Thursday, October 31, 2019

Poetry Explication Essay Example | Topics and Well Written Essays - 500 words - 2

Poetry Explication - Essay Example The fact that it is "smudged" and written in "erasable ink" (2) says a good deal about the students feelings on the topic. The confession, of course, is the students desire to be effortlessly beautiful, and the poem makes us complicit in this confession, asking "isnt it strange / how we want it, despite all we know?" (3-4). Here the sense is one of compassion for the student, and also a vague sense of embarrassment to be caught in the same trap of wanting beauty even while knowing that it is not that easy or important, or even realistic. The imagery used while comparing the narrators daily life to the photos of models builds on this idea, making it clear that the photos are fantasies through descriptions of models as "cobalt-eyed, hair puddling / like cognac" (5-6), or in one case as "curved and light-drenched, more like a beach / than the beach" (7-8). Through these images, the ideal of beauty is shown to be completely unrealistic, and removed from any sort of achievable goal, while at the same time also being something that is just naturally desirable. The poem asks us who has not wanted to be beautiful, and shows us why we want to, at the same time. This is compared to the boring, every-day, and cheap life of the narrators reality. For instance, now her daydreams are limited to seeing a magazine "in the checkout line" (11), which nonetheless inspires in her "the old pull, flare / of the pilgrims twin flames, desire and faith (13-14). Here, the poem compares fashion magazines to religion, which inspire readers to believe in them and want what they show, even though the narrator should know better. The narrators childhood is presented similarly, how she went "from store to store" (15) buying "polyester satin, / machine-made lace, petunia- and Easter egg-colored" (16-17). The cheapness of the materials she can afford is contrasted to the fancy clothing of the models in the photos she admired, described as an "angel inside

Tuesday, October 29, 2019

Summarize DREAM Act or Arizonas SB 1070 Essay Example | Topics and Well Written Essays - 500 words

Summarize DREAM Act or Arizonas SB 1070 - Essay Example This particular discussion intends to provide a comparative standpoint about the DREAM Act developed by the government of the US. Furthermore, the essay will also summarize the Act and discuss the same in alignment with numerous elements or dimensions. In general, the Dream Act provides permanent residency and other amenities to the illegal immigrants of the US. These particular benefits are provided to the people against certain grounds that must be mandatorily fulfilled. Notably, there exists a huge figure of people who resides in the nation for acquiring proper education for them or serving in the defense sector. However, despite of their contribution, they always hold the fear that they will be deported any time from the nation. In this regard, the DREAM Act ensure that these people gets amnesty for residing in the US, owing to which they will be liable to get education loans, tuition fees sponsored by the government and reduction of school fees (Immigration Policy Centre, â€Å"The Dream Act†). As per a particular case, a young boy named Reyna Wences from Mexico, has been dealing with the problems of getting proper identity for himself in the US, despite of spending much of his childhood and adulthood days in the country. Though moving to the US was a decision of his parents, he never complained about the same. However, he was aware of the fact that he will never be able to get fully involved within the American society owing to his immigration status. The DREAM Act proposed in the year 2009 certainly provided a ray of hope for him to get identity as a proper American citizen (Wences 504-506). The DREAM Act has been proposed with the aim of ensuring legal liability to undocumented immigrants. It acts as a reward of legal rights to the undocumented immigrants, as they are residing in the nation for a longer period without enjoying any of the basic amenities offered by the government.

Sunday, October 27, 2019

History Of The Bus Topology

History Of The Bus Topology A bus topology is a network set up in which nodes are connected to a segment of cable in the logical shape of a line, with a terminator at each end. A bus topology connects each computer or nodes to a single segment trunk. All nodes on the network share a common bus and use a multi-drop transmission medium. Bus network allows only one device to transmit at a time. A distributed access protocol determines which station is to transmit. The signal goes from one end of the bus to another. A terminator is needed at each to cut down the signal so it does not reflect back across the bus. CSMA/CA, media access method, is used to control the collisions that take place when two signals placed on the wire at the same time. There are two types of bus topology: Linear Bus Topology and Distributed Bus Topology. In Linear Bus Topology, all nodes of the network are connected to a common transmission medium which has exactly two endpoints. Distributed Bus in which all of the nodes of the network are connected to a common transmission medium which has more than two endpoints that are created by adding branches to the main section of the transmission medium. Bus networks do best with a limited number of devices. If more than limited computers are added to a bus, performance problems will be result. If the backbone cable fails, the entire network effectively becomes unusable. Fig: Bus Topology Ring Topology Ring network topology has no central server and connects computers in a circle of point-to-point connections. Each node handles its own applications. And also shares resources over the entire network. If one node becomes break down, the others are still able to maintain contact with one another. Such a network is best for decentralized systems because no priorities are required. The signal is transferred through a token for one station to the next. When a station needs to transmit, it grabs the token, attaches data and an address to it. And then routes it around the ring. The token travels along the ring till reaches the destination address. The receiving computer replies an acknowledgment to the sender source. The sender then releases the token for use by another computer. Each station on the ring has equal access but only one station can use token at a time. To allow an orderly access to the ring, a single electronic token passes from one computer to the next around the ring. A computer can only transmit data when it captures the token Fig: Ring Topology Star Topology A star topology is one of the most use common network topology where each of the devices and computers on a network connect to a central hub or sometimes just a switch. On a star network, data passes though the hub to its destination. The hub manages and controls all functions of the network. It also performs as a repeater for the data flow. In a star network, the entire network is dependent on the hub so if there is a problem with the hub, the entire network is not working. This makes it easy to troubleshoot by offering a single point for error connection and at the same time the dependency is also very high on that single point. Every computer in the network is safe when the hub is safe. This type of network also offers more privacy than any other network. The star network topology requires more cable than the usual Bus topology. A common cable that is used in star network is the UTP or the unshielded twisted pair cable. Another common cable that is used in star networks is the RJ45 or the Ethernet cables. If one computer fails in the network, it does not affect any other computer in the network and the purposes of this computer can be easily changed to the next computer easily using the controls of hub. In a Star Network Topology it is possible to have all the important data backups on the hub in a private folder so if one computer fails, it can still use data using the next computer in the network and accessing the backup files on the hub. New devices or nodes can easily be added to the Star Network by just extending a cable from the hub. Because of the hub controls everything, the addition or removal of devices are done using the hub. If the hub adds a device such as a printer or a fax machine, all the other computers on the network can access that new device by accessing the hub. The device is no need to be installed on all the computers in the entire network. The central function is cost effective and easier to maintain. Fig: Star Topology Mesh Topology A type of network configuration where each of the computers and network devices are interconnected with one another allows for most transmissions to be distributed even if one of the connections goes down. This type of topology is not commonly used for most computer networks because it is difficult and expensive to have redundant connection to every computer. In Mesh network, it can route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around broken or blocked paths by hopping from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. The network can still operate even when a node fails or a connection goes bad. On a mesh network, messages can send via any of several possible paths from source to destination. It employs one of two connection arrangements, full mesh topology or partial mesh topology. In the full mesh topology, each node is connected directly to each of the others. In the partial mesh topology, some nodes are connected to all the others, but some of the nodes are connected only to those other nodes with which they exchange the most data. Fig: Mesh Topology Different types of cables Different types of network cables are used depending on the kind of network. The type of cable used for a network depends on the networks topology, protocol, and size. If a network has large number of network devices, it will need cables that provide high speed and error free connectivity. Some of the cables being used today are Unshielded Twisted Pair (UTP) cables, coaxial cables and fiber optic cables. The UTP cable is the most popular variety, largely used for school networks as it transfers data at 100 mbps. Coaxial cables have a single copper conductor at their center. A plastic layer provides insulation between the center conductor and the braided metal shield. The outer metal shield blocks out outer interferences such as lights, motors and other computers. Fiber optic cables consist of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals and transfers signals over much longer distances than coaxial and twisted pair cables. Network cables are the backbone of any network. However, today several networks are switching over to other mediums of data transfer such as high frequency radio signals, and infrared light beams to connect the workstations. These systems are not only fast and effective, but also do away with the problem of maintain several hundred feet of cables spreading across the workspace. With such technologies coming to the forefront, the future may well tilt in favor of wireless systems. 10Mbps Networking Standard Cable Type Segment Length Connector 10Base2 Thin Coaxial 185 meters BNC 10BaseT Category 3, 4, 5 twisted pair 100 meters RJ-45 10BaseFL Fiber-optic 2000 meters SC/ST b) Advantages and Disadvantages of medium. Media Type Maximum Segment Length Speed Cost Advantages Disadvantages UTP 100 m 10 Mbps to 1000 Mbps Least expensive Easy to install; widely available and widely used Susceptible to interference; can cover only a limited distance STP 100 m 10 Mbps to 100 Mbps More expensive than UTP Reduced crosstalk; more resistant to EMI than Thinnet or UTP Difficult to work with; can cover only a limited distance Coaxial 500 m (Thicknet) 185 m (Thinnet) 10 Mbps to 100 Mbps Relatively inexpensive, but more costly than UTP Less susceptible to EMI interference than other types of copper media Difficult to work with (Thicknet); limited bandwidth; limited application (Thinnet); damage to cable can bring down entire network Fiber-Optic 10 km and farther (single-mode) 2 km and farther (multimode) 100 Mbps to 100 Gbps (single mode) 100 Mbps to 9.92 Gbps (multimode) Expensive Cannot be tapped, so security is better; can be used over great distances; is not susceptible to EMI; has a higher data rate than coaxial and twisted-pair cable Difficult to terminate c) Recommendation. Star topology would be the best way to use for renewing Townsville Police Department Network infrastructure because of in-house network (LAN) structure. Star topology should be also used for following reasons. Easy to install and reconfigure. No disruptions to the network when connecting or removing devices. Easy to detect faults and to remove parts. Less expensive. Includes robustness, that is, if one link fails, only that link is affected, other links remain active. It has been said that Townsville Police Department covers an area of 100 square kilometers and Townsville is divided into four districts (Northern, Eastern, Western and Southern). For that reason, the switch should be placed in the center of four districts. So, the network cable must cover 50 kilometer and the switch must be gigabit Ethernet. Therefore, UTP with cat6E is the most suitable network for such an area of network. Category 6 UTP Category 6 supports gigabit Ethernet and is recognized by standards bodies as supporting 10GBASE-T, however there are limitations that must be considered. The IEEE 802.3an standard cites a 55 meter distance limitation for standard category 6, which is not universally agreed upon within the TIA and ISO standards.TIA TSB 155 recently released a Technical Service Bulletin covering additional parameters for running 10GBASE-T on standard category 6. In this document a 37 meter distance limitation is referenced for 10GBASE-T on standards compliant category 6 systems. Between 37 meters and the IEEE referenced 55 meters, standard category 6 may support 10GBASE-T, but it is possible that the installer may have to use alien crosstalk mitigation techniques such as unbundling cables or replacing patch cords to improve the electrical parameters to allow 10GBASE-T to work properly. Above 55 meters, it is unlikely that category 6 UTP would work properly without a large amount of mitigation to reduc e alien crosstalk. A key takeaway is that using category 6 UTP for 10GBASE-T should be focused on existing installations, not new installations. The choice for new installations designed to support 10GBASE-T should be augmented category 6 UTP, STP or optical fiber systems. Category 6 Advantages  » Cost and size of media, relative to augmented category 6 and STP  » Installed base currently the dominant UTP cabling standard  » Installation widely accepted Category 6 Disadvantages  » Limited distance for 10GBASE-T  » External noise suppression at 100 m, relative to shielded systems or augmented category 6 Task 2 a) Nowadays, there are several usages of Internet by means of so many ways. There are three basic Internet services: Information (browsing, online-shopping, etc.) Communications (mail, chat, Video conferencing, etc.) Files sharing (downloading, uploading, etc.) b) The connecting suitable for above severs are as follows: For Information service: It can cover only 100 Kbits/s usually prove adequate. For Communication: For video conferencing, bandwidths of no more than 384 Kbits/s usually prove adequate. As for chatting communication, especially for yahoo chat, 28 Kbits/s should be enough. For File Sharing: As for file sharing, bandwidths of more than 1 Mbit/s are most suitable. c) The Internet Service Provider in Myanmar Myanmar Posts and Telecommunications The Myanmar Posts and Telecommunications (MPT), is the sole provider of telecommunication services in Myanmar. It is a Government Agency, operating under the Ministry of Communications, Posts and Telegraphs. It was founded in 1884 as a small Department of Posts and Telegraphs and has grown into the present day Myanma Posts and Telecommunications with approximately 13800 employees of which about 380 are managerial level staff. The present organization is headed by the Managing Director and a General Manager as his deputy. There are nine major departments operating under respective deputy general managers/chief engineers in the fields of administration, works and inspection, planning, training, finance, stores, automatic telephones, overseas communications and long distance communications. The three main categories of services rendered by MPT are the postal services, telegraph services and telephone services, for both domestic and international communications. d) Since, there is only one ISP in our country (Myanmar); we have to use MPT (Myanmar Posts and Telecommunication) as an ISP for our country. Task 3 a) Methods of Two-Way Voice communications Two-way voice communications (radios) are essentially available in three types: Hand-held portable, Vehicle-mounted mobile, and Desktop-base station There are also unique two-way radio devices such as indoor and outdoor call boxes and one-way radio receivers for wireless paging. Hand-held portable two-way radios are the walkie talkie type of radios. As ruled by the FCC (Federal Communications Commission), hand-held radios may not have more than 5 watts of power. Vehicle-mounted mobile two-way radios mount in a car or truck and they use the vehicles battery for power. They may have their own antenna, but better range is achieved by using an externally-mounted antenna. Desktop base station radios use wall AC power and they too may have a built-in antenna, but this antenna may be disconnected and then connected to cable that leads to an external-mounted antenna. The higher the antenna is mounted, the better the range. The vehicle-mounted mobile radios are usually used as base stations by just adding an AC to DC power converter. Mobile and Base station radios are usually more powerful than hand-held radios and may have as much as 100 watts of power. Frequencies There are two major frequency formats for two-way radios. They are Ultra High Frequency (UHF) radio and Very High Frequency (VHF) radio. Neither frequency band is inherently better than the other. They each have their pluses and minuses. Both formats are effective ways to communicate with another person. UHF radio The UHF radio band for commercial radios is between 400 512 MHz. Until recently, it wasnt widely used. Now, the UHF radio frequency is used for two-way radios, GPS, Blue-tooth, cordless phones, and WiFi. VHF radio The VHF radio band for commercial radios is between 130 174 MHz. FM radio, two-way radios, and television broadcasts operate in this range. Both UHF and VHF radios are prone to line of sight factors, but VHF a little more so. The waves make it through trees and rugged landscapes, but not as well as UHF frequencies do. However, if a VHF wave and a UHF wave were transmitted over an area without barriers, the VHF wave would travel almost twice as far. This makes VHF easier to broadcast over a long range. Two-way radios, hand-held portable, vehicle-mounted mobile and desktop base station are full duplex. b) Legal requirement for operation system Two -way radio devices Two-way radio power Antennas Channel usages FCC Licensing Audio Accessories Cases, Holsters, and Belt Clips Batteries Repeaters Drop-in Charger Multi-charging Units Selectable Power Operators Administrators Control station Additional and optional knowledge of two-way voice communication technology Overall knowledge of how to use a selected two-way voice communication device Costs of setting up and operating the system in my country As for hand-held two way voice communication device, according to amazon.com, the costs are as follows: For Cobra CTX400 GMRS/FRS 2-Way Rechargeable Radio with Hands-Free Operation (Pair) $36.88 For Townsville Police Department, total cost for using hand-held two way voice communication device is up to $2065.28. d) Limitations of each method (interference, range, etc.). Product Features 22 Mile Range, 22 Channels 121 Privacy Codes 10 Channel NOAA radio Hands-free operation (VOX) 8 Rechargeable AAA batteries, and a 2 port desk charger included Maximum range extender and belt clip included for maximum efficiency and carrying ease Lead-Free, Eco-Friendly Packaging e) As for following feature Highlights, tow way voice communication should be set up. VOX The Voice Activated Transmit (VOX) feature enables us to use our radio hands free. When VOX is turned on, the radio will automatically begin transmitting when we speak, without pressing the push-to-talk button. VOX works well for any application. On most VOX-capable radios there is a slight delay between when we start speaking and when the microphone turns on so the first part of the conversation may be clipped. Most radio users overcome this by repeating the first word. Military Specification Standards In an effort to achieve standardization objectives for purchases of products used by the military and other government organizations, the U.S. Department of Defense created standards that these products must meet. We will see these standards called military standard, MIL-STD, or MIL-SPEC. These standards ensure products meet certain requirements, commonality, reliability, compatibility, and similar defense-related objectives. According to Military Specification Standards, Townsville Police Department should be used Cobra CTX400 GMRS/FRS 2-Way Rechargeable Radio. Task 4 a) Since AVAYA IP Office 4.0 is only software for PBX telephone system, the main equipment that would be installed is only software. The procedure for the installation is as follows: Installation To establish and maintain an IP DECT installation, a network infrastructure is assumed, which comprises at least the following components: IP Base Stations IP DECT phone IP Office TFTP server (which can be the IP Office or 3rd Party) Depending on the operational requirements the following services should be provided: DHCP SNTP DNS WML/HTTP Syslog daemon b) AVAYA IP Office 4.0 Telephone System (IP DECT) Digital Enhanced Cordless Telecommunication The standard (ETS 300 175) essentially specifies the air interface, known as the radio interface. Voice and data can both be transmitted via this interface. DECT key technical characteristics are: Frequency range: approximately 1,880 1,900 GHz (approximately 20 MHz bandwidth) 10 carrier frequencies (1,728 MHz spacing) with 12 time slots each Doubling the number of time slots (to 24) using the TDMA process Net data rate per channel of 32 kbit/s (for voice transmission using ADPCM) Voice coding using the ADPCM method Maximum transmission power of 10 mW GAP Generic About the IP DECT Base Stations There are two types of IP Base Station. All IP Base Stations have the same hardware and software capabilities. Indoor IP Base Station The indoor IP Base Station is for indoor use only. It can be powered by a mains adapter or by 802.3af compliant power over Ethernet. Note For Australia and New Zealand the mains adaptor is not currently supported. Only 802.3af compliant power over Ethernet is supported. Outdoor IP Base Station The outdoor IP Base Station can be used outdoors or indoors. The outdoor IP Base Station can only be powered by 802.3af compliant power over Ethernet. Note Avaya Power over Ethernet adaptors are non 802.3af compliant, and therefore cannot power the ADMM. One of the IP Base Station within an IP DECT installation must be chosen (at installation time) to operate as the ADMM. This ADMM mode is in addition to the normal IP Base Station functionality that all the other base stations retain. c) Costs for installing AVAYA IP office There are two models of phones: the 3701 and 3711 phones. Avaya Kirk DECT phones (WT9620 and DT20) function on the IP DECT solution, but the functionality is limited. AVAYA Partner 18D- Digital phone 3 new from $95.00 Avaya 6408D+- Digital phone -multi-line operation Avaya 5621SWP IP Phone (700385982) Avaya IP400 Analog Trunk 4 card Available at external website: Atlas Phones for $199.00 d) Costs for operating the system Avaya IP Office Smart Card w/Voicemail Pro like new, available at external website: Atlas Phones for $1,095.00. Premise-based IP PBX systems vary extremely widely in cost and even more so as we look at wide-scale deployments and future growth and additions to a system. A basic premise-based box for a relatively small number of users say up to 20 in a single location can cost less than $1,000 excluding the phones themselves. But expansion costs and other branch locations can change the cost equation dramatically. In addition, we will have ongoing costs related to connection to the regular phone system and whatever connection costs are imposed by our backbone supplier. These ongoing costs are nevertheless going to be considerably lower than any other form of phone system. They should be lower than hosted VoIP solutions, and they will be dramatically lower than any older PBX and telecommunications provider. Phones are an additional cost, but when buying a premise-based IP PBX system, we often have greater flexibility than in any other arrangement. We can choose to go with very low-cost, no-name or bottom-of-the-line phones (which are still perfectly capable) all the way up to top-notch phones from manufacturers such as Polycom and Siemens that provide usability benefits (although often at a price premium). For Townsville Police Department, AVAYA Partner 18D- Digital phone should be used up to 6 base stations as for details, one Headquarter Reception Area, four Districts, and one serious crime squad. e) Recommendation for AVAYA The IP DECT solution delivers all the benefits of IP-based converged communications with the convenience of in-building wireless communications. Designed to support a large number of users, the IP DECT system enables users to carry a wireless phone and get full access to all the features they are accustomed to using at their desk phone. The IP DECT solution, which connects to the IP Office using a variant of the H.323 protocol, can support users in different offices that are connected via a WAN. An IP DECT cordless handset can travel from one office to another, making and taking calls. The DECT over IP system comprises the following components: At least one IP Base Station connected over an IP network and offering IP DECT as a wireless interface. A maximum of 32 IP Base Stations are supported. IP Office Small Office Edition, IP Office 406v2, 403, 406v1 or 412 with available VCM resources. IP DECT phone: Avaya 3701 and Avaya 3711 wireless phones. A maximum of 120 IP DECT phones are supported. Avaya IP DECT Mobility Manager (ADMM): management interface for IP DECT Wireless Solution, which runs on either one of the IP DECT Base Stations. The picture displayed next page gives a graphical overview of the architecture of the IP DECT Wireless solution. The IP Office, ADMM and the IP Base Stations communicate through the IP infrastructure. The IP Base Stations and the IP DECT phones communicate over air. Graphical overview of the architecture of the IP DECT Wireless solution Task 5 Task (5) This is the detail report for the overall tasks sorting from Task 1 to Task 4.In Task 1, the Townsville Police Department should be used Category 6 UTP by the following reasons:  » Cost and size of media, relative to augmented category 6 and STP  » Installed base currently the dominant UTP cabling standard  » Installation widely accepted And it is suitable for Townsville Police Department. Category 6 supports gigabit Ethernet and is recognized by standards bodies as supporting 10GBASE-T, however there are limitations that must be considered. The IEEE 802.3an standard cites a 55 meter distance limitation for standard category 6, which is not universally agreed upon within the TIA and ISO standards.TIA TSB 155 recently released a Technical Service Bulletin covering additional parameters for running 10GBASE-T on standard category 6. In this document a 37 meter distance limitation is referenced for 10GBASE-T on standards compliant category 6 systems. Between 37 meters and the IEEE referenced 55 meters, standard category 6 may support 10GBASE-T, but it is possible that the installer may have to use alien crosstalk mitigation techniques such as unbundling cables or replacing patch cords to improve the electrical parameters to allow 10GBASE-T to work properly. Above 55 meters, it is unlikely that category 6 UTP would work properly without a large amount of mitigation to reduc e alien crosstalk. A key takeaway is that using category 6 UTP for 10GBASE-T should be focused on existing installations, not new installations. The choice for new installations designed to support 10GBASE-T should be augmented category 6 UTP, STP or optical fiber systems. Townsville Police Department has been restructured within an area of 100 square kilometers. But Townsville PD could not over more than 500 square kilometers because the head departments are divided into four districts (Northern, Eastern, Western and southern). Cat 6 UTP could support that area. For Task 2, the services for internet connections are as follows: Information (browsing, online-shopping, etc.) Communications (mail, chat, Video conferencing, etc.) Files sharing (downloading, uploading, etc.) These services are the most common used for internet. And recommended connection speeds are as follows: For Information service: It can cover only 100 Kbits/s usually prove adequate. For Communication: For video conferencing, bandwidths of no more than 384 Kbits/s usually prove adequate. As for chatting communication, especially for most chatting communications, 28 Kbits/s should be enough. For File Sharing: As for file sharing, bandwidths of more than 1 Mbit/s are most suitable. There is only one Internet Service Provider in our country, Myanmar Ports and Communications. In Task 3, there are too many options for two -way voice communication devices. Two-way voice communications (radios) are essentially available in three types: Hand-held portable, Vehicle-mounted mobile, and Desktop-base station These are most common used for two-way voice communication. And I provided the recommendation the device as follows: Military Specification Standards In an effort to achieve standardization objectives for purchases of products used by the military and other government organizations, the U.S. Department of Defense created standards that these products must meet. We will see these standards called military standard, MIL-STD, or MIL-SPEC. These standards ensure products meet certain requirements, commonality, reliability, compatibility, and similar defense-related objectives. According to Military Specification Standards, Townsville Police Department should be used two way voice communication technology. For Task 4, the main equipments that would be installed are just only the software. There are so many options and vendors that provide telephone known as PBX. Among those vendors, I chose AVAYA IP Office 4.0 Telephone System (IP DECT). As for Townsville Police Department, like military office, it is important to choose the right products. The IP DECT solution delivers all the benefits of IP-based converged communications with the convenience of in-building wireless communications. Designed to support a large number of users, the IP DECT system enables users to carry a wireless phone and get full access to all the features they are accustomed to using at their desk phone. The IP DECT solution, which connects to the IP Office using a variant of the H.323 protocol, can support users in different offices that are connected via a WAN. An IP DECT cordless handset can travel from one office to another, making and taking calls.

Friday, October 25, 2019

Comparing Hercules by Walt Disney and Creating the Myth by Linda Seger

One of the greatest Greek mythological stories portrayed in a movie would be Hercules. Hercules is a well-known hero; he displays a supernatural individual who has to overcome the villain and his bad monsters. In â€Å"Creating the Myth† by Linda Seger, she argues that the hero myth as many obstacles (the death experience, the road back, the reborn) that he or she need to overcome to be transformed into a hero. However, these obstacles play a very important role in the hero’s stage of initiation. The movie â€Å"Hercules† by Walt Disney and the creator Alan Menken, we encounter the characters of the movie which are Hercules of course, Philoctetes the trainer, Pegasus the horse, loyal companion, Megera the love of Hercules and Hades the villain. All these characters connect strongly with Hercules because they guide him to become a hero. I argue that the movie â€Å"Hercules† follows the theory â€Å"the Hero Myth â€Å"by Seger, because he was a caring person who loved to help others; he evolved to be a strong person because he listened to his mentors that helped him gained strength, and was courageous individual because of all the obstacles he had to overcome. First of all, the character Hercules was a non-hero who later received the power of strength. As a young boy Hercules wished to overcome any problem and always had in mind to be a strong man and to do the impossible. For example, in the movie , Hercules is a hard working kid who later by his parents gained a valuable power of strength being â€Å"introduced in ordinary surrounding in a mundane world, doing mundane things â€Å" (Linda Seger 2) Hercules could not believe where all his strength was coming from because he had become too powerful to believe. Seger also explained that â€Å"this is how... ...ero and is well-known because he overcome all challenges and accomplished the mission to become a great hero because he is caring, strong and a courageous individual. Without these three powerful gifts Hercules would have not proven himself a true hero. Although, Hercules was not instantly known as a hero, he had to prove his will of becoming one and he sure did. From my point of view, I liked better the Disney version of Hercules than the real myth of Hercules because the movie includes comedy and is appealing to family and children. Seger explains, that â€Å"A myth is more than true because it is lived by all of us, at some level. It’s a story that connects and speaks to us all† (1) and I agree with her because every myth has logic and that logic will last forever. Works Cited â€Å"Creating the Myth† by Linda Seger â€Å"Hercules† Walt Disney. Creted by Alan Menken

Thursday, October 24, 2019

A Prisoner and Yet

A Prisoner and Yet   is an autobiographical piece of non-fiction that was written by Corrie ten Boom two years after her release from the Ravensbruck concentration camp in Nazi Germany. The book is set up in a style that differs from what I am used to. In it, rather than focusing on her story, Corrie addresses individual occurrences she experienced over the course of her imprisonment. Later on, she treats each almost like a parable, using the one to two page subchapter to illustrate either a spiritual or moral lesson for the reader. Over the course of the 170 page book, she addresses a widespread variety of topics including faith, compassion, fear, acceptance of death, courage, strength, sin, love, morality, turning the other cheek, timidity, prayer, covetousness, kindness, and even the bond between brothers and sisters in Christ despite of language barriers. It's really quite remarkable. I started the book thinking the set up would prove awkward and unsettling, but I soon found myself engrossed, incapable of putting the book down. With each flip of the page, my thirst for a definitive ending to Corrie's struggles grew. I was hooked.As an autobiographical account, the hero of A Prisoner and Yet. . . was naturally the author, Corrie ten Boom, and, boy, let me tell you, she was a hero. Selfless and strong-willed, the Dutch watchmaker stood firm in her beliefs even when she had lost everything: her freedom, her family, her country, and even the clothes off her back. The Lord Jesus Christ was her Conqueror. Through His grace and glory, she knew she would be delivered. Corrie did not fear death in the camps. Rather, she embraced the opportunity to spread the Word of God. She preached daily, sometimes up to five times, and prayed with those in need or coming into the faith. It was amazing that someone so oppressed and in such close proximity to death could still have so much hope and conviction. Throughout the book, Corrie attributed much of her survival to the constant companionship of her sister Betsie. Betsie was equally faithful and often provided spiritual guidance when Corrie felt herself straying or in need of extra help. They were inseparable. Sadly, Betsie was a frail thing. She could not carry out heavy labor and became sick easily. Corrie often wondered at her sister's seemingly innocent view of their wretched surroundings. She always looked so peaceful. It was terrible to read when poor Betsie died of sickness, but at least she had gone to a far better place. The story begins with a recollection of the author's life before imprisonment. The readers are given a quick description of the author's home which she shared with her father, Casper Ten Boom, siblings, and an eclectic group of Jews. After the fall of Holland in 1940, the Ten Booms had joined the Dutch resistance, offering a safehouse for God's People. According to the author, â€Å"it was often said (that their house), ‘was the gayest underground address in all the Netherlands'† (ten Boom 7). They were contented, as close to at peace as they could be in such a dark time. Sadly, on February 28, 1944, that peace ended. The ten Boom residence was raided by the Gestapo. Their house was searched and the family was taken into custody. Corrie, her father, and Betsie were transferred to Scheveningen Prison. There, Corrie hardly ever saw the sunlight, spending her days locked in solitary confinement. Later on in her time there, waiting to go on trial, she found out that her father had died shortly after being brought to the prison.She and her sister were reunited when they were sent to Kamp Vught, a political concentration camp. There, conditions were not so bad. They were able to slack off at work and received Red Cross packages and mail from home. Due to her background as a watchmaker, Corrie was given the opportunity to do detailed work on radio parts. After awhile, she and her sister were transferred to a German concentration camp called Ravensbruck. As Corrie aptly described it, the place was hell. They were stripped naked and forced to hand over their belongings before being redressed and sent to barracks where the beds looked more like a line of shelves, tightly packed with women instead of books. Using a bible they had snuck in, the sisters performed worship services with the girls in their barracks daily, keeping up the dwindling morale. Slowly, they became thinner and weaker – Betsie more so than Corrie. Finally, one day in late fall of 1944, Corrie heard the voice of God tell her that her release was drawing near and that she would be free by the first day of winter. This prediction became reality, but sadly fifteen days too late for Betsie. Corrie's sister had gone Home to meet her Maker. The author finished the story by telling of her return to the Netherlands and documenting her decision to open a home which â€Å"would soon be the happy home of people who had been released from the wretchedness of imprisonment† (ten Boom 169). In the end, I believe that Corrie Ten Boom wrote this novel as a testament to the horrors of her experience and to the strengthening of her faith through the experience. A Prisoner and Yet. . . immortalized both her story and, by extent, the stories of many women, men, and children who were held at the various prisons and camps across Europe during the Nazi regime. I am thankful that I stumbled upon it and I would recommend the read to those struggling with their faith, growing in their faith, or merely interested in the treatment of political prisoners in WWII.

Wednesday, October 23, 2019

Dulce Est Decorum Est and This Is the Dark Time, My Love

Neither fame nor glory can compensate for the immense suffering that war inflicts on humanity. â€Å"Dulce et decorum est pro patria mori† is an ‘old’ lie told to youths ardent of joining the army. Not only are the targeted victims oppressed, but the soldiers who risk their lives fighting for their countries are left horrified. In both â€Å"Dulce et Decorum Est† and â€Å"This is A Dark Time, My Love†, the intimate experiences of the personas give first-hand insights of the terrors and tortures of war. Imagery, pathetic fallacy and language vividly create the ghastly image of war. This is The Dark Time, My Love† is about a people whose dreams of a better life have been threatened by the destructive power of the â€Å"strange invaders. † The persona conveys his intense anger against the British military presence and his belief that their rule is wrong and they display total injustice. Additionally, the persona accentuates the subjection, devastation, death and anger of the people of Guyana. It focuses on the â€Å"dark time† that the people are facing that the experience of the war where â€Å"all around the land brown beetles crawl about†. Everywhere the faces of men are strained and anxious† tell of the fear and tension that the victims feel. Even nature is sympathetic as â€Å"red flowers bend their heads in awful sorrow. † The poet laments of the misery of his people, the instability of his people and the sorrow brought by these â€Å"strange invaders†. In â€Å"Dulce et Decorum Est†, a soldier vividly describes the horrors of war as he hopelessly watches one of his comrades being â€Å"gassed. † Returning from the battle-field, â€Å"bent double,† coughing and limping with blood-shod feet, they had not heard the gas-filled shells being dropped. Luckily, most of the soldiers managed to escape, but unfortunately one of his comrades did not. As the persona recounts the traumatic experience, he lashes out at all who thinks that it is glorious and honourable to die for one’s country. The impact of the incident on the persona is one of loathing and revulsion. Both poets use imagery which is striking and graphic to inform us of the terrors of war. In â€Å"This is The Dark Time, My Love,† the visual image of the soldiers, â€Å"all around the land brown beetles crawl about†, in their thick armoury is like the beetles who have hard shells on their backs. All around† and â€Å"crawl† creates the image that they move around in large uniform masses, just like beetles. The word â€Å"crawl† also presents the image of the soldiers moving sneakily and invading the land with stealth. â€Å"Who comes walking in the dark night time? / Whose boot of steel tramps down the slender grass† creates the visual image of the soldiers, who can walk through the dark night fearlessly, unaffected by the dark times. An auditory image is also created as the tramping of the soldiers can be heard as they walk on the unthreatening, impotent grass. Imagery in this poem is used to describe the ways in which war oppresses innocent victims, whereas in â€Å"Dulce et Decorum Est†, similes are used to create images of the struggles soldiers face on the battlefield. The simile, â€Å"bent double, like old beggars under sacks†, is vivid as one can actually picture the soldiers â€Å"drunk with fatigue† and trying to make their way back to camp. They are hopeless and tired and though fighting for one’s country is said to be honourable, they are being compared to beggars. This line contrasts with the title of the poem. Both the visual and auditory image of the â€Å"knock-kneed† soldiers â€Å"coughing like hags† shows the choking effect of the smell of the gas. Their coughing sounds like that of an old, tired person, which they in fact are. They cannot breathe and being compared to ‘hags’ emasculates the soldiers. Pathetic fallacy is used in â€Å"This is the Dark Time, My Love† since even nature was in a state of sadness at the oppression of the society. This is seen by the personifications, â€Å"The shining sun is hidden in the sky/Red flowers bend their heads in awful sorrow. The flowers appear to mourn the people in the dark time who are victims of the violence of the soldiers and the suppression by the colonial powers. It seems as if the wilting flowers, whose stems are usually drooping, are actually bending their ‘heads’ in sympathy with those who have to live through the dark times. The â€Å"shining sun† represents hope and prosperity . It is unable to penetrate through the â€Å"dark times† where the people are hopeless and in despair. The sun being hidden in the sky reflects that there is no hope for the society. The emotive and intense language used in â€Å"Dulce et Decorum Est† tells of the anger, revulsion and disgust the persona feels about being part of the war. â€Å"He plunges at me guttering, choking, drowning, â€Å"white eyes writhing in his face† and â€Å"blood come gargling from his froth-corrupted lungs† evokes sympathy in the reader. The soldier’s comrade did not die instantly from inhalation of the gas, he suffered before he died. In all the persona’s â€Å"smothering dreams,† he never thought he would experience anything like that. â€Å"Like a devil’s sick of sin† compares war to the devil who offers no good and will never be sick of sin. War only offers pain and suffering and it is as if those who declare war are in fact devils. â€Å"This is The Dark Time, My Love† and â€Å"Dulce et Decorum Est† both aim to convey the universal message that the stereotypical assumptions about war and fighting for one’s country are lies. Both poems tell of the atrocities of war and that war affects everyone. In â€Å"Dulce et Decorum Est,† the persona remarks that the battlefield is a horrifying experience and that many are scared for life and left feeling helpless and hopeless. The main comment the persona is trying to make is that dying for one’s country is neither noble nor honourable as people claim it to be and those anxious for glory should not buy into this belief. It emphasizes how much they had to suffer and the message received is that war is not worth the trauma and agony they have to endure. In â€Å"This is The dark Time, My Love,† the persona indicates that war is so dehumanising that even nature makes a statement as pathetic fallacy. The persona also refers to war as â€Å"the season of oppression . . and tears. † This alludes to the hostility and brutality to which the Guyanese are subjected and their suffering as a result. It goes on to say that it is a â€Å"festival of guns† and â€Å"Carnival of misery† showing that violence is so rampant, it seems to be a celebration. War imposes itself on the nation’s culture and robs the nation of its independence and dreams; â€Å"aiming at your dream. † War wreaks severe pain and distress on both soldiers and innocent, targeted people and this brings about the question whether war is really worth the suffering. Those who declare war do not endure the suffering and thus, preach that it is glorious to die for one’s country. However, as the both persona’s prove, it is no honour and certainly, no nobility to die for one’s country !

Tuesday, October 22, 2019

Free Essays on The Empire And The People

â€Å"The Empire and the People† Americans have the need to expand and set their goals high. Oversea expansion wasn’t a new idea that just popped up, but revived again. There have been many oversea probes and interventions by the 1890s and from that, ideology of expansion was widespread. The Monroe Doctrine even glanced southward into and beyond the Caribbean. Captain A. T. Mahan (well-known propagandist for expansion) was influential to American leaders as well as Theodore Roosevelt. He said that the biggest navies would inherit the earth, which was their Manifest Destiny. Now, it’s time for them to set their eyes on inheritance other than within the boundaries of the United States. It’s progress for the Americans to expand and want what they do not have (expand their sight and goals; take more land). Trade is very important to American merchants, and foreign trade was of greater relevance. Theodore Roosevelt talked about expansion and that it wasn’t just for manliness and heroism, but also for the â€Å"trade relations with China.† In 1898, 90% of American products were sold at home. The 10% was sold abroad and amounted to about a billion dollars. Oil was a huge export in the 1880s and the 1890s. Thanks to Rockefeller’s Standard Oil Company, which accounted for 90% of American exports of kerosene, controlled 70% of the world market. This made oil the second leading overseas product nest to cotton. If it weren’t for foreign trade and exports, the United States would have a surplus of goods and that would lead to a depression.... Free Essays on The Empire And The People Free Essays on The Empire And The People â€Å"The Empire and the People† Americans have the need to expand and set their goals high. Oversea expansion wasn’t a new idea that just popped up, but revived again. There have been many oversea probes and interventions by the 1890s and from that, ideology of expansion was widespread. The Monroe Doctrine even glanced southward into and beyond the Caribbean. Captain A. T. Mahan (well-known propagandist for expansion) was influential to American leaders as well as Theodore Roosevelt. He said that the biggest navies would inherit the earth, which was their Manifest Destiny. Now, it’s time for them to set their eyes on inheritance other than within the boundaries of the United States. It’s progress for the Americans to expand and want what they do not have (expand their sight and goals; take more land). Trade is very important to American merchants, and foreign trade was of greater relevance. Theodore Roosevelt talked about expansion and that it wasn’t just for manliness and heroism, but also for the â€Å"trade relations with China.† In 1898, 90% of American products were sold at home. The 10% was sold abroad and amounted to about a billion dollars. Oil was a huge export in the 1880s and the 1890s. Thanks to Rockefeller’s Standard Oil Company, which accounted for 90% of American exports of kerosene, controlled 70% of the world market. This made oil the second leading overseas product nest to cotton. If it weren’t for foreign trade and exports, the United States would have a surplus of goods and that would lead to a depression....

Monday, October 21, 2019

Free Essays on Music Of The 60s - A Clashing Of Generations

MUSIC OF THE 60’S - A CLASHING OF GENERATIONS The Sixties were an exciting revolutionary period of time with great social and technological change. Some people called it the â€Å"decade of discontent† because of the race riots and demonstrations against the Vietnam War. The sixties were about assassination, unforgettable fashions, civil rights, and sexual freedom. All of these components caused a revolutionary change in the world of popular music. In the sixties, music mirrored the tensions of the era, and played an important role in changing American culture. The verbal content of rock songs turned toward rebellion, social protest, sex, and drugs. Rock and Roll was for and about adolescents. Its lyrics articulated teenage and young adult's problems and concerns. All aspects of the music, its heavy beat, loudness, self-absorbed lyrics, indicated a defiance of adult values and authority. This defiance caused older people to express unrealistic fear for their children and for our nation's future. This was the period when the younger generation developed a keen sense of alienation from the older generation and the establishment with all its political, social and religious institutions. They went searching for new answers to age-old questions, such as the value of the individual, the authority of the state, truth, justice, and the meaning of life. Alienation came in many forms and is aimed at different targets. Much of this generation’s music was an expression of the anguish and alienation the young felt towards the older generation, the government, and the confinement of the society they lived in. They attempted to address the important issues generated by the unique events of the period. So, in a way the music of the sixties is explained by the simple clichà © that music was a product of the culture that created it.... Free Essays on Music Of The 60's - A Clashing Of Generations Free Essays on Music Of The 60's - A Clashing Of Generations MUSIC OF THE 60’S - A CLASHING OF GENERATIONS The Sixties were an exciting revolutionary period of time with great social and technological change. Some people called it the â€Å"decade of discontent† because of the race riots and demonstrations against the Vietnam War. The sixties were about assassination, unforgettable fashions, civil rights, and sexual freedom. All of these components caused a revolutionary change in the world of popular music. In the sixties, music mirrored the tensions of the era, and played an important role in changing American culture. The verbal content of rock songs turned toward rebellion, social protest, sex, and drugs. Rock and Roll was for and about adolescents. Its lyrics articulated teenage and young adult's problems and concerns. All aspects of the music, its heavy beat, loudness, self-absorbed lyrics, indicated a defiance of adult values and authority. This defiance caused older people to express unrealistic fear for their children and for our nation's future. This was the period when the younger generation developed a keen sense of alienation from the older generation and the establishment with all its political, social and religious institutions. They went searching for new answers to age-old questions, such as the value of the individual, the authority of the state, truth, justice, and the meaning of life. Alienation came in many forms and is aimed at different targets. Much of this generation’s music was an expression of the anguish and alienation the young felt towards the older generation, the government, and the confinement of the society they lived in. They attempted to address the important issues generated by the unique events of the period. So, in a way the music of the sixties is explained by the simple clichà © that music was a product of the culture that created it....

Sunday, October 20, 2019

Changing Views on Homosexuality

Men and women are feeling more open to express their homosexual lifestyle and this is in part due to the changing views of sexual behavior and homosexuality. Homosexual behavior is defined as sexual behavior with a member of one’s own sex (Sarason Sarason, 2005). Prior to the 1970s, homosexuality was considered to be a diagnosable psychiatric disorder and was listed in the DSM (Diagnostic and Statistical Manual of Mental Disorders). Homosexuality was viewed almost as a disease that people needed to be cured of. Research revealed that homosexual men and women did not differ in psychological adjustment from heterosexual men and women (Sarason Sarason, 2005). There has been the debate of whether a person is born gay or if homosexuality is a learned behavior. In my opinion, I believe that a person is born gay and does not chose or learn this sexual behavior from others. I’ve witnessed a relative grow up and noticed behavior as child that suggested he may be gay. As an adult, he informed the family that he is in fact gay. This came as a shock to no one and when asked when he knew he was gay, he stated that he knew all along. It is thought that if people no longer viewed homosexuality as a behavior that people chose to partake in, that less emphasis would be placed on trying to â€Å"cure† homosexuality. Dr. Glenn Wilson and Dr. Qazi Rahman, authors of the book Born Gay, state that there is no single gay gene, but genes do contribute and consider the effect of sex hormones to which fetuses are exposed in the womb (Ahuja, 2005). Wilson and Rahman feel that sexual orientation is fixed at birth and that any evidence-based scientist would agree (Ahuja, 2005). With more people understanding that sexual orientation is innate rather than learned, viewpoints on homosexuality are shifting. Our society is slowly becoming more accepting and placing less of a stigma on homosexual behavior. In the past there were no rights for gays wanting to marry, but now gays in Massachusetts can legally marry. In Vermont and other parts of the world, gay men and women now have the right to enter into legal partnerships that give them some of the same protections and responsibilities of marriage (Sarason Sarason, 2005). Past opinion polls have resulted in some Americans saying that gays cannot be considered good role models for children (Sarason Sarason, 2005). Some people have thought that a child’s sexual orientation could be affected if the child had gay or lesbian parents. Research on child adjustment in homosexual households provided results that did not differ from children raised by heterosexual parents (Sarason Sarason, 2005). Dr. Ellen C. Perrin feels that children raised by gay or lesbian couples do just as well as children raised as by heterosexual couples. â€Å"In some ways children of same-sex parents actually may have advantages over other family structures†, says Perrin (Chang, 2005). Studies conducted on homosexual couples show that lesbian couples share household responsibilities equally and that children adjust better when there is an equal division of labor (Chang, 2005). Raising healthy, well-adjusted children and understanding that homosexuality is an innate behavior are just two examples of why attitudes towards homosexuality are changing. Although there is still room for improvement in terms of accepting gay culture, strides are being made compared to earlier attitudes. To me the most significant change is understanding that homosexuality is not a disorder, it represents a person’s sexual orientation. References http://www.webmd.com/mental-health/news/20051012/study-same-sex-parents-raise-well-adjusted-kids Changing Views on Homosexuality Men and women are feeling more open to express their homosexual lifestyle and this is in part due to the changing views of sexual behavior and homosexuality. Homosexual behavior is defined as sexual behavior with a member of one’s own sex (Sarason Sarason, 2005). Prior to the 1970s, homosexuality was considered to be a diagnosable psychiatric disorder and was listed in the DSM (Diagnostic and Statistical Manual of Mental Disorders). Homosexuality was viewed almost as a disease that people needed to be cured of. Research revealed that homosexual men and women did not differ in psychological adjustment from heterosexual men and women (Sarason Sarason, 2005). There has been the debate of whether a person is born gay or if homosexuality is a learned behavior. In my opinion, I believe that a person is born gay and does not chose or learn this sexual behavior from others. I’ve witnessed a relative grow up and noticed behavior as child that suggested he may be gay. As an adult, he informed the family that he is in fact gay. This came as a shock to no one and when asked when he knew he was gay, he stated that he knew all along. It is thought that if people no longer viewed homosexuality as a behavior that people chose to partake in, that less emphasis would be placed on trying to â€Å"cure† homosexuality. Dr. Glenn Wilson and Dr. Qazi Rahman, authors of the book Born Gay, state that there is no single gay gene, but genes do contribute and consider the effect of sex hormones to which fetuses are exposed in the womb (Ahuja, 2005). Wilson and Rahman feel that sexual orientation is fixed at birth and that any evidence-based scientist would agree (Ahuja, 2005). With more people understanding that sexual orientation is innate rather than learned, viewpoints on homosexuality are shifting. Our society is slowly becoming more accepting and placing less of a stigma on homosexual behavior. In the past there were no rights for gays wanting to marry, but now gays in Massachusetts can legally marry. In Vermont and other parts of the world, gay men and women now have the right to enter into legal partnerships that give them some of the same protections and responsibilities of marriage (Sarason Sarason, 2005). Past opinion polls have resulted in some Americans saying that gays cannot be considered good role models for children (Sarason Sarason, 2005). Some people have thought that a child’s sexual orientation could be affected if the child had gay or lesbian parents. Research on child adjustment in homosexual households provided results that did not differ from children raised by heterosexual parents (Sarason Sarason, 2005). Dr. Ellen C. Perrin feels that children raised by gay or lesbian couples do just as well as children raised as by heterosexual couples. â€Å"In some ways children of same-sex parents actually may have advantages over other family structures†, says Perrin (Chang, 2005). Studies conducted on homosexual couples show that lesbian couples share household responsibilities equally and that children adjust better when there is an equal division of labor (Chang, 2005). Raising healthy, well-adjusted children and understanding that homosexuality is an innate behavior are just two examples of why attitudes towards homosexuality are changing. Although there is still room for improvement in terms of accepting gay culture, strides are being made compared to earlier attitudes. To me the most significant change is understanding that homosexuality is not a disorder, it represents a person’s sexual orientation. References http://www.webmd.com/mental-health/news/20051012/study-same-sex-parents-raise-well-adjusted-kids

Friday, October 18, 2019

Statistics Research Paper Example | Topics and Well Written Essays - 250 words

Statistics - Research Paper Example In the study, the research establishes that there is no significant difference in the means for leukemia survivors of different gender. Hypothesis test is the process of evaluation of the truthfulness of a statement made regarding the parameters of research data, at a certain level of confidence. (Anderson, Burnham & Thomson p.913) present a hypothesis test on the mean, and attempt to demonstrate how the test has been misused. (Pearson & Bloom p.8) have used the standard z-test to describe the poll results of senate contest in 2002. They have diagrammatically represented the expected normal distribution of the results, and emphasized on the interpretation of these results based on the drafted hypothesis. Nahid, Reisi, Leila, Khalilian. â€Å"Comparison of Intelligence Quotient in Children surviving leukemia who Received Different Prophylactic Central Nervous System Treatments†. (2012). Web, 28 November 2012. Pearson, Elizabeth Jennie, Bloom, Joel David. â€Å"A Probability-Theory Based Test of the Reliability of Election Polls†. N.d. Web. 28 November 2012.

Management case study Essay Example | Topics and Well Written Essays - 3000 words

Management case study - Essay Example Mark, who described to his team members about group dynamics and team effectiveness. Enough time needed to be provided in order to understand each other and proper co-ordination among the team members is of paramount importance. The group leader Mark gave a proper direction and scrutiny to its team members. For the effective undertaking of this session, proper co-ordination among the team members was essential. Working in a group is more dynamic as well as challenging than doing things on one's own. Motivation helps to improve the morale of the team members. Thus, the group leader needs encourage the team members to achieve the goals that they set. It is also necessary to provide a clear idea to the members about the group norms. The goals shall be achievable through team efforts of the group members. Team spirit and effective communication are the key factors behind the proper implementation of the norms of the group. Along with group dynamics and team effectiveness, proper leadership and supervision are necessary for the retreat group's success. Effective training and development programs are also necessary. The members of each group are different from one another on the basis of their knowledge and skills. They come from different environment and are mainly from three locations. While undertaking the session, Mr. Mark, the group leader maintained the group systematically, by arranging seating properly for the team members, and discussed their ultimate goals. The major goals of the team members were to accumulate competitive power, assimilate the essential quality to cope with other groups, reach the best in sports or athelitical activities, running around 25miles, and the like. The group also aimed at developing a sound atmosphere. As the retreat session went on, it could be clearly evaluated that the group was developing in athletic efforts, rather than those of academicals. When the first week of the training session ended, the participants of the group were called to undertake a self evaluation. Even though the group members knew each other, their strength and weaknesses, and so on, they were reluctant to charge each other. Both academic and athletic programs of Mark's group were good enough, but it turned out to be the worst when compared it with those of competitors. Mr. Mark was worried, because he was responsible for developing effective steps to overcome those problems an effectively. After a few days' gap, Mr. Mark planned another procedure known as Project X, by dividing the group members in to two, i.e. six members each. This project aimed at evaluating the capability and skills of the group members. This project would help in analyzing whether the group members will be able to tackle the problem, and their ability to provide a solution for it within the stipulated time period. But the Mark's group performed badly, which made the group leader quiet disappoint. The goals so set by the group remained unachievable. The leadership qualities of Mr. Mark were not remarkable. And the members were unable to attain the goals. The members of the group consist of their own personal merits, but there is a lack of group or team effectiveness to attain these goals. More than this, after the failure of Project X, the group decided to modify the goals on the basis of success and failures attained by them. The Mark's group was unable to

Public Procurement Law Essay Example | Topics and Well Written Essays - 6000 words

Public Procurement Law - Essay Example Under this option, there are several procurement methods that the procuring entity can utilize to source for goods and service, but this essay will focus on open tendering and restricted tendering. The open tendering method is of key importance because of its high value in the process of procurement and because it exerts a significant amount of cost from public resources. This method sets transparency principle to a very high standard. It requires tenders for proposals on how projects will be approached and quality will be met1. Article 28(1) stipulates that unless article 29 to 31, the entities shall use open tendering. Article 10 of the Module law deals with the specification of the tendering process. Article 43(2)(c) establishes that the tender is considered responsive if all requirements conform to the tender documents for solicitation. Article 43 (1)(b) states that minor deviations are possible while not material changes are allowed in terms, conditions, characteristics and any set of requirements in the documents2. When specifications are considered as unlawful, then the procuring entity is required to use the European Union law, to re-issue under lawful forms the specifications are carried out lawfully. For the open tendering method, the Specifications and conditions should be finalized in a clear and concise way, and notices must used to advertise the projects publically. The advertisement should be adequately made to all including international suppliers. This will promote wider competition and place better value for money. The procuring entity will have an understanding of the entity’s needs by establishing a short-term strategy, followed by a definition of the technical direction and requirements of the process.  

Thursday, October 17, 2019

International Marketing Term Paper Example | Topics and Well Written Essays - 3750 words

International Marketing - Term Paper Example Since the contemporary market forces such as globalization, competition and technology influence the way business is carried out, a marketer is generally expected of anticipating the significant variables that can impact the business and how they can be managed too. This piece of research paper presents a brief marketing plan of the ‘Yogo-Sweet’, a medium sized manufacturer and marketer of the Frozen Yogurt, located near to Melbourne, Australia. This paper explains relevant concepts and theoretical underpinning in relation to marketing, strategy and competition. This marketing plan will present a pro forma financial statement and budgets. ‘Yogo-Sweet’ will be an amazing experience of small-treat that would fulfill the personal goal of delivering unique value of supreme quality Frozen Yogurt and ice cream needs of the target market. The company will target customers from around Australia and to export frozen yogurt stuff to countries like New Zealand, Fiji and other neighboring countries. The company has discovered a hidden opportunity for marketing Frozen Yogurt in Australia as well as neighboring countries and it seeks to grab its better slices. With the mission statement- ‘Yogo-Sweet is to facilitate stylish, convenient and uplifting destination where health-conscious and active customers can relax, energize and take treats’. The mission, with 20 well-thought about words in it, proposes the very specific marketing objectives that the emphasis will be placed on outstanding quality Frozen Yogurt and packaged ice-creams with organic and multicultural small-treat aspects. The company is expected to start on January 2012 in the rapidly expanding city of Melbourne, Australia. As Armstrong and Kotler (2005, p. 42) described, a marketing plan’s fundamental element is its mission statement that defines the marketing activities of the business in terms of how it is

Sustainability Research Paper Example | Topics and Well Written Essays - 1000 words

Sustainability - Research Paper Example In fact, it is a common misconception that the presence of global economic crisis could a zero growth rate in the demand for international tourism. According to Reisinger (2009, p. 8), tourism involves the movement of â€Å"goods, services, and people†. For this reason, the context of international tourism is very broad in the sense that this concept includes not only people who are travelling for leisure purposes (i.e. vacation purposes or visiting wildlife attractions, art galleries, museums, and a local festival, etc.) (Felsenstein & Fleischer, 2003) but also those individuals who are migrating to another country in search for new business or employment opportunities (Baum, 2006; Lundmark, 2006). Globalization has something to do with the continuously increasing demand for international tourism. In fact, significant change that is currently occurring in the trend of international tourism became more complex and fast-paced not only because of globalization but also due to th e availability of advance communication technology (Reisinger, 2009, p. 8; Formica & Kothari, 2008; Kyriaki & Vogt, 2006; Morrison, Taylor, & Douglas, 2004). For this reason, Reisinger (2009, p. 27) explained that globalization is the secret behind the opening of new business opportunities and growth in international tourism. ... Other than the permanent or contractual foreign workers, social tourism also includes low-income government employees who are assigned to work outside their homeland (Bhatia, 2001, p. 55). It is relatively cheaper and easier to hire highly competitive individuals from foreign countries. Therefore, one of the main reasons why companies in developed countries are hiring foreign workers is to cut down the fixed cost of labor. In relation to the on-going free trading of labor forces, millions of people each year are expected to be travelling from one country to another (Baum, 2006; Lundmark, 2006). In search for a better financial income, a lot of people from developing or underdeveloped counties will continuously attempt to look for better employment opportunities in developed countries. This explains why the number of illegal immigrants and low-skilled workers who are migrating to UK is excessively higher than expected (Beckford, 2012; Jowit, 2012). To control the increasing number of illegal migrants, the UK government is firm in its decision to deport back illegal immigrants to their homeland (Beckford, 2012). This could somehow increase the number of travelers each year. Instead of forcing illegal immigrants to return back to their mother land, President Obama decided to suspend the deportation and legally allow 1.7 million illegal immigrants to work in the United States (Emmanuel, 2012; Preston, 2012a, 2012b). In general, the presence of economic recession caused by natural calamities can open new business opportunities for some private sectors. Such incidence could eventually open new business and work opportunities not only on the part of highly reputable engineers but also the architects

Wednesday, October 16, 2019

Personal statement Essay Example | Topics and Well Written Essays - 500 words - 16

Personal statement - Essay Example I posses the ability to work well in both independent and team work environments. My work at Travelex has enabled me gain the confidence to deal with people face to face, working with team and managing workloads, this among others are the qualities that will enable me succeed in establishing a PGCE teachers training course in the UK. I am a very social person and enjoy interacting with people and especially students and children. I am an excellent team leader, and always try to lead my team diligently. I find it fulfilling and rewarding working with children and being able to guide them in their growing. I know that the primary teacher teaches across the curriculum and it necessary to be proficient in all areas. I believe that it is not only knowing the subject that is important as a teacher, but also knowing a child’s other needs individually. I have learnt that a teachers approach to a class can have great effects on the ability of the students to learn effectively. I intend on changing the way i teach often in order to maintain interest and focus in the students. Encouraging and praising students who are performing poorly is one of my strategies, this will in turn encourage them and eventually they will be able to achieve their desired goals. I intend on encouraging the use of verbal skills. This is very important for both children and adults and helps in clearer understanding and interpretation of information. I will also concentrate on visiting other schools in order to interact with other teachers. This will help me get more exposure, which will increase my knowledge an d enable me teach new things to my students. My exposure has enabled me acquire good ICT skills, this will enable handle any technical work that would arise in the institution. My outspoken grammar and ability to read well and write in English will help me in my teaching course. English is the major learning language in the UK thus this is an

Sustainability Research Paper Example | Topics and Well Written Essays - 1000 words

Sustainability - Research Paper Example In fact, it is a common misconception that the presence of global economic crisis could a zero growth rate in the demand for international tourism. According to Reisinger (2009, p. 8), tourism involves the movement of â€Å"goods, services, and people†. For this reason, the context of international tourism is very broad in the sense that this concept includes not only people who are travelling for leisure purposes (i.e. vacation purposes or visiting wildlife attractions, art galleries, museums, and a local festival, etc.) (Felsenstein & Fleischer, 2003) but also those individuals who are migrating to another country in search for new business or employment opportunities (Baum, 2006; Lundmark, 2006). Globalization has something to do with the continuously increasing demand for international tourism. In fact, significant change that is currently occurring in the trend of international tourism became more complex and fast-paced not only because of globalization but also due to th e availability of advance communication technology (Reisinger, 2009, p. 8; Formica & Kothari, 2008; Kyriaki & Vogt, 2006; Morrison, Taylor, & Douglas, 2004). For this reason, Reisinger (2009, p. 27) explained that globalization is the secret behind the opening of new business opportunities and growth in international tourism. ... Other than the permanent or contractual foreign workers, social tourism also includes low-income government employees who are assigned to work outside their homeland (Bhatia, 2001, p. 55). It is relatively cheaper and easier to hire highly competitive individuals from foreign countries. Therefore, one of the main reasons why companies in developed countries are hiring foreign workers is to cut down the fixed cost of labor. In relation to the on-going free trading of labor forces, millions of people each year are expected to be travelling from one country to another (Baum, 2006; Lundmark, 2006). In search for a better financial income, a lot of people from developing or underdeveloped counties will continuously attempt to look for better employment opportunities in developed countries. This explains why the number of illegal immigrants and low-skilled workers who are migrating to UK is excessively higher than expected (Beckford, 2012; Jowit, 2012). To control the increasing number of illegal migrants, the UK government is firm in its decision to deport back illegal immigrants to their homeland (Beckford, 2012). This could somehow increase the number of travelers each year. Instead of forcing illegal immigrants to return back to their mother land, President Obama decided to suspend the deportation and legally allow 1.7 million illegal immigrants to work in the United States (Emmanuel, 2012; Preston, 2012a, 2012b). In general, the presence of economic recession caused by natural calamities can open new business opportunities for some private sectors. Such incidence could eventually open new business and work opportunities not only on the part of highly reputable engineers but also the architects

Tuesday, October 15, 2019

Understanding of literature and poetry based on the war Essay Example for Free

Understanding of literature and poetry based on the war Essay I will look at war in my improvisation and to help me gain an understanding of literature and poetry based on the war I will be looking at two poems and one piece of script writing. Both poems were written and set during the First World War. The Soldier was written shortly before the war and therefore its purpose was to be a piece of propaganda to make the war seem like a good thing to do for your country. Dulce EST Decorum EST is actually written by someone who was in the war and therefore its purpose is to show the atrocities of war and a true insight into the war. Blackadder was written in 1988 and set in 1918. The script has a laugh about the war and doesnt really give a serious impression of what the war was. Blackadder is also written in a very bitterly ironic sense. In this paragraph I will explore the themes and ideas behind the poems and script. The soldier is an idealistic poem that represents a sense of pride and the glamour of fighting for your country. The soldier also shows the glory to be had from serving in the British armed forces and what a hero you would be after youve served. Dulce shows the horrific side of the war and I think it shows what the war would have been like very accurately. Dulce is quite a shocking poem with its emotive choice of language. Blackadder shows the fear the soldiers had in World War 1 and the realistic side of it. Dulce and Blackadder both make a strong political comment about the war. Blackadder makes the war look like it run by mad people and that senior officers just sit miles from the front line nice and comfy. Dulce makes a comment also on the lies that children are told about the war to hide them from its brutality. Blackadder is a scripted piece of writing and has characters init that you can look at. Dulce is about a group soldiers. The soldier is one persons viewpoint. The characters in Blackadder have very different roles and personalities. Blackadder himself is a very sarcastic man; he uses dry humour and makes the most personal comment about the war. Baldrick is working class; he is worried and isnt really sure what to do in his situation; the war bemuses him and this is a scary thing for Baldrick. George is the sort of person who would write The Soldier. He is a patriotic, upper classed twit. Although he is patriotic he is very scared. Melchett just sits in his office commanding the men on the front line even though he has no great knowledge of the front line conditions. The Soldier gives a personal viewpoint on the war and has a sentimental message. Dulce uses shock to gets its point across and Blackadder uses humour and irony to present its view on war. At the end of Blackadder when they go over the top it has music and uses slow motion which gives it a depressing and sad feel and men went over the top all the time in the war so it shows what a depressing place it would have been. Studying Blackadder has interested me and I think my group will use humour in our performance to give the war a more laid back feel even though it wasnt like that at all. I think humour would be easier for people to understand.

Monday, October 14, 2019

Power Issues And Case Analysis Imbalances Social Work Essay

Power Issues And Case Analysis Imbalances Social Work Essay This assignment will discuss the case study given whilst firstly looking at the issues of power as well as the risk discourse and how this can be dominant within social work practice. Further to this a task centred approach will be explained and how it could be used when approaching this case study. Finally the strengths perspective will be explored and how this could effect change, and bring about social justice principles. Thompson (2000) discusses that power can be a complex issue that operates on different levels. He further discusses that many service users who come into contact with social services are generally in a relatively low position of power, and that this could be due to, for example; social divisions such as, class, race, ethnicity, gender, or religion. When looking at issues of power, it could be said that Ms. Evans who defines herself as Asian is being oppressed by many power differentials that would need to be considered. For example; Ms. Evans is currently living in naval married quarters and feels she has not been accepted into the community. It could be argued that she is living in a predominantly male domineered, white environment. Thompson (2000:56) highlights patriarchal ideology and how male dominance serves to maintain existing power relations between men and women, he also highlights how we should resist the pressure to make people conform to white malestream norms (Thompson 2000:141). Healey (2005) discusses anti-oppressive practice and how this looks at the personal, cultural and structural objects that can shape the problems that service users experience. Healey (2005) further discusses that through anti-oppressive practice social workers aim to promote service user empowerment by encouraging them to talk about and share their feelings of powerlessness, to help them understand how cultural and structural injustices can shape their experiences of oppression. Therefore when working with Ms. Evans and her family I would need to incorporate anti-oppressive practice in order to empower, and enable her to share with me her feelings and experiences of powerlessness in order to gain a better understanding of the families situation. However Thompson (2000) highlights, social work intervention involves the exercise of power, which if used negatively can reinforce the disadvantages that service users experience. Used positively however power can help to enhance the working relationship, the outcomes, and empower the service user, as Healey (2000:202) writes postructuralists see power as an ever-present and productive feature of social relations, and Foucault cited by Healey (2000) highlights the need for us to recognise the productivity of power, and argues that by focussing on power as only being oppressive ignores the positive dimensions of power. Ms. Evans has been referred to social services via the Health Visitor; this could be making her feel disempowered and nervous about the forth coming intervention of social services. Therefore when working with Ms. Evans and her family I would have to recognise the power imbalances between us, (Thompson 2000). I would need to be sensitive to the issues of power and imbalances by being clear with Ms. Evans on my role and purpose, explaining professional boundaries and responsibilities (Trevithick 2005). I would also need to consider my use of language and how as Dalrymple (1995) cited by Healey (2000:184) explains the way in which language can reflect power differentials and have an impact on the people with whom we are working. As well as recognising power issues and imbalances, as the social worker l would also need to undertake a risk assessment. As Thompson (2000) highlights, to assess the degree and nature of any risk to which Ms. Evans and her family could be exposed to. Assessing exposure to risks or a person, who is vulnerable to it is central to assessment within social work practice (Davies 2005). Stated in the Codes of Practice, as a social care worker, you must respect the rights of service users while seeking to ensure that their behaviour does not harm themselves or other people (GSCC 2007:4). This includes following risk assessment policies and procedures to assess whether the behaviour of service users presents a risk of harm to themselves or others (GSCC 2007: 4.2). Therefore when working with Ms. Evans and her family I would need to be aware of my organisational and statutory duties as there are substantial policies, guidance, and frameworks to inform my practice on risk assessment. When working with children and families as Brayne (2005) highlights, I would need to be aware of the law, which under the Children Act 1989 states; my primary responsibility would be when working with Ms. Evans and her family to that of the child, or children. Ms. Evans has stated that on occasions she and her family have experienced verbal abuse, which would need to be investigated further to decide on any risks this may pose to the family. However she has been described by the Health Visitor as suffering from post natal depression, and finds it difficult to care for her children, aged seven, five, and a ten week old baby who has spinal bifida. Therefore it could be said that my primary statutory concern would be, to what extent is her post natal depression effecting the care and welfare of her children, and does this pose any risks that need to be identified. Risk assessment and the management of risk have become dominant in all areas of social work. Kemshall (1997:123) cited by Davies (1997:123) highlights that within social work risk assessment and risk management have become key issues and are often central in the decisions, to allocate resources, to intervene in the lives and choices of others or to limit the liberties of activities of clients. Risk assessment has become a dominant discourse within social work because social workers are employed within a risk society, which searches for ways to identify and manage risk effectively. (Higham 2005:182) However as stated in the codes of practice, social workers should also recognise that service users have the right to take risks, and help them to identify and manage potential and actual risks to themselves and others (GSCC 2007: 4.1). Higham (2006:182) discusses how service users strengths that are likely to diminish the predicted risks should be assessed in keeping with the social work value of empowerment. Pritchard (1996) cited by Davies (1997:124) discusses how service users should not be denied the opportunities to take risks or exercise choice, and states that, risk-taking is an important feature of all our lives (Davies 1997:124). However, as Thompson (2000) explains, the balance between care and control within social work can be difficult to maintain. By approaching this case with a task centred approach would as Healey (2005) explains, mean focussing on enabling Ms. Evans to make small and meaningful changes in her life, that she has recognised, acknowledged and wanted to work on. Coulshed (1998) highlights that within this approach the service user is the main change agent, helping the worker to assess what the priorities for change ought to be. She further explains that because the worker is as accountable as the service user in carrying out agreed tasks this lessens the sense of powerlessness that the service user maybe feeling. A task centred approach works on a specific set of procedures whereby the service user is helped to carry out problem-alleviating tasks (Coulshed 1998). Healey (2005) explains that it consists of the pre-intervention stage, followed by four sequential but overlapping steps. Therefore firstly I would need to understand and establish the source of referral (the Health Visitor) and negotiate with them any expectations and views. However as Healey (2005) states, by understanding the views of the referring agency does not mean that this has to be the focus of work, as I would need to work with Ms. Evans on defining the target problems. Mutual clarity between Ms. Evans and me would need to be addressed, discussing any limits or boundaries, explaining confidentiality, my role, as well as any legal or other obligations. Working in collaboration with Ms. Evans I would seek to explore and prioritise Ms. Evans views of her problems, as the service user involvement in identifying the target problems are critical to concentrating their efforts on change (Healey 2005:119). Epstein and Brown (2002) cited by Healey (2005) suggest a maximum of three target problems, as it is not necessary to address all problems identified. Success in a few can have a knock-on effect for other problems in a service users life that may enable them to live with these problems or to deal with them (Healey 2005:113). However as Healey (2005) writes, although within a task centred approach the service users definitions of their problems should prevail, in circumstances where the worker is duty bound to insist on considering certain problems, or a judgement has been made of a potential risk that the service user may pose to themselves or others, than these issues should be clearly raised. An explicit agreement (contract) would need to be mutually clarified. This would include times, location of meetings, and detailed information on the goals of intervention, whereby the service user should be responsible for deciding the order in which problems should be addressed (Healey 2005). It should also include any goals the social worker has on behalf of their agency or statutory duties. For example when working with Ms. Evans, goals for intervention might include her health status to be investigated in relation to her post natal depression. As well as this a statement of tasks would be listed to address target problems and to develop the service users problem-solving skills (Healey 2005). This is the key intention of task centred practice, hence we must resist any temptation to do for, rather than do with the service user (Healey 2005:122). An example of one task could be; Ms. Evans to gain more information on spinal bifida and then forward this to her partner, as she feels that he has not accepted their daughters condition, and this could be a fear of the unknown. In supporting Ms. Evans in her task performance I would encourage, and help build on her strengths maybe through rehearsing set tasks with her in the form of role play (Healey 2005). This would enable for any strategies necessary to be put into place to help Ms. Evans overcome any obstacles that she may feel could hinder the completion of a certain task. Task centred practice is a systematic process, therefore throughout my work with Ms. Evans I would need to regularly review performed tasks in order to acknowledge any gain made, as well as address any tasks that have not been performed. This would give me the opportunity to address any issues with Ms. Evans and to explore ways if deemed necessary to revise our contract. Finally integral to the task centred structure is the need for a well planned termination. Healey (2005:124) writes that a clear and looming deadline is vital for concentrating worker and service user efforts on change. Within the termination meeting I would review with Ms, Evans the overall progress of our work, and how in the future she might maintain any progress that has been made (Healey 2005). Healey (2005) explains that a task centred framework provides a shell in which other theoretical perspectives can be incorporated. Incorporating a strengths perspective would, like task centred practice focus on, building a service users capacity to help themselves and to promote a mutual learning partnership between workers and service users, (Healey 2005:158) keeping within the social work values of empowerment, respect and service user self-determination. According to Healey (2005) the strengths perspective concentrates on enabling service users and communities to work towards their future hopes and dreams, rather than looking at past or present problems. Saleeby (1997:4) cited by Healey (2005:152) states that the strengths perspective formula is straightforward, where workers are required to mobilise service users strengths in order to enable them to achieve their goals and objectives, which would lead to the service user having a better quality of life on their terms (Healey 2005:152). Some of the key assumptions of the strengths perspective are, all people have strengths, capacities and resources, and people generally demonstrate resilience, rather than pathology when facing adverse life events. (Healey 2005:157). Healey (2005) discusses the practice principles and how the social worker should adopt a positive and optimistic attitude towards service users, working in partnership with them so solutions to problems are developed collaboratively. Healey (2005:162) further states that the formation of a good working partnership can increase the resources available to solve the problem at hand. Therefore when working with Ms. Evans I would focus on listening to her story, identifying her capacities, strengths, and resourcefulness which could contribute to positive changes. I would clarify any strengths with her as Healey (2005:162) explains, service users can grow when others particularly helpers actively affirm and support their capacity to do so. My role as the social worker would be to facilitate Ms. Evans capacity to acknowledge, and use existing strengths and resources which would enable her to develop new ones. These strengths could be for example; the skills she has developed from parenting, most of which due to her partner being in the Navy she may have done independently. Ms. Evans defines herself as Asian and that Islam is important to her, therefore, another strength could be that of adaptability, and having the inner strength to explore new experiences, as she may have moved from an Asian community to be with her partner in the naval married quarters. According to Saleeby (1996) cited by Healey (2005:164) belonging to a community is the first step towards empowerment. Therefore by working towards social justice principles I would explore with Ms. Evans what formal and informal help was available to her within the community. For example, a mother and toddler group, which would enable her to become part of the community that she feels she has not been accepted into. Healey (2005:164) explains community support can build and draw on the capacities of service users to help themselves and to help others. I would also discuss with her the help she is already receiving in relation to her baby and her diagnosis of spinal bifida, which could mean the family are entitled to both financial and practical help. This could include a family support carer to give some respite, which would allow Ms. Evans some time to pursue her own interests, such as her religion. Further to this I would need to recognise any strengths and assets within Ms. Evans social networks, such as people she may feel can be supportive, maybe discussing with her possible personal support from family and friends (Healey 2005). In conclusion this assignment has discussed the issues of power and how social workers need to be sensitive to and recognise power imbalances. .Following this, risk discourse has been explained, as well as a task centred approach to the case study. Finally the strengths perspective was incorporated which focuses on the capacities and potentialities of the service user.

Sunday, October 13, 2019

Hablando de Inteligencia Exitosa (aprendizaje) :: essays research papers

Hablando de Inteligencia Exitosa by Dumar Là ³pez CONTORNO Tesis: La base del aprendizaje, se encuentra en la confrontacià ³n que se realice entre los conceptos propios y los ajenos, sustentados en fuentes verà ­dicas que proporcionen una informacià ³n exacta. Sin embargo, para el à ©xito se hace necesaria la correcta transicià ³n entre informacià ³n y conocimiento, que se logra dando significado propio a la primera. I. Trabajo en grupo #1: Ideas propias, no siempre la mejor opcià ³n 1) Descripcià ³n: a) Sin bases sà ³lidas. b) Auto didactismo. 2) à mbito cognoscitivo a) Aproximacià ³n al salà ³n de clase. II. Trabajo en grupo #2: Experiencia, distracciones y proposiciones 1) Descripcià ³n: a) Puntos de comportamiento. 2) à mbito cognoscitivo a) Los profesores como facilitadotes. b) Conformar conocimiento. III. Trabajo en grupo #3: El papel de las tecnologà ­as de la informacià ³n 1) Descripcià ³n: a) Útiles para la educacià ³n. b) En constante desarrollo. 2) à mbito cognoscitivo a) Mà ºltiples funciones del hipertexto y el chat. IV. Caracterà ­sticas del à ©xito: 1) Descripcià ³n: a) Confianza en sà ­ mismo. b) Parte de la inteligencia. 2) à mbito cognoscitivo a) Mentes creativas y prà ¡cticas. Hablando De Inteligencia Exitosa La base del aprendizaje se encuentra en la confrontacià ³n que se realice entre los conceptos propios y los ajenos, sustentados en fuentes verà ­dicas que proporcionen una informacià ³n exacta. Sin embargo, para el à ©xito se hace necesaria la correcta transicià ³n entre informacià ³n y conocimiento, que se logra dando significado propio a la primera. Primeramente, basado en experiencias propias afirmo que el trabajar solo y sin colaboracià ³n o pensamientos diferentes provoca el encasillamiento en ideas y conceptos en la mayorà ­a de las ocasiones errà ³neos. En este caso, no existe correccià ³n por alguien talvez mà ¡s experimentado o sapiente del tema a tratar. Personalmente, la aficià ³n por los computadores sà ­ funciona en estas ocasiones con las facilidades del hipertexto y el Chat permitiendo variados contrastes con ideas diferentes. Segundo, como afirman algunos autores tales como Klausmeier (1915), Vygotsky (1978), y Piaget (1950), el trabajar en un ambiente solitario aunque es efectivo para evitar distracciones, no es lo mejor para generar conocimiento. Por lo tanto, en determinadas situaciones estudiando solitariamente no se logra encadenar y dar un significado correcto a la informacià ³n. Finalmente, la palabra à ©xito siendo tan extensa no puede conformarse de una sola letra, sino del conjunto coherente de estas ademà ¡s de una tilde que genera su correcta pronunciacià ³n, a la tilde le proporcionamos el papel de la experiencia y a las demà ¡s letras, conceptos propios y ajenos. Asimismo, significa el porquà © de conformar la unidad (significado) a travà ©s del agrupamiento de algunas partes (conceptos). Para concluir, al compilar algunos conceptos junto a informacià ³n proporcionada por fuentes experimentadas con ideas propias se genera un texto coherente y no teà ³rico, demostrando lo que segà ºn Robert Sternberg (1997) serà ­a el producto de una â€Å"inteligencia prà ¡ctica y creativa† determinante del à ©xito.