Wednesday, July 31, 2019

Dunkirk and the Battle of Britain Essay

Sources A, B and C all give information about what happened at the battle of Dunkirk and about the evacuation. All three sources were written by British people which means that the sources could be biased or contain incorrect information. Source A was written by Commander Thomas Kerr, a naval officer sent to organise the evacuation. Since the naval officer is British we can speculate that the source is biased. Thomas Kerr starts off by saying â€Å"What a terrible night that was, for we had got hold of the odds and ends of an army, not the fighting soldiers.†- this suggests to us that it was a horrible night, the soldiers they had got hold of were like the leftovers from the battle, they were depressed, hungry and they had low morale we know that this could be true because in the DVD we saw in class called ‘The Finest Hour’, a documentary about the evacuation of Dunkirk from a BBC television series, we see soldiers like Peter Vaux who hadn’t eaten for 5 days and was very tired. This source tells us that they weren’t fighting soldiers which we can say is true because if all the suggestions above are true, we can truly conclude that the soldiers weren’t ready to fight. Thomas Kerr goes on to say â€Å"There were hardly any officers, and the few present were useless†- this implies that there were hardly any officers left because they could have been killed or captured during the evacuation, and for the ones that were their they were probably so taken aback by the events going on that they could no longer instruct. It could also tell us that the officers there were tired or injured, so they couldn’t do much. This could be biased because Thomas Kerr could be trying to make us think that the officers were useless to try and make him or other naval commanders look good. Thomas Kerr then says â€Å"but our promise of safety, and the sight of our naval uniforms, resorted some order to the rabbleâ€Å"- this tells us that the navy was promising the soldiers safety and that their ‘glorious’ uniforms resorted some order to the rabble, this can be seen as biased because Thomas Kerr is making us think that the navy was powerful and saying it as if though the navy were the leaders, he himself is a part of the navy and just wants to make them look superior and heroic. Thomas Kerr lastly says â€Å"Their faith in the navy was pathetic; we could only do our best.†- this suggests that the soldiers didn’t really believe in the navy that they thought of them as they did everyone else, it then suggests that they could only do their best. Overall, this source gives us a lot of information on what happened in the evacuation of Dunkirk although quite a bit of the information is biased, in favour of the British and the navy there is some truth in the source.

Tuesday, July 30, 2019

Compare Two Deontological Theories Essay

‘Deon’ means duty in ancient Greek and a deontological theory is concerned with the morality of an act rather than its consequences (or the ‘motive/intention’ behind the act). Kant’s theory of categorical imperatives (I ought to do X rather than a hypothetical; if I want to achieve X then I should do Y) consists of three main principles. The first of these is the universal law which states that you must only act on the maxim (principle) when you can at the same time will it to become a universal law. This means that you must be content that if everybody took the same action as you chose in similar situations, it would remain a moral action. The second of his principles asks you to act in a way that treats others as an end in themselves rather than a means to an end. This relates to Jesus’ teaching to ‘Do to others what you would have them do to you’ (Matthew 7:12) and says humans should not use other humans to gain something for th emselves, as we would not like to be treated in this way. The final categorical imperative is the ‘Kingdom of Morals’ which says that we should always act as though we were the legislators for the kingdom of morals – we are in charge of what is fair and just. Kant placed great faith on human beings as being able to work rationally to such a conclusion and act according to principles. This contrasts with the Natural Moral Law theory which claims that we must find the purpose God has set for us and follow this path accordingly; our own personal beliefs are irrelevant. ‘Natural Moral Law’ was coined by Thomas Aquinas (influenced by Aristotle’s idea of the ‘final cause’) and the theory states that every action must work to fulfil its purpose; every action against it is immoral. According to the theory natural law is accessible through the natural order of the world and is unchanging. It is arguable that part of the theory is teleological as it is concerned with our ‘end’ by tryin g to fulfil our ‘God-given purpose’. Both Aquinas and Kant agree that our morals are absolute, a priori truths, however Kant believes that our reason will lead us to these truths whilst Aquinas has set primary and secondary precepts which he believes humans should follow. His primary precepts are to self-preserve and preserve the innocent, reproduce, learn, order society and worship God. These are absolutist as he believes all societies should share these values. He believes that these are universal and so he is fulfilling Kant’s first imperative. However the theories, when applied work very differently. An example of this is the case of abortion, a girl that is thirteen years old gets raped and becomes pregnant; she cannot care for the child and feels like she would be wrong in keeping it. According to Kant’s theory she would not be able to abort as she could not will every woman who became pregnant to abort their child, if they did then the human race would not survive, making this a contradiction of the ‘Laws of Nature’. Kant also argued that all humans have intrinsic worth and therefore by aborting so that she has an easier life the girl is treating the foetus as a means to an end. As for natural law, abortion goes against two of Aquinas’ primary precepts, largely the precept of ‘reproduction’. But also ‘preservation of the innocent’ suggests that issues such as euthanasia and abortion would not be permitted. The only acceptance to abortion in the natural law theory would be if the mother’s womb had to be removed to save her life – consequently aborting the foetus (this is the doctrine of the double effect). Both Aquinas and Kant assume God, Kant says that we must presuppose God, immortality and freedom in order for his theory to function whilst Aquinas believes that God gave us the ability to reason to find our morals – which God set. Whilst on surface level they appear similar theories, both being absolutist and deontological, when applied to ethical decisions they usually counteract each other with the viewpoint given. Assess the strengths & weaknesses of one of these theories (9 Marks) An obvious problem for the natural moral law theory is that it provides us with legalistic morality, because it is absolutist it means that it does not accommodate for individual circumstances. An example of this is a homosexual couple. According to the theory, the purpose of all sexual acts is to reproduce; any sexual act which does not fulfil this purpose is immoral. We can see that we are biologically ‘set up’ to reproduce in this way, and so Aquinas believes that masturbation, contraception and homosexual intercourse are all immoral because they do not perform the function that they are destined for. However the fact that it is an absolutist theory also has its advantages – it is a source of clear values and moral certainty, it would be very easy to follow, without considering the complexity of circumstances or consequences. Its focus on reason and universalism also helps the simplicity of the theory and can help it to transcend over a variety of cultures and religions. The only problem with it being a religious theory rather than a secular one is that the primary precept of ‘worshipping God’ will not come naturally to those who do not believe in the Christian God, or to atheists/agnostics. The fact that Aquinas maintains that the absolute laws come from God and that we ought to obey them may lead him into the trap of the naturalistic fallacy – obeying God is a value judgement and therefore he is turning and is into an ought. However an advantage is that the theory’s emphasis on the purpose of humanity gives people a structure and meaning in their lives, it is humanistic in its assertion that we all have intrinsic worth. Overall I believe that the weaknesses outweigh the strengths of this theory – it fails in its precepts which determine how people should live – people do not all hold the same values and therefore it is presumptuous to say that our morals were given by God and we all share them. It is also interesting that Aquinas himself went against his primary precept of ‘reproduction’ by being a celibate priest.

