Presidentalism or parliamentarism: which system is better?

Position paper 2 Student Id; 160806 Name of student: Emin Amrullayev Name of course: Comparative Political Research Title of paper: Presidentalism or parliamentarism: which system is better? Which type of democratic regime- presidential or parliamentary - is more adequate to achieve a stable democracy? Although theoretical analyze of this question can bring up different kind of opinions that significantly differ from each other, but such clarification of all advantages and disadvantages of both system is very useful in determination if democratic regime in certain society. In this paper, my main purpose is to briefly analyze both system and to express my perceptions about presidentalism and parliamentarism. In "The Perils of Presidentalism", Linz argues in favor of parliamentary government and tries to emphasize the disadvantageous features of presidentalism. Linz describes two main features of presidentalism: the first, "president's strong claim to democratic, even plebiscitarian, legitimacy" and "the second is his fixed term in office". The second argument is really seemed stronger to argue against presidentalism. Because, during four or five years until next elections the other political groups - "the losers" have not any opportunity to participate in executive power. Moreover, as Linz describes, in case of president's death or incapacity person who is not elected

  • Word count: 737
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Linux memory management. Linux uses demand paging where the virtual pages are only loaded into physical memory when needed by the process. Swapping occurs when a process needs to bring data from the virtual memory to the physical memory,

Linux Memory Management Memory management is an important part of a computers operating system, even from the early days a program will require more and more memory than actually exists. A strategy to overcome this is to use a virtual memory, virtual memory make a system appear that it has more memory as it shares it with other processes. The memory management sub system in Linux provides * Large address spaces * Protection * Memory Mapping * Fair physical memory allocation * Shared virtual memory In a virtual memory system all of the addresses are virtual and not physical. The page table converts virtual to physical addresses. Each of the physical and virtual memory is split up into pages, usually the same size .On alpha AXP the page sizes are 8 Kbytes and on Intel x86 systems the pages are 4kbytes. Each of these pages has a page frame number (PFN). Linux uses demand paging where the virtual pages are only loaded into physical memory when needed by the process. Swapping occurs when a process needs to bring data from the virtual memory to the physical memory, if there is no space available an old page is swapped out of memory to bring in the new one. Linux the Least Recently Used (LRU) technique to efficiently choose pages which are to be removed from the system. This scheme requires every page in the system having an age which changes as the page is accessed. The

  • Word count: 694
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

start an ecommerce business

Introduction Electronic Commerce or e-commerce, the exchange of goods and services by means of the Internet or other computer networks. E-commerce follows the same basic principles as traditional commerce-that is, buyers and sellers come together to exchange goods for money. But rather than conducting business in the traditional way-in stores and other "brick and mortar" buildings or through mail order catalogs and telephone operators-in e-commerce buyers and sellers transact business over networked computers. E-commerce offers buyers convenience. They can visit the World Wide Web sites of multiple vendors 24 hours a day and seven days a week to compare prices and make purchases, without having to leave their homes or offices. In some cases, consumers can immediately obtain a product or service, such as an electronic book, a music file, or computer software, by downloading it over the Internet. For sellers, e-commerce offers a way to cut costs and expand their markets. They do not need to build, staff, or maintain a store or print and distribute mail order catalogs. Automated order tracking and billing systems cut additional labor costs, and if the product or service can be downloaded, e-commerce firms have no distribution costs. Because they sell over the global Internet, sellers have the potential to market their products or services globally and are not limited by the

  • Word count: 3328
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Network report for Middlesex University. The current network design is a star topology with a central point being one of the campus. Each campus is itself designed as a star network and is a Local Area Network.

Introduction: LANs provide data transfer rates that are typically much faster than wide-area networks (WANs). While most companies own their own LAN infrastructure, wide-area connections between LANs are usually leased on a monthly basis from an outside carrier. With the recent developments in Gigabit Ethernet technologies, LAN designs are now capable of 1000 Mbps speeds. High-speed Gigabit links can connect servers to LAN switches. At these speeds, the capacity is there to meet the performance requirements of current high-bandwidth applications. The most significant design rule for Ethernet is that the round-trip propagation delay in one collision domain must not exceed 512 bit times, which is a requirement for collision detection to work correctly. This rule means that the maximum round-trip delay for a 10 Mbps Ethernet network is 51.2 microseconds. The maximum round-trip delay for a 100 Mbps Ethernet network is only 5.12 microseconds because the bit time on a 100 Mbps Ethernet network is 0.01 microseconds as opposed to 0.1 microseconds on a 10 Mbps Ethernet network. To make 100 Mbps Ethernet work, distance limitations are much more severe than those required for 10 Mbps Ethernet. The general rule is that a 100 Mbps Ethernet has a maximum diameter of 205 meters when unshielded twisted-pair (UTP) cabling is used, whereas 10 Mbps Ethernet has a maximum diameter of 500 meters

  • Word count: 7403
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Critique: Why Don't we encrypt email?

