Create a 11 pages page paper that discusses the concerns of gas emissions

The degrading environment speaks for itself and describes the whole story of manufacturing industries. The widening demand of the industry’s products are even promoting the manufacturers to utilize the unsustainable manners to produce products that are produced with no sense of environment, waste management, carbon footprints, etc but only one thing is kept in mind of the manufacturer “ we are making a profit”. In fact, we are not making any profit we are losing profit. Sustainable development binds the knots of manufacturing with the environment. Sustainable development views manufacturing in a sustainable manner.

Sustainable development refers to the progress under the shade of sustainable methods that directly or indirectly reduce the flow of greenhouse gas emissions into the environment. Today, greenhouse emission or carbon emission is a concern that affects all sectors. Industrialists, economists, politicians, and financial advisors show great concern about the emission of harmful pollutants into the environment. Renewable technologies that are the important pillar of sustainable development are making their place among conventional methods. Renewable resources are not only risk-free but also limit the flow of carbon emissions into the environment. Moreover, renewable resources are present all over the planet and can be attained with little effort.

Sustainable development idealistically identifies how the conventional methods either utilized industrially or domestically can be made better, so that the carbon footprints of the conventional methods limit to an acceptable range. On the other hand, sustainable development also promotes are a vision of a carbon-free world. Sustainable development can be enhanced by enhancing the conversation of energy, promoting a low carbon, and renewable energy resources, and minimizing wastes. On the other hand, the use of materials that require less energy and effort during manufacturing also helps in promoting sustainable development.

prepare and submit a paper on the privacy and surveillance in relation to the internet.

. For this reason, privacy violations and unauthorized surveillance continue to expand globally. This trend is explored in this paper using appropriate literature. It is proved that states have only part of the responsibility for the particular problem. Internet users have positively contributed to the expansion of privacy violations since they seem to refuse to follow Internet use terms, as clearly highlighted by Internet providers in all countries.

When browsing the Internet, an internet user receives various messages informing him of the website’s security level. However, this function is not equally developed in all web browsers, meaning that specific browsers cannot identify the attempts of malware to harm the computer of the Internet user (King 6). Moreover, the following phenomenon has also been observed: a browser can send a message to the user that the website he attempts to visit has problems with its digital certificate, but the user cannot understand this message, either because the message appears and disappears instantly or because the user is not aware of the role of digital certificate and cannot realize the risk involved (King 6). The research developed on this issue has revealed that many Internet users are entirely unaware of the importance of ‘Internet digital certificates’ (King 6). These users cannot understand the link between these certificates and the privacy risks when browsing the Internet (King 6).

On the other hand, privacy violations while visiting a website are quite challenging to be fully controlled. The online network is very complex, and its aspects can’t be fully explored (Khosrowpour 304). However, there is always the chance that an Internet user is informed of the violation of his privacy while visiting a website. for example, the particular Internet user can have an advanced Internet browser that stops any attempt of malware to access private data (Khosrowpour 304). If an Internet user realizes the privacy risks related to a website, he will likely avoid revisiting this website. For this reason, firms interested in securing customer loyalty emphasize the protection of their customers’ privacy. H.P. is an example of such a case, trying to show to its customers that it values their relationship the firm has introduced in its website a series of applications that increase safety of personal data during online transactions or while browsing the organizational website (Khosrowpour 304).

Write 8 pages with APA style on A Vertebral Condition for Mobilizations.

One likely cause of lower back pain is sprains of the muscles at that point. A sprain is basically a ‘pulled’ muscles. This can typically resolve itself in a period of not less than two weeks but the same should not go over four weeks (Petty & Moore, 2001). This thus means that if the pain is to go over four weeks, then intervention should be through and put in place. According to Petty and Moore (2001), symptoms of sprains include minor ache but sometimes this may lead to debilitating pain. However, Nordin & Frankel (2003) notes that it is unlikely that the pain which comes as a result of spraining a muscle will be felt far from the location of the muscle. In essence, such a pain tends to be localized. Therefore, the intermittent side in the lumbar region to the left side of the lower back maybe as a result of a muscle sprain. However, such a pain is not expected to spread to the buttock as is the case.

The intervertebral disc in the lumbar region helps absorb compressive forces, in the process creating a space for spinal nerves to leave the spinal column (Nordin& Frankel, 2003). In the event excessive compressive pressure is placed on the disc, sometimes tears can occur in the disc. The force of the jelly put on the tears can lead the disc tearing at that point. In some cases, the disc can be ruptured at the point of the tear. Disc problems like this make the disc vulnerable to compression as the player takes various swings in the process of playing, and this results in the pain. Unlike pain caused by muscle sprain, this type of pain can radiate into the buttocks and the legs (Muscolino, 2009) and maybe the cause of pain is felt into the buttocks.

Thus, to conclude, the two types of pain being felt by this particular player may be as a result of both a muscle sprain in the lower back region and a disc injury.&nbsp.&nbsp.

prepare and submit a paper on securing and protecting information.

. For example, worms and viruses can propagate through the sharing of networks and e-mails. Another major issue that is being experienced in networks is the phishing attacks that try to lure the users to provide personal information such as credit card information and bank account details. In any organization, be it in the hospitality or business industry, data security is fundamental. New and existing organizations should regularly undertake data security review to ensure that data is safe from any loss. The three predominant principles of information protection are confidentiality, integrity, and availability.

One of the main challenges that face numerous firms even before securing the classified information is the classification of the information. It is vital to note that despite the importance of the information in the organization, all the information cannot be treated in the same way. Organizations should maintain a sustainable and clear policy of information classification. Some of the major issues that should be included in the policy include identifying the individual who assigns the original classification once the data is created, the person responsible for storing the data, and the process for declassifying information among other duties (Pipkin, 2000). Notably, the role of information classification should be limited to the Information Technology department but all the managers concerned should be involved. This is based on the fact that information that seems to be vital to a manager, for example, in the marketing department may not be important to a manager in the maintenance department. This implies that individuals or department that understands the importance of the information should be fully involved in the classification. The information handling policy and methods of maintaining data cannot, therefore, be overlooked to avoid making the software and hardware&nbsp.less effective.

In an organization, there is major information that should only be accessed by authorized individuals and which should be stored on the internal network only.

prepare and submit a paper on authentic assessment performance task-political media.

n a report issued to the associated press, Cain’s campaign characterized the politico allegation as ’dredging up thinly obtained allegations’ from his term at the trade group. J.D. Gordon, Cain’s spokesman, dismissed the claim and termed it a personal attack. He pointed out that the press was molding accusations on his character and spreading gossips that lacked facts. During an interview with Fox News’ Geraldo Rivera, Gordon asserted that the allegations were purely rumors and had no basis. He further emphasized that the allegations were politically stirred and were only meant to destroy Cain’s political career (Drash &Wayne, 2001).&nbsp. This information can be considered objective since the politician’s spokesman is well quoted. However, it can also be regarded as non-objective, as the speaker does not have any tangible evidence that what he is saying is the truth on the ground.

According to the norms of objectivity, the information should be quoted. Some of the presses have struggled to observe this, to make this information valid. Some women have come out to give firsthand knowledge to the media on how they were harassed sexually by the man. The intersubjectivity of the information provided by the sources can help in identifying whether the press is bias, or whether the subject is just another political weapon against the politician (Hallowell, 2011)

&nbsp.Intersubjectivity is a shared understanding amongst more than one person. Intersubjectivity comes up when the subjects have e common experience, shared knowledge, age, or social interaction. Intersubjectivity varies by degrees. Intersubjectivity can be attained to the point that the topics focus on the same information. they interpret it similarly and make similar inferences. Intersubjectivity can be acquired because the subjects make similar inferences and store and retrieve the premises in an analogous manner. The issues select and similarly apply their following messages. When total intersubjectivity is attained, then we can claim that the information is from a reliable source. We shall look at the intersubjectivity of the different sources that the press used to pass information about the vying politician.

prepare and submit a paper on pr campaign proposal.

