Wednesday, October 30, 2019

This assignment invites you to explore some of the theoretical

This invites you to explore some of the theoretical underpinning of SFG, as presented in the literature - Assignment Example 15). Micro issues are grammar and punctuation-related in essay writing. Syntax is the procedural term used to define sentence structure. Bad syntax is brought about by badly ordered sentences with no apparent and concise meanings. Inappropriate use of tenses is another micro issue that can be avoided with the introduction and discussion of other people’s judgment using present tense, and using consistency within the sentences. Prepositions are other grammatical features that are frequently misused (Barton, 1999, p. 41). Describing the position and movement, prepositions the state used in the sentence should always be double-checked because they always seem correctly used, even when they are not. Colons, semi-colons, apostrophes and speech marks are marks that can be evaded to keep of unnecessary grammatical errors (Forster, 1981, p. 27). Issues in essay writing feature grammatical, punctuation and syntax aspects that often require double-checking after writing. Advice, guidance, and interactive sources from the reference list can be used to guide the writer on aspects of the topic of the essay (Forster, Mohan & Hector, 2003, p. 13). Developed as one entity, everything developed within an essay should be authored with originality to avoid plagiarism. Grammatical and syntax issues are a vital part of the essay and should be consistently observed by the writer when proofreading the written work (Barton, 1999, p. 46). The four are phonetics, words, sentences and text (Kinoshita and Lupker, 2003, p. 3). The phonetic is the spoken sense of the language and words are a combination of letters to make a meaning as a group sentences are grouped words that give meaning as a group. The texts are a combination of sentences that make meaning. With language we are able to communicate what is going on in our minds in order to understand ourselves and the other persons better (Kinoshita and

Monday, October 28, 2019

All the Worlds a Stage by William Shakespeare Essay Example for Free

All the Worlds a Stage by William Shakespeare Essay â€Å"All The World’s a Stage† by William Shakespeare is a short poem comparing our lives and the many stages we have to a theatrical play and the many rolls an actor plays in them. William Shakespeare identifies the seven stages a person goes through in life. Infancy, the stage where he is a baby introduced to the world, crying and puking in the nurse’s arms. Childhood, this is the stage where he is growing up and starting school with no enthusiasm. The lover, this is the stage where he has a mistress and falls in love with her, while he tries to sing her a song he can’t look into her eyes because he’s so shy. The soldier is when he tries to keep his reputation thinking less of himself and more of others, and always being ready to fight. The justice stage is where he has gained wisdom and prosperity by the many experiences he had in life. The old age stage is when he begins to lose his charm physically and mentally, he also loses his firmness and personality. Finally, physical and mental lose and death, he begins to become dependent on others like a child and needs constant help from others to perform any tasks; he slowly loses his teeth, eyesight, and taste, until he finally dies. In this paper I will analyze the way William Shakespeare compares a person’s life and its many stages to a theatrical stage and the many rolls and actor performs, his tone, how he uses explicit details, imagery, repetition, consonance, and any other figurative language he uses in this poem. Tone The tone in this poem in my opinion is that William Shakespeare feels as if everyone ends up the way people do just because we all go through life as if we were actors on a stage reading a script knowing every step to take till the very end. He is accepting of death, he knows that everyone goes through every single stage of life assuming they know what do to do next, but no one really does. I came to this conclusion because Shakespeare shows no type of anger or excitement throughout the poem. He is neutral; he is neither afraid of death nor excited about it. He feels as if everyone has a purpose in life and to find that purpose you have to go through every stage. It doesn’t matter how confident you are, how hard you try, or how fast you get through each stage, everyone will always end the same way, dying. Shakespeare knows you cannot skip this part of life no matter who you are. One can only enjoy the time you have and wait for your time to come. He understands no one’s life is fully complete until you go through your final stage of life and die. Imagery William Shakespeare uses a lot of very strong visual imagery though out his poem. In line 7-9 one can visualize a little boy in the morning, tired and very slowly dragging himself to school with his satchel, when he says â€Å"the whining schoolboy, with his satchel and shining morning face, creeping like a snail unwillingly to school. † Another sense of strong imagery is in line 5-6, when he says â€Å"at first, the infant, mewling and puking in the nurse’s arms. † In this line one can easily picture a nurse holding a baby who just came into this world for the first time, whining, squirming, and puking in her arms. In line 9-11 William Shakespeare says â€Å"the lover sighing like furnace, with a woeful ballad made to his mistress’ eyebrow. † Here he explains that the lover wrote his mistress a song like poem to express his love to her, but his too shy to look her in the eyes while he sings to her. William Shakespeare uses the entire poem â€Å"All the World’s a Stage† as a metaphor to compare the stages of life to a theatrical stage. He explains how the rolls we play throughout our lives are like the rolls an actor plays on stage. He makes sure to say that no one is ever the same person their entire life, just as an actor doesn’t stay the same throughout a play. William Shakespeare uses strong imagery and metaphor in the poem for us to picture images every stage and how we change all throughout them as we read. Sound Sound is a very big part of this poem, because he uses a specific structure, some rhyme and repetition. The structure of this poem is very important because each stage is in order. He goes from infant, to schoolboy, to lover, to soldier, to justice, to old age, and finally death. For one’s life to start you must be born into this world as an infant; then you slowly grow into a schoolboy, become a lover and then a soldier trying to keep your reputation. You gain wisdom and justice and then you grow into old age where you lose your appearance physically and mentally. Lastly you become dependent on others and eventually your life is over. This poem also has some rhyme in it but not much. You will not find rhyme in the same line. In line 7 he uses the word â€Å"whining† and in line 8 he uses the word â€Å"shining† to describe the schoolboy, which both words rhyme with each other. He doesn’t feel the need to have to rhyme so much in this poem for one to fully understand the metaphor he is conveying. He also uses repetition in the last line of the poem. As he says â€Å"sans teeth, sans eyes, sans taste, sans everything† he repeats â€Å"sans† to let you know he has lost his teeth, eyes, taste, everything as he dies. Theme The theme to â€Å"All the World’s a Stage† in my opinion is live life to the fullest with no regrets. Everyone should have their own life, and do their own thing. No one should have the same routine every single day, that’s boring. Be spontaneous, do things you’d never imagine doing. You’d be surprised at the many things one can do in this world at any age; we just have to be willing to leave our comfort zone and let loose. One should not let another person take over their life for any reason. We should have control of it, and be able to do what we want when we want, and not have to ask for permission. Not everyone goes through each stage of life at the same time, it shouldn’t matter how old one is. One should always have time to laugh and have a good time at any time no matter what. In this poem it is very clear that William Shakespeare wants you to understand how one goes through life. One usually goes through life making choices behind choices, living off your decisions and its consequences. We each have our own routine we follow day by day, even if we don’t always notice it. It’s as if were a character in a play and we follow a script we memorize every day, until something unexpected happens and our role changes. We have to accommodate the new situation into our schedule and try to make it work. We also have time to squeeze in some fun and live. We tend to surprise ourselves from time to time to shake up our lives a little. If you go through your whole life thinking â€Å"what if† isn’t healthy, you need to take a risk and throw yourself out there. Have fun and live your life while you still have it.

Saturday, October 26, 2019

Ellis Island :: essays research papers

ELLIS ISLAND Ellis Island has a long history, was needed, and was the "Gateway to America" from 1892 until it closed in 1954, when it began its slow decay. The island was called Gull Island by the Indians and Oyster Island by the Dutch. Later the English erected a gibbet or gallows on the island for hanging criminals and so the island became known as Gibbet Island. The Indians sold it to the Dutch East India Company for trinkets. The company later sold it to Mynheer Paauw who also bought land along the New Jersey coastline. Samuel Ellis, a colonial merchant bought the island and it became at last Ellis Island. After the Revolution, the island was sold to New York State and in 1811, Fort Gibson was built on it in preparation for the War of 1812. No fighting took place at Fort Gibson it was mainly a munitions storage fort. When immigrants began, pouring into New York City, New York State processed them at an old fort known as Castle Clinton on the Battery at the tip of Manhattan. When that facility became too small for the large number of immigrants arriving in the country, they chose Ellis Island as the new immigration center. After erecting new wooden buildings, it opened in 1892 but those buildings burned in 1897. New buildings were erected in 1900 and it reopened. Eventually the control of immigration was turned over to the Federal government. Ellis Island was the principal federal immigration station the â€Å"Gateway to America† in the United States from 1892 to 1954. More than 12 million immigrants were processed here. Over time, the immigration station spread over 3 connected islands with numerous structures including a hospital and contagious disease wards. It is estimated that over 40 percent of all citizens can trace their ancestry to those who came through Ellis Island. In its early years, when the greatest number of immigrants entered the country, Ellis Island mirrored the nation's generous attitude and open door policy. After passage of immigration laws in the 1920s, it was used more for "assembly, detainment, and deporting aliens," and symbolized a closing door. Immigrants were required to pass a series of medical and legal inspections before they could enter America.

Thursday, October 24, 2019

Womens’ Liberation Movement Notes

The Women's Liberation Movement AKA: Women's Lib Feminist Movement or Women's Rights Movement â€Å"Feminism is the radical notion that women are human beings† -women fighting male power structure Women, you may be feminist if you: -had lots of choices after high school -had the option of college/grad school -have a career/job and family -plan to be a doctor, lawyer, engineer (professional) -support fair work salary for any work -workplace is free of sexual discrimination -participate in women's sports -go to a woman doctor -vote in any political race -run for any political office intend to use daycare -can get a divorce (custody) -â€Å"You have the choose of wearing jeans and tennis shoes instead of a girdle and heels† â€Å"man is not the enemy here but the fellow victim† -Betty Friedan -If civil rights are denied by somebody, it affects everybody Men, you may be feminist if you: -are in college or have had other opportunities because of mom's good job to cont ribute to income -mom had support services to help raise you/siblings -have a content, stay at home mom -have ever been asked out by a girl (or paid) Understand and Appreciate Art -How is it put together? What do I personally bring? -Where did it come from? (Context) The First Wave of Feminism 1848-1920 -Women's Rights Convention *Seneca Falls, NY: July 19-20, 1848 -19th Amendment *ratified June 26, 1920 *voting day: November 2, 1920 Second Wave of Feminism 1960s-70s State of Women's Rights in 1848 by Custom and/or Law -Economic *could not buy/sell property *could not enter into contracts without husband's consent *actually seen as property -Social *no recourse to spousal abuse *no divorce without husband's consent *few custody rights over kids *could not go out in public alone Educational *denied any education *denied education in math, language *most could not go to college *could not enter the professions (law, engineering) *some women attended â€Å"female seminars† or â €Å"academies† to become teachers; once they were married, however, they were fired -Political *could not serve on a jury *could not testify in a case (too emotional, not trustworthy) *could not vote (not smart, too delicate, â€Å"vote like husband†) Lizzy Borden: acquitted by a jury of 12 men: â€Å"not guilty† of killing her two parents â€Å"Lizzie Borden took an axe And gave her mother forty whacks.When she saw what she had done She gave her father forty-one. † The Birth of the Women's Movement -Elizabeth Cady Stanton and Lucretia Mott attended the World Anti-Slavery Convention with their husbands in London; they were denied seats because they were women -The women reunited at a tea party at the McKlintock House in July 1848 (Seneca Falls, NY) and decided on a convention -Stanton mostly wrote the â€Å"The Declaration of Rights and Sentiments† *†We hold these truths to be self-evident: that all men and women are created equal† List of Grievances -never exercised the right to vote he made her morally, an irresponsible being -in the eye of the law, married women were â€Å"dead† -denied right to education -denied divorce rights -demeaned to second-class citizens Women's Rights Convention, July 19-20, 1848 -300 men and women gathered at the Wesleyan Methodist Church, Seneca Falls, NY -Ratification of their Declaration -Fight over the 11th amendment (suffrage) -Frederick Douglass (great orator, ex-slave, equivalent to Malcolm X) fought for women's rights at the convention: compared value of women as lesser than animals in society Video Clip Notes: Not for Ourselves Alone- Seneca Falls narrations from female historians reflecting -procession of women to Seneca Falls -July 19, only women attended; July 20, open to all (over 300 men and women) -Lucretia's husband was asked to lead (the women were nervous because they never spoke in public) -men decried women of their rights -68 men and women signed their Decl aration -11 new conditions, only 10 were passed; still no right to vote -â€Å"The right to vote is ours. Have it we must, use it we will† -Stanton -â€Å"Without the vote, women would be unable to change the laws that hurt them† -Douglass The Suffrage Movement Susan B. Anthony (died 1906) *Last public words: â€Å"Failure is impossible† *One of four women and 2 modern women to be on money -Carrie Chapman Catt -Alice Paul â€Å"Iron Jawed Angels† (film) -women jailed for fighting for suffrage The End of the First Wave -Ratification of the 19th Amendment, June 29, 1920 Sufragette: women (1920s) who fought for women's rights Video Clip Notes -Interview with Ruth Dyk (98 yrs. old): mom was a suffragette -Interview with Ethel Hall (100 yrs. old) -more than 8 million women voted -14 years for women to vote since Declaration Stanton and Anthony did not get to vote because they died One Step Forward, Two Steps Back -Some improvement -loss of â€Å"steam† -Great Depression (â€Å"Migrant Mother† iconic Great Depression photo taken by Dorothy Lange, 1936) â€Å"We Can Do It! † World War II : The 1940s -women take over â€Å"masculine jobs† to help win the war -â€Å"if you've used an electric mixer in your kitchen, you can learn to run a drill press† -â€Å"Rosie the Riveter† represented a lot of women; iconic poster by J. Howard Miller -6 million women became Rosie's -â€Å"Rosie the Riveter† by the Four Vagabonds (song) Marilyn Monroe (Norma Jane Baker) was a Rosie working with planes, when a photographer saw her and took army photos -Fannie Lou Hamer: sharecropper who became a significant voting rights and civil rights activist Rush to the Altar mid-late 1940s -soldiers come home, women go home, men take back the jobs Marriage rate: 1948- 16. 4%; 2008- 7. 1% Traditional Housewives (Suburbs) 1950s -normalcy after the war -traditional families/sex roles -PhT (Putting Husband Through) and Mrs. degrees (women going to college to find a husband) -the ideal of the housewife â€Å"the feminine mystique† Video Clip Notes: â€Å"Why Study Home Economics† (University of Kansas) -â€Å"I'm going to need to know† -â€Å".. homemaker the rest of my life† -we're going to get married, no choice -Counselor: â€Å"Home Ec training teaches you how to be a better homemaker† Ultimate Goal: Marriage and Family -regardless of education -TV Show â€Å"Leave it to Beaver† portrayed traditional family roles -TV was new in the 50s: what messages were TV shows sending to men and women? -â€Å"Drop the Mop† song (â€Å"Equal jobs and educational opportunities†) The Winds of Discontent (late 50s, early 60s) legal job discrimination -1/3 women working outside of home (low paying jobs, laid off first, â€Å"glass ceiling†) -After WWII, new technology -Airline jobs- as soon as a stewardess got married, she was fired; wasn't the same for pilots (only could be male) -teaching was considered the â€Å"best job† (others were secretaries, but no professions) -Lorena Weeks: Used 1964 legislation to fight the legal discrimination at work *operated switchboards under bad hours and low pay Dissatisfied Housewives -Betty Friedan â€Å"voice of dissatisfied housewives† -Wrote â€Å"The Feminine Mystique† (1953)Video Clip Notes -K. Foley: working wife/mother *frozen opportunities and lack of jobs -Dust Roady: earned college degree in 1950, wanted to be a pilot, denied position and only offered to be a stewardess Video Clip Notes: Eastern Airlines commercial -discriminatory and demeaning towards female (stewardesses) -they were fired at age 32, versus male pilots being fired at age 60 -Friedan challenged the identity of women in her book; â€Å".. cannot find herself in a house† -not all women bought her message, however -Jacqui Ceball â€Å"it wasn't us, it was society†The President's Commiss ion on the Status of Women 1961 -JFK's presidency: women were paid $0. 59 for every $1 men were paid -2008: women were paid $0. 77 for every $1 men were paid -low, unequal pay -poor job opportunities -quotas in professional schools (only a certain number of women) -lack of social services -TV show â€Å"All in the Family† – wage disparity (Archie was the husband) -60s: some nuns got rid of their habits (changes in the church) â€Å"The personal is political† -social restrictions *†men only† and â€Å"women only† public places women were isolated in their own homes- they couldn't meet up and talk -this issue lead to â€Å"Consciousness Raising Groups,† where women could talk about anything in privacy without men or children -battered women's shelters -contraceptive rights, including abortion (Roe V. Wade) -rape laws -Before Second Wave Feminism, issues such as abusive relationships were â€Å"personal problems,† not â€Å"society 's problem† -However, feminists argued that society needs to be involved with solving these problems Video Clip Notes -Women try to enter men's bar â€Å"women are people,† â€Å"start all over† (black and whites, men and women)Video Clip Notes â€Å"Second-Class Citizens† -60s: in some states, women needed husband's cosign to get a credit card -70s: women would not be interrupted during consciousness raising group meetings -women's strike â€Å"don't iron while the strike is hot† The Mid 60s-70s -Civil Rights Act 1964 banned discrimination (race and gender) -National Organization for Women (NOW) 1966 *created by Betty Friedan; still one of the largest poetical organizations for women's rights today *aimed at men too (better for them) *not all feminists of 60s agreed with her (like MLK vs Malcolm X)Miss America Protest 1968 -Guerrilla theatre Video Clip Notes -March on Washington 1963 -led to critical victory for minorities and women: LBJ signs Civi l Rights Act -Lorena Weeks cited the Civil RIghts Act to fight *it took 5 years and an appeal to the Supreme Court, but she got the job she wanted -Women in white robes praying â€Å"Mother, Daughter, Holy Granddaughter† -to feminists: Miss America Pageant was epitome of â€Å"ideal woman† -female protestors threw bras, girdles, makeup, and heels in trash -Shirley Chisholm: equal pay and equal opportunities in stock market: feminismWomen's Liberation: â€Å"I Am Woman, Hear Me Roar† -Helen Reddy -Politics -Legal System -Wall Street -Media -Medicine -Arts -Sports -Pop Culure -ALL AREAS â€Å"The Feminine Mystique,† or Betty, Tina, Mrs. Robinson, and all those other housewives Betty Friedan 1921-2006 -Smith College 1942 -Wife, mother, housewife, writer, feminist leader -â€Å"The Feminist Mystique† -Worked as a journalist in 50s, but got fired when she got pregnant; she then did free-lance magazine work from home How did the Feminist Mystique get sta rted? -â€Å"McCall's† magazine â€Å"women's† magazine that catered to women's issues; asked Friedan to write a piece *Friedan interviewed women she graduated with and asked them â€Å"What has been your experience as a woman? † -The initial title of the article was to be â€Å"The Togetherness Woman† (the happy, ideal, traditional woman) -Smith College's Class of 1942 15th reunion What did McCall's expect to find? -ideal 50s women -high levels of satisfaction and happiness -LIFE Magazine, December 1956: â€Å"ideal American woman†¦white, middle-class, frivolous, spoiled, beautiful, boy crazy.. † Ideal 50s Woman -Feminine -Delicate Not intellectual -Compliant -Content -Him-focused -Family-focused -House-focused Video Clip Notes -Christian Dior set standards for fashion trends during wartime -Hourglass figure, girdles and slim shapes with big bust -â€Å"feminine, sexy† -Contestants had to peel potatoes and make a bed in Miss America Pa geant Barbie -invented in 1959 -commercial doll (doll $3, clothes $1-5) -Mattel International Video Clip Notes: Xerox commercial -first machine in 1959 -take-off on Marilyn Monroe, ditzy secetary -overall message: â€Å"So easy a woman can do it† A Housewife's Day -PTA meetings Shopping -Seeing her friends -In her kitchen What did Friedan's survey actually find? -discontent, unhappy -unexplained fatigue and physical illness -prescription drug use sky rocketed *3 years: 1. 2 million pounds of Miltown (tranquilizer) had been taken by women (mid 50s) -lack of interest in the world or hope for the future -went beyond her college peers She found that for women†¦. -College graduate rates: 60% drop out (PhT) -Marriage rates up, age down (average 20yrs and dropping in late 50s) -Skyrocketing birthrate -Labor Market: 1/3 working; nonprofessional â€Å"jobs† Politics: Congress- more in 40s than in the 50s What did Friedan conclude? -Women suffer from â€Å"the problem that has no name† *The housewife's â€Å"blight† (doctors used these terms, even) -Psychological problem: lack of identity -Trapped in a dilemma *Homemaker lifestyle that was the envy of many but not fulfilling, especially to the educated woman -McCall's denied Friedan's magazine Article (editors were men) What is the Feminine Mystique? -Post WWII ideology that a woman can and should only be fulfilled as a housewife and mother -Resistance: sickness, abnormality Intentionally pervasive throughout society -Fight back against Feminine Mystique is the Women's Lib Movement What did Friedan do? -Wrote â€Å"the Feminine Mystique† (1963) *†scream of pain† -Changed the course of history -Became a pioneer of the Second Wave -Remember: Susan B. Anthony was a pioneer of the First Wave Possible â€Å"Why? † Theories -nation's need to return to pre-war â€Å"normalcy†? -â€Å"Artificial Buoyancy† idea that in society, there are people who feel the y want to be on top, meaning some have to sink to the bottom (men vs. omen) -need for a consumer class with time and desire to shop The Freudian â€Å"Why† Theory -Sigmund Freud: Father of psychology and psychiatry -Anatomy is destiny *Women are anatomically built to be mothers -â€Å"Normal female traits are receptivity and passivity†¦a willingness to accept dependence. † -Freud is a â€Å"male chauvinist pig† -Shulamith Firestone coined this phrase Friedan's Conclusion: All the theories are true -The Feminine Mystique is pervasive in society and it is the result of an intentional conspiracy by the male-dominated society to keep things male-dominated The Stepford Wives Sci-fi book by Ira Levin: men find a way to turn their wives into robots (ideal 50s woman) -Movies: 1975- thriller; 2004- spoof (credits show many different shots to send his message) The Graduate (1967) -#7 American Film Institute: Best movie of all time -Book written by Charles Webb- gradu ated from William College then wrote it -Ann Bancroft (who inspired Professor Loughran to act very young) played â€Å"Mrs. Robinson,† an unhappy housewife -Dustin Hoffman plays â€Å"Benjamin,† a discontent college graduate; actor was originally supposed to be tall and attractive, like Robert Redford -Katharine Ross Music: Simon and Garfunkel wrote the theme song, which was originally supposed to be â€Å"Mrs. Roosevelt† -Director: Mike Nichols Video Clip Notes â€Å"the Graduate† -Scene begins after Ben's graduation party -Mrs. Robinson resorts to alcohol and music -â€Å"Mrs. Robinson you're trying to seduce me† Diary of a Mad Housewife (1970) -Comedy of manners: making fun of a certain segment of society -exploring dangers of Feminine Mystique in a humorous way -Making fun of upper, affluent lifestyles of these people Early Days of TV -1939 World Fair -Rapid expansion *Post WWII leisure *Better technology Better programming -Content *news, dram a, variety shows *live broadcast *advertising 1955: Fort Wayne, Indiana -Social Lives -Education -Business -Church TV and Politics -JFK AKA â€Å"TV President† -TV was live in the 60s *death of Lee Harvey Oswald was aired 1950s/60s TV: A Man's World â€Å"Women's lives are so dull†¦ they don't need TV shows† â€Å"women can make decisions in comedies.. † -Norman Felton, MGM Executive Producer -Madelyn Martin, writer for â€Å"Lucy† shows Television's Portrayal of Women (according to Friedan) -boring -jealous -inept -foolish -dependent -weak -silly -spoiled -materialistic â€Å"I Married Joan† (1954 Daytime TV Show) *Joan Davis (like Lucille Ball) *†Mrs. Bradley Stevens† (married to judge_ Marlo Thomas: Arts Hero -Personal Life *Born 1937 *Daughter of Danny Thomas (comedy â€Å"Danny Thomas Show†) *grew up privileged *wife/stepmother Phil Donaghue (precursor to Oprah, similar talk show) *didn't want to get married *saw mistre atment of women firsthand in acting industry *wanted to be an actress, and was concerned about making it on her own Acting -TV Series: That Girl, among others -Film -Theater Writing -Free to Be†¦You and Me (healthier children's book) *books, CDs, and TV specialsOther -Producer -Speaker -Awards: Lucy Award (outstanding women in TV), Emmy, Golden Globe, Grammy *same as Sidney Poiter: not about winning, but making a difference That Girl -September 1966 -First show about a single woman -Force behind the show *scripts *clothes -Production aspects -end of season, she had a boyfriend on the show, the producer wanted them to marry but she said â€Å"Hell no! † Making a Difference -Advocate for women's rights *The Ms. Foundation for Women -St. Jude's Children's (Cancer) Research Hospital *Her dad founded this in 1960 Janis wanted what med had- everything Don't compromise yourself. You're all you've got. † Janis Joplin: first female rockstar -wanted to be equal with men -she wanted a personal life -From Port Arthur, TX; always wrote letters and kept in touch with her family -Dated musician Country Joe McDonald -Wanted a career, broke with the band â€Å"Big Brother†and went successfully solo -Died of heroine overdose -Made it okay for a woman to create her own kind of beauty -made it possible for women to have any type of career -1995: inducted into Rock ‘n' Roll Hall of Fame -Helped women reach for the starts -inspired female rockstars

Wednesday, October 23, 2019

Ethics – Moral Principles

The term ethics is defined as a system of moral principles. When incorporating ethics with business it is extremely difficult to determine what is considered moral or immoral, as well as what is judged as justice in society. One viewpoint on this topic opposes justice can be compatible with business. The other viewpoint believes there is a line that draws between good and bad; it really depends upon the motive of the action. Is business ethics possible in our present day society? Matigari, a short story written by Ngugi wa Thiong’o, shows it is evident that Ngugi was trying to make it clear that ethics would be impossible in a democratic society. The main character in the story, whose name is Matigari, is continuously searching for truth and justice. â€Å"My friends! Can you tell me where a person could find truth and justice in this country? † (Ngugu, 1989) were his exact words when approaching people. The crowds would all look at him as if he were speaking nonsense. Matigari feels as though the democratic world in which he is living was created upside down. The builder sleeps in the open, the worker is left empty-handed, the tailor goes naked, and the tiller goes to sleep on an empty stomach† (Ngugu, 1989). He wonders where truth and justice lies in this world; for even those who farm are starving. His search leads him to a meeting called by the Minister for Truth and Justice. The real truth can be found within the oppressed. He had bui lt his own home, yet it was still taken away from him; it is a clear example of a capitalist private property. Matigari favours the labour theory of property, which gives labourers the right to own their own land. It is clearly not ethical to take one’s land away in which he or she worked upon. It is evident Matigari believes in the labour theory of property; whereas the government enforces a capitalist private property. The labour theory of property is a natural law theory that holds that property originally comes about by the person doing the labour upon natural resources. Land in its original state would be considered not owned by anyone, but if someone were to apply his or her labour to the land it would become their property. On the other hand, private property is central to capitalism (Samuels, 2002). Under capitalism, private hands control basic assets and productive resources. The major economic decisions are made by individuals or groups acting upon their own pursuit of profit. This is what the government has done; they have created the society into private property. For this reason, Matigari has declared for the labour theory of property to be sought out. The Kantian ethics believes all moral duties, maxims, or certain rules of conduct can be labelled either wrong or right. Act only on that maxim which you can will to be a universal law† (Macmillan, 1972). The universal law is fundamental. What is considered part of this universal conduct should be clear to everyone throughout the world. For example, rules that allow murder and cheating etc. cannot be part of the moral code. However, rules such as do not commit murder can be classified as a moral duty. Kant states one should only follow princip als that are morally correct. Moral rules are those that can be followed by people consistently throughout the world, no matter where one lives. Furthermore, the reward of virtue is not happiness but dignity and freedom (Macmillan, 1972). Kant tries to explain that when one is righteous and true, happiness is not the given prize, but one would receive self-respect and liberty instead. Real freedom means obeying no laws but only those that can be legislated as universal moral laws. Both viewpoints touch upon the topic of fear when it comes to ethics. â€Å"There is too much fear in this country†¦ Too much fear breeds misery in the land† (Ngugu, 1989). This so called fear in the story, Matigari, tries to explain that fear causes a society to become unjust. If everyone was too afraid to confront someone in which he or she were doing something unmerited then this injustice will continue. The democratic government is used as an example in the short story. All the citizens are too afraid to stand up to the prejudiced government; therefore, no changes were made until Matigari had no anxiety and fear of the government. In addition, the opposing viewpoint also speaks of fear in a society; although it is not exactly the same. No one ever obeys laws because they are scared but because one is morally trying to follow the universal moral laws. Freedom and fear cannot coincide when trying to make moral decisions. The Kantian viewpoint is one that is more comprehendible than the viewpoint found in the short story Matigari. It is agreeable that one can find ethics in business. A universal moral law is one that is shared throughout the world and would be agreed upon by all people from all nations. Due to the fact that there are many different cultures there is a â€Å"golden rule† to be found in all the great religions (Macmillan, 972). The golden rule is part of the moral code of anything that is judged as a moral principle. Being agreeable in all religions and cultures it would definitely be ethical to follow these rules of moral conduct. Such rules such as â€Å"thou shall not kill† (Lintin, 1999) can be found in the bible; it is part of the moral code. It is like an unwritten rule that everyone on this earth can understand that it is wrong to murder a human being. To a certain extent there is such thing as ethics when it comes to business and how a society should be run.

Tuesday, October 22, 2019

Effectiveness of the Articles Of Confederation essays

Effectiveness of the Articles Of Confederation essays As a revolt against British and early constitutions, America's first national government reflected fears of centralized authority and a possibility of corruption. John Dickinson drafted a proposal for a national government in 1776 which he called the Articles of Confederation. Congress adopted a weaker version of the Articles and had it ratified after the original was finished. The Articles of Confederation provided a partially reasonable and workable transition from the unitary system of British rule to the federal system established under the constitution. The Articles of Confederation adopted a Republican form of government that was quite different from the previous Unitary system of government British had. The Republican government allowed people to vote for representatives to become part of Congress and write and make new laws for them. This brought about a major change in the way the nation was run, by letting the people choose their leaders. Under the Articles, each state received an equal amount of power. Each state retained sovereignty, freedom, and independence from each other and other nations. Every State entered into a friendship with each other to help and assist others against any attacks made on them. The friendships between the states made the states a Unified Nation. The Articles settled the dispute over the land in the North West. In Document E, the map shows the land that was used in the NW Ordinance of 1787. The Ordinance planned how the government in the newly settled areas would be run. If the land had a population of 5,000 males or more, the area was a territorial government with a Governor of Congress. If the area had 60,000 inhabitants, the area became a State with its constitution. In the new states, Slavery was illegal until it became a state in which at that time it could decide on the issue of slavery. In the five areas that became states, none decided to have slavery. ...

Monday, October 21, 2019

Wuthering Heights Questions for Study and Discussion

'Wuthering Heights' Questions for Study and Discussion Wuthering Heights is one of the greatest works by Emily Bronte. Here are a few questions for study and discussion. Questions for Study and Discussion What is important about the title? AnswerWhat are the conflicts in Wuthering Heights? AnswerHow does Emily Bronte reveal character in Wuthering Heights?What are some themes in the story? How do they relate to the plot and characters?What are some symbols in​ Wuthering Heights? How do they relate to the plot and characters?Are the characters consistent in their actions? Which of the characters are fully developed? How? Why?Do you find the characters likable? Are the characters persons you would want to meet?Does the story end the way you expected? How? Why?What is the central/primary purpose of the story? Is the purpose important or meaningful?How does the novel relate to feminist literature?How essential is the setting to the story? Could the story have taken place anywhere else?What is the role of women in Wuthering Heights? How are mothers represented? What about single/independent women?What elements of the story, plot, characterization, etc. are the most controversial? Why do you think the book was banned? Do you believe the book should remain banned? This novel has been compared to the Twilight series. Do you agree? Why? Why not?Compare A Rose for Emily, by William Faulkner, with this novel. How do the characters cope with rejection?Would you recommend this novel to a friend?

Saturday, October 19, 2019

Clinical Practices Paper Essay Example | Topics and Well Written Essays - 1750 words

Clinical Practices Paper - Essay Example It should not be misconstrued that one type of learning must be followed to help every student learn. Central to learning styles for any student is to find those models of teaching that work most effectively for the individuals learning style so that they become more instantly ready to understand the coursework and do well on a test. The research shows that there are many methods currently being used. There are several basic ways that a student must learn different types of material. As an example, some pieces of knowledge must be memorized. This would include lists of facts or aspects of the human body and body systems that are important to know when you are working with patients. Azzarello (2007) points out that there are three stages of knowledge that students must develop. In the first stage, the declarative stage of learning, students find these lists and common knowledge important. They must not only learn the material, but be able to apply the knowledge to their clinical studies. In stage two, called the procedural stage, students must take the knowledge they have and apply it to situations that may not have come up in other settings. With this knowledge, they must use critical thinking and problem solving to add to the knowledge they have about the situation. In the last stage, which the author calls structural knowledge, a student must understand how procedural knowledge and declarative knowledge relate to one another. This basically means that students will need to understand an organized way of bringing the knowledge together (Azzarello, p. 3). The author suggests that in order to understand what students are learning structurally that Pathfinder scaling techniques can be used. A study was conducted to see whether this was feasible and found that it was one way that students could be evaluated. This is a stronger way to evaluate than concept mapping and most students in the study thought some of the work was

Friday, October 18, 2019

Co-Integration, Causality and Export-Led Growth in Portugal Article

Co-Integration, Causality and Export-Led Growth in Portugal - Article Example In the current study firstly, the Augmented Dicky Fuller (ADF) test is used for finding the order of integration between the two data series. Secondly, the Johansen maximum likelihood estimates are used for testing co-integration. Thirdly, the standard Granger-type test is adapted by using lag residual of the co-integrating regression model. Lag length for Granger causality test is determined by minimizing the Akaike’s Final Prediction Error (FPE). The data used in this study comprise annual secondary data of GDP and Exports values in Portugal between 1835 to1985 time period. The base year has been selected since 1914 for calculating the real prices. Statistical estimates of ADF test showed that log GDP and log Exports are 1(1) while the first difference of the level variables is 1(0). The trace statistics of the Johansen maximum likelihood is used to conclude that real GDP and real Exports values of Portugal are co-integrated and causally related. Four lags of the dependent variable are used in this model. Based on FPE criteria Granger causality test structure is determined as m=3, n=2, q=3, and r=4. Accordingly, the Wald test statistics of the Granger causality test rejected the null hypothesis in favor of reverse causality. Thus economic growth has caused export growth in Portugal during 1835 to1985 time period. The first section of the paper describes the concept of autocorrelation in relation to conventional research studies of applied economics. Autocorrelation or serial correlation is a common condition found in time series data. In OLS estimation residual is assumed to be independently distributed and does not contain any long run correlations. Thus in the presence of autocorrelation OLS estimates are not associated with minimum variance. Nevertheless, autocorrelation is not considered as a fatal statistical issue in econometrics analyses.  

First Across The Rhine Essay Example | Topics and Well Written Essays - 3000 words

First Across The Rhine - Essay Example A lot of action-packed, tactical, militarily strategic, and heroic stories fill war movies. Rarely are the actual tasks and skills of non-combatants were featured. This paper will try to present the roles of engineers and their team during the war using mainly the book by Col David E. Pergin and war writer Eric Hammel (1994) First Across the Rhine: The 291st Engineer Combat Battalion in France. The immediate challenges during their landing in the war zone were: grave reservations of the standard in the organization as off-the-shelf engineer combat battalion inevitable combat losses that could remove key people with essential skills or unique training from the ranks (Pergrin and Hammel, 1989, 17). To address this immediate concerns, Pergrin’s solution was to cross-train as many officers and troops as possible in whatever time was left. He noted that, â€Å"The training directives established minimum, not maximum, standards (Pergrin and Hammel, 1989, 17). ... After the cross training, every member of the squad was a qualified: Rifleman for .30-caliber M2 carbines for NCOs and .30-caliber M1 Garand rifles To operate the squad’s .30 caliber machine gun and bazooka (2.35 inch rocket launcher) To lay, detect, and clear mines To operate bulldozers, dump trucks, chain saws, picks, shovels, jackhammers and other tools Read maps (most of them). Meanwhile, Pergin also ensured that the squad leader and his assistant were able to use radio and field telephone equipment; carried manuals on the three main types of bridges with which they expected to work – Bailey, timber trestle, and pontoon; use proper combat engineer tactics to stop or delay enemy (Pergrin and Hammel, 1989, 19). Each line platoon was equipped with: Bulldozer, weapons carrier, 4-ton man-hauling truck with a .50 caliber machine gun, a number of 2 & ? ton dump trucks for hauling equipment and material, own motor pool staffed by mechanics charged with maintaining all the w heeled and tracked equipment and vehicles, weapons sergeant and supply sergeant as overseers of small section of specialists. Pergin noted that the main purpose was â€Å"to save lives in the battle areas by using the many skills and the fruits of their rigorous training,† (Pergin and Hammel, 1989, 27). The following were exemplified and exercised by the team members: Stress small-unit operations using combat-engineering equipment; Facilitate movement of tanks in support of the attacking infantry; Clear mines rapidly; Police and patrol the area up to the front to provide vital information to the decision-makers up the chain of command. All their tasks were conducted through strategies as follows: 1. led the paratroopers through the

Thursday, October 17, 2019

Data Collection Research Paper Example | Topics and Well Written Essays - 250 words

Data Collection - Research Paper Example ChoicePoint’s functions are essential not only for government organizations but also for private consumers. The data collected and provided by ChoicePoint facilitates the fluent running of different organizations in following ways; easy and quick access to personal information benefits both the parties involved in a venture. In addition to that provision of jobs becomes more accurate when different organizations have appropriate data with them. The data provided by ChoicePoint allows the credit card and insurance companies to avoid thefts and frauds and to decrease the cost. This data is also beneficent for security and law agencies because through ChoicePoint they can have an access to the data which they cannot access by themselves due to legal restrictions. The major disadvantage of this data aggregation is identity theft as easy access to personal information enables the hackers to use someone’s identity in criminal actions and as a result the victims of identity theft have to tolerate bitter consequences. In addition to that most of the people think of this data collection as interference in their privacy and thus this act is considered as indecent and unethical. Moreover, there is no proof of the fact that the information provided by ChoicePoint is accurate and sometimes it can be misleading as well. To conclude, there is a very narrow difference between invasions in privacy and the act that is performed to get the information required for the fluent running of different organizations. Personal data collection provides the business with valuable information that plays an important role in acquiring its goals. In today’s era of technology it is essential that one should have complete information about the parties involved in a venture before indulging in it, in order to avoid thefts and frauds. Sometimes, what is considered as an invasion in privacy by certain people is something that is necessary for the fluent

Romeo and Juliet Assignment Example | Topics and Well Written Essays - 250 words

Romeo and Juliet - Assignment Example The ceremony started with melodious music being played. Paris was with his best man on the altar waiting for his bride to arrive. He was blushing with joy and very happy which showed on his face. There was a silence that was music in itself as the bride, Juliet, entered. She walked down the aisle smiling but clearly showed signs of nervousness. All eyes were on the beautiful bride but there was something missing in her. Even though she was very beautiful, the glow of a happy bride seemed to be missing. Paris broke into a smile as Juliet stepped on the altar to join him. Clearly he was on cloud nine, and the nervousness of Juliet vanished as she stepped on the Altar. They made their vows in front of the guests and she they pronounced husband and wife by Friar Laurence soon after. They had their first kiss as a couple. They showed at the balcony where citizens of Verona were waiting to get a glimpse of the couple. The couple had their first kiss in public, then waived to the crowds. They walked hand in hand into the chapel again. Lord Capulet had held a dinner party attended by everyone who is anyone in Verona. The dinner was followed by dance where Paris and Juliet had their first dance as a couple. The day in great style as it had

Wednesday, October 16, 2019

Data Collection Research Paper Example | Topics and Well Written Essays - 250 words

Data Collection - Research Paper Example ChoicePoint’s functions are essential not only for government organizations but also for private consumers. The data collected and provided by ChoicePoint facilitates the fluent running of different organizations in following ways; easy and quick access to personal information benefits both the parties involved in a venture. In addition to that provision of jobs becomes more accurate when different organizations have appropriate data with them. The data provided by ChoicePoint allows the credit card and insurance companies to avoid thefts and frauds and to decrease the cost. This data is also beneficent for security and law agencies because through ChoicePoint they can have an access to the data which they cannot access by themselves due to legal restrictions. The major disadvantage of this data aggregation is identity theft as easy access to personal information enables the hackers to use someone’s identity in criminal actions and as a result the victims of identity theft have to tolerate bitter consequences. In addition to that most of the people think of this data collection as interference in their privacy and thus this act is considered as indecent and unethical. Moreover, there is no proof of the fact that the information provided by ChoicePoint is accurate and sometimes it can be misleading as well. To conclude, there is a very narrow difference between invasions in privacy and the act that is performed to get the information required for the fluent running of different organizations. Personal data collection provides the business with valuable information that plays an important role in acquiring its goals. In today’s era of technology it is essential that one should have complete information about the parties involved in a venture before indulging in it, in order to avoid thefts and frauds. Sometimes, what is considered as an invasion in privacy by certain people is something that is necessary for the fluent

Tuesday, October 15, 2019

Target Marketing Term Paper Example | Topics and Well Written Essays - 1000 words

Target Marketing - Term Paper Example Target marketing is not all about breaking a market into various small segments and attracting the attention of the marketers confining their focus on a few key sections of the market. The implication of target marketing suggests that various considerations should be taken into account with the purpose of identifying the customer groups who are to be targeted. It is worth mentioning that ‘Marketing’ is termed as the art of creating wants among people who gradually turns out as the potential customers of the product and/or services rendered. According to Smith (1956), segmentation of markets is focusing on customers with similar interest to that of the marketer, so that it becomes easier for the organization to develop beneficial communication and thus satisfy the customer need effectively. Target Marketing Approach Customers’ demand varies from one group to the other. Thus, the identification of these demands emerges to be quite challenging for the marketers imple menting the target marketing approach. After identifying customer demands, marketers develop the product and various marketing strategies to satisfy the demand of the particular customer group(s) targeted. Thus, target marketing helps the company to identify their most potential customers. With this concern, marketers tend to emphasise on various aspects of market and human psychology which define the satisfaction and demand of targeted customers. Furthermore, with the assistance of target marketing, strategies are developed to offer the products and/or services according to the customers’ demand which in turn boosts customer satisfaction. Therefore, target marketing assists the organisation to attain additional customer satisfaction rewarding higher loyalty and competitive advantages, although it initially deals with a concentrated group of customers (Smith, 1956). The motto of target marketing is to identify most viable segments focussing on which the organization can attra ct maximum number of customers and retain the valuable customers by satisfying their demands. It is in this context that target marketing can assist organisations in gaining sustainable growth (Bragg, 2005). The main reason for focusing on certain specific customer groups who have been targeted is to develop a marketing mix strategic alliance that can satisfy the customer needs in the best possible way. Marketing mix is so prepared that it supports the strategies of target marketing. Target marketing approach can be highly beneficial if marketing mix is prepared with great attention which also helps in enhancing the competency of the organisation to a large extent. Thus, supreme customer value is ought to be achieved with the benefits provided by the marketing mix which further can prove to be very crucial for target marketing approach (Bragg, 2005). It is worth mentioning that customers’ interests are given the maximum preference while preparing target marketing strategies. Marketers pay keen attention in selecting the target market. The process is initiated when marketing experts analyse different characteristics such as demographic and psychographic qualities possessed by the potential customers. Demographic analysis consists of age, geographic location, gender, earning capacity, education level and relationship status that can influence the demand of the customers. Similarly, psychographic analysis includes offering price of the products; convenience provided by the product, how safe the product can prove to be, availability of the product i.e. how far the customers need to travel to make the product available and so on which defined the satisfaction level of the customers (Restrepo, 2008). Target

Monday, October 14, 2019

The West, Middle East And Orientalism Essay Example for Free

The West, Middle East And Orientalism Essay The Middle East has become a focal point in the last fifty years because of concerns regarding the regions role in economics, international security and politics. There is urgency in developing peace and development for the region: its position in the world’s oil markets and its role as gateway between Europe and Asia are critical reasons for the interest. There has been an exhaustive amount of literature aiming to analyze and develop solutions for the region developing a consensus to what has to be done has proven to be difficult and even if accomplished, implementation has been problematic. One point of suggests that the difficulty in the region stems from cultural reasons. Orientalists contend that the culture of the people in the Middle East which is predominantly Islamic is one of the reasons for the developing conflicts. The purpose of this paper is to survey existing views on this perspective and to assess the validity of the arguments presented. In doing so, the paper will be able to define how culture affects the peace, order and development in the Middle East based on historical and current studies of the region. Perspectives of Orientalism The term orientalism was coined to delineate the geographical divide between the Europe and the Americas with Asia. This reflects the more recent use of the â€Å"west† to refer to the occident and â€Å"east† to refer to the orient particularly during the colonial expansion in the 20th century. Though the term was originally developed as a geographical term, the more significant application is in its use to imply a cultural divide that in turn is the core of conflicts held against the â€Å"west†. In Cole’s review of Bernard Lewis What Went Wrong: Western Impact and Middle Eastern Response, he cites that Lewis uses orientalism to characterize and develop his insights regarding the Middle East’s situation . Lewis uses the west as a standard to define what is wrong with the policies in the region. The approach is not just used to assess the current state of affairs in the region but reaches back historically with the study of the Ottoman Empire versus Central and Western Europe. According to Ismael Hossein-Zadeh, orientalist perspectives have had resurgence after the September 11th attacks. He considers that development an effort to understand the reasons behind the tragedy and at the same time an effort to develop the protagonists and antagonists of what was to be the war against terrorism. In this light, the Middle East and Afghanistan were modeled according to their difference with the Allies and the most distinct difference being the culture of the region . Stefan Lovgren reflects that this view of the Middle East is steeped and history as evidenced as far back by the Crusades . Ideologically, there are significant similarities: in the middle ages, the focus was to deliver the region from the domination of Arabs of Christendom’s birthplace and today, the objective to liberate the region from the supporters of terrorism. Evaluating Orientalism In Edward W. Said’s review of Samuel Huntingtons article The Clash of Civilizations he criticizes the War of the Worlds scenario presentation of the cultural and religious conflicts . Huntingtons approach is distinctively orientalist because of his use of cultural or civilizations to illustrate his theories. Said’s view is that Huntington is only â€Å"reinforcing defensive self-pride than for critical understanding of the bewildering interdependence of our time† . One of the key difficulties in orientalism is that there seems to be too much focus on superficial differences. This is not to imply that cultural differences have to be considered but rather, there is little historical perspective given to the economic, political and strategic factors. For example, Nanda Shrestha and Kenneth Gray reflect that the current conflicts between the West and the Middle East and all other conflict in recent history belie a two hundred years of good relations in terms . Using an orientalist approach, one culture or group is evaluated based on what is considered a more superior culture. In such a scenario, one group ultimately is considered to be superior to another thus its use as a standard. This then leads to conflict because either of the perception that a culture is being judged as inferior or because of the action on enforcing judgment or the will of the â€Å"superior† nation to the other in what is seen as in consideration of the interest of the other. It should be noted that this is not the motive of orientalism but is often used as the justification of extraterritorial action not just in the Middle East but the rest of the world as well. Conflict and Orientalism Cole points out that one of the difficulties in orientalism is that it tends to lumps together issues and then gives it a cultural or ethnic label that rarely represents all the individuals involved in the issue. According to him, when the terms Middle East is used the connotation is of Islamic insurgency which does not represent the majority of the countries in the region in either religion or sentiment . Bernard Lewis considers the current points out that this has lead for Moslems to fell that they are being persecuted and has led to resentment and mistrust of the west, particularly the United States . The cycle then continues on with Middle Eastern leaning towards orientalist views in dealing with other countries. Which, to be expected only further encourages conflict and misunderstanding among the parties involved. In Shrestha and Gray’s evaluation of Huntingtons article clash of civilization theory is that it should be considered as an â€Å"ideological work underpinning a neoconservative agenda for a global American Empire than a work of scholarship or accurate representation of historical reality† . Evaluating the Conflicts Lewis suggests that the evaluation of the conflicts should not focus so much on the disparities suggested by orientalist but rather on the competition because of common interests in terms of economy, politics and security . His view is supported by Lovgren whose study of the city of Jerusalem, one of the most contested cities in history and a goof microcosm of the region, reflect that history has shown that various cultures and civilization have co-existed well enough. He cites that most conflict has developed from territorial, economic and political disputes rather than from cultural differences . Furthermore, Kunihiko Imai that there has been greater tension not only in the Middle East but in the world as a whole because of greater exposure and interdependence among nations . Common stakes and conflicting interests are considered as one of the main causes of conflict. The discrepancies between the developed and lesser developed countries is creating tension and brings to the surface questions regarding the fairness of today’s global economics and politics . At the same time, J. J. Nance points out that there is also realization that issues like terrorism are global issues that have gained the attention of the international community that may not necessarily be in the interest of some country’s sovereignty . Nance uses as an example the aviation industry which has been among the hardest hit after the September 11th attacks: the aviation industry is typically one the highest grossing industries of any country, generating billions of dollars in tax revenue. Educator Henry A.  Giroux also points out that the conflicts that develop can also be attributed to the lack of cultural literacy which is the development of context and understanding of other cultures which has created â€Å"politics of difference† that gives little margin for real communication . Hossein-Zadeh supports this view: he believes that there has been little effort in addressing the root of the conflicts and religion and culture are used as a convenient scapegoat for the conflicts . There is no denying the impact of culture and civilization. It affects all aspects of society, creating the dimensions and forces that shape individuals . Orientalists’ perspectives have merit in that societies have their own motivations and capacities that either allows them to become more developed than another. However, considering communication and technology today which has created unprecedented channels for global interaction the distinction of what the West and Middle East encompasses is becoming blurred. As much as one would want to consider the Middle East as a far off and alien region to the West, the irony is that most recent leaders of the region have been educated in the West . Conclusion It is easy, if not convenient, to use cultural or regional characterizations to explain conflicts but this provides little option for the creation of satisfactory solutions. The real albeit more difficult issues to deal is whether there is fairness in economic policies; whether there is basis of foreign military presence; whether there is religious, racial and social discrimination; whether there tolerance for differences; and whether issues are not being misconstrued because of differences in perspective or objectives. There is little consideration of the underlying issues that was created the existing status quo and leaves too much to speculation and assumption. Therefore, any attempt to tackle with the issues in the Middle East must not be limited to this perspective and if used, should not consider it as indicative for the region. In conclusion, issues can not be fully assessed and solution can not be fully developed from orientalist perspectives alone. These perspectives consider only a snapshot of the issues that have to be dealt with. Reference http://www.freerepublic.com/focus/f-news/533230/posts http://news.nationalgeographic.com/news/2004/10/1028_041028_jerusalem_conflict.html

Sunday, October 13, 2019

Wireless Networking And Malicious Association Computer Science Essay

Wireless Networking And Malicious Association Computer Science Essay Wireless security is to prevent unauthorized user to access the wireless network or damage the computer by using wireless network. When the wireless technology has been first introduced to the world, it already has few danger methods that will harm the users desktop or laptop, but that time cracker and hacker dont have any resources to crack or hack a network by using wireless technology. At that time, the wireless network only use by the big company. But now day, wireless network is very common, every corner of the world like cafà ©, shopping mall, school, or college that has provide wireless access for the people to access it. Not only cafà © and college using wireless network, at other country it use wireless technology to connect whole citys network. With this technology, people that around the wireless router can easily to access the wireless network to do the search of the information, check mail or play online game. Because of the wireless technology, now day, every laptop has wireless adapter card pre-install inside and make the laptop more portable and let them can connect to internet easily. Not only for laptop, wireless technology also make benefit for the desktop. Desktop can connect to network by installing a wireless adapter card or plug in an USB wireless adapter then desktop can connect to a network and without cable messy around the floor. In this case, wireless technology has become widely use and because of this reason, the risk of using wireless technology has increase and let many hacker found the way to hack the wireless network. All of security risk is related to the current wireless protocol and encryption method. Most of the wireless networks use IEEE 802.11b for standard communication and IEEE 802.11b have already became standard wireless networking technology among the small business user and home user. The IEEE 802.11b can support the indoor distance from several meter to several hundred meters, and can support the outdoor from several kilometer to several ten of kilometers by using unlicensed wireless band. Now day, the wireless network devices normally are equipped with Wired Equivalent Privacy (WEP) data encryption. WEP data encryption was based on 64-bit RC4 encryption algorithm. Other that 64-bit RC4 encryption algorithm, 128-bit encryption algorithm is another data encryption on the WEP data encryption. But this kind of device is more expensive compare with 64-bit RC4 encryption and beside that, all the nodes must use the same encryption level. 1.2 Aim of Research Aim of the research is to implement the wireless security into the CSC System to prevent unauthorized user to access the wireless network. To increase the security level of the wireless network. To avoid the data or information inside the server or computer been hacked by unauthorized user. To increase the safety of the data transfer between server and computer. To add extra encryption method to encrypt the packet need to be transfer. To prevent unauthorized user to shut down whole system though the wireless access point. Chapter 2: Main Body 2.1 Wireless Security Concept A research has been carried out about the concept of the Wireless Security and how to enhance the wireless security. Wireless Security is to prevent an unauthorized user to invade the server database and bring harm to entire network. Below are the results of the research. 2.1.1 Unauthorized Access According to the research, have a lot of way to break into the wireless access point without an authorization. The unauthorized access will cause companys daily operation failure and lose profit. Below are the some of the examples unauthorized accesses. 2.1.1.1 MAC Spoofing MAC spoofing is a technique to change an assigned MAC (Media Access Control) address to another different MAC address. When a person using this technique, he/she has his/her reason to changes a network devices MAC address, whether is legitimate or illegitimate. Changes a network devices assigned MAC address allows bypass the access control list on the server or router, either hiding a computer on a network or attacking a network by simulate another network device. MAC spoofing occurs when a cracker or hacker has the ability to listen the network traffic that passed by and through it; the cracker or hacker can identify the MAC address of the computer with network privileges. Most of the wireless system allows MAC filtering to only allow authorized computer that with specific MAC address to access the network. The computer that dont has specific MAC address cant access the network, so the cracker or hacker use a program which has network sniffing capability and combine with other software or program to pretend the computer has any MAC address that the cracker desires. (Wikipedia, 2010) 2.1.1.2 Malicious Association The Malicious Association is hacker that can connect to company network by using their cracked laptop. This type of laptop is known as soft AP (Access Point) and this type of laptop is created by using some software that makes the hacker laptops wireless adapter card look like a legitimate access point. After the hacker has already gained the access to the company network, the hacker can steal the password or plant the computer virus into the network. (Wikipedia, 2010) 2.1.1.3 Ad-hoc Network Ad-hoc network, also known as peer-to-peer network built up between two or more wireless computers and these wireless computers dont have access point in between them. Ad-hoc network usually provide little protection, encryption method to the network. When a company or person using Ad-hoc network and wired infrastructure network together at the same time, and will link up a secured network to an unsecured network. Connect two different network topology need to have a bridge between them. Bridging is in two forms. User can connect the network topology y a direct bridge and indirect bridge. Direct bridge need to configure by the user and indirect bridge is user share resource on the user computer. The indirect bridge is provides two security problems. The first problem is the data can be obtained through the secured network on the user computer and this data exposed to other user discovery via the Ad-hoc network bypassing the user secured network. The second problem is a Trojan, computer virus or worm can be placed on the user computer through the Ad-hoc network. The unauthorized user no needs to crack the password of the network and can place the computer virus through the Ad-hoc network. (Wikipedia, 2010) 2.1.1.4 Denial of Service C:UsersZoukyDesktop424px-Stachledraht_DDos_Attack.jpg DoS (Denial of Service) or DDoS (Distributed Denial of Service) will occurs is when an attacker continues non-stop bombards an attacker targeted access point with bogus request, failure messages, or other commands. Denial of service will cause other users cant get into the network and also will cause a network crash. The DoS attack will expose a little bit of the data to the attacker, when the DoS attack happen, the interrupted network will prevents the data flow and also indirectly prevent the data from being transmitted. After the DoS attack has been performed, the attacker will start to observe recovery of the wireless network. During the initial handshake code is start to re-transmitted to the wireless network, the attacker continue what he remain. The attacker will record down the initial handshake code and use cracking tools to analyze the security weakness and exploit this code to get an unauthorized access to the system. (Wikipedia, 2010) 2.1.1.5 Man-in-the-middle Attack Man-in-the-middle attacker using a computer to sets up a soft AP (Access Point) and enticing other computers to log into the computer that already been sets up to soft AP. After this all are done, the attacker connects to a real access point by using other wireless card and the attacker will offers a steady flow of the network traffic through the done hacking computer to real network. Man-in-the-middle attack forces other computers AP drop the connection to real network and reconnect to attackers soft AP. This allows hacker to receive what other computers want data need to send out to real network. (Wikipedia, 2010) 2.2 Basic Security for Wireless Wireless network exist in this world already has a decade, at that time the security for the wireless network still not strong enough to prevent infiltrate by hacker or cracker. But at that time the hacker doesnt familiar on technology or technique to hack the wireless network. One of the reasons is the hacking device to hack the wireless network still hard to achieve on that time market. After a decade, the technology and technique to hack a wireless network and the step to build up the hacking device can found on internet. So now day the wireless network users need to have a strong and better wireless security to secure the wireless network. Below are the basic securities for wireless network for the first wireless network has been introduced. 2.2.1 Service Set Identifier SSID (Service Set Identifier) is a common network name for a device in a wireless LAN and some of the wireless device has its own default SSID. The default SSID can be replaced by other string and normally this string is generated randomly. SSID is to identify a name for particular wireless access point. All wireless network need to have SSID within the wireless access point just can communicate each other. The client doesnt know the SSID of the access point, then that client cant simply access the network; this is to prevent hacker to invade network by access through access point. The hacker need to know the SSID of a network just can complete the 802.11b protocol to access the network. The access point will broadcasts the SSID by the beacon inside the wireless device. However, even the broadcasting of the access point is turn off, the SSID still can detected by hacker with undetected monitoring of particular network or sniffing. So, all the clients need to know the SSID of the acce ss point before can make connection to the wireless device. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.2 Medium Access Control Address Filter Each wireless access point can be configured only accept the clients MAC address that already registered inside the wireless access point. With this function, the network administrators can limit the access of the client into wireless network by register the clients MAC address into the wireless access point. Most of wireless devices MAC address is unique and MAC address filter only allow the clients MAC address already registered in the wireless access point to access the network. The entire clients MAC address will store into MAC address ACL (Access Control List) and wireless access point will denied other wireless device if the wireless devices MAC address is not register inside wireless access points MAC address ACL. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.3 Wired Equivalent Privacy WEP (Wired Equivalent Privacy) is intend to give wireless users have a security scheme is equivalent to the wired network security. WEP doesnt provide any superior level or higher than that level of security, although WEP doesnt has superior level of security but it security level is equivalent with wired network. In the practice, the result show that the security level of WEP need to equivalent to wired network security is hardly to achieve. The use of WEP is to prevent the wireless client from sending and receiving data from the wireless access point, the wireless clients need to have the correct WEP key just can connect to the wireless access point. Now mostly of the network devices is equipped with the WEP data encryption and the encryption algorithm for the WEP is 64-bit RC4. Some of the network device capable to uses 128-bit encryption algorithm. After WEP is active, each 802.11 packet will encrypted by 64-bit RC4 key with RC4 cipher stream. This key is composed of 24-bit IV (I nitialization Vector) and other 40-bit is WEP key. IV is chosen by the sender and the IV can be change, this make every packet wont encrypt with the same key. Another additional 4-byte is for ICV (Integrity Check Value); ICV is computed and appended on the original packet. RC4 cipher stream is generated by 64-bit RC4 encryption algorithm. The WEP encryption algorithms work on a key that share between wireless device and wireless access point. The packet is encrypted by using the key before packet is send out and all packets wont have same cipher stream. The packet receiver use integrity check to ensure that the packet is not modified during the transmission. Most of the systems are share a single key among all the wireless device and wireless access point. The Integrity Check Field is to ensure the packets are not been modified during the transmission and Integrity Check Field also encrypted with the RC4 cipher stream. WEP is using CRC-32 (Cyclic Redundancy Code 32) mechanism for i ntegrity check. CRC is defined as a class of checksum to prevent overflow by dividing the message into binary. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Prasad, 2007) 2.3 Comparison between SSID, MAC Address Control Filter and WEP From the research, SSID (Service Set Identifier), MAC (Medium Access Control) address control filter and WEP (Wired Equivalent Privacy) are the basic security for the wireless network. This three security methods can implement together in one network. Because these are basic security for wireless network, so the security methods are easy to break by unauthorized user. If not implement other security methods and only just implement SSID, MAC address control Filter and WEP into wireless network, that wireless network will not secure under protection of these three security methods. The wireless access point will broadcast the SSID to the wireless client and wireless client just can access to the access point. When the access point broadcast its own SSID, the entire nearby wireless client will know the SSID of that network or access point, even the unauthorized users also will know the SSID of the network. The unauthorized users will attempt to access the wireless access point. And the wireless access point can close the SSID broadcast function; mean that the SSID is hidden. But when the authorized user requires connecting to the access point, the authorized user will broadcast the SSID to the wireless access point, if the SSID broadcast by the authorized user is match with the SSID of the access point. The authorized user just can make connect to the access point. This make hacker a chance to hack the access point because when authorized user is broadcasts the SSID to the access point, hacker can capture the packet that broadcast by the authorized user and make connection to the wireless access point. The wireless devices MAC address will store inside the wireless access point ACL (Access Control List), the wireless devices MAC address need to be match with MAC address inside the wireless access point ACL just can connect with wireless network. If that wireless network has more than 20 computers need to connect to the wireless network, then the network administrator need to enter all the computers MAC address into the wireless access point ACL. This will make the network administrator very troublesome enter the MAC address one by one and MAC address can be forged. WEP has been considered as a failure in wireless security, at the end it still accepted by the IEEE because WEP wasnt aim for provides fully security for wireless. WEP encryption is very easy to crack by the unauthorized user. WEP only authenticates the wireless client. This allows an unauthorized user to capture the packet send by the wireless client. WEP key is easily lost or stolen by unauthorized user and if the stolen WEP key hasnt been report to the network administrator, the network administrator wont able to detect the unauthorized user has already infiltrated the wireless network. If the stolen WEP key has been reported, network administrator require to change the entire devices that have use the same WEP key with stolen devices WEP key. If the company or enterprise has more than thousands of wireless user using that wireless network, this can be a very difficult task for the network administrator to change the entire WEP key for each wireless users. Like just mentioned, the WEP authentication message is easy to forging by the unauthorized user. Unauthorized user can capture the authentication message that send by the wireless client and forge a new authentication message; unauthorized user can use this forged message to associate with wireless access point. The management for WEP key in not specific in WEP standard. Since dont have management for WEP key, then WEP key will be use for a long term and lack of quality. Most of the wireless network uses one WEP key and share between the entire network and the entire wireless clients access point need to program with same WEP key. Because of this reason, network administrators rarely change the WEP key. SSID, MAC address control filter and WEP is basic security for wireless network; these methods still cant apply in wireless network. Just using SSID, MAC address control filter and WEP are not enough to prevent the security break. These methods require associate with other security methods to enhance the wireless security to prevent security break. 2.4 Advanced Security for Wireless From the research that carried out, advanced wireless securities are to replace the basic wireless security and improve what basic wireless security vulnerability. 2.4.1 Wi-Fi Protected Access WPA (Wi-Fi Protected Access) is a certification program that created by Wi-Fi (Wireless Fidelity) Alliance; WPA is a subset of the IEEE 802.11i. This technology is designed to response to the weaknesses that found in WEP. WPA will generate the key based on the master key and the master key never use by WPA. To encrypt the data, WPA is much more secure than WEP. Key management and updating in WEP is poorly provided, the secure key management is a built-in function in WPA. Mean that WPA can update and manage the key easily, not like WEP. If WEP need to manage or update the key, the network administrator needs to change entire wireless client key that has connection with the wireless network. WPA got one key only and that is master key like just mentioned, network administrator only require to change that master key then WPA will generate the key based on the master key. Generated key is hierarchy of the master key. So this make the management and updating become much easier. The IV (Initialization Vector) values can be reuse and the length of the IV is become longer, from 24-bit increase to 48-bit. Another additional part, the IVs are the sequence counters for the TSC (TKIP Sequence Counter), to protect the loop of the data. The WEP message integrity protocol CRC-32 has been proved ineffective. Because of this reason, WPA uses a MIC (Message Integrity Check) mechanism to replace the WEP message integrity protocol. The correct MIC is very difficult to guess. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) WPA has 3 improvements over WEP: Improved Data Encryption WPA improves the data encryption through the TKIP (Temporal Key Integrity Protocol). TKIP generates the key by using hashing algorithm and adding the integrity checking feature, this will ensure the key havent been edited by other person. TKIP is a Temporal Key hash Function and it is another option to WEP to fix all security problems that WEP has and it doesnt require installing other new hardware. TKIP same like WEP, use RC4 stream cipher to encrypt and decrypt data and all involved clients require share the same key. This key must be 128-bit and it calls Temporal Key (TK). The Initialization Vector also include in TKIP. Even if the TK is shared among all the wireless clients, all wireless clients generate different RC4 key stream. Since the communication participants perform a 2-phase generation of a unique Per-Packet Key (PPK), which is used as the key for the RC4 key stream. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) User Authentication User authentication in WPA is through the EAP (Extensible Authentication Protocol). This function is missing in WEP and WEP access to the wireless network is based on computers network cards MAC address and MAC address is very simple to be stolen. The purpose of EAP is to create a more secure public-key encryption system to ensure that only authorized user can access the wireless network. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Integrity WPA has a new mechanism call (MIC) Message Integrity Code for TKIP is computed by a new algorithm, name Michael. MIC is computed to detect errors in the data contents, either is transfer errors or purposely change the data content. The Michael is a 64-bit MIC and need to add to the data and ICV (Integrity Check Value). (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) 2.4.2 Robust Security Network RSN (Robust Security Network), also call as WPA (Wi-Fi Protected Access) 2. At year 2004, concept of RSN has been released, where the wireless devices need to support by additional capabilities. RSN is fully tested by Wi-Fi Alliances. RSN has a whole new standard and architecture to utilize the IEEE 802.1X standard for AES (Advanced Encryption Standard) and access control. RSN is using a pair-wise key exchange (Four Way Handshake) protocol, RSN also utilizing with 802.1X for key management process and mutual authentication. Now, 802.11i allows for the network implementation and also can use TKIP (Temporal Key Integrity Protocol). By default RSN uses CCMP (Counter Mode MAC Protocol) and AES (Advanced Encryption Standard) to provide for a scalable and stronger solution. AES is a replacement for RC4. Data transmission between the wireless access point and wireless device, RSN uses encryption algorithms and dynamic negotiation of authentication on the data transmission. The authentication of RSN is based on 802.1X and EAP (Extensible Authentication Protocol). Encryption algorithms and dynamic negotiation of authentication make RSNs security more secure and save. RSN is stronger and better than WEP and WPA because RSN is using dynamic negotiation, 802.1X, EAP and AES. Unfortunately only the latest devices have the capability let RSN to accelerate the speed of algorithms calculation in wireless client and wireless access point; now day of wireless product cant fully provide the performance of RSN. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) 2.5 Comparison between WPA and WEP WPA (Wi-Fi Protected Access) is the solution for the WEP vulnerability, has some critics done for the WEP, the WPA has numerous enhancements over WEP. WPAs TKIP encryption algorithm has fully enhances the WEPs RC4 encryption algorithm. TKIP make the data encryption more efficient and replace the RC4 vulnerability. WPA has made the key management became much more easier compare with WEP, because the WEPs key require enter one by one to the wireless client, if the company has more than thousands users then the network administrator need to enter more than thousands keys into the users computer. If the key is hacked by unauthorized user, then network administrator need to change key for entire companys computers. On the other hand, WPA no needs so troublesome, WPA only needs to enter one master key, and then WPA will generate key according with the hierarchy of master key, after that WPA will assign the key to the clients and the key is generated in 48-bit of IV size. Even the company g ot more ten thousands users also no need to trouble the network administrator. If one of the key has been hacked by unauthorized user, TKIP just need to generate a new key then network administrator can info the wireless client to change the key. WPA has EAP to authenticate the wireless user. WEP is using MAC address to authenticate the wireless user and some of the wireless devices MAC address can be forged. If the wireless devices MAC address has been forged by unauthorized user then the unauthorized user can easier to connect the wireless network without known by the network administrator. Network administrator also wont notify the wireless network is infiltrated by the unauthorized user until the wireless user report there is a missing MAC address. WPA is using EAP to authenticate the wireless user and the EAP for each wireless client is hard to forge by unauthorized user. If the EAP of the client is forging, but the unauthorized user still need wireless clients private key just can access the wireless network. WEP dont have error checking for the data content, and this will cause the looping of the data. If cant prevent replay attacks and will cause the wireless network crash. WPA has inserted the MIC into TKIP and IV sequence mechanism; this is to prevent replay attacks in the wireless network. MIC and IV sequence mechanism support for the existing wireless infrastructures not require installing new wireless device. Adding MIC and IV sequence mechanism without install new wireless device, adding these two methods can increase the wireless security and also without increase the installation cost of wireless device. Compare WPA with the WEP, WPA has solved a lot of WEP vulnerabilities. This make WPA is more secure compare with WEP because WEP only is basic security for the wireless network; it doesnt provide any protection for the wireless network. WEPs security methods can let a small enterprise to setup a small wireless network. For the big company, WEPs security methods are hard preventing the unauthorized access from outsider. 2.6 Comparison between WPA and RSN For now, never the less, RSN (Robust Security Network) is the strongest wireless security protocol for the wireless network. RSN provide stronger data encryption algorithm and all advantages of WPA. The RSN data encryption algorithm method is using AES (Advanced Encryption Standard) to encrypt the data. What advantages WPA have all included in RSN, expect the RSN data encryption algorithm is more advance. For WPA require upgrade for the software and firmware of the wireless device for the existing wireless network infrastructure, but the RSN doesnt support existing wireless network infrastructure, require upgrading the wireless device in order to implement AES. Implement RSN into the existing wireless network infrastructure require extra cost for just upgrade the hardware. RSN need large amount of processing resources in order to protect the wireless network. Mean that implement RSN will reduce the wireless network performance by processing the data transfer or verify the wireless client. 2.7 Table of Comparison between WEP, WPA and RSN Below is summary of the comparison between WEP, WPA and RSN: Features of Mechanism WEP WPA RSN Encryption Cipher Mechanism RC4 RC4 / TKIP AES / CCMP CCMP / TKIP Encryption Key Size 40 bits 128 bits 128 bits Encryption Key Management None 802.1x 802.1x Encryption Key Per Packet Concatenated Mixed No need Encryption Key Change None For Each Packet No need IV Size 24 bits 48 bits 48 bits Authentication Weak 802.1x EAP 802.1x EAP Data Integrity CRC 32 ICV MIC (Michael) CCM Header Integrity None MIC (Michael) CCM Replay Attack Prevention None IV Sequence IV Sequence (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Chapter 3: Conclusion 3.1 Achievement of Objectives 3.1.1 To increase the security level of the wireless network. In chapter 2.2 until 2.4, the different wireless securities provide different service. 3.1.2 To avoid the data or information inside the server or computer been hacked by unauthorized user. In chapter 2.1, the type of the unauthorized user that can infiltrates the wireless network and chapter 2.2 and 2.4 the methods to prevent hacking. 3.1.3 To increase the safety of the data transfer between server and computer. In chapter 2.2 until 2.4, increase the safety of the wireless access point of wireless network. 3.1.4 To add extra encryption method to encrypt the packet need to be transfer. From chapter 2.2 until 2.4, the extra encryption methods that can hide the data detail. 3.1.5 To prevent unauthorized user to shut down whole system though the wireless access point. In chapter 2.2 until 2.4, the methods to prevent the unauthorized user to connect with wireless access point. 3.2 Research Conclusion A research has been carried out to finish this seminar report by studying the type of the unauthorized access, concept of the wireless security and how efficiency is the wireless network security by determine the wireless security method. Now wireless has already became widely use by company or enterprise, even at home also can using wireless to connect to internet for home purpose like surfing the internet. The reason why so many people like to use wireless network compare with wired network, is because the structure of wireless network is more neat and easy to manage. At the time wireless just came out to the market, the security for the wireless still breakable by hacker or cracker but need a lot of resources to break the security of wireless network. Because last time, wireless network just introduced, the hacker or cracker lack of technology and technique to break the wireless network. Still after few years, the technology and technique to break the wireless security can found in internet. At that time the wireless network has sound the alert and organizations are finding the solution for solve the wireless security problem. But now, the new technology of wireless security has out to market and the security methods are easy to install. So, now wireless security is not a problem. In the report got mentioned is RSN can be the most dependable wireless security for the wireless network. But it still has certain problem like higher cost. Installation for the RSN needs to change whole wireless network infrastructure. WPA got a lot of security methods that cant compare with RSN but WPA still dependable just like RSN. Doesnt mean the expensive item is the good item. As long as the item is reliable then that item is a good item.

Saturday, October 12, 2019

Fantasy vs. Reality in J. M. Coetzees Disgrace Essay -- Coetzee Disgr

Fantasy vs. Reality in J. M. Coetzee's Disgrace J. M. Coetzee's novel Disgrace is, on the surface, the story of a wayward college professor, Dr. David Lurie, who is aging into a disrespectful decline. But this story tells of not only the strife and wrenching change that exist in the microcosm of Lurie's mind, but also the parallel themes that underlie the social, political, and ethical systems that are the reality of present day South Africa. As David Lurie interacts with people and creatures outside his normal milieu, the fault lines between his myopic view of the world and reality begin to crystallize with a disconcerting clarity. "What goes on in your soul is dark to us... ." These words are emblematic of the willful ignorance used to justify the actions of people, governments and society in a number of unfortunate circumstances. The alienation endemic in such a phrase reinforces the notion that each of us is absolutely alone when it comes to matters of the soul. Often, this willful ignorance is the blindfold used to wrap one's conscious mind into a state of denial that permits the status quo to limp on. If a society can be guilty of misanthropic behavior, then it must first exist on the individual level. It is in personal relationships that errors germinate and where true contrition belongs. The original context of this phrase is between Lurie and his college's disciplinary committee. Having been caught misusing his authority to seduce a young student, the professor is asked to explain. Repentance would go a long way toward absolving his sin, but he is defiant. Though it is acknowledged that "we have our weak moments, all of us, we are only human" (52), Lurie offers a confession but no contrition. As in Byron's La... ...is Lucy who must ironically point out reality by snapping, "[W]ake up, David... this is Africa" (124). Though he seems to be coming to terms with his true identity, the loss of perceived primacy is still "humiliating." The best he can do is identify with those he had been blind to before, human and animal alike. Lucy admits they have both in fact been reduced to having nothing, "no cards, no weapons, no property, no rights, no dignity." "Like a dog." "Yes, like a dog." (205) But David Lurie has learned to have and to recognize dignity despite all indications to the contrary. The animals he tends all posses it as does he; he has learned to "concentrate all his attention on the animal they are killing, giving it what he no longer has difficulty in calling by its proper name: love" (219). Work Cited Coetzee, J. M. Disgrace. New York: Penguin Books, 2000.

Friday, October 11, 2019

Arts and Sciences essay Essay

â€Å"To what extent does the subjective nature of perception act as an advantage for artists and an obstacle that is to be overcome by scientists?†Ã‚  In the theory of knowledge, there are four ways of knowing: perception, reasoning, language and emotion. The central focus is on perception which is fundamentally about using one or more of the five senses to gain knowledge. There are several areas of knowledge such as the arts, sciences, human sciences, history, mathematics and ethics. However, the two focal areas of knowledge are the arts and sciences. A science is an area of knowledge where the scientific method is employed through formulating a hypothesis, constructing a method and drawing a scientific conclusion from the results. The arts are completely different on the other hand. It accentuates the importance of using one’s imagination and expressing emotions through an aesthetically pleasing medium be it visual arts, drama, dance, music or literature. Perception is known to be very subjective which means that different individuals can perceive and interpret the same object in a different manner. What may be deduced by someone may not be the same as the conclusion that another person has drawn. The subjective nature of perception has been known to obscure the nature of science and at the same time, work well for artists. Despite certain exceptions, the subjective nature of sense perception can be viewed as a substantial advantage for artists but it can be a hindrance for scientists. Perception is known to be very subjective regardless of the sense because different people have different abilities and tastes. We know perception is subjective because one person might perceive something different from his/her acquaintance. For instance, in the movie A Beautiful Mind, the protagonist Nash has taken drugs therefore he hallucinates. Whilst he sees images of his past, his family and friends are not able to see or hear those images therefore Nash’s perception has been substantially deceived. This shows that the perception is skewed towards one viewpoint because people have different abilities to see and hear different things. Another reason why perception may be subjective is because different individuals have different tastes and this can formulate differing opinions about a particular topic. For example, a Middle Eastern person, who is not very accustomed to spicy food, might find jalapenos very spicy because of the amount of heat in jalapeno however an Indian may find it insufficiently spicy because they eat much spicier food at home. Across the world, different people have contrasting tastes therefore this makes the nature of perception even more subjective. However, there are counter claims which contravene with this knowledge issue. For instance, when it comes to color, almost everyone can agree on one standpoint. For example, everyone can safely say that the sky is blue including the color blind people because they only struggle perceiving the colors red and green. This shows that perception is sometimes objective. There are some other examples that apply to the different senses besides eyesight. For example, coffee without any sugar is very bitter and almost all, if not all people can agree on the fact that sugarless coffee is bitter. This shows that there are some aspects of this world where people’s views about a particular object are the same no regardless of where they originate from. This means they acquire the same knowledge. However, the fact still remains that perception can sometimes be subjective because not too many people would interpret an object in the same manner due to differences in tastes, abilities and cultural perspectives. Moreover, we know that the subjective nature of perception can hamper a scientist from gaining correct knowledge about the sciences. For example, according to what we cover in the chemistry syllabus, the atom is composed of protons, neutrons, electrons, electron shells and orbitals. However, these subatomic particles are so infinitesimally small to the extent that no one can be able to see them, not even with the aid of a microscope. This can pose a major problem for scientists because it hampers with their knowledge of atomic chemistry. It also ignites doubts about whether claims about the atom are correct or not. There are many experiments to find out what exists within an atom but they are all different, thus substantiating the subjective nature of perception. However, this can prove to be an invalid argument because different people interpret different phenomena differently. In this case, even though all the people would struggle to see the subatomic particles, some people would more easily find evidence of atomic structures. Acids are another example which substantiates the subjectivity of perception. Orange contains an acid called citric acid which has a high pH and is therefore a weak acid.