Monday, September 30, 2019

Civil Action Movie Tort Analysis

Background A Civil Action entails a major class action suit brought forth by several families against major conglomerates (including W. R. Grace chemical company and Beatrice Foods) that were alleged to have negligently damaged the environment of a small town to the extent that its practices led to the spread of leukemia. Jan, a personal injury attorney, decides to represent a woman that claims that her child and other neighbors of a small town in Massachusetts have been diagnosed with leukemia.The lawyer finds evidence that there were some factors that could have led to the contamination of the town's water supply by the conglomerates’ factory. In the course of the lawsuit Jan gets other attorneys in his Boston law firm to assist him. Jan spends lavishly for experts, but the length of the discovery process and opposing counsels’ maneuvers stretch all his assets to the limit. Jan concentrates his efforts against the parent company (Grace) since they had personal testimo ny of a former employee of Grace who had witnessed dumping.The case against Beatrice Foods was dismissed and would then lead the firm to accept settlement from Grace for $8 million. Jan later files for bankruptcy, and the firm is dismantled. Jan then submits the case to the EPA after it concludes, in a report, that both companies had contaminated the wells from sludge removed from the site. Ultimately, due to the lawsuits brought forward by the EPA, Grace and Beatrice Foods are eventually forced to pay for one of the largest chemical clean ups in the history of the United States which cost about $64 million.Brief Analysis for Cause-in-Fact The issue that arises in this plot is whether the conglomerates are negligent for the contamination of the water supplies of the town, and if their negligence contributed to the injuries (leukemia) of the multiple plaintiffs. After finding that there has been a breach of duty, one must consider if the defendant’s conduct was the cause-in-fa ct of the injuries.An actor’s conduct is the cause-in-fact of someone’s injury where if we can say that â€Å"but for† the actor’s conduct the injury would not have occurred. In other words, the dominant â€Å"but for† test asks: â€Å"if we could go back in time and remove the actor’s conduct, would that have prevented the injury? † In Hill v. Edmonds, the court found that where two causes of negligence combine to produce a single injury, each individual is liable for the entire result even though its act alone may not have caused the result.In that case, the conduct of the truck driver was a ‘‘but for’’ cause of Hill’s injuries. If Bragoli (D) would not have left his truck in the middle of the road, Edmonds (D) probably would not have hit the truck. The minority test was molded in the Anderson case, where it was held that where several causes concur to bring about an injury and any one alone would ha ve been sufficient to cause the injury, it is sufficient if D’s conduct was a â€Å"substantial factor. The court in that case concluded that it would be unfair to deny the plaintiff liability, simply because the plaintiff cannot show that ‘‘but for’’ the negligent conduct of one defendant, the injury to the plaintiff would not have resulted. In this instant case, the conglomerates were likely negligent since they failed to provide a duty of reasonable care in managing the factory in the town, causing detrimental damage to the environment and the town’s water supply.The question of whether the conglomerates were liable to the families lies on the causation of the leukemia, and whether it can be shown that the water supply contamination was a direct cause-in-fact of the leukemia. Jan was unable to promptly show this causal connection, and his cases against the other two entities involved were dismissed before settling with Grace. It was diffic ult for Jan to pinpoint the conglomerate’s negligence as a cause-in-fact for the plaintiffs’ leukemia.In fact, in the deposition the defendant’s council articulated that there may have been a wide range of other reasons for the plaintiffs’ cases of leukemia. Everything from family history, food consumption and lifestyles were addressed as possible alternatives. The major difficulty in Jan’s case against the conglomerates lies on causation. The water contamination may have been caused by all the entities involved in the factory near the town’s river. First, it must be shown that the dumped chemicals, especially the industrial TCE, had gotten into the wells.In Anderson, the court reasoned that if a fire set by the Railway’s (D) negligence unites with a fire of an independent origin, there is joint and several liability, even though either fire would have independently destroyed the property. Likewise, even if the wells could have been c ontaminated by either defendant, the Anderson test will provide that where a plaintiff is injured by the negligent conduct of more than one tortfeasor, each is independently liable if they are each a substantial factor in bringing about the plaintiff’s injury.Grace and Beatrice Foods were both substantial factors to the water contamination. Their negligent management of the factory was evident by the former employee’s testimony that they had dumped materials unto the river. Hence, Grace and the others’ negligence could have all contributed to the ensuing injuries. The problem here lies in whether the water contamination was the cause-in-fact of the leukemia and second, if it had, whether the pollutants killed the leukemia patients.As shown in the movie, the EPA would ultimately prevail in forcing the conglomerates to pay for damages. It may be assumed then that further expert testimony and findings uncovered that the water contamination was indeed a cause-in-fac t of the leukemia. If , however, it were not for the EPA’s extensive resources, Grace and Beatrice Foods may have been able to escape liability on the lack of evidence showing that the water contamination was the cause-in-fact of the widespread leukemia.

