Thursday, October 31, 2019

Education Psychology Research Paper Example | Topics and Well Written Essays - 750 words

Education Psychology - Research Paper Example The child also develops intellectually and is able to manage time, set goals and priorities, understand different meanings of words and develop morally. The child develops social skills including attempting to solve problems on their own. The child also tries to form social relationships and make lasting friendships (Morin, 2012). Jean Piaget explained the stages of a child’s cognitive development, which include the sensor motor stage occurring between birth and two years of age, preoperational stage from two to seven years, concrete operational stage starting from seven to eleven years, and formal operational stage occurring from adolescence to adulthood. Fourth grade students are in Piaget’s concrete operational stage of cognitive development. At this stage, students learn how to use logic appropriately. They demonstrate intelligence by manipulating symbols systematically and logically. They are also able to make sensible decisions and think hypothetically about observable objects. Children at this stage can also sort objects according to shape, size or color. They can also recognize the relationships between things in a sequential order. Moreover, they are able to classify objects depending on characteristics such as size or appearance. The child also understands that some objects can be chang ed to different states and reversed again, for instance, the deflation and inflation of a ball (Shaffer and Kipp, 2009). The child also goes through social development. Erik Erikson explained eight stages of psychosocial development, from birth to adulthood. Fourth grade students are at the industry versus inferiority stage. It occurs between the ages of approximately five to eleven years. At this stage, children develop pride in their abilities through social interactions. It is an important stage for developing self-confidence. At this stage, children are given opportunities to gain the recognition of their parents or teachers. For instance, they can be asked to draw, solve problems or write sentences. If they do them correctly, they are commended for their achievements. If teachers and parents commend and encourage children at this age, they will believe in their skills and have a feeling of competence. However, those children who are not encouraged by parents or teachers, but ar e punished and ridiculed instead will begin to doubt their abilities and develop low self-esteem (Underwood and Rosen, 2011). Lev Vigotsky’s socio-cultural theory explains that learning is a social process and human beings get their intelligence from the society. A child’s social interactions play an essential role in cognitive development. Vigotsky’s theory suggests that students should learn in an environment that is socially interactive. The learning environment should be supported with discussions, computers, problem solving, and collaborative writing, among others (Shaffer, 2008). By having knowledge on the social, intellectual and physical development of students, I will be able to teach more effectively in future. Teaching students at the concrete operational stage will involve the use of concrete visual aids to explain complicated ideas to them. I will also use familiar examples to explain complicated concepts and give the students a chance to manipulate objects. I will give students assignments that will require them to think analytically and logically. I will ask them to practice classifying ideas and objects. I will apply Erikson’

Tuesday, October 29, 2019

Western Civilization Essay Example for Free

Western Civilization Essay Functional political structures of prior centuries still exist to a great degree this very day. What that means is those political systems that are viable can transcend centuries and cultures to exist in the modern world. Political structures are not something that are pulled out of thin air and instituted. Instead, political structures and ideologies are the result of a process of evolution. In other words, a political idea or system will develop in an inception stage and then over the course of time, it will evolve into a more complex system that takes into consideration the various complexities that modern concerns may influence said development. However, what does not happen is that the entirety of an old system is completely thrown out unless it is a clearly failed system. Monarchies, for example, have collapsed because they simply are not functional in the modern era. Their modern equivalent, dictatorships, exist is certain parts of the world on a minimalist level (Cuba, North Korea, etc), but they are generally rejected by the vast majority of world governments whereas successful government systems propagate, albeit in different versions of their classical counterpart. For example, democracy started in Athens as a philosophical movement that later developed into a viable political system. This form of Athenian democracy that was instituted in Ancient Greece was considered a model of effective government and a great deal of the principles of Athenian democracy exist in modern governments, although there are a number of departures from the original Athenian concept. In the Athenian system, direct democracy was the dominant factor as opposed to representative democracy. We still see vestiges of this form of direct democracy in America in the form of ballot initiatives. In California, the most (in)famous form of direct democracy can be viewed in the decriminalization a medical marijuana, a law that never would have passed through a representative system.

