Saturday, January 25, 2020

Gilmans The Yellow Wallpaper -- Feminism Literature

American playwright and active feminist Clare Boothe Luce once pronounced, â€Å"Because I am a woman, I must make unusual efforts to succeed† (â€Å"Clare Boothe Luce Biography† n.p.). Societies primarily controlled by the male gender have been the vast majority since the origination of the first civilization. Throughout history, many women lived feeling superior to men only in a domestic setting. This domestic way of life generated considerable false judgments and stereotypes about the female gender as a whole. However, some chose to venture past what society deemed appropriate. These women often sought only for an opportunity where their voices could he heard. As Luce expressed, she and a great number of others found themselves fighting a remarkably hard battle as a result of gender inequality. Luce noticed that when a man articulated his thoughts, others listened. The perpetual request for females to simply be heard is still frequently denied today. A multi tude of women instead turned to writing books and stories in order to communicate the problems they faced. With symbolism, metaphors and other aspects of figurative language, authors, such as Charlotte Perkins Gilman, found themselves making a point without directly speaking their intention. In The Yellow Wallpaper, the narrator represents a woman’s ability to express her beliefs and that disregarding this right only hinders the oppressive, male-dominated society. Charlotte Perkins Gilman, in The Yellow Wallpaper, tells the tale of a woman who documents the hardships she must endure living with a condition known as nervous depression. The story begins as the narrator marvels at the grandiose nature of the home she and her husband will be residing in for the summer. Her... ...re drastic compared to the nineteenth century, but we are still nowhere near having a perfect equality. I honestly feel that we will make one more step toward a solution if more people read Gilman’s story and understand the message she clearly portrays. Every individual’s voice matters regardless of gender, race, or religion, and with The Yellow Wallpaper, readers can easily see what happens when this crucial fact is ignored. Works Cited â€Å"Clare Boothe Luce Biography.† Henry Luce Foundation. N.p., n.d. Web. 13 Dec. 2010. . Gilman, Charlotte Perkins. â€Å"The Yellow Wallpaper.† College of Staten Island Library. N.p., n.d. Web. 13 Dec. 2010. . Weiten, Wayne. â€Å"Stereotype Vulnerability as an Explanation.† Psychology Themes and Variations. 6th ed. 2004. Print.

