Wednesday, July 31, 2019

Preparing Financial Statement

Prepare a Set of Financial Statements Samson Company adjusted account balances as of December 31, 2005 are as follows (some noted balances are Jan. 1, 2005): Sales . . . . . . . . . . . . . . . . . . . . . . . .1,200,000 Purchases . . . . . . . . . . . . . . . . . . . . . . 810,000 Marketable securities . . . . . . . . . . . . . . . . 15,000 Purchase discounts . . . . . . . . . . . . . . . . . 20,000 Purchase returns and allowances . . . . . . . . . . . 2,000 Extraordinary loss due to earthquake, net of applicable taxes of $15,000. . . . . . . . . . . . 35,000 Selling expenses . . . . . . . . . . . . . . . . . 114,000 Cash . . . . . . . . . . . . . . . . . . . . . . . . 90,000 Accounts receivable . . . . . . . . . . . . . . . . . 60,000 Common stock . . . . . . . . . . . . . . . . . . . . 150,000 Accumulated depreciation . . . . . . . . . . . . . . 42,000 Paid-in-capital in excess of par . . . . . . . . . . 30,000 Inventory, January 1, 2005 . . . . . . . . . . . . . 149,000 Inventory , December 31, 2005 . . . . . . . . . . . . 120,000 Accounts payable . . . . . . . . . . . . . . . . . . 71,000 Salaries payable . . . . . . . . . . . . . . . . . . 5,000 Cash surrender value of life insurance . . . . . . 22,000 Patents . . . . . . . . . . . . . . . . . . . . . . . 18,000 Retained earnings, January 1, 2005 . . . . . . . . . 60,600 Interest expense . . . . . . . . . . . . . . . . . . 13,000 General and administrative expenses . . . . . . . . . 160,000 Dividend revenue. . . . . . . . . . . . . . . . . . . 6,000 Allowance for doubtful accounts . . . . . . . . . . . 3,000 Notes payable (maturity 7/1/07) . . . . . . . . . . . 105,000 Machinery and equipment . . . . . . . . . . . . . . . 150,000 Income tax expense . . . . . . . . . . . . . . . . . 30,600 Treasury stock . . . . . . . . . . . . . . . . . . 10,000 Dividends declared and paid . . . . . . . . . . . . . 18,000 Prepare multi-step income statement: Samson Company Income Statement For the Year Ended December 31, 2 005 Sales $1,200,000 Cost of Goods Sold: Beginning inventory $149,000 Purchases $810,000 Purchase discounts ( 20,000) Purchase returns and allowances ( 2,000) ——- Net purchases 788,000 ——- Goods available for sale 937,000 Ending inventory 120,000 ——-Cost of goods sold 817,000 ——— Gross profit 383,000 Operating expenses: Selling expenses 114,000 General and administrative expenses 160,000 ——- Total operating expenses 274,000 ——— Operating income 109,000 Other income (expense): Dividend revenue 6,000 Interest expense ( 13,000) ——- Total other income (expense) ( 7,000) ——— Income before income taxes 102,000Income taxes 30,600 ——— Income before extraordinary item 71,400 Extraordinary loss due to earthquake, net of applicable taxes of $15,000 ( 35,000) ——– Net income $36,400 ======== Prepare a Statement of Retained Earnings: Samson Company Statement of Retained Earnings For the Year Ended December 31, 2005 Retained earnings, January 1, 2005 $60,600 Plus net income 36,400 Less dividends ( 8,000) ——- Retained earnings, December 31, 2005 79,000 ======= Prepare a classified Balance Sheet: Samson Company Balance Sheet December 31, 2005 Assets Current Assets: Cash $ 90,000 Marketable securities 15,000 Accounts receivable $ 60,000 Less allowance for doubtful accounts ( 3,000) ——- 57,000 Inventories 120,000 ——– Total Current Assets 282,000 Property, Plant, and EquipmentMachinery and Equipment $150,000 Less accumulated depreciation ( 42,000) ——– Total Property, Plant, and Equipment 108,000 Other Assets: Cash surrender value of life insurance $ 22,000 Patents 18,000 ——- Total Other Assets 40,000 ——- Total Assets $430,000 ======== Liabilities and Stockholders' Equity Liabilities: Current Liabilities: Accoun ts payable $ 71,000 Salaries payable 5,000 —— Total Current Liabilities 76,000 Long-term Liabilities Notes payable 105,000 ——- Total Liabilities 181,000 Stockholders' Equity: Common stock $150,000 Paid-in-capital in excess of par 30,000 Retained earnings 79,000 Treasury stock ( 10,000) ——- Total Stockholders' Equity 249,000 ——- Total Liabilities and Stockholders' Equity $430,000 ========

Tuesday, July 30, 2019

Simple Gift Esssay

Identifying language techniques Composers use various language techniques or features to make their texts more interesting and engaging to the responder.Some language techniques used by Stephen Herrick in The Simple Gift are: †¢ simile: comparing one thing with another using the words ‘like’ or ‘as’ †¢ metaphor: a comparison where one thing is said to be another †¢ colloquial language: everyday speech characterised by informal language and shortened words (g’day, can’t) †¢ direct speech: quotation marks (â€Å") are used to indicate direct speech, that is, the exact words that are spoken †¢ slang: words which are fashionable within a small group for a short period of time †¢ literary allusion: makingreference to other well known books, films, etc †¢ first person: using the pronouns I, me, my, us, we †¢ comparatives and superlatives: adjectives for comparing, e. g. |Adjective |Comparative |Superlative | | long |longer |longest | |small |smaller |smallest | |bright |brighter |brightest | †¢ ellipsis: three dots to provide a pause, to show that something has been left out †¢ modality: gives information about the degree of certainty involved in an action, e. g. |Low modality |Medium modality |High modality | |possibly |probably |definitely | |could |should |must | |never |sometimes |always | †¢ juxtaposition: the close positioning of words or images to create an effect †¢ imagery: to create a set of strong mental images in the responder’s mind †¢ repetition: a word or phrase used many times to add emphasis †¢ rhetorical question: a question that is asked but which does not expect or need an answer. Activity: Language techniques Find examples of these language techniques in The Simple Gift. Give page numbers. Explain the effect of this technique on the responder. Language technique |Example from the text (quote) |Page |Effect of this technique | |Simi le |Men in suits, like tired penguins |   28 |   I makes you think they all seem tired and | | | | |they all look the same as one another. Doing | | | | |the same sort of thing day in and day out. | |Metaphor |   I dreamt of myself as an old man in a pub |   54 |   It makes you think that he is a bit | | | | |depressed about getting old, from what he has| | | | |seen it is a bad thing. |Colloquial language |   I wished I Hadn’t |  80 |   It is simply regretting whatever they have | | | | |done | |Direct speech |   â€Å"$109, but let’s make it $100 cash. It’s a |   83 |Well Billy is looking to buy a ring, and the | | |good ring son. † | |man is being very generous towards him. | |Slang |   |   |   | |Literary allusion |   He kept talking about the book, his |  118 | It is talking about the book that he loves | | |favourite, The Grapes Of Wrath and the honour | |and the characteristics of the book. | | of poverty | | | | First person |   I hate Cooking |   121 |Well the first one she is saying she does not| | |I love Eating | |like cooking, | | | | |The second shows that she loves to eat. | |Comparatives/ superlatives |   Quieter, |   129 |   It is more silent than quiet but louder | | | | |than quietest. |Ellipsis |   A house seems so†¦ so†¦ |   176 |   It looks like they are struggling to find | | | | |words to describe what they are trying to | | | | |say. | |Modality |   Nothing, something, |   96 |It is like building it up to something big. | |Juxtaposition |   In the quiet sunshine |94   |It creates the affect of a most peaceful day,| | | | |that everyone is happy. |Imagery |   A sip of beer, a slice of cheese, some |   94 |It creates pictures in your head of the food | | |roast, and slowly one biscuit after another | |they are eating and how nice it is. | |Repetition |   |   |   | |Rhetorical question |   What should I say? |135   |He is as king himself what he should say to | | | | |make it perfect but he knows it comes from | | | | |the heart anyway. |

Monday, July 29, 2019

Utilizing Database Performance Using Column Store Research Paper

Utilizing Database Performance Using Column Store - Research Paper Example This technique of data storage has its benefits but again several questions still exist on the same matter. For instance, how row based systems be able to be customized to achieve performances associated with column stores? This is the kind of question whose answers we seek to discuss in this document. 1. Introduction The paper seeks to show how database performance can be increases using database column storage techniques. The paper will be divided into sections which include a brief description about the database column storage, an explanation on how column store can utilize the performance of databases, how database performance will differ by using column store and not row storage. Additionally, areas where column storage count will also be discussed; these are areas of application of the technique will also be discussed. Finally, recommendations on the enhancements of column stores will come at the end of the paper. 2. Database Column Storage Column store database systems can be traced to the 1970’s; this was the first time when transposed files were being studied; Then followed the investigations into the vertical partitioning technique of clustering table attributes on a database. The mid 80’s witnessed the experience of the advantages of decomposed model of storage (DSM). This was the predecessor to column storage technique. It was considered better than the old row based system of storage. Nonetheless, row based database systems still went on to maintain dominance of the markets as a result of market needs, as well as non-favorable trends in technology to implement the column based systems of storage. This was despite the fact that the DSM technique was very suitable and had potential for better analytical queries. However, the 2000s had good tidings for research on column storage systems. Commercial systems of the same took off instantly. In this paper, we look at the technology and the application trends which have led to the renaissance of commercialization of the column stores. In comparison to the row-oriented stores of data, the column oriented, database systems were read optimized; this means that the when a query is sent, access is granted to the required fields only, and a reduction in disk input output processes and time is registered. student_Id Firstname Lastname Grade 1 James Smith A 2 Cathy Jones A- 3 Elizabeth Queen C Table 1: Sample Database Table In a computer, the database information has to be converted and bytes for storage in the hard drive or to be written onto the RAM. For row-based storages, the data in the database is serialized according to the values in each of the rows; then follows the data in the next row. The data is arranged as follows, in the row based model: 1, James, Smith, A; 2, Cathy, Jones, A-; 3, Elizabeth, Queen, C; On the other hand, the column based storage system would arrange the data in the following format for storage: 1, 2, 3; James, Cathy, Elizabeth; Smith, Jones, Queen ; A, A-, C; Research on column stores indicates that, with compression, row-stores perform less effectively than column oriented systems. More formally, column storage systems store their data tables in the form of columns of data unlike the row based systems which store data in the form of rows of data; as seen in most relational

Sunday, July 28, 2019

AFRICAN HISTORY Essay Example | Topics and Well Written Essays - 750 words

AFRICAN HISTORY - Essay Example In a social context, when it comes to social behavior, to begin with it was limited to a few single individuals with children that began to live together to better their chances of survival. These small groups eventually gave to bigger groups evincing a higher degree of social complexity (Berger 1). Thereby the humans felt an increased need for a better and efficient communication, and the need for language was felt (Berger 4). The earlier usage of limited oral expressions to solve the limited problems gave way to much complex lingual constructs (Berger 4). The early humans realized the advantages of using language for the sharing of information. The first convincing stone tools were developed by human about 2.5 million years ago in East Africa (Berger 5). As the early human realized the efficiency that stone tool ushered in their daily activities they started using select rock materials to craft and fashion tools (Berger 5). The humans accepted the importance of tools in butchering activities, as human teeth and nails were quiet incapable of slicing pieces of flesh and tough skins. Gradually the proto humans also learnt to fashion tool from perishable materials like wood (Berger 5). Eventually, with the enhanced preference for group formation, the early humans became more of hunters and farmers than being mere scavengers. This led from human populations confined to small groups that were far scattered to social organization and thereby an enhanced human capacity to fight against the vagaries of nature. This eventually gave way to larger human populations. 2. The relationship between the land, people, and climate has always been a complex issue on the continent. Discuss agriculture, domestication, and pastoralism in early ancient Nile Valley and Southern African communities. Cite techniques used to control plant productivity, livestock domestication, and responses to climatic changes. There is no

Saturday, July 27, 2019

Demand Utility Marginality Essay Example | Topics and Well Written Essays - 500 words

Demand Utility Marginality - Essay Example For instance in the beauty franchise, such as in a beauty salon, many customers are extremely loyal once they find a location that they truly enjoy. "No way would I give up my hair stylist. You develop these relationships," says Liza Burnett, a 26-year-old in New York, who spends $150 for a hair cut and scalp treatment every two months. The factors that appear to affect the marginal utility of such luxury goods among those with large net worth are many. One of the most primary would be that obviously only those with the monetary resources available would be able to afford an item with such a high price. Another factor, which relevantly ties into the first, is that the salesperson of an item such as this would want to have excellent marketing skills as well as proper customer service skills, in order to sell as best as they possibly can. Although there is a significantly higher number of people in the world today with a bank account full enough to easily purchase items with such a high cost as compared to even fifty years ago, it still takes a good customer service representative to sell efficiently. The marginal utility of a Rolls Royce Silver Cloud to me is the fact that it is "considered to be the most aesthetically pleasing vehicle ever to be produced by the vehicle manufacturer." ("Wikipedia",

Friday, July 26, 2019

ACC 501 Case Assignment 1 (Accounting for Cesision Making Essay

ACC 501 Case Assignment 1 (Accounting for Cesision Making - Essay Example According to the disclosure in its Annual Review, standards appropriate to ‘current legislation’ and the company’s Articles of Association are used. As countries listed with the EU securities market use the International Financial Reporting Standards for reporting purposes, it is concluded that the parent company prepares its consolidated financial statements according to the IFRS (Weygandt, Kimmel, & Kieso, 2010). The Auditing Board of the Central Chamber of Commerce undertakes responsibility for local auditing standards within Finland, so it can also be concluded that relevant audit standards used by Fazer Group are as per ABC (DeloitteToucheTohmatsuLimited, 2013). Comparability of the income statement may be difficult as Fazer group’s income statement does not incorporate Cost of Sales or Cost of Goods Sold as an individual line item whereas Caribou’s income statement does. Fazer’s statements have specified increase or decrease in inventory stock individually whereas Caribou’s have included inventory movements within COS. This may give rise to comparability issues within the operational cost heads of the two companies (KPMG, 2012). Caribou’s statement of cash flows does not incorporate the impact of the finance cost, dividends paid and tax paid after the ‘changes in operating assets and liabilities’ segment of the cash flows from operating activities; instead the information is provided as supplementary disclosure at the end of the statement of cash flows. As per IFRS regulations, this adjustment is made in Fazer’s statement of cash flows. This, eventually, creates a discrepancy between the final figures for operating cash flows for the two companies. Conclusive statements about the companies’ performances based on the statement of cash flows cannot be drawn as a result. Purchase of the subsidiary is incorporated within the investing activities of Fazer Group; however,

Cloud computing Risk or Opportunity Research Paper

Cloud computing Risk or Opportunity - Research Paper Example Since last few years, cloud computing has resulted in a number of positive impacts on the IT ecosystem, thereby giving rise to new markets and widely scattered new user communities (European Commission, 2012). Contextually, the concept of cloud computing is the outcome of the direct industrial needs to enhance resource utilization without intervening consumer requirements. In other words, the concept ensures the use of the available resources in more efficient manner (European Commission, 2012). The paper intends to critically examine the opportunities and the risks associated with cloud computing and draws a valid conclusion on its adoption by organizations. Cloud computing was initially used in an academic perspective by Prof. Kenneth K Chellapa who illustrated it in 1997 at the Informs Conference in Dallas as â€Å"a computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits† (Petri, 2010). There are various definitions of cloud computing however the most appropriate and broadly accepted definition is being provided by North America National Institute for Standards and Technology (NIST). According to NIST, â€Å"Cloud Computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort to service provider interaction† (Petri, 2010). Public Cloud: Public cloud model is provided by vendors and can be accessed over the internet or private network. One or more data centers are used by this model which is shared by multiple customers (Weitz, 2010). Private Cloud: Private cloud model is managed and used internally by the organizations which utilizes ‘shared services model’ and makes variable usage of virtualized computing resources. The data stored in the model are managed within the organization (Weitz,

Thursday, July 25, 2019

Local and Surrounding Ecologies and Environment Essay

Local and Surrounding Ecologies and Environment - Essay Example There is a marked difference between the â€Å"built† environment and the â€Å"natural† environment, because the perception of the natural environment is prominent by its varied workings that consist of total environmental and biological groups with specific functions, which includes all plant life, flora, undergrowth, foliage and shrubbery, bacteria microbes, germs and soil, rocks, atmosphere and all non-artificial events in the physical sense that are not produced by humans, although they effect humans. Also included in the environment are general natural resources and natural phenomena that cannot be mapped and have no geographical limits such as air, water and climate and manmade resources or originating from manmade activities such as energy, radiation, electrical charges and magnetism. ... tropical rain forest or desert. The world's lakes and oceans may also be considered biomes, although they are less susceptible to climatic influences than terrestrial biomes. Other factors could be related to, living, or occurring in the waters of the ocean or the open sea as opposed to near the shore such as bird populations, and other deep sea or shallow marine, evergreen forests, deciduous forests, steppes, and grasslands. Also equally important is the factor that fills the various places in the local ecosystem. The ecosystem consists of all the physical and free living systems that describe the physical and chemical aspects of organism environments. Human activities that affect local ecosystems: Human activities that have greatly damaged the ecosystem is the junk discarded from homes and factories which causes the most pollution, has resulted in the loss of habitat and produced acid rain which has in effect resulted in the deprivation of the ecosystem. Urban development of farmla nds for mass agriculture has replaced grasslands with crops that are consumed mostly by humans. Space for crops has been made by chopping down and burning forets, and lumber supplying trees have been cut without letup to feed the growing demand for lumber and other wood products. The flow of rivers, streams and waterways are diverted for use on agricultural lands and for other human requirements in cities and towns. Humans have depleted the amounts of fish in the oceans, seas and rivers by mechanical fishing without giving the fish the time to rebreed and produce thereby severely depleting existing reserves. Every type of human conveniences such as cars, generators etc. use fossil fuel that has caused global warming, acid

