Wednesday, August 26, 2020

Becoming a Cosmetologist

Janae Benton English 12 Kujawski 7 Walk 2018 Turning into a Cosmetologist My drawn out objectives is to turn into an authorized Cosmetologist and to seek after a profession in the field of Cosmetology. This fantasy started for me when I was fifteen years of age; it began as a leisure activity. I would do my sisters hair, my mother's hair, and even my own hair. My enthusiasm for doing hair was additionally fueled by watching hair instructional exercises on Youtube and it motivated me to be increasingly creative. At this moment, I'm moving in the direction of getting my GPA up to a 3.0 in light of the fact that I accept this will improve my odds for being acknowledged into a Cosmetology School. I accept that I will be a decent possibility for a Cosmetologist. As I pursue my deep rooted dream, I need to recognize what are the vital essentials required so as to turn into an authorized Cosmetologist, specifically the instructive prerequisites, just as the character qualities of effective individuals in this profession , and business openings inside the business. The standard prerequisites for being acknowledged into a cosmetology school is to have a GED or a secondary school confirmation and be at any rate 16 years old. The time allotment to finish the program is as meager as nine months or two years. They will be surveyed with the scalp kneads, styling, hair shading, synthetic treatment, and doing cosmetics. Once in a while, a few cosmetology understudies begins as a shampooer, in others words, as a volunteer worker.Benton 2 during the time spent being a Cosmetologist you should contemplate the wellbeing and cleanliness in numerous salons, for example, bacteriology, sanitation, and emergency treatment. Additionally they have some other preparing prerequisites so as to take the board test. Assuming that in the event that you don't go to for this program it isn't state affirmed then you won't get your permit. â€Å"There are a lot of projects that you might be keen on; it tends to be hair interlacing, nail expert, or cosmetologist (hair, skin, nails, makeup)†. While working, you may need to invest a ton of energy in your feet while working with customers. â€Å"A part of customer goes to it is possible that the person in question for a proposal about what styles or hues will function admirably for them.† To hold to the best in class, you can finish the course consistently. â€Å"Numerous of Cosmetologist has earned the authorized and became entrepreneurs yet not every person gets the chance to be an entrepreneur†. So there is bounty for you to go into business. Numerous independently employed Cosmetologist start off when by leasing a structure so as to encourage their business.

Thursday, August 20, 2020

301 Short Story Ideas Guaranteed to Kick Your Writing into High Gear

301 Short Story Ideas Guaranteed to Kick Your Writing into High Gear With shorter attention spans and increasingly hectic lives, its no wonder readers love short stories now as much as ever. The Curious Case of Benjamin Button, The Shawshank Redemption, Minority Report, and Brokeback Mountainâ€"even Hollywood has taken a renewed interest in short stories.Below are 301 short story prompts and starters to help you become inspired, get past writers block and explore the fascinating process of writing in a genre that Stephen King famously once compared to a kiss in the dark from a stranger.Please feel free to use any of these ideas to spark your next creative project. You dont have to credit us, but it would be much appreciated if you do! A simple link to ServiceScape is the best way to do that.AdventureA group of hunters are on a hunt. Their dress and actions are completely primitive until the end when they change back into suits and leave the area in modern vehicles.Weather patterns across the globe suddenly shift, causing natural law to go haywire. A f amily tries to make sense of it while getting to safety.A flood swept away an entire town, leaving only the library and its strange secret.Your main character is evicted from their home and forced to call in some favors. Although, those favors take him/her on a wild ride they never expected.The night before an important social function, your main character is tasked with saving the world.Your main characters boat is sinking in the middle of the ocean and he/she only has 1 hour to make a raft from parts of the vessel.Your main character joins the communist regime and leads the party to glorious victory over the capitalist bourgeoisie funded by your antagonists Super-PAC.Your main character has a change of heart and partners up with your antagonist, joining their evil organization and proving a much more capable evil overlord than your antagonist could ever hope to be.Your characters things are packed up and they are ready to leave town tomorrow. Before they say goodbye to their town, they decide to stop by at their favorite bar just to say goodbye. Something that happens at the bar makes them question whether or not leaving is the right decision.When your character is hanging out at their favorite coffee shop, they notice someone loitering outside. As your character leaves, they see a black SUV pull up and a very handsome man gets out. The loiterer goes to lunge for the man, but your character instinctively decides to jump on him, blocking him from attacking the unsuspecting man. It turns out that the handsome man is the governor of the state. What happens next?Two giant fingers reach down and pluck your main character away from what they were just doing, and unceremoniously deposit them on a pirate ship.Your main character finds an abandoned car, keys still inside, parked outside their home.Your protagonist is a corporate CEO who suddenly must hunt and forage his own food.Your characters are trapped in a structure that constantly shifts and changes. How do the y find their way out?Sci-fi, Fantasy, and SupernaturalYour main character wakes up in the body of the person he/she most despises.An outdoor music festival receives strange, otherworldly visitors who decide to take the stage for their own performance.A man wakes up to discover he can no longer hear but can see things hes never seen before.A man and his dog go to the dog park to play and the dog finds a bone with strange carvings on it that reacts to the environment in unexpected ways.A group of high school friends cross paths 10 years after graduation to catch up, only to learn that one in their midst has developed special, superhuman powers.A secondary character stumbles upon a talking blade, and they begin behaving suspiciously.Your character wakes one morning and finds that they are physically stronger, faster, and have greater reflexes than when they went to sleep. Each time they sleep, they become stronger.As if losing everything she owned in the tornado wasnt enough, Lila lear ned that shed been laid off from her job. And thats when she started noticing the monsters.A tertiary character is revealed to be The chosen one, and your main character must help them to succeed in fulfilling their destiny.The antagonist dies, but the story doesnt end.Your main character is given a suit that protects them from dangerâ€"unfortunately it has a different threshold for safety than seems ideal.A character in your story becomes aware that they are in a story.our character wakes up deaf and mute but sees more colors than he or she knew was possible.Your main character finds that time has slowed for them. Each year they age only several weeks, and slowly those nearest them are beginning to take notice.Your main character makes a pact with an alien visitor to trade bodies for the day to tour around unnoticed.Your main character wakes up in an unrecognizable city that is at least 100 years more advanced in technology than we are today.Lightning strikes your main character an d he/she wakes up in the hospital with a small black goblin perched on their shoulder, which no one else can see.The sun goes out, replaced by building-sized lights in the sky over each major city. Across the world, beams of light descend from the sky, and each points toward your main character.A secondary character is visited by aliens. They are told that they have been chosen as a representative of humanity amongst the interstellar accord. They need your main characters advice.Your main character has a theme song which plays for ten seconds every time they enter a room.Your protagonist is visited by a comic book hero who needs their help.Your character cannot wake from a series of back-to-back dreams that feel like he or she is awake.All rhinos have gone extinct except for two, and your main character has been granted guardianship of the last two of their kind.Your character notices a weird growth on their arm one morning. They brush it off as a weird bump or scratchâ€"until it tu rns into something else entirely.Your character has always thought of their parents in a certain way, but here lately theyre doing something unusual that changes your characters opinion of them.Your main character is the owner of a variety store and an invisible car crashes through the wall, driven by an invisible person.Your antagonist and protagonist meet in the afterlife, hundreds of thousands of years after your story takes place.Your antagonist and protagonist get freaky-Friday-ed. When they wake up, each is in the others body.Your main character is suddenly invisible, but they dont know how long it will last.Your main character wakes up, in high school again, and finds that they are late for an important test.Your main character is granted a single wish, but must be careful, because the genie granting the wish will attempt to misinterpret any wish they make.Your main character finds himself/herself in the video game they were playing.Your main character is the leader of a rand om group of apocalypse survivors who must now forage for food.A cell phone is found locked inside a cabinet in a home recently purchased by newlyweds. On it is a recorded message from their future children. What does the message say and how did it get there?Your main character and the three people standing closest to them, are thrown backwards in time three hundred years.Your protagonist can see the future and doesnt want to leave his/her home.Your main character discovers that they are a wizard, and that this means they will have to leave their family to learn how to safely practice magic, in a school they have never heard of.Suddenly, your main character can hear the thoughts of everyone who is wearing the same color shirt as they are.Your protagonist dies. The story doesnt end.Your main character is really a guardian angel in human form.Your protagonist meets a man claiming to be God. He/she doesnt believe the man, but then miracles ensue.Two adult sisters discuss a fateful night when they were teenagers and ran away from home, only to encounter a pack of vampires waiting to take them in.A family comes together for Christmas, only to discover that they have somehow switched bodies and perspectives over the course of the meal.A man or woman wakes up as his/her dog or cat and its breakfast time.Two writers discover theyve written the exact same text, word for word, 1,000 miles apart from each other.A parent and child encounter their ancestor, who has been dead for centuries, and they go on a walk through the city/the woods.A lost Incan treasure is found in the basement of a school in Ohio. How did it get there? And more importantly, how is it glowing?Your main character suddenly loses his ability to see but can hear things he hadnt heard before..Its 2050 and most of America has become one large city except for a small area in the middle of the country, considered uninhabitable by most people except for a few. Who are they and how do they survive?Romance and D ramaA secondary character starts their own business and enlists your main character to help it succeed but falls in love instead.Your antagonist wins over your main characters best friend, convincing that friend of their good intentions.Your main character gets a new job, working at the evil corporation run by your antagonistâ€"but the work they would be doing could really help people.Your main character and their best friend find themselves in a love triangle with your antagonist.A couple is having an argument at the table beside your character at a restaurant. Although they are trying to avoid eye contact, your character realizes that one of them is the ex that the other never quite got over.A tertiary character is seriously stressing out, and your protagonist feels the need to reach out to them with a kind gesture. It does the opposite of help.Your character is talked into going to their romantic interests mothers dance recital, and their romantic interest doesnt show up.Your cha racter is at a friends house for a dinner party. Suddenly, someone they absolutely despise walks in. What do they do now?Your characters boyfriend of five years surprises them with an engagement ring at a dinner with their whole family. They pause for a minute before they answer him. But if he knew their secret, there is no way he would be proposing right now. The whole room is waiting for the response.Your character gets matched up with a famous person on Tinder. What happens on their date?Your characters friend introduces them to someone at a party. It turns out that your character and the other person actually know each other quite well. However, neither of them acknowledges this fact. The friend steps away. What do they say to each other now?Your characters mom seems really tense when they are out to dinner with her one evening. They ask her whats wrong. I have something to tell you, she says gravely.Write a story about a father and son reuniting for the first time in 20 years. Why did they go so long without talking? What finally brought them together?Your main characters romantic interest finds one day that they are much more interested in your antagonist.Suddenly, a tertiary character confesses their love for your protagonist, getting down on one knee and producing a ring. But your protagonist loves someone else.One night when your character is at a bar with all of their friends, a mysteriously charming stranger starts talking to them. They are instantly captivated by their every word. They ask for your characters number, but theres just one (major) problem.Mystery and HorrorA writers manuscript contains words he didnt write…ghostwriting in its truest form. But who is his co-author and what does the ghost want?Your main character comes home to find that their family is missing.Your character wakes up covered with strange tattoos and cant remember how he/she got them.Your protagonist awoke from a nightmare to find an object from his/her dream laying on the pillow.Two cousins hitchhike along a deserted country road, following a stream of black smoke to an abandoned house, where there is no one tending the steadily burning fire.Your main character wakes up in the trunk of a car, their head throbbing.An escaped convict leaves behind evidence of his innocence for the search party to find.Your protagonist wakes up aged considerably, after a Rip Van Winkle-esque 20-year nap, and his friends dont believe his story.Theres no way out of the concert hall but the concert-goers tried to find it anyway. Behind them, the snarling monster prowled.Lost in the woods, two teens encounter a witch-like woman who offers them all theyve ever wanted in exchange for one small thingâ€"their baby sister.Your main character discovers a long-lost sibling who is down on their luck.Your main character is given an important heirloom, an item passed down for generations in their family. But it is cursed.Your main character finds a black mahogany door in their b asement, shut tight with chains.One night while your character is camping in the woods with their family, theres a loud noise from inside the tent. At first everyone thinks its an animal, but this sounds like nothing theyve ever heard before.Your main character has a conversation with a ghost from their past, either literally or figuratively.Your main character goes broke drinking and gambling and wakes up the next morning with a small white rabbit perched on their chest, possibly stolen from the magic act they saw the night before.Your main character wakes up on a rooftop, in their underwear.Your main character inherits a vast fortune, but they must stay in a creepy old house for an entire night in order to earn it.Your main character sells their soul and seems to have all of their problems solved, only to find out that the devil is a blood relation, and there are no catches.Your main character wakes up to find that ¾ of the worlds population has suddenly disappeared without a tra ce.Two adopted twin sisters embark on a journey to find their birth father, only to find that hes been close to them all along.Your main characters dog goes missing in the night, and they arent the only one missing a pet. After some sleuthing they discover that a friend has become a werewolf, and that their best friend is the cause of the missing animals.Your main character wakes up wearing a strange ring which glows with sparks of blue electricity.People find that if they dont concentrate on keeping their soul attached to their body, it begins to separate. Without continuous concentration, everyone becomes ghosts of themselves.Your character discovers that theres something really mysterious happening at the neighborhood park. Your character finally works up the nerve to go down there one evening, and what they find is even more peculiar than what they originally thought.Your main character is trapped in a dream that is quickly becoming a nightmare.After a particularly grueling day at work, your character groggily returns to work the next morning. The secretary, who your character has said hello to every morning for about five years, suddenly has no idea who they are. When they tell her their name, she responds: No one by that name has ever worked here.Your character wakes up one morning in what looks to be a hospital. They try to move, but it appears they are strapped into the bed. A nurse suddenly enters the room and calls them by the wrong name. What happened to them? What happens next?The doorbell rings. No one is there, but a mysterious package was left behind. Your character opens it up and find something inside thats very unexpected.Write about a scenario where a character does something terrible and gets away with it completely.Your characters sibling is wanted for a serious crime. They swear that they didnt do it, but your character is not so sure.A ghost of your antagonists great-great-great-grandmother visits your protagonist, warning him to stay aw ay from her great-great-great-grandchild.On your characters walk to work, they notice that the streets are suspiciously empty. Brushing it off, they finally get to their office. Theres no one inside at all. They walk around searching for someone, anyone to ask whats happening. They find no one and nothing.A child draws scenes that end up happening exactly as he/she draws them. His/her parents try to understand what is happening.OtherYour main character has been knocked unconscious, and another character from your story needs to step up and take their place.At the library one afternoon doing some research, your character notices an unusual photograph. Your character is immediately captivated by it. Whats in the photograph?Your characters grandma recently passed away. In her will, she left your character something very strange.Your main character has just come face to face with their worst enemy, and they are monologuing.Your antagonist has finally won, accomplishing their greatest fe at. Now what?Your antagonist and protagonist swap places for a day.Your antagonist and protagonists are placed in the same dorm room at university. Hilarity ensues.It turns out your antagonist was right the whole time, and now your protagonist has some explaining to do.Your main character or antagonist wins the lottery, a jackpot of 3.4 million dollars. But he/she doesnt want it.Your main character is contemplating suicide until a stranger stops him/her.The king dies, and your antagonists best friend becomes the new ruling monarch. The catch is, they dont seem too bad, other than the fact that your antagonist keeps whispering in their ear.Your protagonist is incredibly late for their next scheduled meeting, and he or she just keeps running into obstacles which stall them further.Your characters birthday wish that they made when they were blowing out the candles actually comes true. What is it? Is it everything that they hoped for?Your characters home is a little worse for wear. It s eems like everything is broken and your character has no more money to invest in this money pit. In the garage, they see an old can of gasoline. Would they do the unthinkable? What is going through their mind right now?Your characters family has a lot of traditions. They go along with them, except for one. If their parents knew your character broke this rule, they would likely disown them. What is it? What would your character do if they found out?Your character is a pretty shy, introspective person. One day they wake up and realize that they are saying everything that they think. They cant control the words that are coming out of their mouth at all. While this is helpful when they are trying to talk to friends and acquaintances at work, it really starts to get them into trouble.Your character is a member of a family that has always feuded with their neighbors over trivial issues, and now must ask his/her neighbors for help in an emergency. How do the neighbors respond?Story Starter sThe place where the world stopped was not so strange, but the vertigo was overwhelming. The girl could not decide whether or not it would be wise to jump.The gear turned, interlaced with another, and another. His eyes traced the inner workings of the machine to the place where the light shone.Static played between the cracks of the monitor, the spark and hiss of the television muffled as the living room filled with water.The hand was pale, as if circulation had long stopped; and the ring upon the creatures finger seemed to glow with a spark of interior fire.They say that when you die in a dream, you die in real life. I can tell you that isnt true; because I died in a dream, and what happened to me was much stranger than that.The girl spun, dragged by the momentum of her backpack, tilting from one foot to the next so that her balance was tenuous, her motions growing wilder.The face in the mirror was not his own. It was handsomer, his eyes more vibrant, his skin clearer. He frowned, uncertain, but his reflection smiled.Once upon a time, in a night with no stars and no moon, there was a shadow in the darkness.Bright blue water held the stars reflections, until she dove beneath the surface. Then for a long moment the lake was still, until I began to grow nervous. When she finally returned, she held aloft over her head the star which had hung in the North, the wish-making star.It was, as the wave of mud descended, sprayed by the wheels of a yellow taxi â€" it was that moment which made that day the worst of her life.Again, try again. Concentrate now, it will not come easily.Strange, to see her here. She seemed out of place. Not the soft out-of-place, like an uncle entertaining unfamiliar nieces and nephews, but the hard of out-of-place which drew every eye in the room.It was a trick of the fingers, and a twist of the wrist, which changed the shape of the shifting cloak. One moment the garment was a heavy green wool, and the next it was black satin, suitable for th e nights entertainments.I have been many things: a pawn, a dancer, a master of the blade; but none of these in the way you might think, and none of them for less than a moment.The torch hissed as he plunged it into the river and let the current sweep the light away. Then he was alone in the dark with the red-ember eyes.Like a dream she had drifted from the room, and like a dream she seemed unreal, and like a dream she was gone.The pencil was now stuck in the ceiling, the glob of green hanging precariously from it; and before I could dash across the room, or throw the stapler again to dislodge it, Mr. Smythe reentered the classroom.The lower level was waist-deep already, flooding from a number of breaches along the starboard hull. Younger crewmen were wading through the water in search of bailing buckets. Older crewmates were racing toward the ladders, offering prayers beneath their breath.The river was home to a great many, and together they drifted along it. It was never fast, neve r sudden, but always full to brimming of fish, and always clean to drink.The sphere was some metal he had never seen before, like steel but with a faint blue hue. It stood out nearly three feet from the earth; and where it was exposed to the air, lightning struck it repeatedly, illuminating his surroundings with each strike.The woman swung her scythe with the steady clockwork motion of a pendulum.Frost spread across the ground. Slowly at first, with the lingering laziness of autumn, but then with greater fervor; and the creature flew along behind it as it spread across the field.Doom blanketed the town, like silence might have on a more peaceful night.Typical, he thought. Another throwaway evening. Not a soul in town, and not a sound to be heard; but that night was anything but typical.She didnt blink. Not when he made faces, or when he screamed; not when he brought out the joke about the garden gnomes, or the one about the flea circus. She didnt even blink when he resorted to the f eather, or when he made a motion like he might poke her in the eye.His favorite color had always been blue. Not because it was depressing or anything â€" it wasnt â€" but because it seemed to soak in the light, and then give some of it back. Like black, he thought, but less dead, less drab.The ballet slipper would not fit, and that would never do. Only moments now, before they knocked on her dressing room door, and her sisters slipper would not slide onto her foot.You arent supposed to have conversations through the wall of the changing rooms, especially not the fancy kind where a woman waits outside to ask if everything fits just right. And yet, here she was, knee deep in the most awkward conversation she could imagine.There was no gravity here, and so she floated, waiting to come close enough to something solid that she could push off from it, and toward the exit.They say bleach for blood but the odor is too strong. Best to take it out with hydrogen peroxide. Then again, it looks strange buying thirty bottles of hydrogen peroxide at three in the morning, so I settle for a couple gallons of bleach.The doctor looked up from the manila folder in his hands and said, Your test results are positive.Just as she settled into the backseat with her suitcase and carry-on bag, an oncoming headlight illuminated the drivers face and she realized this wasnt her Uber driver. He was the man theyd been showing on the news the last few days.As the doctor handed the newborn bundle to her, she gasped.As she threw her head back to soak up the flowering spring trees, she saw her ex-husband watching her from across the street. How could he have known she was here?The young girl was maybe 5 or 6 but there was something about her that chilled me to the bone.She might never get the chance to be alone with him again. Her husband was across the country; hed never find out, so why not?Is this your handwriting? the policeman asked with a scowl.Story starters are a great way to practice wr iting short stories.I could have been anythingâ€"a doctor, lawyer, architect. Instead, I became a carney.When he saw the state troopers standing on his front stoop, he thought they must have the wrong house. But when the troopers took off their hats and one of them asked, Are you James Cooper? he couldnt find the strength to answer.I knew youd come back to me, she whispered. Its been a lifetime but I knew youd come back.The doctor emerged from the double doors and said, There were some unexpected complications.This was the moment hed been training for. He strapped on his helmet and got in position.She continued running, but as the trail of blood got thicker and the splattered drops got closer together, she started following the blood instead of the greenway path. She had to find the source of all this blood. Was it animal blood... or human?When he looked around, he froze. Hed been here before. This was the same place where he kept getting stuck in his dreams. Would he be able to fin d his way out in waking life?She shut off the kitchen light and turned to go upstairs to bed, unaware that two sets of eyes were watching her every move.He frantically searched his lab, but he found no sign of the invisibility potion. How could someone have stolen it before he even got the chance to use it?As she listened to him snore on the pillow next to her, she wondered how much longer she could stay married to him. She prayed he would die in his sleep or get hit by a car. Then her eyes fell on the pillow at the foot of the bed.Mr. Dempsey, theyre not both going to make it. We can save your wife or the baby, but we cant save both. You need to let us know your decision in the next two minutes, or we may lose them both.Are you sure you want to do this? the man asked as he positioned the needle over her heart.Nothing had grown in that patch of grass for 50 years. It had been a barren dirt patch ever since that stranger had conjured a fire bolt and scorched the ground. But Tommy def initely saw a green sprout growing in the middle of the barren square. What was it, and how could it produce life in a place that nothing else could?The car rattled as if shed gone over a speed bump, but she knew there were no speed bumps on this road. She looked in her rear view mirror and thought she saw blonde hair… and maybe a human form on the road. She wondered if she should turn back. Had anyone seen her?If you walk out that door right now, I dont ever want to see your face in my home again, his mother said.I will get my money back one way or another, he growled, as he pinned her arms beneath her back.The price of freedom depends on what youre willing to pay. Tell me, sir: how much is your freedom worth to you?She fumbled in her purse for her keys, but her hands were clumsy with fear. Just as her fingers grazed the familiar key fob, a sweaty hand grabbed her shoulder.Hed seen her. She could tell by the smirk on his lips. She pushed through the thick crowd in hopes of making it to the exit before he blocked her way.She glared at the thick bracelet on her bicep. Why did her parents make such a big deal about never taking off? It was heavy and not even stylish. She found clasp and fiddled with it for a moment. Surely her parents were exaggerating about all the awful things that would happen to her if she ever took this off.He extended his hand to her and said, Hi, Im Finkel Wolfson. She looked at his outstretched hand as if it was crawling with spiders and roaches. Oh, Ive heard about you, she said with a sniff. Finkel panicked. He was 3000 miles away from home; how could she have heard about him?One of us has to try it, Amir said as he pointed to the lumpy, unfamiliar fruit on the tree in front of them. If we dont, well starve to death. Death by poison seems worth the risk in case its edible, doesnt it?The night winds rustled as the door to the old womans home slowly opened.She laughed when he told her the news. It was exactly what she expected and she knew the lie was over.He glanced in his rearview mirror and saw that the blue sedan was still following him.She stepped off the elevator with a sense of purpose. This time, she would succeed.He flicked the stub of his cigarette onto the pile and walked away without a second look.Just as they got to the edge of town, the car started making a terrible clunking sound.Whats that smell?He rolled down his window and called out, Heyâ€"do you want a ride?You better get down to the station. It happened again.The dog raced toward her with such intensity that she didnt have time to get out of his way.I dont think youre capable of love.He picked up the glowing rock and inspected it. Where had it come from, and how had it ended up in his backyard?By the time Johnny got home, thousands of sheets of paper had piled up on the floor beside the printer, each with only one sentence printed in bold type: I am coming for you, and theres nothing you can do.How could you have married him? You promised you d wait for me.Ive lost him, she screamed, but none of us knew what shed lost.For a moment, time slowed, and the sound of the approaching storm was all that we could hear.Look out! he shouted.Id never last long in the slammer. I get all frantic when Im in tight spaces, start tryin to climb the walls and such.Tears filled her eyes as she scanned the list a second time. She didnt make the team.Im pregnant.He watched her leave, knowing that she only locked the flimsy doorknob behind her. He had at least two hours before shed be back home.Where am I?What happened to you? She asked.There are three things you never mess with if you know whats good for you: heroin, border patrol, and the Valdez cartel.She fell to the floor when she heard the first explosion. She didnt know if she should try to escape or try to hide.Were sending you to live with another family. Its for your own safety.As she watched this hulking, hairy animal lope across her backyard, she wondered what two creatures collabor ated to make this tremendous beast, and what was it looking for?She hasnt spoken a word since the accident. Our friend said that you might be able to help her.Dont lie to me. I already know the truth.As he walked away, his smile grew from a smirk to an all-out grin.Why is all of Daddys stuff in the front yard?He counted his register drawer again. How could he be short $2500?The teacher looked at his gaping shoes and tattered clothes and knew she had to find out what was really going on at home or this kid would end up in the system. She called him up to her desk and asked, Do you want to help me on a project this weekend?If he hurried, he might be able to get back to work before anyone found out what he had done.Do you have experience with demons? she whispered from under the table.This medicine numbs the pain, but it will also permanently numb your ability to feel pleasure. Do you want it?Mr. Whipple, weve just learned that your wife is an undercover agent with the Russian governme nt. We need your help apprehending her.Once shed confirmed that no one was looking, she ducked into the unmarked building.When she walked outside the next morning, she realized his curse must have worked.He pulled his hat low over his brow and tried to blend in with the crowd, hoping no one would realize who he was.He was inside the video game! But waitâ€"if he was in here... who had the controls?She bent down to pick up the strange-looking shell from the sand, but as soon as her hand touched it, the earth started to shake.He opened the letter and sunk to his knees in the middle of the driveway.What are we going to do once the last of this food is gone? he asked.She looked closer and realized that this tree was growing dollar bills instead of leaves and quarters instead of acorns.There is never a better time to say Im sorry than when karma is kicking you good.When the pigeon swooped down in front of her, she realized it had a note attached to its right leg.Ill need to speak to at le ast three of your ex-girlfriends to check your references before Ill go on a date with you.Mommy, theres a ghost in my room!Something wasnt right. No one seemed to recognize her. No one even really seemed to see her. Could he have erased her existence?They had never been this high before. As she reached for the next rock outcropping, she wondered if it was actually close enough to reach, or if she was about to fall into the canyon.This is something we dont usually show visitors, the museum docent whispered as she unlocked the door marked DANGER!He looked both ways before crossing the street, not realizing that he had just made the worst decision of his life.How did you get that scar?He muttered a few extra spells as he stirred the potion. He couldnt risk it malfunctioning this time.Every person on the street and in the mall looked identical. They were all wearing red shirts and blue shorts, and every single one was a man with light skin and short brown hair. What had happened, and h ow was she the only one who was still different?You dont understand, she said, looking at him sadly. I am not who you think I am.All the lights in the city went out and they knew the monsters were surrounding them.If you take one step closer, itll be the last step you ever take, he said, pointing the weapon at the strange figure in front of him. But his threat was useless, since the creature had no feet.There, nestled within the grove of trees, was the thing hed been waiting for since he was 12 years old.Whos there? Her words bounced off of the metal walls of shipping containers when she awoke. But there was only the echo of her own voice to answer her.They were lost in the woods and they knew it, although this time was different. This time, they were hunted.Looking into the fire was the wrong thing to do. He found he couldnt drag his stare away.It wasnt until my father pushed me off the cliff that I believed he was telling the truth.The sign hit them like an inanimate object.The pu mpkin would not stop growing, despite the application of the second potion. The witch had lied.All four tires were on the ground, but I had started floating toward the surface.Smoke leaked from the exhaust pipes of the Mustang as the plane began to descend. She looked into the jungle below, dreading the impact.Picture us, standing against the world, armed to the teeth, walking out into that blizzard.If romance is dead, then I suppose there are none to blame but the hopeless romantics. It was a boy, not too long ago, that taught me romance â€" real romanceâ€"isnt something hopeless, or unenergetic like stale poetry, or futile like canned compliments.Its impossible to tell really, just how many times Ive come back.When a pet passes away, the moment is strangely dense. That moment as I held the shoebox was the longest of my young life, but there were harder times to come.The girl crept past the open door, listening with piqued interests for clues revealed in the voices beyond it.Thunde r does not crash like a wave, but ripples outward like a pebble tossed into a pond. When the lightning struck, I was the first to hear that thunder.Heroes wear masks for all kinds of reasons. I wear the mask so they cant see the grey at my temples or the weariness of age in my eyes.The sun never shone like it did that day. It baked my skin until I felt I might burn in the shade, but I never did. Nothing went wrong that day.The paper tore once, twice, three times. I shredded it and scattered it to the wind.Ma always told me not to climb so high. Always lookin out for me cause I aint look out for myself. Too bad Ma aint here now.They think they know me, but they dont really. I hunt only at night and only when I know I have the advantage over my prey.City slicker like myself doesnt have a wit of business in the country. They knew it. I knew it. Not a one of us in that room was happy Id purchased the land.Heres the thing about family. Family sticks together, but its almost never roses a nd sunshine. Family sticks together when you have nothing; so when you have it all, well, things get complicated in a different way.It wasnt my idea to paint the damn cow, it was Johnnys; but I suppose Im to blame for going along with it.Stars spin real slow. So slow you cant see it, unless you have the time and the resources to take a really close look.I cant say I ever much liked gym class. Ive never seen the point of running unless you were being chased. But Im running now, arent I? I guess Im glad I never skipped gym.Its been a few years since the guns got off the street, and the drugs. Didnt happen all at once, but it did happen fast. Not sure I like it.My dad raised me believing that time is money. Now that money is time though, Im not sure anything he taught me means what I thought it would.I realized that something was wrong when I thought Im getting married, instead of Im getting married to John.It wasnt a happy winter, but it wasnt so sad either, considering.Blood is thick er than water, we all heard that. What people dont do is say it out full: The blood of the covenant is thicker than the water of the womb, which, (if you ask me, which you didnt) means almost the opposite.Never thought Id dance on his grave, not really.Clouds parted that night, while I was bending picking weeds in the darkâ€"fool thing to doâ€"and the moon shone down on my garden.There are dreamers like me, but none as vivid, and none who know the clouds and sunshine of my mind as I do.You cant singâ€"cant really singâ€"a happy song when you are sad; but I know now that you can sing a sad song, and fill that song with life, when you are happy.All it took was one step into the water and I knew I was home.If love stories begin with wonder and end with tragedy, this isnt really a love story.She looked out the window and saw moving shadows, as far as the eye could see, and was thankful at least for the light from the window on the house on the hill.Im falling for you, he said. But he kn ew that look and he regretted it immediately.Give me five minutes and Ill turn that girls silly smile into a look of shock.At dawn, we were swallowed up by the darkness, but it didnt matter, really. We had waited for it all night long.If loss were a taste, youd spit it out as soon as you were able to. But it isnt. Its a sound and a cry and it goes on forever.That night in September, the body count was almost as high as the temperature..Theyre not even normal, the little girl whispered. Look Ma, those men have gills for ears.She closed her eyes and remembered the flowers in her mothers yard and how red the roses grew.There was nothing left to say but I love you as they stood together and watched the world burn.Mamma, theres someone here to see you. I knew from the sound of my daughters scared voice who that someone was.Lost in a wonderland of sorts, I wandered the homes slanted hallways until I found the right room.There he is, she shouted. I told you he…..! But before I could turn to look, she screamed and fell silent.The explosion could be seen for miles around, but only two people saw it.She couldnt identify the lifeforms standing across from her but she knew they werent human. She also knew they werent friendly.Here, put on this mask, she said. They cant know who you really are.It took 15 days and 11 hours to reach the mountain range on foot, but there it was in front of us, big as we knew it would be.I dont know how you handle this type of thing on Earth, she spat, but here on Mars, we dont let killers run free.

Sunday, May 24, 2020

Security Threat Groups/Gangs in Prisons Essay - 1480 Words

Running Head: SECURITY THREAT GROUPS/GANGS IN PRISONS Security Threat Groups/Gangs in Prisons Nicole Sage Kaplan University CJ130-03 Nancy Thode January 18, 2011 Security Threat Groups/Gangs in Prisons In our prison systems today, many different gangs pose a threat to our correctional staff and other inmates. In the United States, gangs exist in forty of the fifty states. These gangs bring violence, drug trafficking and racial unrest to our correctional system. The Aryan Brotherhood was formed in 1967 in San Quentin State Prison in California. They were originally comprised of Irish decent and former members of the fifties biker tips such as the Diamond Tooth Gang and The Bluebird gang. The Aryan Brotherhood was founded by†¦show more content†¦They attempted to kidnap Judge Harold Haley causing law enforcement to open fire. The judge, a bailiff and one BGF member were killed in the shootout. George Jackson survived, was apprehended and sent to maximum security San Quentin. The Folk Nation is not one specific gang. It is an alliance of many gangs. These gangs are the Black Gangster Disciples, the Black Disciples, Gangster Disciples, L a Raza, Cobras, Eagles, Latin Disciples, Maniac Latin Disciples, Simon City Royals, Spanish Gangsters, Two Sixers and the International Posse. Folk Nation was formed on November 11, 1978 within the Illinois Department of Corrections. Larry Hoover, the leader of the Gangster Disciples, created the idea for the alliance of these gangs. Folk Nation is based in the Chicago area and has spread throughout the US and Canada, specifically in the Midwest and South. The Mexican Mafia was founded by Luis â€Å"Huero Buff† Flores in 1957 at Deuel Vocational Institution in California. The territory of the Mexican Mafia includes the US federal prison system and Southern California. The Mexican Mafia is involved in extortion, drug trafficking and murder in the prison system. The purpose of the Mexican Mafia was to show their Maya and Aztec heritage as well as protect its members from prison guards and other inmates. Now they focus on primary ethnic solidarity and control of drug trafficking . FederalShow MoreRelatedSecurity Threat Groups And Prison Gangs1665 Words   |  7 PagesSecurity threat groups and prison gangs are responsible for a lot of the crimes that occur in prison. Well-organized and highly structured prison gangs who have leaders and influences have been around decades. Gangs in prison can be described as groups whose activities pose a real threat to the safety of the institutional staff and other inmates and also to security of the correctional institution (Beth, 1991). These gangs always have strong leaders and use that leadership role to their advantageRead MoreEssay on Prison Gangs: Gangs and Security Threat Group Awareness2814 Words   |  12 Pages One of the major problems of corrections today is the security threat group - more commonly known as the prison gang. A security threat group (STG) can be defined as any group of offenders who pose a treat to the security and physical safety of the institution. Throughout the 1960s and 1970s, prison gangs focused primarily on uniting inmates for self protection and the monopolization of illegal prison activities for monetary gain (F.B.P., 1994, p. 2). STGs are mostly divided along racial linesRead More Controlling Security Threat Groups Essay785 Words   |  4 Pages Security threat groups or, â€Å"prison gangs† pose a daily problem within the walls of our national prisons and officials must constantly devise new methods in dealing with an ever growing population of inmates. The difference in dealing with multiple gangs is that prison officials focus on the group behavior rather than centering on individual involvement. With the focus on the whole group, one then must develop plans or procedures when controlling various threats within a correctional facility. ThisRead MoreShould Prison Gangs Become More Prevalent Inside Our Nation s Prison System? Essay1726 Words   |  7 Pages Prison gangs within the penal system are problematic and a multifaceted issue for severa l reasons. One reason gangs are so problematic in the penal system is due to the threat they impose on others, including other types of gang-bangers, non-gang affiliated inmates, correctional staff, prison administration, and the overall security of the facility itself. According to research, â€Å"A composite measure of gang misconduct represents the threat that particular gangs pose to prison order† (Gaes, WallaceRead MoreThe Security Threat Of Prisons And Police Officers1224 Words   |  5 PagesThere are many dangerous gang in prison and out on the streets that are a security threat to prison staff and to public. These groups are called STGs or Security Threat Groups (gangs). Prisons and police officers try to control these gangs as much as possible so there could be the least threat as possible. Some of the main security threat groups are: The Aryan Brotherhood, The Ku Klux Klan, The Folks, The Nation of Islam, and MS 13. These 5 groups are a major threat to prison staf f and people out inRead MoreGangs in Prison Essay1447 Words   |  6 PagesIntroduction Prison gangs are originally formed by inmates as a way of protecting themselves from the other inmates. These gangs have turned out to be violent and thus posing a threat to security. This paper will have a look at the different gangs in prisons, their history, beliefs and missions, and the differences and similarities in these gangs. The Aryan Brotherhood The Aryan Brotherhood started in 1964 was founded by Tyler Bingham and Barry Mills who were white supremacists and Irish AmericanRead MoreGang s And Management Challenges Facing Corrections Essay1316 Words   |  6 PagesGang s in the Correctional Setting There are many supervisory and management challenges facing corrections, due to the proliferation of the gang problem, presently within our prisons today. It is critically important for upper management, in the correctional field, to be held as responsible stewards, of the all resources available to them to combat this problem. (Saint Leo University, 2016). These actions are necessary, to deter the increasing glut of criminal activities, which gang behavior inevitablyRead More Gangs and Violence in The Prison System Essay2007 Words   |  9 PagesGangs and Violence in the Prison System Introduction Gang violence is nationwide and is one of the most prominent problems in the prison system today. Gangs are known to attempt to control the prisons/jails, instill fear within the prison system and throughout the society, and bring negative attention to the system. â€Å"Gang affiliated inmates comprise about 18 percent of the 18000 inmate population.†(Seabrook) A growing numbers of inmates and a large amount of them serving longer sentences forRead MoreEssay about Rise in Prison Gangs in Canada988 Words   |  4 PagesRise in Prison Gangs Fueling Violence, Drug Trade – Canada – CBC News The article presented on this paper reveals the problem of gangs and gang related violence in our nation’s institutions. Corrections Canada has seen a 44 per cent jump in gang members in federal prisons in the last five years, to 2,040 in 2012 from 1,421 in 2007, according to the documents obtained under access to information. The correctional service constructed a strategic framework for dealing with gangs in 2006, and implementedRead MorePrison Gangs : The United States991 Words   |  4 PagesThe fact that prison gangs are not visible to the public makes them seem unknown to the public eye, however the pose the same threats to the United States as all other gangs. Prison gangs are also often written off and forgotten about by authorities due to fact that they are incarcerated. â€Å"Due to their seclusion from the public and their minimal visibility, prison gangs are difficult to target and are thus frequently overlooked as threat actors, which enables them to commit vari ous crimes without

Wednesday, May 13, 2020

Essay - 1181 Words

Over the past few decades the United States has moved away from its libertarian roots and has moved closer to an oligarchy ran by the few. In this way it is a government for the people, rather than by the people. One specific event has changed American politics forever, this was the September 11th attacks on the World Trade Center. On this day, the United States came under direct attack by terrorists. In the months and years after, the government pounced on the opportunity to grow government under the false pretense of â€Å"security† through the Patriot Act and invasions of Iraq and Afghanistan. As a result, average working class American citizens are now forced to fund a perpetual War on Terror and hand over their private communication†¦show more content†¦In response to these horrific attacks on Americans, Former President George W. Bush used the tragedy as a moment to seize more government power. Rather than assassinating the individual terrorists, President Bush and Congress went overboard and claimed that the United States needed to lead a campaign to eliminate terror across the globe. Although this goal sounded relatively simple, the ramifications were much more complicated. Immediately following 9/11, President Bush requested an authorization for the use of military force against groups and nations supporting terror. In response, Congress passed these authorizations for military force prior to War in Iraq and Afghanistan (Bovard). Although President Bush had good intentions in such a stressful period, his decisions were not a good course of action. Over time, these congressional authorizations have become precedents for Presidents to exert military force without consenting Congress. The issue is that the President does not have the authority to declare war. The constitution explains that the branches of government are separate and there must be checks and balances. How can there be checks and balances when the Congress delegates the military to another branch of government? The president is meant to enforce the laws of the land, but not declare war or create legislation. The next major response to September 11th was the implementation of the Patriot Act. The Patriot Act was advertised as a nationalShow MoreRelatedWhat Is an Essay?1440 Words   |  6 PagesBuscemi Essay #3 Rough Draft An essay is a creative written piece in which the author uses different styles such as diction, tone, pathos, ethos or logos to communicate a message to the reader using either a personal experience, filled with morals and parables, or a informative text filled with educational terms. Educational terms could mean the usage of complicated and elevated words or simply information you would get in schools. Some authors, such as Cynthia Ozick, claim that an essay has noRead Morenarrative essay1321 Words   |  6 PagesNarrative Essay A Brief Guide to Writing Narrative Essays Narrative writing tells a story. In essays the narrative writing could also be considered reflection or an exploration of the author s values told as a story. The author may remember his or her past, or a memorable person or event from that past, or even observe the present. When you re writing a narrative essay, loosen up. After all, you re basically just telling a story to someone, something you probably do every day in casual conversationRead MoreApplication Essay : A Process Essay770 Words   |  4 Pagesassign an essay. The entire class lets out a groan that could be heard from miles away, however this doesn’t phase your professor. The essay is assigned: a process essay. Now what? What is a process essay? How do you go about writing one? How do you get the A you so desperately need? This paper will discuss everything one needs to know in order to write the perfect process essay such as the definition of a process essay, how to construct it, and how to use proper transitions to make the essay flow. Read MoreEssay763 Words   |  4 PagesCan’t be Built on Soccer Fever† and â€Å"Na Na Na Na, Hey Hey, Goodbye† In Jonathan Zimmerman’s essay â€Å"African National Identities Can’t Be Built on Soccer Fever† he describes how soccer brings the people of Africa together. He talks about the unity of Africans and how much soccer is a part of their lives. He also describes the underlying reason of why soccer is so heavily pushed. The perspective in the essay â€Å"Na Na Na Na, Hey Hey, Goodbye† Tim Bowling discusses his passion for hockey and his hate forRead MoreThe Colonel Essay1320 Words   |  6 PagesIn the essay, The Colonel, Michael Hogan illustrates the importance of the influential sport of tennis. Hogan writes about how tennis changed his life from an early age. When he was younger he saw tennis as a rich mans sport in which he had no interest. One of his much-respected neighbors, the colonel, approached Hogan’s father with the idea that his son might like to learn how to play tennis. After pondering the thought with his father, Hogan decided to take t he offer. The Colonel became his mentorRead MorePersuasive Essays : Persuasive Essay897 Words   |  4 Pagesbegan this class, I loved to write persuasive essays. I loved to write about my own opinions and I was quite good at convincing people to agree with my stand points. To convince others to agree on my point of view was an extraordinary feeling. I am very good at getting my point across and giving my reasons on why I feel the way I do about a certain situation. I loved writing persuasive essays because I love to read them as well. I love how persuasive essays have a call-to-action; giving the readers aRead MoreEnglish Composition One: To Be an Essay or Not to Be an Essay That Is the Question910 Words   |  4 Pages In the past, the mention to have to write a paper for an assignment caused me to break out in a sweat or my mouth instantly dries, well it does not have that kind of effect on me anymore. The key to successfully completing the essay on time is getting to researc h the topic at hand as soon as possible or before the process of writing begins. The next step for me would be to find the argument and take a side. Moreover, picking a thesis statement through brainstorming the information I gathered forRead More Flight Essay834 Words   |  4 Pages Essay on quot;Flightquot; amp;#9;It is always hard to get separated from someone you love and with whom you have shared every moment of his life until he decides to walk on a different path than yours. You dont know how to react and confusion dominates your mind. Should you be angry at him for leaving you, or should you support and respect his decision ? In her essay quot;Flight,quot; Doris Lessing illustrates the story of an old man who is learning to let go his granddaughter as she growsRead MoreEssay and Academic Life1117 Words   |  5 Pageslanguage learner? Discuss two or three problems with specific examples and details. Ex. 9 Analyzing students’ essays. Use the assignment and the Student Essays to answer the following questions. Assignment: Computers have become an important part of educational process. Write convincing illustration to this statement. Use specific and convincing examples and details. Student Essay 1 Computer as a multipurpose universal instrument of education. In our days computers have become an importantRead More Community Essay843 Words   |  4 Pagesan important effect on the shaping of a person’s character is key in both Pythia Peay’s essay, â€Å"Soul Searching† and Winona LaDuke’s interview transcribed in essay form entitled, â€Å"Reclaiming Culture and the Land: Motherhood and the Politics of Sustaining Community†. The two authors present ideas, similar and different, of what it means to live in and be a part of community. Through examining these two essays, summarizing and synthesizing, we can gain a better understanding of what community is and

Wednesday, May 6, 2020

Canculus Free Essays

TUTORIAL 3: FUNCTIONS Problem 1: For f( x) = 2Ãâ€"2+ 5x+3 and g(x) = 4x+1 find the following a) (f+g)(x) b) (f-g)(x) c) (f. g)(x) d) (f/g)(x) e) f0g(x) Problem 2: The number N of cars produced at a certain factory in 1 day after t hours of operation is given by N(t) = l00t- 5t2, 0? t? 10. If the cost C (in dollars) of producing N cars is C(N) = 15,000 + 8,000N, find the cost C as a function of the time t of operation of the factory. We will write a custom essay sample on Canculus or any similar topic only for you Order Now Problem 3: Find the inverse of the following functions. a) f(x) = 2x-3 ) f(x) = x3-1 c) f(x) = x2-1 Graph f, f-1 , and y = x on the same coordinate axes. Problem 4: The price p, in dollars, of a Honda Civic DX Sedan that is x years old is given by p(x) = 16,630(0. 90)x a) How much does a 3-year-old Civic DX Sedan cost? b) How much does a 9-year-old Civic DX Sedan cost? Problem 5: When you drive an Ace Rental compact car x kilometers in a day, the company charge f(x) dollars, where Describe Ace Rental’s pricing policy in plain English. (Be sure to interpret the constants 30, 0. 7, and 100 that appear in the pricing formula) Problem 6: For the following demand and supply functions of a product, state the economically sensible ranges of price and quantity for which they are defined. Draw the market diagram for this product. What are the equilibrium price and quantity? QD = 16 – 2p QS = -4 + 3p Problem 7: Consider the following demand and supply functions for a product. q = 500 -10p and q = -100+5p a) Find the inverse demand function and the inverse supply function. b) Draw the market diagram for this product. c) Find the equilibrium price and quantity. TUTORIAL 4: SEQUENCES, SERIES, LIMITS Problem 1: Write down the first five terms of the following sequences 1n;n-1n;12n Problem 2: Determine the convergence or divergence of the following sequences 1n;n-1n;12n Problem 3: Compute the following limits 1)limn? n2-2n+32n2-1 2)limn? -2n+32n2-1 3)limn? (n+25-n) Problem 4: Determine the convergence or divergence of the following series. 1)n=1? 25n-1 2) n=1? 1n3n 3) n=1? 13n Problem 5: Determine the sum of the following geometric series, when they are convergent. 1)1+16+162+163+†¦. 2)1+123+126+129+†¦. 3)132-134+136 – †¦. 4)1+326+3462+3663+†¦. Problem 6: 29(577) Problem 7: 33(577) How to cite Canculus, Essay examples

Tuesday, May 5, 2020

Reliever Compounds In Multiple Bio fluids â€Myassignmenthelp.Com

Question: Discuss About The Reliever Compounds In Multiple Bio Fluids? Answer: Introduction Data and information are important for any business and it represent confidential details regarding the company. In Australia, the communication and energy sector are leads in having the most compromised systems; while, in terms of DDoS activity, the communication sectors and financial sectors are the highest (Australian Cyber Security Centre 2017). However, all the sectors in Australia are suffered from network security attacks and mining and resource sectors suffered from highest number of spam and malicious e-mails (Australian Cyber Security Centre., 2017). Image 1: Sectors with compromised systems in Australia (Source: Australian Cyber Security Centre, 2017) Moreover, the network security also illustrates the problem of cybercrime and procurement fraud that is also growing tremendously in Australia according to the PwCs 2016 Global Economic Crime Survey (Perlman et al., 2016). Image 2: Global Economic Crime Survey 2016 (Source: Global Economic Crime Survey 2016 2017) Kahate (2013) moreover stated that data security in network should be accomplished as there is always a threat from hackers to hack all the crucial details of the company and utilize the same for unethical purpose. Thus, every organization needs to develop network data security in order to prevent industry sabotage and espionage of the important data. In this business report, the concept of information/network security will be illustrated along with three recent demands of network security applications adopted by organizations. In addition to that, the pros and cons of these applications and a proposal for implementing these applications for the next five years will also be presented. Lastly, discussion on whether to adapt customizing off-the-shelf applications or developing products in-house for security maintenance services will also be given. Concept of information or network security In this era of technology almost every work is accomplished through computers, machines and technological innovations. Tankard (2012) also depicts that computers are also used for the purpose of information security and trust in systems apart from completing the work fast and accurately. The terms information security can be describes through three concepts- confidentiality, integrity and availability (Kahate, 2013). Image 3: Information Security (Source: Global Economic Crime Survey 2016 2017) Manshaei et al. (2013) describes that the attainment of control for accessing the information from one system is known as confidentiality. Moreover, the assurance of transformation of information and programs in authorized manner is termed as integrity; whereas, assurance that only authorized members have the accessibility of information and resources is known as availability (Schneider 2012). Many organizations also develop security policy for the purpose of protection responsibilities, information values and organizational commitment (Tankard, 2012). In recent times, the security comes with the solutions of cloud as there are huge data for each single entity (organization). Yu et al. (2012) highlighted that cloud technology not only allows storing significant number of data but it also provide the chance to manipulate the data easily without redundancy. Cloud Access Security Brokers is the recent technology that provides Service (SaaS) apps to offer visibility and control options (Gonzalez et al. 2012). Endpoint detection and response (EDR) solutions is also a new technology that allows detection of security breaches and respond quickly so that accurate solutions can be incorporated (Mell, 2012). EDR is also combined with Indicators of Compromise (IOC) which also used to identify the network breaches at the initial stage. Another technology that is based on detection and response paradigm is Intelligence-driven security operations centers (ISOCs) that use the context-aware components to offer an adaptive architecture (Yu et al., 2012). In addition to that, the Remote Browser is used for to protect the e-mails from malicious messages and attacks. Three information/network security applications currently in the market and their uses The three network security applications that can be used by an organization are- authentication application (Kerberos), Web Security Standards (SSL/TLS) and e-mail and IP security (Kahate, 2013). Authentication Application (Kerberos) The authentication application Kerberos, the database of the clients are protected through private keys and the users register their preferred secret keys with Kerberos. Schrittwieser et al. (2012) sated that this concept is closely related to the data encryption and the Kerberos shared a session key and then forwards it to the clients and servers for message encryption. The success of this application is Kerberos Version 5 (Stallings Brown, 2012). In this case, client requests for a ticket granting service from the application, which then transferred the ticket to the clients and encrypted the ticket by following clients secret key. The issued ticket is then used by the server in order to evaluate whether or not it is the same client to whom the ticket is issued. Perlman et al. (2016) highlight that the ticket is used as many times till it expires. The client presents the ticket to the server with clients name, timestamp and encrypted session key that are also referred as authentic ator. Web Security Standards (SSL/TLS)- Citrix NetScaler Solution Fahl et al. (2012) depicts that there are some risks and treats based on locations and type of attacks. The risk may arise in server or client network that is then known as system security and the risk may arise in terms of network traffic that is referred as web security. Additionally, there are two types of attacks- passive attacks and active attacks. (Hodges et al., 2012) describes that passive attacks illustrates the accessing the traffic between server and browser. This attacks also denotes the accessing the crucial data and information on a website. In addition to that, the active attacks also referred to the situation where one person impersonating another user, alters information on a website and altering message in traffic. In order to overcome this adversity the application that is used is Netscape that originates the Secure Socket Layer (SSL). Raza et al. (2014) highlighted that the SSL also evaluates the concept of connections and sessions. Perlman et al. (2016) stated th at SSL only offer data encryption between SSL and TLS enabled mail servers. Image: Message transfer by using Web Security Standards (Source: Perlman et al. (2016) A connection offers suitable types of services; whereas, the session is considered as association between the server and a client. This application offer secure communication over the internet and the major functions of this application are- client authentication, data encryption and data integrity checks. Wire Shark Wireshark is an application that is use to capture, filter and inspect packets. This application is also known as Ethereal. This application also protects the IP address of a website from malicious attacks and is compatible with all kind of operating system like Linux, macOS, BSD, Solaris, Microsoft Windows and Unix-like operating systems. The major functionality that this application performs are collecting data from live network connection or from a captured already-captured packet and also from different networks like IEEE 802.11, PPP, and loopback. This allows them to detect any discrepancies in the initial stages. The IP address and data display can be protected through display filters that detect intruder through their misconducts and safeguard companys website and business. Authentication Application (Kerberos) The prime advantage of this application is that it considered crucial details like clients name, timestamp and encrypted session key. This application also provides faster authentication as it uses a unique ticketing system and only the matched tickets will allow permits by the resource servers. The disadvantage is that the ticket can be used more than once till expiry. This allow hackers to access all the details if they jack the ticket before it expires. Web Security Standards (SSL/TLS)- Citrix NetScaler Solution The prime benefit is that all the organizations members can communicate securely with their own browsers. Another advantage that can be get from this kind of application is deep inspection of the technology and SSL-encrypted traffic through bi-directional parsing and analysis. Citrix NetScaler Solution provides protection for infrastructure and users and XML protection that allows the organization to detecting and blocking common application threats. owever, the disadvantage that is related to this approach is that if a member sends a message from unsecured (non-SSL) email systems, the message will no longer be a secured site and will not be protected by SSL. WireShark The prime advantage of Wireshark is that it provides security protocols to IP and DHCP for leading companies like AppleTalk and BitTorrent. Another advantage is that since this application is developed under an open source model it is easy to include new support tools along with their each updates. The disadvantage is that small organization or new online industry does not incorporate such advance security system due to lack of budget and thus, these applications are not suitable for such organization. Proposal how these applications can expand organization in the next five years The applications that have been mentioned will help in expanding of the business of the organization. The small companies should always focus on the information technology infrastructure. When the organization is generating revenue slowly they should have spent some amount of money on the infrastructure of the organization so that the information technology department can support the operation of the organization (Nguyen, Newby Macaulay, 2015). The relationship between information technology and operations is very important, as it constitutes the business model. When the business of an organization grows information technology infrastructure will have to be increased to make changes in the operations of the organization. Therefore, the organization will require sophisticated software requirements, which is more robust (Bollou, F. 2014). This will support the increase in the number of user applications in the system so the new sophisticated network system that will help in protecting the data and the user applications. In the coming years, the number of employees in the organization will increase and so will the business clients. These network tools will provide security to the organizational data and will help in managing multiple networks at a single time. During the expansion of the business, the transition of the business will be facilitated by the expansion of the network security applications. The amount of data that has been stored in the database of the organization will be huge so the organization will have to make that no data is lost during the transition of the data. This can be maintained by including the above-mentioned network tools which are necessary for keeping the various types of data in the organization safe and secure. This network security software is used by most of the multinational companies in the market and the organization while providing solution to their clients. Therefore, by using these software, the organization will be able to create a secure network for the clients which will help in improving their reputation in the market. When the organization is able to fulfill the needs, and wants of the organization then it will create opportunities to expand their business (Zhang Warner, 2017). The companies in the market will acknowledge the company as a viable option for providing them with solutions. Thus, by including the network security tools, the organization is able to enhance the quality of service they provide to the clients which will definitely be a positive step towards the expansion of business and acquisition of more clients. Whether the organization should focus on customizing off-the-shelf applications or develop products in-house to provide the ongoing security maintenance services to client organizations he needs of the various business organization vary depending upon their magnitude. The application required for the larger organization will be different from that of the small-scale organizations. Similarly, the application will depend on the industry and the operational process of the organization. The application sued for the manufacturing industry will be completely different from that of the retail industry. The companies in the market will making the applications on the basis of the business model of their respective organizations. The organization in todays world are trying to improve their business process using integration which may provide them with competitive advantage in the market (Jolly et al., 2015). The clients will have to identify the right software required for their organization so it is the duty of the vendor to provide the organization with a proper guidance which will help them to understand their requirements. This will help to identify the type of software w hich will be feasible for the operations in the organization. The off the shelf software have lower cost at an upfront level and contains a lot of features most of which is not required by the organization. This software includes support and can contain maintenance contracts. The upgrades of this software are available for free or at a lower cost than the other products (Morrow, 2016). Moreover, when it is used as software as a service the installation cost is even more low as it does not contain any hardware. The products that are made at an inhouse level will consist of the minimum requirements of the clients and other requirements can be added to the software according to the needs of the clients. This software is tailor made which consist of the exact need of the consumer and changes can be made in this system very easily. However, the initial cost of the setting up this software is high and all the extra requirements will be billable and will increase the overall cost of setting up the software. The in-house product is custom made and will consist of the additional cost as it is specific to the organization only (Sekowski Gibbons, 2016). However, the immediate needs and the long-term goals of the organization are two important aspect which has to be taken in to account as balancing both the aspect will be crucial for the clients. However, the organization will have to look in to the needs of the client to identify which type will be better for the client. There are some organization who may require a lot of features so in that scenario it is advisable to use the off the shelf products as the cost will be low and the delivery can be made at a faster rate. However, as most of the clients are of smaller magnitude and consist of small and medium scale industry then it will be best if they provide the organization with in house products. Thus, it can be concluded that in house product will be the best option for the organization as it will help them to provide a better quality of service (Kruger, Abu-Mahfouz Hancke, 201 5). Conclusion In this business report, it is concluded that the information security can be described through three concepts- confidentiality, integrity and availability. This security is necessary so that an organization can securely transmit their details and message with their employees. However, in recent times, hackers and IT intruders hacks all the authentications and access to the companys useful information. Such technologies for network security in recent times are Cloud Access Security Brokers, Endpoint detection and response (EDR), Indicators of Compromise (IOC) and Intelligence-driven security operations centers (ISOCs). However, in this buiness report the three application that is taken into consideration are- Authentication Application (Kerberos), Web Security Standards (SSL/TLS)- Citrix NetScaler Solution and Wire Shark. In addition to that, it is also concluded that all these application uses unique tools not only for securing the website from hackers but these application also determines discrepancies in the initial stages. Moreover, all the small business organizations or entities need IT process to support their business approaches. Thus, implementing these tools will helps all the organizations especially the inline business as all their business processes will be accomplished through online services and websites. This will provide the enterprises the opportunity to grow. Recommendation Thus, it is recommended that the organization should make use of the network security software to expand the business of the organization. The organization will have to provide in house software as a means of solution to their clients which will help them in providing better service than before. Reference List Australian Cyber Security Centre. (2017). Australian Cyber Security Centre. [online] Available at: https://www.acsc.gov.au/publications/ACSC_Threat_Report_2016. [Accessed 19 Sep. 2017]. Bollou, F. (2014). ICT infrastructure expansion in sub-Saharan Africa: An analysis of six West African countries from 1995 to 2002. InAdvances in Research Methods for Information Systems Research(pp. 151-164). Springer US. Fahl, S., Harbach, M., Muders, T., Baumgrtner, L., Freisleben, B., Smith, M. (2012, October). Why Eve and Mallory love Android: An analysis of Android SSL (in) security. In Proceedings of the 2012 ACM conference on Computer and communications security (pp. 50-61). ACM. Global Economic Crime Survey 2016. (2017). Global Economic Crime Survey 2016. [online] Available at: https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html [Accessed 19 Sep. 2017]. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Nslund, M., Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 11. Hodges, J., Jackson, C., Barth, A. (2012). Http strict transport security (hsts) (No. RFC 6797). Jolly, R., Ahmed, K. B. R., Zwickl, C., Watson, I., Gombar, V. (2015). An evaluation of in-house and off-the-shelf in silico models: implications on guidance for mutagenicity assessment.Regulatory Toxicology and Pharmacology,71(3), 388-397. Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education. Kruger, C. P., Abu-Mahfouz, A. M., Hancke, G. P. (2015, March). Rapid prototyping of a wireless sensor network gateway for the internet of things using off-the-shelf components. InIndustrial Technology (ICIT), 2015 IEEE International Conference on(pp. 1926-1931). IEEE. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. Mell, P. (2012). What's special about cloud security?. IT Professional, 14(4), 6-8. Morrow, K. J. (2016). Upstream Tools Hasten Product Development. Nguyen, T. H., Newby, M., Macaulay, M. J. (2015). Information technology adoption in small business: Confirmation of a proposed framework.Journal of Small Business Management,53(1), 207-227. Perlman, R., Kaufman, C., Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India. Perlman, R., Kaufman, C., Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India. Raza, S., Duquennoy, S., Hglund, J., Roedig, U., Voigt, T. (2014). Secure communication for the Internet of Thingsa comparison of link?layer security and IPsec for 6LoWPAN. Security and Communication Networks, 7(12), 2654-2668. Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14-20. Schrittwieser, S., Frhwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., Weippl, E. R. (2012, February). Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. In NDSS. Sekowski, J., Gibbons, J. (2016).Evaluation of US Commercial-Off-the-Shelf Hand-Held Assays to Detect Opiate Pain Reliever Compounds in Multiple Biofluids. ECBC Aberdeen Proving Ground United States. Stallings, W., Brown, L. (2012). Computer security. Principles and practice (2 nd ed). Edinburgh Gate: Pearson education limited. Tankard, C. (2012). Big data security. Network security, 2012(7), 5-8. Yu, H., Powell, N., Stembridge, D., Yuan, X. (2012, March). Cloud computing and security challenges. In Proceedings of the 50th Annual Southeast Regional Conference (pp. 298-302). ACM. Zhang, X., Warner, M. E. (2017). Business retention and expansion and business clustersA comprehensive approach to community development.Community Development,48(2),