Monday, July 29, 2019

Be true to thyself

Be true to thyself Essay â€Å"I was looking for myself and asking everyone except myself questions which I, and only I, could answer.†-The Invisible ManBe True to ThyselfMany people travel through life on a constant search on who there are and how they fit into this world. Some maneuver through situations and issues that they are faced with never being true to themselves, but more so modeling the behaviors of others. It is not until one defines their self-image, obtain a healthy amount of self-esteem, and confidence can they execute decisions concerning their lives. Until then, their actions are merely mimics or derivatives of the thoughts or beliefs of another. In Ralph Ellison’s novel Invisible Man, the nameless protagonist does not possess a definite sense of self, which results in his living his life for others. Primarily, the invisible man emulates his life after other people. The first example of this is how he behaves like his grandfather. On his deathbed the invisible man’s grandfather tells him to â€Å"to keep up the good fight†(Ellison16). Following this he was always doing what was right and was â€Å"considered an example of desired conduct—just as his grandfather had been†(Ellison 17). Once the invisible man goes off to college he begins to act in a manner to please Mr. Norton. Not only does Mr. Norton not identify with the invisible man racially, he views blacks as â€Å"a mark on the scoreboard of his achievement†(Ellison 95). Despite these two facts the invisible man allows himself to be a â€Å"do boy† by chauffeuring Mr. Norton to slave quarters. It is here that the protagonist can truly be identified as someone that is not in touch with himself because he sacrifices his education for a man that is not concerned about him or his race. Dr. Bledsoe tries to drive this concept into the invisible man when he tells him that â€Å"the white folks tell everybody what to think†(Ellison 143). Dr. Bledsoe expels the invisible man from school, hoping that he will learn how to survive and develop an identity that suits him. After being expelled from school, the invisible man begins a journey to make a living for himself. He ends up in New York where he is introduced to â€Å"The Brotherhood†. â€Å"The Brotherhood† quickly gives him a place to live, a job with a reasonable salary, and petty cash to spend on clothing. He adopts their ideologies, mimics their way of life, and indulges himself in their literature. After going through a rigorous tutorial program the invisible man emerges brainwashed and still lacking an identity. Never making his own decisions, the invisible man becomes â€Å"chief spokesman of the Harlem District†(Ellison 359) and finally begins to promote the ideas of â€Å"The Bro therhood† to the people of Harlem. Not knowing that â€Å"The Brotherhood† is using him to entice the people into following their doctrine and adopting their philosophies. He never decided where he would go or what cause he would speak against. He became a pawn for â€Å"The Brotherhood†. To them he was not an individual, but an inanimate object. Eventually the invisible man grows tired of â€Å"The Brotherhood† and their mannerisms. However, instead of trying to work on developing an identity, the invisible man begins to impersonate â€Å"Rine the runner and Rine the gambler and Rine the briber and Rine the lover and Rinehart the Reverend†(Ellison 498). Wearing a large hat and glasses tinted a dark green, he moves about the street with greetings of â€Å"Hey now!†(Ellison 485) and â€Å"daddy-o†(Ellison 484). He immerses himself into a youthful lifestyle with no prior knowledge of how it operates. His resemblance to Rinehart is advant ageous because it allows him to travel safely from place to place while in hiding from â€Å"â€Å"The Brotherhood†Ã¢â‚¬ . The invisible man moves through his life never really living for himself but for others. In addition, to adopting the behaviors expected of him, he also adopts the personalities of others. Both of these practices strengthen the idea that he is invisible â€Å"simply because people refuse to see† (Ellison 3) him because there really is not a concrete personality to see. Though the invisible man lives a life of emulation for some time, he eventually retreats from others to discover his identity. The invisible man’s first step to living a personally fulfilling life was realizing that his â€Å"future lies chiefly in his own hands†(Vanzant 1/15). Consequently, if he does not know what to identify himself with he will not control his future. To have an established identity one’s self-image, self-esteem and confidence must be asses sed and developed. Secondly he learns that â€Å"identification with an organization or a cause is no substitute for self-realization† (Vanzant4/29). He realizes that his relationship to â€Å"The Brotherhood† and his role in their activities was insignificant. He excepts the fact that he was not really a part of the group, but more so someone that ran errands. In addition, the invisible man discovers â€Å"In the solitude of your mind are the answers to all your questions about life. You must take the time to ask and listen†(Vanzant 1/17). This is seen when he says â€Å"I was looking for myself and asking everyone except myself questions which I, and only I, could answer.† (Ellison 15). Taking time to think about morals, values and basic characteristics can prove useful in determining the qualities, which a person would like to exemplify. Knowing what he stands for will allow him to make better judgments in the future. In due time, he will begin to make judgments based on what his morals, ideas, and values reflect. â€Å"Nothing can dim the light which shines from within†(Vanzant 2/5), when you have a positive self-image you exude a confidence that surpasses even the most negative comments and corrupted situations. The invisible man begins to look at himself positivelyâ€Å"We must not wish to be anything but what we, are and to be that perfectly†(Vanzant 1/7). When we are satisfied with whom we are then we can begin to accomplish things. As the invisible man’s self-esteem increases so does his self-confidence. When someone begins to construct who they are they must realize that â€Å"If you have no confidence in self, you are twice defeated in the race of life. With no confidence, you have won even before you have started†(Vanzant 2/7). The invisible man develops a self-definition, which makes him â€Å"visible† to others. READ: The Failures of Affirmative Action EssayFurthermore, retreating underground was the best decision the invisible man made. Underground is where he finally realizes that he has no identity â€Å"is the way it has always been† (Ellison 566) and that his life was merely a farce. He realizes that other people controlled his whole life: from his grandfather’s death; to driving Mr. Norton; to being expelled from college by Dr. Bledsoe; to being a member of â€Å" â€Å"The Brotherhood†. He understands that he was never given a chance to think for himself and develop an identity befitting him: My problem was that I always tried to go in everyone’s way but my own. I have also been called one thing and then another while no one really wished to hear what I called myself. So after many years of trying to adopt the opinion of others I finally rebelled. (Ellison 573)After years and years of portraying others thoughts and beliefs he accepts â€Å"That I am nobo dy but myself.†(Ellison 15). It took him years to understand that some people live their whole life never knowing who they are and he was one of those people. Happy and content with his subterraneous lifestyle the invisible man begins to live a life true to himself. Invisible Man is a dynamic novel that many people can relate to today. Myriads of people are on a continuous search for their identity and purpose. This process has been conquered by some; however, many never discover or develop to their full potential. The lesson of this novel, however, is that seeking a strong self-definition is essential, while keeping in mind to not let outside agents determine that definition. This novel is one that I would recommend to all of my friends because while following the path that the invisible man takes to self-discover, I realized that many of us are on the same trail of discovery. Invisible Man highlights and emphasizes the significance in having a strong self-identity to live a productive and satisfying life.

Sunday, July 28, 2019

Bayes' Theorem Essay Example | Topics and Well Written Essays - 3750 words

Bayes' Theorem - Essay Example Simon Jackman (2009) defines Bayes’ theorem as ‘a theorem that illustrates conditional probability of the set on the given observed outcome, that is obtained from the knowledge of the probability and its outcome (Jackman, 2009)’. The rules of Bayes’ theorem are based on the basic axioms of probability or conditional probability. It expresses subjective depress of beliefs explaining the repletion through Bayesian statistic fundamental. The mathematical representation of theorem is as follow: Bayesian statistical method provides in depth understanding about the events. The application of theorem is wide in various fields and subjects, such as, science, biology, mathematics, finance etc. The model is applied to determine relation between the events. In the field of finance the Bayesian method is adopted for financial forecasting. One of the major advantages of Bayesian theorem is the consideration that is given to the previous information. The fact is that many statisticians would disregard previous information in order to prove the objectivity of the current statistics. The Bayesian theorem proves objectivity of the statistics by combining both the sets of information. A very significant advantage noted for the usage of Bayesian theorem is that it provides direct probability statement. This is considerably the best way to interpret confidence interval. On comparison, one can easily find out that frequents statistics would imply a number of tools. On the other hand, Bayes ian approach makes use of only one theorem i.e. Bayesian. The fact remains as that Bayesian approach can be used in different situations where most of the tools of frequentist statistics fall short. In the Bayesian theorem, the conditional probability occur on the bases of unconditional probabilities that are derived using a multiplication rules, that is (Prior x Likelihood) that are further divided by the sum of the possible parameters. Posterior in Bayesian theorem can be identified

Euthanasia Research Paper Example | Topics and Well Written Essays - 500 words - 5

Euthanasia - Research Paper Example 2007). Both decision making processes are important because they offer the aspects of knowledge and awareness as well as protection from malpractice lawsuits and license revocation for the nurse in question. Furthermore, the success of effective utilization of these decision making processes will lead to saving of a patient’s life and this means fulfillment of the ethical principles a nurse took an oath to protect. On the other hand, these ethical decision making processes are different. This is so because having knowledge of one and not the other will still lead to the professional getting into trouble with either the legal or moral authorities. Fulfillment of both simultaneously is also not an easy task and especially for nurses who already have other numerous patients to take care of and some of whom are already experiencing burnouts. Legal knowledge with all its jargon is not an easy task and it is confusing and not easily understood. The best ethical decision process to support is the knowledge of the ethical codes. This is so because these codes are the ones that guide the behavior, actions and final choice a nurse is going to undertake when it comes to a patient’s health condition. Having enough knowledge of the codes will also act as a good defense strategy in case there is an ethical malpractice lawsuit in the future as one will have followed these codes to the letter leaving no hanging lose ends. Knowledge of the codes will also pose for a good argument and convincing strategy with the patient and his or her relatives or caregivers and especially if there is any consent being sought. The nurse professional will be armed with enough information even explaining the pros and cons by use of the ethical codes hence convincing the parties of the best ways to solve the ethical dilemma they are presented with or

Saturday, July 27, 2019

Rhetorical analysis Essay Example | Topics and Well Written Essays - 1250 words

Rhetorical analysis - Essay Example He established his logos or logic to be more credible with the help of ethos or credibility by inferring to his lineage that he is the grandson of former President John F. Kennedy. His used of concrete figures also helped in making his arguments in the essay to be more logical and thus, more credible. Scholossberg use emotional appeal or pathos is not through the use of dramatics that would move the audience to cry but rather on appealing to their patriotic sense and love for America. The primary purpose of the essay wasa to voice America’s youth of concern that they too would like to get involve that they care for their country because what is stake in the election is their future in the first place. They are not as apathetic or self-absorbed as they were projected. It is just they reject the petty posturing of politicians, their partisan gridlocks and political inaction to get things done. Give them real leaders and they will respond – through involvement and willingness to work. While the youth may seem unaware and apolitical, Jack Scholossberg clarified that his generation knows what is going on. They know that his generation is burdened with a misguided war that damaged [America’s] credibility abroad. This resulted to America’s numerous implacable enemies that resorted to terrorism out of their hatred for America. Those misguided wars also costed America billions of dollars that they it has to borrow to the point that its national debt has grown so large that they do not know if they can still pay it back. According to Scholossberg, the youth may be silent (evident with their previous non-particpation) but they are very observant. Thus, in writing an essay to the Yale Daily News and The Yale Herald as his contribution, he would like to relay to his fellow students and youth (the paper being an

Friday, July 26, 2019

Psychological influences on health and wellbeing Case Study

Psychological influences on health and wellbeing - Case Study Example Anna’s late biological development, in her puberty, is another biological factor to her condition. Delayed development in her body induced a sense of inferiority complex and developed a social barrier between her peer and her. Poor interpersonal potentials, low self-steem, and inferiority complex are however social factors to her condition. She was not able to relate with her peer at school, had a poor self-opinion about her, and these caused a social gap that induced the condition. One of the effects of Anna’s cognitions of her state during high school was acceptance and ownership of the problem. In identifying anxiety with her uncle, other relatives, and her sister, Anna perceived it as a normal thing, at least within her family, and this could have reduced her efforts in dealing with the problem. When she identified anxiety and alcoholism in her uncle that led to his mobility across jobs, Anna perceived fault in her uncle’s drug problem and not the anxiety problem, an indicator that she overlooked associated problems with anxiety because of the condition’s existence in her family. Recognizing that she was cognitively and physically fine is another factor that contributed to her problem at early adulthood by limiting her from external help. This is because she believed that based on her cognitive potentials into outstanding academic performance and active engagement in physical activities; she could solve the anxiety problem on her own. Anna’s decision to be excluded from physical education identifies one of the interactions between her emotions and her lifestyle. Feelings of inferiority complex from which she identified herself as awkward and unskilled influenced her decision to seek her parents’ intervention so that she could not participate in physical education, and hence physical activities. Anna also led a quite lifestyle in school, especially in class, and her emotions caused this. Based on her delayed physiological

Thursday, July 25, 2019

A path breaking research in the area of Metrics used in IT industry Paper

A path breaking in the area of Metrics used in IT industry and its effectiveness- Developing new metrics for measuring - Research Paper Example Scope becomes sufficiently measured through observation of the changes required during the implementation process. This paper explores the various metrics utilized in assessment of the efficacy in implementation of these unique IT projects. TABLE OF CONTENTS ABSTRACT 2 TABLE OF CONTENTS 3 INTRODUCTION 4 METHODOLOGY 4 Planning 5 Controlling 6 DATA COLLECTION AND ANALYSIS 6 FINDINGS 9 Project metrics 10 Metrics in IT projects 11 Cost 11 Time 13 Scope 15 CONCLUSION 16 REFERENCES 18 INTRODUCTION The information technology industry represents a unique characteristic for development projects aimed at providing improved technologies, both in software and hardware sectors. The planning process for the projects remains an essential component for minimizing project failure ultimately assuring success. Poor management of IT projects remains the highest cause of project failures within the industry. It is estimated that this accounts for 54% failure with technical challenges causing 3% (Gulla, 2012). Proper management begins with development of proper plans during the initial project stages. The evaluation process seeks to make an assessment of the project progress during implementation. ... The process will be broken down into different stages which shall follow each other. The waterfall methodology being utilized shall be as indicated in the chart below. Measurement of the various metrics involved in the project will be undertaken following completion of each stage and relevant actions taken, based on the results of performance indexes. Figure 1the waterfall methodology Planning The project planning aspect involves the development of a plan providing guideline towards undertaking a desired development project. This marks the beginning stage of any project being implemented. The element of undertaking sufficient planning remains fundamental in assuring success, or causing ultimate project failure. The planning process involves provision of various aspects of the project, commonly through estimations. These estimations provide guidelines during implementation; hence their accuracy remains essential in assuring success. The provided estimates must remain reflective of act ual figures, with minimal discrepancies. During the project evaluation process, the actual figures become measured against the provided project estimates, established during the planning stages. Poor planning remains the fundamental cause for most project failures. While the planning phase remains fundamental in ensuring success, the numerous aspects involved within the planning phase contribute towards successful implementation. Individuals involved in the planning phase of any projects should ensure that the plans suffice the project requirements. This serves in eliminating and minimizing continuous changes during the project implementation phase. The planning phase should provide a

Wednesday, July 24, 2019

Lab dispersal time Report Example | Topics and Well Written Essays - 1000 words

Dispersal time - Lab Report Example Animal activity is one of the primary agents bringing seeds to the surface of the soil and burying them. It is, therefore, a profound factor that affects the seed bank contribution to plant recruitment. Also, Earthworms, among animal species are recognized as crucial predators and dispersers of seeds. Seed dispersal is the motion of seeds away from the parent plant. Plants rely on a variety of vectors (living or nonliving) for dispersal (Murray, 2011). The type of the vector responsible for the dispersal of a particular seed is suited to by the general seed characteristics. Common modes of dispersal include gravity, wind, animal, water and ballistic. A particular seed may be acted upon by more than one vector, depending on the conditions and seed type. Exposed seeds on surfaces of soils are vulnerable to extreme contents of moisture and temperature, thus compromising the viability of seeds. In addition, they are easily detected by predators (Hirsch, 2012) Researchers have established that secondary dispersal is a critical characteristic that influences seed survival (Lal, 2002). Secondary dispersal can be defined as the movement of seeds across, and into, the soil (Forget, 2005). When seeds are placed on soil columns, some will penetrate to deeper levels than others, and some will disperse throughout the soil column. In addition to morphology, the role a facilitator species plays affects dispersal. In this case, an earthworm is the facilitator species. The facilitator species activity has a substantial impact on the soil seed bank dynamics and hence on the possibility of plant recruitment in an ecosystem at large (Allessio, Thomas, & Simpson, 2012). Milkweed, buckthorn, sumac and burdock seeds have different morphological features; Milkweed (Asclepias spp.) seeds are shiny, silky seeds which have snow- white fluffs. They are contained in con-shaped seedpods which crack open when dry to disperse the

Tuesday, July 23, 2019

Urbanization in ancient Greece Essay Example | Topics and Well Written Essays - 1000 words

Urbanization in ancient Greece - Essay Example One key characteristic of these settlements was lack of governmental authority beyond the boundaries of the village (Chant et al, 2000). In addition, these villages did not have any workshops or public buildings. Such egalitarian societies persevered on even after the introduction of agriculture. The egalitarian societies were stratified and turned into functionally specialized units by the formation of states and urbanization (Chant et al, 1999). This process took place independently in numerous regions of the world, probably starting from the Southwest Asian region, which was very fertile. The formative era referred to the period between the years 7000 to 5000 BC, which was characterised by urbanization and state development, which complemented each other. Upon the stratification of the egalitarian society, there emerged craftspeople, farmers, soldiers, administrators, merchants and priests, with the cities becoming the civilization focus (Chant, 1999). In the development of Greece cities, the natural environment as well as the existing technologies played a key role. These cities were built in around the eighth century by the Greeks. Distinguishing how the shape of the buildings in the cities was influenced by the natural environment or the available technologies is not easy. This is because there exists a very dynamic relationship between the natural environment and technology, with each shaping or being shaped by the other. Military technologies and needs were very important determinants in the layout and growth of Greek cities. Some of the initial cities in Greece grew as a result of pressure since the people needed to defend themselves form their enemies. As a result they were generally located on rocky positions, which were regarded as defensible. They were also positioned some distance from the harbour, with heavy fortification (Chant et al, 2000). Wall-building proved to be the most expensive and laborious task and involved very impressive engineering accomplishments in the architecture of Greece. Stone was in abundance and was used the building material, with its properties determining the style of construction. For instance, lintels and posts were frequently used in the construction of public monuments. Stone, which was the building material of choice, needed lifting technologies that utilized people as opposed to hoists (Chant et al, 1999). Cranes were not in use until much later, in 515 BC and beyond. They came into use as a result of labour shortage and not because of their capability of lifting larger blocks of stone. The unplanned growth of the earliest settlements was substituted by a bit more formal buildings, mainly after Persian attacks in the fifth century. With the advancement of technology in the military, it became necessary to adopt a defensive layout for the city streets. In the process of the reconstruction of these cities, there was development of numerous town planning theories, most of which were put into practice, with the grid plan becoming very common. Aristotle advocated for a city design of a defensive nature, which uses both the irregular and regular features. This, he argued, was aimed at reconciling the strain of moving both the equipment and troops easily, and to confuse any attackers (Chant, 2000). Natural Environment The location of earlier settlements was mainly determined by the natural

Pakistan and Policy Essay Example for Free

Pakistan and Policy Essay National integration is unity in diversity. It means a feeling of oneness. It implies social, political, economic, linguistic and cultural unity. It is the development of a mental climate that would help reacts in terms of oneness, irrespective of the region, language or religion of the people concerned. It means a heaven of freedom where the world has not been divided into fragments by narrow domestic wells. It is based on feeling of oneness, common ideals of life and a common code of behavior. It implies confidence in nations future, deep sense of values and obligation of citizenship, mutual understanding and respect for the culture of different sections of the nation. Need for National Integration National integration is the feeling that binds the citizens of a country. Its aim is to put individuals best efforts for the optimum growth, prosperity and welfare of the country as a whole. It does away with inter-state, inter-linguistic, inter-religious and inter-cultural differences. It promotes a spirit of tolerance and respect for the view-point of other cultural groups. To Kanungo, Every country at every time needs national integration but India needs it the most. Indias passing through a critical period these days. The integrity of India is in danger. Therefore Indians will have to act carefully. In India national integration is needed due to following reasons: Threat of Foreign Aggression National integration is vital for Indias survival especially at a time when the country is under the threat of foreign aggression and internally the people are divided on the basis of castes, religions, regions, communities, languages and Races For the Development of National Character National integration is an essential element for the development of national character. These days there is lack of national character. Corruption is increasing day-by-day. We are sacrificing national interests for the sake of money. National character can be formed only when we have the feeling of national integration. For Success of Democracy India is a democratic country. National integration is an essential pre-requisite for the success of our democracy. It is a basic need for the success of democracy; otherwise, the fissiparous tendencies in the country may lead to serious consequences. For Diversity National unity is essential for any country at any time. There is unity in diversity in India but now unity is in danger. Therefore, national unity is essential in order to maintain the eternal value of unity in diversity. For Peace National integration is essential for keeping peace at national and international level. Modern age is the age of science. It has changed the whole world in a family. Every nation is dependent on one another. Therefore, scientific achievement should be used for constructive work in order to provide peace to humanity. This feeling can develop only when we have the thought of national integration.

Monday, July 22, 2019

Pearl Harbor - Short Summary Essay Example for Free

Pearl Harbor Short Summary Essay Three-hundred and sixty Japanese planes broke through the clouds above Pearl Harbor at 07. 55. The planes attacked in rows of two or three, dropping torpedoes at 100 knots from 70 feet. The first wave of planes destroyed US hangers and the planes in the neat, anti-sabotage rows. Other attacks in the first wave were on Battleship Row, cruisers and other auxiliary ships. Most ships had numerous torpedo hits. To complete the destruction of the war ships, six submarines aided in the sinking and destroying of what was not already certain. When torpedoing planes left the vicinity, bombers carrying 1 600 pound bombs were sent to destroy any remaining ships. Overlapping the first wave of attack at 08. 40 was a second one. They concentrated on the not yet fully destroyed airfields. By 09. 45 any ship of the US Pacific! Naval Fleet that was not on the Ocean floor was drifting helplessly. It [the Arizona] sank like an earthquake had struck it, a survivor remarked, 1 200 of his crew mates died. US troops returned from church or brunch to defend as best they could. Fighting until they drowned or were crushed by exploding debris, sailors, fliers and anti-aircraft gunners fought heroically to save their doomed naval base. By reason of the attack occurring in what Americans thought was peace time, much of the ammunition was locked away, leaving the defending US troops with little defense. In the end, the US had eight battleships, three cruisers and a large number of smaller vessels sink or rendered out of use. The Japanese lost 0 30 planes and five submarines. Although the destruction was not total, Japanese foremost naval strategist, Yamamoto, found the result better than he had anticipated . Military records state that the attack sank or destroyed 6 ships. US casualties included 2 500 as well as over 1 000 wounded. The Japanese lost less than 30 aircraft and about 55 men. The bombing of Pearl Harbor can be seen as a turning point in the war. Essentially, the war had been of mainly European involvement, now it took a global turn. The bombing prompted a US declaration of war on the following day, as well as great American shock and outrage tempered by anger. The attack was dubbed a day of infamy by President Roosevelt, as no American could forgive or forget the actions of the Japanese nation. The Japanese could not have devised a better way to rally the American citizens into full support for Roosevelt and his governments plan of US involvement in the war. A previous promise between British Prime Minister, Winstin Churchill and President Roosevelt was honored when Britain declared war upon Japan two hours after the US declaration. The events surrounding the bombing of Pearl Harbor prove the US handled the situation very poorly. Many opposing tactics were noted and ignored. Warnings were thought of as routine. Even survivors, who were fully aware of the Japanese tendencies of war on China, the government war warnings and their countrys unprepared state, still describe the attack as a surprise. The Japanese military strategies were intelligent and well executed; although, the Japanese attack would not have been nearly as effective had the Americans not have been so blatantly ignorant. The US had no knowledge of the attack on Pearl Harbor in 1941, and it was their fault.

Sunday, July 21, 2019

Computerised Stock Control System

Computerised Stock Control System Introduction The Enterprise Networking assignment is based on the computerised stock control system. This assignment is about how to implement a new online book company called â€Å"Amazing Books†. â€Å"Amazing Books† company is a new online book company that will be selling books via a website. The website represents the books that are in the company’s warehouse. It also contains the information of the books and the information provided to the customers to order the books they want. It is linking with company’s stock control system. The stock will be regularly recorded and updated based upon the sales record. When a customer fills an order form, he or she has to choose the items and the delivery information. When the company receives the order, it delivered the packaged books to the local depot of a courier company. The online book company also implements its computerised inventory control system in the warehouse. This system includes order processing, recording new entry of books, despatching books to the courier firm, and flagging stock reorder levels up. So, the company will investigate the websites of stock control system as sample and implement its own one. Besides, the company will create a local area network (LAN) for in the warehouse by using appropriate media and topology to carry out its processes well. The company also has a plan to deliver the ordered stock items from the warehouse to the delivery company successfully by using suitable vehicles which contains hardware and software for security management. The last plan is to manage a security control system in order to prevent the theft of staff themselves and to regulate the stock reorder level by the time theft occurs. The network administrator or manager of the â€Å"Amazing Books† online book company will be investigating the book websites and computerised stock control system websites of other companies. He or she is also looking forward to finding the delivery management system and security management system on the web. Then he or she will be writing a report (with recommendations) how to implement theirs company in order to successfully set up. Task 1 Amazing Books Company is one that wants to manage themselves as an online book sales company. They will sell their books via the internet. So, they want to develop a website which will display information about their books. Before it is developed, they examine three websites of the online book companies that sell theirs via the internet. The first investigated website is www.bookshopofindia.com. In home page, the pictures of some books are presented. When the pictures are doubled-clicked, the summaries of each book are displayed. It contains other information such as authors’ names, ISBN number, price and numbers of pages. On the left-hand side of the home page, the subjects of the books that are sold in this website are listed. The subjects contain religions, arts, commerce, computer technology, children books and so on. To order the books, customers can send e-mails, but they can only make payment by using bank account of Corporation bank and Punjab bank. The second examined website is www.boomerangbooks.com. In home page, some pictures of normal books are placed on the right side. In the top, some special ones such as books for Mother’s day are put. In the middle of the page, some are advertised by showing pictures, authors’ names, and short descriptions of them. If the pictures are double-clicked to investigate, the pictures of the books’ covers and summaries of them with authors’ names appear. ISBN, format, number of pages, publishers, publish date and languages are also shown. On the right side, normal price and discount price are compared. On the left side of the home page, the site arranges some categories to browse for books according to book categories, bestsellers, books from movies, and book awards, etc. It also places book contents. In home page, it ranges a menu called â€Å"Boomerang Books Bulletin†. If a user signs up in this form, he or she can get a $5 book voucher and 20% discount when discounts days are on. To order the books, the site displays its phone number, e-mail address, and fax number. Thus, customers can order by phone, e-mail or fax but they can pay only Australian dollars. The third one that is observed to get displaying books information is www.cherrythitsar.org . This website is the one where users can get e-books. On the home page, there is a list that describes the categories that users can download. These categories contain Myanmar free e-books, Myanmar novels, Myanmar newspapers and so on. If a customer wants to get them, he or she has to make an account by entering user name and password. Then he or she can get them. After investigating these websites that provide information for online book selling, â€Å"Amazing Books†, the online book company, is implementing their website. On the top of the home page, the photos of the books that are sold for the memorial days will be presented. They will be sold by gifting suitable discounts. On the left-hand side of the home page, the catalogues of the books will be exhibited in order to search books by the categories the customers want. The catalogues will queue the lists of the books according to book categories, bestsellers, books from movies, and book awards, etc. If the photos of the books in home page are double-clicked, the summaries of the books with books’ titles, sorts of books, ISBNs, authors’ names, publishers, publishing date, number of editions, and number of pages, etc. will be shown. Under the every page of site, there will be company’s address and ordering information will situate. Ordering information will include phone numbers, fax numbers and company’s e-mail address. So, customers can order books by ringing a phone call, or making order by fax, or sending an e-mail. To order by e-mail customers must fill chosen items into the shopping basket that is on the right side of the home page. Then they have to enter their phone numbers and addresses (including postal code). They can enter their bank accounts or credit card accounts to order. Task 2 There are many stock items that are stored in the warehouse of the â€Å"Amazing Books† online book store. The stock control system in warehouse is linked with the company’s website so customers can view the books that are in warehouse via the website. If they want to order books, the will their personal information including delivery addresses, postal codes and bank or credit accounts. When customers make books order via website, the company will inform the staff of the warehouse. The warehouse staff checks the level of stock items and reply to the main server. And the server keeps the information update and let the customers know information to the website. Then the company will deliver the books to a delivery team. And then the courier company will deliver books according to the customers’ addresses and postal codes. To carry out these processes successfully, the book store needs a proper inventory control system. So, they gather information for stock control system by exploring the websites which represent their computerised stock control systems. Required information for recommendations The first and second investigated websites show their online stock control systems. They show their product information and other associated one. Customers can search and browse they want and they can order them by e-mails. The company that creates the first website is using RFID (Radio Frequency Identification) readers for recording the new items for the stock. The company also explains its delivery service for ordered items. The second website uses barcode reader. It describes their control system of balance levels of the stock and alerting the flagging up reorder system by using the stock control management software. The third and the fourth one are the websites that sell software applications for computerised inventory control management system. They give the detailed information of how to use their software. Both of them are produced to run the functions of recording customers’ order, purchasing, items entry, auditing, receiving, shipping, transferring, reporting and security management, etc. Among them, the former one is used with barcode reader and the latter one with RFID for recording new stock items for the system. Customers can buy their software by entering their e-mail addresses, and bank or credit account numbers in these websites Methods and hardware for recording stock entry which are in warehouse After investigating four websites, â€Å"Amazing Books† implements its computerised stock control system. First of all, they make purchasing books from many other sources. Then the books are put in containers which contain RFID (Radio Frequency Identification) tags and the containers are carried by suitable vehicles. When they arrived to the warehouse of the company, the RFID tags are checked by RFID readers which transmit the series of digital identities of the books wirelessly. The tag readers detect the packages or containers which contains several book items. The RFID readers can check each entire container simultaneously and enter data into the server computer using special stock control management software for inventory control. So, the right data in database of the server can keep updating. Being linked the server with the website of the company, the information of the books in web pages is automatically updated. (c) Methods and hardware for order processing To order the book items, the customers have to fill the order form. In this form, the customers must fill their information that contains their addresses and postal codes and delivery fees (which price ranges depend on countries) by means of bank or credit account numbers. After that, they can order books via website of the company. When the company receives orders from customers, they register information of customers and orders in Order file. They check concerned master and transaction files to know how many numbers of which stock items are ordered. They also interrogate stock levels in the warehouse using RFID readers and make records of sending items. These records are entered into the server to update stock information. They then display that information in the website that is linked with server of the company. So, customers can see whether their ordered items are sent to them or not. (d) Methods and hardware for recording despatched items Their next procedure is to deliver the ordered books to a local courier company. Before they send, they pick books up from the warehouse and pack them into specific packages or containers which consist of RFID tags which will help the courier firm easy to check them. Then they deliver them to the delivery firms by appropriate vehicles. When the books arrive, the courier companies check the RFID tags of packages or containers by using RFID readers. Then they start delivering them to the customers around the world by using flights or ships or other appropriate vehicles. The delivery firm company sends the items information in order to update data in database of the server of delivery company. They will update the delivery information whenever the items arrive to their braches in different countries until they reach to the destinations. So, the customers can view the information on the website when and where their ordered items are arrived. (e) Flagging up and reorder levels of stock items After sending the ordered item, the website needs to update the item information. To make balance for the reorder level, they use the automatic flagging up system using the stock control software by giving notation on the server of the warehouse. So, the company can check balance level and decide whether they should reorder new books from other sources or not. (f) Required hardware for system To complete the system, they also use some kinds of hardware devices. They use Server for the main control processes for the stock. And they also need to use some kinds of not only security devices for the warehouse security but also special software to control the system and to prevent unauthorized access to data. It describes their balance of the stock and alert the flagging up reorder system buy using stock control software. Task 3 To implement the computerised stock control system used in warehouse the local area network (LAN) is conducted. The major requirements of LAN network are topologies and media. There are many topologies though only some are widely used. The most popular topologies are ring, bus and star topologies. In ring topologies, computers are connected by cables in a circle or ring form. Each computer is directly connected to the next, so no termination is required. In this topology, token passing method is used to transmit data in clock-wise direction. So every computer can transmit data fairly. It can prevent high-traffic and time-critical applications. So it is reliable and highly secure. But it uses fiber optic cables so cost is high and finds difficulties to install. In bus topology all computers are connected via a backbone, a cable segment. In bus topology, signals are sent as electrical parses. When they are sent, they travel along the cable in all directions. So, data collisions can occur when more than one computer transmit data simultaneously. Thus, occupying high-traffic is the major problem; otherwise, cheapness and ease of installation are advantages. In star topology, all components are connected by cable segments to a central device to communicate each other via it. It can share network resources and send and receive data from the computers in the network simultaneously because it handles multiple connections. So it is useful where high traffic occurs. It supports centralized management and the central server has a complete priority over other computers. But this topology requires a more involved cable installation and high cost. The access of the entire network also loses when the central device fails. To build a network we also need media. There are two groups of media; bounded and unbounded media. In bounded media, there are three types of cables; coaxial cable, twisted pair cable, and fiber-optic cable. Coaxial cable consists of two kinds- thin coaxial (10 Base2) and thick coaxial (10 Base5). There are two types of twisted pair cables; unshielded twisted pair cable (UTP) and shielded twisted pair cable (STP). The optical fiber cable contains two kinds; glass and plastic. The unbounded media or wireless connection technology contains Wi-Fi, and Wi-Max connection. Wi-Fi includes 802.11b and 802.11g at 2.4 GHz frequency and its speeds are between 11 Mbps and 54 Mbps, and 802.11a and 802.11n has 5 GHz frequency and 54 Mbps bandwidth. There are two versions of Wi-Max connection fixed Wi-Max (802.16-2004) and mobile Wi-Max (802.16e). The stock levels displayed in the website are based upon the sales figures which are in warehouse. Updating stock control system regularly can help the stock level. To support the stock control system a LAN network will be created in the warehouse. There are two types of networks; peer-to-peer one and server-based one. The server based LAN network is chosen to implement as it can handle a number of computers, more memory for a large database and extra peripheral devices such as printers; otherwise, peer-to-peer network can handle 10 or fewer workstations. To configure a server-based network, an appropriate topology and a suitable medium are used. The proper one for this network is star topology. Using central devices such as switches connected with cable segments, it supports centralized management for the entire network. It shares resources and access to clients simultaneously without traffic. Unshielded twisted pair cable is used as medium. It ranges into seven categories. Among them, category 5 is chosen because it is designed for 10 Mbps Ethernet whose speed is up to 1 gigabit. It can connect even 1024 nodes and can run 100 meters distance. It also provides ease of trouble shooting all nodes of the network. After configuring topology and medium, a server-based LAN is implemented. Firstly, the OSs is installed in the server computer. Then Active Directory Service (AD) is installed. So, it becomes a domain server which can control client nodes in the workgroup. There will be a network administrator as the authorized user of the server computer. This administrator will control security, access and user accounts of each client-computer user. Being centralized managed network, only server one can share resources but the client cannot. Data can only be updated, or deleted by the administrator who uses the server computer and not by the client. Thus the administrator can check and control the database using the information reported by clerks who provide data concerned with sales figures. Therefore, this database can offer up-to-date information for the stock control system because it is based on the sales figures. The computerized stock control system is being linked with the website via internet. So, regularly updating the data of the stock control system means the website shows the information deal with the status of the books items that are in ware-house. This makes customers easy to find the information they want and to order books by filling order form that displayed in company’s website. Task 4 The company will inform the staff of the warehouse about the information of the ordered books when they received confirmed orders and cost by bank or credit account from customers via their website. They also acknowledge the customers about the confirmation. The voucher numbers of the ordered books and the DNS of the courier’s website are also given. Processing Order in Warehouse After receiving the ordered report, the staff members in the warehouse prepare to deliver the stock items. First of all, they check to ensure whether the quantity of the stock level is complete or not. Then they prepare to send them to the local delivery company. They firstly put and pack the books by means of ordered quantity and titles in the packages or containers. Then they fix an RFID tag which contains an electronic serial number on each container. The information of the sent items is marked by means of an RFID reader which can detect the electronic signals of serial numbers of the books. Then the information is transferred into the server computer to update the data in database. Transferring stock to local courier company Then they transfer containers of books to the local courier firm by taking suitable vehicles which are fitted GPS (Global Position Service) system to point the routes and time taken of them and to acknowledge the company what time where they are. When the containers of books arrive to the delivery team, they are checked with RFID readers again to mark what time the delivery items are received. It makes ensure not only the stocks are prevented by theft of staff but also they are safely arrived and whether they are the correct ones or not. Delivering stocks by Courier Company The delivery team starts the delivered items entry into their website after checking them. Along the paths of wherever they deliver the stock until they reach to the destination, they regularly update information on their website. So, customers can check the delivery information via the website of the courier company if they want to track about their ordered books’ information. The delivery company delivers the ordered stock items according to the customers’ addresses and postal codes. If the addresses and postal codes indicate a customer is in local, the company uses cars to transport them. Otherwise, they firstly send by using shipping delivery to the foreign countries where the branches of their company are situated and they send to their destination addresses and postal codes at last. Updating data Each branch of the courier firm also reports to their main office and the office also return the information to the â€Å"Amazing Books† company until the ordered book items are received by the customers. The online book store company also updated the information in their company’s database in main server. Being linked with the server of the courier company, the information of the books in their website is also updated. So, the customers can see where the items they have ordered and when they will receive them by entering the voucher numbers of them on the website of the courier company. After the ordered books are transferred from the delivery company to the customers, the firm also reports to their main office again. The main office of the company also replies to the online book store company. And then the book store renews the data in database of the server in order to check the balance stock levels by means of automatically flagging up system. Task 5 â€Å"Amazing Books† online book company keeps in a large amount of book items in the company’s warehouse. The stock items in the warehouse are kept by staff members of its. To secure the warehouse and the books in it, a security management system is needed. This system is also required to prevent unauthorized access data of the company. The company should also think about the theft or access data without permission done by staff members of the company themselves. (a) Methods to prevent theft and monitor the staff To implement the security management system of the warehouse, both hardware and software are needed. At first, the local area network (LAN) will be created using Star topology to control the centralized management of the company’s LAN network. Furthermore, the network administrator should also manage the specific working hours, authorized access, and login passwords, etc of an individual staff. So, unauthorized access that aims getting company’s important data in database of the server dishonestly can be overcome. It can also prevent the fraud of staff. Moreover, there should be some plans to detect and prevent the theft of stock items in warehouse. The most appropriate thing to monitor inside the warehouse is CCTV cameras. They will let the administrator or manager watch inside the warehouse all the time. He or she can immediately know if theft is occurred. Besides, there should be some limitations at the entrance and exit of the warehouse. Using retina scanner at the entrance is a proper method. The scanner will sense the retina of each staff to separate if the person has the permission to enter into the warehouse or not. It will make the record of each and it will alarm if something doubtful is happened. An EAS (Electronic Article Surveillance) should be fixed at the exit of the warehouse and everybody must be through when they leave the warehouse. It will detect each person using radio frequency technology and alarm when the staff takes the book items out without registering for despatched processes. (b) Adjusting the stock levels when theft occurs Before implementing the security management system of the warehouse, the stock levels of the books should be checked to ensure that the quantity of the stock before they are stored in it. When the books which are bought from different sources arrive to the warehouse, they are checked with RFID readers. Then the information of the books is transferred into the server computer as unique serial numbers of each. This event makes update the data in database. The server then stores the information of the books which includes quantity, books’ titles, and ISBN, etc. When the books are delivered, they are packed in containers which have an RFID tag and are rechecked with RFID readers again. Then checked data and data in database of the server are compared to confirm. If they are not same, the administrator can know the books are thieved by staff and he or she should review the security records. Automatic flagging up system also alerts when the quantity of books are less to acknowledge the administrator. So the administrator can check the balance level of the stocks and reorder new books from sources if necessary. Task 6 The report is produced in order to describe the recommendations of how to set up the computerised stock control system of the â€Å"Amazing Books† online books company. The summarising reviews for each procedure are as follows: Reviewing Task 1 The company investigates three online books websites via internet. They examine the features of the websites in details, i. e, the presentations of the books, selling and order information, delivery information, and discount information, etc. Then they will implement their own by using the facts which are based on the recommendations. Reviewing Task 2 The company explores four computerised stock control system websites. Then they set up their own computerised inventory control system in the large warehouse of the company. First of all, they will record the stock information by using RFID readers when the stocks arrive to the warehouse. Then they will transfer that information to the database of the server of the warehouse in order to update the data. The information in website will also keep updating because it is linked with the server of the company. When customers want to order books via website, they have to fill the order forms which contain the information deal with their addresses, postal codes, and bank or credit card account number. Then they will transfer the stocks to local courier company by appropriate vehicles. After that, they will update the information of books delivered in database of the server again. In the warehouse of the company, there will be an automatically flagging up system. They will fix this system to auto check the balance level and quantity of the stock. It will alert the company when the new stocks should be reordered. Reviewing Task 3 As the third step to implement the company’s stock control system, they will create a local area network (LAN) in the warehouse using suitable media and topology. The LAN will be set up as a server based one in order to centralized manage the whole network. The website of the company will be linked with the server so the information in website will always keep updating. Reviewing Task 4 After receiving the containers that contain books, the courier company will check stocks’ RFID tags with RFID readers and make records the books information. This information will be transferred into their company’s server computer to update data in database. As it is also linked with the website of their company, the delivery information will also update. The delivery company will always update the delivery information whenever the stocks arrive to their branches which are in foreign country. They will keep updating until they reach to their destination addresses. Customers can view what time at where their ordered books are via the website of the courier company. Reviewing Task 5 There will also be a plan to prevent thefts done by staff while the company is setting up their online book selling system and computerised stock control system. To prevent those events, the administrator will monitor the staff by using CCTV cameras. He or she will also use retina scanner at the entrance and EAS (Electronic Article Surveillance) system at the exit of the warehouse. To prevent unauthorized access, the administrator will manage the specific working hours, authorized access, and login passwords, etc of an each staff member. The stock levels are record by RFID readers when they reached to the warehouse. That information will be transferred into server of the warehouse. When the books are delivered to the deliver firm, they are rechecked with RFID readers again and transferred into server in order to update the data of stock levels. There will be an automatic flagging up system to alarm to acknowledge the administrator. So the administrator can check the balance level of the stocks and reorder new books from sources. Reference Websites http://www.bookshopofindia.com http://www.boomerangbooks.com http://www.cherrythirsar.org http://www.isisasset.com http://www.trakersystems.com http://www.controlelectronic.com http://www.rfid-library.com http://www.dhl.com Books Title Guide to Networking Essentials ISBN 14188-3718-0 Author Name Greg Tomsho, Ed Tittel, David Johnson

Saturday, July 20, 2019

Harry Potter: Good or Evil? Essay -- Essays Papers

Harry Potter: Good or Evil? Throughout adolescents, a child is taught to use his or her imagination. A child is read stories of a talking cat or a silly old bear while still young and naà ¯ve. The child is read such stories to encourage use of his or her creativity. The ideas of such characters are for pure amusement and are obviously fictional. Unfortunately, today there are issues of censorship that stifle a person’s creativity. The most recent book being criticized by censors is J.K. Rowling’s Harry Potter series. Censors claim that the reading of such novels encourages witchcraft, and therefore should be banned. Although critics of the Harry Potter series are well intentioned in their ideas of banning this novel in schools, the actual banning of the novel is far more destructive. What these critics fail to recognize is that the reading of such an imaginative novel allows for children’s creativity to flourish, rather than allowing them to turn to negative forms of entertainment. T he banning of certain novels in schools is extremely important in today’s society, but only when the novel is destructive to a child’s upbringing. In past history, such classics as Maya Angelou’s I Know Why The Caged Bird Sings, Harper Lee’s To Kill A Mockingbird, and J.D. Salinger’s Catcher In The Rye have been banned. Critics justified their actions by stating that such novels are inappropriate for school age children. Critics have now targeted the highly creative Harry Potter series. At the beginning of the school term the American Library Association was bombarded with complaints from parents about potentially harmful content in the series. Unfortunately, opinions vary and there is no simple answer. Although citizens of the United States are given the right to Freedom of Press under the First Amendment, this does not allow schools to incorporate every piece of literature within the curriculum. Schools are torn because as Linda Harvey states in â€Å"USA Today†, â€Å"No school includes everything. Few public schools would accept books advocating drunken driving, bulimia or rape. And itâ₠¬â„¢s rare to find novels in school libraries about teens who proclaim salvation through Jesus Christ† (Harvey). Reading material that encourages such horrendous acts as drunk driving and rape should be the focus of the countries problems, rather then a child’s fantasy series that only encou... ...children to communicate with furniture.’ And we all know where that can lead, don’t we† (Blume)? Works Cited Blume, Judy. â€Å"Is Harry Potter Evil?† The New York Times. 22 Oct. 1999. 17 Nov. 2000 http://www.lexis-nexis.com/universe. Cain, Michael Scott. â€Å"Crazies At The Gate.† Portals Reading, Writing, and Critical Thinking. Eds. Mary T. Segall and William R. Brown. Fort Worth, Texas: Harcourt Brace College Publishers, 1999. 599-608. Harvey, Linda. â€Å"Protect our Kids.† USA Today. 6 Sept. 2000. 17 Nov. 2000 http://www.lexis-nexis.com/universe. Plato. â€Å"On Censorship of Literature for School Use.† Portals Reading, Writing and Critical Thinking. Eds. Mary T. Segall and William R. Brown. Fort Worth, Texas: Harcourt Brace College Publishers, 1999. 586-589. Rowling, J.K. Harry Potter And The Sorcerer’s Stone. New York: Scholastic Inc, 1998. Schmidt, Dominic. â€Å"Choice, Not Censorship, Is the Issue Over ‘Harry Potter’ in School.† Los Angeles Times. 7 Nov. 1999. 17 Nov. 2000 http://www.lexis-nexis.com/universe. â€Å"Harry Potter faces biggest foe yet in book censors.† USA Today. 6 Sept. 2000. 17 Nov. 2000 http://www.lexis-nexis.com/universe.

Teachers Meeting The Challenges of Student Disabilities Essay -- Educa

In this chapter, we discussed the numerous challenges that teachers face while teaching students with different disabilities. It was found that barring a few teachers who had knowledge of the exact needs of these students, majority of the teachers deployed methods that they felt would assist learning for them. Modifications in teaching methods were undertaken based on the nature of the students’ disability and the demands of subject taught. In case of some government colleges, parents were reportedly assisting in the laboratory due the absence of support staff. In the case of students with visual impairments and/or learning disabilities, repetition was found to be the most favoured method to explain everything, from diagrams in economics to sociological concepts. However, implementation of this method was time-consuming. While, in general, students with disabilities were encouraged to seek help from the teachers beyond the class timing, it was observed that students with learning disabilities rarely did so, possibly due to the social stigma attached to their disability. With regard to teaching students with learning disabilities, it was found that a majority of teachers did not take any particular efforts towards addressing the needs of these students may be because their disabilities were hidden or invisible in nature. Contrast to the lack of information on how to cater to students with learning disabilities, a majority of the teachers were able to adjudge some measures as facilitating learning among students with visual impairments such as encourage students to sit in the front row, read aloud any text that was presented in visual format or making the study material available in soft copy. The onus, however, was on the stude... ...7–24. Reddy, Raghava C. 2011. ‘From Impairment to Disability and Beyond: Critical Explorations in Disability Studies’, Sociological Bulletin, 60 (2): 287–306. Sharma, Umesh, Dennis Moore and Sanjeev Sonawane. 2009. ‘Attitudes and Concerns of Pre-service Teachers regarding Inclusion of Students with Disabilities into Regular Schools in Pune, India’, Asia-Pacific Journal of Teacher Education, 37 (3): 319–31. Singal, Nidhi. 2005. ‘Mapping the Field of Inclusive Education: A Review of the Indian Literature’, International Journal of Inclusive Education, 9 (4): 331–50. ––––. 2006. ‘Inclusive Education in India: International concept, national interpretation’, International Journal of Disability, Development and Education, 53 (3): 351–69. ––––. 2010. ‘Doing Disability Research in a Southern Context: Challenges and Possibilities’, Disability & Society, 25 (4): 415–26.

Friday, July 19, 2019

When Pigs Heads Talk :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"What are you doing out here all alone? Aren’t you afraid of me?† asks a pig’s head on a stick, covered in flies. But it’s more that, it’s an entity, which is hidden within the depths of the book, concealed for the reader to discover. The book Lord of the Flies by William Golding contains symbolism all throughout the text, each symbol to be interpreted in its own way.   Ã‚  Ã‚  Ã‚  Ã‚  The main symbol in Lord of the Flies is quite obviously, the Lord of the Flies, which as aforementioned, is a pig’s head on a stick, covered in flies. The symbol represents the evil within the boys that reside on the island. Each one corrupt in his own, fearing what resides within them. Jack with his â€Å"macho† attitude, while he is a leader, has actually took part in killing someone, but then again, so has every boy there. This evil could also be interpreted as a loss of innocence, in which the boys spiral from helpless little tykes to voracious savages, living only to kill.   Ã‚  Ã‚  Ã‚  Ã‚  Another symbol, is just the flies residing upon the sow’s head. They seem to represent people that cling to evil, as though it would their only chance of survival. An example of that would be a cannibal, whose own desires have led him to feast upon flesh, and then, even when he knows that what he has done is wrong, he continues to do it until his disgusting gorging has ended with his capture and punishment. Oddly enough, the flies are feeding on rotting flesh as well.   Ã‚  Ã‚  Ã‚  Ã‚  Simon, the boy murdered by his peers, can be viewed as a Christ figure. While some may say it is Ralph, Simon seems more like a savior. He comes down from the mountain, bearing news of the boys salvation from the beast that torments him and he is persecuted by them, each one taking part in the frenzy of his death. He also seems to be knowledgeable about things the boys can’t comprehend. He is always off in his own little world, pondering something that most boys wouldn’t even consider thinking about.   Ã‚  Ã‚  Ã‚  Ã‚  Yet another symbol in Lord of the Flies would the conch, which Ralph clings to so dearly. All of the boys see that as the upholding of order, until Jack claims it not so. With the shattering of the conch, Ralph seems to plummet into a slight depression, wherein he has nothing to remind of the upright and strict ways of his home. Without it he is nearly lost in a sea of his thoughts, buses as an example.