Wednesday, July 24, 2019

Law Research Paper Example | Topics and Well Written Essays - 1000 words

Law - Research Paper Example 1. Arguments in support of firing the teacher (Pros): There are numerous grounds on which the aforesaid high school teacher is liable to be punished and they are stated as follows: I. The act of posing for an adult website is an immoral act by itself and should not have been committed by the teacher. II. Any teacher is a role model for his students and as such the high school teachers’ act of posing in an adult website gives a bad effect on the ideology of the students. Thus, the teacher should be penalized to prevent further damage on the students’ ideology. III. As a teacher of a school she should have conformed to some public, moral, business, and ethical standards as her actions affect her students and indirectly a larger community, which she did not, making her eligible to be dismissed. IV. Before getting hired by the school, the teacher signed an agreement which read, â€Å"I agree to promote this schools mission of training good and law-abiding citizens who will make this society a better place to live.† The act of posing for the adult website creates a bad impact on the students. It can happen that the students start posing for adult websites following the teacher. The teacher violates her contractual obligation â€Å"of training good and law-abiding citizens who will make this society a better place to live† (Contract clause) and therefore she should be fired. V. It can be presumed that the teacher has caused harm to the students by posing for an adult website once students have come to know about it and this makes the teacher liable to â€Å"be sued personally for causing student injury† and she may â€Å"also lose her job† (Kaplan and Owings 252). VI. The high school teacher was also negligent in doing her duty towards preventing harm to the students. She never thought for an instant that when her act of posing for an adult website is disclosed she may cause a bad impact on the ideology of the students and in directly the future of the students. Moreover, â€Å"neglect of duty and negligence† is a ground for dismissal of a teacher in 26 states of US (Neal 86). 2. Legal provisions in support of firing the high school teacher (Pros): There are numerous legal grounds which entail the dismissal of the high school teacher in this case, which includes dismissal of the teacher for immorality, causing harm, violation of contract, injury to the students and negligence. The burden of proof is on the school for proving through evidence that the teacher actions fulfill one of the aforesaid categories, making the teacher liable to be dismissed. The statutes of many states of US allow the dismissal of a teacher for immorality or unprofessional conduct. Immorality or unprofessional conduct authorize firing of teachers for behavior and choice of lifestyle the community or school board holds wrong or unfitting for teachers (Imber and Geel 193). In the instant case, the act of posing for an adult w ebsite is an immoral act and the teacher is liable for immorality. As stated by Essex in his book that immorality â€Å"is often cited as grounds for dismissal† (197). Immorality is a conduct that offends the ethics of a particular community that makes the teachers unfit to teach. The courts tend to view unprofessional acts of immorality as those actions that have an adverse impact on the teacher’

Tuesday, July 23, 2019

Proposal writing Essay Example | Topics and Well Written Essays - 250 words

Proposal writing - Essay Example It is very important not to omit the mission statement in the writing. It should demonstrate the company’s goals and expectations. Each proposal is based on a particular budget. The latter consists of the following elements: 1) management, 2) labor, 3) facilities and equipment, 4) materials, 5) travel and 6) communication. It is necessary to mention that there are several types of budget. They are: itemized budgets, nonitemized budgets, fixed budgets, flexible budgets, fixed costs, variable costs and semivariable costs. Despite all costs, there are many benefits of proposal. They are hard and soft benefits. Hard benefits stand for the guantifiable outcomes of the project that are easy to see, measure or read. Soft benefits mean abstract things you will get in the process of working with the company. It may be trust, satisfaction, confidence, efficiency, etc. The success of the proposal is begun with its introductory part. To prepare a perfect introduction it is necessary to do the following things: 1) identify the subject of the paper, 2) introduce the purpose of the writing, 3) suggest some main point to prove in the paper, 4) persuade the readers that this subject is very significant, 5) give some background information, 6) foresee the organization of the writing. Conclusion is as important as introduction; here the main point of the proposal should be

Monday, July 22, 2019

Employee Mentoring Essay Example for Free

Employee Mentoring Essay Jankowicz (2005) mentions, that methodology is the process or approach to undertake a research or study. Prior to follow a methodology, it is essential to understand the research philosophy, which according to Grinnell (1993 cited Kumar, 1999, p. 6) â€Å"research is a structured inquiry that utilizes acceptable scientific methodology to solve problems and creates new knowledge that is generally applicable†. When researching it could be apply to any situation, either for professional or personal purpose. In this case, the main purpose of doing research is to develop an investigation about real situations that may increase or change the knowledge of a particular management problem (Ghauri and Gronhaug, 2002). Therefore, the diverse research methods will be discussed in this chapter, which among other strategies it involves collection and analysis of the research data (Blaxter et al, 2001; Collis and Hussey, 2003). Research Philosophy  The understanding of philosophical positioning of research is useful in the way that helps researchers to clarify alternative designs and methods for a particular investigation and identify which are more likely to work in practice (Ghauri et al, 1995). In this case, research philosophy is about the way the researcher perceives the development of the knowledge and the way the information can be acquire through different processes, besides it provides an ideology to carry out the research (Collis and Hussey, 2003; Saunders et al, 2003; Bryman, 2004). Therefore, there are two main views related to research philosophies: positivism and phenomenological, which is also known as interpretivism approach (Denscombe, 2002; Collis and Hussey, 2003; Saunders et al, 2003; Jankowicz, 2005). Saunders et al. (2003) point out that the phenomenological approach proposes the discovery of subjective meanings in for example humans’ behavior in order to understand and give interpretations to their actions and reactions to particular situations (Collis and Hussey, 2003; Saunders et al. , 2003). Nevertheless, it is important to have in mind that one is not a better philosophy than the other. The philosophy â€Å"depends on the research question that the researcher is seeking to answer† (Saunders et al, 2003, p. 85). From the above mentioned, the research philosophy of this study is based on the develop of skills and knowledge without aiming to generalized and seeking for the truth, but to focus on understanding of human behavior based on the descriptions and experiences of people in specific situations (Collis and Hussey, 2003; Saunders et al. 2003; Jankowicz, 2005). Hence, this research will take an interpretivism philosophy, because the study is related with employee mentoring and attitudes towards job satisfaction and organizational commitment. The role of social learning processes and characteristics of a good mentor may have a great influence on the above mentioned attitudes of employees, which is based on different meanings and interpretations that individuals could have on their own experiences. In addition, Collis and Hussey (2003, p. 7) said â€Å"it is an approach which assumes that the social world is constantly changing, and the researcher and the research itself are part of this change†. Not only the social world is changing, but also the global business environment is and using an interpretivism approach provides flexibility to confront those changes. Whereas the positivistic approach is characterized by seeking law-like results that can be generalized and there is an objective truth that exist in the world and can be revealed through the scientific method, where the focus is on measuring relationships, systematically and statistically, between variables. Research Approach According to Saunders et al (2003), a research is conducted to analyze existing theories, or to establish new theories as a result of recent findings. This will depend on whether the approach is deductive or inductive. A deductive approach is where the researcher develops a theory which will be tested, whereas an inductive approach is where the theory will be developed from the analysis of the data that is going to be collected. The nature of this research is not to find a specific theory but an explanation of an existing situation, for example, in today’s global business environment. Therefore, this research will place the inductive approach which is closely related with the interpretivism philosophy due to its characteristic of not assuming results that are inferred from general conjectures, but developing an explanation from the data collected where general conjectures are induced from specific cases (Jankowikz, 2000; Collis and Hussey, 2003; Saunders et al. , 2003). Research Purpose  An important part of a research and mainly seeing it from the perspective of its objectives, is to identify the purpose of it, which according to some authors can be classified as exploratory, descriptive, explanatory and predictive (Kumar, 1999; Saunders et al. , 2000; Collis and Hussey, 2003). Whereas, the exploratory study is carried out to explore areas, identify variable and look for hypothesis instead of confirming hypothesis, the predictive study forecasts the result of an event and anticipate the outcomes of that event which is under study. On the other hand, an explanatory (analytical) study focuses on studying a situation or a problem in order to discover and measure the relationship between variables, while a descriptive study identifies, describes and provides information of a particular issue (Kumar, 1999; Saunders et al. , 2000; Collis and Hussey, 2003). Therefore, the purpose of this research, taking into account its objectives is exploratory due to the fact that it tries to examine the impact of employee mentoring on their attitudes towards job satisfaction and organizational commitment. The role of social learning processes is also very important in the relationship between mentoring and job attitudes. The qualities of a mentor also play a great role in this relationship. Hence, it would lead to find strategic recommendations for the organization involve in this investigation. Data Collection To answer the research question and achieve the objectives of the research there is the need to collect data, (Saunders et al. , 2000). There are two main data resources, secondary and primary data. Secondary data is the one that already exists from previous investigations and it can be found in books, journals and films (Saunders at al, 2003). Primary data is the one that is recollected from the research and it can be obtained by using methods such as questionnaires, interviews, focus group, and other (Collis and Hussey, 2003). Saunders et al. (2003) points out that literature review helps to develop an understanding and insight into relevant previous research. Collis and Hussey (2003), add to Saunders’s point of view saying that exploring the existing literature will help to have a better overview on previous research that has been conducted and its impact on the studied research problem. In addition, Saunders et al (2003) classify the secondary data into three types: documentary, survey-based and multi-source. For this investigation, it will be useful the documentary secondary data because written documents such as articles taken from the Internet, journals, books among others, could be relevant information to be used.

THE IMPACT OF MONETARY POLICY ON NIGERIAS ECONOMIC DEVELOPMENT Essay Example for Free

THE IMPACT OF MONETARY POLICY ON NIGERIAS ECONOMIC DEVELOPMENT Essay Monetary policy being an economic tool is used to stabilize the economy. It is a tool used by the government through monetary agencies like the Central Bank to control the supply of money in an economy. It is used to bring about economic growth and development through the control of inflation. It impacts the economy cannot over-emphasized. It has very positive impacts on the economy and helps in building a sustainable economy. Monetary policy is the process by which the monetary authority of a country controls the supply of money, often targeting a rate of interest for the purpose of promoting economic growth and stability. It is maintained through actions such as increasing the interest rate, or changing the amount of money banks has to keep in the vault(bank reserves). It can be used to increase or decrease the volume of money in circulation based on the situation at hand. PURPOSE OF THE STUDY The intent of the proposed study is to critically examine the impact of monetary policies on the Nigerian economy. The focus will be on how monetary policies adopted in recent years have impacted on the Nigerian economy. How the federal government have strived through the use of monetary policies to stabilize and develop the Nigerian economy. The intent is to provide adequate information to readers on the roles played by monetary authorities and monetary policies in ensuring economic growth and development in the entity called Nigeria. An objective approach shall be employed in order to bring about valid arguments and conclusions. LITERATURE REVIEW Scholars in the economic and financial field have written articles on the proposed research topic. Professor Kunle Adamson in 2002 wrote an article in this regard.he placed emphasis on the then proposed re-denomination of the naira by the then CBN governor Professor Charles Soludo. He critically analysed how the re-denomination of the naira would have impacted the Nigerian economy. Another literature to be reviewed is the article written by Dr Okoro A. Sunday(Ph.D) of the Ebonyi State University. He critically examined the long-run equilibrium relationship between monetary policy instruments and economic growth in Nigeria. The intent  of the proposed research is to explore the various angles to the research topic. The poor implantation process would also be critically examined.

Sunday, July 21, 2019

Can Torture Of Terrorist Suspects Be Justified?

Can Torture Of Terrorist Suspects Be Justified? In advancing into this essay, I shall discuss the history of prohibition of torture, the Utilitarian approach to torture which would include arguments and debates in favour of justification of torture by taking account of the ticking bomb hypothetical, a case study of Guantanamo Bay and the result of torturing terrorist suspects in recent times. This essay would also examine the deontology approach to torture and make recommendations on other means of getting information and truths from terrorist suspects. BACKGROUND TO PROHIBITION ON TORTURE Torture and other cruel or inhumane treatment has been internationally outlawed since the end of the Second World War and the 1948 Universal Declaration of Human Rights stated that No one shall be subjected torture or to cruel, inhuman or degrading treatment or punishment. It allows for no exceptions under any circumstances. This prohibition can also be found in Article 7 of the International Covenant on Civil and Political Rights and the American Convention on Human Rights, Article 5 (2) of the American Convention on Human Rights which are both binding on the United States. In addition, Geneva Conventions III, IV and Optional Protocol I in Articles 17, 32 and 75(2) respectively prohibits physical or mental torture and any forms of coercion against a prisoner of war, they also prohibits an occupying power from torturing any protected persons and torture of all kinds and any other outrages on personal dignity, against anyone under any situation. Also the 1984 Convention against Torture takes these general duties and conventions and codifies them into a more specific rule. It criminalizes torture and tries to prevent any exemptions for torturers by disallowing his access to every possible refuge. The convention states categorically that there will be no circumstances peace time, war time, or even war against terror where torture would be permissible. Importantly even before September 11, the International Convention Against Torture (Art 2.2) states that no exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability or any other public emergency, may be invoked as a justification of torture. The word torture is clearly a subject matter in which International Law is clear about. It does not matter who the person or persons involved are whether criminals, combatants, members of the Taliban or terrorist suspects, the rule is torture is not permissible for any reason. Anyone who threatens or participates in torture would be treated as a criminal before the law. Sands (2004: 208) furthermore explained that absolute prohibition is related to a second set of rules that deals with the status of the terrorists- whether they are to be treated as combatants or criminals. If he is a member of a regular armed force then he is a combatant and must be treated as such and is entitled to protection under International Humanitarian Law. But if he is a member of an Insurgency group such as Al- Qaeda, who is thought to have planned or is planning a suicide attack, International Law regards such people as criminals. The United States, Britain and over a hundred states support this approach. The 1997 International Convention for the suppression of Terrorist Bombings followed that analysis and made it a criminal offence to attack a government structure or facility, a public place or a state with the aim of causing death or damage. State parties to the 1997 Convention have consented to subject anyone who is thought to have been involved in terrorist activities to criminal procedure, by either prosecuting them or extraditing them to another state that will eventually prosecute them. The convention explicitly guarantees fair treatment to anyone who is taken into custody under its provisions which includes rights provided both under the International Humanitarian Law and the International Human Rights Law. Unfortunately, Lawyers in the Department of Justice and in the administration of President Bush had provided detailed legal advice to the US government on International Torture Rules. According to Sands (2005:205) they suggested that interrogation practices could be defined without mentioning the constraints placed on the United States as a result of its international obligations and that so long the practice was in accordance with the US law, it would be fine. This advice categorically ignored the 1984 Convention against Torture and all other international treaties and rules in which the US was bound. It plainly ignored the prohibition against torture in all circumstances, definition of torture, the classification of detainees either to be combatants entitled to prisoner of war status or criminals. Sands (2005: 222)notes the following: Over time a great deal more information will emerge. But even at this stage it seems pretty clear that the legal minds which created Bushs doctrine of preemption in the use of force and established the procedures at the Guantanamo detention camp led directly to an environment in which the monstrous images from Abu Ghraib could be created. Disdain for global rules underpins the whole enterprise. The deontologist-utilitarian debate over torture provides a useful background and reflects common reasoning when faced with this dilemma. Our immediate focus is on the inhumanity of torture (emphasized by deontologists) and the numerically greater threat to innocent people (emphasized by utilitarianism). However, the situation is presented deceptively simply; the next section will examine its flaws. THE DEONTOLOGY APPROACH AND ARGUEMENTS AGAINST TORTURE Deontology would appear to prohibit torture in all cases. This approach invoking Kant as the traditional torchbearer of this approach, Kay (1997:1) describes Kants theory as an example of a deontological or duty-based ethics: it judges morality by exploring the nature of actions and the will of agents rather than goals achieved. Roughly, a deontological theory looks at input rather than result. Kay (1997:1) noted that this is not to say that Kant did not care about the outcomes of our actionswe all wish for good things. Rather Kant insisted that as far as the moral evaluation of our actions was concerned, consequences did not matter. Deontologism is an approach which seeks to create universal rules for the morality of human action; its ideas of common humanity and fundamental human rights were very influential in the banning of torture. (Turner, 2005: 7, 15) Kants deontological approach creates two universal rules by which moral questions can be addressed: Act as though the maxim of your action were by your will to become a universal law of nature, and Act so that you treat humanity, whether in your own person or in that of another, always as an end and never as a means only. (in Turner, 2005: 14) Under the first rule, the act of torture cannot be justified as we would not accept it being universalized and potentially used against ourselves. Under the second, torture is wrong because torturing a person for information is to use them as a means only. (Turner, 2005: 15) Thus Kants logic leads to the conclusion that torture cannot be justified under any circumstances. The individual who chooses not to torture makes the correct moral decision regarding their actions despite the terrible consequences that might result. By torturing a captive, we are treating him as a means only (towards the acquisition of information) as he is definitely not being treated in a way to which he would consent. Torture fails to respect him and treat him inhumanely. Kershnar (1999; 47) believes in some cases utilitarianism would support torture and that because Kantian deontologists would, in all cases, reject it, torture has the position of being a very interesting concept for ethical inquiry. People no doubt have their commitments to utilitarianism or deontology but, given the conflict, there is at least something to talk about and some debate within which to advance opinion to maintain one conclusion or the other. Posner (2004:296) clearly states that if legal regulations are propagated authorizing torture in definite situations, officials are bound to want to explore the outer limits of the rules and practise, once it were thus regularized, it would likely become a norm, in other words, taking an extra step outside the approved situation which would result in abuse of the system. THE UTILITARIAN APPROACH AND DEBATES JUSTIFYING TORTURE The utilitarian approach to torture according to Fritz (2005: 107) argues that the right action is the one, out of those available to the agent, that makes the best use of total aggregate happiness. We might to a certain extent simply imagine a situation in which the disutility of torturing a captive (his pain, the discomfort of the torturer, expense, permanent effects to both, chance of negative events causally connected to torture, etc.) is outweighed, or even dramatically outweighed, by the utility of torture (information is provided that saves many lives and therefore acquires all of the associative utilities). This utilitarian approach is exemplified by one of the most controversial debates on torture which is the ticking time-bomb scenario. This scenario has been thoroughly discussed by Michael Levin and Alan Dershowitz (2002:150) where they have both argued that torture is obviously justified when it is the only way to prevent a serious and impending threat and must regulated by a judicial warrant requirement. The ticking bomb hypothetical tries as much as possible to depict torture as an exception in an emergency. This scenario arises where law enforcement officials have detained a person who supposedly knows the location of a bomb set to explode, but who refuses to disclose this information. Officials could apply to a judge for a torture warrant based on the absolute need to immediately obtain information which will save lives. In other words to avert a greater evil, a lesser evil needs to be done. Another school of thought under the utilitarian approach proposes retaining absolute ban on torture while executing off book torture (ex post). Gross (2004:238) argues that in exceptional situations officials must step outside the legal structure and act extra-legally and be ready to accept the legal implication of their acts, with the likelihood that extra-legal acts may be legally (if not morally) excused ex post. Elshtain(200: 77) in the same way advised that in conditions where we suppose that a suspect might have crucial information, it is usually better to act with harsh inevitability. To condemn torture is to lapse into pietistic rigour in which moral torture of terrorist suspects purity is ranked over all other goods. The primary justification for the torture warrant proposal is that it is compulsory to protect the public. On this view Saul (2004:657) notes that violating the human rights of the individual is essential to safeguard the human rights of the many. Without considering if the information extracted from a tortured terrorist suspect is relevant or not, evidence obtained under torture is inadmissible in court under Article 15 of the UN Convention against Torture and other Cruel, Inhuman or Degrading Treatment or Punishment (1984). Article 15 reads: Each State Party shall ensure that any statement which is established to have been made as a result of torture shall not be invoked as evidence in any proceedings, except against a person accused of torture as evidence that the statement was made. Dershowitz is of the opinion that there should be an exception to torture which would justify the actions of interrogators as essential to avert greater evil to world. To him, it made no difference whether cases are real or imagined; all that matters is the theorys commitment to the moral obligation to torture in cases of imminent evil. Perhaps the general adherence to the rule torture is wrong is more likely than its negation to maximize happiness. Dershowitzs proposal was fortified by Fritz Allhoff in his article Terrorism and Torture Fritz (2005:17) concluded that: The conditions necessary to justify torture are: the use of torture aims at acquisition of information, the captive is reasonably thought to have the relevant information, the information corresponds to a significant and imminent threat, and the information could likely lead to the prevention of the threat. If all four of these conditions are satisfied, then torture would be morally permissible. Efforts to justify torture are often accompanied by rejection of any adverse physical condition effects of the selected torture methods used by interrogators. The ticking bomb scenario makes for great philosophical dialogue, but it rarely arises in real life, at least not in a way that avoids opening the door to persistent torture. In fact, interrogators hardly ever learn that a suspect in custody knows of a particular, impending terrorist bombing. Intelligence and information is rarely if ever good enough to display a particular suspects knowledge of an imminent attack. Instead, interrogators tend to use inferred evidence to show such knowledge, such as someones relationship with or apparent membership in a terrorist group. Moreover, the ticking bomb scenario is a dangerously expansive metaphor capable of embracing anyone who might have knowledge not just of imminent attacks but also of attacks at undetermined future times. After all, why are the victims of only an imminent terrorist attack deserving of protection by torture and mistreatment? Why not also use such coercion to prevent a terrorist attack tomorrow or next week or next year? And once the taboo against torture and mistreatment is broken, why stop with the alleged terrorists themselves? Why not also torture and abuse their families or associates or anyone who might provide lifesaving information? Dershowitzs arguments were faulted by Saul (2004:659) for various reasons which include the threshold of suspicion whereby it is unfeasible for law enforcement officials or judges to know with any legally acceptable height of conviction that the suspect actually possesses the intelligence and information, or whether the suspect is in anyway involved with a terrorist activity. Dershowitzs standard of probable cause is much lesser than the benchmark of evidence essential in a criminal case which requires that you can proof beyond reasonable doubt and more relaxed than the civil benchmark that is based on the balance of possibility. This means that a person may be tortured because of unproven evidence which still poses a risk that countless innocent people will be tortured. Saul (2004:659) notes that the uncomfortable probability of collateral damage is poorly dealt with by Dershowitz. Officials are faced with multiple unknown variables, including the existence of a bomb, interval of bomb explosions, the chances of neutralizing it, the identity of the terrorist suspect, the probability of the suspect being knowledgeable about the explosion, and the truthfulness intelligence gathered from the suspect. Speculation, guesswork, and supposition will unavoidably play a part in law enforcement judgments at every level due to the fact that accuracy of the information is not certain. The Geneva Convention IV (art3 (1)(a), for example, require that a person be definitely suspected of threatening State security before exceptional powers can be implemented. Saul (2004:1) believes that the border for error drastically multiplies in the pre-trial phase, where any available evidence is imperfect and unproven. The atmosphere of tragedy and emergency surrounding the incident may encourage errors, inaccuracy or dependence on weak evidence, by law enforcement agencies and courts under pressure which may eventually produce false results. Another major fault noted by Saul(2004:1) is the threshold of anticipated harm in which he seeks to question how many lives justify torture. Dershowitz limits his torture warrant proposal to the much-fantasized ticking bomb scenario. But he still acknowledges that very rare cases of actual ticking bomb scenarios have ever taken place. Benvenist(1997) try to give a concrete Israeli example, but the harm averted was the prevention of the killing of a single kidnapped Israeli soldier which is not even close to the exemplary ticking bomb case hyperbolically referred to by Dershowitz as involving the prevention of thousands civilian deaths. Apart from trying to prevent thousands of deaths, Dershowitz provides few parameters for the ticking bomb scenario. How dangerous must a bomb be before torture is justifiable? Does it only refer to weapons of mass destruction, or also conventional weapons? Is the danger supposed to be quantified by the number of lives threatened as Dershowitz appears to suggest? If so, how many thousands must be at risk before torture should proceed, and why is it thousands rather than hundreds of people, or less? What if the bomb causes major economic loss, but does not actually kill people? It is certainly very difficult to identify a ticking bomb scenario or to place limits on the utilitarian calculation necessarily involved in torturing one to save many. The Isreali Supreme Court (1999) noted that the so called necessity defence could not be justified and prohibition of Torture is absolute and there is no room for balancing. Dershowitzs argument is built largely on faith that forcing torture into the open would reduce its use. Furthermore, given the decentralized nature of modern terrorism, it might be possible for law enforcement agents to dispute or conclude that every suspected terrorist act can be likened to ticking bomb, thereby justifying widespread preventive torture. A terrorist is likely to target any location, within an unknown time interval, causing an indefinite number of casualties. There has not been any particular set of rules guarding issue of torture warrants to immediate ticking bomb scenarios. Torture warrants is open to flexible interpretation of the probable and expected harm to be done by the strike of terrorist suspects. Dershowitz also appears to emphasize that the consent of a democratic public are relevant to the justifiability of torture in a particular case and that torture should not be ruled out universally. In reality, we can say that torture has not been seen to give excellent intelligence and results. This would be discussed in the next section. RESULT OF TORTURING TERRORISTS IN RECENT TIMES The issue of the efficiency of torture is complicated to conclude, since there are minute consistent and trustworthy facts accessible on the number of terrorists that have been tortured and of this number, how many offered information or intelligence that was subsequently useful in preventing deaths and a greater evil or gratifying the reason for conducting the interrogation. As a result of this we can say that torture has done more harm than good and its outcome over time has not been tangible enough to justify it. Payes and Mazzetti (2004:A1) reported that in July 2004, an Army investigation of detainee operations in Iraq and Afghanistan exposed ninety-four cases of alleged abuse, as well as thirty-nine deaths in U.S. detention. Twenty of the deaths were suspected homicides. The military was reported to have probed into, fifty-eight deaths in Iraq, which comprising nine cases of justifiable homicide, seven homicides, and twenty-one deaths from natural or undecided causes. In one case of a detainee death, several soldiers have been charged with abuse rather than homicide due to inadequate evidence. In a different case, two soldiers were charged with intended murder. (Eric Schmitt, 2004:A7). He also reports that a Navy SEAL, whose identity has not been released, is being court-marshalled in connection with the beating of Manadel Jamadi, who was later killed, allegedly by CIA interrogators, in Abu Ghraib (and who was photo-graphed there, packed in ice). Realistically, the abuses of detainees at Abu Ghraib, Baghram, and Guantanamo pale by comparison with the death, maiming, and suffering in collateral damage during the Afghan and Iraq wars. Bombs crush limbs and burn peoples faces off; nothing even remotely as horrifying has been reported in American prisoner abuse cases. Yet as much as we may regret or in some cases decry the wartime suffering of innocents, we do not seem to regard it with the special abhorrence that we do torture (Luban 2005:5) Accounts have been given according to Wall Street Journal (2005: A16) which accuses United States interrogators to have used various interrogative techniques ranging from water boarding which was agreed to be most coercive technique ever actually authorised by U.S officials involves the submerging of victims face in water or wrapping it in a wet towel stirring up drowning feelings. Luban (2005:12) sees the principal scenery for torture to always be military triumph. In which the conqueror captures the enemy and tortures him. Torture to an illiberal state as he is noted is not only to get and an extract information and intelligence but also to humiliate the loser, to terrorize the victim to submission and to punish the suspect. Whereas Torture to a liberal state is a tool used to gather or extract information and intelligence from a suspect who has refused to disclose information. This may seem to be the same with torture used by an illiberal state to extract confession but the fundamental variation lies in the reality that confession is retrospective as it concentrates on acts of the past while intelligence gathering is futuristic as it aims to gain information to avert prospect evils. Moreover, coercive interrogation creates a less safe environment by effectively preventing criminal prosecution of the detainees. Once a confession is gotten forcefully, it becomes extremely difficult to prove, as due process requires, that a subsequent prosecution of the suspect is free of coercion. As a result, Jehl(2005) believes that the Bush administration finds itself holding some suspects who clearly have joined terrorist conspiracies and might have been criminally convicted and subjected to long prison terms, but against whom prosecution has become unfeasible. In February 2005, the Central Intelligence Agency (CIA) began to worry openly about the problem. What happens, it worried, when continuing to detain suspects without trial becomes politically untenable, but prosecuting them is legally impossible because of taint from coercive interrogation? Slippery slope arguments also address the wider implications of justifying torture. They are concerned with the gap between theory and practice; arguing that the theoretical limits imposed upon the use of torture would never work in practice. It is well documented that torture spreads from one class of prisoner to others, from one type of treatment to harsher types, and from one emergency situation to routine use. (Shue, 1978: 141; Saul, 2005: 3; Pfiffner, 2005: 21) The Israeli experience demonstrates these dangers. In 1987, the Landau Commission advised that coercive interrogation of Palestinian terror suspects should be legalised in extreme cases. For moderate physical pressure to be used the interrogators would have to demonstrate a necessity such as a ticking bomb situation. (BTselem, 2006) However, by 1999, the evidence that this ruling was being abused had become so overwhelming that the practice was outlawed by the Supreme Court. (Bowden, 2003) It was estimated that during this period 66% to 85% of all Palestinian suspects were ill-treated and that in many cases this amounted to torture. Supposed ticking bomb cases were pursued on weekdays but were not severe enough to warrant weekend interrogation; torture had become routine, systematic, and institutionalized (BTselem, 2006). Though returning to a complete ban, the legal repercussions for potential torturers are able to act as a deterrent. Another consequence that is little considered is the impact that becoming a torturer would have on the individual responsible. Torture is not possible without the brutalisation of the torturer; you must lose your soul if you are to save the victims. (Pfiffner, 2005: 20; Meyer, 2005) To torture requires us to overcome our socially conditioned abhorrence of violence and to accept the psychological repercussions. Shue argues that torture carries a much greater moral stigma (and therefore requires greater brutalisation) than killing in war, for example, as it constitutes an act of violence against an entirely defenceless being. (Shue, 1978: 130) The argument for legally sanctioned torture in some situations overlooks the secondary source of suffering it requires; the harmful psychological and social consequences endured by people who must train in and practice torture. To require this of someone is morally very problematic. A further adverse consequence of allowing torture in some cases is the impact it would have upon the judicial system. The US has experienced this problem in relation to its practice of extraordinary rendition. Secretly sending suspects for interrogation in countries known to use torture may occasionally provide useful information but torture evidence cannot be used in any reputable court. US government refusal to allow some of its prisoners to testify in criminal trials has led many to believe that the US is hiding the evidence of torture. As a result, the trial of Zacarias Moussaoui in relation to the 9/11 attacks was stalled for four years and, in 2004, Mounir Motassadeq, the first person to be convicted of planning the attacks, had his sentence overturned because the allowable evidence against him was too weak. (Meyer, 2005) CONCLUSION Dorfman(2004: 17) expressed his opinion by saying I can only pray that humanity will have the courage to say no, no to torture, no to torture under any circumstance, no to torture no matter who the enemy, what the accusation what sort of fear we habor, no to torture, no matter what kind of threat is posed to our safety, no to torture anytime, anywhere, no to torturing anyone- no to torture. Torturing terrorists is a cruelty in which many prefer not to be faced with in the media. Some will counter it, some will openly justify it, and others will secretly go along with it providing that it is not sadistic and serves a useful, although unheralded, early-warning function in the war on terrorism. Those arguing for the justification of torture on terrorist suspects say it has helped prevent attacks. This cannot be asserted as evidence is unreliable and subjectively sketchy In all likelihood, Dershowitzs proposals will remain only proposals and Allhoffs arguments, as convincing as they seem, will not change existing laws. If Deshowitzs proposal works, then judges would oversee the permission to torture while politicians pick judges. If politicians accept torture, judges would accept as well. Though we cannot be sure of the accurate motivation of the terrorists, one thing we know for sure is that violations of human rights and gathering of information through torture will not extinguish the threat they pose. Justifying torture is just replacing a respect for human dignity with an accommodating, excusatory retort to abuse. The ticking bomb case provides perhaps the most convincing justification for torture that we have, the erosion of the torture prohibition that could be caused by justifying and legalising the practice, and the slippery slope from exceptional to routine use of torture, would have very wide implications and could lead to the torture of many individuals across the world. There would undoubtedly be innocent victims faced with long-term suffering as a result, and these victims would include those required to carry out torture. Further, the use of torture makes it impossible to use any evidence collected in a criminal trial and the US has already begun to see key suspects being acquitted as a result. These arguments lead me to believe that torture is unjustifiable, even in extreme cases. However, because the immediate choice is so difficult and because the person making it is possesses human emotions and instincts, I would not absolutely condemn the decision to torture provided it was made in an emergency situation and with the correct intention. To make prior judgment that torture is justified in some circumstances is dangerous and wrong torture must be prosecuted as a crime wherever it occurs. However, it is also important to recognize the mitigating circumstances when it occurs.

Saturday, July 20, 2019

The Long Road To Manhood :: essays papers

The Long Road To Manhood While most people might think that becoming a man is much easier than becoming a woman, this is not true of all cultures around the world. According to Gilmore, becoming a man is problematic (1990). Accordingly, in some cultures, such as the Sambia of New Guinea and the Samburu tribe in Africa, becoming a man constitutes a tremendous amount of rituals. In other cultures, such as the Mundurucu tribe of Brazil, becoming a man, while a lot more complicated than becoming a woman, is not as ritualistic as the Sambia and the Samburu. In most of the societies discussed in class, the road to manhood involves such rituals as circumcision, blood letting, and living in seclusion for a period of several years. The Samburu tribe of Africa force their boys to engage in several rituals, on their voyage to becoming men. â€Å"Samburu males must pass through a complicated series of age-sets and age-grades by which their growing maturity and responsibility as men in the light of these tribal values are publicly acknowledged† (Gilmore, 133:1990). The first initiation into manhood is the circumcision ceremony, which is preformed at the age of fourteen to fifteen. The young boys of the Samburu tribe are taken away from their mothers after the circumcision ceremony, and sent out onto their voyage to manhood. There are a series of different ceremonies that the boys must engage in before they are allowed to move onto the next level of their voyage. Their voyage ends after about twelve years, in which the boys have proved themselves as men, by successfully completing all the different tasks asked of them, they are allowed to take on wives and start their own families. However, the tests of manhood are not limited to the rituals in which the young boys engage in. Even after completing the rituals, a man must always prove his manhood to the others in the tribe. The Sambia, which are similar to the Samburu tribe in their manhood rituals, engage in a majority of the same acts in regards to the transforming young boys into men. However, while circumcision is a major role for the initiation into manhood, the Sambia believe that in order for a boy to start maturing as a male, he must swallow semen. The Sambia â€Å"are firmly convinced that manhood is an artificially induced stat that must be forcibly foisted onto hesitant young boys by ritual means† (Gilmore, 147: 1990).

Friday, July 19, 2019

Extacy the Drug Essay examples -- essays research papers

In the past 20 years, chemically made drugs have been increasing in popularity among drug users all around the world. Although "old" drugs like marijuana and cocaine are still used among addicts, chemically prepared drugs like Extacy and Angel Dust are becoming more common and desired by drugs users today. It is also true that these drugs contain a much larger percentage of life threatening substances. Although Extacy is a dangerous drug, it has been excessively rumored by the media to be the "Killer Drug from Hell". This is unfair though, because the statistics show that deaths due to Extacy are rare and can usually be prevented by the user. Over the past years, it has adapted many other names including E, XTC, X, Ecstasy, MDMA, MDA, Dove, Love, and Adam. (1) Extacy is 3,4 methylenedioxymethylamphetamine, (MDMA). It was invented in 1912 to help in medical science, but was used very rarely. In the 1970?s, it was also said to have been introduced as helping in psychotherapy. It was first used as a street and illicit drug in the mid 1980?s. MDMA is a part of the phenethylamines family of drugs. It is very similar to another drug in this family known as MDA (3,4 methylenedioxyamphetamine). MDA is basically a heavier form of MDMA, where the effects of the drug can last longer, and the symptoms can get more severe. MDMA is also close to MDEA (3,4 methylenedioxyethylamphetamine) which is basically a lighter form of MDMA, where the effects last less and the symptoms are less powerful. It is proven to be extremely dangerous to those suffering from asthma, epilepsy, diabetes, hypertension, glaucoma and pregnant women. (1,3) Extacy is a powerful mood changer, which lets the user act the way he/she wants without having to... ...om the dancing is recommended for the heart to give itself a break. For the body to recover from Extacy, lots of Vitamin C and Calcium are needed. Also, sleeping and eating is another way of recovery, since a lot of energy is lost from the dancing and being hyper while at the peak. (1,3,4,7) Extacy has been one of the drugs most desired by the public in the past decade. It is known to carry a risk factor along with it, but this factor seems to have become exaggerated by the media to certain levels. Although it is no "Killer Drug", Extacy has caused some deaths. Most of these deaths could have been prevented if the users had been careful. After saying all this, I must state again that Extacy is among the Class A group of drugs. This group contains the most dangerous drugs, and that is why all people are recommended to stay far away from this drug as possible.

Free Catcher in the Rye Essays: Role of Allie :: Catcher Rye Essays

The Role of Allie in Catcher in the Rye  Ã‚  Ã‚  Ã‚  Ã‚      Some authors create characters that appear briefly or not at all, but are a significant presence.   Even though he was dead, Allie affected the action, theme and development of Holden.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The death of Holden's younger brother Allie played an important role in Holden's actions.   Holden could not deal with his death and showed it by causing physical harm to himself.   He did this to escape the pain he was feeling inside.   Holden said that Allie was "terrifically intelligent" and the "nicest" person.   Because Allie died so young, Holden felt that his innocence was taken away from him. This led to many of Holden's actions.   Such as, Holden acted out and pretended to be people so that you could deal with the pain he felt inside.   It caused Holden to condone something that he was strongly opposed to as a mere escape from the present.   This is a direct result of the strife Allie’s death left on Holden.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The theme of   Catcher in the Rye was greatly influenced by Allie. Because of his early death, Holden felt his innocence had been stolen.   In reaction to this Holden felt it was his responsibility to protect the innocence of all children.   As a result he developed a job that he would like to have-- "a catcher in the rye."   He would stand at the edge of a cliff and catch the kids who were about to fall off.   This meant that if someone was about to lose their innocence, Holden would save them.   If it weren’t for Allie, Holden would not feel obligated to act as a proctector of innocence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Throughout the novel, Holden repeatedly asked Allie not to let him disappear. Holden felt like he was becoming invisible to the work around him.   He had great respect for Allie and knew that if anyone could save him, Allie could. During one incident, Holden calls for Allie.   This marks his breakdown.   It is then, because of Allie, that he realizes that it is inevitable that he will grow up. Holden is put in a psychiatric hospital.

Wednesday, July 17, 2019

The History of Computer Technology

solitary(prenominal) once in a living pass on a recent earth come closely to touch each aspect of our lives. much(prenominal)(prenominal) devices changed the itinerary we manage, work, and live. A mold that has d champion wholly this and to a prominenter extent than(prenominal) promptly exists in nearly either business in the united States. This implausible intention is the information swear outing arrangement. The electronic ready reck whizzr has been rough for e realwhere a half-century, only its origins eat up been around for 2000 old age. However, just in the finish 40 geezerhood has the information processor changed Ameri notify management to its greatest extent.From the low woody abacus to the freshst fast microprocessor, the reck atomic number 53r has changed nearly e truly spect of management, and our lives for the better. The rattling early existence of the innovative twenty-four hours ready reckoners ancestor is the abacus. The se visualize dressing to almost 2000 familys ago (Dolotta, 1985). It is simply a wooden rack retentivity par each(prenominal)el wires on which beads argon strung. When these beads atomic number 18 moved along the wire gibe to scheduling rules that the user must memorize. accomplishedly ordinary arithmetic operations can be perform on the abacus.This was one of the origin management tools use. The next innovation in ready reckoners took place in 1694 when Blaise Pascal invented the counterbalance digital calculating automobile. It could only rack up arrives and they had to be entered by bit dials. It was designed to help Pascals father, who was a revenue enhancement collector, manage the t confesss taxes (Beer, 1966). In the early 1800s, a mathematics professor named Charles Babbage designed an self-moving calculation implement (Dolotta, 1985). It was steam moguled and could store up to one C0 50-digit verse.Built in to his gondola were operations that inclu de e realthing a unexampled general-purpose calculator would need. It was course of studymed by and stored info on tease with holes punched in them, kick the buckettingly c all in alled punch beaks. This machine was xtremely useful to managers that delt with plumping volumes of good. With Babbages machine, managers could much than easily drive the cosmic numbers accumu youthfuld by inventories. The only problem was that there was only one of these machines built, thusly making it operose for all managers to use (Beer, After Babbage, nation began to lose interest in reckoners.However, betwixt 1850 and 1900 there were great advances in mathematics and physics that began to re agreeablele the interest. Many of these novel advances involved difficult calculations and formulas that were truly(prenominal) fourth dimension consuming for gentle calculation. The scratch line study use for a deliberation machine in the U. S. was during the 1890 census. Two men, Her man Hollerith and James Powers, au sotic a revolutionary punched- beak system that could automatically get check into of information on cards without homophile (Dolotta, 1985).Since the universe of discourse of the U. S. as increasing so dissolute, the data processor was an essential tool for managers in tabulating the These expediencys were noted by commercial industries and currently led to the development of reformd punch-card business-machine systems by International Business Machines, Remington-Rand, Burroughs, and another(prenominal) corporations (Chposky, 1988). By neoe standards the unched-card machines were slow, typically processing from 50 to 250 cards per minute, with each card holding up to 80 digits. At the succession, however, punched cards were an wondrous step forward they provided a pith of input, payoff, and memory board storage on a massive scale.For more than 50 yrs following their eldest use, punched-card machines did the hoi polloi of the worlds business computing By the late 1930s punched-card machine techniques had become so well established and reliable that Howard Hatha commission Aiken, in collaboration with addresss at IBM, chthonictook construction of a large automatic digital calculator ased on standard IBM electro mechanic part (Chposky, 1988). Aikens machine, called the Harvard Mark I, handled 23-digit numbers and could perform all four arithmetic operations (Dolotta, 1985).Also, it had special(a) built-in programs to handled logarithms and trigonometric functions. The Mark I was controlled from prepunched paper tape. Output was by card punch and electric typewriter. It was slow, requiring 3 to 5 seconds for a multiplication, provided it was fully automatic and could complete long computations The outbreak of solid ground War II bring ind a dread(a) need for computing capability, especially for the military (Dolotta, 985). New weapons systems were produced which needed trajectory tables and other essential data. In 1942, behind P. Eckert, crapper W.Mauchley, and their associates at the University of Pennsylvania decided to physique a high-speed electronic computing machine to do the job. This machine became known as ENIAC, for Electrical Numerical Integrator And information processing system (Chposky, 1988). It could multiply two numbers at the rate of 300 products per second, by finding the value of each product from a multiplication table stored in its memory. ENIAC was thus more or less 1,000 clips faster than the foregoing generation of figurers. ENIAC apply 18,000 standard inanity tubes, occupied 1800 squargon feet of floor space, and employ about 180,000 watts of electricity.It use punched-card input and output. The ENIAC was very difficult to program because one had to fundamentally re-wire it to perform whatever task he wanted the information processing system to do. It was efficient in handling the particular programs for which it had been designed. ENIAC is generally current as the archetypal successful high-speed electronic digital computer and was employ in some applications from 1946 to 1955. However, the ENIAC was not social to managers of businesses Mathematician John Von Neumann was very implicated in the ENIAC.In 1945 he chthoniantook a theoretical study of computation that present that a computer could fool a very simple and withal be able to execute any kind of computation matterively by means of proper programmed control without the need for any changes in hardwargon. Von Neumann came up with unimagined ideas for methods of building and organizing practical, fast computers. These ideas, which came to be referred to as the stored-program technique, became fundamental for future generations of high-speed digital computers and were universally adoptedThe counterbalance roll up of modern programmed electronic computers to prevail advantage of these improvements appeared in 1947. This group included computer s using random plan of attack memory, RAM, which is a memory designed to give almost unremitting access to any particular division of information (Dolotta, 1985). These machines had punched-card or punched-tape input and output devices and RAMs of 1000-word capacity. Physically, they were much more compact than ENIAC both(prenominal) were about the coat of a shocking piano and required 2500 small electron tubes. This was quite an improvement over the previous machines.The number 1-generation stored-program computers required considerable importanttenance, usually come through 70% to 80% reliable operation, and were utilise for 8 to 12 years (Hazewindus,1988). Typically, they were programmed straightaway in machine language, although by the mid-mid-fifties communicate had been do in several(prenominal) aspects of march on programming. This group of machines included EDVAC and UNIVAC, the first commercially available computers. With this designing, managers had even m ore power to perform calculations for much(prenominal)(prenominal)(prenominal) things as statistical demographic data (Beer, 1966).Before this time, it was very rare for a anager of a large business to defy the means to process The UNIVAC was positive by John W. Mauchley and John Eckert, younger in the 1950s. Together they had formed the Mauchley-Eckert information processing system Corporation, Americas first computer keep confederacy in the 1940s. During the development of the UNIVAC, they began to run diddle on funds and change their company to the larger Remington-Rand Corporation. Eventually they built a working UNIVAC computer.It was delivered to the U. S. Census Bureau in 1951 where it was apply to help tabulate the U. S. population Early in the 1950s two important engineering discoveries hanged the electronic computer champaign. The first computers were made with vacuum tubes, simply by the late 1950s computers were macrocosm made out of transistors, which wer e little, less high-ticket(prenominal), more reliable, and more efficient (Dolotta, 1985). In 1959, Robert Noyce, a physicist at the Fairchild semiconductor Corporation, invented the co-ordinated duty tour, a tiny chip of silicon that contained an unblemished electronic term of enlistment.Gone was the bulky, unreliable, but fast machine now computers began to become more compact, more reliable and ready more capacity. These new technical discoveries rapidly free-base their way into new odels of digital computers. reposition storage capacities increased 800% in commercially available machines by the early mid-sixties and speeds increased by an equally large margin (Jacobs, 1975). These machines were very expensive to acquire or to rent and were especially expensive to operate because of the cost of hiring programmers to perform the complex operations the computers ran.Such computers were typically run aground in large computer centers operated by industry, government, an d private laboratories staffed with legion(predicate) programmers and support personnel. By 1956, 76 of IBMs large computer mainframes were in se, compared with only 46 UNIVACs (Chposky, 1988). In the mid-sixties efforts to design and develop the fastest executable computers with the greatest capacity reached a play point with the completion of the LARC machine for Livermore radiation therapy Laboratories by the Sperry-Rand Corporation, and the extend computer by IBM. The LARC had a core memory of 98,000 voice communication and multiplied in 10 microseconds.Stretch was provided with several ranks of memory having slower access for the ranks of greater capacity, the fastest access time being less than 1 microseconds and the tally capacity in the vicinity of 100 During this time the major computer manufacturers began to call a range of computer capabilities, as well as various computer-related equipment (Jacobs, 1975). These included input means such as consoles and card feed ers output means such as page printers, cathode-ray-tube displays, and graphing devices and optional magnetic-tape and magnetic-disk filing cabinet storage.These found total use in management for such applications as accounting, payroll, scroll control, ordering supplies, and billing. Central processing units for such purposes did not need to be very fast arithmetically and were primarily employ to access arge amounts of records on file. The greatest number of computer systems were delivered for the larger applications, such as in hospitals for keeping track of enduring records, medications, and treatments given.They were also used in change library systems and in database systems such as the Chemical Abstracts system, where computer records now on file cover nearly all known chemical compounds The fashion during the seventies was, to most extent, away from extremely powerful, concentrate computational centers and toward a broader range of applications for less-costly compu ter systems (Jacobs, 1975). Most continuous-process manufacturing, such as fossil oil refining and electrical-power distribution systems, began using computers of relatively modest capability for controlling and adjust their activities.In the 1960s the programming of applications problems was an rampart to the self-sufficiency of moderate- surfaced on-site computer installations, but great advances in applications programming languages aloof Applications languages became available for controlling a great range of manufacturing processes, for computer operation of machine tools, and for many other tasks. In 1971 Marcian E. Hoff, Jr. , an engineer at the Intel Corporation, invented the microprocessor and another breaker point in the development of the computer began (Chposky, 1988).A new revolution in computer hardware was now well under way, involving miniaturization of computer-logic circuitry and of component manufacture by what are called large-scale In the 1950s it was real ized that scaling down the size of electronic digital computer circuits and part would increase speed and efficiency and improve performance (Jacobs, 1975). However, at that time the manufacturing methods were not good ample to accomplish such a task. About 1960, photoprinting of conductive circuit boards to eliminate wiring became highly real. and so it became possible to build resistors and capacitors into the circuitry by photographic means. In the mid-seventies entire assemblies, such as adders, shifting registers, and counters, became available on tiny chips of silicon. In the 1980s very large scale integration, VLSI, in which hundreds of thousands of transistors are placed on a maven chip, became increasingly common Many companies, some new to the computer field, introduced in the mid-seventies programmable minicomputers upplied with software program packages (Jacobs, 1975).The size-reduction trend continued with the entering of privateized computers, which are progr ammable machines small affluent and inexpensive enough to be purchased and used by individuals (Beer, 1966). 