Thursday, January 23, 2020

Racism, Sexism, and Stereotypes In Media Essay -- Media Essays

This essay discusses censorship and the way in which social media and consumer products affect and model an appropriate societal ‘literacy’ or view in particular regards to gender and race, to young children. A summary of the stereotypes displayed in several videos viewed on YouTube, as well as student’s own identified stereotypes, both in regards to race and gender, are displayed below (Alexander, 2011; BrokenXLoner, 2012; Lac, 2013; Walt Disney Pictures, 1998, 1994, 1992, 1967, 1955, 1953, 1941): Examples of ‘Frequent Racial Stereotypes’ Displayed in Popular Culture African American (examples: Disney crows, orang-utans in Jungle Book, The Lion King hyenas) American Indians (example: American Indians from Peter Pan) †¢ Athletic, often dancing – jive, hip-hop, break dancing, hustle, †¢ Slowed, slurred speech patterns †¢ Jungle Book – orang-utans singing about wanting to be like men †¢ Underdog – has to work hard to get somewhere, ‘sidekick role’ †¢ Criminal – ‘hood’, guns, gangs, ‘crooked/shonky’, poor †¢ Player - sexualise females in particular †¢ Loud, opinionated women who boss around their men †¢ Comedians – loud, funny †¢ Depicted as saying ‘woo woo woo’ whilst clapping hand over mouth, and saying ‘ugg’ †¢ Teepees †¢ Dancing – jumping and kicking with arms crossed without much knowledge or sequence to their movements Asian (examples: Siamese Cats ‘Lady and The Tramp’, Mulan) Caucasian †¢ ‘Asian Features’ – slanted eyes, buck teeth †¢ Cunning and manipulative †¢ Seen as sexist and oppressive societies – girls have no value if they are not married, women should obey orders from men †¢ Intelligent †¢ Fighting/tough †¢ Women can be sexualised and fragile †¢ Tough parental expectations †¢ Rich †¢ Preppy †¢ Dumb †¢ Blon... ...The Lion King [Motion Picture]. USA: Walt Disney Pictures. Walt Disney Pictures (Production Co.), & Clements, R. & Musker, J. (Directors). (1992). Aladdin [Motion Picture]. USA: Walt Disney Pictures. Walt Disney Pictures (Production Co.), & Reitherman, W. (Director). (1967). The Jungle Book [Motion Picture]. USA: Walt Disney Pictures. Walt Disney Pictures (Production Co.), & Geronimi, C., Jackson, W. & Luske, H. (Directors). (1955). The Lady and The Tramp [Motion Picture]. USA: Walt Disney Pictures. Walt Disney Pictures (Production Co.), & Geronimi, C., Jackson, W. & Luske, H. (Directors). (1953). Peter Pan [Motion Picture]. USA: Walt Disney Pictures. Walt Disney Pictures (Production Co.), & Armstrong, S., Ferguson, N., Jackson, W., Kinney, J., Roberts, B., Sharpsteen, B. (Directors). (1941). Dumbo [Motion Picture]. USA: Walt Disney Pictures.

