Tuesday, December 24, 2019

Evaluate the Working Memory Model - 1310 Words

Evaluate the Working Memory Introduction Human memory is a complex cognitive structure, which can be defined in many ways. One would argue that memory is 1.) The mental function of retaining information about stimuli, event, images, ideas, etc. after the original stimuli is no longer present. 2.) The hypothesized storage system in the mind that holds this information is so retained. A clear distinction is made between different types of memory systems and can be divided into subclasses. The first model of the human memory was proposed by Atkinson and Shiffrin in 1968. They introduced two different memory systems first, named after their capacity: Short Term Memory and Long Term Memory. Soon after they added a third memory store and†¦show more content†¦His study on word length effect comprised that participants had to read out as many words as they could than recall it. On the other hand the visuo-spatial sketchpad displays visulal and spatial information. All three elements has limited capacity, therfore if two tasks are from the same elements - like reading a paper and trying to have a conversation at the same time Ââ€" (phonological loop) are used they cannot be carried out properly. But if the tasks are form different elements it could be performed together. The forth element is the episodic buffer that again controlled by the central executive; holds a combination of different information from the phonological loop, the visuo-spatial sketchpad and the Long Term Memory. Disease in the Working Memory Store Working memory has been significant in mental work, and thinking. Baddeley (1996) carried out an experiment on patients with Alzheimer disease, as his suggestions included that aging and distributing information has a huge role in the central executive. His participants were given numerous digit-span trials, numbers as digits, and were asked to put a cross in each of the boxes positioned in an irregular pattern (dual task). Patients with Alzheimer disease proved a noticeable reduction in the mixed condition, but none in the normal tasks. M. C. McDonald (1998) suggested using different tasks and different materials in her study on individuals with Alzheimer disease. her patients had to undergoShow MoreRelatedOutline and Evaluate the Working Memory Model1210 Words   |  5 Pagespicture of short-term memory (STM) provided by the Multi-Store Model was far too simple. Following the Multi-Store Model, it is believed that STM holds limited amounts of information for short periods of time with relatively little processing, it is believed to be a unitary store. This means that due to its single store it has no subsystems, unlike the Working Memory Model which has many subsystems. This proves that the Working Memory is not a unitary store. Working Memory is STM. In contrast toRead MoreModels Of Theories Of Memory1235 Words   |  5 PagesEvaluate two models of theories of memory. This essay will evaluate two models of theories of memory. Memory can be defined as the persistence of learning over time via the encoding, storage, and retrieval of information. Encoding is the process of categorizing incoming information through conscious effortful processing, rehearsal, or unconscious automatic processing. The storage process involves the retention of encoded information over time. Lastly, retrieval is the process of getting informationRead MoreEvaluate two models of one cognitive process1042 Words   |  5 Pagesï » ¿Cecilia Nguyen Evaluate two models of one cognitive process This essay will be discussing one particular cognitive process: the memory by evaluating two models, which are the Multi store model introduced by Atkinson and Shiffrin in 1968 and the Working memory model by Baddeley and Hitch in 1974. The first model is the multi store model. It was first proposed by Atkinson and Shiffrin in 1968 and is a typical example of the information-processing approach. AccordingRead