Saturday, December 28, 2019

Bacteria Relationships - Bacteria and Humans

Bacteria are all around us and most people only consider these prokaryotic organisms to be disease-causing parasites. While it is true that some bacteria are responsible for a large number of human diseases, others play a vital role in necessary human functions such as digestion. Bacteria also make it possible for certain elements such as carbon, nitrogen, and oxygen to be returned to the atmosphere. These bacteria ensure that the cycle of chemical exchange between organisms and their environment is continuous. Life as we know it would not exist without bacteria to decompose waste and dead organisms, thus playing a key role in the flow of energy in environmental food chains. Are Bacteria Friend or Foe? The decision as to whether bacteria are friend or foe becomes more difficult when both the positive and negative aspects of the relationship between humans and bacteria are considered. There are three types of symbiotic relationships in which humans and bacteria coexist. The types of symbiosis are termed commensalism, mutualism, and parasitism. Symbiotic Relationships Commensalism is a relationship that is beneficial to the bacteria but does not help or harm the host. Most commensal bacteria reside on epithelial surfaces that come in contact with the external environment. They are commonly found on the skin, as well as in the respiratory tract and the gastrointestinal tract. Commensal bacteria acquire nutrients and a place to live and grow from their host. In some instances, commensal bacteria may become pathogenic and cause disease, or they may provide a benefit for the host. In a mutualistic relationship, both the bacteria and the host benefit. For example, there are several kinds of bacteria that live on the skin and inside the mouth, nose, throat, and intestines of humans and animals. These bacteria receive a place to live and feed while keeping other harmful microbes from taking up residence. Bacteria in the digestive system assist in nutrient metabolism, vitamin production, and waste processing. They also aid in the hosts immune system response to pathogenic bacteria. Most of the bacteria that reside within humans are either mutual or commensal. A parasitic relationship is one in which the bacteria benefit while the host is harmed. Pathogenic parasites, which cause disease, do so by resisting the hosts defenses and growing at the expense of the host. These bacteria produce poisonous substances called endotoxins and exotoxins, which are responsible for the symptoms that occur with an illness. Disease-causing bacteria are responsible for a number of diseases including meningitis, pneumonia, tuberculosis, and several types of food-borne diseases. Bacteria: Helpful or Harmful? When all of the facts are considered, bacteria are more helpful than harmful. Humans have exploited bacteria for a wide variety of uses. Such uses include making cheese and butter, decomposing waste in sewage plants, and developing antibiotics. Scientists are even exploring ways for storing data on bacteria. Bacteria are extremely resilient and some are capable of living in the most extreme environments. Bacteria have demonstrated that they are able to survive without us, but we could not live without them.

Thursday, December 19, 2019

The War Of The Civil War Essay - 1688 Words

The establishment for dark support in the Civil War started more than a hundred years before the episode of the war. blacks had been in servitude since early pilgrim times. In 1776, when Jefferson announced humanity s unavoidable right to life, freedom, and the quest for joy, the organization of subjection had turned out to be immovably settled in America. blacks worked in the tobacco fields of Virginia, in the rice fields of South Carolina, and drudged in little ranches and shops in the North. Foner and Mahoney report in A House Divided, America in the Age of Lincoln that, In 1776, slaves made forty percent out of the number of inhabitants in the provinces from Maryland south to Georgia, yet well beneath ten percent in the states toward the North. The development of the cotton gin by Eli Whitney in 1793 gave an interest to cotton in this way expanding the interest for slaves. By the 1800 s servitude was an organization all through the South, a foundation in which slaves had few rights, and could be sold or rented by their proprietors. They did not have any voice in the legislature and carried on with an existence of hardship. Considering these circumstances, the slave populace never relinquished the yearning for opportunity or the determination to oppose control by the slave proprietors. The slave s response to this yearning and determination brought about altogether resistance and individual demonstrations of rebellion. Nonetheless, history specialists put theShow MoreRelatedCivil Wars And The Civil War873 Words   |  4 Pages Therefore, the fact that ISIL has become very active in the context of civil war could be a strong indicator of its affiliation to AQ. This, as Robbins (2014) argues, is because civil wars can be said to be better and more reliable predictors of AQ affiliated groups than mere affiliation. This further means that the civil wars in Syria and Iraq could be better used to determine which groups taking part are AQ-affiliated than the mere fact that the groups have been known to be affiliated. It meansRead MoreThe War Of The Civil War1522 Words   |  7 PagesCosts The war produced about 1,030,000 casualties, including about 620,000 soldier deaths—two-thirds by disease, and 50,000 civilians. The war accounted for roughly as many American deaths as all American deaths in other U.S. wars combined. Based on 1860 census figures, 8% of all white males aged 13 to 43 died in the war, including 6% in the North and 18% in the South. Union army dead, amounting to 15% of the over two million who served, was broken down as follows: Notably, their mortality rateRead MoreThe War Of The Civil War964 Words   |  4 Pageswasn’t one sole cause of the Civil War but there were many events that took the country to war and put brother against brother and states against states. Abraham Lincoln wanted to preserve the union and that could only be attained by civil war. Slavery which was an underlying cause for the war played its role in the division that divided the North against the South. Ultimately the preservation of the union, slavery and the consequences and conflicts leading to the Civil War all rested on President Lincoln’sRead MoreThe War Of The Civil War1540 Words   |  7 PagesOver the course of the Civil War, approximately three million men (and a handful of women disguised as men) served in the armed forces. By comparison, before the war, the U.S. Army consisted of only about 16,000 soldiers. The mobilization that took place over the four years of the war touched almost every extended family North and South and affected the far reaches of the country that had split in two. By war’s end, approximately 620,000 men had died, an estimate that is currently undergoing scrutinyRead MoreThe War Of The Civil War777 Words   |  4 PagesThe widespread violence that turned into the Civil War began with the election of 1860. Abraham Lincoln won the election of 1860 without a single vote from the states below the Ohio River. South Carolina was the first state to respond to Lincoln’s election. On December 20, 1680, South Carolina seceded from the Union. South Carolina was the first of the â€Å"Original Seven† who seceded from the Union, including Mississippi, Florida, Alabama, Georgia, Louisiana, and Texas. This became known as â€Å"secessionRead MoreThe War Of The Civil War921 Words   |  4 PagesThere are no doubts that acts of war can have a negative impact o n the individuals involved. There are countless stories of the soldiers’ experiences in the war, and how it affected their lives, families, and attitudes. However, there is a large demographic that is hardly accounted for: children, specifically during the Civil War era. Understanding the children that lived in the time of the Civil War is important because it affected their future careers, shaped their attitudes towards race, and affectedRead MoreThe War Of The Civil War1039 Words   |  5 PagesThe civil war is by far the bloodiest war in American history. In the four deadly years of war, over six-hundred thousand Americans were killed. Many disputes that led to the civil war. These conflicts started under President James Buchanan who was a Democrat elected in the election of 1856. The issue of slavery, states’ rights, the abolitionist movement, the Southern secession, the raid on Harper’s Ferry, the election of Abraham Lincoln all contributed to the start of the civil war. The civil warRead MoreThe War Of The Civil War1284 Words   |  6 PagesEnglish 30 January 2015 The Civil War There are many facts most people generally do not know about the Civil War, so much research is needed to improve one’s knowledge about the Civil War. Authors such as: Robert G. Lambert, Rustle B. Olwell, and Kay A. Chick were all helpful in this research. Many people think that everyone on the Union side of the war believed that blacks should be equal to whites. Most people also think that everyone on the Confederate side of the war believed in slavery. SomeRead MoreThe War Of The Civil War Essay1444 Words   |  6 PagesThe story of this outlaw originated during the Civil War years, April 12,1861-May 9, 1865. The War were the rich sat and watched, while the poor died. A War that wanted to keep black people as slaves permanently by the South (Confederates). Newton Knight quickly grew unhappy with the situation that the people of Jones County, where he was originally from were in. He also did not approved of slavery at all. Newt was the Outlaw who freed Jones County s people, whites and blacks alike when they mostRead MoreThe War Of The Civil War1093 Words   |  5 PagesThe Civil War served as yet another reminder that although the US had successfully broken off away England, a long road still remained before total domestic unity. This war was bloody and it divided the nation, towns, and even families. With both sides fighting for their personal ideologies, this was more than a mere territorial war. Many aspects of this war will forever act as a blemish on our nation s history. In this essay, we will explore one aspect; the camps that were used to contain the prisoners

Wednesday, December 11, 2019

Computer Crimes and Digital Investigations †MyAssignmenthelp.com

Question: Discuss about the Computer Crimes and Digital Investigations. Answer: Introduction: Jane is an undergraduate student in her late-twenties going to a state-funded college in the US. After accepting a progression of messages and texts containing sexually explicit remarks she looks for assistance from her folks. Content inside the messages demonstrates that the sender knows that Jane goes to a public university, the general population in her kinship circle, and other individual data. The personality of the originator isn't revealed in the correspondence. Worried that the sender might utilize identifiable data about Jane accessible on the Internet, her dad performs an online research. He finds different remarks specifying Jane by name in postings on sexual sites, which have all the earmarks of being facilitated abroad. In any case, both Jane and her folks are hesitant to report the issue, as they trust police cannot examine wrongdoings related to the Internet and innovation. Jane is additionally humiliated about the substance of the postings and keeps up the episode is most likely not sufficiently genuine for police to explore. About seven days after the underlying contact, Jane advises her folks that she got a call from an outsider communicating enthusiasm for taking an interest in 'sexual dreams.' The guest asserted to react to an online message before he hung-up. Jane shows her folks a posting she found on an online announcement board containing her name and telephone number and a message broadcasting that she fantasizes about being assaulted. Jane, therefore, gets an email message containing dangers to hurt her. Joined to the message are a few photographs delineating the house where she lives and pictures of her meeting with companions at college. There is additionally a picture demonstrating a thing of her apparel that she accepts was taken from the clothesline. Jane and her folks report the issue to the nearby police station soon after that (Marcovici, 2014). Analysis and Findings Digital crime is any crime committed using a digital device; could be a computer, a PDA, mobile phone or a tablet (Jewkes, 2013). Digital evidence is any information stored in or transmitted in digital form and can be used to persuade based on proof in a court of law. Digital evidence should be handled in such a way that it can be inadmissible in court. Digital evidence is latent and transcends national borders easily with speed and can also be altered, destroyed or damaged easily. It is therefore imperative that special care is taken when dealing with the collection, examination, preservation, and transmission of digital evidence (Scheidlin, 2016. pg380). Careful handling of digital evidence is necessary for it to be used in a court of law as evidence. The collection, preservation, examination, and transmission of digital evidence raise various legal and ethical issues from both sides of the divide. Prosecutors and digital forensics experts have to comply with the law when dealing with digital evidence to ensure that they present a good case before any judge or jury in a court of law. Criminals, on the other hand, use all the tricks available to ensure that they tamper with digital evidence making it difficult to be held accountable. Legal and ethical considerations for investigating digital crimes Technical specialists, police, legal counselors, criminologists, and national security experts comprehend the idea of 'digital wrongdoing' contrastingly. It is progressively misty whether digital wrongdoing alludes to lawful, sociological, mechanical, or legitimate parts of wrongdoing and an all-inclusive definition stays tricky (Jewkes Yar, 2013). Investigators have endeavored to outline the basic qualities of digital wrongdoing with a restricted accord. Current definitions differ fundamentally, contingent upon the legitimate instrument or association characterizing the term. The abuse of ICT by offenders is conversely alluded to as digital wrongdoing, PC wrongdoing, PC abuse, computer-related wrongdoing, high innovation wrongdoing, e-wrongdoing, and innovation empowered wrongdoing, among others (Ruan, 2013. pg2). The semantics of 'digital wrongdoing' point to a lawful and specialized wonder that restricts criminal action associated with the digital area. Such movement is completely distinctive to conduct esteemed 'deceptive' or 'illegal' which does not exist in itself sum to 'criminal lead.' The creator attests that criminal equity procedures ought to just be locked in when a course of lead is resolved to be illegal and warrants arraignment. Key to most legitimate frameworks is the rule of 'nullum crimen sine lege', meaning regardless of how hurtful the conduct, it can't be indicted unless it is formally disallowed by law (Cropf Bagwell, 2016. pg. 149). For the motivations behind this examination, the following components must be available for a demonstration to be named digital wrongdoing affronting: The direct is encouraged by data and interchanges innovation; The direct is roused by plan to confer hurt against a man or association; The executed or planned damage envelops lead adding up to impedance or, on the other hand, harm to either unmistakable or impalpable property possessed by a man or association; also, The lead concerned is criminalized inside either the purview of the casualty or the ward of the denounced. Policing has been altered by advanced criminology and the improvement of specific devices to help investigative procedures into digital wrongdoing irritating. As a logical field of an attempt, measurable science utilizes innovation to aid the foundation of certainties by a courtroom. Advanced legal sciences are a branch of measurable science, which incorporates the revelation, obtaining and examination of data, related to computerized gadgets. Initially utilized as an equivalent word for PC legal sciences, the term advanced crime scene investigation has extended to include the examination of any device fit for putting away data in advanced shape. Advanced legal sciences investigations have an assortment of uses also; the utilization of criminological systems in the advanced area is progressively a basic component of innovative examinations, yet additionally to help or negate the hypothesis of a case in conventional common and criminal examinations. "As a measurable train, nothing sin ce DNA innovation has had such a vast potential impact on particular sorts of examinations and indictments as digital forensic science." Technical tactics in digital crimes, steps involved in a digital forensics investigation The nature of the procedures used to safeguard the integrity of digital evidence, from the moment it is captured to the point that it is presented in court, must be shown by the defender of the proof to substantiate its dependability and reliability. The chain-of-custody process is utilized to check that the submitted evidence is free from altering or adjustment. Evidence progression is normally an issue of truth, and the chain-of-authority process is the instrument connected to keep up and record the sequential history of proof as it moves from one place to another (Peterson Shenoi, 2013, pg.19). The chain-of-authority decide protects that any data exhibited as prove is in substantively an indistinguishable state from when it was seized. Coherence must be kept up for both the physical gadget lodging the information, and the data put away on the gadget itself. The gathering offering the confirmation must show to the reality discoverer that the data recovered from the gadget is a valid and exact portrayal of the first information encoded on the gadget (i.e., genuineness). It should likewise be exhibited that the physical gadget looked to be presented as confirmation is indistinguishable to what was at first found and therefore taken into custody. There are various software available for making exact copies of the original media. This technique is known as imaging. Imaging is necessary to maintain the authenticity of the data collected and prevent tampering with the original storage media. Imaging is also important in cases where the digital media may be set to self-destruct, therefore the technique may come in handy when making the exact copy which may then be presented in a court of law and be used to persuade the court based on proof about the criminal culpability of the suspect. Over the span of an examination, police, as a rule, accumulate data around an occasion after it has happened. The re-authorization of digital wrongdoing insulting expects agents to follow interchanges back to a source and recover data about that correspondence. The limit of police to distinguish people responsible for area names and Web Protocol (IP) addresses at a given point in time is an essential advance in the investigative. Examiners with the imperative lawful expert and related data about a suspect (e.g., username, IP address, time and date of suspicious movement) may likewise have the capacity to get endorser information, value-based or activity information, and content information from specialist co-ops. Examiners are more liable to set up a connection between a suspect and the commission of wrongdoing on the off chance that they can secure information from physical gadgets utilized by a suspect to confirm endorser, value-based and content information. Article 1d of the Budapest Convention characterizes "movement information" as "any PC information identifying with a correspondence by methods for a PC framework, produced by a PC framework that shaped a section in the chain of correspondence, showing the correspondence's inception, goal, course, time, date, size, term, or kind of hidden administration" In a few purviews, media communications suppliers can supply specialists with putting away substance, for example, voice message, call logs, and codes for getting to information contained on Subscriber Identity Module (SIM) cards by utilizing Pin Unlock Key (PUK) codes for handsets (Moore, 2017. pg182). Police may likewise follow telephones continuously through the media communications arrange to utilize cell tower information in the blend with geospatial innovation (e.g., Stingray) which may likewise be customized to coordinate telephone flags and voice. However, the wealth of broadcast communications transporters can make it to a great degree hard to follow a solitary correspondence, as numerous lawful forms are conceivably required to just build up a source. Plans of action identified with maintenance and capacity of information likewise vary provincially. In many cases, police are capable "to effectively follow maybe a couple of steps, just to discover that an upstream transporte r has not held the data, which is basic to proceed with the examination. The likelihood of acquiring data from an ISP normally relies upon police having legitimate expert to influence such to a demand and there being sufficient information maintenance and logging arrangements set up. The fleeting idea of client logs and the "money related and human costs related with a social event and keeping up account data diminishes the plausibility that Internet specialist organizations will willfully gather and keep up such information for a valuable timeframe. Without universally accepted gauges concerning information maintenance, examiners frequently find wellsprings of ESI vanishing as logs are overwritten, and information records are cleansed to free space (Watson Jones, 2013). While agents might have the capacity to urge an ISP to stop or protect put away information, the issue of information maintenance stays extremely questionable. Some lawful national structures engage police and security organizations to acquire court requests to catch correspondences between PCs in earnest and excellent cases. The Code of Criminal Procedure (2000) in France incorporates an energy to order archives important to an examination including the exchange and change of PC information, the unscrambling of PC information, wiretapping, and the capture of different interchanges (e.g., Articles 706-35, 706-47, 706-81, 227-18, and 227-24). This enactment additionally gives a lawful reason for the exercises of law authorization organizations occupied with online examinations. This power stretches out to observing people associated with carrying out a wrongdoing when law requirement officers assemble confirm by acting on the web like criminal associates or beneficiaries. Continuous computerized observing exercises, additionally called 'tapping' and 'bothering,' can be encouraged with utilization of incognito programming and equipment instruments, which, once introduced, empower access to gadgets possessing suspects (Gutie?rrez, 2015). Live block attempt procedures likewise enable examining experts to catch transmissions as they are sent and got. For instance, the Regulation of Investigatory Powers Act (2000) (RIPA) gives law implementation organizations in the UK with the ability to: Intercept interchanges (i.e., movement and substance information; Conduct 'meddlesome reconnaissance' (i.e., undercover in private premises or vehicles, and so on.); Conduct 'coordinated reconnaissance' (i.e., secretive in an open place); Use incognito human insight sources (i.e., covert specialists); and Monitor interchanges information (e.g., records identified with correspondences however not the substance of such interchanges, and so on.) 'Remote Administration Tools' (RATs), console sections checked utilizing keystroke lumberjacks, cameras introduced to catch passwords and physically connect action with a particular client, and 'parcel sniffers' actuated to capture correspondences and assemble data about a specific system. While ordinary investigative forces preclude remote looks past the neighborhood locale, it can be tough to decide when information crosses global fringes. The legitimate treatment of information may contrast altogether starting with one nation then onto the next, representing a minefield of specialized and legitimate complexities (Graves, 2014. pg472). All things considered, it winds up noticeably important that agents and prosecutors be well-informed of geo-particular information mapping issues and keep up watchfulness in watching administrative changes all around, including the burden of approvals and embargoes between country states. Overseeing double culpability arrangements for removal, handling demands for common legitimate help and adjusting touchy strategic relations are for the most part critical encumbrances for examinations concerning digital wrongdoing affronting. Indeed, even where solid strategic ties exist, immature states are probably not going to have sufficient investigative forces or assets to help cross-fringe examinations (Walden, 2016). To defeat these obstacles, some nation states have instituted enactment with extraterritorial reach to engage household law authorization organizations to remotely get to information put away in outside wards (i.e., 'on the web examination'). Be that as it may, the worldwide group has communicated concern about these infringements on state sway. Report on the results of an investigation As the look for the way to battle digital wrongdoing has heightened, so have the desires. The potential for electronic proof to contribute toward results in criminal trials is needy upon the states of mind of non-specialized partners, for example, the police, prosecutors, legal counselors, and the legal. It is fundamental that specialists, legal advisors, judges, and laypeople have an attention to decisively what constitutes electronic proof and the breaking points of digital wrongdoing request (Grama, 2015. pg. 461). According to White 2016, an Officer of the Court has a general obligation to help the court in the organization of equity. In any case, legal counselors and specialists tend to show criminological proof in a way that "mirrors a scientific articulation of likelihood rather than evidence past sensible uncertainty." The way in which the media depicts the abilities and convenience of criminological techniques through TV, silver screen, and writing, plainly misshapes desires. In actuality, legal request is fundamentally an extended procedure. Research center staff, specialists, prosecutors and judges all work under exceptional execution and asset stressors, committing errors also, oversights more probable. Welfare issues likewise emerge as criminal equity officers are over and over presented to indecent material. Conclusions Because of issues of closeness and remoteness, the distinguishing proof of digital wrongdoing insulting will regularly depend on incidental confirmation to set up that a specific suspect was in control of a gadget when an offense happened. Conditional proof sets up actualities by derivation from other demonstrated actualities. In that capacity, conditional confirmation is roundabout proof identifying with issues that in disengagement don't add up to coordinate proof of any reality in issue be that as it may, from which certainties in issue, or matters important to actualities in issue, may sensibly be derived. Fortuitous proof can be to a great degree profitable in checking initiation and realness of data (e.g., metadata, witness proclamations, historical verifications, course of events investigation, Internet perusing history, action on long-range informal communication sites, information held by specialist organizations, and so forth (Williams Chuvakin, 2012). At the point when the arraignment tries to depend on conditional confirmation to build up blame, every sensible theory reliable with the blamelessness of a litigant must be prohibited. As it were, the tribunal of certainty (i.e., judge or jury) must be fulfilled past sensible uncertainty that all components of the offense are demonstrated (White, 2016). As needs are, the main rational induction to be drawn from the confirmation altogether, what's more, not by considering singular things of proof in segregation that can't bolster the induction looked for, and is that the respondent is blameworthy as charged (Daniel Spielman, 2012). References Bryant, R. and Bryant, S. (2016). Policing digital crime. London: Routledge. Cropf, R. A., Bagwell, T. C. (2016). Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance. Daniel, L., Spielman, S. (2012). Digital forensics for legal professionals: Understanding digital evidence from the warrant to the courtroom. Waltham, Mass: Syngress/Elsevier. Grama, J. L. (2015). Legal issues in information security, second edition. Burlington, MA: Jones Bartlett Learning. Graves, M. W. (2014). Digital archaeology: The art and science of digital forensics. London: Addison-Wesley. Gutie?rrez, Z. A. (2015). Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe. Berlin: Springer Berlin. International Conference on Cyber Warfare and Security, Abouzakhar, N. (1900). Proceedings of the 14th European Conference on Cyber Warfare and Security ECCWS 2015. Jewkes, Y. (2013). Crime Online. Hoboken: Taylor and Francis. Jewkes, Y. and Yar, M. (2013). Handbook of Internet Crime. Marcovici, M. (2014). How to deal with a stalker: ...and other assaults on person or property. Norderstedt: Books on Demand. Moore, M. (2017). Cybersecurity breaches and issues surrounding online threat protection. Peterson, G., Shenoi, S. (2013). Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers. (Advances in digital forensics IX.) Berlin, Heidelberg: Imprint: Springer. Ruan, K. (2013). Cybercrime and cloud forensics: Applications for investigation processes. Hershey, PA: Information Science Reference Scheindlin, S. (2016). Electronic Discovery and Digital Evidence in a Nutshell. West Academic. Walden, I. (2016). Computer crimes and digital investigations. Oxford, United Kingdom: Oxford University Press. Watson, D., Jones, A. (2013). Digital forensics processing and procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements. Amsterdam: Syngress. White, P. (2016). Crime scene to court: The essentials of forensic science. Williams, B. R., Chuvakin, A. (2012). PCI compliance: Understand and implement effective PCI data security standard compliance.

Wednesday, December 4, 2019

Why the compromises from 1846~1861 failed to prevent the Civil War free essay sample

The compromises from 1846 to 1861 were, by their intentions, to postpone the struggle between the north and the south temporarily but not to solve it. The foundational problems, like the the slavery itself, the differences in social structure and economic system and the expansion of slavery, were left. The increasing struggle between the abolitionists and slave owners and between the newly formed Republican Party and the Democratic Party kept putting those questions in front of the US people. The compromises themselves failed to satisfy the wants of both sides, enraged the north and frightened the south, so up to the election of Lincoln, the tension built up to a climax and finally broke out to become a civil war. A major difference between the north and the south was the legality of slavery, according to compromise of 1820 the line of 3630 north divided this country into two parts, the southern parts contained with a large amount of plantations and slave owners. In the north the increasingly flourished international trades, the developing industrialization and the urbanization pushed the process to form the market economy, but in the west, because of the allowance of slaves, most economic activities were labor intensive as well as based on agriculture, which limited the development in industries and urban areas. Up to 1860 only New Orleans could be counted as a city with 168 thousands of people in the south. Although the south produced nearly 3/4 of the worlds cotton production, the industrial products were only 10% for the whole US. Slavery, as the foundation of southern economy, further influenced the opinions about race, the politics and the laws, while the north, mostly seen the south as behindhand and as a barrier of the advancement of US economy. One of the influences was about social structure, in the south the idea of patriarchy was dominant, and as the fact that the big slave owners gained social statue and political careers at the same moment, the south was like a nobility society and slavery is their footstone of the cotton kingdom. The differences, started initially with the slavery, were finally spread to all the areas that created a huge gap between the north and the south, they were very hard to understand each other because, for an example, the north saw the southern plantation owners as violators of freedom, but the south saw the northern workers as slaves of market. A compromise could never really worked when the two sides failed to understand each other. Politically, an important question was to maintain the balance in the senate, according to the Constitution, the number of senators was depended on the population of states, so the north were trying to have more free states, like the Wilmot Proviso did, but the south were dreaming to spread slavery to more states, like the decision of popular sovereignty. The south used to be dominant in USs political history but the active movements of northern parties like Free Soil, Know Nothing and the Whig, which eventually formed the Republican Party, supported the free labor which seemed had controversy with the idea of slavery. Although the Republicans could not necessarily be abolitionists, for a balance in power ( which could be seen as a kind of compromise) or for the idea of free labor, they would put effort to stop the expansion of slavery, and whatever their attitude was, the divide was existed and threatened the whole United States. The compromises could worked politically, but to control public opinion was also very important. After the Second Great Awakening the idea of Abolitionists had risen that the problem of slavery, that it must be solved or erased from the US. Theyve tried to ship some freed slaves back to Africa but later, by the efforts of black people, these movements tended to be acknowledging the citizenships of blacks and the equality within all Americans. Some secret societies had created to help the slaves escape from the south, like the Underground Railroad which help more than 6000 slaves to escape. The slave owners protected their property by the Fugitive Slave Laws, like the one in the Compromise of 1850, with the swear of any white people, a black could be counted as a fugitive slave and be sent back to the south. The books and newspapers further pushed these struggles, like the Uncle Toms Cabin. the Liberator and An Appeal to the Coloured Citizens of the World, rises the sympathy in the north to the slaves and increasingly frightened the south. The popular sovereignty used in New Mexico territories, the compromise of 1850 and the Kansas and Nebraska Acts were Victories of the south politically, however these acts were still seemed as compromises because both the north and the south were dissatisfied with these acts, that they could only be compromises but not victories. For the south the expansion of slavery was needed because the slavery was the foundation of southern society and economy, they had enjoyed less benefits from the fast developing northern industrial economy, if, without more lands and slaves moving to the new land, the expansion of production could not be achieved while their way of living could be challenged. For the northerners the process of industrial revolution went slowly in the south and with slavery the free labor could never come true. The Bleeding Kansas, Dred Scott Affair and John Brown created a sense that the movement of northern abolitionists had come to a climax, while the south itself, during the National Convention of Democratic Party, divided into two groups that one supported Douglas and popular sovereignty and the other supported John C. Breckenridge and the slavery. The conflict was now not just between the south and the north but also in both sides themselves. While the election of Lincoln created such atmosphere in the south that in the future 4 years the power of Republican Party and as well as the influence of the north would overwhelm the south by expanding their influences in the south, that, the Virginia and Kentucky Resolutions and Article of Confederation gave the south an excuse that they could leave the union without changing the southern way of living. The compromises from 1846 to 1861 failed to reduce the tension because the inner differences within the north and the south, the contradiction of expansion of slavery or market economy and the moral concerns that could not only solved by political methods, together with the division of the parties and their failed efforts towards compromises. The bloody incidents, prints and public debates heated the situation and acted like catalysts. Since the opposition was seemed impossible to solve, that both sides dissatisfaction increased over time and all the efforts towards compromises were finally given up.