Wednesday, January 29, 2020

Group Behavior and Processes Essay Example for Free

Group Behavior and Processes Essay GROUP BEHAVIOR AND PROCESSES Group behavior and processes in this paper is about a problem with a new low income government housing development and the illegal activities that have impacted the community in making the neighborhood unsafe. The author of this paper sees not only the different illegal groups behaviors as the problem in this scenario but also the behavior group that is supposed to be in charge of this low income government housing development as the problem also. This is the processes that the author of this paper would do to resolve a lot of these problems (Peak, 2012). WHAT KINDS OF INFORMATION WOULD YOU COLLECT TO ADDRESS PROBLEMS SUCH AS DRUGS, PROSTITUTION, AND VANDALISM? First you have to use the local law enforcement agency to come into this neighborhood and having them do round the clock undercover and stakeouts. Having the local law enforcement agency identify and keep accurate records on the main problem persons in the drug, prostitution, and vandalism issues. Also have the law enforcement agency document thoroughly everyone involved in doing illegal activity at the local convenience store that is close by. Try to make active narcotic buys, prostitution buys, and finding the  perpetrators in the vandalism problem and documenting them to make cases against each and every one in this small apartment unit neighborhood will help slow down and eventually alleviate the illegal activity in short order (Peak, 2012). You also need to identify all the bureaucrats involved in working at the low income government housing project. Find out with an external audit who makes the decisions in approving applications to move into this government housing unit and why their rules were broken allowing those with criminal records to move into this small 58 apartment housing unit. Once the external audit has found culpability, replace those involved in breaking the rules. Re-evaluate each and every application of those residents who have criminal records and place them in a separate file from the law abiding residents in the units.. (Peak, 2012). WHAT KINDS OF RESPONSES MIGHT BE CONSIDERED? The local law enforcement agency can take one apartment over and have a senior law enforcement officer move into the apartment and take up residence. By having an officer live in the apartment unit would give the residents a sense of stability in their unstable world. Having this form of community policing will get needed intelligence from residents to help fight the crime in this apartment unit. While patrol officers are patrolling the neighborhood they should each make it a point to stop at the convenience store for coffee stops and spend time on foot patrol in the area. Field interviews should be done with the individuals just hanging out. Make it known that law enforcement is in the area to stay. Monthly meetings need to be put together with the bureaucrats at the low income housing agency and law enforcement agency to keep each other informed on what is going on with these apartment units (Peak, 2012). WHAT TYPES OF ASSESSMENT WOULD YOU PERFORM? I would assess the local law enforcement agency with how much help are they giving the low income government housing agency for all their low income  housing units. The bureaucrats need to work together with the local law enforcement agency to eradicate the illegal activity. Once the local law enforcement agency has all the evidence they need to make cases, start the arrest process. When the arrest process takes place, eviction notices needs to go out to those with criminal records at the same time in coordination with the arrests. Once an apartment unit opens up the bureaucracy moves a new resident in with no criminal record and none on their childrens record. Every six months gradually going to once a year external audits need to assess the performance on the low income government housing agency to make sure the rules are being applied to make sure the safety of the residents are a priority (Peak, 2012). Reference Peak, J.K. (2012). _Justice Administration: Police, Courts and Corrections Management_ (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

Monday, January 20, 2020

Machu Picchu Essay -- essays research papers

Machu Picchu is a physical symbol of the culture that created it. It is located in the Andes Mountains in Peru, South America, high above the Urubamba River Canyon Cloud Forest. The Incan capital, Cuzco, the closest major city, is forty three miles northwest of this landmark. Machu Picchu is five square miles and eighteen square kilometers in size. This ancient civilization has an altitude of eight thousand feet and is surrounded by towering green mountains. Although covered in dense bush, it had many agricultural terraces that were sufficient enough to feed the population. Due to water from the natural springs as well as the agricultural terraces, it had the ability to be self-contained. Machu Picchu was created by the Inca culture for the purpose of religious observance. In order to build this city, the Incans used stone tools, bronze tools, and chisels. The materials they used were mud, clay, adobe, and granite blocks. Each block weighed fifty tons! They would thatch the roofs with tree trunks and straw. After the buildings were constructed, the Incan people would smooth the stones with sand, mud, and clay to make the structures look polished. The people who inhabited this ancient site considered it to be magical because of the Andes Mountains and the Amazon River. The Temple of the Condor was a place of worship where the head of the condor was used as an altar for sacrifices. The Intihuatana is a column of stone that is rising from a block of stone. As winter approached, a priest held a ceremony to prevent the sun from disappearing. Intihuatana means ‘for tying the sun’ and ‘hitching post of the sun.’ Intihuatanas in other Incan civilizations were destroyed by the Spanish. However, the Spanish never found Machu Picchu, th... ... was discovered by Hiram Bingham, an American, who lived from 1875-1956. He went to Princeton, Yale, and got a PhD from Harvard. Bingham was a military officer, governor of Connecticut and a US senator. He mistook it for the long lost Inca capital of Vilcabamba. Machu Picchu was discovered on July 24th, 1911. When discovered Hiram Bingham said, â€Å"I was left speechless.† Scientists can surmise about who built it, who lived there, and why it was abandoned and forgotten, but they still are not one hundred percent sure. Machu Picchu was used for religious observance, astronomical observation, a royal retreat, and a secret ceremonial city. Therefore, I have partially proved my thesis. I said that Machu Picchu was created by the Inca culture for religious observance. Machu Picchu was used for that and many other things and that is why it is such an amazing civilization. Machu Picchu Essay -- essays research papers Machu Picchu is a physical symbol of the culture that created it. It is located in the Andes Mountains in Peru, South America, high above the Urubamba River Canyon Cloud Forest. The Incan capital, Cuzco, the closest major city, is forty three miles northwest of this landmark. Machu Picchu is five square miles and eighteen square kilometers in size. This ancient civilization has an altitude of eight thousand feet and is surrounded by towering green mountains. Although covered in dense bush, it had many agricultural terraces that were sufficient enough to feed the population. Due to water from the natural springs as well as the agricultural terraces, it had the ability to be self-contained. Machu Picchu was created by the Inca culture for the purpose of religious observance. In order to build this city, the Incans used stone tools, bronze tools, and chisels. The materials they used were mud, clay, adobe, and granite blocks. Each block weighed fifty tons! They would thatch the roofs with tree trunks and straw. After the buildings were constructed, the Incan people would smooth the stones with sand, mud, and clay to make the structures look polished. The people who inhabited this ancient site considered it to be magical because of the Andes Mountains and the Amazon River. The Temple of the Condor was a place of worship where the head of the condor was used as an altar for sacrifices. The Intihuatana is a column of stone that is rising from a block of stone. As winter approached, a priest held a ceremony to prevent the sun from disappearing. Intihuatana means ‘for tying the sun’ and ‘hitching post of the sun.’ Intihuatanas in other Incan civilizations were destroyed by the Spanish. However, the Spanish never found Machu Picchu, th... ... was discovered by Hiram Bingham, an American, who lived from 1875-1956. He went to Princeton, Yale, and got a PhD from Harvard. Bingham was a military officer, governor of Connecticut and a US senator. He mistook it for the long lost Inca capital of Vilcabamba. Machu Picchu was discovered on July 24th, 1911. When discovered Hiram Bingham said, â€Å"I was left speechless.† Scientists can surmise about who built it, who lived there, and why it was abandoned and forgotten, but they still are not one hundred percent sure. Machu Picchu was used for religious observance, astronomical observation, a royal retreat, and a secret ceremonial city. Therefore, I have partially proved my thesis. I said that Machu Picchu was created by the Inca culture for religious observance. Machu Picchu was used for that and many other things and that is why it is such an amazing civilization.

Sunday, January 12, 2020

Madam Cj Walker Essay

Madame C.J. Walker was America’s first self-made female millionaire. She amassed her fortune through hard work, innovative ideas, and a fierce dedication to her craft and her people. Contrary to most historical accounts, Madame C.J. Walker did not invent the pressing comb. Per her own words, Madame Walker started the â€Å"hair-growing† business, borne out her desire to remedy her own hair loss. In 1910 Madame C.J. Walker moved her ever expanding â€Å"Special Correspondence Course† business, founded on her System of Beauty Culture, to Indianapolis. There she purchased and paid for her home adjoining which was a factory and laboratory. On September 2, 1911 she petitioned the Indiana Secretary of State to become incorporated and on September 19th, 1911, said petition was granted, marking the genesis of the Madame C.J. Walker Manufacturing Company of Indiana, Inc. wherein Madame Walker was the President and sole shareholder of all 1,000 shares of stock. She was also an early civil rights advocate on behalf of Black people, and an avid financial supporter of what today we call HBCU†s or Historically Black Colleges and Universities. By the time of her passing in 1919, Madame C.J. Walker had built one of the largest black owned manufacturing companies in the world, an international network of over 15,000 Madame Walker agents, beauty schools in three states, and a 32 room mansion at Irvington-on-the-Hudson, New York. Madame’s only child, A’Lelia Walker became President of the Madame C.J. Walker Manufacturing Company of Indiana upon her mother’s passing. Per Madame’s will, two-thirds of the stock of the Company was placed in a Trust, over which were five Trustees. The other one-third of the stock of the company was bequeathed to her only child. When A’Lelia died, the one-third share of stock she owned was â€Å"split† between two people, each receiving onesixth share. The majority two-thirds remained in the Trust. Over six decades later, in 1985, the Trustees petitioned the Marion County Probate court to allow them to sell the stock and assets of Madame Walker’s company, including inventory and historical documents, to a man named Raymond Randolph. The owners of the remaining shares of stock also agreed to sell their shares to Raymond Randolph. Thus, on December 20th, 1985, Raymond L. Randolph became the first person since Madame C.J. Walker herself to own all 1000 shares of stock in the Madame C.J. Walker Manufacturing Company of Indiana, aka the Madame C.J. Walker Manufacturing Company.

Saturday, January 4, 2020

Unix Security Essay - 1353 Words

An Overview of UNIX Security The purpose of this paper is to analyze the security of UNIX. Considerations shall be given regarding generalized security aspects of a typical UNIX system. The ultimate scope of the following presentation shall remain within the boundaries of a few of the more critical UNIX security aspects. Of particular note will be discussion regarding standard user access, root access, file system security, and internet access precautions. This will not focus on specific measures used to implement security, but rather will investigate both pros and cons typical of a UNIX installation. Finally, a brief description of UNIX security versus other operating systems will be noted. Since no two UNIX-based operating†¦show more content†¦Of the utmost security concern is the protection of the root account. The root account allows a user absolute control of the system, including the ability to alter practically every aspect of the systems, from individual files to installed programs. Inde ed, an entry in Wikipedia.com notes, that a UNIX administrator should be much like Clark Kent, only using the root account, or becoming Superman, when absolutely necessary, lest the security of the account be compromised (2006). Ultimately, this implementation represents a near surefire way to protect the system against many internal and external threats. By ensuring regularly scheduled root account password changes and ensuring the passwords are strong, the cons noted previously should be relatively easy to avoid. File system security is also very important regardless of the UNIX implementation. UNIX files system security generally allows access permissions to be granted to various defined users and groups. UNIX also contains an access right flag know as the sticky bit. The sticky bit can be used to allow users and groups write access to certain directories within the system. Similarly, the sticky bit can be used by a user to disallow other users with access to the same direc tory to alter the contents of the file. The file can only be altered by the file owner, the directory owner, and the root account (linuxdevcenter.com, 2006). This particular element allows for a great deal of controlShow MoreRelatedA Project On Capstone Project1039 Words   |  5 Pagesapplications came from? Well there are a lot of computer applications like local security applications, protocols, well I am going to explain some security applications to you. There are many kinds of different security applications. I am going to explain two of different applications Linux and security policy settings. Now what are security policies? Security policy settings in Microsoft could be used as part of all of our security implementation to make sure and to secure domain controllers, servers, clientRead MoreWin32 Api and Posix Api Comparison984 Words   |  4 PagesMicrosoft’s core set of application programming interfaces available in the Microsoft Windows operating systems while POSIX API, an acronym for â€Å"Portable Operating System Interface (for Unix)† is a core set of application programming interfaces, shell, and utilities interfaces for software compatible with variants on the Unix operating system. Each of which has its own style of implementation. Win32 and POSIX API have processes that needed several resources to execute, and if resources are availableRead MoreFile Management Essay768 Words   |  4 Pagesis the permission to run or execute a file. A UNIX system sets up three classifications for its users; an owner or user, a group, and the other. First is the owner, which is the creator of a file, or the user at a specific time of a file. A group is a class to which the user or owner belongs. A group could be a department of a company or any other type of grouping with specific members. Last, the other is the general World Wide Web audience (â€Å"Unix Protection and Permissions†, n.d.). A reviewRead MoreUnix Operating System5471 Words   |  22 PagesAbstract This paper is a general overview of Unix operating system. It starts by presenting a brief history of the early development of Unix. It concentrates on main aspects of Unix operating system. Key concepts covered are interactive multi-user operating systems, the design objectives of Unix, file-store organization, text processing and programming, the role of C programming language with regard to portability and reliable system software, process control (signals and fork), error loggingRead MoreUnit 2 Assignment 11905 Words   |  8 PagesStickykeys, ShowSounds and Mousekeys. Features of UNIX Operating system Kernel The kernel feature is the hub of Unix operating system. It interacts directly with the machine’s hardware in the system. Its major functions are to control access to the computer, to manage computer memory, to maintain file system, to handle interrupts and errors and to perform input and output services. Shell The shell feature is a command line interpreter (CLI) in Unix operating system. It essentially listens to theRead MoreComputer Operating System3141 Words   |  13 Pagesbecome accustomed to so many choices. One of the major choices in the modern era is the â€Å"Operating System (OS)†. Operating systems are the central software component to any computer. The main brands of operating system are; Windows Mac OS, Sun Solaris, UNIX, DOS and Linux. Each brand has its own take on what makes up an operating system. Windows is the most commonly used operating system around the world. The most common advantage about Windows is its simplicity. It is now very easy for an inexperiencedRead MoreHistory And Philosophy Of Open Source818 Words   |  4 Pagesto a lesser extent, have come to accept malware and viruses as an inevitable part of computing, but they are an incredibly rare sight in properly-managed Linux and BSD (a UNIX-like kernel similar to Linux) environments, which are conse quently used in nearly any situation in which security is imperative. Aside from security and customization, open software has numerous other advantages over its proprietary counterparts, but open source includes more encompasses more than just software. Open hardwareRead MoreEssay on The Linux1482 Words   |  6 PagesThe Linux was originally founded by Linus Torvalds. In 1991, he was a second year computer science student in Finland. He sought after an operating system that was similar to the UNIX system, but both UNIX and the hardware it ran on were excessively expensive. A UNIX version called Minix was available for free, but it did not reasonably meet his needs as it was simply an operating system for students, designed primarily as a teaching tool rather than an industry strength operating system. As a resultRead MoreEssay about UNIX and Windows1218 Words   |  5 PagesUNIX and Windows About Unix The Unix operating system is a powerful programming environment designed by and for computer programmers. Unix is available on a wide variety of computer systems, including personal computers, workstations, mainframes and supercomputers. It was developed for, and is particularly well suited to, multi-user systems, but is now also run on stand-alone machines. Beginners and casual users often find the jargon-filled help system frustrating and the lack ofRead MoreIs418 Project 1-2-3 Essay example1327 Words   |  6 PagesIS-418: Security Strategies in Linux Platforms and Applications * Project: Linux – Based Web Application Infrastructure * Project: Logistics * Project Part 3: Executive Summary * Project Part 3: Tasks 1 * Project Part 3: Tasks 2 * Project Part 3: Tasks 3 IS-418: Security Strategies in Linux Platforms and Applications * Project: Linux – Based Web Application Infrastructure * Project: Logistics * Project Part 3: Executive Summary * Project