Wednesday, November 27, 2019

Imaginations, Values, and Emotions

Imaginations, Values, and Emotions There are wide variations in regard to time periods and genres as far as art works are concerned. It is worth noting that some art works were founded on individuals’ minds or cultural and social influences.Advertising We will write a custom essay sample on Imaginations, Values, and Emotions specifically for you for only $16.05 $11/page Learn More In addition, other art works were as a result of an influence from the features and styles used during previous periods and were a reaction or continuation to the artistic styles. The link between the renaissance and neoclassical art eras will be examined. There will be an analysis and discussion of whether there was a reaction to or continuation between the two art periods. Renaissance, characteristics, and social conditions that led to the advent The word renaissance is a French term. It came up during the nineteenth century and elaborates the rebirth of a period that occurred between the fourteenth and sev enteenth century. The artists during this period emulated the works of art from artists before this period. In addition, they incorporated color and light via novel dimensions. During this period, there was innovation of the sense of space and perspective that allowed viewers to view in 3- dimensions. Art was fundamentally inspired by sacred and commissions motivations (Rachels Rachels, 2007). Some of the notorious artists during the renaissance art period included Raphael, Leornardo, and Michelangelo. The art works done during this period were elaborated in that they included more than the vanishing point, horizontal line, and linear perspective. The artists during the renaissance art period had a keen interest in the way light hit objects and consequently formed shadows (Rachels Rachels, 2007). The light and shadows played a great role in attracting viewers to particular areas on the object. The artists also wanted the viewer to get involved emotionally as he looked at the objec t and, therefore, get encouragement and faith. The artists also invested greatly in naturalism and realism. For instance, they wanted images of people to appear more realistic. The images were solid and showed real emotions. This made the viewer to start thinking about what the people were feeling or thinking. Neoclassical, characteristics, and social conditions that led to the advent Neoclassical art refers to a form of art that was exceptionally unemotional and severe. Its rigidity was closely associated with the Baraque and Rocco styles. It was as a result of the renewed interest arising from the classical period. This was greatly beneficial to a number of revolutions. Romanticism emerged in the 1800s as a reaction to neoclassicism and some of the famous artists during this period included Robert Adam, Bertel Thorvaldsen, and Anton Rapheal Mengs.Advertising Looking for essay on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn M ore The key characteristics of the art works during the neoclassical period included stern heroism, lack of emotions, and seriousness. The artists often used sombre colors and brilliant highlights that portrayed self- sacrifice and self- denial. The neoclassical period had distinct features of the structure and form used during the classical art period. In addition, there was clarity and realism (Rachels Rachels, 2007). It is worth noting that similar to the renaissance period that had connections to the social situations and political structure, the neoclassical period had a direct connection to the political events. Neoclassism was linked to the French Revolution beliefs. Similarities and differences between neoclassical and renaissance art periods Whereas the artists during the neoclassical period aimed at recreating the classical art period, which was the Romans’ and Greeks’ style, the renaissance period was basically a rebirth. During the renaissance peri od, people started considering science as a way of answering questions and receiving information. Previously, only religion was used. The neoclassicists were in search of a simple way of thinking that was not chaotic. Continuation of the previous historical art period During the neoclassical period, artists wanted to bring about advancements as was the case during the neoclassical period (Rachels Rachels, 2007). During the two periods, there were great advancements in visual arts, music, painting, and architecture. In addition, the fame associated with artists during the renaissance period continued during the neoclassical period as a result of the artistic philosophies and ideologies experienced. Specific works During the renaissance period, Michelangelo came up with a masterpiece referred to as David. In addition, the Psyche Revised by Cupid’s Kiss was created by Antonio Canova. The renaissance art was represented by David through an impression of the political scenario th at prevailed. On the other hand, the Psyche Revised by Cupid’s Kiss was a depiction of the artist’s concentration on the classical arts and Romans (Rachels Rachels, 2007). Relationship between the works The two works of art discussed reflect huge artistic developments. Irrespective of the fact that the two periods were a representation of great advancing periods as far as art was concerned, the artists and art purposed on extremely varying things. During the renaissance period, artists focused on the political systems, social situations, and culture. The art was created from the social conditions that contributed to the political system in Europe. Hence, it is evident that the link between neoclassical and renaissance cannot be underrated.Advertising We will write a custom essay sample on Imaginations, Values, and Emotions specifically for you for only $16.05 $11/page Learn More References Rachels, J. Rachels, S. (2007). The elements of mora l philosophy (5th ed.). New York: McGraw-Hill.

Saturday, November 23, 2019

Huck, Tom, and Moral Fiber essays

Huck, Tom, and Moral Fiber essays The Adventures of Huckleberry Finn illustrates two young boys lives as they grow together, then apart. Through their shared experiences Huck and Tom remain friends, but once Huck goes out on his own, their very different experiences lead them to very different lives. Twain suggests moral character is only formed through experience. In the beginning, Huck and Tom are relatively similar in their experience and are typical for boys of their age and civilization. Huck follows Tom a lot because he believes Tom is smart from reading all of his books. Even though Huck follows Tom he is still independent and even rebuts Tom early on in the story. When we was ten foot off Tom whispered to me, and wanted to tie Jim to the tree for fun. But I said no; he might wake and make a disturbance, and then theyd find out I warnt in. Then Tom said he hadnt got candles enough, and he would slip in the kitchen and get some more. I didnt want him to try. I said Jim might wake up and come. But Tom wanted to resk it; so we slid in there and got three candles and Tom laid five cents on the table for pay. (15) From this passage you can conclude that Huck has a mind of his own, he just isnt willing to use it yet. Huck also has the intention of not being sivilized. Huck says that The Widow Douglas she took me for her son, and allowed she would sivilize me; but it was rough living in the house all the time, considering how dismal regular and decent the widow was in all her ways; and so when I couldnt stand it no longer I lit out. (11) Huck still has few ideas about the ways of his society, and already despises being civilized. Although Huck seems to have had these independent characteristics from the beginning, he goes along with Tom time and again because of his lack of experience. Huck desires Tom's companionship on the adventures throughout the book. The first time Huck wishes Tom ...

