Monday, August 24, 2020

The Indonesian Tourism Industry Tourism Essays

The Indonesian Tourism Industry Tourism Essays The Indonesian Tourism Industry Tourism Essay The Indonesian Tourism Industry Tourism Essay The capital city of Indonesia, Jakarta with a whole populaces of 9.6 million ( BPS, 2012 ) with five nations viz. West, East, North, South and Central, has positive financial developing since period 2000 to 2011, which to a great extent was continued by the three boss areas, for example, ( 1 ) monetary, existent domain and concern administrations division, ( 2 ) exchange lodging and eating house segment and ( 3 ) creation segment. ( BPS, 2012 ) The expanding of financial developing offers effects on the touristry business in Indonesia. In January 2011, the Culture and Tourism Minister of Republic Indonesia reported the supplanting of Visit Indonesia Year criticism with Fantastic Dutch east non mainstream players as segment of touristry run that normal to pull 7.7 million outside tourers and deliver $ 8.3 billion of gross. While 50 % of this gross will be produced from gatherings, show and presentations that will take topographic point in arranged topographic point in Indonesia. ( The Jakarta Post, 31st December 2010 ) . Jakarta, where the cardinal specialists, exchange, administrations and industry are situated at, makes Jakarta a completion for concern explorers or as a specialists cardinal gathering. In add-on, with the finishing establishments at JIExpo Kemayoran in North Jakarta, Jakarta Convention Center in Central Jakarta, Balai Kartini in South Jakarta, Semanggi Expo in South Jakarta, Jakarta will go one of the touristry finish for MICE ( Meeting, Incentive, Convention, and Exhibition ) concern. ( Sarya, 2011, p.16 ) Table 1. : The measurement of figure of universal tourer coming to through entryway Air terminal Year 2008 2009 2010 2011 Soekarno Hatta, 1,464,717 1,390,440 1,823,636 1,933,022 Ngurah Rai, 2,081,786 2,384,819 2,546,023 2,788,706 Polonia, 130,211 148,193 162,410 192,650 Sam Ratulangi 21,795 29,715 20,220 20,074 Batam 1,061,390 951,384 1,007,446 1,161,581 Juanda, Surabaya 156,726 158,076 168,888 185,815 Adi Sumarmo 19,022 16,489 22,350 23,830 Minangkabau, 40,911 51,002 27,482 30,585 Others 1,257,939 1,193,612 1,224,489 1,311,468 Whole 6,234,497 6,323,730 7,002,944 7,647,731 Starting: Biro Pusat Statistik, 2012 Table 1.1 shows that the worldwide tourers who showed up through Jakarta s International Airport viz. Soekarno Hatta, have expanded twelvemonth to twelvemonth which in 2011, it came to about 1.9 million. The whole universal tourers who came to Indonesia in 2011 have about arrived at the sign of the Culture and Tourism Minister to pull 7.7 million remote tourers. Lodging Industry For some huge states like Jakarta, which has many concern exercises, inn gets one of the most beneficial salary creating belongingss ( Internal data Colliers International Indonesia, 2012 ) . There are four advantages from inn industry for a state ( Medlik A ; Ingram, 2000, p.4 ) , which are, In certain nations, inn as an alluring power of visitant who bring passing influence and who will in general pass more cash than they do when they are at place. This visitant dispensing power habitually gives huge part to the financial framework gross of a state. In Jakarta, lodging, exchange and eating house segment is one of top three divisions which give a greatest part in GDP for generally mature ages. From period 2009-2011, lodging, exchange and eating house part has contributed 20 % for DKI Jakarta s GDP ( Gross Domestic Product ) . ( BPS, 2009 2011 ) In nations which having outside visitants, lodgings play huge capacities as outsider cash workers which can give huge part to their state s parity of installments. For states which have little prospects of fare may accept lodgings as their outsider money workers. Lodgings can flexibly numerous occupation risks that this capacity is of import for nations which have little figure of beginnings of work, where they add to local turn of events. Lodging can move as a medium to promotion the stocks of different enterprises. To a great extent inn are provided with supplement, drink and different consumables which bought from neighborhood husbandmans, anglers and different suppliers. Utilizing neighborhood stocks in their administrations makes this lodging non simply can loan directly to their monetary framework gross to state as an outsider cash workers yet adjacent to by implication as a commercial foundation to progress other nearby enterprises. Lodgings may go cultural action Centers for neighborhood individuals and much of the time their eating houses and different establishments can pull nearby use. The positive macroeconomic becoming empowers the positive developing of lodging flexibly in Jakarta, as a react from inn bunches for the positive developing of room request. Some lodging bunches extend their inn connection by expanding their figure of inn, for example, Tauzia ( nearby link ) which its inn heading will create 23 inns until 2012, comprise of 15 units Harris Hotel and 8 units of Pop Harris. Next, there is the Accor bunch ( universal connection dependent on France and the biggest administrator of inns in Asia Pacific ) program to spread out their web across Indonesia from 40 lodgings in 2011 to 100 inns by 2015. PT Surya Semesta Internusa Tbk ( SSIA ) , who own and deals with the 5-star Gran Melia Hotel Jakarta and Melia Hotel Bali, plans to spread out its gross in the friendly gathering market by building up a spending inn web in 2012. The expanding figure of lodging for a spending inn to a five stars inn for period 2000 2011 are appeared on the Figure 1.2, ( from the period 2012 2015 are projection figure ) , Starting: Adopted from informations inside Colliers International Indonesia, 2012 Figure1. : The inn gracefully in Jakarta by figure of lodging from period 2000-2015 Starting: Adopted from informations interior Colliers International Indonesia, 2012 Figure1. : The lodging flexibly in Jakarta by figure of room from period 2000-2015 In view of the Figure 1.2, the flexibly of inn since 2000-2011 are ruled by 5-star lodging and 4-star inn, while until 2011 there were at that point 37 five-star inn and 35 four-star inn in Jakarta. These inn bunches which play in Jakarta inn showcase comprise of universal and nearby exchange names. Some of universal exchange names Indonesia which the creator would wish to advert are Holiday Inn, Sheraton, Four Seasons, Kempinksi, InterContinental, Hilton International, Ritz-Carlton and Mandarin Oriental. While the neighborhood exchange names other than forcefully work to build their ain link, from Santika, Mulia and Sultan to the Sahid Group and numerous others. The Emerging of Budget Hotel in Jakarta The develop of Budget Hotel in Jakarta started to rise in 2006, started by the Accor Group, France with the Hotel Formule1, which intends to build four other region of this lodging in Bali, Semarang, Yogyakarta and Jakarta. At that point followed by Santika Group with their Amaris Hotel that until 2012 holding 22 Amaris lodging and intending to spread out the link by including another 13 Amaris Hotel. Fundamentally the key members in spending lodging market are inn bunches who as of now have built up their star inn ironss, and on the grounds that they can see the conceivable market and request of spending inn, they include one line in their connection for spending inn. A portion of the inn bunches are appeared in Table 1. : Hotel gatherings and their exchange name on star and spending inn. Table 1. : Hotel gatherings and their exchange name on star and spending lodging Inn Group Star Hotel Brand Spending Hotel Brand Aston International Aston Hotel ( 3 Star ) Fave Hotel Accor Group Excellent Mercure ( 4 star ) Novotel ( 4 star ) Pullman Hotel ( 5 star ) Ibis Budget Hotel ( aforesaid Formule 1 ) Grahawita Santika Santika Premiere ( 4 Star ) Santika Hotel ( 3 Star ) Amaris Hotel Tauzia Hotel Management Harris Hotel ( 4 Star ) Pop Hotel PT Intiland Development Stupendous Whiz ( 3 Star ) Prodigy Hotel Starting: Adopted from informations inside Colliers International, 2012 Spending inns are known for its low menu lodging ( Barrows A ; Powers, 2009, pp.273 ) , where invitees can see staying at great quality inn, with a low money related worth. The invitees pay just for what they use. This will follow in non simply cost proficiency for the costumier however alongside for the financial specialist. In view of Colliers International Indonesia data 2012, in twelvemonth 2011 there are simply 6 spending inns in Jakarta, which are, Formule 1, Menteng by Accor Amaris Hotel, Panglima Polim by Santika Formule 1, Cikini by Accor Amaris Mangga Dua Square by Santika Amaris Soekarno Hatta, Cengkareng by Santika Amaris Senen by Santika In the Figure 1.3 shows the whole figure of spending lodging in Jakarta since rose in 2006 to 2012. Starting: Adopted from informations inward Colliers International Indonesia, 2012 Figure1. : The figure of spending inn in Jakarta from period 2006-2012 The Segment of Budget Hotel The main area of spending lodging in Jakarta is concern explorer. The popularity of concern exercises in Jakarta, which require low fiscal worth alteration with constrained help, has empowered spending inn as a central propensity for organization in taking their anxiety change. In add-on, there is a relocation work framework among enterprise when they will make growth into another nation. In the age of the 1990s, to administer or ensure the workable for worry in nation which newly started, the organization ordinarily sends an immediate top course ( Hari et al. , June 2011, p.44 ) . Since 2000 s, with the bettering monetary framework and nature of HR, the organization started to depute the endeavor at in the middle of course degree ( Hari et al. , June 2011, p.44 ) . In add-on, by deputing endeavors to the level of course, the costs will be less expensive than coordinating the top heading. Those modifications of structure, so sway the movement c

Saturday, August 22, 2020

Articles of association Essay

This sets out the standards for running the organization. It contains the methods for assembling investor conferences, the number, rights, and commitments of chiefs, investor casting a ballot rights, and ultimately subtleties of how records will be kept and recorded. Once these two archives have been concurred they are sent to Companies House (an administration body that looks out for constrained organizations). In the event that everything is all together, the enlistment center of companies’ issues a Certificate of fuse, which permits the organization to begin exchanging out makes the organization a different lawful substance from the proprietors. Subtleties of the director’s and the secretary’s expected location for the enlisted office just as their own subtleties and data of different directorships they may include held inside the last five years. This must be marked after the various archives as it affirms that the various enrollment prerequisites have been satisfied. This statement must be marked before a solicitor. Once all the structures are finished, they ought to be send to the company’s house where they are checked for such examples as affirming that the forthcoming officials of the organization are not on the excluded directors’ list. How the possession suits the business activity Peacocks group’s proprietorship suits their action since they work for an enormous scope by selling a wide scope of products like women’s wear, (undergarments, night wear, swimwear, e-compete designs), men’s wear (coats, shirts, ties, pants), children’s wear (new borns, little children, babies), road wear, foot wear, home wear. With this, they utilize in excess of 5000 work force and exchanges from more than 385 stores all through the UK. The benefits Peacocks gets from selling their merchandise is utilized to pay wages, and purchasing different items to be sold from the providers. Since Peacocks is an enormous organization, it gets a great deal of benefits from various branches and can figure out how to sell countless items and furthermore utilize enough staff to keep up the smooth running of the business. Connection between the size of the business and the sort of ownership Peacocks is an enormous business covering 110,000 square feet and has around 385 stores in the UK. It works for a huge scope and this is one reason why it is an open restricted organization. It utilizes 5000 staff to work for it all through the UK. The mechanical parts to which my organizations belong The essential area is worried about the creation or acquiring of crude materials. This incorporates occupations like cultivating, ranger service, angling and mining, and oil and gas boring. For some items, for example, fish fingers, this will be the primary phase of creation. The fish will be then sold on for handling at the optional stage. The optional part manages producing, preparing, development, and get together. This identifies with makers of buyer and modern merchandise. A paper plant, a floor covering manufacturing plant, and a house developer are completely found in this area. Optional industry forms the products that originate from the essential business and transforms them into something that individuals need. My two organizations, which are Peacocks, and Top Girl beauticians both have a place with the equivalent mechanical segment. The two of them have a place with the tertiary segment, which is known as the administration part. The tertiary part incorporates all the suppliers of administrations to organizations and to people, and can be partitioned into four areas. These are business administrations, money related and business administrations, transport and correspondence, retailing, circulation, inns and cooking. They have a place with this division since they offer types of assistance. Peacocks basically gives retailing while top young lady beauticians gives hair styling. Top young lady beauticians additionally gives retailing however as a side movement. It offers a couple of hair items to its clients just in the event that they come to complete their hair with no items. They likewise give data about looking after hair. Peacocks sells women’s wear, men’s wear, home wear and children’s wear.Consultancy work is commonly mainstream charge experts, the board specialists, and PC advisors. At whatever point there is consistent, fast change that influences business you will find that experts are frequently used to encourage how best to acclimate to these. Enlistment offices and determination specialists rely upon the activity advertise. At the point when joblessness is high they may battle, when work is acceptable and individuals are hoping to change occupations normally they profit by expanded business. Don’t overlook that enrollment offices regularly have practical experience in brief business opportunities. Security firms are turning out to be increasingly mainstream. Surely numerous retail associations do. Security administrations are typically sub-contracted in light of the fact that this is more practical than utilizing and overseeing particular security staff. Industrial cleaners are additionally sub-contracted. Your school likely purchases in its cleaning administrations instead of utilizing cleaners. This has been a development region for business visionaries in the previous few years. Secretarial administrations are commonly less mainstream than they were quite a while prior. The utilization of PCs and present day programming bundles implies that numerous individuals can deliver their own records rapidly and without any problem.