Shonak Nathwani CS133 Professional Skills Term 2 Critique The article "Why Don't We Encrypt Our Email" was written by Stephen Farrell in January 2009. It was published the same month in the journal, "Practical Security" by the IEEE Educational Activities Department. The purpose of the article is to briefly inform readers about the different functionality in common Multi User Agents and the security related issues that are frequently ignored by users when using them. This critique will address the appropriateness of ideas and structure in the article. Farrell's article assumes fairly strong technical competence of the reader in the field of computer security from the beginning of the article. This is showed through the immediate use of terms such as "Mail User Agents" and "Web-based mail client" (Farrell 2009, p.82). In assessing the structure of the article, it is instantly surprising upon first look of the article, how seemingly long-winded it is to answer a relatively simple question. And for the most part, it is. There are many concepts that Farrell ploughs through to try and explain to the reader, many of which don't help in answering the question posed in the title. One example of this would be Farrell's divergence to explaining the two MUA integrated protocols, S/MIME and OpenPGP, and how these have not been incorporated mainstream MUA program operations. He

  • Word count: 905
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Ubiquitous Computing.

Ubiquitous Computing Topic Overview Karen Branley BNurs. GradDipSc(IT) Prog. ECU Edith Cowan University School of Computer and Information Science MIC/MIT student [email protected] Ubiquitous Computing (Ubi Comp), or pervasive computing is hyped as the 'third wave' in computing (Weiser, 1996) and is best described by its creator Mark Weiser, (1996, p1) as " invisible, everywhere computing that does not live on a personal device of any sort, but is in the woodwork everywhere". Ubiquitous computing therefore attempts to create technologies that mar the boundary between the users experience with computing and the world by becoming one with it. There are a number of ubiquitous computing research branches such as mobile computing, wearable computing and the intelligent environment. Ubiquitous computing is reputed to evolve our business, learning, entertainment, collaborative and home environments by embedding smart technologies that interact with us quietly behind the scenes (Roussos et al, 2003). The vision is of smart embedded technology grounded in the realizable theory where microprocessors are becoming smaller, less expensive and able to incorporate into everyday objects and environments such as clothes, pencils, paper, toys, tools, home and office appliances, walls, floors and fixtures (Mattern & Strum, 2003). Wireless technologies will be the enabler

  • Word count: 1768
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

ICT and special needs Stephen Hawking

Stephen Hawking - Physicist Stephen Hawking was born on January 8th 1942. His parents' house was situated in North London, but during the Second World War, which commenced in 1939, his parents re-located to the city of Oxford due to safety fears in London. At this time, Oxford was considered to be one of, if not the safest place in England to have babies. Stephen was born in Oxford, and he lived there with his parents for the first eight years of his life. It was at this point that he moved back down to London to an area about 20 miles away from where he first lived. It was at eleven years of age that Stephen went to St Albans School, and then on to University College in Oxford. This college in Oxford was the college where his father used to go in his schooling days. Stephen initially went there to study mathematics, a subject he thoroughly enjoyed but his father wanted otherwise. He then ended up studying physics, as mathematics was not available at the University College. Stephen then went on to Cambridge University to study Cosmology, the metaphysical study of the origin and nature of the universe. After gaining a PhD in this subject, he became a Research Fellow, and a Professorial Fellow at Gonville and Caius College. After deciding to opt out of a career in Astronomy, he came to the Department of Applied Mathematics and Physics, and since 1979, he has held the position

  • Word count: 1747
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Discuss the basic ( computer ) architecture and operation of the micro-simulator that you have been using in the practical work.