Wednesday, January 15, 2020

Information Technology logical security Essay

Logical data security is the guarding of information against unauthorized access while at the same time making sure that their integrity is guaranteed. If logical security is laid down in a shoddy way, then it would cause risks and its vulnerability may lead to the compromise of the data. System intrusion is one of the vulnerabilities for logical IT security. Software bugs may not all be eliminated by system administrators or programmers (Perry, 2006). The intruders therefore use the bugs to find holes and hack into system computers or server computers. These bugs can be in the form of buffer overflows, unconsidered inputs, and race conditions. Buffer overflows attack is extra information that can overwrite the actual data in the buffer and this data could be degrading the data integrity of the actual data. Race conditions attack is multiple processes access and use same data concurrently and end result is that one process may lose copying correct data since the other process may have changed the data. A system configuration is another issue that normally forms another form of system intrusion. Most systems have default manufacturers configurations. Customers find it easy to use since root/administrator passwords are usually empty/blank. If administrators overlook re-configuration of access controls, then the system can be intruded into even through the network. With the advent of technologies that can eavesdrop at the moving traffic, there has been the creation of sniffer software which are use to monitor the traffic. Sniffing unsecured traffic is poison for logical security. A sniffer can also be used legitimately or illegitimately to capture data transmitted on a network. It can be illegitimately used when the network router reads data packets then determining its intended destination in the network. A router may have a sniffer program that reads data in the packet and can see its source and destination then sends it to unintended destinations due to intrusion mechanisms in the network such as use of software bugs. Control on key directories for data should be factored in access standards to avoid unauthorized access. Limiting or eliminating access to everyone is important therefore restricting use of removable media such as flash disks and floppy disks for confidential information (Cole, & Krutz, 2005). Data integrity should be observed to ensure information stored is as original especially through performing synchronization from time to time to take care of bugs such as race conditions. Confidential information should be encrypted especially that which is sensitive and so done appropriately. Forgetting to back-up and store data on a regular schedule would run organization into crisis especially if the computer system breaks down, especially if the hard disk holding the crucial data crashes. Output devices such as scanners and printers on the network assigned for confidential information should at all time be under monitoring by use of monitoring utility software. Software for local systems should be legal. Vendors face the risk of software piracy for example illegal copying of their software. Organizations should ensure that they install software that has been licensed. Licensed software is beneficial since their updates and patches could easily be attained from the Internet (Perry, 2006). Open source software give users advantage of using them at their own disposal since they are freeware and don’t require license to install them. Their safety is questionable and may not be guaranteed, they could be prone to bugs as they are easily customizable. Pirated operating systems which access the Internet are dangerous and pose danger to the applications installed on it. Such systems can be in risk of being virus infected or may acquire worms and Trojans. Therefore organizations should ensure licenses bought are used for the OS and renewal of the licenses done at end of term for each license, this then will allow recommended updates and patches for the operating system (Cole, & Krutz, 2005). Building security levels on user data is crucial since it ensures confidentiality and integrity of sensitive data. The different levels would be such as access to workstations and desktop applications, access to computer servers and data, access to business bespoke applications. Access built only for authenticated persons using password and ID’s. Password policies should be in place such as allowing strong passwords of more than six characters, allow changing password on regularly basis say after 3 months, one password per one user ID. Password sharing among employees could cause malicious use of a user’s account by another user and this will be untraceable and unsuitable, users should therefore be formally notified their role in user ID and password protection for their user accounts. Web security attack is common in the cyber cafes and computer systems always accessing the Internet. Some of the HTTP (Hyper Text Transport protocol) vulnerabilities include cross-site scripting attacker gains control of the scripts location header and redirects the scripts. The second HTTP vulnerability is the web cache poisoning that allows attack websites visited by many users (Contos, Crowell, Derodeff, & Cole, 2007). The attacker redirects the URL of the website to the IP address of his computer. Web vulnerability is the cross-user defacement attacks where a website maybe seen defaced by a user and at this time attacker is stealing or resetting cookies sessions. Network infrastructure laid without software firewalls spell doom for logical security in the network. This is so because intruders can use software for maliciousness such as phishing where the attacker or program successfully masquerades as another by falsifying data and to the recipient the site appears as genuine but then the attacker will then manipulate or steal recipient’s credentials such as login details or financial information. This kind of masquerade is also called spoofing (Hoffer, Prescott, & McFadden, 2008). Local systems that have their firewalls disabled on system services provided by Operating systems such as Microsoft windows is a threat to security. All the time, firewalls should be set to enabled state and exceptions created for required software applications in the network. Viruses are programs or codes that can alter other programs functionality or render another program useless. Inadvertently leaving virus infected computer systems still connected on the network pose danger of infecting other computer systems in the same network through self-propagating viruses or Trojans or worms. Viruses can also be attained through e-mails. Some chain e-mails sent to users have attachments that have viruses attached to them. They infect a computer system once they are opened or downloaded to the computer hard disk. Distribution of such viruses could also be through the same network and media devices such as external hard disks and flash disks. Repudiation is the situation where one is able to deny being partisan to information manipulation. This is vulnerable for the data confidentiality and integrity of information. The best way to guarantee perpetrators don’t walk scot free is by ensuring data access controls are well defined such as event logs for applications and strong holding policies such as one user password per one user ID, remote monitoring the network activities and data sent and received and saving security logs for local system among other policies very important for non-repudiation.

