Saturday, January 25, 2020

Planning a Game Show

Planning a Game Show Title: All About Women Genre : Television Game Show Logline: It is all about eight women with lack of confidence go on a trip to learning a lot of skills from playing games to reinvent themselves, from an ugly duckling to the white swan. Objectives The main objective of this show is to change people’s behaviour to makeover themselves to be more confident in their life. People nowadays are lazy to be nice on their inner and outer beauty, so this show is to make them to have the motivation of changing themselves to be better. Secondly, our objective is to increase their knowledge of beauty. Women nowadays normally they are lack of the knowledge of beauty. In this show, we invited a lot of professional make up stylist to guide those competitors to make up, diet and so on. Lastly, our objective is to change the attitude of women by making them more attractive. There are no ugly women but lazy women in this world. Some people think that natural is beautiful. But after 20 years old, it no longer works. Through the game show, they will reinvent themselves into perfect women. Synopsis Theme: fantasy fulfilment â€Å"All About Women†, is the Malaysian Television game show. It is the first television game show to offer a Royal beauty treatment to the winner. This show will air every Sunday at 8.30pm on 8tv. â€Å"All About Women† is to help those women who are lack of confidence on themselves in the Malaysia. We will seek the competitors through some interview. Program group are choose 8 competitors to our TV game show. In the beginning, competitors will have a lot of training such as makeup, dressing and so on. After that, there will have small station game to test the competitors. The participant will get marks according to their performance in the station game. These marks is helpful in semi-final as the participant will get some mysteries gift that will boost them to get marks in the semi-final. The last two episodes are our semi-final and final. In the later period of the contest the progress of the competitors is determined 70% by public voting through text messaging or social media and 30% judged by three judges, Jimmy Lee, Grace Wang and Bernard Chandran. The show is hosted by Natalie Ng. Target Audiences The primary audience that we targeted for this show is Malaysia women and men with the age range between 20 to 55 years old. This range of people is more mature in their thinking and they can understand well about the importance of take care for their outer look. Besides that, they are more affordable in buying things to make them look more beauty. After that, this show is joyful and knowledgeable. They can watch this show in weekend to release their stress and also increase knowledge. The secondary audience that targeted for this show is all teenagers that between 13 to 19 years old. The range of this teenagers are more concern about their skin condition. Teenagers nowadays are more likely to care about their inner and outer beauty. So this TV shows can attract them to watch. Besides that, teenagers like to watch something special and excite so they will choose to watch this TV show as they will felt excited when participant are playing station games. Moreover, this TV show is first broadcast during their holiday so they are free to watch the show. Host The host that we invited is Ms. Natalie Ng. (refer to appendix 1.) She had been working for the English and Chinese markets in 2007. She had confidence to take Malaysia market after she finished her Diploma in Mass Communication. She is 8TV’s Entertainment Live Show 8 E-news in year 2008 to 2013. She had also won the 2012 Golden Award for Most Popular Host. Mentor The first mentor that we invited is Mr. Wang Ming Yong (refer to appendix 2.) which will be shown in episode two. Mr. Wang Ming Yong is a healthcare professional from Taiwan. He had studied at Australian School of Herbal Medicine. He is also a well-known dietary nutrition health care consultant. Mr. Wang had be invited before to the ‘Ladies First’ and ‘Health 2.0’ as counsellor of health care. The second mentor that we invited is Mr. Robin Niu (refer to appendix 3.) and he will appear in episode three. Mr. Robin Niu is a skin care professional which is also from Taiwan. Everyone address him as ‘Beauty King’ in Taiwan. He is graduated from a medical school in Taiwan. He have 18 years of experience in investigating skin care product. He get an award by Sogua for the most outstanding contribution to beauty. Mr. Robin have his own brand name ‘Naruko’ which is favourite by billion online users in China. This is the only beauty brand that been awarded the 2009 Top 80 Most Trusted Celebrity Brands and Best New Brand 2010 in Taiwan and China. The third mentor that we invited is Mr. Jimmy Lee (refer to appendix 4.) from Melaka that will be in episode four. Mr. Jimmy Lee is a hair stylist which have 8 years of experience in the hair do industry. When he was 18 years old, he is studying at Hair Connection Academy that is located in Bukit Bintang, Kuala Lumpur. He had also once been offered to be Hair Lecturer by Snips Academy in Sabah for 4 years. He now had formed A ‘Hair and Makeup Art Studio Academy’ in Sabah with Ms. Ryana Yong. The fourth mentor that we invited is Ms. Grace Wang (refer to appendix 5.) that will be in episode five. She is a makeup artist and have 5 years of experience. Ms. Grace Wang is more professional in bridal makeup. She had completed her hairstyling and makeup course in Taiwan and now all the product that she use is high quality product such as Mac, Bobbi Brown, Lancome and more. She also believes that makeup will enhance personal features and will make people feel good about themselves. The last mentor that we invited is Mr. Bernard Chandran (refers to appendix 6.) that will be on episode six. Mr. Bernard Chandran is a fashion designer and people call him as ‘Malaysia’s Prince of Fashion’. He is a former student of prestigious Paris American Academy in France. He is also the local Celebrities most favourite fashion designer. His cloths infused with bold colours and draw inspiration of Malaysia’s multicultural influences. Mostly of his collection is made up of complex, traditional Malaysian costume with modern touches. Mr. Bernard Chandran collection had been worn by Hollywood Stars and also Lady Gaga. Channel The TV games shows will be on air at 8TV, from every Sunday 8:30pm to 9:30 pm. The first episode will be on air at 15 March 2015 while the last episode will show on 3 May 2015. 