Thursday, December 26, 2019

The Impact of Sex in the Media on Society Essay - 920 Words

According to a poll of 10 to 16 year olds done by the advocacy group Children Now, 77 percent say that there is too much premarital sex on T.V., while 62 percent say sex on T.V. and in movies influences kids to have sex when they are too young (Clark, Sex, Violence). The influences of the media is felt everywhere and especially in terms of human sexuality. Everything from TV commercials to the newspaper has some form of sex in it, usually to keep the audience interested. In modern society, the changing times as well as media executives wanting more ratings(and therefore money) have lead to teenagers more willing to try sexual acts at a younger age and the country being more openminded about sexual issues. The main cause behind the†¦show more content†¦How a teen is effected by it can vary. Due to the effects of sexuality in the media, more teens are open to sexual acts and at a younger age now. Adolescents are now open to hook-ups or friends-with-benefits, where they have ca sual sexual encounters at parties and clubs between youngsters who are not emotionally involved with one another which are influenced by new techology and take away the first date which would help put safe sex into the teens minds (Friedman). Some folks are worried that the sex in the media will counteract sex education and do not include problems that having sexual intercourse can bring about. In his article Sex, Violence and the Media, Charles S. Clark explains: To some..., the chief concern is that AIDS, sex education, birth control or abortion are seldom mentioned as the fictional characters hop from bed to bed. But others see the danger in the... message communicated though steady repetition that everyones doing it. (1) Overall, hopefully teenagers are still getting the message to stay safe if they choose to become sexually active in the face of the medias negative influence regarding sex. Another cause of the increase of sex in the media is that times have changed and perceptions about sex have been altered. In her article Teen Sex, Jane Friedman explains how in the 50s and 60s couples in a marital relationship like Lucy and Ricky Ricardo of theShow MoreRelatedViolence And Sex On Television898 Words   |  4 Pages Violence and Sex on Television: Effects on the Younger Audience In today’s society, the media is used greatly for communication, advertisement, information, and for numerous other reasons. The world has evolved by technological advances as well as by the type of content that is put out on the internet, radio, and especially on television. In particular, violence and sex are two of the most controversial content types that have been recently used loosely in the present as compared to theRead MoreCulture and the Mass Media1400 Words   |  6 PagesImpact of Mass Media on Enculturation The mass media and culture go hand and hand in today s society. The American culture thrives on the Mass media and this has become American culture today. â€Å"Mass media is any medium used to transmit mass communication. Until recently mass media was clearly defined and was comprised of the eight mass media industries; books, newspapers, magazines, recordings, radio, movies, television and the Internet (Lane, 2007).† The mas media is no longer simple to defineRead More Views on Teens Pregnancies Through the Years Essay844 Words   |  4 Pagestheir actions. Taking that into consideration the influences of the teens are highly important during the pre teen stage all the way to adult hood. During the time of this impressionable stage many of the teens are having sex not because of love, but because it is a trend. The media is glamorizing teen pregnancy and leading to a cultural shift. Around the world teenage pregnancy has been an issue. Many of the teen mothers are between 15 and 19. There have been a variety of attempts to provide a declineRead MoreSex And Violence In The Media Influence Teen Behavior.1405 Words   |  6 PagesSex and Violence in the Media Influence Teen Behavior In the 21st Century Sex and Violence in the media has had a good and bad impact on our society. It is very common around the world that many kids are exposed to violence or some type of sexual activity rather in household or in the media. The media has become a common reason as to why violence occur. Teenagers in the 21st century are exposed to more sexuality and violence than ever. Being exposed to sex and violence has had a bad impact on teensRead MoreLabelling Society As An Agitated State Over The Phenomenon Of Sex Offenders1521 Words   |  7 PagesLabelling society as an agitated state over the phenomenon of sex offenders and sex crime has been well documented with sex offenders inciting a vast amount of fear and anxiety amongst the general public over the decades. Due to this evoked sense of moral panic lawmakers have been passing legislative initiatives and social policies since the early 1990’s in order to protect the public from sexual victimization. Taken together from reviewed literature it is apparent that there are numerous contributorsRead MoreMedia And Its Effects On Society976 Words   |  4 PagesIn today’s society if one were to walk down a populated sidewalk, it would seem merely impossible to spot a sole not twiddling away on their phone. With an entire world unfolding at their fingertips, we witness a society that has become addicted to media. Used as a powerful source of knowledge and entertainment, media plays an enormous role in the development of human life and gender distinction. Through the use of media, guidelines consisting of generated ideas and ways of living, affect both menRead MoreJust living in a Material World1000 Words   |  4 PagesWhat makes the American society American? Is it our big cities? Our adaptations to new technology? Our extravagant shopping opportunities? Is it the convenience of our society? The fast food opportunities? The drive-thrus? It is our emphasis on personal travel and transportatio n means? Or is it our desire for wealth and success? Many Americans focus on these aspects of our society to be happy in their lives. Americans strive to be the best and often little will stop them on their way. There is anRead MoreMedia And Its Influenceon Relationships . Summary Of Proposal1422 Words   |  6 Pages MEDIA AND ITS INFLUENCE ON RELATIONSHIPS Summary of Proposal The correlation between the use of social media and the stigma around the â€Å"hookup† culture among young adults will be exlplored in this study. Participants will range from ages sixteen to twenty one and half will be engaged in social media and the other half will not. Since previous research studies have shown that the stigma around the â€Å"hookup† culture has evolved, this study will examine whether or not social media is aRead More The Growing Trend of Sex and Violence in Media Today Essay examples692 Words   |  3 PagesModern day society is composed of rules and structures. The general public has become much more sensitive over the years, resulting in a very politically correct atmosphere. Moreover, parents have decided that the opportune way of reaching their ambitions is through the lives of their children. Under this strict lifestyle, one would presume that our values are very conservative. Surprisingly, the opposite is true. Due to the sexual and vi olent permissiveness in today’s Multi-Media, our society has developedRead MoreMedia Influence On Women s Body Image1688 Words   |  7 Pageschanged in many ways. This is very evident in the female sex, especially through media. â€Å"Americans spend about 68 hours per week exposed to various forms of media† (US Census Bureau 2009). This media exposure through outlets such as t.v., radio, music videos, movies, and the internet, all influence the way people think about gender. The media influence is very evident in the way people view women and think about women in different cultures. Media influence on women creates negative viewpoints with how

Wednesday, December 18, 2019

Plato s Ion, Socrates, And Socrates - 855 Words

In Plato’s Ion, Socrates tries to prove that all poets are ignorant. He did not leave out himself, as a matter of fact, what separated Socrates from the others is the fact that he knew he was ignorant. In Socrates conversation with Ion- the rhapsode, he was able to prove that Ion is ignorant by asking him about Homer and another poet who spoke about the same topic, Ion was able to speak up about the questions on Homer, but not that of the other poet, even though they both spoke about the same content. Socrates believed that beautiful speech requires knowledge, and even though the Rhapsodes are ignorant, they were still able to speak beautifully, how is that possible? Socrates dilemma was divine inspiration. He believed that the goddess of memory speaks through the Rhapsodes. To further prove how ignorant Ion was, when Socrates mentioned this to him, he totally agreed with Socrates, even though it was meant as an insult. Also in Plato’s Ion, we saw two different teaching methods between Socrates and the rhapsodes. Socrates believed that for a student to learn they have to ask questions and be actively engaged in the conversation. However, the rhapsodes were more of an entertainer than a teacher. They would dress very nicely and recite the poems to the students as if they were audiences, and in turn the students were required to retain the information given by the rhapsodes. Section IV: Main Post: Plato’s Republic In this section, what was most important and interesting toShow MoreRelatedThe Evolving Role of Poetry and the Poet Essay1751 Words   |  8 Pagesconsists of a series of footnotes to Plato, claimed Alfred North Whitehead in 1929s Process and Reality. Plato studied under Socrates in Athens, Greece, and showed a deep interest for politics. It wasnt until Socrates death that Plato turned from politics to philosophy. He developed Idealism in opposition to the belief of the Sophists and opened a school in Athens. The Academy was one of the first organized schools in Western Civilization it was here that Plato taught his most famous student, AristotleRead MoreThe Body And The Soul1153 Words   |  5 PagesAn Analysis of the Distinctions of the Body and the Soul in the Philosophy of Socrates This philosophical study will define the distinctions of the body and the soul as defined in the philosophy of Socrates. In the Phaedo, Socrates defines the important distinction between the †visible† body and the â€Å"invisible† substance of the soul. Socrates defines the temporal and changing nature of the visible body, which is impermanent. In contrast to this view, the soul is a higher form of incomposite energyRead MorePlato s Classical Athenian Architecture, Drama, And Arts1762 Words   |  8 PagesPlato Plato was born around 428 B.C., Both of Plato’s parents were from distinguished aristocratic families. Besides being born into an illustrious family, Plato was born into an illustrious city. He was born in the wake of Athens’s Golden Age, the period that had witnessed Athens’s the beginning of the strongest Greek power, the birth of classical Athenian architecture, drama, and arts. His father Ariston died when he was a child. His mother Perictione remarried the politician Pyrilampes. He wasRead MoreThe Philosophy of Socrates: a Lover of Wisdom2030 Words   |  9 PagesRunning Head: THE PHILOSOPHY OF SOCRATES 1 The Philosophy of Socrates: A Lover of Wisdom (2052 Words) THE PHILOSOPHY OF SOCRATES 2 The lessons of life that are delivered by Socrates act as a basis for Western philosophy. Plato, the writer of The Apology, significantly respects Socrates and his dialogues act as aRead MoreAn Analysis Of Tolstoy Tolstoy s The Sigh 2435 Words   |  10 Pagesabout the relationship between art and life most similarly to the way that I do, and Plato thinks about the relationship between art and life most contrary to the way that I do. In Plato s piece Ion, Socrates believes Ion can only recite Homer s poetry due to inspiration, and not art. (Plato, 64). On a fundamental level, Plato believes that all artists must have common knowledge to truly be artists. Unlike Plato, Tolstoy believes that â€Å"great works of art are only great because they are accessibleRead MoreLibrary Management204752 Words   |  820 PagesCongress Subject Headings: Principles and Application, Fourth Edition Lois Mai Chan Developing Library and Information Center Collections, Fifth Edition G. Edward Evans a nd Margaret Zarnosky Saponaro Metadata and Its Impact on Libraries Sheila S. Intner, Susan S. Lazinger, and Jean Weihs Organizing Audiovisual and Electronic Resources for Access: A Cataloging Guide, Second Edition Ingrid Hsieh-Yee Introduction to Cataloging and Classification, Tenth Edition Arlene G. Taylor LIbRaRy and InfoRMaTIon

