Thursday, October 31, 2019

Sociological Views on Poverty Essay Example | Topics and Well Written Essays - 1500 words

Sociological Views on Poverty - Essay Example It would then be followed by a critical examination of the arguments taken by authors and commentators and would end in a conclusion that shall emphasize the role of the global interrelation and effort to resolve the problems of poverty. Poverty as stated by Ruby Payne in her book, Framework for Understanding Poverty, is the condition in which the person does not have enough resources. She further clarifies that there are different types of resources with which poverty could be identified with. First and the most popular concerns financial resources which refers to monetary value that shall enable the individual to purchase services and goods. The others include emotional, mental, spiritual, physical, support systems such as friends and family networks, role models and knowledge of habits. However, financial resources have been the most popular since it was the most obvious, regardless of this; the other resources are also important and relevant if one would like to counteract poverty as a whole. (2005, pages4-8) Since usually poverty is seen as a lack of financial resources, it has been customary for people to respond to poverty through financial support. This is primarily done through donations and grants. It is also in line with this view that people thinks that people are poor because they do not work hard enough in able to sustain their basic needs. People who looked like rubbish or are not presentable are often seen as poor. (Payne, 2005, page 4-9) Another author, Farley, believes that poverty is something that is rooted on sociological relationship such as the economic production, the political system, the institution that is present in the society, the predominant culture prevalent in the society. Thus, poverty in this view is not a problem in the individual level but in a societal level which could only be remedied through sociological programs and changes. To further clarify his view, he provided an introduction to two relevant perspectives that shall explain his belief. (2000, 173) The Functionalist perspective is a view, wherein the whole society is likened to a living organism wherein each cells are relevant and relatively connected to one and another. As the name of the theory implies, it insist that each part of the society is present due to a certain function that it must perform. (Kitano, 1985:40). In line with this perspective, poverty is viewed as a necessary part of society. Poverty has a function in the society in which it could be found. Looking closer, poor people resembles certain characters that set them aside from the rest of the society. The differences in values and in culture have made the poor different from other members of the society. Now this attitude would be inherited by their children thus explain the expansion of poverty. Most commonly the poor people think as if they could not change their life and life style since they were born that way. (Eitzen and Baca-Zinn, 1994 page 173-175) However, this kind of approach to poverty is too limited and very illogical. Poverty might indeed be natural but this does not mean that it should be left in its own. Time before

Tuesday, October 29, 2019

The Good and Bad Times of Clinton Office Essay Example for Free

The Good and Bad Times of Clinton Office Essay Every presidency left people with significant events, both good and bad. This holds true to the American setting where each administration is sure to impart both legacy or prominence and most notably, controversy. In fact, it is ironic that people are keener in discussing the intrigues and flaws committed by a former President rather than acknowledge his concrete accomplishments and contributions to the country. Despite however this glaring life reality and human nature, it is still essential that a previous American leader be recognize for his efforts in unifying American people under a common stand which is for the nation to be stable, progressive and remains to be one of the most powerful and influential countries in the world. Such condition is what happened to the regime of the 42nd commander-in-chief of the United States, President William Jefferson â€Å"Bill† Clinton. Foremost his achievements and deeds, which are all supposedly aimed at empowering and uplifting the plight of American people; Clinton is best remembered through his controversial decisions and activities. In fact, beyond the apparent economic growth that his office attained, people are unfortunately reminded of Clinton’s dishonorable ethical blunder which was highlighted by the reported Monica Lewinsky sexual scandal. In an effort, therefore, to best understand and realize both the good and bad times of the Clinton office, it is empirically fair to present the nice and unpleasant things and events that happened during this presidential term. This is because in doing so, people will have the opportunity to realize the benefits of Clinton’s triumphs and most importantly, learn from his leadership mistakes. In his memoir â€Å"My Life,† Clinton made a poignant effort for the American people to understand him beyond his presidency. Regardless however of his charismatic and celebrated personality, Clinton struggled to rectify his dwindled and scandal-ridden administration. It became an inevitably difficult task for Clinton to fulfill his promises, while still campaigning for presidency, as well as adhere to his platform during his two-term office. This is primarily due to the reality that his feats were marred by his own faults. It is first worthy to take into consideration that Clinton’s political era has manifested goodness even before he became the initial Democratic president after Franklin D. Roosevelt to prevail over a two-term White House office. When his time came to lead the nation, Clinton made Americans benefit from further peace and order as well as economic advantages (â€Å"Bill Clinton† 1). Additionally, the good times of the Clinton office are further illustrated with the country reflecting the ever lowest unemployment rate, a feat which previous presidents have not achieved. The economic benefits made by the Clinton office were also depicted by the lowest inflation in a span of three decades, the soaring housing ownership in the entire history of U. S. , significant fall of crime rates in a number of states, and lessened welfare turn-over. These fiscal triumphs were more highlighted with the Clinton office’s proposal of the first fair national budget which eventually ended in a budget surplus (â€Å"Bill Clinton† 1). Clinton time in office was likewise marked by an end of the period of the so-called big government. This is when significant measures were made that improved the educational system, protected and assured people with jobs, curbed firearms trade and reinforced environmental policies. The economic prosperity of Clinton office was corroborated by Kelly who stated that it is in his time that the stock market climbed radically. Aside from this, Kelly added that it is in Clinton’s regime that the Family and Medical Leave Act and North American Free Trade Agreement were passed and ratified, respectively. Lastly it was during Clinton office that international hostilities were put to an end including the reign of Saddam Hussein (Kelly 1). While the bad time of Clinton office significantly resulted from the failure of his proposal to undertake a system for national health care, it was in the second term that his presidency started to fall off. In fact, it is the period when Clinton earned more fame due to controversies that included the Gennifer Flowers, Whitewater Travelgate, the FBI file controversy as well as the emergence of Paula Jones and eventually the Lewinsky alleged intimate affair. Relatively, Gertz alarmingly noted that beyond Clinton’s dreadful confession, over a national television, that he â€Å"misled† the American people concerning the Lewinsky scandal, he is more accountable for further upsetting cover-up. According to Gertz, the Clinton office was definitely blemished by a bad leadership decision that concerned guidelines which, in turn, affected and eventually harmed the nation’s security (Gertz 3). Gertz further revealed how Clinton betrayed the American people through his office’s determined failure and disobedience to â€Å"provide for the common defense† which the American constitution requires. The author added that Clinton’s reckless guidelines, as regard key military and intelligence measures, affected the country’s protection. Clinton’s apparent inconsiderate cover-up of this apparent wrongdoing betrayed and left the country with weaker and susceptible military. This is unfortunate especially during a period that its rival countries have strengthened and a more unsafe world exists (Gertz 3). Judging from the cited good and bad times of Clinton office, the historical importance of his regime became evident. In a time of a mounting divided politics and instability, Clinton succeeded in moving his plan to a core which led to mainstream America. Despite however of the bad times and even the aborted impeachment, Clinton is still and ultimately considered to be a very popular president. Works Cited â€Å"Bill Clinton. † The White House. n. d. 17 March 2009 http://www. whitehouse. gov/about/presidents/williamjClinton/. Gertz, Bill. Betrayal: How the Clinton Administration Undermined American Security. Washington, DC: Regnery Publishing, 2001. Kelly, Martin. â€Å"Bill Clinton – Forty-second President of the United States. † n. d. About. com: American History. 17 March 2009 http://americanhistory. about. com/od/williamjclinton/p/pclinton. htm.

Sunday, October 27, 2019

Characteristics of System Modules

Characteristics of System Modules Identify and report the names , purpose and characteristics of system modules such as mother board, power supply, CPU, Memory modules, storage devices, display devices, adaptor cards, ports and cases in the given machine.(10 marks) Name: Mother Board (P4-GA-EP45T-UD3LR {775/DDR3} w/Sound+LAN) Purpose: The purpose of mother board is to guide the computer do computations. It has buses, or electrical pathways to allow data to travel between the various components that include in a computer and it have two-chip layout that can perform with lower power consumption. Characteristics: It is the basic system of the electronic circuit of computer and all the components for the computer system are glued on it with its various slots and connectors. Moreover, CPU, panel connector slots, memory cards, the adapter cards, DDR slots, AGP, AMR and PCI slots, north and south bridges are glued on it. The back panel ports stick through the back of the case. fig 1.1 Motherboard Name : Power Supply ( ATX power supply with 550W ) Purpose: The purpose of power supply is to deliver electrical power for every connector in the system board and its expansion converter of AC current voltage to DC current voltage. Characteristics: power supply is the converter of AC current voltage to DC current voltage and it has 24 pin or 20 pin and 4 pin. Power supply of 24 pin and 20 pin is to provide motherboard and 4 pin auxiliary is for CPU fan. Name: CPU (Intel Core 2 Duo 2.93GHz {3 MB / 1066 / 775 LGA Socket}) Purpose: The CPU, the brain of the computer, is to receive data from user and it reads, interprets informations and executes commands. Characteristics: In a PC, the CPU uses its ALU (Arithmetic/Logic Unit) to carry out mathematical operation and it can change location data in memory to another address fig1.2_CPU Name : Memory Modules( DDR2 RAM 2GB 240pin 800 MHz Kingston ) Purpose: It enables computers to work faster because all the information processed by the CPU is written or read from memory, Characteristics: Memory module is a board used to refer to a series of dynamic random access memory integrated circuits modules mounted on a printed circuit board and designed use in personal computers, workstations and servers. Name : Storage Devices (such as Floppy, Hard disk, Tape, CD, DVD drives) Purpose: It can save data permanently from temporary data storage by optical and magnetic methods. Characteristics: Major magnetic devices (floppy disks, hard disks, and tape) are rigid disks that are permanently sealed in a non-removable, vacuum- tight portion of the drive unit. With the optical media (CDs, DVDs), data is stored digitally on a light-sensitive material by a powerful, highly focused a laser beam. Name : Monitor (19 LCD Color Monitor(View Sonic wide view 1932 wm with DVI+LED) Purpose: Monitor is the device to display the videos and graphics information generated by the computer through the video card Characteristic: Monitors are similar to televisions but display information at much higher quality. There are two kinds of monitor. They are CRT (Cathode ray tube) and LCD (Liquid Crystal Display).LCD monitors are much thinner, and less power consumptions than CRT monitors Name : Adaptor Cards Purpose: is to enable our computer to communicate with another peripherals such as monitor Characteristics: Motherboard Graphic Adaptors are low cost flat panel display interface card to use on board. Name : Ports Purpose: It is used to connect with electrical devices that need for personal computer system. Characteristics: It is the place where the devices needed to insert in motherboard for a computer. And there are many ports on following. Ports Name Pins Inserted Particles PS 2 6 pins Key Board, Mouse Serial 9 pins modem, mouse, joystick Parallel 25 pins printer VGA 15 pins monitor USB 4 pins mp3, memory sticks, etc. RJ 45 8 pins use to connect with network Name : Cases Purpose: It is the box or tower which can enclose the main components of a computer such as motherboard, power supply, drives and many peripherals. Fig 1.3- System unit and Casing Characteristics: Cases are usually constructed from steel, aluminium or plastic is sometimes used. And it is the largest component in computer system. Tower cases come in mini, mid and big towers and intended to stand on the floor. There are the capacities for CD-ROMs, floppy disk, hard disk drives. I/O ports can insert in back panel shield. Moreover, Cases are more than 14 inches tall. Task 1 b) Identify the names, purposes and performance characteristics of the standardized peripheral ports in the machine such as Serial, USB, Firewire, DB, RJ, Din, Mini-DIN, Centronics, Associated cabling and their connectors.(10 marks) Fig1.b Name: Serial Port(9 pin) Purpose: It is to provide a standard connector and protocol to let our attach devices, such as modems, to our computers Performance characteristics: It is the basic external connections to a computer and Integral part of most computers. The serial port completely in support of USB connections, most modems still use the serial port, and in some printers, PDA and digital cameras. Name: Parallel Port Purpose: It is to connect the PC with printer, external CD drives, Zip drive, external hard disk drive, or tape backup device. Performance characteristics: The parallel port can sends data simultaneously over 8 data lines at speeds of12,000 Kbps. Name: USB (Universal Serial Bus) Port Purpose: It can allow data to transfer between electrical devices and supply electrical power to that devices from cable without own power source. Performance characteristics: USB port is depended on by some devices to get power or charge their battery. Moreover, USB for connecting on personal computers and equipments such as network adapters, broadband and cellular modems for Internet access and USB printers to be shared on a home network. Name: Firewire Purpose: FireWire is to connect data storage devices to anything from TVs or even professional Video recording apparatus because of its high data transfer rate, its perfect for transporting video and digital playback device to a digital recording device. Performance: FireWire can provide more power than USB 2.0 and can deliver data faster. And most satellite TV and digital receivers for cable have a Firewire output and this port can recorded programming to a PC in its original MPEG2 format. Fig: 1b.1for FireWire on popular digital cable terminal used today. Name: DB Purpose: Data Bus is connections between and within the CPU, Memory, and many peripherals that used to carry data. Performance: There are 2 types of data bus, they are data bus and address bus. The data bus is the media that transfer data and address bus transfer information about where the data should go and let to be transferred data faster. Name: RJ (Registered Jack) Purpose: It is the port for twisted pair cable called LAN (local area networks), especially Ethernet or RJ-45 that can link with MODEM or Ethernet Switch. And Modem RJ-11 connectors are also to connect some types of LANs with modems. Fig 1b.2 RJ-45, RJ-11 and Ethernet switch Performance Characteristics: RJ-45 looks similar to RJ-11 that used for telephone equipment, but RJ-45 are a bit wider than RJ-11. Moreover, RJ-11 is connector that has a four or six wire connectors that used to connect telephone equipment. Name: Din Purpose: It is used in AT style of computer. DIN connectors held in place by the friction of the connector body and by pins. And it is used in PC keyboards, MIDI instruments, and etc. Performance characteristics: DIN connectors are round, with pins arranged in a circular pattern. Name: Mini-Din Fig. 1b.3 Purpose: It is the another type of DIN connector Performance: MINI-Din connectors are 9.5 mm in diameters and come in seven patterns that in the form of number of pins from 3 to 9. Name: Centronics (printer port) Purpose: Centronics port shows the bi-directional version of the port, which allows the transmission and reception of data bits at the same time. Performance Characteristics: It has 36 pin connector to connect the PC with printer. That can flow data with maximum 4 megabytes per second for faster printing and back channel status and management. And new standard of Centronics port can connect scanners, tape drives, Hard disks, computer networks adapters and other devices. Task 2 List the 3 most popular types of mother boards, their components and their architecture (6 marks) Types of motherboards XT (Extended Technology) AT (Advanced Technology) ATX (Advanced Technology Extension) The components include in motherboard are The CPU, the busses, Chipsets (controllers), sockets, connectors, etc Architecture of motherboard The motherboard is a board covered with electronics and it is just a big plastic sheet which is full of electrical conductors. And the conductors (tracks) run across and down, and in several layers in order to connect all the individual components, and transfer data between them. The cabinet and the motherboard are made to satisfy each other, so there are holes in the metal for the connectors mounted on the board. Finally, the motherboard has to be linked to the PCs power supply installed in the cabinet. b) Identify the purpose of CMOS memory in your PC and list out what it contains. Describe how and when it is necessary to change the CMOS parameters (6 marks) The purpose of CMOS in PC CMOS (Complementary Metal Oxide Semiconductor) is situated in BIOS chip It requires very little power and it can be powered by a small battery thats integrated into the motherboard hold data It will be automatically recharges while the computer is on. CMOS MEMORY contains Standard CMOS Setup Program BIOS Features Setup Program Power Management Program PNP/ PCI Configuration Program Load BIOS Defaults Program Load Setup Defaults Program Looking about Integrated Peripherals Supervisor Password User Password IDE Hard Disk Drive Auto Detection Hard Disk Drive Low Level Format Save and Exit Setup Program Exit Without Saving Program CMOS Parameters can be changed in CMOS Setup Program and this program can be entered by pressing the DEL or F2 key continuously during the Window Program is started to run. In Most Motherboards that have jumper which allows the user to return to the default CMOS setting configured by the manufacturer in CMOS restore to factory defaults. This is useful because when you cannot enter the CMOS Setup Program because of the incorrect CMOS setting or Lost CMOS Setup password. So, that make sure the power is completely off when you shorten the jumper. c) You are required to use two different types of Printers and list the following information derived from each printer: i) What are the printer technologies, interfaces and options for upgrades available for your printers (4 marks) ii) What are the 2 common printer problems which you can expect from our printers, list our remedies for the problems using appropriate references? (4 marks) Two different types of Printers are Serial Printer Page Printer In Serial Printers, Two Groups can be categorized as follow: Impact Printers (Using Ribbon) -Dot Matrix Printers b) Non- Impact Printers (Using Toner Cartridge) -Thermal Printers -Ink Jet Printers In Page Printers, Non Impact Printers Laser Printers (Mono chrome, Color laser) Interfaces Of Printer: It is a collection of hardware and software that allows the printer to communicate with a computer. It can make some printer more flexible in multiplatform environment. If the printer has several interfaces, it can usually exchange between them on the fly so that several computers can print at the same time. Reference from: A+ Fast Pass written by David Groth Options for Upgrade: Resolution Of Printer can be measured as DPI (dots per inches) Printer Buffer Two Common Printer Problems Paper Jam Cause of Toner drum on laser printers Remedies for Printer Problems If the is jammed, the first work is to pull out any remnants. Even the smallest piece of paper could cause the problem so check your printer carefully. If the problem is related with toner cartridge, check to see your printer toner cartridge that is empty or low. So, the solution is to refill the toner to your laser printer and this problem is depending on time and you must check once a year for your printer. Moreover, the major problem is the ink will dry out in the small nozzles and block if they are not use at least once a week. Task 3 For this task and subsequent task you need to set up a small Windows XP network using at least 3 computers. Produce a report with appropriate screen capture evidencing your practical work and covering the following information: Identify the types of network cables, their characteristics and the connectors which you will use for the network.(5 marks) Types of Network Cables Characteristics Connectors that use for the network Unshielded Twisted Pair (UTP) Cable It consists of several pairs of wires twisted in the insulated jacket and found in 10/100 Base T Ethernet networks. Topology: Star RJ 45 Coaxial Cable (RG) Suitable for most LANs communications that consists of copper wire sealed by insulation and metal foil shield Topology: Bus RJ 58 (use for 10base2 (Thinnet) Ethernet),RJ 8(use for 10base5 (Thicknet) Ethernet), Fiber Optic Cable A thin, flexible glass fiber covered by rubber coating and provides transmission speed from 100 Mbps up to 1 Gbps and a maximum distance of several Miles. Topology: Star ST/SC ST a barrel-shaped connector SC- square type connector Shielded Twisted Pair (STP) Cable 10 Mbps to 2 Gbps for Ethernet, 16 Mbps for Token Ring Topology: Star or Ring RJ 45 for Ethernet, IDC/UDC for Token Ring (IDC-IBM data connector, UDC-Universal Data Connector) Research and list five different technologies available for Internet connectivity for your network and list their strengths and weaknesses. (10 marks) 5 different technologies for Internet Connectivity DIAL-UP Dial up internet uses a modem and dial-up networking (DUN) in Window to establish a connection between a PC and an Internet Service Provider (ISP). It uses standard telephone lines and ties up the phone while it is operating. Dial-up speed is limited to between 52 Kbps and 56 Kbps. ISDN (Integrated Service Digital Network) it is a special type of phone line that is able to carry data faster than a regular dial-up. It also has a separate voice channel, so you can place voice calls while connected to the Internet. It requires special phone lines from the phone company. ISDN is a dial up connection and uses dial up networking. However, it establishes the connection much more quickly than a standard dial-up, usually within 5 seconds. ADSL (Asymmetric digital subscriber line) It enables Internet using existing copper wired telephone networks. It uses the main concept of DSL technology and it works by splitting the existing telephone line signal into two: one for voice and the other for data. ADSL is asymmetric as it uses most of the channel to transmit downstream to the user and only a small part to receive information from the user. http://homepages.uel.ac.uk/u0113650/DSLBASICS.html FIBER CONNECTION It can transfer data via light waves. And data transmission is incredibly fast. They are made from glass or plastic fibers in the core of the cable surrounded by a cladding layer (designed to reflect light back towards the core) and a buffer coating, BROADBAND internet access Broadband has a high rate data transmission and minimum speed that users can get is 256 Kbps. Broadband uses lower-bitrate transmission methods. Broadband technologies supply double rate than Dial-up modems and generally without disrupting telephone use. Strengths and Weaknesses for Internet Connectivity Kinds that use for Internet Connectivity Strength for using this technology Weakness for using this technology Dial-up . Cheapest type of Internet connection . Low price . Lower speed than any other . Discomfort of typing up phone line ISDN . Call setup is very quick . Low retrieval time . Can carry data and voice at the same time and voice clearness is incomparable . ISDN routers and modems are more expensive than any others . Data connections are not available in all locations ADSL . High speed connection . Use of phone line while connected . Faster download than upload . Line testing takes a long time . Home user is contented at 50:1 by sharing your 512 Kbps with 49 other people, giving you 10 bps. Fiber connection . It can transmit data over long distance without much data loss .. . Can cost more price than broadband connection cost . not susceptible radio frequency Broadband . Maximum transmission speed is 4 Mbps . Transmission capacity is faster than Primary ISDN . Bandwidth is not always reliable for customer . Not sufficient enough to provide good video quality. c) List the 5 networking capabilities of Window XP (5 marks) 5 networking capabilities of Windows XP Internet Connection Firewall (ICF) When your computer is connected to the Internet or other route for the network, there is a threat of not permission attack to approach your computer data. If the computer is connecting the external network, a Firewall can protect your home network versus the danger of unsafety network jammed to pass. Network Setup Wizard Window XP introduces us with a Network Setup Wizard for easy using of Setting up your network and it use to configure the Internet connection on your network, and supply the Internet Connection Firewall. Moreover, it can be run on the Window 98, Window ME and Window XP computers on your network using the CD or a floppy disk. Network Diagnostics Features Network Diagnostics features help diagnosing network problems increase people who is setting up small networks. The features of The Network Diagnostics Web Page and NetSh helper, Network Connections Support Tab, Network Connection Repair Link, Task Manager Networking Tab and Updated Command Line Network Diagnostics Tool, enable troubleshooting of various problems by the users. Point-to-Point Protocol over Ethernet (PPPoE) Window XP creates connections using Point-to-Point Protocol over Ethernet (PPPoE). By using this Broadband modem, LAN users can have high-speed data networks. And PPPoE provides separate connections for each user to a remote server. In addition, it also enables your internet connections join smoothly with Internet Explorer and other Window Applications. Wireless LAN Enhancements Window XP deploys some features and enhancements about Wireless LAN networks and these enhancements are summarized as follow. Enhanced Ethernet and Wireless Security (IEEE 802.1X Support) Wireless Zero Configuration Fig.3 c.1 showing about internet connections Task 4 Task 4 For this task you need to do a fresh install of Windows XP (or later operating system permitted by your tutor) on a computer. Prepare a report evidencing your practical work covering the following questions: List out the names, locations, purpose and contents of any 10 Windows XP (or later versions permitted) systems files.(10 marks) By this question, I need to install a Window XP (Service pack 2); I insert a Window XP installer disc into my CD drive. When the CD is read, the monitor screen shows the following messages. Fig 4a.1 By this message, I pressed any key such as Space, Enter, Backspace, etc Fig 4a.28 So Finally, The Window XP installation was finished and the wallpaper and Recycle Bin icon is display on the screen. Simple Reference: From Practical Room List out the names, locations, purpose and contents of any 10 Window XP (or later versions permitted ) system files (10 marks) Names of 10 Window XP system files Location: All system files are located in C: Window XP file Purposes of system files NTLDR : It usually run on primary hard disk drive and the purpose is to loading the boot process for Window NT operating system including Window XP, Window Server 2003. NTDETECT.COM : is used on computer that has BIOS firmware. In Windows Vista and later Operating Systems, NTDETECT.COM is now only to supports ACPI (Advanced Configuration and Power Interface). IO.SYS is an essential part of MS-DOS and Window 9x because it contains MS device drivers and DOS initializing Program. And it can initialize the device drivers into memo MSDOS.SYS It is a hidden system file created on the root of the boot drive. It can changed the PC environment by replacing the file contents [Paths] WinDir=C:WINDOWS WinBootDir=C:WINDOWS HostWinBootDrv=C [Options] BootGUI=1 Network=1 BootMulti=1 CONFIG.SYS can set up the memory managers in the system. It can load files, mostly TSRs and devices drivers, in turn(console, disk, serial port, etc BOOT.INI: is to protected from user configuration by having the file attributes such as system, hidden, read-only. To manually edit it AUTOEXEC.BAT contains DOS commands that executed automatically when a PC boots . This locates in the root directory of the hard drive of the computer and is used to set defaults to run programs that should be executed during setup. Contents: PROMPT $P$G COMMAND.COM is the default operating system shell file for DOS operating system and the default command line interpreter on DOS-based 16/32-bit Window versions of 9x and Me. NTUSER.DAT : it is to set the default language to instead of English and can edit file to correspond to the new language BOOT.INI it is a text file available on the computer. And it is fetched by NTLDR and displayed as OS options. Contents: [boot loader] timeout=10 default=multi(0)disk(0)rdisk(0)partition(2)WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(2)WINDOWS=Microsoft Windows XP /fastdetect C: = Microsoft Windows b) Use the following tools in Windows such as Microsoft Management Console (MMC), Event Viewer and Task Manager on the system. List out the practical uses of these tools. (10 marks) Microsoft Management Console (MMC) Fig 4b.1 First, if you want to enter the Microsoft Management Console, youll enter RUN (win key + R key) program and type MMC. And then MMC program is opened. Fig 4b.2 In Fig 4b.2, there is no program in console root and if you want to add or remove snap-in, go to the File Text Menu Bar (Ctrl+m). You can add the programs that you want to do in the same time and you can click Remove button to remove the program that you dont want to do. Fig 4b.3 Fig 4b.4 shows that you can choose the programs that you want to do and Click Add if not you can click Close Button to exit from the program. Fig 4b.4 The above example shows that the user chose the Device Manager Program to add to the Console Root. And he clicks Add. Fig 4b.5 And the message box shows on the screen to choose the kind of computer (local or another) and the user chose local computer. Click Finish to save the program in add or remove snap-in. Fig 4.6 This above Add/Remove Snap-in box shows that the program that you already add and if you want to add second program, you will click Add button for next time. Fig 4b.7 Fig 4b.7 shows that the user seems to add Disk Defragmenter, Disk Management (Local), Event Viewer (Local), Device Manager on local computer. And the picture is clicked Disk Defragmenter program. Fig 4b.8 The picture shows the Console1.msc file is saved in desktop. Fig 4b.9 Also the Console1.msc file is saved on the desktop on the screen. So, you can also see the Console1.msc file on desktop. And so, u can be use Disk Defragmenter, Disk Management (Local), Event Viewer (Local), Device Manager on local computer by clicking the Console1.msc file. Event Viewer Fig 4b.10 If you want to use event viewer software program, press Window key+R and type eventvwr and click OK. Fig 4b.11 In event viewer software program, you can see the application, Security and System software icons. Fig 4b.12 When you click Application list, you can see what happen in your Computer Operation System such as Informations, Warnings, and Errors when the computer is running. Fig 4b.13 And system list shows how many events occur date by date such as Errors and Information. Fig 4b.14 is as same as Fig 4b.13 In above picture is about System Properties and it can be opened by clicking right click on system icon. Fig 4b.15 In the box of System Properties, the user can adjust the Maximum log size, overwrite events date and clear log manually. Fig 4b.16 Fig 4b.16 shows that the user can change the Event types if the only he wanted by clicking right click and go to view and then click filter. And click OK to show them or click Cancel to get back to the Menu. Task Manager If you want to enter the Task Manager Program, press Window Key and Run key to enter Run Program and type as taskmgr. Fig 4b.17 The above message box is showing that which applications are running on the OS and has Applications, Processes, Performance, Networking and Users icons. Fig 4b.16 The above picture shows that if you want to close Windows Messenger, select it and click right click and choose End Task. Fig 4b.17 And this above picture is about if you want to open the program (eg. Window Media Player), click New Task to create New Task. Fig 4b.18 Moreover, the user can look which program takes how much memory usage in Process Option. And if you want to close Window Media Player click end process to close. Fig 4b.20 And in Performance option, the user can see the CPU and PF usages and histories. Moreover, In Networking option, the use would see the Connection between Local Area Network. Fig 4b.21 In user list, the user can see that how many user accounts in there. And he can disconnect or log off the Administrator (user) account. à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. c) Install two new devices after you have installed the Operation system and list out the procedures which you used for adding and configuring the devices drivers. (10 marks) I installed the Printer after you have installed the Operation system. Installation of Printer First, connect the data cable with Printer port. Fig 4c.1 And, go to the control panel and click the Printer and Faxes. Then, click Add a printer dialog-box. So, the screen shows the display box Welcome to the Add Printer. And then click Next to continue. 19th August, Thursday at 9:48 AM. Fig 4c. 2 And the message box shows that you need to choose local or network printer. If you want to share a printer, chose network printer. But you must have a printers driver in computer. So choose local printer for the users computer only. 19th August, Thursday at 9:49 AM. Fig 4c.3 Select printers port such as LPT (Recommended Printer Port/Parallel Port), COM (Serial port), USB port, so chose USB port. Fig 4c.4 I think you need to choose the manufacture and models of your printer. If you dont have printers model, click Have Disk button and choose and assign as HP and add as HP Deskjet 2200 series. Fig 4c.5 Choose either share the printer or dont share the printer. So choose dont share the printer. Fig 4c.6 So, finished the installation of printer. 19th August, Thursday at 9:55 AM. Fig 4c.7 At the end of the installation of Printer, your installed Printer is in use. Moreover, if you want to share this printer, click right-click to the sharing of printer. Fig 4c.8 And in the Sharing Tab, you need to choose Share this printer. 19th August, Thursday at 9:59 AM. Fig 4c.9 At the end, the installation is finished and the printer is ready to use now. 19th August, Thursday at 10:00 AM. Installation of Scanner Fig 4c.9 First, I mounted the scanner to USB port then the message box shows Found New Hardware and I clicked the right click to My computer icon and then choose Properties to see the property of scanner. 17th August, Tuesday at 12:37 AM. Fig 4c.10 In Hardware tab, I click the Device Manager to see for the scanner installation. 17th August, Tuesday at 12:38 AM. Fig 4c.11 In Device Manager Option, the new scanner program is showing Question Mark as unknown device or other device. 17th August, Tuesday at 12:38 AM. Fig 4c.12 For the first step, I go to the My computer program and then click the Canoscanner icon to open. In second step, I chose the Setup to Install the scanner. 17th August, Tuesday at 12:41 AM. Fig 4c.13 And the CanoScan Message Box is shown to install the scanner and then some software installation notes is shown as to know. 17th August, Tuesday at 12:42 AM. Fig 4c.14 And the message box shows that the check marks will be installed and remove the check mark if some program is not unwanted by clicking next time to unwanted program. And click Install to install the marked program and click Back to go back to the main menu. 1

Friday, October 25, 2019

A Young Americans Discovery of the Silent Majority Essay -- Essays P

A Young American's Discovery of the Silent Majority History panders to the glorious and dramatic while often there is a story untold. Perhaps it is less exciting, but no less crucial in understanding history as a whole. Thus is the story of the â€Å"silent majority.† On November 3rd 1969, one year after his victory in the United States Presidential race, President Nixon issued an address to the American public in which he coined the term â€Å"silent majority.† President Nixon’s address began by describing the situation he inherited when taking office. Nixon described the situation as such: â€Å"The war had been going on for four years. One thousand Americans had been killed in action. The training program for the South Vietnamese was behind schedule; 540,000 Americans were in Vietnam with no plans to reduce the number. No progress had been made at the negotiations in Paris and the United States had not put forth a comprehensive peace proposal. The war was causing deep division at home and criticism from many of our friends as well as our enemies abroad (Episode).† President Nixon then proceeded to detail the progress made and the different actions taken by his administration throughout the course of the first year of his first term. Nixon described the pressure on his administration to end the war. He referred to a protest in San Francisco in which Protesters carried picket signs donning the clause, â€Å"Lose in Vietnam, bring the boys home!† To this President Nixon responded: â€Å"Well, one of the strengths of our free society is that any American has a right to reach that conclusion and to advocate that point of view. But as president of the United States, I would be untrue to my oath of office if I allowed the policy of this nati... ...speech/ >. Freed, Kenneth J. "Kissinger Interview." Associated Press featured in Albany Student Press. 6 Feb. 1973 Frost, Michell. "On the Other Hand." Albany Student Press. 4 Dec. 1970. Frost, Mitchell. "View From the Right." Albany Student Press. 30 Jan. 1973 Oringher, Maida. "Misplaced Priorities." Albany Student Press. 25 Jan. 1972. Pyle, Richard. "Vietnam's New Map." Associated Press featured in Albany Student Press. 31 Oct. 1972. Rosten, Leo. A Trumpet For Reason. Garden City, NY: Doubleday &Company Inc, 1970. The Tactical Leadership. "SUNYA Protests." Albany Student Press. 25 Jan 1972 Weintraub, Peter. "Vietnam Vets: America's Most Alienated." Albany Student Press. 20 Oct. 1972. Whistle, Gary. Interview with Amanda May Whistle. 25 April 2005 Wire Services Compilation. "Rocky Supports Nixon." Albany Student Press. 25 Jan 1972.

Thursday, October 24, 2019

Ending Poverty in the Third World Essay

Poverty continues to be a large part of the third world countries, affecting many people’s wellbeing and country stability in the new millennium, despite many strategies put in place to alleviate the poor status. Due to the continued prominent place of poverty in the third world countries, significant strategies are coming up comprising of political, social, spiritual, environmental, and managerial coping strategies. The strategies have realized various levels of success although it highly depends on the place of implementation and the taskforce mandated to implement the development strategies. The failure or minimal success of some of the strategies geared towards ending poverty in the third world, has encouraged the developed and developing countries, and developmental related agencies to focus on coming up with new theories with the likelihood of more success. Nevertheless, poverty in the third world continues to be a major challenge in the world with many strategies, some successful and others marked with dismal failure coming up to alleviate third world poverty. Description of Poverty in the Third World Poverty implies a lack of adequate food and shelter, lack of better housing, sanitation, access of safe drinking water attributed to lack of income to facilitate acquisition of basic necessities, a sense of powerlessness, and vulnerability to adverse shocks (Parsed et al, 2005, p. 290). The concept of poverty encompasses a large spectrum of attributes such as levels of income and consumption, health, education, security, and housing. Nevertheless, poverty is largely an attribute of low income that prevents individuals and families from acquiring and enjoying basic life necessities such as nutritious food, clothing, shelter, and clean water. Regions highly affected by the incidence of poverty are Africa and Asia, also referred as the third world, the developing nations, or less developed countries, although Africa suffers a more rampant extent of poverty compared to Asia (Parsed et al, 2005, p. 290). Among these countries, the poor live mostly on less than a dollar a day, although some live on $2 a day, although the incidence and gap may not be significant either in the African or Asian developing countries. In the past decade, the development of the concept of globalization gave promise to the reduction of poverty in the third world because of the removal of control on free movement of goods and services; however, the initial hope is yet to be realized. Encouraging the possibility of poverty eradication within the emergence of globalization has been the United Nations and the development of goals towards alleviation of poverty, and the entry of the international community in the process of poverty eradication in the third world. Poverty and the Millennium Development Goals At the turn of the millennium in 2000, the United States member states agreed on eight international development goals to be achieved by 2015 that the countries adopted in 2001 in order to assist impoverished nations and create a sustainable global community. The first goal of the eight was to eradicate extreme poverty and hunger, with the target being to half the number of people living on less than a dollar per day and reduce by half the number of people suffering from hunger. From the creation of the Millennium Development Goals (MDGs), the United Nations Development Programme (UNDP), Non-Governmental Organizations (NGOs), and various public, private, and federal agencies worked towards establishing developmental strategies that would facilitate the realization of the goals (Eggen and Bezemer, 2007, p. 1). The strategies have been constructed mainly along the international community through the UNDP, NGOs funded by international groups, the World Bank, and the International Monetary Fund (IMF) towards poverty reduction. Agreeably, poverty reduction especially in the third world has been an ongoing process in many countries. However, its recognition by the UN made it a priority within the international community with the MDGs becoming a coherent expression of global development priorities and an instrument to shape development policies (Eggen and Bezemer, 2007, p. 2). The introduction of the MDGs meant that the world had a standard by which to measure the success of policy interventions in poverty reduction within a certain period. In the discussion of the strategies set towards ending poverty in the third world, the policy interventions attributed to the MDGs, and the international community forms a critical part of the exploration. Therefore, throughout the paper, reference to the MDGs, the international community, and globalization are inevitable. Strategies towards Ending Poverty in the Third World When considering the interventions being developed towards ending poverty in the third world, one should consider the causes of poverty and their role in determining the responses towards poverty by all key players including inhabitants of third world countries, potential donors, and those from developed countries or economies. Among some of the determined causes of poverty in the third world first is the high and underdeveloped population in the third world attributed to lack of ability among the people, unwillingness to change traditional ways and customs, lack of proper resource management, lack of attempt at self-improvement, laziness, and lack of knowledge (Panadero and Vazquez, 2008, p. 574). The second cause is poor governance in third world countries attributed to corruption and inefficiency among the governments, while the third cause is exploitation of the third world countries by other countries especially developed countries and by the world economy and banking systems, and lack of an open market system. The fourth cause of poverty in the third world according to Panadero and Vasquez (2008) is war whereby the governments spend too much on arms and more is spent in restoring the country after a war or keep the country afloat in the course of the war. Lastly, third world poverty is attributed to natural causes that include diseases, pests and insects that destroy crops, natural disasters because of poor climatic conditions and lack of environmental friendly knowledge. Alleviation and eradication of poverty in the third world will take the effort of the inhabitants of these countries, those from the developed economies and the organizations key to development such as UNDP, World Bank and the IMF. The effort should focus on strategies that will facilitate reduction and eventual eradication of poverty, and ensuring people from the third world gain the knowledge and provisions needed to prevent them from going back to their current status. Agreeably, the eradication of poverty in the third world requires a multidimensional focus that does not only concentrate on reducing income poverty, which has been the focus of many interventions, but also include interventions geared towards reduction of human deprivation in all dimensions (Chopra, 2005, p. 52). To achieve a global reduction of poverty as per the MDGs by 2015, the third world countries comprising the world’s poorest countries need to pursue wide ranges of reforms with developed nations responding to the effort through improved trade terms and increased aid. According to Chopra (2005), action is critical in ensuring global financial stability and ensuring that poor countries are at par with developed nations in the adoption of technology and in scientific and medical research (p. 52). Further, the wealthy nations must open their markets to the products of the poor countries, with aid and debt relief increased to help the poor countries help themselves without the interference of the wealthy nations, which has marked most of the intervention programs. Nevertheless, the poor nations need to give voice to their need and influence decision-making in international forums, noting that in most forums the powerful developed countries make much of the decisions related to the development of the poor nations. Therefore, for the world to end third world poverty and ensure that the global platform allows equal opportunities and competition to all, the international community needs to review existing intervention programs. Among interventions that can aid the process of ending third world poverty that have been part of the implemented strategies, include one promoting equal opportunity through the expansion of economic opportunities for poor people through the stimulation of overall growth (Chopra, 2005, p. 51). Additional strategies towards offering equal opportunity is building up the poor countries assets and increasing the asset returns through market and non-market action. As stated in the discussion of causes of poverty, one of the mentions causes is an underdeveloped population; therefore, offering opportunities for economic expansion will help these populations begin thriving thus facilitate a reduction of poverty. Furthermore, another attributed cause of poverty is a closed market that does not allow the poor nations to promote their products in the developed nations; however, creation of opportunities through the opening of markets will enable them access the international market. Additionally, the promotion of assets especially within the international community is another strategy of providing equal opportunities to the poor nations. Second intervention is facilitating empowerment through adoption of accountability in state institutions and response to the needs of the poor people, as well as strengthening the participation of poor people in political processes and local decision-making (Chopra, 2005, p. 52). Further, empowerment requires people be encouraged to participate in political processes, local decision making, and eradicating social barriers that contribute to gender, ethnic, racial, religious, and social distinction. Dealing with unaccountability in state institutions including governments ensures successful address of some of the cause of poverty, which is corrupt government. Further, strengthening people’s participation in decision-making will provide the link between the people, the leadership, and the resources resulting in better resource usage that has been lacking in many third world countries. The third factor in addressing poverty in the third world is enlargement of security through reduction of people’s vulnerability to ill health, economic shocks, policy induced dislocations, natural disasters, and violence (Chopra, 2005, p. 52). Notably, health is a significant factor in development because when people are healthy they are more likely to engage in economically productive activities compared to when they are ill or undergoing natural circumstances that reduce their efficiency. Security should also include protection from violence, and helping the people deal with adverse shocks when they occur. Maintenance of security is important to offer people an opportunity to work towards developmentally beneficial activities without fear of violence, disease, or natural disasters, and incase such events occur people should know their country has the capacity to address them and restore order. The implementation of some of these factors as discussed in the subsequent section has been ongoing in many parts of the third world realizing a steady decline in poverty. However, the number of the poor continues to be significant denoting a failure in the effective of the strategies, and requiring developmental agencies and developing nations to either adopt different strategies or approach the existing strategies from another side. Nevertheless, one cannot claim that the international community has not been trying to meet the MDGs especially in the third world and some poor parts of the developed nations.

Tuesday, October 22, 2019

Cognitive Approaches in Psychology

In this essay I will outline two approaches in psychology, compare and contrast them as well discussing the nature and nurture debate regarding both approaches. I will be examining a theorist from each approach outlining and evaluating his theory including the positive alltributes along with the negative. Finally I will include a therapy from each theorist and approach. The Behaviourist approach focuses on the concept of explaining behaviour by observation, and the belief that our environment is what causes us to behave differently and suffer illnesses.The Behaviourist approach believes that behaviour is influenced by each and every individuals experiences. This could include their background, social and home living circumstances. Behaviourist psychologists argue that when we are born our mind is ‘tabula rasa’ meaning a blank state and that events taking place in our life time can affect and change the way we behave. Behaviour is the the result of stimulus response, i. e all behaviour no matter how complex can be reduced to a simple stimulus response. All behaviour is learnt from the environment.We learn new behaviour through classical and operant conditioning. Classical conditioning is stimulus- response. If a stimulus that results in a emotional response is repeated along with another stimulus which does not cause an emotional response, then eventually the second stimulus will result in the same emotional response. Classical conditioning is therefore learning by association. Some assumptions are made on the behaviourism approach, for example one assumption made is that there is no mind or body dualism and that everything we do is because of behaviour and not because of the mind.A second assumption would be that discovering a stimuli that causes behaviour associations between stimlulus and response will allow us to predict and control behaviour. They also viewed learning as a change of behaviour due to experience. However some critics object again st the behaviourist view that behaviour is determined by our enviromnets as psychologist Garrett (1996) suggested that ‘†¦ behaviour is now shaped by what goes on inside their heads†¦ and not simply by what goes on in the external environment’ (p. 19) Operant conditioning is a method of learning that occurs through rewards and punishments for behaviour.Through operant conditioning, an association can be made between a certain behaviour and a consequence for that behaviour. For example if a good thing is presented and a certain behaviour is encouraged then the behaviour will increase, this is called positive reinforement. However if the good thing is taken away then the behaviour will decrease. For example is a dog is told to fetch the ball and every time it fetches the ball it gets rewarded with a treat. This would influence the dogs behaviour to always fetch the ball as it will be rewarded.Another key feature of the behaviourist approach is the social learnin g theory. The social learning theory focuses on the learning that occurs within a social context. It considers that people learn from one another including such concepts as observational learning, imitation, and modeling. It says that people can learn by observing the behaviour of others and the outcomes of their behaviour. The cognitive approach deals with metal processes or cognitions. These mental processes include memory, thinking and perceptions. Cognition means â€Å"knowing†.Therefore cognition is the mental act or process by which knowledge is acquired. Cognitive psychology has been influenced by the developments in computer science and comparisons have often been made between how a cumputer works and we process information. The main focus of the cognitive approach is how information received from our senses is processed by the brain and how this processing affect how we behave. Cognitive processes show examples of hypothetical constructs. This means that we can not d irectly analyse processes such as thinking but we can dissect what a person is thinking based on how they act.Cognitive psychologists use laboratory experiments to study behaviour. This is because the cognitive approach is a scientific one. These experiments would involve participants taking part in memory tests in strictly controlled conditions. An assumption made about the cognitive approach is that there exists a circular relationship between learning, meaning and memory. The basis for cognitive theories follows this patern in which what is learned is affected by its meaningfulness, the meaning is determined by what is remebered and the memory is affected by what we learn.The cognitive approach places itself in direct opposition to the behaviourist approach which mostly ignores mental processes. The cognitive approach is internal whereas the behaviourist is external as it focuses on the human environment. The cognitive approach examines behaviour which is directed through the min d rather then the body. It studys the thought processes, memory, language, perception and decision making. Whereas the Behaviourist approach examines our behaviour by our responses to our surroundings and the events taking place around us which may influence us to act in a certain way through imitation.It assumes that we learn things by associating certain events with certain consequences and that we will behave in the way that achieves the most desirable consequences. There are many methods in which the cognitive approach examine. Such as the holistic method which is a view that all aspects of people’s needs such as the psychological, physical and social should be taken into account and seen as a whole. The nature and nurture debate is one of the longest running debates in the area of psychology in which theorists have various different views and opinions.Nurture is the view that everything we learn is through interaction with our surrounding environment, this could include with people, family and mass media. Some assumptions of this approach would be that the nurture theory did not discount that genetics exist but argues that they simply made no difference to how we behave and act. Studies on children temperament showed the most crucial evidence for the nurture theory. Another would be that the nurture argument is most represented by the behaviourist approach as behaviourists believe that all behaviour is the outcome of learning through conditioning.The nature theory focuses on the heredity and specific genes which can determine passing on of traits such as eye colour and skin colour. The nature theory would suggest that even personality, intelligence and aggression is also encoded in our DNA. Some assumptions of this approach would be that behaviour is innate, conditions such a schizophrenia show genetic links and a large amount of research shows that there is a link between hormones and aggression. Behaviourism follows the nurture approach as it stu dies that we learn from our environment, hence making this approach nurturist.It believes that our behaviour is influenced by our surroundings. Watson- the father of behaviourism quoted: ‘Give me a dozen healthy infants and my own specified world to bring them up in and I will garantee to take anyone at random and train him to become any kind of specialist I might select: doctor, lawyer, artist, merchant chef and yes beggar and thief, regardless of his talents, penchants, tenancies, abilities, vocations and race of his ancestors. ’ Watson is clearly stating that he could change any person from any different social background and race if he could bring them up in his own way.His statement strongly argues the nurture side of the debate. He argued that human behaviour could be conditioned depending on their surroundings. On the other hand the Cognitive approach is an interaction between the two nature and nurture. As much as it focuses on reactions of the senses to the bra in and the mind which make it nature it also has many nurture altributes also. The cognitive psychologist would recognise that experience and the environment also contribute and shape these innate abilities. Piaget’s therory backed this up as he believed that humans use their experiences to construct new understandings.He agreed that both nature and nurture are important, humans move through universal stages due to maturation however the rate they mature in depends on experience. He said that people are, by nature active contributors to their own development. Piaget’s argued that both nature and nurture interact to produce cognitive development. He said that the nature side helps the maturation of the brain and the body, along with the ability to percieve and learn. Whereas the nurture helps with the adaptation of children and how they respond to their enviroment. Bandura was a behaviourist theorist.He believed that there are three sources of models which influenced hu mans behaviour, these included the family, the mass media and the sub-culture. He conducted a number of experiments in which he carried out on children. One of his experiments involved an inflatable Bobo doll, his aim was to investigate the effects of observing aggression in an adult model. The procedure of this experiment was for it to take place in a playroom containing a range of toys. Young children watched an adult attacking a large inflatable Bobo doll by hitting it with a hammer and saying ‘pow’!Once the adult left the playroom, the behaviour of the children was then observed. A control group of children who did not see the adult attack the doll were also observed in the playroom. The results showed that the children who had seen the adult attack the doll also attacked the doll in similar ways. However the children who had not seen the adult attack the doll did not. The conclusion to this was that children learned particular behaviours towards the Bobo doll throu gh observational learning and then copied the behaviour when given a chance.Two years later he conducted a similar experiment however this time it was to observe the effects on modelling by children of seeing a model reinforced or punished for a behaviour. This experiment, like the previous involved a bunch of children watching and adult kick and attack a Bobo doll but this time get rewarded for it. Another set of children watched the same thing however saw the adult get punished for it. The children in the group that saw the model being punished were later offered a reward if they could reproduce the behaviour they had observed.The results showed that the children in the group that saw the model get punished for the attack were less likely to imitate that behaviour. This experiment concluded that observation is enough for behaviour to be learned, however reinforcement is necessary for the behaviour to be modelled. The values of Bandura’s social learning theory were that it e xtended the operant conditioning theory. It focused on the idea of the influence of the social environment in behaviour therefore providing an explanation for cultural and individual differences.It could account for individual differences and allowed for more complex human behaviour. Bandura’s theory had a role to play in personality theory and introduces the idea of vicarious learning. Although the criticisms are that his theories are reductionist, environmental and determinism. Reductionist ways of explaining behaviour often examine one single cause ignoring other explanations. Reductionism attempts to understand and describe the human behaviour in terms of simple components or units. Any explanation of behaviour at its simplest can be described as reductionist.This approach reduces a complex behaviour to a simple set of variables which offer the possibilities of identifying a cause and effect. The reductionist approach is therefor a from of determinism. Determinists believ e that it is possible to predict behaviour by identifying the cause of behaviour. His theories were also criticised as being environmental, meaning that the environment that he uses in his experiments can affect the human behaviour. The use of violence towards a doll in his experiments were not ethical as he only used children.It was also sociably incorrect as it was influencing violence to receive a reward. The biological influences are ignored, lack cohesiveness and still excludes influences such as emotions. Jean piaget was a psychologist who studied the development of children’s understanding and how their minds work. His theory on how the children’s mind works and develops has been hugely influential, specially in educational theory. Piaget was particularly interested in the way in which a child’s mind matures in the different developmental stages and how their maturing increases their capacity to understand their world.His theory was that all infants have the same structures and they all have innate reflexes and schemas. He believed that children cannot undertake certain tasks until they are psychologically mature enough to do so. He thought that childrens thinking develop at different stages, and that at certain points the mind would mature into different capabilities such as the first transition taking place at 18 months, then at the age of 7 and 11 or 12. He meant that before these ages children could not have a capable understanding of certain things in certain ways.The stages which took place according to this theory were firstly the sensorimotor stage which takes place between birth and two years. At this stage the child can identify itself and acts as an agent of action purposely banging on pots and pans to make noises to hear the reaction. The child can differentiate self from objects and learns object permanence realising that objects still do exist even if they are not in sight. The second stage is the pre-operational stage . This is the stage in which the child learns to use language and images to identify objects.However their thinking is still egocentric indicating that they cannot see things from another persons point of view. This stage usually takes place from the age of two till seven. The third stage is called the concrete operational stage, this takes place between the ages of seven and eleven. The final stage is called the formal operational stage, at this stage children start to think about the future and ideological problems. The child’s cognitive structure is more like that of an adults and includes conceptual reasoning. His theory was successful in the fact that they used his theory as a basis for scheduling in the school curriculum.His theory has a huge influence on the understanding of cognitive development and it was the first comprehensive theory of children’s cognitive development. His theory also challenged the traditional idea of the child being passive in development , also as his theory was scientifically based this made it come across as more accurate. However his theory has received some criticism, some critics challenged some of his developmental stages such as the sensorimotor stage and the pre-operational stage. Gelman questioned what Piaget viewed about children as young as four not being able to take on another persons point of view.Gelman believed that it was possible for children to do so. Behaviour therapy refers to techniques based on classical conditioning. This therapy consists of using learning principles to change maladaptive behaviour. There are a number of various behaviour therapies including systematic desensitisation. This therapy is a form of counter conditioning using a hierarchy of fear. One example could be to remove a phobia of animals. The patient is taught how to relax so that relaxation and fear cancel each other out, to do this hypnosis or tranquillisers may be used.It is believed that it is impossible for a person to experience two opposite emotions at the same time. The systematic part of the therapy involves a recorded series of contacts with the object of the phobia. Whilst relaxing a least frightening image of the object is introduced to the patient until this can be done without the patient having any feelings of anxiety. Some of the therapies based on classical conditioning are effective, such as the systematic desensitisation therapy. However it is mostly effective only for anxiety disorders and addictions. They are more effective in phobias than in psychotic disorders.An advantage is that the therapies are relatively quick and only take a few months to work as oppose to psychodynamic treatment which can take years. There is also a high success rate, McGrath found that systematic desensistisation to be effective for around 75% of people with phobias. In the case of single sessions success, if conducted in one session it is proved that 90% of patients with phobias made vast improvements and some were even fully recovered. Systematic desennsitisation helped treat one of the most difficult phobias to treat called agoraphobia, this therapy however helped between 60-80% of cases.Critics of these therapies would suggest that many patients with phobias may have no recollection of bad experiences with the object and simply just have a phobia, therefore the therapies would not be effective and solve the problem. Psychodynamic theorists would say this is due to the symptom being a sign that something unconscious is wrong with the patient. Another disadvantage is the unpredictable effects that the therapy can have on the patient such as heart attacks and hyperventilating. The cognitive approach has many therapies to explain and modify behaviour.Cognitive forms of therapy include the Ellis rational therapy, which is now more commonly known as rational emotive behaviour therapy. Ellis came to conclusions about patients negative thoughts and their tendencies to catastrophise s ituations making things seem so much worse then they actually are. This therapy focuses on when irrational thoughts are seen as the main cause of all types of emotional distress and behaviour orders. The aim of this therapy is to exchange the irrational unreasonable with the more positive and realistic beliefs and ways of thinking. Patients are encouraged to ‘look on the bright side’.Ellis identified patients irrational beliefs and ideas which are emotionally self defeating and are mostly associated with psychological problems such as negative thoughts and feelings about ones self. Patients are told to practice certain positive statements like â€Å" I can do† rather then â€Å" I can’t do† to help them create a more positive state of mind. The benefits of using such therapies are that it is a structured therapy with outcomes which are achievable, these methods are becoming more commonly used as they are short term and are cost effective aswell as e conomically effective.This therapy is appealing towards patients who find insight therapies which look deep into their inner emotions and problems seem less threatening and intimidating. Although there are disadvantages of this therapy. It may not uncover the problem completely, however it does almost try to empower patients to help themselves with their issues and feel better. It also may not work well for adults who are not willing to take part and collaborate with the therapist to achieve a new way of thinking. It may also not be successful for those who feel that they can’t achieve self happiness without something or someone else contributing towards it.This therapy is mostly successful for clients suffering from anxiety disorders, stress management and sexual problems. Studies have shown that this therapy is more effective in depression than drugs are and the relapse rate is proved to be lower with cognitive behavioural therapy. This from of therapy has been proved to be more effective then anti depressants. In conclusion, I have included all the points mentioned in the introduction that I said I would include in my essay, I have outlined and evaluated two approaches and discussed two theorists and therapies for each approach.