Sunday, October 27, 2019

Computer Forensics Investigation and Techniques

Computer Forensics Investigation and Techniques Introduction I am the student of International Advanced Diploma in Computer Studies (IADCS). In this course, I have to do Compute Forensic assignment. The assignment title is â€Å"Didsbury Mobile Entertainments LTD†. This assignment helps me understanding computer forensics investigation and techniques Before this assignment, although I am interested in computer forensic, I am hardly used computer forensics toolkit or done any investigation. Because of this assignment, I have learnt many techniques how to investigate computer and done it practically. So, by doing this assignment, I have gained in practical and much valuable knowledge in Computer Forensics.nd a heartfelt thanks to all the people in Myanma Computer Company Ltd. for their warmly welcome during the period of the IADCS course and this assignment developed. Task 1 i) Report DIDSBURY MOBILE ENTERTAINMENTS LTD No(5), Duku place, Singapore Jan 10, 2010 Introduction Computer forensics involves obtaining and analyzing digital information for figuring out what happened, when it happened, how it happened and who was involved. What is more, it is use as evidence in civil, criminal, or administrative cases. Reasons for a need for computer forensic investigation Computer forensics investigation can recover thousands of deleted mails, can know when the user log into the system and what he does, can determine the motivation and intent of the user, can search keywords in a hard drive in different languages and can gain evidence against an employee that an organization wished to terminate. For these reasons, in order to know whether Jalitha has been spending her time on her friend business or not, we need a computer forensic investigation. Steps to pursue the investigation In order to pursue the investigation, I would take the following steps: 1) Secure the computer system to ensure that the equipment and data are safe 2) Find every file on the computer system, including files that are encrypted, protected by passwords, hidden or deleted, but not yet overwritten. 3) Copy all files and work on this copy files as accessing a file can alter its original value 4) Start a detailed journal with the date and time and date/information discovered 5) Collect email, DNS, and other network service logs 6) Analyze with various computer forensics tools and software 7) Print out an overall analysis 8) Evaluating the information/data recovered to determine the case Conclusion After we know the reasons and steps for investigation, then we should move on to conduct the investigation. However, we should note that the first step of investigation is critical as if the system is not secure, then the evidence or data we found may not be admissible. ii a) Report for â€Å"The procedures to make sure the evidence holds up in court† DIDSBURY MOBILE ENTERTAINMENTS LTD No(5), Duku place, Singapore Jan 12, 2010 Introduction Evidence is any physical or electronic information (such as computer log files, data, reports, hardware, disk image, etc) that is collected during a computer forensic investigation. The purpose of gathering evidence is to help determine the source of the attack, and to introduce the evidence as testimony in a court of law. Procedures to make sure the evidence holds up in court In order to make the evidence admissible in court, we need to follow the following steps: 1) Before any evidence can be gathered, a warrant must be issued so that forensic specialist has the legal authority to seize, copy and examine the data 2) Have the responsibility to ensure that the law and the principles we used are met 3) Evidence must be obtained in a manner which ensures the authenticity and validity and that no tampering had taken place 4) Tracking the chain of custody is essential for preparing evidence as it shows the evidence was collected from the system in question, and was stored and managed without alteration. 5) Extracted/ relevant evidence is properly handled and protected from later mechanical or electromagnetic damage 6) Preventing viruses from being introduced to a computer during the analysis process 7) To ensure that original evidence must be described in complete details to present reliable evidence on the court 8) Must arrange to answer reliability questions relating to the software we have used Conclusion In gathering evidence, authenticity, reliability and chain of custody are important aspects to be considered. By following the above steps, we are proper in handling the evidence holds up in court. ii b) Evidence form Didsbury Mobile Entertainments Ltd IT Department Computer Investigation Case No.: 005 Investigation Organization: Gold Star Investigator: Win Pa Pa Aye Nature of Case: Companys policy violation case Location where evidence was obtained: On suspects office desk Description of evidence: Vendor Name Model No./ Serial No. Item #1 One CD Sony Item #2 A 4GB flash memory device Kingston 05360-374.A00LF Item #3 Evidence Recovered by: Win Pa Pa Aye Date Time: 10.12.2009 10:00 AM Evidence Placed in Locker: E2419 Date Time: 15.12.2009 11:00 AM Item # Evidence Processed by Description of Evidence Date/ Time 1 Win Pa Pa Aye Fully recovered deleted email on the drive which is sent to Radasas company, including data exchange between the businesses. 13.12.2009 3:00 PM 2 Win Pa Pa Aye Encrypted document hidden inside a bitmap file. Decrypted and saved on another media. 18.12.2009 9:00 AM 3 Win Pa Pa Aye Password-protected document covering the exchange of information with her friend. Password cracked and file saved on another media. 22.12.2009 2:00 PM Task 2 Report for â€Å"the way the data is stored, boot tasks and start up tasks for Windows and Linux systems† To effectively investigate computer evidence, we must understand how the most popular operating systems work in general and how they store files in particular. The type of file system an operating system uses determines how data is stored on the disk. The file system is the general name given to the logical structures and software routines used to control access to the storage on a hard disk system and it is usually related to an operating system. To know the way the data is stored in Windows XP and Linux, we need to get into file systems of Windows and Linux. The way the data is stored in Windows XP In Windows XP, although it supports several different file systems, NTFS is the primary file system for Windows XP. So, we will have a look in NTFS as the NTFS system offers better performance and features than a FAT16 and FAT 32 system. NTFS divides all useful places into clusters and supports almost all sizes of clusters from 512 bytes up to 64 Kbytes. And NTFS disk is symbolically divided into two parts MFT (Master File Table) area and files storage area. The MFT consumes about 12% of the disk and contains information about all files located on the disk. This includes the system file used by the operating system. MFT is divided into records of the fixed size (usually 1 Kbytes), and each record corresponds to some file. Records within the MFT are referred to as meta-data and the first 16 records are reserved for system files. For reliability, the first three records of MFT file is copied and stored exactly in the middle of the disk and the remaining can be stored anyplace of the disk. The remaining 88% of disk space is for file storage. Below is the partition structure of NTFS system. After we know the file system of Windows XP, then we will move on to the file system of Linux. The way the data is stored in Linux When it comes to Linux file system, ext2 has been the default file system as it main advantages is its speed and extremely robust. However, there is a risk of data loss when sudden crashes occur and take long time to recover. Sometimes the recovery may also end up with corrupt files. By using the advantage of ext2 and add some data loss protection and recovery speed led to the development of journaling file system ext3 and ReiserFs. Though ext2, ext3 and ReiserFs are the most popular file system, there are also some other file system used in the Linux world such as JSF and XFS. As Linux views all file systems from the perspective of a common set of objects, there are four objects superblock, inode, dentry and file. The superblock is a structure that represents a file system which includes vital information about the system. Moreover, it includes the file system name (such as ext2), the size of the file system and its state, a reference to the block device, and meta-data information. It also keeps track of all the nodes. Linux keeps multiple copies of the superblock in various locations on the disk to prevent losing such vital information. Every object that is managed within a file system (file or directory) is represented in Linux as an inode. The inode contains all the meta-data to manage objects in the file system. Another set of structures, called dentries, is used to translate between names and inodes, for which a directory cache exists to keep the most-recently used around. The dentry also maintains relationships between directories and files for traversing file systems. Finally, a VFS (Virtual file system) file represents an open file (keeps state for the open file such as the write offset, and so on). While the majority of the file system code exists in the kernel (except for user-space file systems), (2.3) shows the Linux file system from the point of view of high-level architecture and the relationships between the major file system-related components in both user space and the kernel. The boot task and start up task of Windows XP A good understanding of what happens to disk data at startup is also an important aspect as accessing to a computer system after it was used for illicit reasons can alter the disk evidence. First, we will discuss about the Windows XP startup and boot process, and then shift into the startup and boot process of Linux. Like any other PC system, Windows XP startup by running the POST test, performing an initialization of its intelligent system devices, and performing a system boot process. The boot process begins when the BIOS starts looking through the system for a master boot record (MBR). This record can reside on drive C: or at any other location in the system. When the BIOS execute the master boot record on the hard drive, the MBR examines the disks partition table to locate the active partition. The boot process then moves to the boot sector of that partition located in the first sector of the active partition. There, it finds the code to begin loading the Secondary Bootstrap Loader from the root directory of the boot drive. In NTFS partition, the bootstrap loader is named NTLDR and is responsible for loading XP operation system into memory. When the system is powered on, NTLDR reads the Boot.ini file. If boot.ini contains more than one operating system entry, a boot menu is displayed to the user, allowing the user to choose which operating system is to be loaded. Fig (2.4) shows Boot.ini contains two operating systems and allows user to choose. After the user has selected the desired mode to boot to, NTLDR runs Ntoskrnl.exe and reads Bootvid.dll, Hal.dll and the startup device drivers. After the file system driver has loaded, control is then passed from NTLDR to the kernel. At this time, Windows XP display Windows logo. Virtually, all applications we installed using the default installation decide that they should start up when windows starts. Under â€Å"Startup† tab in the system configuration utility, a list of programs that run when our system boots is listed. Fig (2.6) shows the listed program when our system boots. The boot task and start up task of Linux After we have get into the start up process of Windows XP, we will then shift into the startup process of Linux. In Linux, the flow of control during a boot is also from BIOS, to boot loader, to kernel. When you turn on the power, the BIOS perform hardware-platform specific startup tasks. Once the hardware is recognized and started correctly, the BIOS loads and executes the partition boot code from the designated boot device, which contains Linux boot loader. Linux Loader (LILO) is the Linux utility that initiates the boot process, which usually runs from the disks MBR. LILO is a boot manager that allows you to start Linux or other operating systems, including Windows. If a system has two or more operating systems, LILO gives a prompt asking which operating system the user wishes to initialize. When the user chooses the boot option, it then loads the choosing operating system into memory. The boot program, in turn, reads the kernel into memory. When the kernel is loaded, the boot program transfers control of the boot process to the kernel. The kernel then performs the majority of system setup (memory management, device initialization) before spawning separately, the idle process and scheduler and the init process which is executed in user space. The scheduler takes control of the system management. The init process executes scripts as needed that set up all non-operating system services and structures in order to allow a user environment to be created, and then presents the user with a login screen. We have described about the way the data stored, the boot task and startup task of Windows XP and Linux. After a thorough study of these areas, we can acquire or handle the evidence properly. Task 3 a) Features comparison of â€Å"EnCase, Access Datas Forensic and ProDiscover† Features of Guidance EnCase Forensic * In courts worldwide, forensically acquire data in a sound manner using software with an unparallel record * Using a single tool and investigate and analyze multiple platforms * With prebuilt EnScript ® modules such as initialized Case and Event Log analysis, it can automate complex and routine tasks, so it save time in analyzing * Find information despite efforts to hide, cloak or delete * Can easily handle large volumes of computer evidence, view all relevant files that includes deleted files, file slack and unallocated space * Directly transfer evidence files to law enforcement or legal representatives as necessary * Include review options that allow non-investigators to review evidence easily * Include report options that enable quick report preparation Features of Access Datas Forensic Toolkit * Provides integrated solution that is no need to purchase multiple tools to complete a case. * Provides integrated database that avoid application crashes, lost work and product instability. * Identify encrypted files automatically from more than 80 applications and crack those files. * Supports international language that allows us easily search and view foreign-language data in our native format * Include email analysis that can recover and analyze a wide range of email and web mail formats * Can generate different industry-standard report formats quickly and concisely * Collect key information from the registry that include user information, date of application installed, hardware, time zone and recently used information * While processing takes place, we can view and analyze data Features of ProDiscover * To keep original evidence safe, it create bit-stream copy of disk for analyzing that includes hidden HPA section * For complete disk forensic analysis, it search files or entire disk including slack space, HPA section and Windows NT/2000/XP alternate data streams * Without alter data on the disk, it can preview all files including metadata and hidden or deleted files * Support for VMware to run a captured image. * In order to ensure nothing is hidden, it examine data at the file or cluster level * To prove data integrity, it can generate and record MD5, SHA1 and SHA256 hashes automatically. * Examine FAT12, FAT16, FAT 32 and all NTFS file systems including Dynamic Disk and Software RAID for maximum flexibility. * Examine Sun Solaris UFS file system and Linux ext2 / ext3 file systems. * Integrated thumbnail graphics, internet history, event log file, and registry viewers to facilitate investigation process. * Integrated viewer to examine .pst /.ost and .dbx e-mail files. * Utilize Perl scripts to automate investigation tasks. * Extracts EXIF information from JPEG files to identify file creators. * Automated report generation in XML format saves time, improves accuracy and compatibility. * GUI interface and integrated help function assure quick start and ease of use. * Designed to NIST Disk Imaging Tool Specification 3.1.6 to insure high quality. AccessData FTK v2.0 Guidance EnCase Forensic 6.0 ProDiscover Forensic Report for Choosing Access Datas Forensic Toolkit I think Access Datas Forensic Toolkit is the most beneficial for our lab as it provides more forensic examination features than Encase and ProDiscover. In the evidence aspects, Access