Tuesday, December 10, 2019

Guidelines and standards govern the Human Machine Interactions

Question: Discuss about the International Guidelines and standards that govern the Human Machine Interactions. Answer: Introduction HCI has been working over the ISO ergonomics, with user interface and the software engineering standards. This has helped the user interface and standards to contain the different precise specifications. The standards are set under the context of use, and the user test methods, software interface, interaction and the different software quality standards, the hardware interface and the display terminals, the user centred process set for the development and the capability of the organisation to be considered as user centred (Cakmak et al., 2016). As per the evaluation, HCI works over the evaluation of the designing, evaluation and the implementation for the human use and the study of the major phenomenon that has been set around it. It is important for the individual user, group of users who are working together to focus on the embedded system, user interface where the computers are expensive and are used by the technical people only. Literature Review As per the analysis, the HCI focus on the concerns related to the selection of a proper input device. Here, the International guidelines are depending upon the input and output devices to track the task and determine the style for interaction. The development and improvement with safety standards works over appealing the users and operators to interact with the computer based systems in remote manner (Lancia et al, 2017). The utility matches with the extent to provide the right functionality so that it becomes easy for the user to build on the formulas and the other programs. The standards are set with the general principles from where the interfaces and the procedures could be derived. Here, the focus is on ISO/IEC JTC1 where the SC35 has been for the user interfaces set with evolving the work on the keyboard layout. Here, this also requires the reconciliation of the different usability forms for representing the access to information through internet, international standards which are expensive and difficult as well. The use of the product is set with the effectiveness, efficiency and the satisfaction, where the process is about the development of a product, and holding the capability to apply the user centred designs (Burkhart, 2016). The development of the ISO standards for the HCI focus on the national standard bodies where the focus is on the published documents which tend to change in the significant manner from version to version till there is a consensus which is reached. The standards are set with contexts and the testing methods where the product quality and the quality model are to define the use metrics, guidance on usability and the methodology for the ISO 9241-11. The hardware interface and the development process work with the interactive systems where the usability methods support the human centred designing process and proper descriptions which are related to the ergonomic requirements. Here, the approaches are set to impose the consistency wi th the interface components like the icons and the PDA scripts and the other cursor controllers. This will help de-factor industry to work over the standards which are influential than the other ISO forms. The ISO 9241 HCI has a major impact with activities needing to produce the usable forms of the products. The principles are set with refining the model which could be used to assess the capability of the organisation and working over carrying out the user centred designs as well (Akash et al., 2017). The product oriented bottom up approach is set with making the systems easy to use. Here, the usability though the International guidelines and Standards for the HMI or HCI (Human Computer Interactions) is based on the high-level quality objective with designed usability programs as well. The International Guidelines for HCI depend on the effectiveness, efficiency and the usability formats with proper accomplishment of the goals and consider about the performance for the on-line purchase. The appealing of the user is through gaining the market share and working over buying or using the products with the higher standardised forms. The Google search engine has a higher market with better efficiency as well. The productivity with lowered costs help in improving the standards of the business management system. Here, the disciplines of the computer science and the linguistics are for speech synthesis and recognition which works over the computing of the systems, with providing a proper information about the human mental capabilities as well (Badie, 2016). The sociology is for designing the practices and work over the effective designing of the posters, brochures and the logs with visual communication. Analysis As per the analysis, the International Standards are set for the different activities for the quality and the usability requirements. Here, ISO 9241-11 and ISO 14598-1 has been used where there is an incorporation of the usability into the quality system and designing process. The product oriented standards are for the relative contribution to the software quality. This has been mainly to deal with the usability forms where the ISO 9241 has been for the office work with proper display of the visual terminals. Here, the standards are also specific for the details and appearance and behaviour of user interface. This will provide a complete evaluation of the user interfaces which depends on the user, task and the environment. The product with no major intrinsic usability holds the capability to be used for a context. The industry designing is applied for the different usability of the products which needs to be improved. It also works over the interactive and the interaction designers who work on evaluating the products related to methods and principles (Shih et al., 2016). The UI design engineers are the people who develop the model with end user experience, where the information architecture is for the user experiences. The HCI designing is to identify the needs and establish proper requirements, that will be helpful in handling the easy functioning of the website, with availability of the information as well. The compatibility, usability and making the system easy for the use are important points which needs to be focused on to work over the technology growth, control and the user standards. Application to the real world The real-time applications from industrial fields, manufacturing to autonomous exploration is for the remote planets. The robotics deals with the designing, construction, manufacturing and the application of robots. The swarm applications for the real robots is not used because it is found to be economical with the high costs and the larger area is also required for the execution purpose (Schutte, 2017). The hand gesture real time application is one of the example, where the use of tracking algorithm which involves the motion modelling and the motion analyses. The detecting of the skin and the non-skin colours is the parameter for the real-world applications. the track is also about the intensity with the weighted centroid method that tends to keep the track of skin regions as well. The real-time application of the hand gesture includes the foot-bot robot which is in the swarmanoid project, where the foot-bot robot is for the swarm applications. Here, there are different subsets for the sensors and the actuators which are for the platform to work over the recognition of the gestures. The motorised tracking based wheels also allow the robot to move at a speed, where there are infrared based range and the bearing sensor that allow to detect the line of sight. The second example is about designing a car with the interactive display which also allow the buyer of the car to select the different numbers based on the site that is used for the new cars. The selection of the dialogue is to direct towards the non-technical user where the perspective buyer has to work to make choice for the car. The other solution is based on the orientation, with different visual switches and on-off types of attributes like the binding of edges and the other similar properties. Conclusion The ISO standards 20282 is for the ease of operations for the different products where there is a need to define the user applications with specific test methods for measuring the easy of operations. Here, the common industry formats are mainly to document the usability test reports and the surface interface and interaction (Lancia et al., 2017). This includes the suitability for the task, learning, individuals who work on the user expectations with proper control and the tolerance of error. There are assessments for the conformance which is related to the principles in ISO 9241. Here, the continued tension is mainly producing the national standards to meet the needs of the large markets that tend to contribute towards the international standards. References Cakmak, H., El Haddad, K. (2016). SCE in HMI Social Communicative Events in Human Machine Interactions. Burkhart, C. (2016). L-8: Using Human-Machine Interactions to Enhance Astronaut Performance and Adaptation in Reduced Gravity Environments. Badie, F. (2016). Concept representation analysis in the context of human-machine interactions. InProceedings of the 14th International Conference on e-Society(pp. 55-62). Shih, V., Zhang, L., Kothe, C., Makeig, S., Sajda, P. (2016, October). Predicting decision accuracy and certainty in complex brain-machine interactions. InSystems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on(pp. 004076-004081). IEEE. Schutte, P. C. (2017). How to make the most of your human: design considerations for humanmachine interactions.Cognition, Technology Work,19(2-3), 233-249. Akash, K., Hu, W. L., Reid, T., Jain, N. (2017, May). Dynamic modeling of trust in human-machine interactions. InAmerican Control Conference (ACC), 2017(pp. 1542-1548). IEEE. Lancia, L., Chaminade, T., Nguyen, N., Prevot, L. (2017, August). Studying the link between inter-speaker coordination and speech imitation through human-machine interactions. InInterspeech 2017.

