Monday, December 30, 2019

Linux operating system - Free Essay Example

Sample details Pages: 29 Words: 8608 Downloads: 6 Date added: 2017/06/26 Category IT Essay Type Essay any type Did you like this example? TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Enumerate the various costs associated with the performance, security, support, and maintenance of the Ubuntu within the bank. Answers What is Windows? Microsoft Windows is a series of computer operating systems and GUIs (Graphical User Interfaces) produced by Microsoft Corporation. Windows was the first operating environment introduced by Microsoft in 1985 as an add-on to MS-DOS. Windows was introduced because of the growing interest in Graphical User Interfaces (GUIs). Then Windows dominated the worlds personal computer market, overtaking the Mac OS, which had been introduced previously. Microsoft has introduced two parallel routes in their operating systems. One route is for Home users and the other route is for Professional IT users. The home versions have greater multimedia support and less ability for network and security. But Professional versions have low multimedia capabilities and better networking and security. Windows operating systems are commercial products and we should purchase license in order to use the products. And also the source code of windows products are closed and owned by Microsoft. Linux is a f ree and open source Operating System referring to Unix-type operating systems originally created by Linus Torvalds with the support of developers all over the world. Linux source code is freely available to everyone and anyone can freely modify and redistribute both commercially and non-commercially. Linux kernel can be defined as one of the best kernels that uses today. And further, many organizations have begun to use Linux based operating systems because of its high security and low cost. Linux is well known for its use in servers. And also Linux can be installed on vast variety of hardware, such as mobile phones, watches, mainframes, supercomputers and etc. Fedora, Suse, Mandriva, Ubuntu, Kubuntu and Red Hat are some popular distributions of Linux. Don’t waste time! Our writers will create an original "Linux operating system" essay for you Create order Comparative Features of Windows and Linux Malware Threats Security is a vital feature that every Operating System (OS) should provide. Because operating system is a key requirement of every computer system. Therefore everything depends on it. Malware or Malicious Software is a computer program that is designed by computer criminals in order to damage the systems and theft important information from computer systems. Therefore a network OS should have a thorough security. Without security, the network is vulnerable to larger number of threats. Windows Microsoft Windows OS is the most popular operating system in the world. It runs nearly 90% of desktop computers in the consumer market, and is the main operating system of the vast majority of commercial and institutional users. Therefore this makes windows equipped machines larger target of malware (or malicious software) which is written by computer criminals who want to cause much damage to the system. According to the surveys that conducted by Kaspersky Lab have revealed that more than 11,000 malware programs for windows were discovered just in the second half of 2005. And also nearly one million Windows based computers have been infected with Botnets (Botnet is a small computer program used to control other computers remotely). In windows based computer systems some malware are very hard to remove without using an Anti-Malware program. Linux In year 2006 approximately 800 Linux malware were discovered. Most of the malware are propagated through the Internet. Usually Linux based malware are extremely rare. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. Because of the rarity of malware threats, there is no initial requirement for Anti-Malware programs in Linux based systems. But anti-malware software such as ClamAV and Panda Security are rarely used for Linux servers for more security. Resource Sharing Computer Network is a set of interconnected computers that is used to share resources such as printers, scanners, information, storage and etc. Therefore operating systems should support for reliable resource sharing. Reliable resource sharing increases the networks performance. Linux and Windows belong to two different platforms. Though they provide different facilities, they provide they initial requirements of a network. Usually Linux performs well for file sharing and Windows performs well for Printer, Scanner and other hardware resources sharing. Cost For desktop or home use, Linux is very cheap or free, and Windows is so expensive. For sever use, Linux is very cheap when comparing with Windows. Microsoft allows a single copy of Windows to be used on only one computer. In contrast, once we have purchased Linux, we can run it on any number of computers for no additional change. For instance in year 2005, Windows XP Professional Edition was sold for $200 and Windows Server 2003 Standard Edition with 10 Client licenses was sold for $1,100. But we can download Linux distributions freely from their web sites. Otherwise we can purchase a assorted distributions of Linux in a box with CD and manuals and technical support for around $40 to $80. Bugs All software has and will have bugs (programming mistakes). Linux has a reputation for fewer bugs than Windows. Windows is developed by faceless programmers whose programming mistakes in Windows are hidden from the outside world because Microsoft does not publish the particular source code for Windows. Microsoft believe that their source code as a trade secret. In contrast, Linux is developed by hundreds of programmers all over the world. They publish the source code of the operating system to the world. Therefore it is stronger and less vulnerable for threats. That is why most of the organizations use Linux for their networks. Linux is getting update from many talented programmers all over the world. Network Configuration When comparing with Linux network configuration, Windows configuration is easier. Because of generally Windows is based on GUI (Graphical User Interface). Therefore anyone can understand Windows based network configuration without having much knowledge. But Linux is generally based on Command Line or Terminal and there should have a good knowledge about Linux in order to implement a network by using Linux. File System In Windows based systems the support NTFS, FAT, ISO 9660, UDF and others. But in Linux based systems they use ext2, ext3, ext4, ReiserFS, FAT, ISO 9660, UDF, NFS, JFS, XFS, and others. When comparing with Windows, Linux supports for many file systems. But now Windows has 3rd party drivers for ex2, ex3, ReiserFS, HFS and others. System Stability Windows operating systems based on the NT kernel and it much more stable than the other older versions of Windows. But if we are using unsigned or beta drivers, it can lead to decreased system stability. Linux window manager is a key component of X-Windows based GUI system and can be highly stable. Mechanisms used to terminate badly behaving applications exist at multiple levels, such as Ksysguard and the kill command. If the GUI fails Linux can use a text based system. This feature is a powerful feature in Linux for network stability. Interoperability features of Fedora 12 with Windows Within this task I used Fedora 12 instead of Ubuntu. Windows and Fedora belong to two different platforms. Therefore their mechanisms are different. That is why the feature interoperability is needed. Interoperability can be defined as the ability to work with each other. In order to exchange messages between each different platform reliably without any errors or misunderstandings, there should have a common background between each platform. Likewise Windows and Linux (or Fedora 12) also has that kind of common grounds that support for exchange messages between each platform. Samba Samba can be defined as a re-implementation of SMB/CIFS networking protocols. It was developed by Australian Andrew Tridgell. It provides various facilities for file and printer sharing between Windows, UNIX and UNIX like systems such as Linux, Solaris, AIX, and Apples Mac OS X server systems. Samba runs on most systems and now it has become a standard of most of the distributions of Linux (such as Fedora, Redhat, Mandriva, Suse and etc). When we need to share files and printers between different platforms such as Windows and Fedora, we should have to configure Samba. That is how we make interoperability between each platform. DHCP DHCP is short for Dynamic Host Configuration Protocol, a protocol used for assigning dynamic IP addresses to devices on a network. With a dynamic addressing, a device can have a different IP addresses every time it connects to the network. Though some systems and devices are allow to change the IP addresses while it is still connected, DHCP also supports a mix of static and dynamic IP addresses. DHCP simplifies the network administration because the DHCP server keeps the track of IP addresses rather than requiring an administrator to manage the task. I consider that the DHCP is also an interoperability feature because it can assign IP addresses to any platform such as Windows and Fedora. When a LAN network has a mixture of a Windows and Linux based computers, DHCP can assign IP addresses to all computers without a barrier of the platform. X Windows System The X Windows system is a windowing graphical user interface that almost, but completely, entirely unlike Microsoft Windows and the Macintosh. This X Windows System is an open, client/server system that for managing a windowed graphical user interfaces in distributed network. Earlier UNIX based systems used Shell as an interface. Shell is an inbuilt special program that allows users to enter commands in a CLI or Command Line Interface. But the new versions of UNIX-like systems heavily use X Windows as a Windows like graphical user interface. Earlier it was very difficult to work with Windows and Linux through CLIs. Because of Window was completely GUI (Graphical User Interface) and Linux was completely CLI. But now the new distributions of Linux come with the X-Windows capability. Therefore now the both systems can work more reliably and easily as a whole. X Windows is also an interoperability feature that is provided by Fedora 12 in order to work with windows systems much ea sily. TCP/IP TCP/IP shorts for Transmission Control Protocol and Internet Protocol. Generally it is a protocol suit that is used for the internet. It provides easy communication across different platforms and provide basis for the global internet. And also it can be defined as a basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or extranet). When we set up with direct access to internet, our computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. In an intranet there may have computers with different platforms such as Windows and Linux. But using TCP/IP protocol we can connect these computers. Both Windows and Linux distributions support for TCP/IP. Therefore it can also be considered as an interoperability feature of Windows and Linux. DNS DNS is Short for Domain Name System. DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, theyre easier to remember. The internet is based on IP addresses. Every time when we use a domain name, DNS server must translate the name into the particular IP address. In intranets also some organizations use DNS servers to name their network computers. Though it is a Windows based computer or a Linux system, it carries out its task perfectly. Because DNS also has a interoperability feature to work with different platforms. Enumerate the cost associated with the Performance, Security,Support and Maintenance of Fedora 12 within the Bank. For this Task I used Fedora 12 instead of using Ubuntu. Because Ubuntu do not have an inbuilt a Samba server facilities and it should be downloaded as a third party tool. But Fedora 12 has those facilities for printer and file sharing. Performance Performance is a vital part of a network. The efficiency of a network depends on the hardware and software performance. To the banks network I used one of the distributions of Linux called Fedora 12 as the NOS (Network Operating System). Generally Linux based operating systems are lightweight and need low performances. As the other distributions of Linux, Fedora 12 is also a lightweight operating system that requires low performance hardware. Bank is a place where many transactions are taken place every second across their branches and other networks. Therefore the banks network should be stable and reliable. Due to these reasons a bank should use trusted and reliable hardware and software in order to increase their network performances. Usually the costs of network devices are relatively high in the modern market. And also the network operating systems like Windows are extremely expensive. Therefore by using a free and open source OS like Fedora 12 we can reduce the money wasta ge. Further it does not need high performance computers for installation and does not consume lots of hard disk space like Windows does. Fedora 12 provides online updations and does not have a limit on installation. One copy of Windows can be installed to a one computer only. Otherwise we have to buy license. But Fedora 12 can be installed to any number of computers without any limitations. According to those above reasons