MoreHuman Drug Screening For Memory856 Words   |  4 Pagesefficacy studies, which will be in three well-established and well-accepted mouse models for memory storage. These three tests capture various forms of memory (working memory, object recognition memory and fear memory) in mice and have translational validity for human drug screening for memory disorders. Based on the published data from our lab and others (Ref) our working hypothesis is that positive compounds will enhance memory storage. The following preliminary results support the feasibility of thisRead MoreEssay about Mulit-Store Model of Memory vs. Working Memory Model1101 Words   |  5 Pagescontrast the multi-store model of memory with the working memory model. This essay will firstly briefly describe the theories and important facts about the original multi-store model of memory (MSM) and the working memory model (WMM). This essay will then evaluate the key studies within these two models and explain the strengths and weaknesses of the main theories. The final part of this essay will be to examine the similarities and differences between the two models. The first issue that needsRead MoreThe Verbal Comprehension Index Measures The Ee107’S Ability1016 Words   |  5 PagesComprehension is a weakness for EE107, meaning that she may difficulty understanding oral language and expressing herself through words. The Visual Spatial Index measures the EE107’s ability to evaluate visual details and to understand visual-spatial relationships to construct geometric designs from a model. It is composed of the Block Design and Visual Puzzles subtests. On Block Design, EE107 viewed designs and used blocks to recreate each design. EE107 could correctly copy simple designs, but sheRead MoreEssay about Evaluation of Two Models Of Memory1413 Words   |  6 PagesTwo Models Of Memory In this essay 2 models of memory will be described and compared. They are the Atkinson and Sniffrin model of memory, the Multistore model, and Crain and Lockhart model, the Levels of Processing Model. Models of memory are primitive diagrams of human memory to help understand the flow of information and how it is stored. In order to evaluate those 2 models appropriately it is important to understand how old they are. The Multistore Model of MemoryRead MoreQuestions On The Ethical Tension1415 Words   |  6 Pagesleft to deal with this medical malfunction on her own. Since the surgery, Donna has been diagnosed with post traumatic stress disorder (PTSD). It has changed her life in many ways. She has had to leave her job. She has been experiencing short term memory loss, concentration problems and nightmares. Donna has become a public speaker on educating people about anesthesia awareness. Her story is the basis for constructing this report for registered nurses, a framework on how to work through this typeRead MoreMemories Of The Gulf War Syndrome1619 Words   |  7 Pages9 MEMORY LOSS IN GULF WAR SYNDROME Katherine Krishun What Causes Memory Loss in Gulf War Syndrome? Chemical Exposure or Stress? PSY 101/112 10/24/2016 ​Gulf War Syndrome is a chronic multi symptom illness affecting 250,000 of the 697,000 1991 Desert Storm Gulf War veterans. Iraq and Afghanistan war veterans may also suffer from this syndrome. The Veterans Administration â€Å"refers to these illnesses as â€Å"chronic multi symptom illness† and â€Å"undiagnosed illnesses†Read MoreLearning Disabilities Are The Most Predominant Type Of Disability962 Words   |  4 Pagesformative assessment to drive instruction and analyzing the outcome data to further assist the child. If a child is not performing at the same level as their classmates they may be evaluated for special education services. A multidisciplinary team must evaluate the student to see if they have one or more academic skill deficits compared to their peers, if the student is not make sufficient progress with the interventions that are currently in place, and if the student’s learning disability isn’t the result