Monday, December 2, 2019

Upon Examining Issues Of Mind And Thought, The Questions Of Artificial

Upon examining issues of mind and thought, the questions of artificial intelligence and its capabilities become important considerations for answering the ultimate question of what thought truly is. Computerized calculation is one of the few events that is somewhat analogous to human cognitive thought, so the extension of this current technology to more advanced future applications makes it a very interesting testing area for questions into consciousness. If one concludes that the advancement from cash registers to present day computers is a step closer to human thought, then we must concede that progressing technology will bring us closer and perhaps to the very point of true cognitive skills. The dilemma left to us philosophers and scientists is to determine when a machine has reached the point of thought, or at least to create a rough guideline. A.M. Turing proposed a test to solve this problem. Named, appropriately enough, the Turing test, it contains a controversial method of te sting called the imitation game. The idea is to put one man and one woman in two rooms and have them questioned by an interrogator in a third room. The man would try to answer questions in a way which would suggest he is a woman. The woman attempts to answer in a way to reveal the truth of the matter. If the man fools the interrogator, it is said that he can think like a woman, or, at the very least, mimic a woman's responses. This game can also be played with a computer in the male slot, trying to convince the interrogator that it is human. It would follow reason that if a computer could pass this test, it could think like a human, or at least mimic one. Perhaps the abilities showcased in the test alone would not be sufficient, but Daniel C. Dennett claims that "[t]he assumption Turing was prepared to make was that nothing could possibly pass the Turing test by winning the Imitation Game without being able to perform indefinitely many other clearly intelligent actions" (Dennett 93) . One often cited criticism of this notion is the idea of mimicry. Imagine a program that stored an almost infinite amount of information regarding sentences and grammar and was able to spit out contextualy appropriate sentences to a wide variety of inquiries. The computer has no knowledge of what the information means; it is acting much as a parrot does. Luckily for Turing, there is no shortage of responses for this claim. First of all, as Douglas Hofstadter points outs, "[t]he number of sentences you'd need to store to be able to respond in a normal way to all possible sentences in a conversation is astronomical, really unimaginable" (Hofstadter 92). The computer would also have to contain a complex microprocessor to keep up with conversation in a timely and manageable fashion. It would have to be so advanced indeed that such a microprocessor might be considered a small scale brain, sorting through symbols and their meanings to form contextually valid responses. Accordingly, if su ch a machine existed, it would pass the Turing test and validate the method of testing at the same time. If a machine was capable of mastering the context-sensitive language we use, it may very well have a claim to true thought. At the very least, the computer would surpass mimicry and be labeled a simulation. Human thought is so complicated and demanding that any device that attempts to duplicate it with any success would have to be a highly sensitive simulation. Any machine that passes the Turing test must have a rudimentary "knowledge" of the information it is using and therefore is more than parrot . Assuming this is true, we must then ask hard questions about the value of simulation. The critical claim is that any simulation is just a simulation and not a real example of what it is simulating. Hofstadter finds this fallacious, as do I. First, any simulation can reasonable defined in this context as the recreation of a natural event by an agent other than nature. This view bring s up the idea of levels in simulation. A good example is Dennett's simulated hurricane in Brainstorms. From the programmer's vantage point, the God Upon Examining Issues Of Mind And Thought, The Questions Of Artificial Upon examining issues of mind and thought, the questions of artificial intelligence and its capabilities become important considerations for answering the ultimate question of what thought truly is. Computerized calculation is one of the few events that is somewhat analogous to human cognitive thought, so the extension of this current technology to more advanced future applications makes it a very interesting testing area for questions into consciousness. If one concludes that the advancement from cash registers to present day computers is a step closer to human thought, then we must concede that progressing technology will bring us closer and perhaps to the very point of true cognitive skills. The dilemma left to us philosophers and scientists is to determine when a machine has reached the point of thought, or at least to create a rough guideline. A.M. Turing proposed a test to solve this problem. Named, appropriately enough, the Turing test, it contains a controversial method of te sting called the imitation game. The idea is to put one man and one woman in two rooms and have them questioned by an interrogator in a third room. The man would try to answer questions in a way which would suggest he is a woman. The woman attempts to answer in a way to reveal the truth of the matter. If the man fools the interrogator, it is said that he can think like a woman, or, at the very least, mimic a woman's responses. This game can also be played with a computer in the male slot, trying to convince the interrogator that it is human. It would follow reason that if a computer could pass this test, it could think like a human, or at least mimic one. Perhaps the abilities showcased in the test alone would not be sufficient, but Daniel C. Dennett claims that "[t]he assumption Turing was prepared to make was that nothing could possibly pass the Turing test by winning the Imitation Game without being able to perform indefinitely many other clearly intelligent actions" (Dennett 93) . One often cited criticism of this notion is the idea of mimicry. Imagine a program that stored an almost infinite amount of information regarding sentences and grammar and was able to spit out contextualy appropriate sentences to a wide variety of inquiries. The computer has no knowledge of what the information means; it is acting much as a parrot does. Luckily for Turing, there is no shortage of responses for this claim. First of all, as Douglas Hofstadter points outs, "[t]he number of sentences you'd need to store to be able to respond in a normal way to all possible sentences in a conversation is astronomical, really unimaginable" (Hofstadter 92). The computer would also have to contain a complex microprocessor to keep up with conversation in a timely and manageable fashion. It would have to be so advanced indeed that such a microprocessor might be considered a small scale brain, sorting through symbols and their meanings to form contextually valid responses. Accordingly, if su ch a machine existed, it would pass the Turing test and validate the method of testing at the same time. If a machine was capable of mastering the context-sensitive language we use, it may very well have a claim to true thought. At the very least, the computer would surpass mimicry and be labeled a simulation. Human thought is so complicated and demanding that any device that attempts to duplicate it with any success would have to be a highly sensitive simulation. Any machine that passes the Turing test must have a rudimentary "knowledge" of the information it is using and therefore is more than parrot . Assuming this is true, we must then ask hard questions about the value of simulation. The critical claim is that any simulation is just a simulation and not a real example of what it is simulating. Hofstadter finds this fallacious, as do I. First, any simulation can reasonable defined in this context as the recreation of a natural event by an agent other than nature. This view bring s up the idea of levels in simulation. A good example is Dennett's simulated hurricane in Brainstorms. From the programmer's vantage point, the God

Wednesday, November 27, 2019

Book review on the cold war by mike sewell essays

Book review on the cold war by mike sewell essays For 50 years the world was dominated by two superpowers. The cold war was a confrontation between the United States and Soviet Union, with the belief that the ideology of the other side had to be destroyed. The Soviet Union believed that the conflict between capitalism and communism was inevitable. The United States believed that peace and stability in the world would only emerge when the evil of communism was abolished. The cold war was a significant era in the history of the world as it shapes the economic, political and the ideological world today. Mike Sewells The Cold War thoroughly covers all stages of this era chronologically, from its origins, the confrontation between the powers and the collapse of the communist party in the early 1990s throughout seven sections. One of the positive aspects of reading the cold war is that it is based on a monograph therefore confined to the study of one topic. Whereas reading a book like world history since 1945, by jack Watson may give you broader knowledge of a longer period however it does not go into depth about each topic so the reader is only left with basic knowledge about the particular topic. The vocabulary used by mike Sewell is straightforward which is a positive aspect due to the reason that its is a core textbook at a-level history therefore it is more accessible to a wider audience, as well as students who are more able to understand. As a student, this book may be helpful for the reason that it provides questions at the end of each chapter regarding what has just been discussed. This can be seen to be a positive aspect during revision of the topic. The cold war is crucial era in history and many writers have written and commented on the time, mostly with conflicting views. Mike Sewell has based most of his writing on previous books. At the beginning of each chapter he allows the reader to be aware of these references by providing footnotes to back up his op ...

Saturday, November 23, 2019

Biography of Aurangzeb, Emperor of Mughal India

Biography of Aurangzeb, Emperor of Mughal India Emperor Aurangzeb of Indias Mughal Dynasty (November 3, 1618–March 3, 1707) was a ruthless leader who, despite his willingness to take the throne over the bodies of his brothers, went on to create a golden age of Indian civilization. An orthodox  Sunni Muslim, he reinstated taxes and laws penalizing Hindus and imposing Sharia law. At the same time, however, he greatly expanded the Mughal empire and was described by his contemporaries as being disciplined, pious, and intelligent. Fast Facts: Aurangzeb Known For: Emperor of India; builder of the Taj MahalAlso Known As: Muhi-ud-Din Muhammad, AlamgirBorn: November 3, 1618  in Dahod, IndiaParents: Shah Jahan,  Mumtaz MahalDied: March 3, 1707  in Bhingar, Ahmednagar, IndiaSpouse(s): Nawab Bai,  Dilras Banu Begum,  Aurangabadi MahalChildren: Zeb-un-Nissa, Muhammad Sultan, Zinat-un-Nissa, Bahadur Shah I, Badr-un-Nissa, Zubdat-un-Nissa, Muhammad Azam Shah, Sultan Muhammad Akbar, Mehr-un-Nissa, Muhammad Kam BakhshNotable Quote: Strange, that I came into the world with nothing, and now I am going away with this stupendous caravan of sin! Wherever I look, I see only God...I have sinned terribly, and I do not know what punishment awaits me. (supposedly communicated on his deathbed) Early Life Aurangzeb was born on November 3, 1618, the third son of Prince Khurram (who would become  Emperor Shah Jahan) and the Persian princess Arjumand Bano Begam. His mother is more commonly known as Mumtaz Mahal, Beloved Jewel of the Palace. She later inspired Shah Jahan to build the Taj Mahal. During Aurangzebs childhood, however, Mughal politics made life difficult for the family. Succession did not necessarily fall to the eldest son. Instead, the sons built armies and competed militarily for the throne. Prince Khurram was the favorite to become the next emperor, and his father bestowed the title Shah Jahan Bahadur, or Brave King of the World, on the young man. In 1622, however, when Aurangzeb was 4 years old, Prince Khurram learned that his stepmother was supporting a younger brothers claim to the throne. The prince revolted against his father  but was defeated after four years. Aurangzeb and a brother were sent to their grandfathers court as hostages. When Shah Jahans father died in 1627, the rebel prince became Emperor of the Mughal Empire. The 9-year-old Aurangzeb was reunited with his parents at Agra in 1628. The young Aurangzeb studied statecraft and military tactics, the Quran, and languages in preparation for his future role. Shah Jahan, however, favored his first son Dara Shikoh and believed that he had the potential to become the next Mughal emperor. Aurangzeb, Military Leader The 15-year-old Aurangzeb proved his courage in 1633. All of Shah Jahans court was arrayed in a pavilion and watching an elephant fight when one of the elephants ran out of control. As it thundered toward the royal family, everyone scattered except Aurangzeb, who ran forward and headed off the furious pachyderm. This act of near-suicidal bravery raised Aurangzebs status in the family. The following year, the teenager got command of an army of 10,000 cavalry and 4,000 infantry; he soon was dispatched to put down the Bundela rebellion. When he was 18, the young prince was appointed viceroy of the Deccan region, south of the Mughal heartland. When Aurangzebs sister died in a fire in 1644, he took three weeks to return home to Agra rather than rushing back immediately. Shah Jahan was so angry about his tardiness that he stripped Aurangzeb of his viceroy of Deccan title. Relations between the two deteriorated the following year, and Aurangzeb was banished from court. He bitterly accused the emperor of favoring Dara Shikoh. Shah Jahan needed all of his sons in order to run his huge empire, however, so in 1646 he appointed Aurangzeb governor of Gujarat. The following year, the 28-year-old Aurangzeb also took up the governorships of Balkh (Afghanistan) and Badakhshan (Tajikistan) on the empires vulnerable northern flank. Although Aurangzeb had a lot of success in extending Mughal rule north and westward, in 1652 he failed to take the city of Kandahar, Afghanistan from the Safavids. His father again recalled him to the capital. Aurangzeb would not languish in Agra for long, though; that same year, he was sent south to govern the Deccan once more. Aurangzeb Fights for the Throne In late 1657, Shah Jahan became ill. His beloved wife Mumtaz Mahal had died in 1631 and he never really got over her loss. As his condition worsened, his four sons by Mumtaz began to fight for the Peacock Throne. Shah Jahan favored the eldest son Dara, but many Muslims considered him too worldly and irreligious. Shuja, the second son, was a hedonist who used his position as governor of Bengal as a platform for acquiring beautiful women and wine. Aurangzeb, a much more committed Muslim than either of the elder brothers, saw his chance to rally the faithful behind his own banner. Aurangzeb craftily recruited his younger brother Murad, convincing him that together they could remove Dara and Shuja and place Murad on the throne. Aurangzeb disavowed any plans to rule himself, claiming that his only ambition was to make the hajj to Mecca. Later in 1658 as the combined armies of Murad and Aurangzeb moved north toward the capital, Shah Jahan recovered his health. Dara, who had crowned himself regent, stepped aside. The three younger brothers refused to believe that Shah Jahan was well, though, and converged on Agra, where they defeated Daras army. Dara fled north but was betrayed by a Baluchi chieftain and brought back to Agra in June 1659. Aurangzeb had him executed for apostasy from Islam and presented his head to their father. Shuja also fled to Arakan (Burma) and was executed there. Meanwhile, Aurangzeb had his former ally Murad executed on trumped-up murder charges in 1661. In addition to disposing of all of his rival brothers, the new Mughal Emperor placed his father under house arrest in Agra Fort. Shah Jahan lived there for eight years, until 1666. He spent most of his time in bed, gazing out the window at the Taj Mahal. The Reign of Aurangzeb Aurangzebs 48-year reign is often cited as a Golden Age of the Mughal Empire, but it was rife with trouble and rebellions. Although Mughal rulers from Akbar the Great through Shah Jahan practiced a remarkable degree of religious tolerance and were great patrons of the arts, Aurangzeb reversed both of these policies. He practiced a much more orthodox, even fundamentalist version of Islam, going so far as to outlaw music and other performances in 1668. Both Muslims and Hindus were forbidden to sing, play musical instruments, or to dance- a serious damper on the traditions of both faiths in India. Aurangzeb also ordered the destruction of Hindu temples, although the exact number is not known. Estimates range from under 100 to tens of thousands. In addition, he ordered the enslavement of Christian missionaries. Aurangzeb expanded Mughal rule both north and south, but his constant military campaigns and religious intolerance rankled many of his subjects. He did not hesitate to torture and kill prisoners of war, political prisoners, and anyone he considered un-Islamic. To make matters worse, the empire became over-extended and Aurangzeb imposed ever higher taxes in order to pay for his wars. The Mughal army was never able to completely quash Hindu resistance in the Deccan, and the Sikhs of northern Punjab rose up against Aurangzeb repeatedly throughout his reign. Perhaps most worryingly for the Mughal emperor, he relied heavily on Rajput warriors, who by this time formed the backbone of his southern army and were faithful Hindus. Although they were displeased with his policies, they did not abandon Aurangzeb during his lifetime, but they revolted against his son as soon as the emperor died. Perhaps the most disastrous revolt of all was the Pashtun Rebellion of 1672–1674. Babur, the founder of the Mughal Dynasty, came from Afghanistan to conquer India, and the family had always relied upon the fierce Pashtun tribesmen of Afghanistan and what is now Pakistan to secure the northern borderlands. Charges that a Mughal governor was molesting tribal women sparked a revolt among the Pashtuns, which led to a complete breakdown of control over the northern tier of the empire and its critical trade routes. Death On March 3, 1707, the 88-year-old Aurangzeb died in central India. He left an empire stretched to the breaking point and riddled with rebellions. Under his son Bahadur Shah I, the Mughal Dynasty began its long, slow decline into oblivion, which finally ended when the British sent the last emperor into exile in 1858  and established the British Raj in India. Legacy Emperor Aurangzeb is considered to be the last of the Great Mughals. However, his ruthlessness, treachery, and intolerance surely contributed to the weakening of the once-great empire. Perhaps Aurangzebs early experiences of being held hostage by his grandfather and being constantly overlooked by his father warped the young princes personality. Certainly, the lack of a specified line of succession did not make family life particularly easy. The brothers must have grown up knowing that one day they would have to fight one another for power. In any case, Aurangzeb was a fearless man who knew what he had to do in order to survive. Unfortunately, his choices left the Mughal Empire itself far less able to fend off foreign imperialism in the end. Sources Ikram, S.M, Ed. Ainslie T. Embree.  Muslim Civilization in India. New York: Columbia University Press, 1964.Spear, T.G. Percival. â€Å"Aurangzeb.†Ã‚  Encyclopà ¦dia Britannica, 27 Feb. 2019.Truschke, Audrey. â€Å"The Great Aurangzeb Is Everybodys Least Favourite Mughal.†Ã‚  Aeon, 4 Apr. 2019.

Thursday, November 21, 2019

Answer the questions Research Paper Example | Topics and Well Written Essays - 1000 words

Answer the questions - Research Paper Example In other words, the term ‘paradigm shift’ is used to show a considerable change in a basic model or perception. Nanomachines are still an emerging field of technology. Governments and large corporations are spending huge sums on research and development in the field of nanorobots. The first stream of research is nanomedicine that aims to utilize nanobots for cellular level operations. An example is the work by the Harvard and MIT researchers who attached chemotherapy drug to nano-particles which are able to identify cancer cells and release the drug into them. Another area is the use of robot organisms for space and planet exploration and colonization. For this purpose, Symbrion and Replicator projects are going on under the Seventh Framework Program of the European Union. Also, efforts are undertaken to incorporate distributive intelligence, programming and control. The success of this research will lead to the development of nano-swarms which are capable of computing and collaborating intelligently. In the field of molecular computing, researches are taking place in two directions. The first direction is using DNA computers to analyze the human genome with the intention to get accurate data that can be utilized for medical diagnosis. The second direction is the application of evolutionary computation to molecular evolution. An example is the application of the genetic algorithm to molecular evolution. Mills’ utilitarianism is based on the ‘greatest happiness principle’. According to him, one should select such an action that offers the greatest degree of happiness to the greatest number of stakeholders. The first argument against Doomsday Argument is the posteriori observation that claims that the chances for the extinction of a dominant species like humans are less than once in a million years. Another argument is that the people of a heavily populated future are not yet alive. So, it is not

Wednesday, November 20, 2019

Law Term Paper Example | Topics and Well Written Essays - 1250 words - 1

Law - Term Paper Example The author will also try to explain why Canada has the highest rate of illegal MP3 downloads in the world. The author will analyze the legislative acts that regulate the copyright protection in Canada and will point out their weak points, those that make illegal music downloading possible and, to some extent, legal. Examples of law cases based on illegal MP3 download will be produced and analyzed. The research paper will be concluded with several suggestions on how this situation might be improved in such a way that Canada is no longer the â€Å"winner† among the top countries with the highest level of piracy in music downloads. The USA Digital Millennium Copyright Act has certainly gained its â€Å"fans† among the people who not so long ago were downloading mp3s without any restriction and who now must check twice before accepting a download or a file-sharing. The Digital Millennium Copyright Act has outlawed many online activities, among which it is easy to find the mp3 downloading. So, unless you are a librarian who desperately believes that music is important for the library (and you can even prove it) or a researcher, there is no other legal way which would allow you to download or share music files in USA. The DMCA and the United States Copyright Law also outlaw making copies of copyrighted music, unless it is for personal use. The infringements include penalties of thousands of dollars and jail sentence is also possible. In the USA the copyright belongs to the composer and it is created from the moment that the composition is â€Å"fixed in any tangible medium of expression†1. So if one wishes to download that composition, it is recommended under the provisions of the US Copyright Law and the DMCA that he does it from an authorised legal site, by purchasing it from the provider. Furthermore, peer-to-peer sharing is also prohibited under the law regulations. In Canada, on the other hand, music downloading

Sunday, November 17, 2019

Investigating the effectiveness of Mobile Antivirus Application on Android and Windows Mobile Phone Essay Example for Free

Investigating the effectiveness of Mobile Antivirus Application on Android and Windows Mobile Phone Essay Chapter 1: Anti-virus Applications on Mobile Devices Mobile phone anti-virus software refers to security software programs which have been professionally developed to protect device users from viruses, worms, Trojans and other malicious programs and removing them where possible. Anti-virus software programs have lately gained popularity due the increased incidences of malicious threats of attack on the web. There are several new viruses that are detected on a day to day basis on the cyberspace. While some of these viruses may be harmless, others are annoying and quite destructive. Certain viruses replicate themselves, but others may cause serious problems to the extent of erasing all data on a device drive. The use of anti-virus for device protection can be applied to multiple operating systems including Mobile Windows and Android mobile phones (iSoftwareReviews 2010). Antivirus software works in various technical ways to give protection to and remove viruses from mobile devices. This normally occur through two security scanning functions namely On-Access Scanning and On-Demand Scanning. The On-Access scanning works in real-time to ensure a mobile device is protected at all times by monitoring for viruses to any accessing in the mobile device, for example while opening a file or opening an application. Despite of the fact that this software slows down the speed of a device, its role in antivirus protection is so critical and should thus be enabled at all times. On-Demand Scanning offers antivirus protection only when activated to scan any particular area, folder, file, or drive. The program then provides a scan report about how many viruses that have been found in the scanned item. In the event that a virus is detected, the program will notify the user and recommend an action which includes either to deleting or quarantine the virus (iSoftwareRevie ws 2010). The rapidly increasing advancements of mobile phone technology to include a number of useful features have made android and windows mobile phones very popular pocket personal computers. This increased popularity has not however come with its own setbacks. Just like the ordinary personal computers, android and windows mobile phones have also been subjected to increased viruses attack. Virus attack has therefore become the latest and single biggest threat to the mobile phone industry. Subsequently, numerous companies dealing in software have come up with anti-virus for use in the android and windows mobile phones. These are mainly anti-virus software packages developed to provide anti-virus protection to mobile phones (iSoftwareReviews 2010). There are a number of anti-virus software programs for mobile phones that are available to the users. The main mobile phone anti-virus software includes AhnLab Mobile Security, Avast! PDA Edition, Avira Antivir Mobile, BitDefender Mobile Security, BullGuard Mobile Antivirus, Dr.Web Mobile Security Suite, F-Secure Mobile Security, Kaspersky Mobile Security, and Norton Smartphone Security. AhnLab Mobile Security software provides a solution for viruses and worms protection and removal. It runs under windows mobile and android mobile phones. Avast! PDA Edition is an antivirus protection for PalmOS and Windows CE, Android phones, and Pocket PC based devices (iSoftwareReviews 2010). Avira AntiVir Mobile provides professional virus and malware protection for pocket PCs, Windows mobile and Android mobile phones. BitDefender Mobile Security provides solution for virus protection and removal for PDAs and Smartphone that run on Windows mobile or Android mobile phones. BullGuard Mobile Antivirus provides solutions for protecting Pocket PCs and Windows mobile against viruses and other malicious programs. Dr.Web Mobile Security Suite is designed to provide anti-virus security solutions for pocket PCs that runs on Windows Mobile operating system. F-Secure Mobile Security is a complete mobile security software package that includes anti-virus, anti-spyware, a firewall and a remote control anti-theft feature for protection. Kaspersky Mobile Security also provides a complete protection package including Anti-theft protection, virus protection, firewall and anti-spam for SMS, EMS, and MMS. Norton Smartphone Security offers anti-virus, anti-spam, and firewall for Windows mobi le and Android mobile protection (iSoftwareReviews 2010). Protecting an android and window mobile phone from attack requires a complete understanding of all application communication. This is important because software can only protect a device if and only if it is able to read the same information as the mobile phone device, subsequently application layer threats. It may not be possible within the technological framework for antivirus software to understand application communications or analyse application behaviour through the deep inspection of intrusion prevention packets, whether on individual basis or when reassembled into their original sequence. Similarly, network-level antivirus may detect a small number of known, easily identifiable security threats by simply examining pre-programmed patterns (Citrix Systems 2006).   Installation of antivirus is the best known way of protecting android and windows mobile phones. The best types of antivirus are the application firewalls since they operate at the application layer instead of the network level. The application firewalls are able to enforce correct application behaviour while preventing any malicious activity. This is because the firewalls are able to inspect the actual internet communication and understand the context of all client requests and application responses through which they are sent to the internet. A complete mobile phone security application needs to offer full protection of all the elements of an application as well as users of the application. In most cases however, security applications for mobile phones are only limited to the application programme and application data (Citrix Systems 2006). Thesis Statement Despite web devices continuing to face significant security threats, mobile phones go completely unprotected while web browsing, downloading applications, checking e-mail, conducting online banking and connecting to social networking sites like Twitter and Facebook. While mobile attacks are increasing rapidly and hackers are financially motivated to steal data, identities, and intercept corporate communications, it has become critical to protect mobile devices such as android phone and Windows phones. Background of the study Smartphone security is the process of preventing and detecting unauthorized use of your system. Prevention measures help you to stop unauthorized users (also known as intruders) from accessing any part of your mobile phone system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use android and windows mobile for everything from banking and investing to shopping and communicating with others through email or chat programs.   Although you may not consider your communications top secret, you probably do not want strangers reading your email, using your phone to attack other systems, sending forged email from your phone, or examining personal information stored on your phone (such as financial statements). There are a variety of antivirus software packages that operate in many different ways, depending on how the vendor chose to implement their software. What they have in common, though, is that they all look for patterns in the files or memory of your Smartphone that indicate the possible presence of a known virus. Antivirus packages know what to look for through the use of virus profiles (sometimes called signatures) provided by the vendor. New viruses are discovered daily. The effectiveness of antivirus software is dependent on having the latest virus profiles installed on your Smartphone so that it can look for recently discovered viruses. It is important to keep these profiles up to date. Chapter 2: Android Phone Emulators An android mobile phone is a phone fitted with a set of software consisting of operating systems, middleware and other major applications. The main features of android include application framework for facilitating reuse and replacement of components, Dalvik virtual machine which is optimised for mobile devices, optimised graphics, an integrated browser, media tools for common audio, video and still image formats, SQLite for structured data storage, and GSM Telephony. Other features include Bluetooth, Camera, and Rich development consisting of a device emulator, tools for debugging, memory and performance profiling. Android technology is dependent on Linux version 2.6 to power the main system servicing including security, memory management, process management, network stack, and driver models (Android Developers 2010). Android technology is made up of a multi-process system in which each application runs in its own process. A standard Linux facility is responsible for coordinating security between different applications such as user and group identifications assigned to the applications in Android mobile phone. The crux of the security applications is on the basis of the concept that no application, by default, has access to perform any operation with a potential of adversely impacting on other applications, the operating system, or the user. The applications that the Linux facility must grant permission include reading or writing the user’s private data, reading or writing another application’s file, performing network access, and keeping the device awake. The permission that an application requires is statistically declared in that application so that Linux facility can master the upfront during installation and not subject to change thereafter (Android Developers 2010). The antivirus software for mobile forms utilises various virus detection methods. The two main virus detection methods include signature based detection and behaviour based detection. Signature Based Detection makes use of virus signatures dictionary to compare the files when checking for viruses. A signature dictionary is a database containing very many virus signatures which the software manufacturer has so far found. The user is expected to continually update the virus signature directory as when new viruses, worms, Trojans, and other malicious programs appear. Failure to update the dictionary may lead to failure of the software to detect emerging viruses. The behaviour Based Detection is designed to monitor and control any activities in the device system for suspicious program behaviour. In the event that a suspicious behaviour is detected, the software probes further into that suspicious behaviour by applying the signature based detection to countercheck whether the activity is malicious or not. In the event that the suspicious program is malicious, an alert will be generated to notify the user. Android emulator is a virtual mobile device which runs on a phone system and allows the user to prototype, develop, and test android applications for possible malicious programs without necessarily using a physical device. This device mimics all the hardware and software features of a phone save for the fact that it cannot receive or make a call. As soon as a particular application starts to run on the emulator, it may make use of the services of the android platform to invoke other applications, access the network, and notify the user. The emulators also contain various debug capabilities like console from which the user can log kernel output, simulate application interrupts, and simulate latency effects and dropouts on the data channel (Android developers 2010). As stated earlier, android utilises a multi-process system in which each and every application runs on its own process. Since majority of the security between applications is granted at the process level, android emulators provide more detailed security features through a permission mechanism that enforces restriction on the specific operations that any particular process can perform and permission for granting ad-hoc access to specific pieces of data. While the emulators ensures that no application acts in a manner that can adversely affect another application, it is still possible for an application to encroach into the actions of another application as long as permission is forehand obtained in order to perform the foreign function not provided by the basic nucleus (Vennon 2010). The android emulators can also disallow these extraneous permissions on the basis of the certificates that were used to sign the application or by simply prompting the user. The permission that an application will require to function outside its nucleus is statistically declared by the emulators within the application and will be relayed to the Smartphone user, and the permission will not change. The android emulators consider malware to be malicious software designed to infiltrate a Smartphone system without the user’s informed consent (Vennon 2010).

Friday, November 15, 2019

Eclecticism: The Melting Pot of Education Essay -- Eclectic Teaching

Eclecticism: The Melting Pot of Education "Plasticene and self-expression will not solve the problems of education. Nor will technology and vocational guidance; nor the classics and the Hundred Best Books" (Aldous Huxley, English novelist, essayist, critic). If this is true, what will solve the problems of education? Hundreds have tried to answer that question and yet have said the same things over and over. A pure philosophy has never solved the problem of what to do about the education of the masses or the education of the individuahls, and because of that fact, I have not chosen any specific philosophy. I can only be described as eclectic, for I have taken different pieces from each of the five major philosophies and blended them into a personalized viewpoint. By drawing from the views of the great minds from the past, I have pieced together a way to describe what was already there: my point of view. Although I am eclectic, I have very strong opinions about what should be taught, and that is where I gather from the Essentialists. One of the basic beliefs of the Essentialists is that every child should, upon graduation, possess a basic body of knowledge. Included in this body of knowledge are such things as writing, reading, measurement, and computing. I agree that the child should have a basic body of knowledge, but I do not concur that it should be merely enormous rather than practical. In addition, I agree with the Essentialist beliefs that the program should be academically rigorous; that the teacher should model the correct behavior and instill such things as respect for authority, perseverance, dependability, dutifulness, consideration for others, and practicality. Traditional values and morals should be upheld ... ...hese various viewpoints has not influenced me to join a particular one, on the contrary they have strengthened my belief that no one person is right and only in a vast collection of cooperating educators and thinkers will the best environment for learning be achieved. Works Cited Donald Simanek's Pages, http://www.lhup.edu/-dsimanek/eduquote.htm Bagley, William C., Education and Emergent Man, Thomas Nelson and Sons, New York, 1934. pp 188-189. Adler, Mortimer J., et al., The RevoJution in Education, The University of Chicago Press, Chicago and London, 1963. pp. 96. Dewey, John, Dewey on Education: Appraisals, Random House, New York, 1966. pp. 132-133. Kneller, George. F., Existentialism and Education, John Wiley & Sons, Inc., New York, 1967. pp. 97. Skinner, B. F., The Technology of Teaching, Meredith Corporation, New York, 1968. pp. 148.

Tuesday, November 12, 2019

Ideaistic versus materialistic motivations Essay

Behind every great society, there is always a story. Today, the nation of America is referred to as God’s own land. With population of approximately 293,500,000 and land mass of GDP of approximately $10. 98 trillion per year, the country commands the respect of many of its fellow nations. The question that readily comes to heart is that; has this always been so? What we see in the nation of America today did not just start in a day. It was a process – one that was filled with patriotism from dedicated hearts. In fact, the wonderful story we hear of the great nation all started from the period called the American Revolution of 1775 when the then thirteen colonies of America gain independence from the British colonial power. Many people have from different schools of thought hold different views about this revolution. Some are of the idea that the revolution was based on the mere idealistic and scholarly works of some philosophers and sages of that time. On the other hand, some are of the opinion that these seeming patriots were merely motivated by their materialistic class interest. To this, I will say both sides have a point. I state the reason for my assertion in the following paragraph. Evidently, ideological belief in the notion of individual liberty and human equality was part of what motivated the revolution. This can be seen in the works of John Locke and Montesquieu. We can also see this in the declaration of independence. On the other hand, looking at it critically, some patriots of this revolution knew that the independence will bring political position to them. Some of the we motivated by the savour of power and authority that will be passed into their hands However, I think that no matter what the motivation was, it was a good fight. Generations to come will forever be grateful to them that they did and their name will be in the sand of time. Reference: Fleming, T. (1997). Liberty! : The American Revolution. New York: Viking.

Sunday, November 10, 2019

Power Gained by Deception

Hoe From Cornelius Usual to Kim Gong-UN, power gained by deception-by controlling the thinking style of the people, and power gained by physical or military force are two things that have always been a part of the world's politics through history. According to Citadel (Bibb† political deception may have a close relationship to and Impact on military operations† (page 2). These two Ideas both give the least positive ambiance, but they have never left the hands of the leaders of mankind.In a world where both methods† of gaining political authority exist, it is more appropriate to define the relationship between the two, than to compare and prove which is actually â€Å"better. † Deception and force have a chronological relationship: In the political aspect, the most effective way to gain what you want is by deception, and force is a necessity that follows to maintain the deception from dying out. Almost every major influence between societies- the so-called â⠂¬Å"mind war† that has happened through history expresses this relationship's definition.The Philippines, for instance, was conquered by the Spanish explorers for nearly 300 years. The long triumph of this colonization was not Like the other cases where the westerners' technological advancement caused the victory, but It was the huge Impact of Charlatanry that threw the rather innocent natives Into the traps of the Spanish. The Foolproof were not forced to refrain from fighting back, but they sincerely believed that they shouldn't.Shockproof (1990) wrote, â€Å"Using religious dogmas, they were able to convince the indigenous people, which they considered uncivilized and in need of guidance. (p. 83). Stopping the historical story here would make readers understand the power of deception, but the entire process of Spanish colonization did not work by deception only. The Spanish set strict rules for the natives to follow and implied punishments for anyone who went against it.Th e power of force is implied in this dictatorial colonization, and these rules were simply to make sure that the Filipinos stay inside the net of false beliefs. A lot of the native leaders were at flirts against the Integration of an unfamiliar society and the Influx of a belief they have never heard of, but It was the military strength they saw In the Spanish army that led them to stay low and eventually believe what they were told to believe. What could have happened if Spanish did not have the technology to create a sense of forceful power, a sense of position authority?The native would have not found the exotic idea credible, and sooner or later, would have abandoned the belief. Due to the fact that there was technological superiority, the power of force functioning alone would work and bring minimal results in the start, but it will definitely not last long because forcing them to obey by force would eventually lead the natives to fight back because they would know their rights to do so, and this belief would most likely be based on their own set of beliefs, their own, undisturbed source of Influence.Thus, it is generally agreeable that the power of psychological control Is Indomitable, but that fact does not Imply that the power of deception can stand on Its own. Another great example of a society ailing under deception, and being stuck â€Å"wealth the deception† with a power gained by military force would be North Korea, the home controlled by the well-known that their leader is the top of everything, and their â€Å"father† with the ultimate power.This may bring up a lot of political theory, but dictatorship, in its most basic sense, is a leader's deceiving of his people that everything should be done under his orders. Going back to the stated example, many would believe that the North Korean government's controlling of its people's minds is what kept the dictatorship, and the people's democracy' clear and stable, but it is actually the c ountry strict implementation of its laws and its isolation with other nations and other cultures that did the work.In November of 2013, a rumor, with evidence good enough to reach the front page of a South Korean newspaper, spread that 80 North Koreans were executed in front of the public for several reasons: possession of Christian bibles, distributing pornography and quite shockingly, even watching for watching Korean TV shows and dramas. All these various actions lead to the North Koreans introduction to the different thoughts and ideologies, especially the idea of capitalism.To stop these from happening, or to keep the deception functioning properly, North Korea had to use the dictator's authority to hold public executions in different parts of the country, so that nobody will even try to gain access to new ideas, and stay in what they believe right now. The system of North Korea is in fact, the perfect example of the relationship of the power of deception and power of force. It is quite inferable that with one of these two missing, the result would never be the name and Kim Gong-UN would not be the superior leader of North Korea which he is right now.For argument's sake, if North Korea lost all its military strength and the power to force people to follow, sooner people will be accessed to new ideas, and then they will realize that what their country has believed is not quite ideal, and the deception, the tool that functioned as the frame of North Koreans dictatorship may blur out and eventually shatter. Machiavelli quoted, â€Å"Never attempt to win by force what can be won by deception†.He emphasizes the point that winning by deception is indeed better than winning by force in politics, which this paper tries to address wrong. Sun TTS wrote that, â€Å"All warfare is based on deception. (Book 1, 18)†, which means that these two cannot be divided and as we see from history and that they must coexist. One point that argues to Machiavellian q uote is that deception does not last for so long, and things are to be revealed sooner or later, but it is the force that extends the time of the â€Å"revelation†, thus making the deception more effective.

Friday, November 8, 2019

Characteristics of Left Brain Dominant Students

Characteristics of Left Brain Dominant Students While there are differences of opinion when it comes to brain hemisphere dominance, one thing seems clear: there are some students who are more comfortable with logic and reasoning than they are with creativity and intuition. These preferences are characteristic of people who are sometimes called left brain dominant. Are you very organized? Do you believe that there is a right way and a wrong way to do things?  Do you enjoy math homework more than English homework? If so, you may be left-brain dominant. Characteristics of Left Brain Dominant Students Work well with a daily task listLike to be the critic in classFeel naturally  good at math or scienceAre rational and logicalPerform research that is precise and well-documentedLike to set goalsCan interpret information wellKeep a tidy roomAnswer questions spontaneouslyFollow directions and read directionsArent touchy-feelyCan listen to a long lecture without losing interestDon’t let feelings get in their wayEnjoy action moviesRead sitting upChoose precise words Left Brain Dominant Students in Class Able to remember dates and processes in history classEnjoy going through a long calculation in math classLike the order of scienceHave a good understanding of grammar and sentence structure in English class Advice for Left Brain Dominant Students Study in a quiet room to avoid distractionYou understand math but may get impatient trying to explain it to someone who struggles. If so, don’t volunteer to be a tutor unless you know you have the patience for it.You like to take the lead in study groups, so go ahead and volunteerJoin a debate team or academic competitionTry to excel at the science fair; you can be a winnerUse your skills in math and science to your advantageChoose non-fiction readingYou prefer factual questions and assignments, as opposed to open-ended questionsYou can organize your notes well, so you shouldKeep your room organizedTry to refrain from arguing with the teacherWhen selecting assignments, choose to do analytical essaysWork alone when you have a choice; you get frustrated with others who â€Å"clown around†Avoid â€Å"free-thinking† teachers if they confuse youTake more risks; don’t be afraid to be creative With all of your factual knowledge, you might be a finalist on Jeopardy someday.

Tuesday, November 5, 2019

Hangover Remedies and Prevention

Hangover Remedies and Prevention A hangover is a name given to the unpleasant aftereffects of drinking too much alcohol. While a lucky 25%-30% of drinkers are naturally resistant to experiencing hangovers, the rest of you might want to know how to prevent or cure a hangover. Heres a look at what causes a hangover and some effective hangover remedies. Hangover Symptoms If you have had a hangover, you knew it  and didnt need to read a symptom list to get a diagnosis. Alcohol hangovers are characterized by some or all of the following symptoms: dehydration, nausea, headache, fatigue, fever, vomiting, diarrhea, flatulence, sensitivity to light and sound, trouble sleeping, difficulty concentrating, and poor depth perception. Many people experience an extreme aversion to the smell, taste, sight, or the thought of alcohol. Hangovers vary, so the range and intensity of symptoms may be different between individuals and from one occasion to another. Most hangovers begin several hours after drinking. A hangover may last as long as a couple of days. Hangover Causes According To Chemistry Drinking an alcoholic beverage that contains impurities or preservatives can give you a hangover, even if you only have one drink. Some of these impurities may be other alcohols besides ethanol. Other hangover-causing chemicals are congeners, which are by-products of the fermentation process. Sometimes impurities are intentionally added, such as zinc or other metals which may be added to sweeten or enhance the flavor of certain liqueurs. Otherwise, it matters what you drink and how much you drink. Drinking to excess is more likely to cause a hangover than drinking moderately. You get a hangover because the ethanol in the drink caused an increase in urine production, leading to dehydration. Dehydration causes headaches, fatigue, and dry mouth. Alcohol also reacts with the stomach lining, which can lead to nausea. Ethanol is metabolized into acetaldehyde, which is actually a lot more toxic, mutagenic, and carcinogenic than the alcohol itself. It takes some  time to break down the ace taldehyde into acetic acid, during which youll experience all the symptoms of acetaldehyde exposure. Prevent a Hangover The only sure way to prevent a hangover is to avoid drinking. While you may not be able to totally prevent a hangover, drinking a lot of water or other rehydrating drink will go a long way toward preventing or lessening most hangover symptoms. Hangover Remedies If drinking water didnt help you out enough or its too later and youre already suffering, there are some potentially beneficial remedies. Drink Water: Youll feel miserable until you are rehydrated. Water is an excellent hangover remedy. So is orange juice, unless your stomach is too upset to handle it.Eat Something Simple: Eggs contain cysteine, which may help combat hangover symptoms. Milk is more food than water, but it serves to rehydrate you while supplying calcium, which may ease your misery.Sodium Bicarbonate: Try a spoonful of baking soda in water to help quell the hangover queasiness.Exercise: It raises your metabolic rate, which helps you clear toxins associated with metabolizing alcohol. Exercise helps you deliver oxygen to your cells, which can increase the speed at which you detoxify harmful compounds.Oxygen: Supplemental oxygen is another way to speed up detoxification after drinking alcohol, without having to exercise.Vitamin B1 or Thiamine: Thiamine helps prevent the buildup of glutarate in the brain, which may be associated with part of a headache associated with a hangover. Other B vitamins are deplete d when you drink, so taking a B vitamin complex may be beneficial. Hangover Dont While it may be alright to take a couple of aspirin to deal with a hangover, dont take a couple of acetaminophen (Tylenol) tablets. Alcohol with acetaminophen is a recipe for potentially lethal liver damage.

Sunday, November 3, 2019

The Contrasting Elements of the Two Companys Management Styles - Acme Assignment

The Contrasting Elements of the Two Companys Management Styles - Acme and Omega - Assignment Example Omega discourages barriers between managers and employees, as well as company memos, as it’s believed the barriers create artificial distances between individuals that should be collaborating.  Ã‚   2. When considering the contrasting elements of the two company’s management styles in regards to the ways they coordinated the production of the memory unit prototypes there are a number of notable factors. It seems that Acme highly structured production process created an atmosphere where divergent departments could be willfully disregarded for the purpose of the speed of production. At Acme, this occurred as the process department was bypassed to increase speed. Although this ultimately resulted in increased product deficiency, it nonetheless functioned as a means of allowing the company to maintain its deadline. At Omega the organic management process was better suited to determining the production process and delivering a quality product on time, as the process department wasn’t so easily disregarded. 3. While in the short-term Omega’s manufacturing process was more efficient and better prepared for the task than Acme’s, one can imagine how in a long-term process Acme’s management structure could outpace Omega’s. With a more highly-structured management, the individual departments can be micromanaged more efficiently for production. When a single department is behind on the production schedule, the company president is then capable of applying pressure to this department, and the other departments are still capable of advancing without the hindrances of this single entity. Omega’s organic structure makes this more difficult since the two departments are seamlessly intertwined, so that multi-tasking is complicated. 4. I would recommend that Omega capitalizes on its organic structure through the creative aspects that it could potentially create. As Acme’s structure is more highly structured it disturbs the flow of creative idea production. One can imagine an organic structure working well in a company such as Apple, Inc. where unique ideas are central to the company’s existence.  Ã‚  

Friday, November 1, 2019

Attack on The White House Essay Example | Topics and Well Written Essays - 2500 words

Attack on The White House - Essay Example Space exploration has been left behind by the U.S.A being equipped with satellites apt enough to eye any corner of this world in a matter of minutes. Defense wise as well, U.S.A has the elite position having large chunks of budget being attributed towards the armed forces and most importantly the nuclear sector. Thus, there should be a general consent that the U.S.A is in present world the "ultimate power". Such a concentration of power and authority has not been under calm and tranquil circumstances. Instead, the U.S.A has attracted strong criticism and opposition of many rivals. They can be termed as terrorists in the American 'terminology'. Owing to such a criticism, many sensitive and central points in the U.S.A are at stake as can be observed from the past events like ninth September. The next best point of such a hunt can even be the statue of liberty, the pentagon and also the white house. Thus, to counter the lethal effects of such an emergency certain steps should be a dopted to either curtail or minimize the losses as much as possible. The white house has a place of paramount importance in the U.S.A. Located at 1600 Pennsylvania Avenue, Washington D.C, it is not only the residence of the president of the U.S.A but also a shelter for many governing executive operations. It was built on a neo classical style between 1782 and 1800. The names such as Executive Mansion (1810- 1901), President's House, President's Palace and President's Mansion were also used interchangeably for it in the past. Apart from its official significance, it is also of concern to the civilians as it houses the museum of American history and art. Hence, this structure spread over 7.3 hectares (18 acres) retains utmost importance. Returning to our topic, any kind of terrorist attack on such a prominent place of a dominant nation as the U.S.A could therefore, have serious consequences. To manipulate such a situation of emergency effectively certain steps as mitig ation, preparedness, response and recovery should be followed. However, such an incident could lead to several severe economic, social, academic and other consequences both within the national perimeters and across the border. Whereas, the rivals might in their own interest benefit from such a situation. But we shall see which impact has the highest weightage as we continue. I. Mitigation The technique of mitigation primarily revolves around the principle of not letting the attack happen on the first hand. Such a step is surely tough but if successful it can promote insurance of many lives and losses. Coupled with this, it may also include the calming down of a chaos disaster if white house is attacked. In the U.S.A, the Citizen Corps should train to inculcate this skill into volunteer's stock of craftsmanship to not only survive but also make the surroundings survive as well. In addition, the Department of Homeland Security should adopt necessary steps to detect any suspicious activity and operation beforehand. Certain gadgets and sophisticated cameras with latest updates should be installed to make the white house fool proof. Preparedness Nothing in this highly developed world as well is perfect. Even the flawless

Wednesday, October 30, 2019

The ethics of emotion-arousing & psychoactive ads and their influence Essay

The ethics of emotion-arousing & psychoactive ads and their influence on individuals - Essay Example they depend upon the fact that prospective customers would be interested in obtaining more information about the product and services so that they can arrive at the logically best choice. On the other hand, an emotional appeal is used to create an ambience, to invoke a general feeling - of goodwill or of fear or urgency or any other diverse emotions. It is expected that the aroused feelings would incite and encourage the prospective customer to buy the products associated with such ads. While the appeal of both the approaches has been established by several studies, some professional critics believe advertising adversely affects people and manipulates us to buy things/services by playing on our emotions. Advertising is so powerful that consumers are helpless to defend themselves against it. This has been a time long debate involving issues like not only the morality of using emotions to manipulate consumers, but also about the efficacy and potency of such ads to actually influence the purchase decision. Emotional advertising readily gains public attention when it evokes our fears and wants, sometimes at a very deep level. Some critics claim that these powerful messages are often ineffective, because consumers often tend to remember the emotions but not the product (O’Neill, 2006). The subject under consideration is vast, as scores of early researchers have tried to find evidence for the harmful effects that advertising, and especially emotional advertising has had on people o different ages. Further, an equal number of organizations and businesses have supported research extolling the powerful impacts of emotional advertising and thus providing them with the rationale of spending millions of pounds into emotional advertising. The current research will therefore narrow with scope to a more specific topic – and try to evaluate the relative effectiveness of two different kinds of emotional appeals, namely of using warmth and of using fear in ads. The

Monday, October 28, 2019

Sam Houston Summary Essay Example for Free

Sam Houston Summary Essay Sam Houston had to face many obstacles since he was a little boy. He had very little education; however he educated himself with many readings from his father’s library. Houston served as governor for Tennessee and Texas. He also served as a United States senator for thirteen years. . He befriended General Andrew Jackson and remarried three times. Houston was made the first president of the Republic of Texas in 1836 and was re-elected in 1841. He gave many speeches throughout the years. Houston died on July 26, 1863, in Huntsville, Texas. Sam Houston, fifth child of Samuel Houston and Elizabeth Paxton Houston, was born on March 2, 1793. His father, Samuel Houston, a member of the revolutionary member, went bankrupt in 1806 and had no other option but to sell the Timber Ridge and move west to Tennessee. His father died the same year! A year later, Sam Houston, his mother, and his eight siblings resided south of Knoxville in Maryville, Tennessee. At the age of fourteen, Sam Houston had little education but spent a large amount of time reading books in his late father’s library. He also spent a great amount of time clearing land and developing a farm. The family decided that he would work as a clerk in a store because in his brother’s eyes he wasn’t doing anything worthwhile. Sam showed no interest in this job which resulted in his disappearance from the job and home. He crossed the Tennessee River with the Cherokee Indians. Houston joined a band of approximately three hundred Cherokees led by Chief Oo-loo-te-ka. The chief liked Sam greatly that he soon adopted him and gave him the name â€Å"Colonnen†. Colonnen refers to â€Å"The Raven† which is a symbol of good luck to the Indians. He went into debt due to bringing gifts home to his Indian friends each time he went to visit his family. At the age of nineteen, Houston had to find a way to get out of debt and decided to become a teacher. He charged the students a higher rate than usual which only took six months to pay off his debts. At the beginning it was just a way to make money but he soon realized that he had a strong interest in teaching. The War of 1812 had begun shortly after Houston began teaching. His career ended really soon. â€Å"Euclid soon defeated him and ended whatever thoughts he may have had of a permanent careers as a teacher. Houston was not amongst the early volunteers of the war; however he decided to enroll in a local academy to further his education in math. On March 24, 2013, Sam decided to enlist in the United States Army. Within a few weeks of training he became a sergeant. Nine months later, Sam was promoted to third lieutenant. Early in the 1814, Houston came under command of General Andrew Jackson. He became really good friends with Jackson for approximately thirty years. During the war, Houston was wounded and General Jackson ordered him to stay out the rest of the battle. The Indians refused to surrender. Houston volunteered to lead the attack; however his men hesitated to go forth, Houston ran forward and the Indians ended up shooting him twice in the right shoulder. Jackson ordered the Cherokees to complete the battles which forced the Indians to sign the Treaty of Fort Jackson. This treaty consisted of giving up their claims to more than three-fifths of Alabama. Sam Houston was treated at one of their hospitals in eastern Tennessee and then transported back to Maryville. After the treatment he was assigned to the Southern Division of the United States Army. He was on light duty in the adjutant general’s office. On October 28, 1817 Houston was appointed federal subjacent to the Cherokees. At the age of twenty-five, on March 1, 1818 he resigned from the army and as Indian subagent too. Three months later, Sam Houston returned to Nashville to begin the study of law with Judge James Trimble. It only took Houston six months to learn and pass the bar examination. He then moved to Lebanon and opened a law office. In 1819, Houston was elected attorney general, and he then returned to Nashville. He was very successful and knowledgeable but he was not satisfied with the pay. He resigned in1820 in private practice in Nashville. â€Å"In 1823 he ran for the United States House of Representatives from the ninth Tennessee District. † (pg 15) Houston’s second term ended on March 1827, he went back to Tennessee to run for governor. He put himself in the public’s eyes by attending political rallies and any events that included the voters. â€Å"In early September he defeated Cannon by more than 11,000 votes in a total of more than 75,000 and won the governorship. † (19) In 1824 Sam Houston was introduced to a woman named Eliza Allen. She was only twenty and Sam Houston was thirty-five at the time. He asked her father for his permission to marry his daughter. Her father gave him permission to wed his daughter. She did not love Sam; however her family pretty much pressured her into marrying Houston only because he was a successful man. She followed their command and accepted his proposal in October 1828. They exchanged wedding vows on January 22, 1829 at the Allen’s home. Unfortunately, three months after the marriage his wife left him and went back home to her family. She refused to be with him and on April 16th Houston resigned as governor of Tennessee. It is still unknown why she left Houston, although she was pressured into marrying Houston. Sam and his companion, H.Haralson, journeyed down the Cucumber River to Ohio on April 23, 1829. He ended up in Arkansas with his Cherokee friends. His companion continued to travel leaving Houston behind with his adopted father and friends. Sam Houston soon discovered that the Cherokee nation had to move out of Arkansas and into east-central Oklahoma. The Cherokees were worried that the whites were going to take their current land again. Houston became their advisor and a listener to the Cherokee tribe. â€Å"Houston departed to Washington to inform President Jackson that several Indian agents should be removed and the Treaty of 1828 honored. He traveled to Washington D. C. to inform how the Cherokees received unbroken promises and that they rather have money verses gold. Sam Houston wed another woman, Tiana, while still married to Eliza. It wasn’t a big deal because she was considered Indian and his other wife was Cherokee. Within time he got a weakness for alcohol. It started interfering with his everyday live, was turned down when he campaigned for a position on the Cherokee council, and he also hit his adoptive father. Soon after, his mother fell ill and was rushed back to her home in Tennessee where she died in September 1831. A month later he traveled back to the Cherokee nation. In April he was arrested and punished for striking congressman, Stanbery, with his cane. He was found guilty and received a reprimand. In October 1832, Houston started preparing for his trip to Texas; however his wife refused to go. Houston left her some of his possessions and then divorced her. Sam Houston set up headquarters in San Felipe and began to plan a defensive strategy against the Mexicans. The volunteer soldiers under Stephen Austin battled and successfully took San Antonio, killed Milam, and forcing General Cos to surrender. The soldiers believed that the war was over; however Houston was not convinced that it was over. He made a public announcement that Texas was in need of 5,000 trained men by March 1, 1836. While Houston and the men prepared for the war they were approached by Fannin and the two leaders that won at war in San Antonio. Fannin, Johnson, and Grant came in making promises to the soldiers causing thousands to leave Houston and to join their militia. Sam Houston continued to lead approximately sixty to seventy men. On January 20, Houston traveled to San Felipe to meet with Governor Smith. Houston spent the rest of February with the Cherokees and Indians in the northeast. After arriving at the convention site, Washington-on-the-Brazos, he received news that Santa Anna’s army had attacked Texas and â€Å"besieged† the Alamo and the remaining soldiers. The declaration of independence was adopted on March 2nd. Two days later, Houston had become â€Å"commander in chief of the land forces of the Texian army both Regulars, Volunteers, and Militia, while in actual service. † On March 11th, Houston reached Gonzalez and found 374 volunteers that were led by Edward Burleson. While preparing the men for war Houston received news that Santa Anna’s army had â€Å"taken† the Alamo and attacked and burned all of its defenders. Houston ordered Fannin and his army to retreat to Victoria. They were captured and murdered by the Santa Anna’s army. On April 20th, the battle began between Santa Anna and Houston’s soldiers. Unfortunately, Houston was injured during the battle. Houston’s army men had captured and killed many men causing Santa Anna to offer a peace treaty. Houston refused until both government leaders were present. Fortunately, Houston’s approach succeeded. Sam Houston and Eliza’s divorce was not final until 1837. Houston served as president for two years, December 1836 to December 1838. He was reelected in September 1840. In 1836, a small group of soldiers were attacked by the Mexican General Santa Anna. Houston’s army won the battle against the Mexican forces at San Jacinto and gained independence for Texas, opened up a law office, and promoted a land development after his term expired. He traveled to Mobile, Alabama to interest a wealthy merchant, William Bledsoe, in the Sabine City project. While visiting the Bledsoe estate Houston met Margaret Lea. They were married in Marion, Alabama, on May 9, 1840. They had eight children. Margaret convinced Houston to stop drinking and attend church. Houston continued to work towards annexation with the United States. He used the United States and Great Britain hatred to one another in hopes to make each country want to snatch up Texas so that the other country could not. With high hopes of joining with the United States, the United States still was unwillingly to annex Texas. In 1845, Texas became part of the United States. â€Å"Houston’s joyous moment at the approach of annexation was tempered by the death of Andrew Jackson on June 8, 1845. The family rushed to the Hermitage but arrived a few hours late. They attended the funeral and were guests at the Donelson plantation for several weeks. † (139) Meanwhile, Mexico was at war with Texas for ten years. Houston remained in Washington to work in support of the war. Houston left Washington in the spring of 1847 because his wife had surgery due to breast cancer. â€Å"Houston traded Raven Hill for land within a few miles of Huntsville and planned to build a home for his family. He remained in Texas for the rest of the year, keeping abreast of the war news as General Winfield’s Scott’s army took Mexico City. † (147) In January 1847, Sam Houston obtained a new six year senate term. Houston became a presidential candidate but Houston’s mind and heart was with his family. In 1852, Franklin Pierce was elected; however if Houston put in the effort he could have won. January 15, 1853, he was elected to a new six-year term as Senate. In October 1853, Houston’s family moved to Independence, a city fifty miles to the southwest, while leasing out his home in Huntsville. In 1859, Sam Houston appeared to be leaning toward retirement. Houston invited the public to vote in his favor; however he did not campaign. â€Å"Texans who wanted his leadership had drawn him into the contest, and they did the campaigning. Houston became the only man in the United States to serve as governor of two states. He promised funds for railroads, schools, river improvements, and a protector of Texas if Mexico should try to battle again. Houston was all about the people he served and not the political party. Some petitioned for him to run for president, but he refused to participate in the national convention. When Abraham Lincoln was elected president of the United States, Houston warned Texans that the civil war was going to happen if Lincoln violated the Constitution. The Texas convention removed Houston from office and replaced him with Lieutenant Governor Edward Clark. This resulted because Houston refused to take oath to loyalty to the newly formed Confederate States of America. He wanted to avoid war at all cost and declined Lincoln’s offer to use the federal troops to keep him in office and Texas in the Union. After leaving the Governor’s mansion, he continued to support Texas. Sam Jr. joined the Confederate Army, against his father’s advice, was wounded at the battle of Shiloh. He was reunited with his family but on crutches. Houston moved his family to Huntsville because United States â€Å"took† Galveston and â€Å"destroyed the Houston’s family’s main source of income. † (197) In the winter of 1863, Houston fell ill. He developed an awful cough and was diagnosed with pneumonia. His wife stayed by his side and heard his very last words before his death, â€Å"Texas†¦Texas†¦Margaret. † Texas and his family were very important to Sam Houston. Sam Houston, one of the most important political figures to Texas. Houston served as governor for Tennessee and Texas. He also served as a United States senator for thirteen years. . He befriended General Andrew Jackson. He remarried three times; however he had eight children with his third wife. Houston was made the first president of the Republic of Texas in 1836 and was re-elected in 1841. He gave many speeches throughout the years. He led a successful battle for Texas Independence. On July 26, 1863, Houston died of pneumonia in their â€Å"Steamboat House. † He will always be remembered!