Tuesday, January 28, 2020

The Structure Conduct Performance Framework In Industrial Organizations Economics Essay

The Structure Conduct Performance Framework In Industrial Organizations Economics Essay The SCP paradigm assumes that the market structure determines the conduct of the organization. This conduct, in turn, is the determinant of market performance. Examples of market performance include efficiency, profitability and growth. The framework seeks to establish that certain structures of the industry can lead to certain kinds of conduct or behaviour which then leads to various types of economic performance. The SCP paradigm was developed through evaluation of empirical studies involving American industries. Theoretical models were not used to support the paradigm. The conclusion that was drawn from empirical studies was that market structure determined performance. This is caused by the belief that the laws of competition should not be based on behavioural models but rather on structural remedies. According to J.S. Bain who developed the paradigm in the 1950s, most industries became concentrated than necessary (Ferguson Ferguson, 1994). In concentrated industries, there are high barriers to entry. New firms cannot enter these markets that easily. The SCP approach has been subjected to criticism in the recent years. Some critics say that the relationships between structure, conduct and performance are more complicated than originally thought (Ferguson Ferguson, 1994). Attempts are being made to link the framework back to the neoclassical theory. However, industrial organizations still use the SCP approach for analysis and as a tool in policy formulation. The SCP paradigm remains to be a basic tool used by industrial organizations in competition analysis. Structure is defined as the components and characteristics of the various markets and industries in an economy. Structure also involves the different sectors of the economy. In the SCP approach, structure is described as the characteristics and relevance of individual markets operating within the economy (Papatheodorou, 2006). It provides a description of the environment in which organizations operate within a specific market. The said structure can be identified by considering the size and number of buyers and sellers in the market. The structure can also be identified based on product differentiation, market barriers and the extent of integration or diversification of firms. Conduct in the SCP approach involves all actions and behaviour of organizations regarding the decisions being taken and the reasons behind them. Conduct focuses on how organizations set prices. Organizations will have to determine whether these prices are in collusion with other firms in the market (Perloff et. al., 2007). Industrial economists are concerned with the performance of organizations. Firms should be able to identify whether their activities and operations will improve economic welfare. Firms should also satisfy and meet customer demands within a specific period. The SCP approach helps organizations analyse whether their processes and products are produced efficiently. Organizations should determine whether the allocation of resources is efficient and effective. The right approach is not to waste resources and produce the right products in just the right quantities. Firms should also look at the other aspects of performance like the relationship between price and cost of product as well as the profits earned (De Jong Shepherd, 2007). In the current market, consumer tastes do not change that much. Producers and consumers are said to be perfectly informed. Because of the market conditions, the economic welfare can be maximized using the Pareto analysis in which marginal conditions are expected to be fulfilled. Under marginal conditions, firms are expected to set prices so that they will be equivalent to marginal cost. Using the neoclassical perfect competition model, firms can maximize their profits by ensuring that price will equal marginal cost. This will result in an effective combination of price and output (Ferguson Ferguson, 1994). The SCP approach states that performance should be determined by the conduct of organizations. This conduct is then determined by the characteristics of market structures. The relationships between structure, conduct and performance will then match the models of monopoly, perfect competition, oligopoly and monopolistic competition. The traditional SCP approach is attractive since it is straightforward in its line of reasoning and is comfortable with the identification of structural characteristics (Jones Sufrin, 2010). This kind of approach provides clear guidelines to firms regarding policymaking decisions. The performance of the firm can be further improved by taking actions that are designed to influence the current structures of a specific market. In most cases, performance can be predicted by considering structural conditions of the market. Such conditions can provide sufficient information and predict how organizations should behave. Ignoring conduct in all market conditions c an lead to misleading predictions in markets operating under oligopoly. However, modern economists no longer believe that structures determine the performance of firms (Papatheodorou, 2006). Still, they accept the idea that market structures are important for firms to not behave competitively. The traditional SCP paradigm has two main aspects. The first involves firms obtaining measurements of performance. This can be done by getting a direct measurement rather than just an estimate. The second aspect involves economists using observations gathered from across industries. This is done to create a regression of performance measures on various structures to be used in explaining market performance differences between industries (Papatheodorou, 2006). The measures of market performance can determine whether market power operates in an industry. Measurements of direct or indirect profit are indicators of the performance of an industry against competitive benchmarks. Some of these measurements are rate of return and price-cost margin. To determine how performance is different from structure, industrial economists will need to know the measures of market structure. One common measure of market structure is firm size distribution. This is concerned with the most important issue involving market structure. The relative size and number of firms are indicators of market structure. Organizations will exert more market power when there are few firms in the market. In most SCP research, industry concentration is a term used to measure the market shares of firms in the market (De Jong Shepherd, 2007). SCP studies have ignored the issue regarding exogenous measures relating to market structure. Common concentration measures are not considered as exogenous measures. Another serious issue in relation to this type of measure for market structure is bias. Most concentration measures are said to be biased due to improper descriptions in the market. Since international trade is more significant in other countries than just in US markets, another bias can come from ignoring exports and imports (De Jong Shepherd, 2007). Domestic concentration measures may not be significant measures of market power in such international industries. The Chicago School Critique. The Chicago School is a school of free-market economics. Unlike the Harvard University which was where the SCP paradigm originated, the foundations for competition analysis were based on the theoretical model of neoclassical theory rather than on empirical studies (Cseres, 2005). The Chicago School believed in the establishment of anti-trust laws. Economic efficiency should be the exclusive goal. Economic efficiency has two parts namely productive efficiency and allocated efficiency. In some instances, practices that can improve the organizationà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s productive efficiency can lower the allocated efficiency of the market (Perloff et al., 2007). The Chicago School also believe that most markets are competitive in nature. Even if some markets have a few sellers, the market remains competitive. Product differentiation is less likely to undermine competition. Product differentiation and high market concentration do not contribute to anti-competitive issues (Perloff et al., 2007). The critique of the Chicago School was based on two grounds. One is that government intervention depends on the loosely demonstrated failures of market. The abuse of market power is an example of market failure. The remedies proposed by the SCP paradigm do not need to improve in addressing the problem. The Chicago school also believes that the SCP paradigm is entirely based on anonymous market transactions and price theory (Clegg, 2006). Since the paradigm is based from these sources, it does not recognize the complex relationships that exist within and outside organizations. For example, an organization can choose to limit the number of suppliers in order to reduce the level of competition among them. The action may result in a complex pricing formula rather than getting a fixed unit price to filter customers. The price theory that drives the SCP paradigm is said to be lacking in explanatory power according to the Chicago school (Clegg, 2006). There are limitations because it explores how actors interact within a market. The Chicago paradigm takes a more dynamic approach to economic events. The inefficiency brought by market power is temporary in nature. This efficiency will soon be eliminated by the entry of more innovative organizations. The SCP paradigm has produced different variations of empirical work. Market structure is affected by different basic conditions. These basic conditions include technology, business culture, consumer preferences and product durability among other variables (Audretsch, 2006). Government intervention affects every component of the paradigm. Government intervention may come in the form of regulations, taxes and subsidies, international trade policies and price controls. The SCP paradigm is used as a type of checklist for policymakers (Audretsch, 2006). They should also understand the function of transaction cost economics. This is a concept that attempts to identify the most efficient institutional and organizational activities that will help reduce transaction costs. Transaction costs economics is also based on the concept of bounded rationality. Economic factors are believed to be purposely rational but limited. Transaction cost economics also recognizes that the internal management o f the organization and markets can be alternative forms of allocating resources (Cseres, 2005). These also rely on the facts with corresponding effects if an organization has achieved efficiency. The most efficient firm will be able to either enter the market and engage in specific transactions or take the transactions out of the market and into the organization. These transactions for example, can be the production of goods and services within a vertically integrated firm. To determine whether or not the transaction should be brought into the firm and taken out of the market, organizations should determine the frequency of the transaction. If the transactions are to be conducted frequently, it is best to bring that type of transaction into the organization (Cseres, 2005). The specific transaction might need skilled labour to complete. If for example the transaction seldom occurs like the construction of a new plant, the most efficient resource allocation will be to enter the market and contract services for the transaction to be performed (Jones Sufrin, 2010). The same concept applies when firms decide on the degree of uncertainty. If the risk is great, vertical integration into an organization will bring the most efficiency. If the product can be easily duplicated, the transaction should be conducted in the market. Modern Theory of Industrial Organization. The modern theory of industrial organization is a combination of the SCP and Chicago paradigms into a more comprehensive and successful approach (Jones Sufrin, 2010). This is known as the contract-based approach to industrial organization. The SCP paradigm still provides the guidelines but the analysis of conduct is extended from pricing theory to more contract behaviours. In conclusion, the traditional SCP paradigm is still useful for firms as a tool for analysis but other tools or measurements are needed to support the SCP approach. Static economic theories state that profits in the long-run may vary with market structures. These economic theories do not mention anything about the relationship between the market structure and profits during the short-run. Using the SCP paradigm alone may not result in accurate analysis.

