Thursday, September 3, 2020

International Competitiveness and Innovation †MyAssignmenthelp.com

Question: Examine about the International Competitiveness and Innovation. Answer: Presentation: Innovation headway holds incredible significance with regards to the development of the economy, as it enables an economy to expand paying little heed to the likelihood that the parts of creation, for instance, work and capital remain at a comparable level. Beyond question, creative development is seen as critical to keep up and revive fiscal turn of events, as the extension in the components of age is likely going to end sooner or later. For making countries, ingestion and retention of outside development, worldwide innovation trade, is a basic procedure for achieving mechanical development, in light of the fact that their ability in working up their own advancement is compelled. Overall innovation trade takes various modes including obtaining advancement from outside countries in various structures, including approving, acquiring dispersed materials, inviting remote experts, Foreign Direct Investment (FDI), and others. Among these techniques for worldwide innovation trade, FDI has transformed into an important strategy for overall advancement move in the later decades. A couple of reasons may be found for such upgrades. One is the quick improvement of FDI on the planet, which has been caused in light of the headway in FDI courses of action and the significant lessening in the costs of overall correspondence. These two factors added to the snappy development of FDI as they diminished the costs of undertaking FDI. Another explanation that FDI has transformed into an imperative technique for overall innovation trade needs to do with the procedure of worldwide endeavors (MNCs). Seeing the noteworthiness of keeping development inside MNCs to keep up their forcefu lness, MNCs have been genuinely reluctant in pitching their advances to various associations through authorizing (Shujiro et al., 2006). Intra Firm Technology Transfer: Two kinds of innovation trade, including MNCs can be recognized. One is an innovation trade from parent firms of MNCs to their abroad auxiliaries, and the other is move of innovation from abroad partners of MNCs to nearby firms. The past sort of innovation trade is portrayed as intra-firm innovation trade, the last as advancement overflow . Intra-firm innovation trade needs to occur before development flood is made sense of. Intra-firm innovation trade is finished by various methods, including work understanding (at work getting ready), and planning undertakings to neighborhood agents. Advancement flood may be recognized in different structures. Advancement may be traded from outside firms to close by firms, when provincial workers who have acquired gaining from working at remote firms move to neighborhood firms or start another business. Neighborhood firms may get advancement from outside firms by learning age and organization development or expertise from their business commitment with remote firms through securing of parts and sections or offers of things, and by emulating creation systems and organization know-how claimed by the remote association (Ito Krueger, 2000). Writing Review: A couple of examinations have broke down the instances of intra-firm innovation trade from parent firms to their abroad accomplices. An enormous part of these assessments reviewed the advantages or the costs depleted for intra-firm innovation trade by utilizing information procured from relevant examinations. A creator inspected 119 occasions of innovation trade by British associations in India. He found that British associations devour more resources for innovation trade, through giving such physical resources as plans and sections, and what's more, sending staff, to their joint undertakings with Indian firms than close by Indian firms. Considering the information about the advantage costs identified with twenty-six innovation trade adventures endeavored by U.S. firms in synthetics and oil refining and device, another specialist found that the costs of innovation trade were higher when development recipients were joint undertakings than when they were totally guarant eed remote reinforcements. He also found that the costs were higher when advancement suppliers were less knowledgeable about innovation trade and when recipients were less knowledgeable about amassing. Inspecting the data gathered into fourteen undertakings, he found that MNCs spent more resources, through sending fashioners and getting ready close by laborers in the MNCs' countries of beginning, for innovation trade, including totally had reinforcements than because of joint undertakings, while they spent negligible resources by virtue of innovation trade to self-ruling firms (Petronia et al., 2015). In addition, RD by licensees was found to reduce the proportion of advantages spent for innovation trade, showing that high mechanical limit of the development recipient energizes innovation trade. One of the specialists grasped a relative method to manage consider the costs of innovation trade by Japanese firms. Using information on resources expended for intra-firm innovation trade f or 104 firms, he performed quantifiable assessments to see the determinants of the costs and the lengths of the time required for trading advancement. Like the disclosures of various assessments, he found that the more vital the help given by the parent firm, the more assets are spent for innovation trade. Past association in innovation trade was found to cut down the costs of innovation trade. The degree of development to be traded was found to impact the costs of innovation trade, in that trading high advancement will in general cost more (Wahab et al., 2012). Determinants of Intra-Firm Technology: The elements affecting the intra-firm innovation move model incorporates mechanical, legitimate and money related parts essential for the successful execution of the strategy. Various creators have showed up through their observational examination, the ramifications of the wants of additions. Another fiscal factor that impacts innovation trade decisions is the accessibility of budgetary resources. These are essential for acclimating to the specific and definitive changes that come about due to getting new development (Fazal Wahab, 2014). The theories required for modifying development to the necessities of individual units are commonly less in the intra-firm than in the between firm methodology in light of the fact that the internal spread of new advancement can be performed to the benefit of economies of scale and without radical changes to the strategy of age and the allotment of things. A further factor with direct effect on the intra-firm trade process is the time slack between the creation of a development and its multiplication through trade to helpers or to free firms. In any case, the time slack factor can be consolidated inside the inventive weakness factor, given that the movement of time manufactures learning of the advancement, thusly reducing defenselessness about it (Arenas, 2016). Another approach to manage research the innovation trade's segments has revolved around the characteristics of the development being traded and the various leveled structure of the firm appointed to get it. A couple of makers explicitly have highlighted the particular and progressive traits of these determinants, while others have concentrated on the essentialness of social points, for instance, participation and the correspondence between accessories in the trade system. Among the specific properties, down to earth homogeneity is exhibited as a factor in propelling innovation trade. The advancement to be traded can be gotten for hypothetically and in a general sense relative purposes to those recognized in the associations and the mechanical portion of source. One instance of this is the trade to the clinical fragment on development used by astrophysicists for researching space that offers a comparable explanation behind recognizing ponders, which, as in space examination, are not e vident using traditional optical procedures (Reddy Zhao, 1990). The degree of data about the lead and execution of the development being traded can be assembled among the particular determinants. This learning is commonly the delayed consequence of a good preliminary and comprise the skill that may be controlled by the organization's directors or the trading relationship on an individual reason and in a non-created way, or it may be formalized. The best degree of formalization stays a 'vexed request': formalization addresses a fundamental part in making trade ground-breaking, yet meanwhile makes it less difficult to take. Under explicit conditions, the internal trade process makes a strong lift to formalize the development (khabiri et al., 2012). Intra-Firm Technology Transfer in Japanese MNCs: Malaysia, as a rapidly creating economy is acknowledged to be considerably progressively drawn in with trade of development, especially regarding the modification of new rising headways. In late recognitions it is seen that the issue, remembering an imaginative move for Malaysia has been extremely popular in basically every mechanical social affair happening locally by both open and private accomplices. A specialist certified that, as Malaysia realizes that time and expenses doesn't allow it the opportunity to make and convey all of the advances required; thusly, Malaysia has decided to acquire development which is sensible and by and large speedier contraptions of animating the utilization of science and advancement. To the extent Asian making countries like Malaysia, China, Myanmar, Sri Lanka, Thailand, Ghana, etc, who are experiencing snappy progression International Technology Transfer continues playing as a key force for financial deve

Saturday, August 22, 2020

The Reconstruction Era in the US (1865 to 1877)

The Reconstruction Era in the US (1865 to 1877) Will the period be assessed as both a triumph and a disappointment? The Reconstruction Era happened from around 1868 to 1877. Going before the Civil War, the Souths business and framework was for all intents and purposes left in ruins. It was in incredible need of help, and needed to depend on the legislature that they had attempted to wander away from. The Reconstruction can be assessed as both a triumph and a disappointment of goals essentially due to the bills and laws that were passed, just as the disappointments and step backs that were experienced. The reclamation of each of the 11 ex-Confederate states to the Union, the Radical Republicans, and the Reconstruction Acts that were passed are generally instances of achievements made during the time. The Black Codes, the confidence in racial domination, and the debasement in business and in government are among the numerous disappointments of the Reconstruction. In general, the period was a period of debasement, eagerness, and segregation. In the first place, perhaps the best achievement of the Reconstruction was the rebuilding of every one of the 11 ex-Confederate states to the Union. This was cultivated during the Lincoln and Johnson organizations. By 1868, they were effective in the readmission of South Carolina, Florida, Alabama, Louisiana, Arkansas, North Carolina, and Tennessee into the Union; and by 1877 the readmission of Mississippi, Georgia, Texas, and Virginia (Doc H). Another achievement would be the making of another organization called the Freedmens Bureau. The Freedmens Bureau offered safe house, food, and clinical thoughtfulness regarding anyone needing it after the war. Many reprimanded the organization and blamed it for keep[ing] the negro in inertness at the costs of the white man (Doc D). Under General Oliver Howard, it was fruitful in the foundation of around 3,000 schools for liberated blacks, which incorporated a few dark universities. Before long, the Fourteenth and Fifteenth Amendments were pas sed. The Fourteenth Amendment expressed that the main area disallows the states from condensing the benefits and resistances of residents of the United States, or unlawfully denying them of life, freedom, or property, or denying to any individual inside their locale the equivalent insurance of the laws (Doc C). Thaddeus Stevens, a Radical Republican, announced that the change permits Congress to address the out of line enactment of the States, so far that the law worked upon one man will work similarly upon all (Doc C). The supporters of the rights for liberated blacks were called Radical Republicans. Among this gathering was a man named Benjamin Wade who supported the privileges of ladies, northern blacks, and worker's organizations. African Americans were changing in accordance with their new opportunity and spreading out to do new things. Many joined Negro Baptist and African American Episcopal places of worship, and some moved from the South to frame new networks. A well known s pot they went was Kansas (Doc F). They likewise made universities, similar to Howard and Fisk, which prepared dark priests and instructors. Simultaneously, numerous things were turning out badly in the nation. Sharecropping turned out to be exceptionally well known among liberated African Americans attempting to satisfy their fantasies about claiming their own ranch and accommodating their families. Tragically, the degenerate style where these homesteads were run kept them in a ceaseless pattern of obligation. It was just about another type of subjugation. In the interim, Republican government officials in the South were starting to exploit the payoffs they got and accepted hush money. This represented a decrease in people groups ethics. Dark Codes were another disappointment of the Reconstruction. They were made to limit the privileges of liberated blacks. One code expressed, Every worker will not be permitted to leave his work environment until the satisfaction of his agreement (Doc B). They limited each privilege and development of the liberated blacks and exposed them to considerably more segregation. Especially dege nerate was racial domination that was developing in the South. Numerous men sorted out gatherings of mystery social orders to threaten the liberated African Americans and white reformers. One gathering specifically, the Ku Klux Klan (KKK), were particularly renowned for their consuming of blacks structures and the homicide of numerous freedmen to shield them from casting a ballot. All the while, there was the defilement in business and government that was diverting the North from the issues in the South. Spoilsmen, for example, Conklin and Blaine, were government officials who unreasonably showed support on their supporters. The Credit Mobilier outrage was brought to the consideration of the legislature. They had been offering stock to individuals from Congress with the goal that they wouldnt examine the benefit they were making from government financing for the cross-country railroad they were building. Another outrage included Jay Gould and James Blaine who alongside Grants brother by marriage endeavored to corner the gold market. They were found however Blaine had just pulled off his own benefits. The Whiskey Ring included bureaucratic operators planning with alcohol organizations to take a large number of assessments from the legislature. One man, William Tweed, may have benefitted the most from the cash he took from citizens. He was simply the one behind numerous designs to grab huge amounts of unite. He was effective until an illustrator from the New York Times, Thomas Nast, uncovered him and prompted his capture. In time, the new president, Rutherford B. Hayes, consented to a trade off. The Compromise of 1877 was for the most part to end the help for Republicans in the South and to fabricate a cross-country railroad. In the long run Hayes pulled back the soldiers that were ensuring the freedmen, and the Supreme Court revoked the Reconstruction laws that shielded the blacks from being oppressed. Generally, the period can be assessed as both a triumph and a disappointment of standards. It just relies upon how it is seen. They made many achieves in the rights for African Americans. They liberated them, gave training to them, and permitted them to frame dark networks. All in all, the Reconstruction was not something worth being thankful for. It was a disappointment, it could be said. Everything that had been cultivated were essentially overlooked or reclaimed with the Compromise of 1877. It was a time of defilement in business, government, and in morals. Over the long haul, the main thing that was a living achievement was the opportunity of African Americans. More advancements were yet to come.