Friday, July 17, 2020

Biological Theories of Panic Disorder

Biological Theories of Panic Disorder July 15, 2019 PeopleImages/Getty Images More in Panic Disorder Symptoms Diagnosis Treatment Coping Related Conditions Currently, the exact cause of panic disorder remains unknown. However, there are several theories that take different factors into account when examining the potential causes of panic disorder. Read ahead to learn more about the biological theory of panic disorder.   The Biological Theory of Panic Disorder Serotonin, norepinephrine, and dopamine are chemicals that act as neurotransmitters or messengers in the brain. They send messages between different areas of the brain and are thought to influence one’s mood and anxiety level. One theory of panic disorder is that symptoms are caused by an imbalance of one or more of these chemicals.   Known as the biological theory of panic disorder, this theory examines the biological factors as the cause of mental health concerns.  Support for this theory is the reduction of panic symptoms many patients experience when antidepressants, which alter brain chemicals, are introduced. Antidepressants for Panic Disorder Selective serotonin reuptake inhibitors (SSRIs) (such as Paxil (paroxetine), Prozac (fluoxetine), and Zoloft (sertraline)) work by increasing the level of serotonin in the brain.Serotonin-norepinephrine reuptake inhibitors (SNRIs) (such as Effexor (venlafaxine) and Cymbalta (duloxetine)) work on both serotonin and norepinephrine.Tricyclic antidepressants (TCAs) (such as Anafranil (clomipramine) and Elavil (amitriptyline)) affect serotonin, norepinephrine, and to a lesser extent, dopamine.Monoamine oxidase inhibitors (MAOIs) (such as Nardil, Parnate) also inhibit panic by altering brain chemicals. Additional Support for the Biological Theory   In addition to the response of panic disorder to biochemical changes introduced by antidepressants, there is further evidence that an underlying biochemical change in the brain may lead to panic disorder including gamma-aminobutyric acid (GABA) and metabolic theories. Can a Chemical Imbalance Be to Blame for Panic Disorder? Gamma-Aminobutyric Acid (GABA) It is believed that GABA is a chemical in the brain that modulates anxiety. GABA counteracts excitement in the brain by inducing relaxation and suppressing anxiety. Research has indicated that GABA may play a role in many mental health issues including anxiety and mood disorders. Anti-anxiety medications (benzodiazepines) such as Xanax (alprazolam), Ativan (lorazepam), or Klonopin (clonazepam), work because they target GABA receptors in the brain. These medications enhance the function of GABA resulting in a calm and relaxed state. In several studies, GABA levels in individuals with panic disorder were lower than in control subjects with no history of panic. Future research to yield a better understanding of the role of GABA in mental health disturbances will likely lead to improved medication options for sufferers. Metabolic Theories and Panic Disorder Metabolic studies focus on how the human body processes particular substances. Many of these studies have shown that people with panic disorder are more sensitive to certain substances than they are to their non-panic counterparts. Such observations further support  the biological theory, demonstrating how those with panic disorder may have a different makeup than those without this condition. For example, panic attacks can be triggered in people with panic disorder by giving them injections of lactic acid, a substance naturally produced by the body during muscular activity. Other studies have shown breathing air with elevated carbon dioxide can trigger panic attacks in those with the disorder. Caffeine, nicotine, and alcohol have also been implicated as triggers for those with panic disorder. Myths About Panic Disorder What Does This All Mean? Despite the implications of the research to date, no definitive laboratory findings can assist in the diagnosis  of panic disorder. Chemical messengers in the brain and metabolic processes are complex and interactive. It may be that each of these theories has specific importance in the development of panic disorder. Future research is needed to further delineate and tie together the biological causes of panic disorder. Many experts currently agree that panic disorder is caused by a combination of factors. Research has also supported theories that take several factors into account such as the persons genetic and environmental influences. Researchers continue to look for the causes of mental health conditions, like panic disorder, as this can help in diagnosis and determining the best treatment options.   While learning how biochemical processes may lead to panic disorder isnt terribly helpful in making the diagnosis of panic disorder, this knowledge may be especially helpful for those who are reluctant to take medication to improve their symptoms. This is true for many other mental health conditions as well. There has been a stigma about mental illness, with attitudes still circulating that a person should be able to overcome a condition such as panic disorder on their own. Looking at what we are learning about the biochemical and metabolic theories of panic disorder, this thought pattern is akin to saying that someone should get over their appendicitis by having a positive attitude alone. How to Move Past the Stigma of Having Panic Disorder

