Monday, September 30, 2019

Sunday, September 29, 2019

Charlie Fish

The wife did nothing. I would say that he is the protagonist in the story, because he is doing nothing wrong, the only thing he does is to think evil thoughts. The protagonist is usually the â€Å"good† guy in the story and the main character. I wouldn't say he is good, because he have intentions to kill his wife, but in the end it ‘s her who is the antagonist and let him die. D: Typical for the crime genre is that there often is a crime or someone who breaks the law.For example the woman in the story is breaking the law by not helping her husband, and as it says on the last line â€Å"l fall to the floor. My wife Just sits there, watching. † The main character is often a police officer(the good guy) or a criminal(the bad gay), in our story you could say the main character is both. He's a bad guy inside, but â€Å"behave† on the outside. The tension also plays a major role and there is also often plot twist in the crime genre.In the story we as readers had an idea that he non will kill his wife, but in the end it is her who kills him, it's called a plot twist and the tension is built up. I think It's a good story, because the excitement Is built up and It does not end as expected. The author manages to build something up, although the story Is so short. Charlie Fish By Cannonaded â€Å"Death by Scrabble† by Charlie Fish is a story a husband and his wife. It's the hottest angry at his wife, so angry that he would beat his wife to death.He is Just waiting for he right time. The words they put down on the board, begins to happen in reality. When he puts the word â€Å"QUAKE† down, and she thereafter put â€Å"DEATH†, it all starts to shake and the man gets a piece stuck in his throat, which he had hidden in his intentions to kill his wife, but in the end it's her who is the antagonist and let him I think it's a good story, because the excitement is built up and it does not end as expected. The author manages to build something up, although the story is so short.

