Monday, September 30, 2019

Impact of video games on children Essay

Video games have been available to consumers for the last 30 years. They are a unique form of entertainment, because they encourage players to become a part of the game’s script. Today’s sophisticated video games require players to pay constant attention to the game, rather than passively watching a movie. This has both positive and negative impacts on players. Several studies have been published that explore these impacts on today’s children. Most people this day and age grow up with technology. But now days what people see in the media about children being obese or not social. The media and physical fitness experts always express, the youth this day never go out and play and get about sixty minutes of play a day. This means exercise. I for one think video games isn’t the problem. With children being overweight, video games aren’t always filled with violet’s, there are games that teach you to work as a team with someone you’ve never meet. Even learning sportsmanship which I believe should be learned at a young age. Because facing the realities that you can’t always win there are going to be some people that are better and that you should encourage yourself to become better not just at video games life in general. Within the media they say kids need to go out and play. I think that’s true so what they need to do now a days with games is make it so kids get tired of the games after a while. That way they should try to lean toward making children wanting to go outside. When I was growing up in the 1980s video games where just starting to catch on. All the kids had to have the latest games or â€Å"Gameboys† ext. I remember we would try to find ways to make our parents let use stay inside and play. I believe it hindered me once I got older and wanted to play sports. I was so out of shape then it all came back to me I was hardly active when I was younger. Right now Approximately 17% (or 12. 5 million) of children and adolescents aged 2—19 years are obese. The studies show by kids not eating healthy or even from going outside to play. There are just so many reasons why children are so badly obese. I know video game’s is one of the biggest reason for are youth to being so heavy. Kids rather stay inside being on their video game consoles. I know it’s crazy to say but I believe that it has to do with the area kids are raised. Let’s say you are in a bad neighborhood. Where you know it’s not safe to be outside I know I would want my child to stay indoors so I know that he or she is safe. But I know my child would want to be entertained lots of people know young kids lose their interest in things after time. Which is understandable.

