute that went by felt like an hour. Even though I could see the disappointment on her face, she wasn't going to give up on me. Finally, there was hope.She had done it! We had done it.. I had done it. I was biking down the sidewalk with the biggest smile on my face. I had finally learned how to ride a bike without training wheels. I could finally ride one on my own and be like the rest of the kids. I remember being full of joy that day and riding my bike the whole day long. On that day, I felt different, I felt as if a huge weight had just been lifted off my shoulders. It was an amazing feeling that I'll definitely never forget. â€Å"Coming of Age† In life most people just cannot wait for the chance of becoming a â€Å"grown up†. Anticipating the chance to have more independence and the opportunity to do things that were perceived as being mature and cool. While growing up, the people suffer through a set of changes as they develop a sexually mature adult body. While these changes are primarily physical in nature, profound mental, emotional and social, changes also occur as youth adapt to their maturing bodies. A young Jewish girl who had to go into hiding during the Second World War to escape from the persecution of the Nazis suffered a lot.Although rejected and isolated, she didn? t stop showing signs of coming of age as a normal girl such as having an imaginary friend, entering puberty and having sexual curiosity. First of all, Kitty, Anne? s diary, came to help to deal in the time of transition. Young children often have imaginary friends. Anne Frank, after she followed her family into hiding, never enjoyed this luxu ry. Her diary became Anne? s friend, her retreat from a microcosm imposed upon her and the seven other Jews imprisoned in the loft because of Hitler’s master plan of genocide against Jews and other groups.Even before the Franks entered the loft, Anne had named her diary â€Å"Kitty. †Ã‚   (Shuman). Kitty helps Anne deal with the huge change and the reader sees it when she writes to her about the Annex. â€Å"I’ve probably bored you with my long description of our house, but I still think you should know where I’ve ended up† (Frank 25) and when how her world turned upside down because of the sudden change. â€Å"It seems like years since Sunday morning. So much has happened it’s as if the whole world had suddenly turned upside down. But as you can see, Kitty, I’m still alive† (Frank 19).In these two quotes, Anne is telling Kitty that a lot have happened and she doesn’t feel comfortable being in hideout but at least she is still alive and has a friend who can tell everything. In writing to Kitty, Frank is trying to reach out to the normal world beyond her confined quarters. She misses school and her old friends. As the youngest in the secret annex, she is treated with condescension by the adults and sometimes scolded for her boisterousness. To overcome these feelings of isolation, she invents a friend in whom she can confide (Furst). I hope I will be able to confide everything to you, as I have never been able to confide in anyone† (Frank 1). During her time in the annex Anne feels that despite having her parents, it’s better to tell everything to Kitty. † Paper has more patience than people† (Frank 6). The Jewish girl feels that no one interested of what a thirteen year-old girl has to say and it’s better to write what she feels without fear of being judged and that was really hard for her because of being Jewish in times of the Holocaust. After Germany invaded Nether lands and the government began to persecute Jews.Anne dropped her studies and lost contact with all her Jewish friends. During hideout, Kitty acted as Anne’s trusted confident when there was no one else to tell her secrets to. Kitty provided comfort in times of stress and companionship when she was lonely. â€Å"I hope you will be a great source of comfort and support† (Frank 1). Anne Frank was a popular girl in the school but she felt like she didn’t have a lots of friends and that’s one of the reasons why she had such a strong relationship with Kitty. The reader later learns that neither Mrs.Frank nor Margot offered much to Anne in the way of emotional support and even though Anne’s father tried everything he could, he failed. â€Å"And yet for a long time I’ve felt extremely lonely, left out, neglected and misunderstood. Father did everything he could to curb my rebellious spirit, but it was no use†¦ Why didn’t father support me in my struggle? Why did he fall short when he tried to offer me a helping hand? The answer is: he used the wrong methods. He