Thursday, August 27, 2020

Cellular Reproduction Essay -- Biology

Cell Reproduction Cell Reproduction is the procedure by which every living thing produce new life forms comparable or indistinguishable from themselves. This is fundamental in that if an animal types couldn't replicate, that species would immediately get terminated. Continuously, propagation comprises of an essential example: the transformation by a parent life form of crude materials into posterity or cells that will later form into posterity. (Encarta, 2) In practically all creature life forms, propagation happens during or after the time of most extreme development. (Fichter, 16). Be that as it may, in Plants, which keep on becoming all through their lifetime, in this way making the procedure increasingly mind boggling. Plants' propagation is generally brought about by an energizer, generally ecological or development factors. The conceptive procedure, regardless of whether agamic or sexual consistently includes an trade in innate material from the parent(s) so that the new life form may likewise have the option to repeat. Regenerative procedures can be ordered from various perspectives despite the fact that the most well-known is to put them into either abiogenetic multiplication or sexual generation. Agamic generation is the procedure by which a solitary living being offers ascend to at least two little girl cells. Most single celled living beings repeat by the abiogenetic procedure known as splitting, which is generally called mitosis. Parting (or Mitosis) is the division of one cell into two indistinguishable little girl cells. Interphase, the principal period of the cell cycle and furthermore the stage before mitosis, begins when the cell is conceived. Interphase is separated into three stages, G1, S, and G2. During the G1 stage, the phone increments in mass with the exception of the chromosomes, which remain the equivalent, uncoiled. Protein amalgamation is additionally happening quickly in this stage. On the off chance that a cell doesn't partition further, it remains for all time in the G1 stage. Next is the S stage, in which the mass of the cell keeps on expanding, and DNA is copied, and afterward the chromosomes gap to shape indistinguishable sister chromatids appended by a centromere. (Harold, 45). During the G2 period of Interphase, the phone turns out to be twofold its mass during childbirth, the chromosomes start to abbreviate and loop, and the centrioles show up, the cell is currently prepared to go into mitosis. In the first and longest period of mitosis, prophase, the chromosomes become noticeable and the centrioles split down the middle and afterward move to inverse sides of th... ...on’t seperate effectively. This is called nondisjunction. There are three sorts of nondisjunction, Trisomy-when a gamete with an additional chromosome is fertiized with a typical gamete. Monosomy-when a gamete with one chromosome is missing and is then prepared by ordinary gamete. What's more, Trioloidy-where the two zygotes have an additional chromosome. Propagation is as fundamental to an animal varieties as food, water, or asylum. On the off chance that an animal types can't replicate any longer, that species will in the long run become terminated. There are numerous methods for proliferation yet principally just two: abiogenetic what's more, sexual. In abiogenetic multiplication, One living being gives a section or its entire self, so as to offer ascent to at least two new living beings. During sexual generation, two guardians each structure sex cells, which join together, and in the end structure another person. Works refered to Biggs, Alton and others. Science: The Dynamics of Life. Glencoe McGraw-Hill.: New York, NY, 2000 Encarta Encyclopedia. Compact disc ROM. 1998 Fichter, Sheila. Generation. All inclusive Press: Columbus, OH, 1994 Harold, Christopher. Cells: A Guided Tour. Simon and Schuster: New York, NY, 1987 O’Neil, Franklin. Cells. McMeel Publishing, Inc.: Atlanta, GA, 1990

