Saturday, May 23, 2020

Proposed Dress Code For The National Basketball League Essay

The case study in question relates to a proposed dress code for the players in the National Basketball League (NBL). Dress code requirements must not discriminate against members of protected groups as outlined in Title VII of the Civil Rights Act of 1964. In order to adequately analyze this issue, we must look at possible areas of discrimination including religious, racial, gender and disability discrimination. In this particular case the players are claiming racial discrimination against the NBL and its commissioner. In order to promote a better public image, the NBL and its commissioner, Mr. David Firm decided to institute a new dress code. This dress code is â€Å"business casual† and additionally prohibits any headgear from being worn while the players are on the bench, in the stands or in plain sight of the public. The intent of the NBL is to improve its image and revive the popularity of the league among its paying customers and corporate sponsorship. As a student enrol led in a graduate sport law class, several issues were raised regarding this situation by a few activist players, namely, I.M. Pacer, M.E.Sixer, and I. Warrior (Sharp et al., 2014). Any racial harassment claim would be based on the application of Title VII of the Civil Rights Act of 1964. Title VII states that it is unlawful for an employer to discriminate against any individual’s employment status based on race. In this particular situation, Commission Firm is implementing the same dress code for allShow MoreRelatedThe Great Gatsby By F. Scott Fitzgerald1655 Words   |  7 Pagesleisure activities. Institutions, churches, and saloons sponsored sports teams for women, and provided facilities. Declining prices of sporting goods and increasing popularity of sports as entertainment encouraged the formation of leagues. Both amateur and semi-pro leagues were organized, providing opportunities for middle-class athletes (Women’s Sports Foundation, 2/21/2011) Industries and companies supported sports teams for women. They did this to promote personal health and worker efficiency.Read MoreCoco Cola18335 Words   |  74 Pagesremained shut for 17 months now because the village council has refused to renew its license, blaming the company for causing water shortages and pollution. In  Sivaganga District  of  Tamil Nadu  state there were several protests and rallies opposing the proposed Coca-Cola bottling plant in fear of water depletion and contamination.[25][26]  The president of the Gangaikondan panchayat, Mr. V. Kamson died under mysterious circumstances[vague]  two days after going back and forth in his resentment against theRead MoreUnderstanding Marketing Management16709 Words   |  67 Pagesthe consequences of the marketer’s words and actions can quickly multiply. When two employees in Conover, North Carolina, posted a YouTube video showing themselves preparing sandwiches while putting cheese up their noses and violating other health-code standards, Domino’s learned an important lesson about PR and brand communications in a modern era. Once it found the employees—who claimed the video was just a gag and the sandwiches were never delivered—the company fired them. In just a few days,Read MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagescentury. 3. Social history—20th century. 4. World politics—20th century. I. Adas, Michael, 1943– II. American Historical Association. D421.E77 2010 909.82—dc22 2009052961 The paper used in this publication meets the requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1992 Printed in the United States of America 2 4 6 8 9 7 5 3 1 C ONTENTS Introduction Michael Adas 1 1 World Migration in the LongRead MoreLibrary Management204752 Words   |  820 PagesLibraries Unlimited, 88 Post Road West, Westport, CT 06881 A Member of the Greenwood Publishing Group, Inc. www.lu.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48-1984). 10 9 8 7 6 5 4 3 2 1 To our grandchildren Annika, Jacob, Katherine, Madison, Magnus, and Molly Contents Illustrations . . . . . Preface . . . . . . . . . Acknowledgments . The Web SiteRead MoreHuman Resources Management150900 Words   |  604 Pagesas strategic contributors, HR professionals will participate in the discussions prior to top management making final decisions. For example, in a firm with 1,000 employees, the Vice-President of Human Resources spends one week in any firm that is proposed for merger or acquisition to determine if the â€Å"corporate cultures† of the two entities are compatible. Two potential acquisitions that were viable financially were not made because he determined that the organizations would not mesh well and thatRead MoreProject Mgmt296381 Words   |  1186 Pagesregarding professional certification in project management. It’s nearly impossible to pick up a newspaper or business periodical and not find something about projects. This is no surprise! Approximately $2.5 trillion (about 25 percent of the U.S. gross national product) are spe nt on projects each year in the United States alone. Other countries are increasingly spending more on projects. Millions of people around the world consider project management the major task in their profession. Project managementRead MoreFundamentals of Hrm263904 Words   |  1056 Pagesyou do well on exams? Does it help prepare you for a job? We start every chapter with learning outcomes. We view these as the critical learning points. They present a logic flow from which the material will be presented. If you can explain what is proposed in each learning objective, you’ll be on the right track to understanding the material. But memory sometimes fools us. We read the material, think we understand it, see how the summaries directly tie the learning outcomes together, then take theRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesManagers 30 S A L Self-Assessment Library How Much Do I Know About Organizational Behavior? 4 Myth or Science? â€Å"Most Acts of Workplace Bullying Are Men Attacking Women† 12 An Ethical Choice Can You Learn from Failure? 24 glOBalization! Does National Culture Affect Organizational Practices? 30 Point/Counterpoint Lost in Translation? 31 Questions for Review 32 Experiential Exercise Workforce Diversity 32 Ethical Dilemma Jekyll and Hyde 33 Case Incident 1 â€Å"Lessons for ‘Undercover’ Bosses† 34 CaseRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagestwenty-first century’s economic, social, and political churning, how will these driving factors be influenced by the brutally competitive global economy in which organizations do not have any particular geographic identity or travel under any particular national passport? What will be the effect of the rapid gyrations in markets that emphasize the difficulties that accounting practices face in determining true performance costs and that forecasting programs confront in establishing the economic determinants