Sunday, January 19, 2020

Lewis Latimer :: essays research papers

Lewis Latimer Lewis Howard Latimer was born in Chelsea, Massachusetts, on September 4, 1848, six years after his parents, George and Rebecca Latimer, had run away from slavery in Virginia. They were determined to be free and that their children be born on free soil. Because of his light complexion, George was able to pose as a plantation owner with the darker-skinned Rebecca as his slave. Shortly after arriving in Boston, Massachusetts, he was recognized as a fugitive and jailed while his wife was taken to a safe hiding place. The arrest was protested vigorously by the community. Frederick Douglass, a former slave who had escaped to Massachusetts several years earlier, and abolitionist William Lloyd Garrison spoke forcefully against the arrest. There was a trial, and the attempts to recapture George and return him to Virginia caused considerable agitation in Boston. When the trial judge ruled that Latimer still belonged to his Virginia owner, an African-American minister paid $400 for his release. Although free, George was still extremely poor, working as a barber, paper-han ger and in other odd jobs to support his wife, three sons, and one daughter. Lewis Latimer, the youngest child, attended grammar school and was an excellent student who loved to read and draw. Most of his time, though, was spent working with his father, which was typical of children in the 19th century. In 1857, the Supreme Court ruled that a slave named Dred Scott could not be considered a free man although he had lived in a free state. George Latimer disappeared shortly after the decision became known. Because he had no official papers to prove he was a free man, he possibly feared for his safety and that of his family. With his father gone and his mother struggling to keep the family together, Lewis falsified his age and joined the U.S. Navy in 1864 when he was sixteen years old. When the Civil War ended he was honorably discharged and returned to Boston to seek employment. In 1868 he secured a job as an office boy in the Crosby and Gould patent law firm, a company that specialized in helping inventors protect their patents. By closely observing draftsmen at work and reading books on the subject, Latimer taught himself mechanical drawing. He learned to skillfully use the vital tools of the trade, such as T squares, triangles, compasses, and rulers, and mastered the art of drawing to scale.

Saturday, January 11, 2020

Computer Operating Systems

ICT 100: Introduction to Information and Communications Technology Unit 3: Operating Systems Objectives: ? ? ? ? ? ? ? Define the term software Differentiate between system software and application software Define the terms operating system and utility program Identify the types of operating systems Explain the boot process of a computer Describe the functions of an operating system Identify common utility programs Software, also called a program, consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them.The two categories of software are system software and application software. System Software System software consists of the programs that control or maintain the operations of the computer and its devices. System software serves as the interface between the user, the application software, and the computer’s hardware. It includes the following: 1. Operating Systems 2. Library Programs 3. Utility Programs Operating Systems An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources.Every computer needs an operating system to act as an interface between the user and the computer hardware. It allows the user to perform tasks without having to know how they are done. For example, a user can give a command to save a file on disk without having to know where the file will be stored or how it will be retrieved again. When a command is given to print a document, the user does not have to be concerned with the details of how the printer works – a program called a device driver takes care of the details. ICT 100 – Operating Systems Page 1 of 9The operating system that a computer uses sometimes is called the platform. With purchased application software, the package or specifications identify the required platform (operating system). A cross-platform program is one tha t runs the same on multiple operating systems. Application programs are usually written to work with a particular operating system, so that a word processor, which works with Windows, will not work on an Apple Mac, which has a different operating system. When purchasing application software, ensure that it works with the operating system installed on your computer or mobile device.The Bootstrap Process The process of starting or restarting a computer is called booting. When turning on a computer that has been powered off completely, you are performing a cold boot. A warm boot is the process of using the operating system to restart a computer. A warm boot properly closes any running processes and programs; however, it does not save any unsaved work. Thus, always remember to save your work before rebooting (restarting) a computer. Each time you boot a computer, the kernel and other frequently used operating system instructions are loaded, or copied, from storage into the computer†™s memory (RAM).The kernel is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and assigns the computer’s resources, such as devices, programs, data, and information. The kernel is memory resident, which means it remains in memory while the computer is