Saturday, August 22, 2020

Geography of Iraq

Geology of Iraq Capital: Baghdad Iraq is a nation that is situated in western Asia and offers fringes with Iran, Jordan, Kuwait, Saudi Arabia and Syria (map). It has a little coastline of only 36 miles (58 km) along the Persian Gulf. Iraqs capital and biggest city is Baghdad and it has a populace of 30,399,572 (July 2011 gauge). Other enormous urban areas in Iraq incorporate Mosul, Basra, Irbil and Kirkuk and the countrys populace thickness is 179.6 individuals per square mile or 69.3 individuals per square kilometer. History of Iraq From 1980 to 1988 Iraq was associated with the Iran-Iraq war which crushed its economy. The war likewise left Iraq as one of the biggest military foundations in the Persian Gulf area (U.S. Division of State). In 1990 Iraq attacked Kuwait however it was constrained out in mid 1991 by a United States-drove U.N. alliance. Following these occasions social unsteadiness proceeded as the countrys northern Kurdish individuals and its southern Shia Muslims opposed Saddam Husseins government. Accordingly, the Iraqs government utilized power to smother the disobedience, executed a huge number of residents and seriously harmed the earth of the locales in question. In view of the precariousness in Iraq at that point, the U.S. what's more, a few different nations built up no-fly zones over the nation and the U.N. Security Council instituted a few approvals against Iraq after its administration wouldn't give up weapons and submit to U.N. investigations (U.S. Branch of State). Precariousness stayed in the nation all through the remainder of the 1990s and into the 2000s. In March-April 2003 a U.S.- drove alliance attacked Iraq after it was guaranteed the nation neglected to agree to facilitate U.N. examinations. This demonstration started the Iraq War among Iraq and the U.S. In the blink of an eye the U.S.s attack, Iraqs tyrant Saddam Hussein was ousted and the Coalition Provisional Authority (CPA) was built up to deal with Iraqs administrative capacities as the nation attempted to build up another legislature. In June 2004 the CPA disbanded and the Iraqi Interim Government dominated. In January 2005 the nation held races and the Iraqi Transitional Government (ITG) took power. In May 2005 the ITG designated a board of trustees to draft a constitution and in September 2005 that constitution was finished. In December 2005 another political decision was held which set up another multi year protected government that took power in March 2006. Notwithstanding its new government nonetheless, Iraq was still exceptionally unsteady during this time and savagery was far reaching all through the nation. Therefore, the U.S. expanded its essence in Iraq which caused a decline in brutality. In January 2009 Iraq and the U.S. concocted plans to expel U.S. troops from the nation and in June 2009 they started leaving Iraqs urban territories. Further evacuation of U.S. troops proceeded into 2010 and 2011. On December 15, 2011 the Iraq War authoritatively finished. Administration of Iraq Financial matters and Land Use in Iraq Topography and Climate of Iraq The atmosphere of Iraq is for the most part desert and as such it has mellow winters and sweltering summers. The countrys uneven locales anyway have freezing winters and mellow summers. Baghdad, the capital and biggest city in Iraq has a January normal low temperature of 39Â ºF (4Â ºC) and a July normal high temperature of 111Â ºF (44Â ºC).

Friday, August 21, 2020

Essay Topics and Examples - What Are Essay Topics and Examples?

Essay Topics and Examples - What Are Essay Topics and Examples?The question 'What are essay topics and examples?' is more than a simple as, 'Which topic do you want to write about?' There are so many topics and examples you need to think about in order to create a really great essay.Sometimes you can use a 'filler' paragraph of specific ideas for the purpose of running out the clock, or perhaps just to give you an idea of how long the essay will be. It may be appropriate to mention some of these ideas later on.However, if you find that the topic of your great essay has too many ideas, then the best thing to do is to take some time and explore the ideas of all the ideas. For example, if you're an essay on one of the most popular animal and plants at the zoo, you might want to know what the differences between dogs and cats are.You might also discover that some important but other significant details are actually just a matter of opinion. I am sure there are lots of people who think th e same thing about dogs and cats as me, but this is one example of a topic that may be open to opinions. Likewise, if you're writing an essay on the history of a certain era, you'll probably not find out the actual facts behind a lot of the facts and yet find out the theories of many people.The key to writing the topic of an essay is being able to combine ideas, facts, and opinions that all add up to one great argument, and even provide a whole story. It is very difficult to write the topic of a well-written essay without taking the time to explore what you have learned about topics and examples, and to consider every single idea you've learned from doing so.Now, if you are writing a student essay, it's going to be fairly easy to generate ideas and facts for your great essay. However, if you're writing a reference essay on a topic for which you don't know much, it's going to be very difficult. For this reason, I recommend doing some research on the topic.There are many resources ava ilable on the internet that will allow you to check out the opinions and knowledge of others regarding a topic, and see where they stand. This is especially useful if you are an expert in a particular subject and want to see where people come down on the issues you're writing about. This is an extremely effective way to create the best essay possible.Writing an amazing essay requires that you take time to learn as much as you can about the topic. Not only do you need to know all the aspects of the topic, but you also need to know the opinions and ideas of other people. You need to be very observant, and it takes time and patience to discover the truth through all of this.

Monday, May 25, 2020

African Americans And The Civil Rights Movement - 1531 Words

Disenfranchisement, segregation, and oppression still existed in Southern states for African Americans in the 1960, although it has been nearly 100 years since the Emancipation Proclamation. African Americans were still segregated from classrooms, restrooms, theatres, etc. due to â€Å"Jim Crow† laws; and in 1954, the â€Å"separate but equal† doctrine was struck down by the U.S. Supreme Court. For hundreds of years African Americans fought for their civil rights, desegregation, and basic human rights. One significant movement in history that was major for the Civil Rights Movement era was the Freedom Rides. This was a fight to end the illegal segregation of travel. African Americans have fought tirelessly for their equal rights, desegregation and racism, and Jim Crow laws; the Freedom Rides of 1961 played a major part in the Civil Rights Movement and were one of the final movements to end segregation with public transportation. Prior to the Freedom Rides of 1961 Martin Luther King Jr. led the Montgomery Bus Boycott in 1955 which last 381 days; a little over a year. Prior to the Montgomery Bus Boycott in 1954 the Supreme Court ruled in a very important case that would end segregation in the school system, Brown v. Board of Education of Topeka. In addition to the Supreme Court ruling African American’s hit several other milestones for example the Civil Rights Act of 1964, and the Voting Rights Act of 1965. After the Brown decision on December 1, 1955 Rosa Parks refused toShow MoreRelatedThe African-American Civil Rights Movement1295 Words   |  5 Pages The African-American Civil Rights Movement is arguably the largest and most successful push towards toward change in American history. The movement was influenced by some of the biggest figures in American history as well, led by Martin Luther King Jr. and influenced by others such as president Kennedy and Johnson. Amongst the numerous protests and powerful speeches during the C ivil Rights Movement perhaps the most prominent is the series of three marches in 1965 known today as the â€Å"Selma to Montgomery†Read MoreThe African American Civil Right Movement1040 Words   |  5 PagesThe African American Civil right movement in the late 1950’s and throughout the 1960’s was a powerful fight for equal opportunities to the basic rights and privileges outlined by the US government. During this movement thousands of African American individuals and those who believed in the power of the movement, battled against the piercing white supremacy through various tactics including grass root movements. The grass root movements in the 60’s was characterized by organizations of individualsRead MoreThe African American Civil Rights Movement1450 Words   |  6 PagesThe African American civil rights movement was a long journey for African American nationwide. The success involved many people, hardships and time in order to advance the African A merican community in America. The purpose of the movement was to achieve their rights, cease discrimination, and racial segregation. During the start of the African American civil rights movement, Africans Americans still were faced with Jim Crow laws which segregated them from whites. Under the Jim Crow laws AfricanRead MoreAfrican Americans And The Civil Rights Movement1260 Words   |  6 PagesAfrican Americans have fought for equality for a long period of time against desegregation and racism. It was an era where blacks couldn’t have the same rights as a white individual. African American were treated with hate and anger. The Civil Rights Movement is embodied in dramatic recorded speeches. Speeches like â€Å"I have A Dream†, the â€Å"Black Revolution†, and â€Å"Black Power’ and Coalition Politics. These speeches were written by great leaders. Martin Luther King Jr, Malcolm X, and Bayard RustingRead MoreAfrican Americans And The Civil Rights Movement1624 Words   |  7 PagesDuring the early 1950’s and 1960’s, the civil rights movement defined how African Americ ans progressed from being considered second class citizens to a unified demographic who became more endowed to handle the high tensions between them and the white segregationists. After World War II, protests began to rise between the 1950’s and 1960’s. The large number of blacks that served in the military or worked in the war industry saw that they had a greater place in the world than they had been given inRead MoreAfrican Americans And The Civil Rights Movement1623 Words   |  7 Pages African Americans were brought to America during the colonial days by Britain, before the civil war, as slaves. They were the foundation of slave economy, being auctioned off and sold, with no thought given to their opinions, families, or lives. Throughout American history, African Americans have slowly fought their way towards where they are today. Their fight has developed into the Civil Rights Movement in the 1900s. Many historians would agree that the start of the Civil Rights Movement happenedRead MoreThe African American Civil Rights Movement756 Words   |  4 PagesAnother significant circumstance was the African-American civil rights movement in US in those years. Until the age of eighteen, he had never thought about ethnicity or cultural differences. After 1968, African-American movement turned to be seen in Milwaukee. He met with Father Grouppi*, but he did not support him and his followers. For a long time, he had not appreciated the African American civil rights movemen t. Moreover, he would think that this movement aggravates the racial segregation in societyRead MoreAfrican American Civil Rights Movement1594 Words   |  7 Pagesblack power movement in American Civil Rights Movement. Violence is a physical force intended to hurt someone. Politics is a platform where the wellbeing is thought for the citizens and in America the politics and laws have been placed in order for the betterment of the American citizens. In this essay I will unravel many factors arguing whether violence is legitimate or whether it is a mean that is necessary to a more equal nation mostly focusing on the American Civil Rights movement and the blackRead MoreAfrican American Civil Rights Movement1525 Words   |  7 PagesFollowing World War I, a new, militant spirit of resistance and activism burgeoned among African-American citizens across the United States. Empowered by the sense that blacks had played a crucial role in the conflict, the descendants of freedmen returned home to fight for their own rights only to find persecution; this dire situation called for immediate, decisive action. During the interwar years, African Americans in the southwest Georgia Black Belt fought for community empowerment and, through theRead MoreAfrican Americans And The Civil Rights Movement Essay2200 Words   |  9 Pagesequal rights. A perfect example of racial brutality was the summer of 1955 when Emmett Till was brutally murdered by two white men. This murder case promptly seized the attention of millions and modified the history of the United States. The Emmett Till murder case established itself as a defining event in the United States history because it became a spark to the Civil Rights movement, transformed people’s hearts and minds into realizing how dangerous segregation was, and it proved how African Americans

Friday, May 15, 2020

Fake FBI Warning Email Scam

Beware of messages purporting to originate from the FBI (or CIA) accusing you of visiting illegal websites. These emails are unauthorized and arrive with an attachment containing the Sober virus. This virus-bearing email with a malicious file attached has been circulating since February 2005. Make sure your antivirus software is up to date and your computer is scanned regularly. Another variant of the message comprises the users computer with a virus that can install itself when clicking on a compromised website. A window pops up indicating that the user’s Internet address was identified by the FBI or the Department of Justice’s Computer Crime and Intellectual Property Section as associated with child pornography sites. To unlock their computer, users are informed they have to pay a fine using a service for prepaid money cards. How to Handle a Fake FBI Email If you receive a message like this, dont panic — but do delete it without clicking on any links or opening any attached files. Attachments to these emails contain a worm called Sober-K (or a variant thereof). Though these messages and others similar to them purport to come from the FBI or CIA and may even show return addresses like policefbi.gov or postcia.gov, they were not authorized or sent by any U.S. government agency. FBI Statement on the Message Containing a Virus FBI ALERTS PUBLIC TO RECENT E-MAIL SCHEMEEmails purporting to come from FBI are phonyWashington, D.C. - The FBI today warned the public to avoid falling victim to an ongoing mass email scheme wherein computer users receive unsolicited emails purportedly sent by the FBI. These scam emails tell the recipients that their Internet use has been monitored by the FBIs Internet Fraud Complaint Center and that they have accessed illegal web sites. The emails then direct recipients to open an attachment and answer questions. The attachments contain a computer virus.These emails did not come from the FBI. Recipients of this or similar solicitations should know that the FBI does not engage in the practice of sending unsolicited emails to the public in this manner.Opening email attachments from an unknown sender is a risky and dangerous endeavor as such attachments frequently contain viruses that can infect the recipients computer. The FBI strongly encourages computer users not to open such attac hments. Sample Fake FBI Email Heres email text contributed by A. Edwards on Feb. 22, 2005: Dear Sir/Madam,We have logged your IP-address on more than 40 illegal Websites.Important: Please answer our questions! The list of questions are attached.Yours faithfully,M. John StellfordFederal Bureau of Investigation -FBI-935 Pennsylvania Avenue, NW, Room 2130Washington, DC 20535(202) 324-3000 Sample Fake CIA Email Heres email text contributed anonymously on Nov. 21, 2005: Dear Sir/Madam,We have logged your IP-address on more than 30 illegal Websites.Important:Please answer our questions! The list of questions are attached.Yours faithfully,Steven AllisonCentral Intelligence Agency -CIA-Office of Public AffairsWashington, D.C. 20505phone: (703) 482-06237:00 a.m. to 5:00 p.m., US Eastern time Sources and further reading: FBI Alerts Public to Email ScamFBI press release, February 22, 2005

Wednesday, May 6, 2020

Sonnys Blues - 1514 Words

How does Baldwins real-life experience connect to his short story, Sonnys Blues? The writer was a poor boy growing up. He was also a Negro, so things were bad for him and his family in white America. He probably felt sad every day of his childhood so he turned to books for entertainment and maybe escape. When he started reading, he found that he liked it and wanted to create stories for other people to enjoy, but he was a poor Negro boy who could not expect help from the whites, so he taught himself to write. That is similar to Sonny, who taught himself to play the piano. In the final scene, Sonny performs some improvisational jazz. What is improvisational music? What do we learn about Sonny through his performance? Explain.†¦show more content†¦Back then, there probably weren’t too many white teachers in black schools, so the big brother might have had an easier time finding work as a teacher in a school for blacks than as a lawyer or a doctor. His little brother Sonny is always getting in trouble. He doesn’t go to school, he uses drugs, and he doesn’t do what he is told to do. That is because he does not like life, because the white people are so unfair. After a while and a lot of suffering, Sonny discovers something he is good at. He learns to play the piano, and he is able to do something creative and positive, be successful and have the people’s respect. Write an essay exploring the motivation behind Baldwins choice of narrator for Sonnys Blues. Why do you think he chose the older brother to narrate the story? How would the story be different if narrated from the perspective of the younger brother? Mr. Baldwin made the older brother the narrator so the reader would not feel like Sonny was a dangerous man. The older brother seemed to apologize for Sonny while at the same time try to convince himself and the reader that Sonny really was not a bad guy. Sonny is really a hero and yet an anti-hero. He is someone that seems dangerous, lazy and extreme until you get to know him. The problem is that Sonny does not let people know him. If Baldwin made Sonny the narrator, then the story would be angry and rebellious. Sonny’s inner fears and thoughts would have come out,Show MoreRelatedSonnys Blues in Harlem896 Words   |  4 Pagesus have to struggle to make ends meet and others are born with money at their feet already. â€Å"Sonny’s Blues† opens up in Harlem with the narrator on a bus reading a newspaper learning that his brother, Sonny, has been arrested for selling heroin. Sonny’s brother takes him in after he is released from jail. However, his brother is scared if he lets him back into his home he will fall into his old ways. Sonny’s true passion in life is to become a Jazz musician but his family doesn’t believe in what heRead MoreSonnys Blues Essay989 Words   |  4 Pages In James Baldwins, Sonnys Blues, the title itself is symbolic of the blues in the matrix of the African-American culture of music and suffering. To understand the significance of the blues, one must first define the blues, where the blues originated, and how it is related to suffering and how it is communicated in music. The American Heritage Dictionary defines blues as (1) a state of depression or melancholy, and (2) a style of jazz evolved from southern American Negro secular songs. ItRead MoreSonnys Blues1264 Words   |  6 PagesSonny s Blues A captivating tale of a relationship between two troubling brothers in Harlem, Sonny s Blues is told from the perception of Sonny s brother, whose name is never mentioned. Baldwin s choice of Sonny s brother as a narrator is what makes Sonny s Blues significant in terms of illustrating the relationship and emotional complications of Sonny and his brother. The significance of Sonny s Blues lies in the way Sonny s brother describes their relationship based on what heRead MoreJames Baldwins Sonnys Blues1418 Words   |  6 Pageselaborately broadcasted and exhibited greatly in his short story â€Å"Sonny’s Blues†. First circulated in the late fifties and then again in the mid-sixties, Sonnys Blues explains Baldwin’s reasons for his famous arguments in the arena of Black freedom, while also providing a visual bonding of his work across multiple genres, with the ways and understandings of the urban Black community. The essential and gradual progression of â€Å"Sonny’s Blues† symbolizes the measured adaptation of the narrators perceptionRead More Comparing the Blues in Hughes The Blues Im Playing and Baldwins Sonnys Blues625 Words   |  3 Pages The Blues: in Hughes The Blues Im Playing and Baldwins Sonnys Bluesnbsp;nbsp; In Langston Hughes The Blues Im Playing, the blues are the source of Oceolas life and her choices. Langston is trying to illustrate the conflict between life and art. The art in this story is represented in a confined manner, as a disciplined career with a white woman acting as the overseer in the young ladys life. Art to Oceola, with its profit, convenience and privileges offers an array of benefits, butRead MoreSonnys Blues by James Baldwin Essay775 Words   |  4 PagesSonnys Blues If you were not able to talk to anyone, nor did people want to listen to what you have to say, would that affect you? In the short story, Sonnys Blues by James Baldwin, Baldwin writes about two brothers, Sonny and the narrator, who lose communication between one another because Sonny goes to prison. The narrator, having to make a promise to their mother before her death, was to take care and watch over his young brother Sonny no matter what. This turned out not to be theRead MoreEssay about Sonnys Heroic Journey in James Baldwins Sonnys Blues2971 Words   |  12 Pagesof Sonnys Blues by James Baldwin focuses on whether a person should be conventional in making decisions for their life, or if they should follow their heart and do what is right for them. A person begins with strengths, many of which they lose along the way. At some point along their heroic journey a person may regain their strengths and develop new ones. Each phase of this journey will have an effect on them and o thers around them. According to his brother, who narrates Sonnys Blues, SonnyRead More Sonnys Blues by James Baldwin Essay1228 Words   |  5 PagesSonnys Blues by James Baldwin A captivating tale of a relationship between two troubling brothers in Harlem, Sonnys Blues is told from the perception of Sonnys brother, whose name is never mentioned. Baldwins choice of Sonnys brother as a narrator is what makes Sonnys Blues significant in terms of illustrating the relationship and emotional complications of Sonny and his brother. The significance of Sonnys Blues lies in the way Sonnys brother describes their relationship based onRead MoreDrugs and Musicians in â€Å"Sonny’s Blues† by James Baldwin Essay840 Words   |  4 PagesWhen first reading â€Å"Sonny’s Blues† by James Baldwin, it may initially seem that the relationship between musicians and drugs is synonymous. Public opinion suggests that musicians and drugs go hand and hand. The possibility lies that Sonny’s passion for jazz music is the underlying reason for his drug use, or even the world of jazz music itself brought drugs into Sonny’s life. The last stateme nt is what the narrator believes to be true. However, by delving deeper and examining the theme of music inRead MoreEssay on Literary Analysis of James Baldwin’s Sonny’s Blues2323 Words   |  10 Pagesgenerally done just to entertain readers. Some authors create stories with a singular point of view, while others introduce more complex plots and storylines. When it comes to author James Baldwin’s short story Sonny’s Blues, there is much depth given to the storyline and the characters. Sonny’s Blues has been analyzed by many different people throughout time because the story has many elements. From Baldwin’s skillful use of metaphors and similes to his incorporation of religious references, this story

Tuesday, May 5, 2020

How to design a network Essay Example For Students

How to design a network Essay The college of Business (COB) server is now being used to support deliver to theComputer Information System (CIS) department. The CIS professors would be using the serverfor various operations. Assignments, e-mail, and other types of information would be easier forthe students to access. Network users are able to share files, printers and other resources; sendelectronic messages and run programs on other computers. However, certain important issuesneed to be addressed and concentrated on. In order to begin the process of setting up the COBserver, the total numbers of users (faculty and students) must be determined. Some othersignificant factors to be approached are: the required software applications needed on thenetwork, an efficient and appropriate directory structure and effective security structure. Indesigning the directory structure, the major focus must be on accessibility. The number ofundergraduate CIS courses that the server will be used for is be! tween 15 and 17. For the users to be ensured that their information is not at risk, we will createan effective security structure. In composing the appropriate security structure there must becertain access rights assigned to the users. An important technical detail in setting up a server isthe amount of money that will need to be allocated for the restructuring of the system. For thesystem to function properly, the amount of hardware/ software will need to be determined. The COB server will primarily be used by CIS professors and CIS students. Theapproximate number of professors in the CIS department is between five and seven and theapproximate number of CIS majors is between 100 and 120. As computer technology continuesto grow, the number of CIS majors is vastly increasing. If we see a considerable rise inComputer Information Systems majors the department will have to expand its faculty members. The CIS professors will be using the server to disburse their syllabi, distribute specificassignments and send e-mail to their students. The layout, design and complexity of each classwill determine how much the professor may be using the server. The first class a CIS major usually takes at Western is CIS 251. Management InformationSystems (CIS 251). This class offers students a basis for management information systems inbusiness organizations. In putting the COB server to use and getting the student ready forhands-on knowledge of computer-based information systems, CIS 251 focuses on analysis,development, design, implementation, and evaluation. Other tasks that are covered in this classare computer applications ins spreadsheets, word processors, and database systems. Information systems affect both business people and people who live in society. The first programming class CIS majors take is CIS 256. This CIS course will be verybeneficial for the server. Business Computer Programming (CIS 256) introduces the student toan application of programming principle in business. Detailed assignments involve flowcharting,coding, documentation, and testing. This course provides the student with a background ofcomputer architecture and data representation. This class account will require the BASICprogramming language that will be used as well as the compiler. The CIS elective, CIS 301, emphasizes maximum hands-on experience withmicrocomputers and software packages, including word processing, spreadsheets, databasemanagers, and graphic systems. Microcomputer Applications (CIS 301), is an important coursefor students not majoring in Computer Information Systems, but would like to familiarizethemselves with the personal computer. This account will contain Microsoft Office and e-mailAn important class that becomes useful for the server is the CIS 358 course. The professorcan send applications, reports, programs and other data to the server where the student cantransfer to a disk or their VAX account. Applications Development II (CIS 358) is a study ofthe state of art tools and techni ques for developing complex business applications; dataorganization, on-line processing, software engineering, and software maintenance. This CIS classis an extension to CIS 258. The student will expand his/her knowledge of the COBOLprogramming language. In order for the CIS major to apply principle of good application designand solving problems, the Visual Basic programming language will also be introduced. Theaccount for these two classes will contain the COBOL programming language and the compilerFor the students to learn more about client-server technology, CIS 365 is required to theComputer Information Systems curriculum. The student will be involved in learning aboutdifferent types of client-server environment such as configuring Worldwide Web environment andbuilding a Netware LAN to support delivery client-server computing. Computer Architecture,Communications, and Operating Systems (CIS 365) focuses on the architecture of moderncomputer systems including peripherals; data co mmunications networking with fault tolerantcomputing; language transition; operating systems software/hardware and utilities. This accountwill have internet connections and Netware operations. In studying Database Management Systems (CIS 453), the CIS student will learn the roleof databases, database applications, data modeling using entity-relationship and semantic objectmodels. The significance of the COB server for CIS 453 is that the student will focus onmulti-user database processing on LANs with the emphasis on client-server systems. In thisdatabase class, students will also be required to design and implement a database using thecurrent technology. This account will require Microsoft Access and Salsa. To familiarize the CIS major with systems development, CIS 455 is required by thecurriculum. This class introduces the student with cost/benefit justification; software design;implementation and maintenance procedures; quality assurance; and integration of informationsystems int o management decision-making processes. Computer Information Systems Analysisand Design (CIS 455) will require that a student design an appropriate computer system for aspecific company or business. The account for this class will contain Microsoft Office and willThe last class that is required for in the CIS core is CIS 465. In this course, the focal pointis to strategically use information systems in the business environment. Information ResourceManagement (CIS 465) centers on responsibility and accountability of information resourcemanagers; security, legal, and ethical issues; procurement and supervision of resources andresource assessment. This class will have Visual/IFPS Plus as well as Internet capabilitites. Local area networks (LANs) could be thought of as pockets of coordinated computingwithin a small geographic area. The network has three layers of components: Applicationsoftware, network software, and network hardware. Application software that will be used willconsists of computer programs that interface with network users and permit the sharing ofinformation, such as files, graphics, and video, and resources, such as printers and disks. Thetype of application software that will be used is called client-server. Client computers sendrequests for information or requests to use resources to other computers, called servers, thatcontrol data and applications. The network software to be used will consists of computerprograms that establish protocols, or rules, for computers to talk to one another. Theseprotocols are carried out by sending and receiving formatted instructions of data called packets. Protocols make logical connections between network applications, d! irect movement through the physical network, and minimize the possibility of collisions betweenpackets sent at the same time. Network hardware is made up of the physical components thatconnect computers. Two important components that will carry the computer’s signals will bewires or fi ber-optic cables, and the network adapter, which will access the physical media thatlinks the computers, receives packets from the network software, and transmits instructions andrequests to other computers. Transmitted information is in the form of binary digits, or bits whichthe electronic circuitry can process. The new local area network (LAN) that we are proposing to design will only be a one volumeserver. The directory structure for this server will go as follows: There will be a system directorywhere the queue holds and services the print jobs prior to being printed. A login will beestablished to activate and open a session to the Network Operating System for a user. TheDOS applications available to the public will be Word Perfect, Excel, Power Point, and Lotus1-2-3. A mail directory will be created for users to be able to send e-mail and also retrieve it. The users of this directory structure will be focused around the faculty which will be Heinrichs,Perry, Banerjee, Clapper, and Carland. The faculty will have the rights to the classes that aretaught here at Western Carolina University. These classes will also be used by the students of theComputer Information Systems program. The applications that will be used by the students andBOL, Visual Basic, Database applications, Basic, and Visual/IFPS Plus. In these courses facultycan assign programs or assignments to the students and all they have to do is go to theappropriate class that they are in and get the homework that is do for that certain class. The medium used to transmit information will limit the speed of the network, the effective distancebetween computer, and the network topology. The coaxial cable will provide transmissionspeeds of a few thousand bits per second for long distances and about one-hundred million bitsper second (Mbps) for shorter distances. The type of topology that will be used to arrange computers in this network will be the bustopology. The bus topology is composed of a single l ink connected to many computers. Allcomputers on this common connection receive all signals transmitted by any attached computer. Local area networks which connect separated by short distances, such as in an office or auniversity campus, commonly use a bus topology. Twisted pair, for slow speed LANs, will bethe cabling of these computers. Here, the main cable is typically a shielded twisted pair (likephone lines). The board is attached to a TAP via three cables then the tap is connected to thetwisted pair again at three points. An active hub will connect up to eight PCs and workstations. Each PC or work station can be up from two thousand feet from the active hub. Each port of theactive hub will be electrically isolated and will not need terminators for unused ports. Typically a LAN has a server node to provide certain services to the LAN users. In this case ofa small scale PC LAN, the server is attached to a laser printer, so that all users can share thatprinter through the server. Another use of the server is that if the LAN users need to get someupdated files. Instead of copying to all the nodes each of them can copy / share from the server,where only once those files can be loaded or updated. The Network security structure would not be a very complicated. The Supervisor would begranted full access to all the resources in the CIS program. Students who are a CIS major willhave read, copy and write capabilities for the classes they will attend. The Public accounts willonly have the right to be able to access the rights to Word Perfect, Excel, Power Point, etc. TheFaculty will also have rights to the classes with read, copy, write and send. Networks are subject to hacking, or illegal access, so shared files and resources must beprotected. A network intruder could easedrop on packets being sent across network or sendfictitious messages. For important information, data encryption (scrambling data usingmathematical equations) renders captured packets unreadable t o an intruder. This server will usean authentication scheme to ensure that a request to read or write files or to use resources is froma legitimate client (faculty or CIS majors) and not from an intruder. The system will have asecurity measure of telling whether or not the user is a CIS major or not by given each CIS majorand faculty a code or password.. The CIS majors will be given a code in which they will have toenter in every time he or she gets to the computer and wants information from a CIS class. Everytime the student enters in the code the computer will keep it in memory so if the same passwordis entered somewhere else the person wil! l not be allowed in. This station restricitions will keep students from going in and messing aroundwith the students information while that CIS student is working. There will be disk restrictions toassure that storage space is evenly allocated. The CIS users will also have to change thepassword every now and then to keep confidentiality of his or her passwords. This will put anaccount to have an expiration date to it so that the user will have to change his or her passwordas the semester goes on to insure the security of their account. Under no circumstance should an administrator put an entire system at risk for theconvenience of a few users. Certain measures and precautions should be implemented to ensurethat the network will operate effectively and effeciently. Another major concern when designing a system is to anticipate the addition of moreworkstations and eventually more users. By considering this now many problems can be solvedeven before they exist. If there is room allotted for expansion in the beginning, then actuallyimplementing the new ideas and hardware should be simple. Assumptions about how large the system will actually get and how many users it will accomadate are very serious issues thatneed to be addressed in the utmost fashion. These questions require serious answers that if notAnother key issue that needs to be addressed is who will be issued an account on the system. Assisted Suicide1 Essay Certainly each CIS faculty member will have his or her own personal account. In these accountssome items such as personal research materials and grades will reside. Then there is the matter ofthe individual CIS classes and individual CIS students. Logically each class will have a separateaccount because the information in each account will be different (applications etc.). The mainpoint of concern is the applications involved with each class. Using Visual Basic and Visual/IFPSPlus, having a COBOL compiler to run your programs on and so on. CIS students will have their own personal account. A space will reserved for them toexecute e-mail and other personal things. They will need to have a good understanding of thedirectory to the class that they need to locate and do their work in. Each faculty member willhave their own account as well. They will be able to send e-mail to students and also puthomework in the accounts of the classes that they teach. Other faculty members will not havea ccess to the server. As stated before the main purpose of the server is to deliver CISinformation only and for the CIS discipline only. The main points of concern when dealing with the printer configuration are reliability andaccessibility. Reliability is centered around quality and effeciency. Top quality network printersare expensive but sometimes are not the best choice. Speed of output, such as papers perminute, play a big role in choosing a network printer. Printers that are easy to get to and easy toservice are a key to a successful network. I personally can not stand to walk into a lab and haveto hunt where the printers are and have to wait for someone to remove a jammed paper. The labon the second floor of the Belk building is a good example. An excellent example of a goodconfiguration is in Forsyth. The printers are easily seen and easily worked on. The printersseparate the two main islands of workstations which allow for effecient management. This system will be of conside rable size and area. It will require constant monitoring and anyon-line maintenance will be in the form of a supervisor or network administrator. This designatedperson or person’s will need to be very knowledgable in all the system’s hardware and software. For example CAN certified would be an excellent standard for consideration. The person orperson’s would have to be a full time faculty member in the College of Business. I feel that havinga daily interaction with the system and the users would prove to be very helpful in comparison tohaving someone called in to diagnose and solve the problems. Outside consultants are usuallyexpensive and are most of the time are not worth it. The load placed upon the system will vary at times. Classes are going to have a conflict inassignment due dates and everyone is going to rush to the lab to finish their assignments. However I think that most of the time there will be a slight to moderate load placed on thesystem. Most students bounce in to check their mail or to send a quick message anyway. Sittingdown and writing a program in one session is impossible any, so that will reduce the load in itself. Login scripts for each user need to be simple. Allowing students to write their own shouldnot even be considered. Each student should have the same format and be placed at the samestarting point each time that they login. Alloting a specific number of search drives and networkdrivers would definitly reduce problems. Students should be required to change their passwordsperiodically. The system login scripts could execute certain commands for each different users,faculty and students. These are just a few areas within the entire Technical Design process thatBibliography: