Wednesday, September 2, 2020

Ancient Greece Health and Medicine Essay Example

Old Greece Health and Medicine Essay Example Old Greece Health and Medicine Essay Old Greece Health and Medicine Essay Exposition Topic: Love Medicine Medication all started in Ancient Greece by one man named Hippocrates (ca. 460-377 B. C. E); he is known as the dad of medication. Everything started with the Greeks attempting to think of a rationale framework that would assist them with diagnosing certain infections. The sensible framework depended on the way that we had humors, and every individual had four humors that were substances inside our bodies. The four substances were: blood, dark bile, yellow bile, and mucus (articulated bodily fluid, which means boogers). They accepted that on the off chance that your four substances were adjusted, at that point you would stay a solid individual, yet in the event that one of your substances got inconsistent, at that point you would turn out to be sick. In the event that you turned out to be sick, at that point the specialists accepted that you had a lot of one substances and that’s what was making you sick, along these lines, they would approach attempting to evacuate whatever additional substance you had. Hippocrates likewise caused humors to relate with the seasons: the main season that of blood and air compared to spring; the mid year was fire, bile and liver; harvest time was earth, dark bile and spleen, while winter was the period of water, of mucus (bodily fluid) and of the brain† (history of medication). With respect to sicknesses a large number of them that surfaced in Ancient Greek numerous years back are as yet here today and really pass by a similar name at times. Additionally a portion of the medicines are in a similar thought as we have today, however today we have much better innovation and comprehension of what is happening. Right off the bat, the Greeks had cholesterol; cholesterol is a mix of two Greek words; â€Å"chole† meaning bile, and â€Å"steros† implies strong. Cholesterol was first found as little stones within the gallbladder, and their fix was flaxseeds which show viability is bringing down elevated cholesterol. Also, the Greeks had diabetes. Diabetes originates from the Greek prefix ‘dia’ meaning separated and the word ‘bainein’ which intends to stand, the word together implied a compass or a siphon. The word siphon was a reference to the extreme pee from an individual with diabetes. The Greeks with diabetes followed an extremely sound eating regimen and way of life, yet diabetes was an exceptionally uncommon condition in those days. Another significant ailment in old Greece was the Plague; Greece had a gigantic episode in the late spring of 430. This episode left the specialists, patients, and individuals of the time with a great deal of harm and grief; they could always remember this sickness. They truly didn't have a fix everybody was worthy to this sickness, however information from past flare-ups and data about the side effects which helped them comprehend this unbelievable malady. Different iseases that influenced the Greeks were skin break out, headaches, hypersensitivities, frailty, uncleanliness, cholera, and gonorrhea. With respect to the individuals who really rewarded the evil it was up to the, â€Å"Cult of Asclepius developed in prevalence and was a significant supplier of clinical consideration. This religion created old hypotheses and presented a few medicines not very disparate from current option medicines† (Ancient Greek Medicine). The Ancient Greeks cherished games along these lines the vast majority of the urban communities in Greece had open gyms where residents could accumulate to prepare, work out, unwind, and mingle. Greeks were a firm devotee that a solid body was significant. Men and young men would rehearses sports day by day since they delighted in the game as well as in light of the fact that they needed to remain fit and fit as a fiddle. In spite of the fact that sport wasn’t just useful for getting fit and remaining fit as a fiddle, the Greeks would utilize it to get ready for war as well; ordinary exercise was significant in a general public where men were constantly required for military help. Armed forces must be fit, they needed to walk significant distances, convey all the overwhelming gear, and start the battle with the foe. Alongside all that, the â€Å"athletics was a gigantic piece of their training, many accepted that building up the body was similarly significant as improving the psyche for in general health† (M. Hand truck). The young would work out in the wrestling-school, palastra. The palaestra was a well known spot for the Greek men of any age to mingle. The wrestling school was for the genuine rivals in the Olympics, and for the ones that were not genuine. Men would work out with an athletic coach who might utilize a long stick to call attention to blunders in specific positions and different errors. The â€Å"trainers would give close consideration to adjusting the kinds of physical exercise and the competitors diet† (M. Cart). Work refered to: Ancient Greek Mythology Diseases, Health, Illness, Infections, Conditions. (n. d. ). Home Remedies and Natural Cures for Common Illnesses. Recovered October 26, 2011, from home-solutions for you. com/realities/greek-meds. html Ancient Greek medication. (n. d. ). Schoolshistory. organization. uk online exercises GCSE study helps †Teachers assets. Recovered October 26, 2011, from schoolshistory. organization. uk/ancientgreece. htm Barrow, M. (n. d. ). Sports and the Ancient Greece Olympics . Forests Junior School, Tonbridge, Kent UK. Recovered October 26, 2011, from forests junior. kent. sch. uk/Homework/greece/sports. htm History of Medicine. (n. d. ). Benvenuto in pacs. unica. it Facolta di Medicina e Chirurgia dellUniversita di Cagliari. Recovered October 26, 2011, from http://pacs. unica. it/biblio/lesson1. htm

Saturday, August 22, 2020

Cute Ways to Write Your Name on Paper

Cute Ways to Write Your Name on PaperWhen you're at home or in the office, cute ways to write your name on paper will keep you entertained. When you do find the proper penmanship, it can save you from spelling mistakes. You'll also have a good excuse for not saying your name as often as you should.One of the cute ways to write your name on the paper is to write it as you see it when you're out shopping. If you find a nice pair of shoes, say that they look good on you. If it's a book or magazine you're looking at, say that you think it looks good on you. These sorts of simple things you can express in your cursive writing.Another way to help keep you amused is to write something that reminds you of what you like. Perhaps you're thinking about how great it would be to eat an ice cream cone while sitting on a couch with a glass of wine and a red warm cup of coffee. Write down those things that you like and put them in your name.When it comes to the cute ways to write your name on paper, say your name backwards. There's no need to go out and buy a pen or pencil just for this purpose. Simply write your name backwards with all of the accented letters in the middle first, then type it.As another cute ways to write your name on paper, you can write down your name in reverse order. When you first heard of the practice, they were used by people who couldn't spell their names properly. They wrote down the name backwards, but it is now a universal way to call yourself. You can do this with any name you want to make sure that the other person knows exactly who you are. You can also do this for yourself so that you remember that you're still that person.Write your name backwards if you want to. Say it and do it. It makes sense. Say your name backwards and do it so that you are clearly the one who said it and done it. Your handwriting is going to look the best when you say it backwards.There are other great ways to do this on paper. Say your name three times and put a space b etween each word. Your hands will be moving too quickly.Another way to do this is to make sure that the space between words is the same. This way you have one space and three words and you're going to make your name the easiest it can be to remember.

Friday, August 21, 2020

Research esssay on the wire and its interpretation of corrupt Essay

Research esssay on the wire and its understanding of degenerate establishments all through the arrangement - Essay Example 1). All through the arrangement, it is hard to exactly pi point down what made characters like Burrell and Rawls what their identity is. The undeniable factor would be their fixation on wrongdoing rulers and their broken administration development however this won't be sufficient. We wind up observing figures like Rawls and Burrell having been changed by their institutional practices (Alasdair, 2013, p. 1). This prompts them not fitting in with the foundation while effectively duplicating another culture through their activities. As for the above point, Cedric Daniels is certainly one of the most captivating characters. From the main arrangement we know about accessibility of a specific document that has dialed data of defilement claims comparable to the fluid resources he had gained during the start of his vocation. This makes it simpler for one to name Daniels as a degenerate individual and miscreant in the arrangement. The incongruity is that he is the main character who declines to effectively continue recreating the institutional culture and sort of administration that he indicates to be coming up short (Deleuze, 2002, p. 6). Consequently, he invests more energy to set his own gauges with the expectation that youthful official like Carver can copy (Alasdair, 2013, p. 1). ... We can watch a similar multifaceted nature reaching out to different organizations in the city during the subsequent season. During this season, dockworkers are watched framing a coalition with universal organizations predominantly spoke to by the Greeks. Through the whole arrangement, the Greeks can be regarded to be the most master individuals who are regularly considered to be secretive. Towards the sensational finish of season two, one finds that he is yet to know any names of the Greeks (Alasdair, 2013, p. 1). There is much further theory that they have connections to the FBI and it is demoralizing to discover that they are not in any case Greeks. Degenerate dockworkers like Frank Sobotka helpfully lose some transportation compartments with the goal that The Greeks can utilize them in delivery their medications and sex laborers. Blunt and his kindred specialists never trouble to pose any inquiries as long as they continue accepting their cut. To them this is another wellspring o f income and a method for supporting their families. Property designers re in bed with government officials who are resolved to possess the docks, official Valchek apparently is taking the necessary steps to disregard dockworkers, this prompts a characteristic type of partnership between the Greeks and dockworkers (Alasdair, 2013, p. 1). Because of political eagerness and police terrorizing, these two establishments have normally and unequivocally pushed the dockworkers towards the lesser malevolence (Agamben, 2000, p. 13). The watcher really want to consider Frank to be as not been diverse to that of the establishments made to ensure their advantage. Some cops can be seen attempting to put forth a valiant effort for the city of Baltimore by staying at work past 40 hours. Those in position of intensity like administration appear to put forth a valiant effort in controlling specialists to lose a few cases.

Monday, June 1, 2020

Basic Of Transfer Pricing And How It Works Research - 1650 Words

Basic Of Transfer Pricing And How It Works Research Assignment (Essay Sample) Content: Part BTransfer Pricing and Performance in an OrganizationIntroductionTransfer pricing is used by an organization when the price of the goods and services being provided by the company is controlled or connected between the different legal entities between which it is traded. This process takes place within the organization itself and as the goods and services are being sold within the organization, it is the responsibility of the company itself to be able to set the price at which the goods are traded. For example, when a good is sold by the subsidiary to its own parent company, the sale has to be booked on the accounts of the subsidiary and then the parent as well (Kaplan Atkinson, 2015). The cost of goods at which the goods are sold to the parent are known as the transfer price and legal entities like a branch or department which is operating under the umbrella of the parent company is considered for transfer pricing.Transfer pricing is used for profit allocation in order to attribute the profit earned from a sale to the subsidiary and allows the company to set the prices based on the divisions which exist under the parent company (Sikka Willmott, 2010). The mechanism for setting the transfer pricing uses the arms length method where the price is one that a customer would pay to an independent supplier what they would get in the market or one an arms length customer would be willing to pay in the market.Use of transfer pricingTransfer pricing is primarily used in organizations of companies whose operations are divided into smaller departments or divisions which have a certain amount of autonomy over their functionality. Transfer pricing is used in accounting as there is a need to value the goods and services used by the company. There is a need to record all amounts and legitimate methods for calculation of value are needed to correctly represent the values involved (Perron et al., 2010). Fair value is one of the most basic measure of value where any good or service is measured based on what it would cost or would be sold for in the market which has a sufficient number of buyers and sellers.Goods and services being traded between two divisions or departments within a company cannot be measured in terms of their value to one department or another but an accounting requirement is to book it as a sale for one division while it is considered a purchase for the other department. This is needed in order to present a true and fair picture of cost and sales of both departments and the company in the end. Transfer pricing is used for that purpose as it is the value at which division A is able to sale the good to the other division and allows associating a numerical value to the transaction being carried out.Transfer price is able to allow both companies to determine their revenue and profitability in a more efficient and realistic manner. Accounting figures are mostly used for decision making by managers and these figures need to capture and encompass all the operations of a company. Without transfer pricing, the revenues and profitability of a division will not present the right picture and might distort the accounting figures (Zimmerman Yahya-Zadeh, 2011). Based on the assumptions being used by the accountants or ones interpreting the financial information, accounting data might be used to present a disfigured picture of the company or its branches which need to be corrected before any sort of decisions are made on them.Application of transfer pricingTransfer pricing is always used when an organization is divided into multiple departments or divisions and there is a constant of flow of goods and services being traded between all the divisions. There is a need for the divisions to be able to report their sales and performance separately. The accounting system being used at the organization will look to make sure that the goods and services leaving their department are considered as being as the sales f or their own department. In order to record them properly, they will need a monetary value for the transaction (Pfeiffer et al., 2011). This monetary value is negotiated between the two departments or can be determined by the head office of the company itself in order to allow the departments or the divisions to be able to report their earnings and profits.Quantitative measurement of performanceTransfer pricing is key in order to determine the performance of the company. Once the revenue or profit has been determined, the success of the division can be determined in a much better manner. In the most basic manner, the company can look at the absolute and relative profit that the division is earning. This can be considered one of the most basic measures as it shows how much profit a division is earning and whether it is profitable to the company or not. This is a very robust measure to show profitability of a division but can be developed further (Grant, 2011; Lohse et al., 2012). Th e relative performance can be measured by looking at the return on investment (ROI) of the company itself. This is the amount of profit the division is able to earn based on the investment that has been made in that division. This allows the company to know based on their investment, how much has been earned by the division itself.This can be used as comparable measure between the departments and lets the company determine if future profits can be expected based on the investment being carried out. In simple terms, it can be seen how much the company is able to get for each dollar it is spending. This can also show if the performance of a division was unsatisfactory for the company and whether the continuity of the division will be good for the company in the long run. Similarly, the residual value added by the project can be evaluated. Residual value is another measure which uses the context of profit being earned by the division above its cost of capital. Even though return on inv estment can be used as a measure to monitor the performance of the company, residual income is able to bring each division further into context by matching the profits to the cost of capital of the division itself (Cristea Nguyen, 2014).This shows whether the capital being employed by the company is earning enough profits and based on the capital mix at the company; the profitability is able to match compared to other departments. The last measurement of performance in terms of numerical values is economic value added. This last measure is able to see the profitability of the division above the required return of the shareholders. This is the most stringent measure as it able to see if the division is able to meet the needs and required return of the shareholders as well. Divisions which exceed this return will be considered the best performing in the company. These divisions can be used to balance out certain divisions which are not seen as being well performing but necessary for the company to maintain. These measures can be used to measure the performance of the company in numerical terms. By the use of transfer pricing, a division will be able to determine the revenue and profitability of the company which can then be used to evaluate the performance of the divisions individually (Drucker, 2010).Qualitative measures of performanceIn addition to the quantitative measures, there are also certain qualitative measures which can be used in order to measure the performance of the company. The decision to abandon or continue a division within the company uses transfer pricing in order to see how well the division is performing. For divisions which are proving to be a drain for the company, the company might decide to buy in those products from a third party rather than make them in house as it will prove to be cheaper...

Saturday, May 16, 2020

Link Between Autism And Noonan Syndrome - 1135 Words

Ghaziuddin, Bolyard, and Alessi (1994) sought a connection between autism and Noonan Syndrome. All testing done for this study was characterized as a formal assessment. They were as follows: The Wechsler Intelligence Scale for Children- Revised, Vineland Adaptive Behavior Scales, and Test of Problem Solving skills. For speech and language evaluation specifically, the Clinical Evaluation of Language Fundamentals-Revised was given. (Ghaziuddin, Bolyard, Alessi, 1994) Wilson and Dyson (1982) targeted speech and language characteristics of children with Noonan Syndrome. They used the following assessments to evaluate the speech and language development of children: The Vocabulary Comprehension Scale, Peabody Picture Vocabulary Test, and an Oral Mechanism Exam. A language sample was also taken and used to analyze pragmatic skills, semantic relationships, and phonological processes. (Wilson Dyson, 1982) Lee, Portnoy, Hill, and Patton (2005) studied the psychological aspect of children with Noonan Syndrome. All of the assessments were conducted in the child’s most natural environment, which was their home setting. The Wechsler Intelligence Scale for Children- Revised was used to test the children’s overall intelligence. This test is often used in many of these studies to obtain a type of baseline for each child. This is helpful, because then children from multiple studies can be compared as opposed to children from just one particular study. This is due to the fact that the

Wednesday, May 6, 2020

Negative Externality Pollution Essay - 554 Words

Negative Externality Pollution Negative Externality: Pollution Pollution has become a heated issue in recent years. The destruction of the environment along with serious health problems are the eventual effects. The extensive use and availability of automobiles, tremendous amounts of production in the booming economy and the constant increase in demand for energy, can be held responsible. Pollution and its effects can definitely be categorized as negative externalities. Although millions are inevitably responsible, nobody in their right mind enjoys being subjected to these conditions. Long-term affects of air pollution include chronic respiratory disease, lung cancer, heart disease, and even damage to the brain, nerves,†¦show more content†¦By limiting the amount of pollution will diminish the risk of health problems caused by these toxins. Now many industries have gotten involved with a technique called carbon trading in which those with high pollution releases buy the rights to pollute from others with low amounts of releases. This is a controversial approach to reduce pollution because it allows unnecessary amounts of pollution to be released. If companies chose to sell their rights, what they sell would not have been used in the first place; now they will be used by companies who can afford to purchase them. It is extremely expensive to purchase these rights, however some major companies can do so. In my opinion, all pollution standards should be tightened but over a period of time. I agree totally that pollution is out of hand at the current time, however it is a problem that has built up for many years and can’t be solved all at once. I feel that it is somewhat unfair to those companies who depend on their current status. By implementing procedures and regulations that are to occur over a period of time, it allows many companies to adjust gradually. I also feel that this policy of carbon trading should be eliminated. Although it does generate income for industries that currently comply, it allows many others to evade responsibility. I also feel that such things as public transportation and carpooling should be stressed. It provides an alternative that will drasticallyShow MoreRelatedPositive Vs. Negative Externalities1254 Words   |  6 PagesPositive vs. Negative Externalities An externality exists when a third party who is not directly involved in a transaction (as a buyer or seller of the goods or services) incurs a cost or benefit. In other words, an externality arises when a third party to a transaction experiences side effects (which can be negative or positive to them) due to transactions between buyers and sellers. When the third party benefits from this, it is called a positive externality and when the third party suffersRead MoreEconomics1444 Words   |  6 Pagespolluted and the government intervenes in order to control the pollution by providing economic encouragements towards the firms and organizations to reduce the amount of pollution emitted in the environment (Brown* 2001). When ETS is implemented it reduces the pollution of the environment caused by different firms thus making it its main goal. The type of market failure the ETS is addressing is the negative externalities. An externality is when the production or consumption of a good or service affectsRead MoreHow Do Externalities Affect The Market?1152 Words   |  5 PagesCarol Motley How do externalities affect the market? Introduction Externality in economic sense is the cost or benefit that affects a party who did not choose to incur this cost or benefit. Best example of externalities is the air pollution which affect the whole society even though some of the members have not caused it. If external costs for these externalities exist, such as pollution, producer may choose to produce more goods than they would have produces if there were external costs. SimilarlyRead MoreEco/365651 Words   |  3 PagesWhat is an externality? Provide at least three examples. How does one of the examples you provided affect the market outcome? What is the role of government in addressing the implications of an externality you provided as an example? Is it possible that a government’s solution to a market failure would worsen the failure? Explain your answer. Externality is defined as an effect of a decision on a third party not taken into account by the decision maker. There are two types of externalities being positiveRead MoreEquilibrium Of Supply And Demand1720 Words   |  7 Pagesa certain point. There are different factors that go into equilibrium such as supply and demand where the curves determine the cost to the consumer as well as the cost to supplier. Different costs of taxes, benefits of international trade, and externalities all go into how to maintain the supply and demand, and why it is so desirable To understand the equilibrium of supply and demand, you must first understand what each one means. Supply and demand work together to make the seller and consumer happyRead MoreMarket Failure1713 Words   |  7 Pageswhen they under or over allocate resources of production or consumption, relative to the best interests of society. Market failure occurs due to four main factors: the existence of externalities, asymmetric information, the abuse of monopoly power, and inequalities and wealth and development. The existence of externalities means that the market mechanism does not always work efficiently. Markets run on a mechanism that only takes into account the private benefit and cost for a good. Besides the marginalRead MoreEthical Dilemmas : Ethical Dilemma Essay1355 Words   |  6 Pagesposes a dilemma about whether or not to report the company’s excess water discharge into the local lake to the Ministry. Although there is a legal limit to how much water this company is al lowed to dump into this lake, there are supposedly not many negative consequences to either side of this dilemma. Because the decision of this dilemma is not so clear, it can be seen as an ethical dilemma. Marvin could save his company a lot of money and stress by not declaring the correct amount of discharge, butRead MoreExternalities Essay615 Words   |  3 PagesWhat are externalities? Externalities are common in virtually every area of economic activity. They are defined asthird party (or spill-over) effects arising from the production and/or consumption of goods and services for which no appropriate compensation is paid. Externalities can cause market failure if the price mechanism does not take into account the full social costs and social benefits of production and consumption. The study of externalities by economists has become extensiveRead MoreEconomics708 Words   |  3 Pageswhat are externalities? Externalities are common in virtually every area of economic activity. They are defined as third party (or spill-over) effects arising from the production and/or consumption of goods and services for which no appropriate compensation is paid. Externalities can cause market failure if the price mechanism does not take into account the fullsocial costs and social benefits of production and consumption. The study of externalities by economists has become extensive in recentRead MoreWater Pollution : The Slow Demise Of A Community1552 Words   |  7 PagesWater Pollution; the Slow Demise of a Community Water is essential to all life. Plants need water, people need water, other animals need water; the point being that life depends on water. For thousands of years we can see that humans all have settled near bodies of water. This allowed them to have water for drinking, coking, and cleaning as well as a very efficient mode of transportation. We must be very careful to protect our waters because they are necessary for life. In this essay I will discuss

Tuesday, May 5, 2020

Quick Survey on Cloud Computing †Free Samples to Students

Question: Discuss about the Quick Survey on Cloud Computing. Answer: Introduction: Cloud Computing has able to grab the attention in the market by the business organization. The trend of the Cloud Computing has been increasing among the operational management of the business organization. This have helped in implementing the cloud services in the business organization. The concept of the cloud computing has been discussed with its benefits in the business organization (Almorsy, Grundy Ibrahim, 2014). Various cloud models are properly explained with diagrams. However, development of the cloud services have given rise different cyber threats in the business organizations. This security threats are discussed with proper solution to it. Cloud Computing is a set of resources, which is in demand in the market. Different new ways of business and services are proposed by the Cloud Computing. Therefore, this innovation have provided various opportunities and changes in the operation of the business organization. It has provided distributed data centers all over the world. The cloud computing have helped in creating a virtual world of services and proper delivery of it. Different companies are providing cloud-computing services including Google Engine, Oracle Cloud, Amazon Web Services and Office 365 (Almorsy, Grundy Muller, 2016). These companies have successfully provided cloud services to different organizations and users in all over the world. Cloud computing have created a web based network that initializes different online services to customers and organizations all over the word. Cloud Computing is distributed architecture, which helps in centralizing server resources on scalable platform and provide on demand com puting resources. Cloud computing helps in providing in demand service to the customers. The hackers access databases in cloud environments with the help of hacking techniques including session hijacking and network channel eavesdropping. Cloud computing has accelerate the growth of the company by empowering the workforce and transforming the business operations. The solutions have been developed by the cloud computing that signifies the vision of the company with maximum flexibility and minimum risk (Au, Fung Tses, 2016). Most of the business organizations are using the cloud services to meet requirements of the clients and employees of the company. There are has been logical progression in demand of cloud computing in market. Features of Cloud Computing There are various features of the cloud computing that are discussed below: The cloud computing has able to provide on demand services to the customers. The availability of cloud services have helped in meeting the requirements of the customers in market. The cloud computing services are available and accessible from any part of the world. Therefore, it helps in providing location independent services all over the world. The resources of the cloud computer can be accessed from anywhere on the demand of the user. The cloud computing have able to provide elasticity in its services by scaling up and down to minimize the time required for availing the resources of cloud computing. The cloud services that are shared with public and can be modified and accessed by any user is known as public cloud (Almorsy, M; Grundy, J; Muller, 2016). The data and information stored in the pubic cloud can be used by any user in the organization. Therefore, the security in the public cloud is preferably less than other cloud types. This type of the cloud provide the most secured services to the customers. The data and information stored in the private cloud is not shared with other parties (Hussain et al., 2017). This cloud might be organized by an organization for storing their private and important documents and information over the cloud. The private cloud is an expensive service due to its high security systems. Hybrid cloud is combination of different cloud architecture including public, private and community cloud. Different organization use this type of cloud according to their needs. Some data and information are shared with the customers and employees that are stored in the public cloud (Abdallah et al., 2017). The confidential data and information are stored in private cloud. Therefore, organization have flexibility of using their own cloud architecture according to their needs. The community cloud deals with the sharing of the cloud services between the organizations of the same community. This cloud is maintained by third party or by organization (Demchenko et al., 2017). The community cloud infrastructure can be internally and externally fixed that helps in providing the cloud services to the community. Community cloud consumers look for economies of scale while at same time minimizing costs related with private clouds or hybrid clouds and public clouds Service Model of Cloud Computing Cloud computing services models helps in providing various services to the customers and organization according to their needs and requirements. The common service models of cloud computing are discussed below: User used to avail all the infrastructure of the computer system through internet. This service is known as Infrastructure as a service (IaaS). There are various web based databases and architectures provided by cloud computing that helps in meeting the infrastructural requirement of user and organization (De Carvalhoet al., 2017). Therefore, the cloud computing has able to provide database, backups, networks and other infrastructural facility to the companies through internet. This has increased the versatility of the cloud computing in the computer organization. The benefit of the IaaS is that the user only pay for actual use of infrastructure. Platform-as-a service (PaaS) helps in providing platform where any software can be made, modified and executed for testing purpose. This platform can help in operating the entire life cycle of the software. The service model is suitable of application developers, testers and administrators in an organization. PaaS includes the environment for developing, compiling, testing and programming languages for modifying the required changes in the software (Perez Kumar, 2017). Therefore, the cloud computing us able to provide these services to the companies at a low cost online. Therefore, the company can use these services online from any server and place. This is one of the most used services used by the users and organization in the market. Various software are costly in the market that a business cannot afford for use. Therefore, cloud computing helps in providing this costly software at a low cost for rent. Various software and applications are rented on a monthly basis as per