Monday, December 16, 2019

Broken window concept Free Essays

The â€Å"broken window† concept is among the most popular frameworks, designed for better understanding of the nature of crime and its prevention. George Kelling was the first criminologist, who suggested that even tiny problems are visible – for instance, a broken window points to the house owner’s ignorance and indifference. The paper is intended to discuss the concept and its application in details. We will write a custom essay sample on Broken window concept or any similar topic only for you Order Now â€Å"The essence of â€Å"broken windows† is that neighborhood disorder –physical decay, such as graffiti, litter and dilapidation; and minor misconduct, such as public drinking and vagrancy – will, if left unchecked, signal potential miscreants that no one is watching† (Miller, 2001, p. 27). This means, grave crimes begin with minor misdemeanors, and notorious criminals like serial killers often ‘begin with’ drug or alcohol abuse, which grow into social pathology, constantly reinforced by the conviction in the overall permissiveness (Miller, 2001). Conversely, when eliminating the traces of minor misconducts like litter and graffiti in public places, the visitors become more conscientious about the overall public safety in this place. At first, the concept was applied in subways: Bratton, who received a piece of â€Å"broken window† advice from Kelling and subsequently wrote: â€Å"Fare evasion was the biggest broken window in the transit system. We were going to fix that window and see that it didn’t get broken again† (Miller, 2001, p. 28). Thus, the group increased the number of policemen, supposed to detect the stowaway passengers – as a result, they found that a number of these ‘wrongdoers’ carried illegal arms and some of them had light drugs like marijuana. Finally, the subway became much cleaner and safer, as the number of combats and conflicts substantially decreased. Later, Mr. Bretton was hired as New York police commissioner, assigned to struggle with street prostitution. Violent and aggressive behavior and public drinking. The executive of the law enforcement agency introduced new computerized systems of surveillance in public places and increased the staff of the agency –as a result, the number of felony crimes fell beyond the expected decrease of the aforementioned misdemeanors (Miller, 2001). On the other hand, the causes of crime are still vague, as a complex of factors contribute. Most studies, however, empirically confirmed the â€Å"broken window† idea. For instance, Skogan conducted document analysis and scrutinized the earlier surveys in more than 40 localities. â€Å"He found that measures of social and physical decay correlated with certain kinds of serious crimes† (Miller, 2001, p. 28). On the other hand, new obstacles to policing emerged. As Kelling notes (1999), proactive approach to policing (prevention of crimes through putting the â€Å"broken window† concept into practice) is nowadays viewed by public as â€Å"soft policing†. On the other hand , â€Å"Community policing is inherently proactive: scan for problems; diagnose them; try to prevent them from occurring again; if they recur, try to limit the damage and restore the victim/family/community’s functioning† (Kelling, 1999, p. 10). This means, community policing often involves much more efforts than â€Å"crime fighting†, as in this case the commissioner or the police officer acts as an strategic analyst, supposed to have the ability to anticipate problems. Kelling’s approach to policing inherently includes regular interviews with community members, which means, police officers should keep in touch with the residents in order to identify the discuss the problems the community members are concerned about. In addition, the functioning of the whole law enforcement apparatus should be more transparent for community members, i. e. they should have an opportunity to learn the reasons for their neighbor’s arrest, for instance, as this measure is likely to act as a deterrent for others and a reminder about the policy’s care about public safety. On the other hand, a number of critics expressed their fear of the possible tendency for the expansion of the â€Å"soft policing† and the substantial elimination of reactive and radical measures. In this sense, Kelling alleges: â€Å" The fact that police add options to their repertoire of methods, try to limit damage and restore functioning does not mean that conventional assertive law enforcement is disallowed as a legitimate police tactic. For example, understanding the dynamics of New York City’s â€Å"squeegee men† –unwanted car window washers who intimidate drivers into giving them money – and talking to them did nothing to deter their behavior† (Kelling, 1999, p. 11). Nevertheless, as one can understand, civil law can be used by the police – as Kelling states, the new initiatives including such penalties like forfeiture, restitution and civil fines are placed upon those committing domestic violence, illegal weapons possession or disclose aggressive racist behavior. This means, a punishment should refer to the least possible intervention into the person’s life: for instance, if a criminal is not aggressive or dangerous and hasn’t committed grave crime, arrest is likely to appear a redundant measure. To sum up, the ‘broken window’ approach to policing refers not merely to the elimination of minor crimes, but also to the overall prevention of deviance and more extensive use of civil liberties in the issues like discretion. In general, Kerlling’s position is positivistic, as he views individuals as basically disciplined and law-abiding, but in order to increase public awareness in the importance of citizens’ own efforts in the sphere of public safety, it is important to show them that the police are sensitive and responsive even to the minor misconducts. Reference list Miller, D. (2001). Poking Holes in the Theory of ‘Broken Window’. Chronicle of Higher Education, 2: 27-34. Kelling, G. (1999). â€Å"Broken Windows† and Police Discretion. National Institute of Justice Research Report. Available online at: http://www. ncjrs. org/pdffiles1/nij/178259. pdf How to cite Broken window concept, Papers

Sunday, December 8, 2019

Social Networking for Organizations

Question: Discuss about the Social Networking for Organizations. Answer: Introduction: Social Networking is a part of life for todays youth population. They like to share the happenings in their life through online medium. Seldom, they are unable to distinguish between the professional and personal life and end up sharing some critical piece of information online, that they are ideally not supposed to share. This is a huge issue for the company as the shared information can tarnish the image of the company and can also lead to monetary loss. The argument chosen for this essay is the companies have all the rights to access to the social networking pages of their employee just to ensure that the employee is not sharing any information that is not appropriate to be shared. The discussion will be throughout in support of this argument only. The ethical dilemma here is that the employee is not wrong when he/she says that the social networking platform is their own personal space and they have all the rights to mention whatever they feel is appropriate. On the other hand, the company is also correct that the details of the company are very confidential and should not be shared with the outside world, some of the details may carry some sensitive data that can actually spill out the USP of the company and unnecessary creates a ruckus in the market overall. Hence, in some context going by the deontological principle of ethics it can be well hypothesized that the point raised by the company is not wrong overall. The employee is working for the company and as per the ethics of duty, he should not be doing any such act that gives a wrong impression about the company and also there should not be any interpretation shown by an employee on the social platform that gives competitor any kind of advantage(lacewing, 2012). The persona l space does exist but it is something that is related to personal life and professional life should not be fixed with it. This simple logic explains the ethical dilemma. The utilitarian concept speaks that the ethical decision must be such that it brings in maximum harmony and minimum entropy in the system. By this principle the logic is all more mixed and ambivalent. The harmony is not achieved if both go by their happiness quotient and also going by the quotient of making other party happy is also not the solution, since it will develop more entropy at one end by unable to meet the final objective. Ultimately employee feels that their personal space must not be touched and the company feels that the personal space should not interfere with the companys health and hence it becomes all more relevant to maintain a check over the employees activities. If the utilitarian ethics are to be practices then both party must do what they feel is right and the other party must not get impact by the action as well(Eggleston, 2012). Under that situation, it is best if the employee maintains a private profile for the social networking account and hence share their thoughts and point of views with only close friends and known to and not with the people who may take some unnecessary advantage of the information shared. This way the ethical dilemma is sorted. The concept of stakeholder says that there are people who are linked with the company directly or indirectly. There is some kind of effect that is seen on stakeholders as the company booms or as it dooms and hence the analysis of the stakeholders is very critical and need to be taken care with immense priority. The stakeholders are the one who decides the subsequent health of the company beyond a certain point. The market reactions, the share prices and the investors decision is all decided by the stakeholders of the company and hence the stakeholders are the most important indicator of the health of the company and they more or less decide over the past, present and future of the company and how the company will be seen in the upcoming future(Jemilo, 2010). Going by the context of social networking, the stakeholders are seldom easy to identify and sometimes it is almost impossible to identify them, and if the information is shared loosely by an employee that is an indicator of companys health then this thing can become very devastating for the company and this is the very reason why company wishes to maintain a track of the activities of the employees. There are multiple internal dynamics that runs in the company. Some of which is permanent and important in nature and some is very futile and extremely temporary in nature. These are internal and crucial for the company as any information can goes in the market in a negative manner and hence make the entire market perception negative about the company. This can lead to huge repercussions like Share Price Crash, Delay in merger and delay in investment by stakeholders and things like that. This is a very critical and important dynamic that is very sensitive for the company and they cannot risk it at all. Hence, it becomes imperative for the company to ensure that there is no leak point that is there in the system from where the information can go out. One of the potential point is the social networking sites used by the employees and hence in order to play safe it is seldom okay to keep a track of that(Annansingh, 2010). There may be some ethical considerations that may be showcased by a few proponents, but it is ultimately the companys perpetuity that matters here and the company is trying to safeguard that. No company is nagging about other issues, it is just those issues that are relevant for the company and hence there is no explanation that the companies owes to anyone. Rightness of Employees to check the Social Networking Pages of Their Employees: The younger generation is the generation which has seen freedom in every aspect and are not bounded by any kind of constraint, they are groomed to live life on their own terms and going by the psychology of the generation, they dont like to be guided by anyone and they can work only in complete freedom environment. This is why there is a huge difference in the working style for this generation than the previous generation. They are more vocal and upfront towards anything they find appropriate or inappropriate. The underlying concept is that this change has led to some innovative changes in the system and the concept like Company Rating and Work from Home are a result of these changes only(Pickens, 2010). However, there is a limit to everything and the same principle is applicable here as well. The workmanship is more to do with the commitment toward the work and in both the generation the commitment towards the work has remained the same. There is a higher affinity of the previous generation towards the company, which the generation today is not that committed towards. They are more concerned with the work and they are committed to whatever they are doing as a part of work. There is no correlation between the work freedom and work commitment. The same is said about the fact that the productivity has increased over time as there are smarter ways of working that have come up in the recent times(Tolbize, 2008). The workmanship has been up for those who wants to work all the time and not want to waste their time. The information sharing is any day not a correct thing to do both by ethical principle and by stakeholder theory. The information is seldom the business critical information and can also be some kind of trade secret of the company and that is bound to be protected and as a core stakeholder of the company it is