always talked to me as if I were a child going through a difficult phase† (Frank 329).Anne does realize that her father did try to help her but he failed; although Kitty didn’t. Kitty was always with her. † So far you truly have been a great source of comfort to me, and so has Kitty, whom I now write to regularly. This way of keeping a diary is much nicer, and now I can hardly wait for those moments when I’m able to write in you. Oh, I’m so glad I brought you along! † (Frank 1). Furthermore, during her concealment from the German soldiers, Anne started to show physical signs of growing up as her body started to change.Anne Frank? s puberty began when she was 13 years old. Her breasts started to developed and because of the change, she had a terrible urge to feel her breast at night in bed. In addition, hair began to g row, and at the end Anne finally got her period. â€Å"I think that what’s happening to me is so wonderful, and I don’t just mean the changes taking place on the outside of my body, but also those on the inside. I never discuss myself or any of these things with others, which is why I have to talk about them to myself.Whenever I have my period (and that’s only been three times), I have the feeling that in spite of all the pain, discomfort and mess, I’m carrying around a sweet secret† (Frank 160). At many points in her diary, the young girl expresses her desire to grow up so that her family take her seriously and she hopes to have her period thinking of it as physical sign of adulthood would make others respect her. When her period didn? t brought her family to respect her maturity, she continued to enjoy it as a â€Å"sweet secret†. At the time she made her first entries into her now-famous diary, she was pampered and immature (Shauman).Duri ng Anne’s changes, the reader feels that she is no longer a naive kid because she leaves her normal childhood behind and becomes more mature and thoughtful due to the unusual circumstances of the Holocaust. â€Å"I was suffering then (and still do) from moods that kept my head under water (figuratively speaking) and allowed me to see things only from my own perspective, without calmly considering what the others- those whom I, with my mercurial temperament, had hurt or offended- had said, and then acting as they would have done† (Frank 157-158).This quote shows that Anne began to grow up, reflecting more objectively on her own behaviour. Puberty is not only changes in the person body but it’s also a transition from childhood to adulthood. One cause of the sudden change in Anne was war. â€Å"The war is going to go on despite our quarrels and our longing for freedom and fresh air, so we should try to make the best to stay here. I’m preaching, but I also b elieve that if I live here much longer I’ll turn into dried-up old beanstalk. And all I really want is to be an honest-to-goodness teenager! † (Frank 169). Anne believes that war has made her grow old too quickly.She lost her chance to be a young person, enjoying life. As part of Anne’s development into a young adult, she started to develop an identity separated from her parents and a capacity of decision-making. She started to experience teenage rebellion mostly towards her mother. â€Å"Margot and Mother’s personalities are so alien to me. I understand my girlfriends better than my own mother. Isn’t that a shame? † (Frank 42). This is one of the first times that Anne expresses a typical adolescent sentiment that she can relate to her friends better than to her own family.Throughout the diary, Anne presents her mother in a negative and judgemental fashion. Anne sees her mother as an irritating figure of authority and she frequently wrote of her difficult relationship with her. One reason why Anne has problems with her mother is because Mrs. Frank sees Anne as a friend. †I’ve suddenly realized what’s wrong with her. Mother has said that she sees us more as friends than as daughters. That’s all very nice, of course, except that a friend can’t take the place of a mother.I need my mother to set a good example and be a person I can respect, but in most matters she’s an example of what not to do† (Frank 159). Anne tells Kitty that she needs a mother that possesses a great deal of tact, especially towards her adolescent children, and not one who pokes fun at her when she cries. Finally, as Anne continues to grow, she develops the sense of gender differences and also the curiosity of the body. During her hideout, Anne complains that it? s really easy to see exactly what a naked man looks like because of pictures, but it’s really hard to see a naked picture of a woman. Every time I see a female nude, such as the Venus in my history book, I go into ecstasy. Sometimes I find them so exquisite I have to struggle to hold back my tears. If I only had a girlfriend! † (Frank 161). That? s probably one of the reasons that she touched herself when she was in the annex. The reader also finds out that, before going into hiding, Anne had a sexual curiosity about the human body. â€Å"Unconsciously, I had these feelings even before I came here. Once when I was spending the night at Jacque’s, I could no longer restrain my curiosity about her body†¦I asked wether, as a proof of our friendship, we could touch each other’s breasts. Jacque refused. I also had a terrible desire to kiss her, which I did† (Frank 161). Through her thoughts expressed to Kitty, the reader appreciates that Anne was growing up really fast. The young girl was in the stage of trying to find love and have a relationship. When Anne talks about her love life, things g ets confusing because there were multiple Peters during Anne’s short life. When Anne was thirteen she already had boys on the brain and she had a lot of admirers. I have a throng of admirers who can’t keep their adoring eyes off me and who sometimes have to resort to using a broken pocket mirror to try and catch a glimpse of me in the classroom† (Frank 7). Anne does seem to be a male magnet and before going into the annex, she experienced a relationship with a sixteen-year-old guy named Peter Schiff; however their relationship soon ended because Anne was too young. After going into hiding, she met Peter Van Daan, a shy boy in the annex that Anne has no taste for at first. However later in the diary, Anne begins having dreams of Peter Schiff. I immediately remembered what I’d been dreaming about. I was sitting on a chair and across from me was Peter†¦ Peter Schiff† (Frank 162). Those dreams that Anne had, mark what she thinks to be a significant change in herself. â€Å"I (there I go again! ) don’t know what’s happened, but since my dream I keep noticing how I’ve changed† (Frank 170). Those changes are a result of increased interest in romantic love and sex. It seems that Anne started to realize that she wanted love and companionship so desperately that she blinded herself to who Peter Van Daan really was. No, I think about Peter much more than I do Father. I know very well that he was my conquest, and not the other way round. I created an image of him in my mind, pictured him as a quiet, sweet, sensitive boy badly in need of friendship and love! I needed to pour out my heart to a living person. When I finally got him to be my friend, it automatically developed into an intimacy that, when I think about it now, seems outrageous. (Frank 330). The fourteen-years-old girl initiates a healthy curiosity about a natural part of growing up. â€Å"A very strange thing has happened to me.Before I came her e, whenever anyone at home or at school talked about sex, they were either secretive or disgusting. Any words having to do with sex were spoken in a low whisper. That struck me as odd, and I often wondered why people were so mysterious or obnoxious when they talked about this subject† (Frank 172). The young girl is in a mature stage where she really doesn’t see why people laugh or get mysterious about the subject and she really wants to know about sex. Before going into hiding, she tried to ask her friends about the subject. â€Å"I said as little as possible or asked my girlfriends for information† (Frank 172-173).Also, Anne asked her parents, but they were not open about sex and sexuality and that’s why she decided to ask Peter about sex and later she talks to Margot in the bathroom. In the end, Anne Frank died in early March 1945, in a concentration camp. During hiding, Annelies Frank never could get use to the annex and she always felt lonely and misun derstood. Even though she had a horrific childhood, that didn’t stop the enthusiastic young girl to experience normal teenage phases such as having an imaginary companion, facing mental & physical changes, and possessing sexual curiosity.Work Cited ? Frank, Annelies Marie. THE DIARY OF A YOUNG GIRL ANNE FRANL. THE DEFINITIVE EDITION. United States of America: Penguin Books, 1995. 341. ? Shuman, R. Baird, . â€Å"The Diary of a Young Girl. †Ã‚  Literary Reference Center. EBSCO, n. d. Web. 29 May 2012. ? Furst, Lilian R. â€Å"The Diary of a Young Girl. †Ã‚  Literary Reference Center. EBSCO, n. d. Web. 30 May 2012. ? Shauman, R. Baird. â€Å"Anne Frank. †Ã‚  Literary Reference Center. EBSCO, n. d. Web. 30 May 2012.