Featured Post

Ethos, Pathos, and Logos :: Argument

Quality of Argument: Ethos, Pathos, and Logos ringer hooks’s paper, Keeping Close to Home, utilizes three significant segments of ...

Wednesday, January 29, 2020

Cultural Evaluation in Japan Essay Example for Free

Cultural Evaluation in Japan Essay Cultural evaluation in which you identify the ways that arguments or presentation of the arguments would need to be changed as the result of cultural differences in the country of Japan.               Language is a process of free creation; its laws and principles are fixed, but the manner in which the principles of generation are used is free and infinitely varied. Even the interpretation and use of words involves a process of free creation. ‘Noam Chomsky’. Self-expression should be done in an artistic way for the fulfilment of communication.             Japanese business persons come up with resolutions based on the cultural value of Group frontage. Conclusions tend to be made by group consensus as opposed to Individuality. A foreigner who would desire to venture into business in Japan should not be pretentious as He or She is making advances in establishing a business foundation. Displaying a humanistic culture will be a great principle that will propel the business to greater heights. Strategic measures to observe as a business person             For one to hit the expected set mark in a business, observe and apply the following aspects so that your message is communicated virtually, without embarrassing, intimidating, or offending the clients that are within your target. Speech clarity            This calls for clear articulation so that people can hear and comprehend every word you are saying. Avoid mumbling in your speech, or speaking extremely fast when addressing the prospective client whose native language is Japanese. Speak moderately            Address business people by reducing speech speed. Allow them time to capture your words and abstract the meaning. Provide verbal and non-verbal clues to check for conformity whether you are being understood. When your clients prompt you to repeat what you have said, look puzzled, or respond with difficulty, most likely they have not understood you (Delassus, 1972). Repeat your proposal slowly in the same or different words. In case this does not work out, write it down. Triangulate the key points          This approach calls for expressing the same idea more than once in slightly different ways. It provides your clients better chances to capture what you are saying. For example: Entrepreneur’s Words and Clients’ Thoughts â€Å"I presume the equipment will run smoothly†¦Ã¢â‚¬  Yes†¦ or â€Å"The gadget will operate properly†¦Ã¢â‚¬ Right†¦ Maintain appropriate tempo and intonation         When varying the tone of your voice, switching the tempo, and stressing on areas you would like to emphasize, you provide more hints to help your correspondent grasp your message. Provide posters through the conversation             Posters initiate your partners beforehand by informing them about the topic of your discussion or presentation, as well as any changes along the way. For instance: A slide show, model or chart can be very helpful. Create verification links             In inter-cultural communication, especially, it is valuable to keep checking whether your listeners are getting along with the discussion. This can be done by; asking questions, providing elaborative statements until the idea is passed across. Express numerals and dates slowly            Numbers can be expressed in various ways in different parts of the world These include phone numbers, prices, quotations, , flight numbers, exchange rates, dates addresses,. For example: $1800 can be expressed as eighteen hundred or one thousand eight hundred. October 20th can sound like October 28th. Write down unfamiliar codes or technical symbols            When professional jargons are to be used, it is advisable to write them on a white board, provide a slide or handout. Repeat the use of a term that listeners are not familiar to know or cannot understand (Varley, 2000). Confirm schedules            Observe protocols related to time or dates. Arriving on time sends a positive signal of commitment and certifiable.   Maintain a sense of humour            When expressing yourself, it is important to maintain social relations by sharing humorous experiences in life. Allow the clients to also feel free to share their experiences. Maintain equilibrium. Be sincere                Sincerity and taking up responsibility creates a fair relationship, a positive atmosphere for doing Business References Delassus, J. F. (1972). The Japanese: A critical evaluation of the character culture of a people. New York: Hart Pub. Co http://www.jetro.go.jp/costarica/mercadeo/communicationwith.pdf http://www.presentationprep.com/international-presentations/ Varley, H. P. (2000). Japanese culture. Honolulu: University of HawaiiÌ€ Press. Source document

Tuesday, January 21, 2020

Minorities in Life of a Slave Girl, Push, and Song of Solomon :: Song Solomon essays