Thursday, November 21, 2019

Business law article Example | Topics and Well Written Essays - 500 words

Business law - Article Example For example, in Europe, a three week vacation is normal but workers in America are not keen in even taking a week off much less three week vacation. Employers however are encouraging tenured employees to take vacation by giving them incentives ranging from $750 to $1,000. The idea was to avoid being burned out at work and to reduce work related stress. Nobody will disagree that everybody needs to rest and have a break at some point. Studies have shown as indicated in the article that employees who unplugs from work reduces the risk of being burned out and reduces work related stress. But having a mandatory long break in a business setting where long breaks are not typically taken may have an adverse effect on the operations and bottom line of a business which is not desirable particularly at this time where companies are still in the process of recovery from a long period of recession during the 2008 financial crisis. Employees having long vacation will obviously leave the business understaffed and a business who is not used to being undermanned may have hard time adjusting and this may affect the company’s competitiveness. Having fewer tenured staffs around meant that the inexperienced employees have to step up and this could make the business under its optimal performance that could leave many customers dissatisfied thus undermining the competitiveness of the business. The timing of implementing sabbaticals or long vacation is also a suspect. It raises the question whether employers can actually afford giving its employees long vacation and to top it, with an incentive that goes with it. It is only recent that companies have recovered from the crisis and most companies may not yet that have deep reservoir of resources to send their employees on long vacation. The efficacy of the sabbatical program is also doubtful in American context who have the penchant of working long as â€Å"work martyr complex†

Wednesday, November 20, 2019

The Customer Analysis and Market Segmentation Essay

The Customer Analysis and Market Segmentation - Essay Example The study shows that producers need to create commodities on high demand thus, the need to make potential estimates. While marketing industrial grinding machinery, a marketer will have to make four decisions, which include; the pricing decisions, the product decisions, the placing decisions and the promotion decisions. Under the product decisions, the marketer will first have to decide on the quality, brand name, and functionality of the machinery. Depending on the potential estimates made and the potential customers being targeted, the standards set can be high or low. Marketers need to consider this because for instance; some brand names will appeal to some customers while to others they may not make any sense at all. The pricing decisions are highly critical since they determine the profit-making of the organization. The marketer should ensure that the price set is in accordance with the potential estimates made. Prices should not be exceptionally high since this may cause custome rs to shift to the competitors. In making this decision, marketers should evaluate the prices of other grinders in the market. The marketer also has to decide whether discounts will be issued on the machinery or not (Pride & Ferrell, 2011). Under the placing decisions, the marketer has to decide on the distribution of the grinding machinery. Depending on the potential estimates made concerning the market available, the marketer has to decide which places to distribute the product and which to be left idle. Transportation decisions also have to be considered, and the number of distribution channels. However, most distribution centers should be placed where a wide potential market has been identified. Promotion decisions include the various ways in which the marketer can market the product. Different marketers will use different strategies of marketing a product depending on its type. For instance, marketing grinding machinery would need a method such as personal selling to ensure tha t the customer is totally made aware of the product and its functioning. However, other methods of marketing such as advertising might leave some information about the product. 2) What is the relationship among market segmentation, target marketing, and positioning? What will happen to a company’s target marketing and positioning efforts if markets are incorrectly or not effectively/insightfully segmented? Market segmentation refers to the division of the customers of a product in different groups. Customers will mainly be divided depending on their needs, their characteristics and their financial ability. While segmenting the market, the marketer also has to consider the organization’s ability to satisfy all the segments and the competitive advantage of each segment. Other factors that have to be considered in evaluating the segmentation includes; the costs of the product and the sales estimates (Pride & Ferrell, 2011). Once the business has divided its market into di fferent segments, it then evaluates the potential gains of each market and then chooses which to concentrate on. This process is referred to as target marketing. The market chosen is then referred to as the target market.