Sunday, September 29, 2019

Communication Differences Between the Sexes Essay

Some researchers believe that different styles of communication are developed by nurturing, not nature. That communication styles are learned through the way someone has been raised, not by how a person is wired from birth. Take a newborn girl and put her in a room with family members all about. She will look at every one around and make eye contact with each of them. Put a newborn boy in a room surrounded by family members, and he will pay more attention to the light fixture or a ceiling fan. I know this to be true with my own children as well as with my grandchildren. When our first grandson was born it was after having several granddaughters. The first time I held him I was taken back a bit because I couldn’t get him to make eye contact with me. I was starting to get concerned that maybe he was Autistic, but then I remembered, he was a boy. This behavior difference between male and female is carried with them throughout their childhood and into adulthood. â€Å"In one study, researchers performed a series of test on males and females from four age groups: second graders, sixth graders, tenth graders, and twenty five-year-olds. Instructions for each pair of females and each pair of males were exactly the same: enter a room, sit down on two chairs, and talk, if you wish. As the test proceeded, every pair of females, no matter what their ages, reacted the same way. They turned their chairs toward each other, or at least they turned toward each other, so they could be face-to-face, lean forward and talk. The males reacted differently. They did not turn toward each other in any way. They sat side by side, shoulder to shoulder, looking straight ahead except for an occasional glance at each other† (Eggerich, 244). Girls want to make a connection with the person they’re talking to. They want to make friends, share secrets, and experiences. Boys have a different approach. They like having buddy groups focusing on activities rather than conversation. This difference in communication style follows them into adulthood. Women communicate through dialogue, discussing emotions, choices and problems. Males remain action-oriented. The goal of communication is to achieve something. Women are more relationship-oriented and are more likely to talk to other women when they have a problem or need to make a decision. Men tend to relate to other men on a one-to-one basis. They keep their problems to themselves and don’t see the point in sharing personal issues. Why is communication between men and women such a problem? It goes back to the fact that we send each other messages in â€Å"code,† based on gender, even though we don’t intend to. â€Å"What I say is not what you hear, and what you think you heard is not what I meant at all† (Eggerich, 30). A woman may say, â€Å"I have nothing to wear. † What she means is, she has nothing new. When a man says, â€Å"I have nothing to wear. † He actually means he has nothing clean. This illustrates that we all see things out of our own needs and perceptions. How does nonverbal communication impact male and female communication? One specific aspect of nonverbal communication is body orientation. It’s the two chairs in the room experiment again. When a man doesn’t make eye contact or face his female conversational partner, she may see this as a lack of interest. He might get annoyed because she isn’t responding the way he expected. Body language speaks volumes when communicating with someone of the opposite sex. The difference in physical alignment can make having a meaningful conversation difficult. A breakdown in nonverbal communication between men and women can cause problems not only at home, but in the workplace. Women often nod their head when someone is talking to them as a sign that they’re listening. This can be confusing for a man because men only nod when they are in agreement with what is being said. The man might mistake the woman’s nodding as a sign that she agrees with him, only to find out later that she doesn’t. Now the woman is confused because she doesn’t understand why he would think she agreed when she was never asked her opinion. On the other hand, if a woman is speaking and she doesn’t see his head nod, she assumes he either disagrees or is not listening. Either way, the lines of communication are broken because of nonverbal cues (Simma). As you can see, men and women have different styles in the way they communicate. Neither style is right or wrong, they’re just different. I’m not really in to the whole Mars vs. Venus thing, but if we can recognize the differences in our communication styles we might be better equipped to break through those communication barriers. Women, a man doesn’t necessarily want to talk about it, sometimes just sitting next to him or watching him tinker in the garage is just what he’s looking for. He just wants to know that his lady is there. Men, a woman just needs someone to listen to what she has to say. She doesn’t need her situation to be fixed, she just needs a listening ear, an occasion nodding of the head to let her connect with her man. My husband and I sometimes go on long drives for an hour or so without ever speaking a word, we don’t have to. We’ve had our ups and downs, trials and tribulations, but through the years we have learned to speak and listen to each other’s language. The key to a any relationship, whether it’s with friends, colleagues or spouses is good communication skills. My husband and I have been married for 33 years, I think we’ve been successful in achieving just that.

Saturday, September 28, 2019

Explain the Relation between Trade and World Output

World output or global output represents the sum of the entire amount of goods and services produced by all the countries of the world for a certain period of time. In simple terms, if each country produces a pair of shoes, a computer and a sack of coffee, multiply that by the total number of countries in the world to get global output. On the other hand trade, or more correctly international trade, is the exchange of goods and services across international borders. Since it is impossible for all the countries to produce similar products, trade allows countries to focus on products that they have an advantage in producing over other countries. A classic example is crude oil. Not all countries have an abundant supply of oil – the reason why Middle East countries sell their excess oil to countries that need them. Trade encourages effective and efficient use of a country’s resources. A country that is more proficient in growing coffee could forgo the manufacture of computers and shoes and increase their yield of coffee to ten sacks of coffee and trade some of these excess coffee to a country that has an advantage at making shoes and computers. Following the logic of this interaction, as a country becomes more efficient in producing goods and services its total output also increases. And, as all the other countries increase their total output, world output ultimately increases. Describe the broad pattern of international trade International trade has been evolving at a much faster pace after World War II. Much of the evolution of trade in present times is attributed to rapid advancements in technology. Production of goods is now done at a much faster and more efficient rate – lowering overall manufacturing cost and doubling-up output. At the same time, it is now faster to ship goods to any point in the globe and attendant support communication facilities have improved tremendously. According to statistics from the World Trade Organization (the organization tasked to oversee international trade): –   75 percent of the global exports come from developed countries, while only 25 percent are from developing ones. – 83 percent of exports from developed countries are manufactured goods, accounting for 62 percent of total world exports. – Manufactured goods from developing countries are growing – now registered at 56 percent of their total exports — and account 14 percent of the world total. – Today, more primary products are being exported by developed countries than by developing countries: 14% of world exports, compared with 11% by developing countries. If the nations of the world were to suddenly cut off all trade with one another,  what products might you no longer be able to obtain in your country? An obvious answer is oil since it is one of the top imports of the country. Still, other items would be woodcrafts and furniture and certain agricultural products like rubber and natural oils. If the other trading country is China, products that will no longer be available here are office equipment, shoes and other articles of apparel, telecom and sound equipment, and, professional and scientific equipment. Choose one other country and identify the products it would need to do without In the case of China, products that would no longer be available in that country are electrical and heavy machineries, mineral fuel, oil, seeds and fruits, organic chemicals, iron and steel, aircraft and spacecraft, and cotton, yarn and fabrics. Discuss trade patterns Trade patterns deal with what goods and services a country trades, with whom, and in what direction. Trade patterns are studied in two ways: through the pattern of movement in commodities like oil, capital and raw materials, and, through factor contents or the amounts of primary factors used in the production of goods. Trade patterns reveal the current state of international trade, the direction it is heading and its effect on overall global output. Trade patterns also reveal emerging markets as well as markets that are on the decline. Trade patterns also influenced by global events that do not deal directly with international trade. These events include the September 11 attacks, SARS and the war in the Middle East. The current trade pattern reveals an interesting trend: prior to World War II, primary commodities came mostly from developing countries whereas manufactured products came mostly from developed countries. After the WW II, the trend has reversed and that reversal continues up to the present. Explain the methods governments use to promote and restrict international trade International trade is generally regulated and controlled via imposition of tariffs. Nations carry out such measures in three ways: on their own (unilateral); in agreement with another country (bilateral); or, in agreement with several other countries (multilateral). Non-tariff measures include imposition of quotas and voluntary export restraints (VERs) – a restriction on a country's imports that is achieved by negotiating with the foreign exporting country for it to restrict its exports. To promote international trade, countries give concessions like preferential trading agreements (PTAs), custom unions and common markets. Custom unions are groups of countries that who adopt zero tariffs and no other restrictions on trade when trading among them. Common markets on the other hand, are groups of countries, who choose to eliminate all barriers to movement of both goods and factors among themselves. References World Trade Report: 2006 (2006). World Trade Organization. Retrieved October 30, 2007 from the World Wide Web: http://www.wto.org/english/res_e/reser_e/world_trade_report_e.htm Deardorff, A. (2001). Deardorff's Glossary of International Economics. Retrieved October 30, 2007 from the World Wide Web: http://www-personal.umich.edu/~alandear/glossary/    Morrison, W. (2007). China-US Trade Issues. Retrieved October 30, 2007 from the World Wide Web: http://www.fas.org/sgp/crs/row/RL33536.pdf    Wild, J. Wild, K., & Han J. (2006). International Business. Prentice Hall   