Friday, August 21, 2020

Personality Development Origins of Ones Personality - Free Sample

Question: Talk about thePersonality Development for Origins of Ones Personality. Answer: Presentation: Numerous speculations have been proposed by different clinicians on understanding the roots of ones character. One of the profoundly legitimate speculations depends on crafted by an acclaimed nervous system specialist from Australia Sigmund Freud. He was the first to propose the analysis hypothesis. By and large, all these character speculations are called psychodynamic hypotheses. In spite of the way that there are a different number of psychodynamic speculations that exist the principle accentuation of the considerable number of hypotheses are given on the oblivious wants and intentions and the hugeness of youth occasions or encounters in creating and forming the character of an individual (Lyon, 2013). Leonardo DiCaprio is a popular American entertainer, just as, a film maker. Leonardo Dicaprio started his vocation in the mid 1990s by acting in the TV ads. From that point forward, he assumed repeating jobs in different TV arrangement and movies (Editors, 2016). He is the man who has confronted such a large number of good and bad times both in close to home and expert life. While different superstars picked their profession of acting because of their pleasure looking for conduct and consequently, overwhelmed by id, Leonardos vocation decision was because of the mastery of personality dependent on his youth occasions and encounters. Henceforth, the principle reason for this exploration report is an examination of the character of Leonardo Decaprio regarding psychodynamics and humanistic origination of character. Sigmund Freud planned the Psychodynamic hypothesis that gave an intricate portrayal of different degrees of mindfulness, which are cognizant, preconscious, just as, oblivious. This hypothesis additionally clarified that how the sentiments and considerations of an individual can affect his/her activities. As per a psychodynamic hypothesis proposed by Freud, human character comprises of three unmistakable parts, which are the id, the inner self, and the superego. The id is the wellspring of instinctual vitality, which works on the rule of self-joy. The inner self will in general permit instinctual fulfillment by managing the necessities of the id dependent on the truth standard. While the super-personality will in general direct the fulfillment of the instinctual requests according to the social show and can be called as the ethical arm in the cultural status. The id, sense of self, and the superego performed at cognizant, preconscious, and oblivious state separately. Freud likewise ex pressed that the character of the individual is shaped during his/her mid five years of the people life (Lyon, 2013). Leonardo Dicaprio who is currently a well known Hollywood on-screen character once drives an unglamorous life. His youth was spent in an unglamorous and poor world. Once in a meeting, Leonardo Dicaprio stated: I grew up poor and I got the opportunity to see the opposite side of the range. Leonardo had spent his adolescence in the ghetto zone of Los Angles where prostitution, viciousness, and wrongdoing was available on his lanes. He had seen individuals smoking rocks and shooting heroin, and his entire youth was spent taking a gander at these. He expresses that he never attempted the medication in his life, however Hollywood gatherings are the principle wellspring of allurement for sedate use. For this situation, Leonardo Dicaprios personality has overwhelmed his id. His personality opposed him to attempt drugs at the Hollywood gatherings where it is the principle wellspring of enticement. His personality was driven by the frequencies he had seen during his youth as in his meeting he said that Never done it, that is on the grounds that I saw this stuff truly consistently when I was 3 or 4 years of age. Thus, his youth encounters have made him opposition towards the allurement of the medications and his character is personality driven (Editors, 2016). Leonardos guardians got separated from when he was a baby. This hugy affected his character advancement as after his folks separate, he used to sit back in Echo park, which was a medication ruled, poor, and grimy spot. Leo during his youth was utilized to be an act up and insidious kid and was about tossed out from the instructive program of Romper Room he took at 3 years old years. Additionally, when he first acted in quite a while's TV appear and showed up just because on screen in a Romper Room show he was terminated for his troublesome nature (Editors, 2016). As Leos guardians got separated from when he was an infant, it negatively affected his butt-centric stage and prompts the improvement of butt-centric expulsive character, which prompts the advancement of Leos troublesome and got rowdy character. In spite of the fact that phenomenal and extraordinary jobs have been played by Leonardo, however it took 23 years to win an Oscar grant for his grand work. Each time Leo used to be named for the Oscar grants yet never accomplished it for quite a long time and years. Yet at the same time, Leo never permitted his inability to administer his profession. He utilized sense of self utilized guard components. Freuds resistance hypothesis expresses that to manage issues and clashes in ones life, the sense of self assumes an indispensable job in interceding a scope of different protection components. (Lyon, 2013) Leo utilized his self image as a resistance instrument to defeat the inability to win Oscar grant for a considerable length of time. Losing an Oscar was not an obstruction for Leo to keep living his exceptionally important and fruitful life. He once stated, You can either be a vain famous actor, or you can attempt to reveal some insight into various parts of the human condition. He turned into an ecological dissident and carried open attention to compassionate and natural concerns. Leos sense of self knew about a more prominent need and caused him to understand that what he really had and what he can accomplish for the earth, which helped him chopping down his failure size (Editors, 2016). The psychodynamic hypothesis dependent because of occasions and encounters of adolescence on ones character suits the character of Leonardo Decaprio. In any case, there is sure analysis connected to this methodology. The one essential analysis connected to Freuds advancement hypothesis is the over-accentuation of the hypothesis on the sexuality of a person. Also, as this hypothesis expresses that the improvement of the character of an individual is driven by the occasions and encounters he had during his adolescence, it neglected to investigate the adjustments in the character of the person during his adulthood, which can be gained by observational learning and molding during his up and coming phases of life (Bornstein, 2010). Humanistic hypothesis of character stresses that a people characteristic drive is towards his/her inventiveness and self-completion. As per Rogers Humanistic hypothesis, the one fundamental objective of a life form is self-realization. He stressed that the key pointer of a person towards arriving at self-completion is his/her encounters he/she had during their adolescence. As indicated by Roger, self-idea is one of the most crucial element of ones character, and it comprises of the considerable number of emotions, considerations, and convictions people have about them. He accepted that everybody knows about their self-ideas (Kirschenbaum, 2012).While, Kellys humanistic hypothesis is centered around the premise of Fundamental Postulate that expresses that the manner by which an individual envisions occasions or things mental channelizes the procedure of an individual (Gruber, 2012). The youth encounters of Leo spurred him to turn into an entertainer. Leos unpleasant childhood prompted the way of self-completion as it was the occasion that drove him towards his profession of decision. Leos during one of his meeting said that he once got beat up as he went to private grade school being an understudy of the state funded school. He used to have a reasoning that everybody in the private primary school lived amicably with one another. This frequency was the inspirational occasion that transpired as he told his mom after this occurrence that he needs to be an entertainer since he needs to escape the government funded school. Subsequently, the life of understudies in the tuition based school and a desire to escape the state funded educational system drove him to the way of self-realization (Editors, 2016). The humanistic methodology stresses on people duty and decision and suits to clarify the choice of Leo of turning into an entertainer. In any case, there are sure disadvantages to this methodology of character. The essential analysis looked by this methodology is that this hypothesis neglects to characterize the effect of social connection, character coherence, or nearness of abnormality. Besides, this hypothesis centers around the people ability of looking for constructive objectives, it neglects to characterize the nearness of insidiousness in the general public or aberrance inside typical characters. Subsequently, it comes up short on the experimental proof, just as, needs more falsifiability (Gruber, 2012). Character is the confounded association of practices, perceptions, and influences that gives guidance, just as, example to the people life. It includes both the structures, just as, forms, which mirrors the nature and sustain of a person. Besides, the advancement of the character incorporates the effect of past of a person that incorporates the recollections of an individual and its job towards the development of the people present and future. While Freuds character hypothesis depends on the way that an individual character is an aftereffect of youth encounters and occasions and is unchangeable (Lyon, 2013). Rogers humanistic hypothesis depends on the completing propensity of a person that empowers the individual to develop and understand their possibilities. The humanistic methodology is centered around recommending that the duty to change is an aftereffect of self-idea and self-completion propensity of a person. Despite the fact that both the hypotheses are centered around various methodologies yet both stress the job of youth encounters in the advancement of the character (Gruber, 2012). References Bornstein, R. (2010). Psychoanalytic hypothesis as a bringing together structure for 21st century character assessment.Psychoanalytic Psychology, 27(2), pp.1

Monday, June 15, 2020

Roman Empire Rise & Fall Of One Of The Strongest And Largest Empire - 1925 Words

Roman Empire: Rise & Fall Of One Of The Strongest And Largest Empire (Essay Sample) Content: Name: Course: Name: Date: The Roman Empire The idea of imperialism dominated the historical Age of Exploration as major powers sought to conquer and control other parts of the world. The Roman empire is one of the strongest and largest empire that lasted for over a thousand years since 700 BC to 476 AD. (Scullard, 2012). The Roman Empire was the longest lasting empire with a period of over 1500 years. During its reign, the empire stretched for more than 2 million square miles extending from Asia Minor to Britain and from Egypt to the Rhine River. The Rome became a republic in 509 BC and expanded immensely as a result of the Punic wars which took place between 264 BC and 146 BC (Mark, 2018). The Second Punic War was a significant turning point for the Roman republic as it gained control over the Mediterranean region (Idzikowski, 2016). The system of governance changed from republic to autocratic under Augustus Caesar, who became the first emperor. Emperor Caesar initiated a period of great peace also known as Pax Ramana that l asted for two centuries (Idzikowski, 2016). During this period, the Roman Empire existed as a commonwealth states which were under the rule of the Emperor. The Roman Empire was the most successful civilization in the history of man due the advances in military strength, engineering, and strong governance system, however, the political decay, religious fanatism and poor economic policies led to its fall. The advancement of the Roman army was one of the major factor that contributed to the incredible success and expansion of the roman empire. The army was first from to defend the empire from external threats but after the Punic Wars, the army went on to conquer lands. After defeating the Carthaginians in 146 BC, Rome gained control over the Mediterranean region and later spread east taking Greece (Ferrill, 1986). The Mediterranean had a significant influence on the development of western civilization. The Mediterranean Sea was a reliable link between Europe, Asia, and Europe. The ancient people used the shipping route to trade raw materials, agricultural products as well as religious and political ideas. By controlling the Mediterranean Sea, the Roman Empire was able to navigate and manage vast areas (Mark, Joshua, 2018). This allowed them to conquer more land and recruit people from the conquered lands in the army. The military was strong and well organized and defended the newly con quered territory from barbarian invasion and internal revolts (Ferrill, 1986). Advancement in engineering and architecture hastened the rise of the Roman empire. The mighty distinguished army was considered the foundation of the whole empire, in which roman`s talents of the organization were obvious. They were also skilled in many other sectors like law, city planning, statecraft, and art. The Roman Army built more than 53000 miles of roads by 200 AD., to facilitate quick transportation within the Empire (Ferrill, 1986). In addition to the great Roman city planners who were able to achieve extraordinary standards of hygiene in designing and implementing their dams, sewage and disposal systems. Moreover, Roman architecture is based or inspired by Greek styles, characterized by their audacious plan and luxurious implementation. The Romans were the first to invent concrete which enabled them to build structures such as bridges, sewers, public baths, aqueducts and central heating systems (Garnsey Richard, 2014). The success of the Roman Empire is also attributed to the strong system of governance and dynamic leaders. When Augustus Caesar became emperor, founded a type of government leadership referred to as a principate which incorporated the components of monarchy and republic governance (Mark, 2018). Many other emperors followed some who were industrious and dynamic and others were corrupt and hostile. The period between 96-180 CE was dedicated as the era when â€Å"Five Good Emperors" reigned in the Roman Empire (Mark, 2018). During this period, the empire expanded to its greatest size and conquered large territories towards the East. Trade spread from the east and encouraged innovation and the spread of Christianity (Garnsey Richard, 2014). The empire was successful in the transferring of powers from emperors to kings and the Republicans. Thus, the sophistication of the political apparatus in Roman Empire was high, even during wars, the empire maintained reasonable functionality in all sectors of governance (Garnsey Richard, 2014). Given this remarkable governance, it’s quite disappointing that the Roman Empire fell. The political decay created a weakness in the system of governance, wars, divisions and the eventual fall of the empire. The overexpansion made it difficult for Rome to be controlled or governed. It was difficult to keep an eye on all the administrative staff who are spread in different regions all over the empire (Idzikowski, 2016). However, the corrupted and ineffective leaders had a significant influence too. In second and third centuries, the empire was in chaos due to the civil war, in which more than 20 emperors ruled in 75 years. The civil war sparked and between 211- 285 CE and many emperors were killed by assassinations and revolts (Mark, 2018). As a result, the imperial power started to decline, and due to the vast size of the empire, it was not easy to be governed. Being an emperor was not ever comfortable and safe job, but during that period it nearly became a death sentence. Sometimes emperors were killed by their personal bodyguards, so-called "Praetorian Guard," who af ter assassination them, they install new rulers. At the meantime, corruption and incompetence were spread among Roman senate, which failed to control the situation. In order to make the empire more governable, Emperor Diocletian decided to split the empire into two. The western empire had its capital in Milan under Emperor Diocletian and the Eastern empire had its capital in Byzantium and governed by Emperor Maximia (Mark, 2018). This separation of the two empires made it more efficient and easy to be governed. However, in the long run, the two empires broke apart. The two halves didn't succeed in cooperating to face outside threats, and often argued and disagreed over resources distribution and military aid (Garnsey Richard, 2014). Eastern Empire which was majority Greek-speaking managed to develop and raised up over its Latin-speaking western empire that was tangling with an economic crisis. The Eastern Empire always sidetracked the invasion of the barbarian to the western part. Constantinople which later became the capital of the eastern empire was well protected but Rome was left almost defenseless (Ferrill, 1986). The empire of the west completely disintegrated in the late 5th century. However, the eastern empire lasted for a thousand more year and fell later in the 1400s after an invasion by the Ottoman Empire (Mark, 2018). The rise of Christianity coincided with the disintegration of the great Roman Empire. Some Scholars contended that the rise of Christianity as new religion contributed to declining the empire. In 313AD, Emperor Constantine issued the Edict of Milan which legalized Christianity and in 330 AD, Christianity was recognized as the state religion (ushistory.org, 2018). Christianity is also considered as the main cause of the erosion of traditional value system of the Romans. Roman religion was originally polytheistic, in which emperor was viewed as God, who has the ultimate power. Christianity displaced this belief, and with the new focus on one God, the state lost its glory. The new religion aimed in ending centuries of persecution, however, many people began to die due to different clashes over the interpretation of the new religion (Gibbon, 1846). Furthermore, with the spreading of the new religion, new religious men like popes and church leaders started to have increased political powe r and control over political affairs thereby further complicating governance. This theory was proposed in the 18th century by Edward Gibeon but has been criticized by other historians (Gibbon, 1846). Most historians argue that Christianity played a paled role in the collapse of the Roman Empire while compared to other factors such as military, administrative and economic factors (ushistory.org, 2018). The different internal financial crisis had a noticeable influence in disintegrating of Roman Empire. The imperial resources had been lightened due to the unstoppable wars and overspending on the military (Garnsey Richard, 2014). In addition to that, the social structure started to change, as the gap between rich and poor kept increasing because or oppressive taxation and inflation. Even many affluent men were always trying to find some ways to escape to the countryside...

