Featured Post

Epic of Beowulf :: Poem Poet Beowulf Essays

Friday, November 29, 2019

Presentation talk of slides Essays - Pseudoscience,

Presentation talk of slides What is Homeopathy Homeopathy is a pharmaceutical science. The remedies used are regulated by the FDA in the USA. Homeopathy was founded in the 18th century by Dr. Samuel Hahnemann, a physician and chemist. The ruling principle of homeopathy is the Law of Similars, which states, Let likes be cured by likes. Homeopathy is a holistic healthcare modality, which addresses acute, chronic and traumatic health problems. Principles of Classical Homeopathy Remedies should be proven on healthy subjects to determine their field of action on the mental, emotional and physical levels. The symptoms of the patient should be matched to a remedy that has produced similar symptoms in the provings, or experiments on healthy volunteers. One remedy should be prescribed at a time based on similarity to the patients symptoms. The smallest possible dose should be administered that will produce a healing response. The practitioner should endeavor to make the healing process as gentle as possible and to try to minimize aggravations. With centesimal scale remedies the remedy should only be repeated when symptoms that have improved begin to relapse. The practitioner should match the strength or potency of the remedy with the patients vital force, or the level on which their illness resides. The Source of the Remedies The remedies come from the animal, mineral, and plant kingdoms. They are also made from bacteria and viruses, or disease products. Some remedies are made from imponderables, such as sunlight, moonlight and x-rays. In recent years homeopaths have been studying the characteristics of remedies made from the different kingdoms to learn about their properties, and to understand how to apply them to sick people in a more scientific manner. An understanding of chemistry, biology, zoology and botany are advantageous to the homeopath and intertwined with homeopathy as the natural world is the source of our remedies Remedies from the Animal and Mineral Kingdom On your left is a picture of the surucucu snake or Lachesis muta, one of the greatest additions to our materia medica. On your right is a picture of gold or Aurum metallicum, another one of our great constitutional remedies. Who Can Homeopathy Help Homeopathy is good for babies and children. Homeopathy is good for the health problems of women, and for health issues relating to a womans reproductive cycle. Homeopathy is good for boys and men. Homeopathy is good for the elderly. Homeopathy is good for animals. People even treat their plants with homeopathy. Conditions Homeopathy Can Treat Allergies Fever Anxiety and Fears Arthritis Headaches and Migraines Asthma Influenza Autism InsomniaColds and coughs Trauma and Injuries Ear infections or pain Warts What Happens at a Visit to the Homeopath Your homeopath reviews your questionnaire before you come. They try to get to know you or your child and become familiar with your health problems. Since homeopathy looks at the whole person they will ask you questions about all aspects of your life. they will try to familiarize herself with your health and personal history. they tries to understand your emotional and mental health. they then type the case notes and keeps a record of all that transpires during the visit. Receiving the Remedy Homeopathic remedies come in various strengths, dilutions and in various forms. The homeopath has to determine, which method of administration would be most suitable for you The homeopath carries a wide range of remedies in stock in various strengths. They will prepare the remedy that you need for you, or if They do not have it, they will ask you to purchase it from the pharmacy or order it for you. The homeopath gives you directions on how to take the remedy, and explains what kinds of reactions you may experience after taking the remedy. The homeopath looks for obstacles to cure, which may be environmental influences, life-style challenges, or mental and emotional habits, which negatively impact your healing. Scientific investigations have never found any healing benefits other than a placebo effect from homeopathic treatments, National Health and Medical Research Council released a draft information paper in April 2014 which saying that "there is no reliable evidence that homeopathy is effective for treating health conditions. The review summarised, No good-quality, well-designed studies with enough participants for a meaningful result reported either

Monday, November 25, 2019

Free Essays on Drug Addiction

Drug addiction is a very controversial topic with many diverse definitions and opinions. Stanton Peele discusses the numerous sections of drug addiction in â€Å"Addiction Is Not a Disease.† Peele strongly argues the fact that drug addiction is not a disease and that the prevalent drug problem transpires in the ghetto. Peele also states that celebrities are not real addicts in the fact that they can and do get treatment by attending rehabilitation. Peele also discusses the importance of psychological movies of drug addiction, stating what addicts think and how they feel. However, Peele incessantly reminds the reader that drug addicts suffer from a self-inflicted compulsion. Drug addiction is not a disease; rather, it derives not only from the individual addict’s need to feel euphoric or to cope with a sense of helplessness, but also from the pressures of socioeconomic group disadvantage. Stanton Peele reasons that addiction is not a disease in the most comprehensible sense of the word: a disease has a biological cause and often a cure, while an addiction has neither. Peele explains that â€Å"Addiction is not, however, something people are born with. Nor is it a biological imperative, one that means the addicted individual is not able to consider or choose alternatives† (Elements of Argument 127). Generally, people are not â€Å"born with† addiction in the same way that babies are born with hereditary diabetes. A child who suffers from diabetes has not dileberately encouraged the disease, while a drug addict makes the choice to disrupt his or her own body by altering the central nervous system through drugs. While addiction can be as caustic as a lethal ailment, it is important to discern that no individual can contract drug addiction analogous to the way one can hereditary diabetes. The psychological motives for addicts comprise of the need to cope with a sense of defenselessness and the need to feel happy and satisfied. Stanton P... Free Essays on Drug Addiction Free Essays on Drug Addiction Drug addiction is a very controversial topic with many diverse definitions and opinions. Stanton Peele discusses the numerous sections of drug addiction in â€Å"Addiction Is Not a Disease.† Peele strongly argues the fact that drug addiction is not a disease and that the prevalent drug problem transpires in the ghetto. Peele also states that celebrities are not real addicts in the fact that they can and do get treatment by attending rehabilitation. Peele also discusses the importance of psychological movies of drug addiction, stating what addicts think and how they feel. However, Peele incessantly reminds the reader that drug addicts suffer from a self-inflicted compulsion. Drug addiction is not a disease; rather, it derives not only from the individual addict’s need to feel euphoric or to cope with a sense of helplessness, but also from the pressures of socioeconomic group disadvantage. Stanton Peele reasons that addiction is not a disease in the most comprehensible sense of the word: a disease has a biological cause and often a cure, while an addiction has neither. Peele explains that â€Å"Addiction is not, however, something people are born with. Nor is it a biological imperative, one that means the addicted individual is not able to consider or choose alternatives† (Elements of Argument 127). Generally, people are not â€Å"born with† addiction in the same way that babies are born with hereditary diabetes. A child who suffers from diabetes has not dileberately encouraged the disease, while a drug addict makes the choice to disrupt his or her own body by altering the central nervous system through drugs. While addiction can be as caustic as a lethal ailment, it is important to discern that no individual can contract drug addiction analogous to the way one can hereditary diabetes. The psychological motives for addicts comprise of the need to cope with a sense of defenselessness and the need to feel happy and satisfied. Stanton P...

Thursday, November 21, 2019

Wittgenstein's Approach and Domestic Model of Learning Language Coursework

Wittgenstein's Approach and Domestic Model of Learning Language Acquisition Theories - Coursework Example I use the description and explanation of Wittgenstein’s Approach theory and the Domestic Model of learning language acquisition theory to speculate whether my lesson was successful or not.This paper represents a rationale of the lesson on healthy and unhealthy food groups as an aspect of language acquisition. The main objective of a lesson rationale is to provide a logical basis for discussion as well as explaining the lesson worthiness to the students. Various lesson rationales vary in terms of how the students find them convincing. According to O’Donnell, Reeve & Smith (2011), students find lesson rationales that connect the lesson with their future goals and strivings to be more satisfying and convincing. In this lesson rationale, I compare and contrast two major language acquisition theories used to inform a lesson. In this lesson rationale, I also explain the influence the observation of my mentor teachers may have on my lesson and speculates the success of my less on plan based on the mentioned major language acquisition theories.One major language acquisition theory is Wittgenstein’s approach theory. This theory explains various issues pertaining to language acquisition. One of such issues is that language as skills are paramount as a starting point for learning languages (Erneling, 1993). According to Erneling (1993), the theory also explains that language heard and conceptualized is limited and that language is learned and used in a communicative context. This makes this theory a very important theory in trying to understand how a language is acquired. One of the aspects of this theory that makes it a very important language acquisition theory is that it can be used to explain the acquisition of the first language as well as the acquisition of the second, third and fourth languages.

Wednesday, November 20, 2019

Financial Management Essay Example | Topics and Well Written Essays - 750 words - 3

Financial Management - Essay Example WACC refers to the weighted sum of cost of capital from all sources. Generally, there are four sources of capital which include preference shares, retained earnings, common or ordinary stock and long-term debt. According to Hitchner (2011) the first step in calculating WACC is to calculate the cost of capital from each source as follows: Cost of debt refers to the rate of return required by the long-term debt capital providers. Mathematically, it’s the discount rate that equates the present value of interest’s payments and the principle repayment to the current market price of the long term debt. To calculate the value of the firm we used the market values of sources of funds (Hitchner 2011). They reflect the economic reality and values. However, market value weight is subject to the frequent changes due to the constant fluctuations of security prices. Book values are influenced by the accounting policies used in calculating net profit and in asset valuation. La Tienda’s chairman has proposed that the source of capital to be used will be debt and has set the coupon rate at 5%. He also suggested that for whichever project is to be chosen, the coupon rate should be used as the cost of capital in evaluating the viability of the projects. On the other hand, the chief financial controller opts for the WACC in evaluating the projects. The treasure is confused and does not have a choice for either rate. Usually, a higher discount rate is more appropriate when the anticipated risk of a project is higher than the risk of the whole firm (Reilly & Brown 2011). For a number of reasons, the chairman’s choice is not appropriate. Lower cost of capital reflects high amounts of the expected cash flows but does not take into account the risks involved. The main source of capital is bond; investors are attracted in buying the bond if

Monday, November 18, 2019

Aircraft Maintenance Aircraft Systems Assignment

Aircraft Maintenance Aircraft Systems - Assignment Example The frequency channels of the VHF Omni-directional Range and the Tactical Air Navigation at each VORTAC facility are doubled in line with an overall plan to make air navigation easier. The MFD gives information on the current route of the aircraft. The information obtained from the on board radar and other sensors on the ground as well as detection sensors are relayed to the crew to analyses. The ground components are always stationary while the flight components are moving as the aircraft moves. The ground components too do not have a display system since the display in the aircraft will be the most essential. It is therefore wise to have one in the pilot’s cabin and not on the ground components. The Altimeter is a navigation instrument whose work is to reflect the vertical height of the mean of sea level. This is corrected to the pressure of outside air. The pilot will have to set the right pressure and the altimeter will automatically identify the altitude that corresponds to the Mean of Sea Level. The instruments work more or less the same like the barometer. When the plane is ascending or descending, the pressure will also reduce and increase in that order. The aneroid capsule compares the pressure outside and the one inside. The pointer and linkage help display the altitude on the cockpit display instrument. Vertical speed Indicator is the instrument that measures the rate at which the aircraft is rising or descending. The speed is usually measured in feet per minute. When the plane is flying level, the Vertical Speed Indicator will be reading â€Å"0† feet per minute. The VSI compares the static pressure in the expandable capsule to the metred static pressure in the exterior of the capsule. The inside of capsule pressure changes so fast on the climbing or descending of the plane and the opposite is true because of the leak that

Saturday, November 16, 2019

Controversy Over Water Rights

Controversy Over Water Rights Water Rights: Over 200 Years of History and Still Controversial Water is essential to life, not only human life, but also the life of plants and agriculture. Water is also the essence of life, which means laws have to be made to â€Å"be fair† to everyone that needs water for their land and their agriculture. That is why the Colorado, along with most of the United States, has water rights and laws. Water and water rights have been an issue ever since the mid to late 1800s when â€Å"the water laws first originated during the California Gold Rush in 1848† (Waskom, et al.). The laws were then brought to Colorado during the gold rush of 1859, and put into the state constitution in 1876. It was named the Doctrine of Prior Appropriation or the Colorado Doctrine (Waskom, et al.). Ever since then, water has been fought over constantly and will be fought over until the end of times. It is a valuable source to our survival and also controversial. The history of water rights and water controversy dates all the back to the California Gold Rush during the mid 1800s. As farmers began to migrate in to the state of Colorado, they found a many sunny days and low humidity, and with the right amount of water, they could make crop production rise. However, the Census from 1910 says that Colorado only received about 12-15 inches of rain when farmers first started to arrive. 12-15 inches was not enough for sufficient farming so farmers had to find an alternative water source (qtd. in Penn and Zietz 25). As farmers began to migrate to Colorado, the amount of water needed for farms rose. In the Development of Water Right in Colorado: An Empirical Analysis, Penn and Zietz quote: Early irrigation works in the 1860s were often simple, consisting of a crude stream diversion and a short ditch. Soon, however, farmers discovered that they must combine to build and maintain expensive irritation works; these organized efforts were termed ‘irrigation enterprises’ by the Census Bureau. Between 1860 and 1880, nearly 1,600 new irritation enterprises came into existence. The number of irrigation enterprises more than doubled in the 1880s so that by 1890, 58.9 percent of all farms and 19.4 percent [sic] all land in farms were irrigated. By 1900, 71.3 percent of all farms in the state were irrigated. (26) Penn and Zietz speak of 3 distinct time periods that affected the history of water rights. The first period they speak about was from 1872 to the early 1890s where the majority of court cases were held to deal with upholding and refining the doctrine of prior appropriation. During the second period from the early 1890s to about 1904, courts saw many cases involving irrigation enterprises, which dealt with defining the rights of irrigation cooperatives and partnerships. During the third period, which began in 1905, courts saw many cases regarding storage reservoirs, water rights transfers, and changes in the point of diversion (Penn and Zietz, 26-27). The earliest important case according to Penn and Zietz was seen in 1872 when the Yunker v. Nichols case was seen in the Colorado Supreme Court. This case recognized the need for diverting water from the watercourse. Chief Justice Hallet came to the conclusion that: In a dry and thirsty land it is necessary to divert the water of streams from their natural channels, in order to obtain the fruits of the soil. The value and usefulness of agricultural lands, in this territory, depend o the supply of water for irrigation, and this can only be obtained by constructing artificial channels though which it may flow over adjacent land. (27) To this day, many cases go in and out of courts regarding water rights. It is an on going batter between farmers, states, and whoever else use rivers, streams, irrigation, reservoirs, etc. These cases will continue to roll through courts around the United States. However, without these water rights and laws, states along with farmers would go into riots. â€Å"Many of the developments in water rights in the rest of the Western United States derive in one war or another from the Colorado System† (Penn and Zietz 24). Colorado’s laws have impacted the surrounding states along with states that have adopted Colorado’s ways. Colorado has been the stepping-stone for water rights throughout history and will continue to be. Court cases of water rights are seen around the state of Colorado; however, there is a case that hits close to home in Northeastern Colorado. A small town farmer from the area of Holyoke and near the Nebraska border was involved in a case that changed water rights forever. The Sporhase v. Nebraska case of 1982 was a very controversial case that was taken from a small town all the way to the Supreme Court. Sporhase had land in both Nebraska and Colorado because he lived in the Northeastern corner of the state. Sporhase applied to the Colorado Ground Water Commission to appropriate water to irrigate his land in Colorado from the aquifer that was located beneath the ground. Sporhase was rejected of this application and then decided to invest large sums of money into putting an underground pipeline system beneath his ground to extract water from a well that was across the border in Nebraska. The Department of Water Recourses received a complaint about Sporhase extracting water from Nebra ska and using on Colorado land, which was said to be a violation of the Nebraska statute. Nebraska later sued Sporhase â€Å"to enjoin him from irrigating the Colorado land from his Nebraska well† (Green 924). â€Å"A Nebraska statute required the permission of the Director of Water Resources before groundwater could be transferred across enemy lines.† (Garrett 715-716). During the case, the Supreme Court had to solve an issue that dealt with whether water should be classified as an article of commerce, which would be subject to Congressional Regulation like other natural resources (Green 927). â€Å"An article of commerce is an article (or a resource in this case) that can be offered for sale† (Article of Commerce). Nebraska brought forward three main points that they hoped would sway the decision of the jury. Nebraska first attempted to distinguish water from other natural resources by saying the state makes saving water their top priority because water is the essence of survival for their citizens. In their second argument, Nebraska argued that its water statute was â€Å"a legitimate exercise of the state’s police power to protect the health of its citizens and conserve natural resources.† The third argument, Nebraska argued that congress had given them permission to engage in impermissible groundwater regulation (Green 928-929). In defense, Sporhase used the City of Altus v. Carr case as an example and argument to help his side of the present case. This case â€Å"invalidated a Texas statute that prohibited interstate exportation of groundwater without prior approval of the Texas legislature on the grounds that such restrictions violated the commerce clause† (927). This case was relevant to Sporhase because, in Texas, like Nebraska, landowners do not have a comparable right because water is not privately owned. In the end, the Supreme Court decided in a 7-2 decision, that water is an article of commerce and Sporha se was allowed to keep pumping water from his Nebraska well to his Colorado field (927-930). The decision of this court case set the tone for future court cases that had to do with water because of the decision of water being an article of commerce. When laws and rights are made, they have to be followed. Water rights go along the same lines and this was seen in 2011 when Bonny Reservoir in Yuma County had to be drained to repay Kansas and Nebraska for water that Colorado had used. This came from a 1942 agreement between the three states that claimed the three states had to share water. Colorado had to give up 4 billion gallons of water in order to repay the debt that Kansas claimed Colorado owed them due to the Republican River Compact. â€Å"The compact collected dust for years until Kansas water officials noticed they were not getting enough water from Nebraskas and Colorados portion of the river† (Bonny Reservoir). Colorado looked for many alternatives rather than draining Bonny Reservoir, but all seemed too expensive. The reservoir was drained during Labor Day weekend of 2011, and pushed up the Republican River towards the Kansas-Colorado Border in order to repay the debt to Nebraska and Kansas under the Republican R iver Compact (Bonny Reservoir). Water rights are seen throughout the United States and very much so in the western part of the United States. Water rights come up very often in our local news in Northeastern Colorado along with Colorado. With the increase in technology and agriculture, disputes over water will continue and be on the rise during the future. There will never be an end to this madness because no one will ever be able to get a fair or equal amount as the next person. As water becomes scarcer, the disputes will become more intense and farmers and ranchers will need to find alternatives. Until then, water rights will be taken to courts all across the country to try and make these disputes as fair as possible. Work Cited Article of Commerce. Dictionary.com. Dictionary.com, n.d. Web. 17 Feb. 2014. http://dictionary.reference.com/>. Bonny Reservoir Could Be Drained Because of Water Deal with Nebraska, Kansas. The Denver Post. The Denver Post, 27 Aug. 2011. Web. 17 Feb. 2014. http://www.denverpost.com/ci_18771111 Garrett, J.S. Federal Intervention in Groundwater Regulation: Sporhase v. Nebraska Ex Rel. Douglas, 18 Tulsa L.J. 713 (1982) Green, Mary A. Water Law- Sporhase v. Nebraska. Natural Resources Journal 23 (1983): 923-31. The University of New Mexico. The University of New Mexico. Web. 17 Feb. 2014. http://www.unm.edu Penn, David, and Joachin Zietz. The Development of Water Rights in Colorado: An Empirical Analysis. The American Economist 55.2 (2010): 24-35. EBSCOHOST. Web. 17 Feb. 2014. http://web.a.ebscohost.com/ehost/pdfviewer/[emailprotected]5vid=5hid=4207>. Waskom, R., et al. Irrigation Ditches and Their Operation. Natural Resource Series (2011): n. pag. Colorado State University Extension. Colorado State University, Feb. 2011. Web. Feb. 2014. http://www.ext.colostate.edu/pubs/natres/06701.pdf>.

Wednesday, November 13, 2019

Save the teenagers from the evil inventions :: Computer Science

Save the teenagers from the evil inventions "Hi! What did you do last night?" "Oh I talked to someone whom I've never met before. He's so cool I've got to meet him!" "Wow!" This might not make sense to you but it is a conversation you might hear in a teenage community. It is a lot different from those days when everyone used to read books, and a terrible problem has been recognised due to the adult's ignorance. The fast developing computing systems have enabled us to carry out many tasks - easier research, word processing, shopping from homeà ¢Ã¢â€š ¬Ã‚ ¦ etc., and amongst them is 'easier communication'. For older generations, it probably means an easier way to keep in touch with their old friends or as a mean of exchanging information and ideas. This was probably the main intentions of ISOC (Internet Society), the current internet director. Despite this, by the age of about 15, most children are so sophisticated in their internet use and that they are curious and adventurous, anxious to be independent and sometimes rebellious. For these reasons, many people, especially the teenagers, are using 'chat rooms' on the internet - where they can talk to people they don't know online. It is now the third most popular way of using the web. The advantage is that the person you are talking to doesn't know who you are. Many people who are less confident in speaking in front of the others find that it is easier to start building their confidence by talking to someone without looking at his/her face, and has been a great help for some. The disadvantage is that it equally means that you do not know who you are talking to. Children could be easily exploited or victimised. They may not be someone who they claim to be and you could be giving your personal details to a complete stranger, and arranging to meet him/her is even worse. You could be involved in tragedies such as rape, kidnapping and even murder, as many cases show. 31% of the criminal and civil complaints reported to the police internationally in 2003 were internet related, in which children related was the seventh most common and that of chat room abuse was the 10th. Although some companies, charities and organisations, such as MSN which has closed all its chat rooms recently, are trying to prevent these crimes, it is impossible to ban this system entirely because many important enterprise companies know that they could be after a lot of money from these young people through advertisements. Even if the chat rooms do become illegal, there are the darker sides of the

