Saturday, December 28, 2019

Misconceptions of Muslim Women - 810 Words

In society, there are some misconceptions about who Muslim women are and the identity they have. Through hasty generalizations, Muslim women are often depicted as being only Arab, figures of oppression, and being poles apart with everyone. Popular media fails to recognize the diversity in this group in terms of race, ethnicity, nationality, cultural norms, gender role, education attainment level, occupation and upbringing. I believe that the intersection of social inequalities in these identifying components has rendered Muslim women invisible in society. Description: In the first picture, there is a group of four women wearing black veils-known as the niqab- over their faces. In the second picture, there is another group of three women who are all wearing the niqab also. The third picture shows three women who are all wearing the niqab and the abaya- a long, loose garment that looks like a dress. The fourth picture shows two women who wearing the niqab and the abaya. In the fifth picture, there is one woman wearing a gray hijab with green eyes. The sixth picture and the seventh picture shows a women wearing the niqab. The pictures are zoomed into their faces, focusing on their eyes. In eighth picture, there are four women who don’t have their faces covered. They are wearing chadors- a long garment that covers the head and body. The ninth picture shows one man with a sword and a group of women with their hands tied. They are completely covered, includingShow MoreRelatedMuslim Women Essay943 Words   |  4 Pagesportray Muslim s in a negative light. Some pity Muslims while others feel pure disdain for them. This statement made by Ann Coulter (2001) following the September 11th terrorist attacks demonstrates the disdain for Muslims, â€Å"We should invade their countries, kill their leaders and convert them to Christianity† (as cited in Arab American National Museum, 2011). While this particular statement was directed at all Muslims, there are also many misconceptions directed solely at Muslim women. In thisRead MoreMuslim Women Are Oppressed By Their Religion Essay1272 Words   |  6 PagesIntroduction It appears that there is often a general misconception about Muslim women in Australia; therefore, this investigation will discuss whether or not Muslim women are oppressed by their religion. Oppression is the use of power and control to treat people in an unjust and cruel manner (Merriam Webster 2016). According to the Quran 2016, Islam is a religion of peace, submission, purity and obedience to the wording of Allah (God), which is an Abrahamic, monotheistic faith. Islam is the secondRead MoreThe Middle East And West Perceive Each Other1158 Words   |  5 PagesAfghanistan, many Muslims and Westerners know that they have developed bad relations these days. The media continuously portrays the Middle East as nation filled with terrorist whilst the West are portrayed as the nation that is trying to make peace. There have been so many misconceptions that have made both cultures create a barrier between them because of how both cultures are portrayed through the media. Many in the West, view Muslims as fanatical, violent and as lacking tolerance. Muslims in the MiddleRead MoreMedia Portrayal of Islam Essay760 Words   |  4 PagesIslam: suppressor of women, enemy of Western nations, and breeder of terrorists. The West has many stereotypes and misconceptions about Islam that are due to the media, prejudice, and ignorance. Islam is often seen as an extremist or terrorist religion. Often, the medias reports about Islam are incorrect due to ignorance or not wanting to acknowledge its true teachings. This is one of the reasons why Westerners are often wary of Muslims. In contrast to what the media portrays, Islam is a peacefulRead MoreMuslim Women: Treated With Oppression Or Fairness?. When1429 Words   |  6 PagesMuslim Women: Treated With Oppression or Fairness? When I mention Islam, I am discussing its way of life, a concept that encompasses every aspect of one’s life from beginning to end. Islam, the newest and second largest faith, influences many parts of this earth as we discussed in class. Originating in the Arabian Desert, the religion is based on one book, The Holy Quran, the final word of Allah. Prophet Muhammed, in Islam, was the last messenger of God. His life is one that Muslims should followRead MoreThe Role Of Muslim Women During The Islamic World1564 Words   |  7 PagesThe role of Muslim women in the Islamic world is one has been widely discussed criticized by many people. The most common perceptions are of women living under the oppressive dictatorships of their husbands, forced into marriage, and constantly covered under the veil. The discussion of Muslim women and their roles are an important, firstly because there have been many misconceptions by non-Muslims which needs to be corrected and addressed. Secondly, s ome Muslim countries treat women unjustly inRead MoreThe Veil Is A Symbol Of Religion1312 Words   |  6 Pages In Islam, many women choose to wear a type of veil for religious reasons. A female that covers her head may be deemed as a pious and modest individual. However, there are multiple explanations for why the veil became such an important symbol in the Islamic community as well as across the globe. Despite the fact that a veil is a rather simple object, it is nonetheless full of symbolism and rich history. Unfortunately, this symbolism and history is often ignored by the non-Muslim world. When the reasonsRead MoreWomen Are Oppressed And The Middle East890 Words   |  4 Pagestreatment for women? Do you think of terrorist? There a lot of stereotypes when we think about the Middle East. Sometimes, we cannot always believe what we hear on the news. The stereotypes that we commonly use is that women are being oppressed, and the whole country is filled up with terrorists. Why do we think that women are oppressed in the Middle East? One way that we could think that s women are oppressed is because they are being treated unequally from the men in the Middle East. Women are inferiorRead MoreMuslims Women’s Rights to Practice Their Religion Essays1085 Words   |  5 Pagesheadscarves. France bans Muslim women who wear the hijab from going to schools or even having jobs. In the Islamic countries like Saudi Arabia and Iran, women are forced to wear head scarves. Other countries like Turkey and Tunisia ban whoever female works in the education field from covering her head. The hijab is a symbol of being Muslim, and it should it be left to the Muslim women to wear it or not. French, Turkish, and Tunisian should ask themselves the question, why do we have Muslims here? The answerRead MoreThe Muslim Community1163 Words   |  5 PagesThe Muslim community has faced many microassaults, microinsults, and microinvalidations in America. The microassaults reflect the conscious discrimination about a population. Many of the microassaults consisted of people stating that Arabs or Middle Eastern citizens are terrorists. Because of September 11, 2011, many have condemned one group of citizens as the reason for war in America. The microinsults consisted of every Muslim that comes to an airport being required to be checked, in hopes of safety

Thursday, December 19, 2019

Financial Statements And Evaluating A Corporation Essay

Using Financial Statements to evaluate a corporation The basic financial statements are the primary means for providing information of the company and are prepared from the balances of the accounting records of the company at a given date. Classification and summary of accounting data are properly structured financial statements. These are Income Statement, Accounting Profit, Economic Profit, and Balance sheet. The main objectives of financial statements are to help managers of an organization to determine whether decisions about funding were most appropriate, and thus determine the future of investments. Understand the elements that can be used to compare financial ratios and different analysis techniques that can be applied within a company. Describe some of the measures that should be considered for decision-making and alternative solutions to the various problems affecting the company, and help planning the direction of investments made by the organization. Using the most common reasons to analyze liquidity and activity of a company. Analyze the relationship between debt and financial leverage presenting the financial statements. Assess profitability. Determine the position held by the company in the competitive market in which it operates. Provide employees with enough information they need to keep them informed about the situation under which the company works. Financial statements ar e very useful to compare the current status of different companies in the market. ByShow MoreRelatedThe Financial Health Of Is Wal Mart1193 Words   |  5 PagesThe company I will be evaluating the financial health of is Wal-Mart. Wal-Mart Stores Incorporated, manages chains of merchandising retailers in the United States of America as well as external retailers in the United States of America. In a duration of five years, Sam Walton opened additional retailers and the number of retailers enlarged to twenty-four retailers through Arkansas. Sam Walton released the first Wal-Mart store in Arkansas, United States to the public, in 1962. The merger of Wal-MartRead MoreResponsibilities Of Meghan Kenney Auditing1516 Words   |  7 Pageswhether the financial statements are free from material misstatement, whether caused by error or fraud. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting pr inciples used and significant estimates made by management, and evaluating the overall financial statement presentation. The procedures selected depend on our judgment, including the assessment of the risks of material misstatement of the financial statementsRead MoreThe life of a hobo1508 Words   |  7 Pagesdell-inc-evaluation-of-client-business-risk/...‎ Auditing Case 2 2 Dell Inc Evaluation Of Client Business Risk Essays and Term Papers. Search Results for ... Auditing Cases: 2.2 Dell Computer Corporation . Dell Computer Corporation Evaluating Client Business Risk Free ... www.papercamp.com/group/dell-computer-corporation.../page-0‎ Dell Computer Corporation Case 2.2: financial statements therefore the auditor does not have the responsibility to identify or assess all business risks (AICPA, ... Dell Inc Evaluation Of Client Business RiskRead MoreThe Role Of External Auditors On Public Financial Statements1446 Words   |  6 Pagesimportant roles in delivering cred ibility of public financial statements to stakeholders outside of the audited firms (The Institute of Chartered Accountants in Australia, 2008). Published financial statements can be used by stakeholders as a basis for evaluating the financial position of firms, analyzing the performance of management, or making investment decisions (International Organization of Securities Commissions, 2002). Published financial statements will also be used by institutions such as ratingRead MoreQuality Of Earnings For Major Corporations Essay877 Words   |  4 PagesThis paper examines the quality of earnings for major corporations. The quality of earnings is an ongoing operation of corporations and other business alike, because the value of a business is the current and future earnings of the firm (Schroeder et al, 2011). These earnings are usually updated quarterly by a firm’s financial analyst, which provide this for investors and other users of financial information to make decisions a bout a firm’s financial position in the market. However, there are some differencesRead MoreAccounting Theorist Economist Recommending1112 Words   |  5 Pagesrecommending to deregulate GPFR This memo is in response to Mr. Dewey’s concern regarding large businesses asking for discount in their audit fees many positivist accounting theorists and right-wing economists recommend that general purpose financial statements (GPFS) be deregulated because they think that market forces can control the quality of GPFS. Background Research This research is on vital issue of deregulating GPFS its effect on the national economy. The key features of accounting standardsRead MoreQuality Of Earnings For Major Corporations1242 Words   |  5 PagesThis paper examines the quality of earnings for major corporations. The quality of earnings is an ongoing operation of corporations and other business alike, because the value of a business is the current and future earnings of the firm (Schroeder et al, 2011). These earnings are usually updated quarterly by a firm’s financial analyst, which provide this for investors and other users of financial information to make decisions about a firm’s financial position in the market. However, there are some differencesRead MoreGleim Study Unit 4 Multiple Choice1692 Words   |  7 Pagesbusiness purpose of the transaction. In auditing related party transactions, an auditor ordinarily places primary emphasis on The adequacy of the disclosure of the related party transactions. Subsequent to issuing a report on audited financial statements, a CPA discovers that the accounts receivable confirmation process omitted a number of accounts that are material, in the aggregate. Which of the following actions should the CPA take immediately? Perform alternative procedures to verifyRead MoreStandards Based Decision Making1589 Words   |  7 PagesMaking Green and Associates is the CPA firm retained by the ABC Corporation to handle their external auditing duties. The auditing team at Green and Associates took time to review aspects of ABC’s finances and had some questions regarding their client’s monthly statements that made them a little uneasy. Items such as their inventory valuation methods not to mention, Green’s new client will not submit to an audit of internal financial controls. With all of the issues that Green and Associates are encounteringRead MoreWhat Makes A Cpa Firm? A Competitive Professional Field, And The Most Cpa Firms?997 Words   |  4 PagesCPA firms are anxious to obtain new clients. The client acceptance of engagements procedures can be done easily done through business transactions, however, it depends on the firms’ desire whether to establish client and auditor relationship after evaluating the risk associated with a client and maintaining the integrity of the securities. There a re not any CPA firms would have business transaction with someone who have engaged in fraudulent activities and misleading business practices that might create

Wednesday, December 11, 2019

Case Study on Soft Arc Engineering †Free Samples For Students

Question: Discuss About The Case Study On Soft Arc Engineering? Answer: Introduction The report depicts the importance of changing a business platform towards hybrid cloud for increasing the overall business efficiency and for gaining the measurable market revenue. After deep investigation the traditional business and cloud architecture can be compared. In order to assist SoftArc Engineering the most suitable cloud architecture that must be employed is elaborated in this report. In addition to this, the benefits and issues associated to the cloud architecture and the reasons behind its in deployment in SoftArc Engineering are also elaborated in this report. However different risk also might occur during the implementation. In order to mitigate the challenges in terms of risks certain control strategies are needed to be developed. Those are also illustrated in this report. Apart from the security steps, a brief recommendation including the companies BCP as a result of hybrid cloud adaptation are also discussed. In order to conduct the proposed IaaS and PaaS Remote server administration, Resource management and SLA management processes should be considered. While making movement towards SharePoints instance to AWS cloud different issues and their mitigation strategies are also illustrated in this report. Description of the cloud architecture that would employ to assist SoftArc Engineering to meet the Boards strategy Software as a Service (SaaS) is referred to as the most suitable cloud architecture that should be employed in SoftArc Engineering (Kaur et al., 2015). This delivery model provides proper license to the company leader, for using the required software whenever required. Not only this, but also the overall management cost also get reduced after the implementation of SaaS cloud model in SoftArc Engineering. Description of the architectures that would be used After investigating the products and services of SoftArc Engineering it has been found that SaaS is the most suitable cloud architecture for gaining measurable market revenue and competitive advantages as well (Puthal et al., 2015). Reason behind the deployment Implementation of SaaS model in SoftArc Engineering stands beneficial due to certain reasons. First of all the most frequently rising issue associated to technology that is security can be enhanced with the help of SaaS model (Djemame, et al., 2014). On the other hand, it is not as costlier as the other models and is less time consuming also. For the software adaptation and its maintenance the cloud service model are completely responsible. SaaS model is used due to its customization feature. In addition to this, scalability, reliability and data integrity are the other characteristics that help to upgrade the information system of SoftArc Engineering on each and every session (Durairaj Manimaran, 2015). The users need not to get any additional training for using this platform and due to the platform proof concept it also offers software testing opportunity to the users. Benefits and issues of the deployed architecture Benefits Reliability: The model is reliable and the users can use the system easily and the due to automated upgrade feature as per the changing technology the system will be updated automatically. Scalability and flexibility: The system is flexible enough and the resource requirements can be automatically scale up and scale down as per the customers demand. System access: The data stored in the cloud server can be accessed easily and due to high range security none of the external attackers can access information from the server without authorization or permission (Grozev Buyya, 2014). High performance: From system analysis it has been found that browser access is easier with the help of accurate internet connection in case of SaaS model whereas; in other model even though high internet connection is served still accessibility is not easier. Authorization: The system provides authorization or data security to the users while accessing data from the server (Pahl, Xiong Walshe, 2013). Issues Security: Due to lack of security, the data stored in the server might get hijacked by the external attackers without permission. In order to mitigate this issue proper encryption algorithm is required to be adapted by SoftArc Engineering. Performance management: In order to increase the performance level of SaaS model, accurate technologies are required to be adapted by SoftArc Engineering. Risks associated to new Hybrid cloud architecture The risk associated to SaaS hybrid model and its control measures that are required to be adapted are elaborated in the below section: Identification of the risks Data redundancy: In case of hybrid model the biggest issues mostly raised is the data redundancy (Abbas, Farooq Afghan, 2015). Due to hybridization single information might get stored in multiple sections. It will grab extra storage and for storage wastage necessary application might not get appropriate value in the system. Lack of security management: Due to lack of security management, the sensitive information stored in the server might get hijacked by the external attackers and those could be misused by them. Application error: I order to meet the requirement of the consumers; hybrid cloud needs extra attention and supportive diligence as well (Brender Markov, 2013). It has been analyzed due to lack of infrastructure and support, the authority fails to make appropriate maintenance of the models. Implementation of the possible control for the risks Risks Mitigation strategy Data redundancy In order to mitigate this issue time to time system upgrade is needed. It will help to minimize the rate of data redundancy and storage wastage at the same time (Zhou et al., 2013). Lack of security management In order to mitigate this problem proper system authorization, authentication and encryption algorithm are required to be adapted by the management authority so that only authorized users could access the server on the required time phase (Oliveira, Thomas Espadanal, 2014). Application error For overcoming this risk the management should adopt accurate industry standards and data security approaches during the system handling phase. Description of the general security steps and control approaches that should be employed to secure the hybrid cloud In order to combat the risk associated to system security, proper security steps are needed to be adapted by the authority and the security steps are as follows: Risk identification: This is the initial phase of risk management processes, in this period the management should identify the risks those might occur during the deployment and implementation phase. Risk analysis: In order to implement accurate security the risk are required to analyze well and then based upon the type of the risks the strategies must be developed (Almorsy, Grundy Muller, 2016). Both long terms as well as short term system monitoring approaches are needed to analyze the risk so that exact security measure can be implemented. Risk ranking: Based on the priority all the identified risks should be ranked by the management authority. After proper ranking of the risks security measures will be implemented for each risk. Security management: Even after the implementation the system for maintenance also accurate security management is needed (Sanaei et al., 2014). With the help of system replication, the in house data storage and hybrid cloud both can be maintained well by the security application. Avoidance of data redundancy: The data redundancy must be avoided. It will help to reduce the rate of storage wastage and even multiple data centers could also be handled properly after the implementation of security system. Brief discussion including SoftArc Engineerings BCP as a result of the adoption of a Hybrid Cloud approach Though hybrid cloud is a beneficial technology but still at the same time many vital risks are also associated to the system (Avram, 2014). The recommendations those have been suggested for SoftArc Engineering are as follows: Application resilience: Application resilience is referred to as the capability of execute an application easily even after the presence of distributed error throughout the system.web infrastructure also lacks this specialized characteristic. Data backup: If any data get lost from the server then with the help of data backup feature, the information could be retrieved from the server again whenever required by the users (Botta et al., 2014). Disaster recovery: If any information gets destroyed then ability to recover that data is termed as data recovery. In SaaS model after any disaster also data could be fetched from the server with expertise help. Though, in web infrastructure disaster recovery was not possible. However, hybrid data could be recovered easily with the help of disaster recover feature of hybrid SaaS cloud model. Discussion on the requirement of the SoftArc Engineering In order to conduct the needs for SoftArc Engineering in context with the PaaS and IaaS platform or cloud models, the instances that must be included are as follows: Remote server administration System analysis, system understanding, administrative management process are the components that must beconsidered for the remote server administration. The system could set up easily and the within less amount of budget the system can even perform for remote server administration (Dinh et al., 2013). It provides different management tools and interactive platform to the users for developing administrative level management system. Resource management Different resources and needed to develop a system and for the system migrating other associated resources are needed by the system developers. While considering IaaS and PaaS the resources required are differs from each other (Abbas, Farooq Afghan, 2015). If proper resources are identified the accessibility, time and cost everything will stand beneficial for SoftArc Engineering. The company can access required information regardless of time and location if accurate resources are identified and used by the developers. SLA management In order to establish secured relationship between the end users and the service providers of cloud system, Service Level Agreement (SLA) is needed to be adapted for conducting all the system application accurately without any error. SoftArc Engineering Company should consider this feature foe gaining license of the software for both quality and productivity (Grozev Buyya, 2014). With the help of SLA the users will be able to grab products in affordable price range and the service providers could develop discount strategies also. Proper alignment among the services and the system could be improved or build up if SLA guidelines are maintained accurately. Movement towards SharePoints instance to AWS cloud Discussion of the steps those are included in the plan for mitigating different services The steps needed to be followed are as follows: Accurate migration plan Infrastructure implementation Customization Testing plan Up-gradation Migration through third party products Issues that might occur in these phases Planning for migration: System complexity and dependency are the two major issues associated to migration planning phase. Implementation of accurate architecture plan: Base on the demand and type of the business the system developers should implement accurate architecture for conducting and running the application (Almorsy, Grundy Muller, 2016). Understanding customization and integration: Proper integration and customization are very much important for the system security and planning as well In order to implement the system properly all the features must be integrated properly. Migration issue: During platform migration information might get lost from the server and if the migration is not validated then applications cloud not run properly on the platform (Sanaei et al., 2014). Migration test development: If platform migration test is not done properly then, huge number of risks might occur and will not allow the users to test the migrated data properly. Implementation of Microsoft upgrades approach: Within a specified data base, problems might arise and also could negatively impact the migration. Conclusion From the overall discussion it can be concluded that SoftArc Engineering should migrate their platform from the traditional one to the SaaS for increasing the overall business efficiency in terms of productivity and quality as well. The benefits and issues associated to hybrid cloud and the issue mitigation strategies are also illustrated in this report. Apart from this, the features named as application resilience, disaster recovery and data backup are also elaborated in this report. Additionally, the steps required to implement security in the system are depicted in the report minutely. References Abbas, R., Farooq, A., Afghan, S. (2015). A Security Model for SaaS in Cloud Computing.University of Engineering and Technology Taxila. Technical Journal,20(4), 103. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, pp.529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Brender, N., Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies.International journal of information management,33(5), 726-733. Dasic, P., Dasis, J., Crvenkovic, B. (2016). Service models for cloud computing: Video Surveillance as a Service (VSaaS).Bulletin of the Transilvania, University of Bra?ov, Series I: Engineering Sciences,9(1). Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Djemame, K., Armstrong, D., Kavanagh, R., Juan Ferrer, A., Garcia Perez, D., Antona, D., ... Guitart Fernndez, J. (2014). Energy efficiency embedded service lifecycle: Towards an energy efficient cloud computing architecture. InJoint Workshop Proceedings of the 2nd International Conference on ICT for Sustainability 2014(pp. 1-6). CEUR-WS. org. Durairaj, M., Manimaran, A. (2015). A study on security issues in cloud based e-learning.Indian Journal of Science and Technology,8(8), 757-765. Grozev, N., Buyya, R. (2014). Inter?Cloud architectures and application brokering: taxonomy and survey.Software: Practice and Experience,44(3), 369-390. Kaur, J., Garg, S., Principal, R. I. M. T., Gobindgarh, M. (2015). Survey paper on security in cloud computing.Int. J. Appl. Stud. Prod. Manage,1, 27-32. Oliveira, T., Thomas, M., Espadanal, M. (2014). Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors.Information Management,51(5), 497-510. Pahl, C., Xiong, H., Walshe, R. (2013, September). A comparison of on-premise to cloud migration approaches. InEuropean Conference on Service-Oriented and Cloud Computing(pp. 212-226). Springer Berlin Heidelberg. Puthal, D., Sahoo, B. P. S., Mishra, S., Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Zhou, J., Leppanen, T., Harjula, E., Ylianttila, M., Ojala, T., Yu, C., ... Yang, L. T. (2013, June). Cloudthings: A common architecture for integrating the internet of things with cloud computing. InComputer Supported Cooperative Work in Design (CSCWD), 2013 IEEE 17th International Conference on(pp. 651-657). IEEE.

Wednesday, December 4, 2019

Scenario Evaluation Plan free essay sample

When an organization is trying to reorganize and create new programs, they will use an evaluation plan to do this, an evaluation is a very important step in the development and implementation of the organizations program and projects they are trying to develop. It’s important to have a solid foundation to carry out the mission, goals, and the objectives, and it’s also important to have a way to define success and failures through the proper use of evaluation techniques, appropriate reporting, and having the right tools to carry out the programs. It can be challenging for an agency to decide if they should use a process evaluation or an outcome evaluation plan. The main objective of an evaluation technique is to provide for the state the agency is in, tell how – well or how poorly the programs are working, what may need to be done or changed, and how they are keeping up to meet their goals mission, and objectives. We will write a custom essay sample on Scenario Evaluation Plan or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page For the PEACE Domestic Violence Agency, they want to empower survivors, reduce trauma that victims go through and to promote recovery through direct services. The PEACE agency is committed to the clients they serve, the agency wants to reduce sexual assault and domestic violence through education and strives to challenge how domestic violence is looked at, and how some condone violence in the community. Process evaluations serves a pacific purpose, it’s to collect information from a program which provides the basis for the outcome evaluations. Outcome evaluations take assessments of the raw data which helps the agency to know how well the program is meeting its goals. In order for this agency to be evaluated, some authority has to be taken to set the groundwork for the agency. If both of these processes are over looked the evaluations will not help to provide the correct estimate of any programs. The missions, goals, and objectives presented in this scenario are fairly followed. If the agency does not have a detail description of the performance of how well the program will be administrated and implemented, so in this case it would impossible to perform a process evaluation. A process evaluation, data can be collected in many different ways. By using a designed assessment, the process can be evaluated to see the effectiveness,  efficiency, and use them for extended studies. Evaluations can include tools as participants, interviews with staff members to evaluate the programs process that some individuals go through when they are seeking help to recover. Without the correct data or information, the outcome will not give the correct of true estimate of how the agency or organization is doing. The tools that are used helps to provide a base for an outcome evaluation, while the process which is collected and is equally important as well. The outcome evaluation comes from taking the required collected data, which allows for a decision to be made on the behalf of the evaluation of any programs. It’s very important to remember the mission, goals, and the objective of the organization or the agency at hand, along with working with the required data. With this we can see how far the programs have come together and if we need to make any minimal changes in curriculum and to see how well we are meeting the project or program’s objectives as a whole. We have no way of knowing if the program and the agency valves are on the same track or have they separated itself from their original purpose or plan. Tools that can be used for an outcome evaluation are the financial and process reports which are given to management and to the community. With a detail review of where the program began, how well are the objectives being met, or how can those objectives be met, and what needs to be taken for the future prosperity of the program information which is very important and valuable to the organization. Tools are put in place to help grant donors, the community members, and the people who are interested in the same kinds of programs. When you are evaluating any organization plans or programs, both on a process and outcome level it can provide information needed for the mission, goals, and objectives which drives the internal and external workings of a program.