Some simple adjectives I would use to describe myself in a work environment include hard-working, dedicated, resilient, driven, and detail-oriented. I often give careful consideration to tasks-at-hand and prefer to weigh the merits of different approaches before presenting my conclusions and solutions. Similarly, in my personal life I am conscious of my actions and their greater effect on those around me.
I consider myself to be a moderately spiritual and religious person. I believe in God. I am a Roman Catholic and try to follow the teachings of the Church. My belief is a personal choice, and I use it as a moral guid...
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... Since the US-alliance withdraw its military troops from Afghanistan by the end of 2014, there is an increasing concern that China will fill the power vacuum in Afghanistan as more than 70 percent of oils is imported from the Middle East and Africa . Thus, India views Afghanistan in the context of rivalry with China due to Afghanistan's substantial economic potentials and its buffer state status. At the same time, Nopen claims that China also sees 'Afghanistan as a pawn in its rivalry with India, completing a series of alliance with Pakistan, Sri Lanka and Bangladesh' as both China and India are heavily dependent on energy supplies and resources from other states as the world's major ener... [tags: china, diplomatic power]
1931 words (5.5 pages)
- The insistent cadence of the telephone on the bedside cabinet had a certain sense of urgency to it. Stacey stirred from the warmth and comfort of her bed, switched on the bedside lamp, and glanced at the alarm clock. The time was five minutes to six. It was still dark outside. Sleepily, she picked up the receiver and spoke into the mouthpiece. 'Yes?' It was the Langley switchboard instructing her to get to Headquarters. Director Helms wished to see her as soon as possible. She replied in the affirmative and replaced the receiver.... [tags: Drugs, Mystery]
1283 words (3.7 pages)
- Are the days of the insurance agent coming to an end. There is no hiding the fact that consumers today have moved from the conventional brick and mortar shopping to online shopping. This goes the same for the insurance industry, and insurance companies have taken notice. Insurance companies have created their own websites, where consumers can compare prices with competition for different types of insurance. “Where agents once served as the front line in risk selection and pricing, advances in predictive models are making this role obsolete.... [tags: Insurance, Business, Want, Agent]
1015 words (2.9 pages)
- Diplomatic Failures Arthur Schlesinger Jr., Special Assistant to President Kennedy, was close to the Kennedy family and upheld President Kennedy as being shrewd and omniscient during the crisis. Schlesinger, in an April 1999 foreword to Thirteen Days, states that Soviet Premier Nikita Khrushchev had “played into Kennedy’s hands” (10) and that President Kennedy was a “remarkably cool, thoughtful, nonhysterical, self-possessed leader” (13). President Kennedy did not have control over to the crisis extent that Schlesinger implies he had as he failed to gain respect from Khrushchev and accepted an agreement that he had no intention of fulfilling.... [tags: Cold War, Cuban Missile Crisis, Nikita Khrushchev]
834 words (2.4 pages)
- The Agent Orange was one of the most used and common herbicides and defoliants which is chemical the United States Military used in the Vietnam War from 1961 through 1971. "It was a 50/50 mixture of two herbicides: 2,4-D and 2,4,5-T. It remained toxic for only days or weeks and then degraded, but it had a toxic contaminant, dioxin, that did not degrade as readily and is still causing health problems in Vietnam." (What is Agent Orange). They used this chemical to try to kill people over in Vietnam by spraying it on their fields, vegetation, and trees.... [tags: Agent Orange, Vietnam War]
1409 words (4 pages)
- Cyber security, also known as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. Most aspects of our lives rely on the Internet and computers, including communications (e-mail, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth or death records, social security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research).... [tags: Computer security, Information security, Computer]
1059 words (3 pages)
- Currently, individuals with mental and physical disabilities ever more add to varied populations at higher education institutions. In 1978, the amount of full-time freshmen with disabilities was 2.6 percent, but as of 1998, the amount of individuals with disabilities has risen to 9 percent. The fastest growing and most common classification of disability, learning disability, was reported by freshmen was 41 percent in 1998 (Education Encyclopedia, 2010). Institutions of higher education acknowledge that a considerable portion of the students may experience difficulties that meet the criteria as learning disabilities, and the collection of collaboration services recommended to such individual... [tags: Special Education]
799 words (2.3 pages)
- Physical Security Physical security could be thought of as a very important piece of security. Just because you apply many different policies to have a lockdown on the software environment, it doesn’t mean that people are not able to just go in and inflict damage upon your network. Physical security is the measures to prevent or deter attackers from trying to gain access into the facility. With FTD Enterprises they have none to barely any physical security in place. The most security that they have is a locked door, which is also seen to be open during the night.... [tags: Security]
662 words (1.9 pages)
- Joseph Conrad's The Secret Agent: A Critique of Late-Victorian Gender Roles February 15, 1894, was the most interesting afternoon in the otherwise dreary history of Greenwich Observatory. Earlier in the day, Martial Bourdin, a skinny anarchist, traveled by train from Westminster to Greenwich, concealing a small bomb. As he ominously ambled through Greenwich Park, towards the Observatory, something happened - no one knows exactly what - and he blew most of himself to shreds. The British, who loved to quantify in the late nineteenth century, noted that the explosion spread bits of flesh over a distance of sixty yards.... [tags: Joseph Conrad The Secret Agent]
4961 words (14.2 pages)
- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks.... [tags: Cyber-security, Enterprise Security]
3468 words (9.9 pages)