Monday, September 30, 2019

Case of Unocal Burma Essay

Work in progress at the Yadana pipeline project †¦ modern equivalent of slavery? Unocal Corporation, the California-based giant gas-and-petroleum corporation, will face trial in a United States court on charges of forced labour of Burmese people to build the $1. 2 billion Yadana Gas Pipeline Project in southern Burma. On September 18 last year(2012), a panel of the U. S. Ninth Circuit Court of Appeals in Pasadena reversed a previous Federal District Court decision and allowed the groundbreaking human rights lawsuit against Unocal to go forward. In the Doe v. Unocal case, 11 Burmese villagers are suing Unocal for human rights abuses including rape, forced labour and murder during the building of the Yadana gas pipeline project in Burma. â€Å"This is a landmark decision,† said Richard L. Herz, an attorney with the non-profit group EarthRights International (ERI), co-counsel in the lawsuit. â€Å"In recognising that corporations that aid and abet egregious human rights abuses can be held accountable, the Ninth Circuit has affirmed that U. S. corporations cannot violate international human rights with impunity. † The decision said that plaintiffs need only demonstrate that Unocal knowingly assisted the military in the perpetration of the abuses, and that they had done so. The court also found that forced labour such as that employed by the Burmese military on behalf of the Unocal pipeline is the â€Å"modern equivalent of slavery†. The ruling stated, â€Å"The evidence supports the conclusion that Unocal gave `practical assistance’ to the Myanmar Military in subjecting Plaintiffs to these acts of murder and rape. Thus, because Unocal knew that acts of violence would probably be committed, it became liable as an aider and abettor when such acts of violence, — specifically, murder and rape — were in fact committed. † The legal battle began six years ago when Burmese villagers filed a suit in U. S. federal court demanding that Unocal pay millions of dollars in damages for abuses committed by soldiers along the Yadana pipeline. However, in 2000, despite the court finding evidence that â€Å"Unocal knew that forced labour was being utilised and that the joint venturers benefited from the practice†, the  federal judge dismissed the case because the company’s conduct did not rise to the level of â€Å"active participation† — a liability standard borrowed from the Nuremberg war crimes trials involving the role of German industrialists in the Nazi forced-labour programme. Lawyers for the Burmese villagers responded by filing a new lawsuit under state law and making many of the same charges in the Superior Court in Los Angeles. In June 2002, the California Superior Court Judge Victoria Chaney’s decision held that plaintiffs’ claims might proceed to trial. The trial of the California State case is scheduled to start in early 2003. The lawyers for the Burmese villagers also appealed the federal judge’s dismissal last year, which led to the ruling by the Ninth Circuit Court on September 18 last year. Although the Ninth Circuit Court has sent the case back to the lower federal court for trial, the villagers’ lawyers said they would ask Superior Court Judge Victoria Gerrard Chaney to apply the new liability standard in the California State trial. Unocal maintains that its actions are not on trial in the California case and that the company expects to be vindicated of `vicarious liability’ charges. Responding to the federal decision, Unocal’s lawyer Daniel M. Petrocelli said: â€Å"What the case is about is whether a private American company can be held responsible for the actions of a foreign military regime when the company itself didn’t do any of the offending conduct. † â€Å"No Unocal person participated in any acts of wrongdoing,† Petrocelli said. â€Å"Unocal does not have, nor ever had, any control over the actions of the Myanmar military. The company does not direct, countenance or condone the violation of any person’s human rights, and it certainly did not aid or abet the violation of anyone’s human rights. And if that is the standard that is applied in this case, we are confident we will meet that standard. † During the early 1990s, ignoring widespread calls from the Burmese democracy leader Aung San Suu Kyi and pro-democracy groups worldwide for a moratorium on international investment, transnational oil companies Unocal (U. S. ) and Total (France) chose to invest in a regime with one of the worst human rights and environmental records in the world. In 1992, the Burmese military government entered into a joint venture with Unocal and Total to construct a gas pipeline from the Yadana gas fields in Burma’s Gulf of Martaban to the Thai border. This represents the single largest foreign investment project in Burma. The Yadana gas revenue is one of the largest sources of foreign capital for the Burmese military government. The Burmese military regime was contracted by the oil companies to provide â€Å"security† for the project. Ever since, the Burmese army has engaged in systematic human rights abuses and environmental degradation in order to fulfil its contractual responsibilities. The U. S. court accepted the case against Unocal based on extensive documentation including eyewitness accounts of human rights abuses in the pipeline region provided by ERI. Along the Burmese pipeline route, killings, torture, rape and extortion by pipeline security forces have increased sharply since the Yadana Project was initiated. Many villagers along the pipeline area provided eye-witness descriptions of forced labour: â€Å"Battalion No.  273 came in to our village and asked for two porters to go to two places, including one located directly along the pipeline. These people had to go because it was their turn. The soldiers ordered a total of 18 porters from our village tract. The work lasted about 20 days, and they did not get any payment. I know they did not get payment because that was always the case, and it was the same again. † The influx of soldiers in the previously isolated Tenasserim region also caused an increase in illegal hunting, logging, and wildlife trade. The region is one of the largest rainforest tracts left in mainland Southeast Asia, home to wild elephants, tigers, rhinos and great hornbills, to name just a few rare and important species. It is also home to numerous indigenous peoples, including the Mon, Karen, and Tavoyans. An incriminating piece of evidence is a declassified cable sent from the U. S. Embassy in Rangoon to the U. S. State Department in 1995 that confirms Unocal’s relationship with the Burmese military and their collusion in forced labour. Known as the â€Å"Robinson Cable†, the cable chronicles a meeting between the U.S. embassy staff and Joel Robinson, Unocal’s manager for special projects. According to the cable, Robinson accepts Unocal’s relationship with the Burmese military: â€Å"On the general issue of the close working relationship between Total/Unocal and the Burmese military, Robinson had no apologies to make. He stated forthrightly that the companies have hired the Burmese military to provide security for the project and pay for this through the Myanmar Oil and Gas Enterprise (MOGE). He said three truckloads of soldiers accompany project officials as they conduct survey work and visit villages. He said Total’s security officials meet with military counterparts to inform them of the next day’s activities so that soldiers can ensure the area is secure and guard the work perimeter while the survey team goes about its business. † Tyler Giannini of ERI said that the evidence belies Unocal’s claims that it is not responsible for the acts of the Burmese military. â€Å"When Unocal and Total hire the military, tell them where to go, what to do, and depend on them for the security of their project, they are morally and legally responsible for the abuses that their security forces commit. Unocal was dealing with the devil. Now they will have to answer to a jury,† he said. Doe v. Unocal is the first case in U. S. history in which a corporation will stand trial for human rights abuses committed abroad. Human rights lawyers have viewed the court decision on Unocal as a breakthrough for foreigners seeking to hold multinational corporations accountable for their alleged complicity with repressive regimes in human rights abuses. With at least 10 similar lawsuits pending around the U. S. against multinational corporations, including ChevronTexaco Corp. and Coca-Cola Co. , the Unocal court ruling will encourage human rights lawyers to proceed on these cases.

Sunday, September 29, 2019

Leadership and Tech Final Exam

In my business there are 3 types of Leadership levels there is the lead man that's a technical expert and guides the team through it day to day operations. The there is the first level manager that gives the daily drill down of operations notes and ensures the deliverables are made.. Then the senior manager who's task is the developing the budget, travel keeping the organization fresh with the latest each, and constantly keeping a fresh vision of the organization. 64. Describe a data visualization tool and how it is used. Prize is a great data visualization tool it gives you the ability to, 1.Use visual aids to help communicate your point. 2. It helps you compartmentalize your pitch to segmented parts to build upon the chain of information you trying to convey. 3. Prize gives you the ability to use video, pictures , AR etc to help get your point across. 65. Explain the value to leaders, in using dashboards and data visualization tools. Using a dashboard is value added when compiling any type of metrics and project status. It gives the ability to have a home base of the latest data that everyone can have access to from Eng I/E, MR. , Quality, Operations.Many decisions are based on the database daily such as overtime, manpower distribution, and Eng resources. 66. In the book Progress Makers, the author uses platforms to describe a methodology for incremental transformation. Give one example of leadership transformation using this concept. Use your own thoughts and ideas to express your answer. 67. How do you become Mayor of a location? If a user has checked-in to a venue on more days than anyone else in the past 60 days, and the check-ins re valid under foursquare time and distance protocols, they will be crowned mayor.The user must have a profile picture in order to be crowned â€Å"Mayor† of that venue. Someone else may earn the title by checking in more times than the previous mayor. 68. What is the purpose of a â€Å"special† on foursquare? To g ive the users of foursquare incentives to update data and give them a perks such as coupons for restaurants or apparel shops. Essay 69. (1 0 pits) Describe the difference between leadership in the classic sense and leadership as it relates to the field of technology? Why is it different? The rotational leadership model may include a top down method, which may be antiquated but functional, and gets the job done.The manager will ask the team for certain deliverables and really have no idea of how the deliverable is made and what it takes to get it done. And as long as you have a good team making the deliverables a leader might be able to survive, depending on the strength of his or her team. Technology has changed the nature of classic leadership in some ways, providing some additional challenges. For instance, working in the technology field, a leader must stay current with the latest and greatest technology or his r her group will lose vision and be behind the curve of technology ve ry quickly, rendering them out of date.

Saturday, September 28, 2019

Write up Essay Example | Topics and Well Written Essays - 1500 words

Write up - Essay Example For example there is a probability a particular section in Plot1 has higher concentration of herbicides. E (i) Coleoptile is a pointed protective sheath which grows towards the surface during germination. When the coleoptile has reached the surface it shops growing allowing flag leaves to penetrate its top. The coleoptiles function is to provide protection to the tender flag leave to the surface. It also has vertical water vessels to carry water throughout the germination process. (ii) Magnification is different on different microscopes. To be certain that the reading are accurate a microscope must be calibrated before use. However, there is still a small scope of error after calibration is complete. A non calibrated microscope will profile incorrect data. (iii) Toluidine blue stains the cells wall it is applied to on the basis of organic composition of the subject. Applying Toluidine blue to coleoptile stains the epidermal and cortical cells making them visible under a microscope. When the cross section is used under the microscope, we can easily distinguish the epidermal and cortical cells of the coleoptile. (iv) The study was conducted to find the changes found in the coleoptile exposed to gamma radiation. To cover all aspects it is necessary that we measure the epidermal and cortical cells as each might reach differently to the gamma radiation. Therefore we measure the measure both the epidermal and cortical cells. I placed the test tube holder on the platform and stood the test tube in its hold. I also removed the cap. We then positioned the stand of the Cs/Ba isotope generator over the test tube and ensured that the hole in the top of the stand is centred over the test tube. I removed the both the red end-caps of the isotope generator while handling it with tongs. The writing on the generator was made to face upwards. I then attached a piece of plastic tubing to a syringe and drew up 2

Friday, September 27, 2019

Production and Operations Management Essay Example | Topics and Well Written Essays - 1000 words

Production and Operations Management - Essay Example 2. Analyze the relationship between the retail price of gasoline and the world demand for crude oil. To understand the relationship between the price of gasoline and the demand for crude oil , we’ll first need to understand the dynamics of both gasoline and crude oil individually. Like many commodities being traded in the global market like gold, silver, rice, wheat etc. crude oil is also traded. The main reason for it being traded in the global market is that it’s one of those commodities which is unevenly distributed on the surface of earth. It can found in much abundance in one place which cease to exist at some other country. This instability in the geographic distribution of crude oil makes it quite an important resource to be present in any country. The countries with its abundant deposits are on the top of the food chain economically and the countries with lesser deposits of it are quite weak economically. Hence proving the significance of crude oil for economies . Now crude oil is not only used for production of Gasoline but many other petroleum products are extracted from it. From this we can extract that crude oil has more demand as a commodity and is not only required for the production of gasoline. Gasoline is a refined form of crude oil. Crude oil is extracted or purchased in raw form and goes through various refining processes to produce gasoline. Gasoline has become as the basic commodity which has been in use for decades now as the primary fuel for powering transportation. The transportation requirements have been increasing each year as the population of the world increases by a significant percentage each year. Hence increasing the amount of fuel being consumed each year and the demand for gasoline. Now gasoline and crude oil have developed a relationship in which the demand for both are increasing but Gasoline is dependent on crude oil for its production hence making it the dependent product. The global demand for both gasoline a nd crude oil is on the rise and with no new large deposits being excavated the supply is not increasing much and the demand is growing making the prices for both oil and gasoline head upward. The gasoline we purchase majorly includes the cost of Crude oil , the refining , marketing and distribution and the taxes. So from this we can infer that there is a inversely relationship between the supply of crude oil and the price of gasoline. Also in the years we have seen where the oil prices have dropped but gasoline prices have risen which is due to the fact that there are disruptions in the supply of oil due to unrest in the middle east. (Fuel, 2011) We also can observe this for a fact that the prices of gasoline rise accordingly with the rise of crude oil price but they don’t fall at the same rate when price of crude oil falls. The matter behind this fact is that when prices are high , the retailer have to increase it so that they cover up for their profit margins but what makes the retailers bring price down when the price for crude oil falls is competition. In competition the retailers bring down a few cents to draw in more customers and so on the process continues until they reach a point where they reach their original profit margins or the price of crude oil again increases. Also the demand imbalance of gasoline across various seasons also has an effect on retail pricing of gasoline. (US Energy Information Administration, 2003) 3. Explain what Marathon could do to keep the price at the pump the same without losing

Thursday, September 26, 2019

Hyperbola Research Paper Example | Topics and Well Written Essays - 750 words

Hyperbola - Research Paper Example Different conics have different ranges of eccentricity. Hence a type of conic is identified by the value of eccentricity and if the value of eccentricity is greater than one then the conic is named as hyperbola. Hyperbola is logically very close to that of ellipse in all its mathematical features. The basic and fundamental difference between the ellipse and a hyperbola is enumerated by the difference in the eccentricity value since ellipse eccentric value is greater than zero but less than 1. Actually this difference can be understood in 2D as for ellipse the sum of distances from foci and a point on that of ellipse is fixed. Whereas in hyperbola it is the difference in the distances from foci and a point on hyperbola is fixed. The diagram of a hyperbola reveals the fact that a hyperbola is actually composed of two parts which are disjoined with each other and two parts are positioned on equal distances with each other. As the value of the eccentricity of hyperbola come closer to 1 t he edges of the cups of the hyperbola are lessened with each other coming closer on the other hand if the value of eccentricity increases the edges of the cup widens and the two ends of cup go more far with each other. 1. Mathematical And Geometric Features In Hyperbola Hyperbola has many geometric and mathematical features as that of ellipse. ... There is another axis at the centre of hyperbola which is perpendicular to that of traverse axis and is called as conjugate axis. The conjugate axis is just like a minor axis as in the case of ellipse. Likewise the transverse axis in a hyperbola is just like a major axis in the ellipse. The centre is a point across which all geometric features are located. This centre point is the intersection of the two axes i.e. the traverse axis and the conjugate axis. The centre point can be located at origin as well as it can be replaced to some point like (h, k), in such case of replacement of centre point the equations and calculations are made accordingly and become bit difficult to solve. The traverse axis is normally parallel to X axis (horizontal) or exactly placed on it, but in other cases the traverse axis can be shifted to Y axis (vertical) for this reason a new hyperbolic curvature is obtained. When the transverse axis is placed on X axis the conjugate axis will be placed on Y axis. Bu t when traverse axis is placed on Y axis the conjugate axis will be shifted to X axis. When traverse axis is placed on or parallel to X axis (horizontal), the ‘x’ component in standard equation of hyperbola is taken as positive. If the transverse axis is placed on or parallel to Y axis (vertical), the ‘y’ component in standard equation of hyperbola is taken as positive while the other ‘x’ component is taken as negative. 2. Hyperbolic Classification There are different types of hyperbola categorized on the basis of their orientation and characteristics. Hyperbolae centre can be placed on origin and as well as any where except origin. Hyperbole transverse axis can be parallel to X axis (horizontal axis), can be made parallel

Wednesday, September 25, 2019

Social Psychology Assignment Example | Topics and Well Written Essays - 500 words

Social Psychology - Assignment Example First, Bernice stood up in the wedding and announced to all the visitors that the reason for the wedding was the advice-seeker’s pregnancy. And that the pregnancy was done in purpose to tie down Simon. Second, during Bernice’s hospital visit when the advice-seeker gave birth, she once again reiterated that the pregnancy was just a rouse to tie her son down. The final straw for the advice-seeker was during the college graduation party of her husband. Bernice made reservations for everyone but the advice-seeker and her baby. And everytime conflict happens, the advice-seeker will get the same answer from her husband, â€Å"I can’t control my mother.† The situation shows high consistency in Bernice’s and Simon’s behaviour thus implying that the root cause of the conflict between the marriage is Bernice’s behaviour towards the advice-seeker. These situations also indicate low distinctiveness since in different stimuli and events, Bernice ha s the same reaction towards her daughter-in-law. Bernice’s behaviour indicates clearly resentfulness towards her daughter-in-law and Simon’s behaviour indicates clearly that Simon hasn’t come into terms that he should be supporting his wife and defending her and their marriage against her mother. The situation shows high consensus, low distinctiveness and high consistency. This leads to a conclusion that the marriage is continually being destroyed because of the behaviour and actions of the mother-in-law and the husband’s low response with his wife’s need of support against her mother’s behaviour. The marriage may then really be saved if the couple will not encounter anymore of the mother-in-law’s behaviour. The second situation tells about how a woman wanted to help out her friend in dealing with his son (Dear Abby). The deep friendship between the woman and the father started from the time

Tuesday, September 24, 2019

An international expansion plan for Ferrero Rocher Essay

An international expansion plan for Ferrero Rocher - Essay Example International business expansion strategy has become one of the profitable and important business growth strategies of several leading multinational business organizations. There are several advantages of international business expansion. Organizations can increase its market share through the help of global expansion strategy. In addition to this, multinational organizations can develop potential client base around the globe through this strategy. Major objective behind this internal expansion is to maximize business profit (Blenkhorn and Fleisher, 2005, p.76). The market demand and test or preference of the customers for global products is increasing significantly due to the significant effect of globalization and technological advancement. However, the organizations’ business expansion strategy can get affected due to several risks that are associated with the business operations in international market place. Ferrero Rocher, an Italy based spherical chocolate sweet has bee n chosen as a product for the assignment. The organization is planning to introduce this product in the potential South Korean market. This assignment will determine the business environment of the host country and preferred market entry mode for Ferrero Rocher. A description of the product Ferrero Rocher is one of the popular spherical chocolate sweets. This particular product has gained huge popularity among several regional and international customers. This product is made by a popular Italian chocolate producing organization named Ferrero SpA. Ferrero Rocher was introduced in the Italian market in the year 1982. The chocolate consist of roasted hazelnut. It is encased in a unique thin wafer shell that is filled with vegetable oil and hazelnut cream. This specific chocolate sweet is covered in chopped hazelnut and milk chocolate. Each and every sweet item contains 73 calories. In addition to this, each and every sweet item is packaged individually insider an attractive gold-colou red rapper. The product already has presence in several emerging international market. This specific product achieved huge popularity among millions of people around the globe due to its quality and taste. The product is considered as the leader within the industry and in its category. Effective quality control, innovative shape, original recipe, unique advertising campaigns and refined packaging attract the global customers toward this product (Ferrero, 2013, p.1). It can be stated that the creamy filling, delicious hazelnut centre and crunchy wafer increased the demand of this product. In addition to this, the organization implemented economic pricing strategy for the products. These products are often identified in the retail chains, stationary shops and confectionary stores. A description of the organisational context Ferrero Rocher is the product as well as the brand extension of parenting company Ferrero SpA. Ferrero SpA is known as one of the leading and popular Italy based m anufacturers and distributors of the chocolate and other confectionary products. The organization was established in the year 1946 by famous confectioner Pierto Ferrero. The organization is headquartered in Alba, Italy. The founder of the

Monday, September 23, 2019

Diversity Research Paper Example | Topics and Well Written Essays - 750 words - 2

Diversity - Research Paper Example Lost is an action, adventure, mystery, serial drama, science fiction and mystical drama film, While Greys Anatomy is an American medical drama series. In Lost, a plane, ‘oceanic 815’, flying to Los Angeles crashes on a mystifying island, leaving its survivors marooned in it without the resources to get help from the mainland. Greys Anatomy is all about the lives of the interns, inhabitants and their mentors in the illusory Seattle Grace hospital. It depicts their struggles to achieve their medical internships and have proper personal lives. In the two films, Asian American characters have been cast in quality roles. Lost has featured four Asian American characters; ‘Daniel Dae Kim’, ‘Yunjin Kim’ and ‘Naveen Andrews’ for main characters, and Ken Leung as a minor character. Greys Anatomy features Sandra Oh as the only character of Asian American descent. The Asian American characters in Lost have been given different roles; Daniel Dae Kim plays the husband of Yunjin Kim who is the offspring of an influential Korean entrepreneur and mobster. Naveen Andrews plays the role of a former Iraqi republican guard, while Ken Leung plays the role of a sarcastic supposed ghost whisperer. Greys Anatomy Sandra Oh plays the role of a surgical intern who progresses to a full surgeon. Asian Americans are underrepresented in primetime films, as white film writers do not write for this ethnic group. Asian American characters encompass only of 4% of the prime time television populace (Kendall, 186). Preponderance of the characters portrayed in key television population is cast in drama and science fiction making up 63%. 21% are cast in crime or law enforcement series, and 16% are cast in sitcoms or comedies (Kendall, 186). There are ranges of rationale why Asian Americans are underrepresented in prime time shows. Firstly, tribal issues frequently come up with writers writing for white characters only (Larson, 69). Secondly,

Sunday, September 22, 2019

Hazardous Material Management and Hazard Communication Essay - 7

Hazardous Material Management and Hazard Communication - Essay Example By names, it means the names of both the hazardous chemicals and the other chemicals perceived as not hazardous (McLeod 2009). The availability of spread sheet that has more information such as chemicals name, manufacturer’s name, room number stored and availability of the material safety data sheet that should be available to all the employees when needed. The inventory would be very current if also the chemicals with a higher flammability level are well indicated in the inventory well. The inventories should have spaces for recording the chemicals physical properties it contains, health hazards it can cause this helps to be able to choose the kind of protective wear to use on the chemical( Hoboken 2009). The inventory would be said to be current if it includes the manufacturer’s emergency number. This emergency number helps in getting back to the manufacturer in case of a chemical spill or an unusual reaction of the hazardous chemical. The inventory would be current if it is checked regularly and a different person from the same department crosschecks again. In conclusion, the inventory should be very much current with all the said things above-mentioned (McLeod

Saturday, September 21, 2019

Racial and Ethnic Identity and the feelings of Acceptance and Belongingness Essay Example for Free

Racial and Ethnic Identity and the feelings of Acceptance and Belongingness Essay Ethnicity generally refers to a person’s affiliation with a particular ethnic group, or to their sharing qualities, characteristics or customs of that ethnic group. Ethnic identity, on the other hand, has been linked to the sense of belongingness and identification of an individual within a cultural group. The first use of ethnic identity in 1896 by French nationalist and scientist, George Vacher de la Pouge, was synonymous with racial identity which means the â€Å"natural and counterfeit cultural, psychological and social characteristics of a population. † (Timble) According to Smith, â€Å"Ethnic identity is the sum total of group member feelings about those values, symbols, and common histories that identify them as a distinct groupâ€Å" (Smith, 1991) Charlesworth (2000) maintained ethnic identity development to be an essential human need that provided a sense of belonging and historical continuity and created a foundation on which to build a concept of self. On the other hand, Tajfel (1981) described ethnic identity as part of an individual’s self-concept developed from knowledge of membership in a cultural group and the value or emotional significance attached to that membership. However, moving to another community with different culture and ethnicity, like in the case of migration, compromises the maintenance or preservation of ethnicity in relation to the individual’s belongingness to the majority. Parents of the next generation strengthen ethnic identity development of their children by ethnic socialization. Ethnic socialization consists of three themes: 1) understanding ones own culture, 2) getting along in mainstream society, and 3) dealing with racism. (Steinberg, 1996) Racism and racial discrimination has long been a concern of the immigrants and their descendants. The inherent characteristics like skin color, language, religion are parameters in racial identity which sometimes lead to racial discrimination. Belongingness sometimes adapts the adage â€Å"When in Rome, do as the Romans do† which lose their own self-identity and ethnic identity. Maintenance and preservation of ethnicity and original culture is subjected to a strong pressure of the host country’s culture. For example, language is an important issue for the immigrants. The influence of the communication speeds up to learn the host language that previously, the adaptation of language is in the third generation, now the trend is in the children of immigrants. The growing population and influx of immigrants face debates regarding complex issues which dictate acceptance and belongingness of the immigrants to the host country. Prejudice and discrimination may be directed toward an immigrant’s status as a newcomer as well as against his or her ethnicity or race. In Europe, there is a growing concern on how the immigrants affect their culture and national identity which comes with common language, heritage and ethnicity. (Cohen, 2000) Further queries have been raised whether or not to absorb the immigrants and allow them to participate in their national activities or to allow them to become their citizen without the thorough knowledge of their culture and heritage. During elections, opposition to immigration is always an issue in some countries like Britain, Switzerland, Denmark, Italy and Sweden. (Cohen, 2000) Immigrants in some countries are also subjects of distrusts and fear. Opposition to immigrants often claims that immigrants have something to do with crimes and unemployment, if not low-wage jobs. Racial discrimination tends to set in which affects the acceptance of immigrants to the host country and if not properly addressed to by the government will give negative effect to both the immigrants and the host country. Ethnic discrimination was identified by Garbarino (1999) to be one of the risk factors that contributed to youth violence. Rejection and estrangement from the macroculture experienced by many children significantly contributes to acts of violence. Consequently, immigration issues become the central topic for studies of different researchers and sociologists to minimize conflicts. (Garbarino, 1999) There have been clamor that immigrants are linked with social crimes in the host countries. This was contradicted by some researchers who conducted related studies. Based on the studies in Little Village conducted by the Harvard sociologist Robert J. Sampson, having high number of immigrants does not mean high number of crime. Though Little Village is poor, a relatively low incidence of violence is recorded. (Eval Press, 2006) At least, inacceptance and prejudices to immigrants and their children will lessen a bit by the findings of the researchers done by these sociologists.

Friday, September 20, 2019

Security Features Of Network Hardware Devices Computer Science Essay

Security Features Of Network Hardware Devices Computer Science Essay Describe the security features of network hardware devices. All network hardware devices need to have security functions which would prevent unauthorised access to systems and data and helps stop viruses malicious software from accessing the network. Network hardware devices include: Workstations Modems Routers Wireless Routers/WEP (Wireless Access points) Each network hardware device comes with its own security features. Workstation Workstations rely greatly on software to protect them from network threats. Anti-virus software programs help keep workstations safe and a software firewall is deployed to keep ports closed even if a program tries to open them. Keeping ports from being opened is like keeping a door closed; nothing can go in or out. This reduces the threat from unauthorised access. Routers To access the security settings of a router, a username and password is needed. If this is not configured anyone who gains access will be able to administer the network as if it was owned by them. This is set buy the administrator or the ISP. Wireless Routers/WAP (Wireless Access point) Wireless routers are more venerable to unauthorised access. This is because the LAN (Local Area Network) does not need to be accessed physically. If the wireless functions of a router are not configured properly, the network can be accessed and configured in administrative mode by anyone. This is a serious security risk. The wireless access can be controlled by configuring an encrypted password, setting a SSID (Service Set identifier) and choosing whether it is visible or not. If it is not visible, people will not be able to search for the access point; they will have to know the SSID before hand. For password encryption WEP and WPA can be used. WPA is more secure than WEP. Doing this stops unauthorised users from accessing the network. M2 Configure a networked device or specialist software to improve the security of the network. I have been asked to implement security to the plan below. This is the network security set-up of a bank. I have been given the task of creating a detailed diagram coupled with a full write-up including any evidence of how the network security has been improved. I will analyse the potential risks of each asset in this network to find out what types of threats the business may face and what can be done to defend or prevent these threats. Mainframe with customer accounts Customers are able to log directly onto the extranet using their personal details. This means that they are essentially giving away their personal, confidential information. Although an extranet is a private network it uses the internet for its external access feature. When sending information across the internet without the right protection, information could be intercepted and taken for later use. Information can even be altered at the time of sending for example a hacker might change the address that a customer wants to send money to in order to commit fraud. This is called the man-in-the-middle attack. If the website does not use encryption, people may start attempting to target the sites vulnerabilities. Depending on how popular the service is the likelihood of an attack can vary. The can be easily prevented by using a secure HTTPS connection on the website when dealing with personal and private information. This will also prevent the man-in-the-middle attack as time-stamps are used. This means if information transfer has been delayed, it may be altered so it is ignored. The network set-up can be made more secure by adding a dedicated firewall in between the extranet and the external customers. Although a firewall has already been installed, alternative routes can be taken to avoid the firewall. An example of when this will happen is when the connection is cut between the firewall and extranet, an alternative route may be taken when accessing customer details. Internal Bank Systems and All other bank data Because there is not firewall installed between the internet and extranet, malware and/or spyware may make it through the network, through the Internal Bank Systems and into the server that holds all the other bank data. This data can range from customer accounts to the banks future strategies and projects. This makes the bank venerable to hackers and even competitors as this information can be used for fraud and blackmail or it can be taken secretly by another bank to give the competitor an extra edge in the market. If the internal bank systems are taken over externally, money transferred illegally and records deleted, this would cause a huge problem for the banks as well as all of its customers and employees. Although it is not likely that other banks will hire hackers to attack the network, it is common for hackers to try to find information or ruin a banks system. This is popular and is also often seen in films. This can be prevented by installing anti-malware/spyware software on the server and installing a dedicated, properly configured firewall between the extranet and internet. External Access via Customers Advice can be given to customers to prevent Phishing and other threats. If the customer is knowledgeable in this area they will notice that it is a risk. This can be stopped by informing the customers that they should only go directly to the site before logging in and not to follow email based links. Firewall Its all good having lots of firewalls installed on the network blocking every possible entrance but if they are not configured correctly they may let in experienced hackers. In some cases the user cannot access the internet with a program they use often and so they open a bunch of ports on the firewall so they can access the internet. This is unprofessional and doing this greatly increases the risk of unauthorised access the network. A network administrator should be contacted in this type of situation to open the port needed and minimised network traffic. If unnecessary ports are open the bank will be extremely venerable to a Distributed Denial of Service Attack (DDoS). This type of attack in often aimed towards commercial websites that sell/provide goods and/or services. This attack involves a computer sending a virus to a large number of other computers. The virus will have a trigger. When this trigger is set off (by time or by another computer,) all of the computers infected will flood the victim server(s) with network traffic in order to shut down the server and their service. Here is a diagram that shows how this process takes place. If the server was turned off for even 5-10 minutes a vast amount of customers would complain. This bank may be targeted because if it is popular and well known. This type of attack can also be prevented by using a dedicated firewall that examines network ports to determine whether it is from a reliable or safe source. If it is a malicious packet it is dropped immediately. After receiving a packet it will send in on to the main server only if the packet is safe. Wireless Access point with WEP Wireless routers are more venerable to unauthorised access. This is because the LAN (Local Area Network) does not need to be accessed physically. This is done by using an encryption algorithm called Wired Equivalent Privacy (WEP). As this security measure has become used more, it has been examined by hackers and now had been cracked. For this reason the newer, more secure security method should be used; Wi-Fi Protected Access (WPA/WPA2) If the wireless functions of a router are not configured properly, the network can be accessed and even configured in administrative mode by anyone. This is a serious security risk. The administrator needs to set an admin password and username in order to prevent this. I have produced an improved network diagram using the countermeasures mentioned above. This new network had improved the network security in every aspect above. I have done this by configuring all devices, installing security software on relevant devices and installing two extra firewalls. M3 Explain the similarities and differences between securing a wireless and wired network system. Wired and wireless networks are very similar in a logical diagram but physically can be very different. Wireless networks can go further than a wire, for example they can go through walls and building floors. Because of this wireless and wired network security is very different is some ways. Physical security Securing a traditional wired network, physical aspects of the network have to be looked at. For example servers have to be located in secure rooms with locked doors and wires have to be protected using wire covers. Below are examples of the kind of products that professional networks will have installed. Wire networks also need physical security but they can still be accessed wirelessly, because of this a password has to be used to restrict unauthorised access. This can be implemented using Wired Equivalent Privacy (WEP) or the more secure Wi-Fi Protected Access (WPA/WPA2). The network SSID (Service Set identifier) can be configured to an unsearchable setting. This prevents people even knowing that the wireless network exists. The SSID would have to be known in order to connect to the network in this case. Speed One of the main disadvantages to wireless networking is the reduced speed. Wireless Ethernet is either 11Mbps (802.11b) or 54Mbps (802.11a) or 160 Mbps (802.11n) whereas Wired Ethernet is can be from 100Mbps to 1Gbps (1000Mbps) or more! Performance Although the speed of wireless has been greatly increased due to the introduction of 802.11n, it still cannot keep up with the demand for bandwidth in networks today. If multiple people are gaming over the internet, sharing/downloading files and using bandwidth the network may be overloaded. With wired Ethernet 1Gbps can handle the large bandwidth demand and provide a good service to all users on the same network. Connection Both wired networks and wireless networks can communicate across a peer-to-peer network. This can be used to store and share data, communicate privately or transfer files. Although with a wireless connection files over 100MB problems have been said to occur. Client servers are used to centrally store client data and programs on a server giving them access from multiple locations. This is not possible over a wireless connection as a high performance and high bandwidth is needed. Protocols For communication wired and wireless systems have to use different protocols. Both use standard protocols such as HTTP, UDP and TCP. But for wireless connections encryption has to be used. This is because anyone can interrupt a wireless signal without being noticed.

Thursday, September 19, 2019

Catcher in the Rye :: essays research papers

â€Å"The Member Of The Wedding† and â€Å"The Catcher The Rye† are both similar novels in the way adolescents want to belong to a group of people but there is one major difference. Frankie is looking to grow up so that she can fit in with the people around her while Holden wants to avoid adulthood completely as he sees the adult world as being false and corruptible. In â€Å"Member Of The Wedding Frankie feels like she doesn’t fit in to a child’s world. This is due to a number of reasons. She wishes now to belong to a more adult society. Frankie feels alienated from the rest of her friends. When they play underneath the arbour Frankie doesn’t â€Å"fit† because she is too tall. She resents this and sees her friends as â€Å"ugly screaming kids†. Frankie attempts to befriend the older girls but they say she â€Å"smells† and when they talk about sex Frankie doesn’t understand referring to this as â€Å"nasty lies†. Here we see Frankie excluded from the adult world that she desires to belong to. Frankie also feels excluded from her family. Her father won’t allow her to sleep in the same bed as him anymore. He says that she is â€Å"too big† now. He is rarely at home and when he is he hardly speaks to Frankie. She attempts to converse with him but he just â€Å"grunts† at her. Eventually when he does talk to her he doesn’t say much. After the wedding he shows a lack of understanding towards his daughter. She needs him but he tells her to wait until they are at home because then he will punish her for her behaviour. Berenice is the mother figure in her life but she returns to her own home and family in the evening. She feels excluded from Jarvis and Janice too because when they arrive home for a few days they invite Frankie’s father but not her. She feels this isn’t very fair as she is also part of the family. This heightens Frankies isolation and also heightens her desire to belong to a group. Frankie wants to â€Å"belong† to the navy and then decides to give blood to the Red Cross. She is refused on both accounts because she is too young. She thinks the â€Å"freaks† and â€Å"criminals† are trying to make eye contact with her so she can join their group but Frankie does not want that.

Wednesday, September 18, 2019

Differences between the New England and Chesapeake Colonies Essay examp

The English Settlement in the New World was largely the result of the Age of Exploration. The English started emigrated to the New World around the early 1600s; they settles in regions including the New England and the Chesapeake region and by the 18th century these two regions had developed their own society. These two regions had developed different political, economic and social system in their regions. The political differences were due to who governs the colony. The economic differences were due to the motives of the settlement. The social differences were due to the people who settled there, while the New England emigrated as a family, the Chesapeake emigrated with mostly male. The political difference between the New England and Chesapeake region was that New England government associate more with religious matter than the Chesapeake government. The New England regions included the Massachusetts Bay Colony, the Plymouth colony, the New Hampshire colony, Maine colony, Connecticut colony, and Rhode Island colony. Massachusetts colony for example was governed as a theocracy government. As the first governor of Massachusetts colony once stated in A Model of Christian Charity (Written on board the Arbella on the Atlantic Ocean, 1630),"we shall be as a city upon a hill" a holy commonwealth that could be served as an example community to the rest of the world. The Massachusetts Bay colony placed great importance on religious matters. Only the church member were allowed to vote or held office position. Those who held office position would enforce the law requiring attendance at services. Jamestown, Maryland and the Carolinas were some colonies in the Chesapeake r egions. The governments in these regions were less concerned about... ...ere more concerned about the commonwealth of the people due to their strong sense of community. Chesapeake government placed a harsh rule to ensure the survival of the settlers like the colony of Jamestown. New England had a diverse product due to poor soil and cold weather. They engaged in small scale agriculture, fishing, trading and shipbuilding. The Chesapeake regions had a warmer climate therefore it was more suitable to farm. The economic products that the Chesapeake region produced were tobacco and rice. The New England colonies were more of a community than the Chesapeake colonies. One of the reasons was that the settlers New England emigrated as a family and the Chesapeake emigrants were mostly males with the ambition to find gold and to own a large plantation; this resulted in mostly male population without female to enforce a sense of a real community.

Tuesday, September 17, 2019

Science Education Reform :: essays papers

Science Education Reform The entire purpose of educational reform is to improve the learning of the students. With that in mind, state governments have been and continue to implement programs in their school systems geared towards improving academic performance. Topics under consideration and implementation include lengthening the school day and, in turn, lengthening the school year. This would allow more time for more time for instruction. An important part of educational reform is the reform of teacher education. Nationwide, state school systems are improving the preparation and performance with more meticulous graduation requirements, performance based pay, and â€Å"career ladders† that will require the teachers to continue their education (Blosser, 1989). Most of this educational reform blossomed in the 1980’s, a period which is now referred to as the school reform movement. It was during this time that many of the ideas of educational reform came into public view. Science Teacher Education Most colleges in the U.S. require science teacher candidates to enroll in a vigorous course of study. There are many more areas of study beyond science necessary in order to adequately prepare the students for the teaching world (National Science Teacher’s Association, 2001). For example, at Towson University science education students must complete special education, psychology, communications, and information technology classes in addition to their core science and general education courses. These additional classes help to better prepare the candidates for what they might encounter in the professional world (www.towson.edu, 2001) Certification In the state of Maryland, there are many requirements to receive and hold certification to teach in the state. According to the Maryland State Teacher’s Association, candidates who wish to obtain certification must â€Å"possess an earned bachelor's degree or higher from a regionally accredited institution of higher education in a discipline appropriate to an assignment in the elementary or secondary school curriculum, receive an average of "B" or better in courses related to area of assignment, submit qualifying scores on teacher certification tests- Praxis I and II (Basic Skills and Content tests only), and complete 135 clock hours of study prior to employment as a resident teacher.† Basically, this means that the candidate must attend a four-year school and graduate with a degree. They have to get a B or better in their science and education courses, pass both Praxis exams, and complete one semester of student teaching.

Monday, September 16, 2019

Food waste Essay

FOOD WASTE Fresh vegetables, ready-to-cook meals, and cheap meat is what a modern consumer’s supposed grocery list comprises of! Dump it all into your fridge full of deals, discount offers and feel happy. This is how the shop keeper gets a loyal customer. At the end o the story, it’s the food industry’s creed that the customer is always right†¦.. If food became it s own pungent country, it would be the world’s third biggest contributor to climatic changes. According to United Nations Food and Agriculture Organization, one-third of the world’s total food is wasted around the world, literally to fork direct from the farm. In West, most of the food waste occurs because usually the leftover ingredients are tossed out. The major reason for food wastage is that the harvest of a farmer does not meet the retailer’s specific demand. Considering tomatoes, if too small or even too big to be sold to retailer will be left to rot in fields. Whilst, in developing countries the scenario is a little different because the food rots between fields and markets due to shortage of storage capacity. Awareness campaigns regarding food waste have already begun in the Western part of the world. Organizations are educating people about the waste of food at household level and how can it be eliminated or reduced to an extent. This is just the bit of the whole chunk. Even supermarkets are playing their part by producing recipes to use leftover food and pamphlets to store your food in the best possible manner. Likewise, many grocery stores have initiated redistribution of unsold stocks and excess to charitable organizations. Looking at food waste in local context, Pakistan is also the culprit for this wastage in spite of the fact that underfeeding and food shortage are areas of serious concern. Although we produce adequate food for our nation but still the wastage level is at its peak. This is because of careless attitude of our state and our society’s love for excess food. When we talk about consumption of food, negligence by society also needs to be tackled. At social events as well as weddings, it is quite usual for people to pile up a mountain of food on their plates and eat just a portion of it as if this is the last time they  are eating food. Much is needed to done to store perishable items such as fruits and vegetables. State needs to look into this matter with utmost care and also to preserve grains by creating extra facility for storage purpose. On collective basis, way of thinking needs to be changed. It is not only unethical but also an act of being socially irresponsible to waste food when millions around the world sleep empty stomach. According to Tim Lang, professor at City University London, food waste is a symptom, not a problem. So to eradicate these symptom governments, non-governmental organizations like UN can discourage wasteful exercises by producers of the food, farmers, consumers and grocery stores. Food spoiling and wasting is causing physical destruction to mother earth. So let’s join hands to exterminate wastage of food for those who starve and are under privileged.

Sunday, September 15, 2019

Compare miss Havisham and Lady Macbeth Essay

?Compare the presentation of Lady Macbeth and Miss Havisham. Explore how Shakespeare and Dickens present them as disturbed women. Disturbed is a definition of someone who has emotional or mental problems; both Lady Macbeth and Miss Havisham are presented as disturbed characters in one way or another. These two leading women both have characteristics that were not stereotypical of woman at the time periods that the play and the novel were set in; making them immediately appear strange to the audience or reader of that time. Shakespeare and Dickens both present their leading women in very different ways; however some aspects of their characters show similarities. The play Macbeth was set in Elizabethan times, where there was a patriarchal society in which men were superior to women. Women were known by their husbands’ names and were seen more as their husbands’ property than their partners. Elizabethan women were treated badly and disobedience on their behalf was a crime against religion as the society of that time believed that women were made to serve men. However, it was also believed that women were incapable of having evil thoughts or committing devilish crimes. The character of Lady Macbeth goes entirely against the typical Elizabethan woman as she is portrayed as strong and controlling over her husband Macbeth, and is the one to persuade him to commit an act of regicide. This would be shocking to an Elizabethan audience as regicide was known as the worst possible thing you could do, as they believed that their monarchs were sent from God. Miss Havisham is also the opposite of what women in her society were like; she was a spinster. This meant she was seen as a failure as in Victorian times, a woman’s proper purpose was to suitably marry; it was what they were born for. In most of Charles Dickens’ novels, the spinsters and old maids who appear are usually mad, desiccated, boring or secluded. Miss Havisham in Great Expectations is an example, a woman who fell in love and was jilted on the day of her wedding. She lived for the rest of life in her wedding dress, with one shoe on, a wedding cake uneaten on the table, and the clock stopped at the time she found out that her husband-to-be had deserted her. In Shakespeare’s play Macbeth, Lady Macbeth is first introduced in Act 1 Scene 5. She is reading a letter from her husband, immediately the audience see her as a determined and power-hungry character. In her soliloquy she reveals that Macbeth ‘shalt be what thou art promised’ her ambition for her husband to be king and indeed perhaps for herself to be queen is evident here. Shakespeare’s use of the imperative ‘shalt’ displays her controlling nature, showing her strength and masculinity which would appear unusual to the audience of that time. Although at first Lady M/acbeth would seem to be a rather queer character, the audience would not immediately class her as disturbed. Miss Havisham, however, is portrayed as a disturbed character right from when we first meet her in Chapter 8. Dickens first describes Miss Havisham through Pips eyes as he first sets foot in Satis House. The way the house and the room in which Miss Havisham sits is described, ‘no glimpse of daylight was to be seen in it’ immediately lets the reader know that she is extremely disturbed’ the whole house is stopped, including the clocks at the exact time she turned into a spinster. The idea of showing Miss Havisham first through Pip, allows the reader to see what is wrong, however, not fully understand why this is. Miss Havisham appears to be a much weaker character when she is first introduced as Pip describes her as ‘a skeleton in the ashes of a rich dress’. Dickens use of death imagery gives the reader an impression that Miss Havisham’s life is already over and she is just waiting to die. This makes the reader feel somewhat sorry for her at first and wonder why she is living in such a way. Although it is soon evident that Miss Havisham is not as weak as she first appears when she speaks to Pip for the first time; ‘â€Å"Come nearer; let me look at you. Come close. †Ã¢â‚¬â„¢ Dickens also uses imperatives in Miss Havisham’s speech ‘come’ showing that although regarded by all in that era as a failure she still has power to make others do whatever she wants. Both Lady Macbeth and Miss Havisham are both portrayed as evil characters throughout the play and the novel. Some people may argue that Miss Havisham is less evil as she does not murder anyone, however, she does ruin the lives of others, using Estella to break the hearts of men the way hers was once broken. Lady Macbeth does come across as more wicked than Miss Havisham most of the time however she might not be as evil and sinister as we are lead to believe. We realise this when she says ‘stop up the access and passage to remorse’. This shows the audience that maybe she does have some conscience because she knows she will feel guilty. However, another way to look at it is that she just wants to stop this from happening so that she can live happily as queen without guilt pulsing through her. This makes the reader think of her as a selfish woman who is used to getting exactly what she wants without any of the bad consequences that come along side it. The use of the modal verb ‘stop’ is strong and commanding and it doesn’t give the person she is talking to an option to say no. The idea of not being able to say no is repeated at the end of Act 1 Scene 5 where she tells Macbeth to ‘Leave all the rest to me’. Lady Macbeth is saying that no matter what anyone says no one will persuade her to change her mind about the murder of King Duncan. The language shows that she feels like she has the upper hand over Macbeth. Lady Macbeth uses her power to manipulate Macbeth into committing an act of regicide. Miss Havisham also manipulates people into doing things that they do not wish to do. She brings Estella up to get revenge on mankind and at the same time makes it impossible for Estella to love. Miss Havisham uses Pip for Estella to practice on and is delighted when Pip falls in love with her. ‘Well you can break his heart’ she tells Estella when she does not want to play cards with a ‘common labouring boy’. Miss Havisham says this in such a calm way that it seems to the reader that breaking someone’s heart is not a big deal to her, which it isn’t since she just wants revenge on all men. Although both of these women are ‘horribly cruel’ towards the end of the play and the novel they do realise what they have done wrong and feel guilty about it. Although the way they react to the guilt differs hugely. Miss Havisham becomes more normal with guilt and tries to put her wrongs right. ‘†Oh† she cried despairingly. â€Å"What have I done? What have I done? †Ã¢â‚¬â„¢ she becomes a weak, pitiable creature who begs Pip for forgiveness ‘on her knees and is desperate to do something ‘useful and good’ Her regret makes the reader feel sorry for her rather than blame her. Lady Macbeth becomes more and more disturbed with guilt, up until a point where she cannot take it anymore and commits suicide. Her grief must have been extremely bad for her to do this since she would know that she would be going to hell.

History and Memory Essay

To what extent has textual form shaped your understanding of history and memory? In your response, make detailed reference to your prescribed text and at least one  other related text. The textual form of the poetry of Denise Levertov and the recount Pure Torture by Tom Moe has shaped the reader’s understanding of history and memory to a great extent. While history is represented generally as objective, impersonal, factual and static, memory is represented as subjective, personal, fragmented and fluid. Techniques applied by the composers are consistent with forging these representations. A close examination of the texts indicates that history and memory are distinct concepts, but they are also two elements which work together in an interdependent relationship to make a record of truth. A close study of A Letter to Marek about a Photograph shows how history and memory are both distinct entities, but that they work together to create a more complete representation of the truth. The poem provides a representation of the house’s history as static and objective through the adjectives used to describe the physical building: â€Å"wooden angles† and â€Å"fretted gables†. However, the composer’s memory of the context of the home provides a place filled with anxiety and worry through the use of the pun in â€Å"fretted gables†, and the metaphor â€Å"ornaments turned on the lathe of humor and trust†. While the physical photograph records in a cumulation of adjectives the â€Å"carpentered, unpainted, aging house †¦ in some white ghetto†, Levertov’s memory records the emotional context of the inhabitants of the house in the personification of the building: â€Å"the brooding face of anxiety† and â€Å"waking and sleeping†. Thus, one’s understanding of history and memory as two distinct yet interdependent elements in recording the truth has been shaped to a great degree through a close reading of A Letter to Marek about a Photograph. Similarly, in A Time Past Levertov conveys the idea of history and memory being distinct but interrelated elements in recording the past. While Levertov records the â€Å"wooden steps to the front door where I was sitting that morning† as an historic event, she intertwines the memory with the physical history of the steps. Human experience is deeply involved in the history of these steps through the senses in the tactile, aural and visual imagery. She can â€Å"feel their splinters†, the â€Å"quiet broken by no bird, no cricket†, and â€Å"gold leaves spinning in silence†. The human experience of emotion – â€Å"joy† and â€Å"love† and â€Å"cheerful, unafraid† – are captured in the record of the past. Although the memories are fragmentary in nature, like the splinters, they ironically complete the history. This fragmentary quality is captured in the various anecdotes involving the â€Å"friend and her little son who died†, â€Å"of marriage, of my son†, and â€Å"sitting alone or with my husband†. Although some memories may be blurred or faded over time – â€Å"or was it the second son who lives and thrives? † – The memories themselves do not lose their importance. While the steps play a significant place in terms of events in Levertov’s history, it is the memories involved with the steps which complete the record of truth, thus further enhancing one’s understanding of the relationship between history and memory. In Thai Binh (Peace) Province refers to Levertov’s â€Å"film† of the Vietnam War, both a physical and mental record of a past event. Textual form is very important in conveying the difference between history and memory, thus shaping the reader’s understanding of the two concepts. The historical documentation includes the repetition of the plosives â€Å"bombed†. The cumulation nouns for buildings – â€Å"hospitals †¦ â€Å"schools †¦ silk-factory† – help to convey the utter devastation of the country. This is contrasted by Levertov’s mental retreat to selectively â€Å"photograph within [her] dark sails of the river boats, warm slant of afternoon light†¦ † with the use of adjectives such as â€Å"perched, relaxed†¦ to show her retreat towards â€Å"peace within the long war†. Levertov uses juxtaposition of the â€Å"child with its feet blown off† to the â€Å"boy†¦ relaxed on a quietly grazing buffalo† effectively to provide a more thorough, comprehensive and complete record of the historical event, rather than a biased view of the history. She alludes to the history with the humanistic nature of her memory to make it more comprehensive. Thus, it is clear that the textual form of Levertov’s poem greatly enhances one’s understanding of history and memory being two distinct, yet interrelated, elements. The textual form of Tom Moe’s Pure Torture shows a clear distinction between history and memory, while it presents the notion that history and memory are interconnected to produce a more complete representation of the truth of past events. The first-person recount presented in chronological order is consistent with a recording of an historic event. Moe presents the facts of his five-year incarceration as a prisoner of war during the Vietnam War. As a documented memory, it presents a history, but with the added dimension of his personal perspective that only memory can provide. Moe details the horrific nature of the event, thus personalising it through the use of graphic detail and emotion giving a more accurate representation of the truth. The memory has been recorded and published about 23 years after the events occurred. The graphic details of Tom Moe’s physical harm have been depicted in Pure Torture. He describes their skin which became â€Å"waterlogged, looking like pale cheese, a crumbling coat of slimy flesh†. The use of simile and metaphor emphasise the physical effects of the treatment, personalising and individualising the experience. The memory of how his body deteriorated similarly highlights the unique human experience: â€Å"you could stick your finger into me up to your knuckle and pull it out leaving a hole that would slowly fill with fluid,† and â€Å"I was shocked at how my body looked like a bag of chicken bones. † The composer’s intention is clear; he intends to shock and fill the reader’s mind with his memory, and he is very successful in building images so that the record of history is far more accurate and comprehensive. A close examination of the documentary film Dear America: Letters from Vietnam stands as evidence that the textual form of media recording history and memory are intertwined in such a way that they give a complete record of the truth of an event. The historical record of actual footage of a soldier who has lost his foot, graphically details the man’s pain when he is in the field: â€Å"I’ve been hit †¦ (screams) †¦ I’ve been hit!! † Later, while he is being attended to by doctors, he describes the physical pain, â€Å"It’s that sharp nerve pain †¦ urning †¦ burning †¦ I know there’s not much left. I thought the whole thing was going to come off. † The witness to the event states: â€Å"I’ve never seen such bravery and guts before †¦ You should have seen my brave men. It would give you goose pimples. † This contrasts significantly with the footage: the focus on physical pain is turned in to a focus on mental and emotional qualities. The letter writer is selective in what he wants remembered: his focus is on the courage and bravery of the soldier, rather than the pain associated with it. It appears that the trauma is too close to be passed on to members of his family, and he is selective in what he records as his memory and what he contributes to their memory of the war. The footage of the night patrols is frightening, with bombardment in a montage of explosions, gunfire and fires in the jungle. The aftermath of a night patrol is recorded by a soldier who is called in to identify a body. He writes to his family: â€Å"It’s going to be hard for me to write this, but maybe it will make me feel better †¦ there on the table was a boy †¦ is eyes were open. I couldn’t really identify him. They told me his name: Rankin. I cried. God, it can’t be. But after looking at his face again †¦ it was him. It hit me like a shot. This was the first body I ever saw †¦ it was too much. I went outside and cried. It started raining at noon today †¦ it rained so hard. † The letter writer has used his memory in a therapeutic way, much lik e Tom Moe did in Pure Torture and Levertov has done in much of her poetry. The metaphoric tears from heaven helps describe the emotional impact this event has had on the soldier. This letter shows how the event moves from historic footage of a physical event to an emotional human response in the aftermath of the event. Thus, it is clear that while the historic recording of an event may communicate the actual detail of the event, the human response to the event is vital in giving a comprehensive account of that event. It is clear from the close examination of Levertov’s poetry and Pure Torture and Dear America that the responder’s understanding of history and memory is influenced to a great extent by the textual form of the text. The representations of the objectivity and the impersonal, factual and static nature of historical record is complemented by the representations of the subjectivity and the personal, fragmented and fluid nature of memory. Techniques applied by the composers to create textual form are consistent with forging these representations. History and memory are distinct concepts, but they operate together in an interdependent relationship to make a more comprehensive and accurate record of truth of past events.

Saturday, September 14, 2019

Machete and Tron Review Essay

In this film Robert Rodriguez decided to pay tribute to B-movies of the 70’s and 80’s (the unsteady zooms, the clumsy edits, the continuity errors between shots), this is very apparent in the genre of the movie, exploitation films include excessive violence, gore, nudity and way too many corny lines. Art Direction wise the film also follows a 70’s 80’s kind of vibe, the cast also reminds us of that era. Costume design is amazing, all characters have a distinct very cartoony costume to them, the cheesiness doesn’t end here, the amount of weapons cannot be accounted for other than all the uzi’s minigun’s etc. etc. our main character can turn any household object, gardening tool or surgical instrument into a weapon of mass destruction! Special Effects are ABSURD (in the good way) what really stuck in my head is when our main Hero guts someone takes his intestines and jumps out a window using them as a rope! The Blood spurts and body parts cut off or crushed aren’t few either. Sound Effects have their parts of cheese; the most memorable one to me was when Torrez (played by Steven Seagal) pulls out his Samurai Sword (the effect is actually from the 1974 movie Six Million Dollar Man). Machete is a film that embodies all of the facets a 1970s blaxploitation film would have, but with the Hispanic culture. This is Mexploitation, with a resonant grindhouse feeling, complete with film reel scratches and fake political ads. But the violence and action in this is so extraordinary and unapologetically gruesome, with the extremity of it all not being taken seriously at all. The things they do in this film, guaranteed you haven’t seen most of them ever done before. Corkscrews, high-heels, weed-whackers, and, of course, machetes, are only a very small listing of all the tools and weapons used to dispatch characters in Machete. It’s over the top, absolutely ridiculous scenes that pop up every five minutes and make for a joyous film experience. There are too many be-headings, blood-splattering gunshots, and limb removals to count†¦. Don’t even get me started on the stabbings. The end Battle climaxes the gore, blood, and absurdity of the film. I’m going to get more in some of the Characters; Danny Trejo, the star of Machete, has a face that’s so rough, craggy, and etched with hard living that it’s like a natural rock formation. With a tattooed torso as thick as a refrigerator, and long oily black hair that frames his simmering coal-fire eyes, Trejo, like Mickey Rourke, is a freakishly hypnotic camera subject. Depending on which angle he’s shot from, he can look like the world’s toughest biker, a Native American shaman, or a very angry carp. As Machete (pronounced †ma-chet-ay†), Trejo is so badass he’s funny. Yet the movie, codirected by Robert Rodriguez and Ethan Maniquis, never treats him like a joke. When he slashes people with his machete, which he favors because he’s a true warrior (as opposed to the wimps who hide behind their guns), he’s an unholy ethnic avenger out of a ’70s walking-tall fantasy. Robert De Niro plays the role of Senator John McLaughlin; the character is your typical jackass Texas cowboy senator. Sartana Rivera is you basic torn cop that is realizing that some laws shouldn’t be enforced because they are just laws, Jessica Alba fits well in this role. In a side note her Nude shower scene was a fake she was digitally stripped naked, it was a decision she and Robert Rodriguez made together, which would serve his vision for the film, as well as honor her personal convictions regarding nudity. Torrez played by Steven Seagal , is a drug lord portrayed as if he thinks of himself as a Samurai, he even has his own Katana (the samurai Sword) Michelle Rodriguez plays the Role of Luz, at first she looks pretty normal but in the end scene she is reincarnated as the Mythical â€Å"SHE† leather pants, small top, eye patch and one hell of a Machine gun. Lindsay Lohan shines as April Booth, daughter of Michael Booth, she has 2 costumes in the hole film first one is, well, being Naked!!!! And the second is a full dressed Nun that surely comes with a Machine gun! Cheech Marin plays as Padre Cortez, your favored pastor; he uses 2 shotguns to blow off people’s heads off. Tron: Legacy Put together the old Tron with reminiscent Skintight suits with neon like lines that glow, new tech machinery called Light Runners, and some new and improved Light cycles(new gen Bikes)created out of sticks, think about the film score and music and you realize that it should be done by Daft Punk, I guess Kosinski realized this early on because when he was asked why he ecided to have Daft Punk do the film score, he replied, â€Å"How could you not at least go to those guys? †. The score is a mix of orchestral and electronic elements, this fits right on with the artistic feel of the movie. Daft Punk have created a sonic masterpiece worthy of the legacy of Tron. Their brilliant layering of ambient electronica with orchestral symphonics is every bit as avant garde in creating atmospheric digital soundscapes as Wendy Carlos’ score was for the origin al Tron. I only wish that they had incorporated some more of Wendy’s memorable themes. You can kind of hear a few familiar notes that recalls Tron’s theme in â€Å"Adagio For Tron† but that’s pretty much the only hat tip to Wendy’s vintage score. Like the film itself, Daft Punk have taken the music of Tron to a whole new aesthetic level by incorporating their unique style of techno synthpop along with their influences of electronic film composers like Vangelis on â€Å"Arrival† to the ominous Carpenter-esque â€Å"C. L. U. † and synthesizing them with traditional orchestral composers like Bernard Hermann and Max Steiner. â€Å"The Grid† is the only track with any words put to the music. With Jeff Bridges providing a voiceover for the first half of the track, the song acts as an introduction for anyone who may have missed the first film. As â€Å"The Grid† fades out and â€Å"The Son Of Flynn† opens with an arpeggiated synthesizer, listeners get their first taste of Daft Punks blend between their own unique sound and classical music. Although the majority of the tracks on â€Å"Tron: Legacy† utilize an excellent balance between the two styles, some of the tracks sway one way or the other, drastically changing the mood of the piece. Tracks like â€Å"The Game Has Changed† offer an almost exclusively classical instrumentation while transforming the percussion section into a series of powerful electronic hits, rattling the eardrums and taking focus off of the ominous strings hidden beneath. Although the London Philharmonic Orchestra provides all of the string arrangements, their true feature comes on â€Å"Adagio for Tron. † Sounding a bit like Hans Zimmer’s â€Å"Hummel Gets the Rockets† from the soundtrack for â€Å"The Rock,† Thomas Bangalter and Guy-Manuel de Homem-Christo of Daft Punk use his track as a means of showing off their prowess with orchestration, complete with a simple, yet beautiful cello solo. As the mood darkens, the music dives deeper into the electronic realm while still maintaining at least some aspects of a symphonic orchestra. Tracks like â€Å"End of Line† pull entirely from the electronic realm except for a sustained string part which would typica lly get lost in a Daft Punk mix, but because of their extraordinary presence on the rest of the album, they remain surprisingly noticeable.

Friday, September 13, 2019

Existentialism Essay Example | Topics and Well Written Essays - 500 words - 4

Existentialism - Essay Example The author reiterates that the American culture and authenticity has been developed by religious origins. Religion is considered to be the most outstanding approach to the American authenticity culture, as many of the philosophers have observed. For instance, some American philosophers have initiated their activities in the American history, claiming that they have been heeded by a â€Å"higher calling.† In light of this statement, re-known religious Dr. Phil states that he works and initiates activities if he feels they are logical (Guignon, 6). If he does not feel the logic behind these activities, then there is no need to attend to such. In seconding the religious inductions in authenticity, the author states that Oprah is a re-known American, who is guided by religion in his endeavors. She states that she has the church within herself. This substantiates the bearing of authenticity as strong religion, which makes people successfully attend to their endeavors. In answering the question, what kind of life is the one most worth living, being authentic is one of the best given answers by the author. However, the other point ion answering such a question is Simply acting to fully fulfill a persons social and religious duties. In making this a better approach to living, ones religious experience needed to generate utter sincerity. This could only be achieved by a person having fully admitted his or her introspection.   With such situations in the developing world, it is considered that the developing world has indeed changed the original; view of authenticity (Guignon, 8). Therefore, to get a better view of defining a person’s authenticity and how he or she is living, Personal ambition and agendas are to be given a concrete definition. This is by banking on what a person is determined to gained, given the highest scale of attainment. Given all this freedom, it was considered a hard task to fully

Thursday, September 12, 2019

Antitrust Law Case Essay Example | Topics and Well Written Essays - 750 words

Antitrust Law Case - Essay Example The antitrust laws are enforced by the public and private sectors. The United States department of justice antitrust division and the federal trade commission divide the responsibility for investigating and litigating cases under the Sherman act, and they also consider potentially anticompetitive merges under the Clayton act. In the private sector, any person that is injured in his business or property by a violation of antitrust laws is at liberty to bring an action in court. A prevailing plaintiff is entitled to recover treble damages, costs of suits and also attorney’s fee. The private parties are sanctioned to obtain injunctive help to prevent threatened damages or losses. Most antitrust lawsuits are mostly by private litigants in search of damages for breach of federal and state antitrust laws. The Sherman act is not explicit about the prohibited conduct. On the Other hand, the Clayton act is a bit particular about activities that may be illegal. However, only when such c onduct substantially lessens competition or leads to the creation of monopoly in any line of commerce neither of any that it is defined in the status. The selling gasoline for less than cost violates the act because, Section 1 of the Sherman act contracts, partnership or conspiracies in restraint of trade, prohibits every contract, combination, in the form of trust or otherwise or conspiracy in restraint of trade or commerce among the several states or with foreign nations. A restraint of trade can be defined as an agreement between two or more individuals or entities that affect the process of competition. On the other hand, under this approach also contracts for the purchase and sale of a single

Wednesday, September 11, 2019

High school students Essay Example | Topics and Well Written Essays - 250 words

High school students - Essay Example It may be that they want nothing to do with the language that they have learned. The key is that having learned another language looks impressive on any CV because it will show potential employers that you can work outside of your comfort side. Additionally, high school students should be required to learn a foreign language because it will improve their grades on other subjects too. Learning another language requires much brain power, and this extra effort can help develop a work ethic that benefits other subjects as well. Finally, high school students can gain self-confidence by learning a foreign language. Mastering any foreign language requires hours of dedication, so finally being able to converse in it can give any student great confidence for them to take forward. The importance of learning a foreign language cannot be denied. What better way to start than by making high school students study at least one foreign language for at least two years? High school students should be made to learn another language because it can look good to potential employers, improve other school aspects, and make them feel like they have achieved something of

Tuesday, September 10, 2019

The business law Essay Example | Topics and Well Written Essays - 1750 words

The business law - Essay Example However, there are certain norms and formalities to be followed with respect to the grant of loan to CPI since as per law, the company and its principle shareholder are distinct entitites. Hence, in the eyes of law, the shareholder Luigi Gelata and the loaner Company, ICCI are two distinct entities. If the event of LG acting on a personal capacity with regard to matters that effect the company, it is necessary that he seek the permission of the Board of Directors and seek their consent in such matters, especially in the case of granting, or receiving loans, or other matters which affect the company as a whole. ICCI should authorize the grant of Shareholder Loan to CPI. Next, the Shareholder Loan Document has to be duly authenticated in a Board Meeting duly convened, minuted and signed by the Board of Directors of the lending Company, ICCI. Further, the Board of Directors should ratify Luigi Gelati's authority to disburse the loan. The terms governing the granting of loan should be clearly specified in the document, including the interest rates (if any), mode, term and value of repayment or amortization scheduling and whether the loan is repayable on demand or is for a specified period. The conditionalities to be imposed in the event of default of the loanee, that is, in the event of inability on the part of CPI to service the interest or principal amount should be clearly specified in the Shareholder Loan Document. It is advisable... judicious to have the loan document witnessed and notarized since this is an accepted practice used by Banks and Registry, should such a need arise for the loaner Company, ICCI, to utilize their services in future. (Shareholder Loan Agreements. 2008). In the second part the main facts that need to be considered are as follows: Issue 1: Whether ICCI could lay priority to claim goods over bank and employees Law: The unpaid seller has the highest priority to lay claim over the goods over other creditors in the event of goods being sold and delivered to the bankrupt debtor. However, the following conditions apply: Debtors must have be unable to pay for the full price of the goods bought. Next, the seller has claimed return of the goods within 30 days of delivery to the buyer, but this has not been done by the buyer. The debtor has been rendered bankrupt or a receiver has been appointed, as is evident in this case. Further, the goods are still in the same state, condition and possession of the buyer and finally, the goods are identifiable as belonging to the debtor. Application: It is seen that in this case the following aspects are applicable, except whether the claim for return had been served to MMRI (unclear) Issue 2: Could the Bank claim a security interest in the goods: Law: Order of priorities on bankruptcy: unpaid seller, PMSI secured creditor, other secured creditor, preferred creditors (including employees for up to 6 months wages (max. $2,000), other unsecured creditors. In this case bank could lay claim of being a secured creditor after the claim of ICCI, and to the extent of balance unpaid amounts, the bank would be treated as an unsecured creditor. Application: Since ICCI are 1st preferential creditors, it ranks over the secured and unsecured

Monday, September 9, 2019

Case study analysis for The Garden of Freshness (from logistics point

Analysis for The Garden of Freshness (from logistics point of view) - Case Study Example However, recent instances of customers complaining of stock-outs of specific fruits and vegetables and lack of fresh products have caught the attention of management and the owners of this family business. Garden of Freshness was established as a fruits, grocery, deli and bakery company with special attention on quality and availability of fresh products every time. Very soon the company opened up two more stores with 120 employees currently working for it. While the supplies department is looked after by Marc Pineault, the administration is in the hands of his brother- Sylvain Pineault. There are managers for each store who directly report to the supervisor and every store has two kinds of employees- production employees for logistics functions of loading and unloading the trucks and frontline employees to assist and advice the customers. Currently, Marc Pineault is facing serious nightmares on the issue of shortage of perishable products every afternoon and also the quality proposition which is their unique selling proposition. Most of the vegetables and other products do not remain fresh after the second partial delivery is made to the stores, thereby leaving the customers dissatisfied. Going through the facts of the case reveal the following issues and challenges: Superficially, the issues faced by Marc Pineault seem of operational level but an in-depth analysis of the entire scenario reveals some major strategic loopholes. Shortcomings in the strategic and operational planning of Garden of Freshness are: Strategically, the business has expanded but arrangements to sustain the growth have not been accounted for. The selection of suppliers is the biggest loophole which is damaging the logistics of the business. Every evening the purchasers visit the Central market and every single supplier to assess the price and quality. This is in fact very time consuming and

Sunday, September 8, 2019

Research crique Essay Example | Topics and Well Written Essays - 750 words

Research crique - Essay Example The authors used a specific model so that they could gain a concrete idea of what teams looked like and how they were executed in the hospitals. Problem Statement Clinical and Research Problem Nursing teamwork has become increasingly important in hospitals because they are on the first line of assistance to patients. The need for nurses working together was seen in many areas of the hospital. For example, the authors state that most studies were done with surgical and emergency room nurses, but research on teams has not been seen with acute care facilities. The authors felt that there needed to be a specific understanding of teamwork so that nurses would be encouraged to work together because teamwork is critical to patient safety. The authors point out that hospitals still are unsure of what teamwork in nursing should look like and how it should be executed. The authors state that, â€Å"Lack of clarity about the teamwork processes underlying nursing teamwork hinders the developmen t of targeted, effective quality enhancement and patient safety initiatives† (p. 298). If teamwork is understood and there is a model that can be used to help hospitals be more effective, patient care will be enhanced, according to this study. The gap in the knowledge is that the research before this study has concentrated on surgical and emergency teams for teamwork; this study fills the gap for study of acute care. Significance of the Study The significance of this study lies in patient care initiatives. Kalisch et al. (2009) state that nurses who work totally on their own are prone to make errors with patients. As an example, nurses who work 12.5-hour shifts are prone to make at least 5% of their regular shifts and nurses working 8-12 hours often make 2% errors on their shifts. They also state that 70% of sentinel events happen because of miscommunication between staff members. The authors substantiate the significance of the study by providing these statistics and the read er finds that this is a very important aspect of any hospital. It seems that teamwork strengthens patient care. Purpose and Research Questions The purpose of this study was to measure teamwork effectiveness through the use of focus groups and the Salas conceptual framework of teamwork. The used this framework because it offered a behavioral component that they felt hospital personal could understand. The researchers do not state a specific aim but this was the major thrust of their work. There were no specific questions asked, but it seemed that, What constitutes a team? Was the question they were attempting to answer. They actually asked this question and then provided different studies that described how other researchers defined teamwork. The research question was definitely related the problem because the authors are defining teams. I think that the qualitative method was appropriate to this study because teams begin with people understanding what a team is and whether it is eff ective or not. It would seem that this question would need to be answered by talking to people about their experiences. Literature Review The authors used qualitative and quantitative studies, books, and government reports (Joint Commission). The references that were used spanned between the years 1994 and 2009. Most of them were between 1994 and 2002. I would not think that this was accurate information since most of the references were older than five years. The

Saturday, September 7, 2019

Community Communication Essay Example | Topics and Well Written Essays - 1000 words

Community Communication - Essay Example He wondered such, because of the diffusion of cities created due to the stage of industrial revolution and unsettled west. Another scholar that set out to find the relation between community and communication was Gabriel Tarde in the 1980s. According to him, public opinion is a means of collective community which is controlled and arranged by the media (Katz, 1991). Furthering the previous thought, Bowes (1997) confirms that this relationship further gained strength in the 1920s and thus has now become indivisible. According to this study, for a collective action, communication between citizens and individuals is an important function for initiating a combined action, with the collective action being stimulated and expressed through the media. Of course, when it comes to finding the relation between these two variables, it is obvious to understand the definition of community. According to Hillary (1955), community can be explained in 94 ways. However, three essential components can b e found in the explanation of this variable. Beginning with a person involved in a specific community contact, the author mentioned geographic area as the second component with the common ties completing the collection. Bracht (1990) also revolves around the same concept of community. According to this study, a community can be explained as a cluster of individuals that share the same ethics, ideals and institutions. Further adding to the definitions, the author explained interpersonal relationships, culture and social groups as the interdependent basic components. Therefore, the above mentioned components work collectively towards a common good. This means that these components are a food for the community that are intellectual and conscious in nature and is thus a highly necessary requirement Dewey (1946). Bell and Newby (1971) added more to the definition and stated that communities have nowadays adopted a virtual nature. According to this study, the idea of a physical space has currently adopted a less physical approach of communication. Nonetheless, the relation between community and communication remains intact. Where traditionally the use of broadcast and print media was at its peak, the introduction of the computer based era and the enhancement of development and interactive media have positively worked towards eliminating the geographical constraints in communication. The virtual temperament of the media used two basic tools; the internet and direct broadcast satellites. Therefore, it becomes imperative to mention at this stage that after adopting the virtual mode, the communication media not simply aid the traditional community, rather it aids to the change in the entire definition of it (Bowes, 1997). According to Berrigan (May 1979), there is always the risk of importance in considering communication. That is, it is the author’s firm belief that although communication media is an effective tool in affecting the community, the role of the med ia is highly exaggerated. The study also stated that the media revolves around precedence in its importance. For the role of communication to be effective, it must be understood that it can never work alone. The media, in spite of its role in not the only factor that can bring changes to the community, the organizational, social and political structures also play a vital role that need to be identified. As the international communication association (May 2012) states; as our perceptions regarding the organizational, personal and social communities are undergoing massive changes, the boundaries and peripheries are becoming

Friday, September 6, 2019

The relationship between Frequency and phase- shift in Butterworth filters Essay Example for Free

The relationship between Frequency and phase- shift in Butterworth filters Essay The phase characteristic of Butterworth filters varies with the particular frequency in the passband and also with the ratio of cut-off frequency to sampling frequency. The cut off frequency occurs at the point where the phase shift is half its maximum value. The frequency of the Butterworth filters is often flat (they have no ripples). Therefore the Butterworth has a linear phase characteristic. The function of their magnitude has monotonic changes contrary to other filters which have non-monotonic ripples (Daryanani, 1976). The Butterworth filters have rolls off slowly and thus a particular specification of stopband needs higher order to be implemented. This is because the gain is high at higher frequency and lower at low frequency. Similarly the group delay increases with decrease in frequency. All filter options of the same order has the same phase shift. 2. How this relationship affect the waveform of a complex signal with multiple frequency components sent through it. The waveform of any complex signal that passes through a Butterworth filter shows no ripple although it rolls off at a slower rate around the cut off frequency. Lack of ripples in the Butterworth filter enables it to have a linear phase characteristic. Any signal passing through Butterworth filters experiences slight distortion but not as extensive as it occurs in Chebyshev filters and Elliptic filters. The phase of the signal is inverted in the case of multiple frequency components. The damping ratio of Butterworth filters is approximately 1. 1414 which produces a flat response (Thomas, 1971). Questions 1. The purpose of the LPF in the demodulator . and its bandwidth Low pass filter in the demodulator is meant to suppress the subcarrier frequencies which are contained in the FM stereo of the demodulation signal. In other words, it filters out carrier frequencies Thus the resulting magnetic distortion doesn’t affect the output signal. The bandwidth of the low pass filter is determined by the number of signal sampled that need to be filtered at a given speed (the sampling frequency). The LPF also helps in preventing deterioration in the sound quality (Graeme, 1971). 2. How to calculate the bit clock of the demodulator from the carrier frequency? The bit rate of the clock is a sub multiple of carrier frequency. This means that the bit clock frequency depends on the number of channels multiplied by the number of bits per channel ((Thomas, 1971). For instance if the CD audio has a carrier frequency of 44. 1Hz, with 32 bits per(2) stereo channel, then the bit clock frequency will be given by carrier frequency divide by the channels times the number of bits 44. 1/ (32/2) = 2. 8224 MHz Eye Diagram 1. Snapshot method allows multiplexing up to ten single nucleotide polymorphisms. It is primer extension based multiplex system. It compares every single incoming bit to the threshold voltage and judges whether it is a zero or one. Therefore, snapshot method can put exact decision on time and voltage of every signal. However, the eye diagram is used for high speed serial interfaces. Snapshot method is also used to measures the intuitive performance of the links (at instant time) whereas the eye diagram takes substantial time to give the link performance. It makes the correct decision on whether the incoming signal is one or zero. The eye diagram requires massive knowledge in algorithms to analyze and it takes quiet along time for acquisition. Snapshot method, on the other hand gives the performance at instant time and it is easy to analyze (Graeme, 1971). 2. The effects of differing forms of interference on the signal Interferences render the wireless systems completely unusable. The three major forms of interferences include the intermodulation, radio frequency interference, and electrical interference. The intermodulation interference occurs due to the merging of strong radio signals in a wireless network while electrical interference is caused by digital equipments and lighting system. The radio frequency interference is caused by communication equipment. It is essential to know which type of interference has occurred so as to avoid unnecessary and unproductive solutions (Daryanani, 1976). References: Daryanani, G. (. 1976). Principles of Active Network Synthesis and Design. J. Wiley Sons. Thomas, L. C. (1971). A Multipurpose Active Filtering System. † Newnes: Elsevier Graeme, J. et al. (1971). Operational Amplifiers Design and Applications. New York: McGraw-Hill. 1971.