the duty of the people to safeguard that. Even though it could be their own opinion of the company but it has to be thoroughly checked and even then there is a close group where it should be shared in an undocumented and unavailable manner. Sharing the data that is visible to all is not a good thing to do and it can lead to strict actions by the company against the employees. It should be made clear during the induction program as well that the social pages of the people will be checked and if they wish to stop the people from viewing their pages then they must maintain them in private mode so that an outsider could not come and view the thoughts. The thoughts are meant to be shared with a close group and even then there are some critical information that should not be shared with the people in any case(CCCI, 2012). There should be a limited access that should be allowed to the companies and that will ensure that the degree of information sharing is not surpassing the tolerant requirement of the company. The information or any thought against the culture should not be made public by the employee may be directly or indirectly. Employer has a lot of stakeholders to give answers to and moreover employer is the one who is giving job opportunity and money to the employer. The employer must maintain the decorum and in case there are any concern which he or she has against the company the same must be brought in front of the employer directly and not through some random internet page that is accessible to everyone. The employer if they are maintaining a check around the online activities is not to intrude the private life of the employee and anyhow if the page is open for public then the employer can be stray visitor as well and in that context if they find something not suitable for public sharing then the same may be brought in front of the employee directly for clarification. One of the solution is already shared that encourages company to ensure that they have shared the code of conduct check list already to the employees. This is to ensure that the employee agrees to the fact they will not share any company specific information around the culture, financial, marketing, clients etc. with anyone online or offline. There must be a disciplinary guidelines that must be set in place to ensure that the people are well aware of the repercussion and post that also if the employee is sharing some inappropriate content with the mass public over the internet, then the employer will have all right to take the disciplinary action against the defaulter. Through Strategic HRM, the employees are treated as the owner of the company, the leader which must have some vision for the company and should work for the progression and health of the company. With this thought in mind if the HRM is done at a strategic level that there is a strong correlation and bond that exist between the Human Resource Management Department and the Employees then there are lesser chances for people writing negative things about the company online, rather they might end up writing positive things about them and that turns the situation in their favor overall(Hayes, 2011). Through strategic HRM the situation and environment is maintained between the employer and the employee that employee feels that it is his responsibility to ensure that the image of the company is not tarnished. It is viewed as a fact that instead his own image is at stake if he writes anything wrong about the company due to the strategic partnership that is established between them, which is overall a very positive inclusion program by the company and that can ensure that the relational bond will ensure the positivity to prevail in the social environment overall. The partnership can be established other ways also. The psychological contract can be established between the Company and the employee and that can be done through the strategic initiatives by the HR people. The employees can be made to realize that the company takes a lot of pain for them and also thinks about their progression and growth. The bond will not be formed just by murmuring words and not actually doing things. The onus has to be taken for the wholesome growth of the company. Taking care of the things that the employee is trying to achieve through the work done by them and hence making a system such that the people are able to realize the important role that the company is playing in their life and that leads to the formation of the needed psychological contract. It is not a simple thing and can actually lead to a whole lot of benefits for the employees and the employer in their social life as well. If the people feel in psychological contract with the people at large then through every medium there is a chance that their s ocial presence will be positive and hence lead to the gateway for development of the employer and employees image in the online environment. The Human Capital Management is more towards investment on the people so that they remain loyal to the company. A mode of strategizing the aspiration of the employee with the goals and vision of the company and ensure that the people are seen as a capital investment by the company and hence some returns will be gained from them in the form of loyalty and productivity, which otherwise just by plain vocal praises is very hard to achieve. The Human Capital Management also entails the rewards and recognition program by the company and if that is managed well there is by all means the loyalty is established strongly and will ensure that the online life of the employee will showcase that. It is the most potent way of ensuring that the people dont write anything negative about the company by being double sure that there is nothing negative to write overall. The aspirations and commitment and respected and in due of course of time people are given the authority to build their career the way they want to and that is something which will always fetch some superlative results for the company. The win win situation achieved by this strategy is pretty good as it will ensure that people are genuinely happy and hence they will take care of the companys image. Conclusion The Knowledge Management is the respect for the people for the work that they have done. The management of that is done through the knowledge repository that is maintained by the company. The company can also use the online portals like LinkedIn and share the work done by the employee to the world by tagging them appropriately and ensuring that it will struck the right connect with the people. People will surely add value to the work if they see appropriate returns and if that is guaranteed then there is no way results will not be promising for both the parties. It is one of the latest mode of building the trust and connect and it seems to be working well with the latest generation and that will also establish the case of win win situation online. References: Annansingh, F. (2010). Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach . Plymouth: Plymouth University . CCCI. (2012). The Risky Business of Information Sharing. London: CCCI Publications. Eggleston, B. (2012). Utilitarianism. Kansas: Elsevier Inc. Hayes, M. (2011). Startegic Human Resource Manangement. New Delhi: SodhGanga Publications. Jemilo, D. (2010). The Stakeholder Management Framework. New York: Scaled Agile, Inc. lacewing, M. (2012). Kants deontological ethics. London: Routledge. Pickens, J. (2010). Attitude and Perception. Paris: Health Admin Publications. Tolbize, A. (2008). Generational differences in the workplace. Minnesota: Univeristy of Minnesota.

