Wednesday, February 26, 2020

Mobile Phone Use and Distraction while Driving Assignment

Mobile Phone Use and Distraction while Driving - Assignment Example This involves both innocent lives of school children, pedestrians and passengers traveling in crashing vehicles. Others involved are inside buildings upon car crashes when navigating away from the roads for an expected situation. The other category is those who survive from crash injuries. They either receive minor injuries like scratches and intense bruises and sometimes treatable minor body fractures, or the accident leaves them with permanent damage. Physically permanent body injuries could be a damaged spinal cord, amputated legs, paralysis, major brain injury, which could put the victim on a wheelchair all his life, or impair brain function for coordination. All these injuries could translate into costly medical expenses to treat or maintain where impossible to correct, which is another financial burden. Destruction of private and public property that costs the taxpayers’ money to put up or to own are either partially or fully destroyed. Most of the serious car crashes on highways render the vehicles unusable or irreparable. Most of these vehicles result to waste in scrap metals sites in the USA, while minor bends cost more to repair. If properties outside the road are affected too, owners could claim damages for loss of properties. Human-Related Errors that cause Car Accidents Cell phones: Handheld cell phones are recklessly used anywhere without people taking any measures to control themselves. With the advent of new technology smartphones, the majority of the driving youths have this irresponsible use of gadgets. Most cars and trucks accidents, 22 and 71 percent respectively, meet distracted drivers on cell phones chatting, texting, reading messages, or calling (CARRS 1). It is advisable that drivers avoid taking phone calls while driving because it risks causing accidents. If the issue is urgent, they can stop by the roadside and communicate in a rush, rather than trying to handle two tasks at the same time, which is usually disastrous.

Monday, February 10, 2020

Logical Fallacies; Argument Structure Assignment

Logical Fallacies; Argument Structure - Assignment Example It creates the notion that the public sector entities are knowledgeable on cyber security issues as compared to modern enterprises because of the period of service covered (over a decade). Appeal to belief is evident in that assumption because Microsoft attempts to rule out the viability of enterprises in tackling cyber security because they are modern organizations. The target market gets the impression that the ‘older’ company stands a better chance to handle cyber security issues. In addition, Microsoft claims that public sector entities have tackled multiple national and local threats; hence, stand a better chance to handle cyber security threats. Such an assumption indicates misleading vividness. Despite having the experience with cyber security concerns, Microsoft ought not to rule out modern enterprises in their attempt to handle such concerns. Modern enterprises can offer a lesson to the public sector entities regardless of their period of operation. In the adver tisement, Microsoft employs an appeal to fear by claiming that tables may have turned when it comes to matters of security best practices. Such an assumption attempts to overrule the general belief that public sector entities can derive important lessons from modern enterprises. The target market gets the impression that though the modern enterprises offer valuable lessons to public sector entities, the public sector entities are invincible in matters of cyber security. Logical fallacies exist in every research or argument. People utilize logical fallacies to satisfy their arguments; hence, establishing subjective arguments and judgments. However, it is important to be aware of logical fallacies. In the Microsoft advertisement, the company attempts to market its security services to the target market. With the increase in cyber security threats, individuals and organizations worry about the security of their databases and key technologies. Microsoft