Thursday, January 30, 2020

Texas Science Scholars program Essay Example for Free

Texas Science Scholars program Essay Mrs. Page, I would like you to know that I do not consider English as one of my strongest subjects; however, I still am excited to be in this class. From what I can tell, your particular style of instruction will definitely be helpful towards my education in literature. I feel you are someone who can help me to better myself in writing. My name is Michael Cortinas. I will be majoring in Computer Science and I am currently part of the Texas Science Scholars program. I enjoy reading, but struggle when it comes to writing on a designated prompt. In high school, I was part of both the varsity track, and cross-country team. Before college, I would run two or three miles every morning, but, because all my classes take place in the morning, I haven’t had time. I have been working part-time at H-E-B for nearly a year now, where I do anything from cashier to push carts. I currently live with my mother, step-father, and three younger siblings, meaning most of my homework will be done on campus. When it comes to college, I hope to obtain the skills necessary to become an impact in my community and in the lives of those close to me. I feel if I can get enough from college, I can be the type of person that people feel confident in putting their trust and coming to for advice. I guess this desire was inspired my great-grandfather, who passed away last year. He was someone that everyone felt comfortable confiding in and always seemed to know just what to say. Your class, being one that works with word choice, is a great start towards this goal. I feel that I am going to enjoy your class and all it has to offer.

Wednesday, January 22, 2020

Money & Debt Corporation: Project Plan Overview :: Business Management Studies Essays

Money & Debt Corporation is a mid-size company located in Northern California. Money & Debt Corporation offers a Visa and MasterCard to its customers. Recently, the company has noticed a decline in card usage by approximately 65% of its customers. Based on this decline, management at Money & Debt Corporation initiated a phone and mail survey to its customer-base to discover the reason for decreased usage of its credit cards. The results of the survey determined that many cardholders were dissatisfied with not being able to access their account information via the World Wide Web (WWW). Cardholders commented that their other credit cards have on-line services that meet the demands of their busy life styles. Based on the results of the surveys, sr. management at Money & Debt Corporation has decided to implement a project to create a customer web site. Once functional, the web-site will allow cardholders to access their account information 24 hours a day, pay their monthly bill on line, request credit increases, update personal information, and report lost or stolen cards. The web site will also have a feature for new customers to apply for credit cards. The successful implementation of a customer web site along with effective advertising will increase card usage by existing customers, while also attracting a new customer-base. Project Objectives The objectives for the implementation of Online Credit Card services for Money & Debt Corporation are: †¢ To expand their current operations to the WWW within six months †¢ To ensure that the web site is fully operational 24 hours a day †¢ To ensure that all features described in the Statement of Need function properly prior to project implementation †¢ To ensure that the web site receives appropriate advertising through television ads, mailings, and internet advertising †¢ To ensure secure transactions for the company’s clientele The time frame for project completion is six months and the project should not exceed the $200,000 budget at the time of completion. Once each objective is completed according to the WBS and timeline, the project will be evaluated. Each objective will be compared to the Mission and Goals statement for accuracy and quality assurance. A representative from the corporation will evaluate each task to ensure completion. Each component will be tested by a select group of individuals that will be using the new system. Mission and Goals of Project To expand current operation to the World Wide Web, Money & Debt will start a web site project with the following goals: 1. Personalized Customer Page This will provide the customer the ability to customize the home web page to fit their needs. The main objective is to make it their home

