Georgia Essays Prompts

25+ documents containing “Georgia”.


Sort By:

Reset Filters
Components of a Succession Plan
PAGES 4 WORDS 1501

I am creating a section of the literature review chapter which research is needed on the following question:
What are the detailed components of a Succession Plan?

References should be of scholarly/peered reviewed journals along with any other pertainent references

Specific Topic: How has Workplace Diversity Lead to Improved Organizational Performance

Needs to have at least 14 sources, of which, internet references are not substitutes for original sources unless they also provide specific page locations from original works.

Need at least 14 citations from the sources provided, preferrably 1 per source.

12 pages on content, not including an abstract.

Please contact me if you have any questions or timeline issues. My turn in date is on the 29th, so really no time for lapse.

Thank you

John Locke: Political Thought on
PAGES 15 WORDS 4766

This class is Liberty and Property, about The political thought of John Locke. It is very important that a writer is very familiar or well knowledged with John Locke. If the writer is not then, it is impossible to write a paper.
This paper is final paper which it covers 50% of final grade.

Before you write a paper you should re-read "The second Treatise", and "A discourse on Property" both by John Locke.
"The second Treatise" required reading is chapter from 1 to 19. And "A discourse on Property" is Chapter from 2 to 7.

Paper is asking a question about a current issue of liberty and property(the default topic will be Kelo Vs. New London) by using extensive evidence from Locke and secondary sources.

First, you have to find a case suchs as Kelo Vs. New London.
Then, first 3-4 pages should cover with addresting major three problems related to the case. But not to argue about the problem, and is not argument paper. Structure like John Locke wrote on the book. Try to understand both parties.
Second part 8-10 pages, should cover with John Locke's philosophical idea related to the problems that you addressed.
Last, conclusion 1-3 pages, it is not important who is right. It can be understandable in both parties. Or Such example from kelo Vs. New England, Kelo!!. You can choose it while you are writing.

*Important*
*Clearly identify three questions and backed up by Locke's Philosophical idea.
*Structure base on Locke and gear toward.
*The case must invovle with two Parties such as Kelo Vs. New London. If you are not sure about what is Kelo Vs. New Londong go to the google.com and type "Kelo Vs. New London". It will help to find a case. Also you could look up law.com to find a case. Such as Death penalty, abortion.
*number of evidence is up to you but many evidences are better for the paper. Just use it for appropriately. But it is important that the evidences should backed up from the problems that you address(three questoins, both parties).

Use Chicago Manual of Style. I need the bibliography and work cited information along with my order for free. I provided 11 reference materials to use. Along with that add at least 20 other references. I need minimum of 15 quotations. I have provided the Introduction of the research paper. Based on the introduction please write the body and conclusion. NOTE Keep my introduction and use that as a base to write the body and conclusion. I am ordering 12 pages in total write 10 pages for the body and 2 pages for conclusion based on my introduction. I am not paying to write an introduction as I would like to use my own introduction. So please write the body and conclusion only and make sure it flows with my introduction. The paper should be based on my introduction and answer the last three topic of the introduction, which are:
- Online cross-cultural communication is more prone to misunderstanding and distrust than face-to-face communication because some of the nonverbal communication cues like body language are missing.
- The building of trust between individuals can lead to successful on-line cross-cultural communication.
- There is a need to understand how the meaning of word may vary between cultures in order to eliminate any potential misunderstanding and distrust between individuals.


Subject: Interpretation across Culture in on-line communication

Introduction:

I have been using my second language, English, since I was two years old. I have been living in the U.S. for nine years and still some words do not portray the same meaning to me as they do to people over here. I have found that the meanings of words can change; I notice this particularly at my workplace. When I started my job, I was given a project, and in an e-mail communication I wrote, "I am working on resolving the problem. I will keep you posted with my findings. In the meantime, if you have any further problems please feel free to contact me again." The word "problem" created a big situation in my department. My manager and my co-workers thought the word "problem" sounded negative and that I should use the word "issue" instead. I explained to them that where I come from, Bangladesh, "issue" sounds very harsh. It makes me feel as if I am attacking someone personally. After much discussion, I stepped aside to think from their perspective and decided to change the word. These made me realize that communicating in the workplace in my second language, even if my colleagues and I do not always understand words the same way, we can eventually understand each other well enough to achieve our tasks at work.

Language is the key factor for communication. The English language is being used globally to communicate through online media. While most people are using the same language to interact, not everyone is communicating with the same cultural values and understanding. Effective communication with people of different culture is especially challenging. There are no established procedures or rules for us to follow to be efficient communicators across cultures. The Internet has caused an explosion in the variety of communication methods and has opened an extraordinary level of communication without boundaries. This is causing an unprecedented possibility for misinterpretation, misunderstanding, and distrust. Trust is a vital element in team development and efficiency building within a traditional team context. Any kind of communication we engage in has our cultural values intermingled in it. Culture teaches us values and principles that direct our thoughts and actions toward anything we encounter. This cultural understanding dictates the way we learned how to speak, write, and interact with others. It creates a challenge in understanding each other. Along with the regular face-t-face cross-cultural communication challenges now we need to pay attention to the cross-cultural communication via on-line media.

To keep costs down and remain competitive in the global economy many organizations are choosing to convert traditional teams to virtual teams and forming Geographically Dispersed Teams (GDT). It is easy to setup virtual teams, but the challenge is in establishing trust among virtual team members to work collaboratively. Individuals in a virtual team not only depend on the use of information technology but also create rapport through on-line communication. In a research done by Dr. Zhou she revealed that virtual team also needs to trust their team members for their work. Because they are dependent on each others assigned task to deliver a successful project. When there is s strong trust built within the team, it is easier for the team members to work efficiently because they are able to depend on each other. It also helps them to have open communication within the group and maintain a collaborative environment. Trust is a vital element in team development and efficiency building within a traditional face-to-face communication of team context. So, we also need to pay attention on how to build trust through on-line communication.

It is phenomenal how people can communicate with each other while connected only by computers. Today, online media has shortened the time span of international communication to a matter of seconds. According to Internet World Stats, on June 30, 2008 the Internet was used by 21.9% of the world population, which is a 5.19% increase since 2006. The increase of Internet usage has brought with it a mixture of new settings and concerns that affect how the world interacts with in cyberspace. It has become a melting pot of different languages, cultural values, laws, regulations, and individual expectations. These factors need to be considered while using the online media to network with people of different cultures around the globe. A majority of work teams now spend at least 25% of their time working in a virtual environment, according to a recent survey by the Institute for Corporate Productivity.

It can also be said that the on-line media is also influencing people to take on new habits from other cultures. Consider the following simple scenario that Satinder Gill, talks about in his article "The Cultural Interface: The Role of Self." Usually, in Japanese culture, everyone addresses their colleagues at work by their last name. When communicating via email they tend to address their colleagues by their first name, which they do not normally do in person (1). Here we can see how online communication changes how Japanese communicators address each other differently online rather than face-to-face. This is just one example of global communication causing unconscious changes to occur in users' communication styles and how we need to pay attention to online communication protocols between cultures.

The emergence of cyberspace is pushing everyone in the workplace to grow an understanding of how different cultural values can play a role in online communication. Online cross-cultural communication in can be unconsciously affected by cultural values. This factor can affect how employees from different countries engage in online communications. All of these issues can play a positive or negative role in our life. If we do not pay attention to potential misunderstanding, then we are more likely to become victims of miscommunication. It will take more than just awareness to overcome these issues and communicate online across culture. On-line cross-cultural communication is a vital element in todays communication at workplace for team development and efficiency. In this study I plan to explore some of the potential reasons for misunderstanding and distrust in on-line communication. I believe to address this question I need to tackle the following issues listed below:

- Online cross-cultural communication is more prone to misunderstanding and distrust than face-to-face communication because some of the nonverbal communication cues like body language are missing.
- The building of trust between individuals can lead to successful on-line cross-cultural communication.
- There is a need to understand hw the meaning of word may vary between cultures in order to eliminate any potential misunderstanding and distrust between individuals.


Some Resources to use in the paper Annotated Bibliography


Nastri, J., Pea, J., and Hancock, J. T. (2006). The construction of away messages: A speech act analysis. Journal of Computer-Mediated Communication, 11.4, article 7.
This research study focuses on away messages in IM and how it can be used for better communication. A total of 483 away messages written by 44 individuals were studied. The messages were broken down indo different categories. They are primarily assertives, followed by expressives and commissives, but rarely with directives. These findings are discussed in terms of computer-mediated discourse and online self-presentation.
Coppola, N. W., Hiltz, S. R., & Rotter, N G. (2004). Building trust in virtual teams. IEEE Transactions on Professional Communication. 47.2, 95-104
The authors, researchers at the New Jersey Institute of Technology, Newark uses Debra Meyersons concept, swift trust at the beginning of an on-line course to build trust between temporary teams in online courses. The industry is moving towards a virtual world and along with it the academia is also preparing the students to work in a virtual world. As the students are meeting for a short time they can be compared to the temporary groups at workplace how everyone is pressured to become familiar in a limited amount of time. It shows the faculty members who were able to build trust between the team within the first week of the class were able provide successful learning community. The same phenomenon works within virtual teams at work place. Trust needs to be present between team members so they can count on each other and work more effectively towards their task without additional worries.
Suchan, J. & Hayzak, G. (2001). The communication characteristics of virtual teams: a case study. IEEE Transactions on Professional Communication; 44.3, 174-186
The authors, researchers are from the Naval Postgraduate School and the U.S. Army explores on how there is greater need by the industry to deliver to their client in the most efficient way and how they are turning towards virtual team to give them the nimbleness to leverage their resources. They research analyzed the communication technologies like Customer Support Virtual Team (CST) for a Fortune 500 organization. Advanced electronic media provide the primary means of interaction between the virtual team members. For an effective team they found the great need for self driven team members and a great deal of trust along with the most efficient communication tools. In contrast they also found that organizations need to have staff to support these technologies for virtual team to perform effectively. As the industry is getting more demanding with the turnaround time of their project this study shows how managing a productive virtual team directly depends on a reliable communication systems. They show an interlinked relationship connecting the need to maintenance the uptime of these systems which helps the virtual team to be productive and as a result support their clients.
Zhou, L., & Zhang D. (2005). A heuristic approach to establishing punctuation convention in instant messaging. IEEE Transactions on Professional Communication. 48.4, 391-400
The author, researcher at the University of Maryland, MD explores the behavioral indicators of deception in virtual group when using instant messaging as a media of communication through qualitative study. He also discovered the difference in linguistic behavior between deceivers and the truth teller. This study is crucial for industries as most are instant messaging or synchronous computer mediated communication now pervades in daily life of the workplace. The study also compares the research on deception in face-to-face communication based on the clue theory with the deception via instant messaging. The interpersonal deception theory from social science was also used to guide the deception research in the group studied using instant messaging. Compared to face-to-face interaction instant messaging is influenced by the lack of incoming social cues as the communicators doesnt get to see the facial expressions. It is important identify these deceptions as organizations interact with each other virtually to reduce project failures. The results from this research can be used to understand knowledge of deception behavior in human communication and be aware of deceptions in the virtual world.

Grosse, C. U. (2002). Managing communication within virtual intercultural teams. Business Communication Quarterly. 65.4, 22-38.
This study was based on the findings from a graduate level business communication class assignment and interviews with four executives from France, United Kingdom, and US. The study focuses on how to build a strong virtual team through technology at the same time keep the interaction more humanized. It is a challenge for the traditional workers to work with teammates where there is no face-to-face interaction so there is a greater need for human touch to make them comfortable. There is also a need to have awareness of cultural diversity in the global virtual team to avoid unnecessary misunderstanding. The study also troughs the idea of a first face-to-face interaction between the team before forming them into virtual team but this is not always feasible due to geographical location and cost. The organization need to encourage open communication from the beginning between the virtual team members to grow trust and understanding. In the long run this will help the team to be more efficient and productive.

Shaw, B. , Scheufele, D. and Catalano, S. "The Role of Instant Messaging as a Tool for Organizational Communication: An Exploratory Field Experiment" Paper presented at the annual meeting of the International Communication Association, Sheraton New York, New York City, NY Online Retrieved 2008-06-20 from http://www.allacademic.com/meta/p14438_index.html
Millions of adults currently use instant messaging (IM) in the workplace and yet there is very little research examining how use and perceptions of this new medium affect intra-organizational communication. While one of the characteristics of instant messaging is the ability to exchange real-time communication, what truly distinguishes instant messaging from other widely adopted forms of mediated communication is the integration of presence technology, which allows parties to detect if others are online and available to communicate. In this paper, we propose a theory of productivity benefits of presence-aware communication technology, building upon past research. Based on this model, we use a quasi-experimental longitudinal research design with quantitative and qualitative methods to test how providing instant messaging to selected workgroups at a Fortune 1000 company impacts employees attitudes and work behavior. Results suggest that IM use had a positive effect on improving productivity with participants citing reductions in voice mail and phone tag, improvements to how easy it was to see if colleagues were online and available to communicate as well as increased productivity served by back-channel communications conducted via IM. Results and future research directions are discussed.

Panteli, N. & Davison, M. R. (2005). The role of subgroups in the communication patterns of global virtual teams. IEEE Transactions on Professional Communication. 48.2, 191-220
This study was collaboration between the University of Bath, UK, and the City University of Hong Kong, China. The author, researchers represents both the universities and led a group of 47 students by dividing them into 8 subgroups. The research explores the emergence of subgroups in global virtual and the communication pattern of teams in virtual settings. Extensive observation was made for 8 months to analyze the way all the teams communicated on the same projects by using on-line file exchanges, chats, and discussion forums. The study was veryclose to real life scenario because of the geographical proximity and the organizational homogeneity of the members in two different locations. The study shows how misunderstand between team members caused lack in team cohesiveness thus creating boundaries. Although the end result of the task between the team were very good but interestingly the study show there is greater need to have highly skilled team leader to maintain the serenity between the subgroups and to help taking ownership of faults, thus reducing misunderstanding. The study does a great job in discussing the insinuations of the findings and how to apply in practice. As businesses are moving toward outsourcing this study can be used as source in understanding some of the shortcomings of virtual teams and ways to overcome them.

Burn, J. & Barnett, M. (1999). Communicating for advantage in the virtual organization. IEEE Transactions on Professional Communication. 42.4, 215-222
The authors, researchers at the Edith Cowan University, Australia studies six virtual organizational models and explores how the electronic network of virtual organizations rises above the conventional organizations. All these models have some common needs. They all seek for innovative way to come up with low-cost communications technology and employ rich functionality. The models also explore how virtual organizations are dynamic and are going through constant changes. The most stable virtual organization that run most efficiently are the ones that treat communication knowledge as their core need for their infrastructure. The trend to the formation of virtual organizations industry and a lot can be learned from their communication structure which can be applied to the traditional organization and to the formation of their virtual teams.

Zhou, L. (2005). An empirical investigation of deception behavior in instant messaging. IEEE Transactions on Professional Communication. 48.2, 147-160
The author, researcher at the University of Maryland, MD explores the behavioral indicators of deception in virtual group when using instant messaging as a media of communication through qualitative study. He also discovered the difference in linguistic behavior between deceivers and the truth teller. This study is crucial for industries as most are instant messaging or synchronous computer mediated communication now pervades in daily life of the workplace. The study also compares the research on deception in face-to-face communication based on the clue theory with the deception via instant messaging. The interpersonal deception theory from social science was also used to guide the deception research in the group studied using instant messaging. Compared to face-to-face interaction instant messaging is influenced by the lack of incoming social cues as the communicators doesnt get to see the facial expressions. It is important identify these deceptions as organizations interact with each other virtually to reduce project failures. The results from this research can be used to understand knowledge of deception behavior in human communication and be aware of deceptions in the virtual world.

Judith A. H. (2005). Building trust and collaboration in a virtual team. Team Performance Management. 7.3, 36-48
The author from the Holland College, Canada focuses on how building and having trust in virtual organization is important for it to be productive. Organization are moving toward a virtual team environment and to have effective virtual team there needs to me seamless communication between team members and they need to be able to rely on each other without any doubts. She studied six members in a virtual team to find the out how level of trust is important in team effectiveness. She suggest the application of Jung's theory of personality types to assess virtual teams in a positive and laissez-faire way to highlight value of diversity so the team members are at ease to share their personal and work style preferences, thus creating a circle of trust. Trust is need between all kinds of team but it is crucial for virtual team as there is no face-to-face interaction between team members and there is vulnerability for deception.

Jarvenpaa L. S. & Leidner E. D. (1999). Communication and trust in global virtual teams. Organization Science. 10.6, 791-816
The authors, researchers, at the University of Texas at Austin, TX studied three hundred and fifty master's students from 28 universities for six weeks in virtual team setting to explore the how trust was developed through virtual interaction. The study show communication challenges dues o cultural in interpersonal differences and thus creating misunderstanding between team members. The presence of the SIDE theory was found in the study as there were pauses between the members during their interactions which influence individuals to build stereotypical intuitions about each other. In this study we also see the application of Debra Meyersons theory of swift trust but between the team members were very fragile and temporary. There are challenges in virtual team due to geographical distance so organizations need to focus on open communications between the virtual team members so there is less misunderstanding. A productive virtual team cannot be built just with the proper communication tools but there is need for trust, respect, and relationship between team members.





There are faxes for this order.

We will pay $288.00 for the completion of this order!!

The proposal must contain:
1. Title
2. Abstract (or introduction)
3. Literature Review
4. Methods Section
5. Discussion (limitations of study, possible theats to validity and reliability)
There are faxes for this order.

You are to write 4 complete page paper. State the question first and then continue to answer. Each question is to be answered separately. Cite sources inside paper, which include: page number, author, date, and when quoting use quotation marks. Use sources that were faxed!

During the first 15 years of the 20th century, the general form of the undergraduate curriculum as we know it today came into place. Indeed, now the Elective Principle was at full flower. Faculty members, meanwhile, assumed a more professional role. Research played an important role in some new institutions; other new institutions gave priority to undergraduate education. Meanwhile a war occurred and produced strong responses from academe.

Discussion Questions

1.What changes occurred in the undergraduate curriculum and student life during this period?
2.What were Thorstein Veblens concerns during this period? Were they valid?
3.How did the American professoriate change and in what ways did the American Association of University Professors contribute to that change?
4.Which were the prominent new institutions of this period and what did they contribute? How did American higher education respond to World War I?

There are faxes for this order.

Video Game Violence During the
PAGES 15 WORDS 4289

I'm suppose to write an argumentative synthesis paper and my choice of paper is about violent video games and its effects on children. I would be glad if you could weave all these resources together and maybe use some web pages to fill in the gaps. This paper has to avoid any bias and it has to have an argumentative feel with support and it must use the following resources I will fax to you. If any of the resources below does not fill in the gaps can you use only one source of internet if you can please.

The following are the resources below:

www.dimensionm.com/docs/VideoGamesforLearning.pdf

www.aap.org/advocacy/releases/jstmtevc.htm

media violence

video game epilepsy in the twentieth century

media violence research and youth violence data why do they conflict

video games and violence in school

violent video games may spur boys aggression

reducing television, videotape and video game use in children decreased peer rated aggressive behavior


There are faxes for this order.

You are to write 4-complete page paper. State the question first and then continue to answer. Each question is to be answered separately. Cite sources inside paper, which include: page number, author, date, and when quoting use quotation marks. Use sources that were faxed!

Assuming a Presidential Persona
Assume the role of one of the presidents of this important era in American higher education. You may select from the following: James B. Angell (Michigan); Nicholas Murray Butler (Columbia); William Rainey Harper (Chicago); Daniel Coit Gilman (Johns Hopkins); Charles William Elliot (Harvard); David Starr Jordan (Stanford); Charles Van Hise (Wisconsin); or Andrew Dickson White (Cornell). In the presidential persona

Discussion Questions

(a)What can you tell me about your life, especially as it led to the university presidency you now occupy?

(b)What contributions has your institution made to the rise of universities after 1862? Of what are you most proud?

(c)Why were you able to accomplish what you did when you did?

(d)What obstacles did you encounter along the way? Any regrets

There are faxes for this order.

Cell Phone Growth & Resulting
PAGES 13 WORDS 4013

References
Horrey, William & Wickens, Christopher, D. Examining the impact of cell phone conversations on driving. Human Factors: The Journal of the Human Factors and Ergonomics Society, (2006) 48.1, 196-205
Ihnatko, Andy. iPhone Fully Loaded. New York: Wiley, 2008
MacArthur, John, D. Cell Phones and the Brain, Townsend Letter for Doctors & Patients,
July. 2002. 4 June, 2009 http://www.emrpolicy.org/science/forum/macarthur_cell_phones_brain.pdf
Mello, Jr., John P. Road Texting: An Accident Waiting to Happen. TechNewsWorld 08 Aug.
2007. 4 June, 2009
Most, Eric. Calling All Cell PhonesCollection, reuse, and recycling programs in the U.S.
New York City: Inform, 2003
Murray, James B. Wireless Nation. Cambridge: Perseus Publishing, 2001
Novotney, Amy. Dangerous Distraction. Monitor on Psychology (2009) 40.2, 32.
U.S. Census. U.S. Cell Phone Use Up More Than 300 Percent. 9, December 2004.
4, June 2009. http://www.census.gov/Press-Release/www/releases/archives/miscellaneous/003136.html
U.S. Geological Survey Fact Sheet: 2006-2007. Recycled Cell PhonesA Treasure Trove of Valuable Metals. July 2006. 4, June 2009. http://pubs.usgs.gov/fs/2006/3097/fs2006-3097.pdf
Wireless Week. Can You Hear Me Now? 3, April 2003. 4, June, 2009
http://www.wirelessweek.com/can-you-hear-me-now.aspx

Released by the FBI and
PAGES 65 WORDS 17274

Project Title
-------------
Risk Management and Analysis - Process and Policy before Technology

Propsed Abstract
----------------
According to studies released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks on sensitive data and resources reported by organizations occurred from within the organization itself. Implementing an internal security policy appears to be just as important as an external strategy. The objective of this report is to highlight the necessity of internal processes and policy alongside technology when managing and mitigating risk. The author narrates the problems of security from the unseen forces in an individual that influence thought, behavior and personality. Computers do not yet have the intelligence to question human reasoning, understand the human psyche and then take action based upon logical deduction. The subject matter for this dissertation is based the authors own personal working experiences, modules taught in the Master of Software Engineering and course materials used.

Background (maybe part of opening Chapter 1)
----------
Many of the firms in question that I worked for invest significant sums of money per annum into technology, with the newfound belief that software creates the competitive advantage and brings business value to the market place. These assets some of which are tangible require many forms of security to protect them from vandals, hackers, thieves and yes, even competitors. It is the traditional techniques of using hardware and software to manage this risk that the author believes to be the underlying problem of safe keeping their information commodities.

There is not yet a computer with the artificial intelligence, to understand, that one person accessing a system with another persons credentials maybe alarm for suspicion. It cannot discuss this with another peer computer or explain the extra sensory feelings it has to its human superior. It does not have the ability to correlate the companys compliance rule regarding computer access against the activity a person is performing on a machine it knows does not belong to that person.

Just as computers need rules and boundaries in order to operate in, so do people, as a society we remain sure of this. We cannot however assume that the person knows the consequences of their actions, and understands that what they are doing may be wrong based upon the rules which have been put in place by the company. We have to educate and teach first, discipline and enforce last.

The report should demonstrate the use of software engineering subject matter taught in

1. Practical Software Engineering
2. People and Security
3. Security Risk Analysis and Management
4. Security Principles
5. Software Development Management

Requirements (IMPORTANT)
------------
- An Oxford layout

- At the start of each (proper) chapter I'd expect to see a paragraph along the lines of "In this chapter we're going to do X. We're going to start by thinking about Y and then we'll move on to tackle Z.

- The theory of nature versus nurture in software engineering should be the central point to this project. I am trying to theorise that a persons genetic make up and social up bringing (both parental and cultural), has a definative role to play in software engineering. Is it not logical that our traits and imperfections are carried over to become part of the things we create? If so how do we analise this and what do we do to mitigate and manage the risk involved?

Questions to think about
-----------------------

- Why does a person hack computer systems? What makes them do this? Is their a median hacker age? What stats can prove this? If there is an age pattern would that be part of a process company's would implement to help prevent internal hacking based on age, gender, chemical make up? What are the moral implications of such a thing?

Examples would be to analyse some of the major software engineering failures, such as the following, and ask if better process could have been implemented to prevent this from happening -

The AT&T network collapse (1990)
In 1990, 75 million phone calls across the US went unanswered after a single switch at one of AT&T's 114 switching centers suffered a minor mechanical problem, which shut down the centre. When the centre came back up soon afterwards, it sent a message to other centres, which in turn caused them to trip and shut down and reset.

The culprit turned out to be an error in a single line of code -- not hackers, as some claimed at the time -- that had been added during a highly complex software upgrade. American Airlines alone estimated this small error cost it 200,000 reservations.

Mars Climate Observer metric problem (1998)
Two spacecraft, the Mars Climate Orbiter and the Mars Polar Lander, were part of a space program that, in 1998, was supposed to study the Martian weather, climate, and water and carbon dioxide content of the atmosphere. But a problem occurred when a navigation error caused the lander to fly too low in the atmosphere and it was destroyed.
What caused the error? A sub-contractor on the Nasa programme had used imperial units (as used in the US), rather than the Nasa-specified metric units (as used in Europe).

http://www.wired.com/software/coolapps/news/2005/11/69355

Mariner I space probe
A bug in the flight software for the Mariner 1 causes the rocket to divert from its intended path on launch. Mission control destroys the rocket over the Atlantic Ocean. The investigation into the accident discovers that a formula written on paper in pencil was improperly transcribed into computer code, causing the computer to miscalculate the rocket's trajectory.

Article that reflects my thoughts for this dissertation
-------------------------------------------------------

http://jacobian.org/writing/syntactic-sugar/

However, Ive seen this particular assertion all programming languages are the same because theyre all Turing complete used repeatedly as long as Ive been a programmer. It drives me nuts.

Sure, its true on a technical level. Any computer language we write gets interpreted and compiled down to machine code, so at a practical level a C program with a for(;;) loop and a Python list comprehension might end up with the same values flowing over my registers and the same instructions dropping into the CPU. But this reductionist view of programming completely ignores the incredibly important role that language plays in thought.

The traditional view of languages human or computer is that theyre a tool we use to express thought. But modern literary and linguistic theory holds that its a two way street: our thought drives our language, but the language we use leaves an indelible imprint on our thought processes. Im not a linguist, but from what I can tell the Sapir-Whorf hypothesis is the main designator for this idea of language influencing thought.

http://en.wikipedia.org/wiki/Sapir-Whorf_hypothesis

The hypothesis postulates that a particular language's nature influences the habitual thought of its speakers: That is, different language patterns yield different patterns of thought. This idea challenges the possibility of perfectly representing the world with language, because it implies that the mechanisms of any language condition the thoughts of its speaker community.

Theres no question in my mind that this applies full-force to software development: different languages make it easier or harder to conceive of certain types and classes of algorithms. So-called syntactic sugar can make a big difference in efficiency: one language might naturally lend itself to writing a something close to the theoretically optimal case, while another might lead you towards a different, less efficient, solution.

Most importantly, though, is the way that computer languages intersect with our own thoughts. Youll often a developer talk about how his favorite language fits my brain or matches the way I think. As a group of analytical types, we often dismissthese types of assertions in favor of more quantitative measurements of performance or memory consumption. But thats a huge mistake: well always be more productive in a language that promotes a type of thought with which were already familiar.

http://en.wikipedia.org/wiki/Neuroplasticity

According to the theory of neuroplasticity, thinking, learning, and acting actually change both the brain's physical structure, or anatomy, and functional organization, or physiology from top to bottom.

In other words, what you think changes what you *will* think.

http://en.wikipedia.org/wiki/Syntactic_sugar

Bibliographys
-------------
At least 50 or more, here are some that I have been researching already

Journal Articles

[ja1] John Soat, 2008, Tomorrows CIO: Process Before Technology, http://www.informationweek.com/blog/main/archives/2008/06/tomorrows_cio_p.html
[ja2] Matt Blaze, 2004, Safecracking for the computer scientist, http://www.crypto.com/papers/safelocks.pdf

Books

[b1] Bruce Schneier, 2000, Secrets and Lies: Digital Security in a Networked World, ISBN 0471253111, John Wiley
[b2] Drew Miller, Michael Bednarczyk, 2005, Black Hat Physical Device Security: Exploiting Hardware and Software, ISBN 193226681X, Syngress
[b3] Harold F. Tipton, Micki Krause, 2007, Information Security Management Handbook, ISBN 0849374952, CRC Press
[b4] Pierpaolo Degano, 2007, Programming Languages and Systems: 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003 : Proceedings, ISBN 3540008861, Springer
[b5] James S. Tiller, Tiller S. Tiller, 2005, The Ethical Hack: A Framework for Business Value Penetration Testing, ISBN 084931609X, CRC Press
[b6] Albert-Lszl Barabsi, 2003, Linked: The New Science of Networks, ISBN 0738206679, Basic Books
[b7] Watts S. Humphrey, 1997, Introduction to the Personal Software Process, ISBN 0201548097, Addison-Wesley
[b8] Thomas A. Birkland, 2005, An Introduction to the Policy Process: Theories, Concepts, and Models of Public Policy Making, ISBN 0765614898, M.E. Sharpe
[b9] G. David Garson, 1995, Computer Technology and Social Issues, ISBN 1878289284, Idea Group Inc (IGI)
[b10] Louis A. Poulin, 2005, Reducing Risk with Software Process Improvement, ISBN 084933828X, CRC Press
[b11] Bruce Schneier, 2003, Beyond Fear: Thinking Sensibly about Security in an Uncertain World, ISBN 084933828X, Springer
[b12] Kevin David Mitnick, 2002, The Art of Deception: Controlling the Human Element of Security, ISBN 0471237124, John Wiley and Sons
[b13] Eric Gander, 2003, On Our Minds: How Evolutionary Psychology is Reshaping the Nature-versus-nurture Debate, ISBN 0801873878, JHU Press
[b14] Lorrie Faith Cranor, Simson Garfinkel, 2005, Security and Usability: Designing Secure Systems that People Can Use, ISBN 0596008279, O'Reilly
[b15] Ross Anderson, 2001, Security Engineering: A Guide to Building Dependable Distributed Systems, ISBN 0470068523, John Wiley and Sons

World Wide Web

[www1] Wikipedia, (2008), Wile E. Coyote and Road Runner, http://en.wikipedia.org/wiki/Wile_E._Coyote_and_Road_Runner
[www2] Wikipedia, (2008), Cash is King, http://en.wikipedia.org/wiki/Cash_is_king
[www3] Wikipedia, (2008), Disk Cloning, http://en.wikipedia.org/wiki/Disk_cloning
[www4] Wikipedia, (2008), Firewall, http://en.wikipedia.org/wiki/Firewall
[www5] Wikipedia, (2008), Intrusion detection system, http://en.wikipedia.org/wiki/Intrusion-detection_system
[www6] Wikipedia, (2008), Virtual private network, http://en.wikipedia.org/wiki/Vpn
[www7] Wikipedia, (2008), Smart Card, http://en.wikipedia.org/wiki/Smart_card
[www8] Wikipedia, (2008), Anti-virus, http://en.wikipedia.org/wiki/Antivirus
[www9] Wikipedia, (2008), Encryption, http://en.wikipedia.org/wiki/Encryption
[www10] Wikipedia, (2008), Nature versus nurture, http://en.wikipedia.org/wiki/Nature_versus_nurture
[www11] Kimberly Powell, (2008), Nature vs. Nurture - Are We Really Born That Way?, http://genealogy.about.com/cs/geneticgenealogy/a/nature_nurture.htm

(1500 to 2000 words, not counting the title page and the Reference section) and context (you are writing an undergraduate paper) of your project.

Ensure there is enough literature/sources out there to support your research.

Parts of the Paper
1. You must have a title page.
2. You may choose to include an Abstract, but this is not a requirement. If you choose to include an Abstract it should be 100 to 250 words. It should be single-spaced. It should summarize the papers topic, purpose(s) and main research finding(s). Your Abstract should not be or read like an introduction.
3. Your paper should have an Introduction. This section will introduce your paper and will contain your research question and thesis. Your thesis is your answer to your research questions. Your thesis may be in the form of a hypothesis, multiple hypotheses or generalization(s). It is recommended that you limit your thesis to just one or two hypotheses and/or generalizations.
4. The body of your paper will contain the discussion of your thesis. This is where you present facts and arguments to thoroughly support your thesis. Your facts and arguments must be backed up by research. Arguments must be logical and contextually credible.
5. The conclusion must give a summary of the main points. It should not introduce new facts and ideas, i.e., facts and ideas that do not appear in the Introduction and or the body of your paper must not appear in the Conclusion.
6. You must have an Reference section in APA formatting. Out of the total of 15 sources, you should probably have at least 3 scholarly sources. Scholarly sources are sources written by scholars and published in academic/professional journals. They are typically focused, detailed and peer-reviewed.

Some additional background material for same sex marriage:

For some years, same-sex marriage (SSM) has been near or at the top of any list of leading religious/secular/political controversies in North America. It is complex, divisive, and not readily amenable to compromise. After all, U.S. states either allow SSM or ban it.

Any change, or threat of change, to the culture is distressing to many people. But a change to the structure of the fundamental building block of society -- the family -- can be particularly upsetting.

SSM has split the U.S. by:

Age: Youth and young adults are generally for SSM; the elderly are against.

Political affiliation: Democrats in are favor, Independents less so, Republicans opposed.

Religion: Conservatives opposed; religious liberals and secularists for.

Geography: The northeast and west coast for; the rest against.


Most American adults currently oppose SSM, but the trend is towards increasing acceptance. If current trends continue, most American adults will be supportive of SSM sometime in the early to middle 2010's.

LivingVote.org has followed the debate over Proposition 8 in California, which terminated SSM in that state. LivingVote's visitors have posted three arguments for and three against SSM which seem to reflect Americans' main concerns:

Arguments for SSM:

Dignity & respect: "The institution of marriage conveys dignity and respect towards a couple that make a lifetime commitment to support each other. "Same-sex couples deserve this dignity and respect."

Equal rights: Denying marriage to same-sex couples removes from one group a fundamental, important human right -- the right to marry the person that one loves and to whom one has made a commitment. That is unfair and unjust in a democracy.

Financial & security: Denying one group the right to marry has many adverse emotional and financial consequences. Examples are Social Security, Medicare, medical leave, and other benefits; property inheritance; the right to visit their spouse in hospital, and make medical decisions if they are incapacitated; security of the couple and of their children.

Arguments against SSM

Religious freedom: For most Americans, marriage is a religious sacrament or ceremony. If the definition of marriage is changed to allow SSM, religious individuals and groups become at risk of having to violate their beliefs by marrying same-sex couples.

Children benefit: Many researchers have found that children thrive best when reared in a home with a married mother and father. Boys and girls have needs that are uniquely met by parents of the opposite gender.

Teaching about SSM: The role of marriage in society is a major topic taught in public schools. If SSM is legalized, schools would be required to teach that same-sex marriage is equivalent to opposite-sex marriage, starting as early as Kindergarten.

I need a two-page essay. Heres a question.
Explain the interrelationship of land expansion by the United States and the effect on Blacks. (First answer what happened to the people that lived on the countries of Cherokee, Creek and Mexico-Tejas as the US expanded and what effect did this have on the institution of slavery that was defined by race).
How far did the US go in their land conquest?

Thanks!

Advertising and Word of Mouth
PAGES 22 WORDS 9576

The following is the paper outline:

1. Consumer Behaviour
1.1 Definition
1.2 The Importance of Consumer Behaviour
1.3 Factors affecting consumer behaviour (Cultural, Social, Personal, Psychological etc...)

2. Decision Making Process Theories
2.1 Definition of Decision Making Process
2.2 Howard-Sheths Theory
2.3 Consumer Black Box Model
2.4 Five Stages Model (Problem recognition, Information search, alternative evolution, purchase decision, post-purchase behaviour)

3. Advertising
3.1 Definition
3.2 How does Advertising Work?
3.3 Factors affecting Advertising
3.4 Advertising in the Service Industry
3.5 Effectiveness of the Mobile service providers advertising

4. Word of Mouth
4.1 Definition
4.2 Effectiveness of word of mouth
4.3 Factors affecting word of mouth
4.4 Positive and Negative word of mouth
4.5 The Internet word of mouth (web 2.0)

5. Comparison between Advertising and word of mouth
6. Influence of Advertising on Consumer Decision making process
7. Influence of Word of Mouth on Consumer Decision making process
8. Summary of Literature Review Section (Conclusion).

? The paper has to be a good critical piece of the literatures and the use of Figures is important such as the simplified version of Howard-Sheth Model, Consumer Black Box Model and so on.
------------------------------------------------------------
The following is 33 references that must be used + any other related 17 references to the subject (Most of them (14 Articles at least) must be Articles from a well known Marketing or Management Journals), which I can get access to very easy.

