Friday, January 24, 2020

Teen Romanance is Not Smart Essay -- Argumentative Persuasive Essays Y

Teen Romanance is Not Smart      Ã‚  Ã‚   Do teenagers today have their priorities in the correct order when it comes to dating?   More and more often, it does not seem they do.   Some teenagers these days spend too much time focusing on their "romantic" relationships instead of the things that should be more important.   Teenagers who are in serious relationships do not care as much about school, their families, or their jobs.   These teenagers seem to forget everything that should be important to them.     Ã‚  Ã‚   School should be a very important priority for teenagers.   In high school, teachers try to prepare young people for what lies ahead in life.   That includes going off to college and entering the working world.  Ã‚   But many teenagers in serious relationships begin putting off doing their homework and studying for tests.   Their grades begin to drop, and sooner than they know it, they are failing their classes.   Most times when these lovesick teenagers begin failing, they do not care.   In some cases the teenagers even drop out.   In today's world it is nearly impossible to find a decent job without at least a high school diploma.   Without a job, a person can't get very far or have an interesting life.   Is one boy or girl really worth it?   Ã‚  Ã‚   Just graduating from high school this past June, I saw a lot of my friends go down this road.   Many of my friends were honor students through most of their years of school.   Then some of these friends met significant others their junior and senior years, and that was the end of them being honor students.   Whenever I asked my friends about their relationships, they would each give me the same story, that this was the person they wanted to spend the rest of their lives ... ... keep a 4.2 grade point average and graduated fifth in my class.   This was because I kept my priorities in order.   My boyfriend came last in most situations.   He understood and accepted this.   At that point in my life I had more important things to deal with.   I managed to work, go to school, and hold down a serious relationship without getting my priorities mixed up.   So for the people who say it is impossible to do all of these things, I know from personal experience that it is not.   Ã‚  Ã‚   I am not saying that it is wrong to date as a teenager.   Just remember what is important.   The teenage years are to be used as a time to grow and experience new things, but not at the expense of what is important in life.   Just keep a level head and do not get too involved with that significant other right now.   It is important to remember what it important in life.

Thursday, January 16, 2020

Information Technology Essay

A number of professions in our society are required to abide by a certain set of rules that regulate their actions due to the nature of work they are engaged in. Examples are those of lawyers, doctors, accountants, who follow codes of ethics that define acceptable and punishable behavior to patients and clients. Now, as we are moving towards the information age, more and more organizations are evolving to system automation as they abandon old manual methods of data storage and maintenance. The field of Information Technology has really changed the way people work. As company’s valuable information and data are stored, IT security professionals, just like doctors and lawyers are tasked with important functions, they hold responsibilities that are concerned with the protection of data and systems from unauthorized external and internal access, prevention of disruption especially from software and hardware attacks, modification and destruction of networks. By handling these delicate information they posses a great deal of power that may be abused. The First issue that highlights the need for a code of ethics for IT professionals is that of privacy, one of the hottest topics in information security. These professionals are able to access crucial information which may be about customers, industries, government agencies, corporations, people and networks, that if used wrongly will result to serious legal implications. An example of which is an IT security personnel, in charge of regulating website access of employees of a company. During the course of blocking off sites and programming firewalls, they can install key loggers that enables them to view whatever a person types on a keyboard, these may include credit card numbers, personal information, notes and emails. Release of such vital information can provide the necessary tools for identity theft, fraud, misrepresentation, blackmail and commission of many more crimes. Another issue linked to privacy of information, is confidentiality. Company information such as new products, financial reports, projected plans and researches can be sold off to competitors, this can lead to serious business damage such as bankruptcy of a business. Third, is the monetary benefit that may be derived from the manipulation of a system. Aside from actual theft of information, IT security professionals can alter programmed security measures and charge additional fees for something that they themselves maneuvered. They can make a system appear to be vulnerable to threats created by them. (Whitman and Mottard, 2007, p. 0-99) Moving forward, a number of companies are able to recognize the need to abide by ethical practices. An example of an ethical security practice is that of Cisco Systems Inc. , a multinational IT corporation that designs and sells network communication technology and services. They once encountered a vulnerability that the company felt would affect the health of the Internet, so the company contacted backbone providers first to ensure their systems were patched to protect them from the threat. (Davidson, 2008, Leading By Example). The company has since then receive various awards for Ethical practices. Another example is the development of a software that would at least prevent and regulate unethical security attacks, such as identity theft. This was the creation of Secure Electronic Transfers (SET) which was as developed by SETco, led by VISA and MasterCard (and involving other companies such as GTE, IBM, Microsoft, Netscape, RSA and VeriSign). A set of security protocols that ensures the safety of information from the buyer to the internet, that also takes into consideration safety of consumers. In conclusion, an organization entrusts valuable assets of network and data security to Information Security Professionals. However, unlike older professions such as medicine and law, most ethical issues regarding this occupation have not been codified to a specific law, and there is still no mandatory association such as (Bar association, American Board for Medicine) that has established a detailed code of ethics that is uniform across all IT professionals. So organizations must take it upon themselves to instill a code of ethics to ensure that these personnel understand the moral and legal implications of their actions.