Friday, January 17, 2020

A Decision of Uncertainty Paper Essay

Just recently, this past spring my cell phone contract recently expired after a continuous extension of over lapping contracts for over ten years. I have decided to finally upgrade my cell phone. The saturated cellular device industry can meet various consumer needs just depending on how sophisticated of a device is needed. The new and advanced iPhone 5 is a huge investment for a cellular phone. The retail price for iPhone 5 ranges from an additional $199 with a two year contract and $500 compared to the contract price AT&T offers. If a consumer signs a two-year contract plan to purchase the phone at a reduced price and incentive. See more: Ethnic groups and racism essay Due to financial restrictions and the holidays, I decided to purchase the phone and my contract price for the phone during the 2012 Christmas holidays. â€Å"Through my research and compliance with my constraints, the most opportune time to† (UOP, 2010, Week Three Supplement) upgrade my phone is reasonable during the holidays. Most cell phone companies such as AT&T and Sprint offer huge savings when multiple agreements are made. An iPhone investment could be costly because the standard warranty does not cover accidental damage. The accidental damage insurance, for an additional 48% one-time fee off the contract price, provides consumers with a peace of mind by providing two year coverage for hardware repair, drops, fumbles, slips, and water damage. Purchasing a high costly device means comes with the decisions on whether to purchase the contract price iPhone and not worry about accidental insurance; thus risk purchasing a replacement phone at retail cost or purchase the contract price iPhone and pay an extra 48% insurance fee, which adds to my spending and reallocate my budget for this phone. To decrease my decision of uncertainty; I have complied research on the new iPhone 5. My researched data set was from Business Wire and it provided a survey of 10,000 iPhones including their warranty claims. More important, my researched specified the hardware and accidental warranty claims. The claims all occurred within two years of purchase. Considering a voice plan and data plan would cost at least $1440 over the term of the contract. Another viable option is setting up an agreement with Cricket, which is better known as a pay as you go company. Cricket does offer an unlimited plan that could cost a consumer more than $5,500 over a two year agreement. Based on research from T3 the Gadget Website, the iPhone 5 is 20% daintier than the iPhone 4s, 16% less bulky than the Samsung Galaxy S3 and 14% lighter that the HTC One X. The iPhone 5 reviews have shown that it has a bigger screen, 4G capability and a better front facing cameras. However, the review also shows that the battery life is still not great, there are no iP5-specifice iOS 6 features and the old maps design is highly preferred. Now, it’s time to review the ten best features of the new Apple iPhone. * iPhone 5 will have a 4-inch screen * The new iPhone will be available in only black and white * iPhone 5 comes with Apples new â€Å"A6† processor, which runs twice as fast as the previous generation. * The phone has more than 200 new features in iOS 6 * You can update your Facebook status using SIRI * 8 MP camera, 3264Ãâ€"2448 resolution, five lens element lens, f2.4 aperture, 25% smaller * 8hrs LTE browsing, 10hrs Wi-Fi browsing, 40 hours music, 10hrs video, 225hrs standby * 802.11n 2.4Gz & 5GHz up tp 150Mbps, 802.11 a/b/g/n * The phone will have Now: DC-HSPDA, HDPA+ and LTE * Apples Retina Display 326 pixels per inch (ppi) The iPhone 5 is now available and many consumers will enjoy the new device but it has also started the clock on the next new iPhone. In a year from now, Apple will release a new and improved model of the iPhone. It may possibly be the iPhone 5s or the newly enhanced iPhone 6. My uncertainty still remains to upgrade gracefully to the iPhone 5 or sit tight and wait for the new and improved iPhone. References Future Publishing Limited. (n.d.). Retrieved November 14, 2012, from T3 The Gadget WEBSITE: www.t3.com ZEE NEWS LIMITED. (n.d.). ZEEBIZ.COM. Retrieved NOVEMBER 14, 2012, from WWW.ZEENEWS.INDIA.COM

Thursday, January 9, 2020

Communism and Capitalism Strange Bedfellows Essay

What is it about communism that makes many people scurry and cringe? In America, the mere word might as well be banned from the dictionary. The only time it is used is when talking about new aggressive movements by totalitarian communist countries. American’s tolerance level for communism is zero to none. Is communism so horrific that the thought of some forms being successful is out of the question? In society today, capitalism is the leading economic system. When compared to other systems, few meet its standards of living. Capitalists take this fact and hold it at the heart. They become close-minded to all other forms of government—especially communism. Today, communism is most often associated with totalitarian governments. However,†¦show more content†¦Many capitalists are convinced that capitalism is the only efficient system. But contrary to their belief, there are alternate utopian enterprises that run efficiently in smaller scale nations. Proponents of capitalism claim that it is the most effective economic system and should be spread across the globe and set up in nations stricken by communism and other totalitarian governments. Some reason that capitalism has the potential to reduce world poverty. Abbas J. Ali, Professor of Management and Director, School of International Management, Eberly College of Business, at Indiana University of Pennsylvania, believes that capitalist business executives, â€Å"driven by pragmatism and humility and free of nationalistic or parochial prejudice, continuously search to upgrade market mechanisms to incorporate the ever-changing needs of a world’s population, be they rich or poor† (208). In other words, executives are out to serve customers and are always looking for new ways to efficiently do this. In turn, they contribute to the task of solving world poverty. Jon Mueller, professor of political science at Ohio State University, states that humans are flawed and if a government wishes to be successful, it must learn to cooperate with man’s imperfections (45); he believes capitalism does this well. Mueller points out that capitalism does not â€Å"profess† to make all

Tuesday, December 31, 2019

How Music Can Improve Our Mental Abilities - 1019 Words

â€Å"Listen or not to listen† to music, while studying, is a question that puzzles many researchers, teachers, parents, and of course, us students. There are myriads of studies performed in different countries over the past few decades, and still, there is no single defined answer. Researchers have been able to observe some trends and effects of different type of music on different personalities, while they are in information abortion mode, but have been holding back from a â€Å"one size fit all† conclusion. In some instances certain music can improve our mental abilities to process information, but in other cases it can cause harm. And this is understandable, we are all so different that our reactions and perceiving toward things that surround†¦show more content†¦Likewise, for us, students, music impacts and regulates our mood. The best condition to study is in a relaxed mood. This is why it is important to choose music that does not distract but aligns an d coordinates entire nervous system activity. With advancement of portable music devices, background music has become widespread in our daily lives. Students of various ages may argue that music in general helps them to study more effectively. While music appears to enhance learning of some groups of students, it may negatively affect others. Study published in Applied Cognitive Psychology, in 2010 reveals that remembering and absorbing new information is best done with music turned off. This view is also supported by Clifford Nass, Stanford University professor. He states: â€Å"Music with lyrics is very likely to have a problematic effect when you’re writing or reading.† (January 13, 2015) Listening to songs or music with words may lessen cognitive abilities in a process of memorizing things in order. In other words, music becomes a distraction. In such situations when you need to give learning and remembering your full attention, â€Å"silence is golden.† (January 13, 2015) Every time I visit public library, I get reminded of library etiquette: to be quiet and respectful as â€Å"study is in progress.† (January 13, 2015) I also noticed that in such environment my personal reading and researches

Monday, December 23, 2019

The Potential Costs Of Investment Essay - 2146 Words

1) If the potential costs of investment are shared between worker and employment, they both share costs and benefits of the firm-specialized training. The worker benefits because their initial earning potential is higher comparatively to the rest of the similar general training market workers; the worker also benefits in having job security or retained employment with the firm. But if the worker leaves, the potential costs fall to both the firm and the worker because the worker cannot carry his training elsewhere to another firm and the firm loses a trained worker and investment of time and money, and now must expend cost toward another worker’s training. The worker also must keep in mind that his earnings could remain stagnant while generally trained workers will eventually increase their earnings in the competitive market. Firm specific training is often paid for by the employer for firm-only knowledge and training or can be dually invested by worker and firm; however, it is not transferable among the market. While, highly specialized training is concentrated within the market and only few are trained, specialized, and knowledgeable in the industry or field. Training and investment for firm-specific training can be risky for the employer and the worker while in this worker-employer relationship the potential benefit is mutual only if the worker retains his employment with the firm who trained the worker. The highly-specialized training could be costlier in comparison toShow MoreRelatedAbc Based On Current Cash Flow, Production Cost, Potential Investments, And An Overall Risk Profile1292 Words   |  6 Pagesmaterials to build cedar houses. Incorporating this new plan will comes with it’s share of challenges due to an increase in cost and labor, but the additional gross profit and revenue will assist in reaching the target amount of $3 million. In this paper, I will be going over the report I created for the CEO of ABC based on current cash fl ow, production cost, potential investments, and an overall risk profile. ABC has several risk factors that must be monitored as I go forward with the report. TheRead MorePersonal Finance : The Management Of Funds Essay1680 Words   |  7 Pagesthis, obtain, budget, save, and spend resources (entirely monetary) taking into consideration the associated financial risks and time period. The personal finance apparatus includes savings accounts, credit cards and consumer loans, stock market investments, retirement plans, social security benefits, insurance policies, and income tax administration. Sub categories of personal finance are: †¢ Credit and Debt †¢ Employment contract †¢ Retirement †¢ Financial planning Personal Financial Management willRead MoreCapital Budgeting: An Important Factor in a Companys Survival and Future896 Words   |  4 Pagesassets that are utilized in production and a budget is a plan that outlines anticipated expenditures during a coming period (p 381). So, when the two words are combined to imply one definition, the term capital budget is a synopsis of planned investments of assets that will remain for more than a year. Additionally, capital budgeting is the process as a whole of analyzing projects and determining which ones to acknowledge and then incorporate in the capital budget (Ehrhardt Brigham, 2011, p.Read MoreMaintaining An Internal Mutual Fund For Urban Growth Management Company1560 Words   |  7 PagesEstablishing and maintaining an internal mutual fund for Urban Growth Management Company, with smart investments will allow the company to become a stable flourishing corporation. Listed below is the recommended investments to establish a mutual fund for Urban Growth Management Company. An explanation and breakdown of your investments are written out below the breakdown of funds allocated. The fund allocations through various corporations and companies will shift and foster into new opportunitiesRead MoreThe Production Of Flashlights By 50 % ( $ 2 ) Essay1125 Words   |  5 Pagescompany is to absorb the costs bared and find a solution to earn profits from the available amount of products. Effects of Cost Increase The cost has increased by a significant amount and this would decrease the company’s raw material purchases, sales volume, production and profit: ï‚ · The raw material purchases would be affected as with the same amount of money used in purchasing the materials, less number of raw materials could be purchased, for example: if we the material cost per unit is $4 andRead MoreStrategic Research on ZipCar Essay846 Words   |  4 Pagesï » ¿Scott Hunt 4/3/2014 MGMT 452 Case Study: Zipcar Assignment Questions 1. Evaluate this potential venture and the progress that Chase has made. The potential of Zipcar exceeded the expectations of the owners Chase and Danielson in many factors. Their goal of creating this urban-style car borrowing system gave new light to the ideas of what options urban populations see in commute. The initial idea needed to be sized properly and growth was a big factor in terms of how fast they could get theirRead MoreAn Evaluation Of Capital Budgeting1137 Words   |  5 PagesAn evaluation of capital budgeting will give a concise view of the process management takes to determine the return on a potential investment. After analyzing this concept, the following methods used in making capital budgeting decisions will be discussed: internal rate of return, net present value, and payback period. For each of these three methods, an explanation of the strengths and weaknesses, how they are used, and decisions rules will be given. Capital Budgeting When management of a companyRead MoreAmerican Rice Inc. in Vietnam Essay1362 Words   |  6 Pageslower cost production, new relationships with suppliers and customers, and tax benefits as a result of the joint venture. ARI’s main input for the joint venture is to set up a management team that will run the operation and to consult the plant operation, plant design, improvements, and marketing. Also, ARI will provide machinery, equipment, technology and some working capital. In contrast, Vianafood’s main input was to provide a sufficient quantity and decent quality rice at a competitive cost, obtainRead MoreStedman Case1303 Words   |  6 Pageshome next door. Rent If they choose to rent, they are incurring a substantial rent increase over 5 years that is essentially a sunk cost. Mr. Linton is a resident so we can assume that his paycheck is modest and that Mrs. Linton would bare the majority of the rent increase. On the other hand, continuing to rent would eliminates the time, cost, upfront investment and risk of considering a home purchase. The landowner has also promised that this will be the only large rent increase. Exhibit one alsoRead MoreBasic Hospitality Terms and Formulae996 Words   |  4 PagesBasic Terms Terminology 1. Achievement Factor - The percentage of the rack rate that a hotel actually receives: in hotels not using RM software, this factor is generally approximated by dividing the actual average room rate by the potential average rate 2. ADR – An occupancy ratio derived by dividing net room’s revenue by the number of rooms sold 3. Average rate per guest – An occupancy ratio derived by dividing net rooms revenue by the number of guests 4. Competitive Set - The competitive