Data can acquire files and folders than others. So, it can be a powerful tool when we analyze files for evidence. Moreover, it uses database to support large volume of data that can avoid application crashes, lost work and product instability for our lab. As Access Data is a GUI-based utility that can run in Windows XP, 2000, Me, or 9x operating system and it demo version has most of the same features as full-licensed version, use multi-threading to optimize CPU usage, has task scheduler to optimize time and can view and analyze data while processing takes place, it meets the requirements of our lab. What is more, it supports international language so we can retrieve data no matter which languages they are using. On top of that, it is powerful in searching, recovery, email and graphic analysis. Because of these reasons and by viewing the above forensic tools comparison chart, I can conclude that Access Datas Forensic Toolkit is the most beneficial for our lab. b) Forensic Analysis Report for â€Å"Analyzing FAT32, NTFS and CDFS file system Using Access Datas FTK† Task 4 a) MD5 hash values of bmp, doc, xls files All hash values generated by the MD5 before modification is not the same with the hash value generated after modification. b) Why hash values are same or different A hash value is a numeric value of a fixed length that uniquely identifies data. Data can be compared to a hash value to determine its integrity. Data is hashed and the hash value is stored. At a later time or after the data has been received from mail, the data is hashed again and compared to the stored hash or the hash value it was sent to determine whether the data was altered. In order to compare the hash values, the original hashed data must be encrypted or kept secret from all untrusted parties. When it compared, if the compared hashed values are the same, then the data has not been altered. If the file has been modified or corrupted, the MD5 produces different hash values. In task 4 (a), first we created a doc file with data in this file, then we generated hash values of doc file with MD5. The hash value of info.doc file is da5fd802f47c9b5bbdced35b9a1202e6. After that, we made a modification to that info.doc file and regenerate the hash values. The hash value after modifying is 01f8badd9846f32a79a5055bfe98adeb. The hash value is completely different after modifying. Then we created a cv.xls file and generated the hash value. Before modifying, the hash value is ef9bbfeec4d8e455b749447377a5e84f. After that we add one record to cv.xls file and regenerated hash values. After modifying, ccfee18e1e713cdd2fcf565298928673 hash value is produced. The hash value changed in cv.xls file after data altered. Furthermore, we created fruit.bmp file to compare the hash value before and after modification. The hash value before modifying is 8d06bdfe03df83bb3942ce71daca3888 and after modifying is 667d82f0545f0d187dfa0227ea2c7ff6. So, the hash values comparison of bmp files is completely different after data has been modified. When we encrypted the text file into each image file, the text file is not visible in the image viewing utility and each image file is like its original image file. However, the comparison of the hash values of each image file before and after inserting short messages is completely different. As each image file has been altered by inserting short message, the regenerated hash value is totally different from the original hash values. On top of that, the original image file size has been changed after inserting short messages. The raster image file has slightly increased its file size after it has been modified. The raster image file size is increased from 50.5 KB to 50.7 KB. However, of the remaining three, two image files vector and metafile have decreased its file size a little sharply. The original file size of vector is 266 KB and has been decreased to 200 KB after modified. The metafile also decreased from 313 KB to 156 KB. Only the bitmap is remains stable as its file size does not increase or decrease. In a nut shell, we can conclude that the hash value would change if the file has been modified. However, depending on the file format, the file size can increase, decrease or remain stable. d) Report for â€Å"differences of bitmap, raster, vector and metafile† A bitmap image is a computer file and it is collected with dots or pixels that form an image. The pixel of bitmap is stored like a grid, tiny square. When we use the paint program, we can see the bitmap pixel is like a block and it is draw or clear block by block. A raster image is also a collection of pixels but the image stored pixels in rows to make it easy to print. And raster image is resolution dependent. It cannot scale up to an arbitrary resolution without loss of apparent quality. This is overcome by the vector image. Vector image is made up of many individual, scalable objects. These objects are defined by mathematical equations rather than pixels, so it always render at the highest quality. There are many attributes in vector like color, fill and outline. The attributes can be changed without destroying the basic object. Metafile is a combination of raster and vector graphics, and can have the characteristics of both image types. However, if you create a metafile with raster and vector and enlarge it, the area of raster format will lose some resolution while the vector formatted area remains sharp and clear. If we have lost an image file, before doing anything, we should be familiar with the data patterns of known image file types. Then the recovery process starts. The first step in recovery is to recover fragments file from slack space and free space. The fragment file can locate the header data that is partially overwritten. So, we use Drivespy to identify possible unallocated data sets that contain the full or partial image header values. To locate and recover the image header, we need to know the absolute starting cluster and ending cluster. If not, we could collect the wrong data. Using Drivespy, we can know started cluster number and file size of image that we want to recover. To know the exact ending cluster, add the total number of clusters assigned to the starting cluster position. As we have known the size of image file, we can calculate the total number of clusters. Then, we can locate the image file and retrieve image header. After we get the header value, open the file with Microsoft Photo Viewer. If the file has been opened successfully, then recovery of image file has been completed. If not, we need to use the Hex Workshop to examine the header of the file. Task 5 Report for â€Å"Investigation that prove Naomis innocence† Before we begin tracing an email, we should know which email is illegal and what constitutes an email crime. Illegal email includes selling narcotics, extortion, sexual harassment, stalking, fraud, child abductions, and child pornography. As Jazebel has received an offensive email, so we need to access the victim computer and copy and print the offensive email to recover the evidence contained in the email. Microsoft Outlook, Outlook Express or any other GUI email programs supports for copying the email from inbox to the place that we want to by dragging the message to the storage place. When copying email, the header of the email must be included as it contains unique identifying numbers, such as IP address of the server that sent the message. This helps us when tracing the email. After copy and printing the message, we should retrieve the email header to get the sender IP address. Right click on the message and choose message options to retrieve the email header. The following shows the header information that retrieved from the mail of the victim computer. At line 1(10.140.200.11) shows the IP address of the server sending the e-mail, and provides a date and time that the offending e-mails was sent. Although when we see at line 5, the victim is seemed to be Jezebel, however, line 1 identifies that the e-mail that is sent from the IP address (10.140.200.11) is the same as the victims computer IP address. So, we can conclude that Naomi does not include in sending offensive e-mail. She is innocence and the victim, Jezebel himself, is the one who send the offensive e-mails. References: Computer Forensics Textbook http://www.computerforensicsworld.com/index.php http://www.crime-research.org/library/Forensics.htm http://ixbtlabs.com/articles/ntfs/ www.wikipedia.com Computer Forensics Investigation and Techniques Computer Forensics Investigation and Techniques Introduction I am the student of International Advanced Diploma in Computer Studies (IADCS). In this course, I have to do Compute Forensic assignment. The assignment title is â€Å"Didsbury Mobile Entertainments LTD†. This assignment helps me understanding computer forensics investigation and techniques Before this assignment, although I am interested in computer forensic, I am hardly used computer forensics toolkit or done any investigation. Because of this assignment, I have learnt many techniques how to investigate computer and done it practically. So, by doing this assignment, I have gained in practical and much valuable knowledge in Computer Forensics.nd a heartfelt thanks to all the people in Myanma Computer Company Ltd. for their warmly welcome during the period of the IADCS course and this assignment developed. Task 1 i) Report DIDSBURY MOBILE ENTERTAINMENTS LTD No(5), Duku place, Singapore Jan 10, 2010 Introduction Computer forensics involves obtaining and analyzing digital information for figuring out what happened, when it happened, how it happened and who was involved. What is more, it is use as evidence in civil, criminal, or administrative cases. Reasons for a need for computer forensic investigation Computer forensics investigation can recover thousands of deleted mails, can know when the user log into the system and what he does, can determine the motivation and intent of the user, can search keywords in a hard drive in different languages and can gain evidence against an employee that an organization wished to terminate. For these reasons, in order to know whether Jalitha has been spending her time on her friend business or not, we need a computer forensic investigation. Steps to pursue the investigation In order to pursue the investigation, I would take the following steps: 1) Secure the computer system to ensure that the equipment and data are safe 2) Find every file on the computer system, including files that are encrypted, protected by passwords, hidden or deleted, but not yet overwritten. 3) Copy all files and work on this copy files as accessing a file can alter its original value 4) Start a detailed journal with the date and time and date/information discovered 5) Collect email, DNS, and other network service logs 6) Analyze with various computer forensics tools and software 7) Print out an overall analysis 8) Evaluating the information/data recovered to determine the case Conclusion After we know the reasons and steps for investigation, then we should move on to conduct the investigation. However, we should note that the first step of investigation is critical as if the system is not secure, then the evidence or data we found may not be admissible. ii a) Report for â€Å"The procedures to make sure the evidence holds up in court† DIDSBURY MOBILE ENTERTAINMENTS LTD No(5), Duku place, Singapore Jan 12, 2010 Introduction Evidence is any physical or electronic information (such as computer log files, data, reports, hardware, disk image, etc) that is collected during a computer forensic investigation. The purpose of gathering evidence is to help determine the source of the attack, and to introduce the evidence as testimony in a court of law. Procedures to make sure the evidence holds up in court In order to make the evidence admissible in court, we need to follow the following steps: 1) Before any evidence can be gathered, a warrant must be issued so that forensic specialist has the legal authority to seize, copy and examine the data 2) Have the responsibility to ensure that the law and the principles we used are met 3) Evidence must be obtained in a manner which ensures the authenticity and validity and that no tampering had taken place 4) Tracking the chain of custody is essential for preparing evidence as it shows the evidence was collected from the system in question, and was stored and managed without alteration. 5) Extracted/ relevant evidence is properly handled and protected from later mechanical or electromagnetic damage 6) Preventing viruses from being introduced to a computer during the analysis process 7) To ensure that original evidence must be described in complete details to present reliable evidence on the court 8) Must arrange to answer reliability questions relating to the software we have used Conclusion In gathering evidence, authenticity, reliability and chain of custody are important aspects to be considered. By following the above steps, we are proper in handling the evidence holds up in court. ii b) Evidence form Didsbury Mobile Entertainments Ltd IT Department Computer Investigation Case No.: 005 Investigation Organization: Gold Star Investigator: Win Pa Pa Aye Nature of Case: Companys policy violation case Location where evidence was obtained: On suspects office desk Description of evidence: Vendor Name Model No./ Serial No. Item #1 One CD Sony Item #2 A 4GB flash memory device Kingston 05360-374.A00LF Item #3 Evidence Recovered by: Win Pa Pa Aye Date Time: 10.12.2009 10:00 AM Evidence Placed in Locker: E2419 Date Time: 15.12.2009 11:00 AM Item # Evidence Processed by Description of Evidence Date/ Time 1 Win Pa Pa Aye Fully recovered deleted email on the drive which is sent to Radasas company, including data exchange between the businesses. 13.12.2009 3:00 PM 2 Win Pa Pa Aye Encrypted document hidden inside a bitmap file. Decrypted and saved on another media. 18.12.2009 9:00 AM 3 Win Pa Pa Aye Password-protected document covering the exchange of information with her friend. Password cracked and file saved on another media. 22.12.2009 2:00 PM Task 2 Report for â€Å"the way the data is stored, boot tasks and start up tasks for Windows and Linux systems† To effectively investigate computer evidence, we must understand how the most popular operating systems work in general and how they store files in particular. The type of file system an operating system uses determines how data is stored on the disk. The file system is the general name given to the logical structures and software routines used to control access to the storage on a hard disk system and it is usually related to an operating system. To know the way the data is stored in Windows XP and Linux, we need to get into file systems of Windows and Linux. The way the data is stored in Windows XP In Windows XP, although it supports several different file systems, NTFS is the primary file system for Windows XP. So, we will have a look in NTFS as the NTFS system offers better performance and features than a FAT16 and FAT 32 system. NTFS divides all useful places into clusters and supports almost all sizes of clusters from 512 bytes up to 64 Kbytes. And NTFS disk is symbolically divided into two parts MFT (Master File Table) area and files storage area. The MFT consumes about 12% of the disk and contains information about all files located on the disk. This includes the system file used by the operating system. MFT is divided into records of the fixed size (usually 1 Kbytes), and each record corresponds to some file. Records within the MFT are referred to as meta-data and the first 16 records are reserved for system files. For reliability, the first three records of MFT file is copied and stored exactly in the middle of the disk and the remaining can be stored anyplace of the disk. The remaining 88% of disk space is for file storage. Below is the partition structure of NTFS system. After we know the file system of Windows XP, then we will move on to the file system of Linux. The way the data is stored in Linux When it comes to Linux file system, ext2 has been the default file system as it main advantages is its speed and extremely robust. However, there is a risk of data loss when sudden crashes occur and take long time to recover. Sometimes the recovery may also end up with corrupt files. By using the advantage of ext2 and add some data loss protection and recovery speed led to the development of journaling file system ext3 and ReiserFs. Though ext2, ext3 and ReiserFs are the most popular file system, there are also some other file system used in the Linux world such as JSF and XFS. As Linux views all file systems from the perspective of a common set of objects, there are four objects superblock, inode, dentry and file. The superblock is a structure that represents a file system which includes vital information about the system. Moreover, it includes the file system name (such as ext2), the size of the file system and its state, a reference to the block device, and meta-data information. It also keeps track of all the nodes. Linux keeps multiple copies of the superblock in various locations on the disk to prevent losing such vital information. Every object that is managed within a file system (file or directory) is represented in Linux as an inode. The inode contains all the meta-data to manage objects in the file system. Another set of structures, called dentries, is used to translate between names and inodes, for which a directory cache exists to keep the most-recently used around. The dentry also maintains relationships between directories and files for traversing file systems. Finally, a VFS (Virtual file system) file represents an open file (keeps state for the open file such as the write offset, and so on). While the majority of the file system code exists in the kernel (except for user-space file systems), (2.3) shows the Linux file system from the point of view of high-level architecture and the relationships between the major file system-related components in both user space and the kernel. The boot task and start up task of Windows XP A good understanding of what happens to disk data at startup is also an important aspect as accessing to a computer system after it was used for illicit reasons can alter the disk evidence. First, we will discuss about the Windows XP startup and boot process, and then shift into the startup and boot process of Linux. Like any other PC system, Windows XP startup by running the POST test, performing an initialization of its intelligent system devices, and performing a system boot process. The boot process begins when the BIOS starts looking through the system for a master boot record (MBR). This record can reside on drive C: or at any other location in the system. When the BIOS execute the master boot record on the hard drive, the MBR examines the disks partition table to locate the active partition. The boot process then moves to the boot sector of that partition located in the first sector of the active partition. There, it finds the code to begin loading the Secondary Bootstrap Loader from the root directory of the boot drive. In NTFS partition, the bootstrap loader is named NTLDR and is responsible for loading XP operation system into memory. When the system is powered on, NTLDR reads the Boot.ini file. If boot.ini contains more than one operating system entry, a boot menu is displayed to the user, allowing the user to choose which operating system is to be loaded. Fig (2.4) shows Boot.ini contains two operating systems and allows user to choose. After the user has selected the desired mode to boot to, NTLDR runs Ntoskrnl.exe and reads Bootvid.dll, Hal.dll and the startup device drivers. After the file system driver has loaded, control is then passed from NTLDR to the kernel. At this time, Windows XP display Windows logo. Virtually, all applications we installed using the default installation decide that they should start up when windows starts. Under â€Å"Startup† tab in the system configuration utility, a list of programs that run when our system boots is listed. Fig (2.6) shows the listed program when our system boots. The boot task and start up task of Linux After we have get into the start up process of Windows XP, we will then shift into the startup process of Linux. In Linux, the flow of control during a boot is also from BIOS, to boot loader, to kernel. When you turn on the power, the BIOS perform hardware-platform specific startup tasks. Once the hardware is recognized and started correctly, the BIOS loads and executes the partition boot code from the designated boot device, which contains Linux boot loader. Linux Loader (LILO) is the Linux utility that initiates the boot process, which usually runs from the disks MBR. LILO is a boot manager that allows you to start Linux or other operating systems, including Windows. If a system has two or more operating systems, LILO gives a prompt asking which operating system the user wishes to initialize. When the user chooses the boot option, it then loads the choosing operating system into memory. The boot program, in turn, reads the kernel into memory. When the kernel is loaded, the boot program transfers control of the boot process to the kernel. The kernel then performs the majority of system setup (memory management, device initialization) before spawning separately, the idle process and scheduler and the init process which is executed in user space. The scheduler takes control of the system management. The init process executes scripts as needed that set up all non-operating system services and structures in order to allow a user environment to be created, and then presents the user with a login screen. We have described about the way the data stored, the boot task and startup task of Windows XP and Linux. After a thorough study of these areas, we can acquire or handle the evidence properly. Task 3 a) Features comparison of â€Å"EnCase, Access Datas Forensic and ProDiscover† Features of Guidance EnCase Forensic * In courts worldwide, forensically acquire data in a sound manner using software with an unparallel record * Using a single tool and investigate and analyze multiple platforms * With prebuilt EnScript ® modules such as initialized Case and Event Log analysis, it can automate complex and routine tasks, so it save time in analyzing * Find information despite efforts to hide, cloak or delete * Can easily handle large volumes of computer evidence, view all relevant files that includes deleted files, file slack and unallocated space * Directly transfer evidence files to law enforcement or legal representatives as necessary * Include review options that allow non-investigators to review evidence easily * Include report options that enable quick report preparation Features of Access Datas Forensic Toolkit * Provides integrated solution that is no need to purchase multiple tools to complete a case. * Provides integrated database that avoid application crashes, lost work and product instability. * Identify encrypted files automatically from more than 80 applications and crack those files. * Supports international language that allows us easily search and view foreign-language data in our native format * Include email analysis that can recover and analyze a wide range of email and web mail formats * Can generate different industry-standard report formats quickly and concisely * Collect key information from the registry that include user information, date of application installed, hardware, time zone and recently used information * While processing takes place, we can view and analyze data Features of ProDiscover * To keep original evidence safe, it create bit-stream copy of disk for analyzing that includes hidden HPA section * For complete disk forensic analysis, it search files or entire disk including slack space, HPA section and Windows NT/2000/XP alternate data streams * Without alter data on the disk, it can preview all files including metadata and hidden or deleted files * Support for VMware to run a captured image. * In order to ensure nothing is hidden, it examine data at the file or cluster level * To prove data integrity, it can generate and record MD5, SHA1 and SHA256 hashes automatically. * Examine FAT12, FAT16, FAT 32 and all NTFS file systems including Dynamic Disk and Software RAID for maximum flexibility. * Examine Sun Solaris UFS file system and Linux ext2 / ext3 file systems. * Integrated thumbnail graphics, internet history, event log file, and registry viewers to facilitate investigation process. * Integrated viewer to examine .pst /.ost and .dbx e-mail files. * Utilize Perl scripts to automate investigation tasks. * Extracts EXIF information from JPEG files to identify file creators. * Automated report generation in XML format saves time, improves accuracy and compatibility. * GUI interface and integrated help function assure quick start and ease of use. * Designed to NIST Disk Imaging Tool Specification 3.1.6 to insure high quality. AccessData FTK v2.0 Guidance EnCase Forensic 6.0 ProDiscover Forensic Report for Choosing Access Datas Forensic Toolkit I think Access Datas Forensic Toolkit is the most beneficial for our lab as it provides more forensic examination features than Encase and ProDiscover. In the evidence aspects, Access Data can acquire files and folders than others. So, it can be a powerful tool when we analyze files for evidence. Moreover, it uses database to support large volume of data that can avoid application crashes, lost work and product instability for our lab. As Access Data is a GUI-based utility that can run in Windows XP, 2000, Me, or 9x operating system and it demo version has most of the same features as full-licensed version, use multi-threading to optimize CPU usage, has task scheduler to optimize time and can view and analyze data while processing takes place, it meets the requirements of our lab. What is more, it supports international language so we can retrieve data no matter which languages they are using. On top of that, it is powerful in searching, recovery, email and graphic analysis. Because of these reasons and by viewing the above forensic tools comparison chart, I can conclude that Access Datas Forensic Toolkit is the most beneficial for our lab. b) Forensic Analysis Report for â€Å"Analyzing FAT32, NTFS and CDFS file system Using Access Datas FTK† Task 4 a) MD5 hash values of bmp, doc, xls files All hash values generated by the MD5 before modification is not the same with the hash value generated after modification. b) Why hash values are same or different A hash value is a numeric value of a fixed length that uniquely identifies data. Data can be compared to a hash value to determine its integrity. Data is hashed and the hash value is stored. At a later time or after the data has been received from mail, the data is hashed again and compared to the stored hash or the hash value it was sent to determine whether the data was altered. In order to compare the hash values, the original hashed data must be encrypted or kept secret from all untrusted parties. When it compared, if the compared hashed values are the same, then the data has not been altered. If the file has been modified or corrupted, the MD5 produces different hash values. In task 4 (a), first we created a doc file with data in this file, then we generated hash values of doc file with MD5. The hash value of info.doc file is da5fd802f47c9b5bbdced35b9a1202e6. After that, we made a modification to that info.doc file and regenerate the hash values. The hash value after modifying is 01f8badd9846f32a79a5055bfe98adeb. The hash value is completely different after modifying. Then we created a cv.xls file and generated the hash value. Before modifying, the hash value is ef9bbfeec4d8e455b749447377a5e84f. After that we add one record to cv.xls file and regenerated hash values. After modifying, ccfee18e1e713cdd2fcf565298928673 hash value is produced. The hash value changed in cv.xls file after data altered. Furthermore, we created fruit.bmp file to compare the hash value before and after modification. The hash value before modifying is 8d06bdfe03df83bb3942ce71daca3888 and after modifying is 667d82f0545f0d187dfa0227ea2c7ff6. So, the hash values comparison of bmp files is completely different after data has been modified. When we encrypted the text file into each image file, the text file is not visible in the image viewing utility and each image file is like its original image file. However, the comparison of the hash values of each image file before and after inserting short messages is completely different. As each image file has been altered by inserting short message, the regenerated hash value is totally different from the original hash values. On top of that, the original image file size has been changed after inserting short messages. The raster image file has slightly increased its file size after it has been modified. The raster image file size is increased from 50.5 KB to 50.7 KB. However, of the remaining three, two image files vector and metafile have decreased its file size a little sharply. The original file size of vector is 266 KB and has been decreased to 200 KB after modified. The metafile also decreased from 313 KB to 156 KB. Only the bitmap is remains stable as its file size does not increase or decrease. In a nut shell, we can conclude that the hash value would change if the file has been modified. However, depending on the file format, the file size can increase, decrease or remain stable. d) Report for â€Å"differences of bitmap, raster, vector and metafile† A bitmap image is a computer file and it is collected with dots or pixels that form an image. The pixel of bitmap is stored like a grid, tiny square. When we use the paint program, we can see the bitmap pixel is like a block and it is draw or clear block by block. A raster image is also a collection of pixels but the image stored pixels in rows to make it easy to print. And raster image is resolution dependent. It cannot scale up to an arbitrary resolution without loss of apparent quality. This is overcome by the vector image. Vector image is made up of many individual, scalable objects. These objects are defined by mathematical equations rather than pixels, so it always render at the highest quality. There are many attributes in vector like color, fill and outline. The attributes can be changed without destroying the basic object. Metafile is a combination of raster and vector graphics, and can have the characteristics of both image types. However, if you create a metafile with raster and vector and enlarge it, the area of raster format will lose some resolution while the vector formatted area remains sharp and clear. If we have lost an image file, before doing anything, we should be familiar with the data patterns of known image file types. Then the recovery process starts. The first step in recovery is to recover fragments file from slack space and free space. The fragment file can locate the header data that is partially overwritten. So, we use Drivespy to identify possible unallocated data sets that contain the full or partial image header values. To locate and recover the image header, we need to know the absolute starting cluster and ending cluster. If not, we could collect the wrong data. Using Drivespy, we can know started cluster number and file size of image that we want to recover. To know the exact ending cluster, add the total number of clusters assigned to the starting cluster position. As we have known the size of image file, we can calculate the total number of clusters. Then, we can locate the image file and retrieve image header. After we get the header value, open the file with Microsoft Photo Viewer. If the file has been opened successfully, then recovery of image file has been completed. If not, we need to use the Hex Workshop to examine the header of the file. Task 5 Report for â€Å"Investigation that prove Naomis innocence† Before we begin tracing an email, we should know which email is illegal and what constitutes an email crime. Illegal email includes selling narcotics, extortion, sexual harassment, stalking, fraud, child abductions, and child pornography. As Jazebel has received an offensive email, so we need to access the victim computer and copy and print the offensive email to recover the evidence contained in the email. Microsoft Outlook, Outlook Express or any other GUI email programs supports for copying the email from inbox to the place that we want to by dragging the message to the storage place. When copying email, the header of the email must be included as it contains unique identifying numbers, such as IP address of the server that sent the message. This helps us when tracing the email. After copy and printing the message, we should retrieve the email header to get the sender IP address. Right click on the message and choose message options to retrieve the email header. The following shows the header information that retrieved from the mail of the victim computer. At line 1(10.140.200.11) shows the IP address of the server sending the e-mail, and provides a date and time that the offending e-mails was sent. Although when we see at line 5, the victim is seemed to be Jezebel, however, line 1 identifies that the e-mail that is sent from the IP address (10.140.200.11) is the same as the victims computer IP address. So, we can conclude that Naomi does not include in sending offensive e-mail. She is innocence and the victim, Jezebel himself, is the one who send the offensive e-mails. References: Computer Forensics Textbook http://www.computerforensicsworld.com/index.php http://www.crime-research.org/library/Forensics.htm http://ixbtlabs.com/articles/ntfs/ www.wikipedia.com

Friday, October 25, 2019

Comparison of British Parliamentary Democracy and American Presidential

Comparison of British Parliamentary Democracy and American Presidential Democracy In declaring independence from Britain, the American Colonies sought to create a democracy that found its roots in Ancient Greece and Great Britain while improving on the flaws of each. The result was a presidential democracy that stood in contrast to the parliamentary democracy of Great Britain. Thus these, the two oldest, continuous democracies in existence present an interesting comparison. At the heart of any government is the constitution, and here we discover the first major difference between the American and British democratic systems. The Constitution has never been written in one conclusive and final document, but depends largely on practices accumulated over the years. â€Å"Its most important features are no part of its formal and legal structure and have little other sanction beyond use and precedent.† (Amery 1) This easily adaptable format differs sharply from the American Constitution, a formal organization written at the start of the Union and which created formal means by which the Constitution could be changed. Because the British Constitution is reliant upon tradition, the means whereby power is distributed has changed significantly since the first democratic customs. Initially power was vested in the monarchy, which relied upon input from the House of Lords to run the nation. As time progressed the power came to fall under the command of the House of Commons, and with no system of check and balances it came to reside in the ruling party. This system is â€Å"the modern embodiment of a fusion of governmental powers which has generally characterized British government.† (Moodie 15) In c... ...cmillan Press. 1993. 92-122 Denham, Andre and Mark Garnett. British think-tanks and the climate of opinion. London: UCL Press. 1998 Holliday, Ian. â€Å"Organised Interests After Thatcher†. Developments in British Politics. Ed. by Patrick Dunleavy, Andrew Gamble, Ian Holliday, and Gillian Peele. Houndmills: The Macmillan Press. 1993. 307-320 . Krieger, Joel. British Politics in the Global Age: Can Social Democracy Survive?. Oxford: Oxford University Press. 1999. Marsh, David. â€Å"The Media and Politics†. Developments in British Politics. Ed. by Patrick Dunleavy, Andrew Gamble, Ian Holliday, and Gillian Peele. Houndmills: The Macmillan Press. 1993. 332-349 Moodie, Graeme C. The Government of Great Britain. New York: Thomas U. Crowell Company. 1964. Pilkington, Colin. Issues in British Politics. New York: St. Martin’s Press. 1998

Thursday, October 24, 2019

Women in Ancient Greece

Behind every great man there is a great woman. The woman being the mother and wife of the household, the caretaker and glue that held things together while the man was the â€Å"breadwinner†, this was an ideal that held true throughout history only until recent years. In Ancient Greece, women held an obligation to their house and husband, they were property in a sense, but at the same time they almost held an important position of power, only it was hidden behind the veil of the home life. While they were reliant upon their husbands, it can be viewed that it was the females that helped their husbands and sons obtain the positions that they held, for good or bad. The female role of power in Greece varied from slave to queen, the woman’s role was the important but often subservient glue that was meant to keep the family together. Greek culture did not have to write down what was expected of women of the ancient time, because the men in society spent the entirety of a female’s life leaving their impressions of how they were meant to behave. Analyzing the work of various philosophers and writers, women were viewed as tools of the household, as the glue that held the household. However women were not considered anything outside of that, and were expected to remain in the household and tend to the children. The wives and mothers were at the center of the household, even when the husband was home. The husband would have seniority in the household, but when he was gone, the women were in charge of everything, including the slaves and the children. While the men were gone, the women were meant to follow a stern set of rules in order to avoid being seen with the suspicion and gossiped about by her neighbors. The women of Ancient Greece sought to please their husbands and everything described to be a â€Å"good wife†. If they feel that another woman has been unfaithful, even if she simply let her husband’s friend into their house when he isn’t home, the other women will talk and attempt to ruin the reputation of the woman.

Tuesday, October 22, 2019

Targets Strategy for Developing Customer Relationships Explain the components of a marketing strategy. The target market. The 4 Ps applied to each target market segment.

Targets Strategy for Developing Customer Relationships Explain the components of a marketing strategy. The target market. The 4 Ps applied to each target market segment. AbstractTarget is all about their customers, the communities they serve, and education. This article will explain the many programs associated with each, such as, the REDcard, Reach Out and Read, and involvement with the American Red Cross. Targets employees and corporation holds strong values of making their products affordable and emphasizing great design. This article will include how Target handles their customer complaints, providing information about new or existing products, placing orders, receiving other feedback from customers, tracking an order, and analyzing and critiquing of Targets customer relationship programs.Targets Strategy for Developing Customer RelationshipsINTRODUCTIONWhat does Target believe? This corporation believes in connecting business and community to serve consumers with affordability and great design. With this being their main statement describing their values it explains exactly how they run their business. By connecting business and community, Targe t and their employees are able to support and participate in programs associated with the American Red Cross, Salvation Army and United Way.Jason Kleckner Target CorporationThey also have many educational programs that work with REDcard holders and their local school of choice. This article will go into detail about how Target develops their customer relationships and an evaluation and critique of their current programs in place, and my recommendations for improvements upon these programs.Target welcomes all types of comments including customer complaints. The corporation has several phone numbers located on their website in the about target section. Customer service has several options via telephone according to your problem. Target also has a contact page to e-mail any questions or comments specific to a topic. I had limited success e-mailing the corporation to help me with this project, and with the telephone service.Target's current programs for providing information about new o r existing products are weekly ads delivered via e-mail, through the postal...

Monday, October 21, 2019

Technical Report on Food Dyes Essay Example

Technical Report on Food Dyes Essay Example Technical Report on Food Dyes Essay Technical Report on Food Dyes Essay TECHNICAL REPORT ON SYNTHETIC FOOD COLORS TEXTILE LABORATORY APPLIED CHEMISTRY RESEARCH CENTER Pakistan Council of Scientific and Industrial Research Laboratories. Complex Karachi. TECHNICAL REPORT ON SYNTHETIC FOOD COLORS ______________________ _________________ Muhammad Aleem Ahmed Dr. Arfa Yasmeen P. S. O/ACRC HOC/ACRC _______________ __________________ Dr. Khuala Shirin Dr. Tanzil Haider Usmani P. S. O/ACRC D. G/KLC Compiled by: ________________ ___________ Mrs. Munazza Sohail Mansoor Iqbal Scientific Officer Scientific Officer Corresponding e-mail: [emailprotected] com [emailprotected] com [emailprotected] com TEXTILE LABORATORY APPLIED CHEMISTRY RESEARCH CENTER Pakistan Council of Scientific and Industrial Research Laboratories. Complex Karachi. Table of Contents: S. NoContentsPage Nos 1. Title of Project1 2. Affiliated personnel and organization2 3. Table of Contents3 4. Introduction and uses of Food Colors4 5. List of Approved food colors with details5 6. Background and Classification8 7. Advantages and Adverse Effects due to heavy metals in Food colors9 8. Permissible Limits of Heavy Metals10 9. Schematic Diagram for the synthesis of Food colors11 10. Some details for Mono Azo Food Colorants12 11. Details and specification of Acid Red 33 Food Dye12 produced by PCSIR laboratories Complex Karachi. 13 12. Working Group for Pilot Scale production, Analysis and quality Control of Synthesized Product14 13. References15 Introduction: Food colors are known as certified colors. A colorant which may either be obtained from natural or synthetic route, permissible for use in food, drugs or cosmetics by FDA. All must satisfy strict regulations as to toxicity. The Natural color extracts, which were used for centuries for coloring food, have been extensively replaced by synthetic dyes. These synthetic dyes are colored organic substances that can be applied in solution or dispersion to the food as substrate, thus giving it a colored appearance. Usually the dyes have an affinity for food stuff and are readily absorbed from solution. The synthetic organic colors are superior to the natural dye extract in tinctorial power, consistency of strength, range and brilliance of shade, stability, ease of application and cost effectiveness. Many of synthetic coloring material thus selected for use in foods however the manner in which it is applied is much important from health point of view. A color additive is any dye, pigment or substance which when added or applied to a food, drug or cosmetic, or to the human body, is capable (alone or through reactions with other substances) of imparting color. FDA is responsible for regulating all color additives to ensure that foods containing color additives are safe to eat contain only approved ingredients and are accurately labeled. Uses of Food Colors: Color additives are used in foods for many reasons: 1) To offset color loss due to exposure to light, air, temperature extremes, moisture and storage conditions; 2) To correct natural variations in color; 3) To enhance colors that occur naturally; and 4) To provide color to colorless and fun foods. Without color additives, colas wouldnt be brown, margarine wouldnt be yellow and mint ice cream wouldnt be green. Color additives are now recognized as an important part of practically all processed foods we eat. List of dyes which are called certified Food Dyes: FD C Blue No. 1 – Brilliant Blue FCF, E133 (blue shade) FD Blue No. 2 – Indigo tine, E132 (indigo shade) FD Green No. 3 – Fast Green FCF, E143 (turquoise shade) FD Red No. 40 – Allura Red AC, E129 (red shade) FD Red No. 3 – Erythrosine, E127 (pink shade, commonly used in glace cherries) FD Yellow No. 5 – Tartrazine, E102 (yellow shade) FD Yellow No. – Sunset Yellow FCF, E110(orange shade) List of Approved Natural and Synthetic colors for Food items by their E-Numbers: 100–199 Colors 100–109Yellows 110–119Orange 120–129Reds 130–139Blues Violets 140–149Greens 150–159Browns Blacks 160–199Gold and others Some Mono Azo dyes used in Food with their EN Numbers and Structures: : E102 : Tartrazine E107 : Yellow 2G E110 : Sunset Yellow E122 : Azorubine E123 : Amaranth E124 : Ponceau 4R E129 : Allura Red E151 : Brilliant Black E155 : Brown HT Background Information for Synthetic Food Colors: Artificial food colorings were first introduced after World War II when the chemical industry met with the food industry regarding using chemical-based colors since they were lower in cost than natural colors and had a longer shelf life. The safety of the colors was determined primarily from using LD-50 tests, and the amount was then extrapolated to humans. At the time of approval, behavioral toxicology testing was not required by the Food and Drug Administration (FDA) and therefore was not done on the artificial food colors. Classification of Synthetic Food Colors: Synthetic Food colors have been grouped into following classes. Mono azo Diazo Triazo Triarylmethane Xanthene Quinoline Indigoid Azo Food colors: In azo group of colors the chromopheric system consists of essentially of the azo group on association with one or more aromatic system. Azo Group There may be one or more than one azo group are present in color molecule therefore the mono azo, diazo, triazo, tetra azo or poly a zo dyes are being synthesized. Also the position of azo groups may differentiate their characteristics. The range of the shades covered by the azo group in food colors is very wide and including Red, Orange, Yellow, blue, Violet, Brown and Black. In most of the countries of world the coloration of food is regulated by FDA and government status. This is usually achieved by the publication of permitted lists and purity specification for each colorant and sometimes by the limitation of permitted colorant level in certain food colors. Advantages of synthetic Food colors: 1. Safe 2. Uniform Quality 3. Readily available in adequate quantity 4. Good Stability 5. High tinctorial power makes them economically advantages 6. good stability in water and alcohol 7. tasteless and odor less 8. Available in several forms 9. Freedom from bacteriological problem 10. Compatible in all food and beverages 11. Help to hold down the cost of food since the normal appearance of wholesome colorful tool can be retained or can be restored if color is lost during processing. 12. promote good health by making nutritious food attractive to the consumer. The Adverse effects of Lead, Mercury, and Arsenic: Lead: Lead is associated with lower IQ and it could also responsible for some cavities in teeth. Lead exposure has been linked to developmental delays, peripheral neuropathy, alters thyroid hormones and reduces fertility. In elderly adults level over 4 mcg can have neuro behavioral effects. Mercury: Mercury has been implicated in autism, ADHD, learning disabilities, endocrine problems, allergies, asthma, rheumatoid arthritis, and a host of other disorders. According to the FDA, The toxicity of mercury compounds is extensively documented in scientific literature. It is well-known that mercury compounds are readily absorbed through unbroken skin as well as through the lungs by inhalation and by intestinal absorption after ingestion. Mercury is absorbed from topical application and is accumulated in the body, giving rise to numerous adverse effects. Arsenic: Arsenic poisoning has been associated with respiratory, neurological, developmental, and cardiovascular issues. It has also been associated with cancer. In fact, an increased risk of skin cancer in humans is associated with chronic exposure to inorganic arsenic in medication, contaminated water, and the workplace. Permissible Limits for Some Heavy metal content in Food Colors: In the US, FDA specification for food, drug and cosmetics colorants are supported by published methods, many of which are acknowledge as official methods and reported as such by the association of official analytical chemist. FDA color additive specifications tend to differ from their European counterparts by placing lower limit on a smaller number of heavy metals usually including (Lead, Mercury and Arsenic) and by limiting a smaller number of organic contaminants . Moisture and diluents limit are usually included and minimum pure color content is required. So the General limits of heavy metals in ppm regulated by FDA on which bases a dye can be accepted as certified food color are as follows: S . NoName of MetalLimit in ppm 1. Lead? 10 2. Arsenic? 3 3. Mercury? 1 4. Cadmium? 1 5. Chromium? 50 6. Manganese? 100 7. Total heavy Metals? 40 Some Mono Azo Food Colors with their Numbers and Intermediates: S. NoColor NameC. I NoC. I Food NoEEC NoFD C NoIntermediates 1- Amaranth 16185 Red 9 E123 Red No 2 Naphthionic Acid, 2- Naphthol-6- Sulphonic acid, 2- Naphthol-3,6- diSulphonic acid, 2- Naphthol-6,8- diSulphonic acid, 2- Naphthol-3,6,8- diSulphonic acid 2-Allura Red16035Red 17E129Red No 405-Amino-4-Methyoxytoulene-2-Sulphonic acid, 2- Naphthol-6-Sulphonic acid, 6,6-Oxybis (naphthalene-2-sulphonic acid), 2,2- Di methoxy-5,5-dimethyl-diazo amino-benzene-4,4- di sulphonic acid. -Sun Set Yellow FCF15985Yellow 3E110Yellow No 6Sulphanilic acid,2-Naphthol-6-Sulphonic acid, 6,6-oxybis(Naphthalene-2-sulphonic acid),4,4-Diazoaminodi(benzene Sulphonic acid), 2-Naphthol-3,6-disulphonic acid. 4-Tartrazine19140Yellow 4E102Yellow No 5Sulphanilic acid,4 Hydrazino benzene sulphonic acid,3 Carboxy-1-(4-Sulphophenyl)-5-pyrazone,4,4-Diazoaminodi (Benzene Sulphonic acid) Details and Specification of Acid Red 33 Food Dye12 produced by PCSIR laboratories Complex Karachi, C. I No. 17200 CAS Number:3567-66-6 Name:2,7-Naphthalenedisulfonicacid, 5-amino-4-hydroxy-3-(2-phenyldiazenyl)-, sodium salt (1:2) Synonyms: ,7-Naphthalenedisulfonicacid, 5-amino-4-hydroxy-3-(phenylazo)-, disodium salt (9CI); C. I. Acid Red 33(6CI,7CI); C. I. Acid Red 33, disodium salt (8CI); 11427 Red; 1424 Red; Acetyl Red B; Acid Fuchsin Fast B; Acid Fuchsine 38013; Acid Fuchsine 90120; Acid Fuchsine D; Acid Red 2A; Acid Red 33; Acid Red B; Amacid Fuchsine 4B; AzoFuchsine; Azo Grenadine; Azo Magenta G; Azo fuchsin; Azofuchsin (biologicalstain); Brasilan Fuchsine D; C. I. 17200; C. I. Food Red 12; Certicol Red B;Colacid Red 2A; Cosmetic Red 17000; D C Red 33; D and C Red No. 33;DC Red No. 33; DC Red No. 33-307002; DC Red No. 33-38013;DC Red No. 3-90120; Disodium1-hydroxy-2-phenylazo-8-aminonaphthalene-3,6-disulfonate; Edicol Supra Red 10B;Edicol Supra Red 10BS; Eniacid Fuchsine BN; Fabracid Fuchsine S-B; Fast A cidMagenta; Fast Acid Magenta B; Food Red 12; Hexacol Red 10B; Hexalan Red B;Hispacid Fuchsin B; Japan Red 227; Japan Red No. 227; Naphthalene Red B;Puricolor Red ARE 33; Red 10B; Red 10B307042; Red 33; Red No. 227; Romexal Red2A Molecular Formula: C16H13 N3 O7 S2 . 2 Na Molecular Weight:469. 42 Density:g/cm3 Melting Point: decomposes below the melting point Boiling Point:Â °Cat760mmHg Flash Point: Â °C Lab Report of Our Synthesized product (Food Red 12 or Acid Red 33): S. NoName of Metal Limits in ppm 1. LeadBelow detection limit 2. Arsenic Below detection limit 3. Mercury 0. 011ppm 4. CadmiumBelow detection limit 5. BariumBelow detection limit 6. CopperBelow detection limit 7. BariumBelow detection limit 8. SeleniumBelow detection limit 9. CopperBelow detection limit 10. ChromiumBelow detection limit Working Group for Pilot Scale Production, Analysis and Quality Control of Synthesized Food Color: 1. Members for Production: Muhammad Aleem Ahmed (P. S. O)/ACRC Munazza Sohail (S. O) /ACRC Mansoor Iqbal (S. O) /ACRC Kamran Ahmed (S. O) /ACRC 2-Members for Analytical and QC Services: Dr. Khaula Shirin P. S. O/ACRC Dr. Sofia. K. Alvi S. S. O/ACRC Sheeraz Shafiq S. O/ACRC Mehroz Khan S. O/ACRC References: 1. Color Index, International, Society of dyes and Colorist Bradford England (Page 4105). 2. Development in Food Color by , Eb John Walford ,Elsevier applied Science Publishers London and New York . 3. Color in Food, Improving quality by Douglas b Dougall, CRC Press Boca Raton Boston New York Washington DC, Cambridge England. 4. Food Colorant, chemical and functional Properties by Carmen Socaciu, CRC press, Tailor and Francis Group.

Sunday, October 20, 2019

All the Kings Men essays

All the Kings Men essays All the Kings Men, by Robert Penn Warren is the story of a political icon in the 1930's. Rising from a poverty-stricken home to become governor of the state was not an easy life. Politics is a game of willpower and manipulation, not ideals (Warren 30). Willie puts forth a great deal of energy into keeping his powerful political position. By the use of blackmail and bullying, he coaxes his enemies into submission. His most fearful enemy is Sam MacMurfee; he constantly tries to pull Willie down off his political throne. The author puts emphasis on the fact that Willie starts out a good, honest man opposed to a system filled with blackmail, bribery, and trickery; but he is ultimately forced to master it. All the Kings Men is also the story of Jack Burden, Willie's right hand man. Jack turns away from his good-natured upbringing, joins Willies rough group of allies and hired thugs, and just walks away from all his past interests. Jack's job is to use his gifts as a historical researcher to dig up information and secrets of Willie's enemies. Jack struggles with the idea of responsibility. He attempts to avoid the idea that actions have consequences, and individuals are responsible for those consequences. Jack considers himself to be an idealist. Willie makes a point to be in control of every situation. From the time his son gets a woman pregnant to his political dynasty. Jack's first love, Anne Stanton, begins an affair with Willie. When her brother Adam finds out, he murders Willie in a rage. That would be the only situation in which Willie had no control. After the death of Willie, Jack removes himself from politics. He rethinks his idea that no individual can be responsible for the consequences of their actions; and eventually marries Anne Stanton. An important theme in the novel was reputation. Being a politician, Willie was constantly in the public eye, and greatly concerned with how the people perceived him....

Saturday, October 19, 2019

Journal Assignment Example | Topics and Well Written Essays - 250 words - 10

Journal - Assignment Example Bush: cowboy diplomacy, the Iraq war and America’s lowest standing on the international stage. In the coming weeks, Obama advisers plan to release a list of national security â€Å"surrogates† — high-profile Democrats like former Secretary of State Madeleine K. Albright and Wesley K. Clark, a retired general — who will write newspaper op-ed articles, give speeches and take Mr. Romney to task every time he opens his mouth about foreign policy, Obama advisers said. The plan is to draw a contrast between Mr. Obama — who, his advisers say, kept his word on ending the Iraq war, going aggressively after Al Qaeda and restoring alliances around the world — and Mr. Romney, who will be portrayed as playing both sides of numerous issues. â€Å"He was for and against the removal of Qaddafi, for and against setting a timetable to withdraw our troops from Afghanistan, for and against enforcing trade laws against China, and while he once said he would not move heaven and earth to get Osama bin Laden, he later claimed that any president would have authorized the mission to do so,† said Ben LaBolt, press secretary for the Obama campaign. The more aggressive posture is a break from the past, when Democrats on the national stage battled against the perception that the party was not as committed as Republicans were to a strong defense and an aggressive response to terrorism. Mr. Obama himself, during the 2008 campaign, drew criticism from both Republicans and his primary opponent, Hillary Rodham Clinton, for what they called his naà ¯vetà ©, particularly over his willingness to talk, without preconditions, to American foes like Iran. But Mr. Obama’s victory that year over Senator John McCain, a Vietnam War hero, was in part a result of an electorate weary from years of combat in Afghanistan and Iraq. Now, with a record that includes winding down the Iraq war and killing Bin Laden, coupled with the success of the military strikes in Libya and the removal

Friday, October 18, 2019

Statement Essay Example | Topics and Well Written Essays - 1000 words

Statement - Essay Example 12). On February fourth, I arrived at 6 City Walk, Middleton, which was the family home of Laura Hugh missing person’s report. Julie’s parents had reported her missing on the previous day. Julie was twenty two year old who had disappeared after visiting a dentist on the 4th of February 2013 at 12.30pm. Julie lived with her parents at 6 City Walk, Middleton and works as an office administrator at Office Works Ltd (Hook, 2014, p. 16). On the 5th of February 2013, when I arrived at Julie Sharp’s home address at 8.00 am, I remained near the front door. I realized that the following exhibits were being packed by police investigative officer Angela Still, who has been given the exhibits by police investigator James Winchester, before the exhibits were ready for me to collect in the presence of crime scene manager David Johansson. I took the responsibility of transporting the exhibits to the storage unit at Middleton police station at 12.15 hours. All items were individually packed, correctly labelled, which also included the contact number for transportation to the forensic laboratory at Middleton and sealed by Angela Still in the presence of Commissioner, Sir Andrew Putland and I. Both of us owe the key to the storage unit, (Smith, 2013). The laptop was securely packed in an evidence box to be transported to computer forensic expert, the photograph was labelled and sealed in the antistatic bag that has a tamper-evident seal, and the diary was packed in a nylon bag. On Wednesday, the 6th of February at 9.00am, Angela Still, and I visited the Office Works Ltd, where Julie Sharp worked, so as to obtain statements from her colleagues. On the same day, I visited the dentist where she had an appointment on the day she went missing. At the dentist, there were no CCTV cameras to provide enough information about Julie. Within little background information, I could not determine

FINANCIAL STATEMENT ANALYSIS Assignment Example | Topics and Well Written Essays - 1250 words

FINANCIAL STATEMENT ANALYSIS - Assignment Example Another part of the paper presents the qualitative interpretation of the quantitative results. That is, the interpretation of the company’s ratio results and their significance. Lastly, a summary of the company’s financial position as reflected by the analysis has been produced together with a suitable plan of action. The overview of Procter and Gamble The company, based in the United States, is focused in manufacturing branded consumer products. The company’s main objective is the provision of products and services that are of high quality and value to help improve the well-being of both current and future generations. The company’s mission is formulated based on two objectives. That is, the profit maximization and shareholder wealth creation. The company has a widespread market covering more than 180 countries across the world. The company reaches the customer through the establishment of various outlets such as grocery stores, Merchandisers, drug stores , membership club stores and the neighborhood stores. Currently, the company’s financial performance is still below the investor’s expectations. ... analysis, the following tools have been selected: profitability measures, asset turnover, the inventory turnover, debtor’s collection period, creditor’s collection period, liquidity measures, the analysis of ROE drivers, Common size analysis, the growth analysis, and industrial analysis. The profitability ratio shows the performance of a firm regarding its ability to generate income from the investments. The efficiency ratio indicates the ease with which a firm utilizes its resources in order to generate revenue. The liquidity ratio would indicate the ability of a firm to meet its short-term needs. The common size present the expression of financial statement items as a percentage of another key item. In other words, the expression of all the balance sheet items as a percentage of the total assets. DuPont analysis presents the relationship between ROE drivers. The analysis is used to identify the level of performance of particular processes in a company. A companyâ€⠄¢s growth analysis is the percentage change of financial items based on a base period. Finally, the peer analysis is the comparison between the industrial average performance and the performance of a company [All the mathematical proofs are in the excel file] (Beyer 88-156). Summary of the quantitative analysis The balance sheet analysis – the total current assets decreased in the year 2009 as compared to the figure in the year 2008. The figure decreased by $ 2,610,000. The decrease can be attributed to the decrease in the value of account receivables in that year. Secondly, the decrease could be because of the reduced amount of work in progress. Thirdly, the decreased amount of finished goods also led to the decrease in the level of current assets. The shareholder’s equity decrease in the year by $

Problem Set 6, 7, and 8 Assignment Example | Topics and Well Written Essays - 1000 words

Problem Set 6, 7, and 8 - Assignment Example Thus it is a measure of the strength of relationship between the two variables. David states that when the two variables are continuous-level variables, the value is called Pearson correlation coefficient (David, 1997. Pg100). Suppose an economist wants to determine if higher oil prices increase the cost of shipping and the degree of the relation between the two, in this case, his main concern is the cost of shipping and how it is being affected by the changes in the oil prices; of which he wants to determine whether the shipping cost changes depend on the changes in the oil prices. Thus the dependent variable is the shipping cost while the independent variable is the oil prices. This is basically because the shipping cost depends on the oil prices. To answer his question, the economist can go ahead to collect historical data on the same and probably tabulate his results as below: To measure the strength and direction of relationship/association between two variables, Spearman rank-order correlation can be used. It is a nonparametric measure. David notes that before using Spearman rank-order correlation, it is vital to check the validity of the data (David, 1997. Pg230). This is because not all data is qualified to be analyzed by Spearman rank-order correlation. Thus to use the spearman rank-order correlation, data must meet the following prerequisites: Thus I selected this test to analyze the data based on these two conditions that have been met by the data. Suppose football analysts want to find out the order of the teams between two years in English premier league, Spearman rank-order correlation may be an option. The analyst has collected the following data: 1. Predicting unknown values of a variable from the value of several known variables (predictors) is done using multiple regression analysis. For example, we can predict the value of a dependent variable y so long as we are given the value of xi (x1, x2, x3, †¦xn) Suppose an

Thursday, October 17, 2019

Machine guns Essay Example | Topics and Well Written Essays - 1000 words

Machine guns - Essay Example . automatically more than one shot, without manual reloading, by a single function of the trigger† (National). This is one example where laws confuse us more than help. The machine gun has had a checkered history; it was invented in the mid nineteenth century by Dr. Richard Jordon Gatling, and was known as the Gatling gun. He patented his invention in 1861. The Gatling gun was the first rapid firing gun which can precisely be referred to as the ancestor of modern machine gun. Dr Gatling said â€Å"it occurred to me that if I could invent a machine-a gun- which could by its rapidity of fire enable, one man to do as much battle duty as a hundred that it would to a large extent supersede the necessity of large armies and consequently, exposure to battle and disease would be greatly decreased (Richard par 4).† This was followed in 1885 by a Maxim gun which was the first machine gun that was self powered, in that it used the recoil energy of the previous bullet to load and fire the next bullet. The modern machine gun is a development of the Maxim gun. All machine guns for firing use a basic mounting which is as follows People have been collecting guns all over the world for decades. It is similar to people like collecting swords. But now a new hobby has emerged of collecting machine guns in most countries of the world, owning a machine gun is illegal, but in the United States 34 states of the union, it is legal for citizens to own and shoot with machine guns. In case you wish to start a hobby as a machine gun collector then please do ensure that the state you reside allows you to own a machine gun. In some states such as Delaware, Hawaii, Iowa, Illinois, Kansas, New York, Rhode Island, South Carolina, Washington State and the district of Columbia, have a total ban on privately owned machine guns. However, despite the above quarters of million Americans own machine guns. The National Firearms Act 1934 is the nodal act that governs

Explain the guiding theory to which you adhere, combination of two Essay

Explain the guiding theory to which you adhere, combination of two theories, an integrated model of several theories or one dist - Essay Example I have compared aspects of Adlerian therapy, which to me seems to be a type of reform or broadening of the Freudian approach to psychotherapy to increase its application by focusing on family issues and personal problems, but decided that the Existential Theory represented by Carl Rogers and others would finally be the best field to specialize in for addiction therapy. I would like my work in addiction to relate to social functioning as a type of healing for the disfunctionality in the person suffering from substance abuse. When that person is able to return to a normal daily life and take part in activities that represent his or her own goals of self-realization, I feel that the counseling process will have been successful. In order to assist the individuals with this recovery process, there should be a combination of methods integrated into the counseling practice, and these should be based in a broad understanding of the schools of psychology and their unique benefits for treatmen t. I am personally focusing on Existential Therapy, Gestalt Theory, and Person-centered approaches for my counseling practice. ... In getting to know the people seeking treatment personally, the first aspect of counseling is to look through the substance abuse itself as a symptom to the deeper causes. An important aspect of this is being able to recognize aspects of abnormal psychology which may have roots in degenerative mental illnesses from adjustment problems and substance abuse related to traumas, childhood abuse, coping problems, peer pressure, or other factors that may have led to the behavior initially. The assumption in this process is that in identifying the root cause of the mental origin of the substance abuse problems by counseling, there can also be a conscious recognition of that issue by the person, and through this understanding the problem can be healed as that person becomes aware of methods through which the problems can be positively overcome. In seeking to provide an assistance role for these people to return to normal functioning in society on their own terms, the importance of Existential Theory in counseling becomes clearly evident. One assumption this method includes is that drug addiction and particularly the self-destructive aspects of it that lead people to counseling and recovery therapy are related to â€Å"deeper† problems of self –development and not genetically conditioned or caused by physical addiction to drugs like heroin or cocaine. Where there are physical addictions, these must be eliminated before the counseling can really progress, but in addiction therapy relapses are common so that the person may be constantly moving between treatment, substance use, abuse, and counseling. Thus the â€Å"detoxification† stage should be distinguished from the â€Å"treatment† stage, and the recovery itself proceeds from the treatment as the individual returns to normal

Wednesday, October 16, 2019

Problem Set 6, 7, and 8 Assignment Example | Topics and Well Written Essays - 1000 words

Problem Set 6, 7, and 8 - Assignment Example Thus it is a measure of the strength of relationship between the two variables. David states that when the two variables are continuous-level variables, the value is called Pearson correlation coefficient (David, 1997. Pg100). Suppose an economist wants to determine if higher oil prices increase the cost of shipping and the degree of the relation between the two, in this case, his main concern is the cost of shipping and how it is being affected by the changes in the oil prices; of which he wants to determine whether the shipping cost changes depend on the changes in the oil prices. Thus the dependent variable is the shipping cost while the independent variable is the oil prices. This is basically because the shipping cost depends on the oil prices. To answer his question, the economist can go ahead to collect historical data on the same and probably tabulate his results as below: To measure the strength and direction of relationship/association between two variables, Spearman rank-order correlation can be used. It is a nonparametric measure. David notes that before using Spearman rank-order correlation, it is vital to check the validity of the data (David, 1997. Pg230). This is because not all data is qualified to be analyzed by Spearman rank-order correlation. Thus to use the spearman rank-order correlation, data must meet the following prerequisites: Thus I selected this test to analyze the data based on these two conditions that have been met by the data. Suppose football analysts want to find out the order of the teams between two years in English premier league, Spearman rank-order correlation may be an option. The analyst has collected the following data: 1. Predicting unknown values of a variable from the value of several known variables (predictors) is done using multiple regression analysis. For example, we can predict the value of a dependent variable y so long as we are given the value of xi (x1, x2, x3, †¦xn) Suppose an

Tuesday, October 15, 2019

Explain the guiding theory to which you adhere, combination of two Essay

Explain the guiding theory to which you adhere, combination of two theories, an integrated model of several theories or one dist - Essay Example I have compared aspects of Adlerian therapy, which to me seems to be a type of reform or broadening of the Freudian approach to psychotherapy to increase its application by focusing on family issues and personal problems, but decided that the Existential Theory represented by Carl Rogers and others would finally be the best field to specialize in for addiction therapy. I would like my work in addiction to relate to social functioning as a type of healing for the disfunctionality in the person suffering from substance abuse. When that person is able to return to a normal daily life and take part in activities that represent his or her own goals of self-realization, I feel that the counseling process will have been successful. In order to assist the individuals with this recovery process, there should be a combination of methods integrated into the counseling practice, and these should be based in a broad understanding of the schools of psychology and their unique benefits for treatmen t. I am personally focusing on Existential Therapy, Gestalt Theory, and Person-centered approaches for my counseling practice. ... In getting to know the people seeking treatment personally, the first aspect of counseling is to look through the substance abuse itself as a symptom to the deeper causes. An important aspect of this is being able to recognize aspects of abnormal psychology which may have roots in degenerative mental illnesses from adjustment problems and substance abuse related to traumas, childhood abuse, coping problems, peer pressure, or other factors that may have led to the behavior initially. The assumption in this process is that in identifying the root cause of the mental origin of the substance abuse problems by counseling, there can also be a conscious recognition of that issue by the person, and through this understanding the problem can be healed as that person becomes aware of methods through which the problems can be positively overcome. In seeking to provide an assistance role for these people to return to normal functioning in society on their own terms, the importance of Existential Theory in counseling becomes clearly evident. One assumption this method includes is that drug addiction and particularly the self-destructive aspects of it that lead people to counseling and recovery therapy are related to â€Å"deeper† problems of self –development and not genetically conditioned or caused by physical addiction to drugs like heroin or cocaine. Where there are physical addictions, these must be eliminated before the counseling can really progress, but in addiction therapy relapses are common so that the person may be constantly moving between treatment, substance use, abuse, and counseling. Thus the â€Å"detoxification† stage should be distinguished from the â€Å"treatment† stage, and the recovery itself proceeds from the treatment as the individual returns to normal

Assessment Essay Example for Free

Assessment Essay 1:1 Functions of assessment Initial assessment- the starting part, used to decide what is known, what needs to be taught and what can be assessed. Formative assessment- this stage is where the learner is still in training and requires feedback on how they are progressing. Summative- used to judge completion. Whether you have passed or not. Holistic- clustering of assessments based on the grouping of a work role, rather than stand alone. Functions of assessment in training Identify the skill gap Design the training Deliver the training Plan the assessment Assess Feedback Either move on to the next part of training or go back and re do the previous assessment. This starts from the minute you get a new learner signed on. I do this by, setting out a training plan, giving the training, deciding with the learner when we both feel they are ready to be assessed and then do the assessment. With Sonya, she came from another salon where she had already done her level 2, she was about to be signed on to level 3. Before we got her signed on we done an assessment on a colour and a cut to make sure she was competent at level 2. 1:2 Key concepts and principles of assessment Reliability: By using the criteria and qualification and credit framework any assessor working independently should come to the same decision when assessing a learner. The learner should have been given the appropriate training and be competent to do the assessment. Validity: Is the work valid to the unit? The learner should be watched at all times to make sure the work is authentic. Assessments show us, what the learner is capable of and where further training would be required. It would also show if the learner needed any extra help. 1:3 Responsibilities of the assessor Make sure the candidates logbook is marked of when an assessment has been passed. Provide opportunities for assessment and make sure you book time out in your column. Be fair to all candidates, avoid any discrimination, comparing one against the other. Assess the learner against the national occupational standards and not your own opinion of what the standards should be. Consider the needs of the individual candidates; one might have a different learning style to the other. Learning difficulties should also be taken into account and help appropriate given where needed. Plan and assess assessments with candidates. Make sure learner and assessor think it is the right assessment to be done and that the learner is capable of doing the assessment. Place the learner under no undue pressure. If the candidate does not feel good about doing the assessment you should encourage them, if as an assessor you think they are capable of passing the assessment. But do not apply pressure as this could make the learner worry or feel stressed out by this. Check and ensure all the evidence is valid, authentic, current, sufficient and reliable. Make sure the work is valid to the unit and accurate, the learners own work, the work is consistent and of the appropriate nvq level criteria and is not a fluke. The work should also be current, i.e. if the learner has transferred salons and had some assessments already signed off you should make sure they are currently competent. Give constructive feedback. Using â€Å"complement sandwich† Positive comment Critical comment Positive comment Make sure you include the learner to give self assessment so you know how they think they have done. When giving your feedback always start with â€Å"how do you think you did?† Always give feedback promptly and record all assessment decisions and evidence clearly and fully so that everyone can always look back and see what has been said and done. Also in case there are any disagreements on the outcome you can look back at the records. Agree future action plans with the learner so that both the learner and assessor know what the next stage will be. Any discussions with the learner should be carried out in a professional manor. During meetings with the learner you should review the progress of assessment plans and determine where additional learning and training is required. I have recently had an issue with one of my trainee’s, she did not want to be taught anymore, and just wanted to be assessed on her cutting. She felt she had had enough training , although I didn’t. As she felt very strongly about this I allowed her to do a model we were going to use as training as an assessment, I did this so she would understand that she needs more training. Once she had completed the assessment I checked the cut, and explained to her where she had gone wrong, and also explained to her that with a little bit more practice she would be able to be assessed on models similar to what she had done and would be able to be marked off on them. She has agreed to have a little bit more training and agreed we will decide together in future when she will be assessed so as not to waste models. 1:4 Regulations and requirements relevant to assess hairdressing. Realistic working environment. Must develop realistic management procedures that incorporate a ‘salon image’. All assessments must be carried out under realistic commercial pressures and on paying clients. Assessments should be completed within the commercial timescale. Candidates must be able to achieve a realistic volume of work. The space per working area conforms to health and safety legislation. The range of services, professional tools, products, materials and equipment must be up to date and available for use. A reception area for clients to be greeted must be available. It must also include a payment facility. A retail facility must be provided.