Sunday, December 1, 2019

Internet Censorship Essays (3424 words) - Content-control Software

Internet Censorship The Internet is a wonderful place of entertainment and education but like all places used by millions of people, it has some murky corners people would prefer children not to explore. In the physical world society as a whole conspires to protect children, but there are no social or physical constraints to Internet surfing. The Internet Censorship Bill of 1995, also known as the Exon/Coats Communications Decency Act, has been introduced in the U.S. Congress. It would make it a criminal offense to make available to children anything that is indecent, or to send anything indecent with "intent to annoy, abuse, threaten, or harass" ("Stop the Communications ..." n.p.). The goal of this bill as written(though not as stated by its proponents) is to try to make all public discourse on the Internet suitable for young children. The issue of whether is it necessary to have censorship on the Internet is being argued all over the world. There are numerous homepages on the World Wide Web discussing this issue, or asking people to sign the petition to stop government censorship. The Internet was originally a place for people to freely express their ideas worldwide. It is also one of America's most valuable types of technology; scientists use email for quick and easy communication. They post their current scientific discoveries on the Usenet newsgroups so other scientists in the same field of study all over the world can know in minutes. Ordinary people use the Net for communication, expressing their opinions in the newsgroups, obtaining up-to-date information from the WWW, acquiring files by using FTP, etc. Censorship would damage the atmosphere of the freedom to express ideas on the Internet; therefore, government should not encourage censorship. In the Internet community, there is a large volume of technical terms. For this reason, it is first necessary to examine the terminology specific to Internet. The Internet is a world wide computer network. The "Net" is frequently used in place of Internet. In the words of Allison and Baxter, two experts on Internet Censorship at the Monash University, "the Internet is comprised of various digital media subsuming many of the distinct roles of traditional media" (Allison and Baxter 3). Electronic mail (email), which is one component of the Internet, approximates person to person letters, memoranda, notes and even phone calls. Sound and pictures are sometimes sent along with text. Email is mainly for private communication. Electronic mailing lists are rather like club newsletters and readers have to contract-in or subscribe to a list. Another term that is often used is electronic news (enews/Usenet), enews is a broadcast, free to the Internet medium. It has some properties of radio or television, particularly talk-back radio or television, in that the destination is indiscriminate. The term FTP is also frequently used. File transfer protocol (FTP) started as an Internet archival and retrieval medium, somewhat analogous to traditional libraries. Files can be retrieved from distant computers using a traditional text-based interface. The world-wide web (WWW), which is another component of the Net, can be used to "publish" material that would traditionally appear in journals, magazines, posters, books, television and even on film. The term UNIX, "a widely heard computer term, is a multi-user, multitasking operating system originally developed by Ken Thompson and Dennis Ritchie, at AT&T Bell Laboratories, in 1969 for use on minicomputers" ("UNIX" n.p.). To understand the background of the controversy, it is also necessary to give a brief history on the Internet. The Internet was created about twenty years ago in an attempt to connect a U.S. Defense Department network called the ARPAnet and various other radio and satellite networks. The ARPAnet was an experimental network designed to support military research; in particular, research about how to build networks that could withstand partial outages (such as bomb attacks) and still function. At about the same time the Internet was coming into being, Ethernet local area networks ("LANs") were developed. Most of these workstations came with Berkeley UNIX, which included IP (Internet Protocol) networking software. This created a new demand: rather than connecting to a single large timesharing computer per site, organizations wanted to connect the ARPAnet to their entire local network. The demand keeps growing today. Now that most four-year colleges are connected to the Net, people are trying to get secondary and primary schools connected. People who have graduated from college where they have used the resources of the Net in classes, know what the Internet is good for, and talk their employers into connecting different corporations. All this activity points to continued growth, networking problems to