1 of the first of such machines was introduced in January 1975. Popular electronics magazine provided plans that would support any electronics wizard to build his own small, programmable computer for about $380. The computer was called the Altair 8800. Its programming involved pushing buttons and flipping switches on the confront of the box.It didnt include a onitor or keyboard, and its applications were very limited. Even though, many orders came in for it and several famous owners of computer and software manufacturing companies got their pass in computing through the Altair (Jacobs, 1975). For archetype, Steve Jobs and Steve Wozniak, founders of orchard apple tree data processor, built a much cheaper, yet more productive version of the Altair and moody their hobby into a business. After the base of the Altair 8800, the in-person computer industry became a fierce battleground of competition.IBM had been the computer industry standard for well over a half-century. They held their position as the standard when they introduced their first personal computer, the IBM Model 60 in 1975 (Chposky, 1988). However, the newly formed Apple Computer company was releasing its own personal computer, the Apple II. The Apple I was the first computer designed by Jobs and Wozniak in Wozniaks garage, which was not produced on a wide scale. Software was needed to run the computers as well.Microsoft developed a Disk in operation(p) System, MS-DOS, for the IBM computer fleck Apple developed its own software (Chposky, 1988). Because Microsoft had now adjust the software standard for IBMs, every software anufacturer had to make their software compatible with Microsofts. This would pop off to huge profits for Microsoft. The main goal of the computer manufacturers was to make the computer as affordable as possible while increasing speed, reliability, and capacity. Nearly every computer manufacturer accomplished this and computers popped up everywhere.Computers were in businesses keeping track of even more inventories for managers. Computers were in colleges aiding students in interrogation. Computers were in laboratories making complex calculations at high speeds for scientists and physicists. The computer had made its mark everywhere in management and built up a huge industry The future is assure for the computer industry and its applied science. The speed of processors is anticipate to double every year and a half in the coming years (Jacobs, 1975).As manufacturing techniques are further perfect the prices of computer systems are expected to steady degenerate. However, since the microprocessor technology will be increasing, its higher(prenominal) costs will offset the do in in price of older processors. In other words, the price of a new computer will stay about the same(p) from year to year, but technology will steadily Since the en d of human being War II, the computer industry has with child(p) from a standing start into one of the adultgest and most profitable industries in the United States (Hazewindus,1988).It now comprises thousands of companies, making everything from multi-million dollar high-speed supercomputers to printout paper and floppy disks. It employs millions of people and generates tens of billions of dollars in sales each year. Surely, the computer has wedge every aspect of peoples lives (Jacobs, 1975). It has affected the way people work and play. It has made everyones brio easier by doing difficult work for people.The recital of Computer TechnologyThis report short explains the history of modern computers, starting from the year 1936 to present day time. There are many models of computers documented throughout the years, but they only computer models mentioned are ones that I deemed too have had the greatest effect on computer technology back then and now. This report will examine h ow in just forty years, computers have transformed from slow, room-sized machines, to the small and fast computers of forthwith. Computers are a part of important effortless life, but there was a time when computers did not exist.Computers are one of the few excogitations that do not have one specific inventor. Many inventors have contributed to the take and technology of computers. Some of the inventions have been distinguishable types of computers, while the others were parts needed for the computer to function effectively. Many people have added their creations to the list required to make computers work, adding to the general technology of computers like a shot. The term computer sooner referred to people. It was a job title for those who did clamant work with math problems.A computer is define as a programmable machine that receives input, stores and automatically manipulates data, and provides output in a useful format. The most significant date in the history of comp uters is in the year of 1936. This is the year the first computer was developed by a German engineer named Konrad Zuse. He called it the Z1 Computer and it was the first system to be fully programmable. The Z1 Computer had computing power, setting it apart from other electronic devices. Programming early computers became somewhat of a hassle for inventors and in 1953 Grace Hooper invented the first high level computer language.Her invention helped simplify the binary code used by the computer so that its users could arrange the computers actions. Hoopers invention was called Flowmatic and has evolved into modern day technology. In the same year, the International Business Machines (IBM) was introduced into the computing industry, invariably altering the age of computers. Throughout computer history, this company has played a major role in the development of new systems and servers for ordinary and private use. Inventors sawing machine IBM as competition inside the computing hist ory, which helped to acantha faster and better development of computers.Their first computer technology contribution was the IBM 701 EDPM Computer. During the trinity years of production, IBM change 19 machines to research laboratories, aircraft companies, and the federal government. The first computer physically built in America was the IAS computer. It was developed for Advanced Study at Princeton under the direction of John Von Neumann between1946-1950. (History of Computer Technology, 2011). John von Neumann wrote First draft of a Report on the EDVAC in which he outlined the architecture of a stored-program computer (Computer History Museum Timeline of Computer History, 2006).electronic storage of programming information and data eliminated the need for the more clumsy methods of programming. An example of stored-program data computer is the IAS computer. Many modern computers trace their ancestry to the IAS machine and they are referred to as von Neumann (or Princeton) arc hitecture machines. The IAS computer embodied the concept of a stored-program computer. The main memory contained two main categories of information, book of instructions and data. The computer had an ability to place divers(prenominal) sequences of instructions in the memory which made the computer very useful.This allowed inventions to build computers to complete antithetic tasks at different clock. Such a computer can be reconfigured (reprogrammed) at any time to perform a new or different task. The Hungarian-born von Neumann demonstrated prodigious expertness in hydrodynamics, ballistics, meteorology, game theory, statistics, and the use of mechanical devices for computation contributed to the production of the modern day computer (Computer History Museum Timeline of Computer History, 2006).In 1955, Bank of America coupled with Stanford question Institute and General Electric saw the creation of the first computers for use in banks. Researchers at the Stanford Research Ins titute invented ERMA, the Electronic Recording Method of Accounting computer processing system. ERMA updated and posted checking accounts and manually touch checks and account management. The MICR (Magnetic Ink Character Recognition) was a part of ERMA and allowed computers to read special numbers at the bottom of the checks.This technology helped with the trailing and accounting of checks transactions. ERMA was officially demonstrated to the public in September 1955 and first tested on real banking accounts in the fall of 1956. (Blain, 2005). Today, computer technology has transformed the banking industry. One of the most important breakthroughs in computer history occurred in 1958. This was the creation of the integrated circuit, known as the chip. The integrated circuit device is one of the base requirements for the modern computer systems.On every motherboard and card inside the computer system, are many chips that contain vital information on what the boards and cards do. With out the integrated circuit, the computers known today would not be able to function. The first commercially integrated circuits became available from the Fairchild Semiconductor Corporation in 1961. All computers then started to be made using chips sort of of the individual transistors and their accompanying parts. Texas Instruments first used the chips in Air Force computers and the Minuteman rocket in 1962.They later used the chips to produce the first electronic portable calculators. The pilot integrated chip had only one transistor, three resistors and one capacitor and was the size of an adults pinkie finger. Today, an integrated chip is smaller than a penny and can hold 125 million transistors (Bellis). The late 1970s saw the popularization of personal computers and the draw close continues from then until now. An explosion of personal computers occurred in the 1970s. The Tandy Corporation was one of the leading companies in computer technology.Their most popular invention was the TRS-80 arriving on the market in the late 1970s. It was contiguously popular, selling out at Radio Shack where it was exclusively sold. The TRS-80 was sold for only $600, making it affordable for many individuals to own their own personal computer. at bottom its first year, over 55,000 consumers bought Tandy TRO-80 to use in their al-Qaeda or blank space and over 250,000 of them sold in the next few years. Tandy Corporations TRS-80 had a keyboard and motherboard all in one. This is a common trend that other companies today use for their personal computer products.TRS-80 also included office applications, including a word processor, calculator, and early spreadsheet capabilities (The pot History Computers From the 1970s). People during the late 70s embraced personal computers and used them for a variety of reasons, such as, games, office applications, home finances, storing date, and many other necessary usages. In 1975, Apple Computers was founded by Steve Jobs and St eve Wozniac. The Apple II was launched in 1977 and was an immediate success as well. Apple created the home/personal computer that could be used by anybody.The success of the Apple II established Apple Computers as a main competitor in the field of personal computers. Then Dan Bricklin created a spreadsheet program called VisiCalc for the Apple II. It went on sale in 1979 and within four years it sold 700,000 copies at $250 a time (Trueman, 2000). By 1980, there were one million personal computers in the world. Computers have come an enormous way since their initial establishment, as the earliest electronic computers were so large that they would take up the entire area of a room, while today some are so small that they can fit in your hands.While computers are now an important part of the everyday lives of human beings, there was a time where computers did not exist. Knowing the history of computers and how much forward motion has been made can help individuals conceive just how complicated and innovative the creation of computers really is. The first programmable digital computers invented in the 1940s have dramatically changed in appearance and technology from today. They were as big as living rooms and were about as powerful as modern day calculators. Modern computers are billions of times more capable than early machines and sop up less space.Simple computers, such as smart phones, are small enough to fit into mobile devices, and can be powered on by a small battery. In todays world, computers play an incredibly large role in the way the world exists in general, and the majority of tasks could in truth not be sinless if not for the use of computers. Although there are for sure some areas and jobs that cannot yet be completed solely by computers and which thus clam up require actual manpower, for the most part, computers have helped to make life significantly easier, productive, and more convenient for us all.Future computer technology will help e xploit many medical problems by reinterpreting sensory(a) data and modulating brain activity. Technology will be so advanced that it may allow people who have muzzy the use of their limbs to use robotics to regain their handicapped movements. The future of computer technology is very bright and welcomed indeed. Current trends, research, and development accident at a lightning speed supports this statement. Our children today will see a strong new world of technology with computers within the next decade.Works Citedhttp//inventors.about.com/od/istartinventions/a/intergrated_circuit.htmhttp//www.computerhistory.org/timeline/?category=cmptrhttp//www.thepeoplehistory.com/70scomputers.htmlhttp//www.historylearningsite.co.uk/personal_computer.htm