I think that Fedora 12 provides good performances and also it is more cost effective when comparing with Windows. Security Security is a key requirement of a network. Otherwise anyone and any malware can attack and theft the important information from the network. Therefore OS (Network Operating System) developers try to increase OSs security features. If theres no security within an OS, then it is totally fails. Fedora 12 is a distribution of Linux and it is categorized as Free and Open Source Software. Linux based systems and their source codes are freely available to anyone and can be modified as required. Fedora 12 has also been developed by many programmers all over the world and it is a strong operating system. But windows based systems are commercial OSs and they do not publish their source code to the public. Therefore it is developed by limited programmers and there security is also limited. That is why we need third party security tools to protect windows based systems. The third party trusted and reliable Anti-Virus guards or third party security systems are more expensive and it is an ad ditional cost to the windows based systems. But Fedora 12 has a strong in-built security mechanism (but Windows dont have) such as DPI (Data Packet Inspection) and ISD (Intrusion Detection System). Because it is developed by many programmers all over the world. Therefore it doesnt need any third party virus guards. The cost for additional security efforts has reduced in Fedora 12. Therefore Fedora 12 is a cost effective operating system when comparing with Windows. And also it is the best choice for a cost effective banks network system. Support Computer operating systems and other software are not 100% perfect. That is why the manufactures provide support for their products. When a problem is taken place in a system, we can get the manufacturers support to solve the problem. And also manufactures provide patches and other updations to reduce the vulnerabilities of their products. Microsoft Windows also provide free updations and online support for their products after they are purchased. Though Windows provides free online support services for their products without any payments, Fedora and other Linux based operating systems do not provide free support services. If we need to get a support from Linux based system, we should pay some amount of money for their service. But they provide 24 hours update service for their products. In Fedora should have to pay for their services. Though the support service is not cost effective for the bank, the OS is totally free for download. Maintenance After installation and Configuration every computer system need to be well maintained. Windows systems are much easy to maintain because it doesnt need well trained persons (compared with Linux). But Linux systems are more complex and cannot install, configure and maintain if theres no knowledge of it. In order to maintain the Fedora system in the bank, the bank needs a well trained personnel or network administrator. Anyone cannot maintain a Linux system; therefore the cost of a Linux based network system administrator is higher when comparing with a Windows Network System Administrator. Manufactures support is always need for system maintenance. But we need to buy the service advices in Fedora form its manufacture. TASK 02 Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: A brief overview of current VPN technologies (both hardware and software). Design a suitable VPN using appropriate Internet Service Providers (IPS) for the requirements of the bank. Identify and list the hardware and software required to implement the banks VPN. Produce a schedule for the implementation of the VPN, detailing the installation of any necessary hardware, network operating system upgrades and associated applications software required. Write a section of the report on the responsibilities and level of service required from an ISP in order to implement a successful VPN within the company. Answers Although the topic VPN or a Virtual Private Network is a much complex subject in networking field, the basic idea of a VPN is quite simple. A corporation may have a number of officers (or group of officers) in different locations, and each of these locations can have its own local network. In many corporations there are many employees working remotely by connecting to the corporations local network at home or on the road. And also business partners can join together in extranets to share business information. Interconnecting these separate networks and locations over a public network is called a VPN or a Virtual Private Network. The apparent simplicity of VPN makes us think that it is a simple concept. But there is an ever-increasing number of VPN types, and a huge range of technologies for implementing VPNs are available today. This makes us easy to decide the most appropriate VPN solution for our need. The most common way to interconnect sites has been to use ATM or Frame R elay (FR) leased lines supplied by a service provider. The following parts of this task describe the VPN technologies, cost effective hardware and software solutions and responsibilities and level of services required from the ISP (Internet Service Provider). VPN Technologies As I mentioned above, VPN is a complex subject in networking. Therefore different sort of VPN technologies are introduced for different purposes. These technologies provide secure and cost effective solutions for telecommuters, home based workers, road warriors, remote sales people, mobile executives and also for global business. Within this task I expect to provide a short description about the current VPN technologies that are widely used today. I divide these technologies into two major parts such as Hardware Technologies and Software Technologies. According to my perception, I believe that the VPN protocols that are used to establish a VPN connection should also be a part of the software technologies. Because these protocols are created by using specialized algorithms and programming languages. Therefore I consider those protocols as Software Technologies within this task. Software Technologies PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) protocol technologies are heavily based on this PPP (Point-to-Point protocol) technology. PPP was designed to send data across dial-up or dedicated connections. PPP technology is used to encapsulate IP packets within PPP frames and then transmits the encapsulated packets across a point-to-point link. PPP was specially designed to use between dial-up clients and NASs (Network Attached Storage). PPTP (Point-to-Point Tunneling Protocol) PPTP is one of VPNs first protocols built on PPP (Point-to-Point Protocol) to provide remote access for VPN solutions. PPTP technology encapsulates PPP frames in IP datagrams using GRE or Generic Routing Protocol. PPTP uses authentication techniques within PPP. PPTP can be used for remote access and router-to-router VPN connections. The Point-to-Point Tunneling Protocol (PPTP) uses TCP (Transmission Control Protocol) connection for tunnel management and GRE for encapsulation. L2F (Layer Two Forwarding Protocol) L2F was designed to transmit data from corporate sites to their users by using tunnels. This protocol or VPN technology was first implemented in CISCO products. L2F doesnt depend on IP and its the only way that it differs from PPTP. This protocol accepts other authentication mechanisms and allows tunnels to support more than one connection. L2F uses PPP for authenticate the remote user and its done twice at the ISP and then the second at the gateway to the connecting LAN. This is a Layer-2 protocol and handles IPX and NetBEUI as well. L2TP (Layer Two Tunneling Protocol) L2TP is a combination of L2F and PPTP and it exists in the second layer of the OSI reference model. That is why it named as Layer 2 Tunneling Protocol. L2TP is defied for packet media, Frame relay, ATM and X.25. It has its own tunneling protocol and uses PPPs PAP and other advanced mechanisms for authentication. Its encryption method is based on IPSec (Internet Protocol Security). IPSec (Internet Protocol Security) IPSec is a solution for VPN security and it exists in the third layer of the OSI reference model. IPSec uses number of encryption technologies to provide confidentiality and integrity of data. IPSec allows senders to authenticate and encrypt each packet. There are two modes of IPSec such as Transport mode and Tunnel mode. These two modes depend on the situation of security and traffic. Transport mode authenticates and encrypts the transport segment of an IP packet, and tunnel mode authenticates and encrypts the whole IP packet. VPN Client Software VPN Client software provides protected access to corporate resources via wireless, broadband, and dial-up connections with robust encryption and broad support across multiple connection types. Most of the modern VPN software simplifies the configurations of security policies and management of certificates through its graphical user interface. Microsoft, Netgear, Stone Gate and CISCO are some popular manufactures for VPN client software (But each of these manufactures use different sort of technologies to implement these VPN client software). Hardware Technologies VPN Router In network communication, data are transferred in the form of packets. Usually a router is a hardware device or a computer that looks at the IP packets and decides how to forward it. Routers operate at the network layer of the OSI reference model and that is used to connect networks or connect the networks to the internet. When a packet is received from the NIC (Network Interface Card) card, the router reads the IP address on the packet and forwards it to the appropriate network interface. The packet forwarding depends on the IP address and routing information that contains in the packet header. Even if the network architecture differs, the router has the capability to connect them. Though it can connect different network architectures, I cannot transform data from one data format to another (TCP/IP to IPX/SPX). Software for VPN router functions or normal router functions can be added to a server or a specialized computer that is optimized for communication. VPN Concentrator VPN Concentrator is a device that is used to combine several communications channels into one. And also it is further used to tie multiple terminals together into one line. Although a device called Multiplexor carries out the same function as VPN concentrator, the total bandwidth of the concentrators inputs is not equals to its outputs. The concentrator has the ability to store data temporary but the multiplexor does not have this ability. An Ethernet hub, which is a multiport repeater, is sometimes called as a concentrator. VPN Gateway Although a VPN Gateway can be implemented as both Hardware and Software, I consider this as a hardware technology because for the ease of categorization. VPN Gateway is a device (can be a Hardware/Software) that is used to convert packets from one network protocol to another. Gateway acts as an entry and exit point of data where some kind of processing is done on the information that passes through it. Sometimes the VPN Gateway also called as a router or Layer 3 Switch. Gateway is a device that is used to join two networks together. It can be implemented completely in hardware, completely in software or as a combination of both. VPN Firewalls Firewall can be implemented as both hardware and software or as a combination of both. But I included VPN Firewalls in the VPN Hardware category because for the ease of categorization. Network security is a major need of an organization. Firewall is one such solution that allows the computer to prevent unauthorized access of any application on the computer. Firewalls monitor traffic in the computer or the network. This monitoring can be done by the software in the computer or router. When using a VPN in an organization, the organization has a great requirement of using a firewall solution. Because of there may have a possibility of unauthorized access to the organizations confidential information. By using VPN firewall technology we can reduce the outside threats. Even though the above technologies directly look like just software and hardware, they all have a complex technology encapsulated within them. The above VPN technologies are widely used within the modern VPNs. Description of Banks VPN Due to the requirements of the bank I designed a VPN that provides cost effective networking solutions. The bank needs their agents and branches to connect to the banks network secure through VPN. Therefore I designed a network that provides the above facilities. When designing the banks network I assumed that the particular bank is the head office and the agent is another organization. Although the bank may have many agents and branches, Ive mentioned only one agent and a one branch within this network overview. Banks head office is the place where many of the confidential information about the transactions are stored. Therefore its network should be more secure than any other else. According to my VPN design I connected the banks network to the internet through an ISP (Internet Service Provider) in order to get the VPN access. The bank connects with the ISP directly using a VPN Router (this router is highly configured and cannot be accessed by the unauthorized VPN clients). Th en I added a DMZ (Demilitarized Zone) in order to secure the LAN network from the unauthorized access. If the File server was implemented within the DMZ, it may vulnerable to the threats and there may have a possibility of information thefts. Therefore I implemented the File Server far away from the DMZ and its secured with two highly configured firewalls. Though someone can get into the DMZ in order to access the Web Server, he/she cannot penetrate the other firewall without proper authenticate information. All the computers within the Banks network can access the WEB server and File server according to their assigned privileges. Other agents and branches have rights to access the banks network (using Router to Router connection). Even though the VPN Routers and Firewalls (Hardware) are much expensive, they provide a great security to the Bank network. In order to reduce the software cost I recommend free and open source software for both servers and clients such as Linux, Open Office and etc. Hardware and Software required to implement the banks VPN According to my VPN design I need several kinds of software and hardware to implement the network. Therefore Ive chosen some products to which supports for VPN. Some products are little bit expensive but provide high security and reliable service to the banks network. When choosing the software to the network implementation, Ive chosen some widely needed software. Hardware VPN Router SMC Barricade VPN BR21VPN Router SMCBR21VPN The Barricade router which has built-in VPN support is an ideal networking solution for VPN. This router consists of load balancing WAN ports, DMZ (Demilitarized Zone) port and a 10/100 LAN port. It has a built in firewall to protect the network from the edge. This router supports protocols such as TCP/IP, VPN connections with PPTP and IPSec. The in-built firewall provides a great protection against DOS attacks (Denial of Service attacks) and also it provides flexible Access Control. This router has the ability to access remote corporate network securely through an authenticated and encrypted tunnel over the internet. Switch NetGear Pro-Safe switch is suitable for high-speed network on a small scale. This switch consists of five auto-speed-sensing 10/100/1000 Mbps UTP ports. And also this it has the capability to handle huge workloads (this feature is more useful because of the Web Server is connected to this switch within my VPN design). This switch can move large files across the network instantly and let devices to connect to the network painlessly. The metal chassis protects the interior working parts from physical damages. Hub Cisco FastHub 424 Ethernet Hub (WS-C424M) The CISCO FastHub 424 10/100 of high-performance Fast Ethernet repeaters deliver unmatched flexibility and low-cost managed connectivity to the desktop. The FastHub 424 10/100 provides ultra low-cost 10/100 autosensing desktop connectivity where dedicated bandwidth is not required. The FastHub 424 will be deployed as a high-performance solution for providing 10/100 Fast Ethernet connectivity to the desktop. This hub provides dedicated connections over extended distance (up to 2Kms) to upstream switches or routers. Firewall NetGear ProSafe FVS338 Firewall supports for 50 VPN Tunnels for Encrypted Remote Access. This VPN firewall with 8 Port 10/100 switch and Dial Back-up is an SNMP-Manageable, High Performance network solution that furnishes multidimensional security. Broadband capable VPN firewall comes with connection insurance: a built-in serial port for dial-up access. This hardware firewall provides greater protection to the network from outside threats. Server Machine Hewlett Packard ML115 G5 (470065-098) Server The HP ProLiant ML 115 G5 is a perfect server for the growing businesses. Designed with SMB (Server Message Block) needs in mind, this product offers expandability through multiple PCI-Express slots, and four hard disk drive capacities. This server has the ability to automatically backup vital information. UDP Cable (Unshielded Twisted Pair Cable) These ultra high performance gigabit Ethernet patch cables are perfect for connecting PCs in areas where space is tight. With all the reliability and performance of a standard Cat 5e patch cable, this 1.2mm thick cable is able to fit into even the tightest space and give a neater, less cluttered appearance to desktop or wall jacks. Software Fedora is a Linux-based operating system that showcases the latest free and open source software. Fedora is always free for anyone to use, modify, and distribute. It is built by people across the globe. Therefore this operating system is less vulnerable for threats and supports for many platforms. This is a good alternative for cost effective networking systems. This OS has many networking features that supports for reliable network communication. NetGear VPN Client Full Version for PC The NetGear ProSafe VPN client software provides secure network access for remote users and mobile workforce requiring connectivity to corporate network resources. This VPN client software is ideal for customers using NetGear wireless and wired VPN/Firewall routers. NetGear VPN Client supports for all windows platforms and it is easy to configure and deploy. And also this software is cost effective and provides broad security support with the interoperable with IPSec VPN solutions with other major manufacturers. I recommend this product for client computers which have Windows platform. The AVG Anti-Virus SBS Edition gives advanced antivirus software to guard Microsoft Windows server network with maximum spyware protection. It has the ability to protect the system from viruses, Trojans, worms, spyware, adware, and simultaneously scans files, email and internet traffic. The Web Shield and LinkScanner technologies keep network safe from malicious websites and hackers. I recommen d this software product for the client computers which mainly have Windows Platform. Schedule for Implementing the VPN As in software development, the network implementation mechanism also has a procedure of implementation. Network Design, Implementation, Testing and Maintenance are the abstract level steps that should be followed in order to implement a complete and well functional network. Before implementing a network, we should design a proper schedule with all the facts. The following schedule is the one that I consider when Im going to implement a network as a networking advisor. Responsibilities and Services Required from an ISP ISP who plans to offer VPN services has many responsibilities. As the customer has a responsibility upon the enterprise network, ISP has a responsibility upon giving connection and services. ISP should provide installation and support services for their all customers. Following are some services and responsibilities of an ISP. Responsibilities Decide how VPN services will be provided relative to their other services, such as leased line, frame relay. Decide the most appropriate services and data rates in order to fulfill the customers requirements. Determine the security services that should be provided. Decide the services which should be delivered at the customer premises versus those delivered within the SPs infrastructure. Integrate VPN services into their order administration, provisioning and operating systems. Provide the necessary services on time. Choosing most appropriate hardware and software products that provide reliable services to the particular customers. Determining the billing procedures for VPN. Establish processes and resources for VPN design, installation and support. Services Provide complete security for all VPN. Provide IP services necessary to the other network infrastructures by making arrangements with other SPs. Providing technical services such as repairing immediate damages and system failures of the SPs side. Provide 24 our customer service especially for VPN owners. Provide training sessions to the sales and staff. TASK 03 Prepare a short report on Network Security covering: Trojan horses, Worms, Viruses and the major network security issues. Why there should be a Network security policy in place in all the networked companies? Introduction to Network Security A computer network is an interconnected group of computing nodes that is used to share information and other resources (such as printers, scanners and etc) according to a well defined set of rules and conventions known as Protocols. The interconnectivity of the computers reduces the network security and increases the vulnerability. Because, when a computer is uncovered to the public network (or internet), unauthorized access and other malicious software attacks can be occurred from the outsiders. That is why the need of network security is occurred. Network security means understanding the risks, deciding how much risk is acceptable, and gets necessary measures to avoid the risk. Different levels of security are appropriate for different organizations. It varies from one another according to their purposes and rules. No network is 100 percent secure and we cant even aim for that level of protection. We all know the advantages of computer networks and the internet. Connecting our network to the internet provides access to a vast amount of information and allows us to share them with each. Although this nature of the internet creates so many benefits, it also provides unauthorized users and malicious software easy access to numerous targets. This is the most vital and critical situation of internet. Therefore we all have a responsibility to ensure the safety of our networks. The following parts of this task describe some of the network security threats and the measures that can be taken to protect our networks. Network Security Threats When we talk about network security threats, there are mainly two general categories of threats: intentional and unintentional. Unintentional threats can be defined as the threats that are carried out by accidents or ignorance. For instance, accidently spills water on a server and short the circuitry makes the server inoperable is not an intentional action. But purposely poured water on a server in order to make the server inoperable is an intentional action. According to these examples we can get a vivid idea of intentional and unintentional threats. Intentional threats or attacks can be further divided in to two sub categories such as active and passive threats. An active threat attacks to a system directly. Breaking in to a system and change the sensitive data is the best example for an active attack. In contrast, a passive threat doesnt attack to a system directly. But it observes the actions and the other behaviors carefully and then attacks to the system silently. Looki ng key presses when typing a password, collect private and confidential information secretly and social engineering techniques are some examples for passive threats. Trojan horses, Worms, Viruses, Hackers, Spyware, Phishing, Zombies, Spam, Macros, IP Spoofing, SYN Flood, Teardrop, DOS(Denial-of-Service), FIN Attacks, Fraggle Attacks, Man in the middle and Session Hijacking are some examples for common network security threats. Trojan Horses According to the legend, the Greek won the Trojan War by hiding in a huge, hollow wooden horse to sneak in to the city of troy. Then they conquered it and won the battle. In todays computer world, Trojan horse is defined as a malicious security breaking computer program that pretends or masquerades as a beneficial program. Trojan horse virus is a common security threat that yet difficult to remove. Trojan horse viruses are hidden within seemingly useful software programs. When we execute or install the infected software in to a computer, this type of virus will start infecting to the other files in the computer unknowingly. Trojan horse viruses are mainly used for stealing important information from users computers. Then they send this information to Internet servers designated by the virus developers. After this process, the developers can gain a level of control over the computer through these Trojan horse viruses. While these things happen, the users will notice that the infe cted computers become slow and then it can lead to a computer crash. Trojan horse viruses are mainly spread through email attachments and chat software such as Yahoo Messenger and Skype. Once the users open the attachment, the viruses immediately infect the system and carries out the tasks mentioned above. Best ways to prevent Trojan horse viruses: Do not download form people or sites which you arent 100% sure about. Beware of hidden file extensions. Always be aware on the files come from the outsiders. Do not type command that others ask you to type. Do not go to web addresses mentioned by strangers. Always use up to date anti-virus software. Do not open unknown emails. Worms A computer worm is a self replicating computer program, similar to a computer virus. But it differs from a computer virus because of its ability to run itself. Although a virus needs a host program or a medium to run (because virus code runs as part of another program), a computer worm doesnt need a host program to spread. But modern computer worms use files to hide inside. Worms have the ability to spread copies of itself or its segments to other computer systems via network connections. Mainly there are two types of worms such as host computer worms and network worms. Host computer worms exist in the computer they run on and use network connections only to copy themselves to other computers. Host computer worms terminates themselves after they send a copy to another host (so that, only one copy of the worm running somewhere on the network at any given moment). These kinds of worms are called rabbits. Network worms have several parts or segments. Each segment of the worm exe cutes on different machines and carries out different tasks. And they use the network for several communication purposes. Propagating their segments form one machine to another is their main purpose. The main part of the network worms is called as octopus that coordinates the work of the other segments. In addition to replication, deleting files on a host computer system and send documents via emails are some of the other actions carried out by worms. Best ways to prevent computer worms: Do not uncover an unpatched, nonupdated computer or other devices to the internet. If possible, always use software or hardware firewalls. Patch and update the operating systems and other software frequently. If you have an organization, always train the users. Because the carless mistakes can leads to security threats. Always use up to date anti-virus software. Do not open unknown emails. Always check your system for vulnerabilities. Use spam filters. Delete temporary internet files. Turn off your pc when you are not using it. Turn off auto run on Microsoft Windows system. Viruses A biological virus is a bacterial that makes us sick. It persists within our body and requires something powerful to get rid of it. A computer virus is also very similar to a biological virus in the way they need a host to survive (or a virus needs a medium for its existence). But in the computer world, a virus is a small computer program spreads from one computer to another and interferes to the computer operations. As a biological virus spreads by injecting its DNA into host cell, a computer virus also needs to attach itself to a document or program to infect other computers and programs. Self propagation is the main feature of a computer virus. Just as a biological virus, the way a computer virus infects to a PC depends on its type. Because all computer viruses have their own features and factors that make them unique and dangerous to the health of a computer. Resident Viruses, Direct Action Viruses, Overwrite Viruses, Boot Viruses, Macro Viruses, Directory Viruses, Polymorph ic Viruses, File Infectors, Companion Viruses, FAT Viruses, Worms, Trojan Horses and Logic Bombs are some popular examples for different types of viruses. Computer viruses are easily spread through email attachments and instant messages. Therefore we should never open unknown email attachments. And further, viruses are spread through floppy disks, CDs, DVDs, Flash Drives (Pen Drives) and other storage devices. Having a reliable and updated anti-virus software program is the best solution for this virus threat. How do computer viruses find us? By sharing files with other users. By visiting untrusted web sites. By opening spam emails or email attachments. By downloading free stuffs. By installing untrusted software application without fully reading the license agreement. Symptoms of computer viruses: Slow PC performance. Unexplained data lost. Frequent computer crashes. Unusual computer behaviors Incorrect program installation. Best ways to prevent computer viruses: Use anti-virus protection and firewalls. Get anti-spyware software protection. Update the operating system regularly. Increase browser security settings. Download only from trusted sites. Do not open messages from unknown senders. Frequently visit advisory sites. Hackers Peoples are the only threats for computer network security. Because computers dont have the ability to create malicious programs or launch attacks. Only the people can create malicious programs in order to break into other systems with the help of the computers. Like wise, Hackers are unauthorized users who break in to computer systems in order to steal, change or destroy information. They make the path to break into a system by installing malware without our knowledge. Computer hackers have clever tactics, tools and detailed knowledge of computing. Therefore they break into systems and steal our private and confidential information by using their tools and tactics. The subculture that has made around hackers is often referred as computer underground. Some of the people do hacking for learning purposes. Any computer connected to the internet is susceptible for the threats of hackers. These online criminals typically use phishing scams, spam, email or instant messages and fake web sites to deliver dangerous malware to our computers in order compromise our computer security. Hackers can access our information easily if our computers are not protected with a firewall. What can hackers do to us? Hijack our usernames and passwords. Steal our money and open credit card and bank accounts in our names. Ruin our credit. Sell our important information to the other parties. Make purchases. Use and abuse our Social Security number. Best ways to prevent hackers: Use firewalls. Update our operating system regularly. Use anti-virus protection. J:Networking assignmentPictures?511-0906-2321-1306_Guy_Hacking_a_Computer_clipart_image.jpgGet anti-spyware software protection. Dont open messages from unknown senders. Increase browser security settings. Avoid questionable Web Sites. DOS (Denial of Service) attacks In a denial of service attack, an attacker tries to prevent users from accessing information or other services from a particular network by flooding it with unbearable traffic. In other words, by using DOS attacks, attacker attempts to make computer resources unavailable to its users. Therefore the legitimate users cannot access the email, websites, online accounts and other services that are provided by the victimized computer. Usually DOS attacks are launched by computer hackers. When we type a URL of a particular website on the web browser, we are sending a request to the server that the particular web page is stored. Usually a server can process a limited number of requests at once. So that the attackers overload the server with vast number of requests that the server cannot handle. Therefore the server buffer or backlog will overflow and the services it provides will be unavailable to their legitimate users. This is called a Denial of Service. Like viruses, different kinds of DOS attacks are introduced unceasingly by DOS attackers. Types of Denial of Service Attacks: Flood attack Ping of Death attack SYN attack FIN attack Teardrop attack Smurf attack Symptoms of a DOS attack: Unusually slow network performance Unavailability of a particular web site Inability to access any web site Increasing the amount of spam receive Best ways to prevent DOS attacks: J:Networking assignmentPicturesDOS_attack.jpgInstall and maintain anti-virus software Install a firewall Applying email filters. Spyware Spyware is a type of malware that installed on computers and collect information about users without their knowledge. This installation process is carried out secretly by the spyware program. Sometimes network administrators purposely install spyware programs in order to monitor the other users on the network. As the term spyware suggests that it secretly monitors the users computing, its functions go well beyond simple monitoring. Spyware programs are mainly used to collect users personal information, such as Internet surfing habits and sites that have been visited frequently. Spyware programs change computer settings, resulting in slow connection speed, different home pages, and loss of internet or functionality of other programs. Unlike viruses and worms, spyware do not have the ability to self replicate. Usually spyware programs are mainly designed for commercial purposes. As I mentioned above, delivery of automatic pop-up advertisements, theft of personal information and monitoring web activities are some functions carried out by spyware for marketing purposes. Symptoms of Spyware: Slow connection speed. Changing the home pages. Malfunction of other applications. Failure to boot. System crashes. Application freezing. Best ways to prevent Spyware: Read licensing agreements before installing the applications. Beware of clickable advertisements. Scan computers often. Keep the Internet browser up to date. J:Networking assignmentPicturesspyware.jpgUse anti-spyware programs. Brief Introduction to Security Policy Once a company has determined which parts of the company should be protected, then they document a set of rules in order to protect the company assets. These documented set of rules are defined as a security policy. Although a security policy may seem to be an unnecessary set of rules, the benefits far outweigh the work. Because of it protects the Confidentiality, Integrity and Availability of company data. Mainly a security policy has the following three important benefits: Communicates a common vision for security throughout a company. Represents a single easy-to-use source of security requirements. Exists as a flexible document that should be updated annually to prevent the latest security threats. Acceptable use policy, password policy, backup policy, Remote Access policy, encryption policy, Network Security policy, guest Access policy, confidential Data policy and Mobile Device policy are some examples for policies. Why there should be a Network Security Policy, in place in all the networked companies? When organizations connect their networks to the internet, their private and confidential information also expose to the public. Therefore the possibility of outside threats, such as hackers and malicious software has increased. Thats why the Network Security Policies have been implemented by organizations in order to protect their network resources from the outsiders. Network Security Policy is a documented set of rules for computer network access. Usually this is a complex document that consists of rules for data access, web browsing habits, use of password and encryption, email attachment and more. Network security policies protect the company from outside threats an d limit the internal network access from risky employees. Therefore this document is not only a set of rules, but also a guide for the company network protection. Elements of Network Security Policy On the left are the network design factors which the security policy is based. On the right are some basic Internet threats that need to be prevent by using network security policies. Why do we need Network Security Policies? To set the framework for network security implementation. To define the allowed and not allowed actions of the network background. To create a baseline of our current network security posture. To determine the necessary tools and procedures for the network. To define how to handle network security incidents. To communicate agreements and define roles. Bibliography https://www.ciscopress.com/articles/article.asp?p=24833 https://compnetworking.about.com/od/vpn/a/vpn_tutorial.htm https://www.vpnc.org/vpn-technologies.html https://www.vpn-technology.com/ https://en.wikipedia.org/wiki/Vpn https://www.cisco.com/en/US/products/sw/secursw/ps2138/products_maintenance_guide_chapter09186a008007da0d.html https://httpguru.com/ https://www.skullbox.net/vpn.php https://www.alliancedatacom.com/how-vpn-works.asp https://www.computerworld.com/s/article/9002090/What_you_need_to_know_about_VPN_technologies?taxonomyId=16pageNumber=1 https://www.devhardware.com/c/a/Opinions/Radio-IP-Softwares-Mobile-VPN-Technology/ https://www.vpntools.com/vpntools_articles/vpn-software.htm https://technet.microsoft.com/en-us/library/bb742571.aspx https://www.laptop-security-pro.com/current-vpn-technologies.html https://www.vpntools.com/vpntools_articles/vpn-software.htm https://www.ml-ip.com/html/documentation/vpn-ug-key-concepts-4.html https://www.interhack.net/pubs/network-security/ https://www.selfseo.com/story-19229.php https://www.interhack.net/pubs/network-security/network-security.html#SECTION00021000000000000000 https://www.linux.com/archive/feature/122681 https://www.hq.nasa.gov/office/ospp/securityguide/V1comput/Threats.htm https://www.comptechdoc.org/independent/security/recommendations/ https://www.webroot.com/En_US/csc/computer-security-threats.html https://online.localtel.net/spyware/glossery_computer_threat_terms.htm https://www.londonancestor.com/security/computer-security.htm https://ezinearticles.com/?The-Top-Twelve-Threats-No-Computer-User-Should-Ignoreid=56950 https://www.topbits.com/trojan-horse-virus.html https://www.irchelp.org/irchelp/security/trojan.html https://www.ehow.com/how_4735907_prevent-computer-worm-attack.html https://www.antivirusworld.com/articles/computer-worm.php https://www.2privacy.com/www/viruses/computer-worms.html https://www.builderau.com.au/tag/features/linux-networking.htm?page=2 https://www.linuxplanet.com/linuxplanet/reviews/1821/1/ https://www.us-cert.gov/cas/tips/ST04-015.html https://www.answers.com/topic/denial-of-service-attack https://www.windowsecurity.com/whitepapers/How_to_develop_a_Network_Security_Policy_.html https://www.webopedia.com/TERM/s/security_policy.html https://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper09186a008014f945.shtml#intro https://www.instantsecuritypolicy.com/?gclid=CMHG9uCS0J4CFcwtpAodHHPujg https://technet.microsoft.com/en-us/library/cc781417%28WS.10%29.aspx https://www.foogazi.com/2006/12/19/5-advantages-of-using-linux-over-windows/ https://forum.notebookreview.com/showthread.php?t=21493 https://ubuntuforums.org/showthread.php?t=189192 https://www.vpntools.com/vpntools_articles/VPN-Protocols.htm https://www.vpntools.com/vpntools_articles/vpn-security-issues.htm https://compnetworking.about.com/od/vpn/tp/vpnsoftwarefree.html

Sunday, December 22, 2019

The Learning Theories Of English Language Education

This qualitative study is designed to answer the following primary question: What are the learning theories of English language education that are used in the Palestinian Refugee Camps in Jordan and Israel? This question will branch into the following three secondary questions: 1- What are the sociocultural and socio- economic, gender, literacy, political conflict, religion, race, political stability, religion, sexual identity aspects and their influence in English language education in an extra ordinary and a challenging learning environment? 2- What are the strategies used to deal with refugee students limited English language literacy with relevance to previous leanings and prior experiences that influence their current English language acquisition? 3- What is the contextual and relational nature of the students’ identity in the refugees’ schools? My interest in this study stems from my bilingual, political and social background. My birth and rowing up in Jerusalem in the seventies of the last century made me aware of certain historical wars that led the Palestinians to flee from their homeland in Palestine in 1948 and 1967, Lebanon in 1970 and Syria in 2011 enhanced my understand about Palestinian Refugees dilemmas including education. Additionally, this topic is relevant to my ESL teaching background and being an instructor who taught English as a second language in the Mediterranean and Arabian Gulf countries between 1985-2011. I am highly motivated andShow MoreRelated The Effects of Transitional Bilingual Education On Elementary Level Minority Students1670 Words   |  7 PagesTransitional Bilingual Education On Elementary Level Minority Students Bilingual Education has been an increasingly controversial subject throughout education systems in America. The growing numbers of bilingual students in the country have provided much debate regarding the most effective way of instructing these students in traditional American schools. Perhaps one of the newest and fastest growing methods throughout the country has become transitional bilingual education, a program which integratesRead MoreCurriculum Development Paper973 Words   |  4 PagesDevelopment of curriculum content that implements strategies and methods that enhance Language Acquisition. Presented by: Presented to: Institution: Contents a) Grade/developmental level b) Education needs and rational c) Theoretical perspective d) Learning objectives e) Content outline f) Strategies and methods g) Resources h) Lesson plans Read MoreHow Theories Of Education Have Changed Thought The Years1647 Words   |  7 Pageshow theories of education have changed thought the years and how teachers and students adapt to these changes. With the changes in multicultural classrooms and how students with disabilities have rights in public education. All early childhood theories have changed so much though the years based on a diverse multicultural world and new laws to protect students, have been put into place to aid these children. Research that was taken back in the 1900 containing educational theories wereRead MoreEducation of the English Language Learner1476 Words   |  6 PagesThe purpose of this paper is to compare two different approaches in the education of English Language Learner (ELL) students, Structured English Immersion, and Two-Way Immersion programs. The focus of this paper is to identify (1) the language ideologies behind both approaches, and each program’s purpose and components. This article also looks at the academic achievement of ELLs, the achievement gap between general education students and ELLs, and the programs’ approach to different variables suchRead MoreEnglish Language Literature Review1373 Words   |  6 PagesFor English language learners there are two approaches to le arning a new language, bilingual education where the student is first taught in their native language before transitioning to the new language and immersion where a student is taught completely in the new language. There are benefits to both approaches. The bilingual method has more flexibility for the learner and brings aspects of the first language into the learning process. The learner is better able to relate the new language to hisRead MoreDiversity And Cultural Issues Of Tesol Education1545 Words   |  7 PagesCultural Issues in TESOL Education During the course entitled Diversity and Cultural Issues in TESOL Education, issues of diversity and culture, as well as methods, strategies, and approaches for engaging English language learners were examined. Students all over the world learn English for a variety of reasons. Some students must study English as a requirement. Other students may wish to travel, study abroad, or work in the global marketplace where knowledge of the English language is seen as a prerequisiteRead MoreProblems Associated With Language Education1472 Words   |  6 Pagesmany difficulties associated with language education, especially for pre-service teachers. Throughout the weeks, I have learnt several issues that can be problematic when teaching a second language to students, especially in regards of the Pre-service teachers who may seem inexperienced and unable to perform. Moreover, there is a difficulty in achieving expertise with a secondary language, without the complex understanding of the theorie s that assist in learning. In this essay I will attempt to addressRead MoreForeign Language Learning Motivation As An Integrative Factor1506 Words   |  7 PagesINTRODUCTION Foreign language learning is mandatory in some states in elementary and secondary education in the United States. During higher education, some students take language learning class at the bachelor level, however, graduates students do not follow this tendency. At the University of Pennsylvania Graduate School of Education, I have realized that the students who pursue the M.S.Ed. Program in International Educational Development incline to take a language learning course even if the programRead MoreTeaching English As A Language959 Words   |  4 PagesTheories abound reporting the most effective method of teaching English as a language, and the two methods that people tend to subscribe to are 1) primarily focus on the technical side of the language or 2) primarily focus on the content. Stephen Krashen believed that â€Å"subconscious acquisition† of a language â€Å"is separate from conscious learning and is superior in the long run,† as H. Douglas Brown paraphrases i n Principles of Language Learning and Teaching (289). As one of his hypotheses of languageRead MoreThe English Language Learner Is Defined By The Individuals With Disabilities Education Act1445 Words   |  6 Pages An English language learner is defined as someone who â€Å"has sufficient difficulty speaking, reading, writing, or understanding the English language and whose difficulties may deny such individual the opportunity to learn successfully in classrooms where the language of instruction is in English† (Ortiz, Woika, 2013, p. 2). As defined by the Individuals with Disabilities Education Act (IDEA), a child with a disability has â€Å"mental retardation, hearing impairments (including deafness), speech or language

Saturday, December 14, 2019

Study of Leadership can leaders be born or made Free Essays

Introduction As everybody is living in a competitive world leadership skills are important for successful business. Leadership referred to as direct people to perform a particular task. In a business world, if someone wants to go ahead in the field he may need certain skills which may give an opportunity to be a good leader. We will write a custom essay sample on Study of Leadership: can leaders be born or made? or any similar topic only for you Order Now Simply, it allows a person to climb up the business ladder. Therefore leadership can be considered as one of the main assets a successful manager should have. Management concerns about an effective and efficient way to achieve organizational goals through planning, organizing, staffing, directing and controlling organizational resources. Whereas leadership is one of the components of directing function mentioned above. This means that leadership often linked to the role of the manager or expert. However, leadership and management are two distinguish roles which are confused by many people. Not all managers, for example, are leaders; and not all leaders are managers. Many researchers have studied leadership in a quantitative and qualitative way and seen that it is far more sophisticated and complex that the leadership concepts discussed in the popular leadership books. Leadership can be represented as a process whereby someone influences the thoughts, attitudes and behavior to achieve an organizational goal. As a result, leadership can make employees more confident and train them to increase productivity through building trust and friendly atmosphere which makes employees to feel safety of their jobs which will help to increase the productivity. In an organization there are informal leaders with no tittle, no authority, no position power, but they can increase personal power. Nowadays, most of the companies agreed that management without leadership is an ineffective activity. The resources of the organization cannot be managed without proper leadership. In addition to that without leadership organization may move too slowly and which may result lose their business too. Leader is the one who is a trustworthy, self-confidence and fulfill promises made and consider the work seriously. Different people are having different attitudes and therefore, they give a solution to a particular problem/conflict in a different way. Therefore, most suitable decision needs to be selected when conflict arises. Therefore, leadership is an activity to get other people to do right things. Therefore, the need lf selecting better leader for an organization has become a challenging task. Thus, by having right team with fully motivated staff and great leadership qualities can enhance the reputation and productivity of the organization. Some researchers commented leadership as a personality perspective such as a trait or behavior whereas others think leadership is an information processing perspective.Therefore, in this analysis it is going to be analyze whether leaders are born or can made. Are leaders born? In the real world there are so many self-made leaders who become success in the business. It is a debatable issue whether they become top by born or experience gained during their life time. When considering Trait theory (Ghee Draft, 2004) explained that â€Å"traits are the distinguishing personal characteristic of leader such as intelligence, honesty, self-confidence, and appearance†. That means the Trait theory mainly emphasis that leaders are born. However, this is questionable to see whether people are born as a leader. In that case, it is also needed to investigate people who are not born cannot be a leader. Vien Goleman (1998) reveals that five aspects of emotional intelligence such as self-awareness, self-regulation, motivation, empathy, social skills can be learned and provide. However, this concept is almost similar to the Trait Theory. Therefore, most of people argue that the traits are important in the development and deployment of people skills. Most of the people argue that leadership is born when consider some characters such as artists and players. However, they have realized that leadership is actually not born. Therefore, following examples illustrate the above concern. Tiger Woods- Golf Champion He has born with some talents of sports. His father worked hard from his early ages to make him Golf champion. Mozart- Musician He also has born with certain musical talent. As his father wanted to make him as a musician from his childhood he was trained to use instruments etc. Hendry Ford – Automobile leader His parents were poor people who came to America with the hope of new start for their lives. When he was a child, most of the time he spent with his mother. He is quite and inward looking. In his young age, he mother passed away. He was working as a low level mechanist in various places without having enough money spend better life. He didn’t have any resources such as birthright and pedigree that could make him a born leader. But, finally he became as the greatest leaders the corporate world ever seen. (http://www.businessworld.in/index.php/Columns/Are-Leaders-Born.html, 14/03/11) Those examples prove that their natural talent and qualities improved through hard work of many years. In other words they have improved their influencing ability. â€Å"Leadership is as a process whereby an individual influence a group of individuals to achieve a company goals† (Northouse, 2010) Above definition reveals leadership as a process which means it is not trait or characteristic of leadership, but something deferent between leader and the followers. In addition to that it tells that leadership is not a linear event, but it can be considered as a communicating event. Therefore, it emphasizes that leadership is available to everyone. In this circumstance, it is vital to discuss about whether leadership can be made or born. Leadership is Made: A successful business requires proper leaders, but not managers to run the organization to a leading position in the market. Therefore, to achieve this, managers should be a real leaders. Some argue that good leaders are made not born. If someone wants to be a leader he can be an effective leader by improving leadership qualities such as goals, values and concepts. Bateman Snell (2009) reveals a leader who keeps focus on moving the organization towards its ideal future, motivate them to overcome whatever barriers lie in the way. Therefore, leaders need to motivate others and build cooperate with them to achieve organizational goals. Simply, leaders need to make friends rather than enemies. Further, smiley and friendly approach will be the asset to reach for the success. In order to be a successful leader who needs to gain better training to harvest the success. The leader can develop positive thinking which can be enhanced by positive thinking and better training. Therefore, one’s own abilities and traits are not enough to become a successful leader. In a real world, â€Å"he is born to be a leader† or â€Å"he is a natural leader† is commonly used phrase. It suggests the Traits perspective takes major part in the leadership. Further, it says that a particular person may have inborn characteristics or qualities which will help them to become leaders. However, figure 1 shows there is a difference between the Trait concept and Process concept (Northouse. P, 2009). Figure 1- The difference between the Trait and Process concept The Trait leadership tells that people who have special, inborn, talent can be a leader. Some of the traits are identified as height, intelligence, fluency and etc. Whereas, the Process concept suggests that leadership is interaction between leaders and followers and makes it available to everyone. Further, it says that leaders need followers and also followers need leaders who are closely linked to communicate each other to continue relationship. Northouse (2009) suggests that according to Douglas Mc Gregor (1960) theory, leadership can be concerned in two aspects such as Theory X and Theory Y. Theory X emphasis if employees are shy, they need to monitor, direct and control by the leader. On the other hand, Theory Y concerns that some people take responsibility and organize themselves to achieve organizational goals. According to theory Y, employees can be easily motivated. However, this concept was taken into account later years and Black and Mounton (1964) developed â€Å"Managerial Grid† (Northouse, 2009). In this grid he suggests two aspects of leadership behavior such as production and concern of people. Production- this aspect concern about task oriented behavior such as clarifying roles, scheduling work, and measuring output. Concern for people- this emphasis on building trust, camaraderie and a friendly atmosphere. As this is more concern about the people, it helps to motivate employees in order to achieve defined set of vision, strategies and targets of the organization. Therefore, all the theories mentioned above reveals that leadership is accessible for everyone. Northouse (2009), suggests that leaders should focus on vision, purpose, core values and the structure to translate them to take better business decisions. Therefore, it is essential that all level of employees needed to motivate to achieve the organizational targets. Many researchers such as Mc Gregor’s (1960) theory and vroom’s (1964) expectancy theory motivation reveals that followers are able to achieve targets of the organization with the influence of leaders. In addition to that, in expectancy theory it also suggests that different people concern different things. Therefore, different motivational needs are required. Hence, to understand different situations and different people within the organization the need of training and learning skills required for an effective and efficient leader. Further, leaders should have some attributes and qualities to motivate employees or the team in the organization. Therefore, an effective leadership is an important asset to the organization as great leaders create great business components of business success through delegation, direction, motivation, evaluation and conflict resolution. Bateman and Snell (2009) suggest that leadership can be learned and improved by coaching or mentoring. Therefore, better training will enhance the leader to self-motivate and hence, he or she can motivate the team as well. Conclusion In my concern, leaders can be made which means it is accessible for all people and can be learned as a behavior. There are no born leaders. However, all humans born with unique strengths and it enable to be a successful leader. Leadership is a skill, a proper leader needs to have and can be improved with practice. As a person gain more and more practice his or her leadership qualities improve. In some situations, the company may have leaders but not identified their potentials. In that case, they can make a better leader by giving them better training and performance appraisal. This proves that people are not born leaders. In my view, someone can born with some personal qualities and characteristics that makes it easier. When the responsibility is given to a person it gives an opportunity to get broad skills and being coached by someone to encourage them. Hence, they can be motivated and perform on their own skills and knowledge to succeed the company. Reference Teamtechnology (n.d), Leadership and Management (online) Available from: http://www.teamtechnology.co.uk/leadership-basics.html (accessed 11/01/11) Big dog and little dog’s performance juxtaposition (n.d), concept of leadership(online) Available from: http://www.nwlink.com/~donclark/leader/leadcon.html, (accessed on 11/03/11) Paggu (2009) What is leadershipWhat are the component of effective leadership(online), Available from: http://www.businessworld.in/index.php/Columns/Are-Leaders-Born.html (accessed: 11/03/11) Ehow (2010) why leadership is important in business(online), Available from: http://www.ehow.com/about_6585775_leadership-important-business.html (accessed 11/01/11) Ezinearticle (n.d), are there any born leaders?(on line), available from: http://ezinearticles.com/?Are-There-Any-Born-Leaders?id=477742 (accessed on 14/01/11) Business Mastery (n.d) Are leaders born(online), Available from : http://www.businessworld.in/index.php/Columns/Are-Leaders-Born.html, accessed on 13/3/11) Bateman, Thomas S., Snell, Scott A. (2009). Management: Leading and collaborating in the competitive world (8th ed.). New York: McGraw-Hill/Irwin. Great leaders are made, not born. (n.d) Available from :http://blogs.hbr.org/goldsmith/2008/01/great_leaders_are_made_not_bor.html (acceseed on 18/03/11) Northouse. P (2009), Leadership: Theory and Practice (5th Edition), London, Sage Publications. Torrington D, Hall L, Taylor S (2002), Human Resource Management (5th Edition), England, Pearson Education Ltd. How to cite Study of Leadership: can leaders be born or made?, Essay examples

Friday, December 6, 2019

QUIZ free essay sample

Considering this definition of plagiarism, is the passage below from a College 00 paper, concerning the OPUS plagiarism policy, an example of plagiarism? A simple definition Of plagiarism is taking the writings Of another person and adopting or Incorporating their ideas without proper source attribution. A. Yes, because this passage is a direct quote without the use of quotation marks. B. Yes, because this passage is a simple rearrangement of the authors words without giving credit to the author. C. No, because this passage is a paraphrase of the authors words. D.No, because this passage has been correctly cited. Question 4 of 20 Italicize the name of books, journals, and magazines, but do not italicize the name of an article. True False Feedback: (answer located in the Citation and Plagiarism Powering, PAP Guide from the OPUS Library, and the Basics of PAP Style Tutorial) Question 5 Of 20 A feature of academic writing is the research and analysis of others work. S. union density since the 1980s? Stable in the public sector and declining in the private sector. Media portrayals of unions refute stereotypes that unions are corrupt, motivated by greed, and protect mostly unproductive and poor employees. False Despite the poor working conditions and low wages, one safeguard that employees had in the early part of the 20th century, was stability in employment because legally employers needed a good reason to fire someone. False According to the mainstream economics school, the role of the government is to protect individual worker rights through legislation such as minimum wage laws, safety and health laws, and income protection benefits (e. g. , unemployment compensation) False According to the critical industrial relations school, the cause of the labor problem is that the capitalistic class has control over both society’s institutions and the means of production. True

Thursday, November 28, 2019

Brotherly Love Essays - Gambino Crime Family,

Brotherly Love The snow fell from the night sky like millions of little white stars that lost their hold on the firmament. Little Sammy always one to love the snow ignored it for the moment, showing uncharacteristic concern for his brother. "What's the matter Todd? You've been acting strange all day. I know something's on your mind or you wouldn't have that look on your face. You always look that way when something's wrong". "Oh, it's nothing important little brother, just problems with Sandra again last night. The date went fine and I actually liked the flick this time but later in the back seat I shot jungle juice everywhere before we could even get started. If this had been the first time I wouldn't be so angry but dammit," he accented his curse by punching his thigh, "it's been four times now". Sammy's brow creased for a moment in thought and then his eyes lit up. Being a bit too quick of a thinker, Sammy often stated the obvious and did so now. "Remember that scare you had when you were slamming saddles every night with Judith? She had to go out and buy a pregnancy test. Obviously you weren't having much trouble with her; I think it must have something to do with Sandra herself". Todd could almost see the light Sammy was basking in from the bulb above his head and offered the tyke a warm smile. Sammy was only twelve years old but sometimes he dissapointed Todd with his slow wits. He liked to encourage the boy though and did not mention that he had already come to this conclusion quite some time ago. Even Albert Einstein had trouble in his youth and he could see that Sammy had that kind of potential. In fact he was lucky his brother could think at all. Some kids were born retarded you know. "That's probably right kid but I just don't know what it could be about her that makes me miss the boat and jizz every time. I mean I got my lovebone all poised to slip inside that perfect pie and I just blow it. . . literally. She's getting fed up and I bet her fingers have been working overtime lately seeing as I'm not holding up my end of the deal," Todd paused a moment and looked Sammy in the eye, "Have you ever bumped uglies? I know your only twelve but I've seen how young they start on Montel and Ricky Lake". Sammy's face went a deep shade of red, "Well, I did the three finger tango with Beth after the Halloween Dance last month but I've never navigated nookie", he looked away quickly and began to unconciously tap his toes. The boy was obviously embarrassed. Todd wondered whether his uncomfort stemmed from the fact that they were talking about Sammy wetting his carrot or the fact that he hadn't done it at all. This made him feel proud and nostalgic at the same time. "Well," Todd began, "first of all you know how it is then when you first smell that luscious *censored*. That wet sweet aroma. Douched every other day, lavished with creams and powders only fouled up once a month by unholy seepages. But God didn't make Eve equipped with a bottle of Stay-Fresh. No, it's good no matter what. . . "What's Stay-Fresh"? "It's douche, brainiac. That stuff Mom keeps next to her *censored* diapers under the sink. Now, don't interrupt! I was saying that that smell is enough to send your John Thomas ripping right through the denim of your jeans; and that's just the beginning. Long ago I stopped working my digits in Sandra's sopping mine and tried to go spelunking with my pride and joy right away. I did away with the foreplay so to speak. I thought maybe I got so worked up in those sweaty safaris in her cradle I just shot my wad too soon. FUCK!", Todd punched his thigh harder this time, "Nothing seems to work". Sammy put on his thinking cap again while Todd simmered after his outburst and thought for a minute. He was usually unconcerned with his brother's (or anyone else's for that matter) problems but when it came to this line of talk he would get a throbbing erection. This was better than playing in the snow any day. "I know!", he exclaimed, "Remember when Grandpa used to fool around with us before he was sent to prison? I would pretend I was

Monday, November 25, 2019

How Irish Immigrants Overcame Discrimination in America

How Irish Immigrants Overcame Discrimination in America The month of March isn’t just home to St. Patrick’s Day but also to Irish American Heritage Month, which acknowledges the discrimination the Irish faced in America and their contributions to society. In honor of the annual event, the U.S. Census Bureau releases a variety of facts and figures about Irish Americans and the White House issues a proclamation about the Irish experience in the United States. In March 2012, President Barack Obama ushered in Irish-American Heritage Month by discussing the â€Å"indomitable spirit† of the Irish. He referred to the Irish as a group â€Å"whose strength helped build countless miles of canals and railroads; whose brogues echoed in mills, police stations, and fire halls across our country; and whose blood spilled to defend a nation and a way of life they helped define. Defying Famine, Poverty, and Discrimination Defying famine, poverty, and discrimination, these sons and daughters of Erin demonstrated extraordinary strength and unshakable faith as they gave their all to help build an America worthy of the journey they and so many others have taken.† History of Discrimination Notice that the president used the word â€Å"discrimination† to discuss the Irish American experience. In the 21st century, Irish Americans are widely considered to be â€Å"white† and reap the benefits of white skin privilege. In previous centuries, however, the Irish endured some of the same discrimination that racial minorities endure today. As Jessie Daniels explained in a piece on the Racism Review website called â€Å"St. Patrick’s Day, Irish-Americans and the Changing Boundaries of Whiteness,† the Irish faced marginalization as newcomers to the United States in the 19th century. This was largely because of how the English treated them. She explains: â€Å"The Irish had suffered profound injustice in the U.K. at the hands of the British, widely seen as ‘white negroes.’ The potato famine that created starvation conditions that cost the lives of millions of Irish and forced the out-migration of millions of surviving ones, was less a natural disaster and more a complex set of social conditions created by British landowners (much like Hurricane Katrina). Forced to flee from their native Ireland and the oppressive British landowners, many Irish came to the U.S.† Immigrating to the U.S. Didn’t End the Hardships But immigrating to the U.S. didn’t end the hardships the Irish experienced across the pond. Americans stereotyped the Irish as lazy, unintelligent, carefree criminals and alcoholics. Daniels points out that the term â€Å"paddy wagon† comes from the derogatory â€Å"paddy,† a nickname for â€Å"Patrick† widely used to describe Irish men. Given this, the term â€Å"paddy wagon† basically equates being Irish to criminality. Competing for Low-Wage Employment Once the U.S. ceased to enslave its African American population, the Irish competed with blacks for low-wage employment. The two groups did not join together in solidarity, however. Instead, the Irish worked to enjoy the same privileges as white Anglo-Saxon Protestants, a feat they accomplished partly at the expense of blacks, according to Noel Ignatiev, author of How the Irish Became White (1995). Subjugating Blacks to Move up the Socioeconomic Ladder While the Irish abroad opposed slavery, for example, Irish Americans supported the peculiar institution because subjugating blacks allowed them to move up the U.S. socioeconomic ladder. After slavery ended, the Irish refused to work alongside blacks and terrorized African Americans to eliminate them as competition on multiple occasions. Due to these tactics, the Irish eventually enjoyed the same privileges as other whites while blacks remained second-class citizens in America. Richard Jenson, a former University of Chicago history professor, wrote an essay about these issues in the Journal of Social History called â€Å"‘No Irish Need Apply’: A Myth of Victimization.† He states:​ â€Å"We know from the experience of African Americans and Chinese that the most powerful form of job discrimination came from workers who vowed to boycott or shut down any employer who hired the excluded class. Employers who were personally willing to hire Chinese or blacks were forced to submit to the threats. There were no reports of mobs attacking Irish employment. On the other hand, the Irish repeatedly attacked employers who hired African Americans or Chinese.† Advantages Used to Get Ahead White Americans often express incredulity that their ancestors managed to succeed in the United States while people of color continue to struggle. If their penniless, immigrant grandfather could make it in the U.S. why can’t blacks or Latinos or Native Americans? Examining the experiences of European immigrants in the U.S. reveals that some of the advantages they used to get ahead- white skin and intimidation of minority laborers- were off-limits to people of color.

Thursday, November 21, 2019

The 2011 earthquake in Japan Essay Example | Topics and Well Written Essays - 1250 words

The 2011 earthquake in Japan - Essay Example The 2011 Earthquake in Japan. Cause of the Earthquake. In March11, 2011, a destructive earthquake measuring 9.0 on the Richter scale struck Japan. The epicenter of the quake was near the East coast of Honshu, which was at a depth of 24.4 kilometers. According to Aislinn (2011), the movement along the two main plate boundaries caused the earthquake. Honshu Island is situated at the junction of three continental plates, the Pacific, Philippine, and Eurasian Sea plates. Earthquakes are generated by the tectonic plates that build up the surface of earth through bending, snagging, or breaking of these plates as they move past one another. Alexandra notes that thrust faulting caused the March 2011 earthquake; in thrust faulting, rocks positioned in the lower layer of the earth’s crust get pushed above the overlying layers. These faults occurred on or near the interface plate boundary between the North America and Pacific plates (Alexandra, 2011). This occurred near or along the boun dary where the Pacific Plate moves under Japan. The rate of convergence in the Pacific Plate’s border near Japan is much higher than in other zones. The Pacific plate thrusts beneath Japan at the Japan Trench, and plunges to the west underneath Eurasia; these plates are rocky and they creep past each other at a slow rate. The Pacific plate moves at a velocity of 3.2 inches per year westwards towards the North America plate. As the two plates shift past one another, they release seismic pressure and energy which cause earthquakes (Aislinn, 2011). Japan is situated in a place known as the Ring of Fire; this place experiences most active volcanoes. The Pacific Basin, which holds Japan, has oceanic trenches and experiences volcanoes around it. These volcanoes and oceanic trenches contribute to occurrence of earthquakes in Japan. Damages of the Earthquake. Alexandra (2011) notes that earthquakes that occur under the sea floor unleash tsunamis; these tsunamis are more devastating t han the earthquake itself. Violent movement of the earth’s crust displaces enormous quantities of water; these waves are known as tsunamis. Massive fires, generated by the earthquake, were blazing out of control leading to death, injuries, and the destruction of property. The quake left hundreds of people injured, dead or missing; it killed over 9,000 people. Tsunami wave destroyed power lines and swept homes, cars, ships, boats, trains, and massive islands of debris out to the ocean. Over four million buildings in Tokyo and its suburbs had no power after the quake. Reports indicated cases of landslides and collapse of buildings in several locations along the 2,100 kilometer stretch of coastline. Muddy water waves flowed over farmland near Sendai carrying buildings. Burst of gas pipes led to burning of houses and destruction of properties. Runways of the Sendai airport became inundated with trucks, buses, cars, and thick mud. Debris blocked the roads, and the communications s ystems, including the destruction of telephone lines. There was the suspension of train services in Tokyo and northeastern Japan, which serves around ten million people a day. The quake destroyed nuclear facilities located north of Tokyo. The government of Japan estimated the damage of the quake at $309 billion which was much higher compared to damage caused by the Hurricane Katrina in America. Effects of the Earthquak

Wednesday, November 20, 2019

Strategic Management of Target Assignment Example | Topics and Well Written Essays - 1250 words

Strategic Management of Target - Assignment Example Target stores are usually large and cover about 95000 to 135000 square feet. They carry a variety of goods that includes hard lines, soft lines (clothing) and a few groceries. The items found in the target stores specifically includes clothing, shoes, jewelry, beauty and health products, electronics, DVDs, pet supplies, hardware supplies, beddings, sporting goods and kitchen supplies. The stores also carry seasonal merchandise, which includes Christmas decorations during the months of November and December. Depending on the location, the stores might also contain target optical, target clinic, and a portrait studio. By offering a variety of items to the customers, target stores emerge as a business that can survive in a competitive market (Bouwens and Kroos, P. 171).To survive in a competitive environment, a business should be able to assess its internal and external environment. In the internal environment, the business should be able to know its strengths and weakness. The strength s being factors within the organization that makes it compete favorably with the other competitors while weakness is factored at the organization that makes the business not to compete favorably with the other competitors. In external environment, the business should assess its threats and opportunities to be able to adjust to the market changes. This will enable the business to thrive in such environment. The target stores have a number of strengths that make them survive in the today’s competitive retail business.

Monday, November 18, 2019

Research report Essay Example | Topics and Well Written Essays - 3000 words

Research report - Essay Example The study also found that majority of customers prefer to receive information about the new supplier via post and then by salesperson visit. Presence on the web have has also been selected. It is recommended that information be sent via post and published via web. These customers can then be followed up by salespersons for generating business. We found that 74% of customer have been approached by 0-2 suppliers for their business and 42% of customers have never switch suppliers in the last five years. This means that if the new supplier is able to market the service in accordance to the top 3 desired and top 3 existing attributes, these customer can move over to the new suppliers. 64% of the customer who have switched suppliers over the last five years indicated that they have been approached by a supplier for their business. This indicates that the general trend of the market is to be approached by the new suppliers rather than approaching the supplier with their business. For the analysis, the age of the sample has been broken down into three groups – below 30, 30 to 60 and over 60 years of age. In this sample, we found the majority of respondents between the age of 30 and 60 ( at 42%), closely followed by respondents below the age of 30 ( at 30%) and then respondents over the age of 60 (at 28%). Major of the respondents fall within the income bracket of $50,000 and above (at 64%) compared to respondents with income below $50,000 (at 36%). Considering the income bracket, the sample is unevenly distributed across various respondent profiles. During this analysis, the masses with income lesser than $50,000 are under-represented, so are females. In terms of age, the 30 to 60 age group is dominant, however this is required since this is the age group which would normally be found as a familys decision maker age group. The positive implication of these limitations is that the actual decision making age group is largely represented but the

