Wednesday, October 30, 2019

Company stock profile Essay Example | Topics and Well Written Essays - 750 words

Company stock profile - Essay Example The success on foretelling harmful geological disasters aids in determining future contracts and payments. The second division includes the Division of Resources, which aids in the exploration and extraction of mineral, water and rock for profit. GEO updated its monetary report for the whole year of 2014 and issued a guidance report for investors towards the second quarter of the year. The organization expects its net income to rise from $1.78 to $1.86 per share. Secondly, it also anticipates the annual revenue to range between $i.60 billion and $ 1.62 billion. The enterprise also increased its Net Operation Income to an array of $452 million to $458 million. For the second part of the 2014 financial year, the total amount of diluted shares aims at increasing at a range of $55 million to $57 million. Additionally, the expected revenue for the second quarter of the year is bound to range between $404 and $409 million. The organization’s expenses are low contrast to the revenues making it gain profits rather than lose (The Geo Group 3). For the GeoHazard division, the department secured a number of insurance contracts in order to develop electronic monitoring devices that aid in the prediction of geological catastrophes. The step improved the company’s detection and mitigation skills allowing it to manage its future risks hence aiding in securing future contracts and payments. Furthermore, its ability to predict future occurrences enables it to facilitate its operation services. The Geo Energy Resource Division reports a return to profitability with a net profit of $0.1 million compared to a previous loss of $0.9 million experienced in 2013. The gross profit margin shows a gradual improvement compared to the year 2013 with an raise of $7.2 million, and the company expects an increase towards the second quarter of the year. Generally the profitability and performance levels of the

Monday, October 28, 2019

Importance of Data Security and Data Safety Essay Example for Free

Importance of Data Security and Data Safety Essay To prevent companies from using or passing on confidential information to other companies without the permission of the person who the data is about, companies will need to protect the data. With the popularity of the Internet there are opportunities for thieves to steal their personal data. So the government set a law (data protection act) which is used to protect peoples rights concerning how data is used and you also have the right to see such information and have any errors corrected. Also organisation will want to keep data confidential because it will not want its competitors to know how the business is going. List the 8 principles of the Data Protection Act The Data Protection Act says the personal data should: 1. Be adequate, relevant and not excessive. For example college should keep students details and details must be just what is needed and nothing more. 2. Be processed in accordance with the data subject right. For example the person that the data refers to have the right to read the information about him/her and the organisation should provide hem/her with information they need. 3. Be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move. 4. Not be kept longer than necessary. For example it is alright to keep information for certain length of time but it would be wrong to keep information about past customers longer than a few years at most 5. Be obtained and processed for limited purposes. For example the organization must use the data only in the way it is described and it must not use it for any other purpose. 6. Be secure. This includes keeping the information backed up and away from any unauthorised access. It would be wrong to leave personal data open to be viewed by just anyone. 7. Not be transferred to countries outside Europe without adequate protection. Unless the country that the data is being sent to has a suitable data protection law 8. Be processed fairly and lawfully. For example if you put your money at bank no one can transfer your money without your permission. (a) What is the difference between the Internet, Intranet and Extranet? (P8) Internet: Are public networks that allow the user to use any of its facilities. Intranet and Extranet: is like a private internet. It is like a website that is only accessible to the members of a business or company. The different between Intranets and Extranet is: Intranet: Allow the members of organisation to access the access the system with an organisation. Extranet: Allow the members of organisation to access the system from different location but only by the users who have been given access rights. (b) * What is a browser? Is programme that can read web pages, by downloading HTML code and that allows the browser to interpret the code to the web page. A browser displays web pages, keeps track of where youve been, and remembers the places you want to return to, the most used browsers are Internet Explorer and Netscape Navigator. * Describe the role of a browser when using the Internet, Intranet and Extranet Browser allows the people to access information, view images, hear music and watch video, in the term of intranet and extranet the browser allows user to share documents, access databases and allow group work. * Describe the role of email when using internet communications. You can send email to an individual or to a group of people at the same time, you can create mailing list so that you can write a message and send it automatically to number of people. Also you can send files such as pictures, word document and sound as attachments to your message. (a) List major threats to an organisation that could happen while using the Internet. (P9) 1. Hacking (use to steal the personal details and private files of company) 2. The spreading of viruses (use to destroy or damage the important files of company) 3. Internet fraud (taking credit card details from customers) 4. Spay ware (is biggest threat in the computer system which allows someone to log into your computer and use it for their own purpose) 5. Spam ( sending unwanted messages especially commercial advertising) Purpose of assignment In this assignment, I have to do research and get information on the importance of data security and data safety. M research must be from ICT sources and non ICT sources and by using the evidence that I collect I should explain the importance of keeping customer information confidential, the main provision of data protection act, the role of browsers and email in internet communications, the difference between internet, intranet and extranet, the major threats to organization from internet and finally a poster that explains the importance of data safety and data security. The assignment will also gather key skills portfolio evidence. M5 Physical Security: Use of security guards, locks, reinforced doors, windows and walls depending on what is being protected. Use of ICT to enforce security entry on doors, and protected areas of buildings i.e.: swipe cards, fingerprint ID, voice recognition. Firewall: This is a security device, which acts as a single entry/exit point for information and access to a computer system. All traffic must pass through the firewall and therefore a system is secure from external threats. A firewall usually sits between the internal network of an organisation and access by the internet. Virus Protection: It is usual for systems to have some form of anti-virus software installed and running in the background. All files and devices introduced to the system would be scanned, any attempts to alter system files would be blocked, and notification made to the user/system administrator. Preventing the use of floppy disks is a good method of eliminating one source of potential virus problems. Identification of Users: A system of user IDs and passwords is a simple method of preventing unauthorised personnel accessing the system. These should be managed by the system administrator. With this, only some users will have access to certain programmes and data therefore increasing the level of security on sensitive data. In addition, some users may only be able to read the data and not write the data. Other users may not have the ability to delete or even to access certain files. Encryption software: the data may be encrypted (coded) into a form, which can only then be decoded by the intended user. If the data falls into the wrong hands, it will be meaningless. Backups: To guard against the loss of data, backups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment. Passwords software: Password protection usually involves a person typing in: * A User Name to identify the person. * A Password to identify the person. He should be the only one to know what it is. Computer viruses: which are programs that destroy the way computer operates without the knowledge of the user, there are huge numbers of viruses some are extremely malicious with the ability to delete or damage files and programs. Some of the threats that they cause to computer systems include: * Deleting data on the hard disk of the organisation computer system. * Enabling hackers to hijack the organisation system and use it for their own purposes. How do viruses spread: * CDs and floppy disks containing infected documents. * Emails containing infected attachments. Hackers: who gain unauthorised access to computer systems for the purpose of stealing and corrupting data, also gaining access to financial information about the organisation business or their customers for the purposes of fraud. Security measures may include * Each user should be given a user name and a password. * Computer usage may be logged. * Computers should be disconnected from a network when not in use. * Use a firewall a computer running software, which detects hackers dialling in to a network. Spam: authorised users downloading a web page or receiving an email with hidden active content that attacks the organisation system or send sensitive information to unauthorised people. Organisation can stop spreading of spam by using spam filtering software Spy ware: is software that is placed on organisation computer when the employee visits certain websites, it is used to secretly gather information about the organisation usage and sends it back to advertiser or other interested company to tracking the organisation system use .it can also slow down or crashes the organisation computer Pop up: Many company advertisers on the Internet by using windows that pop up in the middle of computer screen to display a message. They might also open when you click a link or button on a Web site, and they might open either over or under the window, you wish to view. Some pop-up windows can contain inappropriate content or can be a way for employee of organisation to accidentally download dangerous software (called spyware or adware) onto organisation computer. Infringement of copyright: Internet users are not allowed to copy or print some internet materials such as; video, music, files and photos without the permission of copyright holder and sometimes they may have to pay a licence to do so. Theft and fraud: credits card fraud for example people can steal the details on credits card and using them illegally to buy goods Sole trader: A sole trader is the actual owner of a business, a sole trader also has unlimited liability. All the debts of the business are the debts of the owner. They can not issues shares .The whole meaning behind Sole means that she/he does not have partners. (e.g. electrical repair, picture framing, photography, diving instruction, retail shops, and hotels) Partnership A Partnership can be liable for all debts, it is easy to setup, but is also inexpensive to form. Forming partnership requires an agreement that is some times called partnership agreement between two to twenty individuals which entitles them to jointly own and carry on a trader business together. A partnership is a contract between two or more persons who agree to pool talent and money and share profit or loss. Private limited company A Private limited company has limited liability (the shareholders cannot loose more than their original shareholdings), and a minimum of two shareholders and a maximum of fifty shareholders. It cannot offer its shares to the public. A private limited company is treated as a legal entity. Public limited company A company which may have an unlimited number of shareholders and offer its shares to the wider public. (e.g. Cadbury and Tesco) Multi-National company A company that does business in more than one country, usually by setting up branch offices. Tesco Characteristics * Type of company: Tesco is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: including food and non-food business, personal finance, internet shopping, electrical items, home entertainment, toys, sports equipment, and many more. * Profit / loss: Tescos Profit and Loss 2005 2004 Sales at net selling prices 37,070 33,557 Turnover including share of joint ventures 34,353 31,050 Less: share of joint ventures turnover (379) (236) Operating profit/(loss) 1,949 1,735 Share of operating profit/(loss) of joint ventures and associates 130 97 Net profit/(loss) on disposal of fixed assets 53 (9) Profit on ordinary activities before taxation 1,962 1,600 Underlying profit before net profit/(loss) on disposal of fixed assets, integration costs and goodwill amortisation 2,029 1,708 * Size of company: Tesco operates 923 stores and employs 240,000 people , there are 639 branches in Great Britain and 182 in the rest of Europe * Location: they operate in UK, Hungary, Poland, Czech Republic, Slovak Republic, Thailand, South Korea, Taiwan and the Republic of Ireland * Purpose of company: to create value for customers to earn their lifetime loyalty. * Aims: Built good non-food sales expanded into retailing services and exploited e-commerce successfully. * Objective: 1. To deliver a consistently strong customer offer. 2. Making their shopping trip as easy as possible. 3. Constantly seeking to reduce their prices to help customer spend less. * Logo: Cadbury Characteristics * Type of company: is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: chocolate and drinks brands. * Profit / loss: Cadbury Profit and Loss à ¯Ã‚ ¿Ã‚ ½ (Millions) 2006 à ¯Ã‚ ¿Ã‚ ½ (Millions) 2005 Turnover 6,508.00 6,085.00 Operating Profit / (Loss) 1,003.00 825.00 Net Interest (188.00) (205.00) Pretax Profit 843.00 642.00 Post Tax Profits 703.00 497.00 Total Dividend Paid n/a n/a Retained Profit / (Loss) for the financial year n/a n/a * Size of company: they operate in more than 35 countries and they employs over 55,000 people * Location: Americas, Europe, Middle East and Africa and Asia Pacific. * Purpose of company: the organization work together to create brands people love. * Aims : 1. Deliver shareowner performance. 2. Ensure their capabilities are best in class. 3. Reinforce reputation with employees and society * objective: 1. Responding to consumer needs quickly. 2. Grow shareowner value. 3. Attract and develop the best kind of people.

Saturday, October 26, 2019

BIG Brother and the Internet Essay -- Web security Internet Essays

'BIG Brother' and the Internet The Internet invention has most certainly opened many doors for a faster, more efficient educational medium. One can find information about almost everything, discussions range from daily issues to highly academic and scientific issues. It has indeed helped this generation to be much more productive and efficient. The vast web of electronic media that connects us is heralding a new age of communications. New digital networks offer a tremendous potential to empower individuals in an ever-overpowering world. However, these communications networks are also the subject of significant debate concerning governance and jurisdiction. While the free flow of information is generally a positive thing, serious problems arise when information flows free, problems such as: How to protect children and undesiring adults from exposure to sexually explicit or potentially offensive materials? How to protect intellectual property rights? How to determine which country's laws have jurisdiction over a medium that is nowhere and everywhere at the same time? How best to protect privacy and protect our values? How to ensure that legislators, access providers, and network users do not stifle disagreeable speech? While well-established legal principles and cultural norms give structure and coherence to uses of conventional media, the new digital media do not fit so easily into existing frameworks. The Internet might be helpful in making lives much more dynamic and resourceful, but we also hear hundreds of horror stories related to the Internet. Some people argue that it also has the potential of destroying our generation by exposing it to "pornography" and other "indecent" material readily available on the Intern... ...plamem.html>" (March 28, 97). 4: Biskupic Joan "Exploring the Frontiers of Internal Freedom" (March 17, 97) Document. "<http://washingtonpost.com/wp-srv/wplate/1997-03/17/037l-03179- idx.html>" (April7, 97). 5: Burton, Scott "The Indecency of the Communication Decency Act" Document."<http://www.isc.rit.edu/~sab0276/stv/cda.html>" (March 28, 97). 6: Fena, Lori , and Godwin, Mike. "Your Constitutional Rights have been Sacrificed for PoliticalExpediency" "<http:www.eff.org/pub/Alerts/cda_020296_eff.statement>" (March 28, 97). 7: Press Release. "Reno v. ACLU: The Road to the Supreme Court" (October 31, 96) Document. <http://www.aclu.org/news/n103196b.html>" (March 28, 97). 8: Webmaster. "ClariNet files suit over Communication Decency Law" Document. "<http://www.clarinet.com/suitepage.html>" (March 28, 97).