Monday, January 13, 2020

Incarceration as the common solution to the rise in crimes Essay

In today’s society incarceration in a correctional facility is a common punishment for those who have committed a crime. Earlier responses to crimes were brutal and often tried to relate the punishment to the crime itself. Prisons are not as old as some may think and be established because of displeasure from extensive use of brutal corporal and capital punishment. The Pennsylvania and Auburn systems were two of the earliest modern prison systems that highlighted the opportunity for prisoners to reform. Prison labor can play an important role in a countries economy and overtime can cut many costs. The history of punishment can be described in one word, brutal. Early forms of punishment included torture, beatings, branding, mutilation, and death (Seiter, 2011). Most misdemeanor crimes were punished with fines but more serious offenses were punished with public shame, a period of time in the stocks, or a mark on an individual’s body to identify the offense (Lynch, 2011). Early forms of punishment attempted to relate the punishment to the crime such as liars had their tongues ripped out and thieves had a finger or hand cut off (Seiter, 2011). Some forms of punishment were not directly harmful such as exile from a community or tribe. This would ensure the individual does not repeat the offense but could also cause death because the individual could not survive in the wilderness alone (Seiter, 2011). In England, deportation was a common form of punishment and they would send their prisoners or criminal to their colonies. Prisons are not as old as some may believe. Many people were not satisfied with the response to criminal behavior and found the criminal codes were inhumane. They found judges did not want to impose more severe punishments for fairly minor offenses. William Penn and the Quakers came up with a new criminal code to replace the old one that would abolish capital punishment for crimes other than homicide, provide free food and shelter to inmates, and replace the stocks with houses of detention (Seiter, 2011). This code was later repealed until the late 1700’s when Dr. Benjamin Rush revived the Quaker code and established the first prison in the United States. Rush converted a wing of the Walnut Street jail to house offenders as an alternative to corporal punishment (Seiter, 2011). This early prison stressed hard work and repenting for their offenses. The inmates were kept in individual cells and could not speak so they could avoid moral contamination among the other prisoners (Sei ter, 2011). Administrators would put masks on inmate’s faces when being moved because they did not want other inmates to identify each other. Prisoners were also given work to do in their cells and encouraged to read the bible. Overall the prison enforced strict discipline, hard labor, and solidarity. The Pennsylvania system incorporated the Walnut street jails ideas and operations and encouraged solitary confinement, hard labor, and silence for the inmates. The Pennsylvania system was intended to have prisoners separate from each other even when they were working so inmates would not be distracted and focused on their repentance. The Auburn prison system was first implemented in 1819 at the New York state prison in Auburn. It incorporates the Quaker principles of reformation and considered a less pure model than the Pennsylvania system (Barnes, 1921). The Auburn system incorporated different methods such as inmates together side by side while working, eating and praying but they returned to solitary cells at night. The Auburn system introduced a tier system of different levels of cells built above one another. They housed inmates according to their offenses such as first time and repeat offenders (Barnes, 1921). Inmates wore uniforms of different colors which represented the clas sification of their crimes. Prison labor can be an important part of a countries economy and it can help reduce the cost of keeping inmates in prison. In the past, prison labor has been used as a punishment for those who are incarcerated and is meant to be physically draining. Recently, prison labor has adjusted to help save the cost of housing inmates. By making the inmates work in the prison it cuts the costs because the prison does not have to hire people to do the jobs such as cooking, cleaning, and manual labor. Over the past twenty years, state has passed laws allowing the use of convict labor for commercial enterprises (Whyte & Baker, 2000). Prisoners now are allowed to manufacture many things ranging from blue jeans to auto parts. AT&T has even used prison labor for telemarketing services and in Oregon, prisoners do all the data entry and record keeping for the Secretary of States corporate division (Whyte & Baker, 2000). In today’s society incarceration is a common form of punishment for those who have committed a crime but that has not always been the case. Those who have committed a crime were often beaten, branded, mutilated or even put to death. Prisons are not as old as many may believe and come about because people did not believe in the corporal and capital punishments placed upon people. The Pennsylvania and Auburn systems both incorporated similar aspects but have many distinct features separating them such as their view on isolation. Prison labor has changed over the years and it can help cut costs.    References    Barnes, H. E. (1921). The Historical Origin of the Prison System in America. Journal of the American Institute of Criminal Law and Criminology, 12(1), 35-60. Retrieved May 8, 2015, from http://www.jstor.org/stable/10.2307/1133652?ref=no-x-route:ed4b290f20ea7490acdfc081b09cdbd2    Lynch, J. (2011). History.org: The Colonial Williamsburg Foundation’s Official History and Citizenship Website. Retrieved from http://www.history.org/Foundation/journal/Summer11/prison.cfm    Seiter, R. P. (2011). Corrections: An introduction. Upper Saddle River, NJ: Pearson Education.    Whyte, A., & Baker, J. (2000, May 8). World Socialist Web Site. Retrieved from https://www.wsws.org/en/articles/2000/05/pris-m08.html

Sunday, January 5, 2020

Cybercrime and Cyber Criminals - Free Essay Example

Sample details Pages: 2 Words: 516 Downloads: 3 Date added: 2019/08/19 Category Law Essay Level High school Tags: Cyber Crime Essay Did you like this example? Cybercrime is a crime that involves a computer. It is defined as Offences that are committed against individual or groups of indiduals with criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, loss to the victim directly or indirectly using internet. It affects person, financial health and nations security. Some of the popular IT crimes are data breaching, hacking, sextortion, child pornography, child grooming, copyright infringement etc. Private confendital informs are intercepted and dsiclosed illegally. Who are Cyber Criminals? (Hemraj Saini, 2012) Don’t waste time! Our writers will create an original "Cybercrime and Cyber Criminals" essay for you Create order a. Cyber Terrorists: Hackers and data breachers who break websites and other critical data. b. Crackers: Computer virus creaters and distributors fall under this category. c. Cyber Bulls: Cicious forum posts, posting fake profiles on web, emails messaging d. Pranksters: They perpetrate tricks on others. They are not intened for long lasting harms. e. Career Criminals: They do crime to make money as their income. (Hemraj Saini, 2012) What are the Categories of Cyber Crime? 1. Data Crime: Data Interception: Influence data by Data monitoring and information gathering. Data Modification: Attack the network to modify the data and send the target. Data theft: Illegal copying of business or individual data. It includes passwords, ssn, credit card info and other PII information or confidential informations of the business. b. Network Crime: Interfering functioning of computer network by inserting, deleting, tramsmitting, damaging or alterning networking data, Network Sabotage etc. c. Access Crime: This includes unauthorized access, virus Dissemination (virus, worms, Trojan horse, logic bomb etc). (Hemraj Saini, 2012) Impact of Cyber Crime: Economic Impact: Financial impact to the company due to breach in PII information which loses customers confidence. Fall in stock market and other serious economic circumstances. Ransomware Attack: Restricts user from accessing computer systems by freezing computer screen or encrypting computers. Social Media Deception: This includes accessing social media accounts by illegal means and post deceptive messages and posts. E-Banking Fraud: Hackers sends some attachments to the e-banking users which contains malicious programs. Opening these kinds of files infect the computers. Email Scam: Cyber criminals will hack the email login details and cheat victims with all possible means to make remittances. Online Business Fraud: sellers and buyers fail to receive the payment or goods after payment are made. Hackers hacks the transactions. Identity Theft: Hackers may find the PII Information of the individuals and misuse data to get the benefits. (Hemraj Saini, 2012) Future Trends: Hacking in the critical systems in government companies and financial instutitions can lead to leading data loss, misuse and killing of critical systems. Increase money laundering through over-invoicing and under invoicing in e-commerce. Disclosure of confidential informations from social media during group chat. (Hemraj Saini, 2012) Solution to the Cyber Crimes: Antivirus and Anti Spyware Software Firewalls Cryptography Cyber Ethics and Cyber Laws (Hemraj Saini, 2012) References: Bisson, D. (2018). The 10 Biggest Data Breaches of 2018 So Far. Retrieved from https://blog.barkly.com/biggest-data-breaches-2018-so-far Cybercrime. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Cybercrime Hemraj Saini, Y. S. (2012). Cyber-Crimes and their Impacts: A Review. Retrieved from https://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf