StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Palace on Gladstone Boulevard
6 pages (1754 words) , Download 3 , Research Paper
Free
He said that in every museum, including the Kansas City Museum, security is always a major concern.... The primary aim of museum security is to ensure that they are open to the public in a responsible way, especially since the artifacts are housed inside historic structures in the property, which makes the guarantee of security more complicated. ... e mentioned a couple of security systems installed in the property.... CCTV also plays a significant role in ensuring the security of the museum's treasures....
Preview sample
The USA Fighting Against Al Qaeda in Yemen
11 pages (3210 words) , Download 1 , Coursework
Free
Yemen is based in the Middle East and has direct access to major strategic waterways and a long porous border with Saudi Arabia.... United s Fights against Al-Qaeda in Yemen United s Fights against Al-Qaeda in Yemen Introduction Yemen is based in Middle East and has direct access to major strategic waterways and long porous border with Saudi Arabia.... Basically, this targeted all the security forces that had gone to Yemen to help in the fight against Al-Qaeda....
Preview sample
Law Financial Institutions and Securities
20 pages (5262 words) , Download 0 , Essay
Free
) A debenture usually gives the lender some security over the borrower's assets, and this may take various forms.... The company decided to default the loan when the company shares were adequate security for the loan, but the bank failed to enforce its security until the shares became worthless.... The company decided to default the loan when the company shares were adequate security for the loan, but the bank failed to enforce its security until the shares became worthless....
Preview sample
Server Roles for Installing Windows Server 2008 R2
2 pages (500 words) , Download 2 , Essay
Free
Some of the roles available for the installation include the following:Active Directory Certificate Services refer to roles that offer customizable services for providing and managing credentials in software security systems, which utilize major public technologies.... ew security support built into Windows® 2008 R2Additions to the Negotiate Authentication package by use of NegoExts, the SSP can be authenticated to negotiate them between Microsoft and related software providers....
Preview sample
How did the French & Indian War shape the American Revolution
1 pages (250 words) , Download 7 , Essay
Free
The war between the French and the British was sparked with the firm determination of controlling the northern parts of the American lands,.... ... ... The war between the British escalated as more white men start to frequent in the native land of Ohio River Valley. ... ... s a reaction from the Native Americans, George Washington opens fire on kills a French scouting party in How did the French & Indian War shape the American Revolution?...
Preview sample
Mike Daviss Fortress Los Angeles The Militarization of Urban Space Summary and Reaction
4 pages (1000 words) , Download 5 , Essay
The private "security" industry is a thriving business, ready to answer to the ubiquitous slogan of "Armed Response".... The creation of these "fortress" cities, with the constant surveillance cameras, the gated walls, private security contractors, ground as well as on-air watchers, advances the progress of the social fragmentation, a polarization that serves to destroy the society's natural hegemony at the cost of the underprivileged.... The concept of "security" taken to the extreme is the key to securing this potentially lucrative market as evinced in the case of the "Panopticon Mall"....
Preview sample
Implementation of Patient Centered Concepts In a VA Medical Center to Improve Quality Outcomes
11 pages (2750 words) , Download 4 , Research Paper
Free
The intention of this study is evidence-based medicine as gaining traction among providers for two major reasons: firstly, its promise as a tool to help contain continually rising healthcare costs and, secondly its potential to dramatically improve healthcare quality.... ... ... ... This paper highlights one case study that demonstrate how health concepts can improve health quality (such as in a VA medical center), and how it can serve as a key component of effective healthcare delivery by creating the necessary data framework for practicing evidence-based medicine (EBM)....
Preview sample
The Relative Effectiveness of Child Obesity Prevention Programs
26 pages (7733 words) , Download 4 , Dissertation
As the paper "The Relative Effectiveness of Child Obesity Prevention Programs" tells, childhood obesity has more than tripled in the past 30 years.... The Canadian Heart and Stroke Foundation has termed Fat as the 'new tobacco' as of the high general risk of an individual eventually becoming obese....
Preview sample
Not Democracy, Oligarchy Karl Marxs View on American Democracy
6 pages (1750 words) , Download 0 , Essay
Free
This paper ''Not Democracy, Oligarchy – Karl Marx's View on American Democracy'' tells that Karl Marx and Alexis De Tocqueville are two masterminds who redefined the social science of their era to what it is today.... Karl Marx drafted the communist manifesto together with his pal Engels.... ...
