Water An overlooked essential nutrient

Water  is  the  most  important  entity  of  nature. It can  be  considered  that  its  one  of  natures  greatest  gifts  to  mankind. Water  makes  up  about  75  percent  of  the  surface  of  the  earth. It also  makes  up  more  than  two  thirds  of  the  weight  of  the  human  body, and  without  it, we would  not  be  able  to  survive  beyond  a  few  days. The  human  brain  is  made  up  of  95  water, blood  is  82  and lungs  90. This  water  content  of  the  body  is  maintained  by  constant  replenishing  of  the  water  that  is  lost  by  way  of  sweat  or  from  the  lungs. Even  a  2  drop  in  the  total  content  of  the  water  in  our  body  can  trigger  dehydration.

This  type  of  dehydration  may   be  considered  of  a  mild  type. Mild  dehydration  is  also  one  of  the  most common  causes  of  daytime  fatigue. An  estimated  seventy  five  percent  of  Americans  have  mild, chronic  dehydration. This  can  be  considered  a  pretty  scary  statistic  for  a  developed country  where  water  is  readily  available  through  the  tap  or  bottle. In  under  developed  countries  where  clean  drinking  water  is  not  so  readily  available, dehydration  is  a  common  medical  problem  faced  by  almost  every  individual.

Water  is  important  to  the  mechanics  and  proper  functioning  of  the  human  body. The  body  cannot  function  correctly  without  it. In  fact, all  the  bodily  functions  at  cellular  level    and  organ  level   made  up  in  our  entire  anatomy  and  physiology  depend  on  water  for their  functioning. Water  serves  as  a  lubricant It  forms  the  base  for  saliva, the  fluids  that surround  the  joints. Water  also  regulates  the  body  temperature, as  the  cooling  and  heating is  distributed  through  perspiration. This  helps  to  keep  the  normal  body  temperature  at  a  constant  level. Water  helps  to  alleviate  constipation  by  moving  food  through  the  intestinal tract  and  thereby  eliminating  waste. And  hence  acts  as  a  very  good  detoxifying  agent. It  helps  to  regulate  a  healthy  metabolism  and  plays  a  vital  role  in  nearly  every  bodily process. Water  is  essential  for  proper  digestion  and  circulation, numerous  chemical reactions, nutrient  absorption, waste  elimination  and  flexibility  of  the  blood  vessels. It regulates  body  temperature  and  benefits  the  skin  by  acting  as  an  internal  moisturizer, keeping  the  skin  moist, supple  and  clear, as  well  as  preventing  premature  aging  due  to toxic  buildup. Water  is  extremely  important  as  far  as  the  liver  and  the  basic  well  being  of  a  person  goes. You  can  live  40  days  without  food  but  only  about  3  days  without  water

In  addition  to  all  these  key  roles  water  plays  a  vital  role  in  the  daily  maintenance  of  our  bodies, water  also  plays  a  key  role  in  the  prevention  of  disease. Drinking  eight  glasses  of  water daily  can  decrease  the  risk  of   colon  cancer  by  45, bladder  cancer  by  50  and  it  can potentially  even  reduce  the  risk  of  breast  cancer.              

One  can  give  many  such  examples. Water  can  also aid  in  the  prevention  and  cure  of  many  other  types  of  diseases, ailments and  disorders  that  affect  the  many  systems  of  our  bodies. Most  diseases  like  cough, fever  etc.. need  water  to  be  controlled  and  for restoration  to  normal  health. The  most  important  advantage  about  water  is  that  its  abundantly  available, affordable  as  its  cheap  and  freely  available  to  everybody.

 Water can be without the company of humans but  we as humans can only be without water for a few days.

Though  water  is  recommended  and  naturally  your  bodys  favorite  liquid, Gatorade  is  also enjoyed  by  many  people. Due  to  its  flavored  taste  it  has  become  a  favorite  habit  among  people  to  drink  energy  drinks  like  Gatorade  or  Powerade  when  they  are  feeling  tired  and  dehydrated. People  who  are  physically  more  active  might  prefer  these  energy  drinks  more  than  water  to  stay  better  hydrated. Gatorade  provides  about  half  the  calories  of  an identical  serving  size  of  fruit  juice  or  soft  drink. By  U.S.  FDA  standards, an  eight  ounce serving  of  Gatorade  is  a  low-sodium  food. Gatorade  has  110  mg  of  sodium, the  same  as an  eight-ounce  glass  of  milk  or  one  slice  of  bread. These  types  of  energy  drinks  are  good  to  an  extent  if  you  are  exercising  for  more  than  an  hour  daily  but  for general  types  of  exercises  lasting  less  than  one  hour, water  is  still  the  best  sports  drink  around. The  nutrient  you  most  need  to  replace  during  and  after  these  types  of  workouts  is  water.

It  is  important  and  interesting  to  note  that  the  people  who  dont  need  the  products  like  energy  drinks  may  actually  be  causing  more  harm  to  their  body  than  good  by  consuming  these, particularly  those  with  heart  disease, high  blood  pressure, or  other respiratory  problems. These  should  be  consumed  with  great  caution  among  the  elderly.                                                                        

The  energy  drinks  we  are  aware  of, contain  a  high  amount  of  carbohydrates  or  in  other  words  sugars. These  sugars  if  not  required  by  the  body, which  is  true  in  most  cases, becomes  harmful. The  sodium  that  is  contained  in these  drinks  may  actually  cause  the  person  to  consume  more  than  the  recommended  dose  of  sodium  per  day, which again  is  not  desirable. One  more  disadvantage  that  one  may  tend  to  ignore  about  the  energy  drinks  is  the  fact  that  these  drinks  cause  the  sugar  level  in  the  mouth  to  go  up  and  facilitate  growth  of   bacteria  known  to  cause  tooth  decay. Water  on  the  other  hand  has  a  cleansing  effect  on  the  oral  cavity  and  hence  actually  may  prevent  tooth  decay. This  is  a small  but  very  important  advantage  of  water  over  any  health  drink  we  may  consume.

