Sample by My Essay Writer

1: Goals for Information Security
According to the National Institute for Standards and Technology (2001), there are typically five primary goals for information security. These objectives are set in place to protect from incidents such as an organized cyber attack, an uncontrolled exploit such as a virus or a worm or a natural disaster with significant consequences to the data and system. Despite priority given to each of the objectives, each is interdependent and therefore, nearly always necessary for the execution of the rest. The first, often considered the most important objective is that of availability. This references both the prompt speed of the systems and data, as well as the ability of authorized users to access said systems and data.

The second most desired security objective from an organization is the integrity of a system and the corresponding data. To ensure data integrity, the organization must safeguard the data from any unauthorized alterations “while in storage, during processing or while in transit” (NIST, 2001, p. 9). To achieve system integrity, the organization much ensure that the system has not undergone any unauthorized alteration and performs as intended and unimpaired.

Although in terms of importance, confidentiality is considered the third most important objective to be accomplished by a data security organization, it is considered extremely necessary for certain systems. Confidentiality of data and system information refers to the necessity that potentially sensitive and confidential information is made only available to authorized individuals. To ensure confidentiality of data, the organization must have confidence of its inaccessibility to unauthorized individuals and organizations during processing, transit and while in storage.

Accountability on the individual level is the next objective often established by organizations. To achieve security, organizations often establish accountability by way of policy requirement. It is meant to reinforce “non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after action recovery and legal action” (NIST, 2001, p. 7).

Finally, to establish confidence of both the technical and operational effectiveness of the security system is in place, an organization much ensure that assurance has been accomplished. This essential objective refers to the assurance that the integrity, availability, confidentiality and accountability are in place and are effective. This refers to the correct implementation of functionality, unintentional errors (by users or software) are sufficiently safeguarded and intentional penetration or bypass is met with sufficient resistance.[Need an essay writing service? Find help here.]

2: Categories of Services
In order to provide security, an organization must provide the following services: support , prevention and recovery. Supporting services refer to the implementation of reinforcement of the other two services. Prevention services are put in place for the purpose of preventing a security breach. Finally, since it is essential to have a safety net should prevention services fail, detection and recovery services are put in place to reduce the impact of any breach.

Support services reinforce prevention and recovery services by including identification, cryptographic key management, security administration and system protections under the umbrella of services provided. Identification and naming services are needed to identify subject and objects. This includes users, processes and information resources. Cryptographic keys are necessary for the implementation of cryptographic functions as well as other services. Security administration refers to the security features needed to meet the necessities of an installation and to verify the security of changes to the operational environment. Lastly, system protections are put into place to establish certainty in the relative security of the system’s functional capabilites. This includes “residual information protection (also known as object reuse), least privilege. process separation, modularity, layering and minimization of what needs to be trusted”(NIST, 2001, p. 10). [“Write my essay for me?” Get help here.]

The services included under prevention include protected communications, authentication, authorization, access control enforcement, non-repudiation and transaction privacy. Protected communications refers to the necessity of integrity, availability and confidentiality of information during transit. Trustworthy communications are essential to ensure security in a distributed system. Authentication is a service put into place to ensure the validity of a subject’s identity. Authorization is a service implemented in order to ensure as system’s actions are specified and management are enabled. Access control enforcement is the service that enforces security policy as defined by the system after access had been validated to a subject. The capability of a system’s access control enforcement includes both the strength of its security and the precision in its ability to correctly validate access. Non-repudiation prevents senders from falsely denying that they did or did not send information and prevents receivers from falsely denying that they did or did not receive information. Finally, transaction privacy is put into place to ensure the secrecy of sensitive and/or private information.

Should the prevention services in the system fail, recovery and detection services are put into place to minimize the damage of a breach. The services included under recovery are audit, intrusion detection and containment, proof of wholeness and a restore “secure” state. Auditing refers to the process in recovery wherein the system scrutinizes the security event after detection. This allows the organization to learn the exact nature of the security event and/or potential breach. The purpose of intrusion detection is to detect the security event as quickly as possible and the corresponding containment is to effectively respond to said event. These two actions work in conjunction with on another to provide a single service in order to ensure a breach’s effect is minimized. Proof of wholeness is a service that has the ability to detect whether the data or the system has been potentially corrupted. In the event that the breach was able to effect, it is the function of proof of wholeness to determine the nature of the effect and to what extend it corrupted the system. Finally, a restore and secure state is established so that the system and data can return to its former state before the breach. A restore and secure state addresses any alterations produced by the breach and is meant to ensure that such a breach is incapable of resurfacing.  [“Write my essay for me?” Get help here.]

Each one of the categories of service is necessary for an organization to provide security to any system and the corresponding data within.

Federal Emergency Management Agency (FEMA ) (2012, Mar 7). Cyber Incident Annex.

Fischer, E. A. (2014, Dec 12), Federal Laws Relating to Cybersecurity: Overview of         Major Issues, Current Laws, and Proposed Legislation. Congressional  Research Service.

Kurtz, P. (2015, May 19). Congress Wants Companies Facing Cyberattacks to Share        Data, and It’s Not a Moment Too Soon.

National Institute of Standards and Technology (2001). NIST Special Publication 800-33 – Underlying Technical Models for Information Technology Security.

Richards H. W. (2015, Oct 5). Congressional action on cybersecurity would send strong message to China, Congress Blog.


Sample by My Essay Writer

Given the sheer amount of demand for Western products in China, SAB Miller’s expansion into the country has a considerable amount of potential based on the number of new consumers that it could garner. The expansion of other foreign brands into the local market has already proven to be successful as evidenced by Pabst Blue Ribbon’s marketing campaign which resulted in a relatively mediocre beer being sold for $44 a bottle. However, the biggest problem with establishing a supply chain into China is the far lower cost of comparable local products when compared to more highly priced imports as well as the presence of high import tariffs (Caplan, 2013).

One of the reasons that companies find it initially difficult to expand into China is the presence of a relatively robust local market that contains a wide variety of comparable locally produced products. China is notorious for producing fake goods on a massive scale which is not limited to just bags, shoes, and DVDs but also encompasses food products. SAB Miller’s expansion into China would need to contend with the potential presence of these fakes as well as local products that are much cheaper due to the lower price on labor.

