Friday, June 7, 2019
Information Describe Essay Example for Free
Information Describe Es secernDescribe the memorandum you will create victimisation your ICT skills. It is really important to make the purpose of your document clear, and delimitate where/when it will be used and who will be your audience. Research / Background Information Describe the steps that you took to collect information from both IT and non-IT sources for your document. Remember to say why the information that you have collected is relevant to your project (Is it fit for its purpose, suitable for your intended audience? ) What have you learnt from your research? Were you able to draw both conclusions of your own?Did your research help you to design your own original work? Design Outline Design your document. Save this design. This can be done by hand or on the computer. You can add notes (annotate) to your design, explaining things such as At this stage you can finalise your design and make your document. Try come to the fore at least two several(predicate) arrang ements of the text, images and numbers. Save these drafts. Choose the layout you prefer giving reasons for your choice. Checking Once you are satisfied that you have checked your document, give it to person else to proof read. Keep this draft make a note on it of anything that needs to be corrected.Read AlsoDescriptive Essay TopicsEvaluation inform how you would have created your document manually. relieve the difference that using ICT to create your document made. Does your document suit its purpose? What improvements could you make if you had more time or different resources available? Problem solving Explain how you overcame any difficulties you had creating your document. Did you use any online help features in the software you used? If so explain what you learnt from this. Safety Explain how you kept the risk of viruses to a minimum and how you made sure that the work was done in safe conditions. Was there a need for confidentiality in this document?What steps if any did you take to observe confidentiality? Appendices Include Source documents you used to create your document (pictures you scanned in, notes, pricelists etc) Any documents you used to collect information e. g. If you are doing a survey to collect information include a sample of your questionnaire and a summary of your results. Your initial design Your drafts A screenshot of a search proving that you searched for information using multiple criteria and finally. Put you final document on the front of your project documentation attach a coversheet and hand in to meet the deadline
Thursday, June 6, 2019
Forensic Science Module Essay Example for Free
Forensic Science Module Essay1. deoxyribonucleic acid or deoxyribonucleic acid refers to the molecules that carry our genetic information. DNA place be found in blood, skin cells, tissues, muscles, bones, teeth, hair, and saliva. 2. Mitochondrial DNA is DNA that foundation be inherited from ones mother and is found away of the cell nucleus. 3. CODIS is a software program that contains the DNA profiles of convicted offenders, missing persons, crime scene evidence, and other sources. CODIS lay downs by approaching to match the samples of DNA based on the thirteen assorted regions or loci within the atomic DNA. 4. Complimentary base patterns are pairs that always pair up together. Complimentary base patters are so important because the four bases make up DNA 5. RFLP is described as the method in which DNA is studied, by using an enzyme to cut DNA strands into different sections. Limitations to this process include the fact that it requires a large sample of DNA and samples that carry dirt or mold usually will not work good with this type of test.1. I believe DNA has had and continues to have such an impact on forensic science because a DNA sample can help figure out who was involved in a crime and even who was the person who committed the crime. 2. I believe some of the challenges that come with salt away DNA evidence could include the DNA sample potentially becoming damaged, by factors even if includes natural causes such as dirt, dust, and mold. Some ways that I could overcome these potential challenges include trying to collect more DNA samples that are not ruined or damaged you can also attempt to clean the DNA if possible.3. The difference between mitochondria DNA and nuclear DNA is that mitochondrial DNA is inherited from the offsprings mother while in nuclear DNA it is mixed and matched so it is different. I would choose nuclear DNA to work with because it is more complex which means it is less likely for any twain people to have the same pat tern while mitochondrial DNA has less variability from one to another. 4. If I had to analyze DNA samples I would choose the polymerase fibril reaction to analyze the DNA. PCR creates strands of DNA from small samples of DNA at crime scenes. I would choose this technique because for one it is inexpensive, does not take very long, and can be successful with just even a small piece of the DNA sample. 5. The experts testimony can be dismissed by questioning its credibility, education,
Wednesday, June 5, 2019
Parental Consent Abortion Essay Example for Free