Sunday, December 15, 2019

Dr. Condoleezza Rice Free Essays

Dr. Condoleezza â€Å"Condi† Rice was born on November 14, 1954 in Birmingham, Alabama. She is the only child her parent’s name are Angelena and John Wesley Rice. We will write a custom essay sample on Dr. Condoleezza Rice or any similar topic only for you Order Now Both parents are educated; her mother was a teacher while her father was a minister and a football coach. Dr. Rice learned to play the piano at an early age she also learned to speak French. The father moved the family up to Denver because of job placement. Condi graduated at the age of 15 from St. Mary Academy High School with a 4. 00 GPA. She started college at the University of Denver and graduated at the age of 19 with a Bachelor in Political Science. She attended the University of Notre Dame and received her master in 1975. Condi being an over-achiever went back to get her doctoral degree from the Graduate School of International Studies at the University of Denver. She accomplished all of this before the age of 27. Dr. Condoleezza Rice grew up in the turmoil of racism. During this time in the 1950’s it was difficult for African Americans to be successful. Condi mother tired to shield her from the treatments of Blacks. Dr. Rice remembered when she went out shopping with her mother it was one incident where they were at the store and the cashier/owner saw Condi glancing up on some expensive hats and she yelled at her to get off. Her mother yelled at the white women by telling her not to talk to her daughter that way and the mother told Condi to touch every hat in the store. Condi parents taught her to not thi nk of herself as less of a person than white. It’s not as shocking that Condoleezza Rice could stand the hardship of racism. She made something of herself such as becoming an extraordinary public figure. In a short time she gained a great deal of power and influence over people. She became a professor at Stanford and later went to serve as the Director of the Soviet and Eastern Europe Affairs for the National Security Council during Bush’s Presidency in 1989. In 1993, Condi became the Provost of Stanford, where she balanced the $410 million dollar budget within her first year. In 1999, she resigned as the Provost and became Bush’s Foreign Policy Advisor for his campaign. She became the first female National Security Advisor. The NAACP saw Dr. Rice being an influential role model to the minorities and was awarded the President’s Award in 2002. She became the United States Secretary of State which she was appointed in 2005. Condoleezza Rice is a good leader because she has a combination of many things, especially being a proficient communicator. In addition to English she also speaks Russian, German, French, and Spanish. She carries great talent and breaks the language barriers when travelled to those speaking countries. Condi is an effective leader because she is self-assured, knowledgeable, and proficient in the environment that she takes part of. Her major experience in politics is in Russian foreign affairs so being able to speak Russian is a bonus. She carries herself at a position that people know that she is serious and committed at everything she strives to attain. Condoleezza Rice valued her faith which guides her through difficult times in her life. She feels that if you are praying and have faith then God will show you the way. I do believe that’s true prayer can get you through the toughest times in your life that you never thought would have happen to you. Her family is her support system. Unfortunately, she lost her mother from breast cancer that she battled with for 15 years. Her mother was not able to see her daughter accomplished many outstanding opportunities. Her father was blessed enough to see his daughter be the first National Security Advisor but shortly afterward he passed away. Her family was very influential while growing up which led to her going to college and opening bigger opportunities. She knew the importance of education by having her grandfather graduate from college and hears the struggles he went through, ever since than her family has been college-educated. Condoleezza Rice do not feel sorry for people, she feels that everybody can accomplish something and use that special ability that’s inside them to be productive in the society. When it comes to African Americans she seems to be stern on us. She feels that blacks should not be feeding off the benefits of what our people where force to do during slavery time. She really believes that everybody should be treated equal, so she is obviously against affirmative action. After reading this book, I was able to understand more of Condoleezza Rice, her actions and decisions. Some people may not like her and it could be the choices she made along the Bush administration. However, I understand that she is a strong woman who is not intimidated by anybody. She is very direct and stands strong on her decisions. She grew up during the segregating times but didn’t let that hold her back from accomplishing her goals. She ended up being a very powerful and influential public figure, for that I look up to her for that. I know people who would be faced with a difficult situation that would weighed them down. They will not achieve a goal that could have opened the doors of opportunities to better their future. I chose to investigate more of Condoleezza Rice because I didn’t know practically anything about her other than her being the first African American women to be the United States Secretary of State. After reading her biography I can now say how delighted I am to learned that a women that is African American achieving such an enormous ambition in her life. She have influence me to farther my education and get a master degree â€Å"in something I loved† I’m taken her advice to â€Å"always take life one step at a time. † I feel that this step will be great for my family and me. I’m a first generation in my family so I know if my parents were still around that they would be proud of me of aiming that high in education. I know that those young people in my hometown neighborhood look up to me, even though I grew up in the â€Å"hood† I didn’t let the environment hold me back from something potential. I let the environment motivate me to not become a statistics and not to have my future family being raised in that kind of environment. I know furthering your education the key to success and that’s what I’m trying to show those youngsters in the neighborhood. Instead of just talking about it I must show the kids that it can be accomplished. This makes me feel excellent on the inside that I’m bettering somebody else life. How to cite Dr. Condoleezza Rice, Papers

Saturday, December 7, 2019

Computer Security Breaches Web New

Question: Discuss about the Computer Security Breaches Web New. Answer: web for news on computer security breaches The problem of computer security breaches is increasing day by day. The main reason for this problem is lack of appropriate security and privacy of data that is stored into computer systems and shared over different networks. Here we will emphasize on a case of computer security breach that occurred in 2015. Under this discussion, the main problem, why it occurred and what are the possible solutions for this problem will be discussed in detail. News about Data Breach costs Comcast In news of data breaches, case of Comcast Company cannot be ignored. It is a company in United States of America. Due to a big data breach, Comcast Company has agreed to pay a fine of $33 million to customers who are involved in posting their personal information online. There were near about 75000 customers who affected by this big data breach and their personal information got public. The affected customers paid $1.50 a month for keeping their data secure and private to Comcast. According to statement of California Attorney, the violation of privacy of consumers will result in significant penalties and leaking of customers data was a trouble breach of privacy (Checkmarx, 2017). What was the Problem The computer security breach of Comcast Company was held on September 17, 2015. The problem is that personal information of Comcasts customers that was stored in Comcasts database, has hacked by hackers and also made public. Comcast provides so much security to its customers information, but still this computer breach has occurred due to improper usage of security and privacy tools and lack of usage of advanced security techniques and policies (PCWorld, 2017). How and why did security breach occur The root cause of this problem of Comcast Companys security breach is the online posting of personal information of customers that includes names, phone numbers and addresses of customers (Tech Times, 2017). These customers are those who have paid to have voice-over-internet protocol, numbers unlisted and VoIP. The publishing of personal information that should have been unlisted is considered unlawful and it leads to trouble of security breach of privacy and security. Similar thing has happened in case of Comcast Company. Due to lack of security and privacy of data, it has become easier for hackers to hack confidential information from databases or network (LIFARS, 2017). Possible Solutions As we have discussed above, how computer security breach has happened in Comcast Company and due to this potential customers of this company has faced issues that their confidential. Information became public. In this case, it has become necessary for Comcast Company to find possible solutions to resolve this issue of security breach. Following are some possible solutions for handling issues of computer security breach (Morgan, 2017). First of all it is necessary for Comcast Company to improve handling of complaints of customers regarding security of data and vendor use of data. Another possible solution is that Comcast Company has to provide explanation that how unlisted number and personal data are used (com, 2017). All computer systems that are connected with network must have anti-virus in it. Anti-virus helps to control entry of virus into system and if virus finds then fix it successfully. In this way, the virus attacks such as malware and others can be controlled by using advanced anti-virus solutions (Perlroth, 2017). The login credentials that are used by customers for their online accounts must be in encrypted form while stored into database. Encryption is form of cryptography and data in this form is hard to guess. Comcasts security experts should careful about this security technique and must use this while storing data into database. Besides above solutions, it is necessary for Comcast Company to make good security policies and order employees to follow them strictly. The no proper implementation of security policies and companys rules also lead to negative results and chances of security issues are increased (McGoogan, 2017). These are some possible solutions that Comcast Company should implement to resolve issue of privacy and security issues. According to analysis about possible solutions of Comcast Company, it is found that some solutions have already executed in Comcast, but expected outcomes did not get. It means more efforts are required to get full security and privacy of data. Now management of Comcast Company has provided assurance to customers that they are improving their activities to provide much better security to their information and company has already reached to a settlement with the California Public Utilities Commissions and Attorney General of California that brings this matter closure. Like Comcast Company, there are various other companies exist that have already encountered this kind of security and privacy issues. Those companies can also implement above listed solutions to resolve their security problems. Research about popular hack case In this segment of report, we will discuss a popular case of hacking on the web that happened between 2012 and 2016. Here we have selected a case of Yahoo Hack. This incident occurred in December, 2016. This incident is considered biggest data breach of history. As we know that Yahoo is a well-known company that provides telecommunication and other internet services. The Yahoo messenger is also popular among people worldwide. The hacking case of Yahoo was unexpected for its users and management. Now here we will emphasize on hacking case of Yahoo in detail. News about Yahoo Hacking It is admitted by Yahoo that company was hit with the worlds largest cyber-attack that involves breach of customer data. The result of this hacking was losing of personal details and passwords of one billion accounts. What was the Problem According to analysis we got to know that Yahoo got back hacked data in month of November. The information is analyzed by experts of external computer forensics and from this analysis it is confirmed that data is associated with one billion accounts that was hacked in previous years. These one billion accounts include confidential information of names, email addresses. Telephone numbers, hashed passwords and date of birth. This whole information was jumbled and harder to read as compare to plain text. There were also some cases when security questions and answers were also taken. But the stolen information did not include payment or bank account details, because that were stored in a separate system (IdentityForce, 2017). Who were affected and how According to further study about case of Yahoo, it is found that around 3 billion users on the internet and significant numbers of people i.e. one billion were affected due to this attack. These are not small number of people who have affected. Although financial information of customers is secured but still account holders are at risk that they can be targeted by fraudsters those are looking for financial details or any other information. If the combination of stolen passwords and data will be used again by customers then it is possible that hackers can use that to log into other websites. Besides this, phishing attacks are implemented by hackers to target with phishing attacks (McGoogan, 2017). How was attack carried out There was one vulnerable way that is used by hackers to implement this attack i.e. hacking. Through hacking hackers have tried to access confidential information of Yahoos customers from database of this company. The main thing here is stored data is in scrambled form and very hard to understand. But still hackers stole that data. It means security is not properly applied. Besides this, it will be better for Yahoo to use cryptography to maintain security of data. In case of cryptography, encryption technique can be used. This technique encrypts information in unreadable form that is hard to understand by hackers and it is considered better than jumbled of words (Kinney, S., Kinney, 2017). Prevention from Attack As we have discussed above issue of computer security breach that has faced by Yahoo Company, why and how it has happened. From above discussion it is cleared that this hacking attack is vulnerable and must be controlled by company. Here in this segment of report, we will discuss ways that are implemented by Yahoo to get rid of this problem and must be implemented by Yahoo and other companies (Recode, 2017). The first way to get prevention from above discussed attack is to use encryption technique to encrypt data before storing into database. This is an effective way to store data in secure way and chances of hacking data will be reduced. Yahoo security experts should use this technique. (com, 2017) Another way to get prevention from hacking is to manage authorization of users of database in which every data or information is stored. It means login credentials such as username and passwords should be strong and should be stored in encrypted form into database. The access of database should be provided to administration and no other person should be able to access that database without permission (Perlroth, 2017). The security policies of company also matter. If security policy will be effective and followed by all employees of company then issues of hacking or security breaches can be resolved. Besides above listed security techniques, Yahoo is also doing another efforts after occurring of this hacking incident. This company has decided to notify its customers those are affected by this incident and prompt them to secure their accounts on the behalf of some measures such as changing passwords. All unencrypted security questions will be considered now invalid and new ones security questions will be added in encrypted form. The cookie forging hack has also blocked by Yahoo. Therefore, these above listed ways are used by Yahoo Company to resolve problem of hacking. There are million users who have used Yahoo and made accounts on it by providing their personal information to company. Therefore, it is accountability of Yahoo towards its potential customers to provide them full security and privacy. Conclusion After this whole discussion about computer security breaches and hacking issues, we can say that if these issues will be controlled on time then security and privacy of information can be maintained for long time by business organizations. But if proper security tools and techniques will not be implemented by its users then issues of hacking, phishing and identity theft etc. can encountered. It is responsibility of the users and developers to maintain security of data at their own levels. References Checkmarx.(2017). August 2016 Hacks: 8 of the Largest Hacks, Breaches and Cyber Incidents. Retrieved 3 April 2017, from https://www.checkmarx.com/2016/09/11/august-2016-hacks-8-largest-hacks-breaches-cyber-incidents/ PCWorld.(2017). The 10 biggest hacks, breaches, and security stories of 2016. Retrieved 3 April 2017, from https://www.pcworld.com/article/3152367/security/the-10-biggest-hacks-breaches-and-security-stories-of-2016.html Kinney, S., Kinney, S. (2017). Comcast data breach to cost $33 million. RCR Wireless News. Retrieved 3 April 2017, from https://www.rcrwireless.com/20150924/big-data-analytics/comcast-data-breach-costs-33-million-tag17 LIFARS.(2017). Comcast Slapped with a $33 Million Fine over Data Breach. Retrieved 3 April 2017, from https://lifars.com/2015/09/comcast-slapped-with-a-33-million-fine-over-data-breach/ Morgan, L. (2017). Data breach costs Comcast $33million. IT Governance USA Blog. Retrieved 3 April 2017, from https://www.itgovernanceusa.com/blog/data-breach-costs-comcast-33million/ McGoogan, C. (2017). Yahoo hack: What you need to know about the biggest data breach in history. The Telegraph. Retrieved 3 April 2017, from https://www.telegraph.co.uk/technology/2016/12/15/yahoo-hack-need-know-biggest-data-breach-history/ Recode. (2017). Yahoos head lawyer is taking the fall for its hacking, while CEO Marissa Mayer is getting her pay docked. Retrieved 3 April 2017, from https://www.recode.net/2017/3/1/14783686/yahoos-lawyer-ousted-hacking-marissa-mayer-pay-docked Perlroth, V. (2017). Yahoo Says 1 Billion User Accounts Were Hacked. Nytimes.com. Retrieved 3 April 2017, from https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=0 Ft.com.(2017). Yahoo hacking what you need to know. Retrieved 3 April 2017, from https://www.ft.com/content/266aa154-8165-11e6-8e50-8ec15fb462f4McGoogan, C. (2017). Yahoo hack: What you need to know about the biggest data breach in history. The Telegraph. Retrieved 3 April 2017, from https://www.telegraph.co.uk/technology/2016/12/15/yahoo-hack-need-know-biggest-data-breach-history/ Tech Times.(2017). Biggest Data Breaches And Hacks Of 2016: Yahoo Data Breach, DNC Hacking, And More. Retrieved 3 April 2017, from https://www.techtimes.com/articles/190021/20161225/biggest-data-breaches-and-hacks-of-2016-yahoo-data-breach-dnc-hacking-and-more.htm Fortune.com.(2017). Yahoo Got Hacked Big Time: What You Need to Know. Retrieved 3 April 2017, from https://fortune.com/2016/09/22/yahoo-hack-qa/ IdentityForce. (2017). 2016 Data Breaches. Retrieved 3 April 2017, from https://www.identityforce.com/blog/2016-data-breaches Perlroth, N. (2017). Yahoo Says Hackers Stole Data on 500 Million Users in 2014. Nytimes.com. Retrieved 3 April 2017, from https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html