Related Assumptions
The primary assumption that can be drawn from the information presented is that SAB Miller should establish a factory in China to lower their overall cost so that they can be more competitive. This is based on the ease of building factories and other manufacturing facilities within the country, the government tax exemptions that come during the first year of operation as well as other incentives. The scope of its creation would encompass all necessary brewing and production aspects for canning.

a.) Importing from the UK
While importing SAB Miller’s products directly from its factories in the UK would cut down on the investment cost of establishing a plant in China, one of the problems with this method of supply chain creation is the long term cost associated with taxes and tariffs (Measures of the People’s Republic of China on Control over and Taxation for Import and Export Goods of Enterprises with Foreign Investment, 2005). This approach could potentially be used to introduce the product in China to determine how the general market responds to SAB Miller’s products but is unsuitable in the long term.

b.) Production in Taiwan – producing the beer in Taiwan then exporting it to China does have potential given the lower taxes associated with this method of production; however, there are substantial shipping costs.[Need an essay writing service? Find help here.]

c.) Production in Korea – production in Korea could have potential, given the potential access to a new market in Korea as well. However, labor is cheaper in China so it would be more viable to have the factory there instead.

Based on the information presented, SAB Miller should pursue a strategy where it initially imports its products direct from the UK to China to test the reaction of the Chinese market. If the result is positive, it should implement a better supply chain strategy by cutting out the middle man by establishing a factory within the country. This helps to lower the amount of risk that the company is exposed by creating an initial evaluation period. [“Write my essay for me?” Get help here.]

It is recommended that the firm establish a local factory in China instead of importing its products. It cannot compete directly with cheaper Chinese goods despite the popularity of western branded products (Chen, Lobo, & Rajendran, 2014). As such, by being able to sell its products competitively as well as having a western name, this would help the company gain a substantial market share.[Click Essay Writer to order your essay]

The firm should develop a partnership with a local food importer that specializes in Western goods so that SAB Miller can determine through their expertise where they should initially distribute their product. If the reception is positive, the company should then build its own brewery and canning facility within China to cut down on the cost of production to make it more competitive.

Overall, expanding into China is a good idea given the current level of demand within the country for western goods. However, the supply chain should not focus primarily on imports since this will substantially increase costs in the long term. As such, it is highly recommended that the company create a local brewery and cannery to limit the distances involved in shipping and to eliminate costs associated with high tariffs.

Reference List

Caplan, N. (2013). Not for all the wine in China. New Statesman142(5155), 55.

Chen, J., Lobo, A., & Rajendran, N. (2014). Drivers of organic food purchase intentions in           mainland China – evaluating potential customers’ attitudes, demographics and  segmentation. International Journal Of Consumer Studies38(4), 346-356.

Measures of the People’s Republic of China on Control over and Taxation for Import and Export Goods of Enterprises with Foreign Investment. (2005). China Business Laws &  Regulations (pp. 381-386).


Sample by My Essay Writer

The theory of Hofstede’s cultural dimensions explores ways through which values projected in the workplace are related to one’s culture. It is an analysis which creates link between one’s behavioral practices and their cultural backgrounds. The theory was developed by Dr. Geert Hofstede. Hofstede supported the idea that culture was a tool that generated conflicts. The disparities in the cultural values lead to differences in the workplace, which may lead to stagnation. The theory mainly examines the effects of society’s culture in the reinforcement of a people’s values. Hofstede’s cultural dimensions further analyze how these values influence the behavior of an individual.

In developing the theory, Dr. Hofstede employed the factor analysis method. From his initial research, he forwarded four dimensions which could be used to determine cultural values. These include power distance, uncertainty avoidance, individualism-collectivism and masculinity-femininity. In the subsequent researches, Hofstede added the long-term dimension and the indulgence versus self-restraint components (Geert, 2011). Hofstede’s cultural dimensions are pervasive. They can be employed in various industries and segments of the society. All of these dimensions can be used to determine the values reflected in politics, environmentalism, business practices and health practices.

According to Hofstede, Culture comprises a set of unwritten behavioral practice rules, which prevail on the ways by which subscribers to the culture engage each other (Hofstede & Minkov, 2010). The theory was based on the assumption that every individual engages in behavioral inclinations which were promoted by their society. These values cannot be the same given the differences in cultural practices. Given the immensity of culture in determining output in an organizational structure, the Hofstede’s metrics allow the determination of ways through which one’s cultural background can be influenced to propagate the goals of the subject institutions. The dimensions further allow the comparison of different cultures.

Hofstede’s Cultural Dimensions in Business Practices 
There are six known cultural dimensions addressed in Hofstede’s theory. These include power distance, individualism versus collectivism, masculinity versus femininity, uncertainty avoidance, pragmatic versus normative and indulgence versus restraint. These concepts can be used to define different business practices. Some of the business practices that can be influenced by the Hofstede’s cultural dimensions include business communication, management and team building.

The power distance dimension addresses the inequality that is present in different cultures between people with and without power. The power distance index (PDI) comprises the metric engaged in examining the degree of disparity between individuals in authority and the followers. Hofstede (2011) prevailed that power distance as a cultural dimension is the extent to which the less powerful members of a given society accept and expect the power to be distributed unequally. In the article Dimensionalizing Culture: The Hofstede Model in Context, power distance is projected to be reinforced by both the leaders and the followers. The leaders promote the distance by practicing authority while the followers propagate the notion by their acquiescence to the authorities imposed on them. Essentially, this dimension acknowledges that power inequality is present in every society but it is more prevalent in others. [“Write my essay for me?” Get help here.]

The power distance dimension has two forms. These comprise the small power distance and the large power distance. In cultures that promote small power distances, the followers and leaders engage more repeatedly. Essentially, parents in such cultures treat children as their equals. Likewise, in such a culture, the subordinates expect to be consulted (Geert, 2011). Small power distances demand that power should be legitimate and aligned to the metrics of good and evil. In long power distances children are expected to be subservient to the wills of their parents. Constant engagement is projected to be a misdemeanor. In this setting, the subordinates are not consulted but rather directed. Furthermore, the income distribution in such a society is reinforced. [Need an essay writing service? Find help here.]

The next cultural dimension in Hofstede’s theory comprises the next metric which can be used to determine the values that one projects. Uncertainty avoidance can be defined as the degree to which members of a given culture are ready to integrate ambiguous and tricky situations (Ghemawat & Reiche, 2011). Uncertainty avoidance can be structured into two segments. These comprise weak uncertainty avoidance and strong uncertainty avoidance. In weak uncertainty avoidance, the subjects are more tolerant of deviant behavior. Such a culture promotes curiosity and innovation. Essentially, the uncertainties of life within this kind of structure are readily accepted. Alternatively, a strong uncertainty avoidance inspires intolerance to deviant behavior in the society. In this dimension, members of the society view the uncertainties of life as a threat to their existence (Geert, 2011). Therefore, they tend to resist reality. In such a culture, normalcy is promoted. Cultures with a strong uncertainty avoidance index tend to promote values that minimize the occurrence of risks. This is achieved through the creation of regulatory frameworks that promote strict behavioral patterns within the subject institution. While in cultures that reinforce a weaker uncertainty avoidance motivation is derived from the need to create, in cultures that promote a stronger uncertainty avoidance motivation is derived from fear.

