Preview

Engl 200 Unit 2 Analysis

Good Essays
Open Document
Open Document
799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Engl 200 Unit 2 Analysis
Benjamin Carter
Hannah Baker
ENGL 200
October 15, 2013
Unit 2 Essay
Many campuses have issues between smokers and non-smokers; Kansas State University does not escape this. Many people on campus are bothered by smoking and smokers. This has led to a call for further smoking restrictions. In 2010 Joshua Madden wrote an editorial in the Kansas State Collegian against more restrictions on smokers. In the article, Madden argues that further restrictions against smokers are unnecessary since the effects of secondhand smoke outdoors are negligible, since smoking is a lifestyle choice similar to eating fatty foods K-State should not regulate it, and smoking is limited enough at K-State to add further limits. Further restrictions on smoking on campus are necessary because outdoor secondhand smoke is still very harmful, unlike eating fatty foods, smoking effects the health of others, and the places one can smoke on campus are not truly restricted or enforced. In my opinion, Kansas State should define smoking areas, and move them away from high traffic areas.
…show more content…
Secondhand smoke, no matter indoor or outdoor, is very harmful. According to the EPA secondhand smoke is a “known human carcinogen”, meaning that secondhand smoke is known to cause cancer (Cancer). So obviously, secondhand smoke is harmful, but is outdoor secondhand hand smoke? According to a study done by the University of Georgia, even secondhand smoke can increase the amount of carcinogens in a person’s body (Balmes et al.). So even outdoors, secondhand smoke is still damaging to a person’s health. Moving smoking areas away from high traffic area, such as Bosco Student Plaza, would increase the health of not only the students, but faculty and staff as

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The following IP schema is designed to fit the needs of the Warehouse Company. The company has purchased and installed all of the required equipment for the network infrastructure. After consulting with their design team and gathering the required documentation and network designs, we are ready to proceed.…

    • 248 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    No the supervisor isn't right because Mark and Jean can fill the pool less than ten hours.…

    • 104 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Sociotechnical systems theory was created by researchers in human relations in the early 1950s. They found the two were important and needed for the effectiveness of businesses could reach higher potential when they focused on having the internal workplace and the external of the business (the customers) all uniform. Sociotechnical systems theory is when organizations are effective. This is broken down into two parts: social and technical. The employees make sure they follow orders correctly are the social part. The technical part is having right training knowledge and tools so the business can be productive and effective in making sure the customers are happy and return consistently. Social technical systems theory was started being used by Japanese companies which integrated technical systems and management to achieve high performance. Large U.S. automakers like Ford and Chrysler also started to look this way. They wanted to understand how the Japanese were applying these tactics to make their business and their products achieves.…

    • 711 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Eng110 Unit 3 Assignment

    • 1079 Words
    • 5 Pages

    M is off center and above eye level in the shot as well as the little girls reflection in the mirror.…

    • 1079 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Pt1420 Unit 1 Assignment 2

    • 1305 Words
    • 6 Pages

    Das, D., Gregersen, E., Hosch, L., Lotha, G., Sampaolo, M., Sinha, S. (2014). C++. In Encyclopedia Britannica.…

    • 1305 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Solution: The update also removes the ability for this codec to be loaded when browsing the Internet with any other applications. By only allowing applications to use the Indeo codec when the media content is from the local system or from the intranet zone, and by preventing Internet Explorer and Windows Media Player from launching the codec at all, this update removes the most common remote attack vectors but still allows games or other applications that leverage the codec…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    u07a2 Unit 7 Assignment 2

    • 1193 Words
    • 4 Pages

    Wallace Design Group owned by Kevin Wallace is an architectural services company. The location is in Farmers Branch, Texas. Kent Wallace, the marketing director, resides in California and remotely operates in the office. The organization is very small, yet group communication is very poor.…

    • 1193 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 8 Assignment 2

    • 1088 Words
    • 3 Pages

    Centralization sums up my primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big your client’s network has become. If you've worked with Windows NT before, you know that in Windows NT a domain is a completely independent entity. While it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains.…

    • 1088 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are several roles within the health information management (HIM) profession. A HIM professional gathers, preserves, evaluates and guard’s personal health information within many different health care settings. One of the most important duties in regards to a HIM professional is ensuring compliance and upholding the current regulations in the health care industry. This paper will take a closer look at the specifics of what a HIM professional does to ensure compliance as well as the importance of education and certifications that many employers are now requiring for potential candidates in the HIM field.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server.…

    • 506 Words
    • 3 Pages
    Good Essays