1.Allow the user to enter n, the number of values to be processed; then allocate an
anonymous array of n doub1e values, storing its address in doublePtr.
2. Fill the anonymous array of Exercise 1 with ninput values, entered from the
keyboard.
3. Compute and display the average of the values in the anonymous array of
Exercise 1.
4.Deallocate the storage of the anonymous array of Exercise 1.
5. In Exercise 1, if the value of doublePtr is 1000 and double values are stored in 8 bytes, draw a memory map showing the addresses of the first few elements of the anonymous array.
6.Assuming that addresses are stored in 4 bytes and double values in 8 bytes, tell what output will be produced by the following statements:
doubledubValues[] = {l.l, 2.2, 3.3, 4.4, 5.5};
double * dubPtr = dubValues;
for (inti = 0; i< 5; i++)
cout<<sizeof(dubPtr + i) « “ “
<<sizeof(*(dubPtr + i)) « “ ”
<< *(dubPtr + i) « endl;
4.classCartesianPoint for a point (x, y) in a Cartesian coordinate system
10.Write and test a class for a Line, described by its slope and a point on the line, with functions that
a. Find the point-slope equation of the line
b. Find the slope-intercept equation of the line
12. Write a program to read the point and slope information for two lines and to determine whether they intersect or are parallel. If they intersect, find the point of intersection and also determine whether they are perpendicular. Use the classes CartesianPoint from Exercises 4 and 10 and Line from Problem 11 to represent points and lines, respectively.
Zimmerman 1
David Zimmerman
Instructor Cullom
Ethnography Final, Draft
WR 121, Fri 10:00 – 12:50
December 2nd, 2013
Passion and Murder: A Tale of two Méxicos.
We have heard the phrase time and time again. “How well do you know your neighbor?” I set out to put this phrase to the test by exploring Mexico through multiple lenses. I wanted to learn about this country through the eyes of another individual, published academic research and relate it to what my assumptions were of the reality of the smallest country in North America.
When I started off on this academic journey I found it hard to look past the media’s portrayal of Mexico as a kind of Wild West, a regime of lawlessness and a country controlled and in fear of the drug cartels that seemingly run the country with this highest rate of immigrants to the United States. I selected an informant, Daniella, who had grown up in Mexico but has been in the United States for the past few decades. I expected her to paint a very different picture of Mexico than she did.
I had believed that the tough times I pictured in Mexico would lead to tough individuals who protected themselves emotionally from the atrocities that they had seen in their country. Yet I came to find out that she was one of the sweetest passionate women I have ever had the pleasure of meeting. When I had asked her if she was willing to do an interview about her home country of Mexico a week earlier, she lit up ...
Essay Structure Thesis Antithesis SynthesisBrenda Cooper
Here is a draft essay on Othello as a tragic hero:
Othello as a Tragic Hero
In Shakespeare's play Othello, the title character of Othello can be seen as a tragic hero. According to Aristotle's definition, a tragic hero must have a hamartia or tragic flaw, experience a reversal of fortune, and gain self-knowledge. Othello's jealousy and lack of self-control over his emotions lead to his tragic downfall, fulfilling the characteristics of a Shakespearean tragic hero.
Othello's tragic flaw is his jealousy and lack of self-control over his emotions. As a Moor in 16th century Venice, Othello has risen to the highest ranks
The document discusses the importance of teaching students about ethnicity in schools. It argues that American school boards should mandate multicultural and ethnic studies programs to give students a wider perspective on history and human interaction. This would provide an understanding of the numerous ethnic backgrounds that helped shape America, as the country was built by people from around the globe. The author notes they felt limited in their knowledge of other ethnicities as a child but now recognizes the importance of understanding one's own ethnicity as well as others. Schools should teach students concepts like race, ethnicity, gender, and sexuality that they will need to know about in the future.
Essay On India For Students From Cla. Online assignment writing service.Ashley Hernandez
The document discusses how Joe Linta is the head coach of the Hamden Hall high school football team and describes a game taking place on a crisp October evening in Hamden, Connecticut between Hamden Hall and another school with Coach Linta jogging onto the field behind his team. No other details are provided about Coach Linta or the game. The summary establishes the context of Coach Linta coaching a high school football game but does not include any evaluative claims.
Violence In Movies Opinion Essay. Online assignment writing service.Melissa Ford
Horror stories can stimulate imagination and be entertaining for older audiences. However, for children and teenagers, exposure to graphic horror content through movies, videos and stories may cause lasting psychological trauma and negatively impact their moral development by desensitizing them to violence. While horror fiction has its place, parents must carefully consider their children's maturity level and monitor what they experience to avoid potential harm.
briefly summarize how the Electoral College works. Explain some of t.docxjackiewalcutt
briefly summarize how the Electoral College works. Explain some of the main pros and cons in the debate about whether to keep or abolish the current Electoral College process. Also explain one proposal to change how the system works without formally abolishing it. Evaluate the various arguments and the proposal. Include at least two perspectives in your assessment:
Your judgment about the relevance of the Electoral College's underlying rationale to contemporary America.
Your judgment about its impact on presidential leadership capacity.
.
Briefly summarize and analyze two primary sources, identifying their.docxjackiewalcutt
Briefly summarize and analyze two primary sources, identifying their intended audience, purpose, context in which they were produced (what was happening at the time), and their overall historical significance (why it is important). Once you have analyzed the documents, discuss how they relate to each other. For example, do they reveal different perspectives or change over time?
The purpose of this is to go deep into a piece of material and engage with the historians’ craft of how to interpret pieces of the past. This is not a right/wrong type of paper. This is your interpretation based on what you know. The paper needs to have a strong thesis statement supported by quotes from the primary source with a conclusion that sums it up.
The paper should be 2 – 3 pages
PRIMARY SOURCES:
Hunter-Gatherer and Agricultural Societies
Hunting and Warfare - Cave Paintings
Çatal Hüyük City Plan
Code of Hammurabi
Greece
Herodotus: On the Kings of Sparta
Accounts of the Hellenic Games
Plato: The Republic
Rome
The Roman Way of Declaring War
The 12 Tables
Strabo: The Grandeur of Rome
Late Antiquity and the Emergence of Islam
Sidonius Apollinaris: A Civilized Barbarian and Barbarian Roman
The Prophet Muhammad's Last Sermon
The Qu'ran 1, 47
Feudalism
Pope Gregory the Great: Succession to Tenant Holdings on Church Land
Æthelwulf, King of Wessex: Grant of a Tenth of Public Land
Canute the Great: The Granting of Fiefs
The Crusades
Gregory VII: Call for a Crusade [First Crusade]
Eugene III: Summons for a Crusade [Second Crusade]
The Decline of Christian Power in the Holy Land
Richard the Lion-Hearted Conquers Cypress
The Middle Ages
Gregory of Tours: The Harsh Treatment of Serfs and Slaves
Geoffrey Chaucer, The Canterbury Tales: The Prologue to the Wife of Bath's Tale
The Renaissance and Discovery
Niccolo Machiavelli: The Prince [excerpts]
The Book of the Courtier [Excerpt]
The Life of Leonardo da Vinci
Christopher Columbus: Extracts from Journal
Sir Francis Drake's Famous Voyage Around the World
.
