Thursday, September 3, 2020

Management of Security Essay

Cut off security is instrumental in improving validation, approval, and control of access to the system from a restricted point. In this manner, execution and the board of security on windows server 2003 organization is significant first since it empowers simple and sound arranging and support of security setting and programming establishment on PC arrange frameworks. The journey for actualizing security on windows server 2003 organization is disappointment by Microsoft to give a solitary system to security related settings design (Bragg, and Hunt, 2005). The security segments are appended to the server remotely, a factor which makes remote observing and control of associations with the system by the server inconceivable without them. Likewise, the board of security in windows server 2003 is significant in ensuring the protection and certainty of system clients. Web get to has been on the ascent in the network, a component that compromises privacy of PC data. Such are expected to hacking and tainting of PCs by malevolent PC programs. Then again, security the executives in windows server 2003 organization effectively mitigates unapproved access into the system. In addition, this can likewise capacity to distinguish and forestall pernicious PC programs from bargains administrations of the system clients. Another significant part of actualizing and overseeing security in windows server 2003 is that it advances checking and control of the system in any event, when the server is disconnected. Utilizing security settings like Baseboard Management Controller equipment for instance empowers free correspondence with remote PC. Consequently, this adequately upgrades the procedure of remotely distinguishing mistakes and starting reaction by the system director (McCann, Eckert, and Schitka, 2005). Accordingly, security execution and the board in windows server 2003 organization serves to unwavering quality and productivity administration arrangement. References Bragg, R. , and Hunt, C. (2005). Windows Server 2003 Network Administration. Sebastopol, CA: O’Reilly. McCann, B. , Eckert, J. , and Schitka, J. (2005). Dealing with a Microsoft Windows server 2003 Network, Enhanced. Artisan, OH: Cengage Learning.

Saturday, August 22, 2020

How is an “Unwoman” Defined? Essay

Truly, ladies and kids were heavily influenced by the dad of the family. The job of ladies was to conceived infants and run the house. In the novel †The Handmaid's Tale†, Margaret Atwood portrays a general public overwhelmed and managed by men. The individuals who dismiss social structure and predominance of guys are treated as â€Å"unwomen†. The vast majority of them are women's activists and twisted children. These classifications of individuals are â€Å"useless† for Gilead, in light of the fact that they can't play out their fundamental capacity: become pregnant and brought into the world sound infants. â€Å"Unwomen† were females who dismiss the possibility of male predominance and battle against persecution and sexual brutality, low social job and poor treatment. Offred (and her mom) is an extreme women's activist which battles for opportunity and a â€Å"women’s culture†. Radical thoughts permit her to comprehend her own live as a major aspect of normal encounters in male-overwhelmed social orders. As an extreme women's activist, she concentrates on male centric abuse in each region of women’s lives. The writer of the article doesn't legitimately talk about Offred mentality towards a Superior society, however it is conceivable to accept that she would concur with this thought. The possibility of ladies as a class distinguishes mistreated ladies as having regular interests against men, since men have normal interests in overwhelming ladies. In the class framework, men profit by man centric convictions and practices which guarantee that ladies administration their necessities, bring up their youngsters and are rejected from political and financial force. Offred attempts to demonstrate that ladies have prevalent qualities against men. â€Å"Offred reviews a scene where her mom and different women's activists consume pornography magazines†. Somewhat, this comment demonstrates that women's activists attempt to be equivalent to men and could manufacture a Superior society liberated from sexual savagery and oppression. Ladies need to create awareness of their inclinations as a class, and to battle against men and against the association of male controlled society. Sexual orientation is viewed as more basic than class in the association of women’s persecution. Atwood underlines that Offred â€Å"considered her body an instrument of her desires†. Be that as it may, as long as ladies are viewed as a class, at that point the contrasts between ladies are not seen as of prime significance, as they have basic class intrigues which join them against men. References 1. Subjects, Motifs and Symbols.

Friday, August 21, 2020

Emotional Intelligence Essay Example | Topics and Well Written Essays - 10250 words

Passionate Intelligence - Essay Example Writer Daniel Goleman (1995) additionally carried EI into the front line with his books entitled, Emotional Intelligence: Why It Can Matter More Than IQ and Working with Emotional Intelligence (Goleman 1995). The two assets suggest that EI represents accomplishment at home, school, and work, empowering people to turn out to be progressively agreeable and compelling colleagues and to fabricate their specialized abilities and IQ for occupations at all levels (Vitello-Cicciu 2003). Goleman likewise speculated that EI can be learned and improves with age (Goleman 1995). Conversely, Salovey and Mayer (1990) battle that EI creates with age and that enthusiastic information can be upgraded and passionate aptitudes can be educated (Vitello-Cicciu 2003). What's not known to date through research is whether EI scores, as controlled by a capacity estimation known as the Mayer, Salovey, and Caruso Emotional Intelligence Test (MSCEIT), can be brought up in people (Vitello-Cicciu 2003). (See Appendix: Assessment of EI in a Leader) Specialists characterize passionate work as the way toward managing the two sentiments and articulations to accomplish authoritative objectives or desires, or, as the exertion, arranging, and control expected to communicate hierarchically wanted feelings during relational exchanges (Vitello-Cicciu 2003). ... ational objectives or desires, or, as the exertion, arranging, and control expected to communicate hierarchically wanted feelings during relational exchanges (Vitello-Cicciu 2003). Authoritatively wanted feelings, additionally alluded to as show rules are viewed as the gauges of conduct that demonstrate not just which feelings are fitting in relationship with others, yet additionally how these feelings ought to be openly shown or communicated. The structure of this paper is as per the following: Part one of paper starts with the presentation of the subject in a scholarly organization. At that point, clarifies the reason for doing this examination and what it will in general accomplish is expressed. In the wake of characterizing the goal a short outline of the essential research questions are given. A significant part of writing audit follows which features different looks into which were done by the authors and investigators before. Research configuration features the methodology and the approach of how the data was gained from the sources. The principle Research results part has the primary body of this exploration wherein the discoveries have been examined and concluded.In end, the examination shows that Marquise Facilities Corporation will profit with consolidating enthusiastic insight into its Management Training. To some degree 2 of the paper, a concise history of the organization and the difficulties they are confron ted with and how they will profit by such preparing. At last, a proposition of the execution procedure will be introduced. The fundamental objective is to push the significance of this preparation in the association while being delicate not to over-burden the bustling administrators with a program that will before long free force. The key is to execute a procedure that is durable and increases the value of the

Friday, June 12, 2020

Social Media and “Law Enforcement Cooperation” Coursework - 5775 Words

Social Media and â€Å"Law Enforcement Cooperation† Coursework (Coursework Sample) Content: NameTutorSubjectDateSocial Media and Law Enforcement CooperationIn the current technological world, the investigation of crime has gone far beyond the traditional methods of crime investigation. Social media is now used by the law enforcement to help investigate cases, some of which have been successful and has led to the affirmation of justice. For instance, the use of social media in crime investigation has led to arrests of members of criminal gangs in some areas of the United States. Therefore, social media plays an important role in the modern criminal investigation. However, there are some requirements from both parties to ensure the success of investigation. Therefore, this paper discusses the social medias policy for law enforcement requests of five popular social sites. Name of site: FACEBOOKURL:  HYPERLINK "https://web.facebook.com/" https://web.facebook.com/Facebook is one of the largest social networking companies with over 1.44 billion active monthly u sers. Under their section Facebook and Law Enforcement, the company states that it works with the law enforcement community to help promote safety, both on and offline. By this, in case it receives an official request for an account records, the company first strives to establish the legitimacy of such request. By doing so, it helps protect the privacy of its subscribers. The law enforcement authorities are required to produce a valid subpoena that links the account to be investigated with a criminal activity. Such may include the name, credit card information and email addresses among others. A court order and search warrant are also required.On the other hand, the information handed over by Facebook in response to an official subpoena may include photographs, together with its details, people tagged in the photographs, wall posts, messages, post activities as well as contacts available in that account. Below is a copy of Facebooks policy for law enforcement:Information for Law Enf orcement AuthoritiesThese operational guidelines are for law enforcement officials seeking records from Facebook. For private party requests, including requests from civil litigants and criminal defendants, visit:  HYPERLINK "https://web.facebook.com/help/?page=1057" facebook.com/help/?page=1057. Users seeking information on their own accounts can access Facebooks Download Your Information feature from their account settings. See  HYPERLINK "https://web.facebook.com/help/?page=18830" facebook.com/help/?page=18830. This information may change at any time.These guidelines can also be  HYPERLINK "https://z-1-scontent-sin1-1.xx.fbcdn.net/hphotos-xfa1/l/t39.2178-6/851585_544247282309435_854704444_n.pdf" downloaded in their original English as a PDF.US Legal Process RequirementsWe disclose account records solely in accordance with our terms of service and applicable law, including the federal Stored Communications Act (SCA), 18 U.S.C. Sections 2701-2712. Under US law:A valid subp oena issued in connection with an official criminal investigation is required to compel the disclosure of basic subscriber records (defined in 18 U.S.C. Section 2703(c)(2)), which may include: name, length of service, credit card information, email address(es), and a recent login/logout IP address(es), if available.A court order issued under 18 U.S.C. Section 2703(d) is required to compel the disclosure of certain records or other information pertaining to the account, not including contents of communications, which may include message headers and IP addresses, in addition to the basic subscriber records identified above.A search warrant issued under the procedures described in the Federal Rules of Criminal Procedure or equivalent state warrant procedures upon a showing of probable cause is required to compel the disclosure of the stored contents of any account, which may include messages, photos, videos, wall posts, and location information.We interpret the national security letter provision as applied to Facebook to require the production of only 2 categories of information: name and length of service.International Legal Process RequirementsWe disclose account records solely in accordance with our terms of service and applicable law. A Mutual Legal Assistance Treaty request or letter rogatory may be required to compel the disclosure of the contents of an account. Further information can be found here:  HYPERLINK "/about/privacy/other" facebook.com/about/privacy/other.Account PreservationWe will take steps to preserve account records in connection with official criminal investigations for 90 days pending our receipt of formal legal process. You may expeditiously submit formal preservation requests through the Law Enforcement Online Request System at  HYPERLINK "/records" facebook.com/records, or by email, or mail as indicated below.Emergency RequestsIn responding to a matter involving imminent harm to a child or risk of death or serious physical injury to any person and requiring disclosure of information without delay, a law enforcement official may submit a request through the Law Enforcement Online Request System at  HYPERLINK "/records" facebook.com/records. Important note: We will not review or respond to messages sent to this email address by non-law enforcement officials. Users aware of an emergency situation should immediately and directly contact local law enforcement officials.Child Safety MattersWe report all apparent instances of child exploitation appearing on our site from anywhere in the world to the National Center for Missing and Exploited Children (NCMEC), including content drawn to our attention by government requests. NCMEC coordinates with the International Center for Missing and Exploited Children and law enforcement authorities from around the world. If a request relates to a child exploitation or safety matter, please specify those circumstances (and include relevant NCMEC report identifiers) in the requ est to ensure that we are able to address these matters expeditiously and effectively.Data Retention and AvailabilityWe will search for and disclose data that is specified with particularity in an appropriate form of legal process and which we are reasonably able to locate and retrieve. We do not retain data for law enforcement purposes unless we receive a valid preservation request before a user has deleted that content from our service.Details about data and account deletion can be found in our Data Use Policy  HYPERLINK "/policy.php" (facebook.com/policy.php), Statement of Rights and Responsibilities  HYPERLINK "/terms.php" (facebook.com/terms.php), and Help Center  HYPERLINK "/help/?faq=224562897555674" (facebook.com/help/?faq=224562897555674).Form of RequestsWe will be unable to process overly broad or vague requests. All requests must identify requested records with particularity and include the following:The name of the issuing authority, badge/ID number of responsib le agent, email address from a law-enforcement domain, and direct contact phone number.The email address, user ID number (/profile.php?id=1000000XXXXXXXX) or username (/username) of the Facebook profile.User ConsentIf a law enforcement official is seeking information about a Facebook user who has provided consent for the official to access or obtain the users account information, the user should be directed to obtain that information on their own from their account. For account content, such as messages, photos, videos and wall posts, users can access Facebooks Download Your Information feature from their account settings. See  HYPERLINK "/help/?page=18830" facebook.com/help/?page=18830. Users can also view recent IP addresses in their Account Settings under Security Settings/Active Sessions. Users do not have access to historical IP information without legal process.NotificationOur policy is to notify people who use our service of requests for their information prior to disclosu re unless we are prohibited by law from doing so or in exceptional circumstances, such as child exploitation cases, emergencies or when notice would be counterproductive. We will provide delayed notice upon expiration of a specific non-disclosure period in a court order and where we have a good faith belief that exceptional circumstances no longer exist and we are not otherwise prohibited by law from doing so. Law enforcement officials who believe that notification would jeopardize an investigation should obtain an appropriate court order or other appropriate process establishing that notice is prohibited. If your data request draws attention to an ongoing violation of our terms of use, we will take action to prevent further abuse, including actions that may notify the user that we are aware of their misconduct.TestimonyFacebook does not provide expert testimony support. In addition, Facebook records are self-authenticating pursuant to law and should not require the testimony of a r ecords custodian. If a special form of certification is required, please attach it to your records request.Cost ReimbursementWe may seek reimbursement for costs in responding to requests for information as provided by law. These fees apply on a per account basis. We may also charge additional fees for costs incurred in responding to unusual or burdensome requests.We may waive these fees in matters investigating potential harm to children, Facebook and our users, and emergency requests.Name of Site: INSTAGRAMURL:  HYPERLINK "/" / Instagram is one of the subsidiary social media sites owned by Facebook. It is a platform in which people communicate by sharing photos. Since it is owned by Facebook, its operational guidelines for law enforcement offi...

Sunday, May 17, 2020

Thomas Nast, Famous 19th Century Political Cartoonist

Thomas Nast is considered the father of modern political cartoons, and his satirical drawings are often credited with bringing down Boss Tweed, the notoriously corrupt leader of the New York City political machine in the 1870s. Besides his scathing political attacks, Nast is also largely responsible for our modern depiction of Santa Claus. And his work lives on today in political symbolism, as he is responsible for creating the symbol of the donkey to represent Democrats and the elephant to represent Republicans. Political cartoons had existed for decades before Nast began his career, but he elevated  political satire into an extremely  powerful and effective art form. And while Nast’s achievements are legendary, he is often criticized today for an intensely bigoted streak, especially in his depictions of Irish immigrants. As drawn by Nast, Irish arrivals to America’s shores were ape-faced characters, and there’s no obscuring the fact that Nast personally harbored a deep resentment toward Irish Catholics. Early Life of Thomas Nast Thomas Nast was born September 27, 1840, in Landau Germany. His father was a musician in a military band with strong political opinions, and he decided the family would be better off living in America. Arriving in New York City at the age of six, Nast first attended German language schools. Nast began to develop artistic skills in his youth  and aspired to be a painter. At the age of 15 he applied for a job as an illustrator at Frank Leslie’s Illustrated Newspaper, a very popular publication of the time. An editor told him to sketch a crowd scene, thinking the boy would be discouraged. Instead, Nast did such a remarkable job that he was hired. For the next few years he worked for Leslie’s. He traveled to Europe where he drew illustrations of Giuseppe Garibaldi, and returned to America just in time to sketch events around the first inauguration of Abraham Lincoln, in March 1861. Nast and the Civil War In 1862 Nast joined the staff of Harper’s Weekly, another very popular weekly publication. Nast began to portray Civil War scenes with great realism, using his artwork to consistently project a pro-Union attitude. A devoted follower of the Republican Party and President Lincoln, Nast, during some of the darkest times of the war, portrayed scenes of heroism, fortitude, and support for the soldiers on the home front. In one of his illustrations, â€Å"Santa Claus In Camp,† Nast portrayed the character of St. Nicholas dispensing gifts to Union soldiers. His depiction of Santa was very popular, and for years after the war Nast would draw an annual Santa cartoon. Modern illustrations  of Santa are  largely based on how Nast drew him. Nast is often credited with making serious contributions to the Union war effort. According to legend, Lincoln referred to him as an effective recruiter for the Army. And Nast’s attacks on General George McClellan’s attempt to unseat Lincoln in the election of 1864 was no doubt helpful to Lincoln’s reelection campaign. Following the war, Nast turned his pen against President Andrew Johnson and his policies of reconciliation with the South. Nast Attacked Boss Tweed In the years following the war the Tammany Hall political machine in New York City controlled the city government’s finances. And William M. â€Å"Boss† Tweed, leader of â€Å"The Ring,† became a constant target of Nast’s cartoons. Besides lampooning Tweed, Nast also gleefully attacked Tweed allies including the notorious robber barons, Jay Gould and his flamboyant partner Jim Fisk. Nast’s cartoons were astoundingly effective as they reduced Tweed and his cronies to figures of ridicule. And by portraying their misdeeds in cartoon form, Nast made their crimes, which included bribery, larceny, and extortion, understandable to nearly anyone. There is a legendary story that Tweed said he didn’t mind what the newspapers wrote about him, as he knew many of his constituents wouldn’t fully comprehend complicated news stories. But they could all understand the â€Å"damned pictures† showing him stealing bags of money. After Tweed was convicted and escaped from jail, he fled to Spain. The American consul provided a likeness which helped to find and capture him: a cartoon by Nast. Bigotry and Controversy An enduring criticism of Nast’s cartooning was that it perpetuated and spread ugly ethnic stereotypes. Looking at the cartoons today, there is no doubt that depictions of some groups, particularly Irish Americans, are vicious. Nast seemed to have had a deep distrust of the Irish, and he was certainly not alone in believing that Irish immigrants could never fully assimilate into American society. As an immigrant himself, he was obviously not opposed to all new arrivals in America. Later Life of Thomas Nast In the late 1870s Nast seemed to hit his peak as a cartoonist. He had played a role in taking down Boss Tweed. And his cartoons depicting Democrats as donkeys in 1874 and Republicans as elephants in 1877 would became so popular that we still use the symbols today. By 1880 Nast’s artwork was in decline. New editors at Harper’s Weekly sought to control him editorially. And changes in printing technology, as well as increased competition from more newspapers that could print cartoons, presented challenges. In 1892 Nast launched his own magazine, but it was not successful. He faced financial difficulties when he secured, through the intercession of Theodore Roosevelt, a federal post as a consular official in Ecuador. He arrived in the South American country in July 1902, but contracted yellow fever and died on December 7, 1902, at the age of 62. Nast’s artwork has endured, and he considered one of the great American illustrators of the 19th century.

Wednesday, May 6, 2020

The Between Western Languages And Western Cultures

Literature, and particularly drama, is an important medium in which cultures express their own concepts of time, through the use of different narrative forms, such as myths, history, realistic or naturalistic novels. As Ricoeur maintains, it is evident that no culture can refer back to its own conception of time without having resort to the vital narrative activity which, linguistically, is expressed in an immense variety of stories , i.e. of narrative discourse (18). That is, oral traditions of many cultures could reveal the particular time concepts of each culture. It is true, however, that Western cultures tend to measure other societies against their own concepts of time, which, as Aguessy maintains, are measured solely in terms of industrialization( Ricoeur 19). The West also assumes that most cultures went through the same process of rationalization on the path to modernity. In addition, Western languages are different in the sense that they make no distinction, for example, between God and the demiurge who watches over the material and spiritual universe(Ricoeur 21). It will thus be worthwhile to note how different cultures and religious backgrounds recreate the concept of time in their writings, and how in many instances the colonized and the colonizer have diverse readings of the concept of time. Western and Arab thought have been greatly influenced by values from the Bible and Koran, respectively. The advent of Christianity , for example, hasShow MoreRelatedInfluence Of Western Culture1186 Words   |  5 Pages WESTERN CULTURES SHOULD/SHOULD NOT DOMINATE AND INFLUENCE OTHER CULTURES IN A GLOBALIZED WORLD (Name) (Course) (Date) Globalization is in most cases seen as global Westernization with the Western culture seeking to dominate the world. Globalization is the acceleration and intensification of the economic interactions between governments, companies, and individuals of a different culture. The Western culture played a paramount role in promoting globalization and democracy acrossRead MoreMusic Integration : Balance Between Western Music Culture And Other Music Cultures Essay1496 Words   |  6 PagesIntegration: Balance between western music culture and other music cultures Introduction Nowadays, with the development of the transportation and network, people can be easily exposed to different cultures from all over the world. It leads to a problem that how to set some criterions when different cultures has their own ways to measure. The culture also includes music culture. Michael B. Bakan states in his book that the term music is inescapably tied to Western culture and its assumptionsRead MoreObserved From The Standpoint Within Western Culture, It1393 Words   |  6 PagesObserved from the standpoint within Western Culture, it can be a challenge to fully step out of the context of it to gain an outside perspective. Nevertheless, it appears as a necessary aspect to question what is culture and what is not, to therefore get a clearer understanding of what we are as humans. Western Culture can arguably be considered one of the most influential cultures to the rest of the world, and is embedded deeply in the globalization movement of the world. It is not a surp rise toRead MoreThe Mega Marketing Of Depression1480 Words   |  6 Pageswellbeing are not constant across the spectrum of human cultures; individuals’ experiences of emotions and happiness are as as varied and diverse as the cultures which they exist in. A person’s experience of happiness is defined by the culture’s language and driven by expectations that are both artificially created and rooted in cultural tradition. In his essay â€Å"The Mega Marketing of depression in Japan†, Ethan Watters explores the relationship between cultural expectations and the experience of happinessRead MoreAnalysis Of Arundhati Roy s The God Of Small Things 1574 Words   |  7 PagesThe relationship between language and resistance in Arundhati Roy’s The God of Small Things, is a site of continuous contest and struggle. Roy assumes a position within Western discourse to communicate her ideas, all the while challenging and rejecting the very structure she inhabit s. Through her writing, rather than seeking to enter the canon of postcolonial literature, Roy strives to redefine it. Throughout the narrative, she subverts the rules and boundaries of language, internally pursuing aRead MoreThe Spirit Catches You And You Fall Down A Hmong Child1586 Words   |  7 PagesIn the novel, The Spirit Catches You and You Fall Down A Hmong Child, Her American Doctors, and the Collision of Two Cultures, Anne Fadiman exposes the clash between the Hmong culture and Western medicine, in addition to the lack of communication and language. Fadiman uses Lia Lee, a Hmong epileptic girl, as a symbol of cultural dissonance and reveals the effects of how a language barrier can have in the health care system. It is believed that all Hmong people have many souls within them and if theyRead MoreWestern Culture And Indian Culture1604 Words   |  7 Pagesdominant cultures that infiltrate their ascendancy into many of the world’s countries in a conscious and subc onscious manner. An example of this cultural dominance can be seen in the bidirectional influence that Western Culture and the Indian culture portray onto one another. The cultures of the Western world and India in particular are alike one another on the basis that they are both economically established and are full of vibrant social societies. There is an idealized belief that the Western worldRead MoreServing The Purpose Of Education885 Words   |  4 Pagesare indigenous people of the Inupiat. Western education was thrust upon the Inupiat people of Alaska, changing the traditional way they taught their children. Okakok explains why and how The Board of Education for North Slope, Alaska took entire control of their education system after having Western education try to influence their way of teaching. The way the Inupiat teach is different from that of Western education, not only do they teach a different language (Inupiaq), they also need to teach aRead MoreCultural Norms And Pr actices Are Shaped And Practiced Over The Years Essay1491 Words   |  6 PagesAccording to Baffoe, â€Å"culture is the totality of the way of life of a group of people that has been developed, shaped and practiced over the years. The development of these cultural norms and practices are shaped by the environment and the needs of the people† (Baffoe 2005). As traditional societies develop as a result of modernization, the original indigenous practices of the community begin to disappear, and are replaced by ideas from more developed Western countries. Culture is forever changingRead MoreA Brief Note On Business Negotiator And International Business Managerial975 Words   |  4 Pagesand international business managerial. The objectives of this literature are: †¢ Identify the strategies and tactics for different ways of arguing †¢ Identify how culture influences the ways of arguing †¢ Evaluate the effectiveness of ways of arguing at different cultures †¢ Identify the interaction of the two strategies when different cultures meet In this literature, most of the literature collected is through online platforms, such as UWE online library and Google Scholar while hardcopy books that were

Contagious Disease

Question: Compare and contrast provision against contagious diseases in the nineteenth and twenty first centuries? Answer: Contagious disease Introduction: Contagious disease is described as infections which could be transferred from one person to another by direct contact. Contagious disease are still considered to be the major killing agents in the world and the situation has worsened with tuberculosis, malaria, HIV and now recently Ebola taking a huge toll on mankind. These are more apparent in developing world where the sheer survival in early childhood is again a major challenge to the question of survivability as acute respiratory diseases and diarrhoea accounting for close to six million young lives every year. While individuals falling sick require the medical expertise to survive the odd against these communicable diseases, its the assessment of cause and controlling measures that will help the community to fight against these diseases effectively. Background information of contagious disease Any contagious disease could either be epidemic or endemic. The epidemic forms usually are seasonal and most of the time any new form of contagious diseases are epidemic, whereas endemic forms are generally restricted to any geographical forms. The learning process of disease is a long complicated time consuming method where any new epidemic needs to be understood from its category, vectors involved and incubation period. The disease unless understood from factors cannot be controlled from spreading, and then eradicated properly (Ludwig, 2005).. Epidemiology is concerned with the community science where the common characteristics of a disease is compared with other relative ones and analysed. With every passing day the same bacterias and virus that could be killed or restrained with antibiotics are now getting stronger and stronger by mutating. The same virulent now could survive in multiple hosts and that makes the task even more complicated for mankind to survive in this ever changing scenario. Various factors both natural and artificial have influenced the manner in which these diseases have spread and became potent killers even in modern times. The nutrition pattern, diet, the general hygiene conditions, the health systems and overall medical advances along with perceptions have all contributed to both spreading and restricting into new segments of society. During the colonial period most of the causes of death were basically the infectious diseases and if there was any change in the rate of mortality it was only because The mode of transmission Immunity to disease Other methods were of course treatment of disease Aim of learning about contagious disease The main aim of learning about contagious disease is to prevent transmission and reduce the level of infection. The precautionary measures one has to undertake are flu vaccination, pre departure TB test and followed by re test after 12 weeks. The mode of transmission is another vital bit of information which is essential to reduce and finally stop the spreading of disease. Proper quarantine methods are also essential to eradicate the contagious disease from a geographical area or community. Limitations The spreading and infection depended completely on how these bacterias and virus survived in a particular weather pattern along with how well the spreading is restricted. The low death rates in New England were due to quarantine measures and laws which generally reduced the spread of the disease (Bashford, 2006). The higher death rates in south were mainly due to suitable weather patterns for these microbes to survive apart from no or minimal quarantine measures. Density of population, sanitation, nutritional intake all combine together how good a epidemic could be contained. These increase in infectious diseases affected negatively the children and their nutritional status. The nutritional deficiency resulted in deficit growth and development. Reduction in average weight and height of children Class difference resulted in difference in growth pattern as well Infection and contagious disease also resulted in higher casualty during war The wide spread use of antibiotics have made the medicines ineffective against the new strains of microbes. Humankind have become susceptible to new variants of disease which are either spread through animals, birds, body fluids, apart from the normal route of direct contact. Non availability of drugs, resistance to drugs, new entrants of vectors and wide spread use of medicines have led to a situation of emergency in many countries to fight against super bugs. Thesis statement Contagious disease is here to stay and the mutating microbes could become the greatest risk factor for the survival of the entire human kind. Vaccination historical background The term vaccine is basically a Latin word derivation which means cow prevented a disease. As vacca means cow and as cowpox prevented the spread of small pox (Ludwig, 2005). The vaccine era began in 1774 when Benjamin Jesty showed the immunity to small pox. This person had cowpox and later on inocoluted his wife and sons. Almost 22 years later Edward Jenner published his work and mouse pox virus replaced cowpox in the vacine. It was noticed that the vaccine lost its potency when it went through serial human testing and the virus mutated when it passed from human to another and was no longer immunogenic. Contagious disease summary Measles Category : Measles is caused by the measles virus Vectors : Humans are the natural hosts of the virus; no other animal reservoirs are known to exist. Measles is an endemic disease and many people have developed immunity Statistics : WHO in 2011 estimated that there were about 158,000 deaths caused by measles down from 630000 in 1990 Vaccinition : MMR vaccine is given to children to immunizeagainst measles at 12 months Symptoms : Fever, Dry cough, Runny nose, Sore throat, Inflamed eyes or conjunctivitis, Tiny white spots with bluish-white centers, skin rash Historical background : It was known even during 165 AD and was known as plague of Galen. Responsible for the many deaths in Inca civilization, and in between 1855 and 2005 it is estimated to have killed 200 million people worldwide Influenza Category : It is caused by the influenza virus Vectors : Animals birds human contact. By direct transmission, airbourne transmission, and through hand to hand, hand to nose, hand to mouth and contaminated surfaces Statistics :The disease kills between 2 and 20% of those who are infected. The first influenza virus was isolated in 1901 from poultry. Vaccinition :Influenza vaccin Symptoms :Fever or feeling feverish/chills, Cough, Sore throat, Runny or stuffy nose, Muscle or body aches, Headaches, Fatigue Historical background :The human influenza were present 2400 years ago. The disease was first described in 1703 by J. Hugger of the University of Edinburgh. Tuberculosis Category : Tuberculosis is caused by Mycobacteria Vectors : Human, cattle and deer Statistics : Almost one-third of the world's population has been infected with tuberculosis with new infections occurring in about 1% of the population each year. Tuberculosis is the second-most common cause of death from infectious disease after HIV / AIDS Vaccination : BCG Symptoms : Coughing that lasts three or more weeks,Coughing up blood, Chest pain, or pain with breathing or coughing, Unintentional weight loss. Fatigue, Fever, Night sweats, Chills. Historical background : Tuberculosis has been present in humans since ancient times. The first evidence of the disease is found in the remains of bison in Wyoming dated to around 17,000 years ago. Cholera Category : Intestinal bacterial infection Vectors : Human waste, drinking water, food Statistics :The first cholera pandemic occurred in the Bengal region of India starting in 1817 through 1824. The disease has killed tens of millions of people in 19th century Vaccination : Oral vaccination Symptoms :Rapid heart rate, Loss of skin elasticity, dry mucous membranes, low blood pressure, Thirst, Muscle cramps. Historical background :Cholera has originated in India and was prevalent in the Ganges delta since ancient times. Small pox Category : caused by virus Vectors : Transmission occurs mainly by inhalation of airborne variola virus, mostly by droplets from the oral, nasal, or pharyngeal mucosa of an infected person. Statistics : The disease, for which no effective treatment was ever developed, killed as many as 30% of those infected. In the early 1950s an estimated 50 million cases of smallpox occurred in the world each year, a figure which fell toaround 10 15 million by 1967 because of vaccination Vaccination : within three days of exposure and smallpox vaccine is a live virus preparation given to patient using bifurcated needle. Symptoms Historical background : Originated in ancient India at around 1500 BC Comparison of contagious disease in 19th and 21st century Similarities Contagious disease 19th century Contagious disease 21stcentury New strains of virus and bacteria New mutated strains of virus and bacteria Virus and bacteria thrived due to non-availability of vaccines and effective drugs Virus and bacteria thrives due to over use of drugs and antibiotics Virus and bacteria transferred from animals into humans Virus and bacteria can now survive in both human and animal Animals served as reservoir of virus and bacteria Virus and bacteria can now survive in dual host easily Malaria, TB and other contagious disease could not be controlled effectively The malaria, tuberculosis and other infectious diseases remain enormous global problems Casual approach of community against contagious disease Careless attitude of communities encourages contagious disease spreading Difference Contagious disease 19th century Contagious disease 21st century Vaccines and drugs were not effective against most disease Vaccines and drugs are developed to effectively reduce the infection level Research time for any infection detection was more Faster research time and development of drugs Preventive measures against contagious disease were not effective Better enhanced preventive measures against contagious disease Government contribution for research work Private and Government partnering against contagious disease research work Selective cooperation between countries Better and enhanced country to country and research units across the globe Conclusion: Use of vaccine in limited amount of drugs against microbes in controlled manner can control and reduce the threat to humankind. The advent of over usage and uncontrolled use of drugs caused mutations of these microbes and hence has led to a situation where people are more susceptible to disease (Easterlin, 2009). The change in life style, food intake and living conditions have increased the threat level of microbe invasion even more than what it was in early 19th century. The strains are more powerful and immune to drugs. The advent of super bug has now taken the challenge of microbe led war against humankind to a new level. References: 1. Nutbeam, D. (2000). Health literacy as a public health goal: a challenge for contemporary health education and communication strategies into the 21st century.Health promotion international, 15(3), 259-267.2. Olshansky, S. J., Passaro, D. J., Hershow, R. C., Layden, J., Carnes, B. A., Brody, J., ... Ludwig, D. S. (2005). A potential decline in life expectancy in the United States in the 21st century.New England Journal of Medicine,352(11), 1138-1145.3. Tulchinsky, T. H., Varavikova, E. A. (2014).The new public health: an introduction for the 21st century. Academic Press.4. Sclar, E. D., Garau, P., Carolini, G. (2005). The 21st century health challenge of slums and cities.The Lancet, 365(9462), 901-903.5. Bashford, A. (2006).Medicine at the border: disease, globalization and security, 1850 to the present. Palgrave Macmillan.6. Easterlin, R. A. (2009).Growth triumphant: the twenty-first century in historical perspective. University of Michigan Press.7. Barnett, T. P. (2005).The Pe ntagon's new map: War and peace in the twenty-first century. Penguin.8. Arnold, D. (1993).Colonizing the body: State medicine and epidemic disease in nineteenth-century India. Univ of California Press.9. Abraham, T. (2007).Twenty-first century plague: the story of SARS. JHU Press.10. Aginam, O. (2002). International law and communicable diseases.Bulletin of the World Health Organization, 80(12), 946-951.11. Hess, G. R. (1994). Conservation corridors and contagious disease: a cautionary note.Conservation Biology, 8(1), 256-262.12. Fischer, J. R., Stallknecht, D. E., Luttrell, P., Dhondt, A. A., Converse, K. A. (1997). Mycoplasmal conjunctivitis in wild songbirds: the spread of a new contagious disease in a mobile host population.Emerging infectious diseases,3(1), 69.