Friday, January 31, 2020

Outcomes of divorce on children Essay Example for Free

Outcomes of divorce on children Essay Divorce, while lengthy and sometimes hurtful, can be beneficial to the children and spouses. Children coming from situations of abuse and neglect actually benefit from the separation of parents. These parents may remain single or remarry, still studies have shown that the children have and are thriving in a way they were unable to before the separation. While there are exceptions to every rule, the divorce has become a positive alternative in some families. Children coming from homes where violence and abuse is an ordinary occurrence, are not only victims in their childhood, but are continually affected as adults. According to the Traumatogentic model, proposed by Dr. Finkelor (1987), the abused child produces a number of different psychological effects and long term behavioral changes. Leaving a child in such a situation would not only cause continual physical harm, but also the long term psychological problems. In such cases divorce is encouraged for the benefit of both the spouse being abused and the child involved. After divorce children have been shown to thrive in the new, abuse-free environment; showing improvements in their education, attitude, and overall social development. Another factor of positive divorce is the presence of neglect in the household. Accumulating information from the Attachment Theory proposed by John Bowlby in 1980, researchers have compiled evidence of the side effects of the lack of a secure attachment to caregivers at an early age. Because of rejection and inconsistent attention, among other forms of neglect, these children have â€Å"developed anxious, insecure or disorganized/disoriented attachments with their primary care providers† (U. S. Department of Health and Human Services). With two parents this neglect from one or both can turn to a feeling of hatred for one or both parents from the child. â€Å"This lack of secure attachment relationship then hinders the infants or toddlers ability to explore his/her environment and develop feelings of competence† (U. S. Department of Health and Human Services). Divorce here is an apparent necessity to the children involved. Based on the long term effects of neglect from numerous studies, children are better with one parent that cares for them or a non-biological parent than two that do not accurately care for the child’s needs. While being exposed to the process of divorce, children have become aware that struggle is a normal part of marriage and have been able to use their parents as examples. In a study done by â€Å"Psychology Today†, twenty-eight college students were interviewed to see how their parents divorce influenced their own current and past relationships. The group was divided into three different groups according to their responses. The first group were named the â€Å"Modelers†. This group mimicked their parents relationship, continuing to be dysfunctional. The second group were the â€Å"Strugglers†, this group showed a cautiousness in trusting others and hesitancy in opening up to others. The third were the â€Å"Reconcilers†. These students strove to learn from their parents mistakes and the problems they witnessed, to create more successful relationships in their own lives. The group that the students fell into also had to do with the type of relationship they had with their parents before the breakup and after. It was found that the â€Å"modeler† group had â€Å"limited insight† to the problems that their parents were going through. The â€Å"strugglers† lost touch with their parents and received little support after the divorce. In contrast, â€Å"reconcilers† kept touch with their parents and were given positive reinforcement† (H. Parker). In these cases the students learned from their parents divorce by example. Neither regretting their parent’s decision nor harboring ill feelings toward them for the separation. Good communication between parents and children was key to a happy outcome post-divorce. In an interview done by Dr.  Joyce Arditti of the Virginia Polytechnic Institute, fifty-eight young women who were raised by only their mother were asked their feelings on the situation. The women all agreed that the relationship between themselves and their mothers could never be closer. The relationships evolved into that of a best friendship rather than an authority figure and child. Although they are not the traditional mother-daughter relationships, they still provide support for the child in all the ways that a typical mother could and even go beyond that to the type of support that only a friend could provide. Growing up in a family with both parents present, was somewhat less than picture perfect in my own experiences. As a child, hearing constant arguing from both parents caused me to have a bias opinion on the parent doing the least amount of yelling or the parent that was fighting for my cause. This fighting being a constant in my life, made me wish that they would divorce, but because of personal religious reasons they have not. This, in turn, causes me to have apprehensions about marriage and doubt some of the stipulations that I was raised to associate with marriage. Divorce in my case would benefit my relationship with both parents and ease my own apprehensions about marriage. Divorce will always be a tough situation for the parents and children involved, but that does not mean that it has to be a negative one. The term divorce has been, in recent years, coined with a negative connotation. This however, is out-dated and one sided. With the recent studies and the help of psychologists, the term divorce has become somewhat less than taboo in our society today.