Briefly respond to the following questions. Use facts and examples t.docxjackiewalcutt
Briefly respond to the following questions. Use facts and examples to support your answers. Use APA style for any references.
1. When should the architect begin the analysis?
2. What are the activities the architect must execute?
3. What is the set of knowledge domains applied to the analysis?
4. What are the tips and tricks that make security architecture risk assessment easier?
.
Briefly in your own words describe the distinction between explicit .docxjackiewalcutt
Briefly in your own words describe the distinction between explicit knowledge and implicit (tacit) knowledge. Next describe the knowledge network cycle that transforms individual knowledge into organizational knowledge. Be sure to identify any key transformations within your response.
Discuss two (2) fundamental challenges of data storage and information sharing associated with a company’s knowledge management system. Next hypothesize how one would overcome the problem of “not knowing what you know.” Provide support for your response.
.
Essay Structure Thesis Antithesis SynthesisBrenda Cooper
Here is a draft essay on Othello as a tragic hero:
Othello as a Tragic Hero
In Shakespeare's play Othello, the title character of Othello can be seen as a tragic hero. According to Aristotle's definition, a tragic hero must have a hamartia or tragic flaw, experience a reversal of fortune, and gain self-knowledge. Othello's jealousy and lack of self-control over his emotions lead to his tragic downfall, fulfilling the characteristics of a Shakespearean tragic hero.
Othello's tragic flaw is his jealousy and lack of self-control over his emotions. As a Moor in 16th century Venice, Othello has risen to the highest ranks
The document discusses the importance of teaching students about ethnicity in schools. It argues that American school boards should mandate multicultural and ethnic studies programs to give students a wider perspective on history and human interaction. This would provide an understanding of the numerous ethnic backgrounds that helped shape America, as the country was built by people from around the globe. The author notes they felt limited in their knowledge of other ethnicities as a child but now recognizes the importance of understanding one's own ethnicity as well as others. Schools should teach students concepts like race, ethnicity, gender, and sexuality that they will need to know about in the future.
Essay On India For Students From Cla. Online assignment writing service.Ashley Hernandez
The document discusses how Joe Linta is the head coach of the Hamden Hall high school football team and describes a game taking place on a crisp October evening in Hamden, Connecticut between Hamden Hall and another school with Coach Linta jogging onto the field behind his team. No other details are provided about Coach Linta or the game. The summary establishes the context of Coach Linta coaching a high school football game but does not include any evaluative claims.
Violence In Movies Opinion Essay. Online assignment writing service.Melissa Ford
Horror stories can stimulate imagination and be entertaining for older audiences. However, for children and teenagers, exposure to graphic horror content through movies, videos and stories may cause lasting psychological trauma and negatively impact their moral development by desensitizing them to violence. While horror fiction has its place, parents must carefully consider their children's maturity level and monitor what they experience to avoid potential harm.
briefly summarize how the Electoral College works. Explain some of t.docxjackiewalcutt
briefly summarize how the Electoral College works. Explain some of the main pros and cons in the debate about whether to keep or abolish the current Electoral College process. Also explain one proposal to change how the system works without formally abolishing it. Evaluate the various arguments and the proposal. Include at least two perspectives in your assessment:
Your judgment about the relevance of the Electoral College's underlying rationale to contemporary America.
Your judgment about its impact on presidential leadership capacity.
.
Briefly summarize and analyze two primary sources, identifying their.docxjackiewalcutt
Briefly summarize and analyze two primary sources, identifying their intended audience, purpose, context in which they were produced (what was happening at the time), and their overall historical significance (why it is important). Once you have analyzed the documents, discuss how they relate to each other. For example, do they reveal different perspectives or change over time?
The purpose of this is to go deep into a piece of material and engage with the historians’ craft of how to interpret pieces of the past. This is not a right/wrong type of paper. This is your interpretation based on what you know. The paper needs to have a strong thesis statement supported by quotes from the primary source with a conclusion that sums it up.
The paper should be 2 – 3 pages
PRIMARY SOURCES:
Hunter-Gatherer and Agricultural Societies
Hunting and Warfare - Cave Paintings
Çatal Hüyük City Plan
Code of Hammurabi
Greece
Herodotus: On the Kings of Sparta
Accounts of the Hellenic Games
Plato: The Republic
Rome
The Roman Way of Declaring War
The 12 Tables
Strabo: The Grandeur of Rome
Late Antiquity and the Emergence of Islam
Sidonius Apollinaris: A Civilized Barbarian and Barbarian Roman
The Prophet Muhammad's Last Sermon
The Qu'ran 1, 47
Feudalism
Pope Gregory the Great: Succession to Tenant Holdings on Church Land
Æthelwulf, King of Wessex: Grant of a Tenth of Public Land
Canute the Great: The Granting of Fiefs
The Crusades
Gregory VII: Call for a Crusade [First Crusade]
Eugene III: Summons for a Crusade [Second Crusade]
The Decline of Christian Power in the Holy Land
Richard the Lion-Hearted Conquers Cypress
The Middle Ages
Gregory of Tours: The Harsh Treatment of Serfs and Slaves
Geoffrey Chaucer, The Canterbury Tales: The Prologue to the Wife of Bath's Tale
The Renaissance and Discovery
Niccolo Machiavelli: The Prince [excerpts]
The Book of the Courtier [Excerpt]
The Life of Leonardo da Vinci
Christopher Columbus: Extracts from Journal
Sir Francis Drake's Famous Voyage Around the World
.
Briefly respond to the following questions. Use facts and examples t.docxjackiewalcutt
Briefly respond to the following questions. Use facts and examples to support your answers. Use APA style for any references.
1. When should the architect begin the analysis?
2. What are the activities the architect must execute?
3. What is the set of knowledge domains applied to the analysis?
4. What are the tips and tricks that make security architecture risk assessment easier?
.
Briefly in your own words describe the distinction between explicit .docxjackiewalcutt
Briefly in your own words describe the distinction between explicit knowledge and implicit (tacit) knowledge. Next describe the knowledge network cycle that transforms individual knowledge into organizational knowledge. Be sure to identify any key transformations within your response.
Discuss two (2) fundamental challenges of data storage and information sharing associated with a company’s knowledge management system. Next hypothesize how one would overcome the problem of “not knowing what you know.” Provide support for your response.
.
Briefly explain Victoria Australia Covid19 update and impact.docxjackiewalcutt
Briefly explain
Victoria Australia Covid19 update and impact on business in general and the impact on Real Estate
in an email and also rephrase and make the below content which i have written to sound more negative. It is a letter to owner.
.
Briefly introduce the détente policies of the early 1970s, and des.docxjackiewalcutt
Briefly introduce the détente policies of the early 1970s, and describe how they positively or negatively impacted Western politics and society.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Levack, B., Muir, E., & Veldman, M., (2011).
The West: Vol. 2. Encounters & transformations: Since 1550
(3
rd
ed., pp. 928-934). Upper Saddle River, NJ: Pearson Education, Inc.
No Wiki, Dictionary.com or Plagiarism
.
Briefly explain the role of information systems in an organization.docxjackiewalcutt
Briefly explain the role of information systems in an organization.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Kroenke, D. (2013). The Importance of MIS.
Using MIS
(pp. 8-10, 11-13). Upper Saddle River: Pearson Learning
Solution
s. (Original work published 2007)
.
briefly describe, in 2-3 pages, the problemissue and the proble.docxjackiewalcutt
briefly describe, in 2-3 pages, the problem/issue and the problem statement you developed.
Identify the major contributors to the problem (who, what) and briefly explain how they contribute to/cause the problem.
Explain at least two causes of the problem.
Explain at least two effects of the problem.
.
Briefly explain the mission of the OSH Act. What is the rationale be.docxjackiewalcutt
Briefly explain the mission of the OSH Act. What is the rationale behind the Act?
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
.
Briefly discuss the various organizational approaches to managing .docxjackiewalcutt
Briefly discuss the various organizational approaches to managing ethics within an IS?
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Kroenke, D. (2013
). The Importance of MIS. Using MIS
(pp. 394-395, 426-427). Upper Saddle River: Pearson Learning
Solution
s.
No Wiki, Dictionary.com or Plagiarism
.
Briefly explain the identified security issues during Risk Assessmen.docxjackiewalcutt
Briefly explain the identified security issues during Risk Assessment.
Executive summary on Risk treatment and Risk control.
Provide a mitigation policy and plans with the intent of successfully treating the risks that were discovered during risk assessment.
Provide a risk monitoring and risk reviewing plan under risk control
.
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxjackiewalcutt
Briefly discuss some KSAs for Fighting Cybercrime and submit in a word document.
· Be careful. Make sure to avoid plagiarism and to use quotation marks and proper citation as required.
· Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words (avoid using blogs or Wikipedia).
.
Briefly describe what a monopoly is and give an example using the ch.docxjackiewalcutt
Briefly describe what a monopoly is and give an example using the characteristics of monopoly. State what are the barriers for entry that market. How does the monopoly maximises profit and what is the role of the government? Analyse and evaluate an example of natural monopoly in Oman.
.
Briefly describe the spread of industry throughout Europe and into.docxjackiewalcutt
Briefly describe the spread of industry throughout Europe and into America.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Levack, B. P., Muir, E., & Veldman, M. (2011). 18.
The West: encounters & transformations
(3rd ed., pp.). Boston: Longman.
No Wiki, Dictionary.com or Plagiarism
.
Briefly describe the path of food through the digestive system and e.docxjackiewalcutt
Briefly describe the path of food through the digestive system and explain each organ’s role in the digestive process. Research two digestive dysfunctions that can occur and discuss how each of them could impact a person’s health.
*This question is a minimum of 200 words and at least one cited source. It is due by Midnight December the 28th.*
.
Briefly describe the different parenting styles discussed in this we.docxjackiewalcutt
Briefly describe the different parenting styles discussed in this week’s readings. How could they impact a child’s cognitive and social development? Select two parental characters in TV or movie media (e.g., movies, situation comedies, TV dramas) and identify the styles that the characters who are acting in the roles of the parents are applying to the characters who are acting in the roles of children. Each of your characters should demonstrate a different parenting style—do not discuss two characters demonstrating the same style. What do the readings say about the effects of these parenting styles on cognitive and social development? In what ways are the behaviors of the children consistent with the information in the readings and in what ways are the children’s behaviors different?
.
Briefly describe how the BIOS boots or starts the computer and.docxjackiewalcutt
Briefly describe how the BIOS boots or starts the computer and the operating system.
Describe utilities that are on your Windows OS under System Information, Task Manager, and Resource Monitor.
Provide a screenshot of the Performance and Overview tabs of your computer.
(If you feel that a screenshot shows too much personal information, you can choose another tab or decline this part of the assignment.)
.
Briefly describe how to deploy a Continuous Improvement effort.W.docxjackiewalcutt
Briefly describe how to deploy a Continuous Improvement effort.
What Continuous Improvement Is (and How to Use It)
Ben Mulholland
April 6, 2018
Business Processes, Processes, Productivity
No process is perfect; there’s always room to improve. Unfortunately, many teams have no way to identify, test, and deploy the changes they make, meaning each tweak is a roll of the dice.
The savings can be massive, but you need a continuous improvement program to make sure that the changes you make won’t make your operations a whole lot harder.
“1 in 10 improvements save money… [each saving, on average,] $31,043 in its first year of implementation.
1 in 4 improvements save time… [each saving, on average,] 270 hours in its first year of implementation.” – KaiNexus, The ROI of Continuous Improvement
Most successful changes will also make your employee’s jobs easier (or more pleasant) to perform. You’ll be saving time and money, but you’ll also be getting far better value out of your current efforts and operations.
However, I’m getting ahead of myself. Let’s start from the top.What is continuous improvement?
Ever corrected a spelling mistake in your processes or manuals? How about adding a new step to qualify a task that wasn’t recorded before? What about updating your method to take advantage of better tools or software?
All of these and more are examples of continuous improvement.
Continuous improvement is a method to make sure that your processes, methods, and practices are as efficient, accurate, and effective as possible. This is done (surprise, surprise) by periodically examining and improving your processes to smash bottlenecks, use the best software, and take advantage of the most efficient methods.
If you’ve ever heard of lean, kaizen, Six Sigma, or DMAIC then this will sound familiar, as continuous improvement is based on similar principles and forms a key part of both of those practices. This is because the primary objective of any changes is to reduce waste and streamline your work.
While there are many different methods for achieving continuous improvement (such as process innovation and the Deming cycle), all can be classified into one of two groups; incremental or breakthrough improvements.
Incremental vs breakthrough improvements
Continuous improvement is largely practiced using two disciplines; incremental and breakthrough improvements. These can be used interchangeably, but the best way to deploy a thorough continuous improvement program is to combine the two. By doing this you can quickly deal with smaller issues while giving larger items the care and attention they deserve.Incremental continuous improvement
Incremental continuous improvement is all about making small tweaks to a process, method, or practice to improve it as problems are found. This usually costs less and can be done much faster than using the breakthrough method, but there are a few risks and downsides to doing so.
Imagine that you’re working through a regular document.
briefly define democracy and evaluate in detail THREE of.docxjackiewalcutt
briefly define
democracy
and evaluate in detail
THREE
of the items from the list below that you feel has the greatest impact on advancing democracy in the United States. (Provide examples to support your answer)
¨ Bill of Rights
¨ 1st Amendment rights
¨ Civil War Amendments
¨ Gender Equality
¨ Right of Privacy
¨ Three branches of government
¨ Civil rights cases
¨ Civil liberties cases
¨ Political parties
¨ 14th Amendment due process protections
¨ Interest groups
From the list above, select
ONE
item that you feel has hindered the advancement of democracy? Provide examples to support your response. In your conclusion, considering your answer to the first question, explain your role in ensuring an effective democracy? Elaborate your response by describing three things you plan to do to ensure democracy.
.
Briefly define, listcontrast, identify the significance of, or .docxjackiewalcutt
Briefly define, list/contrast, identify the significance of, or describe the following items.
Use two (2) different sources to answer the following business terms.
Use your
BUSN 11
textbook
and one other
Internet source
as needed.
Form Attached
.
Briefly describe elements of a transformational leader. What percent.docxjackiewalcutt
Briefly describe elements of a transformational leader. What percentage of transformational leaders do you believe exists in the world?
1 page APA with min. 2 references
and one question about the subject with the answer supported with a reference
needed in 24 hours.
.
Briefly define cyber-terrorism. Define hacktivism. Illustrate examples of each in current events within the last decade.
Cyber-terrorism is defined as a computer based attack aimed at disabling vital computer systems so as to intimidate, coerce, or harm a government or section of the population. (Cyber-terrorism, n.d). Examples of this include introducing a virus to vulnerable networks, website defacing, hacking into computer systems or terroristic threats made with electronic communication. Hacktivism is defined as the practice of gaining unauthorized access to a computer system and carrying out various disruptive actions as a means of achieving political or social goals. (Hacktivism, n.d). Examples of this include data breaches conducted by organizations such as WikiLeaks and the internet group Anonymous.
What is the fundamental difference between these two?
Although both actions involve computers and are usually politically driven, the difference between the two is cyber-terrorism is used primarily to cause harm.
How has technology helped to advance these groups?
Technology has helped these groups to gain access to systems or networks which they probably would not be able to access through legitimate means. It has also allowed for the spread of propaganda, the organization of individuals in far places by providing a common meeting point in chat rooms or discussion boards located on the Internet, and the gathering of information and intelligence in preparation for illegal activities. (Stark, 2011)
How do you think our government’s response to such groups has changed our attitudes towards our own freedoms?
Personally, it is hard for me to say. On one hand, I can understand the need for the government to clamp down on the activities of hacktivists and especially those of cyber-terrorists. In some cases, the government has made itself susceptible to these attacks by not taking all the necessary appropriate measures to secure their systems. However, that is also not to excuse their ability to cover up their own forms of cyber-terrorism that has caused harm against its own citizens.
In your opinion, do you think Hacktivism is justified or is it just a subset of cyber-terrorism? Give some examples to support your stance
. By definition, Hacktivism is a subset of cyber-terrorism because they both involve the utilization of computers in order to gain unauthorized access to a computer system/network and/or to disrupt said system or network for social, political, or ideological purposes. Whether it is WikiLeaks gaining secret documents exposing a countries government of invading the privacy of their citizens for the argument of security or the case of Aaron Swartz, the creator of SecureDrop. (10 Most…, n.d.). Each instance involved an entity gaining unauthorized access to a computer system or network through illegal means.
Cyberterrorism. (n.d.). Retrieved from
https://www.dictionary.com/b.
Briefly answer the following1. Go to Illustration Capsule 9.1 Man.docxjackiewalcutt
Briefly answer the following:
1. Go to Illustration Capsule 9.1 Many of Apple’s Suppliers Flunk the Ethics Test in your textbook.
Do Apple’s actions indicate that their position on business ethics is aligned with the principle of ethical universalism?
2. Go to Illustration Capsule 9.2, Investment Fraud at Bernard L. Madoff Investment Securities and Stanford Financial Group in your textbook.
What drivers for unethical behavior are evident in reviewing the actions of Bernard Madoff and the managers of the Stanford Financial Group?
3. Go to Illustration Capsule 9.3, How General Electric’s Top Management Built a Culture That Fuses High Performance with High Integrity in your textbook.
In what way do the ethics policies at General Electric recognize and address the possible challenges of maintaining a high standard of ethical behavior?
4. Go to Illustration Capsule 9.4 John Deere’s Approach to Corporate Social Responsibility in your textbook.
What socially beneficial activities does John Deere elect to support, and how does this shape its CSR strategy?
.
Briefly define corporate social responsibility (CSR) in your o.docxjackiewalcutt
Briefly define corporate social responsibility (CSR) in your own words.
Find a current event in the past 1–2 years in which a business either went above and beyond to demonstrate corporate social responsibility (CSR) OR sorely failed to demonstrate CSR. Provide the name of the company and the good or bad deed. Do your findings change the way you will support the company in the future?
.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Briefly explain Victoria Australia Covid19 update and impact.docxjackiewalcutt
Briefly explain
Victoria Australia Covid19 update and impact on business in general and the impact on Real Estate
in an email and also rephrase and make the below content which i have written to sound more negative. It is a letter to owner.
.
Briefly introduce the détente policies of the early 1970s, and des.docxjackiewalcutt
Briefly introduce the détente policies of the early 1970s, and describe how they positively or negatively impacted Western politics and society.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Levack, B., Muir, E., & Veldman, M., (2011).
The West: Vol. 2. Encounters & transformations: Since 1550
(3
rd
ed., pp. 928-934). Upper Saddle River, NJ: Pearson Education, Inc.
No Wiki, Dictionary.com or Plagiarism
.
Briefly explain the role of information systems in an organization.docxjackiewalcutt
Briefly explain the role of information systems in an organization.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Kroenke, D. (2013). The Importance of MIS.
Using MIS
(pp. 8-10, 11-13). Upper Saddle River: Pearson Learning
Solution
s. (Original work published 2007)
.
briefly describe, in 2-3 pages, the problemissue and the proble.docxjackiewalcutt
briefly describe, in 2-3 pages, the problem/issue and the problem statement you developed.
Identify the major contributors to the problem (who, what) and briefly explain how they contribute to/cause the problem.
Explain at least two causes of the problem.
Explain at least two effects of the problem.
.
Briefly explain the mission of the OSH Act. What is the rationale be.docxjackiewalcutt
Briefly explain the mission of the OSH Act. What is the rationale behind the Act?
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
.
Briefly discuss the various organizational approaches to managing .docxjackiewalcutt
Briefly discuss the various organizational approaches to managing ethics within an IS?
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Kroenke, D. (2013
). The Importance of MIS. Using MIS
(pp. 394-395, 426-427). Upper Saddle River: Pearson Learning
Solution
s.
No Wiki, Dictionary.com or Plagiarism
.
Briefly explain the identified security issues during Risk Assessmen.docxjackiewalcutt
Briefly explain the identified security issues during Risk Assessment.
Executive summary on Risk treatment and Risk control.
Provide a mitigation policy and plans with the intent of successfully treating the risks that were discovered during risk assessment.
Provide a risk monitoring and risk reviewing plan under risk control
.
Briefly discuss some KSAs for Fighting Cybercrime and submit in a wo.docxjackiewalcutt
Briefly discuss some KSAs for Fighting Cybercrime and submit in a word document.
· Be careful. Make sure to avoid plagiarism and to use quotation marks and proper citation as required.
· Use APA format for citations and the required References page. Remember that the significant portion of your analysis should be in your own words (avoid using blogs or Wikipedia).
.
Briefly describe what a monopoly is and give an example using the ch.docxjackiewalcutt
Briefly describe what a monopoly is and give an example using the characteristics of monopoly. State what are the barriers for entry that market. How does the monopoly maximises profit and what is the role of the government? Analyse and evaluate an example of natural monopoly in Oman.
.
Briefly describe the spread of industry throughout Europe and into.docxjackiewalcutt
Briefly describe the spread of industry throughout Europe and into America.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Levack, B. P., Muir, E., & Veldman, M. (2011). 18.
The West: encounters & transformations
(3rd ed., pp.). Boston: Longman.
No Wiki, Dictionary.com or Plagiarism
.
Briefly describe the path of food through the digestive system and e.docxjackiewalcutt
Briefly describe the path of food through the digestive system and explain each organ’s role in the digestive process. Research two digestive dysfunctions that can occur and discuss how each of them could impact a person’s health.
*This question is a minimum of 200 words and at least one cited source. It is due by Midnight December the 28th.*
.
Briefly describe the different parenting styles discussed in this we.docxjackiewalcutt
Briefly describe the different parenting styles discussed in this week’s readings. How could they impact a child’s cognitive and social development? Select two parental characters in TV or movie media (e.g., movies, situation comedies, TV dramas) and identify the styles that the characters who are acting in the roles of the parents are applying to the characters who are acting in the roles of children. Each of your characters should demonstrate a different parenting style—do not discuss two characters demonstrating the same style. What do the readings say about the effects of these parenting styles on cognitive and social development? In what ways are the behaviors of the children consistent with the information in the readings and in what ways are the children’s behaviors different?
.
Briefly describe how the BIOS boots or starts the computer and.docxjackiewalcutt
Briefly describe how the BIOS boots or starts the computer and the operating system.
Describe utilities that are on your Windows OS under System Information, Task Manager, and Resource Monitor.
Provide a screenshot of the Performance and Overview tabs of your computer.
(If you feel that a screenshot shows too much personal information, you can choose another tab or decline this part of the assignment.)
.
Briefly describe how to deploy a Continuous Improvement effort.W.docxjackiewalcutt
Briefly describe how to deploy a Continuous Improvement effort.
What Continuous Improvement Is (and How to Use It)
Ben Mulholland
April 6, 2018
Business Processes, Processes, Productivity
No process is perfect; there’s always room to improve. Unfortunately, many teams have no way to identify, test, and deploy the changes they make, meaning each tweak is a roll of the dice.
The savings can be massive, but you need a continuous improvement program to make sure that the changes you make won’t make your operations a whole lot harder.
“1 in 10 improvements save money… [each saving, on average,] $31,043 in its first year of implementation.
1 in 4 improvements save time… [each saving, on average,] 270 hours in its first year of implementation.” – KaiNexus, The ROI of Continuous Improvement
Most successful changes will also make your employee’s jobs easier (or more pleasant) to perform. You’ll be saving time and money, but you’ll also be getting far better value out of your current efforts and operations.
However, I’m getting ahead of myself. Let’s start from the top.What is continuous improvement?
Ever corrected a spelling mistake in your processes or manuals? How about adding a new step to qualify a task that wasn’t recorded before? What about updating your method to take advantage of better tools or software?
All of these and more are examples of continuous improvement.
Continuous improvement is a method to make sure that your processes, methods, and practices are as efficient, accurate, and effective as possible. This is done (surprise, surprise) by periodically examining and improving your processes to smash bottlenecks, use the best software, and take advantage of the most efficient methods.
If you’ve ever heard of lean, kaizen, Six Sigma, or DMAIC then this will sound familiar, as continuous improvement is based on similar principles and forms a key part of both of those practices. This is because the primary objective of any changes is to reduce waste and streamline your work.
While there are many different methods for achieving continuous improvement (such as process innovation and the Deming cycle), all can be classified into one of two groups; incremental or breakthrough improvements.
Incremental vs breakthrough improvements
Continuous improvement is largely practiced using two disciplines; incremental and breakthrough improvements. These can be used interchangeably, but the best way to deploy a thorough continuous improvement program is to combine the two. By doing this you can quickly deal with smaller issues while giving larger items the care and attention they deserve.Incremental continuous improvement
Incremental continuous improvement is all about making small tweaks to a process, method, or practice to improve it as problems are found. This usually costs less and can be done much faster than using the breakthrough method, but there are a few risks and downsides to doing so.
Imagine that you’re working through a regular document.
briefly define democracy and evaluate in detail THREE of.docxjackiewalcutt
briefly define
democracy
and evaluate in detail
THREE
of the items from the list below that you feel has the greatest impact on advancing democracy in the United States. (Provide examples to support your answer)
¨ Bill of Rights
¨ 1st Amendment rights
¨ Civil War Amendments
¨ Gender Equality
¨ Right of Privacy
¨ Three branches of government
¨ Civil rights cases
¨ Civil liberties cases
¨ Political parties
¨ 14th Amendment due process protections
¨ Interest groups
From the list above, select
ONE
item that you feel has hindered the advancement of democracy? Provide examples to support your response. In your conclusion, considering your answer to the first question, explain your role in ensuring an effective democracy? Elaborate your response by describing three things you plan to do to ensure democracy.
.
Briefly define, listcontrast, identify the significance of, or .docxjackiewalcutt
Briefly define, list/contrast, identify the significance of, or describe the following items.
Use two (2) different sources to answer the following business terms.
Use your
BUSN 11
textbook
and one other
Internet source
as needed.
Form Attached
.
Briefly describe elements of a transformational leader. What percent.docxjackiewalcutt
Briefly describe elements of a transformational leader. What percentage of transformational leaders do you believe exists in the world?
1 page APA with min. 2 references
and one question about the subject with the answer supported with a reference
needed in 24 hours.
.
Briefly define cyber-terrorism. Define hacktivism. Illustrate examples of each in current events within the last decade.
Cyber-terrorism is defined as a computer based attack aimed at disabling vital computer systems so as to intimidate, coerce, or harm a government or section of the population. (Cyber-terrorism, n.d). Examples of this include introducing a virus to vulnerable networks, website defacing, hacking into computer systems or terroristic threats made with electronic communication. Hacktivism is defined as the practice of gaining unauthorized access to a computer system and carrying out various disruptive actions as a means of achieving political or social goals. (Hacktivism, n.d). Examples of this include data breaches conducted by organizations such as WikiLeaks and the internet group Anonymous.
What is the fundamental difference between these two?
Although both actions involve computers and are usually politically driven, the difference between the two is cyber-terrorism is used primarily to cause harm.
How has technology helped to advance these groups?
Technology has helped these groups to gain access to systems or networks which they probably would not be able to access through legitimate means. It has also allowed for the spread of propaganda, the organization of individuals in far places by providing a common meeting point in chat rooms or discussion boards located on the Internet, and the gathering of information and intelligence in preparation for illegal activities. (Stark, 2011)
How do you think our government’s response to such groups has changed our attitudes towards our own freedoms?
Personally, it is hard for me to say. On one hand, I can understand the need for the government to clamp down on the activities of hacktivists and especially those of cyber-terrorists. In some cases, the government has made itself susceptible to these attacks by not taking all the necessary appropriate measures to secure their systems. However, that is also not to excuse their ability to cover up their own forms of cyber-terrorism that has caused harm against its own citizens.
In your opinion, do you think Hacktivism is justified or is it just a subset of cyber-terrorism? Give some examples to support your stance
. By definition, Hacktivism is a subset of cyber-terrorism because they both involve the utilization of computers in order to gain unauthorized access to a computer system/network and/or to disrupt said system or network for social, political, or ideological purposes. Whether it is WikiLeaks gaining secret documents exposing a countries government of invading the privacy of their citizens for the argument of security or the case of Aaron Swartz, the creator of SecureDrop. (10 Most…, n.d.). Each instance involved an entity gaining unauthorized access to a computer system or network through illegal means.
Cyberterrorism. (n.d.). Retrieved from
https://www.dictionary.com/b.
Briefly answer the following1. Go to Illustration Capsule 9.1 Man.docxjackiewalcutt
Briefly answer the following:
1. Go to Illustration Capsule 9.1 Many of Apple’s Suppliers Flunk the Ethics Test in your textbook.
Do Apple’s actions indicate that their position on business ethics is aligned with the principle of ethical universalism?
2. Go to Illustration Capsule 9.2, Investment Fraud at Bernard L. Madoff Investment Securities and Stanford Financial Group in your textbook.
What drivers for unethical behavior are evident in reviewing the actions of Bernard Madoff and the managers of the Stanford Financial Group?
3. Go to Illustration Capsule 9.3, How General Electric’s Top Management Built a Culture That Fuses High Performance with High Integrity in your textbook.
In what way do the ethics policies at General Electric recognize and address the possible challenges of maintaining a high standard of ethical behavior?
4. Go to Illustration Capsule 9.4 John Deere’s Approach to Corporate Social Responsibility in your textbook.
What socially beneficial activities does John Deere elect to support, and how does this shape its CSR strategy?
.
Briefly define corporate social responsibility (CSR) in your o.docxjackiewalcutt
Briefly define corporate social responsibility (CSR) in your own words.
Find a current event in the past 1–2 years in which a business either went above and beyond to demonstrate corporate social responsibility (CSR) OR sorely failed to demonstrate CSR. Provide the name of the company and the good or bad deed. Do your findings change the way you will support the company in the future?
.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
1.Allow the user to enter n, the number of values to be processed;.docx
1. 1.Allow the user to enter n, the number of values to be
processed; then allocate an
anonymous array of n doub1e values, storing its address in
doublePtr.
2. Fill the anonymous array of Exercise 1 with ninput values,
entered from the
keyboard.
3. Compute and display the average of the values in the
anonymous array of
Exercise 1.
4.Deallocate the storage of the anonymous array of Exercise 1.
5. In Exercise 1, if the value of doublePtr is 1000 and double
values are stored in 8 bytes, draw a memory map showing the
addresses of the first few elements of the anonymous array.
6.Assuming that addresses are stored in 4 bytes and double
values in 8 bytes, tell what output will be produced by the
following statements:
doubledubValues[] = {l.l, 2.2, 3.3, 4.4, 5.5};
double * dubPtr = dubValues;
for (inti = 0; i< 5; i++)
cout<<sizeof(dubPtr + i) « “ “
<<sizeof(*(dubPtr + i)) « “ ”
<< *(dubPtr + i) « endl;
4.classCartesianPoint for a point (x, y) in a Cartesian coordinate
system
10.Write and test a class for a Line, described by its slope and a
2. point on the line, with functions that
a. Find the point-slope equation of the line
b. Find the slope-intercept equation of the line
12. Write a program to read the point and slope information for
two lines and to determine whether they intersect or are
parallel. If they intersect, find the point of intersection and also
determine whether they are perpendicular. Use the classes
CartesianPoint from Exercises 4 and 10 and Line from Problem
11 to represent points and lines, respectively.
Zimmerman 1
David Zimmerman
Instructor Cullom
Ethnography Final, Draft
WR 121, Fri 10:00 – 12:50
December 2nd, 2013
Passion and Murder: A Tale of two Méxicos.
We have heard the phrase time and time again. “How well
do you know your neighbor?” I set out to put this phrase to the
test by exploring Mexico through multiple lenses. I wanted to
learn about this country through the eyes of another individual,
published academic research and relate it to what my
assumptions were of the reality of the smallest country in North
America.
When I started off on this academic journey I found it hard
to look past the media’s portrayal of Mexico as a kind of Wild
West, a regime of lawlessness and a country controlled and in
fear of the drug cartels that seemingly run the country with this
highest rate of immigrants to the United States. I selected an
informant, Daniella, who had grown up in Mexico but has been
in the United States for the past few decades. I expected her to
paint a very different picture of Mexico than she did.
3. I had believed that the tough times I pictured in Mexico
would lead to tough individuals who protected themselves
emotionally from the atrocities that they had seen in their
country. Yet I came to find out that she was one of the sweetest
passionate women I have ever had the pleasure of meeting.
When I had asked her if she was willing to do an interview
about her home country of Mexico a week earlier, she lit up
with excitement. “Ooohh, you will get to hear all about my
Mexico,” she said with tears forming in her eyes. I knew from
that moment that I had chosen the right person. Not only was I
able to use her as research for my paper, but I was able to give
her the opportunity to tell her story, one that no one had ever
asked her to tell.
We nestled in a corner as the familiar, bold smell of
espresso wafts through the air. The whirr of beans grinding and
milk being steamed is accompanied by the hum of laptops to
form a cacophony of sounds all too familiar. I get up to grab my
latte, a large, as I knew I would be sitting there a while, and we
began. Sitting across from me is Daniella. A warm smile crosses
her face and her soft hazel eyes gaze in my direction. Her curly
dark brown hair glinted, even sparkled, in the soft light of the
shop. This was not the picture I had painted of the haggard
Mexican women who had been through the oppression of her
countries practices. No she looked proud of her Mexican
heritage. She had been born in Mexico city in 1959 well before
the widespread cartel takeover of Mexico and was about to turn
sixty years old when I interviewed her. She, unlike many
American women was so pleased at this. She was happy to be
alive and living. Daniella reflected the goodness in humanity
and the kindness that can appear in anyone.
I assumed that Mexican history as a people began with an
originally indigenous population influenced by the invasion of
Spain in previous centuries. The obvious result of this has been
the establishment of Spanish as the dominant language in the
country. It would also seem that this Spanish influence also
established Catholicism as the main religion in Mexico. Unless
4. I am mistaken, the Spanish empire at the time of the invasion
was still very close to the Vatican and catholic dogma. When I
asked Daniella about her religious background she smiled and
agreed that there are many Roman Catholics in Mexico.
“However I am Jewish and my grandfather is from Turkey.
There is actually a very large constituent of people of the
Jewish faith in Mexico. Not many people realize this.” The
kicker of all of this is that her family originally tried to
immigrate to the United States but with Ellis Island full of
immigrants they were sent down in Mexico instead.
Due to the nature in which our culture portrays Latino
communities having a stronger emphasis on family than
mainstream American culture does, I inferred that this would be
the case. I assumed that Mexicans live with their extended
families and put a strong emphasis on respecting and caring for
their elders even at the expense of their own well-being. With
family seemingly very important to Mexican families, I
imagined that weddings are a huge deal. I had assumed that the
small get together on the beach, a seemly growing trend in the
United States, is probably not an idea very popular in their
culture. I asked Daniella about this idea. She placed a hand
wrinkled from hard work on my arm and said:
“Yes, David, yes, it is very different.” It was as if she was
consoling me for not experiencing how it was down there. “In
Mexico, you don’t or didn’t used to…You lived at home until
you got married whether you were a girl or a boy. There was no
shame in that, and yes the extended family was always there,
playing a big role in our upbringing.”
I could tell how blessed she felt to be raised in Mexico until her
late twenties with so many loving family members intricately
part of her life. Since the death of her mother and moving to the
United States, she has not lived in the same city as her siblings
for over 30 years. It was clear to me from her big eyes staring
past me and the sigh that washed over her whole body how
important this part of Mexican culture is to her.
As her cultural pride permeated throughout her whole aura
5. I had decided to dig deeper and lighten the mood at the same
time. She beamed at me as she reminisced about something as
simple as a Mexican birthday party. Hands waive around as she
describes the all-day affairs. “There are not set times...” she
says giggling, “these are all day affairs; we are having a party
on Friday for Bradley, see you there, there is no four to six or
anything like that, they would start at noon and go late into the
evening”. She was trying to reflect the closeness and community
she feels even with Mexicans that are not her kin. They did have
maids, as they made enough money, but even they were treated
as part of the family, more as colleagues than employees. They
were meant to help out, not be subservient. Even the waiters and
other service positions there have pride. These are not
occupations to look down upon like they tend to be in the
United States. It is clearly a culture that is quite progressive and
tolerant. This surprised me somewhat as I had assumed that
Mexico was a somewhat of a developing country except for the
resort communities. To this day she had told me that she can
meet another woman of Mexican descent and can feel like she
has known that person for years.
What I knew of this country is that, Mexico shares a border with
the United States, one that is constantly patrolled for drug
smuggling, illegal immigrants, and firearms. Chiefly it had
come to my attention, the vast amounts of illegal drugs that
were being fed into the United States. According to U.S.
National Drug Intelligence Center numbers, organized crime
groups that perpetuate drug trafficking earned an estimated $17
billion to $38 billion a year just from wholesaling drugs to the
black markets of the United States (Kellner and Pipitone 30).
Mexico is a democratic country; however I have heard that the
politics in the past have been deeply corrupt to the point where
elections have allegedly been fixed for a particular candidate.
When I asked Danielle how the widespread corruption affected
her life in Mexico, if at all. She smiled: “It was great, at least
for me, because everything could be acquired under the table for
a price. You need a driver’s license? Do you want to take the
6. test or just slide something under the table? Do you think there
is no corruption here David? I prefer my corruption, Mexican
style.” This was something that, besides being incredibly
humerous, shocked me and indicated to me that the corruption is
so widespread and ingrained into the culture that people have
grown accustomed to it. I went on to compare it to how used to
going to foreign wars we are here in American culture.
I wanted to know about the fear of these organizations and their
relationship to Daniella. In her first interview she had told me,
“indeed the drug cartels, they do horrible things. People go on
with their day to day lives and the cartels leave them alone for
the most part. We do not live in fear.” While I had believed her
I had to ask her some follow up questions as she was there
before things really had gotten bad.
The initial cartels that arose through Mexico’s new strategic
position in the drug trade were different than those we are
somewhat familiar with today. They played by what Kazi
describes as “gentlemen’s rules.” They were not using such
widespread violence and brutality to get their way. The initial
method for success was to establish “networks of businessmen,
politicians and journalists. Utilizing his position they built a
network that didn’t need to use violence” (Kellner and Pipitone
30). One such cartel was named the Guadalajara Cartel. Cartels
like this early player rose to power and flourished during the
1980s and the 1990s, during the time of the North American
Free Trade Agreement (NAFTA). “NAFTA made it easier to
ship goods of all kinds across the border, Mexicans become the
go-to distributors for Afghans, South Asians, Middle Easterner
and anyone else looking to sell illegal substances to Americans”
(Lawson).
In our second brief interview she agreed that she had not seen
the worst of it when she was living in the middle class suburban
area of Mexico City. She said, “my response was simply to
serve as a model for the resilience of my people, the
information you have presented me is truly shocking and I am
blessed that it did not happen in my time growing up there.” She
7. told me more recent stories of these atrocities perpetuated by
the cartels happening in areas where friends and family lived.
They had reflected an over-arching theme that I had discovered
in my thorough research of the cartel phenomenon in the past
three decades. . On paper, it appears that the initial pushes came
from United States drug policy to begin with. In the year 1914,
the U.S. Harrison Narcotics Tax Act succeeded in outlawing
opium based products such as heroin and raw opium. This
initially created a huge incentive for smugglers to take up the
business (Zaitz). After the ban of heroin imports in 1922 by the
U.S., smugglers set their sights on poppy-growing areas of
Mexico. (Zaitz). Reflecting the market for drugs in the United
States and with demand on the rise, traffickers of narcotics
become more organized in the 1960s and 1970s in order to
funnel Colombian drugs to U.S. consumers. (Zaitz). What
finally solidified Mexico’s dominance over the smuggling
routes to the United States was the move by the U.S. in the
1980’s that cut off Caribbean cocaine routes and eradicated the
power of Colombian cartels (Zaitz). With the attention of the
U.S. focused on Colombia, the Mexican drug rings began to
gain significant power.
There are many factions that vie for control of a piece of
Mexico’s drug trafficking business. Many smaller organizations
are out there under the umbrellas of larger cartels. The cartels
operate much like parent companies do in the business world
with the smaller organizations acting as subsidiaries. The
largest and most influential drug cartels or umbrella
organizations in Mexico are as follows: The Sinaloa
Federation, Los Zetas, La Familia Michoachana, and The Juarez
Cartel. The two most powerful of these two are the Sinaloa and
Los Zetas.
The Sionaloa is often considered the largest and most powerful
in Mexico. It is “an alliance of several powerful drug lords that
operates in dozens of countries. The cartel’s head, Joaquin “El
Chapo (Shorty)” Guzman Loera, is one of the most-wanted drug
barons in the world” (Kazi). It operates on a large scale using
8. vast quantities of production and shipment to ensure profits for
its business. An example of this is the 2011 discovery of a
marijuana plantation covering the equivilant of 200 football
fields. In addition it is known to be the main producer of
methamphetamine in Mexico (Kazi). This cartel is known for
buying off government and military officials rather than relying
on pure brutality in order to protect its profit. This primary
focus on bribery and corruption instead of violence sets this
cartel apart from others (Kazi).
While the Sionaloa cartels primarily rely on bribes to get
their way, Los Zetas use much more violent tactics. Los Zetas
arose from the former Gulf Cartel, where they were its armed
wing. They are “considered the most violent and ruthless
criminal organization in Mexico” (Kazi). Most of the Zetas’
members were previously Mexican special forces troops who
defected, are well trained, and highly organized (Kazi). They
are responsible for a large number of brutal and grotesque
killings (Kazi). This sets them apart from the Sinaloa who
prefers to use bribes to get their way.
The level of violence and corruption that has brought about and
been caused by the cartels is staggering. The result of which has
been widespread and differing affects to the lives of Mexican
citizens. The amount of murders surely has created fear in the
average citizen. “During January and Febuary 2010, there were
more than 1,500 executions according to Reforma. At this pace,
Mexico may end this year with 9,000 drug related murders”
(Kellner and Pipitone 33). Even smaller mountain towns are not
safe from the sweeping power of the drug cartels that according
to Lawson are, “essentially holding an entire nation at
gunpoint.” A mountain town by the name of Auguascalientes
was overtaken in 2007. Until that point it was a safe heaven and
place of prosperity. Six months following an event signifying
the start of the presence of the drug cartels, “11 Aguascalientes
police officers had been murdered” (Kellner and Pipitone 33).
North of Auguascalientes, a group of cartel members used
automatic weapons and grenades to assault a police station in
9. San Francisco de los Romo with the major inside (Kellner and
Pipitone 34). This level of brazen violence has created a
atmosphere in Mexico where no one feels sale. With groups like
Los Zetas and other cartels having such influences they are even
able to brazenly complete prison breaks and attacks on police
stations (Kazi).
The Mexican drug cartels have risen from the black market
created by the United States’ drug policy. They have become
increasingly more sophisticated by organizing themselves to
mirror huge multinational corporations. With their geographical
position and competitors edged out, the cartels have created a
monopoly on drug trafficking to the United States as well as the
rest of the world. These monopolies play off the corruption of
officials in Mexico and utilize extreme violence to intimidate,
control and dominate their trade. The result is a nation that is
under control by criminal organizations that have become more
powerful than its government.
This record of cartel violence paints a truly ominous picture. It
goes against the great passion that Daniella portrayed of her
wonderful Mexican heritage. However it stands to reason that
she grew up in a much different financial position than many
other do in Mexico. As she had told me, “the majority of the
jobs are agricultural and there are many poor farmers that live
there.” It is no surprise that the cartels prey and recruit
individuals who are not financially sound. People who need to
take care of their families in ways that are more dangerous,
illegal but very lucrative. However there is more to Mexico than
the drug cartels and big beautiful family gatherings. As in most
cases, everything is not black and white.
When I set out on the mission to educate myself about
Mexico, I wanted to learn not only about the country and its
history, but I wanted to learn about its people and its culture. At
the end of the day what I found was two Mexico’s co-existing
side by side. On one hand was the beautiful culturally rich
Mexico full of great people, passion, and love. The other side
belonged to the dark and secret Mexico that was corrupt and full
10. of violent drug trafficking. From a functionalist perspective I
would say that everything serves its purpose and comes together
to make it a great and livable country. I am glad I know more
about our neighbor to our south and hope to go on having a
great relationship with Daniella my link to their culture.
Stastna, Kazi.“The Cartels behind Mexico’s Drug War.” CBC
News,N.p. 28 August 2011. Web. 31 Oct. 2013.
Zaitz, Les. “Drug Cartels in Oregon: History of Mexican
Cartels.” Oregon Live. Oregon Live LLC, 21 June 2013. Web.
31 Oct. 2013.
Flintoff, Corey. “A Look At Mexico’s Drug Cartels.” NPR.
NPR, 16 April 2009. Web. 31 Oct. 2013.
Thomas, Kellner, and Francesco Pipitone. “Inside Mexico’s
Drug War.” World Policy Journal Vol.27 Issue1: 29-37.
Academic Search Premier. Web. 31 Oct. 2013.
Lawson, Guy. “How the Cartels Work.” Rolling Stone Issue
1087. 50-53. MasterFILE Premier. Web. 11 Nov. 2013.