The individual-collective dimension addresses the levels by which people in a society are integrated. It explores the closeness that is present among members of the subject community. Hofstede prevailed that the individual-collective dimension is concerned with the need to determine whether the members of the community project an independent or dependent stance (Hofstede G., 1993). In societies that promote the individual framework, individuals are encouraged to speak their minds. Each individual has to have an opinion which then allows for the determination of the collective decision. In such settings, the use of “I” is pervasive and common. Essentially, the individual comes first in this dimension (Hofstede & Minkov, 2010). Alternatively, the collective framework reinforces the “we” notion. In the projection of an opinion, one should ensure that they promote harmony with other individuals in the group. Essentially, cultures which are aligned towards the collective umbrella encourage collective initiatives over individual initiatives.

The masculinity-femininity framework in Hofstede’s cultural dimension addresses the distribution of values between the different genders in the society. Essentially, the values promoted in one culture with regards to masculinity and femininity may differ from one culture to the next. Some of the values reinforced by men across different cultures comprise assertiveness while in women, modesty and a caring nature is reinforced. In many cultures, it is a taboo to reinforce values of modesty and care in men (Hofstede & Minkov, 2010). The femininity dimension reinforces care for the weak in the society. The concept of competition is minimized while the promotion of women participation is reinforced. It advocates for a minimal emotional and social disparity between men and women. In the cultures that reinforce masculinity, the admiration is channeled towards the strong in the society. Likewise, men are expected to be ambitious and driven.

The indulgence versus restraint dimension alludes to the degree by which a society integrates free gratification of basic and natural human desires which are linked to enjoying life and having fun (Hofstede, 2011). Communities that align their values to indulgence have individuals who are happier. Essentially, the values propagated in such a setting encourage open-mindedness and opinionating. Such a culture promotes leisure activities above the demanding aspects of life. Alternatively, cultures aligned towards restraint has a fewer number of individuals who are happy. Unlike in indulgence, restrained communities hardly remember positive emotions. The short-term versus long-term orientation dimension explores the extent to which a society is willing to go to acquire virtue (Hofstede G. , 1993). Cultures that are aligned towards short-term orientation promote the present circumstances. In such cultures, the overall guidelines act to influence individual choices. Members of such a setting reinforce the concept of luck in weighing their successes. Alternatively, individuals who align themselves to long-term orientation are more concerned with the future. The prevailing guidelines depend on the prevailing circumstances. [Click Essay Writer to order your essay]

Development of the Dimensions 
The first four dimensions are a culmination of extensive research conducted across countries. The dimensions were developed between the years 1978 and 1983. Hofstede conducted interviews on more than 10,000 employees of IBM spread across the continents. At the time of the research Hofstede worked as a psychologist in the IBM company (Hofstede & Minkov, 2010). The data collection processes were conducted in three phases. The first phase involved 40 countries. This phase had the largest number of respondents. The subsequent phases were intended to assess the findings of the previous dimensions. These involved airline pilots and students who were spread across 23 countries. Lastly, civil service staff managers were engaged in 14 countries and elites in 19 countries. The indulgence versus restraint framework was developed in 2010. It was a culmination of surveys on respondents from different countries. The orientation dimension was drawn from the Monumentalism and Flexumility framework.

Hofstede’s Cultural Dimensions in Business Practices 
Business Communication
Hofstede’s cultural dimensions influence how businesses are conducted. To begin with, communication in business comprises an indispensable factor. The power distance dimension influences the nature of communication in a business setting. It influences the direction of communication. Large power distances hamper effective communication in an organizational structure. In such a system, information follows a vertical pattern. Essentially, the form of communication does not allow two-way movement. The subordinates are expected to be told what to do. The superiors further determine what to say. This comprises a closed system of communication and may hamper the progress of the business setting. Open communication is projected in businesses that align themselves to shorter power distances.

The individualism-collectivism dimension also influences business communication. In individualistic business settings, communication is hampered (Geert, 2011). Individuals do not readily share information as they are more inclined to withhold information to benefit themselves. The right of privacy in such a setting discourages opinionating which hampers communication. In a collective business setting, the stress on belonging promotes interactions. This enhances the rate of communication between the members. The short-term versus long-term orientation dimension influences business communication. Information disseminated in a business structure that aligns itself to long-term orientation is more optimistic than the information propagated in a short-term oriented business.

Business Management
The masculinity-femininity dimension influences the management practices of business organizations. Companies that align themselves towards the masculine dimensions tend to reinforce a management style that is authoritative. Essentially, it promotes assertiveness. The management style in a masculine culture reinforces competitiveness (Ghemawat & Reiche, 2011). Essentially, in the setting, the stronger one is, the more it is that they are respected. Business organizations that align themselves to the femininity dimension practice a more relaxed management style. The management style in such a setting encourages nurture. The employees matter just as much as the output of the business organization. Furthermore, a lesser sense of aggression is engaged in the competition with other business organizations. The femininity dimension further encourages diversity in the management structure. This is absent in the masculine dimension.

The uncertainty avoidance dimension also influences the management styles in practice in many business organizations. Organizations that mirror a weak uncertainty avoidance engage a risk-taking management style. The management style in such a structure encourages innovation and the constant reviewing of prevailing strategies (Ghemawat & Reiche, 2011). The management style practiced by organizations that align themselves to strong uncertainty avoidance are conservative. This is a management style that discourages the engagement of new strategies. Change is viewed as a threat that may jeopardize the function of the subject organization. Furthermore, the rigidity of such an organization influences an assertive management style. [“Write my essay for me?” Get help here.]

Business Team Building 
Teamwork is a business practice that reinforces the convergence of employee efforts and talents to further productivity. The individualism-collectivism dimension succinctly addresses the concept of team building in different business organizations. Organizations that incline their strategies to the individualistic dimension does not encourage teamwork. Essentially, the employees reinforce the concept of privacy. This impedes communication and leads to various altercations which stagnate growth of the business. In an individualistic environment, employees look at their interests before those of the subject organization. The business setting becomes second while their interests become first. In a collective dimension, businesses tend to encourage team building (Geert, 2011). Information sharing is encouraged as the most important aspect is “we” and not the “I” observed in individualistic institutions.

Implications of Dimensions in Business Practice to the Individual, Society, and the Public
Increased efficiency of business practices that result from the collective effort improves the quality products. This is of benefit to the public. Likewise, a business practice that is inclined towards femininity encourages individual development of the employees and further reinforces the role of women in careers (Hofstede & Minkov, 2010). This enhances community diversity. An increased intercultural understanding between business practices. The Hofstede’s cultural dimensions enhance the cooperation between the public and the business settings. This improves the business environment and allows for the economic progression of the overall society.

