Write a 6 pages paper on land and water use in the usa.

he manmade pollution of the water bodies by dumping of chemicals and intentional applications of pesticides and over the surface, certainly affects the water quality, underground or above the surface. Hence, it is necessary that use of land should suit the water available in the area, while care must be taken to avoid the contamination of water, at all levels. In addition, it is equally essential that water is not wasted, while it is used for irrigation and other purposes. This is particularly important, as the population grows and the per capita demand of water increases. However, with the limited resources of water, excess use of same for land irrigation and other purposes may leave us without sufficient drinking water.

In most of the cases, the land is not used properly but misused intentionally, to maximize profits from the agricultural and industrial produce. This human activity certainly contaminates the area surrounding the particular region, along with the ground water of the area. However, the criteria for determining the magnitude of contamination of water in certain area would involve considering the process of contamination, while referring to different underground water sources. For example, the water in a well can be contaminated while the water charge for the same passes through the comminuted area before reaching the well. Accordingly, every well has a “contributing area”, which is responsible for the water quality in the well. Similarly the water bodies like streams, lakes and rivers can have contaminated water, which depends on the land use of their contributing area. The following guide map shows an indicative pattern of pollutants that occur either freely or are generated by manmade activities. The rainfall in the area accelerates the movement of these contaminants.

Write a 18 pages paper on what are the implications of leadership in police and criminal communities.

The police leaders should exhibit a high level of competence and integrity of work in order to control the other police officers and execute their orders with the highest level of accuracy (Cronkhite, 2012). Similarly, criminals are headed by leaders who have a high level of competence and integrity in the work in order to succeed in their missions. For example, the leaders have adequate knowledge and skills on how to organize other criminals, delegate tasks to various gang members according to their competence and integrity in particular areas of operations (Baker, 2010). Criminal leaders should not work on trial and error but ensure they know what they are doing and predict the outcome with near certainty.

Police leaders are courageous people and good at decision-making even in circumstances that pose a risk of death. For example, if enemies attack a certain place the police officers have to make the decision to counterattack courageously despite the risk of being killed in the operation. Similarly, criminal leaders have to make courageous decisions to implement their mission even though they are aware of the risk of a retaliatory attack by the police (Cronkhite, 2012). Therefore, criminal leadership requires someone who is able to think and act swiftly even in a situation that is demanding.

The leadership in the police department requires someone who is capable of handling stress (Baker, 2010). In most cases, police officers and their leaders undergo traumatic experiences that can easily cause the officers to breakdown emotionally or death. In the same way, criminal leaders should able to manage stress because their mission involves traumatizing events that can easily cause mental breakdown or death.&nbsp.&nbsp.

Autocratic leadership style is a leadership characteristic whereby an individual is in control of the entire group and the leader in the sole decision-maker (Canter, 2009). The police leadership is authoritarian in nature with the command being issued from a single authority. The strategy results in quick decision-making and increases accountability.

Write 15 pages thesis on the topic code-switching among students in the uk

This paper has been a pilot study to investigate the code-switching between English and Arabic among the Kuwaiti students in the utterances and construction level in the speech.The respondents of this study were undergraduate and postgraduate Kuwaiti students, studying in one of the UK universities programmes of both genders in different ages. The target population were from different universities, majors, and social status. The graph shows the results of the analysis. Most of the respondents do not find it a reason to code switch from Arabic to English because they want to raise audience and interest of what they are talking about with about 40 per cent said they slightly agree. There was about 25 per cent of those who disagree slightly with this fact while about 15 per cent strongly disagree. The first language of the target and sample population is Arabic, and second language is English where most of them have learned it as a compulsory subject at the age of six in the state schools or earlier if they were in private schools. The quantitative method was used in this research. This was aimed at providing data for meeting the objectives of the study.

This report makes a conclusion that this was a pilot study and it was aimed at finding out how the actual research will be conducted. The main aim was to find out the structure of the questions and how well they were understood by the respondents. Based on the results analyzed, most of the research questions were well understood. This is because there was no missing question that the respondents did not answer.

Create a 2 pages page paper that discusses myspace (& other social network sites) predator problems–how can they be solved.

Online Predators Online Predators and how they can be solved With the development of modern technology and increased use of internet, the world has become a global village. Use of internet and computers has eased the rate at which people communicate and interact than ever before. Different social network sites such as MySpace, Facebook, and Twitter among many others are developed with the sole purpose of ensuring that friends and relatives stay connected (Hansen, 2008). However, these sites have been faced with one problem- predators- which have raised concerns all over the world.