RACE steps are always in the form of four steps. The four steps that are involved in this process are research, action, communication, and evaluation. For the process to have a positive result, it is believed that there is a need for the steps to be carried out separately and independently. The steps should also follow the respective sequence (Watson & Noble, 2007). Failure to follow the sequence will imply that some steps might be meaningless, making the outcome of such activities undesirable.

At the research step, the museum should first start with researching on the problem that the museum is facing. By this they will have to know exactly what they aim at solving by the campaign. In between the year 2014 and 2015, the museum aims at undertaking a revamp so that they can make sure that the country’s cultural history is incorporated into the museum’s galleries and spaces. The museum also wants to make sure that they develop post-1965 chapter which they are sure that the people living in Singapore can personally relate to. Such revamps imply that the museum will have to make sure that the public is aware of the fact that they are carrying out such revamps and incorporation. It will be hard for people to come to get interactive with such involvement without being aware that they exist. Otherwise, the general public will just assume that the museum is just as it has always been. Therefore, the museum must find a way of letting the general public aware of the developments that have taken place in the museum.

The museum has a chance of giving the people of Singapore an experience that they had never had before. Looking at the diverse cultures that Singapore has it will be an experience that any person will be longing to have. The fact that there are many cultures also gives the museum many cultures to work with and not just one culture. They will also be the first museum in Singapore to involve themselves in such integration activities. There should also be some research done on the best way to reach out to the people of Singapore.

Compose a 1500 words assignment on analyzing discourse community: perdue civil engineering community.

Currently, there are more than 300 students in graduate school taking either a master’s or a Ph.D. in civil engineering at Perdue University, with the number of an undergraduate being much higher. This implies that civil engineering at Perdue University produces hundreds of highly qualified engineers each year to market, with competence and skills that are unmatched. This has edged civil engineering closer to the sensitivity of people’s lives, with its core functions being providing compatible and sustainable space not only in coming up with structures but facilitating the life and spirit of the ecosystem. Perdue University has therefore become a dream institution for anyone willing to train in civil engineering globally.

Discourse analysis in civil engineering would thus refer to the unique communication and thinking among engineers and the community at large with regard to civil engineering works.

Discourse community of civil engineering will thus be about what’s new and existing in the built environment, where students gain knowledge on the latest trends in civil engineering, procedures followed to come up with civil engineering masterpieces, and how students are involved in a dynamic and active learning process, in preparing them to handle such civil engineering tasks in the future.

Perdue university was ranked 23rd among all public universities globally and was 65th among all private and public university globally in 2012 and was 23rd among public universities and 62nd overall in 2011, with Perdue college of engineering is ranked 10th nationally, and 44th globally among engineering schools with the highest degree as a master’s or bachelor’s degree

My research involved detailing the course available in Perdue civil engineering, investigating steps that would be followed in establishing a new civil engineering systems department at Perdue University, and investigating a typical learning process in Perdue university civil engineering classes.&nbsp.

Write a 5 pages paper on we go public: a public information campaign.

We Go Public campaign inspires members of the society across the state of Texas on the positive and sustainable impact that the public schools have on their lives. Having being established in 2013, the campaign also aimed at supporting public education. According to Karabel (1989), the strong US economy has been significantly improved through educating all the people irrespective of their socioeconomic status, race, religion, and class. On their part, public schools are entitled by the public to undertake more responsibilities that include reducing their budget, feeding the hungry, and assisting the sick members of the public among other duties. On the part of the government, there has been criticism from wealthy individuals due to a reduction in the public school budget. The campaign is therefore a kind of counterattack by the public on the government budget cut. Public schools emulate the campaign as a way of informing the public on their efforts to fulfill the responsibilities bestowed on them by the members of the society.