Minorities within Minorities in Incidents in the Life of a Slave Girl, Push, and Song of Solomon      Ã‚  Ã‚  Ã‚   In a study about minorities, the groups that are differing from the dominant culture are seen as homogeneous. But, if we look deeper into the groups, we can see that there are distinctions among the minorities concerning lifestyle and social status. In Incidents in the Life of a Slave Girl, Push, and Song of Solomon the authors gave some examples in the background of their stories that shows people with differential identities of the general identity of the minorities.    In the autobiographical Incidents in the Life of a Slave Girl, we see that the "free" African-American people form a group which is much less in number than the slaves. We surely cannot properly call them "minorities" in its general sense, but as having a different situation than the rest of the African-American population. When taking the stories of Jacobs as a basis, it is inevitable to talk about only the situation in South.    We can identify the "free" African-Americans in the South as having fulfilled the most important dream of every slave. These people are mostly ex-slaves, who are set free by their masters or who bought their own freedom. With the new generations coming there are also freeborn blacks whose parents were ex-slaves. Although fulfilled their most important dream, these people are not happy and fearless as they should be.    White people of the South just couldn't bear the fact that any black person was called free. In fact the African-Americans were always living with the danger of being unjustly accused of any kind of crime. As Linda is telling us, white people search every house where black people live and put around false evidence to be able to severely punish and even kill the people they hate so much (ch.12). We learn from the stories that is not always a guarantee to be free from slave hood. Linda tells us how her grandmother was set free as a child but then recaptured and sold to other white people as a slave (341-342).    There are also some rules concerning the marriage of these so called "free" African-Americans. If a free black man is married to a slave woman, he has no power to protect his wife from any kind of abuse coming from her master.

Sunday, January 12, 2020

Internet Security Breaches

The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged.Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches. Cyber Fraud Cyber fraud can be defined as the use of software or internet services to defraud victims or taking advantage of them. This includes stealing information that is considered per sonal, in what constitutes identity theft. One of the most common forms of internet fraud entails distributing rogue security software.Internet technology has created the allowance for criminals to carry out fraudulent transactions, as well as transmit the proceeds of the frauds to other institutions. Cyber frauds occur in message boards, websites, emails and even chat rooms (Messner, 2012). Purchase fraud is an example of cyber fraud and occurs when a perpetrator proposes a business transaction to a merchant, only to use fraudulent mechanisms, such as a fake or stolen credit card, to pay for it. The eventuality is that the merchant does not receive the payment and may even be charged back for accepting credit cards.Another example of fraud is whereby theperpetrators post information about goods that they intend to sell. Interested buyers are asked to make payments for the purchase and delivery of the goods. However, it later turns out that the goods were non-existent and they had o nly been conned. The third example of cyber fraud is phishing, which is the act of masquerading as a person that can be trusted, such as bank agents or consultants, to acquire information that is sensitive, such as details of credit cards and passwords, among other details that victims may be convinced to share.Subsequently, the information offered is used for fraudulent transactions. It is argued that cyber frauds makeheadlines each day. In October 2012, Barners & Noble Inc. made announcements that several PIN keypads had been hacked in as many as its 63 outlets, leaking the card information and PIN numbers of its customers. Easy Solution is one of the companies with evolving techniques of curbing cyber frauds. The company claims to be the only one that is well placed to curb various forms of electronic fraud, clouds and premises.The company has introduced an updated version of the Detect Monitoring Services, which entails timely fraud protection, enhanced monitoring capabilities a nd enhanced fraud protection. Detect Monitoring Service software effectively monitors the behaviors and patterns associated with phishing scams. Thus, it stops the threats before they cause damage. The software comprises of a relatively simple interface that can effectively function for all forms of clouds and even premises. It is argued that of over 800, 000 phishing attacks, the service enabled the company to detect as many as 76% on timely basis, exhibiting 3.6 hours of average deactivation time. Online transactions services have been particularly affected by cyber frauds.More often than not, customers often get cautious when asked to give personal information. Online transaction service providers have only resorted to instilling confidence in the customers as a way of encouraging them. This entails displaying policies, security badges and trust certificates, as well as the contact information. Online retailers should highlight security around the websites’ secured areas t o assure customers that their confidential information is safe.This should be done, regardless of whether some browsers have security indicators built in them. Some online retailing companies, such as Amazon, display this through the use of the sign-in button. Others opt to use padlock symbols that are located in the sign-in areas. This is advisable, even when it is not needed by the customers. Online retailing companies are advised to give alternative contact options. Indeed, some companies are offering customer care support by using call backs, e-mails, and chats to enable users report suspicious activities.Data breachesData breaches includeall those cyber activities characterized by unauthorized access, use and disclosure of individuals’ or organization information over or from the internet. Malicious attacks are considered to constitute the most expensive data breach, yet they are increasing. Malicious attacks account for as significant as 40% of the data breaches where n egligence account for about 32% (In Defense of Data, 2013)Computer software companies, healthcare records and companies have been the most targeted and have accounted for as significant as 93% of the global data breaches (In Defense of Data, 2013).Network security is a necessity for every company. A company’s network cannot be said to be effective if it consists of security lapses. Threats to company's network can be considered as a subject of various activities. However, former employees who leave the company due to downsizing can be considered as a significant threat. Other activities such as a daily courier dropping packages at the company’s premises, employees travelling on company business to other cities, or building management company installing a fire extinguisher system in company’s premises are not a serious threat.It can be argued that individuals with the potential of hacking, sabotaging and damaging systems are those with familiarity to nature and f orm of network system. Therefore, an employee that left the company has the capability of hacking the company’s network since they are familiar about the loopholes in the company’s network system. What increases the possibility of hacking is,if the employees left the company due to retrenchment, the attempts of network hacking could be fueled by the whims of revenge.It is argued that all former employees that worked in the company, accessing sensitive data bases and financial documents pose a threat to the company’s security. The fact that information technology does not respond to the altering of access points act as a fueling factor. Therefore, a person with information about the company’s network system has the potential of causing more harm than a hacker. According to the 2005 CERT survey, a significant number of former employees are increasingly utilizing the opportunity.The survey indicates that about 59% of the security intrusion is done by former company’s contractors;48% of those involved in hacking had been sacked;38% had left the company due to downsizing while 7% had been retrenched. The survey also notes that former IT professionals are particularly a significant threat to data security(Hazelden Foundation, 2012). Data breaches caused by negligence could be resolved by addressing the factors associated with negligence. On the other hand, data breaches caused by malicious software could be prevented by using appropriate network intrusion, detection techniques and anti-spyware software.Technological mechanisms would include updating and altering passwords for security purposes. Network intrusion/ Hacking Network intrusion or hacking refers to the unauthorized entry into a network, often characterized by malicious ambition of intercepting information from the network or website. The information can be used for other criminal activities such as fraud or espionage. Telvent Company hacking is considered as one of the r ecent hacking events that occurred in September 2012.The company has learned that its firewall and security systems have been compromised by the attackers who installed malicious software that enabled them steal project files. Telvent, a company whose services and software are applied in monitoring energy industry reported that it has been hacked which affected its operation in United States, Spain and Canada. The incident was blamed on Chinese hacking groups opposed to Western interests (Thiel, 2012). Lately, US officials have blamed Russia and China for staging intrusion attacks against United States for espionage, economic gains and other selfish motives.In November 2012, Leon Panetta, the US Secretary of Defense, had warned that United States was about to experience a cyber-attack comparable to Pearl Harbor, blaming hacking incidents that had been linked to the Middle East and United States Oil producers (Messner, 2012). The technological intervention to network intrusion is the development of Intrusion Detection Systems (IDSs). IDSs refer to application of device or software that aims at monitoring either networks or activities of systems against activities that are either malicious or that violate policies in place.Types of IDSs include Network Intrusion Detection Systems (NIDSs) and Hot-based Intrusion Detection System (HIDS). Network Intrusion Detection System is considered as one of the most popular approaches. Network Intrusion Detection System refers to a system that is designed to detect activities that are considered malicious such as service denial attacks, port scans, as well as cracking into computers via Network Security Monitoring. NID senses the packets coming through the network and scans them in order to identify patterns that are suspected to be malicious.Such patterns can be referred to as rules or signatures. Not only NIDSis limited to scanning of the network traffic that comes into the system but, one can also find a lot of important i nformation concerning network intrusion from both local traffic and outgoing networks. More so, through NIDS, it is possible to stage attacks from the inside the network under monitoring and even a segment of the network. In this regard, such attacks are not in any way considered as incoming traffic. Usually, other various systems are incorporated to function with NIDS.The other network systems could, for instance, deal with updating the blacklists of firewalls using IP address of the computers under the use of real or suspected network crackers. NIDS consist of documentation (DISA) that utilizes ‘NID’ as a terminology with a target of distinguishing IDS that are internal from external. Just like any other IDS, NIDS comprises sensors and management console as its essential components. While management console deals with management and reporting, sensors deal with monitoring of networks. NIDS senses network intrusions through examination of network traffic.The system has the capability of monitoring multiple hosts. Usually, the access to the network traffic is gained through connection to a hub of networks, port-mirroring configured networks or even through the network taps. The NIDS sensors are situated at checkpoints of networks under monitoring. This are more often than not located in demilitarized areas or at the boarders of the network so as to increase effectiveness. All the network traffic is captured by the sensors before each of the packets’ contents are eventually analyzed for malicious network traffic.There are various examples of NIDS such as commercial products (such as ISS Realsecure, NFR Network Intrusion Detection System, Sourcefire and Computer Associates e Trust IDS) and freeware products (such as Ethereal, Snort and Tcpdump). Snort is the most common of all. NIDS should be considered as the most appropriate for organization securitybecause it ensures the greatest impact on the security of the network, takes shorter time to deploy compared to HIDS, yet it is relatively cheaper.Additionally, as long as it is placed on the outside of firewall or demilitarized zones to ensure for effectiveness, NIDS is capable of monitoring all forms of internet traffic and relays immediate feedback on the nature of network security. NIDS is very important to the general internet security. But particularly concerning the network security, NIDS is farther important to organizations in the following ways: first, NIDS has the capability of detecting attacks that HIDS cannot, for instance, fort scan and denial-of-service.Second, NIDS quickly detects and alerts on incidents of intrusion to avert maximum damage. This is particularly suited t o the demilitarized zones, considering the fact that internet providers usually situated at the zones are major computer attack targets. Third, NIDS is capable of reporting successful as well as unsuccessful attacks which is particularly essential as it offers a chance to better understand the network and hence, a key to network security enhancement. Fourth, NIDS equips organizations with knowledge regarding the environment of their network.Fifth, but for application of NIDS, it is difficult to identify network hacking. Lastly, NIDS is very important for organizations’ forensic evidence tool (Thiel, 2007). In this regard, it is not easy to tamper with the evidence unless the aggressors interfered with IDS. Launching worms Launching worms is a cybercrime that involves development of worms, also referred to as viruses, then releasing them on the internet domains. The worms slow down the internet connectivity or infect computers to stop them from functioning effectively.In 2000, FBI suspected incidents of cybercrimes being committed by the Russian citizens namely Alexey Ivanov and VasiliyGorshkov. It sought to track the suspected cyber criminals, luring them to come to United States with a ruse of a job promise (Quinlan, 2012). Activities of concocting worms and launching them on the internet are illegal in some parts of the world. As such, a person found to engage in cybercrime activities that spreads worms is likely to be prosecuted in various courts of countries affected by the worms. In some cases, the prosecution can be consecutive.However, in practice, few countries are in the position of claiming jurisdictions partly because some assume other countries would have incurred serious damages to consider it a priority to prosecute. These reflect how tricky dealing with cybercrimes across the borders is. Certain actions that are done on the internet may be legal in countries where they are initiated, but illegal in other countries that have access to the internet content. There are various recent incidents that entail virus launching. In October 2012, reports were made that FBI was to shut down a DNS as a way of containing viruses.Users were required to check their computers for virus and clean them before they could be allowed to access. These steps had been taken following the launching of the internet infestation by the DNS changer virus. The virus had cost the world billions of dollars (Quinlan, 2012). There are various technological approaches to worm problems. The most common approach is through installing anti-virus software. The antivirus software could be installed remotely on the computers, creating the allowance for all the information that streams in to be scanned for viruses.Malicious files and viruses are either blocked or repaired. Anti-virus could also be installed on the internet to scan the information that is sent over it. Websites, such as Google, are now offering such services. There are various antivirus software products on the market, including Avira, Norton and Kaspersky, which are effective in detecting and blocking malware (Nnap, 2011). Cyber bullying Cyber bullying has been cited as one of the areas that constitute internet security breaches. It entails transferring of abusesor information aimed at intimidating other people.Cyber bullying has turned out as the newest platform for which the people, especially the youth, are increasingly abusing each other. The more concerning issue is that there are currently no new appropriate techniques that intervene for cyber bullying despite the large numbers of children who have access to information and technologies. Internet and cell phone communications have been cited as tools of cyber bullying. Even more intriguing is that cyber bullying occurs during class time. Various incidents of cyber bullying have been witnessed recently.One of the cases that conspicuously featured on news headlines was of Alexis Henkel, a high school student. Henkel was charged with posting a number of anonymous and threatening messages on the internet account of one of her former classmates, who she accused of engaging in a flirt with his boyfriend (HazeldenFoundation, 2012). It has been argued that cyber bullying is particularly rampant because mos t cases are not reported. The most appropriate technological approach to addressing cyber bullying entails the application of safety tools, which facilitates content monitoring, as well as blocking.Indeed, various social sites now offer safety tools that enable users and administrators to report and block forms of communication that amount to bullying. These go hand-in-hand with the approach of instilling of ethical morals among the users, as well as enlightening the society on online safety, including ways of using online safety tools. Category of internet security Breaches Information leakageIntegrity ViolationDenial of ServiceIllegitimate use Data breaches; information stored in a website is accessed and released without authorityCyber bullying; entails sending abuses and information that undermines the integrity of other peopleWorm Launching; worms or viruses block internet access, denying the victims access to the internet. Additionally, some worms infect computers, making them malfunction. This also denies the victims access to computer services1. Internet intrusion and Hacking Hacking enables the perpetrators to access websites and use services illegitimately. 2. Cyber fraud Cyber fraud constitutes the motives of illegitimate use of internet resources

Saturday, January 4, 2020

Teens with Eating Disorders Essay - 2808 Words

Teens with Eating Disorders In our society today, we are constantly hearing about more and more teenagers, mostly girls, who are suffering from an eating disorder. For reasons that are unclear, these young women are developing potentially life-threatening eating disorders as a way of achieving a perfect model body. There are many different types and classifications of eating disorders, but the two most common ones in which teens suffer from and are diagnosed with are called bulimia nervosa and anorexia nervosa. People with bulimia, known as bulimics, indulge in bingeing, which are episodes of eating large amounts of food to satisfy their hunger and craving for food. Then there is purging, this happens after bingeing and it is a†¦show more content†¦Finally, I wanted to possibly find alternatives, or other ways that teens can solve and beat these problems in which they are facing. The direction that I took or supported with this paper is anti-eating disorder, but moreover I am supporting treatment an d awareness programs. The main reason that I am personally interested in this topic is because right now as a Social Work major, my intentions are to help and work with teens with eating disorders once I graduate. I know what it is like and how these teens feel, and the torment that they deal with and agonize over everyday in attempt to live up to society’s expectations. I hope that maybe I can help these teens take a healthy approach to losing weight, or maybe first maybe just try to raise their confidence and morals. Eating disorders are diseases that take a toll on a number of peoples lives currently as well as in the past. In the United States approximately 10% of girls and women suffer from anorexia and bulimia. Anorexia and Bulimia are only two types of eating disorders that combined affect an estimated 11 million people every year(Mintle, 2000). At least 50,000 of those 11 million people will die as result of their eating disorder. In the most extreme cases the suffers literally starve themselves to death or burn up their esophagus. Those who survive are at greater risk of developing brittle bones, life-threatening infections, kidney damage and heart problems (What Causes EatingShow MoreRelatedEating Disorders Among Children And Teens1216 Words   |  5 PagesEating disorders in children and teens cause serious changes in their health. Eating disorders are characteristics and cause by eating behaviors, also people with this disorder use eating, purging or restructuring with their issues. Eating disorders is divided into three parts as anorexia nervosa, bulimia nervosa, compulsive overeating, etc (Eating Disorders,n.d.).Eating disorders can overlap between and alternate of anorexia and bulimia. Eating disorders around the adolescence, but it can also startRead More Eating Disorders Among Teens Essay931 Words   |  4 PagesEating Disorders Among Teens Eating Disorders have become a serious issue in the past twenty-five years. Many people have been diagnosed for having an eating disorder. More teens out of any other age group suffer from it. Sports, peer-pressure, and low self-esteem can cause teens to be driven to eating disorders. Anorexia and Bulimia are the two main types of eating disorders. Anorexia is the self-starving behavior that can lead to severe health problems and even death. Bulimia isRead MoreEating Disorders : Celebrities And Teen Girls974 Words   |  4 PagesEating Disorders: Celebrities and Teen Girls One may believe that slim celebrity pictures make people avoid being that weight, while it is also believed that these celebrities may be causing a weight drop in people around the world. Kelly Cutrone, owner of People’s Revolution, states that models are born with the characteristics needed to model, and these models are not unhealthy. Also, Psychologist Douglas Bunnell states that stars simply show the horrors of eating disorders, and how people shouldRead MoreEating Disorders Among Teens And Adolescents1566 Words   |  7 PagesEating Disorders in Teens In this generation teenagers fight the everyday struggle of wanting to be perfect. Perfection sells in modern society, with perfection being plastered everywhere, people feel the pressure of having to change their appearance. When looking at television and movies women and men see the ideal model of what the world believes they should look like. This long term process of seeing what you are expected to look like can cause emotional and physical problems such as eating disordersRead MoreTeen s Body Image And Eating Disorders996 Words   |  4 PagesTeen Girls’ Body Image and Eating Disorders In today’s society, many adolescent girls are dissatisfied with their body image due to comparing themselves to the media’s unrealistic ideal thin body. Since they grow up in a world filled with mass media such as television, films, magazines, movies, music, newspaper and the Internet, it is very easy to come across this ideal body image (Morris Katzman, 2003). As teen girls associate with this ideal thinness they tend to be dissatisfied with theirRead MoreWhy Do Teens Suffer From Eating Disorders1596 Words   |  7 Pages010 October 20, 2015 Why Do Teens Suffer from Eating Disorders: Annotated Bib It is no new discovery that teenagers in America tend to have a conflict with eating disorders. This problematic issue tend to affect many young teens just as the people that surround them, those who care for them. People might stop to think why teens struggle so much with eating disorders or how can this issue be wiped out. The thing is people need to be well aware of eating disorders and there definition and try toRead MoreWhat Causes Eating Disorders in Teens? Essay2331 Words   |  10 Pagesresearch plan is about the causes of eating disorders among teenagers. Environmental and personal factors play important roles in determining eating patterns and these need to be examined in order to understand how they are related or not to eating disorders. In so doing, it will also be possible to determine the significance of this research and apply it to the modern-day context. Literature review Introduction Recent studies have shown that eating disorders, termed EDs, are gradually taking onRead MoreEating Disorders : A Common Problem Among Many Teens Across The United States1401 Words   |  6 PagesChianna Porter Eating disorders a common problem among many teens across the United States. This mental disease not only affects young teen girls, but also grown women and men of all ages. There are four different types of eating disorders; bulimia nervosa, anorexia nervosa, binge eating and eating disorders not specified. Eating disorders are developed through a number of different factors. These factors are genetics, psychology, behaviors, social environment and biologically. Genetics means thatRead MoreEating Disorders Destroy Lives Essay777 Words   |  4 PagesTitle Eating Disorder – a combination of 14 letters that has the power to rock the life of the person who has it. Some of the most common eating conditions are anorexia, bulimia, and binge-eating disorder. According to the LA Times, â€Å"In 2009 the government published data that showed that kids under 12 were the fastest-growing population of patients hospitalized for eating disorders.† Not only are eating disorders becoming more popular and not in a positive way, but also the teens who have themRead MoreCauses of Eating Disorders Eating disorders are several types of severe eating illnesses that700 Words   |  3 PagesCauses of Eating Disorders Eating disorders are several types of severe eating illnesses that cause people to maintain focus on only their diet and weight. Some prime examples of eating disorders are anorexia nervosa, bulimia nervosa, and binge-eating. Anorexia nervosa is a type of eating disorder where people are so focused on their weight that they refuse to eat or eat as little as possible, bulimia nervosa is similar to anorexia except instead of eating so little people binge eat and then force