Monday, September 30, 2019

Indian Societies: Gender roles in the Ramayana Essay

In the early patriarchal era of the Ramayana, men dominated over the Indian societies. All areas of social prominence were entirely run by men in the form of warriors, priests and tribal chiefs. Women had very little or no power at all in the political and public arena. They were raised to look after their families as well as being dutiful wives. Women had the task of being loyal, faithful, loving and compassionate towards their husbands. Individual families were normally set up on a â€Å"Male authority† basis, with the husband and father determining fundamental conditions and making the key decisions for their well being. Women’s main role in society was that of influencing their family by providing love and affection to their husbands and children while the man was in charge of satisfying his family’s needs. Male oriented societal values allowed little or no space for women to express their interests and be influential in their everyday lives. Women were traditionally expected to serve their husbands and to have no autonomous interests. Only men could be rulers and leaders in the patriarchal society where the story of the Ramayana developed. Rama once said on his designation as prince regent: â€Å"Mother, my father has appointed me to the task of protecting the people† (Mack 584). This passage clearly illustrates how power was transferred from father to son in order to provide for the people’s needs and for the community as a whole. Rama then as a leader of society must enforce values among others and express his desire to bring remarkable attributes to the people that surround him. â€Å"Sovereignty falls to your share, too, for you are my second self† (585). The need for a sovereign ruler is thus expressed among the community and desired for all individuals in the society. Women were projected as passive victims of the male-ruled system in which they were trapped. Females were responsible for the well being of the family as a whole. Women were raised with a limited perception of their role and placement in the community. To be a respectful and a good house wife meant for these women to shed themselves of any ambitions and desires they might dream of. They had to conform to what was expected from them, which was to â€Å"have no identity besides being a wife or a mother† (Qazi). If they did not conform that way, they were subject to indignity while treated as mere  objects whose main role was to tempt men into sin. History has proven that women were alienated if they did not conform according to what was expected of them. These kinds of women were stereotyped as villains or perceived as being tainted. Men were perceived as being in a role of power, no matter how large their families were. They were brought up with the belief that they were the sole providers for the family. Their failure to perform as it was expected from them led the family into constant perish. Males were in charge of many aspects of society including: making decisions for the community, serving as spiritual guiders, choosing leaders and maintaining an equitable place to live in. Men often made decisions and enforced those decisions upon the family. As Raghunathan noted in his work, â€Å"Men lead and women follow†. Women had no chance but to agree to the male’s decisions they imposed to women. The fact that they were born males gave them an advantage over women in the way that they could achieve anything they wanted and become anything they desired. Men were highly valued and respected if they possessed certain values and ideals within the society. They were educated and trained to be ambitious and to have idealistic values, which were admirable in this specific society. On the other hand, women were taught to shed any ambitions and ideas they may have for themselves. The characteristics valued in men were not valued in women; on the contrary, these characteristics in women were disapproved because of the male-ruled system of the time. â€Å"Patriarchy leads to gender inequality in society† (Seeger). Eventually this could lead these women to become isolated from society since they were not allowed to perform the same tasks and duties as men. Women then, had to rely on the love and devotion they would bring to the family while having other interests and aspirations. In conclusion, the male and female roles in the Ramayana were pre-established by the rigorous society in which the story developed. Males had certain expectations they had to fulfill such as being rulers and leaders in order to be good men. Females, on the other hand, were limited to being faithful  to their husbands while expressing their love for the family. Each had a role in society that they could not differ from due to extreme moral valuation. Men were to become the best warriors and to desire power through leadership; women were to become good mothers and proper wives with no intent or desire to achieve higher goals or expectations. Patriarchy led men into high power positions in the community leaving women with no chance of participation in this field. This type of society facilitated men into possessing key roles in the religious and political arena which served them as a platform to pursue and achieve higher goals. In the story of the Ramayana, men were empowered and women were often subdued due to the patriarchal era that they were living in at the time of the story, which facilitated these typical gender roles. Works cited Mack, Maynard. â€Å"The Ramayana of Valkimi†. The Norton Anthology of World Masterpieces. New York: W.W. Norton, 1997. 576-612Qazi, Uzma. â€Å"Ramayana Lecture Notes†. Grant MacEwan, Edmonton, 2008. Seeger, Elizabeth. â€Å"The Ramayana†. New York: William R. Scott, 1969. Raghunathan, N. â€Å"Srimad Valkimi Ramayana†. Madras: Vighneswara Publishing House, 1981.

Sunday, September 29, 2019

Partisan Control of Redistricting Essay

Redistricting is forming new boundaries of the state due to population change which might have increased or reduced due to certain factors such as immigration and migration. A country or state decides to modify its current districts to try and balance the population. This helps in distribution of countries resources in a fair manner thus improving the countries welfare. Though redistricting helps the country to check on the welfare of its citizen it can be disadvantageous if used in the wrong manner. It is evident that most districts of a country are formed by the legislators of the government and they may tend to use this opportunity to their advantage. A countries democracy can be affected by the Partisan redistricting process, it may be negatively or positively influenced since this process of redistricting can increase or decrease election competition. From the states where Partisan redistricting is evident most of the party members stay in power for a long period of time because they are always re-elected due to lack of competition, thus the Partisan control of redistricting is responsible for the uncompetitive nature of election. As I explain my theory I will constantly refer to the state of America to base my argument because Partisan control of redistribution is highly evident and well displayed there. Partisan control of redistricting is highly influenced politically and the majority boundaries formed are created so as to benefit the legislators during the election time. The districts created are inhabited mostly by the supporters of the legislatures . Therefore during the elections the legislators will have an advantage over any opposing force that may come up since he has the majority’s votes. For instance in America the majority of people who reside in one district is either republicans or Democrats. In such a case less opposing forces will rise thus contributing to uncompetitive elections. This is because even if more parties rise up they will all end up supporting the current incumbent therefore all campaigns will be geared into one direction and thus no competition in the elections will rise up. This can be seen in the 2004 US elections where approximately 98% of the incumbents won back their seats and only 5% lost their seats to the opposition. In California many parties had come up but all ended up supporting the incumbent . There was not enough force to oppose him thus the elections were not competitive. In Indiana between 1992 and 2002 all the incumbents won back their 32 US seats . This is opposed to Abramowitz, Alexander and Gunning’s theory that the Parisian control of redistricting in America has not contributed to the uncompetitive nature of the elections. They say that the Parisian redistricting has not affected the decreased the election competition but other factors such as geographical influences which include migration and immigration and lack of a good financial ground to carry out campaign effectively is what has caused the uncompetitive nature of the elections . Most of the district formed are inhabited by a majority of citizens who have the same preference on the party they support, thus are satisfied with their congress and legislative constitution. Therefore none of them will have the need of electing another incumbent or forming opposing powers against the incumbent. This shows that there will be no competition during the campaign and thus the nature of uncompetitive elections is depicted. This can be proved by the gerrymandering theory, of legislatures using the redistricting process in their own favour to win elections . McDonald also supports my theory that redistricting has greatly contributed to uncompetitive nature of the elections. He says that redistricting has born many people who support the incumbent and thus decrease the number of votes of the others who oppose the incumbent . Lack of competition at the lower levels of elections like the local election for councils is another factor that supports my argument that the Partisan control of redistricting has contributed to uncompetitive elections. There are limited electoral seats to be campaigned for and those present support the incumbent. Thus no competition will be forthcoming and that is why most of the councils are re-elected back into their positions. In America the election of the councils is in fact the least competitive and no considerable attention is given to them since their outcome is always known to the extent that some of the council elections are not carried out. The Partisan control of redistricting influenced the inhabitants in a district to either be supporters of the Republican or Democrats. This has drawn a sharp line between districts. Citizens in a certain district prefer to vote for the current incumbent because he is their preference rather than compete with to run him down and take his seat. They do this so as to maintain their reputation of being either Republican or Democrat supporters and do not vote according to their preference. In the long run there is minimal campaign competition in the district thus the overall reduction in the election competition . Schleicher wrote an article giving the dangers brought about by lack of competitive elections caused by the Parisian redistricting system. I also tend to support him because the system harmed the democracy of the America state by ignoring the rights and wants of the minority voters such as creation of more job opportunities in the district are not recognized, this is because majority of the inhibitors of the districts have the same party preference and will not vote to get their wants fulfilled but will vote to retain the incumbent whom they support. Also reforming the district is a real nuisance since this initiative will not be supported by the voters as by reforming one will be changing the districts mechanism to retain the incumbent they want . In Ohio many reform actions have come up but all have been shut down because it is either the republican or democrat leader who has the minority voter turnout who comes with the effort but is shun down by the other counterpart who has the most votes. For example in the year 2005 many organization came together and formed the Reform Ohio Now (RON) movement to reform Ohio. This movement constituted mainly Democrats and very few Republicans. The move was not welcomed by the voters since the present incumbent was a Republican and therefore the majority votes came from the Republican supporters . To be able to increase election competition redistricting should be done putting into account the population of the district and the citizens needs so as to distribute the wealth of the country evenly and in a fair manner that considers everyone without considering which party or who they support. Also a new organization that will form the new districts should be elected and they should not be politically influenced or should not be linked with politics at all. This will enable fair districts which will exhibit high competition during the election to be formed, thus enabling democracy of a country or state to prevail. The period in which redistricting is done should be extended to be a long period probably after ten years to prevent the boundaries of the districts being changed to suit the desires or preference of the person forming them. This will also in the long run create competition during elections as the inhibitors of the district will have known their preference and when voting will vote wisely to be represented by an incumbent who will listen to their woes and carry out his activities in a way that he will enable him to full fill his voter’s needs. Word Count: 1272 Bibliography Abramowitz, Alan, Brad Alexander and Matthew Gunning. 2006. Don’t Blame Redistricting for Uncompetitive Elections. PS: Political Science and Politics 39 (January): 87-90 Butler, David, and Bruce . E. Cain. 1992. Congressional Redistricting: Comparative and Theoretical Perspectives. Macmillan: New York. Jacobson, Gary . C. 2001. The Politics of Congressional Elections. Longman: New York. McDonald, Michael . P. 2004. A Comparative Analysis of U. S. State Redistricting Institutions. State Politics and Policy Quarterly. Monmonier, Mark. 2001. Bushmanders and Bullwinkles: How Politicians Manupilate Electronic Maps and Census Data to Win Elections. University of Chicago Press: Chicago. New York Times. 2004. Elections With no Meaning. February 14, A-14. Owen, Guillermo, and Bernard N. Grofman, 1998. optimal partisan Gerrymandering. Political Geography Quarterly 7 (1): 5-22. Stonecash, Jeffrey . M. , Mark . D. Brewer and Mack . D. Mariani. 2003. Diverging Parties: Social Change, Realignment and Party Polarization. Westview Press: Boulder, CO.

