Monday, September 30, 2019

Testbacksecurity

Chapter 2 – Why Security is NeededTRUE/FALSE 1. Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs. ANS:FPTS:1 2. Information security safeguards the technology assets in use at the organization. ANS:TPTS:1 3. A firewall is a mechanism that keeps certain kinds of network traffic out of a private network. ANS:TPTS:1 4. An act of theft performed by a hacker falls into the category of â€Å"theft,† but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of â€Å"forces of nature. ANS:FPTS:1 5. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. ANS:FPTS:1 6. A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws. ANS:TPTS:1 7. A worm requires that another program is running before it can begin functioning. ANS:FPTS:1 8. A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. ANS:TPTS:1 9. Attacks conducted by scripts are usually unpredictable. ANS:FPTS:1 10. Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems. ANS:TPTS:1 11. With the removal of copyright protection, software can be easily distributed and installed. ANS:TPTS:1 12. Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people. ANS:TPTS:1 13.Much human error or failure can be prevented with training and ongoing awareness activities. ANS:TPTS:1 14. Compared to Web site defacement, vandalism within a network is less malicious in intent and more public. ANS:FPTS:1 15. With electronic information is stolen, the crime is readily apparent. ANS:FPTS:1 16. Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords. ANS:TPTS:1 17. DoS attacks cannot be launched against routers. ANS:FPTS:1 18. A mail bomb is a form of DoS. ANS:TPTS:1 19.A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications. ANS:TPTS:1 20. A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms. ANS:TPTS:1 MODIFIED TRUE/FALSE 1. Intellectual property is defined as â€Å"the ownership of ideas and control over the tangible or virtual representation of those ideas. † _________________________ ANS:TPTS:1 2. The macro virus infects the key operating system files located in a computer’s boot sector. ________________________ ANS:F, boot PTS:1 3. Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________ ANS:F virus worm PTS:1 4. A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________ ANS:TPTS:1 5. When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment. ________________________ ANS:F, spike PTS:1 6. The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. _________________________ ANS:F, surfing PTS:1 7. Hackers are â€Å"people who use and create computer software to gain access to information illegally. † _________________________ ANS:TPTS:1 8. Packet kiddies use automated exploits to engage in distributed denial-of-service attacks. _________________________ ANS:F, monkeys PTS:1 9. The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________ ANS:F, cracker PTS:1 10. Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________ ANS:TPTS:1 11. The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________ ANS:TPTS:1 12.The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack. _________________________ ANS:F, force PTS:1 13. One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target. _________________________ ANS:F, bomb PTS:1 14. Sniffers often work on TCP/IP networks, where they’re sometimes called packet sniffers. _________________________ ANS:TPTS:1 15. A(n) cookie can allow an attacker to collect information on how to access password-protected sites. ________________________ ANS:TPTS:1 MULTIPLE CHOICE 1. Which of the following functions does information security perform for an organization?a. Protecting the organization’s ability to function.b. Enabling the safe operation of applications implemented on the organization’s IT systems.c. Protecting the data the organization collects and uses.d. All of the above.ANS:DPTS:1 2. ____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.a. SSLb. PKIc. PKCd. SISANS:BPTS:1 3. ____ are software programs that hide their true nature, and reveal their designed behavior only when activated.a. Virusesb. Wormsc. Spamd. Trojan horsesANS:DPTS:1 4. Which of the following is an example of a Trojan horse program?a. Netskyb. MyDoomc. Klezd. Happy99. exeANS:DPTS:1 5. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____.a. false alarmsb. power faultsc. hoaxesd. urban legendsANS:CPTS:1 6. Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.a. SSLb. SLAc. MSLd. MINANS:BPTS:1 7. Complete loss of power for a moment is known as a ____.a. sagb. faultc. brownoutd. blackoutANS:BPTS:1 8. Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.a. bypassb. naturec. trespassd. securityANS:CPTS:1 9. There are generally two skill levels among hackers: expert and ____.a. noviceb. journeymanc. packet monkeyd. professionalANS:APTS:1 10.One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.a. hacktivistb. phvistc. hackcyberd. cyberhackANS:APTS:1 11. According to Mark Pollitt, ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.a. infoterrorismb. cyberterrorismc. hackingd. crackingANS:BPTS:1 12. ___ is any technology that aids in gathering information about a person or organization without their knowledge.a. A botb. Spywarec. Trojand. WormANS:BPTS:1 13. The ____ data file contains the hashed representation of the user’s password.a. SLAb. SNMPc. FBId. SAMANS:DPTS:1 14. In a ____ attack, the attacker sends a large number of connection or information requests to a target.a. denial-of-serviceb. distributed denial-of-servicec. virusd. spamANS:APTS:1 15. A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.a. denial-of-serviceb. distributed denial-of-servicec. virusd. spamANS:BPTS:1 16. ____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.a. Dronesb. Helpersc. Zombiesd. ServantsANS:CPTS:1 17. In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.a. zombie-in-the-middleb. sniff-in-the-middlec. server-in-the-middled. man-in-the-middleANS:DPTS:1 18.The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.a. WWWb. TCPc. FTPd. HTTPANS:BPTS:1 19. â€Å"4-1-9† fraud is an example of a ____ attack.a. social engineeringb. virusc. wormd. spamANS:APTS:1 20. Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4. 0, the browser will crash.a. 64b. 128c. 256d. 512ANS:CPTS:1 COMPLETION 1. A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset. ANS:threat PTS:1 2. Duplication of software-based intellectual property is more commonly known as software ____________________. ANS:piracy PTS:1 3. A computer virus consists of segments of code that perform ____________________ actions. ANS:malicious PTS:1 4. A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment. ANS:worm PTS:1 5. A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.ANS:back PTS:1 6. A momentary low voltage is called a(n) ____________________. ANS:sag PTS:1 7. Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________. ANS:intelligence PTS:1 8. When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial ____________________. ANS:espionage PTS:1 9. The expert hacker sometimes is called ____________________ hacker. ANS:elite PTS:1 10.Script ____________________ are hackers of limited skill who use expertly written software to attack a system. ANS:kiddies PTS:1 11. A(n) ____________________ hacks the public telephone network to make free calls or disrupt services. ANS:phreaker PTS:1 12. ESD means electrostatic ____________________. ANS:discharge PTS:1 13. A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system. ANS:attack PTS:1 14. A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective. ANS:vulnerability PTS:1 15. Attempting to reverse-calculate a password is called ____________________. ANS:cracking PTS:1 16. ____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host. ANS:Spoofing PTS:1 17. ____________________ is unsolicited commercial e-mail. ANS:Spam PTS:1 18. In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.ANS:social engineering PTS:1 19. The timing attack explores the contents of a Web browser’s ____________________. ANS:cache PTS:1 20. A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle. ANS: buffer overrun buffer overflow PTS:1 ESSAY 1. List at least six general categories of threat. ANS: Compromises to intellectual property : piracy, copyright infringement Software attacks : viruses, worms macros, denial of service Deviations in quality of service : ISP, power, or wan service issues from service providers Espionage or trespass : unauthorized access and /or data collection Sabotage or vandalism : destruction of system or information Forces of nature Human error or failure Information extortion Missing, inadequate, or incomplete Missing, inadequate, or incomplete controls Theft Technical hardware failures or errors Technical software failures or errors Technological obsolescence PTS:1 2. Describe viruses and worms. ANS: A computer virus consists of segments of code that perform malicious actions. The code attaches itself to the existing program and takes control of that program’s access to the targeted computer. The virus-controlled target program then carries out the virus’s plan, by replicating itself into additional targeted systems. A worm is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. PTS:1 3. Describe the capabilities of a sniffer. ANS:A sniffer is a program or device that can monitor data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. Unauthorized sniffers can be extremely dangerous to a network’s security, because they are virtually impossible to detect and can be inserted almost anywhere. Sniffers often work on TCP/IP networks, where they’re sometimes called packet sniffers. A sniffer program shows all the data going by, including passwords, the data inside files and screens full of sensitive data from applications. PTS:1

Sunday, September 29, 2019

Eight Elvises Essay

Following the times of the middle 1950’s Abstract Expressionism sparked an interest for Andy Warhol, and during the 60’s Andy, and Roy Lichtenstein created a new realism of America. This new realism was called Pop Art which expressed daily life in America as it was being lived. Warhol was born in 1928 as Andy Warhola, he grew up with a curiosity in commercials, and after a very successful life he became the main figure associated with Pop Art. His art is some of the most well known art of all time, and he is considered one of the best artists of all time, his greatest painting was done on canvas in 1963 called the Eight Elvises and is worth one hundred million dollars, which this amount is in the likes of Jackson Pollock, and Pablo Picasso’s work. Andy Warhol has many accomplishments during his life, and he was inspired by many different people and things. His talent led him to many opportunities including movies and artwork. Growing up Warhol was diagnosed with chorea which is a disease of the nervous system that causes movements that are involuntary. This disease is correlated with scarlet fever, causing Andy to grow up primarily bed-ridden, and this is where he listened to the radio and collected pictures of movie stars which helped him gain his own personality and attributes. After his struggle he spent his time at Carnegie School of Fine Arts Institute in Pittsburgh, he studied hard and showed his artistic capability early while he studied commercial art. Warhol was quickly offered a position in New York drawing advertisements for a shoe company. This is where his whimsical colors started to be portrayed in his drawings of those shoes. While working with the shoe company he was recruited to illustrate the vinyl album covers for band by record labels who at the time were booming with musical talent. In 1952, while Warhol was doing shoe art he was also doing his own art on the side. He wanted to show his early work to the public, so after pitching his idea he got his first art show in New York at the Hugo Gallery. All of his works during these times are very interesting to me, because he used his art to represented life as it was in America every day. Warhol took these everyday things as simple as Campbell’s soup cans, or Coke Cans and turned them into monumental items in America’s life. These items sell over 3 million products a day; these companies’ should be thanking Andy for making their business boom Worldwide. Warhol stated â€Å"You can be watching TV and see Coca-Cola, and you know that the President drinks Coca-Cola, Liz Taylor drinks Coca-cola, and just think, you can drink Coca-Cola, too† (Art). This art of the soups and cokes form analytic lines the way he stacks cans precisely and mathematically as he draws, which takes extreme precision and measurement on his part to make sure that everything is straight and perfect. After these paintings were produced, Warhol began getting very well known in the New York art world. This art led him to moving on to what was called â€Å"The Factory† where many creative minds ranging from actors, writers, musicians, and other artists would drop by and lend their inspiration. The Factory† is where Andy let his ability shine, he decided to get rid of a difference between high and low art, and make known that art can be found anywhere. High art being art that has history and low art being art that has no history, but Andy wanted to clear high and low all together. Warhol liked the factory because it had a crazy atmosphere that fit his life style. He produced all of his work during the time at factory while he was working there. Including in 1963 piece that had the most impact on me which was the silkscreen painting Eight Elvises because the unusual thing about this silkscreen is that it is unique. Warhol had many other silkscreen’s that were produced sometimes in the hundreds, and Warhol only made one Eight Elvises. This 12 ft canvas shows from left to right Elvis in cowboy attire with his gun drawn in his right hand with seven repeat images on the left of his body finishing off with a full body view with left hand in sight as his body fades away. Warhol was known as a primary visual artist and this art is an example of that. Silkscreen is a stencil method of printmaking in which a design is imposed on a screen of silk or other fine mesh, with blank areas coated with an impermeable substance, and ink is forced through the mesh onto the printing surface. Warhol did not bother to clean up the imperfections of the print including slips of the screen, uneven inkings of the roller, and general graininess. I believe that this artwork and the artists represent America because Warhol used American icons such as items and faces to secure a place for these in history. For these reasons this is why I have chosen this artwork. I like that he used a popular person Elvis and put his pop art twist on him turning him into eight western Elvises ready to draw his weapon, I think this means that he is a dependable hero for America to lean on. Warhol uses high and low art through his artwork giving it a desirable product. During the sixties his art was very distinct and powerful which in turn Warhol gained mass popularity, and people that had known him had been driven away from him due to his success. In 1968 a woman that worked for Warhol on occasion found him and shot him in the stomach, stating that â€Å"He had to much control over my life† (Art). He survived the gunshot, but was injured horribly and was required to wear a bandage on his stomach for the rest of his life. After this incident Warhol returned to the art world creating some more of my favorite art because of the way that he uses colors on the faces of American icons such as Marilyn Monroe, Mr. and Mrs. JFK, even Jimmy Carter, Mick Jagger, and Elvis. After the assassination attempt he also began publishing a magazine called â€Å"Interview† which is still published today. This magazine was dubbed as â€Å"The Crystal Ball of Pop (Interview. com) due to Warhol’s style of running the magazine, Andy would take pictures of famous people or items and by adding his color schemes he would make the entire magazine look like his art. A portion of this magazine is still dedicated to Andy’s style of work. His hard work ethic led him to many art shows getting his work extensively in museums and galleries around the world until he died during a gall bladder procedure that was deemed a safe procedure. His work of almost forty years has secured his position as one of the most influential talents of all time, and one of the greatest artists in the world. Warhol grew up with tough conditions leading to his confused life and very awkward personality type, these factors contributed to his choice of being a homosexual and his ambition of wanting to only make rich people richer by putting their pictures in the art world for more people to look at this is why he did so many self portraits. He wanted everyone to remember what he did and to this day I would say he made a big impact.

Saturday, September 28, 2019

Thesis Example

enjoy!!! :]]] EFFECTS OF ILLEGAL ABORTION A Research Paper Presented to Ms. Rivera RAMON MAGSAYSAY (CUBAO) HIGH SCHOOL Ermin Garcia St. Cor. EDSA Cubao Quezon City In partial fulfillment of the requirement of English IV By: Rowena Louise V. Eustaquio IV-Scarlet ii APPROVAL SHEET This research entitled â€Å"Effects of Illegal Abortion† was prepared by Rowena Louise V. Eustaquio and hereby submitted for approval. ————————————————- Approved with a grade of ______ on _____________________. ————————————————- Accepted as partial fulfillment for English IV. iiiACKNOWLEDGEMENT I liked to thank God for finishing this Research paper because without the guidance of Him I can’t finish this. I thank my parents for supporting me for the time I used of our compute r to do some research about my topic. I thank my brothers and sisters for helping me when I need them to buy something for me. Especially I liked to thank to my Kuya Leeran because he gave me yellow pad papers for my draft. I liked to thank the librarian of RMCHS because of letting me to borrow the encyclopedias for I have to Xerox it, and also I liked to thank the RMCHS library for giving me some source for my research.I would like to thank Christine Pedrasita for her companion with me when I need to go to the library. I liked to thank Ms. Rivera for giving us this project. She gave us this project so that we are challenge to go to the library and how to use it and so that we can have time management because of hectic schedule. Thank you very much!!! –The Researcher— iv TABLE OF CONTENTS Title page †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦ ii Approval Sheet †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iii Acknowledgement †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iv Table of Contents †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v CHAPTER 1 A.Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 B. History / Background†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7 C. Limitation of Study †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 D. Purpose of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 E. Thesis Statement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 F. Definition of Terms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 11-12 CHAPTER 2 A. Review of Related Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13 Types†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13-14 Methods†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14-16 Abortion Law†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 16-17 Effects of Abortion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 17-18 A List of Major Physical Sequelae Related to Abortion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8-20 Footnotes†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 CHAPTER 3 A. Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 21 B. Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 C. Recommendation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 23 CHAPTER 4 A. Bibliography†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 B. Sample Survey†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 25 C. Permit†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 D. Curriculum Vitae†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 27 V CHAPTER 1 A. INTRODUCTION If you beco me pregnant at the age of 16, what would you do to your baby? Will you give birth or will kill your baby because you are too young to take care of a baby or to become a mother?Killing your baby is not an answer to this problem, even if it is just weeks old or a month young old, because it is not right to kill a human being it is in the Ten Commandments. I want to introduce to you my topic for this research paper. Abortion. I chose this topic because I want to give more information about abortion like the effects of it and why it was discovered. Enjoy learning! B. HISTORY/BACKGROUND Abortion was said that no one invented it, it was just discovered by physicians who were experimenting about the Hippocratic Oath in Ancient Greece, forbade doctors from helping to procure an abortion by pessary. 1) It began on 1800’s when laws forbid the act after 16 weeks of conception. In 1900’s many women was still using it even if it was at risk because of the different procedures that can affect to their health. It became legal in 1973 by the supreme court. (2) But still many countries are saying that abortion is illegal so other countries said to their law that abortion is illegal. There are many people knew about abortion but they have different ways and in different beliefs about it. And many women are still use and do it in different procedures. ________________________________ 1. http://en. ikipedia. org/wiki/Abortion#History 2. http://www. chritianet. com/abortionfacts/historybackgroundofabortion. htm C. LIMITATION OF THE STUDY This research paper only talks about the effect of illegal abortion only. This research is only for the people of the Philippines who wanted to know more or to learn more about abortion. This is to inform you want are the things you really want to learn about abortion. D. PURPOSE OF THE STUDY My purpose of choosing this topic for a research paper is because I really want to know more about abortion and I want to know why someone inve nted it or discovered it.Nevertheless, I want to inform all the people what are the good and especially the bad effects of it and why should we be informed about it. E. THESIS STATEMENT Many people, most of them were women teenagers, those were became pregnant early in a young age, use this kind of procedure so that they can not take the tasks as a young adult mother. They are thinking that this is just a easy thing and pregnancy is just a joke or a play but they are wrong. I want to prove from this research that abortion is not an answer to our problem of being pregnant so young because we are not ready for this situation.If you are pregnant you should be prepared and be proud because God gave you a child. F. DEFINITION OF TERMS ABORTION – any of various surgical methods for terminating a pregnancy, especially during the first 6 months. EUTHANASIA – also called mercy killing the act of putting to death painlessly or allowing to die. SACROSANCT – extremely sacre d or inviolable CONTRACEPTION – the deliberate prevention of conception or impregnation by any of various drugs EPIDEMIOLOGIC – of or relating to epidemiologySONOGRAPHY – a diagnostic imaging technique utilizing reflected high-free body sound waves to delineate, measures or examine internal body structures or organs AMNIOCENTESIS – a surgical procedure for obtaining a sample of amniotic sac in the uterus of a pregnant woman by inserting a hallow needle through the abdominal wall, used in diagnosing certain genetic defects or possible obstetric complications PREMATURE BIRTH – the birth of an infant after the period of viability but before full term ABORTIFACIENT – a drug or device used to cause abortionTANSY – any of several composite plants of the genus tanacetum, especially a strong-scented, weedy, old world herb CONTRACEPTIVE – tending or serving to prevent conception or impregnation PESSARY – a device worn in the  v agina to support a displaced uterus. GYNAECOLOGY – the branch of medicine concerned with diseases in women, esp those of the genitourinary tract PERFORATION – a hole, or one of a series of holes, bored or punched through something, as those between individual postage stamps of a sheet to facilitate separation.PENNYROYAL – an aromatic Old world  plant, Mentha pulegium,   of the  mint family, having clusters of small purple flowers  and yielding a pungent essential oil used medicinally and as an insect repellent. MENSTRUAL – of or pertaining to menstruation or to the  menses PHYSICIAN – a person who  is legally qualified to practice medicine; doctor of medicine. EMBRYO – the young of a viviparous animal, especially of a mammal, in the  early stages of development within the womb, in humans up to the end of the second month. Compare fetus.MENSTRUATION – the periodic discharge of blood and mucosal tissue from the  uterus, occurring approximately monthly from puberty  to menopause  in nonpregnant women  and females of other primate species. FETUS – the  young of an animal in the womb or egg, especially in the later stages of development when the body structures are in the recognizable form of its kind, in humans after the end of the second month of gestation INVOKED – to call for with earnest desire; make supplication or pray for UNSCRUPULOUS – not scrupulous; unrestrained by scruples; conscienceless; unprincipled.MORBIDITY – the proportion of sickness or of a specific disease in a geographical locality. CHAPTER 2 A. REVIEW OF RELATED LITERATURE Abortion is the expulsion of a fetus from the uterus before it has reached the stage of viability (in human beings, usually about the 20th week of gestation). An abortion may occur spontaneously, in which case it is also called a miscarriage, or it may be brought on purposefully, in which case it is often called an induced a bortion. Spontaneous abortions or miscarriage, may be caused by a number of factors, including disease, trauma, or genetic biochemical incompatibility of mother on fetus.Occasionally a fetus dies in the uterus but fails to be expelled; this condition is termed a missed abortion. Induced abortions may be performed for reasons that fall into four general categories to preserve the life or physical or mental well-being of the mother; to prevent the completion of a pregnancy that has resulted from rape or incest; to prevent the birth of a child with a serious deformity, mental deficiency, or genetic abnormality; or to exercise birth control, that is to keep from having a child for social or economic reasons.Abortions performed for any of the reasons in the first two categories are often termed therapeutic or justifiable abortions. Numerous medical techniques exist for performing abortions. During the first trimester (up to about 12 weeks after conception) eurettage or suction may be use d to contents of the uterus. From 12 to 19 weeks the injection of saline solution may be used to trigger uterine contractions; alternatively, the administration of prostaglandins by injection, suppository, or other method may be used to induce contractions, but these substances may cause severe side effects.Hysterotomy, the surgical removal of the uterine contents, may be used during the second trimester or later. In general, the more advanced the pregnancy the greater the risk of mortality or serious complications following an abortion. (1) TYPES Induced A 10-week-old fetus removed via a therapeutic abortion from a 44-year-old woman diagnosed with early-stage uterine cancer. The uterus (womb), included the fetus. A pregnancy can be intentionally aborted in many ways. The manner selected depends chiefly upon the gestational age of the embryo or fetus, which increases in size as the pregnancy progresses.Specific procedures may also be selected due to legality, regional availability, and doctor-patient preference. Reasons for procuring induced abortions are typically characterized as either therapeutic or elective. An abortion is medically referred to as a therapeutic abortion when it is performed to: * save the life of the pregnant woman; * preserve the woman's physical or mental health; * terminate pregnancy that would result in a child born with a congenital disorder that would be fatal or associated with significant morbidity; or * selectively reduce the number of fetuses to lessen health risks associated with multiple pregnancy.An abortion is referred to as elective when it is performed at the request of the woman â€Å"for reasons other than maternal health or fetal disease. † (2) Spontaneous Spontaneous abortion (also known as miscarriage) is the expulsion of an embryo or fetus due to accidental trauma or natural causes before approximately the 22nd week of gestation; the definition by gestational age varies by country. Most miscarriages are due to incorrect replication of chromosomes; they can also be caused by environmental factors. A pregnancy that ends before 37 weeks of gestation resulting in a live-born infant is known as a â€Å"premature birth†.When a fetus dies in utero after about 22 weeks, or during delivery, it is usually termed â€Å"stillborn†. Premature births and stillbirths are generally not considered to be miscarriages although usage of these terms can sometimes overlap. Between 10% and 50% of pregnancies end in clinically apparent miscarriage, depending upon the age and health of the pregnant woman. Most miscarriages occur very early in pregnancy, in most cases, they occur so early in the pregnancy that the woman is not even aware that she was pregnant. One study testing hormones for ovulation and pregnancy found that 61. % of conceptuses were lost prior to 12 weeks, and 91. 7% of these losses occurred subclinically, without the knowledge of the once pregnant woman. The risk of spontaneous ab ortion decreases sharply after the 10th week from the last menstrual period (LMP). One study of 232 pregnant women showed â€Å"virtually complete [pregnancy loss] by the end of the embryonic period† (10 weeks LMP) with a pregnancy loss rate of only 2 percent after 8. 5 weeks LMP. The most common cause of spontaneous abortion during the first trimester is chromosomal abnormalities of the embryo/fetus, accounting for at least 50% of sampled early pregnancy losses.Other causes include vascular disease (such as lupus), diabetes, other hormonal problems, infection, and abnormalities of the uterus. Advancing maternal age and a patient history of previous spontaneous abortions are the two leading factors associated with a greater risk of spontaneous abortion. [14] A spontaneous abortion can also be caused by accidental trauma; intentional trauma or stress to cause miscarriage is considered induced abortion or feticide. (2) METHODS Medical â€Å"Medical abortions† are non-sur gical abortions that use pharmaceutical drugs. As of 2005, medical abortions constitute 13% of all abortions in the United States.Combined regimens include methotrexate or mifepristone, followed by a prostaglandin (either misoprostol or gemeprost: misoprostol is used in the U. S. ; gemeprost is used in the UK and Sweden. ) When used within 49 days gestation, approximately 92% of women undergoing medical abortion with a combined regimen completed it without surgical intervention. [17] Misoprostol can be used alone, but has a lower efficacy rate than combined regimens. In cases of failure of medical abortion, vacuum or manual aspiration is used to complete the abortion surgically. (3) SurgicalIn the first 12 weeks, suction-aspiration or vacuum abortion is the most common method. [18] Manual vacuum aspiration (MVA) abortion consists of removing the fetus or embryo, placenta and membranes by suction using a manual syringe, while electric vacuum aspiration (EVA) abortion uses an electric pump. These techniques are comparable, and differ in the mechanism used to apply suction, how early in pregnancy they can be used, and whether cervical dilation is necessary. MVA, also known as â€Å"mini-suction† and â€Å"menstrual extraction†, can be used in very early pregnancy, and does not require cervical dilation.Surgical techniques are sometimes referred to as ‘Suction (or surgical) Termination Of Pregnancy' (STOP). From the 15th week until approximately the 26th, dilation and evacuation (D;E) is used. D;E consists of opening the cervix of the uterus and emptying it using surgical instruments and suction. Dilation and curettage (D;C), the second most common method of surgical abortion, is a standard gynecological procedure performed for a variety of reasons, including examination of the uterine lining for possible malignancy, investigation of abnormal bleeding, and abortion.Curettage refers to cleaning the walls of the uterus with a curette. The World H ealth Organization recommends this procedure, also called sharp curettage, only when MVA is unavailable. Other techniques must be used to induce abortion in the second trimester. Premature delivery can be induced with prostaglandin; this can be coupled with injecting the amniotic fluid with hypertonic solutions containing saline or urea. After the 16th week of gestation, abortions can be induced by intact dilation and extraction (IDX) (also called intrauterine cranial decompression), which requires surgical decompression of the fetus's head before evacuation.IDX is sometimes called â€Å"partial-birth abortion,† which has been federally banned in the United States. A hysterotomy abortion is a procedure similar to a caesarean section and is performed under general anesthesia. It requires a smaller incision than a caesarean section and is used during later stages of pregnancy. The Royal College of Obstetricians and Gynaecologists has recommended that an injection be used to sto p the fetal heart during the first phase of the surgical abortion procedure to ensure that the fetus is not born alive. (3) Other methods Bas-relief at Angkor Wat, Cambodia, c. 150, depicting a demon inducing an abortion by pounding the abdomen of a pregnant woman with a pestle. Historically, a number of herbs reputed to possess abortifacient properties have been used in folk medicine: tansy, pennyroyal, black cohosh, and the now-extinct silphium (see history of abortion). The use of herbs in such a manner can cause serious—even lethal—side effects, such as multiple organ failure, and is not recommended by physicians. Abortion is sometimes attempted by causing trauma to the abdomen. The degree of force, if severe, can cause serious internal injuries without necessarily succeeding in inducing miscarriage.Both accidental and deliberate abortions of this kind can be subject to criminal liability in many countries. In Southeast Asia, there is an ancient tradition of attemp ting abortion through forceful abdominal massage. One of the bas reliefs decorating the temple of Angkor Wat in Cambodia depicts a demon performing such an abortion upon a woman who has been sent to the underworld. Reported methods of unsafe, self-induced abortion include misuse of misoprostol, and insertion of non-surgical implements such as knitting needles and clothes hangers into the uterus.These methods are rarely seen in developed countries where surgical abortion is legal and available. (3) ABORTION LAW East Country| To protect woman's life| Physical health| Mental health| Rape| Fetal defects| Socio-economic factors| On request|   Brunei| Yes| No| No| No| No| No| No| Cambodia| Yes| Yes| Yes| Yes| Yes| Yes| Yes| China| Yes| Yes| Yes| Yes| Yes| Yes| Yes| Hong Kong [9][10]| Yes| 2nd (up to 24 weeks)| 2nd (up to 24 weeks)| 2nd (up to 24 weeks)| 2nd (up to 24 weeks)| No| No|   Indonesia| Yes| No| No| No| No| No| No| Japan (details)| Yes| Yes| Yes| Yes| Yes| Yes| Yes (de facto under socio-economic factors)|   People's Dem.Rep. of (North) Korea| Yes| Yes| Yes| Yes| Yes| Yes| Yes|   Republic of (South) Korea [11]| Yes| Yes| Yes| Yes| No| No| No (but illegal abortions, in this regard, are not punished)|   Laos| No| No| No| No| No| No| No| Malaysia| 1st| 1st| 1st| No| No| No| No| Mongolia| Restricted| Restricted| 1st| 1st| 1st| 1st| 1st|   Myanmar| Yes| No| No| No| No| No| No| Philippines (details)| Yes| No| No| No| No| No| No|   Singapore| Yes| Yes| Yes| Yes| 2nd| Yes| Yes| Thailand| Yes| Yes| Yes| Yes| No| No| No| Taiwan| Yes| Yes| Yes| Yes| Yes| Yes| Law is unclear| Yes| Yes| Yes| Yes| Yes| Yes| Yes| | | | | | | EFFECTS OF ABORTION (ILLEGAL AND LEGAL) The effects of abortion could be either physical or emotional and they will range with each woman who experienced this procedure. It may be difficult to tell beforehand who is at greater or lesser risk for such effects, and the fact that abortion is legal in most places certainly reduces risk of phy sical complication. That being said, there can be complications to this procedure of a physical and emotional nature, and it is wise to understand any possible risk factors. Right after an abortion, women may feel some soreness and cramping.This, and possibly bleeding from the procedure, which is generally no heavier than menstrual bleeding, may last for several weeks. Some women also experience stomach upset that can take the form of vomiting or simply nausea. These tend to be normal after effects of abortion, but if women feel concerned they should contact their doctor or the clinic where the procedure was performed. Sometimes complications do arise after an abortion, though risk of this is low. Women should watch in the first few weeks for signs or very heavy bleeding, fever, severe pain in the pelvis or severe stomach pain.These signs might suggest dangerous infection or hemorrhage and need immediate medical care. In extremely rare instances, death does occur during or after an abortion, but risk of this is about on par with risk of death during childbirth. There are also emotional effects of abortion, which do exist and need to be noted and looked for. Of these, the most significant is the development of postpartum depression. Postpartum depression is a risk any time a pregnancy ends, at any stage and no matter how. The body can respond by becoming deeply depressed as pregnancy hormones rapidly fall.What this would suggest for most women seeking an abortion is that they have a strong support system; this could be the help of friends, group support, work with a counselor, or a supportive family. Isolation after an abortion tends to increase risk for serious depression, and the circumstances under which a woman gets an abortion may also make depression more or less likely. Those who feel conflicted about the decision or must keep it secretive may suffer more. (5) Other emotional effects of abortion exist. Some people feel guilt, while others feel relief.Wit hout full-blown post-partum depression, some women may still feel tearful, moody, or simply endure a difficult emotional ride during the first few weeks to several months after abortion. Again, not all women have this experience, but some do. Understanding the effects of abortion allows women to make informed choices. There are strong arguments for and against this procedure, and people on both sides of this issue may frequently hold up one or two of the effects as a reason for or against having an abortion.What is most important is that effects be neither aggrandized nor minimized. It is important for anyone who faces this decision to understand effects clear of taint of a political position. (5) A LIST OF MAJOR PHYSICAL SEQUELAE RELATED TO ABORTION DEATH: The leading causes of abortion related deaths are hemorrhage, infection, embolism, anesthesia, and undiagnosed ectopic pregnancies. Legal abortion is reported as the fifth leading cause of maternal death in the United States, tho ugh in fact it is recognized that most abortion related deaths are not officially reported as such. 6) BREAST CANCER: The risk of breast cancer almost doubles after one abortion, and rises even further with two or more abortions. (6) CERVICAL, OVARIAN, AND LIVER CANCER: Women with one abortion face a 2. 3 relative risk of cervical cancer, compared to non-aborted women, and women with two or more abortions face a 4. 92 relative risk. Similar elevated risks of ovarian and liver cancer have also been linked to single and multiple abortions. These increased cancer rates for post-aborted women are apparently linked to the unnatural disruption of the hormonal changes which accompany pregnancy and untreated cervical damage. 6) UTERINE PERFORATION: Between 2 and 3% of all abortion patients may suffer perforation of their uterus, yet most of these injuries will remain undiagnosed and untreated unless laparoscopic visualization is performed. Such an examination may be useful when beginning an abortion malpractice suit. The risk of uterine perforation is increased for women who have previously given birth and for those who receive general anesthesia at the time of the abortion. (6) Uterine damage may result in complications in later pregnancies and may eventually evolve into problems which require a ysterectomy, which itself may result in a number of additional complications and injuries including osteoporosis. (6) CERVICAL LACERATIONS: Significant cervical lacerations requiring sutures occur in at least one percent of first trimester abortions. Lesser lacerations, or micro fractures, which would normally not be treated may also result in long term reproductive damage. Latent post-abortion cervical damage may result in subsequent cervical incompetence, premature delivery, and complications of labor.The risk of cervical damage is greater for teenagers, for second trimester abortions, and when practitioners fail to use laminaria for dilation of the cervix. (6) PLACENTA PRE VIA: Abortion increases the risk of placenta previa in later pregnancies (a life threatening condition for both the mother and her wanted pregnancy) by seven to fifteen fold. Abnormal development of the placenta due to uterine damage increases the risk of fetal malformation, perinatal death, and excessive bleeding during labor. (6)HANDICAPPED NEWBORNS IN LATER PREGNANCIES: Abortion is associated with cervical and uterine damage which may increase the risk of premature delivery, complications of labor and abnormal development of the placenta in later pregnancies. These reproductive complications are the leading causes of handicaps among newborns. (6) ECTOPIC PREGNANCY: Abortion is significantly related to an increased risk of subsequent ectopic pregnancies. Ectopic pregnancies, in turn, are life threatening and may result in reduced fertility. 6) PELVIC INFLAMMATORY DISEASE (PID): PID is a potentially life threatening disease which can lead to an increased risk of ectopic pregnancy a nd reduced fertility. Of patients who have a chlamydia infection at the time of the abortion, 23% will develop PID within 4 weeks. Studies have found that 20 to 27% of patients seeking abortion have a chlamydia infection. Approximately 5% of patients who are not infected by chlamydia develop PID within 4 weeks after a first trimester abortion. It is therefore reasonable to expect that abortion providers should screen for and treat such infections prior to an abortion. 6) ENDOMETRITIS: Endometritis is a post-abortion risk for all women, but especially for teenagers, who are 2. 5 times more likely than women 20-29 to acquire endometritis following abortion. (6) IMMEDIATE COMPLICATIONS: Approximately 10% of women undergoing elective abortion will suffer immediate complications, of which approximately one-fifth (2%) are considered life threatening. The nine most common major complications which can occur at the time of an abortion are: infection, excessive bleeding, embolism, ripping or perforation of the uterus, anesthesia complications, convulsions, hemorrhage, cervical injury, and endotoxic shock.The most common â€Å"minor† complications include: infection, bleeding, fever, second degree burns, chronic abdominal pain, vomiting, gastro-intestinal disturbances, and Rh sensitization. (6) INCREASED RISKS FOR WOMEN SEEKING MULTIPLE ABORTIONS: In general, most of the studies cited above reflect risk factors for women who undergo a single abortion. These same studies show that women who have multiple abortions face a much greater risk of experiencing these complications. This point is especially noteworthy since approximately 45% of all abortions are for repeat aborters. 6) INCREASED RISKS FOR TEENAGERS: Teenagers, who account for about 30 percent of all abortions, are also at much high risk of suffering many abortion related complications. This is true of both immediate complications, and of long-term reproductive damage. (6) LOWER GENERAL HEALTH: In a survey of 1428 women researchers found that pregnancy loss, and particularly losses due to induced abortion, was significantly associated with an overall lower health. Multiple abortions correlated to an even lower evaluation of â€Å"present health. While miscarriage was detrimental to health, abortion was found to have a greater correlation to poor health. These findings support previous research which reported that during the year following an abortion women visited their family doctors 80% more for all reasons and 180% more for psychosocial reasons. The authors also found that â€Å"if a partner is present and not supportive, the miscarriage rate is more than double and the abortion rate is four times greater than if he is present and supportive. If the partner is absent the abortion rate is six times greater. (6) INCREASED RISK FOR CONTRIBUTING HEALTH RISK FACTORS: Abortion is significantly linked to behavioral changes such as promiscuity, smoking, drug abuse, and eating disorders which all contribute to increased risks of health problems. For example, promiscuity and abortion are each linked to increased rates of PID and ectopic pregnancies. Which contributes most is unclear, but apportionment may be irrelevant if the promiscuity is itself a reaction to post- abortion trauma or loss of self esteem. (6) ————————————————- 1. AbortionBritannica Encyclopedia Encyclopedia Britannica, Inc. , 1974-1990 Vol. 1 page 37 1a 2. http://en. wikipedia. org/wiki/Abortion#Types 3. http://en. wikipedia. org/wiki/Abortion#Methods 4. http://en. wikipedia. org/wiki/Abortion_law#East 5. http://www. wisegeek. com/? what-are-the-effects-abortion. html 6. http://www. abortionfacts. com/reardon/effect_of_abortion. asp CHAPTER 3 A. SUMMARY Abortion is a surgical method for terminating a pregnancy, especially during the first 6 months. It has many reasons like because of earl y pregnancy, pregnancy and rape or incest by accident.Women are very careless today because they knew that they can handle it, but they’re wrong. There are two types of abortion, one is spontaneous but also known as miscarriage, it is the expulsion of an embryo or fetus due to accidental trauma or natural causes before approximately the 22nd week of gestation. The other one is induced abortion, is a therapeutic abortion, it is performed when the mother was raped and to preserve the life of physical or mental well-being of the mother. There are two methods of abortion.One is the medical method, they use pharmaceutical drugs so that the womb will be aborted. The other one is the surgical procedure, they use the suction aspiration or they will suck the blood or the embryo so that the fetus is smashed and can not live anymore. In the Philippines, many use medical but sometimes they do not use it because you will go to the hospital and then you will buy expensive drugs. Sometimes Filipinas who abort their child uses the procedure of sucking them but not doing it in the right place, right time and right medical instruments.The procedure they used is very illegal here in the Philippines and especially very dangerous especially to the woman who is carrying the child, it is prohibited against the law in our country. Sometimes woman who aborted their child when it was just a fetus, they just leave it in the trash bags and throw it away in the river and creeks. Here are some effects of illegal abortion: DEATH- many women die because of hemorrhage, infection, embolish, anesthesia and undiagnosed ectopic pregnancies. BREAST CANCER- the risk of breast cancer almost double after one abortion and rises even further with two or more abortions.UTERINE PERFORATION- all abortion patients may suffer perforation or their uterus, yet most of these injuries will remain undiagnosed and untreated unless laparoscopic visualization is performed. CERVICAL LACERATIONS- significant l acerations requiring structures occur on at least one percent of 1st trimester abortions. PLACENTA PREVIA- Abortion increases the risk of placenta previa in later pregnancies (a life threatening condition for both the mother and her wanted pregnancy) by seven to fifteen fold.Abnormal development of the placenta due to uterine damage increases the risk of fetal malformation, perinatal death, and excessive bleeding during labor. ECTOPIC PREGNANCY- are life threatening and may result in reduced fertility. ENDOMETRITIS- is a post-abortion risk for all women, but especially for teenagers. B. CONCLUSION Many women die everyday because of illegal abortion. Many babies too die because of abortion. I therefore conclude that any types and even the methods of abortion is illegal and bad because you are killing many human lives even if it is not yet living but still it is not right.Many effects of abortion may lead to infections or even death. In the Philippines many cases were listed about abo rtion that were illegal and many of them were not yet observe and the other cases were disapproved and been canceled. Women who had just done abortion just put their fetuses in the trash and just throw them away and never think about the life of the beings. C. RECOMMENDATION I recommend to the readers of this research paper is never use abortion because it is illegal and can lead many women to death.Killing a human being is never the answer to the problem of rape or early pregnancy because that is a gift from God and we should treasure it. If you don’t want to become pregnant you should take care of yourself. CHAPTER 4 A. BIBLIOGRAPHY http://en. wikipedia. org/wiki/Abortion#History Abortion Britannica Encyclopedia Encyclopedia Britannica, Inc. , 1974-1990 Vol. 1 page 37 1a http://en. wikipedia. org/wiki/Abortion#Types http://en. wikipedia. org/wiki/Abortion#Methods http://en. wikipedia. org/wiki/Abortion_law#East http://www. wisegeek. com/? what-are-the-effects-abortion. html http://www. bortionfacts. com/reardon/effect_of_abortion. asp http://www. chritianet. com/abortionfacts/historybackgroundofabortion. htm B. SAMPLE SURVEY NAME:__________________________ DATE:____________________ AGE:________ GENDER:_________________ DIRECTIONS: Check the box if your answer to the following questions is YES or NO. QUESTIONS| YES| NO| 1. Do you have knowledge about abortion? | | | 2. Are you aware of the abortion law? | | | 3. Do you agree about abortion? | | | 4.Do you agree that abortion should be illegal? | | | 5. Do you agree that abortion should be legal? | | | 6. Do you know someone that used abortion? | | | C. PERMIT Ramon Magsaysay (Cubao) High School Ermin Garcia St. Cor. EDSA Cubao, Quezon City Dr. Josefina T. Perlado Principal Ramon Magsaysay (Cubao) High School Ermin Garcia St. Cor. EDSA Cubao, Q. C Dear Madam, I would like to request from your good office to allow me to conduct a survey for the purpose of my research entitled â€Å"Effects of Illegal Ab ortion† of school year 2010-2011. This is in compliance with the requirements in English IV.Rest assured that the data would be treated with confidentially. Thank you very much! Respectfully Yours, __________________________ Rowena Louise V. Eustaquio Researcher Noted by: __________________ Ms. Rivera D. CURRICULUM VITAE NAME: Rowena Louise V. Eustaquio ADDRESS: 184 Ermin Garcia St. Cubao Quezon City BIRTH DATE: May 3, 1995 BIRTH PLACE: Marikina City CONTACT #: 09359623977 GENDER: Female CIVIL STATUS: Single CITIZENSHIP: Filipino RELIGION: Roman Cathoic MOTHER’S NAME: Lynn Anne V. Eustaquio OCCUPATION: Call Center ManagerFATHER’S NAME: Raul M. Eustaquio OCCUPATION: n/a SIBLINGS: 1. Lee Randolph V. Eustaquio 2. Liam Romeo v. Eustaquio 3. Regina Lorraine V. Eustaquio EDUCATIONAL BACKGROUND: ELEMENTARY ADDRESS SCHOOL YEAR Eulogio Rodriguez Sr. Elementary School Ermin Garcia St. 2001-2007 Cubao Q. C HIGH SCHOOL ADDRESS SCHOOL YEAR Ramon Magsaysay (Cubao) HS Ermin Ga rcia St. Cor 2007-2011 EDSA Cubao Q. C

Friday, September 27, 2019

Design a compnt IP network and equipment need, and subnet ip using Case Study

Design a compnt IP network and equipment need, and subnet ip using vlsm - Case Study Example The requirement and the budget are large since they depend on the large number of employees in every office. Requirement and Cost The project will require Web Development Company (WDC) to provide a list of items in two categories, hardware and software. The software includes original licensed applications and programs. The hardware in this context includes high quality workstation terminals. The Web Development Company (WDC) will require server systems with capacity for data storage and high-speed processor for the purpose of high performance. In the market, the cost depends on the decisions of the vendor. The budget of the project will be determined by the average costs after doing detailed market survey. The budget is as shown below: ITEM NUMBER PRICE FOR ONE ITEM TOTAL COST       US $ US $ Workstation 200 1500 300,000 Windows Server 7 1800 12,600 Unix Server 7 42000 294,000 Color Printer 100 300 30,000 Color Printers (High Volume) 7 500 3,500 Switch 7 300 2,100 Router 5 350 1, 750 Windows XP SP 3 200 100 20,000 Linux Red Hat  Release 3 7 18000 126,000 Windows Server 2012 8 500 4,000 Patch channel 5 300 1,500 NOD 32 Internet Security Antivirus 10 200 2,000 Firewall system 1 200 200 Installation Costs 1 150000 150,000 Total       947,650 The budget is within the provision of US $ 1,000,000, which the Web Development Company has set aside for the project. ... The IP address range applies to all hosts within the network. In the process of allocation of addresses, there has to be an allowance for enough IP addresses to enable the network to expand as the Web Design Company desires for the future. Each branch will have to provide additional host together with a new hosts whenever a new branch is being established. At the same time, each new branch will require point-to-point addresses. The architecture and the topology have to be designed in such a way that they support the mobile workers since they communicate through the Virtual Private Network (VPN) connections (Moussavi, 2011, p.56). Further to that, there is need to have additional IP addresses allocated to the other components of the network, for example, network photocopiers, scanners and printers. In every department, the average number of employees who will require using the printers, scanners and cameras is about 50. A minimum of one printer is required for every 50 employees in a department. Alternatively, the printers will be allocated to different web sites for each subnet. Some sites are extremely very small. It therefore means that they can only have one printer to serve the number of staff in that department. Such small sites include Hornsby and Penrith, which require just one printer and one photocopier. Some versions of photocopiers are of combined functions, having photocopier, with an inbuilt printer and scanner of high qualities. As required by the subnet naming, each printer and photocopier will get the last available number in the subnet range to which it belongs. Bandwidth Optimization Subnets will be used to separate the

Thursday, September 26, 2019

Strategic Financial Management 2 Coursework Example | Topics and Well Written Essays - 3000 words - 1

Strategic Financial Management 2 - Coursework Example Question one. Calculate the adjusted present value (APV) for the project, correcting any errors made in the net present value estimate above, and conclude whether the project should be accepted or not. Show all relevant calculations. (25 marks) Before any attempt should be made to prepare the adjusted present value of the proposed project, Rattle Co must carefully study how the given projected cash flow statement for four years was made, to know where some should remain because they are already correct or whether they need further adjustments. When the needed adjustments are known, the framework is established to do the same with each item in the prepared cash flows, asking whether it should be adjusted or not. Starting with the revenue, it appears that one critical issue would be whether it should be presented with inflation or net of inflation. The answer would depend on what discount rate is used. If the discount rate is with inflation, then the revenue must include the inflation. In the case facts, the inflation was given however, if the discount rate is used with the real rate, i.e. not the nominal one, then presenting the net of inflation of the inflation rate is the proper thing. The 8% inflation rate increase for revenues and 4% inflation rate increase for cost of sales become irrelevant. Working capital requirements appear not to be reflected in the given cash flow. These need to be determined, as they are a factor in any decision. A business cannot operate without working capital. Since the amount of working capital at the beginning of each year is 20% of the forecasted revenue per year, just multiply each given sales figure per year, then it is possible to generate a working capital requirement per year. As computed in the revised and adjusted projected cash flow in Appendix A, the working capital amounts come to  £4,606,000,  £7,320,000,  £9,814,000 and  £5,428,000 for

Incarcerations effects on families Term Paper Example | Topics and Well Written Essays - 2500 words

Incarcerations effects on families - Term Paper Example Now there is a new category for incarceration, debtors, even for very small debts. In a bid for increased corporate welfare, businesses in some states (Illinois, Georgia, Louisiana, Ohio, Washington, for example) enlist the police, sheriff, and court system to imprison those who owe money and are not paying it quickly enough. A recent news article told about the case of Lisa Lindsay, a breast cancer survivor who ignored a $280 medical bill she was told was in error and not owed. A collection agency got jurisdiction over it and Illinois state troopers took her to jail in handcuffs (Sherter, 2012). In more than one third of the states in America, many poverty-stricken seniors, veterans, mothers, fathers, and the unemployed have been locked up in prison for the flimsiest of reasons, being unable to settle even the tiniest of debts. The marginalized poor are being increasingly criminalized. It is not the assumption of this paper that incarceration is totally without merit. There are peop le whose thinking is so distorted and whose actions are so dangerous that society must be protected from victimization. On the other hand, a rapidly rising prison population, unrepresentative of socioeconomic and racial parameters of the general population, and in comparison to the incarceration/population ratios of other countries, suggests a possibility that the USA criminal justice system is failing to solve crime through incarceration, and is worsening the situation. Incarcerating a person who is found to have broken the law removes a single threat from the street, perhaps, but there are less visible outcomes this paper intends to consider. Incarcerated prisoners, on any given day, represent more than 500,000 families being impacted by incarceration (Hairston, 1991). Those families need to be strongly bonded and assisted by personal and community networks. Maintaining strong family ties has been found to support prisoner and family mental health, increase the probability that th e prisoner will have a family to return to after prison, and reduce the probability that the prisoner, once released, will have to return to prison for probation violations or other criminal activity (Hairston, 1991). In support of strengthening family ties, prisons are beginning to implement more generous family communication policies, marital and private family visits, children’s centers in the prison, and prison visitor hospitality houses. Families of prisoners are organizing to advocate for conditions and services that support prison families (Hairston, 1991). A lot more is needed, however, not only to provide a strong family network for the prisoner, but especially to counter the profound negative effects of incarceration on other members of the family. The effects of parent incarceration on children is a significant social issue because 56% of all state prisoners have minor children, and the majority of incarcerated adults are, in fact, state prisoners (Lengyel, 2006). Separation from an incarcerated father, the stigma attached to the incarceration, and deceptions played on the child around that incarceration have reportedly been associated with emergent aggressive and antisocial behavior, particularly in the sons of

Wednesday, September 25, 2019

Pennicillin process introduction Essay Example | Topics and Well Written Essays - 500 words

Pennicillin process introduction - Essay Example The process of purification of a product especially in a chemical producing plant involves a number of options, and examples of some options which may be involved where a product must be made very pure include:- Some down streaming operations seen in penicillin production chart are not involved in the actual production of penicillin. ( Biwer, Griffith, & Cooney, 2005).For instance, Neutralization is not involved at any stage in this production plant. This is because it will cause decrease in enzyme concentration which will lower the level of penicillin production. In conclusion, a consideration put in the following areas of weakness:-inadequate analytical techniques, simplistic models with assumptions, variance in signals and performance, inefficiencies in use of information, inefficient learning and financial constrains can lead to quality production of penicillin (Biwer, Griffith, & Cooney,

Tuesday, September 24, 2019

Canada and the Founding of The United Nation Essay

Canada and the Founding of The United Nation - Essay Example Prior to the formation of the United Nations, countries first organized themselves to address specific issues. One of the first organization prior to United States that was organized to address peace was the International Peace Conference that was held in 1899 in The Hague to put in place the mechanism on how to resolve crisis peacefully that would prevent wars from happening such as the previous world wars. Canada has been instrumental in the creation of United Nations being one of its founding members and has been an active participant and supporter since its beginnings. It was active not only in the primary role of UN to maintain peace and stability but also on other aspects such as supporting its drive to promote human rights, improving the administrative capability of UN and providing financial support to the institution. United Nations is created to prevent another world war to happen and to also collectively address global issues such as peace and security, climate change, food security and others. It was created after World War II where countries in ruin and wanted lasting peace. At present, UN has expanded its role from averting a world war and maintaining peace to addressing global issues in the 21st century. It has also became a major international platform for dialogue and negotiation not only in settling conflict and dispute but also in addressing other timely humanitarian concerns such as human rights and climate change. United Nation’s predecessor was the League of Nations which was created with similar intention as the International Peace Conference which was established in 1919 to prevent war and promote peace and security under the Treaty of Versailles. The League of Nations however was disbanded after it failed to prevent the Second World War from happening giving way to creation of United Nations after Second World War in 1945.

Monday, September 23, 2019

Analysis of Becoming Native by J. Lockwood Essay

Analysis of Becoming Native by J. Lockwood - Essay Example Lockwood is suggesting that is part of human nature to avoid change and generally fear situations or ideas that are unfamiliar or unknown. This is the first part of living backward where people tend to revert back to what they feel comfortable with rather than embracing new ideas, thoughts, or people. This is part of being held hostage to the past that is based in inherent biology rather than being more flexible and adaptive to changing surroundings. Lockwood compares this attitude to a type of xenophobia in his essay, suggesting that there has always been a â€Å"fear and loathing of foreigners† all throughout history (Lockwood, 140). He compares situations throughout history that reinforce this fear against foreign or alien peoples. He informs the reader that Irish people were treated poorly as well as Chinese immigrants, showing again how difficult it is to overcome this inherent fear of strange peoples and avoid flexible changes in society. Lockwood further reinforces how this type of attitude is even present in government leadership by describing a conflict between himself (as an expert) and the U.S. Department of Agriculture. Lockwood was attempting to warn the agency that there would be significant problems if the agency continued about its naturalistic activities, such as his concern over different diseases and wasps being introduced into native lands. The department argued with him about the potential for this type of natural situation, not because he is not an expert but rather because their value system was much like living backwards. The department offered, â€Å"†¦it is our contention that one factor that contributes to species pest status is inefficiency of the native biological control agents†¦Ã¢â‚¬  (Lockwood, 41). What the author is illustrating is that even government figures are unwilling to see beyond what they have already established as the truth, much like a fixed and rigid schema of thinking. Rather than accepting the advice of Lockwood, the agency uses its power and control to force compliance by Lockwood to simply accept their judgment despite his expert opinion and knowledge. The scientists involved in this particular conflict, Lockwood believed, are not taking a more active role as â€Å"cosmopolitan educators† (Lockwood, 141) and therefore the importance of a particular place is not being expressed properly. He seems to believe that the government agencies would have a much better sense of place at the psychological level with this type of support from the scientific community. Lockwood also describes the idea of who came first when describing the value or importance of native peoples. Lockwood believes that there is a juvenile attitude with a â€Å"finders keepers approach to the world† (Lockwood, 142). He believes that people in society tend to always look behind them in an effort to define who they are today and therefore become locked into thinking about previous struggles for land domination such as Eastern European history. In many ways, the author is suggesting that people are becoming too locked into historical records, none of which could ever be undone, and miss opportunities for expanding knowledge, culture and creativity in this process. This coincides with the concepts discussed by Lockwood about an inflexibility in society that is in-bred where people simply want to reject change and the unknown. When it comes to determining whether the right self-classification is indigenous or native, Lockwood suggests instead to think about

Sunday, September 22, 2019

Virtual Lab Report Template Essay Example for Free

Virtual Lab Report Template Essay In this virtual lab activity, you will be observing the cell cycle in the tip of an onion root. The root tip is responsible for the downward growth of the root and is one of the regions in the plant where cells are actively dividing and growing. Because of this, the root tip is an excellent system in which to observe the entire cell cycle, including the processes of nuclear division (mitosis) and cell division (cytokinesis). You will be submitting a lab report as the assignment for this lesson. Be sure to read the instructions before completing the virtual lab activity and your lab report. Refer to the lab rubric before you submit your report to your instructor. Record any observations about the cells you observed: Data Analysis: Calculate the percentage of the cell cycle spent in each stage. Number of cells in given stage ? total number of cells counted ? 100 = % of the cell cycle spent in this stage Create a graph that represents the time spent in each stage of the cell cycle. Graph: Conclusion: Be sure to answer the following reflection questions in the conclusion of your lab report: 1 Based on your data, what can you infer about the length of time spent in each stage of mitosis? 2 What stages were the longest and shortest? Give a brief explanation of why these stages may have that time period. 3 What is a distinguishing visible feature of each stage of the cell cycle? 4 What differences can you see when you compare the nucleus of a dividing cell with that of a non-dividing cell? 5 If your observation had not been restricted to the tip of the onion root, how would the results be different?

Saturday, September 21, 2019

Criminology Essays Fingerprints Science Crime

Criminology Essays Fingerprints Science Crime Fingerprints Science Crime â€Å"Discuss the importance of fingerprints within forensic science citing appropriate examples† Fingerprints have always been a form of identification. This is probably the reason why fingerprints have supplanted most methods of identifying criminals that deny ever being arrested or even committing the crime. Identifying fingerprints has become a science and it also stands out to many other forensic sciences ( www.onin.com). The science of fingerprints, has helped many goverments around the world, presenting them with correct discovery of criminals (www.onin.com). There are millions of people on this planet and never have 2 fingerprints been found that are alike within humans and automated computer comparisons (www.onin.com). No 2 humans have the same finger, palm or footprint. These parts of the human body have ridges that are constantly broken up by endings or forks, these are called characteristics (www.south-wales.police.uk). Every person has unique distributions of the characteristics that build up in womb and through out life in general, these characteristics stay the same for a time after death too so it makes identifying a body possible (www.south-wales.police.uk). People have often tried to alter their fingerprints with different methods like cutting their fingerprints, burning the skin with acid but that doesn’t work because, superficial skin damage is repaired by the body so the same ridges come back with the new skin that forms (www.south-wales.police.uk). Fingerprints are formed by our skin and our skin is made out of two layers, dermis and epidermis (www.south-wales.police.uk). The epidermis is a thin layer and it is a protective cover of the dermis which is the thicker layer of skin that contains sweat and sebaceous glands (www.south-wales.police.uk). Now a sweat gland, consists of salt, water and urea and the sebaceous gland releases oils on the skin surface (www.south-wales.police.uk). When we come in contact with something, we leave a mark because of the products that are produced by the glands, resulting in a fingerprint mark (www.south-wales.police.uk). When our fingers are dirty or even oily, then our fingerprints can be visible (www.south-wales.police.uk). When going to a crime scene, you often stumble upon fingerprints. Fingerprints, are very valuable evidence when identifying a suspect. If the prints are in sequence, you can very easily identify the hand or finger of origin. Unfortunately, fingerprints collected at a crime scene are rarely in sequence and customarily incomplete as a consequence, it is very difficult to define which hand left the print. So these types of fingerprints are called latent fingerprints (www.south-wales.police.uk). Now latent fingerprints can be left on all surfaces including skin and there are different ways to detect and make them visible like different powders, alternate lights and lasers (www.south-wales.police.uk). There are more types of prints like visible prints, that are also referred to as patent prints and these prints are apparent to the naked eye because they are normally found in blood or something that would make a mold of the print (www.virtualsciencefair.org). When a finger comes in contact with dirt, ink or grease and then the finger touches a smooth surface then there is a visible impression of the ridge (www.virtualsciencefair.org). Another type of prints are called impressed prints or plastic prints, these prints are basically an indentation that is left in a soft surface like wax, paint or clay, they are visible prints that you can look at and photograph (www.virtualsciencefair.org). There are different patterned fingerprints, one of these is called Arches (www.virtualsciencefair.org). 5 % of fingerprint patterns are arches, the ridges of the skin go from side to side without making a backward turn (www.virtualsciencefair.org). Normally, there is no delta in an arch outline but where there a delta, no re-curving ridge must interfere among the core and delta points (www.virtualsciencefair.org). Even with in patterns, there are pattern, there are four kinds of arch patterns: plain arches, radial arches, ulnar arches and tented arches (www.virtualsciencefair.org). Plain arches have an smooth run of ridges from one area to the other of the outline, no â€Å"major up thrusts† and the ridges go into on one part of the impression, and run out the other with a increase or wave in the middle (www.virtualsciencefair.org). The ridges of radial arches incline towards the thumb; they have one delta and no re-curving ridges (www.virtualsciencefair.org). On ulnar arches, the ridges incline towards the small finger, they also have one delta and no re-curving ridges (www.virtualsciencefair.org). Tented arches have an angle, an up thrust, or two of the three basic characteristics of the loop. They don’t flow the same way that plain arches do and above all have â€Å"significant up thrusts† in the ridges near the middle that position themselves on both sides of a spine towards which the bordering ridges meet and come out to form tents (www.virtualsciencefair.org). Another fingerprint pattern are the Loops, they occur in about 60-70 % of the fingerprint patterns encountered (www.virtualsciencefair.org). The ridge enters on either side of the impression, re-curve, and touches or crosses the line that forms from the delta to the core and finishes on or in the course of the side where the ridge or ridges entered (www.virtualsciencefair.org). Each loop outline has one delta and one core and has a ridge count (www.virtualsciencefair.org). â€Å" Radial loops are named after the radius, a bone in the forearm that joins the hand on the same side as the thumb† (www.virtualsciencefair.org). The run of the pattern in radial loops runs in the route of the radius (toward the thumb) (www.virtualsciencefair.org). Radial loops are not very frequent and on most occasions radial loops will be found on the index fingers (www.virtualsciencefair.org). â€Å"Ulnar loops are named after the ulna, a bone in the forearm† (www.virtualsciencefair.org). â€Å"The ulna is on the same side as the little finger and the flow of the pattern in a ulnar loop runs in the direction of the ulna (toward the little finger)† (www.virtualsciencefair.org). Whorls are found in about 25-35 % of fingerprint patterns dealt with (www.virtualsciencefair.org). â€Å"In a whorl, some of the ridges make a turn through at least one circuit† (www.virtualsciencefair.org). Any fingerprint outline that has 2 or more deltas is considered a whorl pattern (www.virtualsciencefair.org). There are four types of whorl patterns, Plain whorls that have of one or more ridges which make a complete circuit with two deltas, and causes an imaginary line drawn and at least one re-curving ridge within the inner outline area is cut or touched (www.virtualsciencefair.org).† â€Å"Central pocket loop whorls have at least one re-curving ridge or an obstruction at right angles to the line of flow, with two deltas, between which when an imaginary line is drawn, no re-curving ridge within the pattern area is cut or touched† (www.virtualsciencefair.org). â€Å"Central pocket loop whorl ridges make one complete circuit which may be spiral, oval, circular or any variant of a circle† (www.virtualsciencefair.org). Double loop whorls are made of two separate and individual loop formations with two different and distinct shoulders for each core, two deltas and one or more ridges which make, a complete circuit (www.virtualsciencefair.org). â€Å"Among the two at least one re-curving ridge within the inner pattern area is cut when an imaginary line is drawn† (www.virtualsciencefair.org). Accidental whorls are made of two dissimilar types of patterns with the exclusion of the plain arch, they have two or more deltas or a pattern which have some of the requirements for two or more different types (www.virtualsciencefair.org). Crime scene fingerprints need to be matched with fingerprints already in a file, if the suspect has never been convicted, then his fingerprints will not have been recorded so they cant compare them (www.south-wales.police.uk). For this reason, when a suspect is charged, they get fingerprinted and if there are 16 points of similarity with the prints at the crime scene it can be presented in court as evidence (www.south-wales.police.uk). Serious issues of fingerprint fraud have started to come to light; many people have been facing jail time because they have told them that their fingerprints have been found at a crime scene. In 2004 Brandon Mayfield was wrongly accused for the terrorist act in Madrid. They told him that his fingerprints were found on a explosives bag that was used to bomb a train in Madrid which resulted in the loss of 191 lives (www.news.bbc.co.uk). This news was shocking since the prime suspect hadn’t left the country in 10 years and that he had never visited Spain (www.news.bbc.co.uk). The suspect was at the time 38 years old and served 8 years in the military army (www.news.bbc.co.uk). He lived in Portland Oregon U.S.A (www.news.bbc.co.uk). He had never been arrested until the day the F.B.I showed up at his house and took him away (www.news.bbc.co.uk). At the end of this, it was proven that the fingerprint did not belong to Mayfield but to an Algerian man said to have been linked to al-Qaeda (www.news.bbc.co.uk). Fingerprints within forensic science is very important even thought there is a very big debate on whether or not it is the right way to go about crime scenes. We have seen the different types of fingerprints, what they are made from, we have gone through a case where fingerprints where not substantial evidence and put an innocent man in prison for a while. So with this I conclude that fingerprints are important the art of fingerprints just needs to be perfect so that the real criminals get what they deserve. References Hodierne, R. (2004) Military lawyers defend civil liberties [on line]. Available from: http://news.bbc.co.uk/1/hi/world/americas/4066775.stm [Accessed on 15 November 2007] Available from: http://www.south-wales.police.uk/fe/master.asp?n1=8n2=253n3=1028 [Accessed on 13 November 2007] Moore, G. History of fingerprints [on line]. Available from: http://www.onin.com/fp/fphistory.html [Accessed 15 November 2007] Available from: http://www.virtualsciencefair.org/2004/fren4j0/public_html/types_prints.htm [Accessed 12 November 2007] Inderjit Singh, P.K. Chattopadhyay and R.K. Garg.(1995). Forensic Science International Volume 152, Issues 2-3, 10 September 2005, Pages 205-208

Friday, September 20, 2019

Comparing Arthur Laurents West Side Story and Shakespeares Romeo and

Although the discrepancies between Romeo and Juliet and West Side Story are too frequent to categorize in such limited space, it is impossible for anyone familiar with both texts to not notice the obvious similarities between the two works ("Theme").   From the opening scenes in both, up through the rumble in West Side Story/death of Mercutio in Romeo and Juliet, the plays mirror each other (Poelstra).   It isn't until the last part of West Side Story, where Tony (our modern-day Romeo) dies and Maria (Tony's Juliet) doesn't (unlike the two star-crossed lovers of Shakespeare's work, both of whom perish), that the major difference between the two works becomes apparent.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Granted, instead of tension between feuding families (Montaguesand Capulets), West Side Story offers prejudice between races, as illustrated between street gangs (Jets and Sharks).   Some of the characters in West Side Story are carbon copies of those in Romeo and Juliet: Maria (Juliet), Tony (Romeo), Bernardo (Tybalt), Lt. Schrank (Prince),   and Anita (Nurse).   Others appear to be a composite of characters, namely Riff, a combination of Benvolio and Mercutio, and Doc, who appears to fulfill the role of Friar Laurence (possessed somewhat of a peacekeeping nature: "You couldn't play basketball?", he asks, when informed of their upcoming "war council" [Laurents 57]) yet, at the same time, it is implied (in the film version, not the play) that he is a pharmacist, and there was, after all, an apothecary in Romeo and Juliet . The tomboyish Anybodys, a Jet wannabe, would best fit into the role of Balthasar (although Doc's cha racter fits into this role marginally, as well), since it was she who aided Tony in escaping after the rumble (which resulted in the d... ... a story four centuries old to be retold in a fairly modern-day setting (after all, street gangs are more prominent now that ever before), a retelling that has garnered its own wide audience appeal over the past four  decades ("Theme"), showing that certain tales can stand the test of time more than once, provided the content/context effectively reflects the world within which it occurs.   Works Cited   Laurents, Arthur. West Side Story. (A musical, based on a conception  of Jerome Robbins; music by Leonard Bernstein; lyrics by Stephen Sondheim.) NY: Random House, 1966. Poelstra, James. "Romeo and Juliet vs. West Side Story." (17 July 97). Shakespeare, William. Romeo and Juliet. The Complete Works of William  Shakespeare, Volume I. Ed. W. G. Clark and W. Aldis Wright. NY:  Ã‚  Nelson Doubleday, Inc., 247-277.  Ã‚   "Modernizing Age-Old Theme." (17 July 97).

Thursday, September 19, 2019

Negotiating a Starting Salary Essay -- Business and Management Studies

Negotiating a Starting Salary With internet access available to nearly everyone, job seekers are armed with more information than ever before. Information can be obtained for job openings, job descriptions, and even salaries. Sometimes when filling out an application, a box will ask for a salary desired. Some advertisements ask to send your resume with salary requirements. These are sometimes tough questions to answer. How much does that job normally pay? Is the job applicant worth the top pay? This paper will explore the various factors involved when attempting to negotiate a starting salary. Topics such as helpful internet sources will be introduced, along with salary ranges, and helpful interview techniques will be discussed to better position one self to obtain the salary desired. Some basic concepts should be understood before attempting to negotiate a starting salary. First of all realize that a job in New York City will most likely pay more than the same job in rural Ohio. Geographic locations and cost-of-living play a major role when determining salaries. For example, comparisons were made for an entry level job as a bank teller in Elyria, Ohio and New York, New York. The results were interesting. The median expected salary for a typical Teller in Elyria, Ohio is $20,913; with the 25th percentile being $19,642 and the 75th percentile at $22,645. The median expected salary for the same job in New York City is $24,274; with the 25th percentile being $22,799 and the 75th percentile at $26,284 (www.Hotjobs.com). Supply and demand also play a part. If job candidates are plentiful then negotiating power is limited. However, some fields are in high demand and college graduates in those fields will find they have their choice of employers. For instance, according to The American Almanac Of Jobs And Salaries, the occupations with the largest job decline are sewing machine operators. This data covers the time period from 1996 to 2006 and they are in decline by 26 percent (xxviii). Conversely, according to Enhanced Occupational Outlook Handbook, the fastest growing jobs are computer related. From 1998-2008 computer engineers, computer support specialists, computer systems analysts, and database administrators are expected to grow by 108, 102, 94, and 77 percent respectively (18). A third concept to remember is that ev... ... appeal to their power and position in the company. Say something like, â€Å"If you have the power†¦Ã¢â‚¬ . Most managers will enjoy the positive comment and if they can get it done for you they will (www.collegegrad.com). These negotiating techniques highlight just some of ways a job applicant can better position themselves for a better starting salary. Salary wizards on the internet will give you a pay range. Various articles at career related web sites can give you some valuable insights. And of course your local library will always have books on hand to guide you through your job and salary search as you prepare yourself for the challenges of the working world of the 21st century. Works Cited Farr, Micheal J. and LaVern L. Ludden, Ed.D. Enhanced Occupational Outlook Handbook 2000-2001 ed. Caroline Levchuck. â€Å"How to Determine Your Salary Range†. 10-30-2004. Lussier, Don Job Search Secrets. Lincolnwood: NTC/Contemporary,1998 Wright, John W. The American Almanac of Jobs And Salaries 2000-2001 ed. â€Å"The Unacceptable Offer Negotiation Technique†. 10-31-2004. . â€Å" 10 Tricks for Negotiating a Higher Starting Salary†. June 20,2004. Employment Digest. 10-24-2004.

Wednesday, September 18, 2019

Low Wage Jobs and Barbara Ehrenreichs Nickel and Dimed Essay -- Pover

McDonalds, Wal-Mart, and cleaning services: all of these have one thing in common-they are all minimum wage jobs. Their pay is low and work load high, and because of this living as a low wageworker is never easy. One must handle many hardships in order to make a few meager dollars, with which most cannot sufficiently live. 'The 'living wage' in the United States is between $9-10.18; sounds great to a college student, but in the real world this kind of money just isn't going to cut it,' (Ramisch). Minimum wage standards for American workers rest at $5.15 per hour, and in such slighted fields, very few make much more than that, perhaps $6-7, but even that is a rarity. The material life of a low-income employee includes bare necessities and next to zero luxuries. These workers often live paycheck to paycheck and never have a moment to fully enjoy life because they are constantly working, supporting themselves, and/or their families. Barbara Ehrenreich tries capturing this unackn owledged side of low wageworkers in her book, Nickel and Dimed, when she goes undercover as a fellow employee. Her real life accounts are noted as accurate and shocking as she brings the severity of poverty to the forefront for many Americans (Ehrenreich 3). She portrays the lives of millions in one simple novel, and it is through this piece of literature that so many relate and feel less estranged in the overall scheme of things. This relation is especially true for three young women, Brandyll Powers, Whitney James, and Charity Pouge all of whom are forced to live on their scanty incomes in today's society. These interviewees discuss their daily struggles of living on minimum wage and how they are active representations of Ehrenreich?s novel. .. ...idden truths and in essence, portrays a minimum wage worker quite well. But for those that must live this life style on a daily basis, simply writing about their injustices will never be sufficient. Government action is the next needed step to help modify minimum wage, and the answer is clear: raise the accepted standard. However, with all the other issues in this country, when will the government finally realize it is time to take action? Works Cited Ehrenreich, Barbara. Nickel and Dimed. New York: Henry Holt, 2001. James, Whitney. Telephone Interview. 16 March 2006. Pouge, Charity. Personal Interview. 14 March 2006. Powers, Brandyll. Personal Interview. 14 March 2006. Ramisch, Claudia. ?Living on Minimum Wage.? ENGL 1302H Class Presentation, Kentucky Wesleyan College, Owensboro, KY. 13 March 2006.

Tuesday, September 17, 2019

Grey Market

A  grey market  or  gray market  also known as parallel market  is the trade of a commodity through distribution channels which, while legal, are unofficial, unauthorized, or unintended by the original manufacturer. Unlike  black market  goods, grey-market goods are legal. However, they are sold outside normal distribution channels by companies which may have no relationship with the producer of the goods. Frequently this form of  parallel import  occurs when the price of an item is significantly higher in one country than another. This situation commonly occurs with electronic equipment such as  cameras. Entrepreneurs  buy the product where it is available cheaply, often at retail but sometimes at wholesale, and import it legally to the target market. They then sell it at a price high enough to provide a profit but under the normal market price. International efforts to promote  free trade, including reduced  tariffs  and harmonized national standards, facilitate this form of arbitrage  whenever manufacturers attempt to preserve highly disparate pricing. Because of the nature of grey markets, it is difficult or impossible to track the precise numbers of grey-market sales. Grey-market goods are often new, but some grey market goods are  used goods. A market in used goods is sometimes nicknamed a Green Market. The parties most concerned with the grey market are usually the authorized agents or importers, or the retailers of the item in the target market. Often this is the national subsidiary of the manufacturer, or a related company. In response to the resultant damage to their profits and reputation, manufacturers and their official distribution chain will often seek to restrict the grey market. Such responses can breach  competition law, particularly in the European Union. Manufacturers or their licensees often seek to enforce  trademark  or other  intellectual-property  rights against the grey market. Such rights may be exercised against the import, sale and/or advertisement of grey imports. In 2002,  Levi Strauss, after a 4-year legal fight, prevented UK supermarket Tesco  from selling grey market jeans. However, such rights can be limited. Examples of such limitations include the  first-sale doctrine  in the United States and the doctrine of the  exhaustion of rights  in the European Union. Manufactures power towards the Grey Market When grey-market products are advertised on  Google,  eBay  or other legitimate web sites, it is possible to petition for removal of any advertisements that violate trademark or copyright laws. This can be done directly, without the involvement of legal professionals. eBay , for example, will remove listings of such products even in countries where their purchase and use is not against the law. * Manufacturers may refuse to supply distributors and retailers (and with commercial products, customers) that trade in grey-market goods. * They may also more broadly limit supplies in markets where prices are low. Manufacturers may refuse to honour the warranty of an item purchased from grey-market sources, on the grounds that the higher price on the non-grey market reflects a higher level of service even though the manufacturer does of course control their own prices to distributors. * Alternatively, they may provide the warranty service only from the manufacturer's subsidiary in the intended country of import, not the diverted third country where the grey goods are ultimately sold by the distributor or retailer. This response to the grey market is especially evident in electronics goods. Identifying the Grey Market Product * Manufacturers may give the same item different model numbers in different countries, even though the functions of the item are identical, so that they can identify grey imports. * Manufacturers can also use batch codes to enable similar tracing of grey imports. Parallel market importers often de-code the product in order to avoid the identification of the supplier. In the United States, courts have decided that decoding which blemishes the product is a material alteration, rendering the product infringed. Parallel market importers have worked around this limitation by developing new removal techniques. * The development of  DVD region codes, and equivalent  regional-lockout  techniques in other media, are examples of technological features designed to limit the flow of goods between national markets, effectively fighting the grey market that would otherwise develop. This enables movie studios and other content creators to charge more for the same product in one market than in another or alternatively withhold the product from some markets for a particular time. ————————————————- Five reasons for not buying a grey market product ————————————————- ————————————————- The grey market holds a lot of attraction for a number of people looking for tech products. In many cases, it provides people with products that have not been officially released in their countries (consider the iPad) and in others, allows them to buy a product at a much lower rate – a grey market iPhone 3GS for instance comes for around Rs 28,000 as compared to its prim and proper counterpart, which costs in the vicinity of Rs 35,000. However, making a purchase from the grey market comes with its own set of pitfalls, some of which can be significant. Here’s a look at five of the biggest ones. 1. No assurance of authenticity:   No matter how well you know the dealer from whom you have bought the product, you have virtually any way of knowing that what you have got is a genuine, first-hand article. There is a chance that you might end up with a second-hand product that has been repackaged. 2. Absence of warranty and support:  Products purchased from the grey market are not covered by official warranty and support. So the Lord help you if something goes wrong with it – you will have to head right back to the grey market to get it repaired, without any assurance whatsoever that things will be fine. 3. No updates:  In the case of many grey market products, software updates are simply not possible. You therefore run the risk of not getting the latest improvements the company might have made to a product. Many people using pirated versions of Windows have been unable to install the special packages Microsoft released for the software. 4. Limited functionality:  A number of products will work only with limited functionality if you purchase them from â€Å"unofficial† sources. For example, those who have purchased their PS3 from the grey market might have trouble playing games online. 5. No receipt:  A grey market purchase being not strictly legal, you are unlikely to get a proper receipt for your product, which effectively prevents you from showing it in your accounts, when you head to the taxman to show your revenues and expenses. The Darker Shades of the Grey Market The grey market has long been an issue for manufacturers and their retailers, but the problem has grown exponentially because of the Internet. The simple definition of the grey market is â€Å"the sale of products by unauthorized dealers, frequently at discounted prices. † Grey market worries go way beyond the scuba industry. It is a global issue for manufacturers as large as Sony, Hewlett-Packard and Xerox, and a major worry for retailers as sophisticated as Best Buy. It is also a problem within numerous industries, some of which you wouldn't guess. For example, broadcasting has its grey market resellers of Dish Network and DIRECTV. And consider the wine business — for marketing purposes wine is sold for much less money in parts of Europe. Because of the price disparity it is possible to buy wine from an authorized distributor, say in France, and resell it in the United States, often for less than the wholesale price of a U. S. authorized distributor. No, the scuba equipment industry is not uniquely paranoid. You are not alone in your concernsGrey market goods are not necessarily illegal, so some ask, â€Å"What is the harm, especially when consumers can benefit from lower prices? † The answer is that the grey market undermines normal distribution channels. It does this in a number of ways. The most obvious is that products that are diverted to unauthorized resellers usually end up competing with a manufacturer's legitimate dealers with substantially lower prices. This devalues the products, reduces everyone's profits, and alienates the manufacturers' dealers. It also puts the manufacturers' network of dealers, and thus the manufacturers' future distribution, at risk. Pricing is a big issue. The argument that lower prices benefit consumers is grossly incorrect. In a service business the grey market winds up hurting everyone, including the consumer. As price cutting gets out of hand and retailers have to compete with price their margins suffer. Consider that, as a general rule, a 10 percent reduction in a retailer's gross profit requires the retailer to sell to 50 percent more customers to earn the same profit dollars. In a specialty business like scuba that increase is near impossible to achieve. The grey market puts the business of the legitimate dealers in jeopardy. That pressure goes up the line to the manufacturers who are forced to watch their dealer base dwindle, and/or make concessions to dealers to help them compete. Then manufacturer margins suffer. In diving, many companies work on slim net margins, so when the gross margins suffer†¦. Let's put the price and margin factors aside for a moment. Another large issue is that since manufacturers have no control over unauthorized dealers, products and brands can be devalued not just from (the consumer's perception that results from the) low pricing, but because of negative issues surrounding consumer protection, product integrity, service and warranties, and recall notifications. In short, when a manufacturer loses control of its distribution, negative consumer experiences can damage the goodwill and reputation of a brand. And finally, a manufacturer's product pricing structure includes its costs for marketing, promotion, product research and development, product liability and regulatory compliance. Although unauthorized resellers benefit from selling the products, they do not contribute to these expenses. It's a very important consideration that for consumers, the scuba business is as much about service as it is about equipment. The service component becomes such a tangible part of every product's retail price. The profit represents no less than your consumers' access to this sport. And anyone who thinks that price is the pressing issue for our customers doesn't understand the importance of service in the consumer's perception of a product's value. In other words, in this business consumers expect retailers to supply them all of the other (including the social) aspects of the sport. Of course, there's a limit to that loyalty when it's tested by low grey market prices. In short, anyone who thinks that the grey market's lower prices are good for consumers is wrong. It's a Tactical Issue Unauthorized dealers acquire products in a number of ways. In scuba, as in the wine example above, much of the product comes from overseas, where favorable exchange rates or pricing structures make America an attractive market. Unauthorized dealers also work to acquire product from sources within the authorized dealer network. I would like to emphasize again that people in the diving business tend to see their industry as paranoid, too provincial, too protective of retailers. But you are not. In fact, in all industries afflicted by the grey market, concerned manufacturers use a number of tactics to fight those sales. In the electronics industry, for example, Sony and many others won't honor the warranty on products bought through the grey market. The U. S. division of Nikon goes further. They will only service products that are purchased through an authorized retailer. It declines grey-market repairs even if a customer is willing to pay for them. Another lever that manufacturers use is the threat of prosecution of trademark laws to restrict advertisements for the products. So when grey market products are advertised on Web sites it is possible to petition for removal of advertisements that violate trademark or copyright laws. Our business, Net Enforcers, has been helping companies combat grey-market distribution of their wares. We understand the darker sides of the grey market because we work in a number of industries for some very large companies like Samsung and Sony as well as for many of the manufacturers in the scuba industry. The companies hire us as a private police force to monitor Web sites for illegal use of product photography, copyrighted product descriptions, trademark logos and branding material. We also look for false or fraudulent statements of warranty or statements to the effect that the manufacturer supports the product they sell. We're the plumbers, finding leaks in the distribution pipes through sophisticated methods of investigation. When we find sites that we suspect are illegitimate, we issue takedown notices, a method of copyright enforcement that compels Internet service providers to pull suspected copyright infringements. The purpose of this piece is to explain the problem that the grey market has become in many industries and why you are right to be concerned about it, and to encourage your industry to continue working to keep it in check. This s especially critical because the dive business is so safety- and service-oriented, and its retailers create diving's customers. It's why maintaining the integrity of brands, products and pricing requires an especially strong commitment to stay within the proper distribution channels. PRESENCE OF GREY MARKET: Grey Market is present in many industries. Some of them are: * Automobiles * Cell phones * Computer games * Pharmaceuticals * Pianos * Photographic equipm ent * Broadcasting * With securities * IPO * Electronics * Textbooks