Saturday, September 28, 2019

Public Health Issue Of Chlamydia Health And Social Care Essay

Chlamydia infection increases the likeliness of being at hazard for HIV infection and cervical malignant neoplastic disease ( Steben, 2004 ) . Known as the â€Å" concealed Venereal disease † because of the comparative trouble in observing infection, chlamydia is peculiarly common among immature adult females ( Alexander, 2006 ) . Numerous prevailing surveies in assorted clinical populations have shown that sexually active striplings and immature grownups have higher rates of chlamydia infection compared to the general population ( Adderley-Kelly, 2005 ) . In add-on, regional sterility undertakings that perform everyday large-scale showing and appraisal among adult females have found that younger adult females are more likely than older adult females to be tested positive for chlamydia infection ( Alexander, 2006 ; Adderley-Kelly, 2005 ) . Controling the spread of chlamydia has been a precedence of The Centers for Disease Control and Prevention ( CDC ) ( 2010 ) . CDC recommends that sexually active females aged 20 old ages old and below and those over 20 old ages old possessing hazard factors ( e.g. multiple sex spouses ) be screened yearly. Literature besides supports the recommendation that Chlamydia testing through nursing wellness appraisal can help in early designation of the disease ( Steben, 2004 ) . Furthermore, instruction on bar could besides be implemented to raise consciousness about the hazard factors that are associated with the spread of this infection. Ahmed et Al. ( 2009 ) identified several hazard factors of Chlamydia, including age, race. deficiency of general cognition, holding multiple spouses, non-use of proper protection like rubber usage, and the use of resources or available plans to educate and forestall.Problem StatementThis survey recognizes that the high incidence of chlamydia can be mitiga ted through proper showing and early designation. More specifically, testing at-risk persons such as females aged 12 to 15 old ages old, would assist in the early sensing and bar of chlamydia infection. Due to the fact that the addition in chlamydia infection is among striplings, and the fact that it is many times symptomless, failure to seek medical attending occurs and later leads to long-run wellness concerns ( Alexander, 2006 ) . Harmonizing to Burns, Briggs, & A ; Gaudet, ( 2007 ) , set uping a chlamydia testing or testing plan for striplings has ever been hard. Barriers to testing include the inability to pay for wellness showing due to a deficiency of wellness insurance, deficiency of transit to the clinic site, uncomfortableness with the clinic, and confidentiality issues. These barriers, in concurrence with a disease that exhibits minimum or no symptoms, generate a challenge for STD plans to test a bad population. The U.S. Preventive Service Task Force ( USPSTF, 2001 ) strongly recommended that clinicians routinely screen all sexually active adult females aged 25 and younger, and other symptomless adult females at increased hazard for infection. Since age is the most of import hazard factor, adult females and striplings through age 20 old ages are at highest hazard for chlamydia infection. Other hazard factors associated with high prevalence included: being single, Afro-american race, holding a anterior history of sexually transmitted disease, holding new, or multiple sexual spouses, holding cervical ectopy, and utilizing barrier preventives inconsistently ( Adderley-Kelly, 2005 ) . Individual hazard depends on the figure of hazard factors and local prevalence of the disease. Surveies have shown that unequal showing, besides consequence from three things: foremost, it takes clip for any new recommendations to be implemented. Second, practician ‘s attachment to testing recommendations varies widely. Third, attachment to testing recommendations varies by site of attention. Therefore, it is of import to be able to discourse and obtain a sexual wellness history with all patients, place the marks and symptoms of chlamydia and acknowledge possible hazard factors that are associated with chlamydia infection that would put persons at higher hazard ( Steben, 2004 ) . As nurses, it is imperative that we complete a full wellness appraisal which would include a sexual history to place early hazard and sensing of the disease. Appropriate screens have non being followed to measure persons with possible hazard factors.AimThe intent of the survey is to look into whether annually testing of sexually-active females aged 13 to 25 will increase bar and early sensing of chlamydia infection, as compared to females aged 13 to 25 who are sexually active and are non screened.Designation of Variables and Target PopulationThe independent variable related to this research is testing. The dependent variables are 1 ) bar and 2 ) early sensing. The mark population is sexually active females aged 13 to 25 old ages old.Hypothesis or Research Question ( s )This survey aims to reply the undermentioned inquiry: Does testing take to bar and early sensing of chlamydia infection among sexually active females aged 13 to 25 old ages old? In relation to this research inquiry, the survey hypothesizes that: RH1: Sexually active females aged 13 to 25 old ages old who are screened are less likely to hold chlamydia infection than females who are non screened. RH2: Sexually active females aged 13 to 25 old ages old who are screened are detected earlier for chlamydia infection than females who are non screened.Definition of FootingsThe undermentioned footings are defined in theoretical and operational footings, as follows: Chlamydia Theoretical Definition: Harmonizing to the CDC ( 2010 ) , chlamydia is defined as a common sexually familial disease ( STD ) caused by chlamydia trachomatis, a bacteria that can damage adult females ‘s generative variety meats. Even though the symptoms of chlamydia are normally mild or absent, serious complications that cause irreversible harm, including sterility, can happen â€Å" mutely † before a adult female recognizes a job. Operational Definition: For the intents of this survey, chlamydia refers to a positive diagnosing made by a doctor through a urine-based PCR showing for chlamydia. Screening Theoretical Definition: Screening is performed to place the presence of the disease or of a hazard factor for a disease, typically among symptomless individuals ( those who do non already manifest symptoms of disease ) . In this manner, a disease or the hazard factors for a disease can be detected early, leting either intervention or bar, including forestalling the farther spread of catching or catching diseases ( Robinson, 2002 ) . Operational Definition: For the intent of this survey, testing involves a wellness history which identifies the hazard factors such as a old history of STD, holding multiple sex spouses, holding sex with new spouse, the usage of non-barrier types of contraceptive method, or holding cervical ectopy. Prevention Theoretical Definition: bar is the maintaining of something ( such as an unwellness or hurt ) from go oning ( Miller-Keane, 1997 ) . Operational Definition: For the intent of this survey, bar is the absence of chlamydia which will be indicated by a negative consequence diagnosed by a doctor through a urine-based PCR proving for chlamydia infection. Sexually active Theoretical Definition: Sexually active agencies engagement or engagement in a sexual act, being involved, and an active participant. Operational Definition: For the intent of this survey, sexually active females will mention to those who arranged a visit for gestation, STD diagnosing, showing, contraceptive method, or intervention.Theoretical ModelThe appropriate model selected for this proposal is Nola Pender ‘s wellness publicity theoretical account ( HPM ) . The HPM, originally developed in the early 1980s, is a model that serves as â€Å" a usher for geographic expedition of the complex biopsychosocial processes that motivate persons to prosecute in wellness behaviours directed toward the sweetening of wellness † ( Pender, 1996, p. 51 ) . The HPM is widely represented in the nursing literature and is the model that underpins over 100 research surveies. Pender ‘s HPM is a valuable tool for the designation of incentives and barriers toward persons ‘ active engagement in activities that promote wellness ( Pender, 1996 ) . Pender proposed in the HPM that there are by and large three countries which influence the acceptance of health-promoting behaviour: â€Å" cognitive, perceptual, modifying factors and cues to actions † ( Pender, 1996, p. 53 ) . Pender focuses on enterprise from the person to endeavor for health and positive wellness and views the benefits of such self-directing behaviours to include verve and even self-actualization. Pender measures an person ‘s â€Å" perceived control of wellness † by his or her ability to command behaviours that are necessary to advance alterations in overall wellness and wellbeing. Pender views wellness publicity as active instead than inactive. The individual must comprehend that he or she wields entire control of his wellness. Hopefully, this perceptual experience will take to a more frequent and consistent application of health-promoting behaviours. The apprehension of wellness advancing behaviours in striplings may non merely be an application of bing cognition related to wellness publicity in grownups ( Srof, 2006 ) . Rather the development of independency and the associated undertakings of adolescent development contribute to alone organic structure of cognition of wellness publicity in teens ( Srof, 2006 ) . Pender ‘s HPM provides a paradigm in an attempt to come up with intercession plans to turn to wellness concerns such as chlamydia infection. Literature has revealed that there are several barriers to prevention attempts initiated by authorities bureaus and not-for-profit organisations to control the spread of Chlamydia infection among younger adult females ( Alexander, 2006 ) . The HPM theoretical account identifies seven perceptual and cognitive factors which could discourage or heighten the likeliness of a individual ‘s acceptance of wellness behaviours. For striplings, these factors could be perceived benefits of action, barriers to action, self-efficacy, and activity-related effects are related to interpersonal influences, such as household, equals, situational influences, options, and demands. As I relate this theoretical account chiefly to striplings and their increased hazard of chlamydia infection, the fact that striplings do non take portion in their ain wellness promotion/disease bar through the usage of rubbers to forestall the spread of STD infections demonstrates the demand to turn to and place each person ‘s perceptual experience of chlamydia infections which could impact his or her quality of life in all developmental phases of life. This survey will stress on modifying factors to include demographics, biological features, interpersonal influences, situational factors, and behavioural factors that could impact a immature adult female ‘s opportunities of prosecuting in behaviours that promote wellness ( Pender, 1996 ) .Significance of StudyThis research proposal seeks to look into the importance of testing as a mechanism to diminish the hazard of chlamydia infections among sexually active females aged 13 to 25. It is of import to screen and educate thi s population about possible hazard factors and preventative steps such as the usage of instruction, supportive resources, rubbers and abstention. Because the disease is chiefly symptomless in females, it is of import for nurses and other health care suppliers to place and follow recommended showing and appraisal of these persons. A job identified in the literature reappraisal is that there is some incompatibility in testing females for STDs due to varies grounds ( Streben, 2004 ) . The CDC ( 2010 ) has recommended showing of all sexually active females ages 13-25 yearly, but it is questionable whether such showing is really taking topographic point. It is besides dubious how many females of this age group routinely see healthcare suppliers unless a job has been identified. This survey would do a difference by pulling a relationship between testing and bar and early sensing of chlamydia in a bad population. In so making, it contributes to the organic structure of literature formed by authorities bureaus, research workers, and non-profit wellness organisations that have initiated plans to cut down the prevalence of chlamydia in immature adult females. Screening will besides depict barriers and hazard factors to infection such as multiple sex spouses, STD history, or deficiency of usage of protective barriers such as rubber usage. In the procedure, this survey will foreground the important function of healthcare suppliers in showing, educating, and observing marks and symptoms of chlamydia infection and the importance of systematically executing sexual wellness history, appraisal, and showings to convey about a lessening in the incidence of this disease.

Friday, September 27, 2019

Humans, Technology, Nature, and Spirituality Essay

Humans, Technology, Nature, and Spirituality - Essay Example The main element of religion was compounded in explaining phenomena that confound human to his or her spiritual ability. In most cases, science often attempts to explain natural processes in line with numerous universal laws while applying scientific methods. In most cases, these scientific explanations have since created dire conflicts with numerous religious beliefs. The film BARAKA has also compounded its theme in numerous cultures that are tied to one specific thing, nature. Nature provides humanity to the full understanding and acknowledgement of their mighty creator. Through spiritual belief of different religions, different people connect to their creator by appreciating nature. The same is not true with technology that often tends to provide explanation and pieces evidences on why certain things are usually the way they are. In other words, technology only provides a platform of explaining nature but do not brings connectivity or binding factors between humans and a given ele ment.The film also brings the element of interconnectivity without explanation, that is, human beings can connect to nature without anyone providing convincing explanations to the necessity to such connectivity. This kind of connectivity is only brought forth by spirituality. However, the recording that the same can be appreciated by human being is facilitated by technology. The emergence of technology only tried to expound on the existence of such relationship, but it has never replaced the binding factor, which is the spirituality.