Monday, May 18, 2020

The African American Healthcare Gap - 1654 Words

effected their decision. However, each variable listed on the study was associated with tracking all the factors involved with hearing loss. What singled out the most is that several of the candidates didn’t know anything or have heard about cochlear implants from their black counterparts, but were informed by medical professionals instead. The study was not to pointe the blame on medical professionals, insurances, and/ or physicians, but to take a deeper view of why is it that African Americans seem to lag behind in the healthcare improvement when new services and technologies are presented to them. Yet, as it stands, for the University of Cincinnati Physicians clinic – ENT department, 95% of the cochlear implants performed are†¦show more content†¦Illnesses or a defect, for that matter, shows their vulnerabilities, and having a hearing implant device connected on the head will certainly put a black CI patient in an uncomfortable position as they will have t o confront their community. Chapter 3 The Future for African Americans and Cochlear Implants Healthcare officials can’t have a discussion on improving the disparities with African Americans and cochlear implants without discussing the driving force that would bring about change and that is the physician. The physician knows first-hand which patients appear to be suffering as it relates to utilizing something that will undoubtedly improve their life. It compels most physician to establish leadership roles depending on their passion to making a difference for their patient’s well-being. Often times physicians find themselves being involved with institutional policy reforms and undergoing vast changes within their healthcare facility. As such, the changes are concurred with administrative officials who routinely revise programs and create comprehensive long-term goals. Although, there are a segmented growing number of physician leaders, it is not always embraced within health institutions and governmental legislations. Why? Because it seems to be that there is some type of disconnection as it relates to physicians and public policies. As such, public policies are for elected officials to