Saturday, November 16, 2019

Case Studies On The Importance Of Oral Care

Case Studies On The Importance Of Oral Care This submission is going to focus on the nursing care that I gave in one placement simulation and two consecutive shifts on placement, placing emphasis on oral care, medication management and communication. It will outline the fundamental aspects of clinical nursing skills that have taken place in my setting. This will also highlight the learning process taken place and how it helped me to enhance my knowledge, and ethical values in order to deliver quality and safety of care. Using other sources of current literature, I will use a reflective model to discuss how I have achieved the necessary level of learning outcome. By utilising this model I hope to demonstrate my knowledge and understanding in relation to these skills as well as identifying areas with scope for learning. Reflection is the process of reviewing an experience in order to describe analyse, evaluate and so inform learning about practice (Reid 1993). Gibbs (1988) model of reflection will be used as a framework, because it focuses on different aspects of an experience and allows revisiting the event fully. By contemplating it thus, I am able to appreciate it and guided to where future development work is required. For confidentiality purposes the patients real names will not be used and will be referred to patients as B and R. This is in line with the (NMC, 2008) requirements to maintain confidentiality at all times. A diary is supported in this assignment as an appendix within the time of the process. The reflective model I have chosen to use as guidance is Gibbs (1988). The care of a patients mouth forms an important component of assisting hygiene needs and yet is a nursing skill which is not always afforded the attention it fully deserves (Evans, 2001) Description I was part of a placement simulation group which went to the multi-skills laboratory to practice delivering and receiving oral hygiene. I was assigned a colleague to brush his teeth using a toothbrush and paste. I put on gloves to pre vent contamination (NICE 2003). Seeking his consent, I undertook a brief visual assessment of his mouths health. I then put him in a comfortable position so that he could tolerate the wash. Thereafter, I cleaned all-round the mouth, gums and tongue. I finished off by helping him to rinse his mouth with mouthwash. I treated my partner as though he was physically unable to hold the brush himself to scrub his own teeth, but he was able to communicate with me and was able to assist me in terms of spitting and gargling with water at the end of the procedure. Feelings When first informed that I was expected to undertake this task I felt anxious and concerned. I was aware that I had not brushed anyones teeth outside of my family before and that the mouth is an intimate and personal part of the body which is not usually exposed to anyone other than myself or the dentist. I was concerned about how my partner (whom I did not know well at that stage) would react to me examining his mouth. Writ ers have described such intimate physical assessments as creating a potentially intrusive situation (Lewis 2006, Sturdy 2007) which might cause the patient to feel uncertain and inadequate. I was also concerned that my own anxiety was shared by my partner who also appeared embarrassed and awkward at the time. This anxiety was increased when during the procedure my partner began to cough as though distressed. This caused me to feel hesitant about continuing- a situation recognised by Millon (1994) as a common response for carers to such an experience, although I persevered with his cooperation. When the task was completed I felt comfortable with my performance overall. Evaluation What was good about the experience was that, despite being aware that this role is often delegated to health care assistants (Kelly et al 2010), I was able to deliver a fundamental component of essential nursing care (Essence of Care 2003) quite effectively. The experience helped me to appreciate that oral c are provides any nurse with an ideal opportunity to undertake a thorough physical, emotional and cognitive assessment of a patient (DOH, 2001). I was satisfied delivering this aspect of care without harming the patient as no injuries were sustained (having I checked his mouth prior to and after cleansing). Also, I was pleased to have an opportunity to improve my communication skills through the delivery of this skill and to understand the impact that this might have on the development of a therapeutic relationship with future patients. From my colleagues reaction and feedback, I understood how feedback is an important learning tool. Despite my discomfort during the undertaking of this task, the experience highlighted the potentially complex problems I might have to solve in the provision of care needs to patients for whom I may not have had contact with before. Analysis Administration of this clinical skill involved undertaking an assessment of my colleagues mouth before delivering any care in order to help determine the most appropriate means of delivering oral care. Malkin (2009) asserts that this is a critical component of the procedure and was one I was keen not to overlook. The World Health Organisation (WHO 2010) describes a healthy mouth as being free of chronic mouth and facial pain and in the situation described; this is the condition I found my partners mouth to be in. I was therefore happy to proceed with cleaning his teeth as instructed. I selected to use a soft bristled toothbrush and toothpaste. The use of these adjuncts are described by many writers as being the most appropriate in terms of removing plaque and preventing trauma to the gums (Holman et al 2005,McCauliffe 2007).Despite this it has been identified that they are also most often not selected by nurses who appear uncertain about most effective evidence based practice ( McAuliffe 2007). Conclusion Clearly, mouth care is important and that, nurses have a role in assessing and maintaining it (Malkin, 2009).The task identified the role of the nurse in providing encouragement to the patient whilst delivering oral care. His weakness created a sense of dependency upon me and necessitated the utilisation of good communications skills on my part to complete the task properly. It has raised my awareness the effects of nursing interventions on others within my practice. Action Plan At the moment, I read more books a day than practice. My aim is to be proactive in the future by promptly opening up through total participation and doing more practices by brushing my teeth on regular basis. I would consider brushing others also and allowing them to brush mine in order to become familiar with areas that are often not well attended to. Keeping up to date with evidence based principles of practice will be maintained through the scrutiny of journals that refer to this aspect of care. I will take care to remember my feelings when providing and receiving oral hygiene before deliverin g it to patients in the future. Recognising the potential for embarrassment and awkwardness I will ensure that I treat the patient with sensitivity and discretion at all times. Administration of medicines is a key element of nursing care (Audit commission, 2002,). Therefore, one is accountable for the administration of medicines. Description I shadowed my mentor during the process of dispensing medication and knew that my role as a student nurse, each registered nurse is accountable for his/her practice. As a student it is important to seek consent from the patient before any care is given which I did. I went to the treatment room with my mentor and prepared for medication for morning. During the process of medication there are important nursing protocol steps to follow. Firstly, I checked order, assessing client, label medication, provide information to the client, check the medication when dispensing and record in the patients prescription chart. Patient R was present and I offere d him a cup of water along with the Clozapine 300mg in another cup. Before I came in contact with the patient, I read their notes and the medication they are on. This gave me the baseline whether the patients comply with medication and the reason why they do not comply. Feelings The routine for prescribing medication may be different in various clinical settings. Although I have participated dispensing medication, I felt nervous and did not want my patient to see this as a weakness. (Butler, 1991,) warns us that when our self-talk is negative, we are carrying around toxic environment for ourselves everywhere we go. My mentor took the role to encourage me by assuring that I was doing fine, talking me throughout the procedures of medication management. I had brief knowledge about medication and this gave the opportunity for my mentor to question my knowledge about the right dose, time, route, right patient and right drug. My role as a Nurse is to record and report deterioration improv ement and takes appropriate action for his treatment to care. Patient R felt that he did not need medication because he is not mentally ill. This was a barrier because he had no insight and it leads him to deteriorate with compliance. Evaluation This practice includes preparing, checking and administering medications, updating knowledge of medications, monitoring the effectiveness of treatment, reporting adverse drug reactions and teaching patients about the drugs that they receive (NMC, 2008). The (NICE, 2008,) guidelines state principles for the administration of medicines that treatment and care should take into account patients needs and preferences and patients should have the opportunity to make informed decisions about their care and treatment, in partnership with their healthcare professionals. The staff discussed his presentation to healthcare professionals in the Muti-disciplinary team (MTD) if they could change his medication time and dose as he presents lack of motivatio n and sedation. People with schizophrenia should have the opportunity to make informed decisions, including advance decisions and advance statements, about their care and treatment, in partnership with their healthcare professionals.(NICE, 2008,) This is the importance of communication working as a team within the MDT. Analysis Administrating drug medication is one of the most critical nursing responsibilities for both legal reason and safety patients. Hand washing was important protocol the infection control policy as hands are source of infection and hand washing would break the chain of infection. Patient R is on Clozapine. The use of this atypical antipsychotic licensed to people who are resistant to or intolerant of other antipsychotic drugs due to the potentially the use of adequate dose of two different antipsychotic agent. Clozapine can lower the number of white blood cells that help to fight infection (BNF, 2008,). Before initiating Clozapine, patients should have a history and physical examination. For example, if the patient has a history of cardiac illness, it is important that you have regular blood tests. The reason behind this is because, if white blood cells count falls below accepted lower limit are classified as Red alerts medication must be withdrawn, and any other prescriber in the future wishing to restart medication are aware of the patients haematological history. Once a week I would go with the Patient to the Clozapine clinic to have blood test done and to monitor his potential side effects of psychiatric drug treatment. Patient R was presenting various side effects sedation, drowsiness which makes him less motivated to get out of bed for his medication leaving him to forgetting the mornings. Conclusion Not all non-compliant choose to reject medication; it may be because they forget to take them and this may be cognitive confusion. Intolerance of various side effects is the most common cause of clients discontinuing medication use (Tayl or et al 1997). It is important to remember that the symptoms can fall into a number of different categories, so patient like to be told their diagnosis and what is wrong with them (Blenkiron, 1998,). This area was one of my weaknesses, and I asked my mentor the importance of the Clozapine clinic and how it is associated with regular blood monitoring. I learnt that in order to attend regular visits, all patients must have normal leucocytes and different counts. Action Planà ¢Ã¢â€š ¬Ã‚ ¦ Communication Description On this occasion I was being observed and supervised by my mentor to work with a 45year old Caucasian man, with a diagnosis of paranoid schizophrenia and on section 37/41 of the Mental Health Act 1983. He has previously presented with chaotic behaviour, auditory hallucinations, delusions as well as violent and threatening behaviour. In the morning I would do my observation of the patient and make an assessment of how he presented himself to see if he had attended to his per sonal hygiene and activities of daily living. According to (Greenwood, et al 1999), patients who are in hospital satisfaction with information are found to be lacking. Feelings As a student nurse my role and responsibility by the (NMC, 2008,) is that you must respect and support peoples rights to accept or decline treatment and care. I observed that Patent R found it difficult to wake up and take his medication, which was a problem that staff nurses struggled with time to time. (Watson, 1995,) emphasise that caring communication is holistic, taking into account the entire person and demonstrating respect for the clients ad people. Evaluation Listening is the most important communication skill in nursing. (NICE, 2004), emphasis that communication between healthcare professionals and patients is essential. I learnt that if patients are encouraged to have treatment choice, they need to have information about the recommendation given before committing themselves. This is why it is impor tant that patients must be central to and include in their care. For the patients to be able to do this, it requires the nurse to use communication skills effectively, to develop therapeutic nurse-patient relationship in which the patient feels safe enough to disclose and discuss issues they find central to them and from jargon. Analysis During the shift I communicated with other members of the team on any significant events or any concerns with the patient. At the end of the shift I recorded what the patient had done for that day and I gave handover to the staff who were taking over the next shift. This was very important because it would ensure continuity of care and reduces any errors or omissions. A good example of effective communication links to medication is to give instructions and provide training involving analysis and synthesis of the learners experience. In reference to my patient (Gamble, 2004), illustrates when a person has mental health problem it can affect the indiv idual cognitive process, their beliefs, perception and outward behavior. If Patient R discontinues Clozapine he will become psychotic again and create a turmoil leaving the community and his family members in distress. Conclusionà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. I developed my knowledge by providing leaflets about Clozapine, encourage to attend to the clinic centre which they will explain the pros and cons of Clozapine. Action Planà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. General Conclusion I identified that some patients felt uncomfortable with direct question so it was important to use (Bein and Miller 1992), Open ended question. The outcome if the client-nurse interaction depends on the nurses ability to engage the client in decision making and share the control and power in the relationship (Roberts, et al 1995,). I felt that their were barrier to communication as I felt that some of the staffs attitudes made me feel as if I was not part of the team and sometimes lead to me no being able t o give my views on issues regarding patients. Although I am aware that all nurses do not use evidence in the same way and may use different methods in clinical settings. I felt that working in partnership with the patient and other health professionals can enable time to build supportive and empathetic relationship as an essential part of care. (NICE, 2008,). The process of learning I went through is more complex than Gibbs suggests. It is not as cyclical as this model implies and I found myself jumping or combining some stages, before coming back. However, it has taken me out of my comfort zone, challenging my thinking.