StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
An American painting. Winslow Homer
3 pages (750 words) , Download 3 , Research Paper
‘The Gulf Stream'1 (1899) is a spectacular painting by one of the greatest American artists named Winslow Homer.... (1836 – 1910) This painting, which is an oil on canvas 3 one, depicts a rough sea with a boat that is tossed about its waters during dusk.... ... ... ... ‘The Gulf Stream'1 (1899) is a spectacular painting by one of the greatest American artists named Winslow Homer....
Preview sample
Implementation of a Communication Tool Kit
4 pages (1373 words) , Download 2 , Research Paper
Free
national Library of Medicine (NLM) from 2002-2005 regarding implementation of Information Prescription (or "Information Rx") Program.... This research paper "Implementation of a Communication Tool Kit " discusses communication tools that are implicated in recent times in order to improve the communication gap and build bridges between the healthcare providers and patients....
Preview sample
The Problem Of Alcoholism
8 pages (2000 words) , Download 3 , Essay
Free
Children from alcoholic parents often lack security and experience helplessness and shame.... Study report submitted by various government and non-governmental agencies such as national Household Survey on Drug Abuse, the Center on Alcohol Marketing and Youth (CAMY) and the national Institute on Alcohol abuse and Alcoholism (NIAAA) underline the danger of alcoholism.... Various national and international agencies made some relevant studies and their reports give strong messages about the harmful effects of excessive drinking among the African –American working-class people....
Preview sample
Effects of Commercialization Crime Prevention Industry
6 pages (1696 words) , Download 0 , Essay
Free
hreat to national security 6 ... eluctance in the national security 8 ... The private security firms offer a diversified approach towards security prevention that eases the work of the national security agents.... The private security firms pose a danger to the national security and intelligence and can be a source of organized crimes. ... hreat to national security ... The wide spread of citizens of a country having such weapons can become a threat to the national security....
Preview sample
Computer Misuse Act 1990: Effectiveness in the Light of Evolving and Increasing Cyber Attacks
12 pages (3753 words) , Download 0 , Coursework
Free
Cybercrime is a very potent threat to not only personal privacy but also corporate and national security that changes everyday as the information age unfolds.... In recent developments in online data fronts, virtually every transaction that involves personal to national security as well as financial information have been incorporated into the online platform thanks to continued computer systems research and the internet4.... Besides personal and national security, the corporate world is faced with worse times of protection of confidential information and financial data on which performance is based....
Preview sample
Understanding Data Communications
8 pages (2161 words) , Download 1 , Assignment
Free
The securing of the company's wireless network will protect the company from unwanted security concerns and will control the individuals who can access the wireless network.... Depending on the functions of each channel allocation, the company would like to exclude the other channels from access this network, therefore, security will be necessary.... hile reconfiguring the access points, I noticed that none of them currently have any security enabled....
Preview sample
The Cold War and U.S. Diplomacy - President's Doctrine
3 pages (750 words) , Download 3 , Assignment
national security depended not only on its territorial security but also on the containment of the Soviet authoritarianism forcible expansion into independent, free nations.... The Marshal plan was a huge success and was replaced in 1951 by the “Mutual security Plan”.... This was at a time when Greece's economy was crumbling and its political situation was steadily deteriorating, most significantly the national Liberation Front Communist-led insurgency....
Preview sample
What does freedom of the press mean To what extent does it exist in modern Britain
5 pages (1250 words) , Download 3 , Assignment
However, a state is also within its rights to protect certain information pertaining to national security and protection of national interests, where it may declare certain information to be sensitive of nature and thus protected from being disclosed.... On the corresponding side, we find that many countries have the ‘freedom of information laws' or the ‘sunshine laws' that while defining the scope and extent of the so called ‘national security /interest,' also allows a citizen to take legal recourses, where he can appeal to get access to government protected information at a minimal charge....