8 TV is one of the free-to-air TV stations that are privately owned by Media Prime Berhad in Malaysia. The reason we choose 8 TV as the channel to broadcast this TV game show is the target audience of 8TV is similar to this show which is Chinese audiences and urban youth. Besides that, we choose to broadcast this games show at Sunday as Sunday is weekend and most of the Malaysians are not working or studying at that day. Most of the Malaysian will customarily watch the Chinese news that broadcast at 8:00pm so the show is on air at 8:30pm as we wish to attract the attention of audience after watching the news. Furthermore, this games show will start to broadcast during the school holiday of primary school and secondary school which is 15 March 2015 because we hope that student can watch this game show when they felt boring and continue to support this show. Episode 1: The first episode is an introduction about the TV game shows â€Å"All about Women† and the participant selection. The hosts, Natalie Ng will give an explanation about screening condition for choosing the 8 participant. For example, participant must be a woman at the age range of 18 to 30 who brace up to learn and change themselves into a perfect woman. The interview is held in the studio by 5 mentor of the TV show. They are Mr Wang Ming Yong, Mr Robin Niu, Mr Jimmy Lee, Mr Bernard Chandra and Mrs Grace Wang. The interviewee need to prepare a short video to introduce themselves and the reason why they want to change into a perfect woman. They also need to answer the questions asked by 5 mentors. The list of participant will deciding by 5 tutors and announce at the end of the show. Episode 2: For the first part of this episode, the participants will start to attend the training class. The mentor of this episode is Mr Wang Ming Yong who is a Taiwan health care professional. He will listen to the participant lifestyles and give a comment on whether it is healthy or not. He will also share his own experience on how to maintain a healthy life and the importance of healthy life. The second part of this episode will be a station game. This game is aims to improve cardiovascular fitness and helps them to maintain a healthy weight. In this game, participants are required to run on a 7 meters foot sole massager in a playground. They need to gain the lead in race in order to win the games. The champion of this game will get 6 marks while the first runner-up will get 5 marks and the second runner-up will get 4 marks, and so on. These marks will continue to increase in following episode according to their result in the station game. Episode 3: The first part of this episode will be the skincare training class. The mentor of this episode is Mr Robin Niu who is professional in skin care. He will explain the symptom of different types of skin condition and the way to take care of it. He also explains about which kind of skin is suitable for which type of skin product. After that, he recommends the best seller product and the right way to use it. For the part of station game, participants are given 20 minutes to memorize 10 types of ingredient that widely used in skin care product and its use. After that, a lightning round will hold by the host, Natalie Ng. A total of 10 questions will be asked and the participants need to be the first to blow a balloon in order to answer the question. Participant will get 1 mark when they give the right answer. The marks they gain in this episode will be added on into the marks they got in previous episode. Episode 4: In this episode, Mrs Grace Wang, a professional makeup artist, will be the mentor for makeup training class. She will first points out the mistake that done by the participant and shows them some basic makeup that is easy and suitable for everyone. Besides that, she will explain and show them the most suitable makeup for them. After that, participant will draw lots to decide who will be their partner in the following part of this episode. They need to help their partner to make up and it will be judged by Mrs Grace Wang. Both of the persons in one group will get same marks. The champion will get 6 marks while the first runner-up will get 5 marks and so on. The marks they gain in this episode will be added on into the marks they got in previous episode. Episode 5 A well-known hair stylist, Mr Jimmy Lee will be the mentor of this episode. He will first indicate the mistake that usually done by most of the women and show them the suitable hairstyles for them. He also shows them the latest hairstyles and the hairstyles that fit in different situation. After that, each of them will be given one picture that showing different hairstyles. They are required to complete the hairstyles same as the picture in a period of 30 minutes. Participant who be the first to complete the hairstyles will get 6 marks while be the second faster to complete the hairstyle will get 5 marks and so on. Participant who be the last or cannot complete the hairstyles in a period of 30 minutes will get 1 mark. The marks they gain in this episode will be added on into the marks they got in previous episode. Episode 6 The first part of this episode is a fashion training class and the mentor is Mr Bernard Chandran, a famous fashion designer. He will show them the wrong way of matching clothes and teach them how to matching outfit. He will then show them the newest trend of clothing. After that, they will move to a dressing room that contains hundreds of clothes. They need to match 3 outfits that suitable for working, shopping and outing in a period of 10 minutes. They will wear the outfit they choose and judged by Mr Bernard Chandra. Participant will get the marks at a range of 0 to 18. The marks they gain in this episode will be added on into the marks they got in previous episode. Episode 7 This episode will be a live semi-final. This episode is aim to select 4 participant who can continue proceed to final. In this episode, participant need to make over themselves in 40 minutes will the themes of traditional costume. They can use the marks they get in the previous episode to exchanges some preponderance for their makeover. For example, participant can use 10 marks to exchanges a chance to ask the mentor to help them and 7 marks to changes the brand of a tool. These participant after makeover, will show their picture of before and after. These picture will show in TV and open voting to all audience around the world through messaging or social media. Four participant who have higher votes will proceed to the final. The result will come out in the end of this TV show. Episode 8 The last episode of this TV shows is a live final competition. In the end of this episode, one winner will be the selectedparticipant and will be required to go inside a room full of clothes, accessories and cosmetic product. They need to make over themselves, at the same time, prepare a talent performance in 1 hour. After 1 hours, the photo of their outfit will upload to social media and let public to vote. The judgment criteria for the final is quite similar with semi-final except there are three judges in the final. They are Jimmy Lee, Grace Wang and Bernard Chandran. The criteria for the judges are 30% and the other 70% are from the public voting. The winner will be given a Royal Beauty Treatment. Conclusion In conclusion, even though we face a lot of problem during completing this assignment but we still manage to complete our assignment due to teamwork. While doing this assignment. We learned how to create a television game show. It is not easy to form an idea. We learned how to make a trailer for TV game show as well. When doing this assignment, we find out that it is difficult to invite the host to participate in our TV game show because they are very busy and maybe some are come from foreign country. The purpose for our TV game show is to let the public know more on how to makeover themselves to be more confident and pretty. We invite some famous and professional make up stylist to our TV game shows to attract more people participate in our TV show. We hope that teenagers can improve the knowledge of beauty through our TV game shows and became a person who perfect in both inner and outer look in the future.

Friday, January 17, 2020

Information Security Policy Essay

1. Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. The goal of this security policy is to lay out a basic plan for a secure information system to be used by Bloom Design Group. This policy will protect the company’s systems from threats that can come from humans and from natural disasters as well. The policy will also put into consideration the privacy, reputation, intellectual property and productivity of the Bloom Design Group. The continued operation of this company depends on being able to access and use resources within the organization and being able to remote access with security. Each persons role in the company will be considered and appropriate access will be given to ensure the efficient operation of the business, while not giving access to those who are not authorized. This policy will also help in the company’s adherence to any governmental regulations. Any disruptions of service or security related issues will be dealt with immediately by means of system software that is automated to handle certain threats . More serious issues will be dealt with by the IT staff whose responsibility it is to oversee the everyday operation of the information system. 2. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 2.1. Company overview The Bloom Design Group is a company that offers interior design services to businesses and individuals around the world. There corporate office is located in New York with a secondary office in Los Angeles for handling operations on the West coast. They have a web site that offers their customers the ability to work up their designs online and then purchase them through a electronic order processing system. Also, the designers use secure logins and passwords to access the web site. A large number of the workforce work remotely possibly using tablets or ipads connected to secure VPNs or Virtual Private Networks. 2.2. Security policy overview Bloom Design group already provides secure logins and networks to their employees so they already have some type of system setup already. However, this does not mean it is a system that works efficiently. I think the appropriate security policy to implement for this project would be system specific. 2.3. Security policy goals As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy. 2.3.1. Confidentiality The policy I plan to implement will help to protect information by reviewing how the company stores sensitive information such as employee and client records, trade secrets, and other sensitive data. 2.3.2. Integrity Since the company will be using passwords and secure logins the system will not be accessible to the public. So the primary focus should be on the employees. Authentication and verification can be done using a data log to keep records of employees activity while on the company’s VPN. Also, the use of a firewall will help with integrity as it will prevent employees from unknowingly accessing damaging websites. 2.3.3. Availability The policy I plan to use will help with back-up and recovery by the possible use of cloud storage or a central data storage center. Although they are already using secure logins for access control the whole system needs to be reviewed. This is to make sure only authorized personnel have access to sensitive areas. 3. Disaster Recovery Plan Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP. 3.1. Risk Assessment 3.1.1. Critical business processes The mission-critical business systems and services that must be protected by this DRP are: Payroll, Human Resource Data, POS backup media, and Web Servers and their services. 3.1.2. Internal, external, and environmental risks Examples of internal risks that may affect business are unauthorized access  by individuals who are employed by the company, and those who aren’t employed by the company but still have access to individual store’s computer systems, applications, or areas where the servers and backup media are located. Other external and environmental risks include fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature. 3.2. Disaster Recovery Strategy Most cases, having an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. With Bloom design group I think having a warm site facility would be the best option. Warm sites are cheaper than hot sites but require more effort. On the other hand, they are more expensive than cold-site facilities but less labor intensive and more likely to be effective in a disaster. Also, having a backup and retention site to work from, and recover from for the main servers and web services is a good idea. 3.3. Disaster Recovery Test Plan For each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan. 3.3.1. Walk-throughs This test plan would be a great way for the key personnel to come together and formulate a plan of action in the event of an emergency. Due to Bloom Design group being spread across a large area it might require some video conferencing and traveling on the part of some employees. 3.3.2. Simulations I think this test plan is the most effective when compared to the others. Simulating an actual emergency is a great way for people to get used to operating in a critical time under pressure. This will show you where your people have their strengths and weaknesses when trying to recover from a disaster. 3.3.3. Checklists This passive type of testing would be a good system to implement on a weekly or monthly basis depending on the needs of the company. This will help in detecting problems before they become a major issue. 3.3.4. Parallel testing Since Bloom Design group is updating their security parameters and do not have an equal type of system already implemented parallel testing would not be appropriate for this security policy. 3.3.5. Full interruption I think this is another very effective way to test the system in the event of an emergency. However, to minimize inconveniences to the customers it would have to be done during off hours. 4. Physical Security Policy Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, â€Å"an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure† (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario. These controls may include the following: Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics) Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning) 4.1. Security of the building facilities 4.1.1. Physical entry controls At the two office locations (Los Angeles, New York) for Bloom Design Group I would use employee badges that double as an electronic key to access the building and other sensitive locations. This will work in conjunction with  an access control system that limits entrance/exit to the offices through one main entrance. There will be an employee entrance as well also to be accessed by an electronic badge. 4.1.2. Security offices, rooms and facilities For the security offices I would implement biometric scanners due to the sensitive equipment inside. Other rooms and facilities of a sensitive nature will utilize electronic badges with a photo and name of the employee. 4.1.3. Isolated delivery and loading areas For these areas I would implement electronic key card access with the use of a CCTV system recording to a DVR. With a CCTV camera located on the driver door in the loading area the person responsible for deliveries will know when a delivery is being made and can observe he outside environment before opening the door. 4.2. Security of the information systems 4.2.1. Workplace protection For this part of the security policy I would utilize pre-employment screening and mandatory vacation time. This prevents people from hiding illegal activities while performing their duties. Also, I would setup privileged entity controls so operators and system administrators have special access to computing resources. 4.2.2. Unused ports and cabling For unused ports I would use a piece of security equipment that can be plugged into the unused port and can only be removed by someone with a special key. This will help prevent unauthorized access into the network. For unused cabling I would secure it in a secure storage room which can only be accessed by authorized personnel. If the above mentioned equipment isn’t available then the port should be removed. 4.2.3. Network/server equipment Being that this is some of the most critical equipment for business operations I would use biometric locks and scanners on any room that  contains this equipment. Also these rooms will be environmentally controlled with air conditioners and dehumidifiers to allow the equipment to operate at peak efficiency. 4.2.4. Equipment maintenance Since a lot of the equipment is spread across a large region I would utilize remote communication connections to troubleshoot issues. If the maintenance need is more severe than I would have a small centrally located facility that specializes in assessing and repairing malfunctioning equipment. 4.2.5. Security of laptops/roaming equipment For laptops and roaming equipment I would install all devices with a GPS tracker and encryption software to protect against unauthorized access. The equipment itself would be stored in a secure storage room with access being tightly controlled. 5. Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 5.1. Authentication Authentication credentials permit the system to verify one’s identification credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a simple password that you set up when you receive the privilege to access a system. You may receive an assigned password initially with the requirement that you must reset it to something more personal—something that only you can remember. However, passwords are the easiest type of authentication to beat. Free and widely available programs are available on the Internet to break the security afforded by passwords on most of the commonly used systems. With two or three factors to authenticate, an information owner can gain confidence that users who access their systems are indeed authorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric scanning uses unique human characteristics to identify whether the person trying to gain access is authorized to enter or not. One common  approach to managing IDs and passwords is to create a password or PIN vault. These programs use secure methods to locally store IDs and passwords that are protected by a master password that unlocks the vault when it’s needed. 5.2. Access control strategy 5.2.1. Discretionary access control The discretionary access control system will be used for Bloom Design Group because this is the favored approach in the corporate environment and due to the wide area of operations this will allow several authorized users to have access to the system at any given time. The principle of least privilege is the predominant strategy to assure confidentiality. The objective is to give people the least amount of access to a system that is needed to perform the job they’re doing. The need-to-know dictates the privilege (authority) to perform a transaction or access a resource (system, data, and so forth). An information owner is one who maintains overall responsibility for the information within an information system. For the Bloom Design Group the information owner is going to be the corporate head of IT operations. 5.2.2. Mandatory access control In a system that uses mandatory access control (MAC; also called nondiscretionary access control), the system decides who gains access to information based on the concepts of subjects, objects, and labels, as defined below. Since the Bloom Design Group is spread out over such a large area I do not think this is the best choice for this scenario. MAC is better suited for military or governmental systems. 5.2.3. Role-based access control Role-based access control (RBAC) group’s users with a common access need. You can assign a role for a group of users who perform the same job functions and require similar access to resources. This would also be appropriate for this scenario because it will allow the information owner to easily assign access to certain groups such as designers, office personnel, customer service associates and so forth. 5.3. Remote access Remote Access Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access users to communicate with a central  server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to set up a policy that can be applied at a single administered network point. Having a central service also means that it’s easier to track usage for billing and for keeping network statistics. A virtual private network (VPN) is another common means for remote users to access corporate networks. With a VPN, a user connects to the Internet via his or her ISP and initiates a connection to the protected network (often using a RADIUS server), creating a private tunnel between the end points that prevents eavesdropping or data modification. 6. Network Security Policy Due in Week Nine: Outline the Network Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices. 6.1. Data network overview Due to the large geographic distances between Bloom Design Group offices a WAN is going to be utilized. WAN covers a larger geographic area than a LAN (technically, a network that covers an area larger than a single building). A WAN can span the entire nation or even the globe using satellites. 6.2. Network security services 6.2.1. Authentication Access to documents can be restricted in one of two ways: by asking for a username and password or by the hostname of the browser being used. For Bloom Design Group employees will need to enter a user ID and password to access restricted documents and sites. 6.2.2. Access control Unlike authentication, which is security-based on the user’s identity, restricting access based on something other than identity is called â€Å"access control.† For Bloom Design group access control to physical locations will be done by controlled by electronic badges. More sensitive areas such as the server rooms will utilize biometric scanners. 6.2.3. Data confidentiality This service protects data against unauthorized disclosure and has two components: content confidentiality and message flow confidentiality. For Bloom Design group all messages transmitted and received through company offices will be encrypted to prevent the unauthorized viewing of sensitive company documents. 6.2.4. Data integrity The goal is to protect data from accidental or malicious modification whether during data transfer, data storage, or from an operation performed on it, and to preserve it for its intended use. For Bloom Design Group the only people who will be authorized to make changes or modifications will be the Head of the IT department and anyone else they deem necessary. 6.2.5. Nonrepudiation A service guaranteeing that the sender of a message cannot deny having sent the message and the receiver cannot deny having received the message. I do not think this will be necessary for Bloom Design group. However, if it does then the proper modifications can always be made. 6.2.6. Logging and monitoring These services allow IS specialists to observe system activity during and after the fact by using monitoring and logging tools. These include operating system logs, server records, application log errors, warnings, and observation of network, switch and router traffic between network segments. I do not think this will be necessary for Bloom Design Group as a whole. However, it will be utilized for any programs having to do with the servers due to its sensitive business content. 6.3. Firewall system Outline the roles of the following network security control devices and how these basic security infrastructures are used to protect the company’s network against malicious activity. Provide a description of each type of firewall system and how it is used to protect the network. Include how the firewall system is or is not applicable to the company’s network configuration in your selected scenario. 6.3.1. Packet-filtering router firewall system The most common Internet firewall system consists of nothing more than a packet-filtering router deployed between the private network and the Internet. A packet-filtering router performs the typical routing functions of forwarding traffic between networks as well as using packet-filtering rules to permit or deny traffic. 6.3.2. Screened host firewall system The second firewall example employs both a packet-filtering router and a bastion host. This firewall system provides higher levels of security than the previous example because it implements both Network-Layer security (packet-filtering) and Application-Layer security (proxy services). Also, an intruder has to penetrate two separate systems before the security of the private network can be compromised. This will be the option chosen for Bloom Design Group based on needs and cost. Since Bloom Design group is not a governmental or military related company then it doesn’t require the most elaborate form of firewall protection. 6.3.3. Screened-Subnet firewall system The final firewall example employs two packet-filtering routers and a bastion host. This firewall system creates the most secure firewall system, as it supports both Network-Layer and Application-Layer security while defining a â€Å"demilitarized zone† (DMZ) network. 7. References Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author. Information Security: Principles and Practices, by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.

Thursday, January 9, 2020

My Personal Opinion Essay - 1349 Words

For as long as I can remember I have been told to constantly strive for more and never settle for less. It wasn’t until one day when I decided to chauffeur a few friends to a local creek that I began to change my personal opinion in regards to exceling in the workplace. During a conversation, my friends and I got on the topic on how each of us was doing. One of us said â€Å"I’m good, I’m not overwhelmed or underwhelmed.† and someone responded, â€Å"so you’re whelmed?† This simple and somewhat odd question caused me to think about things differently. I decided that the idea of â€Å"whelmed† can be defined as being completely content with the current state of your life and self, be it physically, mentally, emotionally, spiritually, and financially. The idea of being â€Å"whelmed† caused me to wonder why it isn’t okay, to just be okay. I believe that the society that we live in has conditioned us to believe that more is better and happiness is only achieved when you have the most recent top of the line inanimate object and enough left over money to splurge on things you don’t need. That way of thinking has caused America to become an individualistic society. You hear the phrases â€Å"This is a dog eat dog world† and â€Å"fend for yourself† and it shows that there is an underlying drive to make it to the â€Å"top†. And once you finally get to the top that is when you are successful. But if you’re not fighting to get there then you are doing something wrong. This nonstop fight to excel in the workplaceShow MoreRelatedWhy I Am A English?947 Words   |  4 Pagescorrectly structure an essay, different methods of writing, and the personal growth that I’ve had since taking this class. With English being my second language, it is difficult for me to express myself in writing form. It is extremely frustrating to have countless ideas and opinions that I would like to share with an audience, but because I am not comfortable with writing, I stay silent for many things. Taking this course has helped me open up as a person and express some of my views. Writing is aRead MoreMy Journey In My Writing : The Journey Of Writing1046 Words   |  5 PagesWriting Writing is something I enjoy doing to share my opinions and ideas. During this english course, I have learned how to change my writing in ways that make it more intriguing and effective. The essays I have written during this English 101 course have pushed me to change my writing process and write more creatively. Those essays have also forced me to reanalyze my personal opinions and beliefs. After taking this course, I believe that my identity as a writer has changed for the better. TheRead MoreMy Experience : My Personal Experience772 Words   |  4 Pagesof my time on essays, while still being able to make them sound well written. This semester tested my ability to work on my own, without being told what to do. With newly given freedom, I often struggled with what I needed to accomplish. By looking at my portfolio, one can tell that I have developed my writing exponentially. I have become more independent and developed through the ideas and opinions that I have. Reading through my portfolio, the lack of concern and work put in my first essay bothRead MorePersonal Experience: English Composition Course622 Words   |  3 Pages Focusing in self- evaluation to improve the learning process, help me to set goals and be aware of my own mistakes. When the English Composition course started, I wanted to be able to express my thoughts and my ideas in an effective way. The continuation of my education was very difficult, and I began to doubt myself when faced w ith the first couple of weeks. My first assignment was my most difficult assignment, and I found myself having trouble sticking to a thesis, because I had so manyRead MoreAcademic Essay Structures and Formats1340 Words   |  6 PagesUnderstanding For many years I have been taught that to write an essay I need to make sure I follow a specific set of steps. English class, in high school, had an essay format that consisted of an introduction, a body with at least three paragraphs, and a conclusion. The introduction was the most significant part of the essay because it was at this point where you explained what the argument, the purpose and the main points of it were. Furthermore, it was of utmost importance that in the introductionRead MoreI have been a student in English Composition II for one semester in which I have learned many700 Words   |  3 Pagesa writer. My writing skills have largely improved as well as my knowledge on how to make my claims depending on the type of audience and of course on what my claim is. After the culmination of five essays, three of them have caught my attention the most and in my opinion they show my improvement as a writer. The three essays, which will be forming my portfolio for this semester, dealt with articles from Times magazine and coverage from ABC and FOX news. The topics of my three essays are differentRead MoreEssay on My Development as a Writer588 Words   |  3 PagesWhen writing a five paragraph essay, there are five steps one must fallow in order to attain perfection, these steps include understanding the question, brainstorming, writing a rough copy, revising, and creating a final draft. The first and most important step is understanding the topic. The topic of the essay is what the essay will be about and if this is misunderstood, the whole essay will be off course. The second step, brainstorming, will help organize thoughts and ideas so they flow amiablyRead MoreTechnology And Technology1027 Words   |  5 Pagesâ€Å"enhancing our intellect , creativity, and mental capacity.† In my opinion, I think new technology is and can be a threat to our brains because I believe technology is replacing our ability to write, and read books. Also, while others might disagree with my thoughts on new technology, I believe technology has become a threat to our brains because it has consumed and become a bigger part of our lives today. An example of this scenario, is the essay â€Å"Is Google Making Us Stupid?† by author Nicholas Carr whereRead MoreSummary Of Neat People Vs. Sloppy People1003 Words   |  5 PagesThe title of â€Å"Neat people vs. Sloppy People† in relation to the whole essay representing the main message of the article discussing the similarity and differences from these topics. In this case, the title was effective, showcasing the idea the essay was talking about. Therefore, the implication of the text was effective since it reflected the title. The main message of the essay is how there are two groups differences between neat and sloppy people. The topic is presented which Neat people areRead MoreCritical Analysis On Critical Thinking1311 Words   |  6 Pages Critical Self Reflection Essay Critical thinking has been defined as the ability to be a disciplined thinker by using clear, rational, open-minded, and informed by evidence. Critical thinking is a skill that takes years of practice to master. In this essay I will reflect on my personal stage of critical thinking and what strengths and weaknesses I currently have. This personal reflection will include what challenges I will face to advance my critical thinking skills and what requirements a critical

Wednesday, January 1, 2020

Different Types of Eating Disorders, Questions and Answers

1. What are the different eating disorders discussed in your text? What disorders did you see exemplified in the documentary? If you did not see examples of some of the disorders, why do you suppose they were absent? The different eating disorders discussed in the text were Anorexia Nervosa, Bulimia Nervosa, and Binge Eating Disorder. With Anorexia, the person restricts what they eat so they don’t get fat. With Bulimia, the person eats a lot of food within a couple of hours (bingeing) and they then vomit or use laxatives to get the excessive food out (purging). And Binge Eating Disorder is where someone eats an excessive amount of food during short periods of time but they don’t purge, so they gain weight. In the documentary, Anorexia and Bulimia were exemplified, but not Binge Eating Disorder. I believe that Binge Eating was not in the film because the center was helping women who are suffering from major weight loss, which doesn’t happen with Binge Eating. Binge Eating has different effects than the other two disorders and the person suffering would need much different treatment. 2. What are the causes of eating disorders (based on what we discussed in class and what you read in your textbook)? Causes of eating disorders can include ego deficiencies, such as low self-control and low self-expectations, depression, and other biological factors such as lateral hypothalamus and ventromedial hypothalamus. There are other sociocultural causes, such as pressures from societyShow MoreRelatedGeneral Education Requirement For Psch 2701410 Words   |  6 PagesName:_____________________________________ GENERAL EDUCATION ASSESSMENT PAPER PSCH 270 / Dassoff / Spring 2016 This assessment meets, in part, UIC’s general education requirement for Psch 270. Type out your answers on this document and print it out, or print out the document and write out the answers in legible handwriting. In either case, limit your answers to the space provided only (i.e., not on the back of the pages, etc.). NOTE: When defining concepts, do not use a word to define itself, as that does not show yourRead MoreEating Disorders And Eating Disorder1573 Words   |  7 Pagesaffects people called an â€Å"eating disorder.† Why did you choose this topic? I chose this topic because it is a very prevalent issue in our society today, and a close friend of mine is suffering from an eating disorder. What question(s) did you want to answer or what was your hypothesis regarding this topic? As mammals, there is no chance of escaping the need to consume food in everyday life. However, when it comes to food there can be a major concern of eating too much or eating too little. Doing eitherRead More Eating and Personality Disorders Essay1710 Words   |  7 PagesEating and Personality Disorders The correlation between eating disorders and other psychological disorders is very important for our understanding of the causes and possible treatments for eating disorders. It is known that many people with eating disorders also fit the criteria for several DSM-IV psychological disorders. If researchers can find patterns of comorbidity between these two types of disorders they may be able to better diagnose and treat patients with both of these disordersRead MoreShould Supplements Be A Type Of Eating Disorder Among Men? Essay905 Words   |  4 Pagesevidence that consuming great amount of supplement is considered a type of eating disorder among men since overusing supplements can also lead to malnutrition and psychological problem. Researchers conducted a survey questioning 195 men between ages 18 and 35 about their diet, their training, and how they view themselves physically in order to observe if supplements have a relationship with eating disorders. The results of the type fi tness supplements that the majority of the participants of the surveyRead MoreEating Disorder Outline951 Words   |  4 PagesGeneral purpose: To inform my classmate. Specific purpose: I will inform my classmate about one of the social justice topic which is eating disorder. Central Idea: informative speech about the three type of eating disorder which are Anorexia Nervosa, Binge Eating Disorder and Bulimia Nervosa. Then my second point will focus on the causes of eating disorder, after that in my last main point I will discuss its effects on our life. I. Introduction A. Tie to audience Food too much of it, weRead MoreEssay on Childhood Sexual Abuse and Eating Disorders1579 Words   |  7 PagesAbuse and Eating Disorders Recently, a great amount of psychological literature has focused on finding biological and genetic causes of mental illnesses and disorders, including eating disorders. However, according to recent twin studies, the heritability component of eating disorders may only account for 0% to 70% of the variance (Fairburn, Cowen, Harrison, 1999). The leaves an ample amount of room for speculation of possible environmental risk factors for eating disorders. In thisRead MoreUnit 5 Essay1106 Words   |  5 PagesParts. Part 1: Know about different eating disorders 1a. Describe at least two different eating disorders. Eating disorder 1: Bulimia Nervosa is a disorder characterised by consuming massive amount in calories in a form on binge eating and then getting rid of them through laxatives or vomiting. There may be social signs or psychological signs like social isolation. Eating disorder 2: Anorexia Nervosa is the most well-known and popular of eating disorders yet it is the least common.Read MoreThe Relationship Between Media Consumption And Eating Disorders1529 Words   |  7 Pagesfactors might influence educated women to have an eating disorder? As a female, I’ve always wondered if eating disorders that I have seen affect women are linked to the ideas that the media puts out for women to consume. Advertisements, television shows and magazines are all categorized as media. Female college students are exposed to media on a day to day basis, and would have to live off the grid to get away from its influence. When researching for my answer I was able to find an article titled, â€Å"TheRead MoreEating Disorders And Its Effects On The World1531 Words   |  7 PagesEating disorders By: Carli Brown Advance Placement Psychology Mr. Cuetara 6-4-15 Abstract: Eating disorders are very common throughout the world and millions suffer in the United States, especially in females. Scientists are continuing to study various eating disorders and trying to find the right treatments. Different places all over the country are working hard to study causes and effects of eating disorders using highly advanced technologies. Studying the brain can give usRead MoreDoes Tumblr Have a Negative Impact on an Adolescent Girls Psychological Wellbeing1094 Words   |  5 Pagesappearance and is one of the main contributors for the desire of teenagers to conform and stick to what is supposedly the norm of the status quo. It has since had a negative impact on girls psychologically. This report will discuss the images of quotes, types of blogs, subcultures in the tumblr community and diets. â€Å"85% of the 20 people surveyed own a tumblr account† 2 Tumblr has become a major success among adolescents, however excessive blogging has negative impacts on adol escent girls. Tumblr allows