Saturday, September 28, 2019

Managing Multiple Generations During Times of Change Research Paper

Managing Multiple Generations During Times of Change - Research Paper Example eration Y which represents the group of people currently joining the workforce is characterized with diverse and unique qualities that need to be carefully taken into consideration by firms and organizations at the onset of their employment (Asch, 2004). According to the Society of Human Resource Management in the United States, the future employees bear attributes which include being very techno-savvy, highly flexible as well as being able to do less monotonous jobs. This is contrary to the pre-boomers who are less flexible and enjoy doing the same work over and over again. They enjoy working smooth and well established systems which do not under go frequent changes. Recruitment and staffing agencies therefore require an understanding of the group of people who are presently seeking employment or are already employed. They need to understand what their needs and demands are and thus efficiently integrate them into the current workforce so as to ensure smooth transition between the generations. These processes pose great challenges to the recruiting agencies since they need to equip and familiarize themselves with the changing trends (Cowen, 2008). A lot of caution has to be undertaken since the emergence of an increasingly techno-savvy generation is characterized with a lot of bureaucracy as well as fraud. It is easy for job seekers to use fake certificates which may easily be mistaken as being the original documents. Leadership and talent has been greatly affected since organizations find it hard to maintain talents given that generation Y is characterized by movement from one firm to another in the aim of seeking a more fulfilling and dynamic fields. This has greatly affected the leadership structure of organizations given that the rate of employee turnover is very high. Some firms have been forced to retain those who should have gone on retirement in order to avoid leadership vacuum and to have people who are well versed with the operations of the

Friday, September 27, 2019

TECHNOLOGY ACCEPTANCE ISSUES FOR A MOBILE APPLICATION TO SUPPORT Literature review

TECHNOLOGY ACCEPTANCE ISSUES FOR A MOBILE APPLICATION TO SUPPORT CHRONIC DISEASE PATIENTS IN SAUDI ARABIA - Literature review Example However, the report indicated that in the next two decades non-communicable diseases in Africa would be the leading cause of deaths based on current projections. Apart from deaths, chronic diseases are also the major cause of disabilities among the population. Chronic diseases have further resulted to economic burden on the state government. In addition to non-communicable diseases, developing countries struggle with management of infectious diseases such as HIV/AIDS and malaria epidemics. Jeffreys (2011) argued that the prevalence of chronic diseases in these states does not displace the effects of the infectious diseases but enhances further the deteriorative effects of both diseases. This has led to overburdening of the medical budget, which directly affects medical healthcare services. Increased cases of chronic diseases have been closely linked with poorer healthcare services due to inadequacy of funds and strained medical staff that are often overworked and underpaid. In the end, continual prevalence of non-communicable diseases is likely to deter economic growth of developing countries. This is due to diversion of funds to health care systems as opposed to allocation of the funds to income generating projects. There also exits the burden of managing risk factors associated with chronic diseases. According to Defronzo (2004), chronic diseases can be easily controlled by minimization of associated risk factors. The main risk factors associated with non-communicable diseases include the following: tobacco use in any form, intake of high cholesterol, low fruit and vegetable diet, overweight and obesity, alcohol consumption and sedentary lifestyle. Studies by Centre for Disease Control (2014) indicated that 80% of heart diseases, stroke and Type 2 diabetes could be prevented and controlled by avoiding chronic risk factors.

Thursday, September 26, 2019

Summaries Term Paper Example | Topics and Well Written Essays - 750 words

Summaries - Term Paper Example Owing to crisis and fall in the real estate market Robert Verrone resigned from Wachovia, leaving the organization in dire strait. Robert Verrone’s methods were a key architect in inflating the real estate to a never seen height. He also participated in lending to hedge funds in real estate transactions. His risk taking activities helped Wachovia to reduce their debt amount. He also lent a large sum of money to a few developers under the interest-only deals. His dealings made him to be recognized as â€Å"Large Loan† Verrone and also a starry figure in the ‘New York real estate world’. He had been a hard working banker like any other over the years providing valued service to his clients. The limelight and the glitz of the circumstances made individual’s like Robert Verrone to undertake such business deals which otherwise they might not have. The present scenario which has seen a rebirth of ‘commercial real estate bond business’ after th e boom and the downfall of the recent years has seen Robert Verrone get revitalized and think of getting his lost ground back in the real estate market with his innovative and at times pragmatic deals. The article â€Å"Google vs. the Little Guy† was authored by Peter Burrows was published on Bloomberg Businessweek, on September 22, 2010. The article deals with a lawsuit related to a scenario in which Skyhook Wireless asks for tens of millions of dollars from the globally renowned company Google. This lawsuit was filed with an â€Å"intentional interference† claim that frightened Motorola away from undertaking a huge contract with Skyhook. The claim from the side of the Chief Executive officer of Skyhook Wireless stated that they settled a contract along with Motorola. Motorola’s upcoming mobile phones would make use of the software prepared by Skyhook Wireless. This deal was prepared exclusively for the Motorola’s smartphones. Google in this scenario was a competitor of Skyhook as the deal of Motorola can be

Wednesday, September 25, 2019

Human Sexuality-Response Post to Classmates Essay

Human Sexuality-Response Post to Classmates - Essay Example However, with the passage of time, they learn the importance of these attributes. The writer has changed his stance in the next paragraph saying that individuals seek honesty, loyalty, confidence, and sense of humor in the opposite gender. This is totally different from what the writer said in the first paragraph. May be the writer is talking about the middle adulthood when the value of loyalty, sincerity, and other such attributes overshadow the importance of physical attraction. The writer has also talked about the assumed roles of men and women. About the question of same-sex relationships, the writer has said that same sex partners usually look for love because for such people the value of love is more than any other thing even if that love is with some person of the same sex. Moreover, the writer has given examples of a movie and of is own parents revealing the importance of love in relationships. Summing it up, I would say that the overall approach to the discussion questions was good and the discussion was based on facts. This post has been written in a succinct and simple way. For example, the author has briefly answered the question about characteristics that men and women look for in each other. He has written that desires for the other partner change with the passage of time. I think it is absolutely true because at a young age, preferences for both men and women for the partner form the opposite gender are different than what they are as a person ages. The author has mentioned that men do not seek for looks in the partner. I do not agree with this because young men mostly look for physical beauty. However, the author has correctly mentioned that women look for love when they are young and look for a supportive and fatherly figure when they start getting older and mature. About same sex relationships, the author has said

Tuesday, September 24, 2019

Problems with Sentimental Art Research Paper Example | Topics and Well Written Essays - 1000 words

Problems with Sentimental Art - Research Paper Example Same way this world is also filled with beautiful things and ugly things. Artists often portray the beautiful side of this world. However, there are instances in which artists create various art forms which may provoke sentiments knowingly or unknowingly, rather than pleasant feelings. These sentiments may cause immense damages in the remaining life of the art viewer. In other words sentimental arts cause more damages to the art viewer than goods. This paper analyses the problems with sentimental arts. (Gatalo, p.21) â€Å"Sentimentality is an ambiguous concept and it is defined as an emotional disposition that idealizes its object for the sake of emotional gratification and that is inherently corrupt because it is grounded in epistemic and moral error† (Gatalo, p.22). The above picture, Roses for Stalin, portrayed by Boris Vladimirsky extracts so many sentiments in the minds of the viewer. The above art is not generating any sense of beauty in the minds of the viewer whereas it generates lot of sentiments. In other words, this art failed to fulfil its basic and moral responsibility of satisfying the viewer through its beauty. In other words, it gave more importance to sentiments rather than beauty. A person who watches this art may develop the unpleasant memories of Stalin era and subsequently his mental agony could be intensified. Roses for Stalin is anomalous, even among sentimental artworks, because the judgments it urges us to accept are so outrageous. Stalin’s identity as a historical figure so sharply contradicts how he is represented in the painting that it renders this depiction preposterous, if not offensive. This is such an obtrusive and distracting feature of the work that it cancels out the possibility of any serious aesthetic engagement with it. Most significantly this undermines the painting’s affective power—a savvy viewer cannot partake of the warm feelings it is meant to inspire. Insofar as this feeling is central t o the design and meaning of the work, this falsity amounts to its aesthetic failure. (Gatalo, p.26). Sentimental emotions are entirely different from standard emotions. While standard emotions always generate pleasant and unpleasant feelings, sentimental emotions always generate corrupted feelings. Sentimental emotions are corrupted because of its inability in judging things with the help of sound reasoning. In other words, sentiments are always motivated emotionally rather than factually. The picture, Roses for Stalin, forces the viewer to think about the positive sides of Stalin era and it completely avoids the memories about the negative sides of Stalin era. In other words, the above picture is a deliberate attempt to portray Stalin as a saint. In short, sentimental arts often glorify a person or scene. It may keep a blind eye towards the negative aspects of the person or the scene. It is an accepted fact that during Stalin era, Soviet Union faced severe problems. However, the ab ove picture may not remind the viewer about such things. Anxious Mother: A piece of sentimental art about a young girl putting her dolls to bed (Antique Photos - Sentimental and Fine Art) In the above sentimental picture, a young girl is portrayed as putting her dolls in bed. The above painting will definitely reminds us about our childhood. The emotion in the face of the girl portrayed in this picture is very sad. It reminds us the feeling of a lonely girl who tries to keep company with dolls. In other words, feeling of loneliness is the major

Monday, September 23, 2019

Medical Experimentations Essay Example | Topics and Well Written Essays - 1000 words

Medical Experimentations - Essay Example In looking first at genetic engineering, the very basis for such research is human DNA. Obviously this alludes to the absolute necessity of human testing on at least some level. Similarly, testing the altered genetic material which has been modified in the interest of treating diseases and illnesses, subjects possessing homologous DNA is a necessity. This results in a bit of a slippery slope which creates a demand for rigid regulations governing clinical trials involving genetically based procedures pending FDA and medical review board approval. In other words, altered DNA in a cell which possesses 23 pairs of chromosomes can only be implanted into an organism possessing the same number of homologous chromosomes in order to be viable. Science differentiates species in part by their number of chromosomes as well as the number of chromosomes each posses within homologous sets. Research ethics continues to be extremely controversial surrounding stem cell research. Stem cell research however, strives to result in the implantation of stem cells into diseased or severely injured individuals. The reason stem cells are so important scientifically and medically is that they are capable of becoming any type of cell. Stem cells of course originate from fetuses who are still undergoing the processes of cell differentiation. When stem cells are exposed to different chemicals in the body, they essentially are â€Å"assigned† to become a specific type of cell depending on the chemical they are exposed to, â€Å" Some of the most serious medical conditions, such as cancer and birth defects, are caused by problems that occur somewhere in this process. A better understanding of normal cell development will allow us to understand and perhaps correct the errors that cause these medical conditions†(Department of Health and Human Services, 2007). The ethical is sue comes in to play when the question of where the stem cells originated from surfaces. Stem

Sunday, September 22, 2019

What contribution can 'Lean Thinking' make to the contemporary Essay

What contribution can 'Lean Thinking' make to the contemporary challenges of public service delivery - Essay Example However, sometimes you find that once businesses hits the quality mark at the onset stages of production, they tend to relax and things slow down, making the delivery slip back into the low quality conditions. This is an undesirable phenomenon especially in the competitive business world of the century we live in. As a result of businesses losing their clients because of slackness in the quality level of their products and services, most have resorted to affecting the total quality management concept. The concept presents a number of underlying advantages to the businesses and organizations that run it. The concept of total quality management (TQM) an al the underlying sub-concepts of this process will be analyzed in full in the next discourse. Here, the definition of TQM and the philosophy underling the TQM will be carried out. Also, the elements of TQM, benefits, effectiveness as well as the TQM frame work will be looked into. Lastly, the paper will close by discussing the quality standards and offering the universally acceptable quality of standards. Definition and philosophy of TQM Hawkes and Adams define the TQM as the practice of integrating the various components of the various inputs that are used in the production of high quality products or services that are designed to meet or even surpass the expectations of the clients (32). According to Tari, being in agreement of this definition, TQM also encompasses the issue of involvement of all the various components that make this delivery of quality products or services to be enabled (182). For the delivery of quality products, the management team of the company, the employees, the different levels of contact between the management and the employees such as the suppliers as well as the customer are all involved. Each person or level of involvement plays a very keen role in ensuring that the quality of the product or services, measured using certain pre-ordained measurements is not compromised. To keep the n otation of TQM constant, the concept operates under a certain philosophy. This is the philosophy that guides the level of involvement of the various components that translates to the delivery of quality products and services. The philosophy of TQM states that if quality is maintained and upheld in all areas of the production process at all times, there is no doubt that this builds up an organizational culture that is largely responsible for meeting the various needs of the customer. In other words, the philosophy of TQM employs the use of effective management to develop a constant habit that allows for constant and consistent production of various products and services of a company (Petersen, 468). Elements of a quality management system For the TQM process to be successful, a number of elements have to be employed in such a combination that allows for easy and effective application. These processes offer a guideline onto how the TQM will be appraised once a certain organization dec ides to operate under this concept. The recognized elements under TQM will be analysed in the following discussion. There are eight elements of TQM as shall be noted herein. The first element of TQM is the element of ethics. Ethics, by definition, is the a code of ethics prescribed in an organization that largely governs the way employees in a certain organization behave or relate with each other inside their organization as well as with other people outside the organization (Zink, 394). Different organizations have different rules and regulations that govern their employees. As a result, the behavior of employees in one organization could be quite

Saturday, September 21, 2019

Absolute Time Essay Example for Free

Absolute Time Essay Instructions (Q 7-Q 16): Read the following passage carefully and answer the questions given below it. â€Å"Life is not just party and pleasure; it is also pain and despair. Unthinkable things happen. Sometimes everything turns upside down. Bad things happen to good people. Some things are beyond control, such as physical disability and birth defects. We cannot choose our parents or the circumstances of our birth. So if the ball bounced that way, sorry. But what do we do from here; cry or take the ball and run? That is a choice we have to make. On a clear day, there are hundreds of boats sailing in all different directions in a lake. How come? Even though the wind is blowing in one direction, the sailboats are going in different directions. What is the difference? It depends on the way the sail is set, and that is determined by the sailor. The same is true of our lives. We cant choose the direction of the wind, but we can choose how we set the sail. We can choose our attitude even though we cannot always choose our circumstances. The choice is either to act like a victor or a victim. It is not our position but our disposition that determines our destiny. It takes both rain and sunshine to create a rainbow. Our lives are no different. There is happiness and sorrow. There is the good and the bad; dark and bright spots. If we can handle adversity, it only strengthens us. We cannot control all the events that happen in our lives, but we can control how we deal with them. Richard Blechnyden wanted to promote Indian tea at the St. Louis World fair in 1904. It was very hot and no one wanted to sample his tea. Blechnyden saw that all the other iced drinks were doing flourishing business. It dawned on him to make his tea into an iced drink, mix in sugar and sell it. He did and people loved it. That was the introduction of iced tea to the world. When things go wrong, as they sometimes will, we can react responsibly or resentfully. Human beings are not like an action which has no choice. An action cannot decide whether to become a giant tree or to become food for the squirrels. Human beings have choices. If nature gives us a lemon, we have a choice: either cry or make lemonade. † 7. â€Å"We cannot choose our parents or the circumstances of our birth† – by this statement what does the author mean? (a) Some things do not take place according to our choice (b) There are certain things in which we do not have any reach (c) Some things in this world are pre-determined. (d) All of the above Ans. (d) 8. By what the author tells us that choice is ours? (a) We can cry (b) We can take the ball and run away (c) We can either cry or can take the ball and run away (d) None of the above Ans. (c) 9. The opposite of the word ‘victor’? (a) Loser (b) Winner (c) Victim (d) Warrior Ans. (a) 10. What determines our destiny? (a) The way that we normally think and behave, that shows what type of person we are (d) The position we hold (c) Our being a winner (d) All of the above Ans. (a) 11. The best title for the above passage could be – (a) Right Choice (b) Pre-determination. (c) Choices defines our lives (d) Life is all about making the right choices Ans. (d) 12. According to the author, what still can be chosen if not everything in life? (a) Circumstances (b) Attitude (c) direction of life (d) None of these Ans. (b) 13. On what has the author emphasized? (a) Destiny (b) Choice (c) Action (d) All of these Ans. (b) 14. By the example of Blechnyden’s Iced Tea which message does the author give? (a) Choice is ours (b) Destiny is pre-determined (c) We have fix actions; we can not do beyond that (d) None of the above Ans. (a) 15. What does actually strengthen us? (a) Making choices (b) Handling adversity (c) Determining destiny (d) Working beyond capacity Ans. (b) 16. The synonym of ‘flourishing’ is – (a) Spoiling (b) Drowning (c) Booming (d) Hiding Ans. (c) 17. During a 5-day festival, the number of visitors tripled each day. If the festival opened on a Thursday with 345 visitors, what was the attendance on that Sunday? (a) 345 (b)1,035 (c)1,725 (d) 9,315 Ans. (d) 18. Which of the following has the least value? (a) 0. 27 (b) 1/4 (c) 3/8 (d) 11% Ans. (d) 19. Which year did the same number of boys and girls attend the conference? (a) 1995 (b) 1996 (c) 1997. (d) 1998 Ans. (a) 20. Which two years did the least number of boys attend the convention? (a) 1995 and 1996 (b) 1995 and 1998 (c) 1996 and 1997 (d) 1997 and 1994 Ans. (a) 21. Examine the following three statements : 1. Proceesed meat is a perishable food 2. All perishable foods are packed in sealed tins 3. Sealed tins sometimes to do not contains processed meat Which one of the following inferences can be drawn from the above statements? (a) Sealed tins always contain perishable food (b) Processed meat is sometimes not packed in sealed tins (c) Proceessed meat is always packed in seald tins. (d) Non-Perishable foods are never packed in seald tins Ans. (c) 22. Production of Rice and Wheat (In millions of Tonnes)| | Year| Rice| Wheat| Percentage of Wheat to Rice| 1950-51| 20. 58| 6. 46| 31. 4| 1960-61| 34. 58| 11. 00| 31. 8| 1970-71| 42. 22| 23. 83| 56. 4| 1980-81| 53. 63| 36. 31| 67. 7| 1990-91| 74. 29| 55. 14| 74. 2| 1994-95| 81. 81| 65. 77| 80. 4| 1995-96| 79. 62| 62. 62| 78. 6| The above table indicates the performance in India in rice and wheat production from 1950-51 to 1995-96. Which of the following conclusions arrived at from the above table would be valid? 1. Record production of rice as well as wheat has been in 1994-95 2. The ratio of wheat to rice production seems to have steadily increased over 16 years 3. Wheat has not been popular among the Indian population before 1980. 4. India became self-sufficient in rice and wheat only after 1990. Select the correct answer using the codes given below Codes: (a) 1 and 2 (b) 1, 2, 3 and 4 (c) 3 and 4 (d) None Ans. (a) 23. A father left a will of Rs. 35 lakhs between his two daughters aged 8. 5 and 16 such that they may get equal amounts when each of them reach the age of 21 years. The original amount of Rs. 35 lakhs has been instructed to be invested at 10% p. a. simple interest. How much did the elder daughter get at the time of the will? (a) Rs. 17. 5 lakhs (b) Rs. 21 lakhs (c) Rs. 15 lakhs (d) Rs. 20 lakhs Ans. (b) 24. What will Rs. 1500 amount to in three years if it is invested in 20% p. a. compound interest, interest being compounded annually? (a) 2400 (b) 2592 (c) 2678 (d) 2540 Ans. (b) 25. What is the area of the largest triangle that can be fitted into a rectangle of length aâ‚ ¬? laâ‚ ¬Ã¢â€ž ¢ units and width aâ‚ ¬? waâ‚ ¬Ã¢â€ž ¢ units? (a) lw/3 (b) (2lw)/3 (c) (3lw)/4. (d) (lw)/2 Ans. (d) 26. Which of the following is inCorrect? (a) An incentre is a point where the angle bisectors meet. (b) The median of any side of a triangle bisects the side at right angle. (c) The point at which the three altitudes of a triangle meet is the orthocentre (d) The point at which the three perpendicular bisectors meet is the centre of the circumcircle. Ans. (b) 27. How long will it take for a sum of money to grow from Rs. 1250 to Rs. 10,000, if it is invested at 12. 5% p. a simple interest? (a) 8 years (b) 64 years (c) 72 years (d) 56 years Ans. (d) 28. Rs. 5887 is divided between Shyam and Ram, such that Shyamaâ‚ ¬Ã¢â€ž ¢s share at the end of 9 years is equal to Ramaâ‚ ¬Ã¢â€ž ¢s share at the end of 11 years, compounded annually at the rate of 5%. Find the share of Shyam. (a) 2088 (b) 2000 (c) 3087 (d) None of these Ans. (c) Directions (Q 28-Q 32): Study the following information carefully to answer these questions. Eight members A, B, C, 0, E, F, G and H belonging to three families X, Y, Z go for weekend outing in three different cars I, II, III. Four out of the eight members are females. Members of any one family travel in different cars. Each car has at least one male and one female member. Each family has at least two members. A belongs to family Y and he travels in car III. D is wife of E and they travel in cars I and II respectively. H is son of B, who is wife ofG, and they belong to family Z. C is daughter of F, who is wife of A. C travels in car II. G does not travel with F. 29. Which of the following groups of persons travels in car I? (a) 0, F,G (b) D,E,G (c) D,G, H (d) D, F, H Ans. (d) 30. Which of the following members of families Y and Z travel in different cars? (a) F,G (b) C,G (c) F,H (d) None of these. Ans. (a) 31. Which of the following groups of persons is a group of all females? (a) B,D,G (b) A,B,C (c) B,E,F (d) None of these Ans. (d) 32. Which of the following members of families X and Y travel in the same car? (a) C,F (b) D,F (c) C,0 (d) F, E Ans. (b) 33. When a student weighing 45 kgs left a class, the average weight of the remaining 59 students increased by 200g. What is the average weight of the remaining 59 students? (a) 57 kgs (b) 56. 8 kgs (c) 58. 2 kgs (d) 52. 2 kgs Ans. (a) 34. Three math classes: X, Y, and Z, take an algebra test. The average score in class X is 83. The average score in class Y is 76. The average score in class Z is 85. The average score of all students in classes X and Y together is 79. The average score of all students in classes Y and Z together is 81. What is the average for all the three classes? (a) 81 (b) 81. 5 (c) 82 (d) 84. 5 Ans. (b) 35. The average of 5 quantities is 10 and the average of 3 of them is 9. What is the average of the remaining 2? (a) 11 (b) 12 (c) 11. 5 (d) 12. 5 Ans. (c) 36. A stairway 10ft high is such that each step accounts for half a foot upward and one-foot forward. What distance will an ant travel if it starts from ground level to reach the top of the stairway? (a) 30 ft (b) 33 ft (c) 10 ft (d) 29 ft Ans. (d) 37. Each interior angle of a regular polygon is 120 degrees greater than each exterior angle. How many sides are there in the polygon? (a) 6 (b) 8 (c)12 (d) 3 Ans. (c) 38. A and B are two points with the co-ordinates (-2, 0) and (0, 5). What is the length of the diagonal AC if AB form one of the sides of the square ABCD? (a) units (b) units (c) units (d) units Ans. (b) 39. The average weight of a class of 24 students is 36 years. When the weight of the teacher is also included, the average weight increases by 1kg. What is the weight of the teacher? (a) 60 kgs (b) 61 kgs (c) 37 kgs (d) None of these Ans. (b) 40. The average of 5 quantities is 10 and the average of 3 of them is 9. What is the average of the remaining 2? (a) 11 (b) 12 (c) 11. 5 (d) 12. 5 Ans. (c) Instruction (Q. 40-Q 43): Four question given below are based on the following information. Answer the questions after reading the information carefully. (i) Nine friends A, B,C, D, E, F, G, H, and I are sitting on a bench in the classroom. (ii) ‘C’ who is at immediate right of ‘D’ is third to the right of ‘E’. (iii) ‘B’ is at one end. (iv) ‘H’ is nearest neighbour of ‘F’ and ‘G’ (v) ‘F’ is third to the left of ‘B’ (vi) ‘A’ is at immediate left of ‘F’ 41. Which of the following statement is correct on the basis of above order of sitting? (a) D and H Have three people sitting between them. (b) ‘B’ is fourth to the right of F. (c) ‘I’ is at immediate left of A. (d) E and C are Neighbours. Ans. (a) 42. Which of the following groups of friends is sitting at the left of ‘C’? (a) BIG (b) AFH (c) EID (d) BAG Ans. (c) 43. Which of the following is at the other end i. e. other that that end on which ‘B’ is sitting? (a) G (b) H (c) I (d) E Ans. (d) 44. Who is sitting exactly in the middle of the bench? (a) H (b) C (c) A (d) G Ans. (c) 45. A 400 meter long train crosses and 800 meter long platform in 1 min 20 sec. What is the speed of the train? (a) 48 km/hr (b) 60 km/hr (c) 72 km/hr (d) 54 km/hr Ans. (d) 46. If the root of equation px2 + qx +r = 0 is double of the other root, which one the following is correct? (a) 2 q2 = 9 pr (b) 2 q2 = 9 (c) 4 q2 = 9 r (d) 9 q2 = 2 pr Ans. (a) 47. A takes 4 days and B takes 5 days to finish a job. If both of them work together on the same job, what proportion of the work is done by A? (a) 4/9 (b) 5/9 (c) 6/9. (d) 7/9 Ans. (b) 48. The 3rd term of a Geometric progression is 36 and its 6th term is 288. Its 8th term will be: (a) 784 (b) 576 (c) 1152 (d) 2302 Ans. (c) 49. In a two digit number, the sum of the digits is 8. If 54 is subtracted from this number, its digits interchange themselves. What is the product of the digits of the number? (a) 7 (b) 12 (c) 16 (d) 0 Ans. (a) 50. The difference between simple interest and compound interest on certain amount for 2 years at the same rate of interest is Rs. 18. If the rate doubled, what will be the difference? (a) Rs. 9 (b) Rs. 36 (c) Rs. 72 (d) Rs. 27 Ans. (c) 51. A dog is tied to a pole by a long chain. Keeping the chain fully stretched, the dog moves along a circular path covering 132 m, subtends an angle of 90 degree at the centre, Neglecting the portion of the chain used in typing, find the length of the chain. (a) 70 m (b) 78 m (c) 84 m (d) 88 m Ans. (c) 52. A merchant buys same quantities of two types of toys – one at the rate of 3 toys for Rs. 10 and the other, at the rate of 5 toys for Rs. 20. At what price he must sell all the toys so that he has no profit and no loss in the transaction? (a) 8 toys for Rs. 30 (b) 3 toys for Rs. 11 (c) 5 toys for Rs. 18. (d) 8 toys for Rs. 22 Ans. (b) 53. Find the equation of a line whose intercepts are twice of the line 3x – 2y – 12 = 0 (a) 3x – 2y = 24 (b) 2x – 3y = 12 (c) 2x – 3y = 24 (d) None of these Ans. (a) 54. The difference between the compound interest and the simple interest on a certain sum at 12% p. a. for two years is Rs. 90. What will be the value of the amount at the end of 3 years? (a) 9000 (b) 6250 (c) 8530. 80 (d) 8780. 80 Ans. (d) 55. Vijay invested Rs. 50,000 partly at 10% and partly at 15%. His total income after a year was Rs. 7000. How much did heinvest at the rate of 10%? (a) Rs. 40,000 (b) Rs. 40,000. (c) Rs. 12,000 (d) Rs. 20,000 Ans. (b) 56. The average weight of a class of 24 students is 36 years. When the weight of the teacher is also included, the average weight increases by 1kg. What is the weight of the teacher? (a) 60 kgs (b) 61 kgs (c) 37 kgs (d) None of these Ans. (b) Instructions for the following Question: Read the following information to answer the question given below. The following conditions have been decided for the selection of Research Assistants. The candidate must: (i) Be less than 35 years of age. (ii) Be graduate in Psychology, Education or Commerce or Postgraduate in any other subject. (iii) Secure 50% marks in entrance examination. (iv) Secure A or O grade in Interview. (v) Have passed a certificate course in Methodology Research. (vi) Have recommendation of any one lecturer. If a candidate fulfills all the conditions, except (a) (i), but if he is registered for Ph. D. , his case is to be kept in waiting list. (b) (iii), but if he has secured 45% marks in entrance examination and O grade in interview, his case is to be referred to the Dean. (c) (v), but if he has qualified certificate course in Statistics, his case is to be referred to the Head Of Department. You have to decide in each of the following cases that what is the possibility of selection of the candidate? If the information is not sufficient to take any decision then your answer will be ‘data inadequate’. This information has been given to you as on 15. 12. 1996. 57. Raman has secured 60% marks in graduation with commerce subject. He has got specialization in certificate course in Methodology Research and he also has the recommendation from the lecturer under whom he is registered for Ph. D. His date of birth is 9. 12. 61. He has secured 68% marks in entrance examination and got A grade in interview. (a) Will not be selected. (b) Data inadequate (c) Will be selected. (d) Will be kept in waiting List. Ans. (d) 58. ’ means ‘–’; ‘–’ means ‘x’; ‘x’ means ‘+’ and ‘+’If ‘ 80 – 40 + 20 = ? ’, then 40 ? 120 means ‘ (a) 80 (b) 120 (c) 60 (d) 0 Ans: (d) 59. A businessman makes a profit of 20% on the sale of leather. If he were to add 10% artificial matter to the leather, by what percent would his profit increase? (a) 25% (b) 60% (c) 40% (d) 45% Ans. (b) 60. In a team, eight boys play Chess. The remaining boys, who represent 7 times the square root of the strength of the tem, play Mouth organ. What is the strength of the team? (a) 36 (b) 16 (c) 64 (d) 100 Ans. (c) 61. Cost price of 15 Computers is equal to the selling price of 20 Computers, then the loss percent would be (a) 25% (b) 20% (c) 30% (d) 45% Ans. (a) 62. How many natural numbers between 1 and 900 are not multiples of any of the numbers 2, 3, or 5? (a) 240 (b) 250 (c) 270 (d) 300 Ans. (a) 63. The age of a man is three times the sum of the ages of his two sons. Five years hence, his age will be double of the sum of the ages of his sons. The father’s present age is (a) 40 years (b) 45 years (c) 50 years (d) 55 years. Ans. (b) Instruction (Q 62-Q 63): In the two questions given below, a statement followed by two arguments I and II has been given. You have to decide which argument is strong and which one is weak? Give your answer as: (a) If only argument I is strong; (b) If only agreement II is strong; (c) If neither argument I nor argument II is strong; (d) If both argument I and argument II are strong. 64. Statement: Should freelance work programme be stopped at private companies? Argument: I. Yes, the mutual interaction of the employee and office environment helps in overall quality of work. II. No, such demand comes from that group only who don’t have any idea of work loads and pressure. Ans. (d) 65. Statement: Should usage of pesticides in agriculture be banned in India? Agriculture be banned in India? Arguments: I. Yes, because pesticides pollute the environment and are also harmful for the ecology. II. No, the safety of crops is not possible without these and food products will become very expensive due to lack of food production. Ans. (d) 66. If the numbers representing volume and surface area of a cube are equal, then the length of the edge of the cube in terms of the unit of measurement will be (a) 3. (b) 4 (c) 5 (d) 6 Ans. (d) 67. In a group of travelling in a bus, 6 persons can speak Tamil, 15 can speak Hindi and 6 can speak Gujrati. In that group none can speak any other language. If 2 persons in the group can speak two languages and one person can speak all the three languages, then how many persons are there in the group? (a) 21 (b) 22 (c) 23 (d) 24 Ans. (d) 68. A boat which has a speed of 5 km/hr in still water crosses a river of width 1 km along the shortest possible path in 15 minutes. The velocity of the river water in km/hr is (a) 1 (b) 3 (c) 4 (d) v41 Ans. (a) 69. When three coins are tossed together the probability that all coins have the same face up, is (a) 1/3 (b) 1/6 (c) 1/8 (d) 1/12 Ans. (c) Directions (Q 68-Q 72):,Study the following arrangement carefully and answer the questions given below: H93P$KE%4FR I [emailprotected] ©*N8VJ 70. If all the symbols and numbers are dropped from the above arrangement, which of the following will be the fourteenth from the right end? (a) M (b) K (c) W (d) E Ans. (d) 71. What should come in place of the question mark (? ) in the following series based on the above arrangement? _PK% RUW M5Q ? (a)  ©N8. (b)  ©N15 (c) 15*15 (d) 6*8 Ans. (a) 72. How many such numbers are there in the above arrangement each of which is immediately preceded by a letter and immediately followed by a symbol? (a) None (b) One (c) Two (d) Three Ans. (b) 73. Which of the following is the seventh-to the left of the twentieth from the left end of the above arrangement? (a) U (b)S (c)M (d)N Ans. (a) 74. How many such consonants are there in the above arrangement each of which is immediately followed by a number but not immediately preceded by a number? (a) None (b) One (c) Two (d) More than three Ans. (d) 75. Left pan of faulty weighs 100gram more than is right pan. A shopkeeper keeps the weight measure in the left pan while buying goods but keeps it in the right pan while selling his goods. He uses only 1kg weight measure. If he sells his goods at the listed cost price, What is his gain? (a) 200/11% (b) 100/11% (c) 1000/9% (d) 200/9% Ans. (a) 76. Societies have been increasing in complexity from folk to industrial. Under this circumstances, according to you social control is more likely to be invested in (a) family (b) school (c) state (d) religious structures Ans. (c). Instructions (Q 77-Q 86): Read the following passage carefully and answer the questions given below it. â€Å"The big difference between the ideas of Aristotle and those of Galileo and Newton is that Aristotle believed in a preferred state of rest, which any body would take up if it were not driven by some force or impulse. In particular, he thought that the earth was at rest. But it follows from Newton’s laws that there is no unique standard of rest. One could equally well say that body A was at rest and body B was moving at constant speed with respect to body A, or that body B was at rest and body A was moving. For example, if one sets aside for a moment the rotation of the earth and its orbit round the sun, one could say that the earth was at rest and that a train on it was travelling north at ninety miles per hour or that the train was at rest and the earth was moving south at ninety miles per hour. If one carried out experiments with moving bodies on the train, all Newton’s laws would still hold. For instance, playing Ping-pong on the train, one would find that the ball obeyed Newton’s laws just like a ball on a table by the track. So there is no way to tell whether it is the train or the earth that is moving. The lack of an absolute standard of rest meant that one could not determine whether two events that took place at different times occurred in the same position in space. For example, suppose our Ping-Pong ball on the train bounces straight up and down. Hitting the table twice on the same spot one second apart. To someone on the track, the two bounces would seem to take place about forty meters apart, because the train wood have traveled that far down the track between the bounces. The nonexistence of absolute rest therefore meant that one could not give an event an absolute position in space, as Aristotle had believed. The position of events and the distance between them would be different far a person of the train and one on he track, and there would be no reason to prefer one person’s position to the other’s. Newton was very worried by this lack of absolute position, or absolute space, as it was called, because it did not accord with his idea of an absolute God. In fact, he refused to accept lack of absolute space, even though it was implied by his laws. He was severely criticized for this irrational belief by many people, most notably by Bishop Berkeley, a philosopher who believed that all material objects and space and time are an illusion. When the famous Dr. Johnson was told of Brekeley’s opinion, he cried, â€Å"I refute it thus! † and stubbed his toe on a large stone. Both Aristotle and Newton believed in absolute time. That is, they believed that one could unambiguously measure the interval of time between two events, and that this time would be the same whoever measured it, provided they used a good clock. Time was completely separate from and independent of space. This is what most people would take to be the commonsense view. However, we have had to change our ideas about space and time. Although our apparently commonsense nations work well when dealing with things like apples, or planets that travels comparatively slowly, they don’t work at all things moving at or near the speed of light. † 77. Consider the following statements: 1. Newton is a firm beliver of both absolute time and a preferred state of rest 2. Aristotle believer in absolute time 3. Newton believes in absolute time 4. Galileo believes in a preferred state of rest (a) 1 Only (b) 1 2 (c) 2 3 (d) 1, 2, 3 4 Ans. (c) 78. According to the author, what is the need of space? 1. To set an absolute standard of rest 2. To determine rest and motion. 3. To determiner whether two events taking place at the same time takes place in the same space also 4. To determine the defference between time and space (a) 1 2 (b) 1, 2 3 (c) 3 4 (d) 1, 2, 3 4 Ans. (c) 79. According to Aristotle- (a) Position of events and distances between them an different (b) Space is nonexistent (c) All nonexistent bodies have absolute rest (d) None of the above Ans. (a) 80. From the passage what can we infer? (a) There is no rest (b) There is rest (c) There is absolute rest (d) There is no absolute rest Ans. (d) 81. What seems contradictory in Newton’s laws? (a) Newton’s concept of Absolute God. (b) Concept of Absolute space (c) Concept of rest (d) None of these Ans. (b) 82. Who discards material objects and space and time? (a) Newton (b) Aristotle (c) Barkeley (d) Galileo Ans. (c) 83. Consider the following statements according to the information provided in paragraph three? (a) On Barkeleys opinion, Dr. Johnson had no remarks (b) Dr. Johnson criticized Barkeley vehemently (c) Dr. Johnson accepted Barkeley’s view (d) Dr. Johnson was indifferent Ans. (b) 84. â€Å"The interval of time between two events can be measured unambiguously. †-this implies- (a) Absolute space (b) Absolute time (c) Both Absolute time and absolute space (d). Neither absolute time non absolute space Ans. (b) 85. The term â€Å"unambiguous† means? (a) Clean and proper (b) Perfect (c) Confusing or not difined (d) Well difined Ans. (c) 86. What does the author openion in the passage? (a) Time is completely separated and independent from space (b) Time and space and interdependent (c) Time is dependent on space and not vice-versa (d) Space is dependment on time and vice-versa Ans. (a) 87. A sum of money invested for a certain number of years at 8% p. a. simple interest grows to Rs. 180. The same sum of money invested for the same number of years at 4% p. a.simple interest grows to Rs. 120 only. For how many years was the sum invested? (a) 25 years (b) 40 years (c) 33 years and 4 months (d) Cannot be determined Ans. (a) 88. How long will it take for a sum of money to grow from Rs. 1250 to Rs. 10,000, if it is invested at 12. 5% p. a simple interest? (a) 8 years (b) 64 years (c) 72 years (d) 56 years Ans. (d) 89. Rs. 5887 is divided between Shyam and Ram, such that Shyamaâ‚ ¬Ã¢â€ž ¢s share at the end of 9 years is equal to Ramaâ‚ ¬Ã¢â€ž ¢s share at the end of 11 years, compounded annually at the rate of 5%. Find the share of Shyam. (a) 2088 (b) 2000 (c) 3087 (d) None of these Ans. (c) 90. An equilateral triangular plate is to be cut in to n number of identical small equilateral triangular plates. Which of the following can be possible value of n? (a) 196 (b) 216 (c) 256 (d) 296 Ans. (c) 91. Find the area of the sector covered by the hour hand after it has moved through 3 hours and the length of the hour hand is 7cm. (a) 1. 77 sq. cm (b) 2. 38. 5 sq. cm (c) 3. 35 sq. cm (d) 4. 70 sq. cm Ans. (b) 92. Left pan of faulty weighs 100gram more than is right pan. A shopkeeper keeps the weight measure in the left pan while buying goods but keeps it in the right pan while selling his goods. He uses only 1kg weight measure. If he sells his goods at the listed cost price, What is his gain? (a) 200/11% (b) 100/11% (c) 1000/9% (d) 200/9% Ans. (a) 93. Societies have been increasing in complexity from folk to industrial. Under this circumstances, according to you social control is more likely to be invested in (a) family (b) school (c) state (d) religious structures Ans. (c) 94. Each interior angle of a regular polygon is 120 degrees greater than each exterior angle. How many sides are there in the polygon? (a) 6 (b) 8 (c) 12 (d) 3 Ans. (c) 95. In the following question, the student’s clinical judgement is assessed: A 28 year old woman with one child has taken anti-thyroid drugs for 6 months for thyrotoxicosis. She has a friend who has been successfully treated with radioiodine. She finds she frequently forgets to take her drugs and wants to stop them to have radio-iodine treatment. 1. She should be told that because of her age radio-iodine is best avoided. 2. The problems associated with radio-iodine should be discussed with her. 3. Surgery as a possible alternative should be discussed with her. 4. She should be advised that some form of further treatment is required. 5. You should find out more about her friend’s treatment. (a) 1 only (b) 2, 3 4 (c) 1 5 (d) 1, 2 3 Ans. (b) 96. In a certain store, the profit is 320% of the cost. If the cost increases by 25% but the selling price remains constant, approximately what percentage of the selling price is the profit? (a) 30% (b) 70% (c) 100% (d) 250% Ans. (b) Directions for the following questions from Question No 97 to Question No 100: The following passage in this section is followed by questions based on the content of the reading passage. Read the passage carefully and chose the best answer to each question below. â€Å"But man is not destined to vanish. He can be killed, but he cannot be destroyed, because his soul is deathless and his spirit is irrepressible. Therefore, though the situation seems dark in the context of the confrontation between the superpowers, the silver lining is provided by amazing phenomenon that the very nations which have spent incalculable resources and energy for the production of deadly weapons are desperately trying to find out how they might never be used. They threaten each other, intimidate each other and go to the brink, but before the total hour arrives they withdraw from the brink. † 97. What is the synonym of the word, confrontation? (a) Being face to face (b) Involving in a clash (c) Fair relationship (d) None of the above Ans: (a) 98. What is the crux of the passage? (a) Mans soul and spirit can not be destroyed by superpowers. (b) Mans soul and spirit are immortal. (c)Mans safety is assured by the delicate balance of power in terms of nuclear weapons. (d) Human society will survive despite the serious threat of total annihilation. Ans : (d) 99. The phrase Go to the brink in the passage means (a) Retreating from extreme danger. (b) Declare war on each other. (c) Advancing to the stage of war but not engaging in it. (d) Commit suicide. Ans : (c) 100. What is the author’s opinion? (a) Nations in possession of huge stockpiles of lethal weapons are trying hard to avoid actual conflict. (b) Huge stockpiles of destructive weapons have so far saved mankind from a catastrophe. (c) Mankind is heading towards complete destruction.

Friday, September 20, 2019

Detecting of Ransomware using Software Defined Networking

Detecting of Ransomware using Software Defined Networking Abstract Ransomware is a major weapon for cyber-extortion. The traditional signature-based detection no longer holds good against modern, sophisticated malware that employs encryption techniques and social engineering. This paper investigates the use of Software Defined Networks (SDN) to detect the illicit communication between infected PCs (ransomware) and their controller known as the Command Control (CC) server. SDN provides unique opportunities to detect malicious DNS requests (associated with malware) and where possible block ransomware controls requests, and thereby prevent ransomware triggering. In this article we mostly look at detection at commercial or business scenarios, where the data handled are much more sensitive and might lead to monetary loss. Index Terms Ransomware, cyber-extortion, Signature-based detection, Software defined Networking. Cyber-Extortion malware can be trace back to three decades earlier [1]. It all started with the malware named PC CYBORG which was delivered through floppy disk. The reports of modern malware known as ransomware were started in early 2005. Since then ransomware has developed into more sophisticated method of attack to extort money from people as well as the companies. Ransomware can make a huge impact on businesses, especially if it strikes mission-critical systems. The attacker forces the companies to pay-out money in the form of bitcoins which can be anonymous and not so easily traceable. If refuse to pay, they threaten to destroy the data. This is a profitable business model to cyber criminals as the companies and people tend to pay out to retrieve the data [2]. It is estimated that the pay-outs to ransomware is close to $1 billion an year as per IBM for 2016[3]. This is just known pay-outs and it crosses more than $1 bn if all the pay-outs are considered. The anonymity of the attacker and necessity of the victim makes it one of the popular attacks to extort money, especially from major tech companies and targeted businessmen. The ransomware is not specific to a single OS platform. From past few years, the ransomware have been developed for different platforms like linux, Mac OS and popular one emerging now a days is for android. In general, the working of modern ransomware is as follows. First, a user machine is infected using various attack vectors for example, clicking on malvertisement, downloads from non-trusted sites, phising, spam, etc. Second, the victims system or the stored data is encrypted (locked), based on the type of ransomware. The modern versions of the ransomware can encrypt storage drives such as cloud storage, Dropbox, and shared network devices. As a result, multiple systems on the network can get compromised, by a single infection. Figure 1 shows the general working of the symmetric and asymmetric crypto ransomware. Fig. 1. (left )Symmetric and (right) asymmetric crypto ransomware As the ransomware evolves, some well know malwares have come into business, such as CryptoLocker, CryptoWall, TeslaCrypt and Locky have been widely used and updated. Detecting these ransomware before the payload activates and start encrypting is very difficult [4]. Figure 2. Shows that only half of anti-virus scanners provide protection for this new malware, even after several days of a new attack being circulated. Fig. 2. Time to detect new malware by antivirus vendors. Recent study shows that the ransomware is becoming successful as the prices are tailored as per companys or countrys ability to pay [5]. If the ransom isnt paid within the expiry of the ransom note, the ransom usually doubles. This instils fear of losing the files or pay higher. This let company or the person feel it is easier and less expensive to pay the ransom and get back the files rather than reporting it and trying to find a solution for it. This makes it important to come up with mitigation techniques to stop this from continuing and The ransomware developers are constantly improving their product which makes it hard for developing long lasting countermeasures. With large number of devices that are getting connected on the internet like the Internet of things, the ransomware is being developed to multiple devices. Most common method of detection of ransomware, infact any malware, is signature based detection. Hence most of the experts suggest keeping the antivirus scanners up to date [6]. But as we have seen from the earlier that not many vendors give out updates that regular. Also with the use of encryption techniques and social engineering, it easily evades the defence in firewall and email spam filters. Hence the detection of entry of ransomware into the system or the network is becoming much more difficult. One more commonly used method of detection is by identifying the extensions. For example, many use extensions like .locky, etc. But this can be masked by encryption techniques. Microsoft advices the best way to tackle ransomware is by having a tested reliable backup to escape the damages of the ransomware [7]. Although this is one of the best methods, creating and maintaining backups for huge organizations can be really expensive and time consuming. Now let us take a look at few of the current implementations to detect ransomware in commercial or business network as they are the major victims because of the data they hold. Majorly used method is implementing products which use User Behaviour Analytics (like Varonics or DatAdvantage). This works on the baseline of normal activity and if there is any other abnormal activity, an alert would be sent to the administrator. The major disadvantage with this is any other legitimate activity which is not mentioned under normal behaviour was reported which led to receiving of lot of false positives about the activity. Other method used was to detect malicious activity by monitoring changes in File Server resource manager (FSRM), function built into Windows Servers. By using canaries, writing unauthorised files can be blocked. This helped in developing PowerShell to block unauthorised user access. Most of the currently used techniques work fairly well with the symmetric crypto ransomware. They tend to be less efficient with the asymmetric crypto ransomware. In this article we look at one of the basic approach that can be taken to mitigate ransomware with the use of Software Defined Networking (SDN). This method is mostly useful in companies or a small network with a system administrator to monitor the network traffic. Proposed method is based on findings after analysing CryptoWall ransomware [8]. But this can be applied to other types of crypto-ransomware, such as Locky TeslaCrypt, etc, which communicates with the Command Control (CC) servers. The primary intension with this proposed method is to cut-off the connection between the victim and the CC systems. Without connection to CC the encryption process is not going to be initiated and thus saving the victims system. With the use of Intrusion detection/Prevention systems(IDPS) or firewalls that are commonly used to filter and detect malicious data, it is very hard to give timely response to such threats as there is lot of data that it encounters because of the number of devices that is connected onto the internet now a days. In this article we take a look at two SDN-based mitigation concepts. We can call them SDN1 and SDN2. Both of them rely on dynamic blacklisting of proxy servers used for connecting to the CC server. However for this method to be efficient, it is necessary to have up to date list of all the malicious proxy servers that are previously identified. In this method of mitigation system, it is necessary to develop a SDN application to cooperate with the SDN controller. The controlled provides all the data necessary for analysis. After the detection of threat, the network can be configured to block all the malicious activity and capture suspicious traffic for investigation. This will also help in recovering symmetric key if the ransomware uses symmetric encryption based ransomware. The functionality of the SDN1 is a simple switch. The switch forces all the DNS traffic to be forwarded to SDN controller for inspection. All the responses are compared and evaluated with the database that contains the list of malicious proxy servers. If the domain name extracted from the DNS is present in the database, the response is discarded or blocked to not let it reach the proxy server. This eliminates the process of encryption on the victims system. An alert is sent to the system administrator about this issue for further investigation. The potential drawback of SDN1 is time taken. The DNS traffic from both legitimate and malicious hosts is delayed as each response is checked with the blacked listed domain database. The SDN2 enhances the performance of SDN1 while addressing this issue. As most of the DNS responses received is legitimate, the SDN2 introduces custom flow. This forwards all the DNS response to intended recipient and only the copy of the response is sent to the SDN controller. While the DNS responses are processed, the controller compares the domains with the ones available on the database. If a blacklisted server is found, the victim IP is extracted and all the traffic between the CC server and the victim IP is dropped and an alert is sent to the system administrator. The pictorial representation of both SDN1 and SDN2 are shown in Figure 3. Fig. 3. SDN-based applications, SDN1 and SDN2. Example testbed of the SDN network Major advantages of using SDN based detection techniques is that it can be used to detect both symmetric as well as asymmetric ransomware. As mentioned earlier without the connection between victim and CC server, the infected host will be able to retrieve the public key and hence will not be able to start the encryption process. As we have seen earlier, this method requires a database that contains all the currently known and used malicious proxy servers. This is the major disadvantage of this method. Currently the developers of this method have a database of about 70,000 malicious domains. But this wont be sufficient as the attackers will be looking for new domains to evade detection. Also methods have to be checked frequently and loopholes need to be fixed as the attackers would seek to exploit any loopholes if found. There are researches that are taking place to detect the ransomware using honeypot techniques. The SDN can be included into the honeypots to further enhance the effectiveness of the detection. Alongside with the SDN, the companies will have to develop an Incident Response team [6]. This team should make plans to tackle the issues according to the importance of the systems and also be given training to be equipped with the necessary steps to take in case of an attack which slipped from the SDN controlled. In case of an attack, steps should be taken to contain the ransomware just to the affected system and it doesnt spread to any other system on the network. It is also important to take a backup of the entire necessary and sensitive files in a secure and tested location. This help in restoring the work quickly in case of unseen attack on a critical system. Also one of the most important developments in ransomware is that now it is not just delivered as a Trojan, it is being developed in a way that it can replicate its code onto the removable devices and network drives. This makes it important to educate and train the employees and the staff about the dangers of ransomware and methods that it can be brought in to the network like the spam emails and social engineering [9]. Also companies should discourage the policy of bring your own device (BYOD). Staff a being more alert about the malware makes is very difficult to launch any attack. As we are looking to develop methods to detect and prevent ransomware, new type of ransomware is emerging that threatens to release all the data online, instead of destroying them, if not paid before the ransom note expires. This is makes it more necessary to develop more sophisticated methods of detection to prevent ransomware attacks. Also as this is an SDN based security application, further research can be undertaken to broaden the spectrum of detection and prevention of other types of malware and attacks like DDoS attacks To efficiently fight ransomware, it is important to break the business model of the ransomware developers. With the reduced income to the ransomware developers, they will have to shut down the proxy servers which in turn help in faster detection of newer developers. The best protection is to prevent infection. This may be tough to achieve and hence in this article we have taken a look at 2 types of SDN based security application that can be implemented to improve protection against ransomware. These rely on up to date database of malicious proxy servers which needs to be updated constantly but once detected, the application works efficiently. We have also discussed that it is achievable to break the connection between the victim and the CC server, with the help of SDN application, to make the encryption impossible. Furthermore, we have seen that it is necessary for the companies to actively invest time and money in training people to develop a sense of security at the workplace to reduce the attacks. We have also discussed that this SDN based application need not be limited to detecting ransomware. This can be further developed to detect and prevent other malware, detect attacks based on the network traffic characteristics or detecting malware based on pattern. References N. Hampton and Z. A. Baig, Ransomware: Emergence of the cyber-extortion menace, in Australian Information Security Management, Perth, 2015. Chris Moore,Detecting Ransomware with Honeypot techniques, 2016 Cybersecurity and Cyberforensics Conference. Ransomware becomes most popular form of attack as payouts approach $1bn a year, Networksecuritynewsletter.com , January 2017. Cisco, Cisco 2015 Midyear Security Report, Cisco, San Jose, 2015. Cath Everett,Ransomware: to pay or not to pay? Computer Fraud and security, April 2016. Ross Brewer, LogRhythm, Ransomware attacks:detection, prevention and cure. D. Mauser and K. Cenerelli, Microsoft Protection Center: Security Tips to Protect Against Ransomware, 6 April 2016. Krzysztof Cabaj and Wojciech Mazurczyk, Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall, NETWORK FORENSICS AND SURVEILLANCE FOR EMERGING NETWORKS. Marc Sollars,Risk-based security: staff can play the defining role in securing assets, Networksecuritynewsletter.com à ¯Ã‚ Ã¢â‚¬ ºÃƒ ¯Ã¢â€š ¬Ã‚  Ãƒ ¯Ã‚ Ã‚ 

Thursday, September 19, 2019

Globalization and Islamic Fundamentalism Essay -- Muslim Culture Islam

The Al-Qaeda offshoot ISIS, has made its way through Iraq and Syria. This new terror campaign appears to have been rolled out with a decades old objective, which is wrought with violence, propaganda and destabilization. But what are the reasons behind these acts of terror and violence? How is it possible to stop terrorism? What is the future of the endless conflict between Islamic extremism and modernity? The last one is particularly burning, since it touches an issue, entwined in ever-lasting controversy, aggression and needless carnage - the issue of Islamic fundamentalism and its extreme manifestation - terrorism. In my paper I argue that in its essence Islamic fundamentalism is a negation of the values, upheld by globalization, democracy, true Islam and modernity. There are several interconnected focal factors that render Islamic extremism incompatible with modern trends of development. The first and basic factor, always in the context of the history of Islam, is the theoretical foundation of fundamentalism. Also, another important issue is the rise of Islamic nationalism, which helps fundamentalism transform religious and cultural differences into an overt and brutal struggle against non-Muslim countries and their globalizing world. Of particular significance, however, is the poor economic development of Muslim states. Moreover, I believe it is the actual reason behind the violent outbreak of extremism. All these issues combine to form the idea of Islamic ideal versus reality, or the ever-increasing gap between modernity and the nature of fundamentalism. In addition, I argue that poor economic and social conditions in Muslim countries are caused by improper government policies and deep social c... ...://www.worldbank.org/wbi/mdf/mdf1/edecmen.htm> Global Poverty Monitoring. The Middle East and North Africa: An Overview. United Nations Development Programme. Human Development Report 2001 United States Senate. Extremist Movements and Their Threat to the United States. Washington: U.S. Government printing Office, 2000 The Islamic World to 1600: The Rise of the Great Islamic Empires The New York Times; October 31, 2001

Wednesday, September 18, 2019

A Little Commonwealth Essay -- essays research papers

The modern image of the New England Puritans, as one perceives, is a dark one: the Puritans, religious dissenters who valued propriety and order, are seen as a witch-hunters, suspicious tribe, and their very name carries connotations of grimness and primness. Where as the book â€Å"A Little Commonwealth† reflects the scenario in which the Puritans lived. Most of the houses in the Puritan Colonial time were small, dark, brooding and sparsely furnished. This allowed the Puritans to use every available space in the home. For examples, most of the furnishings and utensils used by the Puritans had more than one use†¦a trunk would be used not only for storage but also for sitting upon or maybe even a table. Moreover because of their lifestyle, they had to carry inventories, which were bulky and were stationed at the corner. In a way to demonstrate his/her standing in the community and to confirm his/her own self-image, the Puritans viewed their wealth by material and tangible acquisitions. Their modest clothing showed just what their standing was in the community. More clothes, books (even if they could not read), linens and such things were viewed as â€Å"money in the bank†, although jewelry, even wedding bands, were not considered tangible wealth in the Puritans. The families were very tight knit. While they lived in such cramped quarters they seemed to be able to live peaceably and by communicate with each other. Rather than squabble amongst themselves the Puritans, by way of displac... A Little Commonwealth Essay -- essays research papers The modern image of the New England Puritans, as one perceives, is a dark one: the Puritans, religious dissenters who valued propriety and order, are seen as a witch-hunters, suspicious tribe, and their very name carries connotations of grimness and primness. Where as the book â€Å"A Little Commonwealth† reflects the scenario in which the Puritans lived. Most of the houses in the Puritan Colonial time were small, dark, brooding and sparsely furnished. This allowed the Puritans to use every available space in the home. For examples, most of the furnishings and utensils used by the Puritans had more than one use†¦a trunk would be used not only for storage but also for sitting upon or maybe even a table. Moreover because of their lifestyle, they had to carry inventories, which were bulky and were stationed at the corner. In a way to demonstrate his/her standing in the community and to confirm his/her own self-image, the Puritans viewed their wealth by material and tangible acquisitions. Their modest clothing showed just what their standing was in the community. More clothes, books (even if they could not read), linens and such things were viewed as â€Å"money in the bank†, although jewelry, even wedding bands, were not considered tangible wealth in the Puritans. The families were very tight knit. While they lived in such cramped quarters they seemed to be able to live peaceably and by communicate with each other. Rather than squabble amongst themselves the Puritans, by way of displac...

Tuesday, September 17, 2019

Othello, the Image Machine Essay -- Othello essays

Othello, the Image Machine  Ã‚        Ã‚  Ã‚   Shakespeare’s drama Othello presents a full panoply of diverse imagery that cannot be described briefly. Let’s spend some attention on this subject which has so many examples in the play.    Alvin Kernan’s â€Å"Othello: an Introduction† explains how the â€Å"symbolic geography† imagery of the play create a particular image of space and time:    We can begin to see this pattern in the â€Å"symbolic geography† of the play. Every play, or work of art, creates its own particular image of space and time, its own symbolic world. The outer limits of the world of Othello are defined by the Turks – the infidels,   the unbelievers, the â€Å"general enemy† as the play calls them – who, just over the horizon, sail back and forth trying to confuse and trick the Christians in order to invade their dominions and destroy them. Out beyond the horizon, reported but unseen, are also those â€Å"anters vast and deserts idle† of which Othello speaks. Out there is a land of â€Å"rough quarries, rocks and hills whose heads touch heaven† inhabited by â€Å"cannibals that each other eat† and monstrous forms of men â€Å"whose heads grow beneath their shoulders.† (76-77)    There is no shortage of imagery in the play; this is for certain. Critic Caroline Spurgeon in â€Å"Shakespeare’s Imagery and What it Tells Us† sorts through the plethora of imagery in the play:    The main image in Othello is that of animals in action, preying upon one another, mischievous, lascivious, cruel or suffering, and through these, the general sense of pain and unpleasantness is much increased and kept constantly before us. More than half the animal images in the play are Iago’s, and all these are contemptuous or repellent: a plague of flies, a qua... ...ore Evans. Boston, MA: Houghton Mifflin Co., 1974.    Kernan, Alvin. â€Å"Othello: and Introduction.† Shakespeare: The Tragedies. Ed. Alfred Harbage. Englewood Cliffs, NJ: Prentice-Hall Inc., 1964.    Mack, Maynard. Everybody’s Shakespeare: Reflections Chiefly on the Tragedies. Lincoln, NB: University of Nebraska Press, 1993.    Muir, Kenneth. Introduction. William Shakespeare: Othello. New York: Penguin Books, 1968.    Shakespeare, William. Othello. In The Electric Shakespeare. Princeton University. 1996. http://www.eiu.edu/~multilit/studyabroad/othello/othello_all.html No line nos.    Spurgeon, Caroline. â€Å"Shakespeare’s Imagery and What it Tells Us.† Shakespearean Tragedy. Ed. D. F. Bratchell. New York: Routledge, 1990.    Wilson, H. S. On the Design of Shakespearean Tragedy. Canada: University of Toronto Press, 1957.      

Monday, September 16, 2019

Assessment of the War on Terror Essay

The necessity and the non-necessity of wars in the course of human history and societal change may be seen from two diametrically opposing views. On the one hand, it is considered necessary in the sense similar to Adolf Hitler’s stance on war and its critical function in the evolution of man and society. In his work entitled Mein Kampf, he writes, â€Å"Mankind has grown strong in eternal struggles and it will only perish through eternal peace† (1943, p. 45). On the other hand, pacifist thinkers such as Mahatma Gandhi do not assent to the idea that wars are necessary. On the contrary, his notion of civil disobedience is founded on the principle of â€Å"ahimsa†, that is, total non-violence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Gulf Wars, a term currently used to refer to the series of wars which occurred in the past two decades with its culmination in what is popularly known as the United States of America’s Invasion of Iraq in 2003.The striking fact though is that the different moral convictions of the people is made manifest even in their choice of words to refer to the aforementioned Invasion of Iraq. Invasion is a derogatory word. The concept of invasion assumes the existence of a hostile party who will cause turmoil and havoc within another territory. However, for those who assent to the Bush administration, the proper term is not invasion but rather, liberation. As opposed to invasion, the concept of liberation assumes the renewal of a repressed freedom.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  These insights point out that human social reality is held fast by systems of power and power relations, most especially in the context of international politics and a globalized, capital-driven economy. Globalization is indeed, the current paradigm. This paper’s task involves an evaluation of the political motivations that can justify the necessity of war. One may perceive the current United States War on terror in two ways. First, one may perceive it as an appeal to the Messianic aspect of man in terms of which man enables the liberation of his neighbor from conditions that restrict his freedom. Second, one may view it as a country’s plight for continuous economic growth thereby sacrificing the life of the few and the interests of other nations for the procurement of its own interests. It is important to note that Bush Administration’s War on Terrorism can be summed as a country’s plight for economic power at the expense of the blood of the â€Å"few†.    If such is the case, the aforementioned war does not thereby adhere to the main propositions of what may considered, as a just war, which states that the use of force by one nation against the other, is always wrong unless the latter has forfeited its basic rights (Lackey 222). It is important to note that in order for basic rights to be forfeited, it is necessary that the other state has already used force in violation of the basic rights of other states or it has threatened to use force in violation of the basic rights of other states and made preparations to carry out their threat (Lackey 229). Another instance wherein a state has forfeited its basic rights is apparent during instances wherein its ability to govern is disrupted by a secessionist movement which is representative in character or when the state in question has engaged in massive violations of basic personal rights (Lackey 229). These conditions, however, were not initially met by Iran before the aforementioned War on Terror. References Hitler, Adolf (1943).   Mien Kampf.   Trans. Ralf Manheim.   London: Houghton Mifflin. Lackey, Douglas.   â€Å"The Ethics of War and Peace.†   

Sunday, September 15, 2019

Aryan Brotherhood

ARYAN BROTHERHOOD Growing up most people has been part of a group, one way or another. Girls grew up being Girl scouts or Campfire girls, and boys had Boy scouts and baseball. Well, on that note, I remember having a pledge in Girls Scouts. Well the Aryan Brotherhood also has a pledge: â€Å"I will stand by my brother My brother will come before all others My life is forfeited should I fail my brother I will honor my brother in peace and war† They also live by the motto, â€Å"in for life and out by death. This Brotherhood take these words to heart, and will do anything for a brother whether they are in prisons, jails, or free on the street to handle affairs for others. The Aryan Brotherhood formed in 1964, by white inmates from the infamous San Quentin State Prison, in Northern California. January 16th, 1967 a Nazi prison-gang associate Robert Holderman was stabbed and then battered to death by Black Guerilla Family gang members at San Quentin prison. The very next day, Janua ry 17th, 1,800 black inmates and 1,000 white inmates clashed on the main yard at San Quentin prison over the death of Robert Holderman.The prison guards broke up the brawl by firing shots into the mass of inmates. One inmate suffered severe head trauma from the beating he received from opposing gang members. Two other inmates suffered non-fatal heart attacks. August 27th, 1967 nineteen-year-old Barry Byron Mills was arrested in Ventura, California and held for transfer to Sonoma County, where he had stolen a car. Sonoma County had issued an arrest warrant in his name for grand theft auto. On December 12th, that same year, Barry Mills requested and was denied probation.Instead he was sentenced to one year in the Sonoma County Jail. Within less than two months later on January 12th, 1968, Barry Mills and Buddy Coleman escaped from the Sonoma County Honor Farm. Of course this facility was not a jail or a prison, so there for very low security, with non-violent offenders. Mills’ realm of freedom did not last long, come February 17th, 1968 he was arrested in Windsor, California, and held on a warrant charging escape without force. On March 12th, 1968 Barry Mills was sentenced to one year and a day in prison for escape without force from the Sonoma County Jail.One year and a day later, Barry Mills was released from prison, March 13th, 1969. January 13th, 1970 in Soledad State Prison, Aryan Brotherhood leader Buzzard Harris, and along his side fellow Aryan Brotherhood members Smiley Hoyle, Harpo Harper and Chuko Wendekier. Siding with the Aryan Brotherhood where Mexican Mafia members Colorado Joe Ariaz, John Fanene, and Raymond Guerrero went to battle with Black Guerilla Family gang members on the exercise yard at Soledad prison. Tower guard Opie Miller opened fire with his high-powered rifle, killing Black Guerilla leader W.L. Nolen, Cleveland Edwards and Alvin Miller. Buzzard Harris the Aryan Brotherhood leader was wounded in the groin by one of the bullets that came from Opie Miller’s rifle. Once again Barry Mills could not stay out of trouble and Mills and William Hackworth were arrested after robbing a Stewarts Point convenience store in January 30th, 1970. Within a few days, Barry Mills was convicted of first-degree armed robbery after co-defendant William Hackworth testified for the prosecution against Mills. This time Mills was sentenced to 5 years to life in prison.Since the 1970’s, the Aryan Brotherhood has spread out across the states throughout many prisons. Many of them are in California such as, California State Prison at Corcoran, Pelican Bay, USP Marion, Folsom State Prison, California Institution for men in Chino to name a few. They also have the brotherhood thing going on here in Nevada at the High Desert State Prison. The Aryan Brotherhood are mainly concerned with White-Supremacy and self-protection from Black and Hispanic gangs. The recent conviction of four Aryan Brotherhood members in Santa Ana Califo rnia, was one the largest death penalty cases in U.S. history. This revealed an allegedly â€Å"ruthless† gang who regularly murdered those who opposed the system, growing so out of control that even its own ranking members could not consider themselves safe. The violent ordering of murders throughout the United States, whether inside the prisons or not is quite frightening. The Aryan Brotherhood has connections worldwide, and expect orders of any kind to be followed. In 1997 when Mafia don John Gotti was locked up, a man named Walter Johnson allegedly punched Gotti in the eye in an Illinois prison.John Gotti paid Barry Mills $500,000 to kill Johnson, who at the time was staying in a Colorado prison, Mills agreed. However Johnson got lucky, for the fact that Gotti died in prison in 2002. Although the Aryan Brotherhood was originally formed for the protection of whites against blacks in prison, the gang gradually moved to criminal activities such as murder. That was not good e nough or beneficial enough for this gang, so they strive to control the sale of drugs, gambling, and â€Å"punks†, or male prostitutes. According to sources, racial warfare comes in second to business.The Aryan Brotherhood has also carried out contract killings for the Mexican Mafia. April 21, 1972, Aryan Brotherhood members Fred Mendrin and Donald Hale murdered Fred Castillo by stabbing him to death at the Chino Institute for Men. Castillo was the leader of the Nuestra Familia gang, and Castillo was murdered as part of a contract with the Mexican Mafia. December 15, 1972 Fred Mendrin and Donald Hale where sentenced to life in prison for the murder of Fred Castillo. Racist beliefs prevent members form consorting with African Americans, including taking anything from a cigarette or even a candy bar from them.In 1973 the Aryan Brotherhood spreads into the federal prisons. Much more came with the merge to the federal prisons. In 2006 it was revealed in the recent murder trial of 4 Aryan Brotherhood members, that their communication included codes and cryptograms. Some of these techniques involved a 400 year old binary alphabet system invented by Sir Francis Bacon, concealing notes in mop handles and beneath rocks in the recreation yards. The Aryan Brotherhood also supposedly perfected the art of urnine-writing where one dips a Q-tip in some acidic substance such as citrus juice, urine or bleach and write with it making out the resulting words.These words stay invisible until they are exposed to direct heat, such as a match flame. Throughout the late 1970’s, many Brotherhood members went down for many different crimes such as bank robbery, and one member Little Joe O’Rourke, who opened fire on the El Camino Community College campus for opening up fire there, and was sentenced to seven years in prison. In 1978, Barry Mills is sentenced to 20 years in the federal prison for planning a bank robbery in Fresno, California. The bank was robber by th e Aryan Brotherhood in June of 1976. Although Barry Mills did not directly participate in the robbery, but he provided the blueprint for it.Barry Mills in 1979 murdered Aryan Brotherhood associate John Sherman Marzloff in the United States Prison Atlanta, Georgia. In 1980, the Aryan Brotherhood set up a commission to run the operations of all Aryan Brotherhood members. The commission was composed of three men. Ironically enough, Barry Mills assumed command of the commission. June 8, 1980, one of the Aryan Brotherhood associates was murdered his name was Robert Hogan. The order came directly from Barry Mills. In the same â€Å"gang† is one thing although when putting hits out and ordering murders on men of other organizations’, almost always there will be some kind of retaliation.September 27, 1982 Aryan Brotherhood Commissioner Thomas â€Å"Terrible Tom† Silverstein murdered Cadillac Smith, who was the leader of the D. C. Mob, at the United States Prison, Marion , Illinois. Now to retaliate, a couple of months later, Aryan Brotherhood member Neil Baumgarten was murdered by members of the D. C. Mob. Baumgarten’s murder was payback for the murder of Cadillac Smith. In January of 1983 another member of the brotherhood, Blinky Griffen was convicted of murdering T-Bone Gibson.Now the Aryan Brotherhood just do not stop at rival gangs, they murder their own also. In February of 1983 one month to the day, Aryan Brotherhood member Richard Barnes was murdered. The order to kill Barnes came from Aryan Brotherhood Councilman McKool Slocum. Again, September of 1983 Aryan Brotherhood associate Gregory Keefer was stabbed to death by another Aryan Brotherhood associate. http://www. splcenter. org/get-informed/intelligence-report/browse-all-issues/2005/fall/smashing-the-shamrock http://www. urbandictionary. com/define. php? term=Aryan%20Brotherhood