Tuesday, January 7, 2020

Tpn Nutrition Case Study - 1274 Words

t has been pointed out that there is a possibility of deficiencies in trace elements during TPN nutrition control procedures without the addition of trace elements, and, in fact, in several foreign countries have developed TPN solutions containing plural trace elements for the purposes of therapy. (9) In this studied we applied a TPN solution to a group of rats with a trace element deficient diet and compared it with a group of rats with a TPN diet supplemented with iron, zinc, copper, manganese, and iodine were compared while the rats were alive. First, with respect to blood properties (RBC, Hb, Hct, MCV, and MCH), the levels of group A, B, and C significantly decreased compared to those of group D. Groups A, B, and C showed signs of†¦show more content†¦However, iron concentrations in the brain, heart, liver, testis, and tibia in group B tended to shower higher values than those of group A, even though they didn’t reach the same levels as group D. It was suggested t hat if the nutrition management was continued for a longer period of time and the trace element solution was used, that there is a possibility that the blood fluid properties and iron deficiency state of the subjects could have been improved. The occurrence of deficiencies during the time of TPN treatments which have been cured by zinc has been reported numerous times, (2, 3) and it is widely accepted that adding zinc to TPN solutions is necessary. When comparing groups A and C, the zinc concentration in group A in plasma and the tibia’s of subjects showed a significantly lower value, and it is possible that the TPN treatment made zinc deficiency worse. The level of zinc in group B (the trace element mixed solution group) was almost the same as group D. These doses seemed to be proper for alleviating zinc deficiency. ALP uses zinc as a coenzyme, and it has been reported that when zinc is intraperitoneally administered to zinc deficient rats, ALP levels increase markedly. (11) In this experiment ALP levels were elevated by administration of the trace element mixed solution. This change in ALP levels was consistent with the change in plasma zinc concentration levels. Declines is zinc concentration in blood plasma or ALP would reflect zincShow MoreRelatedMalnutrition Increases Morbidity and Mortality Essay1183 Words   |  5 Pagesthat can worsen the case in elderly population. Malnutrition increases morbidity, mortality, complication rates, and the length of stay in hospitals.2 The prevalence rate of hospital malnutrition ranges between 20% to 60% and among outpatient is 7% to 16%. Disease-related malnutrition has become an economical issue. In Europe, it costs up to $125 billion every year. Nutrition screening is recommended to all patients who are admitted in the hospital.3 There are various nutrition screening tools availableRead MoreThe Use Of Supplements And Its Effects On The Health1725 Words   |  7 Pagesfrom chemotherapy can span widely including â€Å"nausea, mouth sores, and taste changes that may make it difficult to eat or drink† (â€Å"Nutrition Recommendations†). These effects often lead to the lack of an appetite but there are some ways to assure that your dietary intake is sufficient. Eating small portions more often is sometimes easier than eating large meals (â€Å"Nutrition Recommendations†). Keeping snacks handy and utilizing different types of shakes and other drink mixes can provide necessary caloriesRead More`` Not For Iv Use : The Story Of An Enteral Tubing Misconnection1143 Words   |  5 PagesChosen for root cause analysis is case study number 18, titled â€Å"Not for IV Use: The Story of an Enteral Tubing Misconnectio n† from the book Case Studies in Patient Safety: Foundations for Core Competencies. Root cause analysis is a process whereby error producing system factors are identified and reviewed to assist in the formatting and implementation of solutions to prevent similar errors from reoccurrence (Wachter, 2012). This accounting of the patient’s experience located in the Systems-BasedRead MorePre Randomized Non Probability Sampling Method889 Words   |  4 Pages2. a) The study used consecutive non randomized non probability sampling method. The study selected records of patients as they were admitted in a consecutive manner until it reached a certain number. In this study, the number was 297. The study excluded 62 records that did not fit the sampling requirements. The final sample was n = 235 (Salinas et al., 2012). When using consecutive sampling techniques, the researcher includes all patients who agree to participate provided that they meet specificRead MoreCentral Line C ase study Essay869 Words   |  4 Pagesis 2500mL.   Output is 2000mL including urine and NG drainage.   Febrile and diaphoretic; BP 130/80; pulse 88; urine specific gravity 1.035; serum potassium 3.0 mEq/l; serum sodium 140mEq/l, CL 92mEq/l, Mg 1.4 mg/dL.   1.) Analyze the data in the case study.   Do the findings indicate a fluid deficit or fluid excess problem?   Support your answer with data from this patient. I would guess a fluid volume deficit. Dark amber urine, dry mucus membranes, poor skin turgor, and labs all point in that directionRead MoreIcu Case Study2940 Words   |  12 PagesCase Study A 45 year old male was admitted to ICU following an exploratory laparotomy which showed a ruptured appendix and peritonitis. The procedure began as a laparoscopic cholecystectomy but the initial finding was pus throughout the peritoneal cavity and a normal gallbladder. An open exploratory laparotomy where a ruptured appendix was discovered which was removed and a washout was performed. The patient had a two day history of abdominal pain prior to his admission through AE. He had noRead MoreEssay on Anorexia and Food Refusal in Children3655 Words   |  15 PagesPARENTERAL NUTRITION While hospitalized, patients must be treated for their immediate physical problems. Parenteral nutrition (TPN) is an effective but costly method of treating starvation (Maloney, Pettigrew and Farrell, 1983). TPN forces protein, glucose, and calories into the bloodstream, avoiding the stomach (Maloney et al., 1983). Maloney et. al.. claim that anorectic patients prefer TPN to nasogastric forced tube feedings because they are scared of the full-stomach feeling (1983). TPN is alsoRead MoreEssay on Inflammatory Bowel Disease5050 Words   |  21 Pages D) That has no bearing on your current problems related to the colitis. Feedback: INCORRECT Ulcerative colitis can cause extraintestinal problems, including mouth lesions. Points Earned: 1.0/1.0 Correct Answer(s): B Diagnostic Studies The nurse provides a stool specimen container and instructs Loren to obtain three specimens, one each on three consecutive days. 4. Which instruction is important for the nurse to provide Loren regarding food and fluid intake during theRead MorePros And Cons Of Neonatal Intensive Care Units1226 Words   |  5 Pagesdifferent studies, an experimental study, a quasi-experimental study, and two non-experimental studies were used in this research process. The meta-analysis provided level one strength evidence and was of good quality for scientific evidence. The experimental study presented level one strength evidence and was also of good quality for scientific evidence. The quasi-experimental study had level two strength evidence and provided high-quality scientific evidence. Both of the non-experimental studies providedRead MoreSymptoms And Treatment Of A Hospital Stays And Extensive Iv Therapy1416 Words   |  6 Pagesto receive a peripherally inserted central catheter (PICC). PICC lines have been found to be a relatively safe and cost effective route to administer long term intravenous (IV) medications such as antibiotics, chemotherapy and total parenteral nutrition (TPN). These devices are most often inserted at the patient’s bedside by nurses who have received advanced training in the placement of PICC lines. Evidence based practice for sterile technique during insertion has been established and as a result