Friday, September 27, 2019

World Religions Report Research Paper Example | Topics and Well Written Essays - 2000 words

World Religions Report - Research Paper Example It believes in the spreading the message of Christ to the entire world and making all the people as the children of god on the basis of baptism. Jesus Christ is considered as the founder of it with the date of its origin being around first millennium AD (Chavis, 2009). In terms of creation of the man, this religion holds to its belief of man as being created by god with a soul and Adam as being the first man. Catholicism has a firm belief in only one supreme authority that is of god, that alone is the creator of heaven and earth. He is the infinite power that embodies all the traits of wisdom, goodness, justice and love; all of which are reflected in his creation of universe and human kind. The main source of the authority for the Catholics comes from the Bible, Tradition, the Creeds, the Bishops and the Pope among others but the ultimate authority is in the hands of the Christ (Bennett, 2010). The religion of Catholicism also comes with the belief that the human race was created in perfect innocence and justice but later it got tainted by the temptation of Satan the angel of evil. Adam and Eve, in the influence of Satan deferred to selfishness and lack of trust in their creator and hence this first sin of disobedience resulted in the death of the spiritual side of the human race. But god being all merciful and kind provided the human race an opportunity to be graced by the eternal life from god in return from his/her practice of baptism (Bennett, 2010). The religion also embodies the belief that Jesus is the true god and all the things were created through him. He was crucified by the human enemies in order to meet the divine justice for the disobedience and sins of man and he became a human (Bennet, 2010). The religion of Catholicism is also of the view that the act of sin corrupts a man and is an act of shunning god, which in turn robs the grace of man’s soul and deprives

Thursday, September 26, 2019

Statistical Mathematics Statistics Project Example | Topics and Well Written Essays - 1000 words

Statistical Mathematics - Statistics Project Example The peak is flat, which is characterized by kurtosis = -0.05. The peak is off centered; the distribution is slightly skewed to the right, which is marked by skewness = 0.06. Figure 2 illustrates histogram of daytime accidents. Visual inspection shows that the frequency distribution does not have a bell curve shape. The histogram does not have a peak and frequencies are not equally distributed. The peak is flat, which is characterized by kurtosis = -0.07. The peak is off centered; the distribution is moderately skewed to the right, which is marked by skewness = 0.42. Figure 3 illustrates histogram of total vehicles on the street. Visual inspection shows that the frequency distribution does not have a bell curve shape. The histogram resembles the back of a two-humped camel; it is close to a bimodal distribution. The histogram does not have a peak and frequencies are not equally distributed. The peak is flat, which is characterized by kurtosis = -0.88. The peak is off centered; the distribution is moderately skewed to the left, which is marked by skewness = -0.14. The assignment is using a data set that has three variables: daytime car accidents, nighttime car accidents and total observed cars in evaluating number of accidents (Table 1). . The distribution characters of the variable in statistics are measured through the calculation and analysis of central tendency and dispersion of the data set. The following section provides the analysis mentioned above. Each variable has twelve values. The assignment uses mean, mode, median, and midrange to study the central tendency of the data set. Table 2 describes the central tendency. The mean and median tell us about data those are on the right and left sides of theses values. For example, total cars mean is 450. In ascending orders, the set shows that five values are on the left, and seven values are on the right side of the average. When we compare the same set with the median value of

Wind farme Assignment Example | Topics and Well Written Essays - 1000 words

Wind farme - Assignment Example he farm, mean annual wind speed at elevation, turbine power curve, rated power capacity, investment required, operation and maintenance cost (O&M)/ year, durability and useful life. Covering the wind profile, total annual energy output per turbine, total energy output, capacity factor, uptime percentage, average annual cost, value of electricity, annual O&M cost, annual inflation rate Based on wind maps, the mean annual wind speed can be determined. In fertile areas, quite prominent for energy harvesting; 100 meter Mean Annual Wind Speed Map, 70 meter Mean Annual Wind ... Mean Annual Power Density Map; 30 meter Mean Annual Power Density Map. To illustrate, a basic analysis of the Buckeye Wind Farm, comprised of 54 wind turbines planned for Champaign County, Ohio. The wind maps provided by the Ohio Power Sitting Board indicate that the mean annual wind speed in the area of the wind farm is approximately 7.5 m/s. Based on this, the analysis indicates a non-existent ROI because the wind turbines do not produce enough reliable electricity to pay for the investment required within a reasonable amount of time. In short, the annual expectation of 439,852 MWh of electrical energy generated does not generate enough revenue at regular average rates to overcome the O&M costs and pay back the $380 million investment within an anticipated 20 year lifespan of the turbines. It can therefore be expected that government grants and subsidies will have to be used to offset the losses, and that the cost of electricity will have to be increased. The simple economic analysis does not account for the cost that will be incurred to maintain and operate a traditional back-up system for generating power when the wind is not blowing adequately, and for the added cost and inefficiency of cycling this back-up system on and off to balance the supply load against the variability of the wind generated power. The lowest wind conditions and the lowest power output will occur in the summer, when

