Wednesday, November 27, 2019

Book review on the cold war by mike sewell essays

Book review on the cold war by mike sewell essays For 50 years the world was dominated by two superpowers. The cold war was a confrontation between the United States and Soviet Union, with the belief that the ideology of the other side had to be destroyed. The Soviet Union believed that the conflict between capitalism and communism was inevitable. The United States believed that peace and stability in the world would only emerge when the evil of communism was abolished. The cold war was a significant era in the history of the world as it shapes the economic, political and the ideological world today. Mike Sewells The Cold War thoroughly covers all stages of this era chronologically, from its origins, the confrontation between the powers and the collapse of the communist party in the early 1990s throughout seven sections. One of the positive aspects of reading the cold war is that it is based on a monograph therefore confined to the study of one topic. Whereas reading a book like world history since 1945, by jack Watson may give you broader knowledge of a longer period however it does not go into depth about each topic so the reader is only left with basic knowledge about the particular topic. The vocabulary used by mike Sewell is straightforward which is a positive aspect due to the reason that its is a core textbook at a-level history therefore it is more accessible to a wider audience, as well as students who are more able to understand. As a student, this book may be helpful for the reason that it provides questions at the end of each chapter regarding what has just been discussed. This can be seen to be a positive aspect during revision of the topic. The cold war is crucial era in history and many writers have written and commented on the time, mostly with conflicting views. Mike Sewell has based most of his writing on previous books. At the beginning of each chapter he allows the reader to be aware of these references by providing footnotes to back up his op ...

Saturday, November 23, 2019

Biography of Aurangzeb, Emperor of Mughal India

Biography of Aurangzeb, Emperor of Mughal India Emperor Aurangzeb of Indias Mughal Dynasty (November 3, 1618–March 3, 1707) was a ruthless leader who, despite his willingness to take the throne over the bodies of his brothers, went on to create a golden age of Indian civilization. An orthodox  Sunni Muslim, he reinstated taxes and laws penalizing Hindus and imposing Sharia law. At the same time, however, he greatly expanded the Mughal empire and was described by his contemporaries as being disciplined, pious, and intelligent. Fast Facts: Aurangzeb Known For: Emperor of India; builder of the Taj MahalAlso Known As: Muhi-ud-Din Muhammad, AlamgirBorn: November 3, 1618  in Dahod, IndiaParents: Shah Jahan,  Mumtaz MahalDied: March 3, 1707  in Bhingar, Ahmednagar, IndiaSpouse(s): Nawab Bai,  Dilras Banu Begum,  Aurangabadi MahalChildren: Zeb-un-Nissa, Muhammad Sultan, Zinat-un-Nissa, Bahadur Shah I, Badr-un-Nissa, Zubdat-un-Nissa, Muhammad Azam Shah, Sultan Muhammad Akbar, Mehr-un-Nissa, Muhammad Kam BakhshNotable Quote: Strange, that I came into the world with nothing, and now I am going away with this stupendous caravan of sin! Wherever I look, I see only God...I have sinned terribly, and I do not know what punishment awaits me. (supposedly communicated on his deathbed) Early Life Aurangzeb was born on November 3, 1618, the third son of Prince Khurram (who would become  Emperor Shah Jahan) and the Persian princess Arjumand Bano Begam. His mother is more commonly known as Mumtaz Mahal, Beloved Jewel of the Palace. She later inspired Shah Jahan to build the Taj Mahal. During Aurangzebs childhood, however, Mughal politics made life difficult for the family. Succession did not necessarily fall to the eldest son. Instead, the sons built armies and competed militarily for the throne. Prince Khurram was the favorite to become the next emperor, and his father bestowed the title Shah Jahan Bahadur, or Brave King of the World, on the young man. In 1622, however, when Aurangzeb was 4 years old, Prince Khurram learned that his stepmother was supporting a younger brothers claim to the throne. The prince revolted against his father  but was defeated after four years. Aurangzeb and a brother were sent to their grandfathers court as hostages. When Shah Jahans father died in 1627, the rebel prince became Emperor of the Mughal Empire. The 9-year-old Aurangzeb was reunited with his parents at Agra in 1628. The young Aurangzeb studied statecraft and military tactics, the Quran, and languages in preparation for his future role. Shah Jahan, however, favored his first son Dara Shikoh and believed that he had the potential to become the next Mughal emperor. Aurangzeb, Military Leader The 15-year-old Aurangzeb proved his courage in 1633. All of Shah Jahans court was arrayed in a pavilion and watching an elephant fight when one of the elephants ran out of control. As it thundered toward the royal family, everyone scattered except Aurangzeb, who ran forward and headed off the furious pachyderm. This act of near-suicidal bravery raised Aurangzebs status in the family. The following year, the teenager got command of an army of 10,000 cavalry and 4,000 infantry; he soon was dispatched to put down the Bundela rebellion. When he was 18, the young prince was appointed viceroy of the Deccan region, south of the Mughal heartland. When Aurangzebs sister died in a fire in 1644, he took three weeks to return home to Agra rather than rushing back immediately. Shah Jahan was so angry about his tardiness that he stripped Aurangzeb of his viceroy of Deccan title. Relations between the two deteriorated the following year, and Aurangzeb was banished from court. He bitterly accused the emperor of favoring Dara Shikoh. Shah Jahan needed all of his sons in order to run his huge empire, however, so in 1646 he appointed Aurangzeb governor of Gujarat. The following year, the 28-year-old Aurangzeb also took up the governorships of Balkh (Afghanistan) and Badakhshan (Tajikistan) on the empires vulnerable northern flank. Although Aurangzeb had a lot of success in extending Mughal rule north and westward, in 1652 he failed to take the city of Kandahar, Afghanistan from the Safavids. His father again recalled him to the capital. Aurangzeb would not languish in Agra for long, though; that same year, he was sent south to govern the Deccan once more. Aurangzeb Fights for the Throne In late 1657, Shah Jahan became ill. His beloved wife Mumtaz Mahal had died in 1631 and he never really got over her loss. As his condition worsened, his four sons by Mumtaz began to fight for the Peacock Throne. Shah Jahan favored the eldest son Dara, but many Muslims considered him too worldly and irreligious. Shuja, the second son, was a hedonist who used his position as governor of Bengal as a platform for acquiring beautiful women and wine. Aurangzeb, a much more committed Muslim than either of the elder brothers, saw his chance to rally the faithful behind his own banner. Aurangzeb craftily recruited his younger brother Murad, convincing him that together they could remove Dara and Shuja and place Murad on the throne. Aurangzeb disavowed any plans to rule himself, claiming that his only ambition was to make the hajj to Mecca. Later in 1658 as the combined armies of Murad and Aurangzeb moved north toward the capital, Shah Jahan recovered his health. Dara, who had crowned himself regent, stepped aside. The three younger brothers refused to believe that Shah Jahan was well, though, and converged on Agra, where they defeated Daras army. Dara fled north but was betrayed by a Baluchi chieftain and brought back to Agra in June 1659. Aurangzeb had him executed for apostasy from Islam and presented his head to their father. Shuja also fled to Arakan (Burma) and was executed there. Meanwhile, Aurangzeb had his former ally Murad executed on trumped-up murder charges in 1661. In addition to disposing of all of his rival brothers, the new Mughal Emperor placed his father under house arrest in Agra Fort. Shah Jahan lived there for eight years, until 1666. He spent most of his time in bed, gazing out the window at the Taj Mahal. The Reign of Aurangzeb Aurangzebs 48-year reign is often cited as a Golden Age of the Mughal Empire, but it was rife with trouble and rebellions. Although Mughal rulers from Akbar the Great through Shah Jahan practiced a remarkable degree of religious tolerance and were great patrons of the arts, Aurangzeb reversed both of these policies. He practiced a much more orthodox, even fundamentalist version of Islam, going so far as to outlaw music and other performances in 1668. Both Muslims and Hindus were forbidden to sing, play musical instruments, or to dance- a serious damper on the traditions of both faiths in India. Aurangzeb also ordered the destruction of Hindu temples, although the exact number is not known. Estimates range from under 100 to tens of thousands. In addition, he ordered the enslavement of Christian missionaries. Aurangzeb expanded Mughal rule both north and south, but his constant military campaigns and religious intolerance rankled many of his subjects. He did not hesitate to torture and kill prisoners of war, political prisoners, and anyone he considered un-Islamic. To make matters worse, the empire became over-extended and Aurangzeb imposed ever higher taxes in order to pay for his wars. The Mughal army was never able to completely quash Hindu resistance in the Deccan, and the Sikhs of northern Punjab rose up against Aurangzeb repeatedly throughout his reign. Perhaps most worryingly for the Mughal emperor, he relied heavily on Rajput warriors, who by this time formed the backbone of his southern army and were faithful Hindus. Although they were displeased with his policies, they did not abandon Aurangzeb during his lifetime, but they revolted against his son as soon as the emperor died. Perhaps the most disastrous revolt of all was the Pashtun Rebellion of 1672–1674. Babur, the founder of the Mughal Dynasty, came from Afghanistan to conquer India, and the family had always relied upon the fierce Pashtun tribesmen of Afghanistan and what is now Pakistan to secure the northern borderlands. Charges that a Mughal governor was molesting tribal women sparked a revolt among the Pashtuns, which led to a complete breakdown of control over the northern tier of the empire and its critical trade routes. Death On March 3, 1707, the 88-year-old Aurangzeb died in central India. He left an empire stretched to the breaking point and riddled with rebellions. Under his son Bahadur Shah I, the Mughal Dynasty began its long, slow decline into oblivion, which finally ended when the British sent the last emperor into exile in 1858  and established the British Raj in India. Legacy Emperor Aurangzeb is considered to be the last of the Great Mughals. However, his ruthlessness, treachery, and intolerance surely contributed to the weakening of the once-great empire. Perhaps Aurangzebs early experiences of being held hostage by his grandfather and being constantly overlooked by his father warped the young princes personality. Certainly, the lack of a specified line of succession did not make family life particularly easy. The brothers must have grown up knowing that one day they would have to fight one another for power. In any case, Aurangzeb was a fearless man who knew what he had to do in order to survive. Unfortunately, his choices left the Mughal Empire itself far less able to fend off foreign imperialism in the end. Sources Ikram, S.M, Ed. Ainslie T. Embree.  Muslim Civilization in India. New York: Columbia University Press, 1964.Spear, T.G. Percival. â€Å"Aurangzeb.†Ã‚  Encyclopà ¦dia Britannica, 27 Feb. 2019.Truschke, Audrey. â€Å"The Great Aurangzeb Is Everybodys Least Favourite Mughal.†Ã‚  Aeon, 4 Apr. 2019.

Thursday, November 21, 2019

Answer the questions Research Paper Example | Topics and Well Written Essays - 1000 words

Answer the questions - Research Paper Example In other words, the term ‘paradigm shift’ is used to show a considerable change in a basic model or perception. Nanomachines are still an emerging field of technology. Governments and large corporations are spending huge sums on research and development in the field of nanorobots. The first stream of research is nanomedicine that aims to utilize nanobots for cellular level operations. An example is the work by the Harvard and MIT researchers who attached chemotherapy drug to nano-particles which are able to identify cancer cells and release the drug into them. Another area is the use of robot organisms for space and planet exploration and colonization. For this purpose, Symbrion and Replicator projects are going on under the Seventh Framework Program of the European Union. Also, efforts are undertaken to incorporate distributive intelligence, programming and control. The success of this research will lead to the development of nano-swarms which are capable of computing and collaborating intelligently. In the field of molecular computing, researches are taking place in two directions. The first direction is using DNA computers to analyze the human genome with the intention to get accurate data that can be utilized for medical diagnosis. The second direction is the application of evolutionary computation to molecular evolution. An example is the application of the genetic algorithm to molecular evolution. Mills’ utilitarianism is based on the ‘greatest happiness principle’. According to him, one should select such an action that offers the greatest degree of happiness to the greatest number of stakeholders. The first argument against Doomsday Argument is the posteriori observation that claims that the chances for the extinction of a dominant species like humans are less than once in a million years. Another argument is that the people of a heavily populated future are not yet alive. So, it is not

Wednesday, November 20, 2019

Law Term Paper Example | Topics and Well Written Essays - 1250 words - 1

Law - Term Paper Example The author will also try to explain why Canada has the highest rate of illegal MP3 downloads in the world. The author will analyze the legislative acts that regulate the copyright protection in Canada and will point out their weak points, those that make illegal music downloading possible and, to some extent, legal. Examples of law cases based on illegal MP3 download will be produced and analyzed. The research paper will be concluded with several suggestions on how this situation might be improved in such a way that Canada is no longer the â€Å"winner† among the top countries with the highest level of piracy in music downloads. The USA Digital Millennium Copyright Act has certainly gained its â€Å"fans† among the people who not so long ago were downloading mp3s without any restriction and who now must check twice before accepting a download or a file-sharing. The Digital Millennium Copyright Act has outlawed many online activities, among which it is easy to find the mp3 downloading. So, unless you are a librarian who desperately believes that music is important for the library (and you can even prove it) or a researcher, there is no other legal way which would allow you to download or share music files in USA. The DMCA and the United States Copyright Law also outlaw making copies of copyrighted music, unless it is for personal use. The infringements include penalties of thousands of dollars and jail sentence is also possible. In the USA the copyright belongs to the composer and it is created from the moment that the composition is â€Å"fixed in any tangible medium of expression†1. So if one wishes to download that composition, it is recommended under the provisions of the US Copyright Law and the DMCA that he does it from an authorised legal site, by purchasing it from the provider. Furthermore, peer-to-peer sharing is also prohibited under the law regulations. In Canada, on the other hand, music downloading

Sunday, November 17, 2019

Investigating the effectiveness of Mobile Antivirus Application on Android and Windows Mobile Phone Essay Example for Free

Investigating the effectiveness of Mobile Antivirus Application on Android and Windows Mobile Phone Essay Chapter 1: Anti-virus Applications on Mobile Devices Mobile phone anti-virus software refers to security software programs which have been professionally developed to protect device users from viruses, worms, Trojans and other malicious programs and removing them where possible. Anti-virus software programs have lately gained popularity due the increased incidences of malicious threats of attack on the web. There are several new viruses that are detected on a day to day basis on the cyberspace. While some of these viruses may be harmless, others are annoying and quite destructive. Certain viruses replicate themselves, but others may cause serious problems to the extent of erasing all data on a device drive. The use of anti-virus for device protection can be applied to multiple operating systems including Mobile Windows and Android mobile phones (iSoftwareReviews 2010). Antivirus software works in various technical ways to give protection to and remove viruses from mobile devices. This normally occur through two security scanning functions namely On-Access Scanning and On-Demand Scanning. The On-Access scanning works in real-time to ensure a mobile device is protected at all times by monitoring for viruses to any accessing in the mobile device, for example while opening a file or opening an application. Despite of the fact that this software slows down the speed of a device, its role in antivirus protection is so critical and should thus be enabled at all times. On-Demand Scanning offers antivirus protection only when activated to scan any particular area, folder, file, or drive. The program then provides a scan report about how many viruses that have been found in the scanned item. In the event that a virus is detected, the program will notify the user and recommend an action which includes either to deleting or quarantine the virus (iSoftwareRevie ws 2010). The rapidly increasing advancements of mobile phone technology to include a number of useful features have made android and windows mobile phones very popular pocket personal computers. This increased popularity has not however come with its own setbacks. Just like the ordinary personal computers, android and windows mobile phones have also been subjected to increased viruses attack. Virus attack has therefore become the latest and single biggest threat to the mobile phone industry. Subsequently, numerous companies dealing in software have come up with anti-virus for use in the android and windows mobile phones. These are mainly anti-virus software packages developed to provide anti-virus protection to mobile phones (iSoftwareReviews 2010). There are a number of anti-virus software programs for mobile phones that are available to the users. The main mobile phone anti-virus software includes AhnLab Mobile Security, Avast! PDA Edition, Avira Antivir Mobile, BitDefender Mobile Security, BullGuard Mobile Antivirus, Dr.Web Mobile Security Suite, F-Secure Mobile Security, Kaspersky Mobile Security, and Norton Smartphone Security. AhnLab Mobile Security software provides a solution for viruses and worms protection and removal. It runs under windows mobile and android mobile phones. Avast! PDA Edition is an antivirus protection for PalmOS and Windows CE, Android phones, and Pocket PC based devices (iSoftwareReviews 2010). Avira AntiVir Mobile provides professional virus and malware protection for pocket PCs, Windows mobile and Android mobile phones. BitDefender Mobile Security provides solution for virus protection and removal for PDAs and Smartphone that run on Windows mobile or Android mobile phones. BullGuard Mobile Antivirus provides solutions for protecting Pocket PCs and Windows mobile against viruses and other malicious programs. Dr.Web Mobile Security Suite is designed to provide anti-virus security solutions for pocket PCs that runs on Windows Mobile operating system. F-Secure Mobile Security is a complete mobile security software package that includes anti-virus, anti-spyware, a firewall and a remote control anti-theft feature for protection. Kaspersky Mobile Security also provides a complete protection package including Anti-theft protection, virus protection, firewall and anti-spam for SMS, EMS, and MMS. Norton Smartphone Security offers anti-virus, anti-spam, and firewall for Windows mobi le and Android mobile protection (iSoftwareReviews 2010). Protecting an android and window mobile phone from attack requires a complete understanding of all application communication. This is important because software can only protect a device if and only if it is able to read the same information as the mobile phone device, subsequently application layer threats. It may not be possible within the technological framework for antivirus software to understand application communications or analyse application behaviour through the deep inspection of intrusion prevention packets, whether on individual basis or when reassembled into their original sequence. Similarly, network-level antivirus may detect a small number of known, easily identifiable security threats by simply examining pre-programmed patterns (Citrix Systems 2006).   Installation of antivirus is the best known way of protecting android and windows mobile phones. The best types of antivirus are the application firewalls since they operate at the application layer instead of the network level. The application firewalls are able to enforce correct application behaviour while preventing any malicious activity. This is because the firewalls are able to inspect the actual internet communication and understand the context of all client requests and application responses through which they are sent to the internet. A complete mobile phone security application needs to offer full protection of all the elements of an application as well as users of the application. In most cases however, security applications for mobile phones are only limited to the application programme and application data (Citrix Systems 2006). Thesis Statement Despite web devices continuing to face significant security threats, mobile phones go completely unprotected while web browsing, downloading applications, checking e-mail, conducting online banking and connecting to social networking sites like Twitter and Facebook. While mobile attacks are increasing rapidly and hackers are financially motivated to steal data, identities, and intercept corporate communications, it has become critical to protect mobile devices such as android phone and Windows phones. Background of the study Smartphone security is the process of preventing and detecting unauthorized use of your system. Prevention measures help you to stop unauthorized users (also known as intruders) from accessing any part of your mobile phone system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use android and windows mobile for everything from banking and investing to shopping and communicating with others through email or chat programs.   Although you may not consider your communications top secret, you probably do not want strangers reading your email, using your phone to attack other systems, sending forged email from your phone, or examining personal information stored on your phone (such as financial statements). There are a variety of antivirus software packages that operate in many different ways, depending on how the vendor chose to implement their software. What they have in common, though, is that they all look for patterns in the files or memory of your Smartphone that indicate the possible presence of a known virus. Antivirus packages know what to look for through the use of virus profiles (sometimes called signatures) provided by the vendor. New viruses are discovered daily. The effectiveness of antivirus software is dependent on having the latest virus profiles installed on your Smartphone so that it can look for recently discovered viruses. It is important to keep these profiles up to date. Chapter 2: Android Phone Emulators An android mobile phone is a phone fitted with a set of software consisting of operating systems, middleware and other major applications. The main features of android include application framework for facilitating reuse and replacement of components, Dalvik virtual machine which is optimised for mobile devices, optimised graphics, an integrated browser, media tools for common audio, video and still image formats, SQLite for structured data storage, and GSM Telephony. Other features include Bluetooth, Camera, and Rich development consisting of a device emulator, tools for debugging, memory and performance profiling. Android technology is dependent on Linux version 2.6 to power the main system servicing including security, memory management, process management, network stack, and driver models (Android Developers 2010). Android technology is made up of a multi-process system in which each application runs in its own process. A standard Linux facility is responsible for coordinating security between different applications such as user and group identifications assigned to the applications in Android mobile phone. The crux of the security applications is on the basis of the concept that no application, by default, has access to perform any operation with a potential of adversely impacting on other applications, the operating system, or the user. The applications that the Linux facility must grant permission include reading or writing the user’s private data, reading or writing another application’s file, performing network access, and keeping the device awake. The permission that an application requires is statistically declared in that application so that Linux facility can master the upfront during installation and not subject to change thereafter (Android Developers 2010). The antivirus software for mobile forms utilises various virus detection methods. The two main virus detection methods include signature based detection and behaviour based detection. Signature Based Detection makes use of virus signatures dictionary to compare the files when checking for viruses. A signature dictionary is a database containing very many virus signatures which the software manufacturer has so far found. The user is expected to continually update the virus signature directory as when new viruses, worms, Trojans, and other malicious programs appear. Failure to update the dictionary may lead to failure of the software to detect emerging viruses. The behaviour Based Detection is designed to monitor and control any activities in the device system for suspicious program behaviour. In the event that a suspicious behaviour is detected, the software probes further into that suspicious behaviour by applying the signature based detection to countercheck whether the activity is malicious or not. In the event that the suspicious program is malicious, an alert will be generated to notify the user. Android emulator is a virtual mobile device which runs on a phone system and allows the user to prototype, develop, and test android applications for possible malicious programs without necessarily using a physical device. This device mimics all the hardware and software features of a phone save for the fact that it cannot receive or make a call. As soon as a particular application starts to run on the emulator, it may make use of the services of the android platform to invoke other applications, access the network, and notify the user. The emulators also contain various debug capabilities like console from which the user can log kernel output, simulate application interrupts, and simulate latency effects and dropouts on the data channel (Android developers 2010). As stated earlier, android utilises a multi-process system in which each and every application runs on its own process. Since majority of the security between applications is granted at the process level, android emulators provide more detailed security features through a permission mechanism that enforces restriction on the specific operations that any particular process can perform and permission for granting ad-hoc access to specific pieces of data. While the emulators ensures that no application acts in a manner that can adversely affect another application, it is still possible for an application to encroach into the actions of another application as long as permission is forehand obtained in order to perform the foreign function not provided by the basic nucleus (Vennon 2010). The android emulators can also disallow these extraneous permissions on the basis of the certificates that were used to sign the application or by simply prompting the user. The permission that an application will require to function outside its nucleus is statistically declared by the emulators within the application and will be relayed to the Smartphone user, and the permission will not change. The android emulators consider malware to be malicious software designed to infiltrate a Smartphone system without the user’s informed consent (Vennon 2010).

Friday, November 15, 2019

Eclecticism: The Melting Pot of Education Essay -- Eclectic Teaching

Eclecticism: The Melting Pot of Education "Plasticene and self-expression will not solve the problems of education. Nor will technology and vocational guidance; nor the classics and the Hundred Best Books" (Aldous Huxley, English novelist, essayist, critic). If this is true, what will solve the problems of education? Hundreds have tried to answer that question and yet have said the same things over and over. A pure philosophy has never solved the problem of what to do about the education of the masses or the education of the individuahls, and because of that fact, I have not chosen any specific philosophy. I can only be described as eclectic, for I have taken different pieces from each of the five major philosophies and blended them into a personalized viewpoint. By drawing from the views of the great minds from the past, I have pieced together a way to describe what was already there: my point of view. Although I am eclectic, I have very strong opinions about what should be taught, and that is where I gather from the Essentialists. One of the basic beliefs of the Essentialists is that every child should, upon graduation, possess a basic body of knowledge. Included in this body of knowledge are such things as writing, reading, measurement, and computing. I agree that the child should have a basic body of knowledge, but I do not concur that it should be merely enormous rather than practical. In addition, I agree with the Essentialist beliefs that the program should be academically rigorous; that the teacher should model the correct behavior and instill such things as respect for authority, perseverance, dependability, dutifulness, consideration for others, and practicality. Traditional values and morals should be upheld ... ...hese various viewpoints has not influenced me to join a particular one, on the contrary they have strengthened my belief that no one person is right and only in a vast collection of cooperating educators and thinkers will the best environment for learning be achieved. Works Cited Donald Simanek's Pages, http://www.lhup.edu/-dsimanek/eduquote.htm Bagley, William C., Education and Emergent Man, Thomas Nelson and Sons, New York, 1934. pp 188-189. Adler, Mortimer J., et al., The RevoJution in Education, The University of Chicago Press, Chicago and London, 1963. pp. 96. Dewey, John, Dewey on Education: Appraisals, Random House, New York, 1966. pp. 132-133. Kneller, George. F., Existentialism and Education, John Wiley & Sons, Inc., New York, 1967. pp. 97. Skinner, B. F., The Technology of Teaching, Meredith Corporation, New York, 1968. pp. 148.

Tuesday, November 12, 2019

Ideaistic versus materialistic motivations Essay

Behind every great society, there is always a story. Today, the nation of America is referred to as God’s own land. With population of approximately 293,500,000 and land mass of GDP of approximately $10. 98 trillion per year, the country commands the respect of many of its fellow nations. The question that readily comes to heart is that; has this always been so? What we see in the nation of America today did not just start in a day. It was a process – one that was filled with patriotism from dedicated hearts. In fact, the wonderful story we hear of the great nation all started from the period called the American Revolution of 1775 when the then thirteen colonies of America gain independence from the British colonial power. Many people have from different schools of thought hold different views about this revolution. Some are of the idea that the revolution was based on the mere idealistic and scholarly works of some philosophers and sages of that time. On the other hand, some are of the opinion that these seeming patriots were merely motivated by their materialistic class interest. To this, I will say both sides have a point. I state the reason for my assertion in the following paragraph. Evidently, ideological belief in the notion of individual liberty and human equality was part of what motivated the revolution. This can be seen in the works of John Locke and Montesquieu. We can also see this in the declaration of independence. On the other hand, looking at it critically, some patriots of this revolution knew that the independence will bring political position to them. Some of the we motivated by the savour of power and authority that will be passed into their hands However, I think that no matter what the motivation was, it was a good fight. Generations to come will forever be grateful to them that they did and their name will be in the sand of time. Reference: Fleming, T. (1997). Liberty! : The American Revolution. New York: Viking.

Sunday, November 10, 2019

Power Gained by Deception

Hoe From Cornelius Usual to Kim Gong-UN, power gained by deception-by controlling the thinking style of the people, and power gained by physical or military force are two things that have always been a part of the world's politics through history. According to Citadel (Bibb† political deception may have a close relationship to and Impact on military operations† (page 2). These two Ideas both give the least positive ambiance, but they have never left the hands of the leaders of mankind.In a world where both methods† of gaining political authority exist, it is more appropriate to define the relationship between the two, than to compare and prove which is actually â€Å"better. † Deception and force have a chronological relationship: In the political aspect, the most effective way to gain what you want is by deception, and force is a necessity that follows to maintain the deception from dying out. Almost every major influence between societies- the so-called â⠂¬Å"mind war† that has happened through history expresses this relationship's definition.The Philippines, for instance, was conquered by the Spanish explorers for nearly 300 years. The long triumph of this colonization was not Like the other cases where the westerners' technological advancement caused the victory, but It was the huge Impact of Charlatanry that threw the rather innocent natives Into the traps of the Spanish. The Foolproof were not forced to refrain from fighting back, but they sincerely believed that they shouldn't.Shockproof (1990) wrote, â€Å"Using religious dogmas, they were able to convince the indigenous people, which they considered uncivilized and in need of guidance. (p. 83). Stopping the historical story here would make readers understand the power of deception, but the entire process of Spanish colonization did not work by deception only. The Spanish set strict rules for the natives to follow and implied punishments for anyone who went against it.Th e power of force is implied in this dictatorial colonization, and these rules were simply to make sure that the Filipinos stay inside the net of false beliefs. A lot of the native leaders were at flirts against the Integration of an unfamiliar society and the Influx of a belief they have never heard of, but It was the military strength they saw In the Spanish army that led them to stay low and eventually believe what they were told to believe. What could have happened if Spanish did not have the technology to create a sense of forceful power, a sense of position authority?The native would have not found the exotic idea credible, and sooner or later, would have abandoned the belief. Due to the fact that there was technological superiority, the power of force functioning alone would work and bring minimal results in the start, but it will definitely not last long because forcing them to obey by force would eventually lead the natives to fight back because they would know their rights to do so, and this belief would most likely be based on their own set of beliefs, their own, undisturbed source of Influence.Thus, it is generally agreeable that the power of psychological control Is Indomitable, but that fact does not Imply that the power of deception can stand on Its own. Another great example of a society ailing under deception, and being stuck â€Å"wealth the deception† with a power gained by military force would be North Korea, the home controlled by the well-known that their leader is the top of everything, and their â€Å"father† with the ultimate power.This may bring up a lot of political theory, but dictatorship, in its most basic sense, is a leader's deceiving of his people that everything should be done under his orders. Going back to the stated example, many would believe that the North Korean government's controlling of its people's minds is what kept the dictatorship, and the people's democracy' clear and stable, but it is actually the c ountry strict implementation of its laws and its isolation with other nations and other cultures that did the work.In November of 2013, a rumor, with evidence good enough to reach the front page of a South Korean newspaper, spread that 80 North Koreans were executed in front of the public for several reasons: possession of Christian bibles, distributing pornography and quite shockingly, even watching for watching Korean TV shows and dramas. All these various actions lead to the North Koreans introduction to the different thoughts and ideologies, especially the idea of capitalism.To stop these from happening, or to keep the deception functioning properly, North Korea had to use the dictator's authority to hold public executions in different parts of the country, so that nobody will even try to gain access to new ideas, and stay in what they believe right now. The system of North Korea is in fact, the perfect example of the relationship of the power of deception and power of force. It is quite inferable that with one of these two missing, the result would never be the name and Kim Gong-UN would not be the superior leader of North Korea which he is right now.For argument's sake, if North Korea lost all its military strength and the power to force people to follow, sooner people will be accessed to new ideas, and then they will realize that what their country has believed is not quite ideal, and the deception, the tool that functioned as the frame of North Koreans dictatorship may blur out and eventually shatter. Machiavelli quoted, â€Å"Never attempt to win by force what can be won by deception†.He emphasizes the point that winning by deception is indeed better than winning by force in politics, which this paper tries to address wrong. Sun TTS wrote that, â€Å"All warfare is based on deception. (Book 1, 18)†, which means that these two cannot be divided and as we see from history and that they must coexist. One point that argues to Machiavellian q uote is that deception does not last for so long, and things are to be revealed sooner or later, but it is the force that extends the time of the â€Å"revelation†, thus making the deception more effective.

Friday, November 8, 2019

Characteristics of Left Brain Dominant Students

Characteristics of Left Brain Dominant Students While there are differences of opinion when it comes to brain hemisphere dominance, one thing seems clear: there are some students who are more comfortable with logic and reasoning than they are with creativity and intuition. These preferences are characteristic of people who are sometimes called left brain dominant. Are you very organized? Do you believe that there is a right way and a wrong way to do things?  Do you enjoy math homework more than English homework? If so, you may be left-brain dominant. Characteristics of Left Brain Dominant Students Work well with a daily task listLike to be the critic in classFeel naturally  good at math or scienceAre rational and logicalPerform research that is precise and well-documentedLike to set goalsCan interpret information wellKeep a tidy roomAnswer questions spontaneouslyFollow directions and read directionsArent touchy-feelyCan listen to a long lecture without losing interestDon’t let feelings get in their wayEnjoy action moviesRead sitting upChoose precise words Left Brain Dominant Students in Class Able to remember dates and processes in history classEnjoy going through a long calculation in math classLike the order of scienceHave a good understanding of grammar and sentence structure in English class Advice for Left Brain Dominant Students Study in a quiet room to avoid distractionYou understand math but may get impatient trying to explain it to someone who struggles. If so, don’t volunteer to be a tutor unless you know you have the patience for it.You like to take the lead in study groups, so go ahead and volunteerJoin a debate team or academic competitionTry to excel at the science fair; you can be a winnerUse your skills in math and science to your advantageChoose non-fiction readingYou prefer factual questions and assignments, as opposed to open-ended questionsYou can organize your notes well, so you shouldKeep your room organizedTry to refrain from arguing with the teacherWhen selecting assignments, choose to do analytical essaysWork alone when you have a choice; you get frustrated with others who â€Å"clown around†Avoid â€Å"free-thinking† teachers if they confuse youTake more risks; don’t be afraid to be creative With all of your factual knowledge, you might be a finalist on Jeopardy someday.

Tuesday, November 5, 2019

Hangover Remedies and Prevention

Hangover Remedies and Prevention A hangover is a name given to the unpleasant aftereffects of drinking too much alcohol. While a lucky 25%-30% of drinkers are naturally resistant to experiencing hangovers, the rest of you might want to know how to prevent or cure a hangover. Heres a look at what causes a hangover and some effective hangover remedies. Hangover Symptoms If you have had a hangover, you knew it  and didnt need to read a symptom list to get a diagnosis. Alcohol hangovers are characterized by some or all of the following symptoms: dehydration, nausea, headache, fatigue, fever, vomiting, diarrhea, flatulence, sensitivity to light and sound, trouble sleeping, difficulty concentrating, and poor depth perception. Many people experience an extreme aversion to the smell, taste, sight, or the thought of alcohol. Hangovers vary, so the range and intensity of symptoms may be different between individuals and from one occasion to another. Most hangovers begin several hours after drinking. A hangover may last as long as a couple of days. Hangover Causes According To Chemistry Drinking an alcoholic beverage that contains impurities or preservatives can give you a hangover, even if you only have one drink. Some of these impurities may be other alcohols besides ethanol. Other hangover-causing chemicals are congeners, which are by-products of the fermentation process. Sometimes impurities are intentionally added, such as zinc or other metals which may be added to sweeten or enhance the flavor of certain liqueurs. Otherwise, it matters what you drink and how much you drink. Drinking to excess is more likely to cause a hangover than drinking moderately. You get a hangover because the ethanol in the drink caused an increase in urine production, leading to dehydration. Dehydration causes headaches, fatigue, and dry mouth. Alcohol also reacts with the stomach lining, which can lead to nausea. Ethanol is metabolized into acetaldehyde, which is actually a lot more toxic, mutagenic, and carcinogenic than the alcohol itself. It takes some  time to break down the ace taldehyde into acetic acid, during which youll experience all the symptoms of acetaldehyde exposure. Prevent a Hangover The only sure way to prevent a hangover is to avoid drinking. While you may not be able to totally prevent a hangover, drinking a lot of water or other rehydrating drink will go a long way toward preventing or lessening most hangover symptoms. Hangover Remedies If drinking water didnt help you out enough or its too later and youre already suffering, there are some potentially beneficial remedies. Drink Water: Youll feel miserable until you are rehydrated. Water is an excellent hangover remedy. So is orange juice, unless your stomach is too upset to handle it.Eat Something Simple: Eggs contain cysteine, which may help combat hangover symptoms. Milk is more food than water, but it serves to rehydrate you while supplying calcium, which may ease your misery.Sodium Bicarbonate: Try a spoonful of baking soda in water to help quell the hangover queasiness.Exercise: It raises your metabolic rate, which helps you clear toxins associated with metabolizing alcohol. Exercise helps you deliver oxygen to your cells, which can increase the speed at which you detoxify harmful compounds.Oxygen: Supplemental oxygen is another way to speed up detoxification after drinking alcohol, without having to exercise.Vitamin B1 or Thiamine: Thiamine helps prevent the buildup of glutarate in the brain, which may be associated with part of a headache associated with a hangover. Other B vitamins are deplete d when you drink, so taking a B vitamin complex may be beneficial. Hangover Dont While it may be alright to take a couple of aspirin to deal with a hangover, dont take a couple of acetaminophen (Tylenol) tablets. Alcohol with acetaminophen is a recipe for potentially lethal liver damage.

Sunday, November 3, 2019

The Contrasting Elements of the Two Companys Management Styles - Acme Assignment

The Contrasting Elements of the Two Companys Management Styles - Acme and Omega - Assignment Example Omega discourages barriers between managers and employees, as well as company memos, as it’s believed the barriers create artificial distances between individuals that should be collaborating.  Ã‚   2. When considering the contrasting elements of the two company’s management styles in regards to the ways they coordinated the production of the memory unit prototypes there are a number of notable factors. It seems that Acme highly structured production process created an atmosphere where divergent departments could be willfully disregarded for the purpose of the speed of production. At Acme, this occurred as the process department was bypassed to increase speed. Although this ultimately resulted in increased product deficiency, it nonetheless functioned as a means of allowing the company to maintain its deadline. At Omega the organic management process was better suited to determining the production process and delivering a quality product on time, as the process department wasn’t so easily disregarded. 3. While in the short-term Omega’s manufacturing process was more efficient and better prepared for the task than Acme’s, one can imagine how in a long-term process Acme’s management structure could outpace Omega’s. With a more highly-structured management, the individual departments can be micromanaged more efficiently for production. When a single department is behind on the production schedule, the company president is then capable of applying pressure to this department, and the other departments are still capable of advancing without the hindrances of this single entity. Omega’s organic structure makes this more difficult since the two departments are seamlessly intertwined, so that multi-tasking is complicated. 4. I would recommend that Omega capitalizes on its organic structure through the creative aspects that it could potentially create. As Acme’s structure is more highly structured it disturbs the flow of creative idea production. One can imagine an organic structure working well in a company such as Apple, Inc. where unique ideas are central to the company’s existence.  Ã‚  

Friday, November 1, 2019

Attack on The White House Essay Example | Topics and Well Written Essays - 2500 words

Attack on The White House - Essay Example Space exploration has been left behind by the U.S.A being equipped with satellites apt enough to eye any corner of this world in a matter of minutes. Defense wise as well, U.S.A has the elite position having large chunks of budget being attributed towards the armed forces and most importantly the nuclear sector. Thus, there should be a general consent that the U.S.A is in present world the "ultimate power". Such a concentration of power and authority has not been under calm and tranquil circumstances. Instead, the U.S.A has attracted strong criticism and opposition of many rivals. They can be termed as terrorists in the American 'terminology'. Owing to such a criticism, many sensitive and central points in the U.S.A are at stake as can be observed from the past events like ninth September. The next best point of such a hunt can even be the statue of liberty, the pentagon and also the white house. Thus, to counter the lethal effects of such an emergency certain steps should be a dopted to either curtail or minimize the losses as much as possible. The white house has a place of paramount importance in the U.S.A. Located at 1600 Pennsylvania Avenue, Washington D.C, it is not only the residence of the president of the U.S.A but also a shelter for many governing executive operations. It was built on a neo classical style between 1782 and 1800. The names such as Executive Mansion (1810- 1901), President's House, President's Palace and President's Mansion were also used interchangeably for it in the past. Apart from its official significance, it is also of concern to the civilians as it houses the museum of American history and art. Hence, this structure spread over 7.3 hectares (18 acres) retains utmost importance. Returning to our topic, any kind of terrorist attack on such a prominent place of a dominant nation as the U.S.A could therefore, have serious consequences. To manipulate such a situation of emergency effectively certain steps as mitig ation, preparedness, response and recovery should be followed. However, such an incident could lead to several severe economic, social, academic and other consequences both within the national perimeters and across the border. Whereas, the rivals might in their own interest benefit from such a situation. But we shall see which impact has the highest weightage as we continue. I. Mitigation The technique of mitigation primarily revolves around the principle of not letting the attack happen on the first hand. Such a step is surely tough but if successful it can promote insurance of many lives and losses. Coupled with this, it may also include the calming down of a chaos disaster if white house is attacked. In the U.S.A, the Citizen Corps should train to inculcate this skill into volunteer's stock of craftsmanship to not only survive but also make the surroundings survive as well. In addition, the Department of Homeland Security should adopt necessary steps to detect any suspicious activity and operation beforehand. Certain gadgets and sophisticated cameras with latest updates should be installed to make the white house fool proof. Preparedness Nothing in this highly developed world as well is perfect. Even the flawless