the requirement of the company in the market. Therefore, this reduces the initial cost of the company for stating the business (Burns et al., 2017). For example, Gmail is a SaaS provider that helps in providing free storage up to a limit for the users. SaaS helps in eliminating all the possibilities of installing and maintaining software and application for organization. Therefore, it helps in reducing the cost of the software for organization in the market. Market Size of the Cloud Computing Cloud computing has been enhancing among business organization in the market. According to the study reported by Forbes, global market of enterprise cloud-based services have grown from $12.1 billion in 2010 to $ 35.6 billion in 2015. Growth rate has been 43 % in 2011 and decreased to 13 % over the next five years (Cloud Security Alliance, 2017). SaaS have 70 % revenue in 2010, 30% is related with the IaaS. As per the report of the IDC, revenue from public IT cloud services exceeded $ 16 billion in 2009 to $ 55.5 billion in 2014. The worldwide spending on the pubic cloud services has grown up to 19.4 %. The Compound Annual Growth Rate has been nearly $70 billion in 205 to more than $141 billion in 2019 (Luitinfotech, 2017). Worldwide Public IT Cloud Service Revenue in 2018 is predicted to be $127B. SaaS and PaaS portion of cloud hardware and infrastructure software spending are projected to reach $55 billion in 2026. Cloud Security Issues The use of the cloud computing have helped in development of organizations. However, it has faced various security issues over the internet. Some of the main security issues are discussed below: Confidentiality refers to set of rules and regulation that monitors the working and functionality of the tools and techniques used in the cloud computing these of the security measures for securing data and information has been continuously lacking in case of cloud computing. Therefore, confidentiality refers to securing data and information of customers and organizations in the market. The use of personal information of users is not acceptable in the organization. The security of data and information of customer is the prior thing for organization (Cimler et al., 2015). The cloud computing has helped in storing the personal data over the cloud storage. However, there have been many cases of data breach from the cloud storage over the internet. The security protocol of the cloud computing has been attacked by the hackers over the internet. The cloud computing consist of three layers including Software layer, Platform layer and Infrastructure layer. The Software layer provides interfa ce for user to use services of cloud computing. The platform helps in providing platform and environment for executing software by developer (Coppolino et al., 2017). The infrastructure layer helps in providing the hardware components including network and storage. Therefore, the hackers can attack at any of the three layers for accessing the data and information of the company over the cloud. The storage of the data an information at the remote location with the help of cloud computing might causes issues in the organization. The location of the data and information is only known by the data owner. Therefore, in the absence of the data owner, data and information is unable to access by the organization in emergency cases (Coughlin, Keller Wustrow, 2017). Therefore, threats to availability of the data and information is prevailing in the organization with use of cloud computing. The cloud computing is responsible for providing on demand services to the customers. Therefore, in the absence of the data owner, it can fulfill the requirement of the clients that violates the Service level Agreement for the cloud computing. The integrity of the data and information is an important in maintaining the database of the cloud. It is good process for storage of data in a secure way persistent data storage, which can be, reclaim or retrieved in same layout, as it was stored later (Dang-Pham, Pittayachawan Bruno, 2017). Therefore, integrity and monitoring of the data and information for minimizing data corruption and data crash in the server. Virtualization and multi tenancy Virtualization and multi tenancy are the two basic factors in use of the cloud computing in the business organizations. The traditional way of hosting applications involves the use of operating system on physical layer. Therefore, thus type of traditional hosting method has been used for creating a functional efficient cloud. These can be achieved with the help of linking multiple servers using Virtual LAN (VLAN) (Dave et al., 2017). However, this process is insecure and inefficient for long term, as huge part of physical hardware is not used. Therefore, Virtualization has helped in maintaining these issues in the cloud computing the Virtual Machine Monitor (VMM) has been created for a single physical server that can host multiple server at a time in the operating system (Mohammad, Kak Alam, 2017). Therefore, a single server can act as multiple processing server at a time. It has enhanced the efficiency of the hardware and enhancing its performance. The virtual layer is also known a s hypervisor. Two ways of using this hypervisor for running virtual machines (VM) (Krishna et al., 2016). These are known as full virtualization and paravirtualization. A VM deployed using full virtualization has emulating BIOS and drives of the OS, in addition to the other functions. There are two architectures for deploying virtual machines hosted architecture. The hosted architecture, the virtual layer is handled by server. The application is charged for keeping up the virtual machines in the operating system. However, the hypervisor architecture skips operating system and runs directly on hardware. Multi tenancy helps in allowing multiple sharing if the computing resources in logical separation of the users in the tenant of a system. In the context of cloud computing, each virtual machines are consider as a tenant of the system (Lin Liao, 2017). Multi tenancy is not limited to the multiple virtual machines that are running in the same hardware. Software and applications are able to use multiple tenants for enhancing the efficiency of the virtual machines in the operating system. In IaaS cloud models, users create new drives on virtual machines and store data on those drives (Luna et al., 2017). However, data in all three-cloud models can be accessed by unauth orized employees and external hackers. Data Encryption Schemes Various security issues discussed in the earlier sections. However, there are some solutions for mitigating the issues in the cloud computing related to security of the data and information. The Proxy Re-encryption is cryptographic scheme that translate cipher texts from one encryption key to another key. After that, PRE forwards encrypted messages without showing clear text to the potential users. A proxy re-encryption algorithm translates a cipher text under a public key PKa to cipher text PKb along with re-encryption key RK A B. In this encryption scheme, IP address or email addresses can be used to formulate public keys for users. The sender uses recipients identity as the public key to encrypt messages in identity based encryption technique. The proxy requires proxy keys, or re-encryption keys, to perform translations without being reading original message (McCormac et al., 2017). The IBE technique has various practical applications including attribute-based delegations, secure email forwarding, and access control in networked file storage. This encryption scheme deals with a proxy server that helps in maintaining additional information that can be transform into cipher text under various attributes into a new cipher text on the same message. Therefore, the data provider might get the original text that helps in sharing the cipher text in the message. In this scheme, private key user has an asset of attributes that helps in providing encrypted cipher text that might specify an access policy (Modi et al., 2013). In this scheme, the data is encrypted in the storage on various server that helps in maintaining back up for the original text and message. In a key private PRE, the proxy and set of users are never derived by message recipient from cipher text and public keys. This scheme helps in helps in providing key privacy for proxy re-encryption schemes in which proxy performs all translations that cannot distinguish the identities of participating parties (Mishra, 2017). It can be concluded that the use of the cloud computing in the business organization have helped in maintaining the development of the organization. The benefits of cloud computing has been discussed properly. The growth of cloud computing in market has been rapid due to its on demand services provided to the customers. The use of the cloud computing has helped in maintaining the business goals and objectives of the company in market. The security and privacy of the data and information has been properly maintained by the cloud computing by using various strategies. The virtualization technique in the operating system has helped in enhancing hardware of the computer system. The use of the virtualization process has helped in maintaining the performance if the operating system in the computer system. Various encryption technique has been discussed in the assignment for mitigating the security issues in the cloud computing. References Abdallah, E. G., Zulkernine, M., Gu, Y. X., Liem, C. (2017, July). TRUST-CAP: A Trust Model for Cloud-Based Applications. In Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual (Vol. 2, pp. 584-589). IEEE. Almorsy, M., Grundy, J., Ibrahim, A. S. (2014). Adaptable, model-driven security engineering for SaaS cloud-based applications. Automated software engineering, 21(2), 187-224. Almorsy, M; Grundy, J; Muller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. Au, C. H., Fung, W. S., Tses, A. (2016). An investigation on the relationship between control self-assessment, cloud security, and cloud-related business performance-using partial least squares. In Industrial Engineering and Engineering Management (IEEM), 2016 IEEE International Conference (pp. 1879-1883). IEEE. Behl, A., Behl, K. (2012). An analysis of cloud computing security issues. In Information and Communication Technologies (WICT), 2012 World Congress (pp. 109-114). IEEE. Burns, A. J., Posey, C., Courtney, J. F., Roberts, T. L., Nanayakkara, P. (2017). Organizational information security as a complex adaptive system: insights from three agent-based models. Information Systems Frontiers, 1-16. Cimler, R., Matyska, J., Balk, L., Horalek, J., Sobeslav, V. (2015). security issues of mobile application using cloud computing. In Afro-European Conference for Industrial Advancement (pp. 347-357). Springer, Cham. Cloud Security Alliance (CSA)s Security Guidance for Critical Areas of Focus in Cloud Computing (2012). CSA, April 2012. Available Online at: https://cloudsecurityalliance.org/csaguide.pdf. Coppolino, L., DAntonio, S., Mazzeo, G., Romano, L. (2017). Cloud security: Emerging threats and current solutions. omputers Electrical Engineering, 59, 126-140. Coughlin, M., Keller, E., Wustrow, E. (2017). Trusted Click: Overcoming security issues of NFV in the Cloud. In Proceedings of the ACM International Workshop on security in Software Defined Networks Network Function Virtualization (pp. 31-36). ACM. Dang-Pham, D., Pittayachawan, S., Bruno, V. (2017). Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Computers in Human Behavior, 67, 196-206. Dave, D., Meruliya, N., Gajjar, T. D., Ghoda, G. T., Parekh, D. H., Sridaran, R. (2017). Cloud security Issues and Challenges. In Big Data Analytics (pp. 499-514). Singapore: Springer. De Carvalho, C. A., de Castro Andrade, R. M., de Castro, M. F., Coutinho, E. F., Agoulmine, N. (2017). State of the art and challenges of security SLA for cloud computing. Computers Electrical Engineering. Demchenko, Y., Turkmen, F., Slawik, M., de Laat, C. (2017). Defining Intercloud security Framework and Architecture Components for Multi-Cloud Data Intensive Applications. In Cluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM International Symposium (pp. 945-952). IEEE. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57-65. Krishna, B. H., Kiran, S., Murali, G., Reddy, R. K. (2016). security Issues In Service Model Of Cloud Computing Environment. Procedia Computer Science, 87, 246-251. Kshetri, N. (2013). Security and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), 372-386. Lin, I. C., Liao, T. C. (2017). A Survey of Blockchain security Issues and Challenges. IJ Network security, 19(5), 653-659. Luitinfotech. (2017). Cite a Website - Cite This For Me. Luitinfotech.com. Retrieved 23 November 2017, from https://www.luitinfotech.com/kc/what-is-cloud-computing.pdf Luna, J., Taha, A., Trapero, R., Suri, N. (2017). Quantitative reasoning about cloud security using service level agreements. IEEE Transactions on Cloud Computing. McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M. . (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151-156. Mishra, A. (2017). Cloud Computing Models: Background, Data security, security Issues. Journal of Web Development and Web Designing, 2(1,2). Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. Mohammad, A., Kak, S. M., Alam, M. A. (2017). Cloud Computing: Issues and security Challenges. International Journal, 8(2). Perez, M., Kumar, S. (2017). A Quick Survey on Cloud Computing and Associated Security, Mobility and IoT Issues. Journal of Computer and Communications, 5(12), 80.