Sunday, November 17, 2019

Identify and fully describe the main developments Essay Example for Free

Identify and fully describe the main developments Essay 1. Identify and fully describe the main developments of Operating Systems, giving examples of their origins and use. Batch Operating Systems were an early operating system available, and were first introduced in the mid 50s. They were designed to make human manual work easier; humans were replicating identical jobs over and over again, hence in batch. A batch operating system keeps itself eventful; it does this by taking jobs from a batch queue, instead of waiting for people to submit jobs. The jobs are then processed one or more at a time under control of the operating system, however most jobs undertaken in this operating system would be single-task. These type of operating system were often left to work overnight, mainly because the jobs were batched the next job in the queue would be commenced as soon as the previous job had been completed, this way of processing would allow for a large work load to be automatically completed without the requirement to wait and tell the computer to do the next job. Real Time Operating Systems (RTOS) are often embedded, meaning a integral part of a system inside another device. They have very little user interface capability. Real time operating systems like their name implies, respond to an input immediately. Real time operating systems are capable of processing data so quickly that the results are available to influence the activity currently taking place. [Computer Science 5th Edition, CS French, Ashford Press Gosport, 1996] Real time operating systems guarantee a certain capability within a specified time constraint; these time constraints are usually very rigid. If the system does not conform to this time limit, the system ultimately fails. They are used for various purposes; a few of these are medical equipment, industrial control systems and car computers. Parallel Systems have more than one processor to carry out a single job. The systems often carry out one single job using the resources of both processors of the machine; however some systems will have a processor dedicated to a single task. These operations work in parallel (side by side) of one another. Distributed Systems act as an illusion to a user. A multiple number of nodes are set up on a network, to allow data access or device sharing. This allows for other users of different machines to access data on another machine on the network. For example at college a student logs on to the machine, the machine seems local to the user, the user observes the system as using its own local drives and devices. However these Drives and devices are setup on a client-server machine but appear to be local to the user. Time Sharing Operating Systems allow multi-tasking, the operating system shares a slice of the processor resources to designated programs and users logged on to the system. For example, it is not unusual for a home user to have a word processing package, internet browser and a multimedia package to be open at the same time. Microsoft Windows is a great example for allowing this. Personal Computer Operating Systems were brought about in the early 70s. However it wasnt until the 1980s that they became popular, and the focus of the operating system changed from the hardware aspect, to that of the user interface (how the user observes the operating system). Personal Computer Systems are simply operating systems that share the processors resources for single users tasks. The main concept behind personal computer operating systems is the user interface. The workings are important; however the main principal is that the user is entirely interactive with the system. These are perhaps the most difficult for designers to produce, as a very high level knowledge of user interface design is required. This is to allow users of any level to use the system comfortably. It allows for considerable power for a single user to run high-tech graphics and multimedia packages. These operating systems evolved in to very capable systems, allowing for heavy multi-tasking usage. Examples of Personal Computer operating systems are as follows: Microsoft Windows Linux Apple Macintosh MAC OS 2. Identify and fully describe the main purposes of an operating system. All components of the operating system are required to be covered, to clearly show an understanding of what each component does and how they fit into the overall system design. Process Management Process management is a way of tracking processes and managing them in such a way that there is enough processor resources to correctly function. Process is another word for a task that is to be performed by the computer. Along with a process is a set of information about the particular process. The information required to track these processes are stored in a data package called a Process Control Block (PCB). The process control block contains the following information about a process:   An identification number that uniquely identifies the process Owner ID An identification of the user/device who the process belongs to   Priority A number to represent its priority to the system   Status What its current state is. This is 1 of 3 states (Ready, Waiting, Running). Units of Processor Time Used   Resources waiting for for example paper for the printer.   Link to Another PCB   Registers the registers the process has contents in. Process ID 239845 Owner ID Chris. Oliver Priority 25 Status Waiting Units of Processor Time Used 264 Resource waiting for Disks [printer] Link to another PCB Next PCB in wait Queue Registers Contents of registers when process last stopped running An example of a PCB is shown below: this is for a print job A Processes state is diagrammatically shown below, this shows state transition and how it works. A process can be in one of five states; these five states are as follows: State Definition HOLD A processs state at the beginning, this is when the devices and memory allocation size is decided. READY this state is when the process has been allocated all the resources required and is ready for being operated on by the computer RUNNING This state is when the process is in the CPU WAITING This is when the process stops because of an input or output waiting to be completed. The process is removed from the processor and is allocated this state. It is given this state until the input or output is given the all clear. FINISHED This is when the process has been finished, and all the devices used by the process have been released ready for the next process. Deadlocks Deadlocks occur when a multiple number of processes fight for very little resources available from the processor. For example one process has been granted the allocation of the modem, however is waiting for a text file, but process two has the text file and is waiting for the modem. In this instance each process will not gather the resources required because they have been allocated to another process, this is where a deadlock occurs. Process Management in an operating system has the job to destroy one of the processes to allow for one of the processes to be put in the ready queue. Scheduling Scheduling is a method in the operating system that allows processes to enter the ready queue allowing them to then take execution. The strategies used to take these processes and allow them to be ready for execution are as follows:   Process the maximum amount of jobs.   Sharing out processing time equally to users   Providing acceptable response times, this is in the form of not running intensive programs while users are logged on to the system. Keeping devices as busy as possible.   Attempting to gradually freeing up of processes, instead of crashing.   Avoid Deadlocking Scheduling is comprised of three sections: 1 Long Term Scheduling this is where processes are batched together, when the resources and space are free the process is then executed. This type of scheduling is used for jobs like heavy overnight print jobs. 2 Mid-Term Scheduling this is where a decision is made as to whether the processor is to busy for the amount of processes attempting to use it, the decision can be then fixed by terminating processes. When the system is free again the process can be re-executed. 3 Short Term Scheduling is a where the next process is selected from the ready queue; it uses algorithms to do this. Shortest burst time being the time spent running before the process will have to wait before an input or output operation. Shortest remaining time is the processes that have very little time left; this inevitably allows space for another process to execute. Priority scheduling a control that allow special circumstance processes to execute through the system quickly. Round robin limits the time a process is allowed to run before it is removed, it is then placed back in the ready queue. Memory Management Memory is an area in which data and instructions are stored. These operations must be managed by an operating system in order for the system to be stable and to run fluently. Memory management within an operating system must ensure that a process has enough memory to run, ensuring it does not go in to another processes slot as this causes corruption. This management is a way of protecting memory from becoming unstable. Memory management is also responsible for using the computers other memory sources effectively, to ensure programs run smoothly and effectively. This is handled by using virtual memory; using the hard disc drive as a temporary memory source for processes and data. This can benefit the user in various ways: The user is not rigidly restricted to space available. Using a large virtual memory space provides convenience for instances where large programs etc. are required to be stored in memory. Users are using less physical memory; therefore the system can handle more users on the system. High Speed Cache is a fast memory storage; cache predicts the data that the CPU may need next, it then retrieves it from RAM and places it in to the high speed cache, this speeds up system performance, as cache is a lot faster than RAM is in providing for the processor. The operating systems task is to control an even flow of the processes and decide where they should go practically, moving processes to the best location as the scheduler asks it to do so. This scheduler knows what process is next in line therefore can tell memory it is next and to move it to a suitable location for it to be quickly accessed. Paging Paging is a method used in operating systems to make a programs memory non-contiguous, in simple terms; allowing a program to be allocated to any memory location available. This is used when a bulk of data is bigger than the memory allocation it has been given; it firstly fills the memory allocation provided, and then stores the rest of the data in any space available in memory. This method of splitting the data is known as Fragmentation. This decreases system performance. Defragmentation To enhance the performance of the memory of a secondary storage medium, the operating system runs an operation called Defragmentation. Defragmentation is a process that sorts data in to a contiguous sequence. If a non-contiguous set of data is found, it will be relocated and stored as a whole. The image above is an illustration to show pictorially how a storage device could look in a data structure. As you can see fragmented files are scattered. If this data was attempted to be retrieved it would be slower feedback to the user as the data has been fragmented and would have to be found first. If data is to be found quickly and retrieved without a problem, the diagram below shows how a data structure should pictorially look. The image shows a contiguous data structure, with no fragmented files. This is the idea state for a system to be operated under. File and Disk Management TALK ABOUT HOW MEMORY IS STORED i. e. CONTIGIOUS Blocks of data are assigned in a complete row, using this method the files are simple to access. The space must be large enough to store all the data Files may become larger, therefore the space may be too small in the future, then it will need relocating (moved) This then causes fragmentation of the storage device. , NON CONTIGIOUS Files are recognised by operating systems and worked upon by using file extensions. A file consist of two parts, one being the unique name to the user, second being the file extension related to the program that runs that type of file. The operating system recognises exactly which program to open when the file is run. The way that files and data are managed, is critical to the performance of the computer and the security of the data. File management within an operating system provides a logical way for the user to observe there data, instead of having the complication of the physical implementation. Operating systems main job in this area is to ensure that data is stored and relocated correctly, as well as having the responsibility to process files, find space to store them, and to retrieve this data at any time. For example a . PDF file when run will be recognised by the operating system to be open in Adobe Acrobat Reader, providing the program is installed on the computer. An operating system can perform several different tasks towards files, they are as follows: Operation/Task Function Create finding space for it on storage medium, a new record made in directory Write Finds the file from directory and adds data to it. Read Finds the file then puts it in to memory and a read pointer is used to track where the next read place is to take place. In most operating systems however, a write pointer is held at this point, in-case the user intends to write to the file while reading Delete finds the file, then frees all space given to it, this is then erased from the computer Files are a collection of saved information that is stored on a type of storage medium for later retrieval. File attributes are the information related to the file, just like we have information related to ourselves, i. e. telephone number and home address. A files attributes are vital in order for the operating system to create a file structure system, it does this by using the attributes to sort the files in to some kind of order. For computer data files there are a set of minimum attributes related to them, they are as follows: Attribute Name Role Name an identifier to the user, in the form of a string of characters Type the type of file it is, this is important as different operating systems handle different types of files differently. Location Information held about where the file is stored, usually in the form of a path to it. e. g. C:\Documents and Settings\Chris\Assignment. doc. Size The size of the file (in bytes) e. g. 270kb. Protection Permissions to who can access the file. I. e. Read Only Date when the file was created, modified or accessed. Author the person the file was created and saved by. Directories Directories are a hierarchical way of separating these files; directories simply make it simpler for users to relocate the file at another time. The root is the top directory of a file system; the root is determined by the operating system. The root directory is usually the bootable device on a home computer system. Commonly C: Paths are a list of directories that the operating system goes through to find a run able file. For example: C:\windows\cdplayer. exe The operating system will go in to the root and then in to the directory Windows the file named cdplayer. exe will then be located and executed. Tree Structure are of a hierarchical nature, therefore the top level is the root of the directory and every other sub directory from which all other directories stem off. A Backslash is used to separate and indicate directories within directories (sub directories) Directories allow a method for the operating system to easy locate files. Volumes are a fixed amount of storage space allocated on a device. If a hard disc drive has two partitions set up, then it is said to have two volumes because it has two separate fixed storage spaces. Formatting a device in turn means to prepare it for read and write access. It does this by wiping all drive information that has been pre-set, it then tests each sector of the disc to ensure they are reliable enough for read and writing in and out of. File Allocation Techniques FAT (File Allocation Table) 32. Located on the storage device, basically holds the relevant information in a table, to find the data on the disk. its security does not measure up to that of NTFS and its filename size constraint is poor to that of NTFS. Searches from top to bottom when looking for a file. Contains the first block of each file on the disk, Requires a tremendous amount of space NTFS (New Technology File System) Used in Windows NT based operating systems Uses a similar table to that of FAT32 to keep track of file locations Looks at directory structure from the side to help speed up the location of files Uses Link Listed Allocation. Linked allocation creates inked lists using disk sectors as nodes. For example, if the sector size is 512 bytes, and it takes a 32 bit number to represent the next block address, then only 508 bytes can be used to store data (the other 4 bytes are used to locate the next file sector). This approach eliminates external fragmentation (since even the smallest block can now be used). Some problems with this approach are that seeking within a file is now difficult. For example, if were interested in the last 100 bytes of a 100mb file, we need to traverse all the sectors of the file (follow links) to get to the last 100 bytes. Another major issue is that we need to do a disk seek with every disk sector (unless disk sectors are contiguous). And yet another issue with this is that storing pointers on every disk sector uses up a lot of disk space. UNIX Used I-Nodes an indexed file allocation method. Its fast for small blocks of data and can accommodate extremely large volumes of data RAM Disk RAM disks are a temporary storage solution, data cannot be permanently saved, and data is lost on any type of system shut off. I. e. system reboots. A Random Access Memory disk is a segment of the main memory that is left for extra storage if required. This is otherwise known as a Virtual Drive. The main use for this area is that of performing operations to files, this is a better way of performing operations as the rate at which they can be performed on are that much higher than that of a physical drive. Size constraints are a major problem with RAM disks, as they are limited to that only of the RAM contained in the machine. For example in modern home computer systems 256mb of RAM is contained, therefore only 256megabyte of RAM disc can be used. 256mb in todays computing is very little in comparison to what users require. OS Services files, copy, delete, rename, view, find, backup Directories create, rename, list, delete Programming, Open, close, read, write, seek File allocation methods, FAT 32, NTFS, UNIX, Disk caching RAM disk Defragmentation I/O System Management DMA DMA takes control of the system by imitating the processor; it does this to enable itself to transfer data to and from the memory using the system bus. Buffering is required primarily because of the slow nature of I/O Device function. It is a way of smoothing out an I/O operation, Virtual Segmentation each process is divided in to slices (segments) non-resident Caching and Spooling of Input and output devices Drivers System Components ( CPU, RAM, System Bus, Local Buses, Device Controllers, Control Registers, Devices). IO response System (polling, interrupts, I/O, DMA Kernal Layers, Purpose, Device, Drivers, System calls Device Management Device management controls hardware resources; this includes the control over selection and operation of the devices used for input, output or storage. 2. Select an appropriate type of operating system for the following ICT needs, giving the choice of current operating systems [trade names]: a) Local council office department in charge of the collection, and distribution of council tax. b) A national car-rental agency, whose main computing centre is located in Sheffield, through which all of the daily transactions for the business are conducted. c) An electro-plating circuit board manufactures. d) A travelling company representative, who uses technology to keep in touch with his office. 3. Research and identify the different operating systems currently available for desktop computers. From your research and investigations of these operating systems you must critically evaluate them. This evaluation should clearly demonstrate your understanding of the differences found including and potential disadvantages. Bibliography http://www. cse. lehigh. edu/~glennb/um/book/c10os. htm http://dragon. acadiau. ca/~dbenoit/3713/slides/pdf/Week2. 1_History. pdf http://cne. gmu. edu/itcore/processes/Time. html http://www. netnam. vn/unescocourse/os/35. htm#3. 5. 3%20Virtual%20memory%20concept http://www. cs. aue. auc. dk/~akbar/ospdfiles/wschap7. PDF Books [Computer Science 5th Edition, CS French, Ashford Press Gosport, 1996].

Friday, November 15, 2019

Teens Essay -- essays research papers fc

In order insure America’s future, a national problem needs to addressed. Is America’s youth being educated in regards to preventing teenage pregnancy? Did you know that approximately every two minutes, a teenage girl in the United States gives birth (Guernsey 6)? While this fact may be sad and startling to most people, it is indeed the truth. Over the past few decades, the problem of teen pregnancy has grown considerably in this country. However, the most extensive dilemma regarding the issue of adolescent pregnancy is the incredibly important question of prevention. Preventing teen pregnancy includes such solutions as the availability of birth control, sexual education among children and adolescents, and a greater sense of support for pregnant teens. However, before society can begin to successfully prevent pregnancies among teenage girls, the underlying causes and facts about the dilemma must first be exposed.   Ã‚  Ã‚  Ã‚  Ã‚  Eighty-five percent of the teenage girls who become pregnant every year do not plan their pregnancies; an alarming fifteen- percent of these pregnancies is, in fact, intentional (Ayer 107). Some girls are under the false pretenses that having a baby will provide them with a certain amount of love that is currently missing in their lives. Many also believe that with this new life they have helped create will come a renewed sense of hope (107). These incentives reflect emotional problems that will not be solved by becoming pregnant, but will only get worse. In addition, a considerable amount of girls become pregnant as a secret plan to hold on to their boyfriends (Guernsey 37). They assume that by giving birth to their boyfriends’ babies, he will stick around longer and the relationship will improve as a result. However, the reality is that if a relationship is not strong enough to survive on its own, the presence of a baby will simply make it much more diffi cult.   Ã‚  Ã‚  Ã‚  Ã‚  There are several myths surrounding teen and adolescent pregnancy. Many of these myths are misunderstandings that many teenagers have, regarding sexual activity and pregnancy. A common deception among teens is that it is impossible to impregnate someone, or become pregnant the first time they have sex. Not only is this extremely false, it just so happens that approximately one out of twenty girls becomes pregnant the first time s... ...as moral and emotional dilemmas.   Ã‚  Ã‚  Ã‚  Ã‚  By targeting males, many believe that the rate of teen pregnancy will drop considerably. Those involved with the prevention of teenage pregnancy are optimistic that the rate in pregnancy will decrease among teenagers. This is a battle being fought not only by teenage parents, but also by society as a whole. It is important that all children are educated thoroughly about teen pregnancy and then they can therefore make proper decisions regarding this issue. With the growing concern for teenage mothers and their babies, it appears that people have finally begun to take note of the problem and are doing what they can, in their own way, to further prevent pregnancies among teenagers. Reaching to America’s teen in regards to the prevention of pregnancies will is one means of in suring America’s future.   Ã‚  Ã‚  Ã‚  Ã‚   Works Cited Everything You Need To Know about Teen Fatherhood. Ayer, Eleanor H. New York: The Rosen Publishing Group, 1993. Bell, Alison. â€Å"Pregnant on Purpose.† Teen August 1997: 106-108. Guernsey, JoAnn Bren. The Facts about Teen Pregnancy. New York: Crestwood House, 1989. Harris, Yvette R.

Tuesday, November 12, 2019

Witchcraft During the Renaissance

Accompanying and following the Renaissance â€Å"rebirth† during the fourteenth through sixteenth centuries and supplementing the Protestant and Catholic Reformations, the persecution of individuals as witches in Europe reached its zenith during the sixteenth century. Countless people, women and men alike, were accused of witchcraft, although this scale was tipped significantly toward poor, old women whose husbands’ had low wage work. The notion of witchcraft appealed to and was possible at the time to the general public because such occurrences as â€Å"mysterious disappearances† or â€Å"Satanic luck† necessitated explanations.These events were thus attributed to â€Å"servants of the Devil,† or witches, who were supposedly possessed to bend to Satan’s will as stated my Luther. Luther’s bias was towards the bible because he was a religious leader; therefor he believed what it said, which was that witches existed. Many accused witches were tortured until they either admitted, like Walpurga Hausmannin, or were killed from torture. Hausmannin’s bias was towards women because she was one, and she was very skeptical towards all the women being killed.No one was safe, as even mayors councilors and associate judges were persecuted. The witch-hunting excitement of the period resulted from religious, individual, societal, and sociological fears and interests prevalent during the time frame. First, highly influential religious individuals like Luther, Calvin, and the pope form a group of people who played a major role in promoting the belief of witchcraft among the people. Pope Innocent VIII, for example, willingly accepted the concept of witchcraft and even fully supported the persecution of witches.His bias was also towards the Bible. As a religious leader, the Pope wholeheartedly believed that individuals â€Å"give themselves over to devils† and, as a servant of God, was obliged to purge the world of th em. The notable Protestant leaders Martin Luther and John Calvin shared this identical perspective. Luther stresses that the â€Å"Devil’s whores† exist to cause chaos and disruption in God’s world. As he strictly upheld the status quo, Luther would have used the convenient explanation that the poor laborers were more likened to turn to witchcraft.Calvin, on the other hand, compares the problem of witchcraft to that of waging â€Å"war against an infinite number of enemies†. Calvin, as an advocate of an organization adjoining religion and state, naturally views the campaign against witches as war. Clergy, influenced by these religious leaders, recorded any slightly suspicious activity as supernatural and Satanic. Since the majority of Europe was Catholic or some form of Protestant during the time, the people looked up to their respective leaders for â€Å"truth. As popes, Luther, and Calvin professed the existence of witchcraft, the people did as well. H owever, other individuals persecuted witches for purely individual or societal interests. The witch-hunting movement was promoted and effectively advertised by those who would gain from the persecution, namely the â€Å"notaries, copyists, and innkeepers†¦executioner†. According to the account, anyone could be put to trial or torture with the slightest provocation. As a result, the individuals who gained some form of wealth from the persecution supported it.Judges gained support from the people for charging individuals with witchcraft. The demographic aspects of accused witches show that women were much more likely to be persecuted as a consequence of gender biases toward the â€Å"impurity† and â€Å"imperfection† of the feminine sex in the group. The authors of are Dominican monks attempting to clarify the reasons for which women are witches. Although John Wier is skeptical towards the idea of witchcraft, his views sustain the fact that old women’s physical state led to their increased chance of persecution.The most important reason why numerous individuals were branded and persecuted as witches during the late fifteenth through seventeenth centuries was probably as a convenient sociological reason for unexplained occurrences. Any unusual event would cause mass hysteria (Doc B5), and as the people could not directly punish the devils for it, they would be satisfied to reprimand the devils’ servants, the witches, since there could be no other reasonable rationalization.The composition of poems regarding witchcraft shows that it played a prominent role in the life of an ordinary person. It also subtly encourages readers not to fall under possession by resisting Satan’s attempts to control them. John Weir also indicates that the public, including some scientists, passionately favors witch persecution. In late seventeenth-century America, several girls’ witch accusations in Salem, Massachusetts caused two yea rs of witch fear illustrating the common fear of spiritual evils.

Sunday, November 10, 2019

American Writers Essay

ENG 4U1 – Film and Literature Comparative ISP Choose your ISP Topic below. For that topic, you must choose one corresponding film and one corresponding novel from the list below. You will then work towards completing a comparative analysis of the two chosen works. The steps of the ISP are as follows: U1A5 – Statement of Intent/ISP Proposal U2A6 – ISP Progress Report #1 (here you will review your ISP novel) U4A1 – ISP Annotated Bibliography U5A1 – ISP Progress Report #2 (here you will review your ISP film) U5A2 – ISP Thesis/Outline U5A4 – Final ISP Essay. ISP TOPICS FILM CHOICES NOVEL CHOICES Personal Liberation/Redemption Gran Torino Rocky Balboa Albert Camus, The Outsider Carol Shields, The Stone Diaries Ernest Gaines, A Lesson Before Dying Ian McEwan, Atonement Jane Urqhart, The Stone Carvers John Irving, A Prayer For Owen Meany Khaled Hosseini, The Kite Runner Margaret Atwood, Surfacing Margaret Laurence, The Stone Angel Miriam Toews, A Complicated Kindness Oscar Wilde, A Picture of Dorian Gray Roberston Davis, Fifth Business Walter Lamb, She’s Come Undone Destructive Nature of Dreams American Gangster. There Will Be Blood Brian Moore, The Passion of Judith Hearne F. Scott Fitzgerald, The Great Gatsby John Steinbeck, The Pearl John Steinbeck, Of Mice and Men Mordechai Richler, The Apprenticeship of Duddy Kravitz Toni Morrison, The Bluest Eye Utopia/Direction of the Future Children of Men The Road Aldous Huxley, Brave New World Anthony Burgess, A Clockwork Orange Cormac McCarthy, The Road George Orwell, 1984 Margaret Atwood, Oryx and Crake Margaret Atwood, A Handmaid’s Tale Ray Bradbury, Fahrenheit 451 Journey Motif Rain Man Motorcycle Diaries  A. Manette Ansay, Vingear Hill Arundhati Roy, The God of Small Things Betty Smith, A Tree Grows in Brooklyn Cormac McCarthy, The Road John Steinbeck, The Pearl Khaled Hosseini A Thousand Splendid Suns Khaled Hosseini, The Kite Runner Kim Edwards, The Memory Keeper’s Daughter Marina Nemat, The Prisoner of Tehran Paolo Coehlo, The Alchemist Salman Rushdie, Satanic Verses Sue Monk Kidd, The Secret Life of Bees William Faulkner, As I Lay Dying Destructive Nature of War Avatar The Hurt Locker Anne Michaels, Fugitive Pieces Denis Brock, The Ash Garden. Elie Wiesel, Night Ian McEwan, Atonement Joseph Boyden, Three Day Road Joseph Keller, Catch-22 Joy Kogawa, Obasan Laura Esquivel, Like Water For Chocolate Markus Zusak, The Book Thief Pat Barker, The Ghost Road Timothy Findley, The Wars Non-Conformist Hero Juno Iron Man Anthony Burgess, A Clockwork Orange J. D, Salinger, The Catcher in The Rye John Irving, A Prayer For Owen Meany Joyce Carol Oates, Foxfire Ken Kesey, One Flew Over The Cuckoo’s Nest Kim Edwards, The Memory Keeper’s Daughter Mark Haddon, The Curious Incident of the Dog in  the Nighttime Miriam Toews, A Complicated Kindness Roddy Doyle. A Star Called Henry Sue Monk Kidd, The Secret Life of Bees Immigrant Experience Lost in Translation In America Anne Michaels, Fugitive Pieces Barbara Kingsolver, The Poisonwood Bible Brian Moore, The Luck of Ginger Coffey Frank McCourt, Angela’s Ashes Jane Urquhart, The Stone Carvers Joy Kowaga, Obasan Margaret Laurence, The Diviners Michael Ondaatje, In the Skin of a Lion Mistry Rohinton, A Fine Balance Nino Ricci, Lives of the Saints Role of Women Revolutionary Road An Education. Alice Walker, The Colour Purple Anita Diamant, The Red Tent Anne Marie MacDonald, Fall On Your Knees Arthur Golden, Memoirs of a Geisha Barbara Kingsolver, The Poisonwood Bible Bernhard Schlink, The Reader Frank McCourt, Angela’s Ashes Khaled Hosseini A Thousand Splendid Suns Kim Edwards, The Memory Keeper’s Daughter Margaret Atwood, The Edible Woman Margaret Atwood, The Handmaid’s Tale Miriam Toews, A Complicated Kindness Sue Monk Kidd, The Secret Life of Bees Tennessee Williams, A Streetcar Named Desire Toni Morrison, The Bluest Eye Wally Lamb, She’s Come Undone.

Friday, November 8, 2019

Cell Phone essays

Cell Phone essays The Development of Cellular Telephones Have you ever stopped to think what it would was like before we had cell phones? You couldnt just call from your car if you were running late for work, in a wreck, or trying to find directions. Technology is increasing day by day, and going to do nothing but get bigger. With every new bit of technology we get, there are always good and bad to come. Finding these problems is what makes technology interesting. Since a cellular telephone is really a two way radio, you can start tracking cell phone history back to 1876 with the invention of the telephone by Alexander Graham Bell(********). In addition, to the telephone there had to be another part this is where the radio invented by Guglielmo Marconi came in 1895(********). A cell phone uses up two frequencies, one for sending your voice out and one which allows one to come in. This is why cell phones are considered two way radios, or full-duplex devices(******) this way more than one person can communicate at a time, instead of a half-duplex for instance a walkie-talkie which only allows one person to talk at a time(******). It was not until 1984 that cell phones were first mass marketed to the public (*notes*). This was a boom in technology as it still continues to rise. Any time any where you could call who ever, where ever you wished. Many service providers used wireless plans. This allowed you to have certain minutes, and ranges whic h you could travel with your phone before roaming. The more you paid the better your plan you could receive. Any time you went over your minutes or out of your area of range they stuck it to you, and it appeared on your bill. As technology grows spontaneously new and improved ideas come out. At the beginning cell phones where very bulky and not many people had them, mostly just the people who had money to blow. Now days you can get a phone that can fit into the palm of your hand, and every one ...

Tuesday, November 5, 2019

Vaccination and Baccalaureate

Vaccination and Baccalaureate Vaccination and Baccalaureate Vaccination and Baccalaureate By Maeve Maddox I wanted to call this post Cows and College Graduates, but blog titles must be plain and to the point. Warning: This is something of a shaggy dog story, so if youre the impatient type, you may want to skip this post. Vaccination The Latin word for cow is vacca. When Edward Jenner was looking for a way to prevent smallpox (variola), he worked with the less deadly disease cowpox (variolae vaccinae). Variola is from Latin varius, spotted, or varus, pimple. Vaccinae is from Latin vaccinus, from cows. Jenner coined the word vaccination for his technique of scratching cowpox virus into the skin. Survivors of cowpox were immune to smallpox. Baccalaureate The word baccalaureate comes from Medieval Latin baccalaureus, student with a first degree. Baccalaureate is related to the English word bachelor. Indeed, we refer to a B.A. (Artium Baccalaureus) as a bachelors degree. At the end of the 13th century, a bachelor was a young man in training for knighthood. Although one conjecture is that bachelor derives from Latin baculum, stick, because squires practiced with staves instead of swords, the more likely source is Medieval baccalarius, vassal farmer. Baccalarius derived from baccalia, a herd of cows. Bacca was a Low Latin variant of vacca, cow. A baccalaria was originally a grazing farm and a baccalarius a cowherd or cowboy. In the 14th century the meaning of bachelor evolved from knight in training to junior member of a guild or university. In time, because young men still pursuing their educations couldnt affordin terms of time or moneyto marry, bachelor took on the meaning of unmarried man. The -larius of baccalarius became the -laureus of baccalaureus by way of folk etymology. Before schools adopted the practice of awarding cheesy plastic trophies, academic achievement was honored by the bestowal of a crown of laurel leaves. Laurel berries in Latin is bacca lauri. Ergo, rustic baccalarius became classy baccalaureus and the cow connection was no more. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Among vs. AmongstCharles's Pen and Jesus' Name

Sunday, November 3, 2019

Higher Education in Qatar Research Paper Example | Topics and Well Written Essays - 2000 words

Higher Education in Qatar - Research Paper Example The Sheik is a capable man eager to set the state in continuous motion of self-independence and sustainability in the future should the oil and gas become extinct. In this case, the generation thus created will be able to stand on its feet and enhance innovation through education (Fromherz, 2012). Not only is this the main factor and project, but also the principal transformation through policies geared to motivate research and technology in production sectors. The country being limited by the amount of rainfall cannot thus depend on agriculture, but has come up to be a rich mine of the gas and oil which are the main sources of per capita income and which has now been used to better the education sector in order to raise a generation that can fend for itself in the near future. Qatar National Development Strategy 2011-2016 was implemented towards the achievement of Qatar National Vision 2030. The Vision aims to create sustainable economic prosperity, promote human development, creati ng a sound social development and sustaining the environment for future generations (Zellman, 2007). The national strategy is one of the key issues that take into consideration the cultural and religious values of the state with an overall mission of providing a balanced and sustainable growth by the year 2030 (Davis, 2012). Among the key elements that the government factored to be used as a tool for sustainable development was education which was to be made available to all citizen and foreigners cheaply (Boys, 2011). To achieve continuous modernization requires the development of the education system and public institutions which aim at providing quality management and services to the general... Qatar National Development Strategy 2011-2016 was implemented towards the achievement of Qatar National Vision 2030. The Vision aims to create sustainable economic prosperity, promote human development, creating a sound social development and sustaining the environment for future generations (Zellman, 2007). The national strategy is one of the key issues that take into consideration the cultural and religious values of the state with an overall mission of providing a balanced and sustainable growth by the year 2030(Davis, 2012).Among the key elements that the government factored to be used as a tool for sustainable development was education which was to be made available to all citizen and foreigners cheaply(Boys, 2011). To achieve continuous modernization requires the development of the education system and public institutions which aim at providing quality management and services to the general public. The aim of the National Strategy is also to highlight the key areas to address t he position of the state in global economic trends and clearly state the roles to be played to enhance both regional and international levels of production. Chapter four of the strategy provides for the human development and highlights the critical issues with regard to education. The main focus here is to realize Qatar National Vision 2030 for education and training, addressing education issues, improving K-12 general education, enhancing higher education, as well as scientific research.

Friday, November 1, 2019

Business Company Analysis Research Paper Example | Topics and Well Written Essays - 3250 words

Business Company Analysis - Research Paper Example Assigning equal weights to each of these external factors, and arriving at the mobiles long-term prospects/evolution as the most important external factor, to which Google has responded with stunning success, based on the brilliant success of Android up to this point. We assign scores of 3 each for the Microsoft and Facebook threats, given that the Google response is credible, but has room for improvement, especially with regard to the threat of Facebook eating into Googles advertising revenues. This latter threat is low at present, given that Googles revenues continue to remain healthy, and promises to remain healthy with the excellent prospects for mobile and Googles substantial stake in mobile via Android. The rating is 4 for the long-term mobile evolution factor. This puts the EFE rating for Google at High, or between 3 and 4 (Kelleher; Paul; Enderle; Coldewey; Fletcher; Foreign Writer; Google Finance; Reuters; CrunchBase; Yahoo!; MarketWatch; Porter). Looking at the IFE matrix, on the other hand, the continuing weakness at Motorola Mobility threatens to weigh down Google moving forward, and this can be rated as a major weakness on the part of Google. This is given the substantial weighting in the IFE, even as its overall revenues is dwarfed by Googles revenues in advertising, and its profits or losses likewise are small in comparison to the profits of Google overall. This is a key consideration for the weighting of the weakness, whereas its core strengths in search and in mobile are very formidable to the point of being almost unassailable at present. Given this, we assign the weights of 70 percent for search, 20 percent for mobile via Android, and 10 percent for Motorola mobility as a key weakness. Rating the first two as 4, and the Motorola mobility weakness as 1, for major weakness, we get a total IFE rating of between 3 and 4 (Kelleher; Paul; Enderle; Coldewey; Fletcher; Foreign Writer; Google Finance; Reuters; CrunchBase; Ya hoo!;