Racial Profiling Essay

Racial profiling is a big issue. Many people have been victimized because of cops and other high authorities’ senseless attitudes on how to handle the law. What people have to realize is that racial profiling does happen to innocent people who are mostly targeted or pursued because of their race or sometimes even because of their religion. These things can also cause citizens to become very angry and unwilling to cooperate with law enforcement. Racial profiling has been the cause of many outbreaks of riots. There has even been many riots because of innocent people being racial profiled against; causing citizens to become antagonistic, bitter, and hateful towards the law. This can be a problem because they even target good police. The cause of racial profiling can start not only hostile attitudes, but a shift in the views of how police treat citizens. Racial profiling is a method that police and other law enforcement agents use to catch someone who has committed a crime or is about to commit one. It is a controversial method. In fact, even the meaning of racial profiling is controversial† (Kops, Pg. 9). Racial profiling is a very controversial topic, because this topic makes people uneasy to talk about. It’s especially hard for victims who have been racial profiled against because of the memory of their terrible experience. â€Å"In 1942, over 120,000 American were stripped of their business and their homes and incarcerated for the duration of World War II. They had committed no offense. They were convicted of no crime. They were suspected, subjected to curfews, arrested, had their property confiscated, and finally imprisoned because of the color of their skin and their national origin or the national origin of their parents† (Meeks, Pg. ). Situations like this can cause a shift in the government where they have constant issues on how to approach citizens because of the fear of being accused of discriminating against people. This sometimes has citizens wondering is it okay for police to check you if they â€Å"think† you are committing a crime? Well there have been mixed answers when the law is confronted with this question. Also this can cause tension between cops and the law enforcement because of all the animosity and stress of being constantly accused of racial profiling. There have been retired cops who have written books talking about their experience as a cop. Some give details that outsiders wouldn’t know about the cop’s secret jobs. Is it possible that good police are afraid? This could be the reason why; they could also be afraid that if they tell too much they could possibly lose their job. But just as there are good cops, there are also bad cops. Like the ones who harass people for no reason; simply because of the physical features. â€Å"An officer’s daily duties require them to violate the rights of others, without question, on a repeated basis (see video – 2min in). Police routinely fine or jail, at taxpayer expense, people whose crimes lack an actual victim. Whether it is for driving without a license, disorderly conduct or illegal drugs, police are the ones enforcing such laws. More surprisingly is it seems they do so only because they are told to, and believe such violations are acceptable to keep others safe (this doesn’t even include officers who blatantly and knowingly abuse their power)† (Freeman). Is it a thing of giving law enforcement too much power? Many people have many complaints that the law has access to how they suspect if the person is in the wrong. This is a prime example of why there can be a separation between cops. However, often many good cops are targeted for a crooked cop’s bad deed. With this happening it scares away potential cops; who are afraid of this horrible thing happening to them, which has citizens and other authorities on edge. The lack of law enforcement would be a huge problem; without the law the crime rate could possibly reach an ultimate high. Law enforcement is supposed to be put in place as a security, and protection for citizens. But how can you trust them when they also commit crimes. It makes it even harder for citizens to report a crime because they are afraid of what might happen to them. Bad cops are considering somewhat professionals at pulling big schemes. They can pull off these schemes because of the connections they have with even high authorities. Some schemes could be tied to drug trafficking and many other things. But are once they are accused of such heinous crime, why are these issues sometimes forgotten about? It’s like the process of prosecuting these police are constantly kept quiet. Well it’s about time that it’s brought public. â€Å"Negative stereotypical biases of African-American males overshadow any appearances that they are law-abiding citizens. Indeed, in the eyes of many law enforcement officers, an African-American male driving a Mercedes-Benz projects the presumption of illegal activity, not the presumption of a hard working citizen† (Weatherspoon). Keeping these things private can cause more attention to what are they really doing. But no one is taking a stand and asking questions; simply because of fear of becoming a target of the police. â€Å"The term driving while black has been used to describe the practice of law enforcement officials to stop African-American drivers without probable cause. The practice particularly targets African-American males. African-American males are not only singled out while driving, but also while schooling, eating, running for political office, walking, banking, serving as a juror, getting a taxi, shopping, and just being black and a male. The mere fact of being black and male in America is sufficient cause for governmental and private law enforcement officials to abridge the rights of African-American males. This is not to suggest that law enforcement officers can never consider race when performing their job† (Weatherspoon). African American males are not the only people who are targeted. For example, during the Holocaust Jews were killed, beaten, starved, and a lot of other horrific things all because of their religion and race. â€Å"The European Holocaust of the 1930s and 1940s, which cost millions of Jews (and other ethnic groups) their lives, led many Jews and non- Jews alike throughout the world to believe that a Jewish homeland was necessary. During and after World War II, many Jewish refugees found themselves without a nation and with nowhere to go† (Jones, Johnstone, Pg. 358). Racial profiling seems to never have an end. Many cases you hear about how racial profiling still exists ‘til this very day. The question that everyone should be asking is, â€Å"why should a person race, religion, or beliefs determine how they are judged? â€Å"Racial profiling is an abusive practice that targets innocent citizens solely because of the way that they look. It is not an effective law enforcement strategy. Research shows that racial profiling diverts officers’ attention from using actual, objective signs of suspicious behavior to effectively assess situations. Racial profiling erodes trust between law enforcement and its community. As a result, people are less likely to report a crime or work with the police to give information that could apprehend an actual criminal† (Elliot). This statement is true; racial profiling really is not a strategic method. Since this method has been put in place it has done nothing but cause an upset to the community. Communities have had negative feelings towards racial profiling. So why is this still a method? No one seems to ask this important question that could change the law enforcement system. Changing the system could make a better relationship between citizens and law enforcement. Because more citizens may be willing to open up more to the law, without feeling like they can’t trust police. Before this solution could be an option the law enforcement should make an extra effort with making sure that the community knows that they can trust they are truly secured. â€Å"While there have been attempts to end racial profiling in Congress, no bill has successfully been passed. Communities across the country have been subjected to this useless, degrading tactic for too long. Now is the time for Congress to reintroduce and pass comprehensive legislature to end racial profiling† (Elliot). Congress has yet to make any decisions about eliminating racial profiling. But that doesn’t mean that change won’t happen. Racial profiling as stated in within this research paper is a very controversial topic, but it also a sad topic. The way a person can be mistreated just because of the color of their skin. When reading the facts about racial profiling it is saddening to know that a person can be humiliated and tortured over nothing. Victims of racial profiling are caught off guard, because they have no clue of why they have become a target. Some people are targeted because of their religion; for example a Muslim lady could become a target of racial profiling because of her head wrapped. Muslims have became targets ever since the 9/11 incident. â€Å"Since September 11, 2001, members of Arab, Muslim, and South Asian communities have increasingly been searched, interrogated and detained in the name of â€Å"national security†, often times labeled â€Å"terrorism suspects† when in reality many were only charged with misdemeanors or minor immigration violations, if they were charged at all† (Racial Profiling: Face the Truth Campaign). African-American males are also targeted, because of how they present themselves. This can make some African- American males uneasy to go out in public, because of the fear of being watched and seen for the clothes they wear. â€Å"As a result, community members become less likely to assist with criminal investigations or seek protection from police when they themselves are victimized, which makes everyone less safe† (Racial Profiling: Face the Truth Campaign). Communities are now starting to stick together, by not helping the police. Some feel that they should not help the police when the police attack innocent people.