Unit 19 HND BIT Computer Architecture Assignment 2 Prepared for Roy Clarke Prepared by R J Clayton .0 Table of Contents -------------------------- .0 Table of Contents 1 2.0 2 3.0 3 Question A 3 Question 3.0 A continued 4 Question 3.0 A continued 5 Question B 6 2.0 ; CONTROL THE TRAFFIC LIGHTS JMP Start DB 90 ; address of the interrupt routine Start: ; RED / RED STI ; Switches on interrupts MOV AL,90 ; Copy 10010000 into the AL register. OUT 01 ; Send AL to Port One (The traffic lights). MOV BL,01 ; Moves value ( 1 ) into BL CALL 80 ; Call Subroutine 80 (delay routine) ; RED AMBER / RED ; Turn on all the traffic lights. MOV AL,D0 ; Copy 11010000 into the AL register. OUT 01 ; Send AL to Port One (The traffic lights). MOV BL,02 ; Moves value ( 2 ) into BL CALL 80 ; Call Subroutine 80 (delay routine) ; GREEN / RED MOV AL,30 ; Copy 00110000 into the AL register. OUT 01 ; Send AL to Port One (The traffic lights). MOV BL,1E ; Moves value ( 1E - 30SECS ) into BL CALL 80 ; Call Subroutine 80 (delay routine) ; AMBER / RED MOV AL,50 ; Copy 10100000 into the AL register. OUT 01 ; Send AL to Port One (The traffic lights). MOV BL,02 ; Moves value ( 2 ) into BL CALL 80 ; Call Subroutine 80 (delay routine) ; RED / RED MOV AL,90 ; Copy 01010000 into the AL register. OUT 01 ; Send AL to Port One (The traffic lights). MOV BL,01 ; Moves value (

  • Word count: 1267
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Describe the principal methods used by investment banks to compute their Value at Risk to movements in market prices. What are the advantages and limitations of using such measures?

Describe the principal methods used by investment banks to compute their Value at Risk to movements in market prices. What are the advantages and limitations of using such measures? . Introduction Philippe Jorion defines Value at Risk (VaR) as a model used to "summarise the maximum loss on a portfolio in a given time horizon, within a given confidence level". VaR is the main method for financial institutions to measure their exposure to risk. In the world of banking today, risk management is becoming an important subject as banks strive to prevent events such as LTCM occurring again. There are several types of risks that banks face. These are: operational, market, credit, liquidity and business risks. There four steps to calculating VaR. First, the risk manager must collect all the data, regarding losses previously made and information about the risk factors involved. The risk factors must be identified. There are four main steps risk factors employed in a VaR model, which are: the decline or rise in interest rates and equity prices, or the movement in commodity and currency prices. The risk manager must then choose the appropriate method of calculating VaR. This could be Delta Normal, Historic Simulation, or Monte Carlo Simulation. Finally, when all the information and data is inputted, the VaR can be calculated. This essay will focus on how the principle methods of

  • Word count: 2683
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

COMPUTER STUDIES INTERNET & INTRANET SECURITY

The exam should follow examination format which should consists of 6 questions with 25% each and student will need to attempt only 4 questions. NCC INTERNATIONAL ADVANCED DIPLOMA IN COMPUTER STUDIES INTERNET & INTRANET SECURITY DECEMBER 2003 EXAM CYCLE CANDIDATES SHOULD ATTEMPT FOUR QUESTIONS ONLY Date : 23rd November, 2003 Time Allowed: 3 Hours MARKING SCHEME Please attempt any four from question 1 to 6 Clearly cross out surplus answers ANSWER ANY FOUR QUESTIONS ONLY QUESTION 1 (25 points) As a security manager, you need to implement security measures to detect intrusions from LAN. You boss need some understanding of IDS before approving your solution. a) How many types of IDS are available? Name them all and describe each (8 marks) Ans: -Host Based IDS (HIDS) - Similar to NIDS but only analyzes network traffic to and from a single machine (1.6) - Network IDS (NIDS) - Analyzes packets on a network and tries to determine if a hacker is trying to break into a system. An NIDS typically runs on a hub or a router, analyzing all traffic flowing through the device (1.6) - System Integrity Verifier (SIV) - keeps track of critical system files and notifies an administrator when they are altered. (1.6) - Log file Monitor (LFM) - Scan through logs generated by network services looking for attacks Patterns. (1.6) - Honeypot - A deception system that has

  • Word count: 2777
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay