Thursday, January 30, 2020

Chain of Command Essay Example for Free

Chain of Command Essay The main focus of Article II of the United States Constitution is the executive branch and the role that it plays in the government. By definition an executive is â€Å"a person or group of persons having administrative or supervisory authority in an organization.† The President, who is elected, is the head of the executive branch and the US government’s chain of command. Second in command is the Vice President who must also be elected. Article II is broken down into four sections in the Constitution and outlines who the qualifications to run, the term that a President can hold office, as well as the duties, responsibilities and powers that he has and the grounds for impeachment. Section 1 Section one of Article II outlines the executive power in 7 clauses. Clause 1 and Clause 2 support each other. Clause 1 states that the President of the United States shall hold office for a term of four years with a Vice President who must be elected for the same term and that executive power shall be vested in the President. Clause 2 describes the appointment and qualifications for presidential electors. In Clause 2, it says that each state shall appoint a number of electors equal to the whole number of senators and representative to which the state may be entitled in the congress but no senator or representative that hold office under the United States can be appointed as an elector. This means that each state chooses electors equal to the number of representatives, representing them in congress, but no senators, representatives or federal officers can become an elector. It then goes on to describe the original method of electing the president and vice president. Originally, an elector would cast two votes for the president, one at least one vote had to be from a state different than the elector’s and who ever had the majority of votes became the president and the vice president would be the runner up. If there was no person who received the majority of votes the House of Representatives could have chosen one of the five with the greatest number of votes. If there was a tie, the House of Representatives could have chosen one of the candidates. When the House would vote, each state representative would cast one vote, and a quorum of two-thirds applied in both houses. One member from two thirds of the States, and a member from two thirds of the states and a majority of all the states were necessary to choose a President. If two or more candidates tied, the senate broke the tie. This was superseded by the twelfth amendment which made some significant changes. Now, electors cast one vote for president and one for vice president rather than two votes for president. If there is a case where no presidential candidate receives the majority, the house chooses from the top three instead of the top five. In addition, the amendment requires the senate to choose the vice president from the candidates with the two highest figures if no vice president candidate receives the majority of electoral votes. The twelfth amendment also specifies that to be vice president, a candidate must also qualify to be President. Clause 3 states that congress may determine the time of choosing the electors and the day for casting their votes. Clause 4 states the qualifications for the office of the president. According to the clause, the president and vice president must be at least 35 years old, both must be a natural born citizen of the United States, and both must have been a U.S. resident for 14 years. The twelfth amendment required the vice president to meet all the qualifications of an eligible president and the twenty-second amendment prevents a president from being elected more than twice. The 5th clause states that in the case of removal of the president from office, or his death, resignation, or inability to discharge the powers and duties of office, the vice president shall assume his duties. In the case that both the president and vice president were removed, resigned, deceased, on unable, then congress, by law would declare which officer would act as president until the removal, death, resignation, inability were to occur or a president was elected. This caused much controversy when President William Harrison died in office. A debate occurred on whether vice president John Tyler would become president, or just be the acting president. Tyler felt like he had a right to become president, and eventually took the Oath of Office, while set the precedent for vice presidents, Millard Fillmore, Andrew Johnson, Chester Arthur, Theodore Roosevelt, Calvin Coolidge, Harry Truman and Lyndon Johnson to ascend to the presidency. Because of this, the Presidential Succession Act was adopted in 1947 which established the line of succession of the office of the presidency in the event that the President or Vice President becomes unable to fill the vacancy. The Presidential Succession Act makes clear that only someone serving as Vice President can ever succeed to the title â€Å"President of the United States† and anyone who takes office under its provisions can only act as President† even if they have to act for 4 years. Clause 6 of Article II states that the President shall be compensated, at stated times for his services. This compensation shall never be increased or diminished during the period he is elected and also during that period, he also shall not receive any other compensation from the United States meaning federal and local government. The Presidents salary is currently $400,000 a year. Clause 7 states that before he enters office, the president shall take the following oath or affirmation: â€Å"I do solemnly swear (or affirm) that I will faithfully execute the office of President of the United States, and will to the best of my ability, preserve, protect and defend the Constitution of the United States.† Section 2 Section 2 of Article II outlines the President’s powers while in office. Clause 1 of Section 2 states that the President shall be commander in chief of the army and the navy of the United States. Although he is the commander in chief, Article One gives Congress the right to declare war, not the President. The President may require the principal officer in each of the executive departments to give their advice in writing. Additionally, the President may grant pardons or reprieves for offenses against the United States, except in cases of impeachment. Clause 2 of Section 2 is also known as the advice and consent clause. The President exercises the powers in the clause with the advice and consent of the senate. The President can enter the U.S. into treaties but they aren’t effective until they are ratified by a two thirds vote in the senate. The President may also appoint judges, ambassadors, consuls, ministers and other officers with the advice and consent of the Senate. However, by law Congress may allow the President, heads of executive departments, or the courts to appoint inferior officials as they see fit. Clause 3 of Section 2 gives the President the power to fill vacancies that may occur during the recess of the senate by granting commission that expire at the end of their next session. Section 3 Section 3 of Article II outlines the Presidents responsibilities while in office. While in office, the President must â€Å"from time to time† give congress information on the State of the Union and recommend to congress’s consideration measures that he judges as â€Å"necessary and expedient.† The President may, in â€Å"extraordinary occasions† call one or both houses into session. If both houses disagree on the time of adjournment, he may adjourn them at a time he thinks is fitting. The President receives all ambassadors and other public ministers. Most importantly, â€Å"he shall take care that the laws be faithfully executed, and shall commission all the officers of the United States.† The President commissions all officers including military and foreign service and although the President has discretion in how and when to enforce laws, he cannot refuse to enforce constitutional law. Section 4 Section 4 of Article II allows impeachment. Section 4 states â€Å"The President, Vice President, and all civil officers of the United States, shall be removed from the office on impeachment for, and conviction of, treason, bribery or other high crimes and misdemeanors. â€Å" The President, Vice President, executive officers as well as judges can all be impeached by the House of Representatives and tried in the Senate. If an official is convicted by impeachment, he is immediately removed from office and remains liable to trial and punishment in court for civil or criminal charges. The trial, if any is separate from the impeachment itself. There have been two U.S. presidents that have been impeached by the House of Representatives, Andrew Johnson and Bill Clinton but they were acquitted at trials that the senate held. The House Judiciary Committee voted on Articles of Impeachment for President Nixon, but he resigned before the full House of Representatives could vote, therefore he was never impeached. Why is Article II important? Article II is important because it establishes the office of the President and the Vice-President, and sets their terms to be four years. It defines the job that the President has to do and the rules that he has to follow. In a sense, it’s his job description and prevents him from overstepping his boundaries. Not only does Article II make the President Commander in Chief, it allows cabinet to aid him, and make treaties with other nations as he sees fit to protect us. It commands him to keep the Union informed about the status of country through the State of the Union address and to most importantly to enforce all laws.

Wednesday, January 22, 2020

The Strengths and Weaknesses of International Law Essay -- Internation

Even after decades of relatively established pattern for the relations between the states there is still an ambiguity on the issue of state sovereignty. To which extent its’ violation could be justified? In the study of International Relations there are two major perspectives on the legitimacy of such actions, they are: liberal and realist. Whilst former advocates for this measures when the state itself violates human rights of the citizens and extended intervention is required (Kegley, 259), latter claims that the state sovereignty is the central assumption of this theoretical framework (Kegley, 28) and the actions that might infringe it are not legitimate. 2011 military intervention in Libya, intended to cease Gaddafi’s regime (UNSC), can demonstrate both of these perspectives. Moreover, it particularly highlights the presence of peacemaking actors’ responsibility to protect the human rights of civilians. Nevertheless, both realist and liberal perspectives incl ude the legitimacy of violation of the state sovereignty and at the same time reveal illegitimacy of this issue. The liberal theory emphasises the importance of non-state actors such as the political institutions, Nongovernmental Organisations (NGOs), Intergovernmental Organisations (IGOs) in world politics decision-making. All of them should act according to the public international law which regulates the government-to-government relationships (Kegley, 400). Thus, when Libyan government started to suppress the riots and demonstrations of civilian population by the military means the international community became cautious about the outcomes of such policies (UNSC). Moreover, when the government failed to respond for the calls to stop the violence, the response of the Un... ...ng of international law’s efficiency. Works Cited Allen, Peter. "France Stops All Italian Trains Carrying North African Immigrants." The Telegraph. 17 Apr. 2011. Web. 28 Apr. 2012. . "Iran Profile." BBC News. BBC, 03 Feb. 2012. Web. 28 Apr. 2012. . Kegley, Charles W., and Gregory A. Raymond. The Global Future: A Brief Introduction to World Politics. 4th ed. Belmont, CA: Wadsworth, 2011. Print. Schenk, Caress. Politics of Global Security: Liberal alternatives. Lecture notes. 17 Apr. 2012. United Nations Security Council. Security Council Report. Rep. United Nations, 8 Nov. 2011. Web. 28 Apr. 2012. .

Tuesday, January 14, 2020

Review the Laws Related to Security and Privacy of Data Essay

Computer Misuse Act 1990  This act was introduced to prevent users hacking. This also stops them entering a computer, programs or files without authorisation, this act is in place to prevent users to use the internet without permission to cause an act of crime and also prevents unauthorised modifications to a computer. This act does not allow any attacks on a server as this is illegal. Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector. Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts. This act also does not allow anyone to use a fraudulent credit card or any other card to make a purchase via the internet. Hackers who overload networks with data to intently disable them can face a prison sentence for up to 10 years. This act makes it illegal for users to upload pornography of someone and children as people will find the offensive, having possession or viewing these types of materials could get the user in to trouble by the law. Users must not use the computer to harass or stalk a particular person, it is also the same when making telephone conversations as the user can not use offensive or threatening language they can face a sixth month imprisonment. This allows the organisation to take action and take back whats rightfully there and also punish the hacker as they are covered by this law, this bring a sense of security as this law ould put the hackers from obtaining information wrongly. Copyright Designs and Patents Act 1988 This is the current UK copyright law which has been created since 1988, it gives artist and creators of, musical and dramatic or any other artist have the right to control their work, this allows them to have control over how their material is used, this right covers broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. It is not what has been created it’s the details within what has been created to be protected, for example if you have a idea for a book that would not be protected however the information and content within the book that is written will be protected. So someone else can write a book around your idea but they cannot copy your book or adapt your book to do so. This helps to protect security and privacy of data as it protects the effort money and time someone has put in to create their content, if this content is being copied the organisation will lose potential customers as someone is using their content to sell another product. Privacy and compensation requirements of Data Protection Act 1984 1998 2000 This legislation first was written in 1984 there are updated version of this data protection act and the one that is used and most updated is the 2000 version, the 1998 version was a broadened and replaced the data protection act 1984, the main purpose for this law is that it gives rights and privacy of individuals, this ensure that their data is not processed without the creators knowledge and is only process with the consent of the artist. This act covers personal data relating to living individuals and protects sensitive personal data of that individual. This act covers data held in electronic formats. This has been changed as over time new technology and items are able to store data this is now updated so that it can cover these items as they will contain sensitive and personal data to an individual. The 2000 version of this act contains added laws and have been updated. This protects the security of the individual as no one should be allowed to take private and sensitive data without the individual being aware of this. Copyrights This exclusive legal right that is given to the original artist to print, perform film, publish or record literary and authorize others to do so for heir material. This protects a physical expression of ideas , for example someone has an idea to write a book the content that is written in that book is covered by the copyright act as it will be unique to the creator. You do not need to register or claim copyright, this protection is automatic as soon as it is created. If someone steals information or wrongly sells other work or creation for their own financial benefit then this copy right act will protect the original creator and he can claim back the money that has been gained by the person who has taken the material without permission. This protects security and the use of private data as it does not allow anyone to take data or material without the author permission, if this does happen the user who has taken this material can be fined and prosecuted as the products does not belong to them, the author can also decide how his material has been used and if someone breaks his restriction they can also be prosecuted. Open Source  This is software or material that is available with the source, this allows users to copy the material and modify the material, the reason for this is because the creators would believe that if someone can edit the material for themselves it will be more useful to another persona and will also allow less problems to occur if the source is available, so organisation believe that it should not be given and source should not be shown, they usually give the compiled version this is so others cannot copy their material and modify this. Open source means that it is available to any one and they can modify it however they want, doing this will improve the security for a material such as software as this source code has been given to the users it will be less likely that someone would want to hack it and modify the code as it is already available. This does have some restrictions as it would like to preserve the name and authors of the material. Freeware  This is software that is offered free of charge and is downloadable off the internet, freeware is different to shareware as shareware would require payment. Even though freeware is available it does have a license this would have restriction as some freeware would not want the user to alter the program, repackage it or sell the freeware, redistribution is allowed of freeware but cannot be distributed for money purposes. The creators want to ive something to the community but want to retain control of any future development of the software, this allows users to have the material without making changes and is free to the users, this makes there coding private and cannot be used however as it is free hackers would not bother to steal or resell this type of material as anyone can get it online for free, this makes the software more secure as there is no risk as it does not hold any value. Shareware  This usually is software that is distributed, this allows users to use the product and then pay for the product after the trial version has finished, you can then only continue to use the full version if you feel like the product is good to use but will have to pay to get the full version, the user will then be covered for registration and then support for the software if they purchase, once purchased additional features are usually given as only who pay can have these. This is been protected under copyright, even though you are able to use this software without payment you are still restricted to what you are allowed to do with it which is selling this software or adding it to another. This allows users to use expensive and powerful software for free and a short period of time however will later need to pay as the trial reaches to its end. This relates to security and privacy as the creators do not mind users having a full version for a short period as they may see as an advantage to sell their product later, copyright protects shareware as users cannot manipulate or sell their product. Commercial Software This is a software that is designed for sale to meet a commercial need for a user, this type of software is only allowed to be used for commercial purposes, this is software that you would usually see in the retailers in a physical box and requires payment before it can be used, commercial software usually contain a registration key and when you purchase this you will acquire a licence to use it. You are still able to download commercial software and this can be often seen in sharewares. These are usually made available directly from the organisation website. This relates to security and privacy of data as the user has to purchase the software before they can use it as they will not receive a registration key not allowing them to use the software, this does make it a security risk as hackers will try to steal a registration key but the copyright act protects the organisation and can prosecute the hacker for stealing data from the organisation.

Sunday, January 5, 2020

Barn Burning vs a Rose for Emily - 1083 Words

In Barn Burning, and A Rose for Emily William Faulkner creates two characters that are strikingly similar. Abner Snopes is loud and obnoxious. Because of this, most people tend to avoid him at all costs. On the contrary, Emily Grierson, a very intriguing woman from Jefferson, Mississipi, is an important figure in the town, despite spending most of her life alone. If these characters were judged purely on their reputation and physical appearance, it would be clear that Abner Snopes and Emily Grierson are opposites. Although at first look both Miss Emily and Abner Snopes appear different, they have more similar qualities than one would expect. These qualities drive them into a very similar and sad lifestyle. To analyze Abner Snopes†¦show more content†¦The most dramatic example of Abners need for this type of independence is when he burns down barns of those he does not agree with. He burns others property because he wants to show them that he is in control. He does this many times, moving to a new town to start over and always leaving a fiery trail behind him. He is so used to this vicious circle that it has even become a ritual. Emily and Abner display their independent and dominating personalities in all of their actions. William Faulkner’s style of writing evokes sympathy for his characters, regardless of how horrible the actions they committed were. The point of view in which he wrote the story determines how the story was told. Emilys version of the events would be quite different from someone elses version. Any person in the town would tell the story from his own experiences with Emily and his own attitudes toward her. By choosing a narrator who is not a part of the town, Faulker is able to achieve several things. He characterizes the town in addition to developing Emilys character. The town itself becomes a character in the story. By using the objective narrator, Faulkner is able to maintain the suspense of the story. The reader doesnt learn the story all at once because the narrator did not learn it that way. Faulkners narrator tells the story in a disjointed way, not in chronological order. He gives the reader clues, out of order. As the reader starts putting the clues together, a growing senseShow MoreRelatedâ€Å"a Rose for Emily† vs. â€Å"Barn Burning†2378 Words   |  10 PagesAmericas greatest authors. In fact, his short stories, Barn Burning, and A Rose for Emily, are two of the best-known stories in American literature. Both are examples of the reflection of contemporary Southern American values in his work. â€Å"Barn Burning† and â€Å"A Rose for Emily† are two stories both written by William Faulkner. â€Å"Barn Burning† has a theme of family loyalty verses loyalty to the law. â€Å"A Rose for Emily† has a theme of power by death. Emily is thought of as a monument, but at the same timeRead MoreMarketing Mistakes and Successes175322 Words   |  702 PagesJuggernaut Starbucks: A Paragon of Growth and Employee Benefits Finds Storms Boston Beer: Is Greater Growth Possible? 29 46 PART II MARKETING WARS 61 Chapter 5 Chapter 6 Chapter 7 Cola Wars: Coca-Cola vs. Pepsi PC Wars: Hewlett-Packard vs. Dell Airliner Wars: Boeing vs. Airbus; and Recent Outsourcing Woes 63 86 PART III COMEBACKS Chapter 8 Chapter 9 Chapter 10 McDonald’s: Rebirth Through Moderation Harley-Davidson: Creating An Enduring Mystique Continental Airlines:Read MoreLogical Reasoning189930 Words   |  760 Pages.............................................................................. 299 CHAPTER 10 Deductive Reasoning .......................................................................................... 312 x Implying with Certainty vs. with Probability ................................................................................ 312 Distinguishing Deduction from Induction ..................................................................................... 319 Review of Major