Monday, November 11, 2019

Nmap Lab Exercise Essay

2. Is Nmap able to identify the operating system running on each system? Is there any Nmap feature that can be used to guess the OS of a host? Explain your answer. Using the ports that are open and the probable services running on those ports, determine what operating systems are running on the devices. Explain your answer. Nmap was not able to classify the operating system (OS) running on all â€Å"3† hosts provided during the exercise. However, Nmap  was able to identify and determine the OS running on â€Å"Host 1† as presented in Figure 1: Host 1 (192.168.100.103). Located in Nmap there is an attribute which is used to conjecture the OS of a target host. If an individual decides to limit the OS detection to the targets, one can use one open and one closed port by using the (osscan-limit) feature command. With this scan Nmap will attempt a (TCP-SYN) connection to 1000 of the most common ports as well as an ICMP echo request to determine if a host if up. On the other hand if Nmap cannot make a perfect match for an OS it will guess something that is close, but not 100% exact (Orebaugh & Pinkard, pp. 111, 2008). This approach is more aggressive and is called (osscan-guess). The initial scan determined that â€Å"Host 1† was running (Microsoft XP SP2 or SP3) validated by the fact that port 445 is open providing Microsoft -ds services. By using the feature attribute (osscan-guess) as described above Nmap determined that â€Å"Host 3† is running (Linuz 2.6X-2.4X â€Å"96%†) as shown in â€Å"Figure 4† below. When running (osscan-limit & osscan-guess) in Nmap I was unable to determine the OS of â€Å"Host 2† due to the fact that all ports were closed. Figure 4 3. Which host appears most secure? Least secure? When running the scans in Nmap, â€Å"Host 1† appears to present the least amount of security of all three hosts in the exercise. This host had the most open ports and by running a rudimentary scan Nmap was able to disclose the operating system of the host. Host 2 was reasonably secure, due to that not even an â€Å"OS Fingerprinting† scan could disclose much about the system. This scan required the use of more advanced attributes to reveal what OS â€Å"Host 2† was running, inevitably the results were ball park answers. In this exercise â€Å"Host 3† has been determined to be the most secure, based on that not even advanced scanning features of Nmap were able to unveil what OS is running on the host. Of the three hosts delivered in the exercise, â€Å"Host 1† had nine open ports, â€Å"Host 2† had two open ports, and the most secure â€Å"Host 3† only publicized one open port. 4. Describe several uses of Nmap. Nmap (Network Mapper) is an open source tool that is used by network administrators and IT security professionals to scan enterprise networks, looking for live hosts, specific services, or specific operating systems (Orebaugh & Pinkard, p. 34, 2008). Nmap has a variety of features, and  territories the aptitude to perform basic scans, while incorporating the capability to command advanced scans containing a mass of options scanning across a huge continuum of IP address universes while logging specific file types or systems. Nmap has the ability to perform packet fragmentation, TCP scan flags customization, and IP and MAC address spoofing to name a few advanced features of many offered in this scanning tool. Nmap can also discover host, and do proper port scanning. Host discovery is a great way to create and maintain an asset database and to discover rogue devices on the network. The real power attribute of Nmap is port scanning, and its efficiency in security auditing, asset manage ment, and especially compliance. Port scanning gives the ability to locate systems with file sharing ports or unauthorized FTP servers and printers. Open ports disclose potential and probable security weaknesses, provide application and services inventory, and validate compliance with approved software guidelines (Orebaugh & Pinkard, p.99, 2008). 5. Which feature(s) of Nmap did you find the most useful and why? The most useful and most operable feature of Nmap is â€Å"OS Fingerprinting†. This feature offers the most depth of results when running a scan of a host. OS Fingerprinting yields information regarding open ports, types of services, as well as the operating system running on the host. OS Fingerprinting is both passive and active, meaning, in the passive it involves sniffing network traffic at any given connection point and matching known patterns that match pre-existing OS identities. In the active this feature requires the use of a set of specialized probes that are sent to the system in question; the responses from the active give insight to what type of OS has been installed. With the availability of these different attributes to one feature gives the IT professional a full scope and clear picture of the host that is being targeted in the scan. 6. Which feature(s) of Nmap did you find the most difficult to use and why? This was my first time using a system like this and struggled with all the features at first. Thus, after performing significant research I have come to the conclusion that using (osscan-guess) can arise significant problems and red flags and this command as described is giving a guess that near-matches aggressively. This command relays back possibilities, and the match has to be very close for Nmap to do this by default. The only positive to this command is that Nmap will tell you when an imperfect match is printed and will display is confidence level by percentage for each guess. 7. Research a command or feature that you consider important but not covered in the lab. Describe its usage and report your findings when running the command against the host in the lab. The one command of interest is the â€Å"sV† command which enables version detection, with attributes of (intensity, light, all, and trace). When performing a version scan, Nmap sends a series of probes each of which is assigned a rarity value between one and nine. The lower-numbered probes are effective against a wide variety of common services, as the higher numbered probes are rarely useful. The intensity level specifies which probes should be applied, and the default is (7). Version light is a convenience for (version-intensity 2) which makes the scanning much faster, but less likely to identify services. Command (all) in â€Å"sV† is an alias for (version-intensity 9) ensures that every single probe is attempted against each port. The last attribute to the feature is (version-trace) which causes Nmap to print out extensive debugging information about what version scanning is doing. As shown in Figure 5 below the (sV) flag tells Nmap to try to determine service version information, this command of version feature is dependent upon the OS Fingerprint scan finding an open TCP or UDP port. Therefore, after the port discovery, version detection takes over and starts its process of probing for information regarding what is open and running on the target (Orebaugh & Pinkard, p.167, 2008). Figure 5: ASSINGMENT PART B NESSUS SCANNER B. Lab Questions: Part B 1. What operating systems are running on different hosts? The operating systems running on each host are the following: Host 1: Microsoft Windows XP SP2 or SP3 Host 2: Linux Kernal Host 3: Linux 2.6X or Linux 2.4X 2. What web server (if any) is running on each computer? According to the screenshots displayed in (Figures 1-3), â€Å"Host 2† appears to running a multicast domain name service (MDNS) server on port 5353 using the UDP protocol. The third host is running a domain name service (DNS) server  on port 53 using TCP protocol and MDNS server on port 5353 using the UDP protocol. It could not be distinguished if â€Å"Host 1† is running any web servers, but ports (80-HTTP) and (443-HTTPS) are both open when running the scan. 3. What are the several services running on each computer? Below will be snap shots of each host providing the services provided by each host. Figure 6: Host 1: 192.168.100.103 Figure 7: Host 2: 192.168.100.105 Figure 8: Host 3: 192.168.100.106 4. Which host had the highest number of vulnerabilities? And which had the least number of vulnerabilities? Based off the scan run on each host, host 1 (192.168.100.103) had the highest number of vulnerabilities, while host 2 (192.168.100.105) provided the least number of vulnerabilities. Host 3 provided no high risk vulnerabilities, one medium risk with two open ports. The details for each host are provided below. Host 1: 192.168.100.103Vulnerabilities: 71 Host 2: 192.168.100.105Vulnerabilities: 49 Host 3: 192.168.100.106Vulnerabilities: 22 5. Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize risk from the vulnerability. Default password (user) for â€Å"user† account; Microsoft Windows SMB shares unprivileged access When performing the scans for all three hosts, only host (1 & 2) produced high severity vulnerabilities. The vulnerability that produced the biggest red flag in my analysis was protecting user passwords. My scans produced both in host (1 & 2) that default password (user) for â€Å"user† account was at high risk. This vulnerability can be very dangerous to an organization and the users that operate within the network, cloud databases, and encrypted files. This vulnerability can be attributed to pre-established policies on lockout threshold, lockout duration, and cache size. According to Oracle, protecting user accounts is vital and the usernames are stored in a domain server and  are hashed. This vulnerability can be fixed by setting a threshold on an account after invalid attempts to log-in to an account exceed the desired attempts. The numbers of failed user password entries are set before the account is then locked, and subsequent attempts to access the account the account remains locked until the administrator re-sets the password. The lockout duration is the number of minutes that a user’s account remains inaccessible after being locked. Subsequently, administrators should set a cache lockout size which will specify the intended cache size of unused and invalid login attempts. The standard according to Oracle is set at (5), and this is very relevant when a company is audited for IT security. This cache will help the administrator catch logs of failed and unused login attempts for proper compliance reporting. 6. Describe the various uses of Nessus.  Nessus is a vulnerability scanning tool which provides patching, configuration, and compliance auditing. It also encompasses features for mobile, malware, botnet discovery, and sensitive data identification. This is a remote security tool which scans a computer and raises an alert if it discovers any vulnerability that malicious hackers could use to gain access to a computer system that is connected to a network. This operates by running (1200) checks on a given computer, testing to see if any of these other attacks could be used to break the security of a computer and otherwise compromise it. Nessus has many advantages, unlike other scanner solutions Nessus does not make assumptions about your server configuration, yet it is also very extensible, providing scripting language for the IT administrator to write specific tests to the system once the admin becomes familiar with the tool. This tool also provides a plug-in interface. Nessus is open source, meaning it costs nothing and the IT admin is free to see and modify the source as appropriate. This software also encompasses patching assistance when it detects vulnerabilities and it is the best way to mitigate the potential vulnerability (Tenable Network Security, 2014). 7. Which feature(s) of Nessus did you find the most useful and why? The report function is very cohesive and comprehensive which is extremely beneficial to the IT administrator. The client itself will list each vulnerability found as we gauge its level of severity while making appropriate suggestions to the administrator to how the problem may be fixed. The Nessus report lists  the number of hosts tested providing a summary of the vulnerability and detailed instructions and sources to fix the inherent problem. The IT administrator is able to generate graphical reports in vast formats, and this is very beneficial if the administrator is scanning a larger number of computers and would like to get an overall view of the state of the network. 8. Which feature(s) of Nessus did you find the most difficult to use and why? Comparable to my answer given in question (11), the auditing functionality is mediocre at best. It is up to the IT professional or administrator to determine the scope of the vulnerability and may choose to use a different exploitation tool to verify if the reported vulnerabilities credulous. The tool is free, but what price are you willing to risk with using this tool. It also means little support, and understanding false positives. I am by no means an expert when using this tool and really struggled understanding the reports produced. Analyzing the results and recommending valid solutions is the biggest hurdle when using this feature. These vulnerability reports deemed confusing due to the combinations of software and configurations involved. After doing some research it has been established that when provided the report Nessus delivers false-positives because the plug-in is only testing for a software version, or the results produced are unexpected but still somehow valid. If my main responsibility is to evaluate risk, when risk level determines the attention given to the problem, the auditing report should offer this attribute in the report. I noticed that they’re reported as a note or warning and labeled in the plug-in summary as (none; low; medium; high; serious; and critical) though, regrettably these specific classifications are not clear and have been subjectively applied. 9. What are the differences between using Nessus and Nmap? Nessus and Nmap are two solutions that are used for examining the overall security of a network. However, these two scanning solutions are different at a very basic level, Nessus is a vulnerability open source scanner solution whereas Nmap is used to map networks hosts and what ports are open on those hosts. Nessus is installed on a server and runs as cloud application, and the program uses plug-ins to determine if the vulnerability is present on a specific machine. Although, Nessus scans ports similar to  Nmap, Nessus takes those open ports into reason and notifies the user if these ports have potential security threats. In Nessus, the administrator logs into the interface and sets up their own policies, scans, and output reports. These policies are set to determine what specific vulnerabilities are being scanned for (Tetzlaff, 2010). On the contrary, Nmap is a host detection software and port location tool. In Nessus, the tool uses specific vulnerabilities against the host, Nmap discovers the active IP hosts using a grouping of probes (Tetzlaff, 2010). Nmap uses open ports to gather extra intelligence such as versions of databases running on specific servers. This feature is offered once the scan has been completed for the identified hosts on the network.  The grease that this solution holds is host detection and port scanning. 10. What would you change about this lab? Any suggestion or feedback? This lab overall was very challenging for as has this whole experience in the major. I have absolutely no previous knowledge in the field or took classes in undergrad regarding IT or computer science. This is a booming industry and worked closely with the forensic agent group at Department of Treasury, yet never understood the processes and procedures it took to properly manage this content. Moving forward, I would like to see this University system move to a more interactive classroom. Meaning, the ability to offer in face interaction between student and instructor with an application platform like Skype or Google Hangout, as these applications can provide the technology to administer taped or live interaction in the event something is seriously miss-understood. The ability to teach myself the content is very rewarding yet difficult at times. Overall the lab was very influential to my growth in this major, but it would be very beneficial if some sort of video instruction was provided as well as communication means provided be enhanced between the student and instructor. 11. Research a command or feature that you consider important but not covered in the lab. Describe its usage and report your findings when running the command or feature against the host in the lab. When running the scan’s against the provided host with research provided by Nessus, the sensitive content auditing is very cumbersome. This feature was not discussed in the lab, but with researching how to use this solution, I attempted to use this feature in the exercise. It states that it performs agentless audits of Windows and UNIX-based systems to identify sensitive information (PII; Credit Cards;  SSN’s; and Top Secret data) but configuring this feature requires an administrator in-depth knowledge of this feature provided by the program. Without this vital knowledge, and potential plug-ins to enable or disable I became immediately confused as to how to appropriately administer the advanced features of this program. To me as a former investigator this feature is very important in the event that insiders or intruders are attempting to identify sensitive data. This will allow an organization the ability to prioritize security issues. The system feature will inherently allow me to monitor systems and users that are not authorized to process that specific data (Tenable Network Security, 2014). REFRENCES Northchutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R., & Mancini, S. (2006). Penetration testing: Assessing your overall security before attackers do. CORE Impact: SANS Analyst Program. 1-17. Retrieved from https://www.sans.org/reading-room/analysts-program/PenetrationTesting-June06 Symantec. (2010). Nessus part 3: Analyzing Reports. Retrieved from http://www.symantec.com/connect/articles/nessus-part-3-analysing-reports Tenable Network Security. (2014). Nessus compliance checks: Auditing system configurations and content. 75, 1-37. Retrieved from https://support.tenable.com/support-center/nessus_compliance_checks.pdf Tetzlaff, R. (2010). Nessus vs. nmap: Comparing two security tools. Retrieved from http://www.brighthub.com/computing/smb-security/articles/67789.aspx#imgn_1 Oracle. (2014). Managing weblogic security: Protecting user accounts. BAE Systems. Retrieved from http://docs.oracle.com/cd/E13222_01/wls/docs81/secmanage/passwords.html Orebaugh, A., & Pinkard, B. (2008). Nmap in the enterprise: Your guide to network scanning. Syngress Publishing Inc. Burlington, MA: Elsevier Inc.

Friday, November 8, 2019

Usage That Provokes Blackboard Moments

Usage That Provokes Blackboard Moments Usage That Provokes Blackboard Moments Usage That Provokes Blackboard Moments By Maeve Maddox The comments on my post about writing dates with or without terminals got me thinking about the way everyone who speaks English reacts strongly to at least one word or point of usage. The different ways that people write a date seem to excite curiosity without making anyone angry, but sometimes words or expressions evoke annoyance so intense as to constitute rabid aversion. (Im thinking of the responses provoked by my article on couldnt care less.) By a blackboard moment I mean a physical reaction similar to what we feel when the teachers hand slips and we hear a fingernail scrape against the board. Here are some of the words, pronunciations, spellings and expressions that produce blackboard moments of various intensities in me. (The preferred form is in parentheses.) standing on line (standing in line) light something on fire (set something on fire) Me and my friends swim. (My friends and I swim.) in hopes of (in the hope of) pronouncing the word pecan with a long e and a short a: /pee can/ (instead of with a schwa and the a of father: /pe kahn/) pronouncing the t in Bill Clinton (he pronounces his name with a glottal stop: /klin?n.) seperate (separate) dalmatien (dalmatian) shepard dog (shepherd dog) cemetary (cemetery) its tail (its tail) In that incidence he was right. (In that instance he was right.) Do you want some sandwich? (Do you want part of a sandwich?) How about you, Gentle Reader? What in the speaking or writing of English produces a blackboard moment for you? Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:The Yiddish Handbook: 40 Words You Should Know75 Idioms and Expressions That Include â€Å"Break†50 Tips on How to Write Good

Wednesday, November 6, 2019

Just War Theory

Just War Theory Free Online Research Papers The Just War Theory is a principle of ethics followed in the military that originated from Catholic and Roman philosophy. The principle has also been put forward by international policy makers in the modern world in holding that conflicts should cater to the needs of political, religious and philosophical justice by following a given code of conduct. There are basically four ways in which war can be thought about. The first is realism whereby war becomes a subject matter of power and necessity so that there is no room for making any analysis on moral grounds. The second may be called a holy war which is fought to authorize the intimidation or killing of non believers. The third way pertains to a war that can be referred to as something which is fundamentally immoral. The fourth way in thinking about war relates to the human activities that is called a just war, whereby a complete moral reasoning must be made applicable to the activities related to war thus assisting in determining wh ether the use of force is justified or not. Wheeler (2002) has defined Just War Theory as one that â€Å"determines that a war is just if it satisfies the conditions of the jus ad bellum: just cause, last resort, right intention, reasonable prospect of success leading to a just peace and right authority. However, states that go to war whether for just or unjust reasons must also meet the requirement of the jus in bello. This establishes the absolute and overriding constraint that states are not permitted to deliberately harm the innocent.† While accepting these criteria of Just War Theory the conduct of the coalition that initiated the Iraq war will be examined in the light of the given standards. The Just War Theory has helped a great deal in shaping the charter of the United Nations and international laws in regard to wars. The tradition of just war ethically aims at seriously reflecting upon the inviolability of human life and dignity in assuming that all those who may be at variance with us as also those who are against us in war do command the basic right for life and dignity in the same way and to the same extent that we may command. Historically the tradition of just wars has served to use force within the limits of moral boundaries and has contributed to a great extent in limiting the use of military force than to authorize the same. However the just war theory does tell us that there are instances when the use of force is necessary and morally justified. In order to get a better understanding of the issue it is better to first outline the circumstances under which the War on Iraq was stipulated. It was assumed that Iraq possesses biological weapons and other weapons of mass destruction and seeks to possess nuclear weapons. Secondly, in view of the history of Iraq, that relates to several instances of aggression and brutality, there was every possibility of Saddam using such weapons in the future, examples of which are present of their use on his own soil when chemical weapons were used to curb attacks in north Iraq. He is also known to have made these weapons available for terrorist activities. The circumstances under which the Iraq war was initiated were quite controversial and it is hard to conclude whether its given objectives were actually the true objectives. As reported by the Sunday Times (July 2005), â€Å"Bush wanted to remove Saddam, through military action, justified by the conjunction of terrorism and WMD. But the intelligence and facts were being fixed around the policy† (Sunday Times, July 2005). There were questions in regard to the presence of Weapons of Mass Destruction (WMD), which though were not found. There were concerns about such weapons being handed over to terrorists. Just before the attack on Iraq, it was observed by Stephen Walt and John Mearsheimer (2003) that, â€Å"there is no credible evidence that Iraq had anything to do with the terrorist attacks against the World Trade Center and the Pentagon or more generally that Iraq is collaborating with al Qaeda against the United States. Hawks inside and outside the Bush administration have gone to extraordinary lengths over the past months to find a link, but they have come up empty-handed† (Walt Mearsheimer,2003). Walt and Mearsheimer (2003) have said that there was always a conflict in ideology between Bin Laden and the Baath regime in Iraq which believed in secularism. It was very unlikely that there could have been any collusion between the two because it would have certainly come to light resulting in a violent response from the US. In considering the principle of last resort as provided by the supposition under â€Å"Jus Ad Bellum†, it is clear that the US was not under attack by Iraq at that time and there was no indication of any imminent attack by Iraqi coalition forces. The US put forth the argument that the war on terror was in progress since it had been assaulted on 9/11 which provided ground for it to take measures of defense. But there was no conclusive association found between Iraq and the September 11, 2001 assault and hence the attack on Iraq cannot be taken as measure that was taken as a ‘last resort’. It is argued by several critics that there are several indications about the purported link between the 9/11 attacks and the WMD being entirely superfluous. There was no apparent or proved threat and no prospects of attacks which prove that there was no reason for the US to resort to this kind of invasion at any level. The only plausible circumstances whereby a coalition could be formed between Al-Qaeda and the Baath Party would relate to a situation whereby Saddam would have unearthed a plan to overthrow him. In this case also the principle of â€Å"Jus Ad Bellum† and the consideration in regard to â€Å"reasonable prospect of success† is in conflict with the provision of â€Å"just cause, right intention† under the Just War Theory. The issue of WMD proved to be insignificant and there was no evidence to nail Saddam on that account or with any association with Bin-Laden. Arguments have been made that an attack on Iraq would strengthen the possibilities of terror attacks from there thus providing impetus for failure of all actions in this regard. There is reason to believe that the criteria of â€Å"Jus in Bello† have not been met by the coalition forces in Iraq. Since most areas of Iraq have been at war since March 2003, it is very difficult to ascertain the exact extent of losses to human life and property. But even in the absence of authentic data in this regard, it is possible to collect information from different sources to get an understanding of the conduct of the coalition force. Amnesty International had reported shortly after the commencement of the war that it was worrisome to observe that cluster bombs were being used in areas that were heavily populated. It is known that cluster bombs disperse small bombs across large areas without exploding thus making the area a potential threat as in the case of land mines. Wheeler (2002) has pointed out in his analysis of the â€Å"Jus in Bello† criteria that a civilian person is â€Å"innocent† in not having the â€Å"capacity to harm others†, and the several deaths of children and civilians clearly indicate that the criteria has been grossly violated in Iraq. According to Walzer, â€Å"the relevant distinction is †¦ between those who make what soldiers need to fight and those who make what they need to live. So, for example, civilians working in munitions factories may legitimately be killed, but not civilians providing essential utilities. Crucial to the Jus in Bello criteria is the concept of proportionality. This is enshrined in the Geneva Conventions, for example, Article 52(2) which allows states only to attack objects which by their nature, location, purpose or use make an effective contribution to military action†. In the terminology of â€Å"Jus ad Bellum†, there is need to revisit the contention that counter insurgency war has links with the broader â€Å"war on terror†. President Bush had said that â€Å"if we lose [in Iraq], if this young democracy fails, the enemy will be emboldened. They will have resources in which to launch attacks. They have declared their desire to have a caliphate throughout the Middle East, and one of their targets is to topple modern governments†. All evidence suggests that the war in Iraq has not been a just war especially in relation to the war on terror. While conceiving the war, intentions were not made clear and the cause was never proved. It has not been conclusively proved that it was undertaken as a â€Å"last resort† because there was no supposed threat that has been proved. The objectives of curbing terrorist activities and threats were never put forth convincingly although the threats for the same were said to have increased consequent to such a military action. Under the circumstances there were very remote chances of success for bringing peace and authority to curb the conditions prevailing in Iraq. Although the Just War Theory has had a long tradition it has been criticized for being just relativistic in contradicting the universal philosophical beliefs like the ethic of reciprocity. Humanists who are secular often propagate the Just War Theory on the basis of widespread ethical practices without relying on morality as espoused by Christianity . The theorists for Just War normally display an attitude that morally abhors war while at the same time being ready to agree that war does become necessary at times. In essence, Just War Theory aims at distinguishing between what is justified and not justified while engaging in war. It aims at conceiving how to restrain the use of arms in a more humane manner so that long lasting justice and peace is established. However in the case of Iraq it is felt that most actions were atrocities that contravened the tenets of â€Å"Jus In Bello†. Hence a war that is fought against an insurgency that is considered popular will neither be â€Å"Jus in Bello† nor â€Å"Jus ad Bellum†. The attacks of September 11 and the two wars that were fought subsequently have raised national security issues and made them larger than the economic problems facing the US. These developments have resulted in divided opinions and conflicting emotions in regard to the foreign policy to be followed in such times. There is considerable discontent with Iraq which is influencing the shaping of the foreign policy as much as the policies for curbing terrorism. Americans have now become intensely conscious and concerned about the reduced international respect for the country arising out of disappointment over Iraq. It is believed that the US is now less respected in the international community because the decision of war was wrong. This loss in respect is considered as a major foreign policy in the USA. There is continued discontentment in regard to the manner in which Iraq was handled and public criticism continues to increase about the faulty approach of the Bush administration to national security issues. A lesson is learnt in that there is no need to act extra fast in using force, but to find diplomatic solutions by all possible means. Most Americans believe that there should be emphasis on relying on the opinion of US allies in the formulation of its foreign policy. The priorities of the American public after 9/11 have changed significantly. Concern over issues not related to terrorism, such as AIDS and dealing with hunger have reduced considerably. Bibliography Cirincione Joseph, et. al. WMD in Iraq, Carnegie Endowment for International Peace, 08 January 2004, carnegieendowment.org/files/Iraq3FullText.pdf, Accessed on 13th July, 2009 Fotion Nicholas, War and Ethics: A New Just War Theory, 2008, Continuum Kegley Charles W, The New Global Terrorism: Characteristics, Causes, Controls, 2002, Prentice Hall Mead Walter Russell, Special Providence: American Foreign Policy and How it Changed the World, 2001, Knopf Walzer M, Just and Unjust Wars: A Moral Argument with Historical Illustrations, 1977, New York, Basic Books Wheeler N J, Dying for Enduring Freedom: Accepting Responsibility for Civilian Casualties in the War Against Terrorism, (2002), International Relations, 16(2) Winnett Robert and Leppard David, Leaked No 10 dossier reveals Al-Qaeda’s British recruits, July 10 2005, The Sunday Times Zupan Daniel S, War, Morality And Autonomy: An Investigation in Just War Theory, 2004, Ashgate Publishing Research Papers on Just War TheoryCapital PunishmentRelationship between Media Coverage and Social andComparison: Letter from Birmingham and CritoArguments for Physician-Assisted Suicide (PAS)Effects of Television Violence on ChildrenAppeasement Policy Towards the Outbreak of World War 2Three Concepts of PsychodynamicGenetic EngineeringOpen Architechture a white paperBringing Democracy to Africa

Monday, November 4, 2019

List and briefly describe at least five of the programs included with Essay

List and briefly describe at least five of the programs included with Microsoft Office 2010. Provide an example of when you might use each one - Essay Example It is a valuable program for analyzing numerical figures. This program is very helpful in making budget reports, calendars or invoices (Microsoft Corporation, n.d.) The PowerPoint program enables the user to make powerful presentations (Microsoft Corporation, n.d.). It now allows easier coordination with other people through co-authoring which makes it possible for collaborators to work at the same time on one presentation (Microsoft Corporation, n.d.). It is used to make office report presentations and slideshows. This program â€Å"creates professional quality publications and marketing materials† (Microsoft Corporation, n.d.). Publisher is a valuable program for making advertising materials, newsletters, greeting cards and brochures. This is the database program of Microsoft Office. It is used to manage and organize information with the use of its templates and other modular components. This program is very useful in setting up a database of a company’s customers. It is also beneficial for creating database for an organization’s workforce. Microsoft Corporation. (n.d.). Whats new in PowerPoint 2010? Retrieved February 17, 2012, from Microsoft Corporation Web site: http://office.microsoft.com/en-us/powerpoint-help/what-s-new-in-powerpoint-2010-HA010336563.aspx Microsoft Corporation. (n.d.). Word 2010 features and benefits. Retrieved February 17, 2012, from Microsoft Corporation Web site:

Saturday, November 2, 2019

Advantages and disadvantagess of power point presentation Research Paper

Advantages and disadvantagess of power point presentation - Research Paper Example 377); ease and convenience in use; simple and concise to relay highlighted points to be discussed; assists in effective cognitive recall; and assisted in increasing classroom attendance (James, Burke, & Hutchins, 2006, p. 376). On the contrary, PPTs were likewise revealed to â€Å"â€Å"trap† instructors into bad teaching practices† (Klemm, 2007; cited in Gurrie & Fair, 2010, p. 24); â€Å"not all students are learning from PowerPoint presentations† (Gurrie & Fair, 2010, p. 29); minimizes interaction and rapport between teachers and students (James, Burke, & Hutchins, 2006); and restricts the use of other innovative and creative technological applications which could provide enhanced learning and stir students’ interests on diverse subjects and endeavors. Overall, as much as PPTs have been proven to be beneficial in classrooms and organizational settings as a tool to provide enhanced learning, there are set-backs on relying too much on them. As such, users and presenters must think of ways to entice audience appeal to ensure that technological applications such as PPTs would continue to serve its ultimate purpose and to maximize the potentials for learning. Gurrie, C., & Fair, B. (2010). Power Point--from Fabulous to Boring: The Misuse of Power Point in Higher Education Classrooms. Journal of the Communication, Speech & Theatre Association of North Dakota, 23,