Thursday, May 21, 2020

Computer Network Data

Sample details Pages: 15 Words: 4422 Downloads: 2 Date added: 2017/06/26 Category Information Systems Essay Type Essay any type Did you like this example? Networking and Management Introduction A computer network is a connection of two or more computers in order to share resources and data. These shared resources can include devices like printers and other resources like electronic mail, internet access, and file sharing. A computer network can also be seen as a collection of Personal computers and other related devices which are connected together, either with cables or wirelessly, so that they can share information and communicate with one another. Don’t waste time! Our writers will create an original "Computer Network Data | Information Systems Dissertations" essay for you Create order Computer networks vary in size. Some networks are needed for areas within a single office, while others are vast or even span the globe. Network management has grown as a career that requires specialized training, and comes with management of important responsibilities, thus creating future opportunities for employment. The resulting expected increase in opportunities should be a determining and persuasive factor for graduates to consider going into network management. Computer networking is a discipline of engineering that involves communication between various computer devices and systems. In computer networking, protocols, routers, routing, and networking across the public internet have specifications that are defined in RFC documents. Computer networking can be seen as a sub-category of computer science, telecommunications, IT and/or computer engineering. Computer networks also depend largely upon the practical and theoretical applications of these engineering and scientifi c disciplines. In the vastly technological environment of today, most organisations have some kind of network that is used every day. It is essential that the day-to-day operations in such a company or organisation are carried out on a network that runs smoothly. Most companies employ a network administrator or manager to oversee this very important aspect of the company’s business. This is a significant position, as it comes with great responsibilities because an organisation will experience significant operational losses if problems arise within its network. Computer networking also involves the setting up of any set of computers or computer devices and enabling them to exchange information and data. Some examples of computer networks include: Local area networks (LANs) that are made up of small networks which are constrained to a relatively small geographic area. Wide area networks (WANs) which are usually bigger than local area networks, and cover a large geographic area. Wireless LANs and WANs (WLAN WWAN). These represent the wireless equivalent of the Local Area Network and Wide Area Networks Networks involve interconnection to allow communication with a variety of different kinds of media, including twisted-pair copper wire cable, coaxial cable, optical fiber, and various wireless technologies. The devices can be separated by a few meters (e.g. via Bluetooth) or nearly unlimited distances (e.g. via the interconnections of the Internet. (https://en.wikipedia.org/wiki/Computer_networking) TASK 1 TCP connection congestion control Every application, whether it is a small or large application, should perform adaptive congestion control because applications that perform congestion control use a network more efficiently and are generally of better performance. Congestion control algorithms prevent the network from entering Congestive Collapse. Congestive Collapse is a situation where, although the network links are being heavily utilized, very little useful work is being done. The network will soon begin to require applications to perform congestion control, and those applications which do not perform congestion control will be harshly penalized by the network, probably in the form of preferentially dropping their packets during times of congestion (https://www.psc.edu/networking/projects/tcpfriendly/) Principles of Congestion Control Informally, congestion entails that too many sources are sending too much data, and sending them too fast for the network to handle. TCP Congestion Control is not the same as flow control, as there are several differences between TCP Congestion Control and flow control. Other principles of congestion control include Global versus point-2-point, and orthogonal issues. Congestion manifests itself by causing loss of packets (buffer overflow at routers), and long delays (queuing in router buffers). Also, during congestion, there is no explicit feedback from network routers, and there is congestion inferred from end-system observed loss. In network-assisted congestion control, routers provide feedback to end systems, and the explicit rate sender sends at –Choke Packet. Below are some other characteristics and principles of congestion control: When CongWin is below Threshold, sender in slow-start phase, window grows exponentially. When CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold. When timeout occurs, Threshold set to CongWin/2 and CongWin is set to 1 MSS. Avoidance of Congestion It is necessary for the TCP sender to use congestion avoidance and slow start algorithms in controlling the amount of outstanding data that is injected into a network. In order to implement these algorithms, two variables are added to the TCP per-connection state. The congestion window (cwnd) is a sender-side limit on the amount of data the sender can transmit into the network before receiving an acknowledgment (ACK), while the receivers advertised window (rwnd) is a receiver-side limit on the amount of outstanding data. The minimum of cwnd and rwnd governs data transmission. (Stevens, W. and Allman, M. 1998) TCP Flow Control In TCP flow control, the receiving side of the TCP connection possesses a receive buffer, and a speed-matching service which matches the send rate to the receiving application’s drain rate. During flow control, Rcvr advertises any spare room by including value of RcvWindow in segments, and the sender limits unACKed data to RcvWindow. TCP flow control also ensures that there is no overflow of the receive buffer. Round-trip Time Estimation and Timeout TCP Round Trip Time and Timeout are usually longer than RTT, but RTT varies, and has a slow reaction to segment loss. SampleRTT is measured time from segment transmission until ACK receipt, ignore retransmissions, and will vary, want estimated RTT â€Å"smoother† Round-trip time samples arrive with new ACKs. The RTT sample is computed as the difference between the current time and a time echo field in the ACK packet. When the first sample is taken, its value is used as the initial value for srtt. Half the first sample is used as the initial value for rttvar. (Round-Trip Time Estimation and RTO Timeout Selection) There are often problems due to timeouts, including the restriction of the sender that is compelled to wait until a timeout, and is able to do nothing during this period. Also, the first segment in the sliding window is often not acked, and retransmission becomes necessary, waiting again one RTT before the segment flow continues. It should be noted that on rece iving the later segments, the receiver sends back ACKs. Estimated RTT EstimatedRTT = 0.875 * EstimatedRTT + 0.125 * SampleRTT DevRTT DevRTT = (1 0.25) * DevRTT + | SampleRTT – EstimatedRTT Timeout interval TimeoutInterval = EstimatedRTT + 4 * DevRTT The integrated services (IntServ) and DiffServ (Differentiated Services) architecture are two architectures that have been proposed for the provision of and guaranteeing of quality of service (QoS) over the internet. Whereas the Intserv framework is developed within the IETF to provide individualized QoS guarantees to individual application sessions, Diffserv is geared towards enabling the handling of different classes of traffic in various ways on the internet. These two architectures represent the IETF’s current standards for provision of QoS guarantees, although neither Intserv nor Diffserv have taken off or found widespread acceptance on the web. (a) Integrated Service Architecture In compute r networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network. For instance, IntServ can be used to allow sound and video to be sent over a network to the receiver without getting interrupted. IntServ specifies a fine-grained Quality of service system, in contrast to DiffServs coarse-grained system of control. In the IntServ architecture, the idea is that each router inside a system implements IntServ, and applications which require various types of guarantees have to make individual reservations. Flow Specs are used to describe the purpose of the reservation, and the underlying mechanism that signals it across the network is called RSVP. TSPECs include token bucket algorithm parameters. The idea is that there is a token bucket which slowly fills up with tokens, arriving at a constant rate. Every packet which is sent requires a token, and if there are no tokens, then i t cannot be sent. Thus, the rate at which tokens arrive dictates the average rate of traffic flow, while the depth of the bucket dictates how large the traffic is allowed to be. TSPECs typically just specify the token rate and the bucket depth. For example, a video with a refresh rate of 75 frames per second, with each frame taking 10 packets, might specify a token rate of 750Hz, and a bucket depth of only 10. The bucket depth would be sufficient to accommodate the burst associated with sending an entire frame all at once. On the other hand, a conversation would need a lower token rate, but a much higher bucket depth. This is because there are often pauses in conversations, so they can make do with fewer tokens by not sending the gaps between words and sentences. However, this means the bucket depth needs to be increased to compensate for the traffic being larger. (https://en.wikipedia.org/wiki/Integrated_services) (b) Differentiated Service Architecture The RFC 2475 (An Architecture for Differentiated Services) was published In 1998, by the IETF. Presently, DiffServ has widely replaced other Layer 3 Quality of Service mechanisms (such as IntServ), as the basic protocol that routers use to provide different service levels. DiffServ (Differentiated Services) architecture is a computer networking architecture which specifies a scalable, less complex, coarse-grained mechanism for the classification, management of network traffic and for provision of QoS (Quality of Service) guarantees on modern IP networks. For instance, DiffServ can be used for providing low-latency, guaranteed service (GS) to video, voice or other critical network traffic, while ensuring simple best-effort traffic guarantees to non-critical network services like file transfers and web traffic. Most of the proposed Quality of Service mechanisms which allowed these services to co-exist were complicated and did not adequately meet the demands Internet users because modern data ne tworks carry various kinds of services like streaming music, video, voice, email and also web pages. It would probably be difficult to implement Intserv in the core of the internet because most of the communication between computers connected to the Internet is based on a client/server structural design. This Client/server describes a structure involving the connection of one computer to another for the purpose of giving work instructions or asking it questions. In an arrangement like this, the particular computer that questions and gives out instructions is the client, while the computer that provides answers to the asked questions and responds to the work instructions is the server. The same terms are used to describe the software programs that facilitate the asking and answering. A client application, for instance, presents an on-screen interface for the user to work with at the client computer; the server application welcomes the client and knows how to respond correctly t o the clients commands. Any file server or PC can be adapted for use as an Internet server, however a dedicated computer should be chosen. Anyone with a computer and modem can join this network by using a standard phone. Dedicating the server that is, using a computer as a server only helps avoid some security and basic problems that result from sharing the functions of the server. To gain access to the Internet you will require an engineer to install the broadband modem. Then you will be able to use the server to network the Internet on all machines on a network. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) TASK 5 Network security These days, computers are used for everything from shopping and communication to banking and investment. Intruders into a network system (or hackers) do not care about the privacy or identity of network users. Their aim is to gain control of computers on the network so that they can use these systems to launch attacks on other computer systems. Therefore people who use the network for these purposes must be protected from unknown strangers who try to read their sensitive documents, or use their computer to attack other systems, and send forged email, or access their personal information (such as their bank or other financial statements) Security Clauses The International Organisation for Standardizations (ISOs) 17799: 2005 Standard is a code of practice for information security management which provides a broad, non-technical framework for establishing efficient IT controls. The ISO 17799 Standard consists of 11 clauses that are divided into one or more security categories for a total of 39 security categories The security clauses of the ISO standard 17799:2005- code of practice for Information Security Management include: The security Policy clause Organizing Information Security Asset Management. Human Resources Security. Physical and Environmental Security. Communications and Operations. Access Control. Information Systems Acquisition, Development, and Maintenance. Information Security Incident Management. Business Continuity Management. Compliance. (https://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.printiiid=467aid=2209) Here is a brief description of the more recent version of these security clauses: Security Policy: Security policies are the foundation of the security framework and provide direction and information on the companys security posture. This clause states that support for information security should be done in accordance with the companys security policy. Organizing Information Security: This clause addresses the establishment and organizational structure of the security program, including the appropriate management framework for security policy, how information assets should be secured from third parties, and how information security is maintained when processing is outsourced. Asset Management: This clause describes best practices for classifying and protecting assets, including data, software, hardware, and utilities. The clause also provides information on how to classify data, how data should be handled, and how to protect data assets adequately. Human Resources Secur ity: This clause describes best practices for personnel management, including hiring practices, termination procedures, employee training on security controls, dissemination of security policies, and use of incident response procedures. Physical and Environmental Security: As the name implies, this clause addresses the different physical and environmental aspects of security, including best practices organizations can use to mitigate service interruptions, prevent unauthorized physical access, or minimize theft of corporate resources. Communications and Operations: This clause discusses the requirements pertaining to the management and operation of systems and electronic information. Examples of controls to audit in this area include system planning, network management, and e-mail and e-commerce security. Access Control: This security clause describes how access to corporate assets should be managed, including access to digital and nondigital information, as well as network resources. Information Systems Acquisitions, Development, and Maintenance: This section discusses the development of IT systems, including applications created by third-parties, and how security should be incorporated during the development phase. Information Security Incident Management: This clause identifies best practices for communicating information security issues and weaknesses, such as reporting and escalation procedures. Once established, auditors can review existing controls to determine if the company has adequate procedures in place to handle security incidents. Business Continuity Management: The 10th security clause provides information on disaster recovery and business continuity planning. Actions auditors should review include how plans are developed, maintained, tested, and validated, and whether or not the plans address critical business operation components. Compliance: The final clause provides valuable information auditors can use when identifying the compliance level of systems and controls with internal security policies, industry-specific regulations, and government legislation. (Edmead, M. T. 2006 retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) The standard, which was updated in June 2005 to reflect changes in the field of information security, provides a high-level view of information security from different angles and a comprehensive set of information security best practices. More specifically, ISO 17799 is designed for companies that wish to develop effective information security management practices and enhance their IT security efforts. Control Objectives The ISO 17799 Standard contains 11 clauses which are split into security categories, with each category having a clear control objective. There are a total of 39 security categories in the standard. The control objectives in the clauses are designed to meet the risk assessment requirements and they can serve as a practical guideline or common basis for development of effective security management practices and organisational security standards. Therefore, if a company is compliant with the ISO/IEC 17799 Standard, it will most likely meet IT management requirements found in other laws and regulations. However, because different standards strive for different overall objectives, auditors should point out that compliance with 17799 alone will not meet all of the requirements needed for compliance with other laws and regulations. Establishing an ISO/IEC 17799 compliance program could enhance a companys information security controls and IT environment greatly. Conducting an audit evaluation of the standard provides organizations with a quick snapshot of the security infrastructure. Based on this snapshot, senior managers can obtain a high-level view of how well information security is being implemented across the IT environment. In fact, the evaluation can highlight gaps present in security controls and identify areas for improvement. In addition, organizations looking to enhance their IT and security controls could keep in mind other ISO standards, especially current and future standards from the 27000 series, which the ISO has set aside for guidance on security best practices. (Edmead, M. T. 2006 retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) Tree Topology Tree topologies bind multiple star topologies together onto a bus. In its most simple form, only hub devices are directly connected to the tree bus and the hubs function as the root of the device tree. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub ports) alone. Topologies remain an important part of network design theory. It is very simple to build a home or small business network without understanding the difference between a bus design and a star design, but understanding the concepts behind these gives you a deeper understanding of important elements like hubs, broadcasts, ports, and routes. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Use of the ring topology should be considered for use in medium sized companies, and the ring topology would also be the best topology for small companies because it is ensures ease of data transfer. Ring Topology In a ring network, there are two neighbors for each device, so as to enable communication. Messages are passed in the same direction, through a ring which is effectively either counterclockwise or clockwise. If any cable or device fails, this will break the loop and could disable the entire network. Bus Topology Bus networks utilize a common backbone to connect various devices. This backbone, which is a single cable, functions as a shared medium of communication which the devices tap into or attach to, with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Star Topology The star topology is used in a lot of home networks. A star network consists of a central connection point or hub that can be in the form of an actual hub, or a switch. Usually, devices will connect to the switch or hub by an Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computers network access and not the entire LAN. If the hub fails, however, the entire network also fails. (www.redbooks.ibm.com/redbooks/pdfs/sg246380.pdf) Relating the security clauses and control objectives to an organisation In an organisation like the Nurht’s Institute of Information Technology (NIIT), the above mentioned security clauses and control objectives provide a high-level view of information security from different angles and a comprehensive set of information best security practices. Also, the ISO 17799 is designed for companies like NIIT, which aim to enhance their IT security, and to develop effective information security management practices. At NIIT, the local network relies to a considerable degree, on the correct implementation of these security practices and other algorithms so as to avoid congestion collapse, and preserve network stability. An attacker or hacker on the network can cause TCP endpoints to react in a more aggressive way in the face of congestion, by the forging of excessive data acknowledgments, or excess duplicate acknowledgments. Such an attack could possibly cause a portion of the network to go into congestion collapse. The Security Policy clause states that â€Å"support for information security should be done in accordance with the companys security policy.† (Edmead, M. T. 2006). This provides a foundation of the security framework at NIIT, and also provides information and direction on the organisation’s security posture. For instance, this clause helps the company auditors to determine whether the security policy of the company is properly maintained, and also if indeed it is to be disseminated to every employee. The Organizing Information Security clause stipulates that there should be appropriate management framework for the organisation’s security policy. This takes care of the organizational structure of NIIT’s security program, including the right security policy management framework, the securing of information assets from third parties, and the maintenance of information security during outsourced processing. At NIIT, the Security clauses and control objectives define the companyâ€℠¢s stand on security and also help to identify the vital areas considered when implementing IT controls. The ISO/IEC 17799s 11 security clauses enable NIIT to accomplish its security objectives by providing a comprehensive set of information security best practices for the company to utilize for enhancement of its IT infrastructure. Conclusion Different businesses require different computer networks, because the type of network utilized in an organisation must be suitable for the organisation. It is advisable for smaller businesses to use the LAN type of network because it is more reliable. The WAN and MAN would be ideal for larger companies, but if an organisation decides to expand, they can then change the type of network they have in use. If an organisation decides to go international, then a Wireless Area Network can be very useful Also, small companies should endeavor to set up their network by using a client/server approach. This would help the company to be more secure and enable them to keep in touch with the activities of others are doing. The client/server would be much better than a peer-to-peer network, it would be more cost-effective. On the average, most organisations have to spend a good amount of money and resources to procure and maintain a reliable and successful network that will be and easy to m aintain in the long run. For TCP Congestion Control, when CongWin is below Threshold, sender in slow-start phase, window grows exponentially. If CongWin is above Threshold, sender is in congestion-avoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold, and threshold set to CongWin/2 and CongWin is set to 1 MSS when a timeout occurs. For a Small Office/Home Office (SOHO), networks such as wireless networks are very suitable. In such a network, there won’t be any need to run wires through walls and under carpets for connectivity. The SOHO user need not worry about plugging their laptop into docking stations every time they come into the office or fumble for clumsy and unattractive network cabling. Wireless networking provides connectivity without the hassle and cost of wiring and expensive docking stations. Also, as the business or home office grows or shrinks, the need for wiring new computer s to the network is nonexistent. If the business moves, the network is ready for use as soon as the computers are moved. For the wired impossible networks such as those that might be found in warehouses, wireless will always be the only attractive alternative. As wireless speeds increase, these users have only brighter days in their future. (https://www.nextstep.ir/network.shtml) It is essential to note that the computer network installed in an organisation represents more than just a simple change in the method by which employees communicate. The impact of a particular computer network may dramatically affect the way employees in an organisation work and also affect the way they think. Bibliography Business Editors High-Tech Writers. (2003, July 22). International VoIP Council Launches Fax-Over-IP Working Group. Business Wire. Retrieved July 28, 2003 from ProQuest database. Career Directions (2001 October). Tech Directions, 61(3), 28 Retrieved July 21, 2003 from EBSCOhost database Edmead, M. T. (2006) Are You Familiar with the Most Recent ISO/IEC 17799 Changes? (Retrieved from https://www.theiia.org/ITAuditArchive/?aid=2209iid=467) FitzGerald, J. (1999), Business Data Communications And Networking Pub: John Wiley Sons Forouzan, B. (1998), Introduction To Data Communications And Networking Pub: Mc- Graw Hill https://www.theiia.org/itaudit https://www.theiia.org/ITAuditArchive/index.cfm?act=ITAudit.printiiid=467aid=2209 https://www.psc.edu/networking/projects/tcpfriendly/ ISO/IEC 17799:2000 – Code of practice for information security management Published by ISO and the British Standards Institute [https://www.iso.org/] I SO/IEC 17799:2005, Information technology – Security techniques – Code of practice for information security management. Published by ISO [https://www.iso.org/iso/en/prods-services/popstds/informationsecurity.html] Kurose, J. F. Ross, K. W. 2002. Computer Networking A Top-Down Approach Featuring the Internet, 2nd Edition, ISBN: 0-321-17644-8 (the international edition), ISBN: 0-201-97699-4, published by Addison-Wesley, 2002 www.awl.com/cs Ming, D. R. Sudama (1992) NETWORK MONITORING EXPLAINED: DESIGN AND APPLICATION Pub: Ellis Horwood Rigney, S. (1995) NETWORK PLANNING AND MANAGMENT YOUR PERSONAL CONSALTANT Round-Trip Time Estimation and RTO Timeout Selection (retrieved from https://netlab.cse.yzu.edu.tw/ns2/html/doc/node368.html) Shafer, M. (2001, June 11). Careers not so secure? Network Computing, 12(12), 130- Retrieved July 22, 2003 from EBSCOhost database Stevens, W. and Allman, M. (1998) TCP Implementation Working Group (retrieved from https://www.ietf.org/proceedings/98aug/I-D/draft-ietf-tcpimpl-cong-control-00.txt) Watson, S (2002). The Network Troubleshooters. Computerworld 36(38), 54. (Retrieved July 21, 2003 from EBSCOhost database) Wesley, A. (2000), Internet Users Guide to Network Resource Tools 1st Ed, Pub: Netskils www.microsoft.co.uk www.apple.com www.apple.co.uk www.bized.com https://www.nextstep.ir/network.shtml www.novell.com www.apple.com/business www.microsoft.com/networking/e-mails www.engin.umich.edu www.microsoft.com

Wednesday, May 6, 2020

The Seaside - 1544 Words

THE SEASIDE How important were the natural features of the sea and sand in creating and maintaining the popularity of the seaside resorts? Whilst sitting on a huge boulder that was on the beach, looking out at the sea with the sunrise glistening off of it, the crest of the waves turning white and finally crashing on to the beach and fizzling out where we sat, I turned to my then girlfriend and said â€Å"I want to live here, by the sea†. Within two months we had moved, lock stock and barrel and were living by the sea. After another few months by the sea, and with winter coming, we packed up again and went off to some of the best beaches in the world, backpacking for a year. This is a true event in my life, so have been drawn to the sea†¦show more content†¦Because of the vast numbers of visitors to the coast, so was the seaside resort born. These were needed to house the ill and disabled people who were looking for a new lease of life, along with the houses for the people there was a need for shops, libraries entertainment venues. The volume of ill and sick folk would also need doctors to treat them, s o sprang up medical practices all over the place. The seaside town was born and never to be ignored again. The eighteenth century saw the seaside as a draw for health reasons. The nineteenth century brought about a change in the thinking of the people who went to the seaside, it was not just seen as good for the sick, but good for the healthy as well. Although the healing properties of the sea air and the sea water were still very much believed in, it was also believed that healthy people would stay healthy with a bit of sea air and fun, and so the seaside holiday was born, the more affluent middle and upper classes would have holidays by the sea for weeks at a time through the summer months. Now people were coming to the seaside to get better, they were coming for relaxation and fun, a prominent feature of most seaside towns by the end of the nineteenth century was that they had a pier, these were built to give effect of being out at sea when standing on the end, to add to the whol e seaside experience. As time rolled on, so did people’s idea of leisure, thing wereShow MoreRelatedSeaside Resorts in Todays Society1230 Words   |  5 Pagesthe weed which will finally choke it, but the moving river clears itself’ (quoted in Matless, 1998, p.88) Looking at the seaside resorts in today’s society, we find that season holidays where millions of people rush to through the summer period are associated simply with leisure and a chance to relax. The view and use of these resorts have changed over the centuries; seaside resorts have always been recreational environments although until the mid-19th century such recreations were a luxury onlyRead MoreThe Growth And Rejuvenation Of The Seaside Town Of Blackpool964 Words   |  4 PagesThe topic of the essay will look into the increase in popularity and rejuvenation of the seaside town of Blackpool in the north-west of England. Various factors played a role in the growth in popularity for visiting Blackpool. The popularity of Blackpool will be compared to the gradual decline of the destination. The destination will then be analysed to see if the area is contributing enough facilities for the rejuvenation of Blackpool. Butler s Tourism Area Lifecycle will be used to determine ifRead MoreDown by the Seaside Essay886 Words   |  4 PagesSeaside Epiphinies Sand squelched between Megan’s toes, gritty and grounding as she waded further from shore. Gentle waves lapped at her ankles, calves, knees, and she simply stared out at the blinding ribbon of pink that encompassed the final chapter of sunset. Further down shore, Megan could barely make out the gleeful squeal of over-excited vacationers, igniting smoky plumes of bonfire and living these precious few moments of sundown without a care in the world. She envied them. For her, theseRead MoreSeaside : The Development Of A Charming American Town2547 Words   |  11 Pages Jeremiah R. Blocker Final Term Paper December 3, 2013 Seaside: The Development of a Charming American Town There is a movement among architects, city planners, designers and real estate developers that desire to return to a simpler way of living. A way of designing communities that at its essence captures the design traditions of years past while also avoiding some of the pitfalls of modern city development. A desire exists to avoid the prefabricated homes and endless urban sprawl of stripRead MoreNew Urbanism in The Truman Show1194 Words   |  5 Pageslives of individual residents, but personal relations are necessary to stabilize and cause continuance of community. Once a model community of New Urbanist practitioners, Seaside, FL is now a summer village; cottages are rented to vacationers who are certainly not members of any permanent community. The value gained in Seaside is no longer a lifestyle advantage, but a financial one. While New Urbanism is known to reject suburban sprawl and is intent on reinventing traditional community developmentRead MoreThe people around us make experiences great and unforgettable. I was oblivious to this fact before800 Words   |  4 Pagestrip for three weeks. In the past, I always traveled with my parents. They were all great vacations but they were not planned or controlled by me. It was all up to my mom. This time, however, I was the one who found the opportunity to go to the seaside with a group of young people and spend 21 days there. My parents were happy to let me go on this trip; as they also saw it as an exciting opportunity. It was up to me to plan it all on my own. I learned about the surroundings of the area I was toRead Morebutler model1533 Words   |  7 PagesButler Model? Figure 11 Weston-super-Mare is a popular seaside resort town located in the county of Somerset, England on the Bristol Channel coast. It is the largest settlement in the North West. Weston-super- Mare has a population of 69,696 People living in households and 2,062 people living in communal establishments; 71, 758 in total.2 Due to the development of the railway between local towns and cities it became a popular seaside resort in the 19th century. In this field report I will beRead MoreEssay on seaside convalescent care center1545 Words   |  7 Pagesï » ¿ Seaside Convalescent Care Center Case Study Atchison (2003) wrote about this process in his book Followership. He describes followership as complementary to leadership and recommends that it be recognized as a necessary component for an effective leader. A self-absorbed administrator will not make a good leader. A true leader will recognize the importance of getting respect, not simply compliance, from the people who follow. It is one thing to have people do whatRead MoreIntroduction to Tourism and Travel1872 Words   |  8 Pagesgradually replaced by the seaside resort. The sea water became associated with health benefits. The earliest visitors therefore drank it and did not bathe in it. By the early eighteenth century, small fishing resorts sprung up in England for visitors who drank and immersed themselves in sea water. With the overcrowding of inland spas, the new sea side resorts grew in popularity. The introduction of steamboat services in 19th century introduced more resorts in the circuit. The seaside resort gradually becameRead MoreConcepts Associated with Tourism Developments in Blackpool Essay4167 Words   |  17 Pagesto the type of holidays being bought in the 1950’s. With regards to Blackpool, effects were not seen until the end of the 1980’ when numbers began to fall to present day numbers, which are about half of what they used to be. Blackpool is a seaside resort located on the North West Coast of England. It is in an almost ideal location for tourism in the UK, and is also very accessible. If travelling by road, The M55, which runs right into the centre of the resort, is a direct link from the M6 and