Preview sample
Comparison between the Medical and Social Models of Health
4 pages (1132 words) , Download 2 , Essay
Free
From the paper "Comparison between the Medical and Social Models of Health" it is clear that the medical model considers a patient to be a victim of the disease process caused by a definite factor.... Thus treatment is aimed at removing the causing factor and bringing down the physical ailments.... ...
Preview sample
Sacagewea's Imact on Modern Native American Women in the Southwest
4 pages (1000 words) , Download 2 , Essay
No other figure in American history is less understood and more revered than the Indian guide Sacagawea.... Historians have debated her origins, her life, her death, and the spelling of her name.... Her name is believed to be Hidasta in origin and translates as "Bird Woman", though Lewis and Clark used the variations of "Sah-ca-gah-we-ah" and "Sah-kah-gar-we-a" (Duncan and Burns 92)....
Preview sample
Should We Reform Laws to Make It Harder to Get a Divorce
1 pages (497 words) , Download 2 , Essay
Free
The paper "Should We Reform Laws to Make It Harder to Get a Divorce" states that some believe that the reason divorce seems to be on the increase is that the laws that have to do with divorce are not hard enough.... So, they believe that the laws of divorce should be made tougher.... .... ... ... Not everyone would agree that laws should be reformed to make it harder to get a divorce....
Preview sample
Proceedings on the Impeachment of Richard Nixon
8 pages (2322 words) , Download 2 , Essay
Free
The essay "Proceedings on the Impeachment of Richard Nixon" focuses on the critical analysis of the opening statement of Barbara Jordan to the House Judiciary Committee which was based on the proceedings which were being executed on the impeachment of the then-president, Mr.... Richard Nixon.... ...
Preview sample
The Impeachment of Richard Nixon
8 pages (2323 words) , Download 2 , Essay
Free
Considerably, when accounting her views in relation to the interpretation of the impeachment articles, Barbara Jordan elaborated on various attributes of the American constitution which in turn apparently increased the significance of the opening statement in the national political history as an artifact.... Subsequently, owing to the mismanagement of corporate governance practices in the national context, the then American community also had to face considerable issues in terms of economic downfall and a consequent declination of living standards....
Preview sample
Compare and Contrast three Separate and Distinct Linux Vendors of Workstation and Server
15 pages (4159 words) , Download 2 , Report
Free
Moreover, the company commits to build on the reputation of Linux of being an extremely protected operating system and provides consumers a secure desktop free from any security threats.... Firstly, applications provided by Red Hat offer protection against commonly exploited security threats, such as buffer overflows incorporated within the standard software products.... Secondly, the SELinux security element provides the highest status of protection to its system services, from any kind of external threats, thereby, offering optimum transparency and making it feasible to adopt and develop....
Preview sample
Criminal Law: a Proposal on Bounced Cheques
10 pages (2675 words) , Download 0 , Research Paper
Free
rom the perspective of a criminal court, the word security on the cheque does not change it characteristics so long as it satisfies the formal requirements of the law.... A security cheque on the other hand makes payment conditional upon fulfilment of certain conditions.... tate security ... Imprisonment is also the punishment for any publication of information, news or caricatures of any kind that would pose a threat to the security of the state, its highest interests or public order. ...
Preview sample
Legalizing Marijuana - Medical Uses of Marijuana
10 pages (2737 words) , Download 1 , Essay
Free
From the paper "Legalizing Marijuana - Medical Uses of Marijuana", the quantity of THC influence the psychological and physiological effects of marijuana will be.... The potency of marijuana is dependent on the type of cannabis plant, when it is harvested, the soil on which it was cultivated, etc....
Preview sample
Identification of Socialism
9 pages (2492 words) , Download 2 , Essay
Free
However, the federal government has the authority to make decisions that affects both levels of government especially in cases where it touches on matters of national security.... For instance, the central government, through the president and approval by majority of the legislator, could have the authority to declare war on a particular nation if it feels that the security on the entire nation is at risk or threatened by that particular country.... Unlike other socialist nations, the United States workers were not mandated to from parties so as to be heard in the national elections....
Preview sample
Have social movements been successful in achieving their objectives in Latin America
9 pages (2250 words) , Download 2 , Essay
This social movement is capable of organising effective tactics in allocating land for their thousands of landless rural workers and their families on the lands of giant latifundistas, plus being able to succeed in placing their agrarian reform on the national agenda, and elected “Lula” Da Silva of the Workers Party in the 2002 presidential elections (Petras, 2009)....