Sunday, September 29, 2019

Network Design Essay

The objective at hand was to build a network from the ground up. This was accomplished by breaking down all of the sections and building upon all previous assignments. This was a good course as I learned a lot about all of the different sections of building a network. The pros are now I know how to build a network on the design side from the ground up. I learned quite a bit about using a lot of the technologies associated with networking and it allowed me to learn quite a few new concepts. Some of the downfalls about this course and what I have learned are I did not feel I accomplished much as there is no hands on training associated with the course. I do not feel like concepts and design ideas are a great resource to actually learn how to use any of the systems but they do give a pretty good idea. Cabling SpecificationsEthernet is a Local Area Network (LAN) technology with a transmission rate of 10 Mbps and has a typical star topology. Computers and devices must wait-and-listen for transmission time on the network as only one device can transmit at any one time. In order to operate with this network strategy, Ethernet incorporates CSMA/CD (Carrie Sense Multiple Access with Collision Detection). Each device on the network listens for the network to be clear before transmitting data. If more than one computer or device transmits data at the same time, then collisions occur. Once collisions are detected, all devices stop transmitting for a period of time until one of the devices senses the line is free and will then gain control of the line to transmit its data. Receiving devices just sit there waiting and listening for transmissions that are meant for them, which are determined by an IP (Internet Protocol) address. The main advantage to Ethernet is it is one of the cheapest networks to put into service. Compared to other hardware for Token Ring, Ethernet equipment such as hubs, switches, network interface cards, and cable (Cat5 common) is inexpensive. The main disadvantage to Ethernet is related to the collisions that occur on the network. Even though Ethernet cable (Cat5) is fairly inexpensive, it can become a cost issue if designing a large network as each device or computer requires its own cable connection to the central hub. Another disadvantage is distance limitation for node connections. The longest connection that can occur within an Ethernet network without a repeater is 100 meters. Today’s Ethernet standards, 100 Mbps and 1000 Mbps, incorporate switched technology, which for the most part, eliminates collisions on the network. The IEEE (Institute of Electrical and Electronics Engineers) specification for Ethernet is 802.3 with three-part names designating the different types. For example, 10BASE-T is for 10 Mbps, and 100BASE-TX is for 100 Mbps. Token RingToken was developed by IBM as an alternative to Ethernet. The network is physically wired in star topology, but is arranged in a logical ring. Instead of a hub or switch like in an Ethernet network, a MAU (Multistation Access Unit) is used. Access to the network is controlled by possession of a token that is passed around the ring from computer to computer as data can only travel in one direction at a time. A computer that wishes to transmit data on the network takes possession of the token and replaces the token frame with data. The data goes around the ring and returns to the transmitting computer, which removes the data, creates a new token, and then forwards it to the next computer. The IEEE specification for Token Ring is 802.5 and it comes in two different speeds: 4 Mbps and 16 Mbps. The main advantage to Token Ring is there are never any collisions within the network, which makes it a highly reliable solution for high-traffic networks. The disadvantage to Token Ring is the network cards and MAU are more expensive than equivalent Ethernet hardware. FDDIFDDI (Fiber-Distributed Data Interface) is an architecture designed for high-speed backbones that operate at 100 Mbps, which are used to connect and extend LANs. A ring topology is used with two fiber optic cable rings. It  passes a token on both rings and in opposite directions. The specification for FDDI is designated by the American National Standards Institute as ANSI X3T9.5. The advantage to FDDI is that it uses two rings for protection in case one ring breaks. When a break occurs, data is rerouted in the opposite direction using the other ring. It is also considered reliable because it uses a token-passing strategy. The disadvantage to FDDI is the expensive network cards and fiber optic cable. In addition, the amount of fiber optic cable is doubled because it has redundant rings. WirelessLocal Area Network (LAN) TopologiesA mesh topology has a point-to-point connection to every other device (node) within the topology. The point-to-point link is dedicated between each device so it will only carry traffic to the two devices that is connected by that link. The advantage of a mesh topology is it works on the concept of routes, which means that traffic can take one of several paths between the source and destination. The network is also robust in that it will not be crippled if one path becomes unavailable or unstable due to each device being connected to every other device. The Internet uses a mesh topology to operate efficiently. The main disadvantage to a mesh topology is the fact that it requires a large number of cables, which is very expensive. A bus topology is a multipoint topology that entails each device being connected to a common link or path. The common link can be thought of as the backbone to the network. All devices typically connect to the backbone with a T-connector and coax cable. The main advantages of a bus topology are that it is easy to install and is not expensive (cost effective) because it uses very little cable to build. The main disadvantage is if there is a problem with the one backbone cable, then the entire network will no longer have the ability to communicate.  These networks are also very difficult to troubleshoot because any small problem such as a cable break, loose connector, or cable short can cause the outage. The entire length of cable and each connector must be inspected during troubleshooting. Another disadvantage is the lack of amplification of the signal, which results in a limited network size based on the characteristics of the cable because of how far a signal can travel down that cable. A ring topology means that each device is connected in a ring, or daisy-chain fashion, one after another. A dedicated connection only exists between a device and the device on each side of it. Data flows around the ring in one direction. Each device contains a repeater that regenerates the signal before passing it to the next device. The main advantage of a ring topology is that it is easy to install. One disadvantage includes difficulty to troubleshoot because data flows in one direction and it could take time to find the faulty device when there are problems. The entire network could be taken off line if there is a faulty device or cable break within the ring. The star topology has each device in the network connected to a central device called a hub, which can actually be a hub or switch. All traffic must pass through the hub in order to communicate with any other device on the network. There is no direct communication between devices like in a mesh topology. One advantage to a star topology is any failure to one cable or device connected to the hub will not bring the entire network down. Repairs can be done to individual nodes without disrupting traffic flow. Another advantage is expandability of the network. Additional devices can be added to the network without disrupting any of the current users. All that is required is an additional cable run from the device to the hub. One disadvantage includes cable costs because each device must have its own cable connected back to the hub. The other disadvantage is the hub itself.  Since all traffic runs through one device, it becomes the single point of failure. If the hub goes down, so does the entire network. Wide Area Network (WAN) DesignA WAN, also known as a Wide Area Network, is an essential part to bigger corporate networks most government networks and companies with multiple sites as well. A WAN, basically, is 2 or more LANs (Local Area Networks) stuck together and running as one big network over a big geographical area. Although a WAN could cover very small distances, most WANs cover much larger geographical areas such as a country or possibly even the world. The largest WAN today would technically be the internet or the World Wide Web. The internet is, in short, one giant WAN because it consists of many smaller LANs and servers. Most WANs can cover a fairly large geographical area, but some, such as the World Wide Web can cover the globe. The United States Government has quite a big WAN as a lot of their LANs are in other countries. They need to get data from one place to another almost instantaneously, and this is one of the quickest and easiest ways to be able to do so. To be able to get on the internet, a subscriber must go through an ISP (Internet Service Provider) and they will give the subscriber access to the internet for a certain price every month. There are different ways to get access to the internet depending on the geographical location in which you live. A subscriber can go through dial up, which is one of the slowest methods, but it is also one of the most common. There is also DSL (Digital Subscriber Line) through most phone companies if they have access in the area and cable which is usually one of the fastest and most expensive methods to access the internet. The last common method is using a satellite to obtain access. This is usually the most expensive ways to access the internet because the equipment usually needs to be bought. When talking about telephone lines, we start getting into analog versus digital signals and degradation over longer distances. A telephone system works on analog signals. These work by a computer transmitting a digital  signal to the modem which converts the signal into an analog signal (this is the beeping heard when a computer dials up to access the internet) and later being converted by a different computer back into a digital signal with the use of a modem. DSL is digital all the way, along with T1 and T3 lines. When using DSL or T1/T3 lines, a filter of some sort is used to filter out the digital and analog signals, so the phone and computer are receiving different signals. Companies usually use faster lines to access the internet or to have access to their other sites. Smaller companies can use DSL or Cable internet services, but when talking about larger corporations or the government, most use public systems such as telephone lines or satellites. Usually, when talking about larger companies and going through a public system, we are talking much faster speeds that can hold many more users. T1 and T3 lines are usually used, satellites are commonly used and fiber-optic is becoming much more common. When getting into many users on a WAN, we need to start talking about Network Latency. According to Javvin.com network latency is defined as “latency is a measure of how fast a network is running. The term refers to the time elapsed between the sending of a message to a router and the return of that message (even if the process only takes milliseconds, slowdowns can be very apparent over multi-user networks). Latency problems can signal network-wide slowdowns, and must be treated seriously, as latency issues cause not only slow service but data losses as well. At the user level, latency issues may come from software malfunctions; at the network level, such slowdowns may be a result of network overextension or bottlenecking, or DoS or DDoS activity.”Dos or DDos stands for Denial of Service and Distributed Denial of Service respectively. These types of attacks are usually by hackers or someone who does not want others to access a certain service. There was a recent DoS threat on the CNN webpage as some hackers wanted CNN to stop talking about a certain issue. This works by one or multiple people talking all of the networks latency or bandwidth from them and thus causing other not to be able to access their site or services. There are other issues that may slow down a users PC as well. Not all issues revolve around hacker attacks. A lot of problems could be caused by malicious software, such as, Spyware, Malware, Viruses, or other programs that may be problematic. These can usually be taken care of by installing anti-virus software or even a spyware removal tool. The issue here is instead of the malicious software causing slowdowns on a PC, there are slowdowns due to the software protecting a certain computer in the background. Sometimes a simple fix to this problem is to defragment a hard drive. This can tremendously speed up a PC, because the files will be closer together and easier and quicker to access. On a network, a simple way to test latency is to use the trace route program. To do this, simply go to a command prompt and type tracert and then an IP address if internal or a website if external. This will send out packets of information and check how much time has passed to receive a packet back. The time passed would be the latency time. Usually it says it only took a certain amount of milliseconds which does not seem like very much time, but it was only a tiny packet of information. The higher the milliseconds the higher the latency time. The higher the latency time, the longer it will take to do anything in a network. If a high latency time is present, there is bound to be lag somewhere down the line. In a WAN, the equipment that will be used is as follows. In each LAN there will be PCs connected to a router somewhere (this is a ring topology example) and that router should be connected into a switch. There may be more but this is a basic example. Each of these LANs then connects to a central HUB somewhere which should interconnect all of the LANs. All of the information then travels to the central hub which is then separated out to the correct switch, router and then PC. There are usually central servers that can store and backup all of the data on the network as well, but this was an example of a crude network. Most companies also a very repetitious and redundant with their WANs. This is because they do not want a central failure point to bring the entire company to itÂ’s knees. There are usually multiple switches that can tie the  entire system together. If a huge corporations Wan decided to fail, the company could lose a few million dollars in a matter of minutes. This is the main reason redundancy in this situation makes more than enough sense. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. A WAN is an imperative part to any corporation, government agency or company with multiple locations, as it allows them to transfer data quickly, easily and over great distances at the click of a button. There seems to be more and more need for employees in the networking field today, because more and more corporations need to transfer data quicker and easier. There will be new technology soon that will improve our current technology such as fiber optic. Network ProtocolsThere are many solutions to remote access and the most common and one of the most cost efficient methods is the VPN (Virtual Private Network). VPN technology is already built in to most operating systems and is very easy to implement. With bigger environments and corporations, a consideration for concentrated VPN hardware should be in place because of the simultaneous users and stress on the servers. There are a few different types of VPN including IPsec, PPTP and SSL. Once the connection from remote access has been made, you need to make sure the files are readily accessible for the user logging in remotely. One way to do so is to use Samba which is an open source file access system. There  are other ways to allow access as well. Using remote desktop connection, the user has the ability to log directly in to their PC and use it as if they were sitting at their desk, rather than away from the company. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. Network Remote AccessMost companies need to be able to access their work from many locations, including home and while traveling. The solution that allows them to access the network is one of two ways to access their network. The first is through a VPN (virtual private network) that allows the user access to remotely log in easily and quickly. The other way is through a dial up remote connection; this way is a bit easier to set up but can become very costly in the long run. The problem with being able to do this is it can be very costly and can eat up much of the IT departments time to set up, configure and implement this system into the current hardware. The definition from whatis.com about a VPN is “ virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization’s network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling  Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a â€Å"tunnel† that cannot be â€Å"entered† by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.”A VPN, also known as a Virtual Private Network is a helpful tool that allows users of a specific domain to be able to log in to their PC from anywhere in the world with the help of another PC. With this tool, they would log in with a special piece of software, using their user name and password to gain access to all functionality of the PC they want to log in to. This allows for a lot of comfortable solutions, such as if an employee is sick, they may still have an option to work from home. This allows a flexible company schedule as well because if a user needs to access a document from their home PC, they can essentially log in to their work PC and download the document. Network Business ApplicationsA second way to access oneÂ’s computer from a different location would be using a dial up service, with this you can basically dial in to access all of their resources available within the server. Using this is a very secure and easy route to go, and allows the user access to files they may desperately need. Another good thing about using a remote connection to access a server is if the user is on a business trip, they have the ability to access all of their much needed documents easily and securely with out much fuss. The explanation between these two pieces of technology is “with dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server. After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. After the virtual point-to-point connection is created, the rest of the connection parameters can be negotiated. ”There are many advantages and disadvantages to using a dial up remote connection over VPN. The biggest advantage I have been able to find is, it is easier to set  up and maintain while using VPN makes you set up and maintain individual accounts for both the VPN and the users name and password on the system. Another advantage of dialing up in to the system would be the fact that no matter where the user is all they need to do is plug into a phone jack and they should be able to log in. The disadvantage of this is depending on where the user is long distance charges may apply and it could rank up a pretty penny or two. Another disadvantage is although the system is cheaper in the short term, the system may be more expensive than VPN in the long run. There are also other methods of using VPN. One specific way is certain ISPs (Internet Service Providers) and other third party support companies are assisting in setting up the VPN and supporting it without a great deal of time spent on it by the current department. This may or may not be more cost efficient than setting it up yourself, but it does remove a lot of the headache that VPN’s can give due to different errors. There are also many advantages and disadvantages to using a VPN over a dial up system. One of the biggest advantages to this system over a dial up system is in the long run this is a much cheaper system than a dial up system. This system is a little bit quicker than a dial up system as well. This system is cheaper than a dial up system because using a dial up system, long distance fees may apply, with the virtual private network, you do not need to worry about this as the user may call into a local internet service provider to gain access. Any internet connection will gain a user access to the companyÂ’s network through a VPN. Through all of this, there still needs to be security measures put in place to keep unwanted users off of the system while allowing employees or other authorized users access without down time. VPN’s can work well with firewalls, all the IT department would need to do is allow the ports to be accessed by the VPN and the user should have full access. All in all, there are two very cost effective solutions at a companyÂ’s finger tips and both are fairly easy to set up. The company needs to decide if they want to save money up front and make it easier so they do not need  to set up multiple accounts per user, or if they would rather have a better solution and save more money down the road. The choice also depends on the amount of users logging in at any given moment. Backup and Disaster RecoverySecurity, back ups and disaster recovery are all important very parts of all networks in today’s world. The problem with today is information on how to hack, destroy and program any type of malicious software (or malware) is easily accessible via the Internet and other easy to access sources. There are roughly 1.4 billion people on the Internet or that at least have access to the Internet in the world, which is about 25% of the world’s population. All of these people have extremely easy access to hacking networks, creating malware and destroying any personal or private data a user may have and wish to keep. There is not really any way to stop these people from harming our personal software and data from their side, this is why a user needs to make sure they have security on the user’s side. There are other things that happen besides people trying to maliciously harm a user’s files and data. Accidents can happen and destroy data as well. There could be many things that can harm a user’s data such as a fire, earthquake, power surge or worst case scenario, some sort of electro magnetic pulse (EMP). This is where data back ups and disaster recovery come in nicely. There are many companies that specialize in helping a user or company back up their data and store it off site such as SunGard (mostly used in bigger company settings). There are other ways to store a user’s data as well. One way is to make a physical copy of everything needed on CD’s, DVD’s, Flash Drive or some other type of media and store it at a friend’s house or some other person’s house they trust. This keeps a hard copy of all of their data off site just in case something happens and it can now be restored. There are a few other companies as well that offer on line backups. For this a user downloads their software and it automatically backs up to a few different location for redundancy which allows the customer more safety and easier access to all of their files. One of the first steps to a business that wishes to be very secure in all  that they do is to set up a backup and disaster recovery plan to start it all off. Like I stated earlier, there are many way s to do it. If this is a larger company they probably want to hire someone internally to make a physical back up of all the data and send it to an off site company for storage. They should also keep another copy close to them at all times, preferably away from where the physical data lies. They should put it on the opposite side of the building than where the file server is. If anything happens to the servers, they can quickly and easily use their backed up copy of all the data and recover it on to the servers in which they lie. Most companies have 2 or 3 backup units on site for redundancy and this allows that if one of those go down as well there are still a couple others in which they can restore all of the data from. Although this can become a little more expensive than just a regular back up system, sometimes it can be well worth it. Network SecurityAccording to devx.com “the first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them using a simple system: rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high. For example, a small Internet company (less than 50 employees) located in California could rate an earthquake threat as medium probability and high impact, while the threat of utility failure due to a power outage could rate high probability and high impact. So in this company’s risk analysis, a power outage would be a higher risk than an earthquake and would therefore be a higher priority in the disaster recovery plan.”Another big part of any security system development is the company (or department) needs to look at their budget and how much they are willing to spend on their system. A company can get a basic security system for their network (including firewall) for fairly cheap and this may do most of what is needed, but larger companies are going to need to spend quite a  bit more money than that of a small company. Most larger companies spend quite a bit because they usually have higher priced clients that they can not afford to lose and all of their data is invaluable to the company. Some companies actually have their own Information System Security employees to monitor the network in case of any type of attack. They also make sure all of the anti-virus and anti-malware softwares are running and updating properly. Lastly, another thing most companies forget about after they have their equipment and software installed is there is more than just the implementation of the hardware and software to save them. They need to make sure everything continues to run and update itself from newer and bigger threats. These companies need to make sure they continually test and check what needs to be done to continually maintain a network that can not be broken in to. There are people out there that can be hired to try and break into a companies network. They get paid and let the company know what needs to be fixed so others can not break into it as well. In conclusion, a company can be nothing or brought to it’s knees with out it’s network and servers. There are many things that can cripple a company without the help of man. The only way to avoid these is to have a proper disaster recovery plan and to make sure the network is not vulnerable in any way. References About, Inc. (2004). Network topologies : bus, ring, star, and all the rest. RetrievedOctober 12, 2004, from http://compnetworking.about.com /library/weekly/aa041601a.htmBrain, M. (2004). How stuff works : how wifi works. Retrieved October 12, 2004,from http://computer.howstuffworks.com/wireless-network.htm/printableNetwork Latency. (n.d.). Retrieved April 27, 2008, fromhttp://www.javvin.com/etraffic/network-latency.htmlBroadband Internet. (n.d.). Retrieved April 27, 2008, fromhttp://www.pcworld.idg.com.au/index.php/id;988596323Wide Area Networks.(n.d.). Retrieved April 27, 2008, fromhttp://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.htmlVirtual Private Network. (n.d.).retrieved May 11, 2008, fromhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213324,00.html#VPN vs. Dial up. (n.d.). Retrieved May 11, 2008, fromhttp://technet2.microsoft.com/windowsserver/en/library/d85d2477-796d-41bd-83fb-17d78fb1cd951033.mspx?mfr=trueHow to Create a Disaster Recovery Plan, RetrievedMay 23, 2008, from http://www.devx.com/security/Article/16390/1954World Internet Usage Statistics, RetrievedMay 23, 2008, from http://www.internetworldstats.com/stats.htm

Saturday, September 28, 2019

Statistical Estimation of Healthy Life Expectancy Research Paper

Statistical Estimation of Healthy Life Expectancy - Research Paper Example Model selection was performed using the software Statistical Package for the Social Sciences (SPSS) Version 11.01. Values for Mallows' Cp were computed manually based on values derived from the computerized models. Scatter plot of the models are, however, performed in Microsoft Excel (2003) for more presentable rendition. To facilitate estimation of the most significant predictors of healthy life expectancy (HALE), one-variable linear regression was performed on each of the 22 predictor variables. To assist in the refinement of the first multi-variable model, a scatter plot of p vs. Mallows' Cp is shown in Figure 1. It may be gleaned from the scatter plot in Figure 1 that four predictor variables X2, X9, X20, and X22 are outliers, while the rest of the other predictor variables were concentrated in the area on the plot encircled in red. The predictors were divided into three blocks: (1) block 1 variables consist of those assumed from the results of the one-variable regression models which can most significantly predict HALE; (2) block 2 variables were those assumed to be moderate predictors of HALE; and (3) block 3 variables were those assumed to be least significant predictors of HALE. Criteria used in grouping the results of... Model selection was performed using the software Statistical Package for the Social Sciences (SPSS) Version 11.01. Values for Mallows' Cp were computed manually based on values derived from the computerized models. Scatter plot of the models are, however, performed in Microsoft Excel (2003) for more presentable rendition. Preliminary Analysis To facilitate estimation of the most significant predictors of healthy life expectancy (HALE), one-variable linear regression was performed on each of the 22 predictor variables. To assist in the refinement of the first multi-variable model, a scatter plot of p vs. Mallows' Cp is shown in Figure 1. Figure 1. Scatter plot of p vs Mallows' Cp It may be gleaned from the scatter plot in Figure 1 that four predictor variables X2, X9, X20, and X22 are outliers, while the rest of the other predictor variables were concentrated in the area on the plot encircled in red. Modeling and Analysis The predictors were divided into three blocks: (1) block 1 variables consist of those assumed from the results of the one-variable regression models which can most significantly predict HALE; (2) block 2 variables were those assumed to be moderate predictors of HALE; and (3) block 3 variables were those assumed to be least significant predictors of HALE. Criteria used in grouping the results of the one-variable regression models were: (1) computed values of Mallows' Cp which most closely approached the value of p; (2) coefficient of determination (R2), delimited to those capable of predicting the variance in HALE by at least 50% (R = > 0.500); (3) highly correlated, based on the Pearson correlation coefficient (0.70 < r < 1.00); and (4) values of the sum of squares of the residuals are to be less

Friday, September 27, 2019

Effective Persuasion Skills Essay Example | Topics and Well Written Essays - 1000 words

Effective Persuasion Skills - Essay Example However, in order to persuade him effectively, I had to listen to him elucidate the year’s theme for the show and the manner that he wanted me to communicate the theme to the audience using the hairstyle. One important lesson that life has taught me pertains to the importance of listening in order to give a well thought-out response. Allow me to briefly explain my journey towards working with Mr. Clark. I used to be a performer in the show choir directed by Mr. Clark throughout high school. Typically, a show choir has forty performers who can sing and dance at the same time. Nonetheless, I attended Aveda Fredric’s school, a cosmetology school, after my high school graduation and learnt the skills important to a hairstylist. Upon completing the course, I obtained a license with the Ohio State Board of Cosmetology to practice cosmetology and, fair enough, I became the hair stylist for my high schools show choir under Mr. Clark. As the choir’s hairstylist, I have to design a new hairstyle each year r epresenting the year’s theme using my creative skills. In this regard, Mr. Clark approached me with this year’s theme. He explained the idea behind the year’s show, the design and concept of the costumes, all-important aspects that should go with the hairstyles design. Moreover, Mr. Clark informed me that the group would be participating in the World Choir Games this July at Cincinnati. It is important to point out that each year has a new concept and theme for the show and it requires creativity (a skill I have perfected overtime) to incorporate the hairstyle to the show’s theme. In this regard, the theme to this year’s show was â€Å"Around the World in 80 Days† and the hairstyle had to match the theme. Once he explained every detail of the future show, I knew that the time had come to assert my authority and use my creativity in designing the year’s hairstyle. However, I knew this was a herculean task, although not an insurmountable one. I said to him, â€Å"With all due respect, sir, there is need for us to be more creative and think beyond the horizon this year. We need to come up with different hairstyles representative of each country’s cultures and ethnicity where the group will be performing.† Knowing Mr. Clark as a conservative who likes maintaining things in a neat, clean, and uniform approach, I had to ask him to allow changes that will make the group more successful this year. In my previous two years of working in the group, I had noticed that designs have been uniform and easy all through for both groups. This formed my opinion to have a different hairstyle this year. You realized that I mentioned two groups; it is pertinent to point out that Mr. Clark is an accomplished director in charge of another group, known as Pure Elegance, an all-girls high school group well in their fourth year of performances. I had to convince Mr. Clark that we had to ha ve a different hairstyle for this year’s shows. In this regard, I told him that we had two choices to consider. As for option number one, I explained to him that we would have to go with the conservative approach of the usual uniform hairstyle with no changes. However, this was not the ideal situation, since it would be challenging to the audience to understand the relationship between the theme and the hairstyle. The second and the ideal option to my mind, as I explained to him, was a suggestion of moving and thinking

Thursday, September 26, 2019

Inventions & Discoveries Essay Example | Topics and Well Written Essays - 500 words

Inventions & Discoveries - Essay Example It has also been attributed to numerous facets of life putting an end to the differences on social, economical, political, and cultural relations. Coca-Cola Company has highly prioritized the global community throughout its operations, which is in accordance with social expectations. Therefore, the Company makes necessary arrangements regarding business processes in order to alleviate necessary risk, which may have adverse effects to the public in terms of health and safety (Coca-Cola Company, 64). Nevertheless, due to significance of this phenomenon in the life, globalization is considered to be a factor for development, which enhances integration and ensures that the benefits reaped are distributed to all persons across the globe. One of the main phenomena to which societies are confronted and that has influenced all aspects of social life of people living in the earth is globalization, which is attributed to association to Coca-Cola Company. Globalization is a multifaceted phenomenon, which leads to disappearance of the borders between economic, social, cultural and political relations and shapes a modern relation and communication between nations (within countries and among countries (Dreher, Noel and Pim, 32). Given that Coca-Cola is a multinational company which employs people from different parts of the world and these employees are transferred to other counties based on the need for talents in various countries in which they operate. Therefore, this contributes to globalization based on culture, whereby people learn things from other counties and they also consume the same products from this company (Dreher, Noel and Pim, 32). Consequently, consumers have developed a high interest for the Companyâ€℠¢s social, ethical, and environmental performance as a result of dynamic social-cultural and economic conditions and high

Wednesday, September 25, 2019

NGOs and Corporations Literature review Example | Topics and Well Written Essays - 2000 words

NGOs and Corporations - Literature review Example He negotiated a partnership between the World Wildlife Fund (WWF) – one of the world’s largest and most influential NGOs, and the IMD, but he is also heavily involved in the corporation side of his research interests. He acts as a consultant for several Fortune 100 companies, including Microsoft and Shell, and has spoken at various think-tanks. Yaziji and Doh adopt a sensible division of their work into four clear sections: understanding NGOs, NGO advocacy campaigns, corporate-NGO engagements, and the future of the latter. This division offers a logical structure for the book’s chapters, and a straightforward framework for analysis. The authors begin by asserting the importance of NGOs in the contemporary world, and on this issue, their arguments can scarcely be contested. By naming just a few of the more prominent organisations, including Amnesty International and Greenpeace – the nature of NGOs as major actors in politics, economics and society is clear. Yaziji and Doh (2009, p.xiii) also provide some staggering statistics for the growth of NGOs in recent years, suggesting a 400% increase in the number of international NGOs. No reader can seriously doubt whether a comprehensive work on this subject was necessary. I would credit the authors’ statement that ‘A fuller understanding of the role of business in society requires a comprehensive understanding of these engagements’ (2009, p.xv). oweHowe And Doh and Yaziji certainly provide a comprehensive account. They apply a logical division of material, and create a work which is easy for any reader to negotiate. However, having set themselves the important task of filling the current gap in the literature, something more than a survey of the field would have been appropriate. In theoretical terms, they have moved on the debate, but to a great extent the book feels like a synthesis rather than a useful new analytical framework. The introductory chapter provides a valu able overview of the current status of NGOs and their influence in society, and sets out a valid framework for the analysis that will be pursued throughout the text. However, beyond the introductory chapter and the logical headings used to divide the work into four main areas, there are some crucial structural weaknesses. In the introductory chapter, the authors describe the ‘hazard-strewn’ nature of relationships between NGOs and corporations, nicely summarise some of the key factors that make them so (2009, p.xxiv). For example, NGOs might recoil from the data discovered on being given access to a corporation’s internal audit, while the media coverage generated by such a collaboration has the potential to harm the legitimacy and reputation of an NGO, sometimes damaging it irreparably. Perhaps most fundamentally, there is a basic value difference between most corporations, and most NGOs. The former are working with markets and their values; the latter with socia l and ethical values. There can be some overlap in their operations, but this fundamental conflict compromises all collaborations. Perhaps this theme could have been developed further, given that it crops up throughout

Tuesday, September 24, 2019

Aboriginal Residential Schools Essay Example | Topics and Well Written Essays - 2000 words

Aboriginal Residential Schools - Essay Example According to this report, it is obvious that there are highly-paid government jobs available in such areas, however, the Inuit community is unable to avail such opportunities due to lack of formal education. In some cases, even if a member of the Inuit community is formally educated he is not qualified for that particular job. Consequently, the burden of unemployed individuals has to borne by the Canadian government. According to the findings of this study, the poverty of aboriginals is not only linked with unemployment. Lack of secondary education coupled with poor health and living conditions also worsen their economic situation. The difference between the majority non-Aboriginal population and minority Aboriginal peoples speaks volumes about the imbalance in Canadian society. It is imperative to raise their living standards by encouraging them to pursue higher education so that they can meet the demands of the job market. Alternatively, specific jobs for Aboriginals should be created so as to streamline their workforce in the mainstream labor market. It is indeed a daunting task to redress the disarray that has been made out of residential schools, but the Canadian government is grave about making definite changes. The government is also serious about resolving the problem of unemployment as this places an undue burden on the national economy. If the Aboriginal population could contribute somehow towards the national economy, the Canadian economy and society both would benefit a great deal from such measures.

Monday, September 23, 2019

How Will Immigration and an Aging Labour Force Affect You Assignment - 1

How Will Immigration and an Aging Labour Force Affect You - Assignment Example When the majority of the immigrants are of the aging population, they put a strain on the working population and the resources of the government. At best, the aging population will work for a short while after which they will retire and start enjoying their pension. Their contribution to the general economy will immensely reduce. The government will have to tax the working age group to meet the needs of the government and to sustain the dependents, the aging population. When the aging population is composed of people older than the age of sixty-five, then the situation becomes different. This population does not contribute in any way to the economy but only spend what the economic agents produce. They lower the GDP of the economy and heavily reduce the resources of the government. They are a burden to the government and the continuous increase means the government will spend more on healthcare and pension than on productive engagements and

Sunday, September 22, 2019

Communication Infrastructure and how it was affeted by Huricane Term Paper

Communication Infrastructure and how it was affeted by Huricane Katrina - Term Paper Example The national communication policy focuses much on the improvement on all the communication services so that everybody is served as fast as possible with the aim of improving the relation and the connection between individuals in different places. In order to achieve this, the national communication policy has placed more emphasis on the service providers to ensure that they restructure their services to meet the future challenges in communication sector. The policy recognizes that the role played by the communication system is vital since it affects the whole economy and hence most government policies would be based on the ICT policies (World Bank Group, 2002). The role played by the ICT is very important in all the other sectors of the economy since any effect in the communication sector results into the direct or the indirect effect on the other sectors of the economy. This can be either direct like in the E-commerce and the companies that have multinational operations may also be affected. It is therefore the role of the government to formulate those policies that aims at improving the communication systems. The communication policies also provide for the response to the disasters such that of Hurricane Katrina. There is the local mobilization of the resources by the local authorities as well as the federal so as to ensure that response is done as faster as possible to safeguard the national infrastructure against the disasters (Johnson & Turner, 2002). The military may also assist in the times of disasters though there is no direct integration of the military efforts within the communication policies. As a result, the military often join the rescue teams and the first responders as the second responders in disasters like hurricane Katrina. In order for the government to ensure that all these policies are harmonized and all the players in the sector are treated fairly, the government has established a regulatory authority to look into the conflicts and also to regulate the communication sector. The communications regulatory authority plays a vital role in regulating the telecommunications, radio and television frequency spectrum, posts and other communication careers (Johnson & Turner, 2002). This ensures that communication is effective and efficient and accordance with the law. Regulatory authority also protects the customer, service providers as well as other people involve in communication industry. It is the role of the regulatory authority to ensure that all the communication systems are in line with the modern technology and hence helps the customer to link with others in the international scene. The provision of radio and television spectrums is important since they ensure there is no mix up in the communication from the many providers. In trade, the communication regulatory authority also assist the businesses by identification of the barriers to trade and hence formulate policies that would ensue free and ease of movement of g oods and services from one region to another (Johnson & Turner, 2002). The investments from other nations as well as from domestic are regulated by the communication regulatory authority. In this way, it formulates and implements a policy that does not only make communication easy, but also provide opportunities for trade. Increasing Security and Protection Communication plays an important aspect in the development of

Saturday, September 21, 2019

Statistics Coursework Plan Essay Example for Free

Statistics Coursework Plan Essay In this project, I will be investigating how accurately students can estimate an angle size and the length of a line. I am investigating it to see if age, gender and mathematical capabilities have an effect on how accurate students can estimate a length of a line and an angle size. I will be using secondary raw data which is given to me to my teacher who has collected the data from other students. The accuracy of the data is unknown and also human errors are also likely Outliers and anomalies distort the mean of the data taking it to either of the two extremes. To avoid any Outliers or anomalies affecting the accuracy of this study, I will remove them before taking the sample size of around 80-100 students and I will be using stratified sampling so each category categorized by gender, age and maths set have a equal proportion in the sample as in the total population so the results are as accurate as possible. Any outliers which I may have missed can be eliminated by using the formula – Q1-(1.5)*(IQR) or Q3+(1.5)*(IQR). The three hypotheses I will be investigating will be: Boys estimate the lengths of a line and angle sizes better than girls. – I will be investigating this as boys tend to partake in activities which involve measuring more than girls and so are better than girls at estimating lengths of a line and angle sizes. Year 8 students estimate the angle sizes and lengths of a line better than Year 10 students. – I will be investigating this because Year 8’s may not have the pressure of other subjects yet as they do not have any real exams however Year 10 students may have been preoccupied with other thoughts and so are less accurate at estimating the lengths of a line and angle sizes. Students who are better at estimating the lengths of a line are also good at estimating the angle sizes. – I will be investigating this as students who are good at estimating one are likely to be better at estimating the other as they have good estimation and measuring skills.

Friday, September 20, 2019

Examining The Maritime Academy Engineering Essay

Examining The Maritime Academy Engineering Essay Arabian Gulf countries have a long history and tradition on maritime affairs, and Arabs considered as the most skilled and experienced seafarers and traders. These traditional and historical ties with sea, the proposed Maritime Academy trusts to cultivate to the highest level by providing the Arab youth with vocational and professional maritime training that meets all current international standards. The proposed Maritime Academy will be dedicated to the training of Arab seafarers to be and will give students the best possible start to their careers in the international shipping industry. It is well known that seafaring offers a stimulating, fulfilling and well paid career to young men who enjoy the associated challenges and responsibility, and who want more from a career than the usual nine to five routine. A career at sea brings with it a wealth of opportunity, providing individuals with the training and experience for a lifetime of rewarding challenges, which in the long term can be continued either at sea or ashore. While many will aspire to reach the ranks of Captain or Chief Engineer aboard ship, others may decide later on to move ashore and pursue one of the many opportunities available to experienced ships officers in the international shipping industry or elsewhere (e.g. shipping management, port management, ship broking, maritime law, ship and cargo surveying etc.) Most Arab countries are blessed with excessive oil reserves and this oil is transported to countries all over the world. This oil industry needs competent and reputable shipping industry to take care of the oil transport and has to be run by skilled, well trained, and educated officers both aboard ships and ashore. Technical and managerial skills learned at sea are readily transferable and can be developed by further training. And is the scope of the proposed Maritime Academy to provide. 1.2 Building up of Students Professional Qualifications In the Maritime Academy young cadets will learn and trained in such a way as to enhance all these personal qualities existing in every man and which are essential for a successful ships officer in order to cope with the demands of the profession. As a merchant marine officer he will spend several months at a time away from home living in close proximity with other crew members. The ability to cope with the stresses of separation whilst exercising tolerance towards others on the ship is therefore essential. In the Maritime Academy young cadets will learn to accept, later as ships Officers, a higher level of responsibility than would be expected at a similar age in most other professions and possess the leadership qualities necessary to direct the work of others, often under difficult circumstances. Self-reliance, self-discipline, initiative and the ability to work as part of a team are also part of the training as well as the commercial awareness and management skills demanded in todays competitive shipping industry. 1.3 The Roles of Navigation (Deck), Marine Engineering, and Electro Technical Officers Navigation (Deck) Officers Navigation Officers maintain watches on the bridge at sea and about the ship in port. They are responsible for passage planning, the safe navigation of the ship, cargo loading and discharge, ship stability, communications, and the maintenance of the hull and deck equipment. The ships Captain or Master is in overall command with ultimate responsibility for the safety of the crew, ship, cargo, and environment. Only navigation Officers can be promoted to the rank of Master. Marine Engineering Officers Marine Engineering Officers are responsible for the maintenance and operation of the ships main propulsion machinery and auxiliary plant, including deck machinery, air conditioning plants, refrigeration plants, and domestic and electrical services. Depending on the type of ship and operational circumstances, Engineer Officers will be required to keep watches in the ships Engine Room. The Chief Engineer Officer is in charge of the department and is responsible to the ships Master for its efficient operation. Whilst the law demands that only one person can be in overall command of the ship and by tradition that person is the Master, the Chief Engineer Officers status and salary is very similar to that enjoyed by the Master. Electro-Technical Officers (ETOs) These specialist officers work within the Engineering Department where they take particular responsibility for the maintenance of on board control engineering and electronic systems including propulsion control, radio communications and electronic navigation aids. OFFICER CADET PROGRAMMES TO BE OFFERED BY THE MARITIME ACADEMY The Maritime Academy shall offer 3 or 31/2 year Officer Cadet training programmes according to National and International (STCW) requirements, which will lead to professional certification by the Academy and either a degree qualification or a Higher National Diploma (HND). Officer Cadets following the Degree route will initially achieve professional certification by the Academy and a foundation Degree in either Marine Operations (Deck cadets) or Marine Engineering (Engine ETO Cadets). Successful candidates will then have the opportunity to top-up their academic qualification to an Honours Degree, achieving either a BSc (Hons) in Marine Operations Management (Deck Cadets) or a BEng(Hons) in Marine Engineering and Management. Officer Cadets following the HND route will initially achieve professional certification by the Academy and an HND in either Nautical Science (Deck Cadets) or Marine Engineering (Engine and ETO Cadets). After gaining initial Academy certification, junior officers prepare for the higher certificates of competency, leading finally to a Master Mariners or Chief Engineers Certificate of Competency, by a combination of sea service and Academy based training. Promotion to senior officer rank depends rather on merit than simply the possession of a senior certificate. The Academy may arrange, through various international shipping companies, for the Officer Cadets to obtain the required sea experience. OFFICER CADETS TRAINING PROGRAMMES PROGRAMME ENTRY REQUIREMENTS Deck Cadets Foundation Degree in Marine Operations, with top-up to BSc(Hons) in marine Operations Management A minimum of 120 UCAS tariff points, preferably including a numerate subject, PlusGSCE grade C or above in the following subjects: Mathematics (preferably Higher Tier) English Science (with Physical Science content) HND in Nautical Science Students will be required to complete an HE Entry course at the Academy prior to commencing the HND. Entry requirements for the induction course are as indicated. Successful completion of a full HND may facilitate later top-up to BSc(Hons) in Marine Operations Management. 4 GCSs Grade C or above including: Mathematics Science (with Physical Science content) English or a subject using English (i.e. Geography, History) Engine/ETO Cadets Foundation Degree in Marine Engineering, with top-up to BEng(Hons) in Marine Engineering and Management A minimum of 120 UCAS tariff points, including a numerate subject, PlusGSCE grade C or above in the following subjects: Mathematics (preferably Higher Tier) English Science (with Physical Science content) HND in Marine Engineering Students will be required to complete an HE Entry course at the Academy prior to commencing the HND. Entry requirements for the induction course are as indicated. Successful completion of a full HND may facilitate later top-up to BEng(Hons) in Marine Engineering and Management. 4 GCSs Grade C or above including: Mathematics Science (with Physical Science content) English or a subject using English (i.e. Geography, History) UCAS TARIFF FOR ACCESS TO DEGREE COURSES UCAS Points GCE A Level GCE AS Level GCC Nationals (Award) Key Skills 120 Grade A Distinction 100 Grade B 80 Grade C Merit 72 60 Grade D Grade A 50 Grade B 48 42 40 Grade E Grade C Pass 30 Grade D Level 4 20 Grade E Level 3 10 Level 2 The 120 UCAS points required for Academys maritime Foundation Degrees can be made up of any combination of qualifications. No UCAS credit is given for GCSEs but Foundation Degree students will be required to hold GCSE Mathematics (minimum Grade C, preferably higher tier syllabus), English and a GCSE science with a significant content of Physical Science. MEDICAL REQUIREMENTS Officer Cadets must have good health and be capable of passing the Merchant Navy Medical Examination tests. Navigating Officer Cadets must also have normal colour vision and be able to pass the Academys Sight Test, although corrective lenses may be acceptable in some cases. COURSE STRUCTURES Each Officer Cadet programme consists of a number of training phases, alternating between phases at the Academy and phases at sea aboard a shipping companys vessels. At the Academy, Officer Cadets will develop the academic underpinning knowledge (UPK) required for professional certification, and also undertake specific safety courses required by International Convention (STCW 95). While aboard ship, Officer Cadets will gain practical shipboard experience and develop their operational competency as watchkeeping Officers. In addition to their academic studies, Officer Cadets must undertake a number of safety and survival courses during their cadetship. These include the following: Personal Survival Techniques (PST) Personal Social and Safety Responsibilities (PSSR) Basic Fire Fighting (BFF) Elementary First Aid (EFA) Medical First Aid aboard ship (MFA) Certificate of Proficiency in Survival Craft and Rescue Boats (CPSC RB) Advanced Fire Fighting In addition Deck cadets must complete the following courses: Efficient Deck Hand (EDH) Global Maritime Distress and Safety System General Operators Certificate (GMDSS) Navigation, Radar and ARPA Simulation Training: Operational Level (NARAS O) NAVIGATING (DECK) OFFICERS 5.1 DEGREE PROGRAMME ACADEMY PHASE DURATION CONTENT Induction Phase 1 3 Weeks 15 Weeks Freshers Week / General induction to shipping industry. Assessment for entry to Degree programme. Intro to EDH / STCW short courses PST, BFF, EFA, PSSR. Foundation degree (FdSc) units: Maritime Analytical Methods Navigation Ship Operations Phase 2 (At Sea) 35 Weeks Work Based Learning (Operations Level) MNTB Deck Training Record Book Phase 3 30 Weeks Foundation Degree (FdSc) units: Meteorology Cargo operations Voyage Planning Shipboard Management Marine Operations Command Management NARAS(O) preparation / assessment Phase 4 (At Sea) 47 Weeks Work Based Learning (Management Level) MNTB Deck Training Book Phase 5 Part 1 5 Weeks Consolidation of Work Based Learning and any outstanding academic assessments prior to award of: Foundation Degree (FdSc) in Marine Operations Phase 5 Part 2 10 Weeks STCW short courses: AFF, EDH, MFA, GMDSS, NARAS(O), PSC RB MCA Orals Preparation Successful completion of MCA Oral examination leads to award of the initial MCA Certificate of Competency and end the Cadetship. Phase 6 (Optional) Top up to BSc (Hons) Degree 11 Weeks Bachelor of Science (BSc) Honours degree units: Project Maritime Technology Optional Units (2 of 4) Safety Management Financial Management Mercantile Law Curriculum Plus Phase 7 (At sea / on leave) (Optional) Blended Learning with Tutorial Support 10 Months Complete self-study elements of Maritime Technology and two Optional Units undertaken. Complete Project Up to 18 months to complete. Successful completion of all units leads to award of: BSc (Hons) Degree in Marine Operations Management 5.2 HND PROGRAMME ACADEMY PHASE DURATION CONTENT Phase 1 16 Weeks Freshers Week / General induction to shipping industry. HE Entry Course, including Academic Study Skills, Mathematics Foundation and introductions to Navigation, General Ship Knowledge and Ship and Port Operations. Successful completion of HE Entry Course leads to award of: National Certificate of Further Education (NcFE) Intro to EDH and PSC and RB / STCW short courses PST, BFF, EFA, PSSR Phase 2 (At Sea) 36 Weeks MNTB Training Record Book Guided Studies (HND Level 1 preparation) Phase 3 28 Weeks HND Level 1 units (STCW II/1 UPK): Navigation Passage Planning Watchkeeping and Communications Ship Construction, Cargo ad Stability Law and Management For SQA examinations NARAS(O) preparation / assessment Phase 4 (At Sea) 48 Weeks MNTB Training Record Book Guided Studies (HND Level 2 and MCA Orals preparation) Phase 5 17 Weeks For completion of OOW CoC + 26 Weeks For completion of HND Part 2 (Academic exemptions to Chief Mate Master Level) STCW short courses: AFF, EDH, MFA, GMDSS, NARAS(O), PSC RB Preparation for SQA/MCA written and oral examinations Successful completion of HND level 1 units, SQA/MCA written and oral examinations and STCW short courses leads to the award of the initial MCA Certificate of Competency and end of cadetship. HND Level 2 units (STCW II/2 UPK) Command Passage Planning Advanced Ship Stability and Construction Cargo and Port Operations Law and Management for Mates and Masters Bridge and Engineering Systems Successful completion of all HND academic assessments at the required pass rates provides full academic exemptions to Chief Mate/Master level and leads to the award of Higher National Diploma (HND) Candidates who successfully achieve a full HND should later be eligible to top-up the academic award to: BSc (Hons) Degree in Marine Operations Management Phase 5 Part 2 10 Weeks STCW short courses: AFF, EDH, MFA, GMDSS, NARAS(O), PSC RB MCA Orals Preparation Successful completion of MCA Oral examination leads to award of the initial MCA Certificate of Competency and end the Cadetship. Phase 6 (Optional) Top up to BSc (Hons) Degree 11 Weeks Bachelor of Science (BSc) Honours degree units: Project Maritime Technology Optional Units (2 of 4) Safety Management Financial Management Mercantile Law Curriculum Plus Phase 7 (At sea / on leave) (Optional) Blended Learning with Tutorial Support 10 Months Complete self-study elements of Maritime Technology and two Optional Units undertaken. Complete Project Up to 18 months to complete. Successful completion of all units leads to award of: BSc (Hons) Degree in Marine Operations Management MARINE ENGINEERING OFFICERS 6.1 DEGREE PROGRAMME ACADEMY PHASE DURATION CONTENT Induction Phase 1 3 Weeks 24 Weeks Freshers Week / General induction to shipping industry. Assessment for entry to Degree programme. STCW short courses PST, BFF, EFA, PSSR. Marine Engineering Principles Workshop Skills Training Foundation Degree (FdEng) units: Mathematics Mechanics / Thermodynamics Marine Legislation and Management Principles Work Based Learning Phase 2 (At Sea) 25 Weeks Work Based Learning (Operations Level) MNTB Engineer Training Record Book Phase 3 30 Weeks Foundation Degree (FdEng) units: Marine Electrics / Marine Auxiliary System Principles Marine Propulsion System Principles Ship Construction / Ship Stability Further mathematics Further Mechanics / Further Thermodynamics Engineering Design and Project Part 1 Work based Learning Workshop Skills Training Phase 4 (At Sea) 23 Weeks Work Based Learning (Management Level) MNTB Engineer Training Record Book Phase 5 Part 1 14 Weeks Consolidation of Work Based Learning Foundation Degree (FdEng) units: Advanced Marine Electrics Engineering Design and Project Part 2 Instrumentation and Control Principles Engineering management Successful completion of academic assessments leads to the award of: Foundation Degree (FdEng) in Marine Engineering Phase 5 Part 2 9 Weeks STCW short courses: MFA, AFF, PSC RB Workshop Skills Training MCA Orals Preparation Successful completion of MCA Oral examination leads to award of the initial MCA Certificate of Competency and end the Cadetship. Phase 6 Top up to BEng (Hons) Degree 15 Weeks Bachelor of Engineering (BEng) Honours degree units: Engineering Project Project Management Professional Engineering Management Optional Subjects (2 of 4): Control Systems, Naval Architecture, materials and Manufacturing, Curriculum Plus Phase 7 (At sea / on leave) Blended Learning with Tutorial Support 10 Months Complete self-study elements of Project management and Professional Engineering Management. Complete Project up to 18 months to complete. Successful completion of all units leads to award of: BEng (Hons) Degree in Marine Engineering and Management 6.2 HND PROGRAMME ACADEMY PHASE DURATION CONTENT Phase 1 30 Weeks Freshers Week / General induction to shipping industry. HE Entry Course. Study skills, Mathematics, IT skills, UPK for 1stsea phase plus intro to: Electrics, Ship Construction and Stability, Marine Engineering Principles, Marine Legislation, Applied Heat/Mechanics. Successful completion of HE Entry Course leads to award of: National Certificate of Further Education (NcFE) MNTB Workshop Skills and Technology STCW short courses PST, BFF, EFA, PSSR Phase 2 (At Sea) 22 Weeks MNTB Engineer Training Record Book Consolidation of UPK (underpinning knowledge) Phase 3 37 Weeks HND Level 1 units: Mathematics Mechanics Marine Propulsion Systems Marine Auxiliary Systems Thermodynamics Marine Electrics Marine Legislation and Management Preparation for Project MNTB Workshop Skills Phase 4 (At Sea) 28 Weeks MNTB Engineer Training Record Book Consolidation of UPK/IAMI EK and MCA Orals preparation Phase 5 9 Weeks For completion of OOW CoC + 26 Weeks for completion of HND Part 2 (Academic exemptions to CEO Level) STCW short courses MFA, PSC RB, AFF Completion of MNTB Workshop Skills Preparatory courses for IAMI EK MCA Orals examinations Successful completion of IAMI EK/MCA Oral examinations leads to the award of the initial MCA Certificate of Competency HND Level 2 units Further Mathematics Further Mechanics Further Thermodynamics Ship Stability and Construction Advanced Marine Electrics Instrumentation and Control Systems Engineering Management Engineering Design and Project Successful completion of all HND academic assessments at the required pass rates provides full academic exemptions to Chief Engineer level and leads to the award of Higher National Diploma (HND) Candidates who successfully achieve a full HND should later be eligible to top-up the academic award to: BEng (Hons) Degree in Marine Engineering and Management MARINE ENGINEERING OFFICERS 7.1 DEGREE PROGRAMME ACADEMY PHASE DURATION CONTENT Induction Phase 1 3 Weeks 24 Weeks Freshers Week / General induction to shipping industry. Assessment for entry to Degree programme. STCW short courses PST, BFF, EFA, PSSR. Marine Engineering Principles Workshop Skills Training/Introduction to Electronics Foundation Degree (FdEng) units: Mathematics Mechanics / Thermodynamics Marine Legislation and Management Principles Work Based Learning Phase 2 (At Sea) 25 Weeks Work Based Learning (Operations Level) MNTB Engineer Training Record Book / Electronics (Guided Studies) Phase 3 30 Weeks Foundation Degree (FdEng) units: Marine Electrics / Marine Auxiliary System Principles Marine Propulsion System Principles Ship Construction / Ship Stability Further Mathematics Further Mechanics / Further Thermodynamics Engineering Design and Project Part 1 Work based Learning Electronic Principles and Systems / Workshop Skills Training Phase 4 (At Sea) 23 Weeks Work Based Learning (Management Level) MNTB Engineer Training Record Book (plus ETO specific tasks) Phase 5 Part 1 14 Weeks Consolidation of Work Based Learning Foundation Degree (FdEng) units: Advanced Marine Electrics Instrumentation and Control Principles Engineering Management / Engineering Design and Project Part 2 Instrumentation and Control Principles Engineering management Successful completion of academic assessments leads to the award of: Foundation Degree (FdEng) in Marine Engineering Phase 5 Part 2 9 Weeks STCW short courses: MFA, AFF, PSC RB Workshop Skills Training MCA Orals Preparation Successful completion of MCA Oral examination leads to award of: MCA Certificate of Competency and end the Cadetship. Phase 6 Part 1 Top up to BEng (Hons) Degree 15 Weeks Bachelor of Engineering (BEng) Honours degree units: Engineering Project Project Management Professional Engineering Management Optional Subjects (2 of 4): Control Systems, Naval Architecture, Materials and Manufacturing, Curriculum Plus Phase 6 Part 2 ENEM GMDSS 10 Weeks Additional units: Electronic Navigation Systems Navigation Systems Fault Diagnosis Radio Communication Engineering GMDSS Radio Maintenance ENEM Certificates Phase 7 (At sea/on leave) Blended learning Tutorial Support 10 Months Complete self-study elements of Project management and Professional Engineering Management. Complete Project up to 18 months to complete. Successful completion of all units leads to the award of: BEng (Hons) Degree in Marine Engineering and Management 6.2 HND PROGRAMME ACADEMY PHASE DURATION CONTENT Phase 1 30 Weeks Freshers Week / General induction to shipping industry. HE Entry Course. Study skills, Mathematics, IT skills, UPK for 1stsea phase plus intro to: Electrics, Ship Construction and Stability, Marine Engineering Principles, Marine Legislation, Applied Heat/Mechanics. Successful completion of HE Entry Course leads to award of: National Certificate of Further Education (NcFE) MNTB Workshop Skills and Technology / Introduction to Electronics STCW short courses PST, BFF, EFA, PSSR Phase 2 (At Sea) 22 Weeks MNTB Engineer Training Record Book / Electronics (Guided Studies) Consolidation of UPK (underpinning knowledge) Phase 3 37 Weeks HND Level 1 units: Mathematics Mechanics Marine Propulsion Systems Marine Auxiliary Systems Thermodynamics Marine Electrics Marine Legislation and Management Preparation for Project Electronic Principles and Systems MNTB Workshop Skills Phase 4 (At Sea) 28 Weeks MNTB Engineer Training Record Book (plus ETO specific tasks) Consolidation of UPK/IAMI EK and MCA Orals preparation Phase 5 9 Weeks For completion of EOOW CoC + 26 Weeks for completion of HND Part 2 (Academic exemptions to CEO Level) STCW short courses MFA, PSC RB, AFF Completion of MNTB Workshop Skills Preparatory courses for IAMI EK MCA Orals examinations Successful completion of IAMI EK/MCA Oral examinations leads to the award of the initial MCA Certificate of Competency HND Level 2 units Further Mathematics Further Mechanics Further Thermodynamics Ship Stability and Construction Advanced Marine Electrics Instrumentation and Control Systems Engineering Management Engineering Design and Project Successful completion of all HND academic assessments at the required pass rates provides full academic exemptions up to Chief Engineer level and leads to the award of Higher National Diploma (HND) Candidates who successfully achieve a full HND should later be eligible to top-up the academic award to: BEng (Hons) Degree in Marine Engineering and Management Phase 6 10 Weeks Additional units: Electronic navigational Systems Navigation Systems Full Diagnosis Radio Communication Engineering GMDSS Radio Maintenance ENEM Certificates AFTER THE OFFICER CADETSHIP NAVIGATION OFFICERS NEWLY QUALIFIED Navigation (Deck) Officers will usually join a shipping companys fleet as 3rd Officer, undertaking bridge watchkeeping duties at sea and operational duties in port, with responsibility for the safety of the crew, ship, cargo and environment. As their skills and experience develop, young officers progress to higher certificates of competency, leading eventually to certification as ships Captain (Master) and possibly to the command of their own vessel. Numerous opportunities also exist for qualified navigation Officers ashore. Shipping companies often recruit shore based superintendents and fleet operations staff from their seagoing officers. Harbour Authorities recruit experienced officers to train as Pilots, Harbour Masters and Port Operations managers, while Classification Societies and Marine Insurance Companies require the fficers skill and experience to fill such roles as hull and cargo surveyors. The MCA also require surveyors and examiners while Marine Colleges recruit lecturers and assessors. MARINE ENGINEERING OFFICERS Newly qualified Marine Engineering Officers will usually join a shipping companys fleet as 4th Engineer Officer, undertaking engine room watchkeeping duties and having responsibility for the safe and efficient operation of the ships main propulsion unit and other vitl services. As their skills and experience develop, young officers progress to the higher certificates of competency, leading eventually to the Chief Engineer Officers Certificate and possibly to the position of Chief Engineer Officer. Marine Engineering Officers acquire a range of transferable skills through professional development and experience, which have many applications in jobs ashore both related and unrelated to the marine industries. Shipping companies often recruit their shore based engineering superintendents from seagoing staff, and Classification societies and marine insurance companies recruit their surveyors from the same source. The MCA also require surveyors and examiners while maritime colleges recruit lecturers and assessors. ELECTRO TECHNICAL OFFICERS After completing the cadetship, ETOs have the choice of following a similar career path to that of Marine Engineering Officer (as above) or remaining within the ETO specialisation. Job opportunities and career progression within the ETO specialisation will depend on the shipping company concerned.

Thursday, September 19, 2019

Bradstreets An Author to Her Book :: essays papers

Bradstreets An Author to Her Book It is hard to sympathize with someone when you have no idea where they are coming from or what they are going through. It is similar experiences that allow us to extend our sincere appreciation and understanding for another human being’s situations and trials of life. Anne Bradstreet’s â€Å"The Author to Her Book† expresses the emotions that Bradstreet felt when her most intimate thoughts were published to the world without her consent. The average person would not see the cause for distress that Bradstreet feels in this situation. She had written a collection of near perfect poetry, which expressed her feelings in a way that the majority of women during that time did not have the talent or training to do. Many would wonder why she would be disturbed about these works being printed when they had brought many people pleasurable reading and had brought Bradstreet herself much personal fame. Therefore, Bradstreet can not just write a straightforward poem to t ell how she feels about her stolen thoughts. Unless her reader happens to be a writer, he or she would not be able to sympathize with Bradstreet in this matter. Instead, she had to use a situation in which her readers could comprehend the many emotions she experienced. No doubt, many women read her poetry, and the majority of women during that time were, or would one day be mothers. This similarity opened a door for understanding. By comparing her writing to a child, Bradstreet is able to win the compassion of her readers and help them understand the feelings that she experiences. Bradstreet sees herself s the â€Å"mother† (line 23) of this work, which she calls an â€Å"ill-formed offspring† (line 1) and she gives the work many human characteristics to enhance the effect of the conceit. She says that the â€Å"child† had been by her side until â€Å"snatched from thence by friends, less wise than true† (line 3). Bradstreet’s works would probably never have been published had it not been for her brother-in-law. A person she thought she could trust saw fit to take her works back to England and have them published without her consent. He took her most intimate thoughts and placed the future of them in his own hands and she was never consulted. She shares an intimacy with her work like that of a mother and child and that intimacy was infringed upon when her work was â€Å"exposed to public view† (line 4).

Wednesday, September 18, 2019

Daycare: The Effects On Children Essay -- essays research papers

With the successes of welfare reform and the high turnout of female college graduates mothers are increasingly, entering the workforce. As affirmed by the Wilson Quarterly (Autumn 98, Vol. 22 Issue 4), â€Å"Ben Wildavsky, a staff correspondent for the National Journal (Jan. 24, 1998), provides statistical background. In 1997, nearly 42 percent of women with children under six were working full-time, 5 percent were looking for work, 18 percent had part-time jobs, and 35 percent were not working outside the home† (p.115). Using these figures it is said that 65 percent of women with children aged younger than six are working or would like to be. Daycare is a necessity for the majority of working American mothers. Within the past 20 years child social developmentalists have accumulated evidence to show that unless children gain minimal social competence by the age of six years, they have a high probability of being at risk throughout life. (Denham & Burton, 1996) Thus peer relationships contribute a great deal to both social and cognitive development and to the effectiveness with which we function as adults. Others suggest that the number of caregivers and the amount of time children spend away from parents’ harms parent-child relationships thus, weakening cognitive and emotional development (Kelly, 2000). This paper will discuss the effects of daycare on children and how to choose one of high quality. Many daycare opponents believe bonding, a strong emotional attachment that forms between a child and parent, is disrupted when mothers and fathers rely on others to be substitute parents. Children who are securely bonded to parents are more confident in their explorations of their environment and have a higher sense of self-esteem than children who are insecurely bonded to their parents. Dr. Stanley Greenspan, a professor of psychiatry and pediatrics at George Washington University Medical School, who has authored several books including the recent book, The Irreducible Needs of Children says, â€Å"A warm, loving human relationship is very important for intellectual development. Children form their capacity to think and self-image based on these back-and-forth interactions. Fewer of these are happening, because families are so busy and more care is being done outside the home. Studies [show] that for all ages, 85 percent of day care is not high quality† (Kelly, 200... ...ay Setting. Child Study Journal, 28(3) (1998). 225-245. Kelly, K. (2000, October 30). Child Docs to Parents: Stay Home and Save your Kids. U.S. News & World Report, 129(4), 65 Oesterreich, L. Childcare Checklist for Parents: PM 1805 <a href="http://www.extension.iastate.edu/Pages/pubs/">http://www.extension.iastate.edu/Pages/pubs/. (December 1999) Schuetze, P., Lewis, A., & DiMartino, D. Relation Between Time Spent in Daycare and Exploratory Behaviors in 9-month-old Infants., Infant Behavior & Development 22(2) (1999), 267-276 Schumacher, R. B. & Carlson, R. S. Variables and Risk Factors Associated with Child Abuse in Daycare Settings., Child Abuse & Neglect, 23(9) (1999) 891-898. â€Å"The Battle Over Child Care,† Wilson Quarterly Autumn 98, 22(4), 115-116 Waterman, J., Kelly, R. J., Oliveri, M. K., & McCord, J. (1993). Behind the Playground Wall: Sexual Abuse in Preschool. New York. Guilford Press. Wilson, E. and Tweedie, P. S. Selecting Quality Child Care. National Network for Child Care: <a href="http://www.nncc.org/Choose.Quality.Care/select.care.html">http://www.nncc.org/Choose.Quality.Care/select.care.html. (December 1996).

Tuesday, September 17, 2019

Baptism :: essays research papers

Baptism is a religious ritual that some people choose to practice. Baptism is a belief that once done you start a new spiritual life. There ways to perform this ritual, which is considered sacred among the people that follow the religion of Christianity. Baptism has three processes. The first process is preparation. The second process is performing the Baptism. The last process is the conclusion of the baptism.   Ã‚  Ã‚  Ã‚  Ã‚  In order to perform a baptism, you have to prepare. The preacher has to see why the individual wants to commit their self to the Lord. Next, the individual has to inform the preacher why they want to give their self to the lord. Committing yourself to the lord is an important decision. Once the preacher agrees that the individual is true to their self and the Lord, the preacher sets aside a date for which the person shall be baptized.   Ã‚  Ã‚  Ã‚  Ã‚  Once the date is meet, the baptism proceeds. In order for a baptism to happen the individual must have on garments they won’t mind getting wet. Also, the preacher gives the individual white robs as a ceremonial garment ; the white garment must be worm over the person’s clothing. Once the garments are in place, the pastor then performs the baptism ceremony. The pastor first gives the individual a name of a saint, which the name shall be his example and protector. Next, the pastor dips water upon the individual’s head three times. The pastor then anoints the individual on the head, this practice symbolizes true love and peace. The individual then receives a taper to mark that he become a child of God.   Ã‚  Ã‚  Ã‚  Ã‚  Lastly, the conclusion of the baptism is performed. The pastor says a few words of inspiration to the individual or individuals that has been baptized. There is also a celebration to celebrate the rebirth of the newly reformed Christian.

Monday, September 16, 2019

Gender Roles in a Streetcar Named Desire

Gender Roles in A Streetcar Named Desire Throughout history empowerment and marginalization has primarily been based on gender. In the play A Streetcar Named Desire, this idea of empowerment is strongly flaunted. Tennessee Williams’ characters, primarily Stanley, Blanche, Mitch, and Stella, conform the expected roles of men and women at the time. Although World War Two temporarily allowed women a place in the work force, they were dismissed from such empowerment when the war came to a close. Characters in A Streetcar Named Desire are accurate representations of the social historical context of that time. The power struggle between Stanley and Blanche conveys dominant ideas about gender such as the primitive nature, aggression, and brutality of men and the vulnerability and physicality of women. The establishment of traditional gender stereotypes is almost instantly provided when Stanley is highlighted as the ‘provider’. His physical masculinity and power is conveyed through a package of raw meat he ‘heaves’ carelessly at Stella and his abusive nature is shown at once through the use of blood imagery involving the ‘red stained package’. This immediately associates Stanley with brutality, foreshadowing his violence and cruelty in the play. Although Stanley is empowered by his gender, he feels threatened when approached by Blanche, who is of higher class than him. Due to Blanche’s social standing, Stanley is unsure of controlling her. As the play progresses the struggle for power between the two becomes increasingly obvious. At first, Blanche appears victorious in the struggle. The physical proof of the tragedies in her past stop Stanley from arguing. Here all of them are, all papers! I herby endow you with them! † His failure to exert power threatens his pride and he is inspired to reject Blanche. Segregation between men and women is clearly defined during the poker night in scene three. â€Å"Poker shouldn’t be played in a house with women. † This reflects the social norms and the dominant belief that women should be disassociated from masculine activities. Stella and Blanche are excluded from this form of masculine boding, and their early return causes chaos in the house. In addition to segregation, dominance is seen once again when Stanley is unable to prevent Mitch’s desertion of the game. His violent outbursts are desperate attempts to exert his dominance. â€Å"Stanley gives a loud whack of his hand on her thigh. † it becomes apparent that his threatening words are not enough, and he begins using violence as a physical means of controlling Stella and frightening Blanche. Although Stanley’s power works mainly to downgrade Blanche, his violent and aggressive nature also disempowers Stella. She is abused during poker night, a moment of masculine bonding. Following the poker night she is made powerful when she retreats to Eunice’s Flat. However, she returns to disempowerment when she leaves Eunice’s flat and Stanley ‘bears her into the dark flat’. Stella’s decision to stay with Stanley is not based on choice, but rather on the fact that she must. This enforces the dominant belief that women are unable to support themselves, emotionally and financially. Similar to Stanley, Blanche also faces a power struggle. Her ultimate downfall is a result of Stanley’s cruelty and lack of understanding for human fragility. Comments about Stanley’s ‘animal habits’ and ‘sub-human’ nature act as the agent of Blanche’s downfall. Stanley cannot deal with her mocking him in his own home and is fed up with her lies. During the final scenes his behavior conveys the male dominant ideas of cruelty and brutality. Blanche’s refusal to deal with Stanley’s rough nature causes her to retreat further into her fantasy world where she becomes increasingly vulnerable. Stanley violates Blanche in the most personal way and initiates the ultimate act of cruelty and abuse of power. His final act of brutality acts as the climax of power struggle between Stanley and Blanche as well as all males and females. This leaves the male empowered and the female lowered and completely destroyed. Blanch Dubois’ empowerment comes purely from her class. Her southern tradition and wealth made her a woman of importance and propriety. However, in Elysian Fields her traditions and former wealth hold significance. Although her wealth was lost with the death of Belle Reve, she desperately attempts to hold on to remains of her previous life and creates a fantasy world. Her ‘incongruous appearance’ and ‘southern tradition causes Stanley to reject her, as he cannot relate to her in anyway. The lack of impact on Stanley reflects the context of time, when tradition was being overpowered by industrialization. As Blanche begins to understand that her class has no impact on Stanley she assumes the role of a temptress. â€Å"I was flirting with your husband Stella! † In order to gain some form of authority, Blanche uses her sexuality and physicality in effort to control Stanley. Blanche uses her sexuality frequently to overpower others. She ‘depended on the kindness of strangers’ regularly in Laurel and her use of physicality landed her in trouble on various occasions. Following her encounter with the paperboy she states, â€Å"I’ve got to be good and keep my hands off children†. This foreshadows her frequent use of physicality as means of empowerment. Although Blanche is notorious for her use of physicality, she has no authority over Stanley and is constantly reminded of this through emotional and physical abuse. As a representation of all females, Blanche is completely disempowered after Stanley rapes her. She creates a fantasy world to escape the harsh realties of Elysian Fields Her marginalization and downfall reflects vulnerability and reliance of females on males for stability. The dominant ideas and beliefs about gender, such as the reliance of women on men and the primitive nature and brutality of the masculine are conveyed by Tennessee Williams’ in A Streetcar Named Desire through the empowerment and marginalization of Stanley, Blanche, Mitch and Stella. Stanley’s role as the ‘alpha male’ empowers him in almost all situations. Blanches’ tradition and social status empowered her past but her physicality empowers her present. Williams’ characters accurately portray the gender stereotypes in the time they were created, and function today to convey the dominant ideas about gender and how they work to empower and disregard people in our society today.

Explore the significance of the witches and the supernatural in the play Macbeth Essay

King James I strongly believed in witchcraft, and Shakespeare used this idea to appeal to him. Shakespeare used the ideas of witchcraft, kingship, and the moral order to develop the play, as these themes were greatly admired in the Jacobean ere. The opening of the play contains many subtle links to the supernatural. The three witches open the scene in an open place with thunder and lightning, which was believed in superstitious times that fierce storms released forces of evil, and were omens of unrest in individual people and whole countries. I will be investigating the significance of the witches and I will be looking at the supernatural effects they have on the play ‘Macbeth’. Nowadays Macbeth is referred to by many people as ‘The Scottish Play’ and within the theatres it would be considered bad luck to mention the name of ‘The Scottish Play’ whilst there are plays taking place on stage. So this goes to show that the supernatural aspect of the play has been carried forward to this very day. Shakespeare’s tragedy is about Macbeth’s bloody rise to power, including the murder of the Scottish king, Duncan, and the guilt-ridden path of evil deeds generating still more evil deeds. As an integral part of this thematic web is the play’s most memorable character, Lady Macbeth. Like her husband, Lady Macbeth’s ambition for power leads her into insomnia and madness. But while Macbeth responds to the prophecies of the play’s famous trio of witches, Lady Macbeth goes even further by figuratively transforming herself into an unnatural, desexualized evil spirit. The witches themselves are a major part of supernatural, and the play, as they can be seen as starting it all off. In the first scene, we see them establishing a link with the supernatural. Their words also link them to Macbeth, and show that right from the start, he has an influence from them. ‘Fair is foul, and foul is fair†¦Ã¢â‚¬â„¢ The witches say this in a chant like way, and you can tell it is a mischievous way of saying it. It shows things will be confused, and moral order will be changed. It also shows that the witches believe that evil is good, and good they find repulsive. This shows their attitude to life, but it could also be a warning to the audience that things to follow are not what they may have seemed, and will be confused. This could also associate them with the disruption of both the natural and social order, as later when Macbeth kills Duncan, many things are affected, and the witches could be blamed for this. The witches in the play of Macbeth are the most powerful characters in the play. â€Å"All hail Macbeth, hail to thee, Thane of Glamis† â€Å"All hail Macbeth, hail to thee, Thane of Cawdor† â€Å"All hail Macbeth, that shalt be king hereafter† (Act 1 Scene 3) The witches start off the play by hailing Macbeth and I believe that if the witches didn’t start off by saying this, then the play wouldn’t have gone ahead. These quotes set out the storyline of the play and give structure of events. The play wouldn’t have been interesting if they hadn’t hailed Macbeth. The appearance of the witches is very much supernatural and something to be feared. â€Å"So withered and so wild in their attire† (Act 1 Scene 3) Banquo in the play refers to the witches as withered, wild and attire; I think this is because in the Jacobean times people who were ugly or didn’t have a husband were labelled as witches. People feared witches in those times possibly because mixing with these witches could have possibly resulted in your death. As many witches in those days were either beheaded or thrown from cliffs to see they could fly. â€Å"Are ye fantastical, or that indeed† (Act 1 Scene 3) This is referring to the supernatural element of the witches in the play, which is again said by Banquo. The main word in the quote that is referring to the supernatural element of the witches is â€Å"fantastical†. In those fantastical didn’t mean fantastic as it does today, but instead it meant ludicrously odd and lots of imaginary around them.

Sunday, September 15, 2019

The Freedom Writers Diary

The Freedom Writers Essay- Chloe Taylor How are different cultures represented in Freedom Writers? What values and attitudes do we draw from the film and its background? Cultures are shown and exposed to us in various ways everyday. Different cultures are represented in different ways in the Western Society. In the movie Freedom Writers, we witness this cultural conflict on a first hand basis. Urban youths in Freedom Writers heavily rely on respect to judge others. They also judge based on each other’s cultural back ground.Later in the film, these same teenagers begin to value education and the sense of belonging in school, rather than belonging in gangs. Gangs and groups are a part of the Western Society that we have had to learn to accept in our lives. In the feature film Freedom Writers, we are shown gangs divided up into cultures and cultural backgrounds. This has built up a lot of tension between cultures and attitudes towards other gangs. The scene in which all the stude nts enter room 203 and take seats into their separate corners of the room divided into their certain corners of the room shows the division between students in a real life.We see a long shot of the whole classroom showing its layout and the segregation between gangs. Then multiple mid-shots are shown of the gang itself and its individual members to decipher the multiple gangs, their attitudes towards school and their way of life. Even though the students start their school year with an attitude of ignorance towards other cultures they begin to learn the value of each individual and change their point of view and their gangs and cooperate with their cultures. People may argue that respect is something that has to be earned, it is not automatic.In the 1992 Los Angeles’s race riots, respect was something that was taken for granted, as it was essential for their society. In Freedom Writers, Ms Gruwell demanded respect immediately. Not surprisingly the students refused to give it to her and why should they of, they didn’t know anything about Ms Gruwell. Towards the end of the film we see that Ms Gruwell has gradually gained the respect she wanted from her class. We are shown this in a first hand basis as Andre, a gang member, calls Ms Gruwell ‘Mam’.She takes this as an offence and claims she is not anyone’s mother; Eva soon corrects her and states that it was a ‘sign of respect to you’. This scene is shown to us by a series of close up shots of Andre, Ms Gruwell and Eva. This is purposely done to capture the changing emotion in the characters face. The students of room 203 value Ms Gruwell not only as a teacher and a person and this is reflected in their attitude and behaviour. We all know what racism is and have most likely been subjected to it or witnessed it at one time in our lives.Racism is more prominent in schools and work places although random attacks of racist acts can also be seen in the streets or at public places where the offender and the victim may not even know each other. In the feature film Freedom Writers, every student at Long Beach either dishes out racist comments or receives them. When all of the ‘unteachable’ students get integrated into the same class we see this clash of cultures collide. A racist caricature is drawn of one of the African-American students and the rest of the students find it amusing.Ms Gruwell takes the picture and compares it to the Jews during the holocaust. Erin was greeted with dumb-founded looks only to find out the kids didn’t know what the holocaust was yet they acted out their lives in a similar racist manner. This scene is shown by using close ups of Ms Gruwell and the victim of the caricature, Jamal. We see Ms Gruwell looking horrified and Jamal’s expression looking embarrassed. We are also shown mid-shots of the whole class to show their expressions and they seem amused and proud of themselves.Towards the end of the movie the students do not lash out any forms of racism at one another and instead treat each other as good friends. At the end of Freedom Writers, the students have accepted and value each other as individual people not of their cultural back ground. Ms Gruwell gained the respect she earned from devoting her life to teach these children. During this essay I have explored the movie Freedom Writers and how factors like gangs, respect and racism can have such an impact on peoples lives. It can change peoples values on life and their attitudes and behaviours towards things and that is what we draw from the film.