Tuesday, May 12, 2020

Analysis Of The Movie Last Year - 988 Words

Last year, the Hollywood film Noah was released. Obviously I was intrigued, so I called up my Pastor and some friends and planned to go to the cinema to see it. As many sources claimed, I can agree that this is certainly one of the least Biblical, Biblical films ever made. Of course the actual story of Noah in the bible is not very long, so it was to be expected that the producers would add some filler â€Å"Hollywood† action, but how much of Noah is actually based on the text that appears in the Old Testament, and how much is fantastical movie magic? Just like the Old Testament, the film starts at the very beginning. Noah tells his children the story of creation and almost stays true to the Genesis story of creation. To begin I will explore the characters presented in the film and the original story. The movie introduces two groups of people, Lemech and Noah the â€Å"good guys† and Tubal-Cain and his people, the â€Å"evil† men, who are of course descendants o f Cain, which is consistent with the Old Testament. Later, the character Methuselah is introduced, Noah’s grandfather. He lives on the top of a mountain and for some reason has a constant craving for berries (The Bible says nothing about this strange detail). He also seems to posses some mystical powers. Methuselah isn’t mentioned much in the Bible, but he is the oldest documented person mentioned in the book. Lemech, Noah’s father, is only brought up in the Bible for genealogy purposes. The movie on the other hand shows thatShow MoreRelatedEssay on Fog of War Film Analysis931 Words   |  4 PagesThe Fog of War Analysis Nearly 160 million people were killed during the 20th century, and film maker Errol Morris wished to show the reason for this in documentary form. He interviewed former US secretary of Defense Arnold McNamara and the two discussed and analyzed some defining moments in US history, thus The Fog of War was made. The movie was set up in 11 lessons. However, I only found three to be completely reasonable. The first lesson that is highlighted in Morris film is thatRead MoreNetflix Case Analysis Essay1134 Words   |  5 PagesNetflix, Inc. â€Å"Netflix, Inc. is the worlds largest online movie rental service, with more than 10 million subscribers (Netflix Media Center, 2009).† Netflix exhibits dominant economic characteristics in the online movie rental business. They enjoy strong market size and growth rate when compared to rivalry competition. The number of rivalries are increasing, and the market remains dominated by only a few sizeable rivalries like Blockbuster Video, Wal-Mart, Walt Disney Movies and Movielink’sRead MoreComparing Yelp, Tripadvisor And Netflix Essay1602 Words   |  7 Pagesactivities, their analysis could be more complete, more targeted, and more accuracy. Netflix, found in 1998, specializes in and provides streaming media and video on demand online and DVD by mail. It needs analytics to gain insight into customers. At first, it provides the service that customers choose the packages of movies to rent. Then it created a data exchange with customer to capture the preference data from customers and make recommendations. After customer watching a movie, they will writeRead MoreV for Vendetta: The Movie and the Book948 Words   |  4 Pagesseveral years, there have been many movies devoted to the issue of future alternative reality. This essay is devoted to one of the alternative reality movies. V for Vendetta was shot in 2006. However, not many people know that in 1982, there was a graphic book V for Vendetta. The movie was based on that very graphic book. The main idea of the essay is to compare and contrast both the movie and the graphic book. The essay will consist of several parts. The first part will contain the analysis of theRead MoreFilm Theater : A Movie Theater1524 Words   |  7 PagesThis is the main point for any Movie Theatre. The profit for a Movie Theatre is not coming only from tickets but also from all the sales of food and drinks. Nowadays a Movie Theater has a 3 to 4 floors building with different types of restaurants and entertainments for kids so basically there are a lot of different sources of profits for Movie Theater. A Movie Theater has to attract people not only with movies but also with all the fun that people can have in Movie Theater. Technological factorsRead MoreMotion Picture Industry Essay1740 Words   |  7 Pagesdioxide in the atmosphere over the last 650,000 years (NASA, 2015) – See Appendix A. In business, data is found in all parts of industry; such as, accounting, finance, marketing, production, economics, and information systems (Anderson et al, 2015, p. 3-5). In the case of this study, the results will be shown as a managerial report from an accumulation of data showing the financial success of 100 motion pictures on the years 20XX in the following categories: Rank, Movie Title, Opening Gross, Total GrossRead MoreSwot Cinemas Essay713 Words   |  3 PagesSWOT Analysis Studio Production Strengths: The major strength of the studios is that they are now being managed by large corporations and manage as profit center to increase their incomes and retained earnings. Weaknesses The main weakness of the Studio production is the cost of bringing films into the market. The average cost of releasing a film is more than $100 million. This cost in producing and releasing the films into the market has dramatically gone up the last five years aroundRead MoreAnalysis Case On Use Of Business Analytics Framework1345 Words   |  6 Pages â€Å"Moneyball† Analysis Case Study on the Use of Business Analytics Framework† Dheeraj Dwivedi School of Professional Studies, Northwestern University, Spring 2016, Section 58 â€Æ' â€Å"Moneyball† Movie Analysis Case Study on the Use of Business Analytics Framework â€Å"Moneyball† movie is about the war between intuition and statistics. I would start my analysis with one of the many interesting quotes in the movie. â€Å"The problem we re trying to solve is that there are rich teams and there are poorRead MoreReflection Paper On Aging1710 Words   |  7 PagesThe movie Last Vegas (2013) thoroughly presented the concept of the embodied aging and experience by creating a storyline based on the character, Billy, shared the good news of him finally proposing to his much younger girlfriend with his dearest friends and wanted them to be supportive in his decision-making. All four friends decided to escape from their daily lives a couple of days in order to throw a bachelor party together for Billy in Las Vegas (Last Vegas, 2013). They have been best friendsRead MoreEssay on Educating Rita - Comparing the Movie and Play963 Words   |  4 PagesEducating Rita - Comparing the Movie and Play       The play Educating Rita by Willy Russell gained great popularity especially during the early eighties. There has also been a movie made from it starring Julie Walters and the more famous Michael Caine. As so often the case, the movie was more elaborate with additional scenes, some of which were spoken of or retold by the actors in the play. The movie also included several actors while the play only featured two, Frank and Rita.