Thursday, January 23, 2020

Essay --

Sarah Miller Mr. Maltby Senior Project 3-11-14 The History of Interior Design Think about the things that make a home look nice. Think about the specific components that pull the whole place together. The paint or wallpaper on the walls, the hardwood or carpet on the floor, the furniture, and even the paintings or decoration on the walls. All of these important characteristics make up interior design. Interior design has been around for as long as the very first homes were built. But, what many people don’t know about are the continuous changes in interior design throughout history. From the looks of the early 17th century home, or the introduction to neoclassicism in the 18th century, to the move towards modernism in the 1900s..Interior design is an ever changing feature. Technology played a key part in the 17th century home. The introduction of the 17th century inventions such as the internal/external brick, house partitions, and stone walls substantially changed how the average interior was used and exposed. After the Great Fire of London in 1666, the fear of fire was huge in the homes of 1700. The brick, partitions and stone not only created more effective protection against fire, but they allowed for better structural strength, improved insulation, and created opportunities for greater and more elaborate use of interior plasterwork. (Parissien 18) The use of coal in Northern Europe began to increase, making many innovations in fireplace technology. People began to realize that the size of the fireplace didn’t necessarily mean more heat and the bigger the chimney piece opening meant the more heat was wasted up the flue. Therefore, the fireplace opening was made smaller and the chimney piece began to serve as a decorative,... ... more spacious kitchen environment. (Ferebee 116). In conclusion, interior design has seen its fair share of changes throughout history. The looks of the early 17th century home with its emphasis on the chimneypiece, the introduction to neoclassicism in the 18th century which stressed principals and proportion, or the first steps toward modernism in the 1900s when hygiene was the main focus. Interior design would not be the same today without the ideas of designers throughout history. I believe that our current style of interior design with its extremely modern look was a result of those very first steps toward modernism way back in the early 1900s. Next time you are admiring how wonderful your home looks, give a silent thank you to those early designers who planted the seed of interior design in many minds that has been passed down, time to time to our generation.

Wednesday, January 15, 2020

Large corporations Essay

Intranets are private websites, connections, or channels, usually owned by large corporations. The look and the environment of Intranets are relatively the same as Internets – the only difference between them is the fact that Intranets built to be accessible only to a group of authorized individuals that belongs to a certain company. For an Intranet connection to work, the presence of at least two servers is required, and one of which is going to act as a web or a file server. The one, on the other hand, is supposed to work as an email server. The faster and more efficient the microprocessor these individual server has, the better will the Intranet performance is going to be. Of course, aside from the servers, individual computers that connect to the Intranet are also part of the whole setup. These client computers can be connected either physically to the server through the use of a network cable or wirelessly courtesy of wireless network cards (Koehler, 1998). The two servers involved are tasked to transmit files, folders, and web pages to all the computers connected to it through it. The whole setup is also made possible through the use of the server software installed in it. Depending on what is required, each of the two servers needs an operating system, such as Windows, Unix, or Linux, and a combination of different programming software like ASP, PHP, XML, Perl, and other similar applications. Client computers however, would just require a functional operating system and a compatible browser (Dasgupta, 2001). It is the software that basically allows Intranet to function. A regular Windows operating system such as Windows 2000 and Windows XP are capable of working as web and email servers after performing the necessary configuration. However, a lot of administrators prefer to use Windows 2000 Server or Novell instead of the ones stated above. Both Windows 2000 Server and Novell have the necessary software embedded in them so that the Intranet connection can perfectly pass through. Intranet data are transmitted through the use of protocols, sockets, ports, and IP addresses. Once the required sets of software are configured and the necessary hardware in place, then the Intranet connection successfully works. It does not stop there, however. In an inner office intranet setup, security is of utmost importance. Without security parameters, data becomes accessible to the public. The regular username-password dialogue box manifests a commonly practiced Intranet security method. But aside from that, firewalls can also serve as a good security measure because of its ability to block access from an unauthorized IP addresses and similar connection points. Encryption software can also be used, especially if sensitive data are involved, such as bank account numbers, credit cards, and similar financial information (Ashley, 1999). II. Hardware Any regular computer with a network card physically or remotely connected to the intranet can access the server. The more important hardware requirements in an inner office intranet setup therefore, are the web, file, and email servers. These servers should adequately provide high-speed access to the whole network, as they are the backbone of the Intranet system. An office system with more than a thousand employees need a file server with 4 Megahertz processor speed having at least 1 Gigabytes of memory installed. On the other hand, the hard disk it contains should be 10 gigabytes or above and ideally, should follow a redundant array configuration. Still considered as part of the hardware requirement is the server’s operating system and it is the platform from which the Intranet system will work. As stated previously, Microsoft Windows 2000 Server is an example of a functional operating system as it has Microsoft Internet Information Server pre-installed in it. Macintosh, Linux and Unix are also popular choices, although which platform to choose depends entirely on the developer’s expertise and the company’s resources. Intranet follows the basic idea of local area networking. As such, the use of physical network connections is required, either directly or wirelessly. Most companies use network cards, cables, hubs, switches and wireless routers to transmit data requests from the computer to the server and then back again. And for the server to understand which remote computer requested a particular data, the concept of IP addressing comes into play. IP address means Internet Protocol address and each computer in the network is assigned a unique number that falls within the server’s subnet. Computers don’t necessarily understand human language. Consequently, the data received from the remote computer has to be translated into a code that the main servers can understand. This is the main task of a protocol stack, which is another program built-in into a computer’s operating system. Protocol stacks are more commonly called as the TCP/IP protocol, and this is what most companies, large and small alike prefer to use. These data pass through ports. Ports are a special set of numbers present in the header of every data packet sent by the client and the server. Ports are used so that the data being transmitted are mapped properly and directly to the correct process or application as designated. Different applications use different ports. Files, web pages, and emails each pass through a unique port in a computer. This is main reason why it is possible to accept these three different type so data packets all at the same time (Dasgupta, 2001). Routers, on the other hand, are the devices that are tasked to know the exact location of the computer that the data is intended for. Routers can either be a software functioning inside the server, like in the case of proxies. But in many cases, a router is a hardware that contains a firmware that has the capacity to direct traffic within the network or sub-network. While routers know all the computers below them, they do not necessarily know the ones above them. The moment that a packet, or a piece of information, is received by the router from the server, it checks the IP address the data is for. When it finds its location, it will then send the data accordingly. Else, it would transfer the data to the next router in the network, which will do the exact same process until the computer with the matching IP address is found. After which, the computer receives the data and is translated in a human-understandable form so that it can be used by the employee who requested it (Dasgupta, 2001). III. Software After the physical layer is in place and is running, the next thing that the administrator has to do is to setup the server-side functions of inner office Intranet. Depending upon the requirements of the company, a web page-like interface can be installed, which usually come in the form of simple HTML software. But that can be enhanced if utilized along with different script builder programs such as Cold Fusion, CGI, and database applications like Oracle. AT this point, the concepts applied here are generally the same as that an Internet connection. Only in this case, the data is not made accessible to the public, but only to the authorized people belonging to the office network. Aside from hard-core coding software, there is also that need for a design or the so-called perfect interface. Design and interface falls under the wet ware requirement of an Intranet network, although this category is still considered part of the software requirements. The most common reason why companies choose to setup an Intranet connection is because they have that need to gather all their employees at a common point. For this reason alone, an Intranet’s design and presentation becomes important. Consequently, they should always go well within what the employees wants to see and hear every time they access the portal and what the management and the shareholders want to impart. And aside from a good web designer, a talented writer may also be required to create announcements, ads, slogans, and content for the inner office’s intranet site (Koehler, 1998). IV. Security The most important aspect of Intranet connection would be its security, for it is that which primarily makes the Intranet different from the Internet. In an Internet setup, people from across the globe can access the data provided they have a telephone line, a modem, and a decent connection speed. Whereas in an Intranet, only authorized people are allowed. Only those who have desks and computers provided by the company can possibly have access to Intranet. Furthermore, in an Intranet setup, employees are given a username and password and from there, they can be categorized according to their respective department. As a result, only people belonging to a particular department can access the resources allotted to them. For example, the finance department can only go through files related to accounting while the marketing department can only download, modify, and create files that relates to sales. Most of the time, those people who belong to the upper echelon are given total access across departments (Koehler, 1998). Aside from categorization, it is also important for an inner office intranet to use firewalls to further protect their network from unauthorized outside access. Some intranets allow external access from their employees, meaning these people have the ability to connect from outside the office by passing through a virtual private network. For such applications, intensive firewalls are needed to keep other people away from the company’s database and server. Most companies use Cisco router firewalls, which can be considered as hardware, while there are companies that settle for purely software-based firewalls similar but not totally alike, to what Norton, Symantec, and AVG creates. But most firewalls that large corporations use are highly customized – meaning a pool of expert programmers are commissioned to create them from scratch. Open ended and individualized firewalls like these are harder to penetrate unlike the pre-built ones. Basically, what firewalls do is to block the ports from which data passes through, especially if the request comes from an unauthorized source (Ashley, 1999). References Ashley, Paul. (1999). Practical Intranet Security: Overview of the State of the Art and Available Technologies. Massachusetts: Kulwer Academic Publishers. Dasgupta, Subhasish. (2001). Managing Internet and Intranet Technologies in Organizations: Challenges and Opportunities. Pennsylvania: Idea Group Publishing. Koehler, Jerry W. (1998). The Human Side of Intranets: Content, Style, & Politics. Florida: CRC Press LLC.

Monday, January 6, 2020

Three Domain System

The Three Domain System, developed by Carl Woese in 1990, is a system for classifying biological organisms. Before Woeses discovery of archaea as distinct from bacteria in 1977, scientists believed there were only two types of life: eukarya and bacteria. The highest ranking previously used had been kingdom, based on the Five Kingdom system adopted in the late 1960s. This classification system model is based on principles developed by Swedish scientist Carolus Linnaeus, whose hierarchical system groups organisms based on common physical characteristics. The Current System As scientists learn more about organisms, classification systems change. Genetic sequencing has given researchers a whole new way of analyzing relationships between organisms. The current Three Domain System groups organisms primarily based on differences in ribosomal RNA (rRNA) structure. Ribosomal RNA is a molecular building block for ribosomes. Under this system, organisms are classified into three domains and six kingdoms. The domains are ArchaeaBacteriaEukarya The kingdoms are Archaebacteria (ancient bacteria)Eubacteria (true bacteria)ProtistaFungiPlantaeAnimalia Archaea Domain This Archaea domain contains single-celled organisms. Archaea have genes that are similar to both bacteria and eukaryotes. Because they are very similar to bacteria in appearance, they were originally mistaken for bacteria. Like bacteria, archaea are prokaryotic organisms and do not have a membrane-bound nucleus. They also lack internal cell organelles and many are about the same size as and similar in shape to bacteria. Archaea reproduce by binary fission, have one circular chromosome, and use flagella to move around in their environment as do bacteria. Archaea differ from bacteria in cell wall composition and differ from both bacteria and eukaryotes in membrane composition and rRNA type. These differences are substantial enough to warrant that archaea have a separate domain. Archaea are extreme organisms that live under some of the most extreme environmental conditions. This includes within hydrothermal vents, acidic springs, and under Arctic ice. Archaea are divided into three main phyla: Crenarchaeota, Euryarchaeota, and Korarchaeota. Crenarchaeota include many organisms that are hyperthermophiles and thermoacidophiles. These archaea thrive in environments with great temperature extremes (hyperthermophiles) and in extremely hot and acidic environments (thermoacidophiles.)Archaea known as methanogens are of the Euryarchaeota phylum. They produce methane as a byproduct of metabolism and require an oxygen-free environment.Little is known about Korarchaeota archaea as few species have been found living in places such as hot springs, hydrothermal vents, and obsidian pools. Bacteria Domain Bacteria are classified under the Bacteria Domain. These organisms are generally feared because some are pathogenic and capable of causing disease. However, bacteria are essential to life as some are part of the human microbiota. These bacteria preform vital functions, such as enabling us to properly digest and absorb nutrients from the foods we eat. Bacteria that live on the skin prevent pathogenic microbes from colonizing the area and also aid in the activation of the immune system. Bacteria are also important for the recycling of nutrients in the global ecosystem as they are primary decomposers. Bacteria have a unique cell wall composition and rRNA type. They are grouped into five main categories: Proteobacteria: This phylum contains the largest group of bacteria and includes E.coli, Salmonella, Heliobacter pylori, and Vibrio. bacteria.Cyanobacteria: These bacteria are capable of photosynthesis. They are also known as blue-green algae because of their color.Firmicutes: These gram-positive bacteria include Clostridium, Bacillus, and mycoplasmas (bacteria without cell walls.)Chlamydiae: These parasitic bacteria reproduce inside their hosts cells. Organisms include Chlamydia trachomatis (causes chlamydia STD) and Chlamydophila pneumoniae (causes pneumonia.)Spirochetes: These corkscrew-shaped bacteria exhibit a unique twisting motion. Examples include Borrelia burgdorferi (cause Lyme disease) and Treponema pallidum (cause syphilis.) Eukarya Domain The Eukarya domain includes eukaryotes or organisms that have a membrane-bound nucleus. This domain is further subdivided into the kingdoms ProtistaFungiPlantaeAnimalia Eukaryotes have rRNA that is distinct from bacteria and archaeans. Plant and fungi organisms contain cell walls that are different in composition than bacteria. Eukaryotic cells are typically resistant to antibacterial antibiotics. Organisms in this domain include protists, fungi, plants, and animals. Examples include algae, amoeba, fungi, molds, yeast, ferns, mosses, flowering plants, sponges, insects, and mammals. Comparison of Classification Systems Systems for classifying organisms change with new discoveries made over time. The earliest systems recognized only two kingdoms (plant and animal.) The current Three Domain System is the best organizational system we have now, but as new information is gained, a different system for classifying organisms may later be developed. Here is how the Five Kingdom System compares to the Three Domain System, which has six kingdoms: Five Kingdom System: MoneraProtistaFungiPlantaeAnimalia Archaea Domain Bacteria Domain Eukarya Domain Archaebacteria Kingdom Eubacteria Kingdom Protista Kingdom Fungi Kingdom Plantae Kingdom Animalia Kingdom Three Domain System