A public Information Campaign (PIC) entails coordinated strategies in order to inform society about a given program. This includes several components that are brought together by the organizers of the campaign in order to effectively communicate the message. For a PIC to be successful, it must include six major aspects. First, there must be a commitment. This implies that the organizers must be focused on attaining their objectives by committing their time, resources, and ideas. Secondly, the organization must be informed. This entails informing the directors all the way to the receptionist about the plans of the campaign. Thirdly, is the identification of the target audience. This includes knowing who wants to receive the message and what action is needed to be taken by the audience. Statt (1977) depicts that by targeting the right audience, a campaign enjoys the support of the public an aspect that leads to its success. Fourthly, it focusing on the message. This entails keeping the message simple and avoiding technical language. In this way, it will be easier for the members of the public to understand the objectives of the PIC. The fifth is planning one activity.

write an article on some processes in the cultivation effect Paper must be at least 3250 words.

These studies showed that the impact of television on viewers’ perception is individual. however, what is still unknown is the exact ‘size and importance of that effect’ (Pingree and Hawkins, 1980). Generally, it was observed that there was no strong relation between watching violent programming and fearing that the viewer himself would get involved in a similar scenario when controlling the third variable. One of the reasons could be that people in other parts of the world were unconsciously aware that their society was different from America. Therefore, they were not impacted that much by American programming.

Furthermore, not much research was done involving controls that would illuminate the children’s exact process. Studies involving age as a variable and discovering that children in the learning stages are usually more susceptible to the television messaging systems than a very young and older audience (Drabman et al., 1976).&nbsp. Another research done by Hawkins considered the preconceived perception of television’s actuality as one of the variables (1977) and discovered that the belief in ‘Magic Window Reality’ (viewing television as the real-life unfolding), decreased uniformly with age. However, confidence in ‘Social Expectations Reality’ (believing television does not depict real life) increased till sixth grade and then stayed constant. &nbsp.

Hawkins and Pingree’s primary purpose were to introduce various variables to alter their sample children’s social and psychological conditions and ultimately tie the cultivation process of the subjects to the nature of the content viewed on television. Their issues were around 1280 schoolchildren of grades 2, 5, 8, and 11, living in Perth, Australia (Pingree and Hawkins, 1980). They studied the effects of modifying various variables, such as age, socioeconomic groups, the content of the television program, and viewing pattern, on the cultivation hypothesis, the findings of which are discussed in the next section.

&nbsp.

Literature Review

Cultivation Theory – Research Proposal

The article talks about the effect of television on the audience and that the more the violent exposure, the more changes it brings about in individuals’ societal behavior. It talks about various factors that enhance or diminish social behavior (water, 1978). Exploratory research needs to be carried out as the problem needs to be clearly defined. Both qualitative and quantitative data shall be compiled for this research.

submit a 1750 words paper on the topic Smartphones and the Security of the Data in Them

The downside to this is that since these technologies are used by people every day and hold our most important information, they are also extremely prone to attacks. Personal computers can be hacked or could get viruses and spyware, while networks are the target of security breaches, and of course, smartphones can be attacked as well. These technologies are targets for the same reason we use them. they are capable of running our lives. Nowadays, you can do banking from your home or phone. You can transfer bank funds via your network, you can keep the passwords of your utilities in your Smartphone, and you can also keep track of your stocks and other assets through these methods as well.

Attacks come in different forms and target different kinds of information. This paper will focus on one of the above mentioned technologies, the smartphones, it will look at the kinds of attacks that could affect a smartphone, and look at current literature regarding available security options for smartphones.

Before we can get into the details of the attacks and security options for a smartphone, we first need to discuss what a smartphone is. According to cellphones.about.com, a smartphone is “is a device that lets you make telephone calls, but also adds features that you might find on a personal digital assistant or a computer.” This means that technically, a smartphone is a miniature personal computer or laptop that can make calls because according to the article, “A smartphone also offers the ability to send and receive e-mail and edit Office documents, for example.”

These kinds of features allow us to do banking, social networking, communication of multiple methods, and asset management through these devices. This is normally used and abused by business owners and company managers that need to bring their work wherever they go, or by entrepreneurs and free-lance employees and contractors as they may get work orders at any given time.

These functions are very useful for people on the move regularly, and even for people who feel the need to stay connected regularly but as advanced these functions may be, they are also more prone to attacks such as viruses and spyware.