Study Guide Mis 691 Chapter 2 Free Essays

Study Guide MIS 691 Midterm Chapter 2 2. 2 Entity: One theme or topic; something of importance to a user that needs to be represented in a database. In the entity-relationship model, entities are restricted to things that can be represented by a single table. We will write a custom essay sample on Study Guide Mis 691 Chapter 2 or any similar topic only for you Order Now An example of this is in the EMPLOYEE table; data about the entity (the employee) is in the table rows and data about the entity’s attributes are in the rows. 2. List the characteristics a table must have to be a relation: * Each row of the table holds data that pertain to some entity or a portion of some entity * Each column contains data of the attributes of the entity * The cells must hold a single value; no repeating elements * All of the entries in any column must be the same kind * Each column must have a unique name and the column order is unimportant * The order of the rows in unimportant * No two rows in the table may hold identical data values 2. 0 Define the term unique key and give an example: A key that defines a unique row. An example of a unique key in the EMPLOYEE table is EmployeeNumber; the query of any EmployeeNumber (223 for example) will only produce a single row and data for one employee. 2. 11 Non-unique key: A key that potentially identifies more than one row. In the EMPLOYEE table from our book, Department is a non-unique key because it identifies several rows. 2. 12 Give an example of a relation with a unique composite key: A composite key contains two or more attributes. An example of a unique composite key in the EMPLOYEE table is if we combined LastName, FirstName, and Department as a key; these three attributes combined would insure that we would identify only one row. 2. 13 Explain the difference between a primary key and a candidate key: Candidate keys are keys that uniquely identify each row in a relation. They can be single or composite. The primary key is the candidate key that is chosen as the key that the DBMS will use to uniquely identify each row. 2. 5 What is a surrogate key and under what circumstances would you use one? A surrogate key is a column with a unique, DBMS-assigned identifier that has been added to a table to be the primary key. You would use a surrogate key when the primary key in the table is not ideal. You add a surrogate because it is short, numeric, and will never change – it is an ideal primary key. 2. 20 Define the term referential integrity restraint and give an example: A relationship constraint on foreign ke y values. A referential integrity constraint specifies that the values of a foreign key must be a proper subset of the values of the primary key to which it refers. In the EMPLOYEE table: the value of Department should match a value of DepartmentName in the DEPARTMENT table. 2. 21 Explain the three possible interpretations of a null value: 1. It could mean that no value is appropriate 2. It might mean that the value is known to be blank (intentionally left blank) 3. It may mean that the value is unknown 2. 4 Name the functional dependency and identify the determinants of: Area = Length x Width Area is functionally dependent upon Length and Width or that the composite of Length and Width are determinants of Area 2. 31 Describe the nature and purpose of the normalization process: Normalization is breaking up tables with more than one theme into sets of tables that have one theme each. You have to do this so that there isn’t repeat information in a table and so there are no modification or deletion issues. Normalization: Normalization is the process of breaking a table with one or more theme into a set of tables such that each only has one theme. You need to create a well-formed relation: 1. Every determinant must be a candidate key 2. Any relation that is not well-formed should be broken into two or more relations that are well-formed The Normalization Process: 1. Indentify all of the candidate keys 2. Indentify all of the functional dependencies 3. Examine the dereminants of the functional dependencies. If any determinant is not a candidate key, the relation is not well-formed. In this case: a. Place the columns of the functional dependency in a new relation of their own b. Make the determinant of the functional dependacy the primary key of the new relation c. Leave a copy of the determinat as a foreign key in the original relation d. Create a referential integrity constraint between the orginal and the new relation. 4. Repeat step 3 until every key is a candidate key How to cite Study Guide Mis 691 Chapter 2, Essay examples

Saturday, April 25, 2020

Turtle Essays - Sea Turtles, Reptiles Of The Philippines

Turtle Distinction For many reasons the human race could be called a blessing. Great advanced in technology, medicine and even the fact we are the most sophisticated species on the planet. Are we a gift to planet Earth, or far from it? With cast amounts of pollution and destruction of the planet, not to mention unthinkable acts of violence and hate that has been going on since the beginning of time. Are we really as sophisticated and important as we have led ourselves to believe? Are we any better than any other creature because we are more technologically advanced? Is the human race a blessing? Humans have destroyed and endangered more species on our planet than any other species or group, with our continuous pollution and lack of respect for out own environment. One area of the world affected by our careless habits is our coastlines and the marine habitats that vast amounts of species rely on. These particular areas of the world are being destroyed because humans don't seem to care as long as they make a couple of dollars in the process. Oil spills like the one in the Prince William Sound on the coast of Alaska and Hawaiian sea turtles and their many troubles with humans are just some examples of human carelessness and the consequences that the environment, particularly marine wildlife incur, which often are fatal. I chose this particular subject because I find the ocean and it's unique and rare inhabitants to be interesting. Every coastline has its one unique species and no two areas are the same. I wanted to learn more about how humans are destroying the habitats of these unique creatures. I found that all species are in someway being threatened by human dominance and carelessness. From the common flounder or sea star you can find when you walk across the beach to a rare fish like the coelacanth (prehistoric fish that was believed to be extinct until one was caught off the coat of Madagascar by a local commercial fisherman until in the 1950's). The ocean can be a calm and loving but can easily turn into a vicious killer within seconds. All of these things are what I find so interesting about the ocean. I wanted to find out why people can continue to destroy it even though they know the effect of their actions. I guess some people are ignorant and just don't care if they destroy the things that make our environment so beautiful. One example of our careless destruction of our environment is the Exxon Valdez oil spill off the coast of Alaska in 1989. The Prince William Sound still shows signs of the oil spill tem years later. Most species have recovered since the spill, but many are still suffering. The Harbor Seal and herring are just two who are vital to the survival of all the species in the area. Herring are the main source of food for many species in the area, including humans. (Mitchell, p.98) "The ecosystem is gradually recovering from the spill," says Molly McCammon, an Executive director of the Exxon Valdez Oil Spill Trustee Council, "but it will never be the same as it was twenty years ago." The Exxon Valdez Oil Spill Trustee Council was founded to oversee the use of nine hundred million dollars to the area by the government after settling with the Exxon Company for one billion dollars in criminal and civil damages. One serious problem in the aftermath of Exxon Valdez is the decline of herring. (The table shows the chave in populations of Prince William Sound before and after the Exxon Valdez spill.) Even more disturbing than the fact herring aren't recovering as well as other species like them is the fact they were on the decline before the accident. This was a major issue because herring are the center of the ecosystem in the Sound. Many biologists now believe that over fishing of the herring has contributed to their decline. The Pacific Herring is just one species of the area, but if you see how important that one species is to the ecosystem of the Alaskan coast than you begin to see how important all species are to their particular habitats. This is just one example, but if you take a species out of its environment, then a chain reaction would occur, hurting the species around it. Another species that biologists are beginning to study wit the money received from the Exxon Valdez settlement is the Alaskan Salmon. The oil spill has