Thursday, October 24, 2019

Air Water Polution

Air and Water Pollution Derrick Harris University of Phoenix ENV/100 Sam H. Abbas PhD August 9, 2010 Table of Contents Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 3 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 Black Carbon Pollution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 Smog Pollution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 Water Pollution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5-6 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 Abstract Air and water pollution has become a great problem in society today. Pollution is not only effecting humans but it is effecting plants, trees and animals and the earth’s natural water supply. This document will give various examples of air pollution and water pollution and how it’s affecting the environment as a whole. Air and water Pollution Introduction The earth is constantly working hard to repair itself for man made pollution such as carbon monoxide, nitric oxide, sulfur oxides, volatile organic compounds and particulate matter. All of the above named pollutants are what is known as primary pollutions; the main reason that they are called primary pollutions is because they are directly released into the earth’s atmosphere and it has adverse affects on everything such as the uman anatomy, the reservoirs as well as animals and even the way major cities sky’s look. But the main things that will be discussed and analyzed are black carbon pollution and smog. The other matters that will be addressed is two types of water pollution such as, Oil spills and trash being dumped into oceans. Black Carbon Pollution According to  lbl. gov  (n. d. ),  Ã¢â ‚¬  Black carbon pollution is the release of tiny particles into the air from burning fuel for energy. Air pollution caused by such particulates has been a major problem since the beginning of the industrial revolution and the development of the internal combustion engine . Scientific publications dealing with the analysis of soot and smoke date back as early as 1896. Mankind has become so dependent on the burning of fossil fuels (petroleum products, coal, and natural gas) that the sum total of all combustion-related emissions now constitutes a serious and widespread problem, not only to human health, but also to the entire global environment. †Ã‚  (Why study black carbon pollution,  para. 1). This type of pollution is called primary pollution, because of the fact that the toxins from the fuel are released directly into the air. The adverse affects on humans from back carbon pollution can be asthma, and acute allergies. Black carbon pollution plays a major role in global warming â€Å"Scripps Institution of Oceanography at UC San Diego atmospheric scientist V. Ramanathan and University of Iowa chemical engineer Greg Carmichael, said that soot and other forms of black carbon could have as much as 60 percent of the current global warming effect of carbon dioxide, more than that of any greenhouse gas besides CO2. † (University of California – San Diego,  2008, para. 2). Smog pollution A smog (2010), according to Smog-Definition, A form of air pollution produced by the photochemical reaction of sunlight with hydrocarbons and nitrogen oxides that have been released into the atmosphere, especially by automotive emissions. Most smog in the world come from industrial plants such as power plants and emotions from cars. This type of pollutions is also called primary pollution as well. Smog effects the atmosphere in such a harsh way and causes things such as acid rain. Which destroys plants and some of the world water supplies and this is a very harmful. Smog also contributes to the overcast in some major cities such as New York, Los Angeles and all other major cities. This affects not only American cities but countries outside of the United States of America. Basically smog can be anywhere any major city is. Water Pollution Pollution is the world water way and water supplies is an ongoing problem because of a various reasons but some of the major reason are, oil drilling. Oil is one of the world natural resources and a great majority of it is found in oceans around the world. Now oil is a resources that is needed in society today but, it is also destroying ocean life and causing clean and fresh water to be continually contaminated. Another type of pollution in the water is the dumping of trash into the ocean; as far as the authors opinion trash dumping is one of the worse types of pollution because when different types of fish see the trash in the water the eat it. For example plastic bags are some of the most common things that, get dumped into the ocean and get mistaken for jellfish. Also, fish always get caught in old fish nets and find it hard to get out. These two types of water pollution’s are known as secondary pollution because they are not directly released in to the atmosphere but indirectly from a second source. Conclusion Pollution is and always will be a never ending problem and will continue to effect the world, unless the leaders of today’s society decides that the earth in which humans have to live on and get their resources from is important; pollution will always be a problem. References   lbl. gov. (n. d. ). Black carbon pollution. Retrieved from http://www. lbl. gov/Education/ELSI/pollution-main. html University of California – San Diego, . (2008, March  24). Black carbon pollution emerges as major player IngGlobal warming. Science daily. Retrieved from http://www. sciencedaily. com/releases/2008/03/080323210225. htm Smog. (2010). In Smog-Defenition. Retrieved from http://www. thefreedictionary. com/smog

Wednesday, October 23, 2019

Creativity in Critical Thinking Essay

In the health care profession, the skills, and abilities to think critically are an essential component of professional accountability and quality care. In order to manage the complexity of the work environment, and patient care issues, critical thinking will enable nurses think more effectively, and work through challenges to achieve the best possible results. There are many ways critical thinking can be used in nursing profession. Critical thinkers in nursing, demonstrate habits of the mind include flexibility, creativity, inquisitiveness, intellectual integrity, intuition, open-mindedness, perseverance, and reflection to manage complex matters in the health care arena (Rubenfeld, Scheffer, 2010). Nurses use creativity, one of the habits of mind in critical thinking to educate their patients. Example of Creative Thinking in Patient Education To provide safe care to the patients, nurses must utilize critical thinking abilities in the assessment of patient issues, the planning of care, and the implementation of care. Careful examination of all the aspects of patient care helps the nurse to reach a better outcome imparting education for the patient. When providing education or information to a patient, the nurses apply creative thinking, by using the counseling dialogues help the patient raise questions of why, how, and who. The nurses guide patients through identifying, and exploring the problem, consider the patient’s choices, choose a plan of action, and evaluate the results (Ranklin, 2005). For example, reducing falls in the inpatient unit. Fall risk assessment is a key safety issue in many inpatients. Identifying the risk for fall on patient admission, and implementing measures and reevaluate the patient is essential to prevent falls on the unit. Moreover educating the patient and families is a necessary step in preventing patient falls. Evaluation of an Example of Creative Thinking The presented example is a way of creative thinking to impart education to the patients. Firstly, visual observation of the at-risk patients helps the staff, patients, and families to prevent falls. Identification tools on the doors, at the bedside, yellow socks, and falls band on the arms enable the health care professionals to target implementation of fall prevention to the patients. The sign at the bedside which says, â€Å"Please call, do not fall†, and the bed alarm reminds the patients and their families that, they are at risk for falling. Participating communication with other health care personals regarding fall risk in a regular shift report, and creating visual cues in the patients’ rooms, alarm the nurses and other health care professionals to prevent patients getting harm from falling. Justification of Creativity in Critical Thinking Creative thinking helps the nursing professionals identify biological, behavioral and environmental risk factors. Patient fall is preventable by implementing effective, and creative fall prevention programs, and thus help the patients live better. Creative thinkers must have knowledge of the clinical problem. They should have the ability of assessing the present problem, and be knowledgeable about the underlying cause, and be able to overcome the situation. Creativity in critical thinking boosts the nurse’s ability to modify, and expand the existing knowledge in patient related situations. In creative thinking, health care professionals take initiative, examine strategies to use, and recognize the consequences of strategies, and make the decision. Creative thinking remains a key ingredient for individualized client care. In that nurse identifies the specific need of each patient, and makes interventions specific to those needs. Without creative thinking, nursing care would become consistent and routine. There is a strong relationship between critical and creative thinking. In order to provide education to the needy clients, nurses’ needs to utilize critical intelligence and to be a critical thinker (Daniels, 2004). Hence, hospitalized patients need an individual assessment when educating them. It is important that, nurse must learn to utilize critical thinking skills natural way when providing care to the patients.