Preview sample
The NASA Budget Cut
4 pages (1266 words) , Download 0 , Essay
Free
The highest NASA budget was the 1961 to 1972 Apollo Program that was motivated by the era's perceived threat to national security that early leads in spaceflight by the Soviet Union posed.... The highest NASA budget was the 1961 to 1972 Apollo Program that was motivated by the era's perceived threat to national security that early leads in spaceflight by Soviet Union posed.... In a survey carried out in 1997, Americans averagely estimated that the share of the national budget to NASA was 20%....
Preview sample
Is war an inevitable feature of international politics
5 pages (1250 words) , Download 2 , Essay
Clausewitz defined War as "an act of violence intended to compel our opponent to fulfil our will".... War is usually seen by countries as a way of political negotiation, as the use of force is implemented to try to gain control over a situation.... Warfare is a concept that existed for almost as long as society itself, but the number of war losses since the mid-1990s is larger than ever before....
Preview sample
A Model Risk for Security at the Local University
8 pages (2000 words) , Download 0 , Term Paper
Free
The paper "A Model Risk for security at the Local University" is an excellent example of a term paper on management.... The paper "A Model Risk for security at the Local University" is an excellent example of a term paper on management.... The treatment of crime as a risk is useful in ensuring that it is well managed (Glendon, Clarke & McKenna, 2016)....
Preview sample
PC / Security on Servers or any thing about Servers 4
1 pages (250 words) , Download 2 , Essay
Free
The standard approach used to perform this task is reviewing error logs.... However, as the volume of logs increases, it becomes challenging to a Database Administrator.... As such,.... ... ... Event notification has an ERRORLOG event, which ensures that messages sent to the error log are also sent to the service broker queue for automatic processing....
Preview sample
Legal, Privacy, and Security Issues in Electronic Commerce
1 pages (250 words) , Download 1 , Essay
The author of the "Legal, Privacy, and security Issues in Electronic Commerce: LG Smart TVs Accused of Collecting Personal Data" paper is not comfortable when someone is accessing his/her information.... The author is not going to buy these smart TVs since he/she doesn't trust their mode of operation....
Preview sample
Security Design for Threat Detection System Employing Relevant Technologies
10 pages (2500 words) , Download 0 , Case Study
Free
This case study "security Design for Threat Detection System Employing Relevant Technologies" presents Hi-Tech Corporations that specialize in the manufacture of Integrated Circuit targeting communication companies.... The company came into being in 2000 and today, it leads in the designing....
Preview sample
Security Systems for the Western Australia Police Service
7 pages (1750 words) , Download 0 , Case Study
Free
The paper "security Systems for the Western Australia Police Service" is a wonderful example of a case study on the law.... This paper presents an assessment of the strengths, weaknesses, threats, and vulnerabilities of security systems for the Western Australia police service.... In addition, in the paper an effective security model will be provided to analyze different threats, risks, and scenarios, to better inform the decision-maker....
Preview sample
Yemen and its Development after Removal of President Ali Saleh
6 pages (1727 words) , Download 1 , Essay
Free
The military and security agencies were at times used to crush down any form of opposition to the government or acts of rebellions. ... However, having a strong opposition to the government was thwarted through the military and security agencies that crashed any form of dissident Phillips and International Institute for Strategic Studies, 2011).... For instance, in 2004 a Shia Zaydi rebellion was crushed through the security agencies that continue to battle tribal fighters in Sa'da, Hajja and al-Houthi governorates....
Preview sample
Gordon Parks
4 pages (1076 words) , Download 0 , Research Paper
Free
An exhibition soon after of those photographs won him a photography fellowship that was presented in connection with the Farm security Administration.... hen Farm security Administration disbanded, Parks stayed back in Washington and worked as a correspondent for the Office of War Information.... He went on to direct a series of documentaries for the national Educational Television which were based on the black ghetto life and the underlying aspects....
Preview sample
Service Desk Shift Supervisors Guide
25 pages (6250 words) , Download 2 , Essay
SERVICE DESK Service Desk Shift Supervisors' Guide Table of Contents Project Summary Review of Other Work Rationale and Systems Analysis Goals and Objectives Project Deliverables.... ... ... Project Plan and Timelines ... eferences Project Proposal ... ummary (1 page) The summary of this proposal basically consists of a technical project that will be completed in order to supplement the Service Desk Operations Shift Supervisor Guide that has already been created....
