Motorcycle Mechanics

Motorcycle Mechanics

Motorcycles are not only a source of entertainment; they can also be a source of transportation and income if someone wanted to make a career of them. Motorcycles are used in many aspects of life. Children, as well as adults, ride motorcycles on trails, open fields and on motocross tracks. They may race, jump or do stunts with the motorcycle. Groups, such as Harley Davidson owners, get together to ride for charity events. Because motorcycles are so cheap to ride, they are great source of transportation. A motorcycle can get 60 to 70 miles per gallon whereas a small Toyota Camry can get 18 to 23 miles per gallon. Industries such as farming, delivery, entertainment, aviation and even the military are known for their use of motorcycles within their operations. Due to the popularity of the motorcycle there has been an emergence of self-taught mechanics. Not all these mechanics can keep up with the new technologies and advancements. “The impact of new technology on the motorcycle industry has been dramatic” (Motorcycle 1). Electronic ignitions, fuel systems, drive trains, and turbocharged engines are just a few areas of advancement. Well-trained technicians are needed and sought after. Job opportunities are available for these well-trained technicians. The motorcycle industry has a lot to offer someone who is interested in a motorcycle mechanic career.

It is always a good idea to understand the history of a subject prior to getting into specifics. Motorcycles originally looked like glorified bikes. They had front and rear wheels that were the same size, with a pedal crank mechanism to turn the rear wheel. Gottlieb Daimler is credited with building the first motorcycle in 1885. It was constructed mostly of wood with iron wheels and was powered by a single-cylinder engine. Most of the early models were three and four-wheeled designs. The two-wheeler was introduced in 1892. “It used a 5-cylinder engine built as the hub of its rear wheel. The cylinders rotated with the wheel, and its crankshaft constituted the rear axle” (Tharp 1). It wasn’t until Hildebrand & Wolfnueller invented and patented a two-wheeler in 1894 that the two-wheeler became success. Still production and manufacturing was a slow process and motorcycles were not readily available for purchase. In 1885, the “French firm of DeDion-Buton built an engine that was to make the mass production and common use of the motorcycles possible” (Thorpe 2). The engine was small, light and a four-stroke. It had a battery and coil ignition instead of a hot tube. A lubrication system was invented to drip oil in metered doses. Soon the engine was copied and was used by Harley-Davidson in the United States. The first U.S. production began in 1892 in Waltham, Massachusetts. The motorcycle was called the Orient-Aster and contained the DeDion-Buton engine. Production continued at a slow pace until 1960. Between 1960 and 1970 over five million motorcycles were produced and sold. During the 1970’s oil crisis, the motorcycle became the preferred mode of transportation (Lear 3). Today there are over “10 million motorcycles in the United States that are commonly used for commuting as well as for various racing competitions” (“Motorcycle Mechanics” 338).

Riding safety is an important aspect to the motorcyclist that needs to be addressed. Safety is the responsibility of the rider. “In an average year 166,000 Americans will be hospitalized as a result of a motorcycle accident. 4,700 of them die. Many others will be crippled for life. In some countries the death rate for motorcyclists is up to nine times higher than that for person riding in a car” (“Motorcycle Safety” 1). A motorcyclist needs to ride with extreme care. Steering, accelerating and braking require skill and a high degree of coordination. A motorcyclist should never drive while under the influence of alcohol. It is very important that one learns how to ride and do so safely. Wearing proper attire is also a necessary component to safety. It should not only provide comfort but also visibility and protection. A helmet, eye protection, jacket, gloves, and boots are the basic attire. The helmet is the most important piece of equipment. It should have a snug fit and be fastened securely under the chin. The helmet should also be certified by the Department of Transportation. Goggles or a face shield are both good for eye protection. Being able to see is an important aspect when riding. Wind that blasts into eyes can be very dangerous. Objects blown into the eyes can cause blurred vision. Jackets made of leather provide a great deal of protection. It is wise to wear gloves and boots in order to provide additional protection. Proper riding apparel will not prevent accidents, but it will decrease the chance of serious injuries.

Finally, motorcycles are a great source of income because one could make a career out of repairing motorcycles. Technician, service writer, parts manager and service manager are a few of the careers available within the motorcycle industry. This paragraph will be focused more on the technician’s career. The technician can make or break a facility. If the technician is knowledgeable and does quality work, the reputation of the facility will be good. If, on the other hand, the technician is not knowledgeable and his quality is lacking, the reputation of the facility will be poor and they will lose customers. One of the tasks a technician will perform is rebuilding a motorcycle engine. A motorcycle engine can be either a two-stroke or a four-stroke.

The two-stoke is preferred by racers and will be the one discussed in this paper. “A two-stroke engine is a simply constructed engine. Two-stroke engines do not have valves, which simplifies their construction and lowers their weight. This makes the two-stroke engine lighter, simpler and less expensive to manufacture and repair. The piston, cylinder, and crankcase serve dual roles in developing power” (“Motorcycle Mechanics” 74). The engine is made up of two parts: a top end and bottom end. The top end contains the cylinder, the cylinder head, piston, the piston rings and the wrist pin. The bottom end contains the crankshaft, the crankcase, the seals, the bearings and bushings. The cylinder’s job is to seal and guide the piston so that it can react to the power of the expanding gases. There are a series of passageways called ports that move gases in and out of the engine. According to David, former motorcycle mechanic, the cylinder head is the area where the gas and oxygen mix on the down stroke, but on the upstroke it is compressed and ignited by the spark plug to produce a mini explosion, which creates power. The cylinder head vibrates constantly and is subject to high temperatures. During a rebuilding job, the cylinder must be inspected thoroughly to make sure there is no warping. If warped, sanding it with emery paper can repair it. The main job of the piston is to hold the ring. The ring must be tight in order to get a good tight seal in the cylinder. If the seal is tight there will be good compression. Lack of compression means a lack of power, preventing the engine from working efficiently. The piston and the piston pin need to be checked for scratches and cleanliness during a rebuild. If any dirt or deposits are left on the piston or the ring it will cause the rings to stick and lead to power loss. So it is very important to take the time to thoroughly check and clean the piston and the piston pin. When replacing a piston, make sure there is enough clearance in the cylinder. Motorcycle books can be purchased with exact measurements and clearance values in them. If there is not enough clearance the piston will shake (seizure) resulting in noise, damage to the cylinder wall and loss of power.

In the bottom end of the engine, the crankshaft continually spins giving the piston the power to continue to work. The crankcase houses the crankshaft. It operates under conditions of high stress. “Atmospheric pressure and the partial vacuum created by the piston causes air to flow through the carburetor to pick up a charge of fuel and then to flow into the crankcase and later in to the cylinder. When the piston has closed off the intake port, the crankcase is sealed” (Motorcycle Mechanics 78). With the continued motion of the piston, the fuel mixture in forced through the transfer ports. Crankcase seals are used to prevent leakage so pressure can build in the crankcase. It is very important to locate and correct crankshaft problems to prevent more serious trouble later. The crankshaft must be measured according to specific measurements. If the crankshaft is seriously damaged, it is better to throw it away and buy a new one. Oil seals are also important during a rebuild job. The seals prevent loss of oil from the engine. The seals also prevent compression leaks. Since compression is needed to move the piston, the seal is important. In addition to preventing leaks, oil seals prevent entry of dirt and particles. During rebuilding jobs, oil seals must always be replaced. Never try to reuse and old oil seal. Finally, the bearings should always be checked whenever the engine is disassembled. Always check for wear (pit marks) and cleanliness. Spin the bearing, listening for noise and roughness. Make sure the spinning is done while the bearing is lubricated. Never spin a dry bearing. All these parts work together to create enough power to move the motorcycle. It all starts when the spark plug fires. Fuel and air in the cylinder have been compressed so when the spark plug fires the fuel ignites. This small explosion causes the piston to go downward. As the piston is moving downward it is compressing the fuel mixture in the crankcase. Once the piston starts reaching the bottom of its stroke, the exhaust port is uncovered. The pressure that has been built up in the cylinder now forces out the exhaust gases. By the time the piston is all the way at the bottom of its stroke the intake port opens. The fuel mixture rushes in the cylinder, filling it up with fresh fuel. During this time, the crankshaft is moving and it forces the piston upward towards the spark plug, which is called the compression stroke. As the piston compresses the fuel, a vacuum is created opening the reed valve and forcing fuel into the carburetor. As the piston reaches the top of its upward stroke, the spark plug fires again. This repeats over and over again.

Two stroke engines require a special fuel mixture. Two-stroke oil must be mixed with the gasoline. In most cases, the mixture is a 32:1 ratio, which means thirty- two parts gas with one part oil. The oil seems excessive, but it is needed in order to keep all moving parts lubricated. The oil lubricates the crankshaft, connecting rod and the cylinder walls. If the gas is not mixed with oil, the engine will run poorly.

There is a lot more to motorcycle riding than meets the eye. A motorcyclist has many responsibilities. It doesn’t matter if a person rides for entertainment, sport, or necessity: the responsibility is the same. Motorcycles are very powerful and must be driven responsibly. Proper riding techniques, safety gear and proper maintenance are key to long and happy riding. If lucky, motorcycle riding can lead to a satisfying career.

Bibliography:

Lear, G. Motorcycle Mechanics. Englewood Cliffs, NJ:Prentice-Hall Inc.,1977.

Motorcycle Mechanic Institute. The Complete Guide to Motorcycle Mechanics. Phoenix, AZ:

Prentice Hall, 984.

Motorcycle Safety. 4 Dec. 2003.

Tharp, Dave.Virtual Museum Curator. The First Motorcycle. December 2002. Motorcycle

search. 6 Dec. 2002.

Advanced Manufacturing Technician Post Concern

Advanced Manufacturing Technician Post Concern

Student’s Name

Institution

Advanced Manufacturing Technician Post Concern

Securing a vocation as an advanced manufacturing technician has been my interest in developing know-how of the career line to follow in life. As the word manufacturing technician depicts, it involves the technicalities to be applied in running equipment and machinery in the industries and other production fields during the manufacturing process. Being a student pursuing electronics related course, I will be receiving my certification in electrical trades at the end of this semester. The ultimate goal of applying the course program was sharpening my knowledge and skills in working as a manufacturing technician in future as if has been my field of interest since the beginning of education curriculum. The coursework provides precise guidelines for understanding that the vacation involves setting up, testing and adjusting plant machinery and equipment (Scott, 2016). In the field of specialization, this will be possible by the application of electrical and electronic technologies which involves a wide variety of the advanced machinery.

Time in the modern society has passed the era of depending on human as the primary sourced of labor. The industries and other production sectors have extensively adopted machine application due to their competence and fast speed performance which cannot be compared to the human rate of doing activities. Relatively, to enhance their functionality, the machines require a dependable source of energy where electricity emerges to be the significant and efficient source in the in the society. For efficiency and proper functionality, these electrical related machinery requires regular repair and maintenance services.

Also, the manufacturing machinery and equipment require set up, testing and adjustment to enhance proper running and functionality (Huang, et al. 2015). The fact that technological advancement has to be adopted and will progress as time goes acted as the motivating factor in pursuing the electrical trading course as it is inevitable to use machinery in the production process. In fact, with industrialization, there will be an expansion in the variety of machinery used to make manufacturing faster as well as improving the quality of the products.

The notion of being part of industrial advancement by taking part in the technology evolution touched the best part of my conscience encouraging me to go for my passionate vocation as a specialist in advanced manufacturing technician. On top of pursuing the electrical trade course as well as having the knowledge and skills in the field, I am bilingual. It is clear that being a manufacturing technician also involves the skills of efficiently communicating with clients and other people in the same area to enhance proper expression of the ideas as the technical area is much involving (Baumers, et al. 2016). Being a hands-on a person becomes another credential as the technicalities applied determines the effectiveness of task performance as well as the machine functionality.

Fixing stuff and finding the problem causing machinery defects becomes my best and joyous moments. This played an essential part in helping me realized my passion as well as the field of specialization being electrical trade sector and having the objective of working with a manufacturing related company.

References

Baumers, M., Dickens, P., Tuck, C., & Hague, R. (2016). The cost of additive manufacturing: machine productivity, economies of scale and technology-push. Technological forecasting and social change, 102, 193-201.

Huang, Y., Leu, M. C., Mazumder, J., & Donmez, A. (2015). Additive manufacturing: current state, future potential, gaps and needs, and recommendations. Journal of Manufacturing Science and Engineering, 137(1), 014001.

Scott, G. (2016). The Industrial Manufacturing Technician Apprenticeship. Work-Based Learning in Action. Jobs For the Future.

Challenges Faced by Immigrants in the United States Between 1880-1920s

Challenges Faced by Immigrants in the United States Between 1880-1920s

Student’s Name

Institution of Affiliation

Date

Life as an immigrant in the United States from 1830 to 1920 was full of challenges, making it hard for the immigrants to survive. During the 1800s, life was not smooth in many parts of the world, and thus, they migrated to the United States, fleeing from crop failure, land and job shortages, rising taxes, and famine. By then, the United States was deemed a land of opportunities, and thus, immigrants believed that going to the United States would provide them with massive economic opportunities (Minkoff-Zern, 2019). However, not everyone sought economic opportunities as others came into the United States seeking personal freedom or relief from political and religious persecution.

The 1870s was characterized by hard economic times, and the European immigrants had to compete with the Americans for jobs traditionally reserved for the Chinese (Sánchez‐Alonso, 2019). As a result, racial hatred and suspicion arose due to economic competition. The feelings of hatred were coupled with anti-Chinese riots and pressure, demanding the exclusion of Chinese immigrants from the United States. As a result, in 1882, the Chinese Exclusion Act was passed, ending the hope of Chinese immigrants into the United States for nearly a century (Burns & Yu, 2018).

Stereotyping and discrimination based on race were common issues among the immigrants when seeking job opportunities (Esses, 2021). Once immigrants settled, they had to look for work, but since the number of job seekers was huge, there were never enough jobs for the immigrants, which prompted potential employers to take advantage of the immigrants. For example, men were generally paid less than native workers, while women found it difficult to get a job. Even if the women got a job, they were paid lower wages than men. Besides wages, immigrants experienced social tensions that made their life in the United States more difficult (Hughes, 2022). They were often stereotyped and discriminated against, with many immigrants suffering from verbal and physical abuse because they were different.

The experiences of immigrants between the 1880-1920s can be considered hostile as they largely involved stereotyping and discrimination from government policies to employers seeking to deny immigrants job opportunities.

Referencing

Burns, R., & Yu, L. S. (2018). The Chinese Exclusion Act. American Experience, PBS.

Esses, V. M. (2021). Prejudice and discrimination toward immigrants. Annual Review of Psychology, 72, 503-531.

Hughes, V. (2022). Tense times for young migrants: temporality, life-course and immigration status. Journal of Ethnic and Migration Studies, 48(1), 192-208.

Minkoff-Zern, L. A. (2019). The new American farmer: immigration, race, and the struggle for sustainability. MIT Press.

Sánchez‐Alonso, B. (2019). The age of mass migration in Latin America. The Economic History Review, 72(1), 3-31.

Advanced Networking Proposal and Network Diagrams – Proposal

Advanced Networking Proposal and Network Diagrams – Proposal

Name:

Instructor:

Course:

Date:

Table of Contents

Executive Summary —————————————————————————3

Project Plan ————————————————————————————5

Components/Network Configurations——————————————————–5

Network Operating System ——————————————————————-6

Data Communication Media ——————————————————————-6

Common Carriers and Service Usage ——————————————————–7

Hardware Needs ——————————————————————————-8 IT Policy ————————————————————————————–9

Network Diagram —————————————————————————-11

Budget —————————————————————————————–12

References ————————————————————————————1

Executive Summary

The Western Count Bank is exponentially growing in size on a Daily basis. However, the bank equipment with old computers approximately five years old has presented problems with the active employees. Moreover, customers and employees have been uncomfortable with some of services offered by bank such as unwitting breakdowns in their systems, lack of support to online banking, and lack of support to mobility. An unreliable networking scheme has attributed to the comprehensive reliance of personal connection between computers for sharing of the ink jet printer. The Western County Bank also only has two routers, one for connection to the Wide Area Network and another for internet connection. This has led to inconveniences in company operations as attributed recently when the routers were under maintenance hence denying the employees access the internet. Owing to this problem, the bank intends to refurbish the networking scheme by introducing redundant connections between the wide area network and the internet connections to avoid occurrence of such problems in future. It also intends to keep its ARIN-assigned (American Registry for Internet Numbers) public Internet Protocol (IP) block and use two internet service providers to ensure network connection reliability. Another problem faced by the bank is that the network routers not only breakdown, but also have problems with minimal filtering in the OSI layers 2-4 of the network. This has prompted the bank to implement security products that can filter OSI layers and ensure that the seven layers of the OSI remain protected from common network attacks. The bank also intends to have a datacenter that has client’s information and applications that every employee can easily access. The Bank also intends to incorporate measures that will ensure that Employees can easily share laser printers and that the datacenter has enough storage capacity for both the current and future operations of the company. The purchased multiprotocol storage area network (SAN) arrays will provide this service.

The Western County Bank intends to implement a simple guest wireless access point in their main office protected through simple pre-shared key authentication and provides internet access in the headquarters database to any interfacing apps. Moreover, each employee will possess a company email, which employees may use for financial purposes accessible by outside systems and networks through an internet connection. In addition to upgrading equipment and implementing a network, the bank intends to have an integrated authentication through Microsoft Active Directory (AD) infrastructure that will establish employee authentication before delegating network access to any mobile device. Lastly, the bank faces limited power supply especially in locations wireless access points are to be deployed. The solution for this problem will involve implementation of Power over Ethernet (PoE) at the access layer of the switched infrastructure.

Implementing this network proposal assures the bank of a reliable renewal from their previous computer systems and network infrastructure. Firstly, old operation systems will undergo complete reinstallation and vital information maintained in the new network system. Following this is the creation of new configurations and network designs that conform to the standards set by the company detailed in occasions of rolling out new computers layouts, connection equipment, and peripherals. When the configuration and design is established, a suitable network Operating system will be selected to control, manage, and share the company apps and information. The configurations, design and network operating systems form the key components of a prosperous network. Therefore, the wide and the local area network, types of media communication, and components will undergo examination and documentation in the network design phase to establish how the different parts of the network link and function. The new network services will be managed by corporate IT policy compiled by company network consultants, directors and owners. Lastly, the budget penned at the end of this proposal should give the West County Bank a rough estimate of the work time and network installation costs.

Project plan

Components/ Network Configuration

The West County Bank raises the question: “is there a need for the network?” clearly, the network needs to be established if the organization is to fulfill their intentions of using a network that can share apps, information, or software and particularly, to achieve the notion of utilizing a datacenter. A logical network topology setup with the provided information and the intentions of the company would require the utilization of a star topology. Star topology, utilizing a server-based network scheme, will provide access to centrally polled accounts and file storage servers enabling easier, cardinal access hence allowing the staffs use single account authentications (Newman, 2010). Employees need to have access to all services and files simultaneously. This calls for utilizing a server, which will process several requests of similar data without deterioration in its performance. This design will also allow client computers, server, and laser printers to be linked to a cardinal switch that can share data across the local area network (LAN) and the wide area network (WAN). Redundant routers, connected to a modem, will give access to the wide area network and the internet source ISP (Tian et.al, 2004). The server purposes will include hosting the bank’s database of client files, a server for various desired printers, and hosting all employees’ bank e-mail accounts. Nevertheless, despite the star topology ability to provide the staff with enhanced and flexible network architecture for a formidable working environment, it remains susceptible to probable downfalls. Physically wiring the system to link the various computers utilizing star topology requires extra workforce and cabling for installation. Requirement of the cabling to run via tight enclosures, ceilings, or under the carpet can be strenuous and time consuming. Considering the growth rate encompassed for West County Bank necessitated by employment of a server-based network, it should suffice for the difficulties involved in the setup and utilization of the new network.

Network operating system

The star topology network, client computers, and the server configuration management and governance will be designated to Microsoft’s latest edition of server operating system that is Windows Server 2008 Enterprise Edition. With the implementation of the Windows 2008 server, along with windows operating systems for the network terminals, the networks services of the bank, its office production apps, security software, and specialization software will operate effectively for the bank staff. This will ensure compatibility with programs such as windows based elective services that include SQL 2005, Exchange Server 2007, or share point server. Productivity programs of the office such as spreadsheets, word processors, and presentation software will be availed for staff use with the installment of Microsoft’s Office 2007 suite. Operating systems of Microsoft and their programs work perfectly and possess high-level file compatibility. Third-party business software for accounting such as Sage Simply Accounting, MYOB Business essentials, works well across networks based on windows and with software for Office Productivity.

Data communication media

Updating the computer equipment will also encompass implementation of new communication media. CAT6 Ethernet cable best suit the specs of the new computers, network equipment, and servers. All the new units have gigabit transfer compatible NICs (network interface cards) and because CAT6 is the only UTP (unshielded twisted pair) cable that can handle gigabit transfer, it is the best choice for the communication media. Gigabit network cards and CAT6 cables will allow the management and employees access to files, server resources, and provide a reliable channel for communication to business agendas. Stationary computers of the bank Utilizing CAT6 cabling enjoy comprehensive network access (Tian et.al, 2004). The main office and the other two branch offices will have a wireless access network to meet the needs of the employees who carry laptops and tablets and other guests who might come for consultancy and auditions. Simple pre-shared key authentication will provide security for the wireless network that gives access to the internet and other interfacing apps in the datacenter. The wireless access points will enhance the business’s laptops and tablets mobility capabilities. Employees with tablets and laptops, while in office, will chose to either connect to the wireless network or plug CAT6 UTP cables to access the network resources of the business.

Common carriers and services usage

Every staff is set to be equipped with a computer that is connected to the network to necessitate access and use of office resource and communications. Two internet service providers will install the internet access of the bank. The selected services will be supplied a business connection speeds of 10Mbps for download and 2Mbps for Upload. The network access will be accessible only to the management and the staff with no exception to the outside public. Business employees as arbitrators between clients and the bank’s services will handle any services or requests by clients. The staff will access the services of the company via their laptop, tablet, or workstations, link to the server that contains the desired information, and use the company software to meet the requests of the client. All employees will be required to possess login passwords for their accounts to give them clearance to access client/bank information. The staff will then select the best software to complete the client request with software installed either on their personal laptop or on network software.

Hardware needs

The new proposal is a server-client network that primarily relies on the main server and its given service. The chosen hardware for the network configuration is from Dell’s business solutions. Dell’s PowerEdge 2800 III will manage the resource and the services of the bank. This server normally utilizes an 8 GB 677 MHz RAM, two Intel 2.0GHz Xeon Quad Core processors, and a storage of two 500GB SATA 3Gbps HDD (hard disk drives). Storage of the server will be supported by the already purchased multiprotocol storage area network (SAN) array. The disk arrays will ensure that the bank does exhaust storage space by consecutively replacing full disks. With these configurations and specs, the server will have the ability to process many request simultaneously for all the bank’s employees with slight or no loss in performance. Dell’s OptiPlex 755computers will replace the old stationary computers used by employees. Every computer will be equipped with Widows Vista Business, which utilizes 2 GB 667 MHz DDR2 RAM, 2.33 core 2 Duo processor, and an 80GB SATA 3Gbps HDD. These computers together with the server and the desktop towers have expandable memory slots for future upgrades. Laptops availed for employee mobile services are Latitude D630 generations that have 4GB RAM 667 MHz RAM, Intel 2.2 GHz Core 2 Duo processors, and 320 GB storage capacity. Their high RAM capacity essentially had little significance to operation specifications but only provided relevance to the computers of the present age. To receive internet connection from local ISP, two D-Link Gigabit routers will be put between the internet access media and backbone switch. This backbone switch will manage and control all the local network traffic and will be a combination of four Dell PowerConnect 2724 48-port Gigabit switches. All the tablets, laptops and personal Smartphones connect to a wireless access point, Linksys for instance, to access the internet and network services. Four switches were picked to support 1 server, 3 wireless access points, 3 laser printers, 2 Dell Color Laser 3110cn, 50 laptops and computers, and still have excess ports available for any upgrade required in future.

Due to limited power supply faced by the bank, especially in areas that wireless networks are to be deployed, the various networks switches mentioned above are PoE enabled. This implies that the need for power will be catered for and employees do not have to connect their devices to a power source and at the same time to the cables (Tian & Cox, 2004).

Corporate IT policy

Network resource and internet availability for any business, specifically businesses dealing with personal and customer data, are key tools to assist in business operations. However, networks are susceptible and require constant control and monitoring (Riles, 2001). Internet access of the business will be availed by two local ISPs to ensure business efficiency and to ensure that resources of the network will be open to its management and staff with no constraints related to time of application. This does not mean that the network is not going to be checked but rather creates an environment suitable for the staff in their work place. Monitoring network and transfer of data will be done to preserve the integrity of customer data, protect employee wellbeing, and maintain integrity of operating business systems. The bank staff will use the internet during working hours to serve business operations, but during breaks or after working hours, they are allowed to utilize the internet for their own desires. Management and employee emails will undergo intense checking before authentication. In fact, management and employee authentication will be done via Microsoft Active Directory (AD) infrastructure. This also applies to their mobile devices to mitigate security concerns. Emails will firstly undergo complete scan of any attachments to locate the possibility of any threats towards the banking system before allowing employees read the contents of the email. Every employee has the responsibility to inform the IT management in case the employee receives questionable email.

Security is essential especially in the deployment of any network having an internet connection. The latest protection and bandwidth checking software will be used to ensure that unauthorized third parties do not access bank information and data files (Peterson & Davie, 2011). The preferred software for this task is the Microsoft Active Directory (AD). The management and the staff will have passwords and user accounts with administrative rights and specific security clearance. Only the IT manager will have full control and access to client/strict bank information. There is needs for a backup system to cater for any outages in the network. The most vital information requiring back up is on the bank’s older computers since loss of information as delicate as banking information could bring problems to the organization. Since the bank wants to utilize the new network as a system facilitating the staff gain access and share resources, the information will be stored on the central server (Riles, 2001). Cloud computing will also be adopted by the bank for storage of its vital information and avoid problems that come with outages (Riles, 2001).

The server and information systems will undergo a weekly backup of system configurations and information. This length of the chosen period was short because it is easier to perform system rollback as compared to long period rollbacks. Employees and client accounts will be stored on servers in both local and remote locations. Finally, Western County Bank is interested in integrating their main internal web-based application with a “Software as a Service” (SaaS) provider that specializes in online banking services. The web-based application was designed to easily integrate into a cloud-computing environment.

Software as a Service and Virtualization is a key trend in many businesses today. Businesses are virtualizing their operations to way a tame cybercrime that is on the rise. In addition to cloud computing, the network topology will allow for virtualization and online banking services provided by a SaaS company of choice (Antonakos & Mansfield, 2009).

Network diagram

The diagram below is a basic layout of how the new network system will appear and operate. However, the diagram does not illustrate the actual measurements and positions of the equipment. Routers displayed do not show the redundancy that the new network intends implement. The connections correctly show the network peripherals and computers, however, the laptop and desktop computers are all directly linked. The illustration below shows only some computers to prevent consumption of large space.

Budget

The proposed budget for the new rollout will include the cost of the software, hardware, labor, and external resources. The budget includes a five-week time span for complete installation.

Week 1

Oder software, network peripherals, hardware, and internet services

Information backup form old computers

Start office organization to conform to the bank’s new network

Week 2

Arrival of ordered materials

Removal of old computers and other hardware at the discretion of the bank

Installation of internet by two ISPs

Week 3

Setting up and configuration server and backbone network setups

Wiring the backbone switches to workstations and wireless access points for laptops, tablets and Smartphones

Week 4

Installation of computers and laptops with Operating Systems, software, and other configurations

Linking all computers to network and testing

Week 5

Training IT managers on the usage of specific network set ups

Training employees too

Finalizing and troubleshooting any possible issues and cleaning p any excess materials

The cost for training employees and installation will be averaged at $150 dollars per hour. There will be 35 hours per week spent on network installation. This generates 175 total hours, and the cost of the total services is $ 26250.

Software and hardware description Cost Per Unit Total Cost

2 Dell PowerEdge 2900 III Servers w/

Windows Server 2008

w/30 CALS and Symantec

Multi-Server Security Suite $7,833 $15,666

35 Dell OptiPlex 755 Desktop

Computers w/Windows Vista Business

licenses & Microsoft Office 2007 $1,849 $64,715

15 Dell Latitude D630 Laptops

w/Windows Vista Business licenses $1,735 $26,025

4 PowerConnect 2724

24 Gigabit Ports $369 $1,476

2 D-Link Gigabit Router $90.50 $181.0

3 Linksys Wireless-N Access Point $155.99 $467.97

2 Dell 3110cn Color Laser Printer

w/Network Ready Capabilities $549 $1,098

2000ft. CAT6 Ethernet Cable $298 $298

QuickBooks Enterprise Solutions

50 Users $7,000 $7,000

Sage Enterprise Simply Accounting $2,000 $2,000

Two Cable Internet Access Initial Startup

& then $160 per month $180.00 $180

Total

(including $26250

installation services) $145,356.97

References

Antonakos, J. L., & Mansfield, K. C. (2009). Computer networking for LANs to WANs: Hardware, software and security. Clifton Park, N.Y: Cengage Delmar Learning.Newman, M. E. J. (2010). Networks: An introduction. Oxford: Oxford University Press.

Peterson, L. L., & Davie, B. S. (2011). Computer networks: A systems approach. Burlington: Elsevier Science.Riles, A. (2001). The network inside out. Ann Arbor [Mich.: University of Michigan Press.

Tian, K. Q., & Cox, D. C. (2004). Mobility management in wireless networks: Data replication strategies and applications. Dordrecht: Kluwer.

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer.

Motorola

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer. This includes two-way radio, messaging, satellite products systems, networking and Internet-access products, semiconductor applications, and cellular communication products and systems. Motorola also manufactures and sells automotive and industrial electronics, printed circuit boards, energy storage systems, and ceramic/quartz electronic components (Multex.com, 2000, p. 1). Motorola strives to be the global leader in all aspects of telecommunication applications.

Maintaining the lead in the telecommunications industry requires innovation, motivation, and discipline to stay focused on the mission. Accomplishing the mission is extremely important to Motorola and its shareholders. Motorola has set four main objectives to keep the company focused as the industry leader in the new millennium.

The first objective is global leadership in core businesses. Motorola shifted from “product to market organizations” to putting the customers first. In addition, Motorola employed external leadership talent to key positions, and reassigned thousands of engineers to higher-growth businesses. The realignment of personnel increased the digital wireless telephone unit sales by 85 percent (Motorola, 2000, p. 16).

The second objective is total solutions through alliances. Many of these key business alliances are enabling Motorola to bring the Internet to the wireless arena. Motorola led the development of the Wireless Application Protocol (WAP), which standardized the way wireless telephones access and displays Internet content. WAP is supported by more than 175 of the world’s leading telecommunications and software companies.

Motorola has merged with General Instrument Corporation, which integrates broadband technologies to deliver the vast potential of video, voice and data networking to the home. The merger was valued at $17 billion dollars, and was completed on January 5, 2000. The merger also acquired the majority ownership of Next Level Communications, which provides digital subscriber line (DSL) technology. With the formation of SpectraPoint Wireless, Motorola and Cisco Systems has entered the market for broadband access through Local Multipoint Distribution Service (LMDS), which uses point-to-point microwave systems (Motorola, 2000, p. 17).

The third objective is platforms for future growth. This means building expandable telecommunications architectures upon which other companies can build and add value. This feature is extremely vital due to the fast pace of technological innovations. Some of these platforms include Aspiraä that deals with third-generation wireless systems to DigitalDNAä platforms designed to make Motorola a leader in the embedded electronics market place. Motorola has also teamed up with Lucent Technologies with the platform application of StarCore ä concerning digital signal processing (Motorola, 2000, p. 17-18).

The fourth objective is performance excellence. This is measured by providing first class service to customers and financial results. Customer complaints have decreased by 22 percent by implementing a customer-care training program to the sales staff. Financial results for 1999 are also in positive territory. Sales in 1999 rose five percent to $30.9 billon and net earnings were 817 million dollars compared to a one billion dollar loss in 1998. Motorola’s debt-to-equity ratio is improved to 10.1% in 1999 from 26.8% in 1998 (Motorola, 2000, p. 18-19). Performance excellence balances Motorola’s financial results with measures of customer and employee satisfaction, and market share.

Motorola has many strengths, the first and foremost is brand recognition. The name Motorola is known worldwide for quality products. Another strength is the P/E ratio, which is calculated by taking the price per share and dividing it by the earnings per share. The ratio for Motorola is at 68 times, compared to Motorola’s peer group at 62 times (Multex.com, 2000, p. 3). The higher the number shows the confidence shareholders have in the company.

Logistics is another asset that Motorola has in its favor. Motorola owns 126 facilities (manufacturing, sales, service and office), 65 of which are located in the United States, and 61 located in other countries. Motorola also leases 756 such facilities, 385 are located in the United States, and 371 in other countries. In Scotland, Motorola has three manufacturing plants, which employee over 6500 workers, and an additional 3500 workers employed elsewhere in the United Kingdom (Meares, 2000). Motorola has a strong foothold in the United States and overseas to produce and distribute products quickly and efficiently. .

Motorola has been on top of the telecommunications industry for many years. Being on top for a long time can lead to complacency. New innovations and equipment designs by other competitors have reduced Motorola’s market share. For Motorola to stay competitive they must employ the best personnel available and empower them to innovate and create new products and systems.

Another weakness is investing in questionable ventures. This happened to Motorola on the Iridium project. Iridium is company that provided satellite phone service for customers covering the entire globe. The Iridium system consisted of 66 satellites in orbit providing phone coverage no matter where a customer was located. This service is very appealing, but the down side to having this service was the price of the phone, which ranged from three to ten thousand dollars and the usage fee per minute was a little over ten dollars. For some customers this was the perfect service, but Iridium could not generate enough customers to stay solvent. The explosion of the wireless industry and low cellular coverage rates was the downfall of Iridium. Motorola had an 18 percent stake in Iridium and lost over two billion dollars. The Iridium satellite service was turned-off in April of 2000 and Motorola will gradually let the 66 satellites burn up in the earth’s atmosphere. Neither iridium nor Motorola could find a buyer for the Iridium system (Kaiser, 2000).

The state of the economy is in great shape and the technology industry is growing at a rapid pace. Motorola’s stock price has surged over a 150 dollars a share this year and is one of the most actively stocks traded on the NASDAQ (Multex.com, 2000). This insurgence of funds through the sale of stock is an excellent opportunity for Motorola to invest heavily in research and development and buyout smaller competitors. Motorola needs to show extreme caution when investing in research or buying out a competitor since they incurred a tremendous lost with Iridium.

Another opportunity Motorola can expand on is sales overseas. The European market makes up twenty-one percent of sales and Asia-Pacific region only makes up ten percent of Motorola’s sales (Motorola, 2000). These two regions are prime areas to increase market share, the technology boom in these areas are expanding rapidly just like the United States.

The booming economy has been favorable to Motorola, but many of Motorola’s competitors have also reaped the same rewards. Motorola’s four main competitors are Ericsson, Qualcomm, Nokia, and Advanced Micro Devices. Advanced Micro Devices primarily is a manufacturer of semiconductors. Ericsson, Qualcomm, and Nokia primarily deal with cellular phones and systems (Multex.com, p. 2). In fact, Nokia cell phones are taking the market share aware from Motorola due to the new modern designs and features. Qualcomm has developed and patented Code Division Multiple Access (CDMA) technology, which is what current cell phones use. Qualcomm receives royalties off this technology for every cell phone sold.

The government is also a threat to Motorola. The Federal Communication Commission (FCC) regulates and allocates bandwidth. Motorola and other firms must get permission to use certain frequencies. In other countries, the rules and regulations are more lax or they do not have any at all. That is why companies to include Motorola have many manufacturing plants overseas, so they do not have to deal with the stringent rules in the United States.

There are many strategies Motorola can implement to be more successful. Horizontal Integration is one strategy. Horizontal Integration seeks ownership or control over competitors. As stated earlier, Motorola has done this with the acquisition of General Instrument Corporation. This strategy can also backfire, as did the venture with Iridium. Extensive research must be done when a company is looking to expand.

Another strategy that can be implemented is the Join Venture strategy. This strategy involves two or more firms forming a separate organization. Motorola and Cisco Systems accomplished this by forming SpectraPoint Wireless. This strategy is good when risk is involved, losses or profits will be split between the two companies. However, if each firm can provide a unique service or product the other does not have, this alliance can be very powerful.

The Product Development strategy is another alternative Motorola can use to be successful. This strategy increases sales by improving or modifying existing products or services. Motorola has shown improvement with its customer service department and digital cell phone division, but Nokia and Qualcomm are gaining ground with their new products and ideas. Advances in technology happen everyday, if this strategy is not addressed, Motorola will be a follower instead of a leader.

For Motorola to maintain their position as a global leader in the telecommunications industry, the Product Development strategy needs to be implemented. Motorola’s main competitors are developing new products and systems, which are outperforming and selling Motorola products and systems. Money has to be allocated for research and development of new and existing products and systems. Once the quality and performance of the products and systems are improved, sales will increase and consumer and shareholder confidence will rise. This confidence will enable Motorola to focus on overseas sales, especially Europe and the Asia-Pacific region where sales figures are low. The Y2K bug has come and gone, Motorola needs to step up to the forefront of technology and not be the stereotypical brick and mortar company that got passed by in the new millennium.

Bibliography:

References

Kaiser K. (2000). Motorola still hopes to find a buyer for Iridium.

[On-line]. Available: http://biz.yahoo.com/rf/000501/ik.html

Meares R. (2000). Update2-Motorola spends $2 billion on Scottish chips.

[On-line]. Available: http://www.ameritrade.com/cgi-bin/login.cgi

Motorola. (2000). 1999 Summary Annual Report.

[On-line]. Available: http://www.mot.com/General/Finacial/Annual_Report/1999/99annual

.pdf

Multex.com. (2000). Motorola, Inc. Stock Snapshot.

[On-line]. Available: http://www.multexinvestor.com/download.asp?docid=1346436&ticker

=mot

Quicken. (2000). Motorola Inc. Company Profile.

[On-line]. Available: http//quicken.elogic.com/sec_key.asp?ticker=MOT

Challenges Faced by Transgender Yong Adults

Challenges Faced by Transgender Yong Adults

Student’s Name

Institution of Affiliation

Date

Identity crisis is a common problem among young adults, especially transgender people who experience changes later in their lives. Gender dysphoria is phycological distress that results from an incongruence between an individual’s sex that is assigned at birth and one’s gender identity which they developed later in life. Young adults are at a stage in life that poses a major psychological problem in which a person fails to relate to either socially acceptable gender – male and female. While a person may be born female, and transform later in life to be a male, they may undergo psychological and hormonal changes that they previously not experienced. As a result, most transgender people are vulnerable to symptoms of depression and anxiety as they are not sure whether they will be fully adopted by society for what they have chosen to be and what they were previously. For this assignment, I will analyze the poem, “A letter to the girl I used to be” by Ethan Smith to help understand the challenges that young adults pass through especially those experiencing gender changes.

The text, “A letter to the girl I used to be,” highlights the story of a young man in his early 20’s narrating the changes and challenges that he faced when transforming from a female to a male. According to the poem, Ethan describes how it feels to be trapped inside the wrong body. He writes to a young girl, a female version of his younger self named Emily. Previously, he was a girl, but presently, he is a male. In the poem, Ethan goes back to the days when he was Emily, and here he experiences numerous challenges. For example, he states that every time she goes to watch baseball, a voice he no longer recognizes whispers “Ethan, do you remember? When you were gonna be the first girl in the major leagues-Seattle Mariners. Rally Cap.” By this, Ethan is referring to him as a young girl who reminds him of the time, he was young and wanted to be the first girl baseball league player. When Ethan was Emily, he wanted to be a baseball player, but maybe his ambitions have changed since transforming from a female to a male, and this is why he is conflicted about his past and present interests.

References

Ethan Smith. “A Letter to the Girl I Used to Be.” Retrieved from: https://youtube.be/Lkn06Y8prDU

Motorola Mission

Motorola Mission

Motorola mission is to provide integrated communications and embedded electronic solutions to the customer. This includes two-way radio, messaging, satellite products systems, networking and Internet-access products, semiconductor applications, and cellular communication products and systems. Motorola also manufactures and sells automotive and industrial electronics, printed circuit boards, energy storage systems, and ceramic/quartz electronic components (Multex.com, 2000, p. 1). Motorola strives to be the global leader in all aspects of telecommunication applications.

Maintaining the lead in the telecommunications industry requires innovation, motivation, and discipline to stay focused on the mission. Accomplishing the mission is extremely important to Motorola and its shareholders. Motorola has set four main objectives to keep the company focused as the industry leader in the new millennium.

The first objective is global leadership in core businesses. Motorola shifted from “product to market organizations” to putting the customers first. In addition, Motorola employed external leadership talent to key positions, and reassigned thousands of engineers to higher-growth businesses. The realignment of personnel increased the digital wireless telephone unit sales by 85 percent (Motorola, 2000, p. 16).

The second objective is total solutions through alliances. Many of these key business alliances are enabling Motorola to bring the Internet to the wireless arena. Motorola led the development of the Wireless Application Protocol (WAP), which standardized the way wireless telephones access and displays Internet content. WAP is supported by more than 175 of the world’s leading telecommunications and software companies.

Motorola has merged with General Instrument Corporation, which integrates broadband technologies to deliver the vast potential of video, voice and data networking to the home. The merger was valued at $17 billion dollars, and was completed on January 5, 2000. The merger also acquired the majority ownership of Next Level Communications, which provides digital subscriber line (DSL) technology. With the formation of SpectraPoint Wireless, Motorola and Cisco Systems has entered the market for broadband access through Local Multipoint Distribution Service (LMDS), which uses point-to-point microwave systems (Motorola, 2000, p. 17).

The third objective is platforms for future growth. This means building expandable telecommunications architectures upon which other companies can build and add value. This feature is extremely vital due to the fast pace of technological innovations. Some of these platforms include Aspiraä that deals with third-generation wireless systems to DigitalDNAä platforms designed to make Motorola a leader in the embedded electronics market place. Motorola has also teamed up with Lucent Technologies with the platform application of StarCore ä concerning digital signal processing (Motorola, 2000, p. 17-18).

The fourth objective is performance excellence. This is measured by providing first class service to customers and financial results. Customer complaints have decreased by 22 percent by implementing a customer-care training program to the sales staff. Financial results for 1999 are also in positive territory. Sales in 1999 rose five percent to $30.9 billon and net earnings were 817 million dollars compared to a one billion dollar loss in 1998. Motorola’s debt-to-equity ratio is improved to 10.1% in 1999 from 26.8% in 1998 (Motorola, 2000, p. 18-19). Performance excellence balances Motorola’s financial results with measures of customer and employee satisfaction, and market share.

Motorola has many strengths, the first and foremost is brand recognition. The name Motorola is known worldwide for quality products. Another strength is the P/E ratio, which is calculated by taking the price per share and dividing it by the earnings per share. The ratio for Motorola is at 68 times, compared to Motorola’s peer group at 62 times (Multex.com, 2000, p. 3). The higher the number shows the confidence shareholders have in the company.

Logistics is another asset that Motorola has in its favor. Motorola owns 126 facilities (manufacturing, sales, service and office), 65 of which are located in the United States, and 61 located in other countries. Motorola also leases 756 such facilities, 385 are located in the United States, and 371 in other countries. In Scotland, Motorola has three manufacturing plants, which employee over 6500 workers, and an additional 3500 workers employed elsewhere in the United Kingdom (Meares, 2000). Motorola has a strong foothold in the United States and overseas to produce and distribute products quickly and efficiently. .

Motorola has been on top of the telecommunications industry for many years. Being on top for a long time can lead to complacency. New innovations and equipment designs by other competitors have reduced Motorola’s market share. For Motorola to stay competitive they must employ the best personnel available and empower them to innovate and create new products and systems.

Another weakness is investing in questionable ventures. This happened to Motorola on the Iridium project. Iridium is company that provided satellite phone service for customers covering the entire globe. The Iridium system consisted of 66 satellites in orbit providing phone coverage no matter where a customer was located. This service is very appealing, but the down side to having this service was the price of the phone, which ranged from three to ten thousand dollars and the usage fee per minute was a little over ten dollars. For some customers this was the perfect service, but Iridium could not generate enough customers to stay solvent. The explosion of the wireless industry and low cellular coverage rates was the downfall of Iridium. Motorola had an 18 percent stake in Iridium and lost over two billion dollars. The Iridium satellite service was turned-off in April of 2000 and Motorola will gradually let the 66 satellites burn up in the earth’s atmosphere. Neither iridium nor Motorola could find a buyer for the Iridium system (Kaiser, 2000).

The state of the economy is in great shape and the technology industry is growing at a rapid pace. Motorola’s stock price has surged over a 150 dollars a share this year and is one of the most actively stocks traded on the NASDAQ (Multex.com, 2000). This insurgence of funds through the sale of stock is an excellent opportunity for Motorola to invest heavily in research and development and buyout smaller competitors. Motorola needs to show extreme caution when investing in research or buying out a competitor since they incurred a tremendous lost with Iridium.

Another opportunity Motorola can expand on is sales overseas. The European market makes up twenty-one percent of sales and Asia-Pacific region only makes up ten percent of Motorola’s sales (Motorola, 2000). These two regions are prime areas to increase market share, the technology boom in these areas are expanding rapidly just like the United States.

The booming economy has been favorable to Motorola, but many of Motorola’s competitors have also reaped the same rewards. Motorola’s four main competitors are Ericsson, Qualcomm, Nokia, and Advanced Micro Devices. Advanced Micro Devices primarily is a manufacturer of semiconductors. Ericsson, Qualcomm, and Nokia primarily deal with cellular phones and systems (Multex.com, p. 2). In fact, Nokia cell phones are taking the market share aware from Motorola due to the new modern designs and features. Qualcomm has developed and patented Code Division Multiple Access (CDMA) technology, which is what current cell phones use. Qualcomm receives royalties off this technology for every cell phone sold.

The government is also a threat to Motorola. The Federal Communication Commission (FCC) regulates and allocates bandwidth. Motorola and other firms must get permission to use certain frequencies. In other countries, the rules and regulations are more lax or they do not have any at all. That is why companies to include Motorola have many manufacturing plants overseas, so they do not have to deal with the stringent rules in the United States.

There are many strategies Motorola can implement to be more successful. Horizontal Integration is one strategy. Horizontal Integration seeks ownership or control over competitors. As stated earlier, Motorola has done this with the acquisition of General Instrument Corporation. This strategy can also backfire, as did the venture with Iridium. Extensive research must be done when a company is looking to expand.

Another strategy that can be implemented is the Join Venture strategy. This strategy involves two or more firms forming a separate organization. Motorola and Cisco Systems accomplished this by forming SpectraPoint Wireless. This strategy is good when risk is involved, losses or profits will be split between the two companies. However, if each firm can provide a unique service or product the other does not have, this alliance can be very powerful.

The Product Development strategy is another alternative Motorola can use to be successful. This strategy increases sales by improving or modifying existing products or services. Motorola has shown improvement with its customer service department and digital cell phone division, but Nokia and Qualcomm are gaining ground with their new products and ideas. Advances in technology happen everyday, if this strategy is not addressed, Motorola will be a follower instead of a leader.

For Motorola to maintain their position as a global leader in the telecommunications industry, the Product Development strategy needs to be implemented. Motorola’s main competitors are developing new products and systems, which are outperforming and selling Motorola products and systems. Money has to be allocated for research and development of new and existing products and systems. Once the quality and performance of the products and systems are improved, sales will increase and consumer and shareholder confidence will rise. This confidence will enable Motorola to focus on overseas sales, especially Europe and the Asia-Pacific region where sales figures are low. The Y2K bug has come and gone, Motorola needs to step up to the forefront of technology and not be the stereotypical brick and mortar company that got passed by in the new millennium.

Bibliography:

References

Kaiser K. (2000). Motorola still hopes to find a buyer for Iridium.

[On-line]. Available: http://biz.yahoo.com/rf/000501/ik.html

Meares R. (2000). Update2-Motorola spends $2 billion on Scottish chips.

[On-line]. Available: http://www.ameritrade.com/cgi-bin/login.cgi

Motorola. (2000). 1999 Summary Annual Report.

[On-line]. Available: http://www.mot.com/General/Finacial/Annual_Report/1999/99annual

.pdf

Multex.com. (2000). Motorola, Inc. Stock Snapshot.

[On-line]. Available: http://www.multexinvestor.com/download.asp?docid=1346436&ticker

=mot

Quicken. (2000). Motorola Inc. Company Profile.

[On-line]. Available: http//quicken.elogic.com/sec_key.asp?ticker=MOT

Cell Phones Standardization Regulations

Cell Phones Standardization Regulations

Name

Professor

Course

Date

Cell Phones Standardization Regulations

It is absurd that a simple device like a cell phone could cause death to people severally without people learning lessons from these incidences. The government should standardize cell phone regulations that discipline drivers on safe driving to protect people’s lives. Banning use of Cell phones while driving is one way to protect countries safeties. The consideration on whether the ban on using cell phone while driving should be implemented, there are two different positions. Cell phone, when a car is in motion, should be made unlawful with exceptions of situation considered emergencies. Cell phones have proven to be a distraction as a human brain concentrates better on one thing at a time. The usage of cell phones when driving gives an individual a slower reaction time, therefore, increasing the number of accidents on the roads. Other people argue that the cell phones tend to cause as much distraction as radio and cell phones are required for emergencies. On the other hand, there is the argument that a law that makes the usage of cell phones illegal when driving will be helpful in reducing the number of accidents on the roads and increase drivers concentration when driving.

The usage of cell phones while driving should be outlawed because they are a source of distraction when driving. It is obvious that an individual brain works better when concentrating on one thing and cannot concurrently function well when doing any tasks (Funk, 2004).  Research shows that the cell phones users when driving are at a greater risk of being involved in serious road accidents. Driving using two hands on the wheel gives a person total concentration, this often encourages safe driving. The aspect proves that human beings are not good at multitasking and, therefore, using cell phones when driving is unsafe.

At the same time, although an individual might believe they can multitask, using cell phones when driving makes a person have a slower reaction time resulting to an accident. Cell phone drivers can be compared to drivers who are under the influence, in that they both experience great impairment and are less responsive when driving (Briem & Hedman, 2005). A significant aspect of being in control when driving is a driver reaction time as immediate reaction is important in the prevention of accidents. Many laws have been put in place to help in the reduction of alcohol related accidents, which, therefore, necessitates attention n establishment of laws to ban usage of cell phones while driving (Funk, 2004).

The law, which bans the usage of cell phones when driving unless in a situation considered emergency, will help in reducing the number of road accidents. It is obvious that the cell phones are an essential need socially unlike in the past where there were no cases of cell phone drivers. In emergency situations, there is a need for cell phones to be allowed but if the call is important a person should first pull over to make a call (Alm & Nilsson, 2005). Other people argue that the usage of cell phones when driving tends to reduce the response times associated with emergency situations. Research shows that over 140,000 emergency calls are placed using cell phone users daily, which makes a good point and need to be considered when outlawing the usage of cell phones when driving (Brookhuis, De Vries & De Waard, 2001). The move is essential as accident rates would remain lower by enacting a ban on cell phone users while driving but still permit emergency phone calls. Although, there are many factors that have not been banned yet such as drinking, eating and talking with other people who are in the car when driving, this should be because not overlooking the ban (Lahood, 2009). Cell phone usage while driving has been a contentious issue for a long time now, which needs to be addressed by enacting a law to ban the common behavior. Cell phones are considered noticeable factor, which can be helpful in reducing the number of road accidents.

Conclusion

The usage of cell phones has proven to be a distraction in terms of concentration when driving resulting road accidents. The human brain functions better when focusing none thing at a time and cannot multitask. Cell phone drivers experience slower reaction time when driving which leads to more accidents in the end. Conversely, the usage of cell phones when a person is driving need to be made illegal with exceptions given to emergency cases. It is obvious by the studies undertaken; the benefits associated with usage of a cell phone when driving do not surpass the risks associated with the behavior. Many lives have been unnecessarily lost as families being torn apart over something that can be easily prevented. There are a number of viable options available that can help reduce these numbers. Since studies show that using a cell phone while driving is equivalent to driving under the influence and they have to be treated as similar crime and liable to be punished by the state law. There should be standardization of regulations regarding cell phone usage while driving across all states. The safety of the states motorists should be regarded as vital as the convenience. Most countries ban mobile texting while driving, however, there no bill that has been passed to eliminates the use of cell phones while driving across all states.

References

Alm, H., & Nilsson, L. (2005). The effects of a mobile telephone task on driver behaviour in a car following situation. Accident Analysis & Prevention, 27(5), 707-715.

Briem, V., & Hedman, L. R. (2005). Behavioural effects of mobile telephone use during simulated driving. Ergonomics, 38(12), 2536-2562.

Brookhuis, K. A., De Vries, G., & De Waard, D. (2001). The effects of mobile telephoning on

Driving performance. Accident Analysis & Prevention, 23, 309-316.

Funk, J. L. (2004). Mobile disruption: the technologies and applications driving the mobile

Internet. Hoboken, N.J.: Wiley.

IRTAD Road Safety Annual Report 2009 (2009 ed.). (2010). S.l.: International Transport Forum.

The best of Motor Trend: 1949-1999. (A 50th anniversary special ed.). (1999). Los Angeles:

Advanced Clinical Nuts and Bolts Assignment

Advanced Clinical Nuts and Bolts Assignment

Cognitive

Provide a brief history of how the theory began and how it has evolved. Who are the major contributors to this theory or model and what do you know about him/her/them? What historical events and cultural norms may have influenced the creation of this theory? This can be in bullet points where it is relevant) in other words, you do not have to write this section in narrative form).

Cognitive aka Cognitive Behavioral Theory (CBT)

Focuses on patient/client’s thought process

Sensitive to time (short term) and focuses on the present

Dysfunctional thoughts= maladaptive behaviors

Focuses on the linkages of systems

CT can be thought of as a theory

This is because it’s a system of strategies and a series of techniques

Each system involved is for survival- cognitive, behavioral, affective and motivational- composed of structures known as schemas

Cognitive therapy involves strategies

Collaborative enterprise between patient/client and therapist

Purpose is to explore and modify dysfunctional interpretations by using logical examination and behavioral experiments

Clients/Patients learn to help themselves through coping mechanisms

Collaborative Empiricism

Therapist asks questions to understand the client/patient point of view

Guided Discovery

Finding out what the client/patient misinterpretations and beliefs come from

Both work by using Socratic Dialogue which is a form of questioning that helps uncover the patient/clients views

Created by psychiatrist Aaron T. Beck in the 1960s

Realized that internal thoughts affect and influence behaviors

Psychologist, Albert Ellis, worked independently from Beck on the same concept

Many patients had internal dialogues that seemed as if they were talking to themselves

Thoughts made an impact on their feelings

Rigid form of treatment

Patient to discuss issues with therapist who will work on specific goals with client/patient

Identify the basic assumptions, tenants, and major concepts of the theory. You should include techniques, examples, or any important aspects of the theory that you consider primary to your understanding and ability to apply the practice. This can be in bullet points. The information you provide here will be especially useful as a “cheat sheet” in your internship and/or as a study guide for any licensure exams you take. This can be in bullet points where it is relevant (in other words, you do not have to write this section in narrative form).

CBT is an action oriented treatment; patient must be actively engaging during tx

With CBT, you identify common themes in a patient’s emotional reaction, narratives, and imagery

Usually goes on for 12-16 weeks and therapist is actively engaged with client

CBT is used in conjunction with Rational Emotive Behavior Therapy (REBT)

Both share an importance of cognition and both view the task of therapy is to change maladaptive assumptions

Facing your fears is a technique

To bring about change, a client must face their fears instead of running away from them

Role playing

Clients may role play during sessions

This helps the client prepare for problematic interactions that they may have with others

Learning to calm yourself as strategy

Patients can resort to relaxation techniques such as breathing or stretching or using guided imagery that helps you focus on peace, rather than destruction that may be occurring in one’s life

CBT focuses on both negative and positive interactions/experiences patient may have had

People contribute to their own negative experiences

CBT helps clients to have a routine and lessen avoidance

Based on the major concepts of this theory, what presenting problems or mental or behavioral health concerns do you think this theory may be appropriate for? And is it a theory of explanation or change or both?

This theory works with individuals who experience anxiety, substance abuse, personality, and other disorders.

This theory would be considered to be both due to it being one of the most used treatments with patients. They must acknowledge the issues that they have in order to break free from the issues that are barriers and allows the patient to change their way of thinking.

Does the theory account for the life experience of the client? Does the theory/model allow for diversity of identity or experience in relevant ways such as ethnic preferences, cultural values or norms, racial differences, gender expressions, socioeconomic status, and religious preference? How?

Yes, the theory accounts for life experiences. This theory allows the patient to reflect over their life and what is causing them issues so them and the therapist can come up with goals for treatment. This theory can take in account a person’s diversity or identity, if need be in order to overcome barriers during treatment and growth.

What does the evidence say about this theory? Pull from other resources other than your textbook readings to answer this question. For some theories, it is equally important to identify which groups or problems the theory is NOT effective with as it is to indicate which groups or problems it is effective with.

Works for all types of individuals

Those with mental illnesses such as depression, PTSD, eating disorders, substance abuse, etc

Children and geriatric clients

Cognitive Theory/CBT is an effective treatment

Research has been conducted to evaluate the effectiveness of CBT and has proven that it is an effective treatment for those with psychological issues and those who have medical issues with mental illness as a co morbidity

Evidence based treatment

Therapists who have used CBT with their clients have noticed success with complex disorders

Short term treatment that focuses on the here and now

Works at the pace of the client

Just as effective as medication because clients learn coping skills that they will use even after treatment ends

Goals of treatment are clearly defined for clients; no surprises so they know what to expect

Requires patient/client engagement

Therapist works along with patient in goal creation and attainment

Effective for communication and dialogue

Can be adapted to meet the patient where they are

In what ways, if any, does this theory fit in your theoretical approach to your current work or your future work as a social worker?

I do believe that CBT will allow me to assist my clients or patients by assisting them with coping mechanisms. For instance, if they are nervous coming to treatment, I could assist them with breathing exercises that they could do prior or during to treatment to make them feel at ease.

Motivation is the application of a positive factor so as to get a positive result form an individual

Psychology:

Name:

Professor:

Institution:

Course:

Date:

Introduction

Motivation is the application of a positive factor so as to get a positive result form an individual. All people are prone to undergo a stressful period where they need a push to the next level. This push determines the success or failure of the receiver of the motivational instrument. The theories of motivation were introduced to the world though psychologists such as Abraham Maslow, Sigmund Freud, Fredrick Herzberg and Fredrick Taylor (Miner, 2008). These psychologists spent the better part of their career coming up with the theories. There are several theories of motivation that can be applied to motivate a person in different situations. The application of these theories is essential to the sustainability of the success of the future generation. Being an aspiring psychologist, I have received motivation from different people. These people have direct or indirect contact with me. This showcases motivation as a factor that does not have boundaries. Motivation has been a vital part of my life from the early stages of my life to my current point in life. Some of these influences are unconscious sources or conscious. Unconscious motivation plays a significant role due to the manifestation that it encourages. These motivational theories are have impacted significantly on my choice to pursue psychology as my career. The analysis of motivational influences is thus ideal in that it showcases the reasons for my actions in the past and present day (Beck, 2004).

The focus of this paper is to provide an analysis of motivational theories in psychology. The paper uses examples of psychologists such as Maslow by providing their take on motivation influences. The paper uses this information to explain what motivates me to take on psychology as a career. The paper finally offers a concluding paragraph that summarizes its contents.

Motivation involves encouraging an individual to pursue a certain goal or objective. The fulfillment of this objective acts as a source of happiness and achievement which in turn adds meaning to a person’s life. A person can be motivated consciously or unconsciously depending on their surrounding environments. Most individuals are influenced at an early stage in their life making this a crucial time of there. Motivation entails using the positive aspects in the environment so as to derive a positive result. There are different types of motivational method that are classified into theories. These theories are used to date by the general public in various industries making them an essential aspect in the world of psychology (Beck, 2004).

Theories of motivation

Motivational theories are theories that explain different motivational techniques and their role in the influencing of behavior. There are several motivational theories that exist in present day. These theories are inspired by different situations and thus reflect on different individuals. One of the psychologists who has played a significant role in the determining these theories is Abraham Maslow (Beck, 2004).

Maslow is known for his motivational theory that talks on the hierarchy of needs. According to Maslow, human beings are motivated by items that they do not have direct possession or contact. These needs are not satisfied due to a variety of features that are determined by the internal and external environment (Miner, 2008). The hierarchy in this case consists of needs and wants that human beings experience at one point in their life. The first category consists of physiological needs; these needs consist of basic needs such as food, shelter, clothing and education. These needs are essential for the proper growth and development of all the human beings. Lack of physiological needs creates a vacuum that puts a strain on their progress of an individual’s life. People who experience this situation rely on factors such as family, friends and faith so that they can improve their life (Miner, 2008).

Exposure to these needs is ideal in that it improves the self worth of an individual. People who fall under this category are said to be less fortunate in that they lack the essential resources to ease their life. The second category in the pyramid is the safety needs; safety needs comprise of security in all aspects of life. Beings able to live in a safe environment increase the confidence of a person. Safety creates the provision for investment which in turn, yields more progress in the life. The third stage is social needs; social needs comprise of family, friends, social status, and lifestyle. This stage is a pivotal part of life due to the aspect of communication. People strive to perfect their social needs so that they can elevate their position in life (Miner, 2008). This stage is also significant because people need comfort from their friends and family when experiencing different hardships. The fourth stage is the esteem needs; these needs are essential due to the fact that they help human beings accomplish the goals and objectives they have. Self esteem is ideal for the success of any person. Self esteem is initiated right from the time of an individual’s childhood. Through self esteem a person is able to control all the challenges that come with life. Lack of self esteem reduces the motivation of an individual making it harder for them to survive in life. This stage is required to go through all the stages in life with ease. The last and final stage is self actualization; self actualization is a state of superiority. At this stage an individual has achieved all the objectives that they have set. These objectives constitute to the overall happiness and success of a human being (Beck, 2004).

Very few people manage to reach the self actualization stage. Belonging to a certain stage determines the amount of motivation one has. If a person is born into a family that does not have a lot in terms of financial resources, they are likely to work harder so that they can fill this vacuum. This situation can however take a different turn in that some people may accept their state and choose not to improve it. Motivation involves adding a positive factor to the life of a person so that they can use it to improve on their situation. The lack of a certain commodity influences a person to strive so that they can acquire the commodity. This is brought about by manifesting in an item until one achieves their goal or objective (Miner, 2008).

A close look at Maslow’s theory of motivation indicates that he is one of the sources of inspiration for my choice of psychology as a subject. The theory mentions that a person cannot be motivated if they do not have a motivating factor. This simply means that an individual has to have something that to look forward to before they can set their goal (Forgas & Sydney Symposium of Social Psychology, 2006). The United States has the most successful economy in the world. Despite this, the country is experiencing high levels of poverty due to the rate of employment. Over fifty percent of the economies population is living on government welfare and do not have an adequate healthcare plan. These statistics display that the economy is not in a good place. The fact that a country like the United States is not able to provide for its citizens adequate living standards increases the rate of uncertainty of the future generation (Hoffmann, 2007).

As a young member of the population, it is essential for me to get an education so that I can compete with the more than capable job seekers. My choice get a college degree is thus motivated by the fact that a college education is essential for the sustainability of the society. My choice to take on psychology as a major as opposed to engineering or education is determined by the social ills that occur in today’s society. Today’s society cannot be compared with the society that the older generation grew up. The rate of insecurity, evil and poverty continues to increase on a daily basis. Majority of the crimes that are committed are as a result of people who are mentally or emotionally scared. One of the ways that people can make the country safer to live in is by investing in careers that eradicate these occurrences. Psychology is a significant contributor in the safety of the community due to the ability to communicate with social deviants (Hoffmann, 2007). Some of the most disturbing cases committed in the country over the years have been solved with the aid of psychologists. Having psychology as my major is not only a personal objective but a community objective. According to Maslow’s hierarchy of needs, each individual is placed in one of the categories of the pyramid (Forgas & Sydney Symposium of Social Psychology, 2006). As a student, there are some achievements that I am yet to achieve in the future. This places me in the fourth and fifth category because achieving my dream would be a driving force for the start of my career. The ability to kick start my career will validate my existence in the self actualization stage. This is due to the satisfaction that comes with the achievement of my goal. The probability of having a positive future without a college education is low. The fact that I am yet to achieve a degree motivates me to work hard so that I can graduate. This is reflective of Maslow’s theory that states that the lack of a commodity makes a person motivated to work toward achieving that goal (Miner, 2008).

As stated earlier, motivation is influenced unconsciously and consciously by the surrounding environment. One of the factors that the society continues to face is the high rate of divorce. This is created by the change of the society in terms of social roles, education and globalization. One does not have to be a product of a broken home to experience the impact it has on children. Being a physiologist is ideal in that it a person identifies with children who are having hard times coping with divorce. This is source of motivation is unconscious in that there is not particular person that has geared me towards helping such children. The events in the society make me want to take a stand so that I can be of help to people who are in need (Forgas & Sydney Symposium of Social Psychology, 2006).

Motivation starts at an early stage; most of the individuals derive motivation without even being aware. This is known as unconscious motivation due to the lack of knowledge of the impact of a positive factor. One of the physiologists who placed emphasis on unconscious motivation is Sigmund Freud (Miner, 2008). He mentions a human beings behavior is comprises of desires, thoughts and memories. These factors are represented by the unconscious state making them unconscious forms of motivation. These unconscious actions influence the conscious actions of an individual. Most of the actions that people perform are triggered by the unconscious thoughts that they relay. This is one of the theories that give credit to positive thinking and positive actions. A person who thinks of negative thoughts and desires creates negative situations. This is because negative thoughts give rise to negative actions (Forgas & Sydney Symposium of Social Psychology, 2006). This applies to the application of positive thoughts as a source of motivation. This source of motivation has played a significant role in my decision to get a college education by studying psychology. Both unconscious and conscious motivation work hand in hand making them complement each other. Thinking about being a psychologist in future influences me to apply all my talents so that I can achieve my goals. Applying my talents is performed by positive actions such as hard work, studying for exams and concentrating in all things psychology.

Motivation is used in places such as the workplaces, schools and sports. My choice to take on psychology is inspired by my family. Through my family, I am able to align myself with positive features so that I can get positive results. My choice to take on psychology as a course is inspired by the needs to understand people better. Psychology is the study of the mind of a human being (Forgas & Sydney Symposium of Social Psychology, 2006). Human beings have the same characteristics which makes them similar in nature. Despite this, they possess different qualities that set different people apart from each other. Having different personalities creates different character traits that make each individual unique. Being unique gives rise to different social groups that people use to identify with each other. Human beings cannot be contained in a particular group due to the different personalities they portray. It is thus ideal to have the ability communicate with different sorts of people in different social classes and creeds. As stated earlier, psychology aids a person understand the thoughts, feelings, qualities and character traits of their peers (Hoffmann, 2007). Understanding different people encourages communication which in turn, gives rise to respect. When people respect each other, they are able to maintain peaceful situations where war would be the obvious choice. Choosing to study psychology is thus motivated by my need to understand the different character traits that people have. This form of motivation portrays conscious motivation due to influence by the surrounding environment. Unconscious motivation cannot be ruled out because positive thoughts determine the actions and performance that I choose to take.

Another theory of motivation is Frederick Winslow Taylor’s theory of motivation. Taylor takes a different route by breaking down goals and objectives in small portions. Taylor states that people generally have a hard time achieving their objectives (Miner, 2008). This is credited to the fact that most of the objectives are long term oriented. It is much more difficult to achieve long term objectives due to the monotony and boredom that may come with the trade. Choosing to get a degree in psychology takes a period of three to four years. This type of goal is thus classified under a long term goal making it harder to achieve. There are a number of factors that make students drop out of college. Taylor mentions that people have an easier time performing their tasks when there divided into sub tasks (Forgas & Sydney Symposium of Social Psychology, 2006). This form of motivation is ideal for someone in my position and thus acts as a source of reference. Since it is not advised to take a break from college, a student can concentrate on the selected semester courses that are of interest to them. As a psychologist student, I have chosen to focus on each course keenly so that I can maximize on my score. This acts as a source of motivation in that I can concentrate on three months as opposed to four years. Motivation should be applied by a person who portrays features that an individual aspires to be like (Hoffmann, 2007). Agents of motivation can come in different forms depending on the surrounding environment. Some of the people I get motivation from are my parents, teachers, influential figures and pioneer psychologists. This type of motivation is ideal in that I am able to live by the principles that are set by my mentors.

Conclusion

Motivating factors improve the performance of people who receive motivation on a regular basis. It is difficult to be motivated by factors that do not portray positive outcomes. People require motivation on a regular basis due to the challenges that are experienced on a daily basis. A majority of people around the world apply the motivation theories without even knowing about their existence. This provides evidence of the effectiveness of the motivational theories. As a student, I face a number of hardships that may distract me from achieving my goals. The use of unconscious motivation puts me back on track by acting as a source of inspiration for me. My choice to acquire a psychology degree is one of the most significant choices of my life. This is categorized under the long term goals and requires an immense amount of motivation so that I graduate with honors. Being able to use my degree will impact not only on my life but on the lives of the entire society. Through my degree I will be able to give back to the community by using my talent to help others. One of the advantages that come with this is the idea that I will one day become a source of motivation for the younger generation to come.

References

Beck, R. C. R. C. (2004). Motivation: Theories and principles. Upper Saddle River, N.J: Pearson Education.

Forgas, J. P., & Sydney Symposium of Social Psychology. (2006). Social motivation: Conscious and unconscious processes ; [the Sydney Symposium of Social Psychology, volume 6]. Cambridge [u.a.: Cambridge Univ. Press

Hoffmann, S. (2007). Classical Motivation Theories – Similarities and Differences between them. München: GRIN Verlag GmbH.

Miner, J. B. (2008). Organizational behavior 5: From unconscious motivation to role-motivated leadership. Armonk, N.Y: M.E. Sharpe.