Preview sample
Bills on Iran - Iran Sanction Enabling Act of 2007, Afghanistan Free Trade Agreement Act
5 pages (1459 words) , Download 0 , Coursework
Free
It was referred to House subcommittee on Crime, Terrorism, and Homeland security.... 316 International Financial security Act, 1989 ... 2881 national Defense Emergency Authorization Act for the 2002 financial year ... The bill aimed at controlling export both goods and technology to countries that increased national insecurity in the US or increased the chances of terrorism activities....
Preview sample
Quality in Management
10 pages (2910 words) , Download 0 , Report
Free
The company used integrated ISO 20000 –ISO 27001 Approach and these standards greatly prioritize security management through carrying out an in-depth Risk Assessment, impact analysis in addition to mitigation planning.... This is the most significant aspect of the ISO process which is involved in the organization of the work within a planned way and ensuring that project management best practices are employed whereas goals like scope identification, policy writing, setting up of service management and organizing security and development of Information security Risk Management as well as ITIL Service Management Structure are employed as well (Warren, 2007)....
Preview sample
Immigration and Customs Enforcement Agency
4 pages (1000 words) , Download 2 , Research Paper
Free
The directorate's priority is to apprehend, arrest, and remove convicted criminals that are deemed as a national security threat.... They also deal with the border entrants, fugitives, and those seeking asylum in the United States.... border patrol.... The budget is primarily for two directorates which are Enforcement and Removal Operations and Homeland security Investigation (U.... Homeland security Investigations directorate's role is to investigate the activities that arise due to illegal movement of good and people out, into, or within the United States....
Preview sample
Medical uses of algae
20 pages (5000 words) , Download 2 , Research Paper
The term “algae” a Latin term for seaweed, is a broad description to include a variety of phyla that fit the general description in terms of morphology and general physiology.... As very simple organisms, they have no roots, stems and leaves.... Their sexual organs are not found.... ... ... In terms of physiology, they are basically autotrophic with all their materials from inorganic sources and photosynthetic producing complex carbon compounds from CO2 and light energy....
Preview sample
The Role of TV in Shaping the American Culture from 1950 to 2000
12 pages (3161 words) , Download 2 , Essay
Free
The ruling by The Federal Communications Commission in 1941 that required the national Broadcasting Company (NBC) to sell one of its radio networks.... In a country that once marked by regional difference that were very strong, network television programming erased these distinctions and facilitated forge a national popular culture.... At some time it was the focus of a national debate that was heated on whether the utilize comedy was good to deal with prejudice and social inequality....
Preview sample
Nativism and Immigration Restriction
6 pages (1925 words) , Download 2 , Essay
Free
This period was also accompanied by unemployment, falling prices, business fluctuations, and widespread loss of security.... The next four decades would continue to affect the country's perception of immigration and would culminate with the passage of the national Origins Act in 1924.... Our national views and policies towards immigration continue to be shaped by the nationalism, fears, and nativism that were spawned in California over a century ago. ...
Preview sample
The British Legal and Enforcement Systems
8 pages (2000 words) , Download 2 , Essay
Free
On the other hand, in the name of national security the UK regime is emboldened to use measures that borders on repression.... However, the groundswell of negative public opinion regarding draconian legislations in the wake of terrorism and national security, especially from the media and human rights activists, does make the law in the UK appear bloodthirsty.... Even the threat of terrorism has come in handy for public authorities to confront civil liberties issues in the interest of national security....
Preview sample
Advantages and Disadvantages of Paramedics Using Online Medical Controls and Set Guidelines in Emergencies
9 pages (2626 words) , Download 0 , Report
Free
The paper "Advantages and Disadvantages of Paramedics Using Online Medical Controls and Set Guidelines in Emergencies' is a remarkable example of a report on medical science.... Paramedics are important persons in the situation of an emergency.... This is because they are trained in managing and ensuring that the emergency situation is maintained....
Preview sample
Has international law governing the use of force dramatically changed since 2001
3 pages (750 words) , Download 3 , Essay
This is just an emphasis of the mission of UN Charter as contained in Article1 (1) ‘Maintain international peace and security, and to that end: to take effective collective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace.... Notwithstanding these provisions in the UN charter, there are two exceptions that allow use of force; Article 42 permits the council (and to member states) to take appropriate measures to restore peace and international security....
Preview sample
Employee Benefits and Health Insurance
5 pages (1250 words) , Download 0 , Research Paper
Free
Employee Retirement Income security Act (ERISA) covers most of the private sector health care plans and provides medical protection to employees and beneficiaries.... ERISA is administered and enforced by The Department of Labors Employee Benefits security Administration (EBSA), which provides information on health plans for the employees, and also compliance assistance information for the employers.... Income maintenance plans include social security, disability insurance, survivor's benefits, Supplemental security Income Program (SSI), private pensions, and other welfare plans....
Preview sample
Aviation Safety Program Management
10 pages (2500 words) , Download 4 , Assignment
Free
The paper "Aviation Safety Program Management" states that International Civil Aviation Organization and national Transport Safety Board consider risk as a degree of probability and severity, of the end result of a hazard taking into consideration the worst foreseeable situation....
Preview sample
Globalization, Urbanization, and the Law
26 pages (6316 words) , Research Paper
Nobody downloaded yet
In most cases, globalization is viewed in economic terms and is thus considered the assimilation of national economies into an international economy through capital flows, foreign investments, military presence, and technology.... The "Globalization, Urbanization, and the Law" paper seeks to examine the various parameters that the law has touched on globalization and urbanization....
Preview sample
Book Review of Drug War Zone
5 pages (1250 words) , Download 3 , Book Report/Review
Free
Howard Campbell digs into the anthropological examining of drug peddling in the mexican border and the measures the government has tried to put in place to counter the activities.... Cocaine, methamphetamine and marijuana are the most famous as they are traded from the United States across the mexican boarder to the country's interior cities.... the mexican boarder is always chaotic due to the illegal business that goes around it.... After many deaths have been registered in Mexico, the US government was forced to sprig into action by putting more agents to reinforce the law at the borders of Mexico and also funding the mexican government with the aim of stopping the smuggling business and putting in place more security personnel to ensure the safety of innocent citizens (campbell 132)....
Preview sample
Structures of Criminal Justice
11 pages (3018 words) , Download 3 , Research Paper
Free
he offenders are often classified in terms of security and as such there are maximum, medium and minimum security offenders depending on the crime committed.... An institutional parole officer working under the Correctional Service of Canada is then supposed to compile an offender security classification report together with a correction plan for the offender.... However, for the life sentence offenders, they are supposed to spend at least two years in a maximum security correction facility in spite of the offenders behavior....
Preview sample
Plaintiff v Latin American Music Company
5 pages (1537 words) , Download 2 , Essay
Free
The paper "Plaintiff v Latin American Music Company " highlights that it is essential to state that Plaintiff Brown filed a suit requesting for a declaration that the poet Corretjor's work was in the public domain since it was first published in 1957.... .... ... ... Defendant counterclaimed by charging Brown with copyright infringement for his musical rendition of one of the poet's poems, on the basis that they had registered copyright for the poet's poems in 2000....
Preview sample
The American Frontier and the Western Hero
2 pages (500 words) , Download 2 , Essay
Free
The literature of the ninetieth century represents different prototypes and characters typical for this historical period.... In the works, The Virginian by Owen Wister and The Wide, Wide World by Susan Warner the authors create strong male and female characters able to fight and survive in any circumstances....
Preview sample
Indigenous People
1 pages (250 words) , Download 2 , Coursework
Free
It is apparent that, they were active farmers and for this reason, there are credited to have contributed heavily to the cultivation of flora Department of Homeland security the pre-Columbian inhabitants found in the north and southern parts of America are theoriginal inhabitants of the United States.... & national Museum of the American Indian (U....
Preview sample
Local Governments Interaction in Policy Formulation and Enforcement
7 pages (2013 words) , Download 1 , Term Paper
Free
n conclusion, pressing policies that involves national security and welfare require effective and immediate measures since they hold the welfare of the public at stake.... ecentralization of police power policy, leaving it to state government has really enhanced the security system in individual states.... This kind of policy enforcement, involving the public, either directly or indirectly is effective since the citizens feel the sense of belonging and they also know that they have a role to play in ensuring their own security and welfare. ...
Preview sample
Book Review
3 pages (750 words) , Download 2 , Book Report/Review
They described what took place from the standpoints of Anglo, mexican armed forces, Tejano associates, and eyewitnesses.... They used the diary of Jose Enrique de la Peria, mexican texts, journals, letters, authoritative books, and many other archival sources for composing the novel.... Alamo was not only a location where soldiers fought courageously for the sake of their national integrity, but it was a whole occurrence that affected the American nation's lives....
Preview sample
Key Issues for Expatriates Working in American and South Korean Business Environments
16 pages (4429 words) , Download 0 , Term Paper
Free
Most importantly, national cultures are viewed as vital in dictating how people relate.... Most importantly, national cultures are viewed as vital in dictating how people relate.... Most importantly, national cultures are viewed as vital in dictating how people relate and how business is conducted within the boundaries of a country and also internationally.... As such a lot of effort has been made over the years to understand and define national cultures with the sole aim of breaking the cultural barriers to business processes and relationship building (Alon & Higgins, 2005)....
Preview sample
The Immigration
6 pages (1697 words) , Download 1 , Essay
Free
According to the Department of Homeland security, Yearbook of Immigration Statistics, 2008 1820-1920 is the European period's peak to the Americas.... According to Department of Homeland security, Yearbook of Immigration Statistics, 2008 1820-1920 is the peak of European period to the Americas....
Preview sample
Historical Figures and their impact on American History
4 pages (1000 words) , Download 2 , Essay
Historical Figures and their Impact on American History Introduction Indeed, the American president has a vast extent of influence on every person in the United States.... The power of their leadership even stretches out through the borders of the nation to play a part in other countries' governance....
Preview sample
Gendering Macroeconomics: The Challenge of Promoting Gender Equality
14 pages (3846 words) , Download 0 , Term Paper
Free
The concept of social reproduction is used to define the effort and time needed to build the future workforce and to sustain the welfare and security of the individuals in households and communities. ... Gender budgeting's macrofiscal feature must deal with the impact of gender disparity on economic security and its implications for the financial and labor markets.... As stated by Elson and colleagues (1997), “Constraints can be seen as hampering the smooth interaction of the different dimensions of the economy, creating disabling rather than enabling environments, and preventing the outcome of the international and national policy and of individual decisions adding up to sustainable, well balanced development” (as cited in Gutierrez, 2003, 4)....
Preview sample
Foot care for people with diabetes
3 pages (750 words) , Download 2 , Research Paper
Free
Some of practices for caring for the feet of diabetes patients include, proper section of shore, reporting persistence cuts and bristles, and preventing possible injury (national Eye Institute, 2009).... ID=1047440 national Eye Institute (2009).... Lesson Plan: Foot Care for People with Diabetes Name Institution Lesson Plan: Foot Care for People with Diabetes Client Initials: Mercy Hamilton Age: Sixty years Gender: 60 years Health Literacy: Low Level of Health Literacy Culture Identified/ Influences: American Indian Many American Indians embrace a diet that puts them at the risk of contracting diabetes disease....
Preview sample
The Social and Cultural Diversity
8 pages (2386 words) , Download 1 , Report
Free
Being a bicultural student of both mexican American and White American descent it was somehow hard for me to fit in.... As early as third grade, my peers were always curious about my identity and I would often be asked about my whether I was mexican or White?... The professional helper must also consult American Counseling Association (ACA) and national Association of Alcoholism and Drug Abuse Counselors (NAADAC) codes of ethics in order to address ethical issues that arise from cultural diversity effectively....
Preview sample
Maritime Technology and Innovation
8 pages (2230 words) , Download 4 , Essay
Free
However with the new security concerns that have come up post Sptember 9/11, it has become very difficult to access coastal shoes due to large arrangement of multi layer of security.... This essay "Maritime Technology and Innovation" discusses and ascertains how far the design and other technical requirements have been confirmed, to achieve a stable ship....
Preview sample
How Mobile Technology Are in the Present and How They Will Change with the increased use of Mobile Operating Systems and Platforms
12 pages (2961 words) , Download 0
Free
The need to provide better usability, management, security, and integration of services carried on these platforms is highly recommended.... Corporate-grade security and manageability make the BlackBerry platform the preferred option for the most stringent roles of mobile devices.... Some important security additions have been added to the Android recently.... Apple iOS security and manageability are currently good enough to be considered for mobility roles that require policy control and device encryption....
Preview sample
What Are Advanced Persistent Threats and How to Prevent Them
20 pages (5780 words) , Download 0 , Research Paper
Free
APTs have grabbed international headlines due to its ability to effectively target both enterprise as well as governmental networks which can generate considerable national security threats.... This type of attack has negative impact on national economy and national security.... In most of the APT, the stake is on intellectual property related with new technology, national security secrets and access to crucial critical information.... APTs are levels of attacks, gradually referred by IT security companies, sufferers and law implementation agencies....
Preview sample
Vulnerability of an Organizations Information System
10 pages (3003 words) , Download 2 , Research Paper
Free
This paper ''Vulnerability of an Organizations Information System'' focuses on the vulnerabilities those organizational information systems presently challenging the IT managers, with over viewing the most important cyber security vulnerability and considering measures that might protect organizations from such vulnerabilities.... Thus cyber security has become an essential part of every organization considering the vulnerability of the information that is dealt with through the use of information systems (Kim & Solomon, 2010, pp....
Preview sample
Is There a China Threat, and If So What Should We Be Doing About It
7 pages (2442 words) , Download 0 , Literature review
Free
Analysts worry that a militarily powerful China poses a huge risk to global security and to the stability of the Asia-Pacific arena as well (Lawson, 149).... "Asian anxieties, Pacific overtures: experiments in security for a new Asia-Pacific community.... China Economic And security Review Commission Hearings (2005, February).... China Economic And security Review Commission Hearings (2005, April).... China Economic And security Review Commission Hearings (2005, April)....
Preview sample
American History: Early European Migration
8 pages (2217 words) , Download 0 , Essay
Free
This paper ''American History: Early European Migration'' tells that during the later years of the 16th century and late into the 17th century, a number of European countries mainly, England, France, The Netherlands, Portugal and Spain initiated the establishment of colonies in the Americas.... ... ...
Preview sample
A Critique of Taylor's Concept of Multiculturalism in Relation to Nation Building
7 pages (1750 words) , Download 2 , Essay
Free
According to this group of philosophers, the idea of multiculturalism threatens the fibre of society and prevents the creation of a national identity.... This therefore means that there is the need for these nations to find a way of building a national identity that will ensure that the citizens get the best opportunities for its citizens and build an identity that can be exported.... Although the politics of difference can be used as a tool for positive discrimination, which involves trying to use conscious efforts to bridge differences between some severely degraded cultures and promote national integration, I think the same idea can be used negatively....
Preview sample
The Rate of Interest
2 pages (567 words) , Download 2 , Essay
Free
In this method, the sale and purchase by the central banks in the security market have the desired effect on the money supply in the economy.... An increase in the purchasing by the central bank in the security market increases the amount of money that people has and it increases the money supply in the economy.... By funding, we mean that the central bank changes the composition of the national debt in order to alter the money supply in the economy....
Preview sample
Syrian Refugee Crisis and the Rise of Far-Right Wing Movements in Europe
18 pages (5256 words) , Download 0 , Research Paper
Free
The survey showed that respondents had mixed reactions to the entry and presence of refugees in the country and such supported the far right-wing movement that is against the migration of Syrian refugees due to fear of national security and terrorism.... On the basis of the Syrian crisis, several respondents felt that the migration law favoured the Syrians due to the security crisis in their country.... The far right-wing movement has capitalised on the inability of the government and the European Union as well to control the refugee crisis and ensure security. ...
Preview sample
Understanding the Evolution of the African-American Race and Their Triumphs over Racism
10 pages (3020 words) , Download 4 , Coursework
Free
In 1808, the federal constitution outlawed the importation of slaves and in 1820, a national law was passed declaring the act of importing and trading slaves as a criminal act (Franklin, 2004).... This coursework "Understanding the Evolution of the African-American Race and Their Triumphs over Racism" talks about the history of slavery among Blacks started the culture of racism against African-Americans but still, racism continues in different sectors and levels in society....
Preview sample
Telemedicine Project
2 pages (500 words) , Download 3 , Essay
Free
The American Telemedicine Association specifies that before any organization or individual would practice or use telecommunication equipment in the delivery of healthcare, that organization or individual must fulfill the requirement of providing a set of Standard Operating.... ... ...
Preview sample
The Nurses' Responsability in the Prevention of Medical Errors
4 pages (1213 words) , Download 2 , Term Paper
Free
The paper provides insight into the nurses' perceptions as regards to medication errors.... There are disparities in the perceptions of nurses as regards to the causes and treatment of medication errors.... Causes range from illegible physician handwriting and tired, distracted and exhausted nurses....
Preview sample
Module Three Politicians/Influential Political People
4 pages (1000 words) , Download 2 , Research Paper
8 have not been appointed by the president including the Great lakes czar who is EPA appointed and the border czar who has been appointed by secretary Homeland Security.... 2 were confirmed by the Senate with Director of national Intelligence, the chief performance officer and also with the deputy interior secretary all of which have czars....
Preview sample
Educational Tourism and Hospitality in Oman
13 pages (3408 words) , Download 1 , Report
Free
The information technology sector is an important component of the training regime at SQU and courses offered in this growing discipline include: Tourist Information Systems, Modern Trends in Tourism, Tourism security, Computer Skills 1&2, Statistics for Tourism, Scientific Thinking and Problems solving and Methods of Tourism Guidance.... Further management courses include Managing the HACCP Process, Managing Front Office Operations, Managing Housekeeping Operations security & Loss Prevention, Supervision in Hospitality Industry, Planning & Control in Food & Beverage Operations, Managing Hospitality Human Resources and Event Management....
Preview sample
Emergency Mnagement 670 Week 4 Conf
2 pages (500 words) , Download 3 , Assignment
Free
Putting together, a broad emergency action plan includes conducting a workplace evaluation which defines how rescuers will react to different types of crisis situations, considering specific worksite plans, operational features and emergency systems (Department of Homeland security, 2010).... Alertness denotes the rapidity of changes in behavior to restrict the influence of disaster situations and is considered as a constant cycle of planning, supervising, categorizing, training, assessing and monitoring activities to certify effective direction and improvement of capabilities which further helps to inhibit the consequences of any kind of emergency situation (Department of Homeland security, 2008)....
Preview sample
Early Childhood Life Events and Depression
7 pages (2296 words) , Download 4 , Research Paper
Free
Odhayani and Watson (2013) point out that children rely on security and stability to be normal.... The depressed also lose interest in most activities including those they enjoyed in the past (national Institutes of Health, 2011; Salmans, 1997).... In fact, most depressed people tend to commit suicide eventually, especially if they do not get the much needed intervention or treatment (national Institutes of Health, 2011).... The national Council on Child Abuse and Family Violence (n....
Preview sample
How to Coping with Down Syndrome
7 pages (1750 words) , Download 2 , Term Paper
Free
Though a child with down syndrome may not exhibit all these features, it can be confirmed through the diagnosis, which is usually a blood test shortly after birth (The national Women's Health Information Center, 2006).... In this paper, the author demonstrates how Often Down syndrome is identified at birth....
Preview sample
25601 - 25650 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us