We  cannot  deny  the  fact  that  these  health  drinks  or  energy  drinks  are  beneficial,  but  anything  that  one  tends  to  put  into  the  body  is  useful  only  if  the  body  needs  it  or  else  its  useless  or  may  even  be  harmful. For  people  who  exercise  regularly  for  an  hour  or  more, these  energy  drinks  may  be  beneficial  during  the  exercise  regime, but  otherwise  plain  water  is  best  for  everyone, as  now  we  know  this  is  one  nutrient  we  cannot  afford  having  a  deficiency  for  in  our  bodies. Rather  than  believing  the  various  marketing  gimmicks  we  should  ourselves  judge  if  we  really  need  these  energy  drinks  or  are  we  just  following  a  fad.

WaterGatoradePowerAdeAdvantages-easily  available
-no  calories
-cleansing  effect  on  oral  cavity
-required  by  the  body  under  all  conditions.
-maintains  normal  body  functions.-provides  instant  energy  during  heavy  exercise.-provides  instant  energy  during  heavy  exercise.disadvantages-purity  should  be  checked.
- no  proven  disorder  caused  by  excessive  consumption.-may  not be easily  available.
-high in calories.
-required  by  the  body  only  in  cases  of  heavy  exercises.
-excessive  consumption.   may  cause  tooth  decay and  other  health  related  problems.-may  not  be  easily  available.
-required  by  the  body  only  in  cases  of  heavy  exercises.
-excessive  consumption  may  cause  tooth  decay  due  to  high  sugar  content.Nutrient value-provides  the  daily  requirement  of  fluids.-450mglit sodium (approx.)
-high carbohydrate content.-225mglit sodium (approx.)
- approx. 78 calories per 8fl oz.Cost-Almost  negligible as  compared  to  energy  drinks, mostly  freely  available.

0.03 per gallon.- approx. 4  for  a  24 oz bottle.- comparable  to  Gatorade.

Daily recommendations
And safety levels-daily 100 ounces of  water  required  by  the  body  for  normal  functioning.
- can  be  freely  given  to  all  including  children  and  elderly.-No  daily  recommendations  known.
-must  be  given  with  caution  to  children  and  elderly.-No  daily  recommendations  known.
-must  be  given  with  caution  to  children  and  elderly.

Five resources needed for the survival of the global population

The global population is no doubt on the increase and so is the increase in the demand for resource to sustain this growth. Just like before there are basic human need that must be available for the ultimate survival of mankind. It is however to be noted that due to the civilization and globalization concepts adopted in the modern society, there education and technology are evidently becoming basic requirements for human survival (Dority, 1993). This paper gives a discussion on the basic human requirements and the consequences of limitation of such in the society. These resources are food and water, shelter, clothing, education and technological advancements.

Food and water is the basic fuel that keeps the human body healthy and productive. It has been evidently established that the human body does not only need food but a balanced food for its efficient functioning (Marks, 2007). Available statistics have shown clearly lack of food and water in most parts of the world is a major cause of deaths and poor health. Therefore, failure in ensuring sustainable food production and water supply, and just distribution of such can greatly compromise the survival ability of many in the global community (Matson, 2009). It is thus a great concern across the varied stakeholders of the global community that the question of sustainable food security should be sufficiently addressed. It is indeed due to the importance of food and water as a resource for sustaining the ever growing global population that many attempts are being made to mitigate the problem of global worming and its associated climatic changes to enhance food production and water supply capacity (Matson, 2009). Such have also been the main reason behind the many research activities seeking to produce more productive and climate resistant organisms.

The second resource is shelter. It is not only the right of every individual to live a healthy life but also live it in a safe and reliable environment. It is the shelter which guarantees the human body protects form external poor climatic influence (Marks, 2007). Still, the availability of reliable shelter ensures the sufficient rest by individuals. It is here to be noted that sufficient sleep and sense of security are quite crucial in ensuring the optimized productivity in the community (Marks, 2007). Also clear is that security from both internal and external threats is a vital requirement of the human community. This necessitates the availability of shelter as it serves to ensure the sustainable protection of the individuals mainly from external threats. There lack of sufficient shelter for the ever growing global population will not only compromise the global production potential but also compromise the efforts to ensure sufficiently reliable security to all in the society.

Another basic resource is clothing. Since the dawn of civilization across the globe, wearing of clothes has become a basic requirement for all in the society. It is based on this reasoning that any potential limitation in the availability of cloth products in the society is seen as a major threat to the sustainable survival of the global population (Marks, 2007). Still to be stated here is the concept of globalization and its concern for unification of the global market. It is to be noted here that the global job market and culture is evidently emerging into a single culture which is marked with white collar fashion of clothing. All these are making demand for clothing high thus any limitation of this resource could greatly compromise the harmonious and successful coexistence and survival of the global society (Marks, 2007). This is because it will negate the purposed of both globalization and civilization.

Still to be noted is that education is a basic human requirement in the modern human society (Dority, 1993). The global community is evidently becoming more qualification oriented than ever before. This has made the provision of quality and globally compatible education by members of the society quite important for ensuring their sustainable survival in the community (Dority, 1993). It is here to be noted that it is due to the importance that education has in the society that the international community has and still strives to realize the Education for All initiative by the United Nations. The levels of technical advancements in the modern society call for skill and reliable professional qualification if any sustainable production is to be realized (Dority, 1993). It is indeed due to this reason that any limitation or compromise on education both in availability to the members of the global community as well as in quality could greatly threaten the potential sustainable survival of the global population.

Lastly is the question of technological advancement as a basic resource for the ultimate survival of the ever growing global population. It is evidently clear that humankind is more and more becoming dependent on technological advancements for executing his day to day activities (Dority, 1993). Still, it is clear that most of the modern generation has less physical experience on the survival techniques used by our ancestors. It is due to this reason that any potential failure or limitation in technology in the global society will not only compromise the economic stability of the globe but much deters any chances of surviving by the young generations which are highly dependent of such for survival (Dority, 1993).

In conclusion, the ultimate successful survival of the ever increasing global population greatly relies on the availability of the basic human need such as food, shelter and clothing. However, due to the increasing civilization and globalization concerns, the availability of education and technology has a great role to play in the community. Limitation of all these resources will lead to compromised living or elimination by the rules of nature of the human community to match available resources.

Multiple sclerosis

The term demyelinating disease is used to refer to a condition which causes damage to the myelin sheath that surround the nerves present in the central nervous system. The overall result for the damage is that, the nerve impulses slow down and eventually stop being functional. For this particular essay, we shall focus on Multiple Sclerosis (MS) which is most common type of a demyelinating disease.

Multiple sclerosis manifests itself when the immune system attacks both the myelin sheath and the cells that produce and maintain myelin sheath. Due to this, there are multiple areas of sclerosis in the brain which may eventually slow or stop nerve signals.

Common symptoms associated with multiple sclerosis include muscle weakness, poor coordination and memory failure. Other symptoms associated with the disease include urinary urgency and incontinence, blurred, double vision and impairment in terms taste and smell. The exact cause of the disease has not been ascertained but surveys indicate that the disease is hereditary. Both infectious and non-infectious environmental factors have also been associated with MS. Genetic susceptibility is also a common cause of the disease (MedicineHealth.com, 2010).

The disease is more prevalent in women than in men and often presents itself between the age of 20 and 40 but most of the onset signs present themselves at the age of 34. It is difficult to diagnose because its symptoms resemble those of other medical problems. Initially, medics were using both Schumacher and Poser criteria but they later shifted to the McDonald criteria (MedicineHealth.com, 2010). However, it is now simple in that, a follow up of clinical data for those who may have neurologic symptoms is normally sufficient to diagnose MS.

Currently, there is no known cure for MS but some therapies have proven to be of much help. Also some medical treatments are necessary in the management of MS but they often have adverse effects on ones mobility, energy level and eating habits. Patients have also shifted to the use of alternative treatments though scientific study does not back there use.

Research paper on system analysis

Abstract
A good education system is usually very important in any country. The education systems that exist are the backbone of any country. With a good education system, it is possible that a country will be able to grow economically, socially, politically and in all other areas. Its through education that social revolution is made possible. It is also though schooling that children are able to find their careers. This is because the most essential purpose of school is to make young people be in a position to understand themselves and their environment. It is also in school that a child gets to understand their potential in life. Education should allow the talent in a child to grow. An education system should instil value to children. The values should ensure that each and every profession is respected. This will help the society to have morals that can assist it to grow. A society with morals has people who respect each other.

Introduction
Due to the increasing number of people in the modern world, many countries have employed various education systems. Most of these systems are designed to fit those who want to learn. This paper will look at the internet as an education system. In addition, the computer system of learning will also be looked at.
The computer system of learning is the system of learning whereby the internet acts as the source of information. A person learns through the internet. Mostly, it is referred to as an online system. This system has developed as the world has grown in technology. In this system, one does not need to go to class but just sit by the computer and learn. This has been brought about by the age technological development. This system of education has gained fame. In this system, a person can pace hisher learning as the training is through the computer. This learning system is also sometimes known as web based training. All the assessments are done through the online software.

The paper will also look at the two theories that have come up in analysing the use of the internet as a system of study. The theories are the traditional theory and the modern theory.

The paper will also look at the relationship that exists between the process of system analysis and system design. These are two processes that are important in the development of a new system. I will look at their relationship in the process of developing a new system.

Education System Analysis (Internet)
There are two different theories that have come up trying to analyze the use of the internet as a mould of learning. One is the traditional theory which explains that the use of computers hinder a teacher from transferring all hisher skills on the internet. The theory also holds that it is not the best method of learning as it is not possible to have individual students feedback. The students are not also serious as they know that no one is going to question them. That means that there is no academic honesty in the students. There is usually no one between the instructor and the students. There is also lack of development of values as could be in a classroom situation. This is because there is no coming together of the student to share different skills or life experiences. The internet may also offer other information which may hinder a student from concentrating on studying. (Kramer 2002)

On the other hand, another modern theory supports the online system of education. It holds that the internet has given an alternative mode of study as not everybody is in a position to join higher institutions of learning. It also helps those students who are working as they can have time to work and at the same time do their studies. This is not possible in the institutional system of education. Also in institutions where students are many, one may not adapt well to the pace of study. This can be solved through the use of the internet as one can study at herhis own pace. (Moran 2000)

Both schools of thought have their own arguments which are valid. The only best way is the overall system of education to be inclusive so that it can be in a much better position to cater for the needs of the students as people have different needs.

System Analysis and System Design
People create systems so that they can be able to have their problems solved. Systems are designed in a way that they are able to address problems. A system consists of input, output and the process. All these are related. Systems which people come up with include economic systems, educational systems etc. (Laudon 2000)

System analysis comes after a new system has been developed. This is where the system which exists is studied and recommendations are made for designing another new system. The inside and outside operations of that system are studied during the system analysis. There are various data collection tools that are used e.g. available files, interviews etc. In system analysis, all the processes which are of the whole system are subdivided. The following are the main points which are put into consideration when doing data analysis. One is the intention of the new system depending on what the user of the system will require of it and the functions of the system. (Daniel 2003)

The new system must be designed in accordance with the stipulations of those who will be using it. The process of system designing is the most important stage in system development. The first stage of system designing is where the characteristics of the new system are elaborated. The cost and the benefits of the features are projected. If the system is found to be of benefit, then the next phase which incorporates the system structures is developed. There are tools used for system designing e.g. flowchart, data dictionary etc. (Daniel 2003)
                           
Conclusion
As can be deduced from the paper, a system always needs improvement. No system is 100 effective as there is always room for improvement. This is where the analysis of the current system becomes very important as it is with this analysis that the designing of the new system will depend. For example, if there are loopholes in an education system, its after the analysis that the designers will be in a position to know how they can seal the loopholes.

Then there is need for allowance of coexistence between different systems. There are people who may be in a position to use the new system but others may not be in a position to do so. That is why there arises a need to put much consideration when designing a new system. The benefit that a new system brings should also be analyzed critically with relation to the cost to prevent designing a system that has a very high input as compared to the output.

Cyber Terrorism and Information Warfare

Cyber terrorism and information warfare also known as cyber warfare are todays fastest growing threat around the world. As information technology continues to advance, different ways are being formulated on how to utilize the new technology for different purposes. Individuals, businesses and nations are today faced with greater threats emanating from cyber terrorism and cyber warfare of information growth today. Having knowledge on the constituents and effects of cyber terrorism and cyber warfare on individuals, communities, statescities or a country is a major step in formulating ways to prevent their occurrence.

Introduction
Cyber or information warfare and cyber terrorism are some of the fastest growing technological threats today around the world. While these two concepts relates to the use of computers and information technology, their application, purpose andor intentions are very different and so are their economic value. They also vary in their definitions and usage. Cyber warfare or information warfare basically refers to the use of computers and internet services with an aim of conducting warfare acts against different websites andor internet groups. This may include distributing propaganda, defacing websites, denial of service attacks distribution and collecting classified data using the internet among other warfare acts. This differs from cyber terrorism which refers to politically motivated and premeditated attacks on information, computer programs, computer systems, as well as data which in turn leads to violence being perpetrated against noncombatant targets by clandestine agents or sub-national groups. Cyber terrorism affects not only the systems using the cyber but it can also entail physical hardware attacks making up the systems of a computer. While there are two different concepts, cyber terrorism and cyber warfare have some similarities as well (Brenner, 2006).
This paper will begin by giving an in-depth analysis of cyber warfare or information warfare and cyber terrorism concepts. The second part will deal with the similarities and differences between cyber warfare and cyber terrorism.

Information warfare and cyber terrorism
Cyber terrorism is in real sense a subset of cyber warfare mainly because it employs cyber warfare weapons. However, to understand the differences and similarities of cyber terrorism and cyber warfare, it is essential to note the differences between terrorism and warfare, their motivations and their manifestations. Terrorism refers to the acts committed for either economic or political motives. In most cases, crime is usually committed so as to gain economically. However, terrorism may be committed not purely for economic gains but for some particular political goals. Terrorism unlike warfare which does not aim at civilians has the intention of demoralizing civilians and this is usually accomplished in the physical or real threat. It is exhibited via property destruction and killing of the civilian population with an aim of sending a political message to a government like was the case of the September 11 attacks in the United States (Hutchinson, n. d).

Cyber warfare or information warfare
Information warfare refers to actions that are taken in order to gain information superiority through affecting the information of the adversary, adversarys information systems, their information based process and also their computer based networks with an intention of defending or protecting the attackers own information, information systems, computer based networks, information based process and information systems.

However, there is no single official definition of information war that exists today. Cyber warfare technically means the use of computers with an aim of engaging in activities of warfare by targeting or harming cyberspace groups or websites and this move is motivated by selfish gains. Some of the forms of cyber warfare include false information circulation, vandalizing websites, service attacks rejection and misguiding, propaganda and false accusation propaganda and lastly collecting classified information or data from the internet commonly referred to as cyber space. South Korea is one of the countries that are currently experiencing cyber attacks that are aimed at paralyzing some of its major websites. Some of the targets include national newspaper and one of its biggest banks. The United States is also said to be experiencing such attacks with pentagon and White House being the major targets. These are real world cases of information warfare that might have adverse effects on the operations of these two countries. The United States and South Korea speculates that North Korea is behind such attacks with rumors stating that this country has a military unit that has employed over one thousand experienced hackers for such work. However, no evidence has so far been produced to fully link North Korea with the cyber space attacks (Brenner, 2006).

Denial of service kind of attack is the most common type of information warfare especially amongst states. In the year 2007, April, Estonia experienced cyber attacks whereby a series of attacks were experienced on different Estonian organizations such as ministries, banks, the Estonian parliament, broadcasters and newspapers, a warfare that was waged by Russia following disagreements on Bronze Soldier of Tallinn relocation. Citizens experienced denial of service and spamming. This is one of the most devastating form of attacks that attracted most countries and military planners of many countries. It was a cyber warfare that had been state-sponsored and the second largest to have occurred in the world after the titan rain (Marszaleka, 2008).

Expectations of security analysts and researchers are today being overcome by cyber warfare in many nations given the intensity of its growth. Cyber warfare has high level of precision and strategic target results hence its impact should not be lowly regarded owing to its flexibility and difficulties in detecting it. Cyber warfare is a low cost endeavor and this has allowed hiring and training of individuals thus complicating its impact especially in battle fields. In the past, strategic operations of battle were being carried out manually by use of papers and alter in action. However, these traditional modes of developing weapons have changed and are today being substituted by technology such as smart computers and GPS or the global positioning satellites. Today, about 99.9 of all successful activities are being conducted by smart computers and artificial intelligence software while only 70 of activities are being carried out by human beings. This has led to an increase of cyber warfare among countries, individuals and corporations (Acharya, n. d).

Types of information warfare
In most cases, when information warfare is mentioned, we tend to think of nations waging cyber war against each other. However, corporations and individuals also wage information war against each other. There are three classes or classifications of information warfare individual warfare, economic warfare and global information warfare. Personal information warfare refers to the attacks that are perpetrated against the electronic privacy of an individual. It entails several incidents such as digital records disclosure and entries of databases in information storage areas or sites. Today, individuals have very little control of stored information in their own private computers especially private information. Unlike in the past where spies were required to use microphones and miniature cameras to solicit information concerning an individual, this has dramatically changed owing to an improvement of and advancement of technology thus increasing the information warfare threat in our society. Individuals have today been using information warfare to blackmail other people or even to destroy their reputation. It is easier to solicit private information from the databases and use it for ones own gain which is in most cases to destroy their enemies or individuals considered a threat to their success. It is also easier to edit private information of a person stored in various databases for malicious purposes, usually for economic gain or with an aim of destroying another person (Olmstead  Siraj, 2009).

Corporate information warfare is the second class of cyber warfare present today. This type of cyber warfare is evident by the corporations wars being experienced today courtesy of technological advancement. Today, companies are investing heavily in information technology systems so as to be able to break into the database of their competitors and in turn copy such data worth more than what they had invested in.

Corporate information warfare is meant to give a company a competitive edge by either destroying the competitive strategies of the competitor or taking the innovative strategies of the competitors before they are able to implement them first. In this form of warfare, the perpetrator company, after copying the desired data may either destroy that database or simply leave it the way it was. This form of information warfare was evidenced during the cold war between the American and Russian where spies from both countries tried to collect information concerning their enemies with an aim of destroying each other (Haeni, 1997).

Corporate information warfare does not just entail information acquisition but also for the purposes of spreading fictitious or real information that has the capability of destroying the adversary or the competitor. For example, a company may begin false accusation pertaining to the quality and safety of its competitors goods and pass such information to the consumers. This as a result leads to lack of confidence of such products by the public and their subsequent withdrawal from the market place as further investigations are carried out. While this is being done, consumers shift to the products of the other company hence increasing their sales. One disadvantage of corporate information warfare is that it is difficult to prove that it is the competitor who has stolen the information from a company even when the harmed company is almost sure about it. Corporate information warfare is very common today and is being targeted on corporations as a whole or their leaders especially those believed to be influential in an industry. One of the major causes of increased corporate information warfare is use of computer chips to control most of the processes in an organization. This has made it easier for criminals to tamper with the original intentions of the manufacturers hence intensifying corporate information wars (Rogers, n. d).

The last type of information warfare is the global information warfare. This is the most dangerous form of information warfare as it is perpetrated by economic forces at a global level against a country or a state. This does not merely mean sneaking to competitors and stealing their research data but it entails theft of internal secrets of a nation and using such information to fight the owners of it. This form of information warfare is employed by nations to destroy their adversaries or countries believed to be a threat to a nation. While the first two forms of information warfare are mainly intended for economic gains, global information warfare may not be for economic gain but rather for political or social gain or influence. In actual sense, countries using this form of information warfare use a lot of money so as to destroy their political enemy (Sproles  Byars, n. d).

Information warfare weapons
Information warfare can be perpetrated using various computer weapons. Computer viruses are the major weapons used during information warfare. A virus refers to a fragment of a code that if introduced to a computer, it copies itself on the larger computer programs and modifies the original programs. The execution of a virus takes place when the targeted host program commences running. After attacking one program, the virus has the capability of replicating itself and corrupting or infecting all other computer programs where it is attached as well as the networks connected to the host program. In todays technological era, most of the individuals using computers have an idea of what viruses are and the harm they are capable of doing to an organization or a state. Due to their severity intensity, viruses have become an attractive weapon for information warfare. While using this form of weapon, a nation, state or corporation simply inserts a virus to the enemys switching networks using the phone system especially because most of the systems of phones today are connected or switched by computers hence transferring them to the computer system and other networks. Any data that comes into contact with the virus is corrupted and cannot be repaired. The aim of computer viruses is to destroy the information source of a nation or company (Rayamajhi, 2009).

Worms are the second weapon used in information warfare. A worm refers to an independent program that reproduces itself by copying to a particular fashion of a computer in full-blown and affects all other computers connected to such a computer. It is different from a computer in that it does not lead to modification of other programs within a system. Also, unlike the viruses, worms never destroy information or data in a system but they are capable of curtailing communication as they eat resources within a system and spread to via the networks. Perpetrators using this form of weapon simply modify the works leading to data deletion from a system. This is very detrimental for nations or corporations (OHara  Ayers, n. d).

Trojan horses are the third weapon employed in information warfare. Trojan horse refers to a fragment of a code that carries out a disguised function while hiding inside a computer program. It is usually camouflaged or appears as a tool related to security such as SATAN or the security administration tool for analyzing networks. The role of SATAN is to check systems of UNIX for security holes and it is offered freely on cyber space or the internet. Editing of SATAN in a manner that makes it to send any security holes discovered in email messages enables the person who edits it (commonly referred to as a cracker or a hacker) to be notified of such security holes which he in turn uses to attack the unsuspecting adversary. Since Trojan horses hide themselves in programs, they are not easily detected making the effective information warfare weapons. Trojan horses allow the crackers to solicit information pertaining vulnerability of servers and hosts. Trojan horses that are cleverly written do not usually leave any mark or traces and they also do not cause damages that can be detected (Sudworth, n. d).

Logic bombs are also used as information warfare weapons. It is a special form of Trojan horse that is used in releasing works and viruses to a system. It can either be planted by a programmer or be an independent program. This program is installed during manufacture of a system to allow a company or government be notified of critical information that passes through such a system.  Other weapons include trap doors, chipping, nano machines and microbes, electronic jamming, denial of service, and high energy radio frequency guns (Gordon, n. d).

Users of information warfare
While use of information warfare has intensified today, the exact people using it and the branch of military employing it is officially unknown. There are no public sources pertaining to the usage of information warfare despite it being in high usage especially by some of the military braches and special government agencies. During the Persian Gulf War, the usage of information warfare is not clear the desert storm is one real world experience of use of information weapon. During this war, the CIA dropped many messages in Iraq army headquarters most of them which were fake. They were meant to demoralize the troops of the enemy and to dray them towards the sea. This led to the destruction of the Iraqs headquarters. Technological advancement and use of information warfare is expected to continue increasing in the future. Highly technologized countries are the main engineers of information warfare and this puts a great danger to the less developed countries in terms of technology. Developing information warfare weapons is a costly endeavor and its damages are very disastrous (Webster  Borchgrave, n. d).

Cyber terrorism
Cyber terrorism basically refers to the use of computer technology with an aim of perpetrating terrorism acts. The main aim of cyber terrorism is to create terror in a country. The terror that emanates from cyber terrorism is dependent on the perception of the target group on it. United States eastern seaboard electricity saga is an example of the effects that cyber terrorism can have on a population. When power or electricity went off in the eastern seaboard, most individuals believed that this was an action of cyber terrorism and there was panic. However, it was later discovered that it was an error by the electricity company. Fake or real cyber terrorism leads to creation of terror and fear in a community and may cause widespread panic in a country (Hutchinson, n. d).
 
Computers are today being used as a means of enhancing cyber terrorist threats. Just like in the case of cyber warfare, no official definition has been agreed upon to define cyber terrorism. However, a large part of analysts and writers agree that it is a predetermined, planned and politically motivated attack on computer programs, computer systems, as well as data which in turn leads to violence being perpetrated against noncombatant targets by clandestine agents or sub-national groups. Cyberspace or the internet offers some kind of anonymity that allows individuals or groups to threaten specific groups or citizens of a nation without risking capture or even injury or death that is associated with physical presence. As the name suggests, cyber terrorism is closely linked to terrorism. Terrorism acts are perpetrated not necessarily for economic gains but also for political and social purposes. Cyber terrorism is the use of internet to create or spread terrorist threats in a population thus leading to panic and fear. Basically, cyber terrorism means leveraging of information on target computers through the use of cyber space or the internet with an aim of causing real world and physical harm or to severely disrupt infrastructures (Jahangiri, n. d).

The interest on cyber terrorism by public began in the 1980s following an increase in terrorists attacks and threats of attack. The millennium bug of the year 2000 heightened this uncertainty and fear and this led to an increase of interest pertaining to cyber terrorist attack. While the millennium bug turned out not to be a cyber terrorist attack on the United States, it increased fears of a wider and devastating cyber space attack. Year 2001 attacks on United States intensified the medial coverage of cyber terrorist attacks and it became apparent that United States was a target for larger cyber space terrorism attacks. While the United States has been a victim of cyber terrorist attacks, it is also a perpetrator of the same having used this kind of attack in many wars (Golubev, 2004).

As noted earlier, cyber terrorism is a subset of cyber warfare as it utilizes most of the avenues used by cyber warfare. The only difference between these two concepts lies in the intention of the person or group using it.

Cyber terrorism forms
Privacy violation is the major form or type of cyber terrorism. Privacy law gives individuals some rights over information he or she considers personal. Privacy information can be accessed from the personal computer system of an individual and in turn used to blackmail an individual. This is similar to personal information warfare that uses personal information for economic gain. However, unlike in personal information warfare where a cracker only alters information and later takes or steals the identity of the other person, in cyber terrorism, it is different. Perpetrator s in this case may use any solicited information to threaten a persons life or that of his or her family with an aim of causing fear to make them do as per the terms and conditions of the perpetrator (Marszaleka, 2008).

Similarities and differences between cyber warfare and cyber terrorism

Similarities
One of the major similarities between cyber warfare and cyber terrorism is that both are cyber space based. Cyber warfare and cyber terrorism as their names suggests are only possible in the presence of computer systems and the cyber space or the internet. They make use of the cyber space to interfere with the original format of a system altering it to make it suit or fit the needs of cracker or hacker. They both entail cracking down the normal operations of a system and altering it to make it suit their different needs. Information warfare entails cracking down of the information system of a country, corporation or an individual so as to solicit information or destroy information so as to gain an advantage over the adversary or a competitor.

Cyber terrorism entails altering a computer system with an aim of altering its normal function so as to destroy an adversary or cause fear or panic (Haeni, 1997).

The second similarity of cyber warfare and cyber terrorism is that they are both carried out to protect the interests of the perpetrator or to gain an upper hand over the adversary or competitor. The interests may either be political in nature, economic or social factors. As mentioned above, the major aim of the information warfare is to solicit vital information intended to help the cracker or a system defeat the opponent in various endeavors. The motivators are either to stop the opponent, to blackmail the opponent with information obtained or to avoid being blackmailed by the opponent. The motivating factor in cyber terrorism just like in cyber warfare is to destroy the source of strength of the opponent. Cyber terrorism allows the individuals using it to gain an upper hand in real world war (Rogers, n. d).

Differences
The main difference between cyber terrorism and cyber warfare is the actual and apparent harm that is caused by these forms of attacks. Whereas in cyber terrorism it is possible for violence to take place and thus hurt people or even cause deaths, the same is not likely to occur in cyber warfare in which case only threats are created and loss of highly confidential data and other secrets to the enemies or competitors and in turn use it against the owner. In most cases, cyber warfare involves kinetic attack form of war against the opponent. In this case, cyber warfare is not mostly aimed at causing any actual or physical destruction, it is however designed in such a manner as to affect the process of decision making and desires of the target. In most cases, cyber warfare leads to disinformation or propaganda campaign in which case the target gets much distorted pieces of information that are aimed at luring the victim into making decision with adverse negative effects. It is for this reason that is used as a basic instrument in the arsenal of information warfare to attain attacks that are non-kinetic. On the other hand, cyber terrorism leads to force vs. force involvement between the opposing sides of the war. Unlike in cyber warfare, the forces involved in cyber terrorism are asymmetric. Therefore, suicide bombers can be used to execute the planned cyber terrorist attacks on the opponent (Haeni, 1997).

The costs involved in cyber warfare and cyber terrorism differ substantially. The entry costs involved in cyber warfare are very low. The main and only costs that are involved are the prices of internet connection and computer. Again the varieties of tools applicable in cyber warfare are readily available on several internet sites around the world. Due to the low costs involved in cyber warfare, the number of potential perpetrators of cyber warfare is large. On the other hand, cyber terrorism is a very expensive affair and it can thus be effectively carried out by few well organized and wealthy terrorist organizations such as the Al Qaeda. The main costs are not involved in purchasing computers or accessing internet connectivity, but in hiring experts who are capable of planning cyber terrorist attacks in an effective and efficient manner and thus enable the perpetrators of cyber terrorism to easily cause actual physical damage on the victim as well as causing panic and fear to the targeted state or organization (Sproles  Byars, n. d).

Cyber warfare leads to traditional boundaries that are largely blurred, in the creation of its fog of war. With infinite organizations capable of causing cyber warfare, it is very difficult to effectively determine the cyber warfare sources whether originating locally or internationally. In the end, cyber warfare leads to the creation of dilemma in cyber response. Since the origin of the cyber warfare is not clear, cyber response becomes very complicated making the states and organizations that have been victims of cyber warfare to guess the source and respond to it thus causing a lot of confusion. However, in cyber terrorism, most of the operations are very clear. It is not hard to determine the source of a certain attack since in most cases the victim is usually warned in advance of the attack. Therefore, unlike in the case of cyber warfare, in cyber terrorism, the attacker discloses his or her identity and explains the reasons for the attack and in fact threatens to attack once again if his or her demands are not met (Olmstead  Siraj, 2009).

Cyber warfare has greatly expanded the perception of management role the perpetrators have the capacity of manipulating public perception effortlessly by changing multimedia files and manufacturing information digitally. The perception of the media is thus continuously detracted by the perpetrators of cyber warfare. Through it, the members of the public are made to think and act according to the desires of the perpetrators of cyber warfare. On the other hand, cyber terrorism is mostly based on the idea of ideologies. Cyber terrorism is mainly aimed at propagating certain ideologies in certain regions of the world. These ideologies might be based on religion, economic policies or be political in nature. The perpetrators of cyber terrorism aim at compelling the targeted victim to adopt the ideologies preferred by the cyber terrorism perpetrators (Acharya, n. d).

There are several difficulties involved in assessing attacks and tactical warnings in cyber warfare attacks as compared to cyber terrorism ones. Due to the availability and ease of tools used in cyber warfare, and the fact that virtually any person can initiate a cyber attack, it is not easy to assess the actual danger posed by such attacks. On the contrary, cyber terrorism attacks are quite easy to assess and develop a tactical warning. This is so due to the fact that not everyone is in a position of launching a cyber terrorist attack. In virtually all cases of cyber terrorist attacks, it is not possible for independent individuals to launch such attacks and they therefore have to be carried out by well organized organizations with both financial and human resources to launch such attacks effectively and efficiently (Brenner, 2006).

Conclusion
Cyber terrorism and warfare are major threats facing the world today, the use of secrets, information and data of the targeted victim. Methods of information warfare have been used for several decades especially during periods of conflicts. Terrorism is not also a new phenomenon in the world. However, with increased internet connectivity and access of computers, these types of crimes have become a major threat across the entire world. While cyber warfare is used in propagating propaganda aimed at distorting some information and thus creates confusion and panic in the country or organization, cyber terrorism is used to plan and execute terrorist attacks against the targeted nation.

Master of Science in Database Technologies

1 What do you expect to learn and achieve in the School of Computer and Information Sciences, Masters of Science in Database Technologies   program

The ability for a learner to be trained in accordance with the requirements of the career one is expecting to take up in future is a very important aspect which ought to be considered in the selection of a school for any form of training. Due to this I believe that at the School of Computer and Information Sciences, I will be in a better position to get the best possible training necessary for me to achieve what I desire in my future career. I am deeply convinced of this, because the school prepares career-oriented professionals in the fields of the administration and management of information systems as well as database engineering and administration. In addition to this, the school has the proven capacity to impart similar career-tailored skills in network systems, data communications and internet-based courses.

As far as the training for adults is concerned, the school offers relevant courses in the fields of information systems management and communication analysis. As a person with a deep desire to venture in the wider information technology area, I am looking forward to receiving the kind of specialized training that this school can offer me. Owing to the fact that this is an advanced training, it is also imperative that the school I choose has the ability to apply the knowledge I have already obtained as the foundation for the training, so that the outcome would be the combination of the factors which enhance my future career success. I am deeply convinced that the Master of Science in Database Technologies is the program that will not only develop what I have already acquired in the course of my undergraduate studies, but will also improve my career chances and lead me to my dream job. As an adult professional, I hope to be able to use the skills acquired at this school to usher me into my future career.

2 Discuss the kind of position you anticipate having five years after you earn this degree.

After earning my Master of Science degree in Database Technologies, my goal is to become a database architect or an Oracle database administrator.  Although I clearly understand that it might be not easy to get either of these positions immediately upon graduation due to the lack of the appropriate practical and hands-on experience in the particular fields, I believe, a certain part of this experience will be attained as I undertake my studies at the School of Computer and Information Sciences. In addition to this, I hope to use the first few months after the completion of my Masters Program to specifically focus on developing my database practical skills through internship. Therefore, in five years time I am sure I will be in able to achieve one of these careers.

3 What experiences have you had that form the foundation for these career goals

Among the requirements that I will need in order to have the relevant foundation for becoming a database architect or an Oracle database administrator is my past experience. Although I still look forward to gaining much more experience, at this point I have already earned quite a considerable experience in various information technology areas. First of all, I possess a 9-year experience in programming and application development which has been acquired due to working in different organizations and through studying at various colleges and schools. I have been working as an information systems specialist at Sun Star Industries, serving as a program analyst at Big Sky Inc and also working as a programmer analyst at Al-khaleej Computers  Electronic Systems in the United Arab Emirates. This experience, coupled with my undergraduate degree in computer science, will be of good help in paving my way to the dream career. The fact that the experience is directly connected with my future career gives me the belief that I will realize my dream in five years time. There is usually no end to learning and putting into practice whatever has been learnt. Therefore, I know that I still have the opportunity to gain additional experience to increase my chances of securing my dream career.  

4 How will the Master of Science degree enhance your career plans

Given the experience I have already acquired and the fact that the entire field of information technologies is becoming increasingly competitive, the additional information and experience that I will acquire while undertaking the program will put me on a more advanced level to stand the competition from others. Not only is a Master degree an additional advantage, but the fact that it is acquired at such a high-ranking institution gives me a competitive edge over others. The reason for this is that today it is a critical factor where one gets training, with reputable institutions getting priority over others.

In addition, since databases have become pervasive and integral to business, database administrators have become increasingly rare as the demand for them in the market soars. That aside, database designers and administrators work in every sector of the economy and therefore job opportunities continue to increase and expand. Designing, administering, fine-tuning, and maintaining databases that power modern enterprises require the expertise of database professionals with a wide range of skills and capabilities. These experts play the critical role in keeping clientserver databases consistent, reliable, and secure. I will have acquired all these competencies as I graduate after completing my degree program. Therefore, this degree program is the key to my future.

Paper 2

My Expectations
In any learning process, it is always ideal for a student to be trained in accordance with the requirements of the career that heshe expects to take up in future. This is a very important factor which must be considered in the selection of an appropriate learning institution. I believe, therefore, based on these considerations that the School of Computer and Information Sciences will be in a better position to offer me the right training that I need in order to achieve all that I desire in my future as far as my career is concerned. This is based on the fact that this school prepares its students in a unique way which enables them to graduate having acquired a unique approach especially in the fields of administration, management information systems, and database engineering and administration. This uniqueness aside, the school has in the recent past been able to prove itself as a leading destination for students seeking to develop their career chances in the field of information technology, because it offers a specialized, career-oriented training in network systems, data communications, and internet-based courses, it is an ideal school.

The school also caters for all kinds of people, including adults and professionals. Therefore, I look forward to studying at the school because I believe it will grant me the education and training that is ideal for a person like me. As far as adults are concerned, the school offers relevant training in the fields of information systems management and communication analysis. Having a deep desire to venture in the information technology field, I highly value the specialized training that this school can offer me. Studying at the masters level, I expect that this school will have the ability to use the knowledge I have already as a foundation for the training so that in the end I will have an education built on a strong foundation. I believe that the Master of Science in Database Technologies program will not only build on what I have already acquired previously, but will also better guide me to my dream career.

Future Career Expectations  

I expect that once I have completed my Master program in Database Technologies, I will become a database architect or an Oracle database administrator, because these are the two fields that I am very interested in. I believe that due to the great value that has been placed upon these two positions, I will achieve one of them in future. I understand that it will not be an easy task, just like any other goal in life is never easy to attain, therefore I am confident that my level of training and the additional experience that will be attained as I undertake my studies at the School of Computer and Information Sciences will be enough to assist me to my dream. I also hope to use the first few months after my Master Program to develop my database practical skills, so that I can realize the dream sooner.

My Level of Experience

In order for a person to become an Oracle database administrator, it is important that one has to have a wealth of experience to spruce up ones level of education and training. Although I do not claim to have all the experience I need, but still look forward to gaining much more knowledge, I have been able to develop some of it through various information technology assignments. I have experience in the fields of programming and application development which has been acquired working in different organizations namely working as an information systems specialist at Sun Star Industries and as a program analyst at Big Sky Inc. In addition to these two, I have also worked as a programmer analyst at Al-khaleej Computers  Electronic Systems in the United Arab Emirates. This brings my total to 9 years of experience. Since this experience is directly linked to my future career, it enhances my chances of achieving the results I want to have five years from now.

How the Master of Science Degree Will Enhance My Career Plans

Given the fact that databases have become pervasive and integral to business, database administrators have become increasingly marketable in the job market. In addition, database designers and administrators work in every sector of the economy, making job opportunities for them all the more impressive. Designing, administering, fine-tuning, and maintaining databases that power modern enterprises requires the expertise of database professionals with a wide range of skills and capabilities. These experts play the critical role in keeping clientserver databases consistent, reliable, and secure. These competencies will be part of my resume once I complete my degree program. In essence, this masters program holds the key to my future.
Given my present experience and the fact that information technology is becoming an increasingly competitive discipline, the experience that I will acquire studying at the school will put me on a more advanced level to compete with others for the available opportunities. The Master degree is an additional advantage to my experience. This coupled with the fact that it is acquired at leading institution gives me a competitive edge over others because it is a critical factor where one gets ones training.

Paper 3

Answer to Question 1

Every student ought to be trained in accordance with the requirements of the given learning institution and also those of hisher dream career so that at the end of studies, one is able to get the career that one has been dreaming about. One of the most notable facts about the School of Computer and Information Sciences is that it has been able to earn for itself the reputation of being a school where the expectations of every student studying at any given level  post graduate, diploma, or undergraduate  are fully met. I come to this school expecting nothing less, as I am a student who is keen not only to have an education that will add another title to my resume, but also to have a real training that is geared toward helping me achieve my goals in life. As I have been able to put a lot of effort in the past in order to work toward achieving my life goals including landing my dream career through continued and targeted training, it will only be right if I manage to get what I have worked so hard for since when I was in my lower ranks of education.

By deciding to study at this school, I not only put myself and my life in the hands of the institution but I also give to it my future and the future of all who will depend on me. However, I have the trust that the School of Computer and Information Sciences is in a better position to give me the right preparation that I need in order to have what I desire. This is because the school has a proven capacity to impart career-tailored skills to its students in as diverse IT field as network systems, data communications and internet-based courses. Others are information systems management and the communication analysis. Therefore, being one with a deep desire to venture in the wider IT field, I really desire such kind of specialized training that this school offers. I also believe that the school ought to have the ability to build on what I already have as a foundation for the training in order for me to come out better equipped. The schools Master of Science in Database
Technologies program will help me achieve this.

Answer to Question 2

I have always dreamed of working as a Database architect or as an Oracle database administrator.  This dream has not vanished and never will, especially now that I am just in the final phases of the long journey to achieving it. The desire in me has always been that, although the wider field of IT has often been appealing to me, one of these two careers which have been central in my mind all along must become my future career. This has come about partly because of the love I have for seeing to work organized in a manner that is very appealing and have consequently liked database architecture and Oracle database administration, as they are among the many ways that one can achieve a superior quality organization of ones databases. The School of Computer and Information Sciences will no doubt give me the chance to realize this dream.

Answer to Question 3

I have had the rare opportunity of working with different firms, organizations and other business ventures, a privilege which I have used to gather considerable experience that I know is very critical to the realization of my dream as far as a career is concerned. Though I still look forward to gaining a lot more experience, I currently have a 9-year year progressive experience in different programming and application development which has been acquired working in these organizations and firms. Specifically, I have worked as an information systems specialist at Sun Star Industries and also as a program analyst at Big Sky Inc. to crown my nine years of experience, I worked as a programmer analyst at Al-khaleej Computers  Electronic Systems in the U.A.E. This experience, coupled with my undergraduate degree in computer science, will help me to realize this dream. Since this experience is connected with my future career, it gives me the confidence to believe that I will realize my dream.

Answer to Question 4

Due to the fact that databases have become pervasive and integral to business, database administrators have become increasingly valuable even as their demand in the market continues to grow. In addition, database designers and administrators work in virtually every sector of the economy and as such, job opportunities available for them have continued to increase as well. Tasks such as designing, administering, fine-tuning, and maintaining databases that power modern enterprises require the expertise of database professionals with a wide range of skills and capabilities. These experts play the critical role in keeping clientserver databases consistent, reliable, and secure. All these competencies are necessary if I have to achieve my dream in life especially in my career. Considering the fact that I have some experience already and that IT is becoming very a competitive field, the program will put me in a better position to cope with the competition if not staying on top of it. The Master degree is both an additional advantage and a booster of my future career prospects because it is acquired from a reputable school.

Summary of Two Articles

First Article
Author Johanna Rickman reviews in her article for Renaissance Quarterly the book that contains an inspiring collection of essays about women in the 15th through 18th century Europe that was edited and compiled by Stephanie Tarbin and Susan Bromhall. The book, entitled Women, Identities and Communities in Early Modern Europe, tackles and commemorates female identities, roles, and issues in different parts of Europe and largely focuses on English women. Rickmans article highlights how the book presents the diversity of the gender related issues that occur as time passes by. The article describes how the essays in the book narrates and details efficiently to its readers the lives of women and the roles of men to females issues in the past. Rickman also mentions how the editors Tarbin and Bromhall recognized the contributions of Patricia Crawford, an influential scholar of women studies, to the orientation of the society regarding female-related stories and issues.

Second Article
In his essay entitled Business Failure and Civil Scandal in Early Modern Europe, Thomas Max Safley delves into the reasons and consequences of bankruptcy in the economic history, particularly focusing on one of the biggest financial enterprises in early modern Europe, the Ambrosius and Hanns, the Brother Hochstetter and Associates. The author relates in his article how the events of the past translate into theories of the limitations of the modern economic crisis and development. Safley explores extensively how bankruptcies are caused by both economic downturns, and the managerial failures of the people are considered key players in the industry. The author also stresses in his article how most of the time bankruptcies result in grave scandals but sometimes, like in Hochstetters case, the problem of bankruptcy had in fact encouraged positive development for the public goods of the economy.