Preview sample
The Great Gatsby by F. Scott Fitzgerald
3 pages (750 words) , Download 2 , Research Paper
In other words, she gave up a relationship built on passion for a life of security – however much she carries a lot of disdain for her husband, Tom.... In a sense, he was right about the latter part given that Daisy does decide to marry Tom because of the security element....
Preview sample
American culture has infiltrated and marred China culture
2 pages (500 words) , Download 3 , Essay
Free
The author of the paper touches upon the influence of American culture on Chinese one.... Admittedly, considering the greatness of America and the potential realized in China, it is indeed important to expect some form of cultural infiltration between these countries.... .... ... ... It must be stated from the outset that the world is actually inundated with thousands of different forms of culture arising from the diversity realized across the board....
Preview sample
Cyber Terrorists: Shutdown the Internet
10 pages (2500 words) , Download 4 , Term Paper
Free
The author concludes that the threats by the possible cyber attacks can be critical enough to drive the attention of the security agents of the developed and the developing countries.... There is also the presence of the United States Computer emergency readiness team (CERT) which works under the domain of the National Cyber security division.... The major security forces of the world have strengthened their operation and have manipulated every possible measures to encounter the brutal acts of terrorist, but not very often they did managed to escape from the parasitism of terror....
Preview sample
Mental Health and Its Impact on Children
18 pages (5530 words) , Download 5 , Thesis
Free
The CDC did this research in conjunction with other organisations such the Substance Abuse and Mental Health Services Administration (SAMHSA), Health Resources and Services Administration (HRSA) and the national Institute of Mental Health (NIMH).... national Plan for the Chronically Mentally ill.... The national Service Framework: Past, Present and Future.... Washington DC: national Academies Press.... Washington DC: national Academies Press....
Preview sample
The Barriers to Benefits for Asylum Refugees in the United States of America
10 pages (2987 words) , Download 0 , Case Study
Free
However, the border patrol officials and other institutions that determine an individual's eligibility for asylum contribute to the increasing denials of asylum.... border Patrol officials do not carry out their responsibilities as required.... Many border patrol officials and other institutions involved in granting the asylum fail to recognize such violence in the broader social context. ... The research will make use of a qualitative approach in an effort to determine the barriers, according to the perception of refugees, border patrol officials, and the lawyers from the American Immigration Lawyers Association....
Preview sample
Field of Training and Economic Status
8 pages (2000 words) , Download 2 , Essay
Free
The State of Maryland, in its recent report of comparative higher education statistics, made a comparison of educational attainment for the year 2009 between the state and national average.... percent compared to the national average of 29.... percent in Maryland, compared to the national average of 10.... RACE MARYLAND national African American 28.... % What is curious to note is the low enrollment rate for Hispanics compared to the national average....
Preview sample
Effective State Building Practices
2 pages (578 words) , Download 2 , Essay
Free
Furthermore, the Afghanistan government should also support state-building by ensuring peace and security in the country.... The authorities initiate national processes that are based on the state-society relationship.... Moreover, the international community and donors are also helping the national government to fight corruption in various powerful institutions such as the Kabul Bank....
Preview sample
UN and UNOMIR in Rewanda
5 pages (1250 words) , Download 2 , Essay
The spectrum is so broad that therein also lays the problem of having a definitive framework for the crime of aggression, further compounded by the broad discretion of Article 39 of the Charter, enabling the UN to take necessary measures to restore international peace and security....
Preview sample
Federal Aviation Regulation
5 pages (1490 words) , Download 2 , Research Paper
Free
Others include the transportation security organization; contend that they are vital for national security (Canavan, 2002).... his part has countless to guarantee airworthiness in ranges, for example, structural burdens, airframe, execution, security, controllability, and wellbeing components, how the seats must be built, oxygen and air pressurization frameworks, fire counteractive action, escape lids, flight administration methods, flight control interchanges, crisis arriving systems, and different restrictions, and additionally testing of every last one of frameworks of the flying machine....
Preview sample
Surveillance Studies: Policing and Surveillance
14 pages (3855 words) , Download 0 , Coursework
Free
national security and the European Convention on Human Rights.... Cross-border Crime in a Changing Europe.... For many people who work as police officers, security guards, or as other types of security officials in many parts of the world, a certain standard in terms of professionalism, knowledge, skills, and conduct is expected of them.... For a police officer or security guard, a closed circuit television camera is a piece of technology that he or she is extremely likely to have seen or worked with during the course of his or her employment....
Preview sample
The impact of stereotypes on African American self perception
12 pages (3000 words) , Download 3 , Essay
Free
"I have a dream that my four children will one day live in a nation where they will not be judged by the color of their skin but by the content of their character" (Luther-King & King, 2007) At first glance, the message drawn from a line of Martin Luther's King's renowned "I have a Dream".... ... ...
Preview sample
Analysis of the Novel Push by the American Author Sapphire
4 pages (1152 words) , Download 0 , Book Report/Review
Free
This review "Analysis of the Novel Push by the American Author Sapphire" illustrates the life of a typical African American girl born in a poor family and faced with many challenges self afflicted and some by the society.... The author depicts the real environment that African American society lives in....
Preview sample
PESTEL analysis Courier and Delivery market UK
5 pages (1250 words) , Download 5 , Essay
Free
Courier industries deal with information sharing and need to invest a lot in information automation and security if they want to win client trust and confidence (Monaghan 1998).... national Book Network.... The courier and delivery industry in the United Kingdom is involved in providing surface, air or combined courier delivery services....
Preview sample
E-Commerce Websites as a Guarantee of Effective Trade
9 pages (2600 words) , Download 2 , Research Proposal
Free
E-Commerce security ... Many of the e-commerce websites are of low quality as they are vulnerable to security threats.... This means that the user interface of e-commerce websites have to be designed in such a way that transactions are easy to effect while at the same time ensuring that users are safe from online security threats.... nfortunately, many potential customers have maintained serious doubts about the websites with respect to security of their personal information....
Preview sample
Operation Anaconda II - Intelligence Management and Terrain/Weather
3 pages (750 words) , Download 5 , Essay
Intelligence organizations operating in Afghanistan consists of SOF, national assets available for tactical exploitation, CIA and various other kinds of Army units.... The levels of intelligence of CIA, SOF, national assets available for tactical exploitation, and other Army units of the tactical commanders: Support planning and carry out fights and engagements....
Preview sample
Communication and Leadership Paper
4 pages (1000 words) , Download 3 , Essay
The term communication in the simplest and most basic sense refers to the mode of sharing or passing information from the source to another person called the recipient.... It also involves the notion of articulating ideas and concepts from one person to the next person or to a.... ... ... Thus, effective communication refers to the aspect where the speaker or the communicator is able to relate well with the audience by capturing their attention and imagination during the discourse of the presentation....
Preview sample
Legalizing Marijuana: For Better or for Worse
12 pages (3000 words) , Download 4 , Research Paper
Free
This is based on a discussion by a national Institute of Drug Abuse (NIDA) scientist, Dr.... national Academy Press, 1999.... Ottawa: national Library of Canada.... The paper 'Legalizing Marijuana: For Better or for Worse?... examines the legalization of cannabis, commonly known as marijuana, which often leads to a contradiction....
Preview sample
Legalizing Marijuana: For Better or for Worse
16 pages (4410 words) , Download 3 , Research Paper
Free
This is based on a discussion by a national Institute of Drug Abuse (NIDA) scientist, Dr.... national Academy Press, 1999.... Ottawa: national Library of Canada.... This research paper "Legalizing Marijuana: For Better or for Worse?... discusses marijuana as a drug that has raised a significant array of debates and controversies for decades....
Preview sample
The Death Penalty with African American Males Vs Minorities
5 pages (1527 words) , Download 0 , Research Proposal
Free
This paper "The Death Penalty with African American Males Vs Minorities" focuses on the fact that studies show that discriminations are dominant in the capital sentencing process in many states.... The studies have shown that African American Males are at greater risk of suffering capital punishment....
Preview sample
Racine County, Wisconsin
4 pages (1000 words) , Download 2 , Research Paper
Free
Self-reported discrimination and mental health status among African descendants, mexican Americans, and other Latinos in the New Hampshire REACH 2010 Initiative: the added dimension of immigration.... Journal of national Medical Association 98(4), 488–91 Gee, G....
Preview sample
The Importance of Health Care in America: the Improving Access and Affordability
10 pages (2500 words) , Download 2 , Research Paper
Free
985 The Consolidated Omnibus Budget Reconciliation Act of 1985 (COBRA) amended the Employee Retirement Income security Act of 1974 (ERISA) to give some employees the ability to continue health insurance coverage after leaving employment. ... Studies, reviews, and researches were done by the legislation leading to the amendment of Employee Retirement Income security Act of 1974 (ERISA) to Consolidated Omnibus Budget Reconciliation Act of 1985 (COBRA) to give health insurances to employee even after employment....
Preview sample
30851 - 30900 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us