Monday, January 27, 2020

Google Drive: Functions, Security and Applications

Google Drive: Functions, Security and Applications Table of Contents (Jump to) Introduction What is Google Drive and its function? How to start with Google Drive? How secure is Google Drive? How do people use Google Drive? What is the maximum upload limit of Google Drive and supported files? What is Google Drive’s storage plan pricing? What are Google Drive’s compatible Operating Systems? Conclusion References Introduction In addition to the development velocity of modern technology, the volume of information completing by or ingested by individuals all over the world maintains growing quickly. The storage units seem to incapable for holding increasing data quantity. In servicing, add-on and again-up of data are important just in case of automobile accident. To meet the requirements stated earlier, the cloud computing is produced especially cloud storing which have turn into a needed info storage for all fairly recently. There are 4 competitive large cloud storages from the IT sector Google Drive, SkyDive and iCloud Dropbox. With the advancement of the information technology the development of app has significantly elevated. The brand new age of online technologies have triggered need for the World Wide Web app in people’s everyday life. In this particular document we shall make an effort to assess among the many programs developed to make people’s existence less difficult. We have now s elected Google drive as our most fascinated cloud app and we are going to publish a comprehensive report about it. What is Google Drive and its function? Google Drive is really a central location where you may keep your documents. You have access to Google Drive from the desktop, the web or maybe the Google Drive app. Transform data online, on your computer system, or in your mobile device and it also updates on every gadget in which you have installed Google Drive. So should you use Google Docs, this application will let you gain access to your Google doc at anyplace and at any time. Google Drive is greatly used to exchange each sort of files and folders between individuals. Google Drive is really an Online-dependent document web hosting support run by Google, Inc. that utilizes networked storage space to permit users to hold and share folders and files with others throughout the World Wide Web making use of document synchronization. Google Drive is definitely the easiest, most classy document synchronization instrument actually utilized. The idea behind Google Drive would provide you with access to your data files no matter what per sonal computer or system you are using. The service merchants records with solid encryption on multiple hosts and lets you get at your records quickly and easily, and for the most part elegantly from practically any World Wide Web-empowered system. We begin by quickly describing the application and its features. How to start with Google Drive? What started off as just a few valuable on the web business office resources named Google Docs, has transformed into Google Drive, a workplace package with cloud storage. You get a small amount of everything with these services, together with a word processor chip, spreadsheet application, and display tradesman, plus 15GB of totally free storage area. You can enter Google Drive if you already have a Google account. You just need to head over to drive.google.com and start the service. You will get 15GB of storage space for everything you upload to Drive, such as photos, papers and videos, Photoshop files and a lot more. You will need to share that 15GB with your Gmail account, photographs you upload to Google+ , as well as any files you generate in Google Drive. While you can access any documents in the Google Drive site, you may also acquire the Drive desktop app for your computer to deal with your records through your laptop or computer. It is possible to organize all your files from the personal computer app, and theyll sync with the cloud to therefore you can have them with you all the time on all your devices. Chromium is a Web-based operating system which Drive is built into it, when you have a Chrome book, Google Drive is the best cloud storage choice. Like other cloud safe-keeping professional services, Google Drive has applications for iOS and Android, so you can control your files from the phone too. What we like most about Google Drive is that you can drag and drop files into the Drive Web site and theyll be uploaded automatically. You can also preview attachments from Gmail in Google Drive, and save those files to your cloud. Google Drive has the benefit of a built-in place of work suite, where you can modify documents, spreadsheets, and reports, even though you created the papers in an additional application. This service will also support other third-party apps than can edit and modify the documents. What we like about Google Drive is that you could drag and decrease records to the Drive Web site and theyll be submitted instantly. You can also review devices from Gmail in Google Drive, and preserve these records to the cloud. How secure is Google Drive? Google Drive is amongst the most extensive cloud-safe-keeping services, but between your National Security Agency (NSA) and Googles own overreaching relation to service, your data files might be available for being snooped from both organizations. The NSA asserts that its PRISM system focuses on only people of foreign nations and Not American inhabitants. In case the NSA at any time made a decision that it would be useful, with this particular technology into position, it would be simplicity itself to turn PRISMs focus toward People in America. Google denies granting the NSA unrestricted entry to exclusive data. Im unsure I could say this far more obviously: Were not in cahoots together with the NSA, mentioned David Drummond, Googles chief legitimate police officer, in the document on the Guardian. Regardless of whether you trust Edward Snowden, the NSA or Google, you will find good things about knowing precisely what Google gives many services a web email and internet browser, an internet search engine and worldwide menu, amongst other things. PRISM can supposedly acquire information and facts from these professional services as well as Google Drive, the companys cloud-storage foundation. Drive has two elements: Producing papers and keeping them around the Drive (Create), and importing your own personal documents (Upload). Googles online privacy policy weighs in at nine web pages, and states that Google can accumulate login, tool and location info. Google also gathers your browser past history, plants and cookies on the process and data the other applications youve been utilizing, in the event you entry Google Drive by way of Stainless. Googles Drive FAQs point out that the organization will not use any details of your tag as exclusive for advertising or advertising functions, nonetheless its terms of services tend to be much more freewheeling: Google can adjust, host, retail store, recreate and make use of create derivative performs interact, submit, openly execute, publicly screen and spread [customer] information. These permissions may appear terrifying, but theres actually an incredibly naive outline for every single one. So to keep you authorized-in on a cell phone or exclusive laptop or computer, Google needs to know your unit and logon info. Your physical location information and facts helps Google determine when someone has hacked your account in an unusual spot. How do people use Google Drive? Here are some examples of how people use Google Drive: 1. A harried item supervisor should proceed work towards a vital proposition within the weekend break. In past times, she could have dug about in the handbag to look for an old USB Drive she purposes of transporting documents. Or, she probably have emailed herself an attachment to open at home. Instead, she helps save the Word document and a Shine spreadsheet to Google Drive at her workplace. Later on that evening hours, in her home Computer, she starts her Google Drive folder to gain access to the Shine file. All of her helps save are updated to Google Drive. When she profits to operate the subsequent Monday, the up-to-date details might be considered in her work station. 2. The organizer of the family members’ reunion wishes to survey 34 relatives about attendance, accommodations personal preferences, and potluck meal preparation. He email messages everyone a link to web-based created Drive. The solutions are immediately transferred to Bedding, where he can view the reactions and the results. 3. An elementary university faculty makes use of Docs to team up on session plans. Every single teacher accesses the same papers from her or his houses or classrooms. Upgrades are quickly reflected, even if two teachers are all at once accessing the same record. Their principal is surprised by how quickly the faculty wraps up the plans, and the way properly the curriculums are incorporated. 4. At the identical institution, the fifth-level educators request their college students to distribute groundwork using Docs. The educators put remarks and modifications, in which the individuals can accessibility whenever you want via a Browser. It’s much more effective than emailing accessories close to, and the college students do not have to bug their parents to acquire pricey phrase-processing plans. What is the maximum upload limit of Google Drive and supported files? Documents: 1,024,000 characters, regardless of the number of pages or font size. Uploaded document files that are converted to the Google documents format can’t be larger than 2 MB. Spreadsheets: 400,000 cells, with a maximum of 256 columns per sheet. Uploaded spreadsheet files that are converted to the Google spreadsheets format can’t be larger than 20 MB, and need to be under 400,000 cells and 256 columns per sheet Presentations: Presentations created in Google Slides can be up to 50 MB — which is about 200 slides. Uploaded presentation files that are converted into the Google presentations format can also be up to 50 MB. Drawings: We’ve never seen anyone make a drawing that was too big (but that’s not a dare). Other files: Files that you upload but don’t convert to a Google Docs, Sheets, or Slides format can be up to 10 GB each. (Daily News Analysis, 2012) What is Google Drive’s storage plan pricing? People can store up to 15GB of data on their Google Drive account for free. If they need more space they can purchase it and the pricing is as follows: What are Google Drive’s compatible Operating Systems? Google drive is compatible with Windows, Mac, Android phones and tablets and Apple iOS. Conclusion Google Drive is a free of charge service that allows you to take your images, docs, and video clips anyplace and share them easily. There are tons of optimistic features which can be addressed to the application. The Google Drive buyer allows end users to decrease any data file right into a chosen directory which is then synced with Google drives Internet service and to every other of your users units and computer systems with the Google Drive’s customer. Customers may also upload data files manually through an internet browser. With these usages, it can be a substitute for World Wide Web (physical transportation of removable media), and also other standard sorts of submitting exchange, like File transfer protocol and e-mail attachments. While Google drive capabilities are as a storage service, its concentrate is on synchronization and revealing. It facilitates revision record, so data files deleted in the Google Drive directory might be healed from any of the synced computer systems. References Google unifies cloud storage across gmail, drive and google+. (2013, May 15). Kashmir Monitor. Gaylord, K., Kavanagh, M. (2006, 04). Search your hard drive in a snap: Google it! Inside the Internet, 13, 5-7. Retrieved from http://search.proquest.com/docview/191096234 Nivio launches google drive app. (2012). Wireless News Maltais, M. (2012, Apr 25). Google adds to the cloud with drive. Los Angeles Times. Retrieved from http://search.proquest.com/docview/1009108737 Google introduces google drive quick facts. (2012, Apr 24). RTTNews All you need to know about google drive. (2012, May 01). DNA : Daily News Analysis. Retrieved from http://search.proquest.com/docview/1010363648 Google drive updates app. (2013, Nov 08). Telegraph.Co.Uk. Kleinberg, S. (2012, Jun 11). Google drive: A lot to love, room for improvement. Chicago Tribune. Retrieved from http://search.proquest.com/docview/1019609166 Google drive slashes prices on storage. (2014, Mar 13). University Wire. Retrieved from http://search.proquest.com/docview/1507019544

Sunday, January 19, 2020

George Herbert Mead and Erik H. Erikson Essay

George Herbert Mead was a ground-breaking sociologist that coined the phrase â€Å"self† and the theory behind it in the early 1900’s. The self can simply be defined as, â€Å"the part of an individual’s personality composed of self-awareness and self-image.† Mead’s primary approach to social behaviorism centered around the idea that one’s self is purely a product of social interaction with others. Sociologists today find Mead’s work important as the self is needed for survival of society and culture. Comparatively, Mead shared some intellectual sociological similarities with Erik H. Erikson. Particularly with Erikson’s broader view of socialization: his eight stages of development. Mead understood the self to thrive as long as four major components that revolved around social cooperation fell into place. The first belief he transmitted was that the self was not present in a person at birth. It must be developed over time through social reciprocity with other individuals. Mead then believed that social experience is the product symbol exchanges. In other words, human beings can find meaning not only through language and words but also within the use of actions and such other symbolic representations. His next conceptualization assumed that in order to fully understand one’s intentions we must take the role of the other. What Mead plainly meant by this was that anticipation of how another human being will react can often be attained when we imagine ourselves in another person’s shoes. His final inference about the self is by taking on the role of another we then become self-aware. This idea spilt the concept of self into two parts, the I and the me. The I part is used to describe the self in action, the subjective aspect of self. The me part outlines the self as we imagine others to see us. Mead then theorized that the development of these four components could be achieved in four basic stages. In developing the self, we must learn to take the role of another. Infants lack the social experience to do this so they achieve responses through imitation, or the mockery of actions. Children learn to use symbols and language to evolve the self through play. Play involves the assumption of a singular role in a singular situation. This role is typically modeled on significant others, such as parents, those most  important to a child in their life. The child gradually learns to accept the roles of several other people at once in a singular situation as opposed to just one at a time. Mead called this evolution engaging in games. Therefore, if play refers to a game of catch, then exhibition in games would be the sport of baseball. The final stage of development occurs when one is able to recognize the roles of many others in many situations. Mead referred to this as the generaliz ed other. The existence of self depends upon the existence of society and culture in a very key way. The primary reason self is so important perhaps revolves around communication for survival. In order for the world to be able to support society and culture in any facet people must communicate. Mead described this as transmission through the use of words, hand and facial gestures and a general sense of self composure. Without total and proper development of the self, communication would be extremely difficult. If everyone in the world suffered deficient or no personal growth people would struggle to find ways both as a culture and as a society to flourish within inter-group communication. Erik H. Erikson explained socialization with the theory that people face challenges throughout the life course that develop and shape personality indefinitely. He mapped out these potential challenges within eight generalized stages. These stages stretch to include infancy, toddlerhood, preschool, preadolescence, adolescence, young adulthood, middle adulthood, and old age. Though Erikson presented a much broader and different view of socialization than Mead, their works remain similar because they share one familiar aspect, the self. Erikson never used the phrase â€Å"the self† within these eight stages of development, however, he explains that in many of these stages communication with family members, peers and society in general helps to play crucial roles in the proper development of one’s personality. George Herbert Mead was indeed a brilliant sociologist and theorist. By studying the concept of the self, Mead relayed the idea that social experience or lack thereof could create or destroy a human being thereby affecting society and culture as we know it. He concluded that the self  continues to change and evolve as we encounter social experiences. Throughout this evolution, we remain creative individuals. It is in the shadow of this creativity that we, indeed, play a very distinctive role in our own socialization process.

Saturday, January 11, 2020

Company Financial Analysis Essay

Emirates Computers Name: Instructor: Task: Date: Calculate the three (3) liquidity, five (5) financial leverage, six (6) turnover and four (4) profitability ratios for all the years as per example 3. 5 in the PowerPoint presentations. Liquidity; Current ratio=current assets/current liabilities 2010:29021/19483=1. 49 2011:24245/18960=1. 28 Quick ratio= (current assets- inventories)/current liabilities 2010: (29021-1301)/19483=1. 42 2011: (24245-1051)/18960=1. 22 Cash ratio=cash/current liabilities 2010:13913/19483=0. 71 2011:10635/18960=0. 6 Financial leverage; Total debt ratio= (total assets-total equity)/total assets 2010: (29021-7766)/29021=0. 73 2011: (24245-5641)/24245=0. 77 Debt equity ratio=total debt/total equity 2010: 30833/7766=3. 97 2011: 28011/5641=4. 97 Equity multiplier=total assets/total equity 2010:29021/7766=3. 74 2011:24245/5641=4. 29 Turnover; Inventory turnover=cost of goods sold/inventory 2010:49128/1301=37. 76 2011:42789/1051=40. 71 Days sales inventory=365/inven tory 2010:365/1301=0. 28 2011:365/1051=0. 35 Receivables turnover=sales/account receivables 010:61494/10136=6. 07 2011:52902/8543=6. 19 Days sales in receivables=365/receivables turn over 2010:365/10136=0. 04 2011:365/8543=0. 04 Total assets turn over=sales/total assets 2010:61494/38599=1. 59 2011:52902/33652=1. 57 Capital intensity=total assets/ sales 2010:38599/61494=0. 63 2011:33562/52902=0. 63 Profitability ratios; Profit margin=net income/sales 2010:2635/61494=0. 04 2011:1433/52902=0. 09 Return on assets=net income/total assets 2010:2635/38599=0. 31 2011:1433/33652=0. 04 Return on equity=net income/total equity 2010:2635/7766=0. 4 2011:1433/5641=0. 25 Emirates Computer products and services bring revenue from its sales. Revenues from January 2010 to January 2011 were about 16% that is an increase from the previous years. This was mainly because of the recovery in the economy. A company’s economic health is critical because the products it sells are not primary products a nd therefore people prefer buying food than spending money to acquire a computer. This explains the reasons to why there was a decline in revenue for the year 2009, which was about 13. % drop in comparison to the previous years. 2010 has reported an increase and this is due to a change in the strategies involved in the business. The revenue stream of the company has changed due to the solution and services that Emirates Computers has put in place. The service revenue has shown a tremendous increase over the years. There has been a gradual appreciation from 14. 3% of revenue in January to about 18. 7%of revenue in January 2011. There has been a profitable growth of 25% in 2010 and a growth of about 5% in the year 2009.The percentage of revenue for the past three year has been due to cost of goods and services, which has shown a relative growth. Expenses like selling and administrative expenses and other expenses have been constant for over three years. There was an increase on intang ible assets in addition to other costs. This is because of an increase on intangible assets from the Perot systems in 2010. The increase in facility action costs and severance was because of closure of some facilities that manufacturers used in addition to using contract manufactures to provide cheaper services.The company has shown increase in values because of its stability in percentage revenues because the company has good management, which understands the business, and controls their costs. The company is well informed, they understand every detail that may challenge it operation, and therefore they never encounter surprises that may negatively influence them. The company has registered an excellent net income in the year 2011 which showed an increase of over 80% from the years before. Return on assets is 2. 5 % and profit margin is 1. 6%, which come because of the increase in net income.Additionally the growth in the company has been because of higher revenues and a good cost control. The change in the company’s way of operation has led to the increase in net income. The services of operation of this company have increased as compared to the cost of manufacturing the product. The acquisition of the Perot systems led to the decrease in net income to 42. 2 % in 2010. Health wise the company has shown progress and therefore Emirates Computers has plans to keep expanding its services to a higher level, which will eventually help the company (Peterson & Fabozzi, 2012).There has been an increase on the current assets as compared to previous year from 72% to 75% in the year 2011. The company has recognized all highly liquid investments such as credit cards from banks with a three month original maturities. These because there was increase in cash provided by operations while a decrease in cash in investing activities. The decrease in cash in investing activities is mainly because of lack of material they are important for acquisitions in 2011 as compared to 2010. Generally, the company has portrayed a good fiscal year and their good health.It indicates an improvement in the ability to generate profits and income. The company has shown efficiency and effectiveness in because all the three Profitability ratios that involve profit margin, return on assets and return on equity. The company has a qualified auditor who analyses the financial statement of accounts of the company. Although at one point, the auditor gave an unqualified opinion concerning its financial statements. This is evident when analyzing the property plant equipment account, which is not very heavy in the balance sheet. The only representation is only 5. 1% assets own by Emirates Computers.Another aspect that the company has shown strength in is its Liquidity. The company current assets increased while its current liabilities and the current ratio and quick ration showed an increase from 1. 2% and 1. 22% in 2010 to 1. 49% and 1. 42%. Current liabilities on a dollar re mained stable. Nevertheless, the increase in total assets, led to the decrease in current liabilities to 5. 8 %. All changes made Emirates Computers to be liquid and this gave it a boost and an advantage thus indicating good health. The company’s equity of stakeholders increased to about 2 billion dollars (Fridson & Alvarez, 2011).This is because of the increase as are suit of earnings retained. In the year 2010 – 2011 return on equity (ROE) rose from 28. 8% to 39. 3% in 2011 while net income increased greater the stakeholders equity. Therefore, Emirates Computers makes profit with the stock price variation because it does not pay dividends (Tracy, 2009). Conclusively, the purpose of Emirates Computers Company is mainly to offset gains and losses that resulted from their exposure on contract. This reduces volatility of the earnings in addition to protecting the values of assets and liabilities.Emirates Computers carries out assessments in order to ensure effectiveness both at the beginning of hedge and at regular intervals in order to pinpoint out any ineffectiveness that might occur. Reference Peterson, P. P. , & Fabozzi, F. J. (2012). Analysis of Financial Statements. Hoboken: John Wiley & Sons. Tracy, J. A. (2009). How to read a financial report: Wringing vital signs out of the numbers. Hoboken, N. J: John Wiley & Sons. Fridson, M. S. , & Alvarez, F. (2011). Financial statement analysis: A practitioner's guide. Hoboken, N. J: Wiley.

Thursday, January 2, 2020

Death Penalty Of Colorado Springs - 852 Words

Death Penalty June 19, 1975, began a killing spree in Colorado Springs when a soldier from Ft.Carson and his friend who worked on base shot a cook in the head. He only had fifty cents. The next week they stabbed a Fort Carson soldier with a bayonet. On July 1, 1975, they killed Kelsey Grammer’s sister. After raping her, they stabbed her throat and left her out in a trailer park to die. That night they went to Fort Carson and called a cab from a club. That pick up would be Dad’s last. Knowing he was in trouble, Dad called dispatch to ask the distance and the fare to Butts Field, a strange request for a seasoned cabbie on such a small military base. All the fares were thirty five cents except the one to their airport. One of the guys grabbed my dad and slashed his throat from ear to ear, leaving him for dead on the side of the road. They drove the cab through the housing area, across one of its inhabitants front lawns. He had driven a taxi in New York and had his money t aken before, but never harmed. Mom laughed hysterically when she told me that even with witnesses, their attorney argued it was too dark to adequately identify them.The local police investigated Karen’s murder, but my dad’s killing had taken place on a military base, putting the federal agents in charge. The murderers were given the death sentence for Karen and the other murders, so the feds decided not to investigate my dad’s case. Why was my Dad’s murder case thrown in with the others? I always felt theyShow MoreRelatedThe Ineffective Use of Capital Punishment1445 Words   |  6 PagesThe death penalty can be unfair and can cause innocent lives to be took. The death penalty should be abolished because it is an ineffective way of punishment. There are trials that are unjust and many innocent people that have been killed. Putting people to death cost more than sending people to jail for the rest of their lives. Capital punishment doesn’t affect change. Capital Punishment is the legal authorization for killing someone who committed a crime. The first date for which the death penaltyRead MoreShould Marijuana Be Legalized?926 Words   |  4 Pagesuse of harder drugs, which was termed the gateway theory and as a result, for the first time marijuana was included along with traditional narcotics. This is when the first round of mandatory minimum sentences for drug crimes were introduced. Penalties for marijuana were again increased in 1956 with the passage of the Narcotic Control Act (Boire, Feeney, 20). In 1976, Robert Randall became the first U.S. citizen approved to receive federal supplies of marijuana as part of the the governmentsRead MoreThe Juvenile Death Penalty: A Case For It1583 Words   |  7 PagesWhen I was a junior in high school, I was arrested and expelled from school. I spent the rest of my high school education jumping between online and alternative school. I went to six different schools between spring of junior year and spring of senior year, trying to find a school that would accept an expelled student but also provide challenging enough classes for me. Once my expulsion was up, I returned to public school and finished out my senior year at Lakewood High School. In May 2013, I graduatedRead MoreCapital Punishment: A Moral and Economic Disaster1619 Words   |  6 PagesCapital Punishment: A Moral and Economic Disaster The average cost for a death penalty case in the United States of America is 2.4 million dollars. Currently, the number of people on death row is 3261. The government, therefore, would have to pay a little over 7.5 billion dollars to execute every single person on death row (â€Å"Death Penalty Statistics†). The United States government can alternatively spend this large sum of money in numerous ways aside from taking people’s lives, such as saving themRead MoreHuman Trafficking And The United States1417 Words   |  6 Pagesand women this is mainly prostitution or pornography whereas men are more likely victims of forced labor as traffickers slaves. Trafficking laws exist at the federal levels. Over half of the states now criminalize human trafficking, though the penalties aren’t as severe at a state level as they are at a federal level. The federal government has taken a firm stance against human trafficking both within the borders and outside them. Human trafficking is a federal crime â€Å"Title 18 of the United StatesRead MoreBiography Of Theodore Bundy Born Theodore1561 Words   |  7 Pages Laura Ann Aime, 17, disappeared after leaving a cafà © just after midnight. Her naked body was found by hikers 9 miles to the northeast in American Fork Canyon on Thanksgiving Day. He was believed to have killed women in Washington, Oregon, Utah, Colorado, and Idaho by this time. Bundy’s first arrest was arrested because he wouldn’t pull over for a Highway Patrol officer. The officer saw that Bundy’s car was missing the passenger seat which raised suspicions. In the car they found a ski mask, a secondRead MoreEmergency Management Challenges Todays Modern Society1445 Words   |  6 Pagesissues of urbanization and hazard exposure, the rising costs of disaster recovery, and low priority of emergency management. Urbanization Urbanization an increase in a population in cities and towns versus rural areas (Dictionary, 2015). Colorado Springs, located within El Paso County, recently has began a slow movement toward urbanization as some local developers hope that the national trend of creating denser, more urban and walkable community and possibly a downtown renaissance (Journal, 2012)Read MoreHate Crimes: Society Reaction to Change Essay1431 Words   |  6 Pagesindividual self-identification as a man or woman does not match up with their physical genetic sex. Yes the bible says â€Å"If a man has sexual relations with a man as one does with a woman, both of them have done what is detestable. They are to be put to death; their blood will be on their own heads.† Leviticus 20:13 NIV. but it also states â€Å"There is only one lawgiver and judge, the one who is able to save and destroy. But you- who are you to judge your neighbor.† James 4:12 NIV. The stories of two differentRead MoreWhy Ut Nor Atm Would Slingshot Me Into A Career Of Law Enforcement1532 Words   |  7 PagesScholarship: It is available to a senior majoring in Criminal Justice who plans to pursue a career in law enforcement. Students must maintain a grade point average of 3.0, there is also the James C. Boswell Scholarship: it may be granted for the fall and spring semesters to deserving undergraduate students in the College of Criminal Justice at Sam Houston State University who have demonstrated financial need and who are seeking to pursue a degree in law enforcement or affiliated Criminal Justice disciplinesRead MoreTheodore : A Serial Killer Who Claimed The Lives Of More Than Twenty Women1984 Words   |  8 Pagestransferred to University of Washington (Rule). This is where he met Stephanie Brooks, his dream girl (Rule). Stephanie was from a wealthy family in California, she was tall and slender with dark hair parted in the middle (Rule). The two began dating in the spring of 1967 (Rule). Stephani e was older than Ted and not as infatuated with him as he was with her; she also felt that Ted was not mature or driven enough for her, so she broke up with him in the summer of 1968 (Rule). He was devastated by the break up