Hofstede’s cultural dimensions address the essence of culture in determining the values projected by members of the society. These dimensions can be manipulated to enhance the efficiencies of business practices. They can be used to influence team building, communication processes and the management of business settings. Dimensions such as femininity and long-term orientation allow the development of the individual. On the other hand, there is a need for balancing in the integration of the various Hofstede’s dimensions. Dimensions such as masculinity may promote partisan dynamics in business settings. This discourages diversity which in turn impedes progress. [Need an essay writing service? Find help here.]

Ghemawat, P., & Reiche, S. (2011). National Cultural Differences and Multinational Business. Globalization Note series, 1-18.

Hofstede, G. (1993). Cultural constraints on management theories. Academy of Management Executive, 7(1), 81-94.

Hofstede, G. (2011). Dimensionalizing Cultures: The Hofstede Model in Context. Online Readings in Psychology and Culture, 2(1).

Hofstede, G., Minkov, M., & J., G. (2010). Cultures and Organizations: Software of the Mind. New York: McGraw-Hill.


Sample by My Essay Writer

Part One
Selection A: Excerpt from WikiHow article on “How to Build a Birdhouse”
“Attach the roof. Lie the birdhouse down on a stable work surface, which the back flat against the surface. Take two roof panels, cut from 1×6 boards. One will need to be cut to 9? in length, the other will need to be 8 1/4?. Fit the pieces so that they overlap and sit flush with the sides and back panel. Glue and then screw them into place, using 4 equally spaced screws, as before.”[Click Essay Writer to order your essay]

The audience for the piece is average people who want to learn how to build a birdhouse.  It assumes some literacy and ability to follow basic directions but no higher education.  It is more appropriate for someone who has at least limited experience with basic construction.  The intended age demographic is old enough to read and follow instructions and young enough to have the necessary dexterity to complete the project.[Need an essay writing service? Find help here.]

Its purpose is instructive and informative, as it is intended to give directions that can be followed by the reader to accomplish a specific goal.  It is highly descriptive, as it is intended to provide all necessary steps to complete the task of building a birdhouse without additional help.

The influences for the piece are likely personal construction experience and a desire to teach others to do things for themselves.  Important factors include a desire to encourage the author’s audience to adopt a do-it-yourself, or DIY, ethic and attempt to teach themselves valuable life skills.

Selection B: Excerpt from blog post on “Anything Goes!”
“It has been a wet and rainy past couple of mornings over here. It’s a good thing that I’m on a short rehab from running for the moment or it would have definitely disrupted my running plans. Not have a race to train for also makes me kinda lazy to wake up and lace up.
“The plus side of the morning rains is the yearly haze hasn’t been showing itself and I’m hoping it stays that way. The skies have been nice and clear after the morning rains unlike the past few years where there would be a blanket of haze enveloping the country.”

The audience for this piece is an average blog reader, most likely someone who personally knows the author as it is a personal blog post with no informative or instructional content.  It is more suited to younger readers who don’t have anything better to do than read a random person’s personal reflections than to a busy professional.  However, the language used is not very challenging, so it is appropriate for most age groups.  There is nothing in the post that makes it particularly appealing to one gender over another.

The excerpt’s purpose is to share the author’s personal reflections with a general audience, and it is format reflects this purpose.  It reads more or less like someone’s personal journal entry.

The direct influences behind this piece are strictly personal; the author just wants to share his reflections on his own life.  On a larger scale it could be argued that its creation is also influenced by blogging culture, in which average people are encouraged to keep what are essentially personal reflections journals available to a wider audience via the internet.

Selection C: Excerpt from scientific paper abstract
“Nanosized TiO2 powders were prepared using the sol-gel procedure. The selected colloidal suspensions were stabilized with polyethylene glycol (PEG). This polymer prevented sintering of TiO2 particles during the calcination of the starting material. X-ray powder diffraction (XRD) phase analysis showed that the samples, obtained up to 500°C, were a mixture of anatase and brookite. In the samples, obtained at 850°C and higher temperatures, rutile as a single phase was detected. The TGA/DTA curves were dependent on the preparation of TiO2 samples. The samples were also characterized by Fourier transform infrared spectroscopy and laser Raman spectroscopy.”

The audience for this piece is very specific.  It is intended to be read and appreciated by the niche scientific community interested in the chemical and structural properties of TiO2.  The age group and demographic being targeted is extremely highly educated adults, whose choice of employment implies that they are probably also middle to upper class citizens.

The excerpt’s purpose is to summarize the information gathered in the course of a scientific experiment to the relevant community.

The language used in writing this abstract was influenced by the scientific community, in which an extreme amount of jargon and other very specialized language is considered necessary.  It is very academic in nature and is all but completely incomprehensible to someone outside of the specialized field with which it is concerned. [“Write my essay for me?” Get help here.]

Part Two
Selection A

Illustration of quality of diction
“Take two roof panels…”

Characteristics of excerpt
The level of language is quite low in order to make the piece easy to understand.  The word choice is simple and direct, using the second person imperative.  The image of the roof panels is intended to be interpreted as strictly concrete and representing parts of a very particular activity.

Alternative wording
Two panels traditionally used for roofing were obtained.

Explanation of change
Through changing the wording to use the passive voice and adding a few words, the intended audience for the piece has also been altered. It sounds more like steps to be followed in recreating a scientific experiment rather than steps that anyone can follow to perform a simple task, which would encourage an academic audience rather than an average reader.

Selection B
Illustration of quality of diction
“….kinda lazy to wake up…”

Characteristics of excerpt
The excerpt uses slang and incorrect grammar, drawing attention to itself as a piece of personal writing rather than an excerpt from a formal or academic work. The language is concrete and uninspired, allowing anyone to read and understand it but not encouraging creative thought.

Alternative wording
…the seas of sleep break harshly upon the vessel of my waking mind…

Explanation of change
The removal of grammatical errors and slang and addition of a more interesting abstract image and alliterative sound devices causes the phrase to read more like poetry and less like a boring personal journal.  It creates more nuanced meaning while still conveying the same basic idea.

Selection C
Illustration of quality of diction
“…selected colloidal suspensions were stabilized…”

Characteristics of excerpt
It uses the passive tense, as is necessary in scientific writing, and employs obscure terms without giving any definitions or explanations for them.  The level of language is extremely high as it is throughout the piece, and the word choice is very concrete.

Alternative wording
…we stabilized our chosen mixture somewhere between a liquid and a solid phase, creating a colloidal suspension…

Explanation of change
The change in wording makes the phrase sound much more approachable, using active voice instead of passive and offering an explanation of the meaning of “colloidal suspension.”  Such revisions would make the piece more accessible to a wider audience instead of requiring a high degree of academic achievement and very specialized knowledge.  With the revision it continues to be a concrete and literal image, but it is now one that can be more easily understood.[Click Essay Writer to order your essay]

Part Three
Dear Jane,

Just wanted to write ya a quick note to let ya know that I’ll be moving soon.  Didn’t think it would come to this; I love my school and all my teachers and the new friends I’ve made (especially you), but I just don’t love this city like I thought I would.  I hope you know that I’m gonna miss you like crazy, though!

