Monday, August 24, 2020

George W. Bush as the Anti-Christ Essay -- Exploratory Essays Research

George W. Hedge as the Anti-Christ To truly get a handle on the essentialness of the image of the counter Christ we should initially place legislative issues as itself representative. Governmental issues is the semiotics of a country's will: it turns into the People similarly as the People become it by being chosen into office and taking an interest in the political procedure, or in autocracies, by keeping the principles and not framing underground developments. In any case, in a majority rules system, it is a particularly close emblematic relationship, in this way the unmistakable connection between political image and hostile to Christ in George W. Shrub. Both subject and subjectifier, governmental issues in this country misuses as it engages by permitting a well known will (or a famous feeling of cynicism) to show itself as a political competitor, who thusly is constrained by his media (and his electability) to pander back to the People. Subsequently a competitor turns into an image - being both subject and article in the brain of the electorate. This goes past being a negligible nonentity: nonentities are permitted faults since they are not viewed as genuine chiefs. Nonentities express a country's feelings about an office, and just those. American political figures- - particularly presidents- - express feelings and will, and they express them as far as a man (Americans appear to feel emphatically that the workplace ought to be held by a man). The administration is image in that it communicates us: we indicted Clinton since we saw his direct with Monica Lewinsky as indefensible. There was not the political will to convict him, in any case, since we realized that basically he represented us, and who among us has not had love illicit relationships of which we are humiliated? Fundamentally, we brought Clinton before a group, yet the group could cast no stones. Th... ...lves: rich, ruined, sort of idiotic, yet fundamentally agreeable. Shrubbery is simply the substance of America's picture: untrusting of a lot of mind, insight or intellect. It would be a supernatural occurrence if he somehow managed to win the White House, which is actually why we will put him there. Consequently the pattern of portrayal and imagery is finished: Bush is what our identity is: degenerate, unrepentant, in stunningness of cash and at the same time supplied with it. A definitive estimation of the Bush office regarding Revelation isn't so much that it will decidedly introduce the End Times, yet the markers are unquestionable. We have become the degenerate society that Revelation predicts. We have gotten ready to get the swindler. Works Cited Conason, Joe. Notes on a Native Son. Harper's Magazine Mar. 2000: 39-53. Phillips, Kevin. The Prospect of a Bush Restoration. Harper's Magazine Mar. 2000: 54-8.

Saturday, August 22, 2020

What is the federal governments single greatest r Essay Example For Students

What is the national governments single most prominent r Essay esponsibilityto the public?In my supposition the government has manyresponsibilities to the general population, however above all is itspledge of assurance to the general population. At the point when I state assurance, I meannot just from military assaults from different nations, butby providing assets for all the necessities of the residents. As thepopulation in the U.S. increments and bureaucratic subsidizes decline, thegovernment will in general overlook the entirety of the little individuals who electedthe legislators into office. The individuals to whom I am referringare the ranchers and entrepreneurs, who depend on thegovernments backing to secure their speculations. As shippingand universal cash trade has gotten simpler and faster,the capacity for entrepreneurs or ranchers to sell theirgoods have then again become more earnestly. I accept that it is thegocernments duty to guarantee that these individuals do notstruggle to gain a living. Bills, for example, exchange limitation s, etcare made so these individuals can win a living. We will compose a custom paper on What is the governments single most noteworthy r explicitly for you for just $16.38 $13.9/page Request now Another sort of assurance that the administration should provideabundantly is help to the littler governments, for example, state orcity workplaces. I feel this is generally significant in wrongdoing ridden,overpopulated urban communities, for example, New York or Los Angeles. These arethe extraordinary vacation spots in America, yet they dont receivethe acknowledgment that they merit from the administration. Withoutgovernment reserves, these urban areas dont have enough cash forupkeeping and permit their pictures to become discolored. This willcause a domino impact in light of the fact that less vacationers will need to visitAmerica. Less the travel industry implies that these urban areas have less revenuesand less significance to the administration. Less significance implies thatthey will get even less guide. Such an impact will demolish anybright spots which despite everything are in the U.S. The general population made the U.S. government to guarantee that therewill consistently be an astute and reasonable pioneer for America. This gave usthe capacity to place somebody into office, who fits the necessities of thecountry, at present time. This individual embraces the soleresponsibility to guarantee the government assistance of every one of his kin. Thegovernments obligations are extraordinary, however with a littlecontrol and cautious arranging, all can be practiced.

Monday, July 20, 2020

Signs and Symptoms of Addiction

Signs and Symptoms of Addiction Addiction Addictive Behaviors Print Signs and Symptoms of Addiction By Elizabeth Hartney, BSc., MSc., MA, PhD Elizabeth Hartney, BSc, MSc, MA, PhD is a psychologist, professor, and Director of the Centre for Health Leadership and Research at Royal Roads University, Canada. Learn about our editorial policy Elizabeth Hartney, BSc., MSc., MA, PhD Updated on June 04, 2019 Tom Dee Ann McCarthy/Getty Images   More in Addiction Addictive Behaviors Caffeine Internet Shopping Sex Alcohol Use Drug Use Nicotine Use Coping and Recovery All addictions, whether to substances or to behaviors, involve both physical and psychological processes. Each person’s experience of addiction is slightly different, but usually involves a cluster of some of the below signs and symptoms of addiction.   Symptoms vs. Signs Symptoms can only be experienced by the person with the addiction, whereas signs can be observed by other people. You can never know what someone else is experiencing unless they tell you, so if you are concerned that someone else may have an addiction, look for signs as well as for symptoms. Signs and Symptoms of Addiction You might see some of these signs but not others in an addicted person, but you can still be addicted even if you do not have all of the symptoms. These are signs which occur across many, but not necessarily all, addictions.  Some of the common signs and symptoms of addiction are: SecretivenessLyingStealingFinancially unpredictable, perhaps having large amounts of cash at times but no money at all at other timesChanges in social groups, new and unusual friends, odd phone conversationsRepeated unexplained outings, often with a sense of urgencyDrug paraphernalia such as unusual pipes, cigarette papers, small weighing scales, etc.“Stashes” of drugs, often in small plastic, paper or foil packagesTolerance, which is the need to engage in the addictive behavior more and more to get the desired effectWithdrawal  happens when the person does not take the substance or engage in the activity, and they experience unpleasant symptoms, which are often the opposite of the effects of the addictive behaviorDifficulty cutting down or controlling the addictive behaviorSocial, occupational or recreational activities becoming more focused on the addiction, and important social and occupational roles being jeopardizedThe person becoming preoccupied with the addiction, spending a lot of time on planning, engaging in, and recovering from the addictive behaviorExtreme mood changes â€" happy, sad, excited, anxious, etcSleeping a lot more or less than usual, or at different times of the day or nightChanges in energy â€" unexpectedly and extremely tired or energeticWeight  loss  or weight gainUnexpected and persistent coughs or snifflesSeeming unwell at certain times and better at other timesPupils of the eyes seeming smaller or larger than usual 7 Types of Drug Paraphernalia and Clues Parents Often Miss Use Caution Most of the signs of addiction can have other explanations too. For example, someone can be secretive because they are planning a birthday surprise for a friend. People can have changes of energy for numerous reasons, health-related and otherwise. They can make new friendships and end old ones for many reasons other than addictions. Be cautious about jumping to conclusions. Unless you have found drugs or drug paraphernalia or have some other obvious evidence of an addiction, it is likely there is another explanation. However, do not be naïve if you have found drugs or drug paraphernalia, as you may end up with legal problems if you do not address the situation. Tread Carefully Most of the signs of addiction are similar to normal teenage behavior. Unfortunately, teenagers are one of the groups most vulnerable to addiction. Parents who are concerned about their teenage child should be very careful when discussing addiction with a teenager. Study Identifies Top Risk Factors for Teen Substance Abuse Types and Signs of Other Addictions The links below will give you more details of the signs and symptoms of specific addictions. Substance Addictions The most common substance addictions include: Alcohol  â€" for example, wine, beer or liquorAmphetamine or similarly acting sympathomimetics â€" for example, speed or  crystal methBenzodiazepines  â€" for example, Xanax, Valium or KlonopinCaffeine  â€" for example,  coffee, tea  or  sports drinksCannabis  â€" for example,  marijuana, grass or hashCocaine  â€" for example, coke or crackHallucinogens  â€" for example, acid or ecstasyInhalants  â€" for example,  poppers  or  aerosolsNicotine  â€" for example,  cigarettes,  cigars  or  nicotine patchesOpioids â€" for example,  heroin,  morphine  or  painkillersPhencyclidine (PCP)  or similarly acting agents â€" for example,  angel dust  or  ketamineSedatives, hypnotics or anxiolytics â€" for example, sleeping pills or downers Behavioral Addictions The most common behavioral addictions include: Computer â€" for example,  internet,  video games, social networking sites,  cybersex  or  online gamblingEating  â€" for example,  overeating,  bingeing  or purgingExercise  â€" for example, weight loss or sportsGambling  â€" for example, VLTs, casinos or slot machinesGaming  â€" for example, computer gamesSex  â€" for example, porn,  cybersex  or multiple partnersShopping  â€" for example, spending or stealingWork â€" for example, overwork, money or power How to Live With and Treat Behavioral Addiction

Thursday, May 21, 2020

Misguided Love in The Glass Menagerie Essay - 1404 Words

Misguided Love in The Glass Menagerie The Glass Menagerie, written by playwright Tennessee Williams, is the story of a family torn apart by heartbreak from the past and tragedy from the present. Williams parallels this play to his true life experience with his own family, which makes The Glass Menagerie an even more tragic version of what happens to a family when love is lost and abandonment is reality. Providing for a family can be an overwhelming responsibility, for there are many pitfalls along the way, some families are able to cope, some are not, and The Glass Menagerie gives us insight into what truly happens to a family when faced with abandonment. The story begins in The Wingfield apartment in the rear of a building,†¦show more content†¦Laura, crippled at birth, is so profoundly introverted, partly because of her handicap, but mostly because of her mothers inability to come to grips with her beautiful daughters fragile state of mind. One evening at the insistence of Amanda, Tom brings a gentlemen caller, Jim, home for dinner; in hopes as Amanda puts it, that he will surely see how lovely her daughter is, and will ultimately win Lauras heart and take care of her for the rest of her life. Jim and Laura soon realize that they know one another from high school, and quickly establish a friendly conversation. Laura, for a brief moment, releases her shy and sullen personality and shares her precise glass figurines with Jim. Jim becomes infatuated by Laura, her innocence, her vulnerability, her quaint disability, and in a moment of passion, kisses her, only to realize his foolish gesture was a grave mistake; for his heart is already taken by another. He awkwardly apologizes to Laura, and abruptly excuses himself, leaving Laura to sink even further away from reality. Amanda, of course, blames Tom for the dinner fiasco, and humiliates him beyond the breaking point, leaving the family torn apart. Tom can no longer bare his mothers constant accusation that he will turn out to be just like his father; and Amandas inability to help her precious, innocent,Show MoreRelatedThe Glass Menagerie By William Shakespeare Essay1489 Words   |  6 PagesWe all want to disappear at times†¦ escape even. In the end we all know that we cannot run from our problems, no matter where you run they are always there lurking in the shadows. Tennessee William’s 1944 play â€Å"The Glass Menagerie† is a remembrance of time long ago and wanting to escape the unhappy, confining lives of Tom, Amanda, Laura and Jim. Although they are unhappy with their lives they choose to hide from the reality. Amanda is stuck in a lifetime ago- her youth ba ck in St. Louis in the 1930sRead More Illusion vs. Reality in The Glass Menagerie Essay2797 Words   |  12 PagesIllusion vs. Reality in The Glass Menagerie      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In The Glass Menagerie, Tennessee Williams uses the roles of the members of the Wingfield family to highlight the controlling theme of illusion versus reality. The family as a whole is enveloped in mirage; the lives of the characters do not exist outside of their apartment and they have basically isolated themselves from the rest of the world. Even their apartment is a direct reflection of the past as stories are often recalled from theRead MoreThe Glass Menagerie By Tennessee Williams2151 Words   |  9 Pagesâ€Å"The Glass Menagerie† is a riveting play by Tennessee Williams that takes place in 1930’s St. Lois. This play is unique in the manner that it is a memory play. The narrator, Tom Wingfield, is also one of the main characters. Tom is the son to Amanda Wingfield, and the brother to Laura Wingfield. Toms father, whom is referred to as Mr. Wingfield, left his family and has only sent one postcard from Mexico since his desertion. Alth ough Mr. Wingfield deserted his family his picture still remains

Wednesday, May 6, 2020

Vulnerability Assessment Of The Network Security - 1281 Words

Introduction According to Kizza (2013), the rapid growth of networking has led to increased security risks. Many of these risks are as result of hacking, improper uses of network resources and network device vulnerabilities. Awareness of the various weaknesses and vulnerabilities is vital to the success of current networks (Kizza, 2013). The network security incidents are increasing at a disturbing rate every year. As the complexity of these threats increases, so do the security measures required to protect networks. Enterprise data center operators and analysts, network administrators as well as other data center experts need to understand the principles of security in order to safely deploy and manage networks today. Vulnerability†¦show more content†¦Table 1 lists security weaknesses found and their description. Table 1 Network Security Weaknesses Vulnerability Description TCP/IP protocol vulnerabilities Some internet protocols such as HTTP, FTP, and ICMP are intrinsically insecure. On the other hand Simple Network Management Protocol (SNMP), Simple Mail Transfer Protocol (SMTP), and SYN floods are closely related to the intrinsic insecure structure design of TCP. The network workstations operating system weaknesses The company uses the Windows network operating systems whose security problem needs address. Network equipment weaknesses The various types of network equipment, such as routers, firewalls, and switches, have security weaknesses that should be recognized and protected against. These weaknesses include the following: Password protection Inadequate authentication Routing protocols Firewall holes Configuration Weaknesses Network administrators and engineers need to fully understand what the configuration vulnerabilities are and correctly configure their computing and network devices. Table 2 lists configuration vulnerabilitiesShow MoreRelatedThe Process Of Conducting Vulnerability Assessments And Modeling Threats1122 Words   |  5 Pages The purpose of this report is to explain the process of conducting vulnerability assessments and modeling threats. Vulnerability assessments are conducted to keep organizations safe from device and network vulnerabilities. There is a process that should be followed in order to perform a proper vulnerability assessment, if it is followed properly the organization will eliminate most if not all vulnerabilities from their network. Modeling threats is also an important step in creating a safe computingRead MoreInterpreting The Results And Remediation1512 Words   |  7 PagesInterpreting the results and remediation. After the vulnerability assessment has taken place i t is time to interpret the results of the scan. This is where the organization finds out what the vulnerabilities of their network are. The vulnerabilities that were found in the process of the assessment must be categorized, most vulnerability scanners will produce reports that will list and categorize the threats that were found, this is also called threat modeling which we will get into in the next sectionRead MoreLab 2 Performing A Vulnerability Assessment Worksheet Essay648 Words   |  3 PagesAssessment Worksheet Performing a Vulnerability Assessment CSS150-1502A-02 : Introduction to Computer Security Course Name and Number: _____________________________________________________ Johnathan McMullen Student Name: ________________________________________________________________ Stephen Osborne Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commandsRead MoreIs4550 Week 5 Lab1611 Words   |  7 Pagesand Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * IdentifyRead MoreRisk Assessment Is The Top Priority For Any Type Is Impenetrable1671 Words   |  7 PagesFindings Networks are very vulnerable to any holes that are within its infrastructure. In fact, many may believe that they have the best security measures in place, but no system or network of any type is impenetrable (Trim Lee, 2014). Risk assessments are extremely necessary so that corrective countermeasures can be applied and overall security can be enhanced (Broder Tucker, 2011). Security should ensure that this is the top priority for any company or organization. A detailed risk assessment showsRead MoreCase Analysis : Corporate Theft And Sabotage1483 Words   |  6 Pagesthreat (APT) Apart from these 2 major security threats, DBR should also be concerned about an Advanced persistent threat (APT). This is a network attack situation where a person infiltrates the network security of a company, gains unauthorized access and remains undetected for a long time. These attacks are generally aimed at stealing the data by gaining unauthorized continuing access to the network. Given the security threat from its competitors, APT network attack should seriously concern DBR managementRead MorePreliminary Security Assessment1466 Words   |  6 Pagesu04a1 Preliminary Security Assessment TS5311 Enterprise Security February 3, 2013 Introduction The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this isRead MoreA Report On Suntrust Bank1671 Words   |  7 Pagesorchestrated by the hacktivist group Izz ad-Din al-Qassam (Kitten, 2012). SunTrust plc. is committed to helping their customers to up their online transactions secure and safe. Despite the various security measures, features and procedures implemented by SunTrust to secure their network and server from cyber-attacks as well as to help protect consumers from scammers and unauthorized access to their accounts, yet, they become a victim of the hacktivist group Izz ad-Din al-Qassam who insistRead MoreEssay on Is 305 Week 3 Lab795 Words   |  4 Pages How to Identify Threats amp; Vulnerabilities in an IT Infrastructure Using ZeNmap GUI (Nmap) amp; Nessus Reports Learning Objectives and Outcomes Upon completing this lab, students will be able to: 1. Understand how risk from threats and software vulnerabilities impacts the seven domains of a typical IT infrastructure 2 Review a ZeNmap GUI (Nmap) network discovery and Nessus vulnerability assessment scan report (hardcopy or softcopy) 3. Identify hosts, operatingRead MoreThe Security Of A Home Network1352 Words   |  6 Pages Yu Lun Chou 1730799 MADS 6638 Computer Security Admin. George Thucydides 4/26/2016 Table of content Introduction Inventory Vulnerability Test Protection Support Incident Response Introduction Information play an essential role in everywhere. For a company, in order to run the company well, information management is a necessary skill, and leaking information, odds are , causes significant damage to the company. Even though a private network will not have as great damage as an organization

Jahrod Free Essays

Textbooks vs. Tablets Jahrod Meyers Central Carolina Technical College Topic:Should tablets replace textbooks in K-12 schools? Specific Purpose:Explaining the advantages and the disadvantages Thesis Statement:Publishing for the K-12 school market is an $8 billion industry, with three companies – McGraw-Hill, Pearson, and Houghton Mifflin Harcourt – capturing about 85% of this market. Tablets are a $35 billion industry with roughly one in three adults owning a tablet. We will write a custom essay sample on Jahrod or any similar topic only for you Order Now As tablets have become more prevalent, a new debate has formed over whether K-12 school districts should switch from print textbooks to digital textbooks on tablets. Introduction A 4GB tablet filled with 3,500 e-books weighs a billionth of a billionth of a gram more than if it were empty of data – a difference that is approximately the same weight as a molecule of DNA. The same number of physical books would weigh about two tons. In San Francisco, New York, and Los Angeles, robberies related to internet-enabled handheld devices (including tablets) have accounted for 50, 40, and 25 percent respectively of all robberies in 2012. Manufacturing one tablet requires the extraction of 33 pounds of minerals, 79 gallons of water, and 100 kilowatt hours of fossil fuels resulting in 66 pounds of carbon dioxide. Students who used an interactive, digital version of an Algebra 1 textbook for Apple’s iPad in California’s Riverside Unified School District in 2012 scored 20 percent higher on standardized tests vs. students who learned with print textbooks. During the 2011-12 school year more than 13,700 US children, aged 5 to 18, were treated in hospitals and doctors’ offices for backpack-related injuries such as contusions, sprains, fractures, and strains to the back and shoulders. Transition:getting into the pros and cons. Body I. PRO Tablet a. Tablets help students learn more material faster. b. Tablets can hold hundreds of textbooks on one device, plus homework, quizzes, and other files, eliminating the need for physical storage of books and classroom materials. c. E-textbooks on tablets cost on average 50-60% less than print textbooks. d. Tablets help students better prepare for a world immersed in technology. II. CON Tablet a. Tablets have too many distractions for classroom use. b. Many students do not have sufficient home internet bandwidth to use tablets. c. The average battery life of a tablet is 7. 26 hours, shorter than the length of a school day. d. Tablets shift the focus of learning from the teacher to the technology. * Transition:In closing, â€Å"Computers are getting smarter all the time. Scientists tell us that soon they will be able to talk to us. (And by ‘they’, I mean ‘computers’. I doubt scientists will ever be able to talk to us. )† Dave Barry. Conclusion I. Opponents of tablets say that they are expensive, too distractin g for students, easy to break, and costly/time-consuming to fix. They say that tablets contribute to eyestrain, headaches, and blurred vision, increase the excuses available for students not doing their homework, require costly Wi-Fi networks, and become quickly outdated as new technologies are released. II. Proponents of tablets say that they are supported by most teachers and students, are much lighter than print textbooks, and improve standardized test scores. They say that tablets can hold hundreds of textbooks, save the environment by lowering the amount of printing, increase student interactivity and creativity, and that digital textbooks are cheaper than print textbooks. III. 43% of Americans read online books, magazines, or newspapers. Amazon announced in July 2010 that e-books were outselling paper books, and a July 2012 report by the Association of American Publishers showed that e-book revenue IV. xceeded that of hardcover books for the first time ever. 80% of publishers now produce e-books. While e-books sales rose 117% from 2010 to 2011, the print book business declined 2. 5% in 2011 to $27. 2 billion from $27. 9 billion in 2010. However, over 90% of educational textbooks are still read on paper, and only 30% of textbook titles are available electronically. V. I feel tha t transfer to tablets isn’t a bad idea. Considering you will only have to keep up with the tablet and not 5-6 different books for one class. It will also help the children in K-12 to learn and soon master technology How to cite Jahrod, Papers

Sunday, April 26, 2020

Mexican Democracy Essays - Politics Of Mexico,

Mexican Democracy Jim Sullivan Mexican Democracy When one thinks of Mexico the first thing that often comes to mind are all of the old Westerns where the bad guys would run to Mexico to escape and good guys were attacked by desperados and also government troops. This stereotype is not too far off from the actual political situation in Mexico. If one were to look at the history of this troubled nation one would find a universal lack of stable government and a tendency towards military run dictatorships. This comes from a turbulent history fraught with foreign influence and puppet governments. The most recent foreign intervention was in the 1850s when the French sent troops over to Mexico in order to establish a puppet government under Archduke Maxamillian of Austria. His reign was short-lived and revolutionaries executed him after his surrender in May of 1867. The revolutionary leader Benito Juarez then assumed the presidency. His reign only lasted five years until another revolution lead by Porfiro Diaz. Diaz was the leader in Mexi can politics for 35 years until he was finally overthrown. This progression didnt end with Diaz, his successor, Francisco Madero, was overthrown and executed by General Victoriano Huerta, a brutal military dictator who was in power for a short time then overthrown in a new wave of revolutions. This flow of leaders coming to power then being overthrown has lead to a very unstable Mexican political structure. The trend of the losers in an election starting a revolution in response continued until General Lazaro Cardenas came to power in 1934 and became the first president in Mexican history to serve out a full term. The next president, Avila Camacho was the one to organize the PRI, the political party that continues to dominate in Mexico even today. The problems with the present Mexican political system are many in number. First historically the solution to political dispute has always been to start a rebellion. This leads to an extremely unstable situation where candidates may be intimidated out of running for office for fear of their lives. Next even when there has been a stable government the governments have been weak and often fail to accomplish any real progress. Finally the biggest obstacle to true democracy in Mexico is that the average person has had very little representation in the government. This is due to the fact that this current Mexican governmental structure, in place since the 30s has been dominated by one party, the PRI, and has been essentially a one party system. For the common people this means they can either not vote or vote for the party they may or may not support. To remedy this situation is not an easy task. The current Mexican system is a federal-presidential system, using first past the post elections. The mostly FPP system is what has allowed the PRI to stay in power because it is very hard for new parties to win significant numbers of seats. The first amendment to the Mexican system would be the electoral system. To gain entrance to the political sphere in the current system a party may win some seats with the small PR but still must win a majority of votes in a given district or districts. This is very difficult for a new party who people would be afraid to support due to the fact that they dont know it or that they may not vote for because they know it will not win. My recommendation would be to change to a 50/50 mix of first past the post and proportional representation in the Mexican legislature. Going to a 50/50 mix is better than a total PR switch because total PR often leads to political instability with coalition and minority gove rnments. In a country such as Mexico that has a history of instability any new elements of conflict would be bad. With the new electoral system smaller parties that already exist such as local parties or current fringe parties could gain power in the legislature and force the PRI to change and adapt to the will of the people. The increased diversity in the legislature would lead to some conflict but in the long run it