Friday, December 20, 2019

Survival of 15 Year Old Girl Essay - 990 Words

It’s year 2036, the government has collapsed on itself, the economy crumbled. Riots Rebellion and violence fill the streets. The cities abandoned, suburbs a ghost town. Resources used up, and the chance of survival is rare. After the government shutdown, they couldn’t seem to start back up again. Attempts of restarting were common, but never successful. After the government was gone, the oil taken from the east was no longer being replenished, and being used up daily. Technology failed due to a virus and basic electricity we have depended on for centuries. The chance of survival for a 15 year-old girl is rare but this is my story of survival in a complicated and confusing world, alone. Common fears of society include the basic things†¦show more content†¦The government will have been shut down for a year, come January 2037. The result of the shutdown has been horrifying. There is barely any food in sight, and when there is food there is the struggle to get it. I have decided to make my way down south to attempt to survive the harsh winter of New Jersey. My journey will not be easy, but it has to be done otherwise I might not live to see the promised â€Å"rebirth† of our country. It was a cold day in the middle of September. I remember waking up in our bunker- hidden from civilization for the safety of our family- and seeing that we had a new message to our telephone. Hearing the message left from my parents I almost knew that the chances of them returning were slim: â€Å" We have run out of food in the bunker and in order to survive the next year we are going to have to restock. There is an abandoned supermarket about an hour walk away. The word had just gotten out that they have supplies and we have left to get there before anyone else. See you soon, Love Mom and Dad† I didn’t think that that would be the last time that I would hear their voices. I’m still in denial about them leaving me alone in a dangerous world left in ruins. Being alone is quite frightening, especially when you are a 14-year-old girl. I still barely understand why the world has come to this. In school we were taught about the government shutdowns and the economy stuff in brevity, but they neverShow MoreRelatedThe Culture Of The Thule Culture1428 Words   |  6 Pagesfishing nets, canoes, tea, and canvas tents (Netsilik, n.d). Adding these trading posts not only shows how adaptive the Netsilik are to other cultures, but it allowed them to get a hold of items with more advanced technology, thus survival could be made easier. Ten years further into the future, is when a mix of different cultures began, for in 1930 permanent non-native settlements began to appear. This demonstrated the Netsilik’s ability to adapt to new culture, for they quickly embraced new religionsRead MoreViolation of Child Rights1704 Words   |  7 Pageswhat they are, and to whom they are intended.†A child is any human being below the age of eighteen years, unless under the law applicable to the child, majority is attained earlier. , World leaders in 1989 decided that children needed a special convention, because children often need special care and protection that adults do not. The leaders also wanted to make sure that people under 18 year old have human rights too. UN Convention on the Rights of the Child was adopted and opened for signatureRead MoreCannibal Justice Essay1192 Words   |  5 Pagesby one the survivors start to die for no apparent reason. Starving, you start to eat their bodies by building a fire and roasting them as if you would roast a pig. Of course, you feel guilty, but after all, you are starving. Cannibalism can be a survival technique in extreme cases such as these. Even though cannibalism is most commonly believed to be the epitome of savage behavior (Bell), cannibalism is not always for pleasure, it can also be a way to survive because cultures all over the world practiceRead MoreModule 1 Case Assignment Essay662 Words   |  3 Pagesguarantee survival of only six people. The committee must decide which six are to be included from a list of twelve to go on and rebuild a new society. The twelve individuals they have to choose from are the following: A 36-year-old female physician, known to be a racist; Army drill instru ctor; African-American militant, biological researcher; Biochemist; Olympic athlete, all sports; movie star; third-year medical student, homosexual; 16-year-old pregnant female; 30-year-old Catholic priest; 38-year-oldRead More Early Marriage Essay1131 Words   |  5 PagesEarly marriage is the marriage of children and adolescents below the age of 18. Causes: According to UNICEFs Innocenti Research Centre, the practice of marrying girls at a young age is most common in Sub-Saharan African and South Asia. There are specific parts of West Africa and East Africa and of South Asia where marriages before puberty are not unusual. However, the Centre also notes that marriage shortly after puberty is common among those living traditional lifestyles in the Middle EastRead MoreProblems that Teenage Mothers Face Essay1602 Words   |  7 PagesBabies are born more likely to be born premature and/or suffer low birth weight. There are a lot of problems involved with children having children. There is a higher risk of low birth rate, premature labor, and stillbirth. The problem is teenage girls are not done growing and fully maturing, there for, when they become pregnant it induces problems not only on the baby but the mother as well. *A general rule: The younger the mother, the greater risk of complications for both the mother and childRead MoreBetwee n Shades of Gray1078 Words   |  5 PagesLina Vilkas is an average 15 year old girl with a prestigious art school to look forward too, typical teenage problems, and a family who loves and supports her through her everyday life. Her life as she knows it is shattered before her when Soviet secret police unexpectedly barge into their elegant Lithuanian home one summers night in 1941, leaving nothing but broken shards of her life behind. Lina, her younger brother Jonas, and her head strong mother are separated from their father andRead MoreKim Phuc Will Forever Be Scarred1656 Words   |  7 Pagesphoto of Kim Phuc was photographed by, Associated Press (AP) photographer, Nick Ut. Within a year the photo had captured the 1973 Pulitzer Prize for Spot News Photography for The Terror of War. This year is the 42nd year anniversary of the photo being taken. A moment encountered during the disarray of war would be both Kim’s her saviour and her curse. In the pulitzer prize-winning photo the 9-year-old girl will forever be bare and left with nothing but her voice as she yells ‘’Too hot! Too hot!’’Read MoreRites of Passage: The Journey to Adulthood1126 Words   |  5 PagesPassage: The Journey to Adulthood The dictionary defines rites of passage as ceremonies that mark important transitional periods in a person’s life. It usually involves rituals and teachings that help shed their old roles and prepares them for their new roles. Although all boys and girls will go through a rite of passage to be considered an adult, the path they will take will differ greatly. The common point I have found them all to have is the age range at which this usually occurs, which is betweenRead MoreWhy Do Men Commit Crime So Much Recorded Crime?939 Words   |  4 Pagesfewer issues that they experience in their home life. For instance, exploitation, or child abuse. This, in turn, can make these girls unprotected to more exploitation and engaging in illegal activity, for example, soliciting, survival sex and drug use (Slowikowski, 2010). The Youth Justice Board figures (2015, p.p 6) reported that the number of personal violent offences by girls rose by 48% between 2003-2008; this also showed an increase in public order offences by 37% and the report showed that this

Thursday, December 12, 2019

Downloading the Movies and the TV Shows is not a Crime

Question: Discuss about the Article for Downloading the Movies and the TV Shows is not a Crime. Answer: Introduction Ethics has been defined to set the moral values and the principles which can easily govern the conducts of a particular individual or the group. For this, there is a need to properly analyse the different concepts of the ethics in the IT development. The focus has been on understanding the speed and scale of greater information which can easily store or retrieve the information at any scale. There have been complexity where there is a focus on the privacy, property, accuracy and the accessibility of the system. The privacy has been closely set to the data security where there is a need to handle the unauthorised access which attacks our system. (Makela et al., 2016). The measurements are based on handling the IT security of the system with the hold of the different imperative issues. The security is mainly for managing the cross functionality in the organisation with the setup of the enterprise issue. The enterprise security management encompasses the different variety of the security which relates to handling the copyright crackdown. In Australia, there is a possibility that the downloaders are sued for the infringement of the copyright where no laws have been administered to watch the content for a particular individual usage. Ethical Theory relative to the Media article The theory is relating to the consequence based pattern where the focus has been on the morality to hold the different outcomes of a particular action form. This is based on different judgements with morals to take hold of the conducts based on the ultimate base of the judgement about whether the particular conduct is correct or wrong. This has been focusing on the rules and the moral duty which is able to remarkable set and promote the benefits based on the consequentialism factor. (Schulz et al., 2015). The ethical theory visions for setting up a strategic framework which is able to recognise the different personal and corporate issues. The intellectual property includes the software as well as the data, where the information has a key resource to safeguard the integrity of the information. There have been growing opportunity to misuse the ICT with the advancements in the ICT. This cause the organisation to take into account all the established values and the code of practices including the privacy and confidentiality. Doing Ethics Technique The factors related to the copyright breakdown for downloading, are related to the breach of the security and the privacy. (Kavathatzopoulous, 2015). The Australian government has completely indicated a stronger support for the introduction of the legislation which is anticipated through the definite legal obligations. Some of the questions, one need to hover on are: What has been the issues relating to the accessibility? At the time of downloading, there are issues relating to the accessibility of the disabled users who are easily able to surf the websites that are incompatible. Also it depletes the actual copyright of the movie or the TV show. Hence, it is always recommended to buy the original versions of the disks. What are the Facts and events related to the ethical issues? The major focus has been on handling the ICT problems which are relative to the subscriptions and the other business model. As per the analysis of the article, it has been seen that downloading is very common in Australian and the people prefer to download the copyright versions. There have been versions to set the transitions of the subscription and the service. Who all are affected by the breach of the data? The Australians seems to be affected a lot by this as they will have to make sure about the management of the content and the TV shows they are producing. Also, there is a need to handle the ISP provider who shares the details of the system. It is important to handle the needs of the people with a higher level of integrity of to protect the breach of data. Steps and the measures taken to ignore it? The major remedy that is seen is to handle the current legislation for the different content procedures as well as the owners to pursue individuals in the civil courts. There are certain record labels and the movie studios who are able to suit their customers with the ISP like the Telstra, Optus and other to reveal the identity of the people who are downloading illegally. Consequence of the scenario? The downloaders can easily be sued by the different copyright holders with the order to pay for breaching the right of the holders. The relative legislation has been the Australian Copyright Act which crafts to outlaw the smuggling of all the goods which are pirated. (Shin, 2015). To handle the damage, it is important to set the flagrant infringements which are set under the deterrent message and which needs to be sent with certain statutory damages. What is the best option for this? There is a need to work on the research with the downloading of the different copyright infringements. This is mainly to handle the effective ways to discourage the people from the privacy and help them to download all from the reliable links. Conclusion The information communication technology is based on handling the concerns related to the data protection and the personal privacy. For this, there is a need to take hold of the user responsibility with secure acceptable access to the software license and the piracy. A better policy of ICT follows the associated issues which are important to be dealt for the technological advancements. The organization needs to hold the responsibility which set to use the ICT as well as provide better support to consider and examine how the reports are treated. This is important to analyze and consider the public decisions and actions which are worthy depending upon the ICT professional system. References https://www.smh.com.au/digital-life/digital-life-news/downloading-movies-and-tv-is-not-a-crime-20141126-11uyie Makela, J. P., Sampson, J. P. (2016). Ethical Issues Associated with Information and Communication Technology in Counseling and Guidance.International Journal for Educational and Vocational Guidance,14(1). Schulz, R., Isabwe, G. M., Reichert, F. (2015, August). Ethical issues of gamified ICT tools for higher education. Ine-Learning, e-Management and e-Services (IC3e), 2015 IEEE Conference on(pp. 27-31). IEEE. Kavathatzopoulos, I. (2015). CEST-Center for Ethics, Sustainability, and Technology. Shin, S. K. (2015). Teaching critical, ethical and safe use of ICT in pre-service teacher education.Language Learning and Technology,19(1), 181-197.