Wednesday, May 6, 2020

Analysis of Little Red Riding Hood Essay - 802 Words

In his story Little Red Riding Hood, Charles Perrault introduces the concept of being wary of strangers to his young audience. The story begins with a little girl getting instructions from her mother to take some bread and butter to her ailing grandmother. Shortly after her journey to her grandmothers cottage, the little girl comes in contact with a wolf. She engages in conversation with the wolf, informing him of her destination and the whereabouts of her grandmother. The wolf, being a cunning and malicious character, quickly goes off to eat the grandmother and wait for Little Red Riding Hood. Eventually, the little girl arrives at her grandmothers only to be taken advantage of and eaten by the wolf. On a different note, in order to†¦show more content†¦In Little Red Riding Hood, Charles Perrault used his version of the story to teach young girls, especially the attractive upper class young ladies, should always refrain from talking to strangers. If they are not weary of su ch characters, they may become the unsuspecting prey of a seemingly polite and kind wolf. Sadly, it is these wolves in sheeps clothing who pose the most dangerous threats of all. Fairy tales are often written to an audience composed to children. This is displayed in Little Red Riding Hood through Charles Perraults use of chronological order in his plot portrayal. The story goes from one event to the next; it is simple, not complex, so as a child would be easily able to comprehend and follow the storyline. Another aspect of the storys structure is that of Perraults word choice. His text consists of words that belong exclusively to the language of children of his time; for instance, the tap, tap at the door, leading only to the point when the wolf ate her all up. If a child could not understand the language or structure of the fairy tale, then he clearly would never be able to grasp the meaning of it as a whole. Initially, the story of Little Red Riding Hood may seem to possess only o ne meaning, that of the danger strangers pose to young girls. But as the child matures, he may notice underlying subtexts commenting on rape, molestation and even cannibalism. TheShow MoreRelatedLittle Red Riding Hood Analysis Essay1190 Words   |  5 Pagesâ€Å"Little Red Riding Hood† Analysis â€Å"Little Red Riding Hood† Analysis I am going to describe the theme of Little Red Riding Hood, and describe the elements I found to contribute to the theme, how those elements affect the narrative theme. The elements that I am going to use in this paper are the narrative point of view, plot and symbolism. The point of view of is described in our text as is third-person objective, which the narrator takes a detached approach to the characters and action increasingRead MoreAnalysis Of The Little Red Riding Hood 1871 Words   |  8 Pagesand the varying interpretations surrounding them, provides much information in this. Several popular and enduring fairy tales, Little Red Riding Hood, Cinderella, Puss in Boots, and Sleeping Beauty will be examined in this essay. By tracking the changes of these tales the deeper implications regarding differing societies and period can be gained. The Little Red Riding Hood tale as it exists today remains quite different to the original peasant tale. The original tale was marked by much more violenceRead MoreEssay on Psychological Analysis of Little Red Riding Hood773 Words   |  4 Pages Psychological Analysis of Little Red Riding Hoodnbsp;nbsp; In the story of Little Red Riding Hood, you hear about the grandmother, the granddaughter, and the wolf. But the reader does not hear much about the mother. In Olga Broumas poem Little Red Riding Hood, the reader can hear about the mothers impact on Little Reds life, or the lack of one. At the first glance, Little Red Riding Hood appears as a lament of a daughter who misses a dead mother or who is trying to explain to her motherRead MoreFairytale Analysis: Aladdins Lamp and Little Red Riding Hood1133 Words   |  5 Pagesintentional. This shifting nature predicates the textual integrity of the tale, allowing it a pertinent and germane makeup, built upon its didactic nature. This significance is especially apparent in the appropriations of ‘Aladdin’s Lamp’ and ‘Little Red Riding Hood’. Aladdin’s Lamp, 1704, was included in Antoine Galland’s translation of Arabian Nights., however, it has a status as a disputed orphan tale, bearing its origins vaguely from an 1115 manuscript and a tale recited to Galland by a scholarRead More The Pleasure Principle in Perraults Little Red Riding Hood and Brothers Grimm Little Red Cap1001 Words   |  5 Pageswork together to produce our complex behaviours: the Id (â€Å"It†), the Ego (â€Å"I†) and the Superego (â€Å"Over-I†). His psychoanalytic theories are used today in many different fields, including literature analysis. â€Å"Little Red Riding Hood†, written by Perrault in the 17th century, as well as in â€Å"The Little Red Cap†, written by the Brothers Grimm in the 19th century, are both famous folktales turned fairy tales about a young girl’s encounter with a cross-dressing wolf. The tale makes the clearest contrastRead MoreAnalysis Of The Book Fairy Tale 810 Word s   |  4 Pages†§ Red in religions Red was used in different type of religion art, but they all symbolize fire and blood overall. (Gage, 1999) For example, red was a representation of Apostles and Martyrs’ feasts. (Gage, 1999) The importance of red in church was also been seen in the article written by Laura Dilloway. She mentioned that cardinals are the second rank of the Roman Catholic religion only below the Pope. When they are in choir, they would wear fully red robes. In usual time, the black robes theyRead MoreShort Story : Little Red Riding Hood1364 Words   |  6 Pagesâ€Å"Little Red Riding Hood† is an extremely well known fairy tale that has been told across the globe in a multitude of versions. The story is often told with a young girl dressed in a hooded red coat, sent by her mother to deliver a basket of food to her sick grandmother. On the journey to her grandmother’s house, Little Red Riding Hood meets a wolf, whom she assumes to be good-natured. She tells him where she is heade d and who she is planning on visiting. Although the little girl trusts the wolf,Read MoreAnalysis Of The Great Cat Massacre1402 Words   |  6 Pages Darnton does a fantastic job about inviting the reader into to the text. This can best be described a tour of Darton’s mind and thoughts with no particular bias. Through further analysis of Darton’s The Great Cat Massacre reveals that not all subjects in the seventeenth and eighteenth century benefited from the enlightenment. These essays and short stories tell us that the peasants, described in â€Å"Peasants Tell Tales† have violent, nasty, and brutal outlooks on life based on their harsh upbringingRead MoreFairy Tales Adapt to Culture1235 Words   |  5 Pagestales are some of the oldest stories in literary text; in this scenario the question becomes the following: How and to what extent does the given cultural situation affect the status of fairy tales in that time? Fairy tales are the center of constant anal ysis by literary scholars and psychoanalytic experts alike. The stories are probed, analyzed and examined time and time again for they offer themes and ideals that provide realistic application of and interpretation on society and the way people thinkRead MoreEssay Classic Fairy Tales: Annotated Bibliography1398 Words   |  6 PagesIn his evaluation of Little Red Riding Hood, Bill Delaney states, â€Å"In analyzing a story . . . it is often the most incongruous element that can be the most revealing.† To Delaney, the most revealing element in Little Red Riding Hood is the protagonist’s scarlet cloak. Delaney wonders how a peasant girl could own such a luxurious item. First, he speculates that a â€Å"Lady Bountiful† gave her the cloak, which had belonged to her daughter. Later, however, Delaney suggests that the cloak is merely symbolic

Securing the Computer Networks Trojan Attacks

Question: 1. Describe approaches to computer security including access control, identity verification and authentication in order to minimize the cyber attacks on a system. 2. Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks, and malicious software that exists. Answer: Introduction Today millions of people are using the internet as a way to do transactions, companies using it as a medium to conduct and manage business. Therefore it can be said that, huge amount of money are transferred via internet. With this increasing day to day transactions the risk of cyber attacks are also increasing. These huge amount of money gets transferred either as the part of bank transactions or as a result of the consumer product purchases. There are different ways in which this financial information can be stolen by the hackers using the malwares, viruss warms and many other cybercrime tools (Mulliner et al. 2013). Therefore it is important for the users as well as the network administrator to protect the work stations inside the network from the different intruders. The information security can be defined as the controlling the unauthorized accedes or the alteration of the information. According to the Bhunia et al. (2014), in the present day the threats are used to gain the control over a system and to block the access of the actual user. Moreover, the attackers also use this control on the system to have some financial gain or intellectual property. The following report focuses on the attack of a Trojan horse on an organization, the approaches that are taken to minimize the effect and scope of penetration to the same network (Kalige, Burkey and Director 2012). Moreover, the report also focuses on the different counter measures to protect the network from the future attacks. Overview of the Scenario The most common attacks are mainly unstructured threats. The following case study is about a Trojan attacks on a network. These attacks are intended to steal information like the passwords, email correspondence and other user credentials (Fedler, Kulicke and Schtte. 2013). The same happened with a real estate agency in Newcastle. The Trojan attack deleted, modified and copied the confidential data without the consent of actual user. Moreover this malwares are responsible for the disruption in the performance of the work stations that resides inside a network of that agency (Acharya, Dutta and Bhoi 2013). As an example it can be said that, may be user or a employee downloaded a file that seems to be a movie or a mp3 file, but when the users clicks on the program or file it unleashes a program or executable that erases the whole data on the disk, sends the credentials to the hacker. Basic Network Diagram In the home network there is a firewall that filters the different viruses and worms that try to intrude inside the network. More over there is a laptop, PC, data storage, printer and a wireless device (the smart phone). Figure 1: Basic home network (Source: Created using Visio) Identification and level work station and the network components of the diagram In the above depicted diagram some of the devices that are connected with the home network station are discussed below: Firewall: It mainly helps in doing both the monitoring and controlling of both incoming as well as outgoing network traffics that are mainly based on prearranged security protocols. Router: Router is mainly one of the network devices that transfer data packets among the computer networks. In addition, router also undertakes the duties of traffic directing functions over the internet. Fedler, Kulicke and Schtte (2013) discussed that data packet which typically forwarded through networks consists the types of internetwork until in delivered to the destination node. Level workstation: In level workstation, it mainly consists of database, PDA and virtual PC that are connected. Other devices: Some of the other devices include tablet devices; PCs, Laptops, printer etc are mainly connected with the whole network diagram. In the above network diagram the devices like the laptops and the Smartphone devices are mainly affected by the Trojan attack. Explanation of Current Access Control The existing access controls mechanisms are role based access control methods, mandatory access control and discretionary access control. Role based access control: In case of the role based access control, the access of an individual to some information and resource are allowed or restricted by the different banks according to their role in the organization (Mulliner et al. 2013). Mandatory access control: In this access control method, every user in the banks network, resources are classified and assigned with a security label by the operating system (Bhunia et al. 2014). Moreover in this model the users are not the decision makers about the accessibility of their created files at the banks. The users do not decide who can access their files. The rules are created and modified by the security officer or the network administrator. Discretionary access control: As the name suggests, the accessibility of the different files or resources of the different banks are decided according to the users discretion (Golchha,Deshmukh and Lunia 2014). The owner of the resource can allow or restrict the access of the other users to their files or resources. Different verification authentication measures: The existing authentication and verification methods are discussed below, Network access authentication: In this type of authentication method, the user has to authenticate them every time the user tries to access any of the network services. Logon authentication: In this authentication system, the user must be authenticated in order to enter in the network (Fedler et al. 2013). This can be done by entering a pin, by using a smart card or by using their fingerprint. In addition to the above techniques, the group policy and the passwords policies are also enforced in the organization to protect the work stations and the network devices from the malwares specifically from the Trojans. Description of the IT Security Information Steps in a Trojan attack: The following section provides a detailed description about the steps in the Trojan based malware attacks, Step1: In this step the users of the apps of the different banks unknowingly clicks on a malicious link or opens a Phising mail and the Trojan gets downloaded on their devices (Bhunia et al. 2014). In the next phase the program or the Trojan waits for the user to login into their respective user accounts. Step 2: Here, when the users log in to their user account through the banks app, the Trojan intercepts the session of the user and inserts a JavaScript into the users login page of the app. The next time, users log into its system or device the injected file produces some kind of security upgrade alerts and instructs the users to follow some certain steps to install the upgrade (Acharya et al. 2013). In the next steps user is asked to enter the personal as well as financial data to get the upgrade. Step3: The Trojan delivers the whole personal and financial data from the users device to the attacker at the remote site (Bhunia et al. 2014). This information is further used in the future attacks. Step 4: In this step after getting the users personal and individual information of the banks customers, the virus itself or the attacker sends mail or SMS to the user asking them to complete the upgrade process. Moreover, in some cases the users asked to click on an attached link with in the mail or the SMS (Mulliner et al. 2013). Also in some cases the hacked devices are controlled by the remote hacker. After clicking on the given link in the SMS, the mobile devices or the workstations gets infected by the Trojan. After clicking on the provided link the users workstations gets infected and the remote hacker can get the information of the further activities of the users gets transferred to the hacker. Description of Steps to Minimize the Avenues of Trojan Based Attack To minimize the avenues of the Trojan attacks some preventive measures can be taken. 1) First of all it is to be ensured that all patches for the operating system, antivirus programs and applications are installed (Fedler et al. 2013). Many security problems or the attacks that occurs for viruses and worms, mainly exploits the known vulnerabilities of the softwares, for which patches exist. Therefore installing the latest patches for the applications can help in minimizing the probability of the attack. 2) In the second step that can be used is to limit the services that are running on the system (Bhunia et al. 2014). This in turn reduces the number of patches that needs to be installed. 3) Another way to minimize the chances of the attack is to restrict the availability of the information about the resources and processes outside the organization. Since the hackers or the attackers are mainly after the information and try to get the organizational information. Approaches for workstation and network level security In order to secure the workstations from the Trojan attacks, the antimalware programs are used so that they can detect and defend the systems from the Trojans. Moreover full back up of the data of workstations is to be done on a regular basis (Bhunia et al. 2014). The best way to clean an infected file is to replace it with an original non-infected file. The web browsers are not allowed to execute programs automatically or to download files from internet. For the network level security the gateway virus scanning system is implemented in the network (Acharya et al. 2013). Since all the source codes of the major Trojans are publically available, and if a new kind of virus tries to attack the network it can be only prevented by using an executable scanner. List of major security problems of the network List 3 security problems and Their Infiltration DNS Tunneling: The use of the botnets in the brute force attack technique is also used in Trojan attacks. DNS is used as a covert communication in terms of bypass the firewall security in the server. Through it, attackers is able to tunnel the other protocols such as TCP, SSH, etc. Through DNS tunneling attackers can tunnel the data infiltration in the network. Following diagram show the same Figure 2: DNS Tunneling (Created By Author) Cache Poisoning: Hackers or attackers consistently updates and releases new threats and exploits the flaws of the different application and system softwares (Kalige, Burkey and Director 2012). These pitfalls can cause harm to the network if the latest released patches are not in place. If the latest patches are not used in the laptop, computer or to the smart phone devices then they became easy targets of the attackers. Herzberg and Shulman (2013) argued that it is the corruption of DNS cache data. Through cache poisoning, attackers can theft the credential information like log in details, credit card numbers, etc. Following diagram is showing the process of Cache Poisoning Attack Figure 3: Cache Poisoning (Created By Author) TCP SYN Floods: This technology allows the attackers to stop the server and helps in making new connection requests where they can legitimate the information of users. This technology uses 3-way handshake that begins with TCP connection (Kolahi et al. 2014). Hackers send to user the spoofed SYN packets including IP address of a bogus destination. Figure 4: TCP SYN Floods (Created By Author) Analysis and Presentation of Solution Counter measures to protect the network for 3 identified problems In order to protect the network from the Trojan attacks the network administrator needs to create the complex passwords so that they cannot be guessed or tracked easily (Acharya et al. 2013). Also it is advised that the users should take care of the different programs that run at the start up computer. Because the Trojans like the Rootkits are mainly used to corrupt the boot sector of the storage device (Mulliner et al. 2013). On the other hand the different applications must be patched as soon as the companies release the patches for its products. Prevention= Prevention+ (Detection+ Response) Firewalls Audit log Backups Encryption Intrusion detection system Incidents response teams Honey pots Computer forensics Explanation of the security principle The security principle to protect the networks is principle of least privilege. The principle of least privilege states that, the users have the least amount of privilege to perform and complete the business processes (Bhunia et al. 2014). Moreover, when a new feature is added to the applications then it adds some certain risks to the overall system too. Therefore for the development of the application must be done using the secure development methodology. It helps to reduce the total attack surface area. Prevent the cyber attacks and frauds, it is important to separate the different duties and responsibilities of the different users (Wei and Potkonjak 2012). Therefore, it can be said that the network administrator cannot be the user of the application. Summary of the approaches taken to protect the network Since the threat of the cyber attacks or particularly the Trojan attacks are increasing day by day. Different measures are taken to counter these attacks like, access control mechanisms, minimizing the different avenues of attack (Bhunia et al. 2014). In addition to that to protect the network at the workstation level as well as on the network level some measures are also taken this measures includes the backing up the whole data of the system, control over the web. Lessons learnt From the case study it is learnt that, even though the apps for the banks are intended to provide convenience to its customer, but the due to the unsecured use of the apps the attacker was successful in injecting the Trojans in the users device to steal financial as well as personal information and huge amount of money is robbed from the banks. Therefore the users and the bank officials should use the apps and the information of the banks in a secured environment. It will be helpful in protecting the data from the breach and attacks. Moreover, to protect the data of the bank as well as the customers should use the firewall and anti viruses in its computer networks. Conclusion Trojans are malicious software that pretends to be something desirable and necessary, but they are more dangerous than viruses and worms. This Trojan may steal the users data, damage and even erase the users disk. There are different programs that can open sockets or automatically run a program at the time of start up of the workstations. Therefore the users have to control the access of the Trojan in the network. Moreover, the detection and the prevention mechanisms need to be updated periodically so that the new threats can be detected and stopped before it infiltrate into the network. References Acharya, H.S., Dutta, S.R. and Bhoi, R., 2013. Network and Information Security Issues.International Journal of Innovative Research and Development|| ISSN 22780211,2(2), pp.400-406. Bhunia, S., Hsiao, M.S., Banga, M. and Narasimhan, S., 2014. Hardware Trojan attacks: threat analysis and countermeasures.Proceedings of the IEEE,102(8), pp.1229-1247. Fedler, R., Kulicke, M. and Schtte, J., 2013, November. Native code execution control for attack mitigation on android. InProceedings of the Third ACM workshop on Security and privacy in smartphones mobile devices(pp. 15-20). ACM. Ghai, S. and Verma, A., 2015. Network Security Using Divergent Firewall Technologies.IITM Journal of Information Technology,1, p.29. Golchha, P., Deshmukh, R. and Lunia, P., 2014. A Review on Network Security Threats and Solutions. Henson, M.J., 2014.Attack Mitigation through Memory Encryption A Thesis Submitted to the Faculty(Doctoral dissertation, Dartmouth College Hanover, New Hampshire). Herzberg, A. and Shulman, H., 2013, December. Socket overloading for fun and cache-poisoning. InProceedings of the 29th Annual Computer Security Applications Conference(pp. 189-198). ACM. Kalige, E., Burkey, D. and Director, I.P.S., 2012. A case study of eurograbber: How 36 million euros was stolen via malware.Versafe (White paper). Kolahi, S., Alghalbi, A.A., Alotaibi, A.F., Ahmed, S.S. and Lad, D., 2014. Performance Comparison of Defense Mechanisms Against TCP SYN Flood Cyber Attack. Liu, C., Cronin, P. and Yang, C., 2016, January. A mutual auditing framework to protect IoT against hardware Trojans. In2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC)(pp. 69-74). IEEE. Lucamarini, M., Choi, I., Ward, M.B., Dynes, J.F., Yuan, Z.L. and Shields, A.J., 2015. Practical security bounds against the Trojan-horse attack in quantum key distribution.Physical Review X,5(3), p.031030. Lucamarini, M., Choi, I., Ward, M.B., Dynes, J.F., Yuan, Z.L. and Shields, A.J., 2015. Practical security bounds against the Trojan-horse attack in quantum key distribution.Physical Review X,5(3), p.031030. Mulliner, C., Borgaonkar, R., Stewin, P. and Seifert, J.P., 2013, July. SMS-based one-time passwords: attacks and defense. InInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment(pp. 150-159). Springer Berlin Heidelberg. Tenenboim-Chekina, L., Barad, O., Shabtai, A., Mimran, D., Rokach, L., Shapira, B. and Elovici, Y., 2013, April. Detecting application update attack on mobile devices through network featur. InComputer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on(pp. 91-92). IEEE. VukoviĆ¡, O., Dn, G. and Karlsson, G., 2014. Mitigating Gray Hole Attacks in Industrial Communications using Anonymity Networks: Relationship Anonymity-Communication Overhead Trade-off. Wehbe, T., Mooney, V.J., Keezer, D.C. and Parham, N.B., 2015, October. A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs. InProceedings of the WESS'15: Workshop on Embedded Systems Security(p. 2). ACM. Wei, S. and Potkonjak, M., 2012, April. Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection. InProceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks(pp. 161-172). ACM. Xue, M., Wang, J., Wang, Y. and Hu, A., 2015, August. Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme. InInternational Conference on Cloud Computing and Security(pp. 14-24). Springer International Publishing.

Monday, April 13, 2020

Using Free Samples of Your Paper As An Excuse

Using Free Samples of Your Paper As An ExcuseFree samples of your work should not be used as a crutch for failed assignments. Instead, use them as inspiration and keep working on it until you find an essay that is easy for you to write. If you use your knowledge of academic topics, you will be in the best position to develop your own concepts that are unique to your own particular field. You may also try out techniques from other writers before you tackle your own topic.The first step in writing a paper is to write your essay on an open topic. Make sure you can talk about it, ask questions about it, or give examples of it. Once you have a topic, write in a manner that involves a lot of research and hard work. Remember that a paper has to be relevant to the point you are trying to make and not just a jumble of words. Try to make your assignment as logical as possible to avoid misunderstandings will lead to confusion and may even result in your project being rejected.Write the essay yo u want to write, not the one that you think you should write. Ask yourself what do you want to get out of writing this assignment. Are you trying to impress your professor? Perhaps you are trying to impress your sister or uncle, an admirer or perhaps just an acquaintance.Write your essay as if you were giving a presentation or presenting a new idea. What do you want people to know about your essay? A good idea is to take a photograph of your topic and have it put in your presentation.Next, ask yourself some of the same questions you did when you were researching and working on your research, asking yourself some of the same questions with respect to different angles of the topic. For example, 'Is there a need for education in the real world?'What can students learn from applying these ideas in real life situations? What can they learn by applying these ideas in situations where the actions would be very difficult for them to do?' After writing the paper, you are ready to work.Some p oints to consider in doing this writing include: 'How could this new idea to help me improve my current writing?' 'What situations are most suitable for implementing the concepts presented in the essay?' 'Can I implement the ideas I have found through actual practice?'This is only a sample of the types of questions you might be asked when it comes to doing research and writing a paper on a subject that could involve classification. Because there are so many ideas that could be written, you will need to spend a long time just brainstorming and searching for information that you can use in your essay.