Thursday, November 28, 2019

Same Sex Marriage an Example of the Topic Psychology Essays by

Same Sex Marriage Should same sex marriage be legally recognized? Marriage is one of the most important socio-cultural institutions that for centuries have served the humanity for its inpidual and collective good. Although sexual co-habitation exists since primitive times but marriage was exclusively a heterosexual phenomenon. However, since the last half of the 20th century certain segments of the society defied the views of the conformist prepositions about the nature and purpose of marriage and challenged the tenet that marriage is and should be entirely heterosexual. This phenomenon developed in the last years of 1950s and surged in the early years of 1960s. Need essay sample on "Same Sex Marriage" topic? We will write a custom essay sample specifically for you Proceed Marriage is not only a summation of two spouses but it is an all-encompassing phenomenon that includes social, cultural, moral and legal aspects. Marriage is developed as a social patronaged and culturally patterned institution that is much more than an intimate personal relationship as it has assimilated and incorporated itself with other social institutes, so marriage should not viewed as a relationship for personal intimation only as adherents of the same-sex marriage articulate and thus should not be legalized. University Students Often Tell EssayLab support: I'm not in the mood to write my essay. Because I want to spend time with my boyfriend Professional writers advise: Don't Waste Your Time Paper Writing Service College Papers Online How to Prepare an Assignment Essay Writing Help Company The adherents of the same-sex marriage disseminated the notions that marriage has nothing to do with heterosexuality and it is exclusively superfluous religious and legal fiction. They further propagated that different other dimension of the marriages i.e. same-sex marriage, should not be sacrificed at the altar of conventional religious morality. Generally, this change in the thought process of society compelled these segments of the society to indulge in same sex marriages. (Cantor, 2006) The case for heterosexual marriage is based on the religious, social and historical fact. (Dent, 1999; Frank, 2006; Finnis, 1997; Reid, 2005;Vetri, 1998) Marriage is a social and religious bond between a man and woman. Biblical references can be provided that marriage as an institution is an association of one man and one woman. Furthermore Christianity is against gay and lesbian relationship and considers it immoral and unethical. In some cases has ordered to outcast the convicts of such crimes. In Christianity, marriage is considered a holy and sacred obligation since the Wedding at Cana (John 2:1-11). So it was considered a vital activity since the time of Jesus as a legitimate and sacred sexual relationship between man and woman. Several legal court decisions and constitutional codes also include the same definition of marriage. Prof Eskridge (1993) provides a crux of the arguments of the opponents of the same-sex marriages by saying; Marriage, they say, must involve a man and a women because (1) this is the definitional essence of the marriage (2) the Judeo-Christian tradition requires it and/or (3) the modern Western nation-state has structured society around the assumption that only different-sex marital unions are allowed. Historically, homosexual indulgence and practices were common in primitive societies but no verified or verifiable clue is available that same-sex marriage was recognized and sanctioned as marriage socially and stately in various parts of the world. Prof Eskridge is his well researched work A history of Same-sex marriage provides various historical facts about homosexuality but not about legal sanctity of same-sex marriage. For example, he provides example from certain archaeological remains like tomb of two male courtiers of the fifth dynasty (circa 2600 B.C.) includes bas-beliefs of the two men in intimate poses. He further quotes the views of social historian David Greenberg to affirm his point of view about same-sex relationship that same-sex relationship was accepted by the state, because Pharaoh provided their tomb. (21) So it is quite clear that historically, same-sex marriage were never sanctioned by any primitive law. This historical fact is important to assume that millennia of human experience never sanctioned homosexuality as a legal marriage and there were various reasons behind that i.e. collective good of human society, fear of extinction of human species etc. He again cites David Greenberg to explaore the state recognition of same-sex relationship in the ancient civilization of Mesopotamia where Mesopotamian monarch, notably King Zimri-Lim of Mari and King Hammurabi of Babylon, had male lovers akin to wives. (22) He further suggests hat although earlier laws of Mesopotamia regulates the action of sexual indulgence and marriages but it has no connotations toward approval of same-sex relationship. Reproduction is the essential human phenomenon that is primarily concerned with future and retainment of human specie. This primarily refers to the importance of hetero-sexual marriage as social fact. As the world is tending to move toward inpidualistic societies and its concerns, it is fundamentally imperative that wider social concerns must be taken into account. So the primary purpose of marriage is not an intimate relationship sanctioned by the society and state alike but it is the development and retainment of human generation. Hetero-sexual marriage is compatible with this social objective but same is not true with the same-sex marriage. Scott Bidstrup, a distinguished supporter of same sex marriage, does not take into consideration this important objective of marriage and only relies on the personal intimacy theorem. He says that Sex, in a committed gay relationship, is merely a means of expressing that love, just the same as it is for heterosexuals. Being gay is much more profound than simply a sexual relationship; being gay is part of that person's core identity, and goes right the very center of his being. (Gay Marriage: The Arguments and the Motives) But marriage is much more than an expression of love and affection for the partner or spouse. Hetero-sexual marriage capacitates men to achieve their moral and personal discipline that is a pre-requisite to achieve success in life on one hand whereas it also enabled them to live a stable and balanced domestic life. On the other hand it facilitates the married women gain a protected and stable social status, acknowledgment of protection and economic provision of their children. Somerville refutes the same-sex marriage in a higher cultural level as she derives that Marriage is primarily a cultural phenomenon and one of its absolute function is to transmit human life to the next generation and nurture and protect that life. (3) She is of the opinion that same-sex marriage could not perform that function due to the fact that it involves a relationship rather than a social function. A research study Why Marriages Matters: Twenty-One Conclusion from the Social Sciences by twelve scholars have tried to summarize the positive effects of marriage through analyzing research literature and found that Marriage is an important social good associated with an impressively broad array of positive outcomes for children and adults alike [W]hether American society succeeds or fails in building a healthy marriage culture is clearly a matter of legitimate public concern. [Doherty, William J. et al., 2002] So marriage is a social phenomenon here that has social connotations and it is not a personal relationship between two inpiduals. Adherents of the same-sex marriage further refer to the civil rights guaranteed by the constitution and put their case in the historical context that once interracial marriages were prohibited but Supreme Court established that these laws were unconstitutional and were against the letter and spirit of the constitution and fundamental rights. So they maintain that it is also erroneous and unconstitutional to bar same-sex marriages. But this argument does not validate their yearning for legalization of same-sex marriage because being of a different race and color is a natural phenomenon whereas theirs is a behavioral predicament. It is not an innate feature. It is a habitual formation that seems to be instinctive. There are certain other segments of the society with deviant behaviors i.e. pedophiles, people with incestuous orientation, pornography addicts. It does not mean that civil rights grant them validation to exercise their will against the collective good of the society. Don Browning sums the overall opposition to the case for same-sex marriage and says that providing social recognition and legal sanction to the gay marriage will epitomize the societys stride toward dismantling the goods associated with marriage. The further says that same-sex marriage is not an extension of old institution of marriage to new segments of society but it alters the overall objective and purpose of marriage. He further extends that same-sex marriage reduces marriage primarily to committed affectionate sexual relations. It goes further. It gives this new and a more narrow view of marriage all of the cultural, legal, and public support that accrued to the institution when it functioned to hold together this complex set of good. (Browning 204) All these arguments clearly manifest that same-sex marriage will not serve like the traditional institution of marriage based on hetero-sexual relationship, so it should not be endorsed as legally and constitutionally in order to save the society from socio-cultural catastrophe. From the primitive times the institution of marriages is regarded as the major source of family life. In almost every civilization it is known to serve and has served three essential social purposes. First, it is regarded, as a hatchery where new pool of children are conceived and are brought up under the maternal and paternal supervision; the rearing of children in this way assures the provision of all their psychological, emotional, social and economic needs. So same-sex marriages should not be sanctioned and must be prohibited by law. If not an extensive power of judicial activism save the society, the proponents of same-sex marriage will exploit the situations and will put aside the majority opinion about aberrancy and deviancy of homosexuals. References Bidstrup, S. Gay Marriage: The Arguments and the Motive. Retrieved on 7 Febrauary, 2007 Browning, D. S. The Liberal Case against Same-sex Marriage. The New York Times. 09 Mar. 2004. Cantor, D. J. Same-Sex Marriage: The Legal and Psychological Evolution in America. Wesleyan University Press. 2006. Dent, G. W. "The Defense of Traditional Marriage," The Journal of Law and Politics 15 (1999) :581-644. Eskridge, W. N. A history of Same-Sex Marriage. Symposium on Sexual Orientation and The Law. Virginia Law Review 79. 7 (1993): 1419-1513. Eskridge, W. N. The Case for Same-Sex Marriage: from Sexual Liberty to Civilized Commitment. New York: Free Press, 1996. Franke, K. M. "The Politics of Same-Sex Marriage Politics". Columbia Journal of Gender & Law 15 (2006):236-248. Finnis, J. "The Good of Marriage and the Morality of Sexual Relations: Some Philosophical and Historical Observations". American Journal of Jurisprudence 42 (1997):97-134. Patterson, C. J. "Same-Sex Marriage and the Interests of Children...," Virginia Journal of Social Policy & Law 9(2001):345-351. Perkins, J. (ed.) Defense of Marriage: Does It Need Defending?. Nova Science. 2004. Reid, E. "Assessing and Responding to Same-Sex "Marriage" in Light of Natural Law". Georgetown Journal of Law & Public Policy 3(2005):523-539. Somerville, A.M. The Case against Same-sex Marriage. A Brief Submitted to The Standing Committee on Justice and Human. McGill Centre for Medicine, Ethics and Law. 2003. Vetri, D. Almost Everything You Always Wanted to Know about Lesbians and Gay Men, Their Families, and the Law". Southern University Law Review 26 (1998):1-91.

Monday, November 25, 2019

The Evolution of Evolutionary Biology essays

The Evolution of Evolutionary Biology essays A century and a half ago, a man by the name of Charles Darwin went on a journey around the world. This trip sparked an idea that would permanently alter the future of biology, and in conjunction with a certain Alfred Wallace, led to the publication of one of the most controversial and earth-shaking documents in history. Fifty years prior, Jean Lamarck made a benighted attempt to explain the vast differences in species; he was an ignoramus to be sure, but an asset nonetheless. You see, in the beginning, it was widely and thoroughly believed that higher power, a god, had created every creature to be perfect as-is, adapted to its exact surroundings with no need in the present or past for a change. Lamarck first scraped on the idea of environmental influence on an individual's form in 1809 when he stated that the environment affects the shape and organization of animals and that the "frequent use of organs, when confirmed by habit, increases the function of that organ...and endows it with a size and power that it does not possess in animals which exercise it less," meaning that when an animal uses, say, an arm more than another (as the stresses of the environment force it to), that population of animals will start to have stronger, larger arms. Lamarckian evolution is fundamentally flawed, as we can all see that an animal won't grow larger arms unless it is genetically prone to. The wonderfully outspoken Wallace made observations of this in early 1858, mocking Lamarck's early attempts at explaining the wonders of evolution. At the side of the famous Englishman Darwin, the quasi-connected duo published several papers on the theory of natural selection in regards to the origin of species. In these papers, Lamarck was shown to be a silly moron, and more importantly, the shroud of mystery around the creation of all life was pierced. Many people did, and still regard Wallace's (but more famously, Darwin's) final clarification of Lamarck'...

Thursday, November 21, 2019

The Concept of Human Resource Management Assignment

The Concept of Human Resource Management - Assignment Example All these careers relate to the training, developing and managing an aspect of the labor force in an organization. They cater to an extensive application of all the theories and aspects of the human resource knowledge in a broader aspect. Many organizations require a good personal, professional and academic profile in order to recruit people for the position of any skilled job in management designation. For less skilled job or fresh graduates with less or no experience, initial level jobs are offered. On the other hand, those candidates, who possess more experience and have the great qualification, are normally offered managerial level jobs in the human resource field. In this case, the Training and development Specialists are required to have basic knowledge of HR, a bachelor’s degree in the required field, and diplomas or certificates in the fields of training and developing the people. This is also performed by the individuals who are specialists in the field of managing people. Compensation and benefits in this designation are on an average level, while the job may be on a contractual basis only. Compensation and Benefits Manager is the position of a senior or managerial level. This position requires a Master’s degree in the relevant field, an acquaintance of candidates with the subject of accountancy and finance, and a good amount of long experience. The candidates with extra qualification and certificates are usually preferred for this post. The compensation and benefits may vary from organization to organization; however, the managers are normally given higher salary packages and good non-cash benefits too. These include car, cell phones, laptops, and other things.

Wednesday, November 20, 2019

Gulf Pharmaceutical Industries (JULPHAR) Essay Example | Topics and Well Written Essays - 2000 words

Gulf Pharmaceutical Industries (JULPHAR) - Essay Example More than 800 products of the company are in the dosage forms, and few are yet to enter the market. The company employs more than 2800 employees around the world (Kapur, 2014). Turnover reported by the company at the end of 2013 was AED 1.36 Billion. The company reported various growth strategies in 2013. It performed a GCC wide review of its functions and operations. The new scientific office was launched across GCC under the new director. Additionally, the company launched its first manufacturing facility in Ethiopia at Addis Ababa (Julphar Extends its Global Footprint, 2015). This facility is a major part of the company’s international expansion objective and a milestone in its history (About Julphar, 2015). The objective of IAS 1 is to provide the organizations with the basis for presentation of general-purpose financial statements. It is to ensure the comparability of the financial statements of the previous periods and the financial statements of the other entities. IAS 1 is applicable to general-purpose financial statements that are prepared in accordance with the international Financial Reporting Standards. General-purpose financial statements are prepared in order to provide information about the financial performance, financial position and cash flow of the entity that is useful to a wide range of users for the purpose of making economic decisions (IAS 1, 2015). To fulfil the objective, financial statements provide the information about an entity’s: IAS 1 states that financial statements must present fairly the financial position, financial performance and cash position of the entity. This means that the entity should faithfully represent the effects of the transactions, events and condition in accordance with the criteria of assets, liabilities, income and expenses as mentioned in the framework. Going Concern: the conceptual framework requires the financial

Monday, November 18, 2019

Cloud based computing security Essay Example | Topics and Well Written Essays - 2000 words

Cloud based computing security - Essay Example ability) , discusses the security challenges that currently face the enterprise when storing data in its own local severs or deploying it the cloud and introduces available solution for these issues . Security is simply protecting data against improper disclosures, modification or destruction; whether these are intentionally or accidentally caused. That is to say, a complete solution to data security issues should meet three basic requirements: confidentiality, integrity and availability. Confidentiality requires that data should be protected from unauthorized individuals or systems . Integrity refers to an assurance in the accuracy of the data. This means preventing of unauthorized or improper data modification or deletions must be engaged. Availability refers to keeping timely access to data and resources by authorized person. It also refers to the protection from malicious data denials making the system no longer available; or the recovery from hardware and software errors. The importance assigned to these requirements significantly depends on the considered environment. For example, in military environments, most attention devoted to the confidently, while integrity is the mo st relevant aspect of commercial environment. In public institutions, such as hospitals and airline companies and credit institutions in which data correction is essential in addition to the privacy constraints, a combination of integrity and confidentiality are needed. Developments in networking technology and an increase in the need of computing resources have encouraged many enterprises to outsource their storage and computing needs. This new model of computing is commonly referred to as â€Å"cloud computing†. Cloud computing is computing which leverages computer resource through the internet. It is defined by the national institute of standards and technology (NIST) as: â€Å"A model for enabling convenient, on-demand network access to shared pool of configurable computing resource

Friday, November 15, 2019

Study On CPU And Memory Hierarchy

Study On CPU And Memory Hierarchy CPU must have compatibility with the memory in the computer system. Memory cannot increase the speed of the processor however it can help the processor increase its performance. If the CPU doesnt get the data it requires, it would sit idle wasting CPU clock cycles that would decrease the overall throughput and execution of the processes. If data needs to be accessed to and from hard disk which is slower as compared to the main memory, more and more cycles are wasted decreasing the efficiency of the system. Conclusion- For better performance of the system, faster program execution and proper CPU utilization the compatibility between CPU and memory is required. A computer employs RAM chips of 256*8 ROM chips of 1024*8. The computer society system needs 2K byte of RAM 4KBYTE of ROM, 4 interface units. Each with 4 registers. A memory mapped I/O configuration is used. The 2 highest order bits of the address bus are connected with address 00 or RAM and 01 for ROM 10 for interface. How many RAM ROM chips are needed? Draw a memory address map. 2 kb of RAM required i.e. 21024(bytes) =2048 bytes (Since 1 kb =1024 bytes) RAM = = 8 chips; and 4kb of ROM is required i.e. 4 x 1024 = 4096 bytes Therefore ROM = = 4 chips; and There are 4 interfaces each having 4 register, So total no. of registers is 44=16 registers; Memory address map Cache Coherence- Caches allow greater performance by storing frequently used data. In multiprocessing system, each processor is provided with its own cache and they all share the same memory or address space so it is possible for more than one processor to access a data item at a time. What if one processor updates the data item without informing the other processors, inconsistencies may result and cause incorrect executions and the problem of inconsistencies is known as Cache Coherence in computing. The coherence of caches is obtained if the following conditions are met. However these read and write operations are said to be one after another and this is not possible due to memory access latency and a write by first processor may not be seen by a read from second processor if the read is made within a very small time after the write has been made. Case 1 Case 2 Processor P1 reads memory location X and then writes back to same location X while no other processor is not accessing the memory location X. Processor P1 reads and then processor P2 writes to and from same location X and currently the location would return value written by processor P2 only. Processor P1 and P2 writes to same memory location X in a sequence and currently the value returned would be decided as per the sequence. Mechanisms- Bus Snooping- In Bus Snooping each cache is connected through the same bus and it is where every CPU knows who has a copy of its cached data. So each CPU watches continually for write activity concerned with data addresses which it has cached. This assumes that all communication can be seen by all. However it is far more complex to implement. Directory Based Approach- In a directory-based system, the data being shared is placed in a common directory that preserves the coherence connecting caches. The directory acts as a filter through which the processor must ask authorization to fill an entry from the primary memory to its cache. When an entry is distorted the directory either updates or invalidates the other caches with that entry. The MESI protocol is the best suited protocol to avoid cache coherence, where M stands for MODIFIED, E stands for EXCLUSIVE, S stands for SHARED and I stands for INVALID. Write Back Cache- Cache uses two approaches to write data back to main memory. Write Through Write Back It is the simplest one in which all write all operations are made to the main memory as well as to cache; ensuring main memory is always valid. Any other CPU- cache module can monitor traffic to main memory to update the data in its own cache, but always results in substantial memory traffic. It minimizes memory writes. In write back method modifications to data in the cache arent copied to the cache source until absolutely necessary. It is also known as copy back cache .In write back updates are made only in the cache. When an update occurs UPDATE bit are set associated with the slot and when the block is replaced it is checked whether the UPDATE bit is set or not. If it is set then data is written back to main memory. For Example- Intel processors since the 80486 uses back caching. Problem with this kind of implementation is that performance improvement comes with a slight threat that data may be vanished if the system crashes and more complex circuitry. Onboard Cache- Cache is a part of multi-level storage strategy which is used to increase the performance of CPU by providing a bridge in between the slower memory RAM and CPU. The cache that is the part of the CPU is known as off-board cache and the cache which is present on the motherboard is known as on-board cache. Generally L1 cache is referred as off-board and L2 is known as on-board. Sometimes L3 cache is also present on the motherboard along with L2. Now a days specific CPU vendors incorporates L2 as a part of CPU and L3 on motherboard. Implementation of Cache- In Cache, latency needs to be decreased and hit rate needs to be increased. Larger caches have better hit rates but longer latency. To address this problem, many computers use multiple levels of cache. The smaller and faster one is L1 cache built inside the CPU known as on-chip. If CPU needs data it first checks in L1; if it hits the processor proceeds at high speed. If the smaller cache misses, the next larger cache (L2) is checked, and so on, before external memory is checked. As the latency difference between main memory and the fastest cache has become larger, some processors have begun to utilize as many as three levels of on-chip cache. For Example- Intels Xeon MP Product code-named Tulsa, AMD Phenom II (2008), Intel Core i7 (2008) uses unified L3 cache. However Cache can be implemented by using Direct Mapped, Associative Mapping or Set-Associative Mapping. Virtual Memory- For the execution of programs memory required is more than what is actually present. So, the technique used to overcome this size limitation is Virtual Memory which is illusion of memory not physically present. The purpose is to allow multiple programs share same memory allowing splitting up of program into smaller pieces that can be loaded into different parts of memory whenever space can be found. Implementation of Virtual Memory- It is implemented using two techniques- one is Demand Paging and other one is Demand Segmentation. CPU generates address which is not physically present. These are the program addresses referred to as logical addresses, they dont have any existence outside the program, the actual memory addresses are known as physical addresses. These virtual addresses are mapped or interchanged to its corresponding physical address through a process known as mapping. A page table or look up table is maintained for this purpose. In Demand paging, valid-invalid bit scheme is used in which a valid-invalid bit is associated with each page. 1 for the page in memory and 0 for not present in memory. During address translation if bit in entry is 0 the page fault occurs. In virtual memory process are divided into chunks of equal size known as pages and chunks of memory in which pages are loaded are known as frames. In Demand Segmentation each row of the lookup table contains a starting address for a logical block of memory, together with the size of the block and a corresponding starting address in physical memory. Paging and Segmentation operates both the same. Problem of Fragmentation- Fixed Memory Partitioning- Operating system occupies fixed portion of main memory and partitions are created for multiple processes but not of same size, so there will be wastage of memory. In most cases the process will not acquire memory provided to it. Variable Memory Partitioning- In variables-size partitions, the memory allocated is as much it is required by process. However when processes are swapped in, small holes are created leading to problem of fragmentation. Compaction is done to solve problem, but it waste CPU time. In Virtual Memory demand paging method is implemented, in which memory is partitioned into equal chunks that are relatively small, and each process is divided into small fixed size chunks of some size. The lists of the frames that are free are maintained by the operating system. As the size of the pages and frames are same so suffer less fragmentation problem. The Memory Hierarchy The design constraints on a computers memory can be summed up by three questions: how much memory is available, how fast it is and how much it will cost? Following are the relationships between these tradeoffs- Smaller access time, greater cost per bit. Greater capacity, smaller cost per bit. Greater capacity, greater access time. Access Time Increase Transfer Rate DecreasesCPU Registers Cache Cost per/bit Decreases Capacity IncreasesRAM Magnetic Disk Figure -Memory Hierarchy Memory hierarchy helps in increasing the performance of processor, without hierarchy, faster process wont help and all time waiting on memory, It provides a large pool of memory that costs as much as the cheap storage near the bottom of the hierarchy, but that serves data to programs at the rate of the fast storage near the top of the hierarchy. It provides a faster access of data stored in the memory. If it is understand how the system moves data up and down the memory hierarchy, then application programs can be written so that data items are stored higher in the hierarchy, where the CPU can access them more quickly. Addressing modes affecting performance of system- It simplifies the memory references, produces variable length instruction format and instruction manipulates operands in memory directly. It adds convenience and flexibility to have modes of addressing, and it allows a large range of addressable memory while using a reasonable number of bits. Addressing modes make it easier to write certain type of programs such as loops that uses an index to address different entries in a table or array. For Example- Indexed Addressing. Now a days computer allows programmer accessible registers that manipulate data directly between registers.

Wednesday, November 13, 2019

Smokng in Bars :: essays research papers fc

Smoking in Bars   Ã‚  Ã‚  Ã‚  Ã‚  Within the last several years, health issues toward smoking have become a very popular issue. All over the nation, college students are having to deal with secondhand smoke any time they want to go out and socialize with their friends in a bar. Secondhand smoke can be very detrimental to anybody that it encounters. It is associated with an increased risk for lung cancer and coronary heart disease in nonsmoking adults (TIPS). For years communities have been working to get smoking out of their workplaces, restaurants, and now they are pushing to ban smoking from bars. If you are a non-smoker, this is a very positive movement. It is never very much fun when you go into a bar to hang out with some friends and the whole place is covered with smoke. The whole next day, on top of maybe having a slight hangover, you will probably be coughing up a lung. Where is the fun in that? This law has already been passed in many places all over the United States. Only a select few are against what is trying to be done. When these laws were being debated at the University of Kansas in Lawrence, some bar and restaurant owners showed up to voice their opinions. They called it extremist, draconian and overly broad, saying it would cause the loss of jobs and the loss of city liquor taxes. They also said the law would set an uneven playing field because it allows smoking at restaurants with outdoor patios (Cooper). Of course, you might upset a few customers, but are people going to quit coming? Troja, a manager at Johnny’s Tavern in Lawrence, does not foresee the ordinance chasing customers away. â€Å"When it comes down to it,† he said, â€Å"they’re not going to stop going to their favorite tavern just because they can’t smoke there† (Cooper, par.7). An estimated 1,700 cities across the country restrict smoking, but only 74 have smoking bans that, like in Lawrence, include the workplace as well as restaurants and bars. (Cooper) This is great. Why can’t more people follow suit? An estimated 3,000 lung cancer deaths and 35,000 heart disease deaths occur annually among adult nonsmokers in the United States as a result of exposure to secondhand smoke (TIPS). College students do not realize that they are putting themselves at risk every time they step foot into these bars.