Thursday, July 18, 2019

How Have Cell Phones Changed Our Society Research Paper

– 1 – Alexia Corbett 3-12-2009 CELLULAR PHONES INFLUENCE(s) AND IMPACT(s) ON SOCIAL INTERACTIONS AND INTERPERSONAL RELATIONSHIPS This paper seeks to explore how cellular phones (cell phones/mobiles) have influenced and impacted social interactions and interpersonal relationships. There have been a number of suggested theories and studies that have been contributed to the rising popularity and commonality of cell phones as to how they are affecting the way individuals are interacting in society.Some of these include, a change in the concept of time and space (Fortunati, 2002), lack of face-to-face interaction (Thompson and Cupples, 2008), the maintenance of relationships, social absences, and social dependency (Reid and Reid, 2004). In addition to these ideas, it has also been suggested that the use of cell phones has had a negative affect on social relationships, grammar, and increased social anxiety (Tully, 2003). BACKGROUND Technologies are an ever-changing aspect of this day and age. New gadgets and ideas are always trying to simplify life and bring people closer together.The cellular phone was first developed in Sweden in 1956, but had no conveniences about it, nor did the average person have access to it. It weighed 90 pounds, and was as inconvenient as having a landline with a 10-foot long cord. Following several trials and developments, in 1978 Bell Labs, working with Motorola created the first generation of a cellular network (Fortunati, 2002). Although this first generation network was not approved by the FCC until 1982, it brought into focus the ability to create a – 2 – form of communication that would allow anyone to make a phone call when it was convenient for them.Following improvements within the second and third generations of cell phone networks and accessibility, cell phones went from becoming an item of luxury for those who could afford it, to an everyday necessity. For anyone operating in the modern world, in addi tion to being able to make phone calls on a cellular phone, in 2000 SMS (Short Message Service) was introduced to allow individuals to send a message to someone else’s mobile device without the necessity of making a phone call. Today, the global cellular phone market now stands at approximately 1. billion subscribers, and is forecasted to reach 3 billion by the end of 2010 (Reid and Reid, 2007). In contrast with instances in the past, having a cell phone of your own is more of the social norm vs. not having a cell phone of your own. Cell phones are taking over on a global level not just a local level, which allows individuals to have the sense of security that wherever they go, they will be able to remain in social contact with those whom are in their social networks. Communication and the way that individuals interact with each other is a huge dynamic of sociology.The cell phone is changing the way in which all of this interaction occurs, which makes it sociologically releva nt. With the creation and accessibility of cell phones, more and more individuals own their own cell phone, and using them everyday to communicate within their social network. Cell phones also make individuals available anywhere, and anytime, which changes the way that individuals are choosing to interact in social settings with other individuals. In this paper I will show how the cell phone has had an impact on social relationships and social interactions in today’s society.I will first show how the concept of having a cellular phone has changed the concept of social space and time among social relationships and interactions. Second, I will show how individuals have shown to have some form of a dependency to the use – 3 – and possession of a cellular phone. Following that, I will provide research that demonstrates how SMS (Short Message Service) has taken on its own form of communication in relationships, and has become more predominate in comparison to voice c alls.Lastly I will provide an overall conclusion of the impact that the use of cellular phones has had in regards to social interactions and interpersonal relationships. The Change of Space and Time/Proximal Relationships Since the 18 th century, the idea of using the telephone has always been a fixed mentality in regards to accessibility. The phone was located at a fixed location, usually in a home or office, and you would have to be in that location where the phone was in order to be able to receive and answer incoming phone calls.This bore the concept of â€Å"sitting and waiting by the phone† for someone to call, since at one time it was the only option. With the development of technologies, there have been ways to alter this mentality; there was the creation of the answering machine, which allowed for you to access messages from missed phone calls when you returned home, which did not always allow for a prompt relay of a message nor reply, and more recently the creation and distribution of the cellular phone. Cellular phones have taken this concept and spun it around on itself.With the development of cellular phones, individuals are able to remain in close and instantaneous contact with members of their social network regardless of where they are in the world. In addition to keeping up with social relationships, individuals have also been able to increase productivity with their work because they can be hundreds of miles away from the office, and still have instant access to their e-mail, documents and contacts wherever they are (Tully, 2003). There is no longer a disconnection. – 4 –The concept of being accessible anywhere and anytime has shown to have both positives and negative results in a social setting; older generations for example have typically been scornful of younger generations pulling out their cell phones in restaurants, classrooms, public transportation and other public spaces (Banjor, Hun and Sundar 2007). Cell phone u sage in a public place typically generates a negative response when used in close approximation to other individuals, as it is seen as a disturbance to their personal space, with little or no consideration from the cell phone user.Social interaction signifies that we are aware of the existence of others, as well as implies active engagement between two or more parties (Banjor, Hun & Sundar 2007). Cell phones have allowed individuals to surpass time and space and have any conversation that they choose, wherever they choose. With public conversation comes public invasion, meaning that you are invading into other’s personal spaces by talking out loud about your own personal spaces coming off as inconsiderate and/or rude which links to alienation of oneself.A trend that is becoming more apparent is present absences; this is the concept of how an individual’s presence in a social setting changes regardless of their physical presence, they are only half-present (Fortunati 20 08). After a ring or buzz of their mobile phone, they are drawn away somewhere else, away from their present situation and/or conversation. Through observation, researchers have found that individuals typically will not hesitate to interrupt an ongoing conversation to answer the ringing of their cell phone.This has several repercussions. In answering the ringing cell phone, the individual who is presently being conversed with, has described feeling a sense of being left alone, which can cause social anxiety, as well as resentment/annoyance towards the individual who answered the phone call (Humphreys 2009). The change of space and time through the use and accessibility of cellular phones has changed the way in which people communicate with other individuals.With the ease of being – 5 – accessible anywhere at anytime, individuals are finding that they are becoming dependent on their cell phone on a day-to-day basis. Cell phones are allowing individuals to stay in a cons tant connection with anyone and everyone in their social network. In the next section I will explain how this dependency is being seen, created and acted upon by individuals. Cell Phone Dependency As mentioned above, cell phones are becoming increasingly popular among the general population. Due to their increasing popularity, more and more people are obtaining them for themselves.In having a cell phone, individuals are becoming reliant on them from day-to-day to stay in contact with other individuals in their social networks, as described throughout this section. Cell phones are not a new concept for all generations. There are individuals who have gown up in the cell phone age, and do not think anything of it. Today, 45% of adolescents aged 12-17 possess a cellular phone in the United States (Leung 2008), making it one of, if not the, most popular way to communicate with other individuals. While cell phones have become less of a tatus symbol and more of a fashion statement, they ha ve also created an unspoken social dependency. Leisure boredom, which is a category of dependency to cell phones described as an individual who is found to become bored with their current situation, has proven to lead to cell phone dependency (Leung, 2008). For adolescents and young adults, as leisure boredom arose, they were more likely to be found engaging in SMS messages, making phone calls, accessing the internet from their phone or playing a mobile driven game.Once there is an element of boredom his or her attention is drawn immediately to his or her cell phone device for an instant connection – 6 – to someone, somewhere. Through a series of surveys it was shown that the higher rate of leisurely boredom, the more frequent use of a cell phone occurred (Leung 2008). Sensation seeking behavior has also linked adolescents and young adults to have the desire to take risks with relationships, rules and roles (Leung 2008). Individuals seek out entertainment and avoid bor edom; as with anything there are appropriate times and inappropriate times.This concept translates over to cell phone use as well, people will use their cell phones at appropriate and inappropriate times, simply to satisfy a social urge/want/need. This category was supported significantly by relationships between individuals who were cell phone addicted via sensation seeking, demonstrating that the cell phone was used more for entertainment, information and social connectivity (Leung 2008). For example, an individual using their cell phone on the side of the road when they break down vs. using their cell phone to just say ‘Hi’ to someone, or chitchat with another person.Self esteem, a third dependency category examined the standardized idea that individuals with low self esteem typically do not communicate as much with others, and are more prone to expect a negative response from those whom they do contact. However, it is thought that individuals who have low self estee m will actually use their cell phone more to try and establish social networks, and build relationships without having all of the pressures of a face-to-face encounter with an individual, as well as to try and reach out to other individuals (Reid and Reid 2007). Research shows that individuals ho have low self-esteem seek out more frequent use of the cell phone to seek to establish new relationships and try and gain an element of control in their social relationships. This makes it easier for individuals with lower self-esteem to form and maintain social relationships. Along with the factors listed above, many individuals have stated that they cannot imagine not having their cell phone with them on a daily basis. The integration of cell phones – 7 – into our daily lives is exaggerated in how younger generations talk about not being able to imagine themselves without their phones now (Thompson & Cupples 2008).Their imaginaries include cell phones; their senses of self a re tied up with this technology as is evident in the following quotations: I just can’t imagine myself without a cell phone now. . . when I don’t have my phone I always feel like I’m missing something . . . (Samantha, 14) My phone’s always in my skirt pocket at school so it’s just always there. And if I, like, leave it in my locker by accident, or it’s in my bag, I panic ’cos I don’t know where I’ve put it ’cos I’m used to having it in my pocket . . . it’s just a permanent part of you. Michelle, 15, emphasis added) Individuals are forming an attachment to their cell phones, which enables them to think that they cannot function without their cell phone on a day-to-day basis. There are many factors that lead to cell phone dependency, such as leisure boredom, sensation-seeking behavior and low self esteem as described above. Another aspect of the cellular world that contributes to dependency and changes the way in which we socially interact on a daily basis is SMS Text Messaging. SMS Text Messaging as a Social InteractionShort Message Service (SMS/Text Message) was first developed in 1990 in an effort to allow operators to notify customers when there was some type of a service issue or a network problem. This service has now become one of the most common ways in which individuals use their cell phones to communicate with others. In 2002 80% of all cell phone users in the United States were ‘Talkers’, however by 2006 that number was almost reduced by half, dropping to only 42%, with the other 58% being ‘Texters’ (Fernando 2007).Many researchers have expressed concern that the increased use of SMS messaging will cause face-to-face interaction to become non-existent, as well as poor grammar by frequent – 8 – users. Research has shown however, that text messaging between individuals can actually create stronger ties between individuals as well a s act as a buffer to face-to-face interactions with a new individual. Communicating through a text message allows individuals to not only take their time composing a more thought out reply, but it also alleviates the pressures that accompany a first encounter/face-to-face meeting.With the popularity of SMS messaging, individuals are using it more and more, and in an effort to send more text messages, a new language is being created that is making experts worried that grammar will overlooked. Individuals who are regular texters have created new acronyms for various words to get their point/idea across faster than if they were to type out the entire message. For example; LOL is the same as saying Laughing Out Loud, OMG is equivalent to Oh My God, and finally TTYL, which refers to Talk To You Later.SMS/Text messaging has become more popular among younger generations in comparison with older generations. Sending and receiving text messages is a form of communication with others that can be secretive and discrete; parents/teachers cannot intercept or have access to what is being sent back and forth. In 2001 Nokia conducted a worldwide survey of 3,300 people, under age 45, over 80% of those that were surveyed reported that text messaging was the most used function on their mobile phones (Reid and Reid 2004).With its popularity growing at an exponential rate, text/SMS messaging has also become a new way for individuals to form new relationships, and strengthen existing ones. Teens admitted spending nearly an equal amount of time talking as they do texting each month. The feature is so important to them that if texting was no longer an option, 47 percent of teens say their social life would end or be worsened – especially among females (54 percent compared to 40 percent of males) (CTIA Survey 2008).In addition, individuals claim to see text messaging as a comfortable, easy and effective means of communication for younger people (Thompson and – 9 – Couples 2008). Without the pressures that come along with a voice or face-to-face conversation, text messaging allows individuals the time to spend composing their thoughts and making edits to their responses before sending them to others. Composing thoughtful responses to text messages also allows for an element of privacy at any given time and /or place for individuals to communicate, thus relating back to the change in concept of Space & Time.Messaging back and forth allows for an often unseen and unheard communication between individuals, as well as fewer limitations to where and when they can communicate, and text messaging has served more for ‘filler’ communication, and less for functional/practical communication between individuals. Filler messages relate to messages regarding, friendship maintenance, romantic, social functions, and/or boredom and loneliness.A study on a group of undergraduates showed that only about one third of the text messages that were bein g sent were actually functional/practical information; the rest was a combination of filler messages (Reid & Reid 2004). Social interactions via text message seem to serve as more of an instant personal contact with someone else, without having to worry about your personal appearance and actual interaction. Sending and receiving text messages is a new concept for most generations, and changes the way in which individuals are required to interact.By communicating through text message, individuals are not required to interact with others socially in a face-to-face manner, they can do it all via messaging. While this is a convenient way and discrete way to communicate with another person, it has changed the way that individuals are reacting with others not only in a social setting, but also in how they are maintaining their existing relationships, and building new relationships. – 10 – CONCLUSION Our society today is one that is based on technology, and technological adva nces.Technology as a whole will always have an effect on the way that individuals function in society, and while there has not been a lot of research on the effects of cellular phone use, it has both positive and negative consequences. Cell phones in their small time in existence have changed the way in which individuals are interacting with each other. Cell phones have provided avenues for individuals to stay connected on a new level that does not depend on space or time, but is readily accessible at any time, anywhere.Never being disconnected has allowed social networks and relationships to be strengthened as well as new relationships formed. Cell phones have also allowed individuals all over the world whom, without the cell phone would never have access to all of the networks, assets and information that they do via the mobile phone. While it has provided a new avenue to social networking and interactions, the change in the space and time concept has also had a negative affect as well.Many of us have likely experienced a situation where we have been in the presence of a cell phone user who is engaging in some form of rude behavior that lacks respect for the individuals around them. Cell phones have changed the way that individuals socially interact. Individuals are communicating more via text messages and cell phones than they are face-to-face, changing our social environment. Individuals have become enveloped in their cell phones and less aware of their social surroundings, missing out on possible new social interactions.There is still a lot of future research still needs to be done on the long-term affects of the mobile phone and social relationships. Something that should be looked at is how the mobile phone effects relationships over time, as well as what the long term health effects are, and how the access and use of cell phones varies through different socioeconomic classes. However, you – 11 – can see how in its short history, cell phon es have already had a huge impact on the way individuals interact with one another. – 12 – References â€Å"Teens Who Text. â€Å"2008.Communications of the ACM 51(11):19-19 (http://search. ebscohost. com/login. aspx? direct=true&db=aph&AN=35211892&site=ehostlive). â€Å"New Information Technologies and the Fate of Rationality in Contemporary Culture. â€Å"2006. Russian Social Science Review 47(6):65-85. Agosto, Denise E. and Sandra Hughes-Hassell. 2005. â€Å"People, places, and questions: An investigation of the everyday life information-seeking behaviors of urban young adults. † Library & Information Science Research (07408188) 27(2):141-163. Atkin, Charles K. 1972. â€Å"Anticipated Communication and Mass Media Information-Seeking. The Public Opinion Quarterly 36(2):188-199. Boase, Jeffery. 2008. â€Å"Personal Networks and the Personal Communication System. † Information, Communication & Society 11(4):490-508. Fernando, Angelo. 2007. â€Å"If you text it, they may come. † Communication World 24(4):11-12 (http://search. ebscohost. com/login. aspx? direct=true&db=ufh&AN=25547883&site=ehostlive). Fortunati, Leopoldina. 2002. â€Å"The Mobile Phone: Towards New Categories and Social Relations. † Information, Communication & Society 5(4):513. – 13 – Hu, Yifeng, S. S. Sundar and Omotayo Banjo. 006. â€Å"Cell Phone Usage and Social Interaction with Proximate Others: Ringing in a Theoretical Model. † Conference Papers — International Communication Association:1-30. Humphreys, Lee. 2005. â€Å"Cellphones in public: social interactions in a wireless era. † New Media & Society 7(6):810-833. Igarashi, Tasuku, Tadahiro Motoyoshi, Jiro Takai and Toshikazu Yoshida. 2008. â€Å"No Mobile, No Life: Self-Perception and Text-Message Dependency among Japanese High School Students. † Computers in Human Behavior 24(5):2311-2324. Katz, James E. 2007. Mobile Media and Communication: Some I mportant Questions. † Communication Monographs 74(3):389-394 (http://search. ebscohost. com/login. aspx? direct=true&db=aph&AN=26386708&site=ehostlive). Leung, Louis. 2008. â€Å"Leisure boredom, sensation seeking, self esteem, and addiction: Symptoms and patterns of cell phone use. † Pp 359-381 in Mediated Personal Communication. Edited by S. B. Barnes, E. A. Konijn, M. Tanis, and S. Utz. New York, NY: RoutledgeMcfedries, Paul. 2002. â€Å"All Thumbs. † IEEE Spectrum 39(10):68 (http://search. ebscohost. com/login. aspx? direct=true&db=aph&AN=8930492