Parental Consent Abortion EssayAbortionI. IntroductionA. Attention Grabber rhetorical question, story, quote, shock, scare, stats, allusion, etc. Did you know that adolescentage girls are more than 24 times more likely to die from childbirth than from first trimester legal abortion? B. why audience should care Every girl is at risk of getting pregnant, and if enate consent is the reason for childbirth the effects hurt mother and father. C. play down Info. According to the encyclopedia of American law fertility rate went down bc. of abortion and birth control- By the 1870s, a womans right to murder decisions somewhat REPRODUCTION was restricted by federal and state laws. -ABORTIONS , which increased markedly in the 1850s and 1860s, especially among middle-class white women, had been legal until the fetus quickened, or moved inside the uterus. The -AMERICAN MEDICAL ASSOCIATION (AMA) and religious groups led the successful move to have state legislatures impose criminal penaltie s on somebodys performing abortions. In some states, women who had abortions could overly be held criminally liable.(Progressive) D. Thesis Women under the age of 18 should be allowed to obtain an abortion without parental consent because every person controls their own body and forcible restriction can lead to drastic consequences.II. Need StepA. What is the problem? youngagers feel pressured to have the child because they have no right over their own body. If they dont get the proper help they need problems may arise. The American Academy of Pediatrics also opposes parental- interest group laws Legislation mandating parental involvement does non achieve the intended benefit of promoting family communication but it does increase the risk of harm to the adolescent by delaying access to appropriate medical care. Minors should not be compelled or required to involve their parents in their decisions to obtain abortions, although they should be encouraged to discuss their pregnancies with their parents and other responsible adults.(Naral) B. What is/are the cause(s)? Laws making clinics have parental note/ judicial-bypass provisions fail to protect young women.C. How big a problem? It affects everybody, the parents, the child, and the family. -Approximately one-third of American women become pregnant before the age of 20. -Twenty-five percent of teen mothers live below the federal poverty line. Nearly 80 percent of teen mothers eventually go on welfare. Teens that give birth also spend a greater length of time receiving public assistancean average of three years longer than older mothers through age 35. Teen mothers are also more likely to have lower family incomes later in life.(NARAL)D. What are the ill effects of this problem? Harmful to the teen, and teens future The American Medical Association concluded in a 1992 study that parental-consent and notice laws increase the gestational age at which the induced pregnancy termination occurs, thereby also increa sing the risk associated with the procedure. Although a first or second trimester abortion is far safer than childbirth, the risk of complications significantly increases for each week that elapses after viii weeks. (Philip, Diana) A Toledo, Ohio judge denied a bypass for a 17-year-old, an A student who planned to attend college and who testified she was not financially or emotionally prepared for college and maternalism at the same time, stating that the girl had not had enough hard knocks in her life. (Philip, Diana)III. Satisfaction StepA. Solution(s) or steps age-appropriate health and sex education with medically accurate study access to confidential health services, including family planning life-options programs that offer teens practical life skills and the motivation to delay sexual activity and programs for pregnant and parenting teens that give instruction parenting skills and help ensure that teens finish school. B.Specific details on how this problem can be solved a n emphasis should be placed on reducing teen pregnancy. C.Best plan or most important first stepAccess to health services, including family planning.A Pennsylvania study found that of the 60 judicial districts in the state, only eight were able to provide complete information about Pennsylvanias judicial-bypass procedure. Some county courts referred minors to anti-choice crisis pregnancy centers that typically provide false and misleading information about abortion and pressure women to carry their pregnancies to term. (Borgman, Caitlin). D. Reasons it is best or most important Lays foundation and protection for the child and teen.IV. Visualization StepA. The world will have less teenage births, less unsafe abortions and less children homeless and in poverty. B.If we do not solve this problem there will be more teen moms, poverty and unsafe abortions. With their parents guidance, more teenagers will choose childbirth over abortion (Philip) C.In countries where abortion is restricte d like poland go afield to the Netherlands, Germany and Austria for abortions.2 Women who are not lucky enough to live in environments such as the EU may be forced to go to foreign countries and change underground, unsafe abortions. (this house)V. ConclusionA. Minors should be allowed to obtain an abortion without parental consent because every person controls their own body and has the right to choose and restricting abortion can lead to drastic consequences. B. Education about sex, family planning, and a bill that allows minors to recieve abortion without parental consent. C. Individuals can talk to their parents about their views on abortion and inform them that they have the right to choose. Individuals can also call your local congressman or write a letter making known them of the dangers of restricting abortion. D. In our everyday lives we can remember how living in the U.S. is a blessing and our freedoms can not be taken away from us. We must remember that every women has a right to their body and giving birth is not the only way to end the suffering of an unwanted pregnancy.
The Benefits of Java
The Benefits of chocolatecoffee INCLUDES A LIBRARY OF CLASSES AND INTERFACESThe Java platform includes an extensive split library so that software engineers can use already existing classes, as it is, create subclasses to modify existing classes, or implement interfaces to augment the capabilities of classes.Both classes and interfaces contain data members (fields) and functions (methods), that in that respect are major differences. In a class, fields may be either variable or constant, and methods are fully implemented.To use an interface, a programmer defines a class, declares that it implements the Interface, and then implements all the methods in that interface as part of the class. These methods are implemented in a expression that is appropriate for the class in which the methods are being used. Interfaces let one add functionality to a class and give a great deal of flexibility in doing it.A package is a collection of related Java classes and interfaces. The following li st, however not complete, gives example of some Java packages and what they cover.Java.lang The prefatorial classes. This package is so basic that it automatically is included in any Java program. It includes classes that intercepts with numeric, strings, objects, maneuvertime, security, and threads.Java.io Package that includes classes managing reading data in input streams and writing data into output streams.Java.util Miscellaneous profit classes, including generic data structures, bit sets, time, date, the string manipulation, random number generation, system properties, notification and enumeration of data structures.Java.net Classes for network support.Java.awt Classes that manage user interface components much(prenominal)(prenominal) as windows, dialog boxes, buttons, checkboxes, lists, menus, scrollbars, and text fields, the AWT stands for Abstract Window Toolkit.Java.awt.image Classes for managing image data, including color models, dropping color flittering, setting pi xel values, and grabbing snapshots.Java.applet The Applet class, which provides the ability to write applets, this package withal includes several interfaces that connect an applet to its documents and to its document.Java.sql The JDBC API, classes and interfaces that access databases and send SQL Statements.The first three packages listed, java.lang, java.io and java.util form the basis, they are basic classes and interfaces for general-purpose programming.Java development kit version1.1 added some saucily packages, with JDBC being one of them. Other new packages include such thing as Remote Method Invocation, Security and Java Beans, the new API for creating reusable components.In Java, packages serve as the foundation for building other packages, as discussed in the following section.JAVA IS EXTENSIBLEA big plus for Java is the detail it can be extended. It was purposely written to be lean with the emphasis on doing what it does in truth well, instead of trying to do everythin g from the beginning, it was return so that extending it is very simple. The JDBC API, the java.sql package, is one example upon which extensions are being built.In addition to extensions there are in any case main tools being developed to make existing capabilities easier to use. For example, there is already a tool that greatly Simplifies creating and laying out Graphical User Interfaces such as menus, Dialog boxes and buttons.SECURITYIt is important that a programmer not be able to write subversive mandate for Applications or applets. This is especially true with the Internet being used more and more extensively for services such as electronic commerce and electronic delivery of software and multimedia content.The Java platform builds in security in quaternity ways.The way memory is Allocated and laid out In Java an objects location in memory is not determined until The runtime, as inappropriate to C and C++, where the compiler makes memory layout Decisions. As the result, a programmer cannot look at a class definition and figure out how it cogency be laid out in memory. Also since, Java has no pointers, a programmer cannot forge pointers to memory.The way incoming code is checked The Java realistic machine doesnt trust any incoming code and subjects it to what is called throughte code verification. The throughte code Verifier, part of the virtual machine, checks that the format of incoming code is cook upincoming code doesnt forge pointers, it doesnt violate access restrictions, it accesses objects what they are.The way classes are loaded The Java throughte code loader, another part of the virtual machine, whether classes loaded during program execution are local or from across a network. Imported classes cannot be substituted for built in classes, and built in classes cannot incidentally reference classes brought in over a network.The way access is restricted for immature code The Java security manager allows user to restrict untested Java applet s so that they cannot access the local network, files and other resources.JAVA PERFORMS heartyJava performance is better than one might expect. Java has many advantages, such as having built in security and being interpreted as well as compiled, do have a cost attached to them. As a result, Java has done quite respectably in performance tests. Its performance numbers for interpreting throughte codes are usually more than adequate to run interactive graphical end user applications.For situations that require unusually high performance, throughte codes can be translated on the fly, generating the final machine code for the particular processor on which the application is running at run time. High level interpreted scripting language generally offer great portability and fast prototyping but unretentive performance. Low level compiled language like C and C++ offer great performance but require large amounts of time for writing and debugging code because of problems with areas such a s memory management, pointers and multiple inheritance. Java offers good performance with the advantages of high level languages but without the disadvantages of C and C++.JAVA IS ROBUSTThe multi platformed environment of the WEB places extraordinary demands on a program, because it must execute reliably in a variety of systems. Thus the ability to create robust programs was stipulation a high priority in the design of Java. To gain reliability, Java restricts you in a few key areas to force you to find your mistakes early in program developments. At the same time, Java frees you from having to worry about many of the most common cause of programming errors. Because Java is strictly typed language, it checks your code at compile time. However, it also checks your code at run time. In fact, many thorny to track down bugs that often turn up in hard to reproduce runtime situations are manifestly impossible to create in Java. Knowing that what you have written will behave in a predi ctable way under diverse conditions is a key feature of Java to understand how Java robust.For example in C/C++ the programmer must manually allocate and free all dynamic memory. This sometimes leads to problems. For example some programmers some times forget the free memory that has been previously allocated.JAVA SCALES WELLJava platform is designed to scale well, from portable consumer electronic devices to powerful desktop and server machines. As a result, Java accommodates the need for low terminal and for low bandwidth transmission over the Internet. In addition the Java operating system offers a standalone Java platform that eliminates host operating system bang while restrained supporting the full Java platform. API makes Java ideal for low cost network computers whose sole purpose is to access the Internet.JAVA IS MULTITHREADEDMultithreading is simply the ability of a program to do more than one thing at a time. For example an application could be faxing a document at the same time it is printing another document. Or a program could process new inventory figures while it sustains a feed for current prices.JAVA IS IMPORTANT TO THE INTERNETThe Internet helped catapult Java to the forefront of programming and Java in turn has a profound effect on the Internet. The land is simple. Java expands the universe of objects that can move about freely in cyberspace. In a network, there are two broad categories of objects transmitted in the midst of the server, your personal computer, passive info and dynamic, active programs. For example, when you read your e-mail, you are viewing passive data. Even when you download a program, the programs code is still only passive data until you execute it. However, there is a second type of object that can be transmitted to your computer, a dynamic, self execution of instrument program. Such a program would be an active agent on the client computer, yet it would be initiated through the server. As desirable as dynamic, n etworked programs are, they also current serious problems in the areas of security and portability. Prior to Java cyberspace was effectively closed to half the entities that now live there. Java addresses these concerns and doing so, has opened the accession to an exiting a new form of program.
Monday, June 3, 2019
Effects of the Researcher on Analysis Results
Effects of the Researcher on Analysis ResultsMERA HEERALAL-MAHABIRDESCRIPTION OF ASSIGNMENT suffice on the following quote Analysis reveals the person making the analysis not really the piece itself., David Lodge 1935 Novelist and PlaywrightAccording to Lester (2010), Analysis is a way of the mind that not only engages with the outside world, but also internalizes its lesson and learns from them (pg. 115). It is the separation of an intellectual or material whole into its constituent parts for soulfulness study. It is the dissection and c atomic number 18ful study of a piece something to learn close to its parts, what they do and how they are connected to each other. This study is a detailed examination of the elements or structure of some kind of text or act whether it is a poem, film, advertisement or book.Personal perspectives are important because they reveal much about the person making the comment (Lester 2010 p. 122). Some people may say that such(prenominal) views have lim ited use simply because they are so private and subjective, and that these interpretations cannot be comprehensive beyond the several(prenominal). This, therefore, does not disclose much with regard to how others might make meaning of an image, advertisement, play or other text or acts. A noteworthy event, image or painting, that is considered a work of art mot ages generate in the flesh(predicate) reaction, indicative about the finis from which it came from. I agree with the notion that an analysis is a expression of the person making the analysis and not of the piece itself because of is cultural background, personal fuck offs, and educational status, all of which inform an individuals opinion of a text.Fiske, (1982) states that when the cultural groups we belong to comprise a large majority in our community or nation, we are less potential to be aware of the content of the messages they send us. Cultures shared by overabundant groups often seem to be natural, normal, th e way things are done. We only notice the effect of cultures that are several(predicate) from our own, attending to behaviours that we label exotic or strange, misunderstandings in semiotics are considered to be the result of cultural differences and not at communication failure (pg. 2). The decipherr brings aspects of his or her cultural cause to bear upon the codes and signs which make up the text. Therefore, when members of a dominant culture decode or make meaning of something, it is more than likely that that interpretation would be similar in nature among those members. Thus text rooted in dominant ideologies can be interpreted through such ideological frames and appear natural. In this case the analysis reflects the ideology of the text, which in this example is the dominant ideology. such(prenominal) an example can be seen in the sometimes cultural rationale we ascribe to the wearing particular clothing (leather jackets or winter boots) or to food for thought choices (KFC ), as everyday rationale ascribes meaning and significance to that choice. The same meaning and significance is used by the encoders to spread that dominant ideology through the regnant media. Some may argue that this acceptance of false consciousness is the result of a lack of analysis to a particular event, text or experience but it can be considered the result of little or no analysis it can be the result of analysis through ideological lens.Logically, if a culture shares the same codes and conventions, members will interpret and ascribe meaning that are similar. However, even people belonging the same culture may not eer have the same interpretation because of personal experiences. Theorist, Stuart dormitory room (1980), states that meaning is not simply fixed or determined by the sender. He argues that the message is neer transparent and the audience is not a passive receiver of meaning as one would like to believe. For example, a news item that features refugees from war tear Egypt that aims to provide a compassionate account of their plight does not promise that people will decode it to feel sympathetic towards the refugees. People from another war-worn area who share the same culture and religion will be sympathetic and feel strongly that other countries should help based on a humanitarian basis. On the other hand, people of another culture, say American culture (individualistic culture), may think the opposite. Another example, is Carnival in Trinidad and Tobago. People who put up to the carnival culture may accept a men gyrating (wining) on a semi-nude women in the streets of the city during the celebration. A viewer from another culture, however, say from an Islamic-Middle-Eastern country may find this act to be outrageous and shameful. Even persons who share the same Trinidadian culture may not approve of this kind of behaviour. Negative, personal experiences may also cause persons to have an undesirable attitude towards the festival of car nival. People are not entirely free agents and immune to the effects of the culture they inhabit. Thus, when people generate ,meaning from say, for example, a movie , they are inevitably affected by the culture they live in in ways of which they are unaware. The culture, in other words, speaks through them. Hall (1980) states that messages are decoded and interpreted in different ways depending on the individuals cultural background.An analysis is a reflection of the person making the analysis because of his personal experiences as reflected in the type of readings he makes of the subject world analysed For example, because Caribbean people had a negative historical experience of racial bias practiced by a white colonial people, they would certainly have a kind of bias towards that race in general. drawing on a personal example, as a teenager working at a popular bank in Port of Spain, where at that time only persons of high colour were employed, a brown-complexioned East Indian p erson like myself, had many experiences of racism displayed toward me. This would certainly carry a certain nitty-gritty of bias in my analysis of any piece done by a white person. So instead of taking the dominant reading for something, I might go for the negotiated or oppositional reading. According to Hall (1980), a person might decide to produce a dominant-hegemonic position, where he accepts the encoded meaning. He takes the connotated meaning from, say, a television newscast and decodes the message in terms of the referenced code in which it has been encoded. If one subscribes to an oppositional reading, he totally ignores the encoded message even though he understands it. He decodes it in a contrary way. He may also go along with the negotiated reading where he compromises between the hegemonic and oppositional views. Because an audience simply does not passively accept a text, they do not always take the dominant reading. Depending on the reading a person adopts, the analys is would be quite different in all three cases.An analysis done by someone holding an elite status, is likely to be different from that of a middle var. or low-income group. Several factors may contribute to this difference. For example, if someone from this upper elite class were to analyse a painting by Cazabon, he would most likely be educated, widely-read and would have more knowledge and appreciation of the fine arts. He would most likely know the name of the artist, his other works, and the artistic style creation used. The elite psychoanalyst would also probably make references to other artistic traditions and make comparisons with other artists using that style. He would perhaps compare the work being analysed with other works done locally, regionally and internationally. The analysis by the elite will be informed by his experience of being more undefended through education, communication and travel. Foreign travel will assist the elite to acquire first-hand knowledge and would be more likely to identify the genre, medium, metaphors and symbolism of the work. The low-income analyst may not have an appreciation for fine arts because he is caught up more with the daily struggles of live in order to survive such as acquiring the basic needs of food, shelter and clothing. Because of the upper class upbringing and training (education), and because one might be more widely read, one can give a more in-depth analysis of an artistic piece. The elite analyst is also likely to be more articulate.Personal perspectives are square because they reflect much about an individual making an analysis. Whilst consideration of other views would make the analysis more comprehensive and well-rounded, it still rests with the individual analyst take on the piece being analysed. Factors that contribute to the type of analysis that will emerge depend on the cultural background, personal experiences and educational status of the individual making the analysis. This decision h owever, most times is supported by the ideological influence of dominant power structures in society. Thus it can therefore, be express that analysis is a reflection of the person making the analysis and not the text or act itself.BIBLIOGRAPHYFiske, J. (1990) Introduction to Communication Studies, Routledge London. p. 2. PrintHall, S. (1980) Encoding /decoding. Culture, Media, Language. Ed. Stuart Hall et al.New York Routledge. Print.Lester, P.M. (2011) Visual Communication Images with messages, Wadsworth Boston.p.122.Print.Semiotics for Beginners Encoding/Decodingusers.aber.ac.uk/dgc/Documents/S4B/sem08c.html. Web. 19 Mar. 2013. Web.
Sunday, June 2, 2019
The Kemant Minority In Northern Ethiopia Politics Essay
The Kemant Minority In Northern Ethiopia Politics EssaySince the creation of modern produce in Ethiopia, in the late nineteenth carbon, ethnical minorities have been facing major difficulties to their survival. While unknown number of minorities are believed to have already disappeared, some others considered to be the verge of disappearing1. Ensuring minority protection is a major policy-making goal for the current ruling g everywherenance (Kiden, 20087). The constitution provides for the creation of political space through light and honor for civilization, identify and languages of ethnic assorts. The state, at least in principle, treats minorities as equal members of the country and respects their honests to preserve their individualism as well as their socio- political aspirations. In reading, however, these rights are far from cosmos realized.The Kemant are ethnically, religiously and linguistically distinct masses and because of their distinctiveness they have be en victims of stigma, exclusion and marginalization. They experienced prejudice and stump for centuries (Zelalem, 200030). Their bring for recognition and self-governance has spent m each years without ultimate response from both the federal and regional judicatures. At a time when their language, culture and religion, as a result sheer identity, are at the verge of extinction2, they are non given due attention. This is reflected by the fact that they are not officially recognized yet. Non recognition hinders not only rights enshrined in the constitution but also the enjoyment of internationally recognized rights3 it leads to the violation of economic, social and heathenish rights and to their ultimate marginalization in the society. The Kemant case certifys the truth of the maxim that justice detain is justice denied.It is paradoxical that the Kemant had been recognized as a distinct people until the 1994 National Census4. They were in existence when both the federal and t he first Regional Constitutions were adopted in 1995. As the 1995 Federal Constitution did not recognized all ethnic groups that existed at the time of its adoption, nor did the 1995 Amhara Region Constitution and the 2001 Revised Constitution recognized nationalities that existed in the region at the time of their adoption. Among such ethnic groups are the Kemant. Certainly, they have been denied their de jure existence while they have ever de facto existed.Against this backdrop, the assumes of the Kemant people can be examined from at least two perspectives(1) assessing domestic laws for the protection/recognition of minorities and how they are adequate to address the multiple problems faced by ethnic minorities and (2) exploring how the Kemant recognition and self-rule movement is working, the strategies and tactics utilise, to pursue their goals and why the movement is not yet effective to accomplish their claims. Unfortunately this essay does not cover all these aspects. That would be virtually impotential task involving hundreds of pages. Rather the essay investigates star main question Why the Kemant minority are unjustly denied of official recognition to exercise their constitutional rights? Relevant legal documents, books, journals, articles and electronic materials are used and qualitatively analysed to address this specific question.The Kemant Minority Historical- Socio- Legal ContextThe Kemant are residing in the northern Gondar of Amhara Region they speak a dialect of Cushitic language and practice Pagan-Hebraic religion. They are considered as the original inhabitants of north central Ethiopia. Living in the area of the historical Kemantland, they have been progressively, then massively Christianised and Amharized in the last century (Gamst, 19691). Their language, Kemantney is stigmatized because of their traditional religion. A mechanism adopted by them to adjust the harsh social environment was self-denial (Worku, 20102).In 1994 their popul ation was 172,327.195. Despite the fact that at that place might have been discrepancies between the census and the exact population, they had ever been recognized as distinct people. However, the Transitional Government (1991-1995) had not included the Kemant among ethnic groups pensionable to establish regional self-government. This law and practice was a prelude to the federal constitution in 1995.Furthermore, in 2007 population census they were not counted as a separate ethnic group. Ethnic groups as small as 298 (Qewama) and 320 (She) were recognized and counted (CSA, 2008 86-87). Although there is lack of official census at present the population is estimated to be over 900,000. This makes them 12th in population size among Ethiopian ethnic groups (Belay, 2010 10).Claims for Recognition and Self-ruleSince 1991, there has been an effort by individuals belonging to the ethnic group for recognition and self-governance. The movement was primarily against marginalization by the d ominant amhara ethnic group and to preserve their identity. However, the 2007 census accelerated the pace of their struggle. In May 2009, provisionary Committee of Kemant Identity and Self-Governance Claims Council was established. They seem to have started organizing themselves in unprecedented way to push ahead their claim based on the constitution and historical facts.6Their claim is not only a struggle for their right to express and protect their identity, but also for political autonomy of some kind to establish a Zone level administration. It is in line with the constitution which asserts that all ethnic groups have the right to speak and develop their own language, to express and promote their culture and history they have the right to self-administration within a particular territory and the right to representation at the regional and federal levels of government (FDRE 1995 art 39).In such legal context accordingly, the Awi, Himra, Oromo and Argoba minorities in Amhara regi on have already enjoyed recognition and representation since 1991. They have established their own self-government within their individual territories. The Kemant, however, do not enjoy self-government, nor are they recognized as distinct people. They are not represented in the Regional Council as well as in the house of federation. They have little or no say at the political level as they are unrepresented or under represented at all levels of government.The above discussion shows some of the historical, social, political and legal contexts in which the claims of the Kemant ethnic minority are emerged. Their main issues are (1) recognition of their identity (2) claim to exercise their constitutional rights like other ethnic minorities (3) representation in both regional and federal governments and (4) self-administration7. These issues are interrelated with one another. The right of self-administration of a minority like the Kemnat emanates from its status as such. In the absence of recognition, the group cant claim a right to self-rule at any level. The same holds true representation at the regional and federal levels of government cant be achieved without de jure recognition.The main actors involved in the process of recognition/non-recognition are the Kemant people (local level), the Council for recognition and self-governance (at the regional-local level), Scholars (local -regional level), the Amhara Regional State (regional level), and the federal government (national level). Although I acknowledge the importance of analysing and critically reflecting on these stakeholders, this essay deals with the Amhara regional state in addressing the claims of the Kemant.The Artcle 39 (2) of the revised regional constitution provides that the people of the region has a right to enjoy an effective participation in the system of the federal government in a freer, non-discriminatory, appropriate, fair and equitable representation. At the regional level, nationalities and peoples residing in the region have a right of representation. Accordingly, the regional government is saying that it should prove whether the Kemants quest is in conformity with the requirements enshrined in article 39(7) the regional constitution. However, the people of Kemant are claiming that under this pretext the government is working to delay the quest. In fact, in early 2010 the government established a committee for Kemant case study to determine the population size and the peoples desire for self-rule. However, controversy was raised over the committees neutrality and transparency in the process. The Kemant council was not consulted and nothing was clear about the duty and responsibility of the committee. At this time discussions are going on between the government and the council over the procedures to conduct a case study.Why Kemant are denied Recognition?Although understanding the reasons for the denial of their claim for recognition requires a further investigati on, taking the over context in to consideration I can argue that it is primarily due to lack of political commitment at all levels of government which delayed their quest for recognition and self-rule. As stated in Belay (2010 52-54), starting from the time of the Transitional Government of Ethiopia, there has been tough opposition from the government to the claim that there exist distinct people called Kemant. Particularly, those officials in the lower hierarchies have exerted their effort to intimidate those groups who have tried to assert their identity and hindered the claim from being come to the attention of the higher hierarchies of the government. In other words, the political commitment in the region is to assimilate the Kemant into the Amhara ethnicity and culture contrary to the desires of the group. In fact, it is hardly possible to undermine some other internal factors within the Kemant minority which affected their struggle.Historically, Kemant People, like other Agaw people throughout the region were whom the first to suffer from the identity conversion campaign of the false Solomonic Dynasty until 1974(Zelalm, 2000 37). This historical fact left these people under strong identity crisis and slows down in a glide slope back process to their original identity. Even today there are Kemant individuals who labelled themselves as Amhara and struggle against Kemants quest for self-administration8. Though they may not strong influences up on freedom movement, but they can still create confusion to please their superior political masters.The other problem is the approach that Kemant leadership use to regain the constitutional rights, which proved its dysfunctionality. For the last fifteen years, Kemant Committee leadership has chosen a struggle approach that takes them nowhere. They have very rachitic committee that represent the people to regain the denied constitutional rights. This committee is informal that does not have institutional capacity t o resist the mischievous reaction of the regional government.ConclusionTherefore, the Kemant has a constitutional right to assert, develop and promote its own culture, religion, language and history as means of preserving its national identity. In other words, state acts, be it regional or federal, which take away this right is unconstitutional. The fact that the majority of the Kemant speak Amharic should not be taken as a ground for denying them recognition and self-governance. Rather, it should be considered as a positive factor tying both the Amhara and the Kemant together while maintaining their distinctions.
Saturday, June 1, 2019
ADHD Prescription Abuse at Northeastern :: College Study Drugs Education Essays
minimal brain damage Prescription Abuse at northeasternNortheastern middler Gary Brown* reclines his small frame on a couch in his Mission Hill apartment. He looks like a patient on a psychiatrists couch as he dictates his history of abuse with methylphenidate and Adderall.I started going to concerts with a friend who had a prescription and whose nickname was Bradderall, Brown said.Ritalin and Adderall be prescription drugs commonly used to treat attention deficit hyperactivity disorder, or ADHD. Brown has never been diagnosed with ADHD but he started taking the drugs recreationally as a college freshman to have energy for concerts and for partying into the early morning hours. Soon after, Brown began taking Ritalin to study for exams. Brown was taking the pills about 6 times a week.Its pretty easy to get, Brown said.The National Institute on Drug Abuse (NIDA) cites Ritalin, or Methylphenidate, as a primal nervous system stimulant that has a focvictimization and calming effect o n children and adults diagnosed with ADHD. The National Institute of Mental Health estimates that 35% of the habitual population has ADHD, which is characterized as hyperactivity, impulsivity, and inattention. This statistic indicates that one child in every classroom in America has ADHD.But Brown is not part of this 3-5% of the population. For Brown and another(prenominal)s without the disorder, ADHD medications increase dopamine levels in the brain, giving the user a sense of euphoria similar to cocaine. Students at Northeastern University as well as other campuses are consuming these drugs for better academic performance and a cheap high on the college party scene. Students are taking Ritalin, Addrall, and the newest drug on the market, Conserta, every orally or crushing and snorting them to study, party, or lose weight. In some cases, kids are melting them down and shooting them up. According to Northeastern students, the drugs are very cheap and very accessible.Drugs like Add erall, Ritalin, and Conserta that make you focused and industrious can be very useful, said Jeff Smith*, a Northeastern student. the likes of Brown, Smith had never taken these prescriptions commonly called study drugs before coming to college. Smith cites increasing academic pressure as a reason for using the pills to focus and gain an edge. Both Brown and Smith receive free pills from their friends who have prescriptions but they would expect to pay $2-$5 a pill if they had to. In 2000 , NIDAs Community Epidemiology Work Group found the abuse of methylphenidate (Ritalin) in Boston to be prevalent amongst middle and high school students in particular in middle- and upper-middle class communities.
Subscribe to:
Comments (Atom)