Thursday, September 26, 2019

What do you consider to be the key differences between orthodox and Essay

What do you consider to be the key differences between orthodox and new approaches to International Political Economy Illustrate your answer with particula - Essay Example Thus, it has become interdisciplinary studies of economics, law and political science, which help in grasping the inter-relation of political institutions and capitalism – how they affect each other in the political environment. The new range of approaches to ‘International political economy’ (IPE) refers to international trade and finance and government’s monetary and fiscal policies that decide which way the international business of a state proceeds. These approaches to IPE are linked with the journal The Review of International Political Economy (RIPE), edited by British and American scholars.(http://en.wikipedia.org/wiki/Political_economy) ) Ronen Palan in his book, Global Politician Economy: Contemporary theories, has summarized the IPE in the preface of the book - â€Å"†¦. The emphasis on negotiation, contestation and historical narrative underlines the open-endedness of contemporary processes in the Global Political Economy†. http://www.mammadli.az/political_economy.htm The name of Robert Gilpin, the dean of American students of international political economy stands high in the field because of the new approach to IPE, which is due to the focus he has given to essential economic, political and technological forces changing the world. His Global Political Economy: Understanding the International Political Order is a masterpiece of scholarly research done on the different approaches to comprehend international economic relations. The book also takes into consideration the problems the new economy faces. Gilpin has taken into consideration the new emerging economic and political forces; how the new technology, computing and regionalism are changing the face of world economy after the end of cold war. He has laid emphasis in particular to globalisation of the economy, actual and underlying meaning of economic affairs and the level of its importance, nature and how far goes the role of economic affairs and

Annalyzing Alice Walker The Color Purple Essay Example | Topics and Well Written Essays - 750 words - 1

Annalyzing Alice Walker The Color Purple - Essay Example She tells Him that she is only 14 and is already burdened with responsibilities of her siblings and the household, sexually abused by her father and pregnant twice. Innocent Celie is confused as to why these things are happening to her and asks God the reason, saying that she has â€Å"always been a good girl†. (Walker, 1) The letters written by Celie to God and later to Nettie, her sister, symbolizes her voice. Her initial letters to God were symbolic to her emotions that were very private, and therefore not for everyone’s eyes. It also shows her isolation as she has no one else to talk to. The only love she has in her life is that of her sister Nettie. They both share an unusual bond of very deep love. The story takes a turn for worse when Celie is married off to a much older man, who is a widower with children and has no respect for Celie. He treats her like a slave and uses her like a sex object, while continuing his affair with Shug Avery. Shug was first introduced to Celie through a photograph which is symbolic to her belonging to a very different world, a place where beauty exists and not like Celie’s world which is devoid of beauty. Celie, after marriage has a life much the same as before marriage. Nettie, on the other hand, in order to escape her father leaves home and comes to stay with Celie but later she escapes this place as well in order to escape the advances of Mr.__ (Celie’s husband). The separation of the two sisters further adds to the misery of Celie. Carrie and Kate, sisters of Mr.__ had good relations with Celie. Kate was the one who had made Celie believe that she deserved â€Å"more than this†. (Walker, 21) The climax of this book is the growing affection between the protagonist and her husband’s love interest, Shug Avery. Their mutual affection and closeness (even sexual relationships) helps these two women to overcome their personal problems. Shug is the one who brings Celie to the joys of sexual communion and it is from

Wednesday, September 25, 2019

Freshman College Admissions Paper Essay Example | Topics and Well Written Essays - 500 words

Freshman College Admissions Paper - Essay Example I like to go trekking and exploring the parks around my district. I like to do this in groups of friends and acquaintances. I believe that this gives me a chance to indulge in team building exercises that improve co-ordination and control with others and also get to know my strengths and weaknesses. I use these expeditions as a means to get to know myself and understand what my blind spots are. In the school, I am on the track and field team and specialize in Long jump and triple jump events that call for agility and stamina apart from endurance. My experiences in the track and field team have taught me to value the importance of training and discipline as well as concentrating on a particular task at hand. I believe that these values would hold me in good stead in my subsequent education and career. I want to join ISU as I feel that it would be a good fit for me academically and socially. By this I mean that the program would give me enough opportunities to do well in the courses as well as give me a chance to display my athletic skills as well as my social skills. I have sought information about the intramural program at ISU and I feel that I contribute to the success of the program as well as gain friendships in the process. As outlined above, I am relationship oriented person and this is reflected in the way I have dealt with the kids while I was a swimming instructor at Park district for the last four years. In this stint, I have learnt that a good coach is one who teaches as well as learns in the process. Further, I have come to appreciate the people side of the mentoring and coaching process that has helped me in nurturing talent as well as increasing the chances of my progress in the swimming school. Though I cannot claim to be a brilliant student, nonetheless I am hard working and dedicated. I believe that effort and perseverance are as important as natural abilities and being endowed with the same in extra curricular arena, I know what it takes

Tuesday, September 24, 2019

Teamwork Experience Essay Example | Topics and Well Written Essays - 250 words

Teamwork Experience - Essay Example We developed a clear insight into the project in the first meeting and decided to analyze the case from our individual’s perspectives the results of which were discussed in the second meeting. The proceedings of the meeting were recorded by my partner and each of us received a copy. Though effective results were achieved due to the well organized meetings the teamwork did have its share of miscommunications. A meeting was cancelled as one of us failed to check the email informing the date and time of the meeting and conflicts arose due to our differential views about the case. For instance, my understanding of the case was that all the possible communication problems needs to be identified while my partner was for discovering only one particular communication problem and finding a solution. A compromise was achieved after various viewpoints and arguments were discussed. It was decided to list all the potential problems and to consult with the professor for a final decision. Our team work did suffer slightly due to this misinterpretation of our team goals. It was also decided that my partner would present the communication problems while I would focus on the possible solutions and the implementation plan of the case study. I conclude that it was a very effective teamwork and a good learning experience where tasks were distributed equally amongst us. The teamwork experience was enlightening and I am very sure that this would help me to act professionally whenever I am confronted with a similar situation in the