Wednesday, May 6, 2020

Essay on The Abortion Debate - 1351 Words

Abortion is one of the most heated moral debates. It can be said that a person’s view on this issue speaks to the type of person they are in general. Most would say that someone who has a more liberal view of the world is pro choice and someone who is more conservative is pro life. Although there may prove to be a correlation between political view and view on abortion, there are people in this world on both sides of the issue. Some support a woman’s right to choose abortion, while others think the right to life is more important than a woman’s right to choose. Many people are in the middle of the issue, and support it on a situational basis. People tend to be unsure until the situation is explained and the individual takes their†¦show more content†¦Dilation and curettage requires the doctor to dilate the cervix and use a curette to remove the fetus and clean the wall of the uterus. Suction aspiration abortions are where the doctor inserts a suct ion tube into a woman’s womb and sucks the fetus out. Dilation and evacuation also requires a doctor to dilate the cervix but there are multiple tools used to remove the fetus from the uterus. Salt poisoning requires a doctor to remove amniotic fluid from the amniotic sac and replace it with saline solution, which then burns the skin of the fetus. Salt poisoning is no longer used in the United States. A prostaglandin chemical abortion is a two-part procedure in which a woman must take a cocktail to kill the fetus and another cocktail to initiate uterine contractions to begin to process of allowing the fetus to leave the uterus. This option is often referred to as an abortion pill, and formerly known as RU-486. A hysterotomy or cesarean section is when the doctor will preform a cesarean section birth for the fetus but the umbilical cord is cut within the womb for the baby to be killed before birth. Partial birth abortion is when the doctor causes a breech birth so the ba by’s head is the last thing left in the birth canal and the back of theShow MoreRelatedThe Debate On Abortion And Abortion1448 Words   |  6 PagesAbortion. This word leaves most people feeling uneasy after just saying it out loud. The discussion of abortion is continuously left open-ended with millions of opinions, arguments, and questions. Abortions occur every single day leaving potential fathers devastated or thrilled, leaving friends and families broken and distraught or in contrast, proud. More importantly, leaving the potential mother uncertain and even destroyed. But with abortion in mind, what is considered wrong and what is consideredRead MoreThe Debate Over Abortion3667 Words   |  15 PagesPolitical Science 101 SBCC April 19, 2015 T/R 11:10 Laws vs. The Right to Life The debate over abortion has divided Americans into polarized sides since the Supreme Court’s 7-2 decision in Roe v. Wade on January 22, 1973, where the Court deemed abortion a fundamental right under the United States Constitution. The lawsuit began when Norma McCorvey became pregnant with her third child in 1969 and could not get a legal abortion in Texas. With her attorneys, they filed a lawsuit. Roe v. Wade reached SupremeRead MoreThe Abortion Debate Essay1652 Words   |  7 PagesThe topic of abortion is one of the most controversial topics affecting our society. The disagreement between for and against abortion has caused hundreds of fights that have even resulted in death. Regardless of what many individuals may accept, fetus removal is not right or off. It is a matter of individual assessment. Consequently, each one side can say with assurance that alternate isnt right. Accordingly the inquiry remains; should premature birth be lawful? Though many people may disagreeRead MoreThe Philosophical Aspects Of The Abortion Debate1672 Words   |  7 Pagesphilosophical aspects of the abortion debate form two logical arguments, which oppose and support abortion. These arguments are based on what is ethical and the rights of an individual. The view that abortion should be illegal rest on the moral right of the life of a human being at or near conception killing an embryo is unjust since it violates the right to life (Hershenov 129). Therefore, the law should prohibit violation of the right to life. The view that abortion should be legal, generally arguesRead MoreEssay about The Abortion Debate706 Words   |  3 PagesThe Abortion Debate There are all kinds of people in the world, and we all have different opinions. In this report I am discussing abortion. You will read about the pros and cons of this subject. Some people think that abortion is wrong; they think that abortion is the killing of innocent children. Other people believe that the unborn child is not actually a human until it takes its first breath of air. Many people think that having an abortion is in a way, murderRead MoreAbortion Is A Never Ending Debate1094 Words   |  5 Pages Amir Azarvana Pols 1101 July 2nd 2015 Abortion. The tittle of the article I will be analyzing is â€Å"republicans seek to put abortion on the front burner in 2016†. The article was published in U.S. News and World Report, written by Tierney Sneed. Abortion is a never ending debate, it is one of the most common medical procedures performed in the United States each year. Abortion is also one of the most debated topics of all time, it is a never ending debate of whether it should be legal for womenRead MoreThe Debate Over The Controversy Of Abortion1600 Words   |  7 PagesWhen taking the emotional aspect out of the abortion argument, what premise would most support individual liberty? The debate over the controversy of abortion continues because of its frequency of occurrence, and the cultural, legal and religious status that varies extensively in different parts of the United States. While the emotional arguments regarding abortion can be compelling, but should have no bearing in the legal discussion, the individualsà ¢â‚¬â„¢ rights to life and liberty should be held aboveRead More The Debate Over Abortion Essay2024 Words   |  9 PagesWith the ongoing debate and the advancement of technology in determining the viability of a fetus, abortion, the ending of a pregnancy by removing a fertilized egg, has become increasingly controversial. The morality of abortion has caused many to separate into opposite sides of the spectrum, pro-life and pro-choice. The arguments over abortion has stirred a continuous debate between a pro-choice stance such as that presented by the analogical reasoning of Thomson or Glover’s examination of socialRead MoreA Comprehensive Review Of The Civil Liberty Debate On Abortion.1500 Words   |  6 PagesA Comprehensive Review of the Civil Liberty Debate on Abortion Of all the issues plaguing the United States, currently and in the past, abortion rights have been one of the most passionately debated civil liberty issues. Edward Sidlow and Beth Henschen define civil liberties as â€Å"Individual rights protected by the Constitution against the powers of the government†(72). Some argue that women should be protected from the powers of government in terms of reproductive rights while others argue thatRead MoreAbortion In The United States Is A Major Topic Of Debate1218 Words   |  5 PagesAbortion in the United States is a major topic of debate in United States politics. People today frequently hear the terms pro-choice and pro-life, which represent the liberal and conservative views on this issue, respectively. First made illegal in the late 1800s, the federal government did not rule that abortion was legal again until the Roe vs. Wade Supreme Court decision in 1973. Despite this ruling, citizens still fight for women’s ability to terminate their pregnancies as they face legislature

The Narrator Free Essays

The first person point of view adds to the suspense by showing us the thoughts and feeling of the narrator(James). â€Å"I said little, for I felt uneasy. There was something unnatural, uncanny, in meeting this man. We will write a custom essay sample on The Narrator or any similar topic only for you Order Now † The narrative tells us that he feels uneasy about meeting the man. He feels as if it is unnatural about meeting Mr. Atkinson. The narrator is uncertain and uncomfortable about what is happening. â€Å"I began to draw. So intent was I on my work†¦ The final result, for a hurried sketch†¦ It showed a criminal in the dock immediately after the judge had pronounced sentence†¦ He turned round as he heard my steps and I stopped short. It was the man I had been drawing, whose portrait lay in my pocket.† The author uses figurative language to reinforce why the narrator is uneasy about what is happening. The author uses foreshadowing to help the readers understand why the narrator feels uneasy. He feels uneasy because he has drawn a man that he has never seen before, and now that very man is sitting in front of him. â€Å"I tried at first to persuade myself that I had seen him before, that his face, unknown to me, had found a place in some out-of-the-way corner of my memory, but I knew that I was practising little more than a plausible piece of self-deception.† This piece of evidence it shows that the narrator is uncertain about what is happening and is trying to convince himself that he had seen this man before. Also later on in the text it states, â€Å"For some time I sat in silence. Then a cold shudder ran down my spine. I asked him where he had seen the name.† This also supports that the author was uncertain and uncomfortable about the situation. â€Å"I have had what I believe to be the most remarkable day in my life,† The narrator uses foreshadowing to help the theme of the story. We know that the day was a remarkable one but what made it that way. The theme of this story is fate. â€Å"I rolled up the sketch, and without quite knowing why, placed it in my pocket†¦ A sudden impulse made me enter.† This supports the theme because it reveals how the narrator acts without knowing why. This suggests that that he acts upon decisions that are not his. This supports the theme of fate because what he does is determined ahead of time by something other than himself. â€Å"‘Oh, I didn’t see it anywhere,’ replied Mr. Atkinson. ‘I wanted some name, and I put down the first that came into my head’†¦Ã¢â‚¬  Mr. Atkinson says that he did not know or have a reason for using the narrators name. That it just popped into his head, even though he has never heard it before. This very innocent and random act supports the theme is fate because it supports that there is something stronger than Mr. Atkinson’s free will that is controlling what he does and the situation. It also states in the text, â€Å"‘The best thing we can do,’ he continued, ‘is for you to stay here till twelve o’clock. We’ll go upstairs and smoke; it may be cooler inside.’ To my surprise I agreed.† This supports the theme because the other does not know why he says yes. It is something bigger than them both that is controlling what they do. How to cite The Narrator, Papers

Seek and You Shall Find, Neglect and You Will Lose Them free essay sample

I strongly believe that people know the difference between the good and the bad, and it simply tells me that good is in everyone of us, it’s just that sometimes we tend to take the wrong path. I agree to disagree with what he said. Although, sometimes, good comes with the bad. But I think that bad things happen just so we could see what good is. Maybe that is why he said â€Å"Seek and you will find’. Our life is full of question about the unknown, and we just couldn’t stop ourselves looking for â€Å"It†, the thing that we know is good, and will make us better. Whether it be Goals, Dreams, Love, Nirvana, or even just material things. Cos we know that if we have it, it will make us better. That is why we give our all. People look for things that they don’t know, just for the sake of holding on to something. We will write a custom essay sample on Seek and You Shall Find, Neglect and You Will Lose Them or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Like a belief, even if we know that we might not know, and we don’t even know if it’s real or not. We would still look for it, No matter what. Just like Francois Rabelais’ (A great Renaissance French writer) last words, â€Å"I Go to seek a Great Perhaps†. When he said â€Å"Seek†, it means a quest. People always go after something, even if it’s just nothing. We always go out and look to see what we can find. And â€Å"The Great Perhaps†, is something about dying. I know it’s kind of cynical to say that it’s about dying. But I think â€Å"The great perhaps’ is heaven. And that it is Just a perhaps! We don’t really know if there is one. I Guess, what Mencius meant about the word â€Å"Seek† is Adventure. And in layman’s term, Adventure is an exciting or remarkable experience. Which I think what Mencius wants us to have, an Adventure. And if we don’t look for it, otherwise, we will never know what’s behind of it all. We will never know the way out of the Labyrinth. We, therefore lose what we have neglected. We haven’t even looked for it in the first Place. I Guess, that’s what life is all about. It’s about having Dreams, Love, Goals, Happiness. It’s about wanting something and holding on to it. It’s about having things and losing it, like Love lost and found, Living and dying, all those Cliches. And that, makes Life†¦ Worth Living.

Friday, May 1, 2020

Conference on Foundations of Genetic Algorithms †MyAssignmenthelp

Queston: Discuss about the Conference on Foundations of Genetic Algorithms. Answer: Introduction: The encryption process in the recent time is playing a very vital role in every sphere. The message which is send from one person to another have to be secured and has to be seen that it is not in hand of nay user expect the actual recipient of the message. In Symmetric key encryption each of the computer system has a secret key. The secret key can be used to encrypt a packet of information mainly with the main propose of protecting it from other users before it is send over the network to another computer system (Goyal, Koppula Waters, 2017). In the process of sending message with the indicated encryption process it is very important to know the computer which is going to interact with in order to install the key. The drawback aspect of the process is that the transfer of key is very much important and it has to be seen that the key does not reach anyone else than the intended recipient. Symmetric key is very similar to secret code that each of the two computers which are interacti ng must know in order to complete the communication process (Prajapat Thakur, 2016). In Symmetric key encryption each of the computer system has a secret key is can be considered as the most important and the most beneficial aspect of the encryption technology related to Symmetric key encryption process. The public encryption can be referred to as a system of cryptography that mainly consists of two keys a public key and the private or the secret key. The public key is basically known to everyone and on the other hand the private and the secret key are known only to the intended end user of the message. The main aspect in this cryptographic function is that the two keys are related in a way that only the public key can be used to encrypt the message and only the corresponding private key which is related to the public key can be used to encrypt the message from the recipients side (Bellare, Kane Rogaway, 2016). The security aspect involved in the technology is that it is virtually impossible to generate the private key if some user knows the public key. From the hackers point of view it is generation of the private is a hard job at hand, so the message is transferred in a secured manner. The hashing function is almost available in all application which is related to the information system (Waters, 2016). The technology is very much important from the users point of view with the security aspect related to the internet and the communication medium. The hash function is mainly a mathematical function which is used to convert an input value which is numerical and convert it into a numerical value which would be compressed. The value which is returned by the hash function is termed as message digest or in order words hash value. Technique Used For Confidentiality and Authentication Hashing is the most popular implementation of the cryptography which uses different aspect of security which can directly insure Confidentiality and authentication (Koppula et al., 2017). In computer security aspect the term confidentiality and the authentication play a very vital role. Everybody who access the network want their data to be secured and no one expect the intended person would not get access to the data stored in the server or over the network. There are two direct application of the hash function which is based on cryptographic property. If the password is stored in a normal text it would be directly accessible to anyone. Instead of this mostly login procedures store hash values of the related password in the file. The intruder who has the intention of hacking the password would only see the hashes of the password, even if access to the password is made (Goyal, Koppula Waters, 2017). Logging with the password or deriving the password would not be possible, this is due to the factor that hash function mainly processes the property with are related to the pre- image resistance (Altman et al., 2016) The integrity data check is the most common application of the hash function. The main aspect in the process is the generation of the checksums on the data files. The integrity check helps the user to detect whether any change is made to their original file (Appelt et al., 2016) the concept how ever does not give any sort of assurance related to the originality aspect. The concept is useful on if the user is somewhat sure about the originality of the file or the data. The Denial of service attack is mainly an attack in which the system, server or the traffic which is related to the network is flooded with resources and as a result of which it makes it very difficult for the user to use them accordingly. The server is in this scenario is flooded with inappropriate request that any task or job cannot be achieve from the system. The attack crashes the server and it can be dealt by merely restarting or rebooting the system. There can be different ways in which accompany can be protected from the denial of service attack. Two most effective way in order protect are stated below Create an action plan in advance The main aspect in this case is not waiting for the attack; it is the intelligence in response to the potential risk before the attack is done. The main focus should be on the creation of a system that absorbs a DDoS attack potential. Thought the precaution measure before the intended action takes place is not 100% foolproof it does not help in mitigating the risk to a extent. The action plan might consist of the following aspects. Implementation of a sensor so that it gives an indication whenever a website is down. Dumping of logs should be provided in any case of any malicious activity. Construction of ISP in order to get the understanding about the free and the paid DDoS protection plans and its implementation (Chen et al., 2016) Confirmation should be obtained with the DNS TTL ( time to live) for system which are prone to attack in the near future The result of the DDoS attack accounts in a unprecedented amount of traffic in the server which is beyond imaginations. Putting emphasis on the hacker an ideal time to jack into the website is when a huge amount of traffic is concentrated (Gollmann, Meier, 2006). Therefore the best way to notice quickly the attack is by looking out for the situation of the abnormal traffic in the website. It can be estimated the amount of traffic in a particular website in a pre defined time, whenever the rate increases the DDoS attack may be in active mode. Staying alert with it monitoring and setting the threshold time or limit when the traffic goes beyond a certain level will help an individual to protect themselves from the DDoS attack (Antonakakis et al., 2016) Rules of working in secure areas Maintaining the integrity with the physical security for the secure areas. Confirmation that the door is closed with the access of the area. Never leave the door open or unattended while working in the area. Never allow the access of unsupervised personal by a contractor or technician with the role of maintaining (Ling Chen, 2016). Maintaining the integrity of the environment in the area which is secured. Do not involve food, hazardous material or drinks in such an area. Never store any equipment like tools, cleaning supplies, ladder, ceiling tiles, unused servers, etc). Maintenance of the fire protection unit is very much essential. Report of any building mechanical failure such as door not working in proper condition, a water leak or a burned out bulb light (Chen et al., 2016) Limitation of action with regards to authorized and appropriate activities. An approval from the ITS request should be taken in order of all the changes made in the infrastructure and production system. The response on the production system in a n emergency or equipped failure must be accordingly followed by emergency request for change. If not responsible or authorized never open the cabinet for equipment In many situation there can be a case that accidently switching of or damage of computer equipment is done in such case the ITS service desk should be approached. Computer security mainly involve in securing the computer system and preventing it from unauthorized access. The task of securing a system is very much challenging. Hackers are considered to be upper hand than the normal people with emphasis on the technological knowledge aspect . However securing the computer system is very essential in order of protecting the data Updating the system regularly: the operating system should be updated at least ones a month in order to keep the system updated. Installing the recent patches and security installation can help in securing the aspect. Internet Browser: the browser is considered as the most important aspect in order to achieve connectivity to the internet. One of the most renowned browsers is the Mozilla Firefox which is mainly open source software. This is advantageous because the personal who are involved with the security aspect can easily fix the bugs and build better security features which are involved in the aspect. Another important aspect of Firefox is that it is Add- one or implementation of extensions, this aspect can help in building the build in security and features which are related to the privacy aspect. Software aspect: unwanted software can directly affect or infect the computer system, if during the downloading of the software it is not taken care of. The source of the software is the main aspect here and it should be ensured that there is bundling of additional wanted program with the legitimate software. If the computer system has java installed in it, it should be disabled as stated by the Homeland Security. Java is responsible for many malware attacks on the computer which are unsuspecting from the users point of view. Virus and malware: A virus can implement anything that a normal computer program can do. The virus spreads by infecting files or the area involved in the system and then it makes copy of itself. On the other hand some computer viruses are not harmful at all others may damage the data files and some destroy the files and some can directly spread to other computer systems. Malwares is considered as a broad category of threads which are related to the computer including unwanted programs and spyware that may get installed in the system without the proper knowledge of the user of the computer system. an spyware program may be included with other softwares. The spyware can reach the intended system when a download is ion activated such as a music file.. The user should be conscious of the pop- up boxes where a answer to a question is asked in aspect of yes and no. Firewalls An intrusion detection system is mainly designed in order to maintain all the inbound and outbound activity of the network and identify and pattern which may be assumed to be suspicious that may be an indication of someone attacking or attempting to break into the network (Korman Avidan, 2016). The intrusion detection system is considered to be passive in the sense that its suggests user of the suspicious activity taking place not prevent them. There are two types of filter associated with the filtering process of the IDSs which are deep packet inspection and packet stream analysis (Hoffmann et al.,2016). The deep packet inspection role is not only limited on the footer and the header of the packet of the information but also looks into the content of the packet (the data part) in order to search for illegal statement and criterias that are predefined. This allows the firewall to make appropriate decision about the aspect of whether to allow or disallows the packet of the data in order to get through the route of the internet. Delving into the content with the packet is done by the DPI by which it allows determination to be made with respect to the packet are finally allowed traveling into the network (Desai et al., 2016) The Deep packet inspection enforced a strong foothold in the aspect of the security. The DPI offers just more than the examination of the packet of the data (Thorup, 2017). The network management tools which can a future player in the security aspect of networking gather the deep packet inspection information in order to create a better knowledge and understanding of the network traffic, performance related to network and unifying applications. The concept also provides an additional advantage of information that are implemented and user for network trending, forensics and analytics with network (Roy, 2017). Packet Stream Analysis The packet stream analysis can be used in both way legitimately or illegitimacy. When the technology is used legitimately the packet sniffer identifies any transmission error for the network and data. The most important function of the technology is the network detection. The process of packet capture is very much similar in the essence of telephone wiretapping in basic sense detecting anything which is going through the computer network (Weiss, Y., Torralba Fergus, 2009). Monitoring the network problem and troubleshooting any problem when it arises can also be an advantage of the implementation. The Packet sniffer has a variety of function which would be very much beneficial in the near future. By this mean it can help defend in detection of attempt of intrusion, detect misuse of the network ,monitoring momentum with the data , debug communication in the server, filter out suspect content, isolate and detect exploited system, gather statistic on the network issues. Thus it can be stated that these method serves as a primary point for the monitoring purpose of the network. References Altman, Y., Keren, A. Y., Krupkin, I. (2016). U.S. Patent No. 9,306,971. Washington, DC: U.S. Patent and Trademark Office. Antonakakis, E., Perdisci, R., Lee, W., Ollmann, G. (2016). U.S. Patent Application No. 15/384,025. Appelt, D., Nguyen, D. C., Briand, L. (2016). Automated Testing of Web Application Firewalls (No. TR-SnT-2016-1). Bellare, M., Kane, D., Rogaway, P. (2016, August). Big-key symmetric encryption: resisting key exfiltration. In Annual Cryptology Conference (pp. 373-402). Springer Berlin Heidelberg. Chen, P., Ong, Y. C., Page, D. N., Sasaki, M., Yeom, D. H. (2016). Naked black hole firewalls. Physical review letters, 116(16), 161304. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X. (2016). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE transactions on information forensics and security, 11(4), 789-798. Desai, M., Patel, S., Somaiya, P., Vishwanathan, V. (2016). Prevention of Distributed Denial of Service Attack using Web Referrals: A Review. Gollmann, D., Meier, J. (2016). Computer SecurityESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings (Vol. 4189). Springer Science Business Media. Goyal, R., Koppula, V., Waters, B. (2017, April). Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 528-557). Springer, Cham. Hoffmann, H., Daily, M. J., Holland, G. D., El Defrawy, K. (2016). U.S. Patent No. 9,336,239. Washington, DC: U.S. Patent and Trademark Office. Koppula, V., Pandey, O., Rouselakis, Y., Waters, B. (2016, June). Deterministic public-key encryption under continual leakage. In International Conference on Applied Cryptography and Network Security (pp. 304-323). Springer International Publishing. Korman, S., Avidan, S. (2016). Coherency sensitive hashing. IEEE transactions on pattern analysis and machine intelligence, 38(6), 1099-1112. Ling, H., Chen, Z. (2016). U.S. Patent No. 9,503,425. Washington, DC: U.S. Patent and Trademark Office. Mell, P., Grance, T. (2017). The NIST definition of cloud computing. Prajapat, S., Thakur, R. S. (2016). Optimal key size of the AVK for symmetric key Encryption. Covenant Journal of Informatics and Communication Technology, 3(2). Roy, S. (2017). Denial of Service Attack on Protocols for Smart Grid Communications. In Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 50-67). IGI Global. Sinclair, G., Olson, R., Falcone, R. (2017). U.S. Patent No. 9,721,099. Washington, DC: U.S. Patent and Trademark Office. Thorup, M. (2017, January). Fast and powerful hashing using tabulation. In Proceedings of the 14th ACM/SIGEVO Conference on Foundations of Genetic Algorithms (pp. 1-1). ACM. Waters, B. (2016, June). Deterministic Public-Key Encryption Under Continual Leakage. In Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Vol. 9696, p. 304). Springer. Weiss, Y., Torralba, A., Fergus, R. (2017). Spectral hashing. In Advances in neural information processing systems (pp. 1753-1760).