running. Other parts of the operating system are nonresident, that is, these instructions remain on a storage medium until they are needed. When you boot a computer, a series of messages may appear on the screen. The actual information displayed varies depending on the make and type of the computer and the equipment installed.The boot process, however, is similar for large and small computers. The steps of the bootstrap process are given and explained below: Step 1: The power supply sends a signal to the components in the system unit. When you turn on the computer, the power supply sends an electrical signal to the components in the system unit. Step 2: T he processor finds the ROM chip(s) that contains the BIOS. The charge of electricity causes the processor chip to reset itself and find the ROM chip(s) that contains the BIOS. The BIOS (pronounced BYE-ose), which stands for basic input/output system, is firmware that contains the computer’s start-up instructions.ICT 100 – Operating Systems Page 2 of 9 Step 3: The BIOS performs the POST, which checks components, such as the mouse, keyboard, and adapter cards. The BIOS executes a series of tests to make sure the computer hardware is connected properly and operating correctly. The tests, collectively called the power-on self test (POST ), check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives. As the POST executes, LEDs (tiny lights) flicker on devices such as the disk drives and keyboard.Beeps also may sound, and messages may appear on the screen. Step 4: The results of the POST are compared with data in a CMOS chip. The POST results are compared with data in a CMOS chip. CMOS is a technology that uses battery power to retain information when the computer is off. The CMOS chip stores configuration information about the computer, such as the amount of memory; type of disk drives, keyboard, and monitor; the current date and time; and other startup information. It also detects any new devices connected to the computer.If any problems are identified, the computer may beep, display error messages, or cease operating — depending on the severity of the problem. Step 5: The BIOS may look for the system files on a USB flash drive or on an optical disc drive or may look directly on drive C (hard disk). If the POST completes successfully, the BIOS searches for specific operating system files called system files. The BIOS may look first to see if a USB flash drive plugged in a USB port or a disc in an optical disc drive contains the system files, or it may look directly on drive C (th e designation usually iven to the first hard disk) for the system files. Step 6: The system files and the kernel of the operating system load into memory (RAM) from storage (i. e. , hard disk). Once located, the system files load into memory (RAM) from storage (usually the hard disk) and execute. Next, the kernel of the operating system loads into memory. Then, the operating system in memory takes control of the computer. Step 7: The operating system loads configuration information, may request user information, starts several background processes, and displays the desktop on the screen. The operating system loads system configuration information.Necessary operating system files are loaded into memory. On some computers, the operating system verifies that the person attempting to use the computer is a legitimate user. Finally, the desktop and icons are displayed on the screen. The operating system executes programs in the Startup folder, which contains a list of programs that open a utomatically when you boot the computer. ICT 100 – Operating Systems Page 3 of 9 Figure 1 The bootstrap process Shut down options including powering off the computer, placing the computer in sleep mode, and hibernating the computer.Sleep mode saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state. If, for some reason, power is removed from a computer that is in sleep mode, any unsaved work could be lost. Hibernate, by contrast, saves any open documents and programs to a hard disk before removing power from the computer. Operating System Functions Operating systems perform the following functions: (1) manage resources, (2) manage backing store, (3) handle interrupts, (4) provides a user interface, (5) provide networking capabilities, (6) provide security. . Manage Resources The operating system keeps track of all resources (CPU, disk, memory, files, input and output devices etc. ). Through scheduling it decides what process gets what resource, when it gets it, ICT 100 – Operating Systems Page 4 of 9 how much and for how long. This is called allocation of resources. Resources can also be taken away from a process. This is called de-allocation of resources. Memory Management Computers are capable of holding several programs in memory simultaneously so that a user can switch from one application to another.The purpose of memory management is to optimize the use of random access memory (RAM). The operating system allocates, or assigns, data and instructions to an area of memory while they are being processed. Then, it carefully monitors the contents of memory. Finally, the operating system releases these items from being monitored in memory when the processor no longer requires them. If there is no memory management then one program might accidentally address the memory space occupied by another. This would result in corrupting programs with potentially disastrous results.Virtu al memory is used when sufficient physical RAM is not available. Part of a hard disk is allocated to be used as if it were main memory. The speed of access is very slow compared to RAM access speed. File Management The file management part of an operating system has four basic functions: 1. To allocate space on the storage device to hold each file stored, and to deallocate space when a file is deleted. Space is usually divided into fixed size allocation units (addressable blocks) of say 512 or 1024 bytes. 2. To keep track of the allocation units occupied by each file.Files may be split over several allocation units, not necessarily contiguous (i. e. together). A file may initially occupy one unit of 512 bytes, and then when updated by a user, need extra space which may have to be found somewhere else on the disk. 3. To control file access rights and permissions. 4. To map logical file addresses to physical addresses. For example, a physical disk may be split into several logical dri ves C, D, E, F, G. Managing Programs Some operating systems support a single user and only one running program at a time. Others support thousands of users running multiple programs.How an operating system handles programs directly affects your productivity. A single user/single tasking operating system allows only one user to run one program at a time. A single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time. When a computer is running multiple programs concurrently, one program is in the foreground and the others are in the background. ICT 100 – Operating Systems Page 5 of 9 The one in the foreground is the active program, that is, the one you currently are using.The other programs running but not in use are in the background. A multiuser operating system enables two or more users to run programs simultaneously. Networks, servers, mainframes, and super computers allow hundreds to thousands of use rs to connect at the same time, and thus are multiuser. A multiprocessing operating system supports two or more processors running programs at the same time. Multiprocessing involves the coordinated processing of programs by more than one processor. Multiprocessing increases a computer’s processing speed. 2.Manage Backing Store The operating system is responsible for the transfer of data from secondary storage (e. g. disk) to memory and vice versa. It also has to maintain a directory of the disk so that files and free spaces can be quickly located. 3. Handle Interrupts The operating system detects interrupts (such as the click of the mouse or a process indicating that it is finished with the processor) and then performs the necessary task (such as allowing the processor to be used by another process). 4. Provide a User Interface You interact with software through its user interface.That is, a user interface controls how you enter data and instructions and how information is d isplayed on the screen. The operating system acts as a user interface between the user and the machine. Command-Line Interface To configure devices, manage system resources, and troubleshoot network connections, network administrators and other advanced users work with a commandline interface. In a command-line interface, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. Graphical User Interface Most users today work with a graphical user interface.With a graphical user interface (GUI), you interact with menus and visual images such as buttons and other graphical objects to issue commands. Many current GUI operating systems incorporate features similar to those of a Web browser, such as links and navigation buttons (i. e. , Back button and Forward button). Some GUI operating systems provide access to command-line interfaces. Menu-driven Interface User is presented with a range of options from whi ch to choose ICT 100 – Operating Systems Page 6 of 9 Form Interface A user interface in which the computer outputs separate prompt and response fields for a number of inputs.Natural Language – the interface consists of standard languages such as English, Spanish, French, and Dutch etc. 5. Provide Networking Capabilities Some operating systems have networking capabilities built in, others are creating specifically for managing networks, e. g. server operating systems. Networking capabilities include organizing and coordinating how multiple users access and share resources on a network. Resources include hardware, software, data, and information. For example, a server operating system allows multiple users to share a printer, Internet access, files, and programs.The network administrator, the person overseeing network operations, uses the server operating system to add and remove users, computers, and other devices to and from the network. The network administrator also uses the server operating system to install software and administer network security. 