While social network sites are aimed at networking and being in touch with relatives and friends, the bottom line is that social networking is highly famous and it is a big business today. Unluckily, scam artists, child molesters, and sexual predators have noticed that these sites can also be exploited to find victims. MySpace is one of the sites where predator is a big problem. MySpace is a social networking site just like facebook. However, there have been numerous cases of sexual predators and child molesters posing as children to network with young victims on MySpace (Zilney & Zilney, 2009). Recently, MySpace was also discovered to be compromised by attackers spreading malware on exploited profile sites. These have led to MySpace taking steps and implementing security measures to minimize this problem though users are still supposed to be cautious and aware. Predators were therefore a big problem to MySpace not only because it led to increased cases of sexual assaults but also death cases were on high rate.

Nevertheless when putting into consideration increased cases of predators. social networking sites have employed numerous efforts to cut down on the numbers of predators online. For instance, they have developed an e-mail registry that would permit parents to prohibit their children creating online profile for such networks. Social networking sites would also create the default profile setting for 16 and 17-year-olds on their site “confidential “ so that they can only be contacted by individuals they know hence making it difficult for predators to find them (Krinsky, 2008).

According to Hansen (2008), they employ a third party to gather a registry of email addresses offered by parents who want to restrict access of their children to the websites, and will block anyone using email address listed in the registry from signing up or creating a user profile. Laws have also been implemented to govern and address this issue and all networking sites have agreed to comply with them and cooperate with the government to sue people who are revealed to have broken these laws. These sites have also created a tab where users can report any incidence of abuse. Hansen (2008) asserts that this has made it easy to report and locate predators since it is only one click away to report incidence of abuse. Lastly, all networking sites are encouraging parents to make sure that they scrutinize whatever their kids are doing or who they are interacting with on these sites. They should also educate them on the existence of predators and let them know that predators exist hence need of being careful when using these sites.

In general, it is apparent that predators are a very big problem not only to MySpace but all other networking sites. Therefore, as far as these sites have been doing their best to end this, everybody across the globe is supposed to be aware and offer the best they can to ensure that this comes to an end. This is because everybody is affected by this issue when considering that social networking sites are used across the globe. Governments should also be alert and implement additional laws in addition to ones in existence so as to ensure that users of these sites are completely safeguarded from predators.

References

Hansen, C. (2008). To Catch a Predator: Protecting Your Kids from Online Enemies Already in Your Home. New York: Penguin Group USA.

Krinsky, C. (2008). Moral panics over contemporary children and youth. New York: Ashgate Publishing, Ltd.

Zilney, L. and Zilney, L. (2009). Perverts and predators: The making of sexual offending laws. New York: Rowman & Littlefield.

prepare and submit a paper on effects of the key discoveries in science since 1800.

The paper will seek to investigate the effects of three scientific discoveries on the world. These are the discovery of practical electricity generation by Alessandro Volta in 1800, the discovery of the neutron by Professor James Chadwick in 1932, and the discovery of induced pluripotent stem cells by Dr Shinya Yamanaka in 2007.

Alessandro Volta was credited for the creation of the voltaic pile in the year 1800, which led him to discover the first practical way to generate electric current. According to Schlesinger (2010), this discovery also led to Volta’s later discoveries in pneumatics, meteorology, and electrostatics. This discovery had a worldwide impact since it allowed for the invention of the battery and electrophorus, which are crucial in the powering and construction of mobile devices that today’s society is so dependant. In fact, so important was the discovery that the basic unit of electromotive force produced by batteries, or the volt, is named after him. Volta’s invention of the voltaic pile, which came later to be referred to as the battery, was crucial in later inventions of the capacitor, which enables the working of most electrical devices. The electric battery created by Alessandro Volta was one of the most important discoveries of the 19th century and has had widespread use in later centuries. According to Piccolino & Bresadola (2013), the battery enabled scientists to come up with new ideas in the electric field, which set off for the second time an electrical era.

Today, Hurst et al. (2012) contend, batteries have become inseparable with various fields, including transportation, entertainment, medical science, and in the home. In the home, for example, people utilize batteries for their computers, iPods, iPods, electronic games, radios, as well as watches, all on a regular basis.

Complete 2 pages APA formatted article: M and M’s. GOODNESS OF FIT WORKSHEET The following is a quote from the Mars Company, maker of M&M candies:

We can assure you that the colors are blended mechanically according to the formula. Our present means of color dispensing should place a fairly uniform blend of colors in every package: however, occasionally an unusual assortment of colors may appear.

The theoretical percentages of each color (as given by the M&M company) are:

Red

Yellow

Green

Orange

Blue

Brown

Plain

20

20

10

10

10

30

Peanut

20

20

20

10

0

30

1. Each person will need to buy a package of regular colors, Milk Chocolate M&M’s that is at least 4 oz. (colors of red, yellow, green orange, blue, brown) to be used for this project. Exchange your counts with the members of your group to get the total for the group.

Red

Yellow

Green

Orange

Blue

Brown

Total

Yours

18

19

8

13

12

36

106

Group

78

79

38

36

38

123

392

Expected value

2. Group Leader will total the group values, will sum their color and post those totals on the bulletin board. After consulting with the rest of the group on the answers to these questions the leader will need to post these results on the bulletin board and email this completed form to the instructor.

Red

Yellow

Green

Orange

Blue

Brown

Total

Group

78

79

38

36

38

123

392

Expected value

3. Is this frequency data? How can you tell?

Yes, this is frequency data. This is because the data represents the counts for each color (colors of red, yellow, green orange, blue, and brown) for the regular colors (Plain), Milk Chocolate M&M’s candies.

4. Write the null and alternative hypotheses. Remember these two statements must include all of the possible outcomes.

H0:

Ha: At least one of the proportions is not equal to the given claimed value.

5. Determine the expected values for all of the M&Ms. Use the number of M&Ms from the whole group.

The expected frequency for each color is calculated using formula: E = np

Red

Yellow

Green

Orange

Blue

Brown

Total

Observed value, O

78

79

38

36

38

123

392

Proportion, p

0.20

0.20

0.10

0.10

0.10

0.30

1.00

Expected value, E

0.20*392 = 78.4

78.4

39.2

39.2

39.2

117.6

392

6. Compute the Chi-square critical value

There are 6 colors for the Milk Chocolate M&M’s candies. Therefore, the degrees of freedom are

df = k – 1 = 6 – 1 = 5

The Chi-square critical value for α = .05 with degrees of freedom of 5 is = 11.07. Therefore, decision rule will be

Reject H0 if χ2 &gt. 11.07. Otherwise, do not reject H0.

7. Compute the test statistic value

Table 1 shows the calculation for the χ2 Test Statistic value.

The value of test statistic is

= 0.5893

Table 1: Calculating the χ2 Test Statistic for the colors of Milk Chocolate M&M’s candies

Color

Observed Frequency O

Expected Frequency E

Red

78

78.4

-0.40

0.16

0.0020

Yellow

79

78.4

0.60

0.36

0.0046

Green

38

39.2

-1.20

1.44

0.0367

Orange

36

39.2

-3.20

10.24

0.2612

Blue

38

39.2

-1.20

1.44

0.0367

Brown

123

117.6

5.40

29.16

0.2480

Total

392

392

&nbsp.

&nbsp.= 0.5893

8. Write a decision about null hypothesis:

Decision: Fail to reject H0.

This is because the test statistic χ2 = 0.589 is less than the critical value = 11.07.

9. Write a conclusion about the colors of the M&Ms:

There is not enough evidence to reject the claim about the theoretical percentages of each color given by the M&M Company for the regular colors (Plain), Milk Chocolate M&M’s candies.

In conclusion, M&M Company’s claim about the proportion for the regular colors (Plain), Milk Chocolate M&M’s candies is correct.

10. Put the group names on this handout, post your results (number in each category, hypothesis test steps and conclusion) to the BB and email a copy of the handout to the instructor.

Please write group names

Triola, Mario F. (2011). Elementary statistics using the TI-83/84 plus calculator. (3rd

edition).

Write 9 pages with APA style on Are Law Enforcement Cameras an Invasion of Privacy

There are certain issues that need to be discussed: a) the actual power of individuals ‘to protect themselves against the potential sale of their private data is quite limited’ (Froomkin 1502). this problem is mostly related to the unawareness of people in regard to the existing privacy laws. b) the First Amendment that refers to ‘the freedom of association’ (Froomkin 1506) can be used for setting borders to the expansion of these cameras in public spaces.

Referring specifically to the English law of privacy, Lord Walker (2010) notes that ‘the tort of invasion of privacy in the UK is rather recent’ (Walker 1). in fact, the initial reference to the violation of privacy, as a tort, in the English courts can be identified in the case ‘Douglas v Hello in 2000’ (Walker 2). The above decision reflects the alignment of the British legislation, especially of the Human Rights Act of 1998, with the ‘European Convention on Human Rights’ (Walker 2), where the right of each individual ‘to respect for his private and family life’ (article 8) is clearly set. At the next level, the Human Rights Act of 1998 notes that it is not allowed for public authorities to proceed to initiatives that violate the right of individuals to privacy, as this right is secured by the European Convention (Walker 2). It is made clear though that the terms of the Convention for privacy may be violated if it is not possible for public authorities to act in a different way (Walker 2). According to the above, the use of law enforcement cameras can be characterized as a violation of the Convention’s orders because of the following: the public authorities may use different tools for controlling public spaces. the use of security guards could be a potential alternative for protecting public spaces without violating the right to privacy. Taylor (2002) also claims that the use of CCTV cameras can be considered as opposed to article 8 of the European Convention.

submit a 250 words paper on the topic Complaints about Customer Service Department

This situation only came to my attention very recently when my department received a number of complaints stating that the customer service department was not being very helpful. After looking into some of these grievances, I found that our customers’ claims could be taken seriously. In response to this, I informed each individual customer through a personalized letter that this behavior was completely unacceptable and the necessary action would be taken. It is my view that the right course of action would be to include select customer service representatives in the occasional staff meeting so that they are not left behind.

In taking all of this consideration, I would ask that you consider taking the action that I have outlined above. At this stage, the problem is not so great that it cannot be fixed. If you could reply back to me by the end of the week with your thoughts and recommendations, it would be much appreciated.&nbsp.&nbsp.

Create a 6 pages page paper that discusses applied final project: parenting today scenarios (40 percent).

. I believe I will approach them in a non-intimidating and non-threatening fashion. Recognizing this is a transition phase for my child, I view this conversation as a means of aiding in their personal development, as well as strengthening my connection with them. After sitting down with my child I will not speak with them in an accusatory way, but rather ask their perspective on cigarettes and alcohol. My belief is that punishing them outright will be ineffective as it would not target the course issue, namely their acceptance of cigarettes and alcohol in their life. Rather I will continue the discussion through having an open dialogue about these substances, and I will inform my child the dangers of each. I will spend considerable time emphasizing how these substances deter an individual from having a healthy, fulfilling, and happy life. I will concluded by informing them if I found evidence of alcohol use I will take measures towards punishment, including taking their car away from them. Ultimately, I believe the conversation will be successful in establishing the facts about these substances in a way that would not encourage rebellious or spiteful behavior.

Family development theory is an approach to studying families that considers dynamics elements of change and development (White 2007, p. 4). Within this spectrum of understanding theoretical applications have been implemented in considering transitions and developments both within individuals and within the larger family structure. In many instances, systems theories have been implemented as a means of addressing the ways that families interact. For instance, Bronfbrenner’s ecological systems theory divided social structures into a variety of systems that then correspondingly are analyzed for their interacting tendencies (Steinberg, 2008, p. 43).

write an article on key principles of tortuous liability and negligence as the concept in legal studies Paper must be at least 2250 words.

Severn bridge Metropolitan Council must, therefore, ensure that the buildings do not cause potential harm to visitors of the building or passers-by. If an incident does happen wherein a part of the properties of Severnbridge Metropolitan Council falls and injures a person, it will be Severnbridge Metropolitan Council who will need to pay for damages for injuring that person, since tortuous liability will be applied. Therefore, even though the injured party and Severnbridge Metropolitan Council are not bound by any contractual obligations or contractual liabilities, the Metropolitan Council would still be bound by tortuous liability.

On the other hand, contractual liability is created when there is a promise between two or more parties to perform a duty or obligation for another. For example, if Severn bridge Metropolitan Council has promised one of its clients that the council will ensure that no harm would come to any of his clients when they visit their offices, however &nbsp.if one of the clients is injured by the debris in one of the council buildings, contractual liability would apply to the Severn bridge Metropolitan Council.&nbsp. The primary differences between contractual liability and tortuous liability are that contractual liability is voluntary in nature, whereas tortuous liability and is an obligation imposed by law. The contractual liability is strict whereas a tortuous liability is established on the platform of fault. Another major difference between the two is that in the case of contractual liability, a person is found to be guilty when he’s not performed an action which he should have performed, whereas, in tortuous liability, the person is proved&nbsp. to be guilty when he has performed an action which he should not have performed.