Wednesday, May 6, 2020

Negative Effects Of Marijuana - 1903 Words

Among teens and adults marijuana is the number one drug used for medical and recreational use. Marijuana was not legalized by the states in the U.S. until recently, but it has been in use since the 1970’s. Although, marijuana has been legalized for only a couple of years, the issues of marijuana are becoming a larger epidemic. Many people have the misconceptions that marijuana will not have the same effects as other drugs or even such as tobacco, but after an abundance of research, scientist discovered that marijuana do have similar effects as smoking cigarettes in which children are the most because their brains and bodies are still developing. Not only does it affect their child physically, but also socially. Teenage years are when the†¦show more content†¦There are many different factors that can influence children’s perspective on marijuana. Parental views and guidance are one of the factors that can impact these decisions greatly. Cannabis, also known as marijuana comes from the cannabis plant called the cannabis sativa. Cannabis in the wild grows in tropical and temperate areas, but it can be grown indoors which can be a little difficult. Marijuana plants need a great deal of attention because these plants need a specific amount of light, heat, humidity, and water. The cannabis sativa contains more than 60 cannabinoids, which is a general term for the chemicals released in your body that alters neurotransmitters in your brain. THC or tetrahydrocannabinol is considered a cannabinoid, responsible for a euphoric high when you use marijuana. Marijuana is the dried up leaves or stem of a cannabis plant which is then chopped up and smoked in a joint. There are many different ways to use marijuana, but most people either smoke it, or consume it by its natural oils in forms of edibles. Under the federal law, residents are allowed to grow no more than 6 marijuana plants only if they are 21 years and older, and must be grown in an area that is enclosed and cannot be seen by the public. In conclusion, there is more to know about marijuana than its reputation as an addictive drug. There are many different reasons why teens choose to start using marijuana. Teenagers fall underShow MoreRelatedThe Negative Effects Of Marijuana861 Words   |  4 Pages Marijuana is sweeping the nation. How might this affect people’s everyday lives? Is the progression on legalization a good thing or a bad thing? In order to answer that, the people must first consider the health effects of the consumer and the economic effects of the nation. Marijuana could have both positive and negative effects on the health of the user and the economy. While marijuana does indeed have some health benefits, it also has many adverse health effects and can lead to severalRead MoreNegative Effects Of Marijuana1612 Words   |  7 Pages What is marijuana? What is it made of? Why is cannabis still illegal in certain states? Why does marijuana have so many names? Where do the names come from? What is the marijuana culture and how do they celebrate? How is marijuana beneficial? All these questions roaming through people’s mind. Cannabis is a green mixture of the dried, shredded leaves and flowers of Cannabis sativa. People usually smoke marijuana in hand-rolled cigarettes called joints or cigars called blunts, or in a pipe, orRead MoreThe Negatives Effects of Marijuana on Teenager880 Words   |  4 PagesThe Negatives Effects of Marijuana on Teenager What is Marijuana? The marijuana affects the brain development on teenager. Also affect the function at school, work, and social life of the teenagers. The marijuana increases the risk of mental health issues. The sadistic show that the used of marijuana increase every years. Marijuana affects the teenager and also their families. According to National Institute of Drug Abuse, Marijuana is a greenish-gray mixture of the dried, shredded leaves, stemsRead MoreNegative Effects Of Marijuana1903 Words   |  8 PagesAmong teens and adults, marijuana is the number one drug used for medical and recreational use. Marijuana was not legalized by the states in the U.S. until recently, but it has been in use since the 1970’s. Although, marijuana has been legalized for only a couple of years, the issues of marijuana are becoming a larger epidemic. Many people have the misconceptions that marijuana will not have the same effects as other drugs or even, such as tobacco, but after an abundance of research, scientist discoveredRead MoreThe Negative Effects of Marijuana2471 Words   |  10 PagesMarijuana has the reputation of giving users a high when smoked, eaten, or inhaled through vaporization. The chemical that causes the feeling of euphoria is called Delta-9-tetrahydrocannabinol (THC). When smoked or ingested, th e THC rapidly passes through your lungs or stomach, then your bloodstream, and to other organs in your body. When it finally reaches your brain, the THC targets specific brain cells called cannabinoid receptors (Harding, 2013). These receptors are especially found in partsRead MoreMarijuana Has A Negative Effect On Your Health1728 Words   |  7 PagesI believe that cannabis has a negative effect on your health. Now I’m fully aware that a portion of the world’s population truly believe that cannabis is nothing more than a harmless drug that is used for nothing more than recreational use and will not have any long-term effects on your health, but I want you to ponder on the thought of my statement and why I might believe that cannabis has a negative effect on your health. First what is cannabis? according to drugs.com cannabis also known as â€Å"CannabisRead MoreEthical Issues : Weed And Medical Marijuana1148 Words   |  5 PagesKevin Noh Professor Ericka Scott English 100 11 April 2016 Ethical Issues: Weed Marijuana has been consumed ever since the human civilization started. However, according to Zimmermann (2014), large amounts of research on medical marijuana started around the early 1970s. Through articles and videos on the Internet, social media, and even school, people are becoming more aware of the presence of medical marijuana. Even children are being informed through D.A.R.E. programs offered in many elementaryRead MoreEssay on Pros and Cons of Legalizing Marijuana557 Words   |  3 Pageslegalization of marijuana is a very debatable subject, some people think it is bad and should be illegal, and some people think it is good in some ways if used properly. It should be legal because it has few negative effects, it serves other purposes than getting people stoned, and it is better than other drugs. Many advocates say â€Å" Marijuana is a common drug used by many people.†(Sandra) A lot of people think marijuana has numerous amounts of negative effects on the body. Marijuana helps the bodyRead MoreEffects Of Marijuana On The Minds Of Many Americans1257 Words   |  6 Pagesannually on marijuana-related charges (Smith). Because of this, the topic of marijuana, specifically legalizing marijuana, has been on the minds of many Americans. Some of the American population does not see marijuana as an issue because they think it is not as harmful as some other drugs. On the other hand, scientists, doctors, and the rest of Americans view marijuana as a dangerous drug that should stay illegal because of the harmful effects that it can have on a person. Negative views of marijuanaRead MoreThe Harmful Effects Of Marijuana On The Minds Of Many Americans1250 Words   |  5 Pagespeople are arrested annually on marijuana-related topic (Smith). Because of this, the topic of marijua na, specifically legalizing marijuana, has been on the minds of many Americans. Some of the American population does not see marijuana as an issue because they think it is not as harmful as some other drugs. On the other hand, scientists, doctors, and the rest of Americans view marijuana as a dangerous drug that should stay illegal because of the harmful effects that it can have on a person. Throughout

Critical Thinking - Reasoning and Problem Solving

Question Discuss about theCritical Thinking, Reasoning and Problem Solving. Answer: Literature Review Remote Desktop Access According to this paper[1], the authorhas described a procedure to access the desktop by using the android mobiles. This procedure depends on the Virtual Network Computing (VNC) method. For this purpose, the desktops or computers are required to install a virtual network computing servers with the help of wireless service. By using wireless platforms, clients may be able to access and execute the performance. The picture of the desktop is compacted before it is transmitted to the android mobiles. There are few capacities given to facilitate the survey on mobile phones. The alternate operation can be utilized instantly to access the periodically used locations. The responsibility of a current key can be seen utilizing the management work. The function of twin view helps the clients to see two locations at the same time. The prototype or model is now installed utilizing Java and inspected on a Java based android mobiles. This application helps to monitor the assessments and helps in ex changing the file in the network management, inside a wireless location. The application of system through the internet is implemented in the next level. The same RFB convention is utilized for the information exchange. The structure of Virtual Networking Computing (VNC) may be required for the system implementation. Because of wide utilization of android gadgets, this framework will be created for tablets and for all the portable gadget. This framework will give the ability to the clients to access their desktops through internet. In this paper [2], the mobile phones are connected as an accessing device of a remote desktop. The performance of the mobile phone depends on the execution of Java programs in past days. The results for that method contains reading and writing of e-mail and web page browsing. According to this paper, the trend has switched to Android applications. In current situation, the mobile acts as a remotely accessing computer. The remote control through the network is provided by the desktop sharing system, which is denoted as Virtual Network Computing. It provides the controlling function with the updated graphical screen from the mouse, keyboard capturing and through device controllers. This system is only based on the Remote Frame Buffer protocol. These protocols are used to share the information between the connected devices. The TCP/IP protocol is used to transmit the information from one port to another in the range of 5900-5906. There are two types of application that are required for VNC system to do proper work. The server application is used for machine which is controlled by the controller and the client. Also it is used for supervising the device. Based on the performance, the client side is known as viewer. The controlled machine is a major response to view the desktop which shares the information and also is used to convert and capture the activities of the user via RFB protocol messages. In another side, the server should break the events which are collected from the client and sends them to the self-system. Server must have the responsibility to update the graphic screen request via sending the desktop view to client connection. Through the mobile phone the user can directly access the desktop and work with that. If the user wants to talk to anyone using the mobile phone, the user should terminate the connection of the network. As per [3], every android mobiles can access the desktops remotely. The keyboard and the mouse are accessed via touching the screen of the mobile, the computer is handled for the support of accessing the remote desktop. The keyboard and mouse is also used to provide the functionality in typing and handling the desktop. When the application part is accessing the desktop, the server must need on PC and it accesses the mobile phone, where the server must be an android device. The server should break the events which is sent by the client and it is injected to the self-system. The major part of the LAN connection in the network is used to connect the devices such as computer and android device. This process is done by entering the IP address and port number that is generated from any side of the server which is a server in the computer or the server in the android device. Due to this reason, it implements the socket primitives and accesses the android device using the "NANOHTTPD" protoco l. The usage of the updated graphical screen from a keyboard and mouse capturing and controlling the device provides the controlling functionality. The above system used the RFB protocol to transmit the information in between the connected devices. There are two types of application that are required for VNC system to do proper work and the server application is used for machine which is controlled by the controller and client. Moreover, it is also used for supervising the device. With the help of a mobile phone, the user can easily access the desktop from anyplace. It is stated in [4], that the user accesses and controls the remote server (remote desktop) by using the RDP (Remote Desktop Protocol) which gives the capacities of desktop control and remote login. Microsoft Corporation enforces the Remote Desktop Protocol from the protocol families of ITU-T T.120. By differentiating the important benefits when compared to the various remote desktop design, the frame-buffer access protocol depends on ideally transferring the GDI (Graphic Device Interface) data from a server, rather than the complete bitmap pictures. This paper suggests a remote collaborating system that is planned and actualized on the structure of RDP. The proposed framework was comprised of a cross control conspire with transport re-encryption design that gave the full capacities for every single remote coordinated effort. For example, remote control, application approach and transferring towards all the RDP users. Therefore, it gives the recording and replaying plans to the packe ts RDP for replaying the greater part of the definite tracks through which a multiparty gathering experienced. The execution displayed and assessment demonstrates the system practicality and it suggests that it has adaptable model for the modern services. According to this paper [5], the best software tool is a Remote Machine Control System. The user can access the desktop through internet by using this application and can play out the managerial tasks like program accessing, checking the required hardware and checking the users. The software is used to connect two different networks from various locations and also interacts with them. In the most recent decade, dispersed frameworks engineers are frequently dependent on the middleware stages to expand their efficiency. Living amongst the working framework and appropriated applications, middleware frameworks gives reflections that avoids application designers with a few information that is built-in for the circulated programming. For example, arrange correspondence primitives, handling of failure, heterogeneity, administration query, synchronization, information marshalling and unmarshalling. Java RMI is considered as the most well-known middleware stages. Critical Thinking on Issues As per [6], the system administer faces many issues on Remote Desktop Protocol (RDP) when establishing the connection between systems. The Remote Desktop Disconnected is an error message that is shown when it does not support the Microsoft Product. This is why the error message will be displayed. This is a reason for disconnecting the remote system and it points implicitly. The causes for problems are listed below. Misunderstanding the settings and terminologies. Unauthorised access from end-user. Conflicts occurring during port assignment. Misconfiguring RDP- TCP Group policy settings during Remote Desktop Service configuration. When trying to connect a remote computer, the above mentioned problems are attempted by a system administrator. It is important to identify the issues and it delivers the solutions which are mentioned in [7]. Misunderstanding of the Settings and Terminologies The Remote Desktop Licensing Server for example aka Terminal service Licencing should be installed on the system. The Remote Desktop Session Host (aka Terminal Server) is also required to be installed for establishing the remote connection. In the first step, the connection is established on both the servers. After that, the systems are connected. When thinking out of the network, the Remote Desktop always supports two connections concurrently. So, it is not necessary to get licence for the connection establishments. Unauthorised Access from End-user The end-user has an appropriate right to access the remote desktop. The user groups should have an authorized permission to use the remote system. The control will be given by the server. For example, the user receives the right by suggesting and by having authorization to sign up the system. These access controls are provided by the server. The local security policy on the server provides the facility to allow the user to login with the authorized account. Port Assignments The port assignment is a major problem on the Remote Desktop access. The issue causes either blocking the port or port assignment conflicts on the server systems. To detect and resolve this problem, it is required to verify whether the default port for RDP (port number=3389) is either blocked or not. It is necessary to ensure that the port assignment is managed by the TermService. Misconfiguration of Settings Another major issue is that the limited number of end-users can access the Remote Desktop Service at a session time. Obviously, the error message "Failure to connect" will be displayed on the end-users system by the Help Desk call. It can be handled by, Enabling the unlimited connection setting Settings of Network Adapter under (RDP-TCP properties) and displaying on the RD session Host server. It is stated in [8] that in the end-user support centre, the help desk is always associated. While establishing the first help desk, there is no need of information to be implemented. Twenty years ago, the first help desk was established and accepted. Before that, it is difficult to contact friends and colleagues with the assistance of the help desk. But now, the critical issues in help desk is analyzed by the managers of savvy technology. The helpdesk came as a telephonic communication. This technology is considered as an efficient technology and it manages multiple type of communication interaction between the people economically. This efficient technology is called as 'service desk'. The communication between the people may be in terms of voice or non-vice such as email and messaging. By using the transition from self-assistance to remote incident resolution, the operation cost can be reduced as half of the original cost. But the performance is increased by service quality which i s provided for communication. Source of the Support The end-user must evaluate the user support strategy is based on the value and cost. According to the company, the support worker and outsourcing with Third Party Company is important. It is critical to do and it is a very challenging process. So, the end-user strategy is used for supporting the outsourcing process. As the survey says, the technical work to support outsourcing of the company is centralized by using help desks. It is applicable for all the Information technologies and business process outsourcing managements. Thus, 40% of the people from managers are working for a company to resolve this problem in IT industries. The solution is provided by the people who work for the in-house services. Hence, according to the survey only 3% people support only work for outsourcing the process. The major challenge is to find and get help desk workers for an automated products and outsources is mentioned in the paper [9]. While analysing the problem of outsourcing in business industry, the business strategy is well grown by providing the customer services and support systems. According to the help desk value, the price for each call is either fixed or bundled. Method of Support The primary decision is based on the source which is provided by the support given to outsource. Often the end-user contacts the helping people through the dedicated help desk. The issue in this method is handled by the application of question proficiency and convenient to the end-user by receiving help from them. Providing inaccurate, obscure and incomplete information from the help desk to the end-user is a major issue. Because, the help desk should support the end-user by contacting them. Thus, it leads to a big deal in the technical support method. The outsourcing support help desk provides the facility to ask the clearing method by contacting the people who need help. According to the survey, most of the people contact the support people through telephone contact. Because, asking clearly is the best solution for the end users. Thus, the phone contact is preferred for interaction between the end-user and the support specialist. It is a great opportunity for the end user to clarify the issue details. Though the telephonic method helps for support process, sometimes it is too difficult to encounter stress and frustration. Because, not all the end-users have knowledge about the issue thoroughly. Therefore, the support specialist needs to improve the confidence of the application and access the resources. References [1] J. chintalapati and S. Rao T.Y.S, "Remote computer access through Android mobiles",IJCSI International Journal of Computer Science Issues, vol. 9, no. 5, 2012. [2] A. Jadhav, V. Oswal, S. Madane, H. Zope and V. Hatmode, "VNC Architecture Based Remote Desktop Access Through Android Mobile Phones",International Journal of Advanced Research in Computer and Communication Engineering, vol. 1, no. 2, pp. 98-99, 2012. [3] K. Bhandari, V. Mandole, A. Munde and S. Takmare, "Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser",International Journal of Computer Science and Information Technology Research, vol. 3, no. 1, pp. pp: (369-373), 2015. [4] C. Tsai and W. Huang, "Design and Performance Modeling of an Efficient Remote Collaboration System",International Journal of Grid Distribution Computing, vol. 8, no. 4, 2015. [5] R. Kumar and A. Anil, "Development of Remote Access Network Communication (RANC)",International Journal of Computer Applications (0975 8887, vol. 27, no. 8, 2011.ed: 26- Jan- 2017]. [6] K. andeep Bhandari, V. Baliram Mandole, A. Dattatray Munde and S. Takmare, "Secured architecture for remote virtual desktops - IEEE Xplore Document",Ieeexplore.ieee.org, 2015. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/4621741/. [Accessed: 28- Jan- 2017]. [7] . Darabont, K. Kiss and J. Domokos, "Performance Analysis of Remote Desktop Virtualization based on Hyper-V versus Remote Desktop Services",MACRo 2015, vol. 1, no. 1, 2015. [8] S. Kapoor, A. Verma and A. Lala, "To Access Remote Desktop using Windows Azure Cloud Computing",IJARCCE, pp. 98-100, 2015. [9] H. Ohta, Y. Sato, T. Sagawa, T. Fujita and S. Katsuki, "Sa1204 An Introduction to Remote Internet Access for Capsule Endoscopy: Using the Cloud to Diagnose Images and a Remote Desktop Control to Check the Real-Time Viewer",Gastroenterology, vol. 142, no. 5, pp. S-242-S-243, 2012.