Wednesday, November 27, 2019

Geography Of Japan Essays - Japanese Archipelago, Hokkaido

Geography of Japan Geography of Japan Perhaps more than any other nation in the world, Japan is shaped by its geography to a tremendous extent. Technically classified as an archipelago, Japan is a curved chain of four islands (Hokkaido, Honshu, Shikoku, and Kyushu, plus over a thousand smaller islands). However, it is first and foremost an island nation, a fact which isolated Japan from the rest of the world. The second largest influence in Japanese geography is the size of the nation. The total area of Japan proper is a little under 143 thousand square miles; the contiguous United States spreads across just over 3 million. To say that Japan is crowded with its 130 million people would be an understatement. But add that to the fact that seventy-five percent of the nation is hilly or mountainous, and the wide open spaces for living and working are even more crammed. The mountainous terrain, lack of lowlands and plains all have had far-reaching consequences on the development of Japan and its people. No study of them is accurate without a study of Japan's geography. Before Japan was unified, many different clans held power over different parts of the islands. Centralizing power proved difficult because of the physical disunion. Once a nation, though, Japan's island geography kept Japan isolated from even its closest neighbor, Korea. Being a group of islands was the main reason Japan could maintain its isolationist ways until just a century ago. It was also the main reason for a strong maritime outlook in the Japanese. It has over 17 thousand miles of coastline, which means almost all the centers of population (lowlands) have sea frontage. The term "center of population" isn't fair to the "non-centers" of population. Except in the northern island of Hokkaido, all parts of Japan are still crammed with over 300 persons per square mile. The centers have population densities of over 512 persons per square mile. The seventh most populous nation in the world lives in an area smaller than the state of Montana. This circumstance fed Japanese expansionism in the early twentieth century, and is now a daily challenge for the Japanese people and leaders as they deal with an ever-shrinking space dilemma. Nowhere is the dilemma more dramatically playing out than in the big cities. Japan's six largest cities were built in its only two major plains. There are simply no more suitable flatlands to build additional cities. The rest of Japan is cast with high mountains with considerable volcanic activity. Earthquakes, then, have become a commonplace occurrence in the daily life of many Japanese. In 1981, only 14.6 percent of Japan was arable. Rice, Japan's most important food crop for centuries, is intensively cultivated on terraced hillsides because there are not enough flat paddy fields to feed the whole nation. A hard-working Japanese peasantry has resulted from the agricultural challenges.

Sunday, November 24, 2019

Free Essays on Aggression As A Concept

Aggression is a social behavior that differs throughout cultures and society. Aggression is also a trend that occurs in nature’s wildlife. Some animals are more aggressive than others. For example, lions can and will attack almost any other animal for its prey. This is very different behavior from a giraffe that can barely defend itself while feeding on a nearby tree. Some societies seem to have more aggressive behavior than others. Germany, when under the influence of Hitler, had a very high death rate among its Jewish population, which devastated many families. Aggression can also be a biological trend through a family’s genes and DNA. Researchers have tried to link aggression to heredity and hormones. Many structures in the brain have been found to be very significant in studying aggression within families. A high level of the hormone, testosterone, has also been linked to aggressive behavior. These are very interesting aspects of aggression, but this essa y will mainly focus on aggression as a product of social learning. The social learning theory explains that aggression is likely to be learned by watching others who have an aggressive nature in their actions, which is very dangerous. Violence is usually a result when dealing with aggression among society. In Sdorow’s Psychology textbook, he states that researchers have found women to be more aggressive after watching their parents act aggressively. A study conducted by Albert Bandura showed that children acted aggressively towards a â€Å"Bobo doll† after seeing an adult hitting the doll several times. The behaviors towards the doll were very different than those of children who did not observe any aggression towards Bobo. Children are also more likely to show aggression towards other children after watching a violent show on television. Many cultures and countries other than the United States show aggression in their society. Rome used to hold gladiator e... Free Essays on Aggression As A Concept Free Essays on Aggression As A Concept Aggression is a social behavior that differs throughout cultures and society. Aggression is also a trend that occurs in nature’s wildlife. Some animals are more aggressive than others. For example, lions can and will attack almost any other animal for its prey. This is very different behavior from a giraffe that can barely defend itself while feeding on a nearby tree. Some societies seem to have more aggressive behavior than others. Germany, when under the influence of Hitler, had a very high death rate among its Jewish population, which devastated many families. Aggression can also be a biological trend through a family’s genes and DNA. Researchers have tried to link aggression to heredity and hormones. Many structures in the brain have been found to be very significant in studying aggression within families. A high level of the hormone, testosterone, has also been linked to aggressive behavior. These are very interesting aspects of aggression, but this essa y will mainly focus on aggression as a product of social learning. The social learning theory explains that aggression is likely to be learned by watching others who have an aggressive nature in their actions, which is very dangerous. Violence is usually a result when dealing with aggression among society. In Sdorow’s Psychology textbook, he states that researchers have found women to be more aggressive after watching their parents act aggressively. A study conducted by Albert Bandura showed that children acted aggressively towards a â€Å"Bobo doll† after seeing an adult hitting the doll several times. The behaviors towards the doll were very different than those of children who did not observe any aggression towards Bobo. Children are also more likely to show aggression towards other children after watching a violent show on television. Many cultures and countries other than the United States show aggression in their society. Rome used to hold gladiator e...

Thursday, November 21, 2019

Evaluation and Judgment using Internal and External Evidences Essay

Evaluation and Judgment using Internal and External Evidences - Essay Example The evidence based decision making process can also be applied in other clinical processes especially by clinical experts towards improving the output services provided to the patients and also to improve relevant policy making processes that are effected by national and local government legislators in conjunction with health administrators (Wolberg, 1995). Nonetheless, the evidence based decision making process to addressed in this essay are those that involve patient diagnostic health concerns towards improving then health status of the involved patient. In the evidence based evaluation of the medical conditions of a patient, the doctor or involved practitioner is required to adopt both internal and external evidence based examinations. The internal evidence are usually based on the knowledge acquired from formal education experiences and trainings with accumulated practice experience obtained from daily practices and or specific experience individually gained from clinical patient relationship (Wolberg, 1995). In other words, the internal experiences in any practice or profession are those experience gained from educational and work backgrounds. On the other hand, external evidences are the knowledge acquired through extensive research on a particular field of interest. Nonetheless, both internal and external evidences should be examined critically towards evaluating patients’ medical conditions none of which quality medication may be difficult to come by from such evaluations (Wolberg, 1995). Additionally, determination and application of relevant methods of evaluation is vital towards effective judgment. All the issues affecting a patient must be examined closely from multiple sources. It is worth noting effective evidence based decision making in the medical practice can only be achieved through sound application of both internal and external evidence based decisions. In examining patients, the only sure ways of determining their medical conditions may be either asking questions or conducting diagnostic tests on them. The interviews aimed at determining medical conditions are usually structured and aim at determining health problems that the patient is undergoing. Notably, only with internal evidence that a doctor or involved practitioners can related to the answers provided by the patient to the actual medical condition the patient; otherwise, wrong decisions that may further affect the patient’s medical condition may emerge from such evidence based evaluations. Additionally, from the same interviews, the involved medical practitioner may use the information provided by the patient through answering questions and link them such answers with internal evidence and arrive at an amicable medical report (Wolberg, 1995). Medical conditions of similar characteristics usually related to nearly the same medical condition. However, if the doctor or the involved medical practitioner has some slightest doubt, he or she may embark on additional examination to ascertain his or her doubts. In essence, in the evidence based examinations, doctors among other medical practitioners must find the finest and relevant as well as accurate information towards arriving at the conclusive judgments. The other sure way of ascertaining t he medical conditions or evidences that are provided by the patient in an interview is conducting medical testing (Wolberg, 1995). Medical testing also requires interval evidence practice experience; otherwise, wrong result may be reported from the test. Therefore, doctors among

Wednesday, November 20, 2019

Safe use of Health Information Technology Research Paper

Safe use of Health Information Technology - Research Paper Example Poor workflow and inefficient communication inevitably create more health IT sentinel events. Although communication and workflow are vital, the clinical content must also be well-structured to enable effective communication (The Joint Commission, 2015). For example, health records managers must be supplied with relevant and cogent information because they enter clinical data into systems on an as-is basis. Wrong or illegible data creates problems during retrieval. The success of any health IT framework also depends on internal organizational policies, procedures and cultures. These three aspects should be congruent with the overall objectives of the health IT system. Some cultures, policies and procedures hinder the efficient operation of the system, leading to health sentinel IT situations (Johnson, 2014). The level of training received by health staff determines their effectiveness in their duties. However, training is merely a means to an end. Employees should be taught to follow set policies and procedures or their training will be futile. The type of hardware and software used in a specific health IT framework determines the frequency with which sentinel events occur. To this effect, hardware and software must be relevant, usable, and adaptable (The Joint Commission, 2015). External factors, including vendor and other issues occurring in the external environment can also cause a health sentinel IT event. In some cases, legal and social challenges (e.g., culture) can increase the number of health sentinel IT situations (Balgrosky, 2014). Research shows that regular system appraisal and monitoring significantly reduces the probability of critical situations

Sunday, November 17, 2019

Religious Influence on Japanese Art Term Paper Example | Topics and Well Written Essays - 1500 words

Religious Influence on Japanese Art - Term Paper Example Japanese art spans a wide range of media and styles including ancient pottery, wood and bronze sculptures, silk and paper calligraphy, ink painting and performing arts (Nobutaka 52). Japan has historically been subjected to invasions by new and alien cultures, ideas and religions. As the Japanese assimilated and imitated the foreign cultural and religious elements, their forms of art also took a shape influenced by the changes (Tsutsui 104). Although a majority of Japanese people are not exclusively identified as adherents of a certain religion, the strongest indigenous religion is Shinto (Sokyo 89). Buddhism and Confucianism strongly influenced prehistoric Japanese art. It was a representation of nature in a spiritual perspective unlike the secular perspective of scientific realism (Abe 64). Shinto, a form of nature worship has existed from ancient Japan (Sokyo 89). It means the way of the gods. A kami is a Shinto deity (Sokyo 90). Through Shintoism, the Japanese worshipped spirits thought to inhabit in natural phenomena like waterfalls, rocks and mountains. The kami were not initially represented symbolically, but rather, their perceived habitats were demarcated. However, with the adoption of the developed Buddhism and Confucianism styles of art, the Japanese people were prompted to introduce art into Shintoism, creating Shinto sculptures and paintings (Sokyo 101). They also created artifacts used in worship that symbolized kami. These were mostly in the form of protective items and amulets. The protective items and amulets used in the ancient Shinto religion were also a form of art (Sokyo 101). They used small wooden plaques called Ema to write and draw pictures of their wishes and placed them in shrine grounds for the wishes to be fulfilled by the deities (Abe 55). Of uda were religious talismans curved out of wood or formed from paper and metal, with names of kami inscribed on them for delivery of good luck. Paper modeling may also be traced back to daruma, which are paper doll representations of Bodhidharma, an Indian monk (Sokyo 101). The Shinto faithful used them to forward wishes to the kami. Another form of paper modeling is the inuhariko, a paper dog used to pray for good births. The Shinto also molded earthenware bells in the form of zodiacal animals called dorei, for use in prayers for good fortune. In Shinto architecture, the earliest shrines constructed to house ancestral spirits are a suggestion of the outline of single dwelling homes in ancient Japan. Similar to the ancient Japanese domestic homes, the shrines were entirely wooden (Sokyo 102). Japan’s relationship with Korea and China paved the way for the infiltration of artistic techniques and styles (Tsutsui 111). As Buddhism moved from Korea to Japan with it came artistic influences such as Buddhist texts, architecture and icons (Sugimoto 230). Art and craft specialists also migrated to Japan from China and Korea and participated in creating the new arts. With the introduction of Buddhism in the mid 6th century, Buddhist temples and Shinto shrines began to incorporate the same architectural designs. The structure of the Shinto shrines got more elaborate under the Chinese and Korean influence (Sugimoto 230). Since shrines also reflected family dignity, the designs were commissioned by noble families and many more structures were built in Nara and Kyoto cities (Sugimoto 231). Buddhist art in Japan is categorized into periods or eras. It shaped Japanese art from the 6th to the 16th century (Tsutsui 109). The Amida sect of Buddhism laid the foundation of Buddhist art in Japan. Prince Shotoku encouraged Buddhist art in the Suiko period while Emperor Shomu encouraged it in the Nara period of 645 to 784. In these eras, indigenous Shinto arts were taking the shapes of Buddhist arts and architecture, and the demand for Buddhist paintings increased among the wealthy Japanese

Friday, November 15, 2019

Abraham Lincolns Second Inaugural Address

Abraham Lincolns Second Inaugural Address Abraham Lincoln and His â€Å"Second Inaugural Address† Delivered March 4, 1864 Though delivered almost 150 years ago, Abraham Lincoln’s (1809-1865) second inaugural address continues today to be an exemplary model of leadership, demonstrating its abilities in political unification, cues to nation-building, goals of social progression, and most importantly, its expression of the importance of national reconciliation. Given at a time when a young American country was still reeling from the Civil War, Lincoln’s address not only reaffirmed the Union’s justification for fighting against Confederate secession and insurgency, but also extended a hand to the formerly rebellious states that found themselves structurally and economically debilitated by the end of the war. A work of oratory mastery, Lincoln’s content was not nearly as important as the address’ literary devices such as assonance, alliteration, and diction. Then-president Lincoln’s style and delivery prove that today’s politicians and leadership stand much to gain from the model presented at Lincoln’s Second Inaugural Address. The beginning of Lincoln’s final term saw a distressed nation left economically and structurally ravaged. Costing the lives of more Americans than any war in its short history, the Civil War was the product of a social, economic, and political rift between the Northern Union and the insurgent Southern Confederacy of secessionist states. Lincoln’s Second Inaugural Address therefore had to satisfy several requisites. The speech had to take special care to give praise where due to the Northern Union army and its loyal population without alienating the defeated South, still reeling from the economic blow dealt to its agrarian majority by the abolition of slavery. In order to maintain this delicate balance, â€Å"Lincoln began the shift in content and tone that would give† the second inaugural address â€Å"its singular meaning,† inclusive to both North and South (White 61). In his Lincoln’s Greatest Speech: The Second Inaugural, Ronald C. White makes no te of Lincoln’s â€Å"masterful understanding and use of both imagery and distinctive phrase,† tools that America’s sixteenth president would use as part of an â€Å"overarching strategy† emphasizing â€Å"common actions and emotions† (White 61). George Rable stressed the importance of non-political language in Lincoln’s address in his The Confederate Republic: A Revolution against Politics, as the Southern population was infamously apolitical in its views and practices. Lincoln’s diction therefore had to be deliberately neutral in diction and content so as not to highlight the existing tension between North and South, the major differences manifested in the stereotypes of the prototypical agrarian Southerner and politicized, industrial Northerner. Lincoln was less â€Å"intellectual and studied in tone† in delivering his second inaugural address, focusing more on religious allusions and spiritual reference (White 22). A key feature of the address, Lincoln’s use of religious overtones was neutral in its acceptance in both the North and South. Though taking great care to give the North credit for â€Å"accepting the war rather than let it perish† (Lincoln, lines 17-18) Lincoln did his best not to alienate the South but also took great care not to indemnify the insurgents in the face of his loyal Union constituency. To avoid a potentially catastrophic venture, Lincoln used Christianity and references to Protestant texts shar ed by both national contingents. With such radically different constituents, religion was the only common ground, resulting in a final address that notorious author and black activist Frederick Douglass found more akin to a â€Å"sermon than a speech† (White ii). Lincoln’s religious allusions served to emphasize national unity in similarity, as seen in lines 29-30 in his reference to Northern and Southern populations â€Å"both [reading] the same Bible and [praying] to the same God.† Furthermore, Lincoln alluded to religion as a mechanism to displace blame on either party for the violence that transpired following the Confederate secession from the Union. In lines 29-32, Lincoln urges the two halves of the nation to â€Å"judge not† its counterpart lest they in turn â€Å"be judged†. Placing the final victory in an intangible God’s proverbial hands, the politically masterful president did not place the moral imperative in the hands of either North or South, instead referencing the â€Å"Almighty’s [purposes]† in line 30 which in turn were assumed in the Judeo-Christian tradition incomprehensible by man. The heavily religious theme of the address kept abreast of the apocalyptic undertones of the war. In such a fractious time in American politics, both sides endorsed the distribution of their own versions of the Bible. White links the use of religion as a propaganda tool to encourage both reluctant Northern and Southern populations of their justifications for war: â€Å"With the beginning of hostilities, Bibles were produced almost as quickly as bullets. The American Bible Society made the decision to supply Bibles to all soldiers. At the Bible House, headquarters of the ABS in New York City, sixteen power presses printed and bound the books. The increase in the publication of Bibles was astonishing. In the first year of the Civil War, the American Bible Society printed 370,000 more Bibles than in the previous year† (White 102). Lincoln’s somewhat exploitative use of religious allegory was therefore not a novel concept; the hastened production of Bibles reflects both the Union and the Confederacy’s employment of religious justification to override whatever national allegiances would erstwhile prevent war. Lincoln’s address counteracted this stratagem employed by both North and South, neither negating nor supporting either side’s contentions that divine providence remained with their respective side. Richard Striner detailed the importance of the religious factor in Lincoln’s speech through a private letter Lincoln wrote to a contemporary, wherein Lincoln made special note to mention that â€Å"men are not flattered by being shown that there has been a difference of purpose between the Almighty and them†; â€Å"to deny it, however, in this case, is to deny that there is a God governing the world† (Striner 251). The letter continued, stating that the concept of man’s helplessness under divine will â€Å"is a truth which [Lincoln] thought needed to be told† (Striner 251). Glen Thurow’s Abraham Lincoln and Political Religion portrays Lincoln as a shrewd politician who understood the power of religious allegory in political speech. Thurow accentuates Lincoln’s foresight in his recollection that â€Å"Lincoln’s law partner, William H. Herndon, [claimed] after [Lincoln’s] death that the president was not a believer in Christianity; [and] some even testified he was an atheist† (Thurow 12). From this vantage, a different Lincoln is brought to the forefront, his re-election address taking on an entirely new significance. For all his political foresight and social innovation, Lincoln did not challenge the heavily religious tones of Washington. Selective of what views he would reveal to the American public, Lincoln was hence an innovator in every sense of the word, an abolitionist leader of a nation whose agrarian half depended on the institution of bondage for its sustenance. Moreover, Lincoln was also an atheist president o f a religious people, one of the primary reasons his two most impacting speeches—the Second Inaugural Address and the Gettysburg Address—were so religious in their hyperbole. More than maintaining the faà §ade of Lincoln’s religious piety, religious speech bolstered what White refers to as the â€Å"homespun† factor (White 15). As a man of humble beginnings, Lincoln’s appeal as a self-made man sharply contrasted that of the social elite who elected him into power. The apolitical South, despite its misgivings about Lincoln’s intentions for the future of America, recognized Lincoln as more than a member of the political bourgeois. Though they perceived his immense support from the Northern elite, the Southern contingent of the country also observed his detractors decrying his â€Å"homespun† style of speech and persona as something that gained him the enmity of his Northern opposition. A considerable amount of confusion stemmed from Li ncoln’s religious ambiguities; though he never belonged to an established church, Lincoln frequently attended services with his wife, Mary. Thurow observes that â€Å"much of the confusion surrounding Lincoln’s religion stems from the fact that commentators have tried to see whether he belonged to the religion of the churches, neglecting the possibility that his speeches were political, not religious, or were religious because they were political† (Thurow 14). It was not Lincoln’s lack of professed faith that made him a leader, but rather his understanding of the unifying effect of religion and his â€Å"carefully thought-out understanding of political religion in America† (Thurow 14). Just as the Confederacy would make use of Christianity’s most sacred texts to justify everything from slavery to secession, so would Lincoln take advantage of religious overtones to unify America and promote national reconciliation and reconstruction. A brilliant orator, Lincoln’s choice of diction played a significant role in the delivery and conveyance of Lincoln’s message of national reconciliation and unity. Taking care not to use divisive terms such as â€Å"we† or â€Å"they† to refer to Northern and Southern constituents (respectively), Lincoln used strategic terms repeatedly to emphasize unity no matter the events of the war. In describing the course of the Civil War, Lincoln describes the other side not as an intangible â€Å"it† but with a genuine sense of moral equivalency and respect. There are frequent references to the nation’s civil war as a tragedy for the collective nation. For example, the war is described as â€Å"the progress of our arms† (line 8). In describing what the war meant to the people of the United States, Lincoln uses the phrases â€Å"all† repetitively in line 12 (â€Å"all dreaded it, all sought to avert it†), the phrase â€Å"both† (line 16) and the term â€Å"each† (line 25) as well. Though Lincoln does ascribe some separating characteristics to North and South, he does not specifically assign b lame, instead ascribing relatively ambiguous terms. Halfway through the address, Lincoln has established the terms of the war and begins to reconcile using the word â€Å"neither† (line 24) to address both the North and the South; in using the negative â€Å"neither,† the president further reconciled the two parties by removing them both from the realm of culpability. Exonerating both entities, the president continues in the address by portraying opposing struggles in relatively positive terms. For instance, in line 28 the president describes each side’s fighting as the means in which both parties sought â€Å"an easier triumph†, giving all involved moral equivalency to one another. The venerated master politician closes the address with the completed theme of national reconciliation with the quotes â€Å"malice toward none† and â€Å"charity for all† (line 47). The strategic repetition of certain alliteration and assonance serves to emphasize the president’s points. For example, the issue of slavery is evoked as one of great importance by the repeated ‘p’ sound of â€Å"peculiar and powerful† (line 20). National reconciliation is reflected by the use of the ‘f’ sound of line 41, as the president communicates his perception of the American citizen as â€Å"fondly† hoping and â€Å"fervently† praying for a positive future. Such optimism was a necessity, as it was of the utmost importance that unity and reconciliation for a bright future were touted foremost on the political agenda. Despite the mass havoc, destruction, and loss of human life throughout the rebellious Confederate states, Lincoln’s address was crafted with an uncharacteristic optimism for the time. White notes that â€Å"after four years as a war president, Lincoln could look ahead to four years as a peace presidentâ €  (White 22). The Civil War was not the only issue addressed, however. North and South were only one party at odds with each other. The fledgling Republican party Lincoln so aptly represented was highly criticized for its disputed reconstruction plan. Moreover, political rifts still remained between Northern Democrats who remained loyal to the Union and the predominantly Southern Democrats who seceded. Thus, the â€Å"election of 1864 would be one of the most decisive in American history—and potentially the most catastrophic† (Striner 217). Lincoln’s political strategies were remarkable, most notably his ability to entertain the political goals of many without compromising his base of support. Alexander McClure’s compilation of letters revealed how politicians with opposing political agendas including â€Å"antagonistic elements to [Lincoln’s] own support† approached the president, who made it a point to â€Å"maintain close and often apparently confidential relations with each without offence to the other† (McClure 85). Lincoln’s proclivity towards national reconciliation stemmed from an â€Å"abiding faith in the people, in their intelligence and their patriotism†; the president â€Å"estimated political results by ascertaining, as far as possible, the popular bearing of every vital question that was likely to arise, and he formed his conclusions by his keen intuitive perception as to how the people would be likely to deal with the issues† (McClure 87). Lincoln was the ideal candidate to handle the fractious political environment of post-bellum America. There were few â€Å"political movements of national importance during Lincoln’s administration in which he did not actively, although often hiddenly, participate† (McClure 85). Crossing political party lines, Lincoln successively galvanized Congress across partisan issues. The Civil War marginalized not only Southerners, but also Northern Democrats who were among the minority of said party to support the Union against the insurgency. The second inaugural address could not alienate the already marginalized white Northern Democrats, as the actions of their Southern secessionist brethren made the Democratic Party something of a political pariah in the Union’s eye .In the years leading to Lincoln’s re-election, Democrats in the Union â€Å"never gave speeches, framed resolutions,† or took any stance of progressive thought for fear of eschewing Southern Democratic support. The issue of slavery, for example, was pivotal in Democratic thought and political action. Though touted by the president as â€Å"two hundred and fifty years of unrequited toil† and inherently frowned upon by â€Å"God† and morality, slavery was a divisive issue among Northern Democrats to say the least (line 43). Though pockets of the North such as New England were adamantly abolitionist, there was no significant shortage of support for the institution of slavery on the grounds of racial superiority. For every â€Å"popular expression of the [black man] as human, there â€Å"was a [derisive] counterpart† that dehumanized the so-called â€Å"Negro† cause (McClure 88). Consequently, Lincoln faced problems among the Northern elite, who â€Å"by using popular [racist] language and symbols† managed to â€Å"link popular sentiments to party agenda† (McClure 89). Perhaps one of the most pivotal and important issues of the Lincoln administration, slavery and its abolition may very well have served as the archetype of social and political change for the American nation. Proponents of slavery were as such supportive of the institution for more than social or perceived moral imperative; in addition to being burdened by the incapacitation of agrarian and some industrial facilities at the end of the Civil War, the American economy would be burdened by the throwing of â€Å"4 million former slaves onto the world with virtually nothing: no land, no savings, little or no schooling, no experience of politics, the legal system, or the free economy† (Golay 208). Despite the president’s push for abolition and moral recompense with the equivocation of â€Å"every drop of blood drawn with the lash† to â€Å"another drawn by the sword† (lines 44-45), there was a rift in opinion over how best to deal with the economic windfall of s upporting four million newly impoverished freed slaves. The president encountered significant opposition from both parties in supporting the freed slave; Lincoln had established a bureau expected â€Å"to protect the freed people, distribute emergency relief to the destitute, build an equitable free labor system, and establish a system of basic education throughout the South† (Golay 208). The funding for the said bureau would naturally come from Reconstruction efforts, but few members of White America—North or South—would give equal priority to freed black slaves as they would confederate states. Lincoln faced the spectre of two types of nationalism: the nationalism defined by the then-predominantly Republican Union and the nationalism defined by what was a predominantly Democratic Confederacy. Jean Baker wrote in Affairs of Party: The Political Culture of Democrats in the Mid-Nineteenth Century that: â€Å"In the years before the Civil War one way to express nationalism was to be a Democrat. Some Americans still suspected political parties of subversion, but by mid-century the Democracy had emerged as an institution through which citizens could celebrate devotion to their country and at the same time favour particular programs, leaders, and ideals. No longer was partisanship considered antirepublican. On the contrary, its nature tended to evoke sentiment for the Union and thus forced Southern separatists like John Calhoun and William Yancey to attempt a replacement. In the North, however, the Democracy continued to inspire unity† (Baker 318). Once dominant in the public eye, the Democrats were faced with a new challenge and a new bane to overcome in the regaining of the Union’s trust. While the issue of partisan affiliation was not a topic nearly as frequented then as it is today, a considerable Democratic identity was established with the disaffected South; it was not for some time that the Democratic Party championed the Northern caucus. By comparison, Republicans in the mid-nineteenth century were equally as suspect to national dissolution, as the prevailing theme of the reigning Democratic party was â€Å"inescapably nationalistic,† focusing on â€Å"the preservation of union, liberty, and constitution† (Baker 318). Lincoln’s Second Inaugural Address became an insightful indicator of the requisite political, social, and economic changes that were necessary in the reconstruction of post-bellum America. Galvanizing the country’s opposing social and political factions, Lincoln’s address was a masterful piece of oration that testified to both his earnest nature and shrewd understanding of not just politics, but the political climate of America and its fragile stasis. Its diction, alliteration, and religious allegories worked together in a patchwork of executive prestidigitation; Lincoln’s delivery was almost a political sleight of hand in its theme and scope. Though he would be assassinated in a matter of a few months following the delivery of the speech, Lincoln achieved political normalcy in the aftermath of America’s most debilitating war, garnering the collective enmity of an entire half of a nation and the admiration of the remainder. To his opponents, Lincoln was a democratically-elected aspiring autocrat as evidenced by John Wilkes Booth’s infamous quote â€Å"sic semper tyrannus.† To his grateful and loyal supporters, however, Lincoln managed the unthinkable: the abolition of slavery and the retention of American unity. BIBLIOGRAPHY Baker, Jean H. Affairs of Party: The Political Culture of Northern Democrats in theMid-Nineteenth Century. Bronx: Fordham U P, 1998. Golay, Michael. A Ruined Land: The End of the Civil War. New York: John Wiley Sons, 1999. McClure, Alexander K. Abraham Lincoln and Men of War-Times: SomePersonalRecollections of War and Politics During the Lincoln Administration. Lincoln: U of Nebraska P, 1997. Striner, Richard. Father Abraham: Lincoln’s Relentless Struggle to End Slavery.Oxford: Oxford U P, 2006. Thurow, Glen E. American Political Religion. Albany: State U of Albany P, 1976. White, Ronald C. Lincoln’s Greatest Speech: The Second Inaugural. New York:Simon Schuster Press, 2002. Rable, George C. The Confederate Republic: A Revolution Against Politics

Tuesday, November 12, 2019

Models of cultural differences Essay

There are several different theories and models of cultural differences. Let us detect key dimensions that characterise different cultures. The work of Hall, Hofstede, Trompenaars and many others who study national cross-cultural differences has been invaluable in the area of cross-cultural studies. Edward Hall is a prominent cultural anthropologist. His theoretical framework includes a concept known as the context of culture or communication. Basically Hall argued that there is a continuum extending from a low to high degree of intense socialization within cultural groups. Hall introduces five dimensions as follows: 1. Space: Different cultures have different attitudes towards space. Social distance varies by culture. He revealed that there are different spatial zones that cultures will use for communication. For example among those of Anglo-Saxon heritage, in the United States, there is an intimate zone that extends from 0 to 18 inches from a person. Only close relations will communicate this closely. However, some cultures prefer much closer contact. For example, in many Arab cultures contact is so close that individuals frequently can smell the breaths and odours. 2. Material Goods: Such goods are used for power and status. 3. Friendship: Interpersonal relationships vary considerably across cultures. 4. Time: Linear time cultures take time and deadlines very seriously, in a very rationalist sense. Time is structured, sequential and linear. Hall distinguished between monochronic and polychronic time. Monochronic people and cultures prefer focusing on a single task at a time, and completing one task before beginning another. Polychronic cultures have the ability to focus on multiple priorities simultaneously. 5. Agreement: Expressing agreement and disagreement varies by culture. In some cultures the detailed written contract is essential to agreement, while in others a handshake is sufficient. An interesting study highlighting cultural orientations toward time was completed by Trompenaars. The point of that study was to determine time orientation of different cultures. This national study on time orientation revealed that countries such as Germany and the United States were primarily present and future oriented. Conversely, France was found to be much more focused on the past. Trompenaars develops his parameters of national cultures in such pair oppositions: 1. Universalism – Particularism: The universalist approach means that what is good and right applies everywhere, while the particularist emphasises the obligations of relationships. 2. Collectivism – Individualism: that indicates the relative closeness of the relationship between social group members. 3. Neutral – Emotional: Some cultures are affective in that they show emotions while others are neutral, control and subdue their emotions. 4. Specific – Diffuse: In specific oriented cultures the manager separates the work relationships with subordinates from other dealings with them. 5. Status: While some cultures give status on the basis of achievement, others ascribe it on the basis of age, class, gender, education, etc. 6. Sequential – Synchronic: In the former cultures time is treated as a sequence of events while on later cultures a number of events are juggled at the same time. 7. Inner-Directed – Outer-Directed: The former cultures believe that they can and should control nature while the later go along with nature. Hofstede (1991) defines culture as mental programming or the software of the mind. Hofstede identifies five national culture dimensions as follows (Hofstede, 1980), (Hofstede, 1991): 1. Power Distance that is the extent to which the less powerful members of institutions and organisations within a country expect and accept that power is distributed unequally. 2. Individualism-Collectivism that indicates the relative closeness of the relationship between team members. 3. Masculinity-Femininity that identifies the sexuality of roles in society and the degree to which a society allows overlap between the roles of men and women. 4. Uncertainty Avoidance that is the extent to which the members of a culture feel threatened by uncertain or unknown situations. 5. Long-term Orientation that is based on values of Confucianism showing to what degree do people value the future versus the past or present. The advantages of Hofstede’s dimensions include the fact that they are founded on outstanding psychological and sociological theories within the American and European traditions that are over 100 years old; they are empirically derived; they allow us to rank order nations on each dimension; and they are readily understandable by managers and students. While Hofstede’s dimensions provide an effective general approach for comparing the cultures of nations, they are not grounded to specific nations. His dimensions are designed to be culture-general rather than culture-specific. Moreover, Hofstede results are often hard to remember and difficult to use in daily cultural interactions. All of the above models are quite useful and have several strengths. However there are also some points of concern; some weakness that should be identified with respect to each model separately. Hall’s model is built on qualitative insights rather than quantitative data and does not rank different countries. Hofstede’s work has such main problems like it assumes that national territory corresponds to culture limits, omitting existing cultural non-uniformity in various countries included in the survey, or some of the dimensions effects overlap such as the small power distance characteristics with the feminine ones. For Trompenaars’ model the main problem is that the pool of informants is vaguely defined and lacks homogeneity, therefore the comparisons that are made between cultures are imprecise. References: Hall, E. T. & Hall, M. R. 1990 Understanding Cultural Differences, Intercultural Press. Hofstede, G. 1980 Cultures Consequences, Sage. Hofstede, G. 1991 Cultures and Organisations, McGraw-Hill. Trompenaars, F. 1993 Riding the Waves of Culture, Nicholas Brealey.

Sunday, November 10, 2019

Computer Hardware Essay

I. LECTURE OVERVIEW Foundation Concepts: Computer Hardware, reviews trends and developments in microcomputer, midrange, and mainframe computer systems; basic computer system concepts; and the major types of technologies used in peripheral devices for computer input, output, and storage. Computer Systems – Major types of computer systems are summarized in Figure 13.2. A computer is a system of information processing components that perform input, processing, output, storage, and control functions. Its hardware components include input and output devices, a central processing unit (CPU), and primary and secondary storage devices. The major functions and hardware in a computer system are summarized in Figure 13.9 Microcomputer Systems – Microcomputers are used as personal computers, network computers, personal digital assistants, technical workstations, and information appliances. Like most computer systems today, microcomputers are interconnected in a variety of telecommunications networks. This typically includes local area networks, client/server networks, intranets and extranets, and the Internet. Other Computer Systems – Midrange computers are increasingly used as powerful network servers, and for many multiuser business data processing and scientific applications. Mainframe computers are larger and more powerful than most midsize computers. They are usually faster, have more memory capacity, and can support more network users and peripheral devices. They are designed to handle the information processing needs of large organizations with high volumes of transaction processing, or with complex computational problems. Supercomputers are a special category of extremely powerfu l mainframe computer systems designed for massive computational assignments. II. LEARNING OBJECTIVES Learning Objective †¢ Identify the major types, trends, and uses of microcomputer, midrange and mainframe computer systems. †¢ Outline the major technologies and uses of computer peripherals for input, output, and storage. †¢ Identify and give examples of the components and functions of a computer system. †¢ Identify the computer systems and peripherals you would acquire or recommend for a business of your choice, and explain the reasons for your selections. III. LECTURE NOTES Section 1: Computer Systems: End User and Enterprise Computing INTRODUCTION All computers are systems of input, processing, output, storage, and control components. Technology is evolving at a rapid pace, and new forms of input, output, processing, and storage devices continue to enter the market. Analyzing City of Richmond and Tim Beaty Builders We can learn a lot about innovative business uses of PDAs from this case. Take a few minutes to read it, and we will discuss it (See City of Richmond and Tim Beaty Builders in Section IX). TYPES OF COMPUTER SYSTEMS -[Figure 13.2] There are several major categories of computer systems with a variety of characteristics and capabilities. Thus, computer systems are typically classified as: †¢ Mainframe computers †¢ Midrange computers †¢ Microcomputers These categories are attempts to describe the relative computing power provided by different computing platforms or types of computers therefore, they are not precise classifications. Some experts predict the merging or disappearance of several computer categories. They feel that many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks of microcomputers and servers. Most recently, some  industry experts have predicted that the emergence of network computers and information appliances for applications on the Internet and corporate intranets will replace many personal computers, especially in large organisations and in the home computer market. MICROCOMPUTER SYSTEMS Microcomputers are the smallest but most important categories of computers systems for business people and consumers. They are also referred to as personal computers (or PCs). The computing power of current microcomputers exceeds that of the mainframe computers of previous generations at a fraction of their cost. They have become powerful-networked professional workstations for use by end users in business. Microcomputers  categorised by size 1. Handheld 2. Notebook 3. Laptop 4. Portable 5. Desktop 6. Floor-standing Microcomputers  categorised by use 1. Home 2. Personal 3. Professional 4. Workstation 5. Multi-user Systems Microcomputers  categorised by special purpose 1. Workstation Computers 2. Network Servers 3. Personal Digital Assistants Workstation Computers – some microcomputers are powerful workstation  computers (technical work stations) that support applications with heavy mathematical computing and graphics display demands such as computeraided design (CAD) in engineering, or investment and portfolio analysis in the securities industry. Network Servers – are usually more powerful microcomputers that co-ordinate telecommunications and resource  sharing in small local area networks (LANs), and Internet and intranet websites. This is the fastest growing microcomputer application category. Network Computers: †¢ Network Computers (NCs) are a major new microcomputer category designed primarily for use with the Internet and corporate intranets by clerical workers, operational employees, and knowledge workers with specialised or limited computing applications. In-between NCs and full-featured PCs are stripped-down PCs known as NetPCs or legacy-free PCs. NetPCs are designed for the Internet and a limited range of applications within a company. Examples are: Dell’s Webpc, Compaq’s IPaq, HP’s e-PC, and eMachine’s eOne. Network computers (also called thin clients) are low-cost, sealed, networked microcomputers with no or minimal disk storage. Users of network computers depend primarily on Internet and intranet servers for their operating system and web browser, Java-enabled application software, and data access and storage. Main attractions of network computers over full-featured PCs are their low cost to: †¢ Purchase †¢ Upgrade †¢ Maintenance †¢ Support Other benefits to businesses include: †¢ Ease of software distribution and licensing †¢ Computing platform standardisation †¢ Reduced end user support requirements †¢ Improved manageability through centralised management and enterprisewide control of computer network resources. Information Appliances The market is offering a number of gadgets and information appliances that offer users the capability to perform enable host of basic computational chores. Examples of some information appliances include: †¢ Personal Digital Assistants – (PDAs) are designed for convenient mobile communications and computing. PDAs use touch screens, pen-based handwriting recognition, or keyboards to help mobile workers send and receive E-mail, access the Web, and exchange information such as appointments, to-do lists, and sales contacts with their desktop PCs or web servers. †¢ Set-top boxes and video-game consoles that connect to home TV sets. These devices enable you to surf the Web or send and receive E-mail and watch TV programs or play video games at the same time. †¢ Wireless PDAs and cellular and PCS phones and wired telephone-based appliances that can send and receive E-mail and access the Web. Computer Terminals Computer terminals are undergoing a major conversion to networked computer devices. For example: †¢ Dumb terminals are keyboard/video monitor devices with limited processing capabilities, to intelligent terminals, which are modified networked PCs, network computers or other microcomputer-powered network devices. Intelligent terminals can perform data entry and some information processing tasks independently. †¢ Networked terminals which may be Windows terminals that are dependent on network servers for Windows software, processing power, and storage, or Internet terminals, which depend on Internet or intranet website servers for their operating systems and application software. †¢ Transaction terminals are a form of intelligent terminal. Uses can be found in banks retail stores, factories, and other work sites. Examples are ATM’s, factory production recorders, and POS terminals. MIDRANGE COMPUTER SYSTEMS Midrange computers, including minicomputers and high-end network servers, are  multi-user systems that can  manage networks of PCs and terminals. Characteristics of midrange computers include: †¢ Generally, midrange computers are general-purpose computers that are larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframes. †¢ Cost less to buy, operate, and maintain than mainframe computers. †¢ Have become popular as powerful network servers to help manage large Internet websites, corporate intranets and extranets, and client/server networks. †¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. †¢ Data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. †¢ First became popular as minicomputers for scientific research, instrumentation systems, engineering analysis, and industrial process monitoring and control. Minicomputers could easily handle such uses because these applications are narrow in scope and do not demand the processing versatility of mainframe systems. †¢ Serve as industrial process-control and manufacturing plant computers and they play a major role in computeraided manufacturing (CAM). †¢ Take the form of powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications. †¢ Are used as front-end computers to assist mainframe computers in telecommunications processing and network management. †¢ Can function in ordinary operating environments (do not need air conditioning or electrical wiring). †¢ Smaller models of minicomputers do not need a staff of specialists to operate them. MIDRANGE COMPUTER APPLICATIONS Serve as industrial process-control and manufacturing plant computers. Play a major role in computer-aided manufacturing (CAM). Serve as powerful technical workstations for computer-aided design (CAD) and other computation and graphics-intensive applications Serve as front-end computers to assist mainframe computers in telecommunications processing and network management. Midrange Computer as Network Server: †¢ Electronic commerce and other business uses of the Internet are popular high-end server applications, as are integrated enterprisewide manufacturing, distribution, and financial applications. †¢ Other applications, like data warehouse management, data mining, and online analytical processing are contributing to the growth of high-end servers and other midrange systems. †¢ Serve as powerful network servers to help manage large Internet web sites, corporate Intranets and extranets, and client/server networks MAINFRAME COMPUTER SYSTEMS Mainframe computers are large, fast, and powerful computer systems. Characteristics of mainframe computers include: †¢ They are physically larger and more powerful than micros and minis. †¢ Can process hundreds of millions of instructions per second (MIPS). †¢ Have large primary storage capacities. Main memory capacity can range from hundreds of megabytes to many gigabytes of primary storage. †¢ Mainframes have slimmed down drastically in the last few years, dramatically reducing air-conditioning needs, electronic power consumption, and floor space requirements, and thus their acquisition and operating costs. †¢ Sales of mainframes have increased due to cost reductions and the increase  in applications such as data mining and warehousing, decision support, and electronic commerce. Mainframe Computer Applications: †¢ Handle the information processing needs of major corporations and government agencies with many employees and customers. †¢ Handle enormous and complex computational problems. †¢ Used in organisations processing great volumes of transactions. †¢ Handle great volumes of complex calculations involved in scientific and engineering analyses and simulations of complex design projects. †¢ Serve as superservers for the large client/server networks and high-volume Internet web sites of large companies. †¢ Are becoming a popular business-computing platform for data mining and warehousing, and electronic commerce applications. Supercomputer Systems: The term supercomputer describes a category of extremely powerful computer systems specifically designed for scientific, engineering, and business applications requiring extremely high-speeds for massive numeric computations. Supercomputer Applications: †¢ Used by government research agencies, large universities, and major corporations. †¢ Are used for applications such as global weather forecasting, military defence systems, computational cosmology and astronomy, microprocessor research and design, large scale data mining, large time-sharing networks, and so on. †¢ Use parallel processing architectures of interconnected microprocessors (which can execute many instructions at the same time in parallel). †¢ Can perform arithmetic calculations at speeds of billions of floating-point operations per second (gigaflops). Teraflop (1 trillion floating-point operations per second) supercomputers, which use advanced massively parallel  processing (MPP) designs of thousands of interconnected microprocessors, are becoming available. †¢ Purchase price for large supercomputers are in the $5 million to $50 million range. Mini-supercomputers: The use of symmetric multiprocessing (SMP) and distributed shared memory (DSM) designs of smaller numbers of interconnected microprocessors has spawned a breed of mini-supercomputer with prices that start in the hundreds of thousands of dollars. TECHNICAL NOTE: THE COMPUTER SYSTEM CONCEPTS – [Figure 13.9] As a business professional, you do not need a detailed technical knowledge of computers. However, you do need to understand some basic facts and concepts about computer systems. This should help you be an informed and productive user of computer system resources. A computer is a system, an interrelated combination of components that perform the basic system functions of input, processing, output, storage, and control, thus providing end users with a powerful information-processing tool. Understanding the computer as a computer system is vital to the effective use and management of computers. A computer is a system of hardware devices organised according to the following system functions: †¢ Input. Examples of some input devices of a computer system include: 1. Keyboards 2. Touch Screens3. Light Pens 4. Electronic Mice 4. Optical Scanners 5. Voice Input They convert data into electronic machine-readable form for direct entry or through a telecommunications network into a computer system. Processing. The central processing unit (CPU) is the main processing component of a computer system. (In microcomputers, it is the main microprocessor). One of the CPU’s major components is the arithmetic-logic unit (ALU) that performs the arithmetic and logic functions required in computer processing. Components of the CPU include: 1. Control Unit 2. Arithmetic-Logic Unit 3. Primary Storage Unit Output. Convert electronic information produced by the computer system into human-intelligible form for presentation to end-users. Examples of output devices include: 1. Video Display Units 2. Audio Response Units 3. Printers Storage. The storage function of a computer system is used to store data and program instructions needed for processing. Storage devices include: 1. Primary Storage Unit (main memory) 2. Secondary Storage Devices (magnetic disk and tape units, optical disks) Control. The control unit of a CPU interprets computer program instructions and transmits directions to the other components of the computer system. Computer Processing Speeds: Operating speeds of computers are measured in a number of ways. For example: †¢ Milliseconds – Thousands of a second. Microseconds – Millionths of a second. Nanoseconds – Billionth of a second Picosecond – Trillionth of a second Other terminology used includes: Teraflop – used by some supercomputers MIPS – Million instructions per second Megahertz (MHz) – Millions of cycles per second Gigahertz (GHz) – Billions of cycles per second Clock Speed – used to rate microprocessors by the speed of their timing circuits and internal clock. Section II: Computer Peripherals: Input, Output, and Storage Technologies INTRODUCTION A computer is just a high-powered â€Å"processing box† without peripherals. Your personal computing needs will dictate the components you choose for our particular computing needs. Analyzing United Technologies and Eastman Kodak We can learn a lot about the business value of consolidating computer operations and systems from this case. Take a few minutes to read it, and we will discuss it (See United Technologies and Eastman Kodak in Section IX). PERIPHERALS Peripherals are the generic name for all input, output, and secondary storage devices that are part of a computer system. Peripherals depend on direct connections or telecommunications links to the central processing unit of a  computer system. Thus, all peripherals are online devices, that is, separate from, but can be electronically connected to and controlled by, a CPU. This is the opposite of off-line devices, which are separate from and not under the control of the CPU. INPUT TECHNOLOGY There has been a major trend toward the increased use of input technologies that provide a more natural user interface for computer users. More and more data and commands are being entered directly and easily into computer systems through pointing devices like electronic mice and touch pads, and technologies like optical scanning, handwriting recognition, and voice recognition. POINTING DEVICES Keyboards are still the most widely used devices for entering data and text into computer systems. However, pointing devices are a better alternative for issuing commands, making choices, and responding to prompts displayed on your video screen. They work with your operating system’s graphical user interface (GUI), which presents you with icons, menus, windows, buttons, bars, and so on, for your selection. Examples of pointing devices include: †¢ Electronic Mouse – A device used to move the cursor on the screen, as well as to issue commands and make icon and menu selections. †¢ Trackball – A device used to move the cursor on the display screen. Pointing Stick – A small buttonlike device, sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Touchpad – A small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Touch Screens – A device that accepts data input by the placement of a finger on or close to the CRT screen. PEN-BASED COMPUTING Pen-based computing technologies are being used in many hand-held computers and personal digital assistants. These small PCs and PDAs contain fast processors and software that recognises and digitises handwriting, hand printing, and hand drawing. They have a pressure-sensitive layer like a graphics pad under their slatelike liquid crystal display (LCD) screen. A variety of penlike devices are available: Digitizer Pen – A photoelectronic device that can be used as a pointing device, or used to draw or write on a pressure-sensitive surface of a graphics tablet. Graphics Tablet – A device that allows an end user to draw or write on a pressure-sensitive tablet and has their handwriting or graphics digitised by the computer and accepted as input. SPEECH RECOGNITION SYSTEMS Speech recognition and voice response (in their infancy) promise to be the easiest method of data entry, word processing, and conversational computing, since speech is the easiest, most natural means of human communication. Speech recognition systems analyse and classify speech or vocal tract patterns and convert them into digital codes for entry into a computer system. Early voice recognition products used discrete speech recognition, where you had to pause between each spoken word. New continuous speech recognition (CSR) software recognises controlled, conversationally paced speech. Examples of continuous speech recognition software include: †¢ NaturallySpeaking by Dragon Systems †¢ ViaVoice by IBM †¢ VoiceXpress by Lernout & Hauspie †¢ FreeSpeech by Philips Areas where speech recognition systems are used include: †¢ Manufacturers use it for inspection, inventory, and quality control †¢ Airlines and parcel delivery companies use it for voice-directed sorting of baggage and parcels †¢ Voice activated GPS systems are being used in advanced car design †¢ Physicians use it to enter and printout prescriptions †¢ Gemmologists use it to free up their hands when inspecting and grading precious stones †¢ Handicapped individuals use voice-enabled software to operate their computers, e-mail, and surf the World Wide Web. Speaker-independent voice recognition systems allow a computer to understand a few words from a voice it has never heard before. They enable computers to respond to verbal and touch-tone input over the telephone. Examples include: †¢ Computerized telephone call switching †¢ Telemarketing surveys †¢ Bank pay-by-phone bill-paying services †¢ Stock quotations services †¢ University registration systems †¢ Customer credit and account balance inquiries OPTICAL SCANNING Optical scanning devices read text or graphics and convert them into digital input for a computer. Optical scanning enables the direct entry of data from source documents into a computer system. Popular uses of optical scanning include: †¢ Scanning pages of text and graphics into your computer for desktop publishing and web publishing applications. †¢ Scan documents into your system and organize them into folders as part of a document management library system for easy reference or retrieval.  There are many types of optical scanners, but they all employ photoelectric devices to scan the characters being read. Reflected light patterns of the  data are converted into electronic impulses that are then accepted as input into the computer system. Optical scanning technology known as optical character recognition (OCR) can read special-purpose characters and codes. OCR scanners are used to read characters and codes on:   Merchandise tags Product labels Credit card receipts Utility bills Insurance premiums Airline tickets Sort mail Score tests Process business and government forms Devices such as handheld optical scanning wands are used to read OCR coding on merchandise tags and other media. Many business applications involve reading bar code, a code that utilises bars to represent characters. One common example is the Universal Produce Code (UPC) bar coding that you see on packages of food items and many other products. OTHER INPUT TECHNOLOGIES Magnetic stripe technology is a familiar form of data entry that helps computers read credit cards. The dark magnetic stripe on the back of such cards is the same iron oxide coating as on magnetic tape. Smart cards that embed a microprocessor chip and several kilobytes of memory into debit, credit, and other cards are popular in Europe, and becoming available in the United States. Digital cameras and digital video cameras enable you to shoot, store, and download still photos or full motion video with audio into your PC. Magnetic ink character recognition (MICR) is machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. OUTPUT TECHNOLOGIES Computers provide information in a variety of forms. Video displays and printed documents have been, and still are, the most common forms of output from computer systems. But other natural and attractive output technologies such as voice response systems and multimedia output are increasingly found along with video displays in business applications. VIDEO OUTPUT Video displays are the most common type of computer output. Most desktop computers rely on video monitors that use cathode ray tube (CRT) technology. Usually, the clarity of the video display depends on the type of video monitor you use and the graphics circuit board installed in your computer. A high-resolution, flicker-free monitor is especially important if you spend a lot of time viewing multimedia on CDs or the Web, or complex graphical displays of many software packages. The biggest use of liquid crystal displays (LCDs) is to provide a visual display capability for portable microcomputers and PDAs. LCD displays need significantly less electric current and provide a thin, flat display. Advances in technology such as active matrix and dual scan capabilities have improved the color and clarity of LCD displays. PRINTED OUTPUT After video displays, printed output is the most common form of output displays. Most personal computer systems rely on inkjet or laser printers to produce permanent (hard copy) output in high-quality printed form. Printed output is still a common form of business communications, and is frequently required for legal documentation. †¢ Inkjet printers – Spray ink onto a page one line at a time. They are popular, low-cost printers for microcomputer systems. They are quiet, produce several pages per minute of high-quality output, and can print both black-and-white and high-quality colour graphics. Laser Printers – Use an electrostatic process similar to a photocopying machine to produce many pages per minute of high-quality black-and-white output. More expensive colour laser printers and multifunction inkjet and laser models that print, fax, scan, and copy are other popular choices for business offices. STORAGE TRADE-OFFS Data and information need to be stored after input, during processing, and before output. Computer-based information systems rely primarily on the memory circuits and secondary storage devices of computer systems to accomplish the storage function. Major trends in primary and secondary storage methods: †¢ Progress in very-large scale integration (VLSI), which packs millions of memory circuit elements on tiny semiconductor memory chips, are responsible for continuing increases in the main-memory capacity of computers. †¢ Secondary storage capacities are also expected to escalate into the billions and trillions of characters, due primarily to the use of optical media.  Storage Trade-offs: Speed, capacity, and cost relationships. †¢ Note the cost/speed/capacity trade-offs as one moves from semiconductor memories to magnetic media, such as magnetic disks and tapes, to optical disks. †¢ High-speed storage media cost more per byte and provide lower capacities. †¢ Large capacity storage media cost less per byte but are slower †¢ Semiconductor memories are used mainly for primary storage, though they are sometimes used as high-speed secondary storage devices. †¢ Magnetic disk and tape and optical disk devices are used as secondary storage devices to greatly enlarge the storage capacity of computer systems. †¢ Most primary storage circuits use RAM (random access memory) chips, which lose their contents when electrical power is interrupted †¢ Secondary storage devices provide a more permanent type of storage media for storage of data and programs. Computer Storage Fundamentals: [Figure 13.20] Data is processed and stored in a computer system through the presence or absence of electronic or magnetic signals in the computer’s circuitry in the media it uses. This is called a â€Å"two-state† or binary representation of data, since the computer and media can exhibit only two possible states or conditions – ON (1) or OFF (0). Computer storage elements: †¢ Bit – is the smallest element of data, (binary digit) which can have a value of zero or one. The capacity of  memory chips is usually expressed in terms of bits. Byte – is the basic grouping of bits that the computer operates as a single unit. It typically consists of 8 bits and is used to represent one character of data in most computer coding schemes (e.g. 8 bits = 1 byte). The capacity of a computer’s memory and secondary storage devices is usually expressed in terms of bytes. ASCII (American Standard Code for Information Interchange) EBCDIC (Extended Binary Coded Decimal Interchange Code) Pronounced: EB SEE DICK Storage capacities are frequently measured in: Kilobyte = 1,000 bytes Megabyte = 1,000,000 bytes Gigabyte = 1,000,000,000 bytes Terabyte = 1,000,000,000,000 bytes Petabyte = 1,000,000,000,000,000 bytes Exabyte = 1,000,000,000,000,000,000 bytes Zettabyte = 1,000,000,000,000,000,000,000 bytes Yottabyte = 1,000,000,000,000,000,000,000,000 bytes Direct and Sequential Access †¢ Direct Access – Primary storage media such as semiconductor memory chips are called direct access or random access memories (RAM). Magnetic disk devices are frequently called direct access storage devices (DASDs). The terms direct access and random access describe the same concept. They mean that an element of data or instructions can be directly stored and retrieved by selecting and using any of the locations on the storage media. They also mean that each storage position (1) has a unique address and (2) can be individually accessed in approximately the same length of time without having to search through other storage positions. Sequential Access – sequential access storage media such as magnetic tape do not have unique storage addresses that can be directly addressed. Instead, data must be stored and retrieved using a sequential or serial process. Data are recorded one after another in a predetermined sequence on a storage medium. Locating an individual item of data requires searching much of the recorded data on the tape until the desired item is located. SEMICONDUCTOR MEMORY The primary storage (main memory) on most modern computers consists of microelectronic semiconductor memory circuits. Plug-in memory circuit boards containing 32 megabytes or more of memory chips can be added to your PC to increase its memory capacity. Specialized memory can help improve your computer’s performance. Examples include: †¢ External cache memory of 512 kilobytes to help your microprocessor work faster †¢ Video graphics accelerator cards with 16 megabytes of RAM are used for faster and clearer video performance †¢ Removable credit-card-size and smaller â€Å"flash memory† RAM cards provide several megabytes of erasable direct access storage for PDAs or hand-held PCs. Some of the major attractions of semiconductor memory are: †¢ Small size †¢ Fast speed †¢ Shock and temperature resistance One major disadvantage of most semiconductor memory is: †¢ Volatility – Uninterrupted electric power must be supplied or the contents of memory will be lost (except with  read only memory, which is permanent). There are two basic types of semiconductor memory: †¢ Random Access Memory (RAM) – these memory chips are the most widely used primary storage medium. Each memory position can be both read and written, so it is also called read/write memory. This is a volatile memory. †¢Ã‚  Read Only Memory (ROM) – Non-volatile random access memory chips are used for permanent storage. ROM can be read but not erased or overwritten. Instructions and programs in primary storage can be permanently â€Å"burned in†Ã‚  to the storage cells during manufacturing. This permanent software is also called firmware. Variations include PROM (programmable read only memory) and EPROM (erasable programmable read only memory), which can be permanently or temporarily programmed after manufacture. MAGNETIC DISK STORAGE These are the most common forms of secondary storage for modern computer systems. That’s because they provide fast access and high storage capacities at a reasonable cost. Characteristics of magnetic disks: †¢ Disk drives contain metal disks that are coated on both sides with an iron oxide recording material. †¢ Several disks are mounted together on a vertical shaft, which typically rotates the disks are speeds of 3,600 to 7,600 revolutions per minute (rpm) †¢ Access arms between the slightly separated disks to read and write data on concentric, circular tracks position electromagnetic read/write heads. †¢ Data are recorded on tracks in the form of tiny magnetized spots to form the binary digits of common computer codes. †¢ Thousands of bytes can be recorded on each track, and there are several hundred data tracks on each disk surface, which provides you with billions of storage positions for software and data. Types of Magnetic Disks There are several types of magnetic disk arrangements, including disk cartridges as well as fixed disk units. Removable disk devices are popular because they are transportable and can be used to store backup copies of your data off-line for convenience and security. Floppy Disks, or magnetic disks, consist of polyester film disks covered with an iron oxide compound. A single disk is mounted and rotates freely inside a protective flexible or hard plastic jacket, which has access openings to accommodate the read/write head of a disk drive unit. The 3-1/2-inch floppy disk, with capacities of 1.44 megabytes, is the most widely used version, with a newer Superdisk technology offering 120 megabytes of storage. Hard Disk Drives combine magnetic disks, access arms, and read/write heads into a sealed module. This allows higher speeds, greater data-recording densities,  and closer tolerances within a sealed, more stable environment. Fixed or removable disk cartridge versions are available. Capacities of hard drives range from several hundred megabytes to many gigabytes of storage. RAID Storage Disk arrays of interconnected microcomputer hard disk drives have replaced large-capacity mainframe disk drives to provide many gigabytes of online storage. Known as RAID (redundant arrays of independent disks), they combine from 6 to more than 100 small hard disk drives and their control microprocessors into a single unit. Advantages of RAID disks include: †¢ Provide large capacities with high access speeds since data is accessed in parallel over multiple paths from many disks. †¢ Provide fault tolerant capability, since their redundant design offers multiple copies of data on several disks. If one disk fails, data can be recovered from backup copies automatically stored on other disks. †¢ Storage area networks (SANs) are high-speed fibre channel local area networks that can interconnect many RAID units and share their combined capacity through network servers for many users. MAGNETIC TAPE STORAGE Magnetic Tape is still being used as a secondary storage medium in business applications. The read/write heads of magnetic tape drives record data in the form of magnetised spots on the iron oxide coating of the plastic tape. Magnetic tape devices include tape reels and cartridges in mainframes and midrange systems, and small cassettes or cartridges for PCs. These devices serve as slower, but lower cost, storage to supplement magnetic disks to meet massive data warehouse and other business storage requirements. Other major applications for magnetic tape include long-term archival storage and backup storage for PCs and other systems. OPTICAL DISK STORAGE Optical disk storage involves technology, which is based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. †¢Ã‚  CD-ROM – A common type of optical disk used on microcomputers. They are used for read only storage. Storage is over 600 megabytes per disk. This is equivalent to over 400 1.44-megabyte floppy disks or 300,000 double-spaced pages of text. Data are recorded as microscopic pits in a spiral track, and are read using a laser device. Limitation: Recorded data cannot be erased †¢Ã‚  CD-R – (Compact disk recordable) is another optical disk technology. It enables computers with CD-R disk drive units to record their own data once on a CD, and then be able to read the data indefinitely. Limitation: Recorded data cannot be erased †¢Ã‚  CD-RW – (CD-rewritable) optical disk systems have now become available which record and erase data by using a laser to heat a microscopic point on the disk’s surface. In CD-RW versions using magneto-optical technology, a magnetic coil changes the spot’s reflective properties from one direction to another, thus recording a binary one to zero. A laser device can then read the binary codes on the disk by sensing the direction of reflected light. †¢Ã‚  DVD – (Digital Video Disk or Digital Versatile Disk) can hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. The large capacities and high- quality images and sound of DVD technology are expected to eventually replace CD-ROM and CD-RW technologies for data storage, and  promise to accelerate the use of DVD drives for multimedia products that can be used in both computers and home entertainment systems. †¢ DVD-ROM is beginning to replace magnetic tape videocassettes for movies and other multimedia products. †¢ DVD – RAM is being used for backup and archival storage data and multimedia files. Business Applications One of the major uses of optical disks in mainframe and midrange systems is in image processing, where longterm archival storage of historical files of document images must be maintained. Mainframe and midrange computer versions of optical disks use 12-inch plastic disks with capacities of several gigabytes, with up to 20 disks held in jukebox drive units. WORM – (Write Once, Read Many) versions of optical disks are used to store data on the disk. Although data can only be stored once, it can be read an infinite number of times. One of the major business uses of CD-ROM disks for personal computers is to provide a publishing medium for fast access to reference materials in a convenient, compact form. These include: †¢ Catalogs †¢ Directories †¢ Manuals †¢Ã‚  Periodical abstracts †¢Ã‚  Part listings †¢Ã‚  Statistical databases of business activity and economic activity Interactive multimedia applications in business, education, and entertainment using CD-ROM and DVD disks. Optical disks have become a popular storage medium for image processing and multimedia business applications and they appear to be a promising alternative to magnetic disks and tape for very large mass storage capabilities for enterprise computing systems. However, rewritable optical technologies are still being perfected. Also, most optical disk devices are significantly slower and more expensive (per byte of storage) than magnetic disk devices. So optical disk systems are not expected to displace magnetic disk technology in the near future for most business applications. IV. KEY TERMS AND CONCEPTS – DEFINED Binary Representation: Pertaining to the presence or absence of electronic or magnetic â€Å"signals† in the computer’s circuitry or in the media it uses. There are only two possible states or conditions – presence or absence. Central Processing Unit (CPU): The unit of a computer system that includes the circuits that controls the interpretation and execution of instructions. In many computer systems, the CPU includes the arithmetic-logic unit, the control unit, and primary storage unit. Computer System: Computer hardware as a system of input, processing, output, storage, and control components. Thus a computer system consists of input and output devices, primary and secondary storage devices, the central processing unit, the control unit within the CPU, and other peripheral devices. Computer Terminal: Any input/output device connected by telecommunications links to a computer. Digital Cameras: Digital still cameras and digital video cameras enable you to shoot, store, and download still photos or full-motion video with audio in your PC. Direct Access: A method of storage where each storage position has a unique address and can be individually accessed in approximately the same period of time without having to search through other storage positions. Information Appliance: Devices for consumers to access the Internet. Laptop Computer: A small portable PC. Liquid Crystal Displays (LCD): Electronic visual displays that form characters by applying an electrical charge to selected silicon crystals. Magnetic Disk Storage: Data storage technology that uses magnetised spots on metal or plastic disks. Magnetic Disk Storage – Floppy Disk: Small phonograph record enclosed in a protective envelope. It is a widely used form of magnetic disk media that provides a direct access storage capability for microcomputer systems. Magnetic Disk Storage – Hard Disk Secondary storage medium; generally nonremovable disks made out of metal and covered with a magnetic   recording surface. It holds data in the form of magnetised spots. Magnetic Disk Storage – RAID Redundant array of independent disks. Magnetic disk units that house many interconnected microcomputer hard disk drives, thus providing large, fault tolerant storage capacities. Magnetic Ink Character Recognition (MICR): The machine recognition of characters printed with magnetic ink. Primarily used for check processing by the banking industry. Magnetic Stripe: A magnetic stripe card is a plastic wallet-size card with a strip of magnetic tape on one surface; widely used for credit/debit cards. Magnetic Tape: A plastic tape with a magnetic surface on which data can be stored by selective magnetisation of portions of the surface. Mainframe Computer: A larger-size computer system, typically with a separate central processing unit, as distinguished from microcomputer and minicomputer systems. Microcomputer: A very small computer, ranging in size from a â€Å"Computer on a chip† to a small typewriter-size unit. Microprocessor: A semiconductor chip with circuitry for processing data. Midrange Computer: Larger and more powerful than most microcomputers but are smaller and less powerful than most large mainframe computer systems. Minicomputer: A small electronic general-purpose computer. Network Computer: A new category of microcomputer designed mainly for use with the Internet and Intranets on tasks requiring limited or specialised applications and no or minimal disk storage. Network Server: A type of midrange computer used to co-ordinate telecommunications and resource sharing and manages large web sites, Intranets, extranets, and client/server networks. Network Terminal: A terminal that depends on network servers for its software and processing power. Off-line: Pertaining to equipment or devices not under control of the central processing unit. Online: Pertaining to equipment or devices under control of the central processing unit. Optical Character Recognition (OCR): The machine identification of printed characters through the use of light-sensitive devices. Optical Disk Storage: Technology based on using a laser to read tiny spots on a plastic disk. The disks are currently capable of storing billions of characters of information. Optical Disk Storage – CD-ROM: An optical disk technology for microcomputers featuring compact disks with a storage capacity of over 500 megabytes. Optical Disk Storage – CD-R: Compact disk recordable (CD-R) enables computers with CD-R disk drive units to record their own data once on a CD, than be able to read the data indefinitely. Optical Disk Storage – CD-RW: Compact disk rewritable (CD-RW) enables computers with CD-RW disk drive units to record and erase data by using a laser to heat a microscopic point on the disk’s surface. Optical Disk Storage – DVD: Digital video disk or digital versatile disk (DVD) enables computers with DVD disk drive units to hold from 3.0 to 8.5 gigabytes of multimedia data on each side of a compact disk. Optical Disk Storage – WORM Disk: Optical disk that allows users to write once, read many times. Optical Scanning: Using a device (scanner) that scans characters or images and generates their digital representations. Pen-Based Computing: Tablet-style microcomputers that recognise hand-writing and hand-drawing done by a pen-shaped device on their pressure sensitive display screens. Peripheral Devices: In a computer system, any unit of equipment, distinct from the central processing unit, that provides the system with input, output, or storage capabilities. Personal Digital Assistant: Handheld microcomputer devices, which are designed for convenient mobile communications and computing. Pointing Devices: Devices, which allow end users to issue commands or make choices by moving a cursor on the display, screen. Pointing Device – Electronic Mouse: A small device that is electronically connected to a computer and is moved by hand on a flat surface in order to move the cursor on a video screen in the same direction. Buttons on the mouse allow users to issue commands and make  responses or selections. Pointing Device – Pointing Stick: A small buttonlike device sometimes likened to the eraser head of a pencil. The cursor moves in the direction of the pressure you place on the track point. Pointing Device – Touchpad: Is a small rectangular touch-sensitive surface usually placed below the keyboard. The cursor moves in the direction your finger moves on the pad. Pointing Device – Trackball: A roller device set in a case used to move the cursor on a computer’s display screen. Primary Storage: The main (or internal) memory of a computer. Usually in the form of semiconductor storage. Printers: Devices that produce hard copy output such as paper documents or reports. Secondary Storage: External or auxiliary storage device that supplements the primary storage of a computer. Semiconductor Memory: Microelectronic storage circuitry etched on tiny chips of silicon or other semiconducting material. Semiconductor Memory – RAM: Also known as main memory or primary storage; type of memory that temporarily holds data and instructions needed shortly by the CPU. RAM is a volatile type of storage. Semiconductor Memory – ROM: Also known as firmware; a memory chip that permanently stores instructions and data that are programmed during the chip’s manufacture. Three variations on the ROM chip are PROM, EPROM, and EEPROM. ROM is a nonvolatile form of storage. Sequential Access: A sequential method of storing and retrieving data from a file. Smart Cards: Cards such as debit and credit cards, which have an embedded microprocessor chip and several kilobytes of memory. Speech Recognition: Direct conversion of spoken data into electronic form suitable for entry into a computer system. Promises to be the easiest, most natural way to communicate with computers. Storage Capacity Elements: Units used for storage capacity and data: bits, bytes, kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes (TB). Storage Capacity Elements – Bit: A contraction of â€Å"binary digit†. It can have the value of either 0 or 1. Storage Capacity Elements – Byte: A sequence of adjacent binary digits operated on as a unit and usually shorter than a computer word. In many computer systems, a byte is a grouping of eight bits that can represent one alphabetic or special character or can be â€Å"packed† with two decimal digits. Storage Capacity Elements – Kilobyte (K or KB): When referring to computer storage capacity it is equivalent to 2 to the 10th power, or 1,014 in decimal notation. Storage Capacity Elements – Megabyte (MB): One million bytes. More accurately, 2 to the 20th power, 1,048,576 in decimal notation. Storage Capacity Elements – Gigabyte (GB): One billion bytes. More accurately, 2 to the 30th power, or 1,073,741,824 in decimal notation. Storage Capacity Elements – Terabyte (TB): One trillion bytes. More accurately, 2 to the 40th power, or 1,009,511,627,776 in decimal notation. Storage Media Trade-offs: The trade-offs in cost, speed, and capacity of various storage media. Supercomputer: A special category of large computer systems that are the most powerful available. They are designed to solve massive computational problems. Time Elements: Units used for measuring processing speeds: milliseconds, microseconds, nanoseconds, and picoseconds. Time Elements – Millisecond: A thousandth of a second. Time Elements – Microsecond: A millionth of a second. Time Elements – Nanosecond: One billionth of a second. Time Elements – Picosecond: One trillionth of a second. Touch-Sensitive Screen: An input device that accepts data input by the placement of a finger on or close to the CRT screen. Transaction Terminals: Terminals used in banks, retail stores, factories, and other work sites that are used to capture transaction data at their point of origin. Examples are point-of-sale (POS) terminals and automated teller machines (ATMs). Video Output: Video displays are the most common type of computer output. Volatility: Memory (such as electronic semiconductor memory) that loses its contents when electrical power is interrupted. Wand: A handheld optical character recognition device used for data entry by many transaction terminals. Workstation: A computer terminal or micro- or minicomputer system designed to support the work of one person. Also, a highpowered computer to support the work of professionals in engineering, science, and other areas that require extensive computing power and graphics capabilities. V. DISCUSSION QUESTIONS Do you agree with the statement: â€Å"The network is the computer†?   What trends are occurring in the development and use of the major types of computer systems? Do you think that network computers (NCs) will replace personal computers (PCs) in business applications? Are networks of PCs and servers making mainframe computers obsolete?   What  trends are occurring in the development and use of peripheral devices? Why are those trends occurring? When would you recommend the use of each of the following:   Network computers NetPCs Network terminals Information appliances in business applications What processor, memory, magnetic disk storage, and video display capabilities would you require for a personal computer that you would use for business purposes?   What other peripheral devices and capabilities would you want to have for your business PC?

Friday, November 8, 2019

A Stranger Is Watching Essays - A Stranger Is Watching, Free Essays

A Stranger Is Watching Essays - A Stranger Is Watching, Free Essays A Stranger is Watching A Stranger is Watching is a terrific book. I enjoyed reading this book very much. The non-stop action kept me reading for hours. One of the best features of the book is how it was written.The point of view changes every chapter.For example Chapter 1 is written in the point of view of the infamous Foxy character.Chapter 2 is written in the point if view of our protagonist, Steve; and so on.I also liked how the author built the relationship of the characters up,so you care about what happens to them and feel like you're going through what they are going through.For instance,the author tells us of Steve's wife's death.We find out that Steve's son, Neil was never the same after this tragedy.When a new women,Sharon comes into Steve's life,Neil rejects her.Neil thinks that if Sharon and his father get married ,his father will send him away.When Neil and Sharon are held hostage together, Neil's feelings for Sharon change;he begins to see her as a nice person and a motherlike figure.I felt the author built this relationship up well so that the story would have a happy ending. I also like how the author made the character traits of the protagonist completely conflict with the antagonist.The protagonist,Steve is a successful man with a family and no problems;at least in the mind of the antagonist.The antagonist has problems with females,a career he feels is going nowhere,and a lack of good friends.throughout the story we find out that the antagonist is very jealous of the protagonist's lifeand that's why he indirectly targets him.This contrast was an addition to the already excitng plot of the story.. In my opinion the best part of "A Stranger is Watching"is the end,chapter 52.this chapter contains one of the greatest climaxes I ever read.The chapter begins at a frantic moment.All of the characters lives are at risk because Foxy's bomb is about to go off.After a fight with Foxy,Steve manages to release Sharon and Neil.At the same time Ronald Thompson(a juvenile convicted if murder)is about to be executed for the murder of Steve's wife,Nina.A few chapters earlier we find out that Nina is Foxy's victim but he got off clean with it. Steve races out of Grand Central Station (where the bomb is going to go off)with Sharon and Neil.At this point the author stops her narrative and begins with the time eleven forty-two,twelve minutes after the bomb goes off,at this point we don't know what happened to our characters.In this next paragraph we are informed that Steve,Neil ,and Sharon get away while Foxy dies from his own bomb.We also find out that Ronald Thompson is saved from his ex! ecution and released from prison. I enjoyed this part of the story so much because it was the point of the highest excitement. Every event that took place in the story built up to this major event.All excitement in the story was covered at this point.I feel the climax is the best part of every story,and should be.This was definitely one of the best books I have ever read.

Wednesday, November 6, 2019

A True Heroine In Wuthering Heights Essays

A True Heroine In Wuthering Heights Essays A True Heroine In Wuthering Heights Paper A True Heroine In Wuthering Heights Paper Essay Topic: Wuthering Heights The story of Emile Brontes Wuthering Heights takes place during a time in history when women existed and were important to family and society, but had no legal or social rights, as their well-being, health and happiness depended upon the men in their lives. From the start of the novel, as told by Mr. Lockwood we see that Cathy did not seem to belong in the Heathcliff household, but by the end of the story, it was Cathy who owned the entire Wuthering Heights estate. Her accomplishments were impressive, as she over came whatever obstacles the men in her life put in her way! Bronte emphasized Cathys passion, and determination, making her the only character who was able to rise above the hatred, discrimination and cruelty. Cathy inherited her mothers pride and beauty, and her fathers mildness and devotion but she also had a spirit all her own, a fighting spirit of a hidden warrior. It was important for Cathy to have these characteristics (especially her will to survive) because it was these inner strengths that enabled her to be my heroine. One of Cathys strongest forces was her intense loyalty and love for her father I care for nothing in comparison to papa, Ill never to an act or say a word to vex him (231). I love papa better then you (273). Cathy was the only character in this novel and Jane Eyre that actually showed love, and dedication to a parent. Her respect for her father is an important aspect in Cathys character as it made her an honourable woman. A strong-willed Cathy enjoyed disobeying orders from Nelly as a child, and continued to do so as she grew up by sneaking letters to Linton. I wish you to avoid his house and family (223). She continued to develop a relationship with Linton, although it became clear very early that they were not meant to be together. He had no spirit, was spiteful and demanded constant attention, but it was because Linton was so defenseless and an easy target for Heathcliff that Cathy had feelings for him. They were not feelings of true love, but a desire, or duty to protect and support Linton, in his days of need. It was as if Cathy sacrificed herself for Lintons well being. Cathys sympathy and humanity for Linton was impressive and courageous. Im not crying for myself Ellen, its for him- He expected to see me again tomorrow, hell be so disappointed (224). Even though my heroines goal was to please Linton, when he pushed too hard, she also had the resolve to fight back Cathy, beside herself, gave the chair a violent push (239). And, unlike everyone else who feared Heathcliff she had no problem in attacking him. You cant make us hate each other, I defy you to hurt him, I defy you to frighten me (287). Catherine told Hareton who she was and where she was going and asked him to show her the way (197). It was fate that she met Hareton through her relationship with Linton, but my heroine had to be patient before she experienced her own happiness. It was Cathys strength which enabled her to survive the torture and suffering during her days as Lintons wife and Heathcliffs prisoner. This awful experience only made her a better person. It prepared her for her destiny as Haretons wife and as landlord of Wuthering Heights. Bronte wanted the reader to have confidence in Cathys future success by displaying her heroic attributes; having the stamina to endure those long, lonely days separated from her dying father. At one point, Heathcliff owned all of Wuthering Heights and the Grange, but Cathy still showed spirit and optimism by planting a delicate flower bed in the middle of the dark and depressed black currant trees. This rebellious act showed Cathys passion for life, as she looked at her beautiful flowers as a new healthy and fresh beginning (Lybyer, online). Perhaps Cathys garden represented her future achievements as a blossoming flower amongst the weeds. As she was determined to overcome injustice, she stated You shouldnt grudge a few yards of earth for me to ornament, when you have taken all my land and my money, and Haretons land and his money (319). Cathy was a heroine who showed that it is possible to rise above adversity not with revenge, but with forgiveness, and dignity. As Ellen observed, Miss Cathy, conversant with no bad deeds, except her own slight acts of disobedience, repented on the day they were committed, was amazed at the blackness of spirit that could brood on and cover revenge for years (223). Cathy had something just as powerful as the will to survive, she was humane, and she was able to forgive and forget. At the end of the novel, Cathy married Hareton. Their relationship was one of happiness and true love. Ill come and teach him to read it right, if he refuses Ill go upstairs and never tease him again (314). She knew that Heathcliff tried to corrupt Hareton, He will never be bale to emerge from his bathos of coarseness and ignorance (219). She realized that Heathcliff only succeeded on the surface. Deep down in spite of his influence Hareton remained a kind, innocent, loving man, a perfect match for my heroine. The pupil claimed a reward and received at least five kisses, which he generously returned (308). Cathy was now at peace with herself and with life; something that none of the first generation of characters was able to achieve (especially her own mother) Cathy triumphed over adversity in a subtle, almost innocent way. She won back the land that was rightfully hers and Haretons. It is true that eventually Heathcliff merely gave up the fight, but it was Cathys spirit for life and hatred of revenge which allowed justice to prevail. When other characters in the novel were gloomy, sinister and sad, Cathy was a breath of fresh air, giving the reader a feeling of calmness. She also proved that good can win over evil and that humanity goes hand in hand with success. For all these reasons, Cathy must be respected and honored as a true heroine of Wuthering Heights. Bibliography : References : Bronte, Emily. Wuthering Heights. Ed. Ian Jack. Oxford: Oxford University Press, 1981. Jack, Ian, ed. Introduction. Wuthering Heights. By Emily Bronte. Oxford: Oxford University Press, 1981 Lybyer, J. M. Cliffs Notes on Wuthering Heights. Ed. Gary Carey. Inc. Lincoln, Nebraska, 1982 (Also, Available Online. April 2002. cliffsnotes. com. Downloaded product) Works Consulted: Abitbol, Jen. Colonial Visions of the Other (Wuthering Heights), University of Montreal. April 2002. Novel Guide: Novel Analysis: Wuthering Heights. April 2002. Online. Available: novelguide. com/wutheringheights/novelsummary. html Novel Guide: Character Analysis: Wuthering Heights. April 2002. Online. Available: novelguide. com/wutheringheights/characterprofiles. html