Wednesday, January 8, 2020

A Comparison of Beowulf and Icelandic Sagas Essay

Beowulf and Icelandic Sagas There are many similarities between the hero of the poem Beowulf and the heroes of the two Icelandic sagas, The Saga of The Volsungs and The Saga of King Hrolf Kraki. The former saga is an Icelandic saga representing oral traditions dating back to the fourth and fifth centuries, when Attila the Hun was fighting on the northern fringes of the Roman Empire; the latter is an Icelandic saga representing 1000 years of oral traditions prior to the 1300’s when it was written. An unknown author wrote The Saga of The Volsungs in the thirteenth century, basing his story on far older Norse poetry. Iceland was settled by the Vikings about 870-930, who took to that land the famous lay of†¦show more content†¦Concerning Sigurd, â€Å"none was his match in conduct and size† (55); concerning Beowulf, he was â€Å"noble and huge† (198), and had â€Å"the strength of thirty in his mighty hand-grip (380-81). Sigurd â€Å"was raised there with King Hjalprek† (5); Beowulf was raised with King Hrethel. â€Å"And when all the most renowned men and kings in the ancient sagas are named, Sigurd must be counted the foremost in strength and accomplishments, in zeal and valor† (55); King Hrothgar said to Beowulf, â€Å"Your glorious name is raised on high over every nation, Beowulf my friend, your fame spreads far† (1703). Sigurd had contact with runes; Beowulf experienced runes on the sword hilt after the death of Grendel’s mother. Sigurd experienced magic from an old man living in the woods; Beowulf experienced magic in a sword which melted. Sigurd was taunted by Regin (57); Beowulf was taunted by Unferth before facing Grendel. Sigurd had made a sword for himself whose â€Å"equal has never been made† (59); Beowulf had more than one famous sword. Sigurd was so strong that he broke swords; likewise Beowulf. Sigurd went by ship to avenge his family members who had fallen in battle; Beowulf went by ship to avenge his family (Heardred and Daghrefin) who had fallen in battle. Sigurd was feared by other tribes; Beowulf was feared by other tribes. Sigurd killed King LyngviShow MoreRelated A Comparison of Women in Beowulf, Widsith and Icelandic Sagas4023 Words   |  17 PagesWomen in Beowulf , Widsith and Icelandic Sagas  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Are women in these poems active equals of the men? Or are they passive victims of the men? The roles of the women in Beowulf, Widsith, The Saga of The Volsungs, and the Saga of King Hrolf Kraki are not always stereotyped ones of passive homemaker and childbearer and peaceweaver, but sometimes ones giving freedom of choice, range of activity, and opportunity for personal growth and development.    Let us first ofRead MoreBeowulf: An Anglo-Saxon Epic Poem Essay1356 Words   |  6 Pagesepic poem Beowulf, is a work of fiction and was composed sometime between the middle of the seventh and the end of the tenth century of the first millennium, in the language today called Anglo- Saxon or Old English. This story is a heroic narrative, more than three thousand lines long, concerning the deeds of the Scandinavian prince, also called Beowulf, and it stands as one of the foundation works of poetry in English. Beowulf is obviously a creation of the poet, through partial comparisons have been