Monday, September 23, 2019

Berry Aneurysms Case Study Example | Topics and Well Written Essays - 2000 words

Berry Aneurysms - Case Study Example An aneurysm usually balloons and may rupture as the forces increase, which would lead to rupturing of the arterial wall and interior bleeding, a situation that is usually fatal and leads to death. Consequently, berry aneurysms results from rupture of arterial walls in the brain with fatal consequences that may cause brain death. The condition is usually caused by defects in the tunica media muscles and lack of enough support from the brain parenchyma, which creates unprecedented stress to the arterial walls causing rupture (Liebeskind, 2013). Therefore, cerebral aneurysm occur incases were the strength of the internal elastic membrane of the adventitia and the tunica media are compromised mainly resulting from abnormal arterial structure at arterial bifurcations, which results in rupture of the vessels at these sections due to blood pressure (Liebeskind, 2013). Causes of Berry Aneurysms Various conditions may lead to berry aneurysms, which include the following: Arterial malformations, aorta coarctation, inherited polycystic kidney diseases and other vascular problems. Others include sickle cell anemia, fungal infections, Marfan syndrome, hypertension among others (Liebeskind, 2013). However, not much is known about the actual causes of the aneurysms and the formation processes leading to ballooning and rupture, but smoking that leads to vascular changes and hypertension are major some of the major predisposing factors (Jonathan et al., 2006). The main characteristic of aneurysms is reduction in the tunica media leading to arterial structural defects.... the reduced membranes causes formation of balloon like structures at the branching parts of the arteries mainly at the lower part of the brain (Jonathan et al., 2006). Epidemiology Most berry aneurysms are small in that 60% to 80% of all cases may not rupture, meaning they pose much less danger to the patient (Connolly & Solomon, 2004). It is estimated that between 10 and 12 million adults in America have intracranial aneurysms, with berry aneurysms accounting for about 90% of all these cases (Liebeskind, 2013). Those over fifty years of age, females and cigarettes smokers are at a higher risk of the aneurysms (Vega et al., 2002). Consequently, as Vega et al noted, berry aneurysm are responsible for the highest cases of mortality and morbidity affecting about 90% of all intracranial aneurysms. However, more cases are being reported in younger patients and especially in cocaine, users or those with smaller arterial diameters (Nanda et al, 2000) Presentation Most aneurysms do not have any symptoms and they may not be reported until they rupture; hemorrhage through a fatal medical emergency remains the single most prevalent clinical presentation in most cases, accounting for about 58% of patients (Yamaura, Onno & Hirai, 2000). However, patients report acute headaches at the onset, which in some cases may also be associated with brief sessions of unconsciousness, vomiting, meningismus and nausea. These hemorrhages are also misdiagnosed as most patients have milder symptoms that indicate a warning leak before the aneurysm ruptures (Vega et al., 2002). Studies have reported rupture rates of between 1.4 to 1.9 %, though the rates are higher in aneurysms of more than 10mmm diameter. However, rupture has also been reported in cases where the aneurysms are less than 5 mm in

Sunday, September 22, 2019

Article Critique Essay Example for Free

Article Critique Essay The thought that peer exclusion is correlated with children’s classroom achievements and adjustment has been hypothesized since the 1930’s. Much research and empirical evidence for such hypotheses have since been collected, and seem to agree with the premise of the correlation. Peer acceptance is the main measurement of this study. In contrast with other types of peer relationships, peer group acceptance, or rejection, is strongly connected with academic readiness and achievement. This article focuses on peer sentiments and its effect on children’s adjustment. It differs from past studies in that its approach is to measure non-observable feelings about classmates, rather than only the observable interactions. The article begins by outlining past research, and developing a premise for the study from those previous studies. The main study that this research builds upon is that of a 2001 study by Eric S. Buhs and Gary W. Ladd, who also conduct this study along with Sarah L. Herald. The premise of the study, based on the 2001 study, is that once classmates express negative feelings and actions upon a peer, those feelings and actions act as a visible marker for further rejection by the larger peer group, and the rejected child as well; as a result, the rejected peers are flagged by their peers, and are left out of classroom interactions, and as a consequence, the rejected child’s learning is impacted ultimately leading to lower levels of achievement (Buhs, Ladd, and Herald, 2006, p. 2). The prior 2001 study found that â€Å"early peer rejection was negatively related to later achievement and that this association was partially mediated through peer maltreatment and declining classroom participation, respectively† (Buhs et al. , 2006, p. 2). The authors developed a hypothesis that built upon their previous study. Their hypothesis was stated as, â€Å"it was hypothesized that prolonged peer maltreatment increases the probability that children will disengage from classrooms (or the school context) and that increasing disengagement impairs children’s achievement. Thus, it was predicted that longer rather than shorter histories of peer maltreatment, after controlling for contemporary exclusion or abuse, would mediate the link between early peer rejection and later classroom disengagement† (Buhs et al. , 2006, p. 3). The authors further state that their purpose for conducting this study was to bridge the gap between the limitations of the previous study (it was only a one year study that attempted to predict students future outcomes) by conducting a more comprehensive longitudinal study over a six year period (kindergarten through fifth grade). Methodology The research study constructed six variables to measure the children with. They include, peer group acceptance/rejection, peer exclusion, peer abuse, classroom participation, school avoidance, and achievement. Peer group acceptance/rejection was conceptualized to mean â€Å"the extent to which individuals were liked/ disliked by classroom peers,† and operationalized by sociometric ratings that were collected from peers during kindergarten. One problem with this operationalization is the ability to comprehensively scale the true feelings of one peer toward another, especially during younger years. Scales, questionnaires, and observations might be too incomplete to capture the true meaning behind the dynamics of peer to peer interactions. Another issue is of how to evaluate separate peer groups. Many times classrooms encompass only a selection of developed peer groupings throughout the grade, and might be unfairly balanced toward one group. An example of groupings would be defined by the terms, â€Å"popular,† â€Å"punk,† or â€Å"nerds. † The research might be biased toward one group, if only because they were over represented in a class room. The variable Peer Exclusion was conceptualized as â€Å"the extent to which children were the target of peers’ nonaggressive rejecting behaviors, including behaviors such as ignoring, avoiding, or refusing to associate with them in the classroom context† (Buhs et al. , 2006, p. 3). The Variable Peer Abuse—the second form of peer mistreatment—was conceptualized to mean â€Å"the extent to which children were recipients of classmate’s aggressive and harassing behaviors† (Buhs et al. , 2006, p. 3). These two variables contained indicators to distinguish between chronic peer abuse, and situational peer abuse. Again, the issue that arises is the effectiveness of these measures. The interactions between childhood peers are complex, and can change daily. The variables Classroom Participation, and School Avoidance were used to measure disengagement from the classroom environment. A large issue with this is how to distinguish individuals who might be avoiding class as an outcome of separate circumstances. If poor participation and avoidance was only observed from the angle of peer interactions, then this view is biased toward the study. The study is seeking a correlation, and if outside factors aren’t controlled for, then they will biasly effect the results of their study. A child’s family life, neighborhood, economic status, innate ability, among other factors, could influence all of the variables that this study examines. The last variable, Achievement, was defined as â€Å"the accuracy with which children could solve progressively more advanced reading, mathematics, and spelling problems on an individualized achievement test† (Buhs et al. , 2006, p. 4). The issue that comes to mind with this variable is the way it uses tests to gauge â€Å"achievement†. Some students fare better on tests than others, while some students take time to develop adequate test taking skills. Another problem is how to control for separate curriculums in different classrooms, and the quality of what is being taught. Data (From the text) Buhs et al. , 2006, p. 5 Participants The data used in this investigation were gathered from a total sample of 380 children (190 girls These children were followed longitudinally from age 5 (kindergarten) to age 11 (fifth grade31 kindergarten class rooms across 10 schools, and by the fifth-grade data collection period, children were in 162 different classrooms across 32 schools. The sample contained nearly equal proportions of families from urban, suburban, or rural midwestern communities, and the sample’s ethnic composition was 17. 4% African American, 77. 1% Caucasian, 1. 6% Hispanic, and 3. 9% â€Å"other. † Family incomes were distributed as follows: 10. 9% of the sample reported total household incomes from $0 to $10,000, 10. 9% reported incomes from $10,000 to $20,000, 12. 6% reported incomes from $20,000 to $30,000, 12. 6% from $30,000 to $40,000, 12. 9% from $40,000 to $50,000, and 40. 3% reported incomes above $50,000. Results The study reports it’s results as, â€Å"peer group rejection is predictive of a range of chronic, negative peer behaviors that may alter both the social environment of the classroom and children’s adaptive responses within that context across the elementary school years. † (Buhs et al. , 2006, p. 11). It suggests that the facet of peer exclusion leading to reduced participation, and ultimately delayed achievements needs further study. It goes on to say that with further study, and thus more knowledge, an empirically based intervention program can be developed. Conclusion It can be argued that to have a complete understanding of the ever evolving and complex world of the social interactions in a school environment is close to impossible. The authors came into their study with a set premise, and expectations of the outcomes, and have seemed to found what they were searching for. The question becomes, how valid are the author’s findings, and can they be applied in a general manner across learning environments. I believe studies that look at complex interactions between children over several years, such as this study, might have too many outside interactionary forces that could effect the data and results. Works Cited Buhs, Eric S. , Ladd, Gary W. , and Herald, Sarah L. (2006). Peer Exclusion and Victimization: Processes That Mediate the Relation Between Peer Group Rejection and Children’s Classroom Engagement and Achievement?. journal of Educational Psychology 2006, Vol. 98, No. 1, 1–13.

Saturday, September 21, 2019

How Number System Is Used In IT

How Number System Is Used In IT In this documentation I have discussed of how the application of number system is used in IT applications in both hardware and applications, operating system and in programming language. I have discussed about the use of base 2 in the 8 bit bytes form use with the operation for subnet. The use of hexadecimal form addressing memory and classless inter Domain Routing. There are number of different numbering system which is in use for the unique ability to represent different numbers. Binary, Octal, Denary and Hexadecimal are number systems that are used in different aspects Denary number is the most commonly used number system which is frequently used in daily life. Nevertheless each number system has associated benefits which are the reason that different number systems are used in different areas. Each of the number system has a fix number of representation of numbers which are used to represent the numbers like, say for example Binary numbers are represented by either one or zero, Octal numbers are represented by numbers from 0, 1, 2, 3, 4, 5, 6, 7 whereas Denary and Hexadecimal numbers are represented by the number of 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and 0, 1,2. 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, respectively. Binary Numbers Binary numbers are mostly used when there are only two options available so if one is false then the other is true. Examples of binary system can be their usage to represent bits in a computer which can have only 0 or 1 value a switch in a electric circuit which can be either on (1) or off (0). Binary system is widely used to represent situations in everyday normal life as well for example for electronic gates in electricity circuits, false or true statements can also be displaced in terms of binary digits where 0 represents false and 1 represents true states. Denary Numbers Denary numbers are frequently used in everyday life in accounting, calendar systems, financial systems or daily routine counting. The main benefits of Denary number system is that they are easier to use as compared to other number systems and have more number to present different situations though Hexadecimal number system has more representations but that representation can include characters in them as well which makes them more difficult to understand and use as compare to denary system. Denary number systems are so frequently used that a person even do not need to have a formal education to know or use them. One of the reasons can be that it is frequently use in daily life accounting. Other number systems are used in more specified fields such as computing and hence would need to be learned. Octal Numbers Octal numbers are not that commonly used as compared to other numbers and are mostly used in computing graphics, text and famous operating system such as UNIX also uses octal numbers for their file protection system. Octal numbers have total of 8 unique representations which can be combined together to make more octal number representations. Octal numbers are difficult to understand for a normal person who has limited number of understanding about the number system. As after 7 different numbers are used to represent numbers from 7 onwards and hence they seem physically bit difficult to comprehend. The number system needs to use a subscript of 8 with is number to represented they are not Denary but octal number otherwise confusion can easily occurred. Hexadecimal Number System Hexadecimal number are used where there are more options which needs to be represented off and are mostly commonly used in computing to represent different memory locations. Since binary, octal and hexadecimal have representations which are powers of 2 (power of 0 in binary, 3 in octal and 4 in hexadecimal) hence that makes them more suitable to different situations, which require different number representations. They are positively contributing to the daily life and to the technology and logical world as well and needs to be understood properly if one needs to take advantage of such technology. Whilst the above gives uses of the binary, octal and hex number systems in different areas of IT and while some example are given the manager encourages you to research a wide range of examples for him to look at. Binary Number System used in ASCII table and IP Address Binary number system are also used in the ASCII table to represent different codes for different characters which then can be used into computing as well. ASCII number is more like a combination of binary numbers. Binary numbers are also used in IP addressing system again which is a combination of Binary number and are used in computing field. These IP addresses are of two different versions now one is known as IP 4 and other one is known as IP 6. These IP addresses are further sub divided into different classes such as class A, B and C where each class has a different number of hosts and network address. The ASCII character set, each binary value between 0 and 127 is given a specific character. Most computers extend the ASCII characters set to use the full range of 256 characters available in a byte. The upper 128 characters handle special things like accented characters from common foreign languages. In ASCII character set, each character is represented by 7 bits when stored in the computer and in an extended ASCII character set, each character is represented by 8 bits. Say for example: ASCII 0000000 represents NULL Similar the word HELLO if converted into binary using the ASCII to binary conversation could be represented as follows. 01001000 01000101 01001100 01001100 01001111(in decimal 72 69 76 79) Please refer an ASCII character table for further understanding of this conversion. ASCII Binary Conversation Octal numbering system for file protection in UNIX Every file or folder in UNIX has access permission. There are three types of permissions (what allowed to do with a file): Read Access Write Access Execute Access Permissions are defined for three types of users: The owner of the file The group that the owner belongs to Other users Thus, UNIX file permission are nine bits of information (3 types x 3 type of users), each of them may have just one of two values: allowed or denied. Simply put, for each file it can be specified who can read or write from/to the file. For programs or scripts it also can be set if they are allowed to be executed. Textual representation like -rwxr-r- It is used in UNIX long directory listings. It consists of 10 characters. The first character shows the file type. Next 9 characters are permissions, consisting of three groups: owner, groups, others. Each group consists of three symbols: rwx (in this order), if some permission is denied, then a dash -is used instead. For example -rrwxrr- 0123456789 Symbol in the position 0 (-) is the type of the file. It is either d if the item is a directory or l if it is a link, or - if the item is a regular file. Symbols in positions 1 to 3 (rwx) are permissions for the owner of the file. Symbols in positions 4 to 6 (r) are permissions for the group. Symbols in positions 7 to 9 (r) are permissions for others. r Read access is allowed w Write access is allowed x Execute access is allowed Replaces r, w or x if according access type is denied Numeric (octal) representation like 664 If a numeric representation is used (like in chmod-command, for example), then it is in the octal format (with the base of 8), and digits involved are 0 to 7. Octal format is used for the simplicity of understanding: every octal digit combines read, write and execute permissions together. Respective access rights for owner group and others (in this order) are the last three digits of the numeric file permissions representation. Example: 0644. Here the second digit (6 in the example) stands for rights of the owner, the third digit (4 in the example) stands for rights of the group, the fourth digit (4 in the example) stands for rights of others. The below tales show what numeric values mean: Octal digit Text equivalent Binary value Meaning 0 000 All types of access are denied 1 x 001 Execute access is allowed only 2 -w- 010 Write access is allowed only 3 -wx 011 Write and execute access are allowed 4 r 100 Read access is allowed only 5 r-x 101 Read and execute access are allowed 6 rw- 110 Read and write access are allowed 7 rwx 111 Everything is allowed According to the above table we can see that 1 stands for execute only, 2 stands for write only, 4stands for read only. To combine the permission you can simply add 1, 2 and 4 to get a needed combination. For instance, to get read and write permission, you add 4 (read) and 2 (write), thus getting 6 (read and write). To get read and execute permissions, you add 4 (read) and 1 (execute), this getting 5 (read and execute). Example: 755 on a file would mean rwx r-x r-w permission on the file. Simply convert the octal number to the binary equivalent and enable the permission where the bits are 1. 755 would mean 111 101 101 In addition there is one more octet representing the Set user ID, set group ID, sticky bit which works in a similar way. Octal digit Binary value Meaning 0 000 setuid, setgid, sticky bits are cleared 1 001 sticky bit is set 2 010 setgid bit is set 3 011 setgid and sticky bits are set 4 100 setuid bit is set 5 101 setuid and sticky bits are set 6 110 setuid and setgid bits are set 7 111 setuid, setgid, sticky bits are set Explain the use of binary in IP addressing for both V4 and V6? Use of binary in IP addressing for V4: Each IP in a V4 IP addressing consists of 32 bits. These 32 bits are divided into 4 octets of 8 bits each. An IP address is represented like this: 172.12.12.46. A computer can understand only binary values and therefore each IP is stored in binary. Each octet is represented as follows. For example if the value of the first octet is 128, it would be represented as follows: 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 0 Therefore an IP 128.128.128.128 would be stored as follows: 10000000 10000000 10000000 10000000 Use of binary in IP addressing for V6: While IPv4 allows 32 bits for an Internet Protocol address, and can therefore support 232 (4,294,967,296) addresses, IPv6 uses 128-bit addresses, so the new address space supports 2128(3.4 x 1038) addresses. This expansion allows for many more devices and user on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. The IPv6 128-bit address is divided along 16-bit boundaries. Each 16-but block is then converted to a 4-digit hexadecimal number, separated by colons. The resulting representation is called colon-hexadecimal. This is in contrast to the 32-bit IPv4 address represented in dotted-decimal format, divided along 8-bit boundaries, and then converted to its decimal equivalent, separated by periods. The following example shows a 128-bit IPv6 address in binary form: 0010000111011010000000001101001100000000000000000010111100111011 0000001010101010000000001111111111111110001010001001110001011010 The following example shows this same address divided along 16-bit boundaries: 0010000111011010 0000000011010011 0000000000000000 00101111001110110000001010101010 0000000011111111 1111111000101000 1001110001011010 The following example shows each 16-bit block in the address converted to hexadecimal and delimited with colons. 21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A IPv6 representation can be further simplified by removing the leading zeros within each 16-bit block. However, each block must have at least a single digit. The following example shows the address without the leading zeros: Javascript:CodeSnippet_CopyCode(CodeSnippetContainerCode3); 21DA:D3:0:2F3B:2AA:FF:FE28:9C5A Binary in describing class A, B and C IP addresses The class of the address determines which part belongs to the network address and which part belongs to the node address. All nodes on a given network share the same network prefix but must have a unique host number. Class A Network binary address start with 0, therefore the decimal number can be anywhere from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102.168.212.226, where 102 identifies the network and 168.212.226 identifies the host on that network. Class B Network binary addresses start with 10, therefore the decimal number can be anywhere from 128 to 191. (The number 127 is reserved for loopback and is used for internal testing on the local machine.) The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network. An example of a Class B IP address is 168.212.226.204 where 168.212 identifies the network and 226.204 identifies the host on that network. Class C Network binary addresses start with 110, therefore the decimal number can be anywhere from 192 to 223. The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. An example of a Class C IP address is 200.168.212.226 where 200.168.212 identifies the network and 226 identifies the host on that network. Hexadecimal for addressing memory Memory addresses are displayed as two hex numbers. An example is C800:5. The part to the left of the colon (C800) is called the segment address, and the part to the right of the colon (5) is called the offset. The offset value can have as many as four hex digits. The actual memory address is calculated by adding a zero to the right of the segment address and adding the offset value, like this: C800:5 = C8000 + 5 = C8005 C8005 is called as the absolute or linear address of the memory. Similarly F000:FFFD can be computed to get the following memory address. F0000 + FFFD FFFFD or 1,048,573(decimal) The Segment: Offset addressing was introduced at a time when the largest register in a CPU was only 16-bits long which meant it could address only 65,536 bytes (64 KB) of memory, directly. But everyone was hungry for a way to run much larger programs! Rather than create a CPU with larger register sizes (as some CPU manufacturers had done), the designers at Intel decided to keep the 16-bit registers for their new 8086 CPU and added a different way to access more memory: They expanded the instruction set, so programs could tell the CPU to group two 16-bit registers together whenever they needed to refer to an Absolute memory location beyond 64 KB. Classless Inter Domain Routing Classless Inter Domain Routing. CIDR was invented several years ago to keep the internet from running out of IP addresses. The classful system of allocating IP addresses is very wasteful. Anyone who could reasonably show a need for more that 254 host addresses was given a Class B address block of 65533 host addresses. Even more wasteful were companies and organisations that were allocated Class A address blocks, which contain over 16 Million host addresses! Only a tiny percentage of the allocated Class A and Class B address space has ever been actually assigned to a host computer on the Internet. CIDR specifies an IP address range using a combination of an IP address and its associated network mask. CIDR notation uses the following format xxx.xxx.xxx.xxx/n where n is the number of (leftmost) 1 bits in the mask. For example, 192.168.12.0/23 applies the network mask 255.255.254.0 to the 192.168 network, starting at 192.168.12.0. This notation represents the address range 192.168.12.0 192.168.13.255. Compared to traditional class-based networking, 192.168.12.0/23 represents an aggregation of the two Class C subnets 192.168.12.0 and 192.168.13.0 each having a subnet mask of 255.255.255.0. In other words, 192.168.12.0/23 = 192.168.12.0/24 + 192.168.13.0/24

Friday, September 20, 2019

Censorship of the Internet and Mass Media

Censorship of the Internet and Mass Media The conversation regarding censorship amongst states, meaning nations or countries in this context, has been a highly contested and conflicted debate for over a century.   According to The Merriam-Webster Dictionary, â€Å"censorship is suppression of speech, public communication, or other information, on the basis that such material is considered objectionable, harmful, sensitive,  politically incorrect  or inconvenient as determined by government authorities or by community consensus† (Merriam-Webster). Nearly all states, even those that are considered to be extremely free states, practice numerous forms of both direct and indirect censorship. Censorship is usually rationalized to protect from dangerous, obscene, and/or negative information from being released and exposed to certain audiences or the general public. It is important to be noted that self-censorship, where one or more individuals censor their own personal discourses and environments, is not the type of ce nsorship that pertains to this essay as it will focus on official acts of censorship. In her book, Censorship In America, historian Mary E. Hull defines official acts of censorship as official actions by a government or governing body that restrict access to certain information to their audience (Hull, 1).   For the purposes of this essay, the United States of America will be the main focus when discussing censorship and its effects and implications. If given the absolute power and ability, the censorship of the internet and mass media in America could produce detrimental effects amongst nearly all aspects of society. Therefore, it is of utmost importance that free, open, public, and uncensored access to the internet and medias across the United States of America must remain and be protected. Technology and increased globalization have interconnected states and their citizens more than ever which has led to the creation of the â€Å"global citizen†. Because of this, some governments have highly censored media within their states as freedom of speech and access to different thoughts and ideologies poses high risks. Across the globe, numerous non-governmental organizations research and work to determine the amount and ways-in-which information is censored in different states. Reporters Without Borders (RWB), a United Nations consultant, studies the freedom of expression and information in states and publishes their findings in the annual World Press Freedom Index. The World Press Freedom Index consults and surveys expert lawyers, sociologists, media professionals, and journalists on pluralism, media independence, environment and self-censorship, legislative framework, transparency, infrastructure, and abuses within their country. The 2018 report that surveyed one hundred and eighty states concluded that Norway, Sweden, and the Netherlands are the most free and/or least censored states while Syria, Eritrea, and North Korea are currently the most censored and least free states (RWB, 2018). For reference, Canada is the eighteenth most free state, the United Kingdom is the fortieth most free, and the United States falls as the forty-fifth most free state. The United States fell two places from 2017 to 2018 which can be attributed to the actions of President Donald J. Trump and his administration. Trump notoriously declared the press an â€Å"enemy of the American people†, which has triggered attacks against journalists and their credibility using the fallacious and often erroneous term â€Å"fake news† (RWB, 2018). Reports and research like this help truthfully determine the freedom of speech, press, and information across the globe from a nonbiased perspective.  ­ Censorship in The United States of America Censorship in the United State of America is a highly controversial topic given how prominent and institutional the liberty of freedom of speech and the press is engrained into legislature and society. The First Amendment to The Constitution states, â€Å"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.† (U.S. Const. amend. I). The freedom of speech in America is not absolute as it does not protect hate speech or obscenity, meaning that strongly offensive speech or speech that promotes hateful acts based on bias can legally be censored as they are not protected forms of speech (Hull, 3). The First Amendment can be attributed as the foundation for the popular American motto and saying, â€Å"land of the free†. This nationalistic saying has permeated American society as many Americans pride themselves on the thought of America being thee land of freedom and justice despite numerous ranking and studies pointing otherwise (RWB, 2018). Since the creation and implementation of the First Amendment, numerous laws and rulings have been instituted and repealed in order to restrict the freedom of speech and press. Notably, the Sedition and Espionage Acts, imposed under President Wilson in 1917, declared it illegal and treasonous for citizens to speak against the United States government, military, and flag. This act attempted to bend the First Amendment, however, it was repealed in 1919 as it clearly violated the freedom of speech and press clause. In 1971, The Pentagon Papers, officially titled  Report of the Office of the Secretary of Defense Vietnam Task Force, were classified United States of America military and government documents that were leaked. The Pentagon Papers detailed the involvement of the United States in the Vietnam War from 1945-1967 (Hull, 27). These documents revealed that the United States had gone against legislation and made official decisions without the aid or input from Congress, which is legally required. They were leaked, according to Hull, because â€Å"critics charged that the government resorted to excessive classification of documents in order to conceal activity from the public, whereas the government maintained that it was acting in the interests of national security† (Hull, 29). This leak was taken to the Supreme Court of the United States and was ruled legal as the Supreme Court determined that the general public has the right to these documents despite the government’s attempt to censor the press. Although the First Amendment has been tested numerous times, it stands generally true that individuals in the United States of America are entitled to freedom of speech and press so long as it does not fuel the occurrence of legitimate crimes. Internet Censorship in the United States Within the past few decades, the rules and guidelines set by the First Amendment have made the waters murkier than ever when discussing censorship and the media.   The internet has made news and media more accessible than ever which enhances the effects, debatably both positive and negative, censorship can have. Given the capitalistic nature of the internet, major new sources occupy a massive section of the internet and tend to circulate only chosen specific media and news stories that fit their agenda, this is known as corporate censorship.  ­Project Censored, a news source that publishes important news and media that was not reported by the mainstream mass media, works to eliminate corporate censorship as they see it as a blockade towards democracy and free press. (Jensen, 2018). Although corporate censorship is highly problematic, it is protected by the First Amendment as companies and individuals have the right to broadcast what they see as fit. The Internet Must Remain Free from Censorship Internet Censors and Blockers In the United States, the First Amendment protects against and prohibits majority of internet censorship involvement from the federal, state, and local governments. However, private companies have more leeway in their actions to censor content, particularly in regards to public spaces. There tends to be a steep crossover between these private companies and the state as the government or government officials often support and fund companies whose interest align with theirs. This is a classic incident of corruption with the government finding a loophole to overstep their rightful bounds. Internet censorship is typically performed by content blockers and removers that are created, installed, and programmed to block all content deemed obscene or unfitting. The major problem of these programs is determining what content is and is not okay†¦a process that can be easily corrupted. In the words of Mary E. Hull, â€Å"What is indecent in one persons mind may be decent in anothers; thus, regardless of the censors motive, the result of censoring is the denial of anothers freedom to choose.† (Hull, 2). This exact problem was exacerbated in 1997 in a Virginia library that had installed a blocking program on its public computers. The intention of the program was to block and censor sexually explicit content from minors, which is perfectly legal and the decision was supported by the National Law Center for Children and Families (Hull, 35). However, this program, advertently or not, also blocked the American Association of University Women website and an AIDS website which is extremely problematic because this blocker is now restricting access and information from the public. The center of this controversy is not the use of a blocker, as individuals should have the right to knowingly censor content in private, but the fact that a publically funded device was censoring appropriate content. Given this incident occurred in 1997, it is unlikely that the censoring of those two specific websites was directly intentional, however, it remains unclear as numerous biases could lead a company to explicitly censor more than originally intended.   This incident, albeit small, shows how detrimental censorship of the internet can be and why the internet needs to remain publically uncensored.  Ã‚   It is extremely important that the First Amendment be rigorously upheld in the United States of America as it is the major piece of legislation that prohibits extreme censorship. For this reason, totalitarian control of the internet has not been observed in the United States but other countries can be used as examples of this. The People’s Republic of China is notorious for their strict censorship of the internet, especially social media, and suppression of news and information. According to the 2018 World Press Freedom Index, China is the one hundred and seventy-sixth (fourth worst) least free states as President Xi Jinping and the Communist Party implement extreme censorship and surveillance on the citizens (RWB, 2018). China has been very innovative to censor the internet by creating different apps and networking sites that resemble sites like Facebook and Twitter (Walker & Orttung, 77). China’s censored version of Twitter, called Sina Weibo, has a massive member base with over six hundred million users.   Key to their censorship is strict criminal punishments for publicizing thoughts, ideologies, and ideas that go against China and the Communist Party (Walker & Orttung, 78). China also restricts nearly all forms of media by requiring newspapers to register with the government and all television is broadcasted by government-run China Central Television. The extreme censorship in China has taken the voices away from the people and subjected them to only the thoughts and rhetoric provided by the government. This is extremely dangerous as nearly all forms of dissidence, personal expression, thought exploration, education, and legitimate news are deprived from the people so that they unintentionally surrender themselves to the country. In order for democracy and freedom to remain in the United States, it is absolutely essential that the internet and social media remain free from government interaction. The Importance of Social Media The growing accessibility and prevalence of the internet in daily lives has allowed for social medias to play pivotal roles in individuals’ personal lives, politics, and society as a whole. Both Facebook and Twitter have become major sources of news, information, and misinformation in America. Both of these sites have become hubs for people to share their personal opinions in reaction to the news, especially politics. Politics in America has become more polarized than ever which has increased greatly increased tensions and amplified party affiliations from the election of Barack H. Obama in 2008 to the election of Donald J. Trump in 2016. Misinformation, especially political misinformation, has become increasingly more prevalent and believed through platforms like Facebook and Twitter. Misinformation can be partially attributed to motivated reasoning, the illusion of objectivity, and partisan-driven motivated reasoning as they explain why voters cling to certain ideologies, misperceptions, and corrections (Thorson, 463; Berinsky, 7; Nyhan & Reifler). In short, motivated reasoning is a phenomenon where one will support a desired conclusion if they can rationalize it (Kunda, 482-483). A study researching the presence and diffusions on Twitter during the 2012 election showed that rumors were shared by polarized accounts that created â€Å"‘echo chambers’ defined by political homophily that were based on ideological attitudes not truth and merit† (Shin, Jian, Driscoll, & Bar, 1227). Social media sites harbor misinformation because they are highly polarized, therefore misinformation is more likely to become believed via motivated reasoning if it aligns with one’s belief system or party alliance. An extremely detrimental piece of misinformation began in 1988 when Andrew Wakefield published a report that incorrectly liked the Measles-Mumps-Rubella vaccine to autism. This link has been extensively discredited yet still persists and has caused numerous recent outbreaks of measles. In a study conducted by Mark R. Joslyn and Steven M. Sylvester, they found the individuals’ belief in this myth became politicized and lead to faulty governance and policies that allowed outbreaks to occur (Joslyn & Sylvester, 17). Although this report was false, it is important for it to be noted that social media has enough power to influence politics and government. Social media also becomes an accessible intermediate that exposes its users to current news, political beliefs, and ideologies. Numerous studies show that social media becomes an environment where individuals can find like-minded individuals and share their thoughts, however, those same factors also nourish misinformation.   As previously mentioned, Donald J. Trump coined the term â€Å"fake news† when referring to news that is not favorable toward him or his administration, regardless if the news is actually true or false. This term is extremely problematic because it discounts journalists providing truthful information while diminishing that problem that legitimately false news poses. False news tends to spread faster and quicker, however, eventually, it tends to reach a much smaller audience. In 2016, a tenth of conservative Republicans accounted for consuming sixty-five percent of fake news (Carey, 2018). In order to tackle this problem, Facebook has embedded a fact-checking service into flagged articles so the consumer knows it is misinformation before they choose to share it (Hunt). Fake news and â€Å"fake news† are both very real problems as legitimate journalism is of value and should be protected. Censorship is a dangerous tool that should be used in a very selective manner as it can deprive individuals of necessary information. In the United States of America, it is incredibly important that the First Amendment is upheld as it provides all citizens with a voice and platform to both share and receive thoughts, information, news, and ideologies. Free speech and free press absolutely has its downsides as dangerous misinformation can easily be shared and believed but the benefits of freedom of speech and press are so much greater. Protection of freedom of the internet is essential in order for the United States to remain a democratic, liberated, and just nation. References Berinsky, A. J. (2015). Rumors and Health Care Reform: Experiments in Political Misinformation. British Journal of Political Science,47(02), 241-262. doi:10.1017/s0007123415000186 Censorship [Def. 1]. (2018, April 25). In The Merriam-Webster Dictionary. Retrieved April 29, 2018, from https://www.merriam-webster.com/dictionary/censorship 2018 World Press Freedom Index(Rep.). (2018, April 25). Retrieved May 3, 2018, from Reporters Without Borders: For Freedom Information website: https://rsf.org/en/ranking/2018 Hull, M. (1999). Censorship in America : A Reference Handbook. Retrieved May 1, 2018, from http://web.b.ebscohost.com.ezp1.lib.umn.edu/ehost/ebookviewer/ebook/[emailprotected]essionmgr120&vid=0&format=EB&lpid=lp_I&rid=0 Jensen, C. (n.d.). Censored News Stories. Retrieved May 3, 2018, from http://projectcensored.org/about-us/ Joslyn, M. R., & Sylvester, S. M. (2017). The Determinants and Consequences of Accurate Beliefs About Childhood Vaccinations. American Politics Research. doi:10.1177/153267317745342 Kunda, Z. (1990). The case for motivated reasoning. Psychological Bulletin,108(3), 480-498. doi:10.1037//0033-2909.108.3.480 Nyhan, B., & Reifler, J. (November 30, 2016). Do People Actually Learn From Fact-Checking?Evidence from a longitudinal study during the 2014 campaign. University of Exeter. Retrieved April 17, 2018. Shin, J., Jian, L., Driscoll, K., & Bar, F. (2016). Political rumoring on Twitter during the 2012 US presidential election: Rumor diffusion and correction. New Media & Society,19(8), 1214-1235. doi:10.1177/1461444816634054 Thorson, E. (2015). Belief Echoes: The Persistent Effects of Corrected Misinformation. Political Communication,33(3), 460-480. doi:10.1080/10584609.2015.1102187 United States Constitution,  § Amendment I (1787). Walker, C., & Orttung, R. W. (2014). Breaking the News: The Role of State-Run Media. Journal of Democracy,25(1), 71-85. doi:10.1353/jod.2014.0015