I’ve been losing it a little bit since moving into my new place, to be honest.  I can’t stand my roommates and I even hate the room I live in.  The white washed walls are stifling, and it feels like I can’t even see the sun shining in through the windows.  Maybe it’s not the city; maybe it’s me. Either way, I already applied to a new school and I’m gonna be transferring at the end of the semester.

The new school I’ll be attending offers all the classes I need for my major, plus some that ours doesn’t!  I can choose whether or not to live on campus, and the campus itself is beautiful.  The weather will be fine and I’ll be able to ride my bike to the beach!  Don’t worry, though, I won’t forget about ya; you’ll always be my best friend, and placing even a whole country’s worth of distance between us wouldn’t change that.

Your Best Friend

The purpose of this fictional letter to my best friend Jane is to convey information, but also to establish an emotional connection.  The devices I chose to focus on were the use of slang, such as “ya” instead of “you” and “gonna” instead of “going to;” connotative language like “love” and “best friend,” and sound devices like the alliteration of “white washed walls.”

Works Cited
Furic, K., Ivanda, M. Gotic, M., Music, S., Popovic, S., Sekulic, A., Trojko, R., & Turkovic, A.
“Chemical and micro structural properties of TiO2 synthesized by sol-gel procedure.”
            Materials Science and Engineering: B, vol 47, no. 1, May 1997, pp 33-40. DOI:

Phillips, Nick. “Wet Mornings.” Anything Goes!, 9 Sept. 2016.

“How to Build a Birdhouse.” WikiHow


Sample by My Essay Writer

Terrorism is a factor that threatens different countries in the world and has been met with different responses. The United States is one of the biggest targets for many terrorist groups. In history, the United States has suffered both Domestic and International Terrorist attacks. One of the biggest attacks in the American history was the terrorist attack on the World Trade Center on September 11, 2001. When it comes to such attacks, information is always considered a powerful tool that can either make the attacks successful or even prevent such attacks. When it comes to information, the Media proves to be an important contributor. One of the primary roles of the Media is to ensure that the government is kept in check by reporting both the good and the bad to all citizens. However, in some cases, the Media has been known to participate in the concealing of information at the request of the government officials. This will look at the different roles of the Media concerning the domestic surveillance of people by the National Security Agency (NSA).[“Write my essay for me?” Get help here.]

The fact that the United States government was monitoring people’s communication through different channels such as Emails, Text messages, and phone calls. This move was made with the aim of ensuring another instance such as the attack on the World Trade Organization building is never repeated. This surveillance has been run through the administrations of two different presidents. These refer to Former President George Bush and the current American president, Barrack Obama. Many people have found this surveillance to be a violation of their rights. In fact, such an act is considered illegal and unethical according to the American Constitution. However, the practice has continued and this is due to the conflict of interests in the different wings of the government. The Judiciary, Executive, and Congress have had different opinions and that has made the surveillance a controversial issue for a very long time.

The immediate impact upon the publishing of this information was outcry among people in different parts of the United States. From a personal perspective, it does not feel right for the government to monitor one’s communication. People always need their privacy and especially when sensitive matters are concerned. This surveillance could mean that people have all their secrets known and stored by the government agency. The short-term effect was that the government did not value the rights of the citizens. It is also strange that the government can have such a program running and still fail to use such details to prevent other social evils such as home invasions and even murder. The drug trade is also a factor that has affected different people and such a program could easily help them government find ways of arresting the major drug dealers and even the established drug routes. While considering the long-term impact of the published information on the NSA spying program, the government suffered a huge a lack of trust. Even now, people have little or no trust in the government and different agencies.

On the other hand, I cannot help but be afraid of the revelation of this program as it also meant that the American enemies also became aware of this surveillance. This could easily provide them with insight on the ideal channels to use while looking to carry out attacks. In this case, I think that the only victims would be the American citizens. The government had established chains of communication that was not monitored under the program. The American enemies, on the other hand would just easily find ways of communicating without being monitored. Despite these negative outcomes, it is a good thing that America has not seen another attack of deadly magnitude as the September 11, 2001. [Click Essay Writer to order your essay]

The fact that the former American president George Bush has asked the New York Times not to publish the information on the surveillance program shows a government that does not intend to practice transparency with its citizens. In addition, this program meant a violation of people’s right to privacy. Should the media have chosen to conceal this information, people would have had their rights violated for a longer time. It was a good thing that the New York Times ignored the warnings by the president and his government and published the information. In fact, it was a good thing that the information was made public since the program is still ongoing. For instance, one of the whistleblowers claimed that he could not share information with the journalists since one of them had brought an iPhone with him. Since iPhones have one of the latest technological trends, it could be true to state that the program is still ongoing and the private companies are now becoming parts of it. In addition, he would also ensure that the webcam of every laptops he used was covered to prevent the recording of passwords. Telecommunication companies such as Verizon would turn over communication data of all clients to the NSA.

This shows that people could not have any private conversation while using the Telecommunication companies. In addition, the programs required that all these programs be archived to ensure it has records for future references. I think that cellphones have become an important tool in people’s lives and the fact that people cannot enjoy privacy with their use shows the intensity of people’s rights. One of the primary reasons why this program has managed to exist despite the outrage by different people is the manner in which the government explained its purpose. By stating that the program was meant to protect the American citizens and use different government agencies to prove some of the progress made by the program resulted in a reduced outrage (Gillmor, 2014). However, most of the information provided by the president at the time was limited and misleading. I find it very offensive that the manner in which the NSA collects information is not in any way intended to find bad people but the United States citizens and others all over the world. [Need an essay writing service? Find help here.]

Some of the dangers of having companies such as Apple and Google collect data on people for the program include violation of rights. Even though people rely on these companies for their social lives, some level of privacy has to be guaranteed (CNN, 2013). Given the fact that the private sector is profit driven, some of the information saved could easily be used to increase their profits. For instance, when people use the internet, the cookies usually enable different companies to access their data and market whatever services of products are involved. This becomes dangerous since the ease with which such marketing companies can access this information can also be enjoyed by people looking to commit crimes.

There have been many arguments on the position of this program and this is because people have different opinions. The people supporting it argue that it ensures all people are protected. In addition, they also claim that it would be impossible for the program orgovernment agency to know the right data to collect and the ones to avoid (Howerton, 2013). In addition, it is safer for the program to monitor all persons and then filter the information and find terror related data. The people opposing this program, on the other hand, have insisted that people have the right to privacy and the manner in which information is collected can easily leave them vulnerable to other crimes such as identity theft. I feel that while this program might have positive results, it still becomes a violation of people’s right since it was known based on an NSA staff leaking the information to the Press. Should the government have come out clear than it was running a program aimed at boosting national security then many people could have supported the program.

The increased technological advancements have meant that people are now easily monitored. Personally, I enjoy the use of electronic gadgets such as smartphones, laptops, and tablets among many others. The internet is also a feature that has become more a requirement than luxury in life. I find it quite unfair that whatever information in these gadgets is recorded by the NSA and could be retrieved in the future. The media has played a crucial role in ensuring that the public is made aware whenever the government goes against the constitution. I still feel that there is more to be done by the media especially while considering this Spy Program. It should go ahead and monitor the government actions and inform people on whatever changes are made. The private sector also needs to be monitored since they could easily use the citizen data for different uses while considering their profit gains. I also find the fact that the Federal Bureau of Investigation (FBI) unfair sought the NSA employee behind the leakage on the existence of this program and all persons involved. Therefore, the Media and Government are important to the American society and they should all play their roles. The media should never fail to provide people with information regarding sensitive information such as surveillance on domestic citizens.

CNN. (2013, October 16). Your life, under constant surveillance. Retrieved September 5, 2016, from CNN:

Gillmor, D. (2014, April 18). As we sweat government surveillance, companies like Google collect our data. Retrieved September 5, 2016, from The Guardian

Howerton, J. (2013, June 10). Here Is the Pro-NSA Surveillance Argument. Retrieved September 5, 2016, from The Blaze


Sample by My Essay Writer

Racism in employment comprises a major challenge in the United States of America. It can be intentional or unconscious. It occurs when members of a particular are excluded from the recruitment process. It further manifests itself when an individual with the necessary credentials is overlooked because of their racial profile. Racism in sports is not an uncommon phenomenon. In games such as football, soccer, basketball and athletics there have been more than one incidences of racism.
The Rooney Rule was determined in 2003. It was intended to protect the interests of coaches from minority groups in football (Collins, 2007). The rule was established in response to the unfair treatment that African-American coaches were being subjected to vis-à-vis their white counterparts. The rule was created to ensure that African American coaches would also be included for the high-level coaching positions in teams that played in the prestigious National Football League (NFL). Before the rule, there were fewer than ten African coaches to have coached teams that were in the NFL. [Need an essay writing service? Find help here.]

Since the establishment of the Rooney Rule, there have been major changes in the football game with regards to the coaching staff. By the time the rule was coming into practice, there had only been seven individuals from minority communities to have held coaching positions in the NFL. However, since the introduction of the rule, twelve coaches from minority groups had been hired to act as head coaches (Hunt & Onwere, 2014). This shows that more and more African-American coaches are being considered for leadership positions courtesy of their credentials. This was not the case in the past. Likewise, by the year 2014, at least one coach from a minority group had participated in the Super Bowls. Essentially, at least one team in the Super Bowl was being coached by an African-American. The Super Bowl in 2007 comprised the first significant football match to have been exclusively contested between two African American coaches (Hunt & Onwere, 2014).

Given its non-profit nature, the NCAA cannot adopt the Rooney Rule in appointing coaches to head college football teams. The NFL is a for-profit organization which is legally empowered to enforce the policies addressed in the Rooney Rule. Unlike the NFL, NCAA is made up of voluntary members. It is impossible for the association to influence the hiring processes of coaches within the college setting (Pike, 2011). Regardless of the non-binding relationship that coaches have to the NCAA, it is necessary to create a policy framework that encourages the hiring of African American coaches. In the absence of such a binding framework, coaches from minority groups will continue to be overlooked in the hiring processes. For instance, currently over 80% of the head coaches in Divisions, I, II and III, come from the White community. This translates to fewer opportunities for members of the black community.[Click Essay Writer to order your essay]

Ethically, it would be wrong to enforce any legal burdens on voluntary members. Given that the groups that make up non-profit groups earn no revenue from their activities in the subject association, it is inadmissible that rules should be imposed on them. It would be unethical to interfere with the internal processes of voluntary members. One risks pushing the members away. Furthermore, legal frameworks protect voluntary members from such exploitations. Thus, an imposition of the Rooney Rule on non-profit organizations borders on criminal behavior. This constitutes unethical practices.

There have been additional measures which have been instituted in the Rooney Rule framework. These additional measures are meant to further reduce the potential racial employment discrimination in sports. These additional measures are necessary. From a personal perspective, they will further serve to protect individuals from minority groups against racial discrimination in sports. Currently, over 80% of leadership roles in American sports is limited to members of the White community (Pike, 2011). To attain a similar position, coaches from minority groups have to work marginally harder than their counterparts from the White race. The rules will allow for the increased participation of coaches from minority groups in coaching and the front office (Brown, 2009). The more stringent the rules are, the more likely it is that the NFL and other sporting organizations will adhere to them. Whereas previously, the rules majorly aimed to encourage the participation of coaches from minority groups in the interview process, the rules will encourage the hiring of the subjects. [“Write my essay for me?” Get help here.]

Conclusively, the Rooney Rule has had a positive impact on the football sport. There is the need to create a national framework that will address the interests of African American coaches in the sporting fraternities. Recent times have seen increased participation in sports by members of the African American communities. Consequently, there is need to ensure that they are given equal opportunity in the leadership of sports.

Brown, S. (2009). Rooney Rule is expanded to front office. Pittsburgh Tribune-Review, 1-3. Retrieved September 2, 2016

Collins, B. W. (2007). Tackling Unconscious Bias in Hiring Practices: The Plight of the Rooney Rule. NYU, 82(870), 870-912.

Pike, J. (2011). From the Rooney Rule to the Robinson Rule: NCAA Football and the Quest for Equal Opportunity in Head Coaching. Widener Journal of Law, Economics & Race, 3, 29-53.

Proxmire, D. C. (2008). Coaching Diversity: The Rooney Rule, Its Application, and Ideas for Expansion. American Constitution Society for Law and Policy, 1-9.


Sample by My Essay Writer

Conducting business internationally often involves encountering new cultures, operational processes and methods in which particular transactions are done. As such, what applies in a company’s home market may not necessarily apply to a new location that they are attempting to expand into. Employees need to understand how these local markets work, what sort of marketing tactic would be attractive to them and knowing the type of operational procedure that would mesh well with the local business culture. [Click Essay Writer to order your essay]

It is due to this that cross-cultural training is an absolute requirement when it comes to training employees to conduct business internationally. Employees need to realize that they cannot implement the same sales and marketing tactics in a new business environment that has an entirely different culture and expect classic methodologies to work. They need to accept change, be open to reinterpreting how they view particular markets and make changes to how they operate so that they can adopt to these new experiences. [Need an essay writing service? Find help here.]

Cross-cultural training does this by helping employees get a “taste” so to speak of the type of culture that they will be exposed to. Whether it’s the cultural conservatism inherent in the Middle East or the relatively liberal standards of Western Europe, a proper cross-cultural training course would be designed to help employees know what to expect and how to interact with people in these countries. This can often entail lessons on the local language, a briefing on unique cultural nuances that a person should be aware of (ex: the type of hand gestures that are and are not acceptable), and basic lessons on etiquette.

The more an employee knows how to interact with the locals in a new country; the more likely they are to being able to implement the desired goals of the companies since proper interaction and communication are essential to achieving goals when conducting business internationally. Aside from this, cross-cultural training lessons often include cultural sensitivity training where employees are taught how to respect properly respect local laws and basic decorum. For example, in the case of regions like the United Arab Emirates, there are certain ways in which religion should be expressed and criticized since, in some cases, being overly critical of Islam could wind up getting you arrested. [“Write my essay for me?” Get help here.]

While simple lessons like these may seem absurd on the surface, it is the little things (i.e. small cultural nuances) that can make an absolute difference when it comes to how an employee can properly interact with others in an international context. Markets like Japan place a considerable emphasis on seniority and the use of honorifics when addressing people (ex: attaching the term “-san” to the end of a person’s last name). If you were to follow the same business cultural notion in the U.S. by addressing someone in Japan by their first name immediately, this may seem acceptable to you but is considered to be incredibly rude within the context of the Japanese business culture. Understanding differences in business culture and adapting your mannerisms to take this into account is the main essence of any form of cross-cultural training.


Sample by My Essay Writer

The ideology of the government having the privilege to eavesdrop on citizens is arguably comparable to the limited capacity of citizens to do the same to each other or the government. Appreciation of the significance of this practice by the government is necessary for an exhaustive analysis of the implications of social interactions and cultural orientation of citizens. Listening in on citizens can be related directly to the political situation of a country and the perception that these citizens have towards their government, whether they are aware of such monitoring or not. Eavesdropping, in some discussions, is considered an infringement on the civil liberties of citizens, while in others, it is a way for security organs to offer security through eased garnering of data and communication within its social space. Therefore, this analysis assumes the standpoint that society should not prohibit government eavesdropping, but rather engage functional surveillance in increasing efficiency of security systems. It also considers the necessity of positive perception from society in aiding such surveillance.

Mass surveillance may be regarded as a practical approach for governments to control society, assess risks, and respond with minimal impact to social interactions. Its necessity, therefore, relies on the setup of a community and its requirements towards privacy. In the American setting, for example, civil liberties are seen as imperative to freedom and unwarranted surveillance is tantamount to an invasion of privacy (Lyon, 2014). This system attempts to qualify the level at which eavesdropping can be justified, and increases the confidence of the society in its approach towards eavesdropping. However, within these limitations, there exists abuse of capacity to eavesdrop by government agencies, especially on electronic platforms. It is necessary to appreciate that such agencies may act in the interest of national security or be driven by malicious intent (Betts & Sezer, 2014). In such situations, it remains necessary that the society continually engages government agencies that have such surveillance capacity to ensure that such systems function within the limitations of necessity.

Conversely, the social perceptions towards eavesdropping have changed over time, especially with the modern use of electronic based communication. These communication platforms offer various deterrents to eavesdropping, but cannot guarantee private information transfer. The argument that is commonly provided by government agencies is that citizens need not worry of surveillance if they are not involved in illegal activities (Betts & Sezer, 2014). This, however, may not inspire social confidence in the operations of a government, especially with personal information. Also, access to such information may not be guaranteed, and this may leave citizens feeling vulnerable. The disclosure of information obtained from eavesdropping is only permitted on a legal platform, but the handling of such information still leaves the public concerned with who can access their personal data (Betts & Sezer, 2014). In this respect, it is necessary that a government agency tasked with assessing persons within society do so with secrecy and minimal interruption of the social settings being investigated. [“Write my essay for me?” Get help here.]

On the sociocultural front, the impact of policies allowing eavesdropping on communication is significant where society values privacy. Within the current age of electronic communication, the confidence that these people have towards their communication devices is based on the level of intrusion that a government possesses. In situations where all communication is to be filtered, the levels of privacy drop, and necessitate that the community interacts on different (more private) platforms (Bajc, 2013). Nonetheless, the ability of persons within the community to be aware of eavesdropping limits their concern towards privacy. Since these individuals may not be interested in encrypting communication or eliminating third party listeners, their interests towards eavesdropping policies are insignificant. In such settings, the society does not care whether their communication is bugged or not.

The necessity of eavesdropping towards the maintenance of national security relates directly to the interests of the citizens. However, for their approval of such surveillance tactics, there is a need to inspire confidence in government operations in light of security threats. Terrorism, for example, is a common factor in the discussion, since intelligence is necessary for the prevention of attacks. In this respect, the government is tasked with the identification and assessment of threats through eavesdropping on communications between suspects (Lyon, 2014). Without such measures, it would be difficult to assess and predict the occurrence of these risks. Still, the argument against eavesdropping attempts to indicate possibilities of profiling and interfering with persons who are not threats, whose rights to privacy are violated (Bajc, 2013). However, the benefit of the usage of covert approaches in investigating such persons ensures that the information obtained is only as deemed necessary and such data secured after closing an investigation. [Need an essay writing service? Find help here.]

In the overall sense, eavesdropping is a significant contributor to the effort towards ensuring internal security but with costs on social perceptions. It changes attitudes towards communication and may influence communication habits. However, since it directly contributes to the feeling of security of these individuals, it is possible to overlook sociocultural impact for the benefit of securing the citizens from terrorism and crime. Within all these factors, it is necessary for government agencies to vet the ethical limitations of their surveillance techniques and ensure functional and useful surveillance without contradicting of any social justices.   [“Write my essay for me?” Get help here.]

Bajc, V. (2013). Sociological reflections on security through surveillance. Sociological Forum28(3), 615-623.

Betts, J. & Sezer, S. (2014). Ethics and privacy in national security and critical infrastructure protection. 2014 

Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society1(2).


Sample by My Essay Writer

What should have Harry have done?
Harry should have started by enquiring from Tom Blair on whether Luther had approved the request. It is important that the hierarchy in the organizational setting is followed. Thus, Harry should have ascertained as to whether it was Luther that had referred Tom. After ascertaining that the initiative was undertaken without the knowledge of the immediate supervisor, Harry should have referred Tom back to Luther. Likewise, Harry should have consulted Luther before affirming Tom’s leave. He should have solicited the views of Luther on the matter and relegated the departmental decision-making processes to the departmental head. Since Luther was the departmental head, he was solely responsible for the decisions made within his department. Harry’s actions jeopardized his authority in the department. Harry should have made it clear to Tom that any information that originates from the department was to be passed on by none other than the departmental head Luther. He should have indicated that since the Luther was around and active, he should have been consulted instead which would pre-empt confusion in decision making.  [“Write my essay for me?” Get help here.]

Who was at fault? Harry or Tom?
Both Harry and Tom were at fault. Tom knew that his immediate boss was responsible for the decisions that involved the department’s staff. He manipulated Luther’s boss into signing his approval. Instead of heading to Harry, Tom should have indicated why he felt he needed the holiday to Luther. It was then that Luther would decide on whether to consult the higher authority. Tom should not have employed his personal relationships with Harry as a tool to override the decisions of Luther. In turn, Harry was at fault. On receiving the request, he should have immediately notified the department head, Luther. In this way, Luther would have cleared the air on why he cannot allow Tom to take a vacation leave. [Need an essay writing service? Find help here.]

What if Luther confronted Harry and he brushed it off?
Luther should immediately confront Harry. He should indicate politely the reasons as to why Harry’s actions are undermining his authority in the department. In case Harry brushes this off by saying that he was only helping, then Luther should approach Harry’s superior with the problem. He should indicate to the superior why it is that he feels his authority is being undermined. He should also institute a meeting in his department which will address the hierarchical system and the need to respect this form of authority. Luther should reinforce why he needs to be the one to make decisions on behalf of the department. He should further encourage the employees in the department to forward their challenges. Likewise, he should advocate for a collective strategy of mitigating the challenges. [Click Essay Writer to order your essay]

Effective Management Structures in Small Business Organizations
An effective management structure provides for a significant component of an organizational structure. Most small companies grow but the inability to establish a succinct management structure greatly curtails their progress. This is because an effective management structure is a vital part of the productive activities. Essentially, a management structure determines the flow of authority in the organization. It addresses the role of every party and the duties one is supposed to limit themselves to. This serves to pre-empt instances of confusion and overlapping which result when the management structure is ineffective. The absence of an effective management structure results in confusion, usurping and insubordination. For instance, Tom’s case comprises an act of insubordination. He deliberately overlooks the authority of his immediate superior. This was disrespectful. Still, an ineffective management structure results in poor decision making. Many times, in a business scenario, which is made up of an ineffective management structure, the involved members do not consult each other. Every individual acts in his accordance. This leads to poor decision making in the organization(Gold, Malhotra, & Segars, 2001). Successful organizations encourage a collective decision-making process. This enhances the openness of the decisions made. It further allows for the review of each and every decision. This makes the decisions made in such a management system highly effective.
To avoid an ineffective management structure in the organizational system, every staff member should be informed and educated on the subject organization’s management structure. In this way, each one of the individuals will be aware of their roles in the institution (Gold, Malhotra, & Segars, 2001). It will further prevail on the mode of communication that the staff members accord each other within the organization. Likewise, it is necessary to introduce disciplinary measures which will be meted out against any individual who breaches the management structure’s dynamics. Therefore, should an individual decide to overlook their superior in the hierarchical system, they should be subjected to a disciplinary action such as dismissal or fine. This will discourage the occurrences of deliberate insubordination such as was the case with Tom. Lastly, there is a need for the creation of open forums through which employees can consult each other and forward the challenges in their departments. This enhances the relations between the staff and the managerial bodies of the subject institutions.

Gold, A., Malhotra, A., & Segars, A. H. (2001). Knowledge Management: An OrganizationalCapabilities Perspective. Journal of Management Information Systems, 18(1), 185-214.


Sample by My Essay Writer

Upon the evaluation of the “Spider Informative Speech” and the “Stress Informative Speech,” there is a clear difference in the two videos. The first one relies on visual aid and uses slides and audio enhancement technology to reach the audience. The other one only uses captions and a presenter that relies on her notes to communicate with the audience. The effectiveness of these two videos will vary based on the setting.[“Write my essay for me?” Get help here.]

I consider the Spider Informative Speech to be more effective because it provides people with a picture of what the presenter says. For instance, the different slides provide the audience with additional information on the species of spiders found in Florida. A topic such as spiders requires people to use a visual aid to help in identifying what the presenter means. On the other hand, the second video has no visual aid but the use of captions. That means that the captions can only be useful the persons who watch the speech from a screen. The audience will be forced to listen to the presenter’s points. Having to keep up with her speech could prove an issue to some people, and that means the chances of miscommunication could be equally high. In addition, the Spider Informative Speech could use audio enhancement to ensure the audience can get quality sound. That makes it suitable for large audiences even when the rooms are large. The first speaker has excellent presentation skills since she manages to keep up with the slides. The only issue is when she leaves the music play for longer than is needed at the beginning of the video.

The use of slides is always considered effective when a presenter would like to keep the audiences engaged for a long. Therefore, the audience from the Informative Spider Speech is likely to access information easily as compared to the Stress Informative Speech. If I were to make part of the audience in both videos, I would find the one on spiders to be more interesting.

Response 1
The Stress Informative Speech is delivered by an excellent presented who relies on good content as well as real life examples. I would consider her presentation skills to be very effective but then her limitation arises from the lack of presentation equipment. If she were to use slides then she would have made a greater impact. In addition, she maintains a single position during the presentation and that would make some parts of the audience consider her boring. If she were to move around then that would easily compensate for lack of presentation equipment. In addition, she could have also used variation in tones to set the mood of the audience from time to time. Doing this would have made the presentation lively. However, she still managed to do a good job in delivering a presentation with a clear flow of points. [Click Essay Writer to order your essay]

Response 2
Even though the spider informative speech was better while comparing the two presentations, I still think there are some factors that would have made it better. First, the presenter should have organized herself better at the beginning by ensuring the audio and presentations are complementary. The sound was clearly in conflict with the presentation, and that could easily make the audience form a negative perception of the speaker and presentation. The first impression is always important in determining whether the audience will be attentive during the presentation. Another notable difference between the two videos is that the one on spiders uses very little to no real life experiences. The second one, on the other hand, uses many real life examples that help the audience in relating to the topic. I would also like to add that while both presentations are good, they would suit different audiences. The Spider speech would be suitable for a class setting in which student are expected to take notes. The second one could suit both a class and social meeting in which people are expected to make presentations. [Need an essay writing service? Find help here.]

Eastman, A. (Director). (2013). Spider Informative Speech. Good attention getter. [Motion Picture]. Retrieved September 24, 2016,

Speaking, R. P. (Director). (2010). Stress Informative Speech (with captions) [Motion Picture]. Retrieved September 24, 2016,