Thursday, December 26, 2019

Air Pollution and Human Health - 574 Words

Air pollution has become a big problem to our environment and human health. Air pollution are certain gases and aerosols in the atmosphere that have harmful effects. (Wright Boorse, 2014) These pollutions can be put into our air in many different ways. Air pollution is cause by both human and natural actions. Some natural actions are things like volcanic eruptions, radioactivity, forest fires, or even evaporation of organic compounds. Some human activities are things like industries and manufacturing, burning fossil fuels, fumes from cars, and household and farming chemicals. What are the different types of air pollution? How does each type affect human health and the environment? And what are some ways to control air pollution? are the questions that I needed answered. There are many different types of air pollution. These types are broking down into two categories, primary and secondary. The primary pollution consists of seven major air pollutants that are the direct products of combustion and evaporation. Primary air pollutions are pollutants released directly into the atmosphere, mainly as a result of burning fuels and wastes, as opposed to secondary air pollutants. The first primary pollution is Suspended particulate matter, (PM). This pollution affects the human health and the environment by reducing the lung function and it affects respiration. The second pollution is Volatile organic compounds (VOC). This pollution affects human health and the environment by theShow MoreRelatedEffects Of Air Pollution On Human Health1319 Words   |  6 PagesCareful What You Breathe In: Effects of Air Pollution on Human Health The idea that we, as a global community, are destroying the very earth we commonly share is something that takes time for people to fully understand. It takes research and a open mind to be knowledgeable about the environmental issues the human race is causing to planet earth, as well as the issues that it is causes to our personal health. Air pollution is a large problem that exists in the United States. However, the challengeRead MoreThe Effects Of Air Pollution On Human Health1874 Words   |  8 PagesAIR POLLUTION Do you know 3.3 million people die each year due to air pollution? According to Borenstein, â€Å"Air pollution kills more than HIV and malaria combined.† Both of these diseases have caused worry from many people. How come people do not seem as worried about air pollution? In a study conducted by Harvard University, they found that â€Å"the yearly death total will double to about 6.6 million a year by 2050† because of air pollution. Something needs to be done in order to control air pollutionRead MoreThe Effects Of Air Pollution On Human Health850 Words   |  4 Pagesincreasing, so does pollution. The debate associated with this contamination on the environment has to do with how much should be done to stop pollution, and whether or not this is a serious enough issue to be concerned with. Well, this issue should disturb people. The most frightening point about it is that these poisonous impurities infect the Earth in multiple forms, including air pollution and water pollution. The value of Earth is incomparable, and the presence of pollution devaluing it needsRead MoreThe Effects Of Air Pollution On Human Health Essay1381 Words   |  6 PagesObjectives 1. To establish the definition of air pollution and pollutants and determine their chemical nature. 2. To identify the causes of Air pollution 3. To define air pollution in India with respect to law as stated in the Indian Constitution. 4. To describe the Supreme Court interjection due to Delhi’s pollution and its results. 5. To assess the air pollution level in Delhi and compare the levels before and after Diwali 6. To find the level of pollution caused by different sources and the data supportingRead MoreThe Effects Of Air Pollution On Human Health And / Or The Environment Essay1780 Words   |  8 PagesAir pollution refers to a â€Å"broad range of contaminates† (Brimblecombe Atkins, 2013, p.20) found in the atmosphere that are harmful to human health and/or the environment. While air pollution can, at its most simplistic, be defined as â€Å"any input of chemical, aerosol, or particulate† (Blauvelt Gates, 2011, p. 17) found to be deleterious and airborne, the term can be subdivided in many ways by source, components, and mode of formation. (Blauvelt Gates, 2011, p. 17) Typically, an essential distinctionRead MoreHuman Health Problems Caused By Air Pollution1796 Words   |  8 PagesNext, there are human health problems caused by air pollution from the burning of coal and oil. Air pollution can cause long-term damage including many diseases and a range of short-term respiratory symptoms, such as coughing, throat irritation, wheezing, chest tightness, and shortness of breath. Children, seniors, and asthmatics are most vulnerable to this air pollution. Miners, especially, are prone to black lung disease. Another cost of fossil fuels includes damage to land from coal mining. ItRead MoreThe Effects Of Air Pollution On Human Health And Quality Of Life965 Words   |  4 PagesAir is the ocean we breathe. Air supplies us with oxygen which is essential for our bodies to live. It is the most essential element for all living organisms and yet, most humans play a big role on polluting this essential resource and this means air pollution occurs. According to the Geoplanet.org, air pollution is the addition of harmful substances to the atmosphere resulting in damage to the environment, human health and quality ofRead MoreEffects Of Outdoor Air Pollution And Its Effects On Human Health1405 Words   |  6 Pagespoor air quality due to outdoor air pollution and its’ effects on human health. I have examined numerous documents, learning about the anthropogenic causes of the air pollution in addition to studying the hazards the c ontaminated air presents to the public, particularly in urban areas. I have created a policy that I believe directly addresses the current needs of the atmosphere in order to continue to reduce the amount of pollution in the air we breathe, in turn improving our overall health. LookingRead MoreAir Pollution1499 Words   |  6 PagesAir Pollution emissions have been a leading threat to the world, as the world has become more and more industrialized over the past century. However, many fail to realize the threat that air pollution emissions pose to human health. As humans continue to buy gasoline for the excessive amount of cars that are driven on a daily basis, create waste from factories, using coal and biomass fuels to power their daily lives, they will continue to put their own health at risk. China, a developing countryRead MoreEffects Of Population Pollution Essay1464 Words   |  6 Pagesnegative impacts on the environment. Each day the air around us is becoming more polluted as the amount of carbon dioxide emitted into the atmosphere caused by human activities increases each day. As population continues to gradually increase, it is causing harmful effects in terms of air pollution. An increase in the number of people directly varies with the polluti on that is emitted into the environment. Moreso, the human population is polluting the air due to the use of vehicles such as cars, trucks

Tuesday, December 17, 2019

Terrorists in the 1972 Munich Olympic Games - 1241 Words

On September fifth, 1972, the terrorist group, Black September, took nine Israeli athletes hostage during the 1972 Munich Olympic Games. Black September was a small group of Palestinian militants, almost unknown to the world before the Munich Games. The group belonged to the PLO, or the Palestinian Liberation Organization. The origin of Black September’s anger goes back to the long-lasting conflict between the Palestinians and the Israelis, which dates back thousands of years . Black September had one purpose for the attack: they wanted to televise the event to bring more attention to the Palestinian-Israeli conflict. The Black September terrorist group used the attacks on the Israeli athletes as well as the constant media at the 1972 Munich Olympics, to bring attention to the Palestinians wrongful treatment during the Palestinian-Israeli conflict. There has been an unsettling conflict between the Israelis and the Palestinians for many years. The two territories of Israel and Palestine were originally ruled by Britain, but because of many disputes and fights, the United Nations passed the UN Partition Plan in 1947. This plan suggested that the two territories of Israel and Palestine would be turned into separate countries. The Arabs loathed this idea because they got less land, but the Israelis loved it, for they received much more territory. In this spring of 1948, the United Nations declared the creation of Israel, in result, many countries in the Middle East wereShow MoreRelatedThe Events That Occurred At The 1972 Olympics1614 Words   |  7 Pages1972 Munich Summer Olympic Games The events that occurred at the 1972 Olympics were the result of a long conflict between Palestinian Arabs and Israeli Jews dating to the end of the nineteenth century. Although the two groups have different religions (Palestinians include Muslims, Christians and Druze), religious differences are not the cause of the strife. The conflict began as a struggle over land. From the end of World War I until 1948, the area that both groups claimed was known internationallyRead MoreOlympic Games And Its Impact On Society1494 Words   |  6 Pagesbillions of people. No one sporting event is greater than the Summer Olympic games, for it brings together athletes from all across the globe to compete and represent their respected nations. Winning an Olympic gold medal can create a widespread feeling of patriotism and unite a nation. Unfortunately, the events of the 1972 Olympic Games were a catastrophic disaster. Consequently, the following will reveal the 1972 Munich Summer Olympic Games trage dy and the ramifications of its build up, the event, andRead MoreThe Federal Republic Of Germany1248 Words   |  5 Pagesoptimism, but was equally marked by national and international debate and dispute. The symbolic potential of the Games did not escape the Munich organizers who took just one month in 1965 to secure promises of funding from the city of Munich, the Bavarian State and the Federal Government. Hosting the Games was deemed to be of immense importance. As Chancellor Willy Brandt said, â€Å"Munich 1972 was to serve as a showcase of modern Germany†, a chance to replace memories of the Third Reich with images ofRead MoreThe World Shook With Terror1593 Words   |  7 Pageswith terror September 5, 1972, when a group of eight Palestinian terrorists killed two Israeli Olympic team members and took nine hostage, during the 1972 Summer Olympics in Munich, Germany. Prior to the hostage crisis, the games had run smoothly and were into their second week of competition . The games were used to present a new identity of democracy and optimism for Germany. This was the first-time Germany had been allowed to host the games since the 1936 Berlin Olympics, which still loomed in internationalRead More1972 Munich Olympics Essay1578 Words   |  7 Pagesthat are providing coverage of events around the world? Do news sources invest time and work into their reports, or do they release reports teeming with bias and unproven facts solely for money and satisfactory ratings? The massacre at the 1972 Munich Olympics shocked the world and its citizens, and newspapers responded by producing a variety of biased reports of coverage from the attack and its aftermath. After evaluating news releases from the left-leaning New York Times, the centrist Trenton EveningRead MoreTerrorism in the Olympics Essay1151 Words   |  5 Pagesin the Olympics Security is a fundamental notion in sports. Nowadays athletes are viewed often through the media, therefore they are recognizable. In the Olympics security measures must be taken to protect the athletes. There are many different nationalities involved therefore security has to be taken in order to ensure that there arent conflicting views that could possibly be damaging towards another team. But quite often it cannot be prevented. On the morning of September 5, 1972, the membersRead More The Olympic Games in Munich of 1972 Essay1617 Words   |  7 Pagespolitical, religious or racial propaganda is permitted in any Olympic sites, venues or other areas† (Advertising, Demonstrations, Propaganda* 98). This rule shows just what the Germans were hoping for, a peaceful, passive, war-free environment in which countries can get together and compete. Although we all know that quite the antithesis was upon the 1972 Olympics in Munich between September the fifth and September the sixth. The Munich Massacre, one of the worst massacres of all time, was drivenRead More Terrorism In The Olympics Essay1139 Words   |  5 PagesSecurity in the Olympics Security is a fundamental notion in sports. Nowadays athletes are viewed often through the media, therefore they are recognizable. In the Olympics security measures must be taken to protect the athletes. There are many different nationalities involved therefore security has to be taken in order to ensure that there aren’t conflicting views that could possibly be damaging towards another team. But quite often it cannot be prevented. On the morning of September 5, 1972, the membersRead MoreThe 1972 Summer Olympics in Munich Essay1719 Words   |  7 PagesThe 1972 Summer Olympics were an international multi-sport event. Another name for that Olympic Game was the 1972 Olympics Massacre. It was the 20th Olympic Games. It was held in Munich, Germany from August 26, 1972 to September 11, 1972.The 1972 Olympics were the second Olympics to be held in Germany. The first Olympic Games that were held in Germany occur in 1936 in Berlin, which occurred during the Nazi regime. The Olympic Committee in West Germany was hoping to get rid of the military image ofRead MoreMunich Massacre6185 Words   |  25 PagesRESEARCH PROPOSAL Name: Nick Karvountzis Date: 10/5/09 Topic: 1972 Munich Olympic Massacre Area of Investigation: Outline the main historical debates, perspectives or interpretations you will be discussing Discuss the role that West-German authorities played during the 1972 Munich Olympic crisis, specifically addressing their preparation prior to Black September’s terrorist, as well as their consequent actions and decisions made during the crisis. Primarily, assess whether criticisms of

Monday, December 9, 2019

OS category Management

Question: à ¢Ã¢â‚¬â€Ã‚ ¾ Based on the systems overview, identify and describe at least 3 security tools for each OS category (UNIX, open source, and Windows) that can be used at the operating system level to protect the systems, users, and data from security threats. Answer: Introduction The use of computer is consistently increasing in this modern era; the computer has great impact on every sphere of human life. In daily life, in business and in education the computer is massively used. With the ever increasing use of computer, the essentiality of proper security of the computer, the information and data within the computer is increasing (Bott and Siechert, 2002). As there are several different types of computer viruses present, and new viruses are developing constantly by the virus programmers; therefore the security of computer become foremost important. Beside this, the hacking activities are also increasing in these days as the hackers are hugely proactive in present scenario and the hackers used to theft the necessary information and data. Therefore, many sophisticated security tools are developed, for the example: firewalls, intrusion detection system, virtual private networks etc. Apart from this, the security for the operating system is most crucial and the security tools of the operating system are the most significant security components for the overall security programme. As the company AA currently using Windows, Unix and open source operating system the company has significant security threat and the security practitioner must select the correct tools to minimize the security risk (Calder, 2008). The operating system is mainly the foundation for the other software, which runs on a computer machine. Thus the security for the operating system is one of the most important aspects and one of the most significant challenges for the security practitioner. Security system for Unix The UNIX is typical operating system, which is generally made up of three essential parts, which are kernel, shell and the program. Kernel of UNIX is considered to be the primary hub of the operating system, which helps to properly allocate and distribute the time and the memory to the program, and systematically handle the overall file storage parts and core communication with the proper response to the overall system call (Wood and Kochan, 1985). On the other hand, shell clearly response at the core interface between the kernel and the users. UNIX provides multiuser operating system, which help to provide the protection to the several users and help to enable the overall protection of the core system services from the key users. UNIX system security is primarily divided into three main core areas out of which two account security and network security are considered primary as these are related with restricting the unauthorised user from getting the authorised access. The third and the most significant areas of the concern related to the security of the UNIX is the file security system which help to restrict the unauthorized access either with the help of authorised person or with the help of crackers to gain the access of the stored data in the system (Chen and Gong, 2012). Physical security is often considered to one the internal security, which is frequently, overlooked which make the security more vulnerable for someone to get the access of the authorized data and files. This is the one of the most basic and simple types of security, which is required to be implemented and should be taken care and included on the security plan. Console security is considered one of the most significant part of the security of the UNIX. Machine and console are required to be secure as any unauthorised person can get the access of the authorised document and file. For the particular reason the computer and related console should be kept on the core secure room. The security system of UNIX is systematically divided into different parts according to the function of the users. Each user contain their significant set of files which provide platform for the overall operation which eventually help to express who else can have the access (Duffy, 2003). Hence, all the users core process run according to the users. System on the other hand own a group or a set of key files which help the root users to proper defined the system core principal and grant the overall access of different significant thing which eventually help to provide a key secure environment. Core users can properly invoke the overall system services, which are required to switch the root users. Data security is one of the major issue as the companies that are concerned with data and value the data required a clearly and precise backup recovery plan (Farrokhi, Bogorodskiy and Pradeep, 2008). One of the most simple and basic step to get the access of the companies data and file is the back tapes which are required to be safe, therefore all the sensitive and authorised data of the company should be locked in a cabinet . Security system for Open source The security practitioners face a significant threat in process of protecting the computers from the open sources. The security practitioner must have the adequate security skill so that they can protect the computer from the unauthorised programs, viruses and hackers (Harrington, 2007). In order to protect the computers the security practitioners have to establish few basic defences for protecting the network from the outsider and then come the ensuring of the security of the servers and the inside part of the network. Owing to this, the security practitioners have to build a firewall system for the internet connection. For this purpose, there should be necessary configuration, which allows the machine connection only from the internal network (Howlett, 2005). Beside this, the entire incoming connections, which are not requested from the internal network, must be totally blocked. The virtual private network via the firewall system also be helpful for ensuring secure connection from the outside network. This will helpful in securing the computers from the primary attacks for the internet. After that, the security practitioners have to assess the overall security of the computers the security hole or issues and it is necessary to recognize the places, where the burglar can getting in. In this position, the firewall is quite capable to protect the internal machines from random burglary. The open source software is generally the software which source code is open as well as available to anybody. The open source software are usually freely redistributable and must permit to distribute as source code along with the compiled form. Beside this, the essential licence must permit alternation as well as in order to generated derivatives from the source code. There are various security components, which are developed for the open source community (Jaeger, 2008). The popular open source security tools are as follows: firewalls like iptables, intrusion detecting system like Snort, network monitoring components like MRTG ( multi router traffic grapher) and security assessment tools like Nikto in order to scanning web server. The features of general availability of open source software provide sufficient chance to the criminals and attackers to investigate the source code and destroy the vulnerabilities. Therefore, the open source community provide utmost efforts to enhance the quality of the software and the security of the software to minimize the vulnerabilities in the application software and the computer machine. In order to ensure the safe use of the open source products in any company, the company must maintain few security policies such as, establish a well structured software security policy and must ensure that the policy should be strictly adhered. Only from the trusted site the open source security tools can be downloaded. Download only the source code instead of downloading the complied form (Jones and Ashenden, 2005). Examine the general s ecurities vulnerabilities in regular basis. The security practitioner should adopt defence in depth strategy thus variety of threats at various stages can be completely addressed. Security system for Windows Window operating system is the most prevalent and used operating system around the globe. The users of window are more compared to other operating system. The windows operating system is therefore considered one of highly vulnerable for security breach (Vacca, 2014). Window security context is very crucial and effective. One of the simplest tenets of window security is that each single process operates on the presence of users. Therefore, each process is related with the overall security context. Security context is a bit of cached data, which is related with the user consisting of SID, group SIDs and privileges (Manzuik, Gold and Gatford, 2007). The core security principal is considered to be one of the significant entity which help to determine and identify the security with the help of proper techniques eventually termed as authentication. Security principal in window is considered to be assigned on a significant process by process system with the help of kernel object which is te rmed as token. Single users or group account in the computer is considered as the security principal on the system, which is running on window operating system. Security principal connects and receives significant permission, which helps to grant access to the overall resources present in the computer such as document, file and folders. The overall working and execution of these authorised permission and significant right is considered to define what actually security principal significance and what are their proper role and responsibilities in performing the security in window operating system (Nipkow, Grumberg and Hauptmann, 2012). In windows operating system there are three core basic types of security principal, which are user principals, machine principal and service principals. Security identifiers in the users reference is the accounts with the help of usernames however the operating systems is internally takes reference in their accounts with the help of security identifiers. SID are considered to be unique in their primary domain and locals and are never used again which eventually makes them more uniquely identified users and the group account in windows. Security related to the account used in windows operating system are considered to be core unit of network security (Silberschatz, Galvin and Gagne, 2005). Domain account are stored in significant active directory database. Onm the other hand the local account is stored in the security account manager database making it more secured for authorised personnel. Account lockout policies, password policies are some of the security tool, which are, embedded in the windows operating system to provide more security to the user of the computer. Conclusion The security for the operating system is most important as the operating system is the base for the other software of the computer system. The security means protect the computer from the unauthorized entities to do anything that the computer owner does not want (Wilfred, 2003). As any unauthorized access can harm the availability, integrity and confidentiality the internal characteristic of the computer protect the operating system of the computer from the unauthorized access. Moreover, this is essential for the security of the computer but not sufficient. For ensuring security the files must be encrypted by the users and only can be opened by providing proper password. In recent time many new inventions take places in this segment biometrics is the most advance and more powerful in this segment. Fingerprints readers are most common in these days and the iris scans are the most secure. The biometrics is most efficient if locally stored. There are several viruses and threat like Troj an horses, buggy software and login spoofing and these are significant threat for the computer system, cause severe damage to the machine (Wood and Kochan, 1985). In addition to that, as the company AA currently using Windows, Unix and open source operating system the company has significant security threat and the security practitioner must select the correct tools to minimize the security risk. References Bosworth, S. and Kabay, M. (2002). Computer security handbook. New York: John Wiley Sons. Bott, E. and Siechert, C. (2002). Microsoft Windows security inside out for Windows XP and Windows 2000. Redmond, Wash.: Microsoft Press. Calder, A. (2008). Ten rules of information security for the smaller business. Ely: IT Governance Pub. Chen, L. and Gong, G. (2012). Communication system security. Boca Raton, FL: CRC Press. Clercq, J. (2004). Windows Server 2003 security infrastructures. Amsterdam: Digital Press, an imprint of Elsevier. Duffy, M. (2003). Getting started with openVMS system management. Boston: Digital Press. Farrokhi, B., Bogorodskiy, R. and Pradeep, D. (2008). Network administration with FreeBSD 7. Birmingham, U.K.: Packt Pub. Harrington, J. (2007). Ethernet networking for the small office and professional home office. Amsterdam: Morgan Kaufmann Publishers/Elsevier. Howlett, T. (2005). Open source security tools. Upper Saddle River, NJ: Prentice Hall. Jaeger, T. (2008). Operating system security. [San Rafael, Calif.]: Morgan Claypool Publishers. Jones, A. and Ashenden, D. (2005). Risk management for computer security. Amsterdam, Netherlands: Elsevier Butterworth-Heinemann. Manzuik, S., Gold, A. and Gatford, C. (2007). Network security assessment. Rockland, Mass.: Syngress Pub. Nipkow, T., Grumberg, O. and Hauptmann, B. (2012). Software safety and security. Amsterdam: IOS Press. Silberschatz, A., Galvin, P. and Gagne, G. (2005). Operating system concepts. Hoboken, NJ: J. Wiley Sons. Smith, B. and Komar, B. (2003). Microsoft Windows security resource kit. Redmond, Wash.: Microsoft Press. Vacca, J. (2014). Network and system security. Amsterdam: Syngress. Wilfred, A. (2003). Solaris 9 security. Cincinnati, Ohio: Premier. Wood, P. and Kochan, S. (1985). UNIX system security. Hasbrouck Heights, N.J.: Hayden Book Co.

Monday, December 2, 2019

There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) Essay Example

There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) Essay Syed Hussamuddin Ahmed Course name: Instructor: Date: 04 / 11 / 2010 There is no hope of doing perfect Research (Griffiths, 1998, p97) Research implies ‘searching again’. It is a careful study of a subject, especially in order to discover new facts or information about it (http://www. oxfordadvancedlearnersdictionary. com/dictionary/research). Research can be Qualitative or Quantitative (Research, wikipedia) It is a methodical investigation into a subject in order to discover facts, to establish or revise a theory or to develop a plan of action based on the facts discovered (Research, Microsoft Encarta Dictionary, 2009). Data is collected on a particular subject from various sources. Psychology differs from person to person, because of this the synthasised information results in inaccuracy. Results derived from a research never change in a perfect research. But this is rare. Thompson laid down his atomic model resembling a water melon, and electrons embedded in an atom, as seeds in a water melon. Later, Bohr proved the electrons to be in motion, and hence Thompson’s model to be inappropriate. Dobernier discovered that the elements present during his period, when arranged in the order of their increasing atomic masses, the mass of the middle element equals the average mass of the immediate preceding and succeeding elements. Modern Periodic Table proved this theory inapplicable for all the 117 elements known presently. Inventions and discoveries seem to be perfect momentarily. But later its imperfections would be proved. Quest for knowledge, improvisation of the present inventions and discoveries, or dissatisfied nature of the human beings compels them into researching. Human minds tend to be illogical at times. We will write a custom essay sample on There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on There Is No Hope of Doing Perfect Research (Griffiths, 1998, P97) specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Experiments fail at times leading towards no hope of doing perfect research. Research, according to Umardaud of www. expertcolumn. com, will always have imperfections, but quality and quantity will improve in the direction of perfection. (Umardaud, p. 1) â€Å"Home assignments- a boon or a curse†, was the topic in my grade 9, in 1980. Mixed responses proved the efforts futile. Conclusion was that, studious children liked it, but the playful did not. Results of the survey stated that 80 percent did not like to be assigned any work, as only 100 colleagues exhausted with overwork were interviewed. Now, this was a biased survey. â€Å"Corporal punishments at schools†, was the topic to be researched in 1985,in my Engineering first year. Students without spankings showed marked improvement compared to the students who were not. A father of three children has noticed that his second son does wonders only when parents are firm. Youngest son just needs to be instructed. So, no research is perfect All above findings clearly prove that there is no hope of doing a perfect research. Research on a subject continues†¦ _____________________________________ Bibilography Oxford’s Advanced Learners’ Dictionary 2010 Oxford University Press www. oxfordadvancedlearnersdictionary. com http://www. oxfordadvancedlearnersdictionary. com/dictionary/research November 2, 2010. Wikipedia, the free encyclopedia 3 November 2010 at 08:47. Wikimedia Foundation, Inc. , en. wikipedia. org http://en. wikipedia. org/wiki/Quantitative_research

Tuesday, November 26, 2019

mainframes and pcs essays

mainframes and pc's essays Mainframes were conceived from an idea from Charles Babbage, however it would be seventy years later. Under the direction of Howard Aiken in 1941 Harvard University developed the Mark I Calculator. Within five years the Mark I Calculator was outdone by the Electronic Numerical Integrator and Computer (ENIAC) developed at the University of Pennsylvania. The ENIAC was introduced as the first digital computer, and could compute up to 5000 times faster than any previously introduced computer. The ENIAC did not go over well due to the high initial cost and the high ongoing maintenance costs. Financial backing from the US Census Bureau led the same developers of the ENIAC to design the BINAC. The BINAC helped to calculate the 1950s census which produced enough capital for J.P. Eckert and John Mauchly to begin work on the Universal Automatic Computer (UNIVAC.) However, due to financial trouble again Eckert and Mauchly sold the UNIVAC to Remington Rand. Remington Rands substantial finances lead to the completion of the UNIVAC and was delivered to the US Census Bureau in 1951. The UNIVAC was the first computer that utilized stored memory and did not require constant attention from engineers. In the mid and late 1950s several milestones are reached in the computing industry. IBM sales their first commercial computer, the first transistorized computer (TX-O) was completed at the Massachusetts Institute of Technology, development of two important computer programming languages Common Business Oriented Language (COBOL) and List Processor (LISP.) Almost thirty years later the personal computer (PC) will start being introduced. It was 1975 when MITS Altair the first 8080 based kit computer was introduced followed by the Imsai 8080. There were few other models that showed up but it was the Apple II introduced in April of 1977 that was dubbed the first true personal computer. The Apple II was ...

Saturday, November 23, 2019

Biography of Ken Mattingly, Apollo and Shuttle Astronaut

Biography of Ken Mattingly, Apollo and Shuttle Astronaut NASA Astronaut Thomas Kenneth Mattingly II was born in Illinois on March 17, 1936, and raised in Florida. He attended Auburn University, where he earned a degree in aeronautical engineering. Mattingly joined the United States Navy in 1958 and earned his aviator wings flying from aircraft carriers until 1963. He attended Air Force Aerospace Research Pilot School and was selected as an astronaut in 1966. Mattingly Goes to the Moon Mattinglys first flight to space was aboard the Apollo 16 mission, on April 16, 1972, of which he served as commander. But this wasnt supposed to be his first Apollo mission. Mattingly was originally been scheduled to fly aboard the ill-fated Apollo 13 but was swapped out at the last minute with Jack Swigert after being exposed to measles. Later, when the mission was aborted due to an explosion in a fuel tank, Mattingly was one of the ground crew who worked around the clock to devise a fix that would save the Apollo 13 astronauts and bring them back safely to Earth. Mattinglys lunar trip was the next-to-last crewed moon mission, and during that time, his crewmates John Young and Charles Duke landed in the lunar highlands for a geology expedition to extend our knowledge  of the surface. One unexpected part of the mission became a legend among the astronauts. On the way to the Moon, Mattingly lost his wedding ring somewhere in the spacecraft. In the weightless environment, it simply floated away after he took it off. He spent most of the mission desperately searching for it, even during the hours that Duke and Young were on the surface. All to no avail, until, during a spacewalk on the way home, Mattingly caught sight of the ring floating out to space through the open capsule door. Eventually, it smacked into Charlie Dukes head (who was busy working on the experiment and didnt know it was there). Fortunately, it took a lucky bounce and rebounded back to the spacecraft, where Mattingly was able to catch it and safely return it to his finger. The mission lasted from April 16-27 and resulted in new mapping data of the Moon as well as information from 26 different experiments conducted, in addition to the ring rescue. Career Highlights at NASA Prior to his Apollo missions, Mattingly was part of the support crew for the Apollo 8 mission, which was a precursor to the Moon landings. He also trained as backup command pilot for Apollo 11 landing mission before being assigned to Apollo 13. When the explosion occurred on the spacecraft on its way to the Moon, Mattingly worked with all the teams to come up with solutions for the problems faced by the astronauts onboard. He and others drew on their experiences in simulators, where the training crews were confronted with different disaster scenarios. They improvised solutions based on that training to come up with a way to save the crew and develop a carbon dioxide filter to clear their atmosphere during the trip back home. (Many people know of this mission thanks to the movie of the same name.) Once Apollo 13 was safely home, Mattingly stepped into a management role for the upcoming space shuttle program and began training for his flight aboard Apollo 16. After the Apollo era, Mattingly flew aboard the fourth flight of the first space shuttle, Columbia. It was launched on June 27, 1982, and he was the commander for the trip. He was joined by Henry W. Hartsfield, Jr. as the pilot. The two men studied the effects of temperature extremes on their orbiter and operated a number of science experiments installed in the cabin and payload bay. The mission was successful, despite the need for a quick in-flight repair of a so-called Getaway Special experiment, and landed on July 4, 1982. The next and last mission Mattingly flew for NASA was aboard Discovery in 1985. It was the first classified mission flown for the Department of Defense, from which a secret payload was launched. For his Apollo work, Mattingly was awarded a NASA Distinguished Service Medal in 1972. During his career at the agency, he logged 504 hours in space, which includes 73 minutes of extravehicular activity. Post-NASA Ken Mattingly retired from the agency in 1985 and from the Navy the following year, with the rank of rear admiral. He began working at Grumman on the companys space station support programs before becoming Chairman of Universal Space Network. He next took a job with General Dynamics working on Atlas rockets. Eventually, he left that company to work for Lockheed Martin with a focus on the X-33 program. His latest job has been with Systems Planning and Analysis, a defense contractor in Virgina and San Diego. He has received multiple awards for his work, which range from NASA medals to Department of Defense-related service medals. He is honored with an entry at New Mexicos International Space Hall of Fame in Alamogordo.

Thursday, November 21, 2019

Module 2 SLP PLANNING FOR EMERGENCIES Essay Example | Topics and Well Written Essays - 750 words

Module 2 SLP PLANNING FOR EMERGENCIES - Essay Example It could also be a result of increase in flow of water from rivers, streams, and other inlets. Hurricanes also have a big role to play in the motion of coastal waters in the Riverside County. Riverine flooding is the major cause of flooding in Riverside County. This comes as result of rivers and streams breaking their banks due to an increase in rainfall caused by changing weather patterns. Flash flooding usually last a short time and are a product of irregular high rainfall in the inland regions with compromised drainage facilities. A good example is regios with high population especially major towns. Modern day construction of subways, highways, and rail lines are partly to blame because these structures interfere with drainage systems thus causing floods. As reported by NBC Southern California, eight people had to be rescued from floodwaters in Riverside after a thunderstorm pummelled the region (Avila & Schwartz, 2014) Depending on severity, floods can be classified as major, moderate, and minor. Major floods causes the greatest property damage. For instance, flooding caused the closure of Highway 74 in Riverside County on both ends from Willowbrook to Highway 243 (McAllister, 2013). In addiiton, the floods could result in loss of life in serious incidences. It may involve the evacuation of people and closure of major transport networks. In moderate floods, the risk is at medium level but not as pronounced as in major floods. In the case of minor floods, there is no property damage. Earthquakes are most frightening and devastating occurrences in nature, they can happen in any time of the year, it’s important for people and governments to prepare in advance for earthquakes to avoid mass destruction of property and loss of lives, various methods can be used to reduce impact of earthquakes, for instance, use of earthquake surveillance systems, planning of construction places. Earthquake risk maps have been used in land management

Tuesday, November 19, 2019

Carnival Cruise Case Study Example | Topics and Well Written Essays - 1000 words

Carnival Cruise - Case Study Example The company currently has 21 ships in active service, with one more under construction. On a trivial note, all of their ships have names ending in "of the Seas". The company also operates the well-known Celebrity Cruises line, Pullmantur Cruises, and Azamara Cruises among others. They are famous for building the largest cruise ships in the world, highlighted by their Freedom and upcoming Genesis class of ships. The Freedom of the Seas is currently the world's largest cruise ship in operation, accommodating over 4,300 passengers and 1,300 crew. Royal Caribbean offers a comprehensive line of activities which augment the entire cruise experience. These include rock climbing, ice-skating shows, and a specially built "Flowrider", a wave simulator where one can learn to surf. There is also an on-board casino, several bars and lounges, a 400-foot mall, and even scuba diving to boot. A sample itinerary for a trip to the Caribbean would include climbing Jamaica's Dunn's River Falls, mountain biking in Costa Rica's rain forests, snorkeling with stingrays, horseback riding on the beaches of St. Thomas, diving 800 feet below see level to a research submarine, exploring the Hato Caves in Curacao, and exploring Mayan ruins. The company's biggest strength is that it has a tremendous marketing arm, and it is very effective in leveraging off the publicity it gains with its high-profile cruise ships. Even the construction of "Freedom of the Seas" was featured on the Discovery Channel. This attests to their very effective strategies in increasing overall market share through word of mouth and mass media. The cruise's main weakness is that if you are a person who likes privacy, it is not exactly the best choice. Its cruise ships are the largest in the world, and it is teeming with people. If one would like a nice, relaxing time by the pool, this is most likely a remote possibility as many others would most likely be doing the same. Its clientele and target market include upper middle to high net worth individuals. It is considered very expensive by some quarters. Their clientele has an average age of 42, 7 years younger than the industry average. Another major player in the cruise ship industry is Star Cruises. It is the third-largest cruise line in the world behind Carnival Cruises and Royal Caribbean. It dominates the Asia-Pacific Market with a combined fleet of 22 ships and over 35,000 berths, and is credited as the primary catalyst for the industry in the region. The cruise line was founded in 1993 under the Genting Group of Malaysia, with its corporate headquarters in Hong Kong. In 2000 it acquired Norwegian Cruise Line, and became the first global cruise line in the process It had a net revenue of $337 million in 2007, up 15.4 % from the previous year Activities onboard include a multi-million dollar production show, superstar musicians for entertainment, and a murder mystery game. For further entertainment and leisure there is also a golf driving range, a jet current exercise pool, a basketball court, a wine shop, a card room, and

Sunday, November 17, 2019

The text the color purple Essay Example for Free

The text the color purple Essay The text ‘The Color Purple’, in both the novel by Alice Walker and the film adaptation directed by Steven Spielberg, show Celies, a broken, mistreated girl, developing into an independent, strong woman, despite the physical, emotion and sexual abuse that she faces throughout her life. Each representation of the text take on a different approach as to how it portrays Celie’s search for self through her relationships with other characters-particularly Nettie and Shug-, her belief in God, her struggle for independence and fight against the oppression Albert forces on her. The novel tends to be more confronting while the harshness of the mistreatment is softened in the film by the placid music, comical elements and the fact that physical violence is hardly seen. Though the film and novel vary significantly and utilize different techniques to express the general ideas, both explore the major themes of racism, male dominance and family relationships. The novel tells the story through Celies letters, and therefore the reader knows nothing more than what Celie writes. This strong, single point of view makes the story much more personal and the effect of her innocent, frank language make the injustices she is put through even more stirring. The book uses Celies short, blunt sentences to convey her fear and turmoil, opening with a simple confronting sentence: â€Å"you better never tell nobody but God. It’d kill your mammy†. Celie starts as a scared, confused girl with nothing in the world but her faith in God and her love for her younger sister, Nettie. The film, however, begins with direct contrasts to this, with the two sisters laughing and playing clapping games in a beautiful field of purple, Celie’s pregnancy not revealed until she steps out to meet ‘Pa’ in which the light music stops abruptly. The film used this lighter opening to soften the impact of the rape and to show her innocence and youth, as well as immediately show the closeness she shares with Nettie. Celie grew up with no self-formed opinion of herself, believing the negative comments that others spoke of her: â€Å"Celie you got the ugliest smile this side of creation†. The years of abuse made her submissive and silent, never speaking up for herself in order to survive. Shots of Celie watching events from behind props, windows or with her face turned down demonstrate the invisible nature that she has developed in the film. As the film had to keep running time down, Celie’s life is skipped through. This is done with a clever camera position showing young Celies shadow reading, her voice gradually getting deeper and her reading more fluent, the shadow changing to the figure of a woman. Recurring snapshots of the letterbox in various conditions as well as the use of dates aid the films quicker progression through the plot. Gaps left in the story by these skips in time are filled in with a voiceover. The novel illustrates Celies fear of males through word choice and blunt statements, as well as Celies husband being referred to as simply Mr. _____ for a significant part of the book , whereas the film used visual techniques such as lighting and camera angles. Many low angle camera shots of Albert or ‘Pa’ enclosed by shadows or looking down upon the females give the impression of dominance. Close-ups highlighting the expression of fear on Celie’s face or at sinister intentions of the male characters at the start of the film compared to the close ups of Celie as a confident woman after she found her identity show the change that she has undergone. This change in Celie occurs with the introduction of Shug and Sofia into her life. The two contrasting women are both strong and free and teach Celie that women do not have to be ruled by men. Celies main influence is Shug, who is loved by Albert as well as Celie, whose attachment to Shug is depicted through her primary role in the story of Celies life. Shug plays an extremely imperative part in Celies search for self by being the affectionate, encouraging person that Celie always needed. Most importantly, she teaches Celie to love herself and be happy with whom she is as a person. Shug opens Celies mind by removing other peoples influence on her belief in God, explaining that â€Å"not being tied to what God looks like frees us†. The turning point in both the book and the novel is when Celie discovers that Albert has hidden Nettie’s letters from her for all these years. Her love of Nettie, who she believes to be â€Å"the only one to ever love me† had helped her to stay strong through the years and endure Albert’s abuse. When she finds that he had been keeping Nettie from her, her rage breaks her fear of him and gives her the courage to leave the house and move to Memphis with Shug. Albert summarizes what he believes to be her weaknesses when he says â€Å"You black, you poor, you ugly, you a woman. Goddamn you nothing at all†. Celies retaliation by cursing him with â€Å"everything you even think about is going to fail until you do right by me† shows just how far she has come already. Albert’s insult poses a challenge for Celie. She goes out to find happiness and become self-sufficient, despite Albert’s condemnation. The novel looks at the progress that Celie makes with her sewing of pants. This is symbolic of the protest against discrimination against women and is a major part of Celie’s search for self. The film however skips through this, instead focusing on the symbolism of the purple field in Celie’s happiest moments-her childhood with Nettie, her walk with Shug after she returns home a successful woman and her reuniting with Nettie at the very end. The conclusion of the novel seemed to be much more rounded, with all the strings of the past woven neatly into a final letter in which she addresses â€Å"Dear God. Dear stars, dear trees, dear sky, dear peoples. Dear everything. Dear God†. In this letter we find out that Nettie and her husband, Olivia, Adam and Adams wife have returned home from Africa. Celie and Nettie now have their own house, after finding out the truth about their ‘Pa’, Shug as come back to Celie, Sofia and Harpo are once again happy together and Celie has forgiven Albert for the past, now valuing him as a friend. It is this connection that eventually brings them together as friends. Though the film and novel vary significantly and utilize different techniques to express the general ideas, both explore the major themes of abuse, oppression, male dominance and family relationships. The central character, Celie, finds her identity through the help of those she loves and her personal strength to accept the past and move on with the future.

Thursday, November 14, 2019

Imperfect Conscience in Dostoevskys Crime and Punishment Essay

Crime and Punishment:   Imperfect Conscience  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A highly educated individual, avoiding the hardships of society while pondering the possibility of great wealth, Raskolnikov, in Fyodor Dostoevsky's "Crime and Punishment," frustrated with his immoral actions, suffers from an abrupt physical and mental breakdown after brutally mutilating a wicked pawnbroker. After this soul-scarring incident, the initial feelings of success in completing his mission quickly changes once he realizes possible flaws in his, otherwise considered, perfect murder. Raskolnikov's imperfect conscience finally comes to an emotional awakening once his saint, Sonya, an unintelligent prostitute, brings him the love, sensitivity, and inner serenity to help him confess to the murder he so coldly commits. After ruminating on the pessimistic consequences of this crude and selfish murder, a change in conscience comes over Raskolnikov. Once he understands the reality of the matter does he actually suffer a breakdown. Though he commits a very serious crime, Raskolnikov still refuses to believe its contin...

Tuesday, November 12, 2019

Dove: evolution of a brand Essay

The aim of this case study, written by John Deighton, is to highlight and explain the revolutionary brand evolution strategy at the basis of the extraordinary Unilever’s Dove results, achieved in 2007. Overview: Masterbrands as part of the â€Å"Path to Grow† strategy Unilever is a leading multinational company active in the food, home and personal care sectors. It has been developing globally during the years, creating several of the most successful brands of the world. Its expansion allowed a geographical diversification but also brought some problems of controls; especially the brand portfolio had grown in an unstructured way and required a change of course. Indeed, in February 2000 Unilever began the so called â€Å"Path to Growth†, a five-year strategic activity which included the reshaping and the reorganization of the brand portfolio. More precisely, the company planned to reduce its more than 1,600 brands to 400 and, among them, select a small number of â€Å"Masterbrands† responsible for creating a clear and global identity to be shared with the range of products, included under each Masterbrand name. In this broad strategy it is situated the outstanding evolution of one of the survived brands, Dove, which was selected to become the â€Å"Masterbrand† for Unilever personal care products, beyond the beauty bar category and including hair care products, deodorants, body lotions etc. Dove Masterbrand strategy development Dove, until February 2000, had always been orienting to meet its costumers’ needs, providing them products, with a scientifically proven functional superiority. As a logical consequence, its advertisements had always been centered in promoting the cited higher functionality, preferring natural-looking women rather than fashion model icon in order to communicate honesty and authenticity. But a marketing strategy to build a unique Masterbrand identity could no longer be based on functional superiority, as explained by Deighton; it should create a meaning for Dove, as a â€Å"Masterbrand†, to be applied to all its products. Pursuing the best way to develop the proper image, the management had to slightly change the approach to the promotion. Elements such as â€Å"client need†, â€Å"scientific research†, â€Å"the employment of natural-looking women† and â€Å"honesty and authenticity† survived as central aspects, but they were reassembled and combined differently to accomplish the mentioned goal. The scientific research was no longer used to prove product functionality; but, it was the starting point of the new strategy: a worldwide investigation led by the global brand director for Dove, Silvia Lagnado, and interpreted with the help of two experts, revealed that women generally perceived aesthetic canons, typically illustrated in the advertisements, as very distant and unreachable. It was found out that most of the women didn’t mirror themselves in the advertised concept of beauty and a further survey showed that only the 2% of the interviewed described themselves as beautiful. Dove experts recognized a cultural issue; the beauty-related belief of average women and the advertised beauty weren’t matching. The misalignment generated frustration in women and, as a relevant consequence for Dove, negatively affected the sales of health and care products. So, aware of women dissatisfaction, of their personality, of their need to feel beautiful and keeping in mind Dove internal goals, the management gave life to the revolutionary strategy and decided that Dove should have stood for a point of view. The management decided that natural-looking women would have had a key role in the campaign, but with a different responsibility: instead of promoting Dove’s products they would have promoted their â€Å"average† beauty, with honesty and authenticity. The campaign for Real Beauty was setup and ready to be implemented. The Aim(s) of the campaign Born from the simply idea of creating a common and clear image to be shared with the Dove Masterbrand products, â€Å"The campaign for Real Beauty† has been then developed and changed as it went forward, pursuing further goals and, at the end, revealing itself somewhat different. As a matter of fact and as declared by Kathy O’Brien, Dove marketing director for U.S, the company wanted to â€Å"change the way society views beauty† and â€Å"provoke discussion and debate about real beauty†. This aim was reflected in the Dove’s mission statement, elaborated for the campaign, and it was enhanced with a relevant aspect: the expected repayment for the company, which was keenly expressed. The statement said: â€Å"Dove’s mission is to make more women feel beautiful every day by broadening the narrow definition of beauty and inspiring them to take great care of themselves†. And here the real purpose of the whole initiative became clearer. With the declared aim to develop the common values for the Masterbrand and to overcome the beauty-related mismatch, emerged from the scientific research, Dove started the campaign. Then, inducing the community to a proactive involvement and to debate on such meaning, the company began in a certain sense the democratization process of the beauty. So, being recognized as the entity responsible of the birth of such a thorny process and as a provider of a clear and rule-breaker point of view, Dove started to be on everyone’s lips. It remarkably increased its popularity and most important, allowed it to captivate a huge number of potential clients: those women to be helped in perceiving themselves â€Å"beautiful every day by broadening the definition of beauty†¦Ã¢â‚¬  and to be inspired â€Å"to take great care of themselves†. Paraphrasing the meaning of the period â€Å"to inspire to take great care of themselves†, the commercial aim of Dove’s campaign for real beauty becomes apparent. What made the campaign effective? The combination of different elements made the design and the implementation of the campaign so successful. As a first element, the campaign has its roots in the setting of a clear brand’s mission, shared on a global level. The structure of the organization introduced by the Path to Growth strategy, which split the responsibility for each brand between two groups, the Brand Development, centralized and global in scope, and Brand Building, decentralized according to the regions in which Unilever was involved and responsible to bring the brand to life in each marketplace, substantially helped in defining a global mission. Once developed, the brand’s mission worked as a benchmark for each initiative; a cornerstone around which, the whole campaign moved and evolved. Furthermore, the settlement of a well-defined mission was crucial to maintain the control over the campaign, once it had been shared with the community and on purpose exposed to its assessment, starting what I called â€Å"the democratization process of the beauty concept†. And exactly this process is the feature that I consider the sharpest and the most effective of the whole strategy. Indeed Dove, proposing and supporting its unconventional point of view, with the aim to provoke discussion and debate, really made people feel part of revolution and, at the same time, outstandingly got the company closer to its potential clients. In order to increase women’s engagement, Dove, at a certain point of the campaign, directly asked them to film â€Å"their own daughters discussing their self-esteem challenges† and later on, â€Å"to create their own ads for Dove Cream Oil Body Wash† and to participate at the contest â€Å"the Real Ads by Real Women†. It extremely helped in creating a strong social interconnection between Dove’s supporters and the company; they were joint forces against stereotypes of beauty. Moreover, the involvement of the community, thought in a more general sense and which spontaneously commented and also criticized the campaign, was crucial to increasing Dove’s initiative range and for its goals fulfillment. This aspect was part of a further successful feature of the strategy, the so-called Media planning, which was revolutionary and tailored as well. Responsible of the strategy and the investments for the campaign diffusion, the Media planning unit, as said, relied on the engagement of the community and of Internet too and so, it centered the investments in creating and expanding the community of the â€Å"real beauty seekers†. It included the purchase of a Superbowl advertising space. Thanks to such investments and to Youtube, which played a key role in the divulgation of the ads, the phenomenon reached an extraordinary dimension and, as a consequence, the debate started to spread all over, acquiring more and more media hype, insomuch as 16 minutes of Today Show were dedicated to one of the campaign initiatives; even Oprah devoted a full show to self-esteem, built around a Dove’s advertisement. Critics, discussions and parodies rose in sequence, did nothing but increased the relevance of the campaign and amplified its range, exactly as planned by Dove. These are the reasons that made the revolutionary and unprecedented Dove’s campaign so successful and helpful for the company in becoming â€Å"one of 10 brands with the greatest percentage gain in brand health and business value in the past three years† and in its $1.2 billion of grow. References: John Deighton, (Rev: March 25, 2008), Dove: Evolution of a brand, 9-508-047 Harvard Business school

Sunday, November 10, 2019

Law as A Social Institution Essay

What does it mean to say that law is a social institution? In the light of a legal positivist view, law embodies and is contingent to the social construct within our society. Legal positivism is the notion that law depends on social fact and that its merits do not and should not reflect its intrinsic nature1. Law is simply not a set of rules and regulations that govern the way in which our society should be, but rather, an exhibition of how our society exists as it is2. That being said, a social institution is a pattern of beliefs and behaviors over time, as defined by Nicosia and Mayer as ‘a set of activities performed by specific people in specific places through time3. Therefore, law encompasses numerous social institutions such as family, homosexuals, or more specifically the Indigenous community etc. – an exhibition of how society exists as it is. The concept that law is a social institution will be discussed in the legal positivist framework particularly in close regard to homosexuality. Traditionally, homosexuality was seen as an immoral act, it was encoded under the Criminal Law Amendment Act 1885 Section 11 that an act of ‘gross indecency’ between two males led to a term of 2 years imprisonment. In the last century same-sex relationships have been considered acceptable in society. Harsh amendments in legislation against homosexuality grew unacceptable and argument arose that it was an ‘overreach’ in criminal law concerning homosexual behaviour4. As aforementioned, a social institution is the ‘interaction among activities, people, and places over time’5. The law essentially is a product of these institution’s morals, ideas and standards. The idea that law is a social institution is illustrated by the changes in law over time and the changes in attitudes towards homosexuality that arise simultaneously. There has been a gradual acceptance and legal recognition of same-sex relationships. This is evident in the evolving attitudes towards homosexuality reflected in various cases and legislation, in which the law has responded positively to the changes in these social standards. As seen in the case of Hope & Brown v NIB (1995)6, where the couple, Andrew Hope and William Brown attested to the Equal Opportunity Tribunal (EQT), arguing that NIB Health Fund Ltd had denied them access to a family health insurance policy on the basis of their sexual orientation. The EQT coerced  the insurance company to recognise the couple as a family in order for them to receive insurance. It was acknowledged that the policy was in fact discriminatory. A year later, the federal government recognised homosexual couples as a family unit in the 1996 consensus7. Additionally, amendments to the Health Insurance Act 1973 were carried through to recognise same-sex couples and their children as a family. In relation to the theory of legal positivism, these social standards have molded the law, reinforcing that law is dependent on a social construct. One of the most significant legislative changes was the passing of the Property (Relationships) Legislation Amendment Act 1999 (NSW)8, which granted rights to same-sex couples for the division of property and claiming finances, as well as access to the District Court in a relationship break down. This Act also gave same-sex couples inheritance rights in line with heterosexual couples. However, bearing in mind the theory of positivism, where law depends on social fact, there are other institutions such as religious groups, like the Australia Lobby Group that curb the acceptance of homosexuality in light of their own social standards. This is evident where the law does not encompass every aspect in the recognition and protection of same-sex couples. In addition, the Howard government passed the Marriage Amendment Act 2004 (Cwlth) consolidating that marriage in Australia is the union between man and woman only9. In effect, this governance affirmed their social institutional beliefs: opposition to same-sex marriages. Thus, demonstrating that law is a social institution because the law directly reflects the beliefs of the social institution, namely the government. We can infer that although the issue of marriage equality is shelved, it does not equate to the idea that the whole of society disapproves of marriage amongst same-sex couples, but that certain structured governances limit the extent to which these ideas are legislated. Law is based upon our morals and therefore should be an exact carbon copy of the beliefs and ideas of social institutions. However external systems, for example, law systems and governments, can limit the degree to which the law wholly represents social  institution, in this case, homosexuality. The fact that a policy may be seen as discriminatory, unjust, inefficient does not mean that policy is the law, or the fact that the policy is fair, just and efficient also does not make it law. By taking these authoritative systems out of the equation, law is intrinsically a social institution. In 2006, the Human Rights Commission published a report titled ‘Same-sex: Same Entitlements’, which found that 58 federal laws discriminated against same-sex couples in areas of financial and work-related entitlements10. This caused social upheaval amongst the homosexual community. The law responded and shaped into these morals, by means of the Family Law Amendment Act 2008 (Cwlth)11. Changes and alterations were made in federal laws to remove the provisions discriminating against homosexual couples, and thus, they were granted rights pertaining to financial matters. The theory of legal positivism is demonstrated here, where the Amendment mirrors the social fact that there is no sufficient reason for same-sex couples to be discriminated based on sexual orientation and should receive the same benefits, as heterosexual couples. Homosexuality is now a greatly accepted institution12 whereby the law embraces same-sex couples as equals with heterosexual couples. The Family Law Amendment Act 200813 and the Miscellaneous Acts Amendment (Same Sex Relationships) Act 200814 is significant in the sense that same-sex marriage is now the point of legislative inequality between heterosexual couples and same-sex couples15. In essence, legal positivism is a construct that gives a greater understanding of law as a social institution. It is inextricably linked to the social order of society. Homosexuality exemplifies the positivist model through the alignment of developing attitudes and legislation amendments over time. This demonstrates the notion that the morals of our society set ideals for law to abide by. The way law and social construct interconnects means that law is man-made and built upon on patterns of beliefs and behaviour over a period of time. Word Count: 1318 References: Primary Sources of law: Family Law Amendment (De Facto Financial Matter and other Measures) Act 2008 (Cwlth) Hope & Brown v NIB Health Fund Ltd [1995] 8 ANZ Insurance Cases 61-269 Marriage Amendment Act 2004 Section 88EA Miscellaneous Acts Amendment (Same Sex Relationships) Act 2008 Secondary Sources of law: Austin, John (1832). The Province of Jurisprudence Determined. Ed. W.E. Rumble, 1995. Cambridge: Cambridge University Press. Anthony, T. Sanson, M. Worswick, D (2010) Connecting with Law (2nd Edition), Chapter 1: Introduction: Overview of the Book, 4. Baker, MJ and Saren, M. (2010). Marketing Theory: A Student Text (2nd Edition). 154 Wilson, P and Brown J.W. 1973. Crime and the Community. St Lucia: University of Queensland Press. Boesenberg, J, Derwent, B, Hamper, D, Hayes, M, Thiering, N. Legal Studies HSC (Third Edition), Chapter 18: Contemporary issues concerning family law. 278 -297 â€Å"Marriage Equality and Public Opinion† Fact Sheet: http://www.australianmarriageequality.com/wp/wp-content/uploads/2010/10/AMEpollfactsheet@Jun11.pdf

Thursday, November 7, 2019

Media Violence and American Youth essays

Media Violence and American Youth essays Generation Numb: Bouncing Violence off the Brains of Americas Youth Imagine a generation of young people who are shocked by nothing. Imagine a group of young people who have seen and can bear the grotesque and unnecessarily violent to the point where they consider it the norm. This is my generation, born between 1981 and 1985, which I like to call generation numb. Through movies, music, and other media my peers have been bombarded by carefully marketed, gratuitous violence, and with each viewing of such violence it becomes more and more difficult to shock us. However, the corporate media is more than happy to meet our new shock levels if a profit can be made. My generation is becoming increasingly indifferent to violent acts which should disturb us, and our sense of reality is breaking down, creating peril for my peers in the present and the future. We tolerate violence and, in the process, become more violent ourselves. The root of this desensitization lies not so much in the violence of war, which my generation did not truly begin to experience until recently, but gratuitous violence. Gratuitous violence is fighting or gore which is uncalled-for, unjustified, of without need or cause. (violence.). This violence, often appearing in movies, music, or on television, differs from the violence of war in that sectarian violence has an apparent purpose. The real violence of war or in the impoverished areas of the inner city is naturally less fantastic and less glorified than the violence of, for instance, a summer action blockbuster with huge explosions and shootouts where the good guys never seem to be shot. Violence in the real world has consequences. Violence on film and television often goes unpunished. This fantasy violence had appeared in films for decades. But in the late seventies and early eighties, the sharp increase in...

Tuesday, November 5, 2019

Bella Abzug - Activist and Member of Congress

Bella Abzug - Activist and Member of Congress Bella Abzug Facts: Known for: feminism, peace activism, first Jewish Congresswoman (1971-1976), organization founder, instituted Womens Equality Day. Her large hats and fiery personality brought her considerable public attention. Occupation: member of the US House of Representatives, lawyer, writer, news commentatorDates: July 24, 1920 - March 31, 1998Education:  Hunter College: B.A., 1942. Columbia University Law School: L.L.B., 1947.Honors:  Editor of Columbia Law Review; National Womens Hall of Fame, 1994Also known as: Bella Savitsky Abzug; Bella S. Abzug; Battling Bella; Hurricane Bella; Mother Courage Bella Abzug Biography: Born Bella Savitsky in the Bronx, New York, she attended public school and then Hunger College.   There she became active in Zionist activism. She started Columbia University Law School in 1942, then interrupted her education for a wartime shipyard job. After marriage to Martin Abzug, then a writer, and she returned to Columbia Law School and graduated in 1947. She was editor of the Columbia Law Review.admitted to the New York Bar in 1947. In her legal career, she worked in labor law and for civil rights. In the 1950s she defended some accused by Senator Joseph McCarthy of Communist associations. While pregnant, she went to Mississippi to try to stave off a death sentence for  Willie McGee.   He was a black man accused of raping a white woman. She continued her work on his case despite death threats, and was able to win stays of execution twice, though he was put to death in 1951. While working against Willie McGees death sentence, Bella Abzug adopted her custom of wearing hats with wide brims, as a way of signaling that she was a working lawyer and should be taken seriously. In the 1960s, Bella Abzug helped to found Women Strike for Peace, and she worked as a legislative director, organizing protests and lobbying for disarmament and against the Vietnam War.   In Democratic politics she was part of the Dump Johnson movement in 1968, working for alternative peace candidates to challenge Lyndon B. Johnsons renomination. In 1970, Bella Abzug was elected to the U.S. Congress from New York, with support from the reformers within the Democratic Party. Her slogan was This womans place is in the House. She won the primary, though she was not expected to, and then defeated an incumbent who had held the seat for many years, despite his accusations she was anti-Israel. In Congress, she was especially noted for her work for the Equal Rights Amendment  (ERA), national day care centers, ending sex discrimination, and working mothers priorities.   Her outspoken defense of the ERA, and her work for peace, as well as her trademark hats and her voice, brought her widespread recognition. Bella Abzug also worked against American involvement in the Vietnam War and against the Selective Service System, as a junior member of the Armed Services Committee. She challenged the seniority system, ending up as chair of the House subcommittee on government information and individual rights. She advocated for separate statehood for New York City and helped to win the Sunshine Law and the Freedom of Information Act. She lost the primary in 1972, with her district redrawn so she would compete with a strong incumbent Democrat.   She then won an election for the seat when the candidate who had defeated her died before the fall election. Bella Abzug ran for the Senate in 1976, losing to Daniel P. Moynihan, and in 1977 was defeated in a primary bid for the office of mayor of New York City. In 1978 she again ran for Congress, in a special election, and was not elected In 1977-1978 Bella Abzug served as co-chair of the National Advisory Committee on Women. She was fired by President Jimmy Carter, who had originally appointed her, when the committee openly criticized Carters budget for cutting womens programs. Bella Abzug returned to private practice as a lawyer until 1980, and served for a time as a television news commentator and magazine columnist. She continued her activism work, particularly in feminist causes.   She attended international womens caucuses at Mexico City in 1975, Copenhagen in 1980, Nairobi in 1985, and her last major contribution was at the United Nations Fourth World Conference on Women in Beijing, China. Bella Abzugs husband died in 1986.   Her health failing for several years, she died in 1996. Family: Parents: Emanuel Savitsky  and Esther Tanklefsky  Savitsky. Husband: Maurice M. (Martin) Abzug (1944). Children: Eve Gail, Isobel Jo.Places: New York Organizations/Religion: Russian-Jewish heritageFounder, Women Strike for Peace (1961)Co-founder, National Womens Political CaucusCo-chair, Presidents National Advisory Committee for Women, 1978-79President: Women-USAWomens Foreign Policy CouncilNational Commission on the Observance of International Womens YearCommentator, Cable News Network (CNN)Also: National Organization for Women, National Urban League, American Civil Liberties Union, Hadassah, Bnai Brith Bibliography: Bella Abzug and Mim Kleber. Gender Gap: Bella Abzugs Guide to Political Power for American Women. Boston: Houghton Mifflin, 1984.  Paperback.   Hardcover. Bella Abzug and Mel Ziegler. Bella!: Ms. Abzug Goes to Washington. New York: Saturday Review Press, 1972.Doris Faber. Bella Abzug. Childrens book.  Hardcover.   Illustrated.

Sunday, November 3, 2019

How Effective Repositioning is in the Prevention and Treatment of Essay

How Effective Repositioning is in the Prevention and Treatment of Pressure Sores in ITU - Essay Example This study is meant to throw light on the effectiveness of repositioning as a premier curative component in the case of pressure sores. It will help widening the existing knowledge in this area to a new qualitative dimension. Repositioning has been considered as one among the components which is manual, while the other methods are either technical or equipment based. Focusing on repositioning, given its easy availability and less complication in practice, the study will supplement the existing knowledge in this area. This essay makes a conclusion that the most important advantage of the study will be its high reliability, because the data is collected directly from patients who are the real beneficiaries of the proposed study; and Medical professionals who are the care givers, and who over a long period of time, have been practicing in this area. Therefore they have vast practical experience and a very realistic understanding as to the effectiveness of each method on different types of patients. They have a clear idea about which method suits which patients, which is the ideal method for a larger segment of the population. Moreover, they have dealt with numerous cases and through practices over a long period of time, they have gained sufficient insight into the effectiveness of each method and also which method suits which individual. Another advantage is that, the hospitals one located in the local area and therefore data collection will be easier, and can be done within a limited period of time and resources.

Friday, November 1, 2019

Law versus Morality as Regulators of Conduct Essay

Law versus Morality as Regulators of Conduct - Essay Example However, individuals tend to overlook the moral aspect of various laws, and thereby break some laws. In our instance, an individual has the freedom to choose from breaking the law, owing to the lack of supervision or strictly adhere to the law, even on condition that breaking the law would not harm any individual. As such, failure to follow traffic rules in such an instance would make an individual duplicate that habit in another instance and this may compel such an individual into unwarranted litigation.   Breaking the law in such instances in critical conditions such as saving the life of an individual in serious health challenges may be morally allowable. However, since it is evident that such an individual is not in such a critical hurry, it would be unjustifiable to break the law.   Besides, individual instincts have a significant influence on our behaviors and the way individuals conduct themselves in conditions where there is no supervision (Shavell, 2002). As such the human instincts may make an individual feel guilty, owing to such incidences. As such, to omit such guilt, it will be advisable to stop and follow the rules. â€Æ'

Tuesday, October 29, 2019

Valentines Essay Example | Topics and Well Written Essays - 500 words

Valentines - Essay Example She expected more appreciation than a disappointment from her best friend. Nelly said that being athletic make her stronger. She says that it is her choice to be a sportswoman, and she expects her lover to motivate and not to disappoint (London, 2015). Nelly says that she was astonished by her date to offer a gift suggesting she cut on her weight (London, 2015). Nelly said that that a membership card to a Slimming club was the least she expected on a Valentine date. She always imagined that her friend likes and support her involvement in sports; however, she was disgusted. It is out of this anger and lack of respect that she decided to end their relationship (London, 2015). Katie Ford a 33 years old business woman had a worst experience on a Valentines Day (London, 2015). Ford like many other ladies knew that she was to have a romantic time for many years after she broke up with her boyfriend at the age of 26 years. For the years she had Valentine date, Ford had appreciated the company of her date, but not this time. As usual she waited patiently for her date to pick her and drive to town. Her date came on time, and they headed for the party. However, this time she experienced a traumatic encounter after she and her date had to part ways. That evening they went to buy drinks, but they changed the plan and stayed in the restaurant. Her date started drinking, and they talked of a better future. She was promised so many things and could not afford to resist him. Ford though hesitant agreed to let him have a chance. Their romantic time did not last long as they Fords date got too drunk. He started fighting with strangers and police were called to calm him down. When police arrived, they arrested Ford’s lover even after she begged for his release. The police had no other choice but to arrest the unruly man and booked him overnight. Ford was so disappointed in his friend behaviour and

Sunday, October 27, 2019

Historical Films: Perceptions Of The Past

Historical Films: Perceptions Of The Past The first films were made in the first half of the twentieth century and along with this the first historical films were made. These include The Passion of Joan of Arc in 1924, The King of Kings in 1927 and The Four Horseman of the Apocalypse in 1921. Even since the first historical films were made, this genre has become one of the most popular out of all types of film. Due to this, millions of people watch these films every year and therefore get their perception of History mostly from film. This poses a problem for the historian. Robert Rosenstone clearly states this, Lets be blunt and admit it: historical films trouble and disturb professional historians and have troubled and disturbed professional historians for a long time (Rosenstone R, 1995, p.45). Furthermore, William Guynn provides evidence of this, In cinema, history empties out its significance and leaves us with the cold artifice of representation (Guynn W, 2006, p.6). On the other hand, Guynn admits, For some Historians, the cinema is not entirely lost; indeed, it can be salvaged if we acknowledge that historical film is the most fictional of genres and abandon the idea of film as a vehicle of historical representation (Guynn W, 2006, p.6). What this means is that although film cannot be an instrument for representing the past, it can bear witness to the historical period in which it is produced. Most people do not study history or have only briefly studied it at a younger age; therefore film has become the primary source of knowledge for them about the past. Therefore historians are forced to accept these historical films despite their historical inaccuracy. Even if a film cannot offer the critical elements and analysis insisted on in scholarly text and even if it bends history to match the characters or the plot line and completely misses out the finer details of historical accuracy, film can stimulate the imagination and create curiosity and interest into the lives of past generations. Important ly, it can cause an interest into history which can later lead to the choice of studying it or a topic of research and enjoyment. Therefore there are a number of negatives and positives to historians from film. However one thing is clear, it is not possible for a film to be historically accurate. There are a number of reasons for this. The obvious one is that how can a film be historically accurate if no one, not even historians, have an accurate picture of a historical period. Furthermore, most historical film makes dont care whether the film is accurate of not, they prioritise making a popular film with a good story line. It is not important if a film is inaccurate, it is only important for a historian who is frustrated with the wrong facts being given out to millions of people. The reasons are many and these will be explored in detail. It is clear that a film cannot be historically accurate however a historical film has so many benefits that it doesnt need to be. History is not a pure science, it is not just open to historians alone to study therefore historians do not have a monopoly on reading, studying and conveying history. Most films are not made for historical accuracy therefore is not open to criticism from historians. Guynn believes, Historians resist approaching film because history and film are based in different sign systems that refer to the world in a radically different way (Guynn W, 2006, p.8). However historical truth on a whole is elusive and subjective just like a film set in a historical period. What is important is that no work or historical piece of writing is capable of achieving the appreciation of, for example, medieval warfare. Historical films like Braveheart however can accomplish this in minutes. This by no means claims that Braveheart is historically accurate, in fact it is incredibly inaccurate; how could William Wallace have an affair with Isabella of France when she didnt even arrive in England until three year s after his execution? Despite this however, it is clear that film can powerfully convey the foundations of historical information to millions of people. Furthermore, can a document, sculpture and eyewitness account present the excitement and chaos of chariot racing which was accomplished in Ben Hur? Similarly, in no other way can the power and magnitude of the Roman coliseum be portrayed than in the film Gladiator. In these ways, film is an incredibly valuable tool in creating history as a vision which is engaging, vibrant and real, in the sense that we can hear and see it. Guynn supports this, From this perspective, films are like any other artefacts dropped on the road of history. They bare unconscious witness to their own period, as do private letters, diaries, and accounts that were never intended to be read from the historians perspective. They provide a body of data to be analyzed and interpreted in terms of the mentality of a period, or they can, unwittingly, speak about una cknowledged realities (Guynn W, 2006, p.12). Furthermore, one can argue that there are times when film can achieve greater levels of appreciation than those possible in the written world. Rosenstone provides evidence of this, Film shows history as a process. The world on the screen brings together things that, for analytical or structural purposes, written history often has to split apart (Rosenstone R, 1995, p.57). Therefore this provides evidence that despite the fact that a film may not be historically accurate, it is incredibly effective at displaying the foundations of History in a way no other works of history can. Bringing history alive in a way which people can hear and see is arguably more effective than a historians writing. The historical story line may not be accurate however the general foundations of the period probably are and this is very important in providing people with the awareness of history in an enjoyable way. R.J Raack provides evidence to support this view, Traditional written history is too linear and too narrow in focus to render the fullness of the complex, multi-dimensional world in which humans live. Only film, with its ability to juxtapose images and sounds, with its quick cuts to new sequences, dissolves, fades, speed-ups and slow motion, can ever hope to approximate real life, the daily experience of ideas, words, images, preoccupations, distractions, sensory deceptions, conscious and unconscious motives and emotions. Only film can provide an adequate empathetic reconstruction to convey how historical people witnessed, understood, and lived their lives. Only film can recover all the pasts liveliness (Raack R, 1983, p.417). As stated previously, there is no doubt that written history and film history possess different strengths and weaknesses. What is important however is that written history and history in film are experienced in different ways. Rosenstone states, The most serious problems the historian has with the past on the screen arise out of the nature and demands of the visual medium itself (Rosenstone R, 1988, p.1173). Furthermore Rosenstone believes, The historical film must be seen not in terms of how it compares to written history but as a way of recounting the past with its own rules of representation (Rosenstone R, 1995, p.3). Critics point to the lack of essential historical information in films and the finer details of history. What historians are basically referring to is the lack of footnotes. However these historian critics are attempting to judge these historical films by inappropriate standards. It is not realistic analysis of how viewers watch films. They dont care about finer deta ils missing, they probably dont notice. Furthermore, the director does not put first these finer historical details but instead a good story line which an audience will want to watch. Historians may not like the view audiences create for themselves of a historical period however they should think positively and believe that the viewer is being informed of the foundations of a historical period and becoming aware of it. If anything, the fact that the film misses out the finer details creates lose ends which the viewer can then explore further. This can create an interest in history and cause a future study or interest in it. Critics of film history also repeatedly state that the films over personalise however this is from the experience of a historian. The filmmaker over personalises to create a story however this makes the film historically inaccurate. It is almost impossible to make a good film with a good story line historically accurate as films are focused on particular people p ersonally and their feelings of love, hate, anger etc. However history focuses on people personally only to the extent to which their personalities or actions are portrayed by another person and this is not a reliable viewpoint to get an accurate picture of an individual as opinions of a figure can differ from person to person. Therefore as films are deeply personal, this overwhelms the senses and the viewer becomes personally attached. This in itself is a strength and a weakness depending on who is watching it. Clearly a historian, who is aware of all the facts of the person or time period, wouldnt believe it as the historian has their own perspective on the person taken from a document and writings. However the viewer of the film will have a different view. There is no way of knowing in detail what, for example, Elizabeth I was like personally however Shekhar Kapur portrays his view in the film Elizabeth. Therefore this is evidence to prove that no one knows personally what histor ical figures are like therefore films are beneficial to providing viewers with a visual representation and this is the directors view on the figure. Rosenstone provides a balanced view on why historians distrust a historical film, The overt answer: Films are inaccurate. They distort the past. They fictionalize, trivialize, and romanticize people, events, and movements; they falsify history (Rosenstone R, 1995, p.46). However Rosenstone goes on to state, The covert answers: Film is out of the control of historians. Film shows that we do not own the past. Film creates a historical world with which books cannot compete, at least for popularity. Film is a disturbing symbol of a post literate world in which people can read but wont (Rosenstone R, 1995, p.46). This is further evidence to prove that despite inaccuracy of historical films, they are very beneficial to raising awareness for a historical period. Similarly to Rosenstone, Marc Ferro provides a balanced viewpoint on historians vi ew of historical film. Marc Ferro is the most influential French historian in the neglected field of history and film and Guynn states, Ferros approach is well articulated and worth following in some detail (Guynn W, 2006, p.8). Ferros argument begins with a negative thesis, It is easy to think that film is not suited to represent past reality and at best its testimony is valuable only for the present; or that, aside from documents and newsreels, the reality it offers is no more real than the novels (Ferro M, 1988, p.47). However Ferros principal thesis on the viewpoint is very positive. He argues that film can become a rich resource of information on the period in which it was made. Ferro believes that historians have neglected film almost entirely, film does not enter the historians mental universe (Ferro M, 1988, p.47). Therefore this is evidence to prove that not all historians believe that historical film is completely useless and that it can be very useful to the study of hist ory as it brings it to life. Despite the fact that historical films are never completely historically accurate, they can be incredibly useful in teaching. This includes primary school, secondary school and even university teaching of history. A class discussion of the accuracies and inaccuracies in a film can be quite valuable. For example, for all the criticism which Braveheart faced from historians, it does include some realistic parts on medieval warfare and tactics. Furthermore, the vast battle scenes and accurate medieval executions bring this historical period to life. Therefore for a class which is learning about thirteenth century England or Scotland, the watching of Braveheart can be useful, especially in a discussion on the accuracies and inaccuracies. Furthermore, despite the fact that Gladiator is centred on a romanticized plot that is not real, it displays rich glimpses of the Roman period. Several of the characters are portrayed realistically, and while not all historians would agree with the archi tectural specifics of the reconstruction of the great city of Rome, the resulting grandeur is certainly effective at illustrating how superior the city was compared to the rest of the world in the period. Another fine example is the film The 13th warrior, this film has a number of historically accurate scenes which are taken from historical manuscripts. The face washing of the Vikings and the ship burials are taken directly from the tenth century works of Ibn Fadlan. Furthermore, The 13th warrior includes references to Beowulf. Therefore a discussion on the films relationship with Beowulf and the way in which modern people perceive the Vikings is useful and could possibly lead students towards the interest of medieval literature and history. Elements of historical accuracy can be found in many historical films and the appreciation of these accuracies in class discussion can be very rewarding. Can a film be entirely historically accurate? The answer to this question is no. However there is no doubt that a film can contain elements of historical accuracy therefore be extremely beneficial to the study of history. It is also clear though that a student of history can never rely on films alone. It is certainly obvious that the library is not about to be cleared out of the way by video or cinema. Evidence of this is that film history only started in the twentieth century however the study of history has been going on for hundreds of years prior to this. Therefore only in the twentieth and twenty first centuries have films become a possible primary source for the past therefore this is evidence to prove that it is not necessarily necessary. The real question to ask is what can historians potentially learn from film, as a secondary source, that written works cannot tell them? Film brings alive a historical period, it is easy to learn something when you can see it or imagine it cl early. Film can be classified as a historical resource and historians should be making the most out of every resource. There is no doubt also that the combination of historical films and written history could be a highly stimulating way of learning and teaching history. It can teach important skills which are essential to history for example, becoming more critical in the analysis of sources of historical information. Therefore is it clear to sometimes set aside the written world and allow the drama of film to stimulate students of history and to view it as a dynamic medium which can be appreciated for it complexity and its application to the present. Historical film, as a production which portrays the past during the present can be an enjoyable and informative way of participating in history despite the fact that films are not entirely accurate. Ron Briley makes an important case on appreciating historical film, Whether educators approve or not, young people are going to attain a g reat deal of historical information through film. Accordingly, it behoves teachers to provide their students with the intellectual tools and media literacy to deconstruct and interpret film (Briley R, 2006, p.5). Therefore it is clear that historical films should not be ignored or dismissed in the teaching of history as they can beneficial. Historical film adds a spice to history; it is good to sometimes change from reading through books, documents and manuscripts but instead to visualise and hear history. Therefore despite the fact that a film cant be entirely historically accurate in the view of historians, it can be accurate in the sense that it can be extremely beneficial to the study of history as well as creating a new enjoyment and interest in it.

Friday, October 25, 2019

Advertising :: essays papers

Advertising Nowadays, advertising is a very big business. Very often is the major means of competing among firms. Furthermore, supporters of advertising claim that it brings specific benefits for consumers. First off all, they claim that advertising provide information to consumers about the quality or the availability of several products. This is very important for consumers because they do not waste time for searching (search costs). If we suppose, that consumers want to shop at the lowest price shop but, they do not know which is the store with the lowest prices, then they gather information by reading and watching advertisements and TV commercials respectively or by visiting several stores. This action of consumers makes prices to fall, but only if consumers have the appropriate information. Otherwise the prices may rise. Supporters of advertising also claim that advertising may encourage price competition among the firms, if prices feature significantly in the advertisement. In addition to this, by increasing sales through advertising, firms can gain economies of scale, which means that it will help to keep prices down. As we can understand information is very essential for consumers, not only because it lowers the prices, but also because it improves the quality of several products. The problem here is that it is unlikely for all the consumers to have perfect information. This means that the information is either imperfect or asymmetric. Imperfect information, as well as asymmetric information, lowers quality. Advertising may solve this problem in most cases. Consumers can gather information for several products through advertisements and because of this, producers must improve the quality of their products. But why firms advertise so much? As I noted above advertising increases consumer ¡Ã‚ ¦s information. So we can suppose that a firm which advertise much, has high quality products. A very expensive advertising campaign is something like a signal to potential consumers, that the firm believes that its product has good quality. Furthermore the company believes that because of its good quality products, is going to make repeat sales for a long time in order to  ¡Ã‚ §recoup the fixed costs of initial advertising ¡Ã‚ ¨. On the other hand, firms with poor quality products  ¡Ã‚ §that know that consumers will soon discover they have been misled about quality ¡Ã‚ ¨, do not invest much in advertising.