Thursday, October 31, 2019

Article Review Example | Topics and Well Written Essays - 1000 words

Review - Article Example Creativity is important to every organization and can solve any problem. The success of the organization depends a lot on the capacity of the employees to invent new things, solving problems and imparting new ideas. The main issues unraveled in individual creativity research are â€Å"General Personality, Big Five Personality and Self Perception† (Egan, 163). In addition to these factors, several other sub-factors also have an impact like â€Å"creativity goal setting, evaluation and feedback, teamwork, role models and leadership and supervision† (Egan, 164). The Creative Personality Scale (CPS) is one of the most widely followed techniques in measuring individual creativity. The study found that creativity of a personality is enhanced by support from family members and peers. The system of evaluation and feedback can negatively affect the creativity of the employees. This curbs the natural instincts of the employees to improvise or rendering new ideas and hence creativity is negatively affected. The article dwells on individual creativity and the external factors influencing it. It forms a detailed study in understanding the creativity of the employees. Creativity is driven by many influential factors. It has to be kept in mind that creativity makes people more inclined towards work and drives them to work that much harder. A true leader will encourage creativity among the employees and thus will help in increasing the productivity of the organization. The article provides a detailed study on the external factors influencing creativity. To be an effective leader one has to keep an account of the external factors, as this would help to increase the creativeness of the employees. As we can infer from the article, satisfaction of the jobs is very essential in increasing the creativity of an employee. The job fulfillment of an entity relies upon the individual perception of the jobs. Therefore, it is very essential to choose the right kind

Tuesday, October 29, 2019

Compare between contrast system software and application software Essay

Compare between contrast system software and application software - Essay Example The computer programming tools include, but are not limited to the debuggers, linkers, compilers, Microsoft software development tools and Java development tools. The document focuses only the system and application software and provides their detailed comparison. The initial section of the document contains a description of the system and application software, however, it proceeds with the comparison and contrast between the system software and application software. The system software is developed specifically for the computer systems so that the computer system starts and runs the application software. After successful installation of the system software in the computer systems is able to run separately as well as over the computer network. There are different types of system software include: operating systems, device drivers, firmware, Graphical User Interface (GUI), Middleware and free system software. Initially, the operating system(s) (type of system software) are installed on the bare hardware of the computer system to provide an interface to the computer users for provision of computer services. The prominent examples of the operating system include: the Microsoft Windows OS, LINUX, UNIX and Mac OS. Once even one of the operating systems is installed in the computer systems enable the computer user to install various computer utility software to fulfill particular requirements of the computer users. However, the Middleware (type of the system software) can also be installed in the computer system to get functionalities that are even not provided by the operating system. Usually, the Middleware system software is used by the software developers so that they can get an interface to communicate with the computer hardware. It is pertinent to mention here that overall the system software is used for the specialized purpose by the

Sunday, October 27, 2019

Static Code Analysis

Static Code Analysis Jim Kielt Table of Contents (Jump to) 1.0 Analysis 1.1 Cross-Site Scripting: 239 vulnerabilities detected. 1.2 File Manipulation: 9 vulnerabilities detected. 1.3 SQL Injection: 4 vulnerabilities detected. 2.0 Bibliography Table of Figures Figure 1 RIPS results output for bWAPP Figure 2 Line of code from xss_json.php vulnerable to Cross-Site Scripting detected by RIPS Figure 3 Returned message from xss_json.php Figure 4 Returned message from xss_json.php with a script being passed to the application. Figure 5 Returned message from secured xss_json.php with the script being passed to the application. Figure 6 Vulnerable to File Manipulation code detected by RIPS Figure 7 Link to uploaded file on unrestricted_file_upload.php showing path to uploads Figure 8 Attempted upload of a PDF file on unrestricted_file_upload.php Figure 9 Vulnerable to SQL Injection code detected by RIPS Figure 10 Message from SQL Injection on sqli_3.php 1.0 Analysis The open source project for analysis for source code vulnerabilities is The Buggy Web App or bWAPP. This application is deliberately insecure to help security experts and students of IT security learn about the vulnerabilities that exist on the Internet today, how they can be exploited and how they can then be secured. bWapp is a PHP application that makes use of a MySQL database. [1] To analyse the source code for vulnerabilities, a static source code analysis tool is required. RIPS is such a tool which is written in PHP and designed to find vulnerabilities in PHP applications. It transforms the PHP source code that it is analysing; into a programme model that can detect potentially vulnerable functions or sensitive sinks that could then be tainted by user input that causes vulnerabilities. [2] So a potentially vulnerable function in source code that uses a source containing user input creates a vulnerability. bWAPP is available as a virtual machine called buzz-box where it can run as a stand-alone web server on a lab/testing network. To analyse the buzz-box server, the RIPS application files need to be extracted to the buzz-box server’s document root i.e. /var/www/rips/. Then on the host machine’s browser, navigate to http://localhost/rips to bring up the main scanning page. The path to the file or directory and/or subdirectories to be scanned is entered along with some available options before the scan button is clicked. The available options for scanning are as follows: Verbosity level:1. User tainted 2. User, file and database tainted 3. User, file and database tainted secured 4. User, file and database untainted secured 5. Debug mode Vulnerability type: All or one of the following: Server-side all or one of the following: Code Execution, Command Injection, Header Injection, File Disclosure, File Inclusion, File Manipulation, LDAP Injection, SQL Injection, XPath Injection, and other. Client-side all or one of the following: Cross-Site Scripting and HTTP Response Splitting Unserialized / POP For the bWAPP analysys, /var/www/bWAPP was entered as the path with the subdirectories option checked. Verbosity level option 2 (User, file and database tainted) and vulnerability type option All was selected. After clicking the scan button, 198 files were scanned in the web directory and after just under a minute, the statistical output in figure 1 was generated. According to RIPS, the scanner works by tokenizing and parsing all of the PHP source code in the file or directory structure and tranforms the code into a program model which detects sensitive sinks that can be tainted by user input, the source throughout execution of the program. At a glimpse it can be seen that Cross-Site Scripting has been heavely detected along with some of the other top vulnerablilties found in web apps today. Of the 198 files scanned, 4251 sensitive sinks (vulnerable functions) were found of which 293 could be tainted by user input and therefore considered vulnerabilities. The three chosen vulnerabilites for futher analysis are as follows: 1.1 Cross-Site Scripting:239 vulnerabilities detected. Cross-site scripting (XSS) is an injection attack where malicious scripts can be passed through user input on to the web application to create undesired effects and generally performed through a client browser. An attacker can use his browser to use XSS to execute a malicious script to another browser user visiting the same page and have the script display unintended information or perform an unintended action. Because the user’s browser has no way to know if the script should be trusted or not, it has no option but to execture the script. The script or tainted data becomes embedded into the HTML output by the application and rendered by the users browser which can lead to website defacement, phishing or cookie stealing and session hijacking.[3] A potentially vulnerable function like echo() which prints data to the screen that uses a source like $_GET containing user input can create Cross-Site Scripting vulnerability, e.g: $title = $_GET[title]; echo ($title]); The above code would display whatever the user enters and could therefore be exploited. To demonstrate the Cross-Site Scripting vulnerability in bWAPP, the focus is on the bWAPP/xss_json.php file/page. Figure 2 shows the code snipit where user input was found and marked by the scanner (white dots) as a potential entry point for exploitation. Line 34 of the program places unchecked user input straight into a function which causes the vulnerablility. Figure 2 Line of code from xss_json.php vulnerable to Cross-Site Scripting detected by RIPS This page was opened in a browser and was titled ‘XSS-Reflected(JSON)’, displaying one textfield and a search button looking for the name of a movie to be entered. To test how this page works, ‘Spiderman’ was entered using the ‘Marvel’ hint ans submitted. The resulting message appeared below the textfield based on the input (see figure 3). Figure 3 Returned message from xss_json.php So the user input was displayed back in the output message which could mean that the input was probably unchecked. To test how the texfield responded to a simple script to display cookie information in an alert box, the following was entered and submitted: alert(document.cookie) The message this time did not display the entered script statement but instead tried to execute the script and displayed lines of the code from the page (see figure 4): Figure 4 Returned message from xss_json.php with a script being passed to the application. This message reveals information about the application that should never be dispayed and raises a security concern. A hacker could learn further how to exploit the application using this information. Mitigation: We should never trust user data entered into an aplication which needs to be screened for the likes of scripting code. All entered data should be encoded before being embedded into the output. HTML encoding converts untrusted user input into a safe format that can be used as output instead of executing as code in the browser e.g Converts ‘’ to ‘amp’. For PHP applications, HTML entity encoding is done via the htmlspecialchars() function which convert all special characters to HTML entities.[4] To encode any double or single quotation marks that could be interpreted by the application as code, the ENT_QUOTES parameter is used to prevent any injections and defining the correct charset prevents any special characters being used in the input e.g UTF-8 ASCII compatible multi-byte 8-bit Unicode. Line 34 shows the vulnerable code which was updated to incorporate the mitigation to make it secure. Vulnerable code: $title = $_GET[title]; Secure code: $title = htmlspecialchars ($_GET[title], ENT_QUOTES, utf-8); Once the code was secured, the same script code was entered and submitted and this time, the message showed the script statement in the message but this time treated it as a string and did not attempt to execute it (see figure 5): Figure 5 Returned message from secured xss_json.php with the script being passed to the application. 1.2 File Manipulation:9 vulnerabilities detected. File Manipulation can occur with Full Path Disclosure vulnerabilities where an attacker can see the path of a file in the url of a webapp, e.g. /var/www/htdocs/file. This gives the attacker a partial knowldege of how the application is structured or how the underlying operating system is arranged in order to mount different kinds of attacks. [5] Knowing the location of a particular file, the attacker could access and manipulate it by adding malicious code to compromise the webapp server or even upload an attack tool to that location. A potentially vulnerable function like move_uploaded_file() that uses a source like $_FILES directly from user input (upload) can create File Manipulation, e.g. move_uploaded_file($_FILES[file][tmp_name], images/ . $_FILES[file][name]); To demonstrate File Manipulation in bWAPP, the bWAPP/unrestricted_file_upload.php page was examined. Figure 6 shows the vulnerable code where unchecked user input (the selected file for upload) is used by the application. Figure 6 Vulnerable to File Manipulation code detected by RIPS When the page was opened in the broswer, a ‘Browse’ and ‘Upload’ button were displayed where an image file could be uploaded to the server. A test image file was uploaded and the resulting message returned the link to where the file is stored on the server. The link was followed to a directory called ‘images’in the bWAPP directory. Navigating to the images directory brought up a list of all files in the that directory (see figure 7). A PDF file was then selected and successfully uploaded so no file type check was in place. Effectively these files could be manipulated as described above or malicious files uploaded and executed like a webscript that take control of the server. Figure 7 Link to uploaded file on unrestricted_file_upload.php showing path to uploads Mitigation: Sensitive information like file locations should not be visable to the user and any path or file names displayed should be encoded to prevent leakage of this information. This could be achieved by changing the path and filename to a format that the server understands like a hashing function. The move_uploaded_file function should have the file checked that the files being uploaded are image files before being uploaded to the ‘images’ directory. Line 34 shows the vulnerable code which uploads any file to the ‘images’ directly without being firstly checked. The preg_match() function can be used to check for particular file extensions, in this case images file types, in a new $filename variable. [6] A file check statement was added to the vulnerable code that checks for the file type and will now only execute the original code as long as the file has the correct extension using an if statement. Line 166 uses the $file_error variable to determine if the upload is successful or not which determines the output, so $file_error is firslty set to an unsuccessful attempt message by default which is cleared if the correct file extension executes. Vulnerable code: move_uploaded_file($_FILES[file][tmp_name], images/ . $_FILES[file][name]); Secure code: $filename = $_FILES[file][name]; $file_error = Not an image file, try again; if(preg_match(/.(gif|png|jpg)$/, $filename)) { move_uploaded_file($_FILES[file][tmp_name], images/ . $_FILES[file][name]); $file_error = ; } Once the code was secure, another PDF file was browsed to and the ‘Upload’ button clicked and this time because the file is now firstly checked for file type and because pdf in not in the array of allowable files, the upload function does not execute (see figure 8): Figure 8 Attempted upload of a PDF file on unrestricted_file_upload.php 1.3 SQL Injection:4 vulnerabilities detected. SQL Injection attacks happen when SQL queries are successfully injected through user input data into the application that can reveal information about the database to allow for further attacks where the database can be modified by the insertion, updating and deletion of data. [7] The user input is crafted in such a way that it is interpreted by the application as SQL commands allowing the attacker contol over the database in even the operating system itself. A potentially vulnerable function like mysql_query() that uses a source like $_POST containing user input can create SQL Injection e.g $login = $_POST[login]; $password = $_POST[password]; $sql = SELECT * FROM heroes WHERE login = . $login . AND password = . $password . ; $recordset = mysql_query($sql, $link); To demonstrate the SQL Injection in bWAPP, the bWAPP/ sqli_3.php page was examined. Figure 9 shows the vulnerable code where unchecked user input is used by the application. Figure 9 Vulnerable to SQL Injection code detected by RIPS When this webpage is loaded, it shows a login screen for ‘superhero’ credentials requesting a login and password. A basic test for web applications for SQL Injection is the entering of the following command in place for the username and/or password: or 1=1 The single quote is interpreted by the web application as a special character in SQL which allows for the additional condition to the SQL command 1=1 which is of course always true and the double hyphen is intrepreted by the web application as a comment which closes off the query. When the or 1=1 statement is entered into the login and password fields, a welcome note is displayed (see figure 10): Figure 10 Message from SQL Injection on sqli_3.php This shows that this web page is vulnerable to SQL Injection attacks which uses unchecked user input directly by the application which could be exploited in compromising the server. Mitigation: The most successful defence against SQL injections is to never use user input directly in the application and to use parameterized queries (prepared statements) instead — which is supported by most languages — and to avoid using dynamic SQL queries or SQL queries with string concatenation. For PHP the mysql_real_escape_string() function can be used to escape special characters in a string for use in an SQL statement. Lines 137 and 137 of the code takes in the user inputs which are executed in the SQL statement in line 140 which is the vulnerable code really is. By implementing the mysql_real_escape_string() function into the code it will escape any special characters. [8] Vulnerable code: $sql = SELECT * FROM heroes WHERE login = . $login . AND password = . $password . ; Secure code: $sql = SELECT * FROM heroes WHERE login = . mysql_real_escape_string($login) . AND password = . mysql_real_escape_string($password) . ; Once the code was secured, the or 1=1 statement was entered again into the login and password fields and this time instead of getting the previous message as above, the invalid message displayed (see figure 11) Figure 11 Message after attempted SQL injection on secured sqli_3.php 2.0 Bibliography [1] itsecgames. 2015. itsecgames. [ONLINE] Available at: http://www.itsecgames.com/. [Accessed 19 February 2015]. [2] RIPS free PHP security scanner using static code analysis. 2015. RIPS free PHP security scanner using static code analysis. [ONLINE] Available at: http://rips-scanner.sourceforge.net/. [Accessed 19 February 2015]. [3] Cross-site Scripting (XSS) OWASP. 2015. Cross-site Scripting (XSS) OWASP. [ONLINE] Available at: https://www.owasp.org/index.php/XSS. [Accessed 19 February 2015]. [4] PHP: htmlspecialchars Manual . 2015. PHP: htmlspecialchars Manual . [ONLINE] Available at: http://php.net/manual/en/function.htmlspecialchars.php. [Accessed 25 February 2015]. [5] Full Path Disclosure OWASP. 2015. Full Path Disclosure OWASP. [ONLINE] Available at: https://www.owasp.org/index.php/Full_Path_Disclosure. [Accessed 02 March 2015]. [6] PHP: preg_match Manual . 2015. PHP: preg_match Manual . [ONLINE] Available at: http://php.net/manual/en/function.preg-match.php. [Accessed 25 February 2015]. [7] SQL Injection OWASP. 2015. SQL Injection OWASP. [ONLINE] Available at: https://www.owasp.org/index.php/SQL_Injection. [Accessed 19 February 2015]. [8] PHP: mysql_real_escape_string Manual . 2015. PHP: mysql_real_escape_string Manual . [ONLINE] Available at: http://php.net/manual/en/function.mysql-real-escape-string.php. [Accessed 25 March 2015].

Friday, October 25, 2019

The Hasid and the Zionist :: Essays Papers

The Hasid and the Zionist The saying, â€Å"Opposites attract† actually comes to life in The Chosen, by Chaim Potok. There are both similarities and differences between Reuven and Danny. Usually, close friends have more similarities than differences, but not Reuven and Danny. They really are total opposites. They have differences on almost every aspect of life. They have different beliefs and ways of living. They even have differences in almost all of their relationships. Reuven and Danny are completely unlike. Reuven Malter is a Zionist; he was a Jew who wanted a Jewish state, before the Messiah came. He has always been good at math, not like Danny. He wanted to be a Rebbi when he grew up, although at first he wanted to be a mathematician. â€Å"The gematriya for prozdor is five hundred and thirteen (134).† Reuven really doesn’t think for himself, he always has his father help him with his problems. â€Å"I told him (251).† This pretty well sums up Reuven’s relationship with his father, he told him absolutely everything and never solved his own problems. Unlike Danny, Reuven and his father communicate really well together. Reuven hates Reb, Danny’s father, but Danny â€Å"Respects† him. â€Å"I hate Reb (221).† Contradictory to Danny, Reuven goes out with women on his weekends, while Danny sits at home studying. Reuven said, â€Å"I was dating regularly now on Saturday nights (250).† There are even some differences in ap pearance, such as, Reuven wears glasses and he doesn’t have ear curls. Danny Saunders is an anti-Zionist, which means he opposes Zionists. Danny was great in the study of the Talmud; Reuven on the other hand was kind of slow at it. Danny never actually wanted to be a Tzakkid; he always wanted to become a psychologist. â€Å"I don’t know, Probably a psychologist (69).† He constantly showed that he thought for himself, because every problem he had, he usually solved it by himself, he never got the answer like Reuven. Between Danny and his father, there is an uneasy silence, but Reuven and his father get along perfectly. â€Å"There was never any simple human kind of conversation between him and his son (184).† This is talking about Reb and Danny. Danny never says he loves his father, he only respects him, but Reuven however, despises Reb Saunders.

Thursday, October 24, 2019

Administrative Law Rev Essay

Freedom of Information Act 1982 is entirely in the interest of public who can have access to various documents of government of Victoria and its public agencies for verification or for any other useful purpose.   The sole objective of FOI Act is to bring awareness among public whether the functioning and operations of government are in order   and how public analyze the same. Section 22 provides about the charges to be paid for having access to specific documents.   The section provides technical details of payment of fee that is calculated with time that is taken for search of documents.   This is particularly due to the fact that   the time taken for search of documents may vary depending on the date of publication of document. This is also in order to reduce the payment of fee to be paid by public.   All sectors of public may not afford to pay high rate of fees for having access to government documents.   In view of such as these reasons, hourly rate and time taken for search of documents has been included in this section. The section also covers transcription (h)   and routine requests (g)   and in case of inspection of documents no charge shall be calculated (f) in pursuance of Section 8(1) or 11(1). Section 27 clearly states about reasons of refusal of documents by a Minister of state to that effect, applicant shall be informed about the reasons in writing.   This section is somewhat complicated with the fact that a minister or a government official is a servant of public and with that motive, public must be provided access to the documents which is the sole purpose of FOI Act. This section is likely to give rise to conflicts between and may bring a deep dissatisfaction to public. Some of the documents that contain health information are also restricted with the provisions of Health   Records Act 2001, which of these reasons are also to be stated to applicant.   Although there are clauses for applying of review of decisions, launch complain to Ombudsmen, it is both time consuming and   undecisive for applicants to move further with such grievances. Section 50 deals with applications for review which would be pending with Tribunal for decisions.   This may pertain to a request for document, charge made, decision for access, or any other specific request regarding information under FOI Act.  Ã‚  Ã‚   The Tribunal in all respects has to deal with each individual case, giving its due importance of provisions along with genuine reasons. This section is in favor of public, as Tribunal shall reconsiders and reviews the decisions and grants permissions to public in various aspects that are relevant to FOI Act. The Tribunal may refuse the decision of Minister or agency and give an order in favor of public. Those issues or requests for documents which were not considered by Minister, are very well resolved at Tribunal by applicants. Section 51 states that an applicant may apply to Principal officer or Minister for review of decision, which was given in the deemed absence within 28 days   for review of decision or refusing to give access to health documents as per Section 36 of Health Records Act 2001. This section offers powers and opportunities to public   for   reconsideration of requests for having access to documents.   Applicants have to be excessively vigilant in deriving the maximum benefit from the government bodies and officials.  Ã‚  Ã‚   This section is both useful for public and for principal officers to check the veracity of facts in all respects. Section 51A  Ã‚  Ã‚   deals with conciliation of Health Service Commissioner   which state that issues that were deferring in Section 50 and 51 in the matters of health documents, may suitably be taken up by applicant with this section and apply for Health Service Commissioner’s decision.   In case Health Service Commissioner fails to conciliate a request, to that effect an notice in writing must be issued to both applicant and Principal Officer. This appears as a last resort for applicant as the decision of Health Service Commissioner is the final approach for an applicant. Conclusion The enactment of FOI is made with a view of regularizing the functioning and to increase the   working efficiency of governments.   Apart from this fact, the public are also provided an in-depth knowledge about information and working status of governments. Although there are many technicalities involved in FOI Act, each section, sub-section and clause, a significance of reason is attached to it for the benefit of both public and governing bodies.

Wednesday, October 23, 2019

Are the social Sciences Really Inferior? Essay

Prologue It is a common notion that the social sciences, as it were, are inferior to the natural sciences when it comes to being a â€Å"science†. Some sects in the society even questions the credibility of the claim of the social sciences that they are indeed a science; several faction of the society views social science as a whole as being inferior to the natural science, a number of them even does not consider social sciences as a science at all. The article at hand, tackles this dispute by pointing out several points of comparison between the two bodies of knowledge so as to achieve clarity and a definitive answer regarding the matter at hand. The following are the points that the author of the article pointed out: invariability of observations, objectivity of observations and explanations, verifiability of hypothesis, exactness of findings, measurability of phenomena, constancy of numerical relationships, predictability of future events, distance from everyday experience, and stan dards of admission and requirements. The points presented by the author of the selection will be pondered upon in this paper in such a manner that clarity and clearness may be achieved. In this respect, the author of this paper took liberty of dividing the work into several headings, just like what the original writer did, and after each heading the authors own explanation of the matter at hand will be presented. In this manner, the author hopes to arrive at a scholarly paper that can ascertain the matter at hand. Invariability of observations To make things simpler, the notion that the author of the said article wants to establish under this heading is that the natural sciences imposes a sort of superiority over the social sciences. This is because of the fact that the natural sciences are invariant when it comes to its object of study, hence its object of study may recur. While in the case of the social sciences, since the nature of society is to change, its object of study is incorporated with variability. However, the author pointed out that there is  a social science that can be considered as invariable, and that is in the field of economics. In addition to what already has been stated, the author posited the position that the only difference in the variability between the social sciences and the natural sciences is that of degree, that is if we are talking about the real world. Taking a closer look at the matter at hand, we may safely state that there is indeed a difference between the two sciences when it comes to the variability of their object of study, this is due to the number of relevant factors to be taken into account for explaining or predicting events occurring in the real world. Objectivity of observations and explanations It is a common notion that the natural sciences will do everything in its power to at least reduce the level of subjectivity in their field, if not to completely annihilate it. On the contrary, the society views the social sciences as imbued with subjectivity and thrive on it. Well, this is true if we look at both sciences at a glance; however, taking a second look at it we may realize that even the natural sciences may have a little touch of subjectivity instilled in it. This assertion is based on the following factors: the scientist, who conducts the experiments and other vital stuff in the natural sciences, ethical problems, and selection of a project in the choice of the subject for investigation. The scientist The scientist, who conducts different sorts of experiments and tests in the laboratory, in one way or the other, is still imbued with subjectivity no matter how hard he try and no matter how hard they contest it to be. This is for the reason that the individuality of a scientist cannot be eliminated no matter what because he is still a human being in the first place. Ethical problems Ethical problems may influence the subject of study in the natural sciences in many various ways. Political pressure, media intervention, Church’s involvement etc. may affect the object of study in any natural sciences. This influence of diverse forces in the natural sciences may in the process infuse a subjective aspect in the object of study being scrutinized. Selection of a project in the choice of the subject for investigation The scientist chooses the project in the choice of the subject for investigation. As it implies, the scientist will of course choose the subject matter that interests him. In this manner, the subjectivity of the scientist is being instilled in the object of study under the natural sciences. It seems that the only difference between the two sciences when it comes to the heading being tackled is that social phenomena are explained only if they are attributed to definite types of action which are understood in terms of values motivating those who decide and act. The concern with values of the social sciences, it seems, is the crucial difference between the two. However, this does not take anything away from the social sciences and it is clear that this advantage is not a basis of superiority in either case. Verifiability of hypothesis In the case of the natural science, it is benefited with the capacity to have or conduct controlled experiments on the object of study. In this type of experiment the diverse factors that may affect the object of study are limited and controlled, that is the reason why in the natural sciences verifiability of hypothesis is possible. In the case of the social sciences, these types of controlled experiments and tests are not possible for the reason that the object of study of the social sciences deals with the society and the day-to-day living of different people, which makes it improbable to conduct experiments as such. Clearly, in this respect, the natural sciences have a vantage point vis-à  -vis the social sciences. However, this does not necessitate that the natural sciences are indeed  superior to the social sciences. Exactness of findings According to the article, the meaning of exactness best founded in intellectual history is the possibility of constructing theoretical systems of idealized models containing abstract constructs of variables and of relations between variables, from which most or all propositions concerning particular connections can be deduced. In this respect, the natural sciences are no different from the social sciences. This is for the reason that such systems cannot be found in several of the natural sciences– in several aspects in biology for instance–while it can be found in at least one of the social sciences: economics. Given this fact, it cannot be asserted that the natural sciences are indeed superior to the social sciences regarding the factor at hand. Measurability of phenomena The point of the author in this particular portion of the article is that there is no way of judging whether non-quantifiable factors are more prevalent in nature or society. In this light, there can be no aspect of superiority or inferiority regarding this matter between the natural and the social sciences. Constancy of numerical relationships Regarding this matter, there is without a doubt that the natural sciences are in advantage if compared to the social sciences. This is due to the fact that in the natural sciences, there exist such a constant law and figures that can never be changed or alter in any manner. On the contrary, in the case of the social sciences there are no such constant laws or figures to support and supplement the body of knowledge in its endeavor. This is for the reason that in the real social world nothing is constant but change, and it is due to this nature of the social world that constancy is far from being achieved. Predictability of future events The common notion regarding the predictive power of the natural science is true, given the fact that it does not permeate different factors that can alter the prediction. In other words, due to the controlled experiments of the natural scientist, prediction is not far from being reached. However, in the case of the social sciences, wherein the object of study is the society, predictability is hard to find. According to the author of this particular article, the only difference between the two sciences in this respect is that experts in the natural sciences usually do not try to do what they know that they cannot do; and nobody expects them to do it. Social scientists, on the other hand, for some strange reasons are expected to foretell the future and they feel bad if they fail to do so. Distance from everyday experience Science is viewed by many as anything that cannot be comprehended by a layman or an ordinary person. The object of study of the natural sciences are somehow not attuned and far from the day-to-day experiences and living of the ordinary people. While the object of study of the social sciences are directly affects the fervor of the masses. This is the reason that the social sciences are more close to the hearts of men. However, this does not say anything regarding the query at hand. Standards of Admission and requirements According to some study the IQ level of the students of physics are more advance than those students in other courses. In this basis where the foundation of the natural sciences’ claims that there proponents are more intelligent than those of the social sciences. However, as stipulated by the author of the said article, this does not assert anything in favor or against both the social and the natural sciences for the reason that this  factors depends entirely on the school or the academe that are offering such courses. It is a given fact that the natural science students are more advance in terms of their IQ level for the reason that they are more adept in calculus than any other students. Nonetheless this does not entail that the natural sciences are superior to the social sciences. The Score Card Taking a closer look at the point by point comparison made by the author between the factors that may be able to point out the difference between the two bodies of knowledge, we may ascertain that there are at least three definitive advantage of the natural sciences with regards to the social sciences, namely; invariability of observations, verifiability of hypothesis, and constancy of numerical relationships. However, the way the author of this paper sees it, these advantages are mere benefits that the natural sciences enjoys and these vantage point does not entail that the natural sciences are superior to the social sciences in any manner. On the second thought, the author of this paper thinks that there is no point of comparison between the two sciences at hand. This is because of the reason that the one is not an alternative of the other. The social sciences are not an alternative of the natural sciences, wherein we can choose one over the other. Instead, the two bodies of knowledge go hand in hand to make the complex world that we are living in comprehendible to the society. Without one of these sciences an individual person may find himself amidst a cloud of confusion and bewilderment. The factors presented in the paper do not imply that we ought not to study social sciences because of its inferiority to the natural sciences. The vantage point of the natural sciences is but a benefit that can be enjoyed by this particular body of knowledge. To sum things up, the so-called inferiority of the social sciences to the natural sciences is but a phantom that the society in general integrates to the former, viewing the later as indeed superior. Epilogue In chapter one of the set of articles that we were asked to read, the thesis  question presented is that â€Å"is the social science really inferior to the natural science?†. On the course of our discussions and presentation of facts, we come to the conclusion and understanding that the natural sciences indeed has some advantage to enjoy and maximize if compared to the social sciences. However, as pointed out in the paper at hand, these vantage points does not entail that the natural sciences are superior to the social sciences in any manner. This is for the reason, as stipulated earlier; the one is not an alternative or a substitute of the other. This is for the same reason that, as the author of this paper views it, there is no point of comparison between the two bodies of knowledge at hand. Indeed, there are several advantages when it comes to the nature and structure of the natural sciences if compared to the social sciences. However, these advantages should not be viewed in lieu of the superiority/inferiority debate; instead it should serve as a challenge on the part of the social sciences to maximize and make the most out of the available resources of the social sciences to be able for it to comply and be attuned with the needs of the social reality.