6. Provide Security Computer and network administrators typically have an administrator account that enables them to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network.Settings include creating user accounts and establishing permissions. These permissions define who can access certain resources and when they can access those resources. For each user, the computer or network administrator establishes a user account, which enables a user to access, or log on to, a computer or a network. Each user account typically consists of a user name and password. A user name, or user ID, is a unique combination of characters, such as letters of the alphabet or numbers that identifies one specific user. Many users select a combination of their first and last names as their user name.A user named Henry Baker might choose H Baker as his user name. A password is a private combination of characters associated with the user name that allows access to certain computer resources. Some operating systems allow the computer or network administrator to assign passwords to files and commands, restricting access to only authorized users. After entering a user name and password, the operating system compares the user’s entry with a list of authorized user names and passwords. If the entry matches the user name and password ICT 100 – Operating Systems Page 7 of 9 ept on file, the operating system grants the user access. If the entry does not match, the operating system denies access to the user. To protect sensitive data and information further as it travels over a network, the operating system may encrypt it. Encryption is the process of encoding data and information into an unreadable form. Administrators can specify that data be encrypted as it travels over a network to prevent unauthorized users f rom reading the data. When an authorized user attempts to read the data, it automatically is decrypted, or converted back into a readable form. Types of Operating SystemsOperating systems can be divided into the three following types: 1. Stand-alone 2. Server 3. Embedded Stand-Alone Operating System A stand-alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device. Some stand-alone operating systems can work in conjunction with a server operating system (here it functions as a client operating system); others include networking capabilities allowing users to set up small networks (e. g. home or small business network). Examples of currently used stand-alone operating systems are Windows 7, Mac OS X, UNIX, and Linux.Server Operating System A server operating system is an operating system that is designed specifically to support a network. These operating systems can support all sizes of networks from small to large-sized networks and Web servers. A server operating system typically resides on a server and provides client machines with access to resources. Examples of server operating systems include Windows Server 2008, UNIX, Linux, Solaris, and NetWare. Embedded Operating System The operating system on mobile devices and many consumer electronics, called an embedded operating system, resides on a ROM chip.Most handheld computers and small devices use embedded operating systems. Popular embedded operating systems today include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, embedded Linux, and Symbian OS. ICT 100 – Operating Systems Page 8 of 9 Library Programs A library program is available to all users of a multi-user computer system, typically to carry out common tasks required by everyone. For example a routine that searches for lost files or restores corrupted files may be stored in a library. Utility ProgramsA utility program, also calle d a utility, is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs. Most operating systems include several built-in utility programs. Users can also buy stand-alone utility programs. Utility programs perform common tasks that thousands of computer users need to do at some time or another, such as searching for files, viewing images, backing up files and disks, uninstalling programs, defragmenting disks, burning optical discs, and so on.One common utility is compression software such as WinZip that ‘zips’ files so that they occupy less space. This is very useful if your want to transmit a graphic or large data file over the Internet, as the transmission time will be much reduced. References Shelly, G. B, Vermaat, M. E. (2010). Discovering Computers 2011. Boston, MA: Course Technology Daley, B. (2008). Computers Are Your Future 2007. Upper Saddle River, NJ: Pearson Education Heathcote, P. M, Langfield, S. (2004). ‘A’ Level Computing, 5th edition. Oxford: Payne-Gallway Publishers Ltd ICT 100 – Operating Systems Page 9 of 9

Friday, January 3, 2020

The Car - Original Writing - 1131 Words

As I blinked my eyes open, I remembered the screeching of the car. My heart racing at felt like a thousand’s, I finally remembered it had happened so quickly. I layed down until my mind comprehended what was happening. I heard an easy voice in the distance, ‘’Are you all right?’’It was the paramedics talking to little sisters. I tried to yell, but the medics walked up to me and patted me up, and told me to go get my sisters and follow her to the ambulance. I ran crying and breathing harshly and complaining that they wanted my mom. I felt like crying but I could not. I had to keep my sisters, who are still 4 years old calm. We went to the ambulance and waited. Then the police officer walked up to us and asked us some question. I asked him if, I could look for my dad but he handed me. My dad’s phone and my mom’s necklace. He told me that the paramedics took them to the hospital. The police officer thanked us and climbed out the ambulance. The medic closed the door and drove us to the hospital. As I entered the building, the nurse tapped my shoulder ‘’excuse me are those your parents?’’ She showed me the picture. ‘‘Yes but where are they?’’ she didn’t reply, she just bowed her head and held my hands, I took a deep breath and ask her again ‘’do know where are my parents have passed away’’ I was dumbfounded ‘’nooooo! , that’s not true, you’re lying to me why did they leave me?’’ I screamed. I stand taking it out on people that didn’t deserve it. I needed a lot of help. I didn’tShow MoreRelatedThe Car - Original Writing2084 Words   |  9 Pages_We loaded into his black car about a half an hour later. Will told me we were going to a fast food restaurant and then he’d improvise the rest of the day. I was kind of excited, but not really because I kind of wanted to go home._ _I got into the passenger side and decided to look at his nice car more. The entire interior was a dark grey and the car was super clean despite belonging to a teen who apparently drank all the time. Will started the car, but I barely noticed with how quiet the engineRead MoreBoy Of The Car - Original Writing1274 Words   |  6 PagesBoy in the car I never thought it would happened. My mother’s hands were trembling in mine. The beautiful face I looked at was covered with pain; tears like a broken pearl necklace, cascading down from her black eyes. Her eyes was deep as an ocean, that I couldn’t see anything in the bottom. Gazing to the her, my heart like being ripped into pieces until I could hardly breathe. She shrinked on the chair with her curls black hair spread on her shoulder, pity but beautiful, as a withered rose. MaybeRead MoreMy Beloved Car - Original Writing866 Words   |  4 PagesI use to be invincible, or at least that is what I use to think. I was a teenager and up until that point I had been in a few accidents, but nothing as compared to the one on that March evening. That accident would not only take my beloved car, but would also alter my life. One of my greatest possessions, was my ’94 Ford Mustang. Van Gogh, named for his mixed paint job, was red and grey with a clean body. When I got him he wasn’t running, but after a couple hundred dollars and a few new parts, myRead MoreMy First Car - Original Writing2103 Words   |  9 Pagesyears. I started liking cars and wanted to know more about them, when I started high school. I started to want to own a car to modify it. I got my first car on my 15th birthday. I was so happy suddenly, a lot of ideas popped in my head on what I want to do to the car. I’m a car fan, I started to like cars a lot that it became, â€Å"my favorite thing in life.† Which a lot of people think, that it’s stupid and just a ride. According to â€Å"car people† who I’m one of them, a car is not car if it’s stock. RacingRead MoreMy First Car Wreck - Original Writing846 Words   |  4 PagesFirst Car Wreck It was Sunday September 8, 2013. I was hanging out with my best friends Courtney and Colten. We were at my house and we decided that we were going to see our friend Josh. Then we had to decide what car and who was going to drive. We all decided to just take my car, which was my mom’s car. I drove out to Josh’s house, which was fifteen minutes away. We picked up Josh and then drove around the country for a while. After driving around for a while Josh wanted to go get his car so weRead MoreCarbon Footprint, by Jeff Parker914 Words   |  4 Pageslarge, black, foot rising out of the ground. This foot has writing on it saying â€Å"Carbon Footprint†. The foot is closely following a vehicle. There are two frantic looking people within the vehicle. There is one driver and one in the passengers seat. A text bubble is displayed above the vehicle saying â€Å"Remember, â€Å"Objects in the mirror are closer than they appear.†Ã¢â‚¬ . The foot also seems to be cr eated from the same stuff coming from the car exhaust. The intention of this visual argument was to attractRead More Contracts Essay1093 Words   |  5 Pagesrequest for something in return (a persons car). The acceptance consists of an assent by the party to whom the offer is made, showing that the person agrees to the terms offered. The offer may be terminated in a number of ways. For example, the party making the offer may cancel it (a revocation), or the party to whom the offer is made may reject it. When the party to whom the offer is made responds with a different offer, called a counteroffer, the original offer is terminated. Then the counterofferRead MoreBad Girls : Women For Women1127 Words   |  5 Pagesthat, bad girls, who were doing the exact opposite of what their sexual discourse is defined as. The video takes place in a desolate middle-eastern town, it features one of a kind stunt driving as cars drift on two wheels while M.I.A and others casually sit on top of them. It features other amazing car stunts and M.I.A dancing alongside people armed with weapons, there are similar scenes throughout showing this controlled chaos. Though what truly separates this music video from the norm is that womenRead MoreEssay on The Popularity of Advertising1324 Words   |  6 Pagesthis by the Advertising Standards Authority and the Independent broadcasting Authority. If you watch the Television any night of the week, you will definitely come across a great selection of adverts, most of which would be advertising cars. I will be analysing two Television adverts, a Volvo and a VW. The Volvo adverts opening frame is of a long shot showing a dark sky and land. The sky is red and black and the thought of danger and fear comes to mind. The frame freezesRead MoreWriting Process : Analyzing Your Audience1356 Words   |  6 PagesThe Writing Process The first thing to do in the writing process is to select a topic and do research on that topic. Once you’ve selected a topic and have done enough research to tentatively commit yourself, you can then go into the four phases of the writing process; I. Prewriting: Analyzing your audience, determining your purpose in writing, limiting the scope of what you will cover, and generating potential content. II. Drafting: Making a case and structuring your evidence for that case. III