1. Chisnall Peter M, (1995) Consumer Behaviour, 3rd edition.
2. Smith & Taylor (2004) Marketing Communication an Integrated Approach, 4th Edition.
3. Chisnall Peter M, (2005) Marketing Research, 7thedition.
4. Gremler Dwayne et al (2001) Generating Positive Word-of-Mouth communication through customer-Employee Relationships. International Journal of Service Industry Management.
5. Schiffman Leon & Lazar Kanuk Leslie (2007) Consumer Behaviour, 7th edition.
6. George Silverman (2001) The Secrets of Word-of-mouth Marketing
7. Kotler Philip (2009) Marketing Management, 13th edition.
8. Kotler Philip (1997) Marketing management: analysis, planning, implementation, and 9. control, 9th edition.
10. Solomon Michael et al (2002) Consumer Behaviour A European Perspective, 2nd edition.
11. Fill Chris (2009) Marketing Communication, 5th edition.
12. Shimp Terence (2007) Advertising Promotion and Supplemental Aspects of Integrated Marketing Communication, 7th edition.
13. Mangold & Miller (1999) word-of-mouth communications in the service marketplace, Journal of Service Marketing.
14. Foxall Gordon (1998) Consumer Psychology for Marketing, 2nd edition.
15. George E. Belch & Michael A. Belch (2009) Advertising and promotion: an integrated marketing communications perspective, 8th edition.
16. Friestad Marian (1995) Persuasion knowledge: Lay People's and Researchers' Beliefs about the Psychology of Advertising. Journal of Consumer Research.
17. Peter, J. Paul (1999) Consumer Behaviour and Marketing Strategy, European edition.
18. Blackwell, Roger et al (2006) Consumer Behaviour, 10th edition.
19. Ueltschy L & Krampf R (2001) Cultural Sensitivity to Satisfaction and Service Quality Measures, Journal of Marketing Theory and Practice.
20. Rossiter J & Percy L (1997) Advertising communications & promotion management, 2nd edition.
21. Schultz D (1995) what is direct marketing, Journal of Direct Marketing.
22. Weilbacher W (2003) How advertising Affects Consumers, Journal of Advertising Research.
23. Barnard N & Ehrenberg A (1997) Advertising: Strongly Persuasive or Nudging? Journal of Advertising Research.
24. Charlett D & Garland R (1995) How damaging is negative word of mouth? Marketing Bulletin.
25. Bone P (1995) Word of mouth effects on short-term and long-term product judgment, Journal of Business Research.
26. Lam D, Mizerski D & Lee Alvin (2005) Cultural Influence on word of mouth communication, AMA Winter Educators Conference Proceedings.
27. Sweeney J, Soutar G & Mazzarol T (2008) Factors influencing word of mouth effectiveness: receiver perspectives, European Journal of Marketing.
28. Grewal R, Cline T & Davies A (2003) Early Entrant Advantage, word of mouth communication, Brand Similarity and the consumer Decision marking process, Journal of Consumer Psychology.
29. Stauss B (1997) Global word of mouth, Marketing Management.
30. Riegner C (2007) Word of mouth on the Web: The Impact of Web 2.0 on Consumer Purchase Decisions, Journal of Advertising Research.
31. Donaton S (2003) Marketings new fascination: figuring out word of mouth, advertising Age
32. Gildin S (2003) Understanding the Power of Word of mouth, Revista de Administrao Mackenzie
33. Jobber D (2007) Principles and Practice of Marketing, 5th edition.

Read one of the two following books: A Brilliant Solution: Inventing the American Constitution by Carol Berkin or Decision in Philadelphia: The Constitutional Convention of 1787 by Christopher and James Lincoln Collier. Write an essay of about 2000 words discussing how the author describes the Constitutional Convention and ratification of the Constitution. Explain in what ways the authors description of the process, goals, and results differs from Middlekauff's. Discuss the uniqueness of the creation of the American polity.

write an essay that answers the question, why is kings letter considered a classic argument? include the logical, ethical emotional proof with detail examples. how dose MLK present his claim and stablish his credibility? what makes the letter relevant in modern times?

4 to 5 page paper single spaced, use your gudgment and write well explained and well supported response. the response is not limited to these questions.

explain the logical argument of his letter his claim, include the ethos, pathos and logic of his letter.

what are the charges against him, and how are they refuted, and how is his cridibility built.

explain his charges of unjust and untimly mannerand, also MLk complaines about the justice they are recieving. he complains that the officers obeying law of the government that is an unjust law,. what is a just and an unjust law. how is he refuting the charges of the outsider with the other clergymen.

these are all the critical points of this essay please, make sure you read the letter carefully and undrestand the charges and his refute. and gave some moving examples.

i have to get an A for this essay, so plzz make sure it is A quality paper.

work cited is required too. please attach that for me.

Background research on topic must Include:

The Extent of the Problem: Use (national, state, local) data/information to show the need for counseling.

Behavioral Characteristics: Describe observable symptoms.

Counseling Strategies: Describe counseling approaches, techniques and topics that have been used (or are suggested for use) when covering this issue.

 Label each of the above sections in paper
 Support all ideas with research!!
 Use at least 4 current references (journal articles within the past 10 years)

Sample of Research paper:

Violence in schools is a topic that has become talk of the media in recent years after incidents like Columbine and Virginia Tech. Although school violence is discussed when a
major incident occurs, it is rarely talked about in terms of violence in dating relationships. Schools are acting to address the issue of active shooters but by failing to address the more common issue of dating violence, they are opening themselves up to liability issues as well as
molding a future generation of students with severe roblems. Schools are not only involved with shaping the minds of our adolescents but also their character. This puts school counselors in a unique position to address dating violence by promoting positive alternatives and creating a
safer school climate. Dating violence among adolescents is rarely addressed from the perspective of prevention. Most schools only address issues of violence post crisis which sends mixed messages about the importance of prevention. Therefore, the schools response, or lack there of,
to dating violence teaches valuable lessons as well.

Extent of the Problem:

In the United States, teens are the fastest growing population at risk for dating violence.
According to the Center for Disease Control (CDC), 1 in 5 adolescents reports being a victim of physical dating abuse, with the numbers dropping to 1 in 3 when verbal, emotional and sexual abuse are included (CDC, 2006). States seem to mimic the national statistics as well. According
to the California Student Survey, 5% of 9th graders and 8% of 11th graders reported at least one incidence of dating violence in their relationships (Austin & Skager, 2004). In addition to physical violence, many teens are reporting unwanted sexual experiences as part of the violence
included in their relationships. Nearly all female teenage rape victims know their attacker with 11% identifying the attacker as their boyfriend (CDC, 2006). In our high schools, teenage dating violence could be called the silent epidemic. This is because many teens fail to report these acts of violence. Molidor and Tolman (2001) state that only 3% of students reported an abusive incident to an authority figure and even more frightening is that 40% report someone else witnessing the abuse and failing to report it. In addition to remaining silent about the abuse, many girls tend to remain with the abuser. About 80% of girls who have been physically abused in their relationships continue to date their abuser after violence has begun (Moles, 2001).
Why should dating violence be a schools concern? Dating violence is a direct threat to a schools safety. Californias State Constitution reads schools must provide a safe, secure and peaceful environment for our students (California State Constitution, n.d.). This form of
violence compromises a schools ability to provide that safe environment. First, some dating violence literally takes place on school grounds. Approximately 43% of teen dating violence victims reported that the dating abuse they experienced occurred in a school building or on school grounds (Molidor & Tolman, 2001, p. 180). Second, victims of teen violence are more likely than other students to be involved in other forms of violence on school grounds. A
California study found that ninth grade victims of violence are 6.4 times more likely to have carried a gun to school and 3 times more likely to have been in a physical fight at school (Austin & Skager, 2004). Finally, by ignoring the problem schools send a loud message that violence is
an acceptable behavior. Therefore, by failing to address the issue of teen dating violence schools are not only shirking their responsibility of providing a safe learning environment which could result in liability issue if violence occurs but they are as the statistics show opening up the school to other forms of violence as well.

Behavioral indicators:
Dating violence impedes academic success and threatens those who are victims with other issues that interfere with academics. Girls experiencing relationship violence often feel self-conscious, afraid, do not want to go to school, and find it hard to pay attention (OKeefe,2005). Girls may feel unsettled or frightened of their abusers who most likely attend the same school which causes an inability to focus on school work. Among 9th and 11th graders in
California, teen dating violence victims were twice as likely to have grades of mostly Ds or Fs as other 9th and 11th graders (Austin & Skager, 2004).
In addition to school work problems, violence contributes to health and safety issues
among victims. Victims of teen violence are also at considerably higher risk of engaging in
harmful behaviors such as using alcohol, tobacco, and drugs, becoming pregnant, developing
eating disorders, risky sexual behavior and considering or attempting suicide (Silverman, Mucci,
Raj & Hathaway, 2001). These behaviors are both indicators that something is impeding the
students ability to learn and warning signs that abuse might be occurring in their relationships.
Some common warning signs can be observed by those who have regular and consistent
contact with teen dating violence victims, including school staff. These include: physical signs of
injury, truancy, failing grades, indecision, changes in personality, use of drugs/alcohol,
emotional outbursts, isolation, depression and lowered self-esteem (OKeefe, 2005)
As prevalent as teen dating violence is in todays society, schools that fail to address the
problem are failing their students. An effective school will take the proactive approach to dating
violence and develop programming to address it before an incident occurs.

Counseling Strategies:
Many of the studies have all agreed that schools need to take a proactive approach in creating a
safer school concerning dating violence. Besides preventing current problems in their schools,
these programs seek to develop positive healthy adults. Davis and Benshoff (2000) state that as
dating is common among adolescents it is this critical time that can provide pivotal experiences
that help adolescents define how they will interact, positively or negatively, within future dating
relationships and intimate partnerships (395). Teaching students the basics of healthy
relationships will help them form the foundations upon which to develop positive future
relationships. Therefore, early intervention is important in changing harmful lessons teens will
learn about relationships as well as interpersonal behavioral patterns (Davis & Benshoff, 2000).
Studies conducted on current prevention programs have noted some common areas that
have been successful in changing attitudes and behaviors around teen dating violence. Effective
prevention programs have included education about the different forms of dating violence,
understanding dynamics of power and control, early warning signs, and aspects of healthy and
unhealthy relationships (OKeefe, 2005). In addition, programs that have shown promising
results have included skill building around effective communication, conflict resolution, selfesteem
respect and honesty (Feiring & Furman, 2000).
Finally effective programs have been shown to teach prevention, intervention and
treatment. Hallfors, Young, Sanchez, Martin & Kupper (2004) state that programs should not
only teach young people how to avoid an abusive relationship, but to also teach them how to help
a friend who might be in one. After reviewing the literature, it seems the most effective programs
ar those that are multifaceted addressing several areas with a focus on education and skills
acquisition.

Gas Prices Are Beginning to
PAGES 4 WORDS 1439

I need a essay paper in APA format On the Causes of why gas prices have risen so dramatically in the past 30 months. Supply and demand issues State taxes on gas ect.

Racism by the Time "Everything
PAGES 5 WORDS 1565

This assignment is for : Hophead
-------------
http://www.geocities.com/cyber_explorer99/oconnorconverge.html

Compose a 5 page essay in response to the link above. Present a clear claim about the text and support it with reasons and evidence from the work of fiction and from "outside sources" really important to find out side sources that support the claim. In other words, construct an argument that sets forth your own interpretation and the findings of your research. While you should use evidence from the stories, do not quote extensively or use quotes that are more than three lines long. Do not give a plot summary.
-----
You will incorporate 5 outside sources in the essay, consult literary critics and use your findings to enrich your writing. Sources should be documented using MLA style, and the essay should include a works cited page.
------
Considering OConnors Everything That Rises Must Converge, make an argument
regarding EITHER 1) the storys perspective on racial and/or social class stereotypes and prejudice
OR 2) the problems of interpretation created by limited point-of-view in the story (i.e. an unreliable narrator). Use evidence from the text to support your points and argument.

No paper should composed based purely on web sites. The number of written or published citations should exceed web sites. Footnotes should be utilized for both directly and indirectly quoted information. you may use either standard footnote formatting at the end of the page or at the end of the paper or short footnotes withen the text. (an example of the latter would be: Thomas 1994:27-28, referring to a complete Thomas dietitian in the Bibliography.)
The paper should not only talk about the pottery itself but also focus on culture and beliefs surrounding the creation and use of these art forms.

Hugo Black When One Considers
PAGES 10 WORDS 3200

The paper will examine the judicial career of Justice Hugo Black. President Roosevelt appointed Black with two goals in mind. One, to curry favor with Southern Democratic voters. Second to interpret the Constitution broadly to allow New Deal programs. The paper should be organized into three parts.

part one: to what degree did Black write and vote to advance the goal of winning Southern voters? Please use two Supreme Court cases as examples. This should be about 3 pages

part two: to what degree did Black write and vote to advance the goal of allowing New Deal programs. Please use two Supreme Court cases as examples. this should be about three pages.

part three: what does Black's career say about political influences on the Supreme COurt? Basically, did Black's appointment meet the president/s goals? In this case, it did with regard to New Deal programs but did not in terms of gaining the Southern vote, especially in light of Black's votes in racial cases.

Civil War How the Civil
PAGES 7 WORDS 2408

Please Submit in Word Document form.
From Syllabus: The Civil War ... how did this event shape our national views on freedom, democracy, justice and equality, and how was this event shaped by forces of geography, politics, society, and economics? Also, discuss the influence of leadership in this conflict, with specific views and comment on Lincoln, Grant and Lee. Comment on if you believe this event continues to influence our nation, and what the speeches and thoughts of Lincoln have meant to the development of our nation and its culture over the years.

Professor likes G. Ward's book on Civil War and Gettysburg. Thinks Lincoln was country's finest communicator/speechwriter (of course, hasn't met you!:)

Your topic should be sufficiently narrow that you have to complete some in-depth research to write your term paper. You should have a minimum of 12 sources that include both index and internet resources.
I will discuss how sugar is converted into fuel and also discuss its efficiency. I will also include in my paper information about the different technologies used to convert this natural resource into fuel and how the military will benefit from this phenomenon. If it is known that sugar is an ingredient in the soda, Mountain Dew, and it surely does give us a boost, why cant our electronic devices and vehicles go on a sugar high to get them moving too?

Nation of Islam Has Been
PAGES 3 WORDS 870

This paper should be clearly written. it will be graded on style, and correct use of grammar, spelling, punctuation, footnotes and paragraphing. the paper should not simply be a retelling of class lectures but should manifest your own research on the topic you have chosen. Most problems: mechanical errors, lack of a clear focus, lack of a conclusion, not following directions, not citing your sources, problems with the works cited page. i will like (Writers
Order ID: 102172)for very good job and get A. Thanks a lot. just remind again, i am international student so do not need very perfect paper and my goal is A. Allow to have few grammar mistake.

5 pages, include Hervey Cleckley and his work on psychopathy, psychopath, and sociopath.Also up to date info as well. APA format.

Case Study
The CEO of eBay recently said that the popular online auction site is enabling a kind of e-commerce that didnt exist to any extent before, and thats person-to-person e-commerce. Like garage sales, online auctions bring together buyers and sellers. Web auction sites have been described as combining extensive classified ads with the excitement of a television game show. To foster trust in brokers and bidders, some online auctions even provide chat boards where people can share tips and feedback.

Web auction sites are particularly useful for buyers and sellers of unusual items. Pierre Omidyar, who founded eBay in 1995, started the site in an effort to add to his girlfriends collection of Pez candy dispensers. Today, you can use Web auction sites to buy everything from Beanie Babies and baseball cards to expensive jewelry and art.

Visit a Web auction site.
1) How does the site work?
2) What types of items are available on the site? Could you find similar items elsewhere?
3) What, if any, guarantees are available?
4) Are any additional services available (such as a chat board)?
5) Some people insist that, although Web auction sites are entertaining, they are not necessarily inexpensive (after all, the selling price is the highest price offered). In general, are costs at the Web auction site low or high?
6) Would you make a purchase at a Web auction site? Why or why not?

Write a brief report on the findings of your research as outlined above. You must have at least three sources (see the example Case Study on how to format your sources).

image
4 Pages
Essay

Components of a Succession Plan

Words: 1501
Length: 4 Pages
Type: Essay

I am creating a section of the literature review chapter which research is needed on the following question: What are the detailed components of a Succession Plan? References should be of…

Read Full Paper  ❯
image
12 Pages
Research Paper

Aviation Strategy Workplace Diversity May

Words: 3588
Length: 12 Pages
Type: Research Paper

Specific Topic: How has Workplace Diversity Lead to Improved Organizational Performance Needs to have at least 14 sources, of which, internet references are not substitutes for original sources unless they…

Read Full Paper  ❯
image
15 Pages
Essay

John Locke: Political Thought on

Words: 4766
Length: 15 Pages
Type: Essay

This class is Liberty and Property, about The political thought of John Locke. It is very important that a writer is very familiar or well knowledged with John Locke.…

Read Full Paper  ❯
image
12 Pages
Research Paper

Cross Cultural Communication Interpretation Across

Words: 4205
Length: 12 Pages
Type: Research Paper

Use Chicago Manual of Style. I need the bibliography and work cited information along with my order for free. I provided 11 reference materials to use. Along with that…

Read Full Paper  ❯
image
12 Pages
Essay

Grammar Instruction Hybrid Grammar Instruction

Words: 4321
Length: 12 Pages
Type: Essay

We will pay $288.00 for the completion of this order!! The proposal must contain: 1. Title 2. Abstract (or introduction) 3. Literature Review 4. Methods Section 5. Discussion (limitations of study, possible theats to…

Read Full Paper  ❯
image
4 Pages
Research Paper

Education Growth, Diversification and Change

Words: 1232
Length: 4 Pages
Type: Research Paper

You are to write 4 complete page paper. State the question first and then continue to answer. Each question is to be answered separately. Cite sources inside…

Read Full Paper  ❯
image
15 Pages
Essay

Video Game Violence During the

Words: 4289
Length: 15 Pages
Type: Essay

I'm suppose to write an argumentative synthesis paper and my choice of paper is about violent video games and its effects on children. I would be glad if…

Read Full Paper  ❯
image
4 Pages
Research Paper

Education Assuming a Presidential Persona

Words: 1230
Length: 4 Pages
Type: Research Paper

You are to write 4-complete page paper. State the question first and then continue to answer. Each question is to be answered separately. Cite sources inside paper,…

Read Full Paper  ❯
image
13 Pages
Essay

Cell Phone Growth & Resulting

Words: 4013
Length: 13 Pages
Type: Essay

References Horrey, William & Wickens, Christopher, D. Examining the impact of cell phone conversations on driving. Human Factors: The Journal of the Human Factors and Ergonomics Society, (2006) 48.1, 196-205…

Read Full Paper  ❯
image
65 Pages
Research Paper

Released by the FBI and

Words: 17274
Length: 65 Pages
Type: Research Paper

Project Title ------------- Risk Management and Analysis - Process and Policy before Technology Propsed Abstract ---------------- According to studies released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks…

Read Full Paper  ❯
image
6 Pages
Essay

Same-Sex Marriage: An Idea Whose

Words: 2289
Length: 6 Pages
Type: Essay

(1500 to 2000 words, not counting the title page and the Reference section) and context (you are writing an undergraduate paper) of your project. Ensure there is enough literature/sources…

Read Full Paper  ❯
image
2 Pages
Research Paper

U.S. History Like Many Colonialism

Words: 631
Length: 2 Pages
Type: Research Paper

I need a two-page essay. Heres a question. Explain the interrelationship of land expansion by the United States and the effect on Blacks. (First answer what happened to…

Read Full Paper  ❯
image
22 Pages
Essay

Advertising and Word of Mouth

Words: 9576
Length: 22 Pages
Type: Essay

The following is the paper outline: 1. Consumer Behaviour 1.1 Definition 1.2 The Importance of Consumer Behaviour 1.3 Factors affecting consumer behaviour (Cultural, Social, Personal, Psychological etc...) 2. Decision…

Read Full Paper  ❯
image
9 Pages
Research Paper

Constitutional Convention a Brilliant Solution

Words: 2645
Length: 9 Pages
Type: Research Paper

Read one of the two following books: A Brilliant Solution: Inventing the American Constitution by Carol Berkin or Decision in Philadelphia: The Constitutional Convention of 1787 by Christopher and…

Read Full Paper  ❯
image
4 Pages
Essay

Martin Luther King's Letter From

Words: 1287
Length: 4 Pages
Type: Essay

write an essay that answers the question, why is kings letter considered a classic argument? include the logical, ethical emotional proof with detail examples. how dose MLK present…

Read Full Paper  ❯
image
3 Pages
Research Paper

Policy Development in Criminal Justice

Words: 912
Length: 3 Pages
Type: Research Paper

Background research on topic must Include: The Extent of the Problem: Use (national, state, local) data/information to show the need for counseling. Behavioral Characteristics: Describe observable symptoms. Counseling Strategies: Describe counseling approaches,…

Read Full Paper  ❯
image
4 Pages
Essay

Gas Prices Are Beginning to

Words: 1439
Length: 4 Pages
Type: Essay

I need a essay paper in APA format On the Causes of why gas prices have risen so dramatically in the past 30 months. Supply and demand issues State…

Read Full Paper  ❯
image
5 Pages
Research Paper

Racism by the Time "Everything

Words: 1565
Length: 5 Pages
Type: Research Paper

This assignment is for : Hophead ------------- http://www.geocities.com/cyber_explorer99/oconnorconverge.html Compose a 5 page essay in response to the link above. Present a clear claim about the text and support it…

Read Full Paper  ❯
image
5 Pages
Essay

Lapita Pottery the Native Peoples

Words: 1791
Length: 5 Pages
Type: Essay

No paper should composed based purely on web sites. The number of written or published citations should exceed web sites. Footnotes should be utilized for both directly and indirectly…

Read Full Paper  ❯
image
10 Pages
Research Paper

Hugo Black When One Considers

Words: 3200
Length: 10 Pages
Type: Research Paper

The paper will examine the judicial career of Justice Hugo Black. President Roosevelt appointed Black with two goals in mind. One, to curry favor with Southern Democratic voters. Second…

Read Full Paper  ❯
image
7 Pages
Essay

Civil War How the Civil

Words: 2408
Length: 7 Pages
Type: Essay

Please Submit in Word Document form. From Syllabus: The Civil War ... how did this event shape our national views on freedom, democracy, justice and equality, and how was this…

Read Full Paper  ❯
image
6 Pages
Research Paper

Converting Sugar Into Fuel Man's

Words: 2102
Length: 6 Pages
Type: Research Paper

Your topic should be sufficiently narrow that you have to complete some in-depth research to write your term paper. You should have a minimum of 12 sources that include…

Read Full Paper  ❯
image
3 Pages
Essay

Nation of Islam Has Been

Words: 870
Length: 3 Pages
Type: Essay

This paper should be clearly written. it will be graded on style, and correct use of grammar, spelling, punctuation, footnotes and paragraphing. the paper should not simply be a…

Read Full Paper  ❯
image
5 Pages
Research Paper

Psychopathy a Concealed Personality Defect

Words: 1519
Length: 5 Pages
Type: Research Paper

5 pages, include Hervey Cleckley and his work on psychopathy, psychopath, and sociopath.Also up to date info as well. APA format.

Read Full Paper  ❯
image
1 Pages
Essay

Online Auction Sites Including Ebay

Words: 462
Length: 1 Pages
Type: Essay

Case Study The CEO of eBay recently said that the popular online auction site is enabling a kind of e-commerce that didnt exist to any extent before, and thats person-to-person…

Read Full Paper  ❯