Wednesday, September 25, 2019

U.S. foreign policy in Iraq Essay Example | Topics and Well Written Essays - 1250 words

U.S. foreign policy in Iraq - Essay Example The expression â€Å"the first casualty of war is the truth† would probably be appropriately applied to all of the wars between nations throughout the entire history of warfare. The Iraq war will always be branded as the only war that was based completely on lies.The truth died several deaths prior to the human deaths that occurred due to the U.S. invasion and occupation of Iraq (March 2003 – August, 2010). As the war progressed following the 2003 invasion, the American public progressively lost confidence in the Bush administration’s war policy as they grew to understand more and more what the majority of the rest of the world had realized since the first nights bombing of Baghdad. The war is undeniably illegal as defined by the United Nations (UN) and International Court of Justice (ICJ), the two most paramount legal bodies in the world. Iraq had no link to terrorism, no weapons of mass destruction (WMD), and no legal rationale to attack. Despite this, Bush dec ided to invade the Republic of Iraq for causes deemed objectionable to the majority of other countries so he frequently relied on and utilized false information to rationalize it. He lied. This discussion will examine how the truth was a casualty early and often during the lead up to the war and outlines some of the consequences brought about by these far-reaching and deadly deceptions. Bush voiced his disagreement to the concept of ‘nation building’ during the 2000 presidential election debates but as president waged an undeclared war against a sovereign country that had neither attacked first nor threatened to. Immediately following and as a reactionary reply to the terrorist attacks on September 11, 2001, Bush stated the county’s intention to begin a ‘War on Terrorism’ which he portrayed as a protracted battle against those that would use terrorist actions in addition to the countries that enabled them. The eventual culmination of the selective le gal reasoning and rhetoric concerning the ‘War on Terror’ was Bush’s order of the military to invade both Afghanistan and Iraq, an illegal action on many fronts. Bush had constantly claimed that these actions were legal. First, he argued, due to language existing within the UN Security Council Resolution 1441 regarding Iraq and secondly, the invasions were an act of self-defense which is permitted by international law. Conversely, according to Richard Perle, advisor to U.S. Defense Secretary Donald Rumsfeld and official of the U.S. Defense Policy Board, â€Å"international law ... would have required us to leave Saddam Hussein alone.† (Burkeman & Borger, 2003). However, this option would have been â€Å"morally unacceptable† according to the Bush administration. Bush chose to solicit then followed the advice of biased, self serving legal opinion from a low-level Justice Dept. employee despite strong disagreement by higher level personnel within the Dept. in addition to and the U.S. State Department which cautioned against ignoring international law and U.N. laws in addition to covenants of the Geneva Convention. The Bush administration was determined in its careless use of military force and disregard for laws established to by the world’s community of nations. The initial foreign incursion of the U.S. military along with the ‘coalition of the willing’ in its ‘War on Terror’ was Afghanistan, more specifically the Taliban terrorist faction based in that country. The U.S. claimed to possess ‘clear and compelling evidence,’ that the State of Afghanistan was giving refuge to terrorists, as did Iraq. However, if this assertion were true, why then didn’t the Bush administration divulge this information to the UN Security Council so as to obtain legal grounds to invade? The U.S. defended its invasion and occupation of Iraq to the countries of the world by announce, if not substanti ating, that it was a undertaking to remove WMD which endangered not only the U.S. but all other countries as

Tuesday, September 24, 2019

What is the relationship between homeless young adult transitional Research Paper

What is the relationship between homeless young adult transitional housing program and job readiness - Research Paper Example Dependent variables include reason for being homeless, level of education, educational attainment, age, length of time spent in transitional housing, current employment status (or duration in employment), program referral, job retention capacity, mental health status, and substance use. Survey method will be used to source for data, which will involve 251 participants between the age of 18-24. Study outcomes will be analyzed using statistical methods, that is, SPSS and Intercooled Stata. Finally, an analysis of implications of the study on policy and practice reveal relevance between this research and social work values and ethics. Over the past years, the number of homeless people in many states has been on the increase, and the United States has particularly focused much attention on the plight of homeless young people as well as those that age out of foster care systems (Bloom, 2010). Researchers have explored the various challenges these two groups face, especially in connection to job readiness, thus the federal, local and state legislators have endeavored to devise means of facilitating change the lives of these young people. Instituted policies mostly focus on increased funding for support of independent living skills, housing, and education. It is in this respect that the Transitional Housing Program for Homeless Young Adults (THP) was founded. It provides a wide range of services including housing, which comprises payment for utilities and rent; food vouchers, employment assistance, training on life-skills, transportation resources among others (Baider & Frank, 2006). Research has shown a close linkage between homelessness and job readiness, where people, especially the youth who transit from childhood to adulthood, as well as those that age out of foster care systems, stand higher chances of being unemployed due to lack of

Monday, September 23, 2019

Criminal Justice and Deviance Essay Example | Topics and Well Written Essays - 1500 words

Criminal Justice and Deviance - Essay Example The premise of this is a statement given by Congressman Hutchinson, stating that â€Å"Having lost its social stigma, bankruptcy ‘convenience’ filings have become a tool to avoid financial obligations rather than a measure of last resort.† (quoted in Thorne and Anderson, 2006, 147). This was also supported by Efrat (2005: 481), who attributed the lessening of stigma to the fact that â€Å"American society may have developed a more positive attitude towards the individual that was manifested by less anger and more sympathy with the plight of the individual.† Thus, if the theory is to be followed, there was no more shame to be had because of the acceptance of those who defaulted from debts. The findings of Thorne and Anderson, however, appear to suggest otherwise. In fact, instead of viewing personal bankruptcy as merely a product of rational economic choice and a strategy to stop payment of mounting debt, those who file for bankruptcy find themselves confron ting stigmatization and discrimination. Proof of this is their desire to conceal their bankruptcy from family members and associates whom they feel would be critical of what they perceive to be their fiscal mismanagement. To quote: Virtually every debtor whose parents were still living tried to withhold knowledge of the bankruptcy from them. Older debtors whose parents had passed away commented that "if they knew, they'd spin in their graves." One woman, whose father was visiting when the researcher arrived for the interview, nearly pushed the interviewer off the front steps out of fear (as she explained later) that if her father saw the researcher, he would ask disconcerting questions and potentially learn of the bankruptcy. If one looks at stigma as the social devaluation or deliberate alienation of an individual who deviates from a behavioural norm, such behavioural norm being â€Å"a shared belief of a particular social unit that individuals should act in a certain way under ce rtain circumstances† (Stafford and Scott (1986: 81), then it is fairly obvious that when something becomes common, or when there are enough individuals who file for bankruptcy, it ceases to be a reason for stigma. An analogy could be premarital sex. In the past, there were not a lot of people who engaged in premarital sex and hence it was a stigma. But now, because it had become fairly common, there was no reason to feel stigmatised or ashamed. Fay, Hurst and White (2002: 708) also suggested that households file for bankruptcy when it becomes economically beneficial for them to do so. This paper argues however, that stigmatisation still affects those who file for bankruptcy. The empirical data accumulated by Thorne and Anderson prove this, so do Sutton and Callahan who said that even firms experience stigmatisation. â€Å"The bankrupt firms we studied were often shunned by members of their organizational audiences. The leaders we interviewed were hurt and embarrassed.(1987: 4 06)†. The reason is simple: no matter how common poverty is, it still causes stigmatisation. Bankruptcy is an indication of poverty. It is an indication of inability to pay off one’s debts. Even if there are a lot of people doing it, it is still is a cause for shame when one admits in official documents that he or she is asking to be legally discharged from debts contracted. Since childhood, people have been programmed to aspire towards prosperity and a certain way of life. Bankruptcy is a signal that that aspiration has not been met and that,

Sunday, September 22, 2019

Analytical Essay About Leaders Essay Example for Free

Analytical Essay About Leaders Essay What is a leader? A leader is a person who leads or commands a group, organization, or country. There are many types of leaders. A leader can be a laissez-faire leader that lacks direct supervision and fails to provide regular feedback to those they lead, an autocrat that possesses total authority and take decisions upon their own will without consulting those who are following or even a participative leader who has the responsibility of making the final decision but greatly includes the opinions, ideas and feedback of those they lead. Leaders can also be transactional leaders who receive certain tasks to conduct and give rewards or punishments to those under them based on their performance or transformational leaders who motivate followers and increase productivity using communicative techniques and involvement in the tasks they set. Not only that, a leader also has to have some traits that correspond to their types of leadership. For example, transformational leaders have to be patient with their followers otherwise relationships can break down and the whole idea of efficiency is destroyed. Leaders need to be persuasive as well to motivate and convince their followers to believe in an idea or their ability to do a task which they hesitate to do or think they are unable to. As seen in history and many novels, leaders lead differently than other leaders as ideas, methods and perceptions of perfection differ between them. For example, the ideas and methods used by Queen Elizabeth the First differed from those used by Sampath Chawla from the novel entitled ‘Hullabaloo in the Guava Orchard’ written by Kiran Desai as well as Mark Antony from the play entitled ‘The tragedy of Julius Caesar’ written by the famous William Shakespeare. The three of them all differed in how they led their followers and using which ideas to do so. Despite differing in many aspects, they all shared some common traits that are the bases of leadership. In ‘The Tragedy of Julius Caesar’, some conspirators had killed the almost roman emperor, Julius Caesar. They did so, giving the false reason that they wanted to rid him of the fear or worry of death. Mark Antony, using persuasive techniques, managed to change the mindsets of the public who believed in the conspirators’ reason into believing that Caesar was a good man and had no bad intentions, which is what the conspirators thought. Mark Antony uses persuasive techniques like repetition, false intentions and sophistry. He uses these in his speech at Caesar’s burial to convince the crowd into believing his ideas by first commending Brutus on how honorable he is but then repeating how honorable he is to make the crowd question their faith in Brutus. He also says that he did not arrive to praise Caesar but to bury him which is exactly the opposite of what he wanted to do. Another false intention was that he did not want to disprove Brutus which is exactly what he did by using appropriate facts. Lastly, his speech was sophisticated and so led the crowd to believing that he was superior to Brutus which cemented his gaining the crowd’s support. In ‘Hullabaloo in the Guava Orchard’, the main character, Sampath, is a leader later on in the novel after losing his job at the post office where he reads every letter that passes him. He becomes a sort of spiritual leader as he passes on some of the knowledge, both useful and downright senseless, to those who believe he is one. He manages to convince the people who come to him for advice, as he seemingly has an answer that seems meaningful and wise, using persuasive techniques that include loaded language and glittering generalities. An example of the responses he gives to people is when someone asked him if anyone could comprehend all there is to know about god to which Sampath replied ‘‘ Once you have broken the bottle you can no longer distinguish the air inside from the air outside’’ This represents the colorful and loaded language Sampath represents as well as his ability to confuse and manipulate people into thinking meaningless sentences like these have greater meaning and that is the reason they cannot understand. He is also a leader because he represents a symbol of knowledge and religious importance and this gives people something to look forward to, believe in and rely upon. Queen Elizabeth the First was a leader as well when she ruled over England in 1588. She was brave, intelligent, caring and because of this, loved by the people. At this time, England was about to go to war with Spain. The units in concern were the naval fleets of both nations that were about to engage in combat. The Spanish fleet, nicknamed the Spanish Armada, were in comparison to the English fleet, bigger, stronger and heavily armored and this caused the soldiers to doubt their own ability to win and caused large bouts of cowardice. Despite this, the English fleet came out victorious. Queen Elizabeth, on the eve of the Spanish Armada, gave a powerful speech that motivated her soldiers and showed her love and respect for the country. She used persuasive techniques like bandwagon appeal to bring out the desire to belong in the soldiers, rewards that gave incentive to the soldiers to fight, win and return, loaded language to appeal to her audience, a tone of self-assurance to show that she knows the position of power she is in and how she is not threatened by anything on the outside and lastly, the most powerful technique she used was to keep using the word ‘we’ to show how they are all united and how she was willing to give up everything for the nation. This inspired the confidence needed to win the battle. A leader is a person who leads or commands a group, organization, or country. This is what all three leaders have shown, the ability to lead. They have shown this in their own ways and with their own ideas. They all share this common trait as well as being persuasive and adapting intelligently to fit the situation. That is the basic leadership trait that all successful leaders throughout history have shown and that is all that is needed in order to be a successful leader.

Saturday, September 21, 2019

Data Storage for Art Gallery

Data Storage for Art Gallery Executive Summary This assignment is based upon an Art Gallery. Being the system analyst and designer the art gallery is hopeful I demonstrate professionalism and propose a computerized cataloging system which they require. Currently the Art Gallery has 8 exhibition rooms where they display art items from around the word. These items dont only belong to the Art Gallery but by other owners, be it other galleries or private collectors. These items are borrowed to enhance the exhibition rooms which change exhibits every 3 months. The gallery is lead by a curator and 6 assistant curators to see about its daily operations. One of the major issues of the art gallery is the paper based form which they use to keep record exhibits in storage or in exhibition, in addition and borrowing and returning of items to their respective owners. There are several technologies available in which these paper forms can be transferred directly into the catalogue system which I am designing for the art gallery. These technologies would be reviewed and the best suited technology would be recommended for the transfer of the paper forms to the computerized system. In building this catalogue it is required that only the curator and assistant curators have read, write, edit and delete functions once the system is properly installed. These functions would be given with discretion to the user according to rank i.e. the curator would be given access to the entire catalogue system granting him permissions to all CRUD functions whereas the 6 assistant curators would have specific access and could only delete certain items in the system. This is required for security issues. In this proposal submitted must be a prototype interface so the users can see how the system would look before the interchange from the current paper based system to the computerized catalogue. The prototype would demonstrate the following functions: Adding a new item Editing item details Searching for the location of an item Listing items due for return This system would make the curator and assistant curators demonstrate efficiency and effectiveness in the art gallery as it is a step into the modern way or storing data which is used by many businesses worldwide. Unified Modelling Language, or UML, is a set of diagrammatic techniques, which are specifically tailored for object-oriented development, and which have become an industry standard for modelling object-oriented systems. In developing this cataloguing system for the art gallery, specialized diagrams would be used to model the system throughout the development process. These diagrams would represent part of the system but not the whole thing. Some of the diagrams that would be shown are: use case diagrams use case specifications activity diagrams class diagrams sequence diagrams state machines communication diagrams Use Case Diagrams Use case diagrams are description of the system from the users point of view. This would entail an actor, use case and system boundary. Three use case diagrams are presented to the art gallery to the show some functional requirements of the system but not the whole system. The art gallery system, maintaining the art list and returning the art item are demonstrated below. This use case describes all the functions carried out in the art gallery system which includes all the actors from the curator, assistant curator, owner and the public. Some of the use cases include maintain art list, maintain owner list, maintain exhibition, manage store rooms, borrow and returning of art. Maintain Art list is a function carried out by the curator. This use case was generated from the Art Gallery System use case in figure 1. It extends to describe the description of what the curator could do in the cataloguing system, which are CRUD functions. Returning of art is a function which the assistant curator performs. This use case was developed from the Art Gallery System in Figure 1 and gives a details listing of the function the assistant curator can perform. Use Case Specification The use case description is a narrative description of the functional requirements from the use case. It describes the use case goal and gives the description of what usually happens and the normal course of events. Following are the use case specifications from the previous use case diagrams. Use Case: Maintain Art List Actors: Curator Goal: Managing the entire art list Description: The curator logs into the system, the user name and password is verified. Access is granted and the curator continues to function. A search is carried out on a particular art ID to ensure it does not exist, once affirmed the curator may create the new record with all the art details required. Other functions granted to the curator are update, delete and print functions which follow along the same line. Once the curator is finished with the particular functions so desired he then logs out the system. Use Case: Maintain Art List Actors: Curator Goal: Managing the entire art list Overview: The curator logs into the system, the user name and password is verified. Access is granted and the curator continues to function. A search is carried out on a particular art ID to ensure it does not exist, once affirmed the curator may create the new record with all the art details required. Other functions granted to the curator are update, delete and print functions which follow along the same line. Once the curator is finished with the particular functions so desired he then logs out the system. Typical course of events: Alternative courses: Step 6 the art information may already exist in the system in the event of adding a new art item and may choose a new art ID. Use Case: Returning Art Actor: Assistant Curator Goal: To return art to respective owner Description: The assistant curator logs into the system, the user name and password is verified. A search is carried to verify all items that are due. The list is obtained and the assistant curator/s may contact the respective owner making them aware the due date is soon. The contract is ended for borrowing the art item, a report is printed and the art is returned. Once successful the assistant curator logs out. Use Case: Returning Art Actor: Assistant Curator Goal: To return art to respective owner Overview: The assistant curator logs into the system, the user name and password is verified. A search is carried to verify all items that are due. The list is obtained and the assistant curator/s may contact the respective owner making them aware the due date is soon. The contract is ended for borrowing the art item, a report is printed and the art is returned. Once successful the assistant curator logs out. Typical course of events: Description: The art gallery system includes the daily operations of the art gallery; this includes the maintaining art list, owners list and exhibition carried out by the curator. The assistant curators also maintain the exhibition rooms, the storage rooms and carry out the functions of borrowing and returning the art items. The owner of the art items are also included in the borrowing and returning of the items and viewing the exhibitions in conjunction with the public. Activity Diagrams Activity diagrams show the internal flow of control in a process. Activity diagrams can be used to represent sequence, selection and iteration and they can also illustrate where all activities can be carried out in parallel. According to IBM.com Activity diagrams are helpful in the following phases of a project: Before starting a project, you can create activity diagrams to model the most important workflows. During the requirements phase, you can create activity diagrams to illustrate the flow of events that the use cases describe. During the analysis and design phases, you can use activity diagrams to help define the behaviour of operations. This diagram shows the activity of events in swim lanes with the assistant curator, art list and the owner. It shows the process of the activity of events taking place in the returning process. Class Diagrams The class diagram is central to object-oriented analysis and design, it defines both the software architecture. It is used to model classes and the relationships between classes, and also to model higher-level structures comprising collections of classes grouped into packages. The class diagram appears through successive iterations at every stage in the development process. Designed are class diagrams illustrating the super class, hierarchy and attributes and operations for the proposed catalogue system for the Art Gallery. Transfer Methods Currently the Art Gallery stores and processes all information on paper based forms which outlines the name, location, owner, value of art, due date, etc. This system could cause problems in finding location of art items and generating due dates because of the frequent change in the exhibitions and in storage. The Art Gallery wishes to fully change this paper based style and produce a catalogue which would improve the efficiency and effectiveness in the work place that would entail the same information from the paper forms. The system would also grant permission to only the Curator and Assistant Curators to have read, write, edit and delete functions. In order to commence this catalogue all the paper forms must be transferred to the computerised system. There are many techniques in which this catalogue could be created, but only the most efficient one would be chosen as it is critical to implement this system. These techniques range from human data entry, document scanning and even voice recognition tools. The mentioned techniques and technologies would be compared and contrasted where only the best option would be chosen to perform the functions needed. Human Data Entry Beginning with the very basic and most popular way of entering information into a system is human data entry. This operation is fully dependant on the data entry clerk or in the Art Gallerys case the assistant curator to read the document and manually key information from the paper forms into the catalogue on the computer system. This process would be strenuous and lengthy as it is a fully manual process. There are only six assistant curators employed at the Art Gallery and this would be highly impossible to implement in a short period. The curators not only have to borrow and return art items, but mange the store rooms and exhibitions so time would be limited in such, to perform data entry. It is assumed that if this technique is chosen at least two of the assistant curators would perform the functions of keying the information into the system. Therefore this option is not best suited for the art gallery due to time constraint and the amount forms that would be re-processed even though a specific number of records wasnt given, it is alleged that there are a profound amount of documents to be entered into the catalogue. Advantages of Human Data Entry Method requires simple software systems and low-end computing hardware Less costly in the sense of hardware and software in addition depending on cost of manpower A large number of PCs would be available for use after census Disadvantages of Human Data Entry Requires more staff Time consuming compared to automated data entry Human errors may consist Standardisation of operations is difficult as performance may be individually dependant Optical Mark Recognition (OMR) According to tiscali.co.uk OMR is a technique that enables marks made in predetermined positions on a computer input form be detected optically and input to a computer. Optical Mark Recognition is used to process data entry form in various institutes and companies. This technology shines a light beam onto the document and is able to detect the marks filled from check boxes and fill-in fields on a printed form, and then the software interprets the output from the scan and translates it to the desired format, bearing in mind the use of a keyboard is nonexistent. OMR is best applicable for processing large number of hand filled forms which are needed to be processed quickly and accurately, which may include survey reply cards, questionnaires and ballots. The speed of OMR is very fast as it could process approximately 85-130 pages per minute and up to 4000 pages per hour depending on the type of machine used. Advantages of Optical Mark Recognition Improved data accuracy Faster than human data entry Capture speeds around 4000 forms per hour Equipment is relatively inexpensive as costs are predictable and defined It is simple to install and run Well established technology that is used by many countries Disadvantages of Optical Mark Recognition There are restrictions as to form design Restrictions on type of paper and ink OMR cannot recognise hand written or machine printed characters Images are not captured by scanners so electronic retrieval is not possible Response boxes should be correctly marked with appropriate pen or pencil The Art Gallery forms are hand written documents and OMR technology doesnt recognise hand written documents therefore this technology is at fault with the requirements of the Art Gallery. Even though this technology has many advantages and of its use worldwide, another type of technology must be considered for transferring the paper based forms to the computerized system. Optical Character Recognition According to wisegeek.com Optical Character recognition is the process of converting printed or hand written materials into text or word processing files that can be easily stored and edited. All OCR systems require hardware and software for analysing the images. A scanners is used to scan the text on a page, then breaks the fonts into a series of dots called bitmap in addition it reads most common font and can determine where lines start and stop. The bitmap is then translated to computer text. This technology fits the requirements of the Art Gallery as it is able to read hand written documents. There have been a lot of advances to this technology over the years as to improve the recognition of handwriting or fonts similar to hand writing. As we observed before in human data entry if we wanted to document one of the forms which is currently used by the Art Gallery someone would have to manually type the document word for word, but with OCR you just scan the document and it could be converted to several formats such as Microsoft Word, Excel, Access, PDF or HTML. OCR would save a lot of time as it is fast in reading documents, just scan a document and it would be ready in seconds. A lot of businesses have chosen this technology as it cuts time in producing a document which would usually take days to complete can now be accomplished in a minute. As stated in the scenario the documents which the Art Gallery has are neatly handwritten characters which are easy to read so the problems with recognising font wouldnt be of a problem to hinder the operations carried out by this technique. Advantages of Optical Character Recognition Quicker processing, up to 60 sheets per minute Savings in costs and efficiencies by not having the paper questionnaires Scanning and recognition allowed efficient management and planning for the rest of the processing workload Reduced long term storage requirements, hard copy documentation could be destroyed after the initial scanning, recognition and repair Quick retrieval for editing and reprocessing Minimizes errors associated with physical handling of the questionnaires Disadvantages of Optical Character Recognition Higher costs of equipment High calibre IT staff required to support the system Handwriting on census forms be as close as possible to the model handwriting to avoid recognition error Possibility for error during character substitution which would affect data quality Tuning of recognition engine to accurately recognize characters is critical with trade-off between quality and cost Intelligent Character Recognition (ICR) Intelligent Character Recognition is sometimes compared with Optical Mark Recognition because of their similarities, but the difference with ICR is its advancement in recognition patterns allowing the technology to recognise all fonts and different styles of handwriting. This technology also allows automatic updates to the recognition of new hand writing patterns in its database. This technology is best suited for the transferring of the forms in the Art Gallery because it would recognise the handwriting on the forms without any editing taking place. The process of documenting the forms to the computerised system would entail the form being scanned; the data is captured then analyzed and translated using ICR software that enables pattern-matching and automatic indexing. Just like OCR the data could be transferred into several formats such as Word, Excel, Access, PDF, XML etc. According to managedoutsource.com some features and benefits of using ICR are: Can recognize any text of a form or a check Allows manual key boarding reduction or deletion Maximum process automation of documents Recognize text regardless of its specific typeface, style or size. Batch processing Automated updating, reports display and automated mass spectra interpretation Automatic checking of the information against databases and dictionaries Costs reduction for your business Because of the similarity with ICR and OCR the advantages and disadvantages may be the same. Therefore the following disadvantages are reiterations of OCR disadvantages as described earlier. Recommendation Voice recognition technology is another aspect of converting the paper based forms to the computerized system but due to all the training involved in this technology only the fastest and most reliable techniques were discussed. It is recommended that the museum use the Intelligent Character Recognition method for the transfer of the forms to the computerized system. Even though it is stated that the forms are easy to read and in standard English the Optical Character Recognition would have been the ideal choice, but doesnt know what the future holds while the process is actually being implemented and what errors may occur. One of the major downfalls the company would face with the ICR technology is its cost. This equipment quite costly and the budget of the Art Gallery are unknown. Instead of buying the machine it could be rented at a cheaper cost, because this technology is only being used to transfer the old forms and nothing further. This would result in a more economical status for the museum. Another form is to buy the machine and rent it out to other businesses who demand the use of this technology for the same purpose. The income generated from the ICR machine could be used in the borrowing of the art items from other galleries and private collectors. Prototype User Interface According to agilemodeling.com a prototype user interface is an iterative technique where users are involved in the development of the User Interface for the system. Since the actual system isnt necessary to demonstrate to the users all desired are snapshots of the designed prototype interface. Includes are the searching for the location of an item, editing an items details, adding a new item and listing the due for return to their owners by a selected date. In the searching process there are two options available to the user, by either entering the Art ID or browsing the current collection with the option of choosing the item type or by selecting the item. Once an option of choice is chosen the art details would be listed below. In the art item details there would be the name of the item what type of art it is, and its current location, further information could be granted to either see what exhibition room or store room it is located in. This form is designed to add a new art item into the catalogue. It gives the option of entering all the art details into the form, once completed the curator has the option of going to another record and view all records in the catalogue or add another record in the system, once completed the curator could close the form. This image is similar to adding the art information; the only difference is the editing aspect. The curator and assistant curators have specific functions where editing is concerned. First they search the record by browsing through the forms and choose the edit button to make changes to the art information. Once completed the new information is automatically saved then the user can close the form. Generating due dates is a function which the assistant curator does in the returning of an art item process. The assistant curator has two options of searching for the due dates. Either by entering a desired date and then the catalogue would list all the due art items on that particular day or by entering an art id which would display the due date of the item. When the search is completed the assistant curator could then print out a report of the information gathered or close the form and continue with the returning art item process. Security Issues Security is a continuous process of protecting an object from unauthorized access. It is as a state of being or feeling protected from harm. That object in that state may be a person, an organization or property such as a computer system. Many businesses suffer the loss of their business due to lack of security. Security doesnt only have to be securing the computer system of the Art Gallery but also its physical surroundings. Objects in the art gallery can either be tangible or non-tangible, tangible objects being hardware and paintings, and intangible being information and data in the system that the art gallery depends on for its continuation. There Art Gallery has many art items which are on loan from different galleries and private collectors which may be priceless or one of a kind art work so losing this could cost the art gallery fortunes. Listed below are the possible threats to security to the art gallery system. Physical Security This may vary in different ways, if there is poor security measures such as little or no implementation of swipe cards, biometrics, security guards, surveillance cameras and identification cards, this may result in a negative effect on the company as there may be imposters wishing to harm the operations of the business. Businesses sometimes think if securing your computer with anti-virus and firewalls would help secure your business but the little things like an unauthorized person gaining access to the building and removing the server, stealing hardware or by vandalizing equipment could make businesses suffer continuity. Therefore the Art Gallery should have proper implementation security guards, surveillance cameras, swipe cards and other media to help with securing the exhibition rooms and store rooms in the Art Gallery. Physical Attacks Physical attacks may result in the event of malicious activity, natural disasters or it may be an accident these attacks results from denial of service. Listed are some physical attacks that may be harmful to the Art Gallery: Fire destruction of art and equipment Water flooding or leaks in the art gallery Electrical Power Surges Temperature air condition failure Natural Disasters Hurricanes, earthquakes, etc. Equipment Failure failure in servers, surveillance cameras, swipe readers. Tampering of equipment With respect to the physical attacks once proper planning and prevention of the above mentioned are complied with the art gallery may be protected against any harmful measures. Faulty Software Faulty software may be unintentional mishaps, it doesnt necessary means sabotage in a business but manufacture problems. These could occur if there is a glitch in the Operating System causing it to malfunction; software was misconfigured during installation or database software malfunction or exploitable weakness. Malicious Software Malicious software is software designed to destroy a computer system without the owners informed consent. Malicious software could be developed by hackers or internal employees in the workplace. Some malicious software may include Computer Viruses Worms Trojan Horse Logic Bomb Hackers toolkit Spyware Dishonest adware Crime ware These malicious software can be contracted due to illegal use of the company internet for personal use other than work related or implanted into the system intentionally. Unauthorised Access Unauthorized Access may take form in different forms. A common way of unauthorized access is by leaving a system logged on and walking away from your desk, another co-worker may intentionally spy on your computer and steal information this is also called eavesdropping. Counter authentication is another form of unauthorised access which may include individuals guessing passwords, password interception, password cracking and session replay. Session Hijacking is the exploitation of a valid computer session to gain access to information or services in a computer system. Denial of Service Denial of service is designed to interrupt normal system functions and affect legitimate users to access the system. Hostile users send a flood of fake requests to a server making the connection impossible to establish. This may result in significant server downtime and financial loss for many companies. All these mentioned security issues are threats to the art gallery; even though some attacks are based on a networked system it is assumed that the Art Gallery would implement a network for the computerised system. Consequences to breach of security According to the threats discussed earlier they play serious threats to the Art Gallery. Once the art gallery has a breach in security it could harm the continuity of the business depending on the level of attack. Firstly starting off with physical attacks, a natural disaster can destroy the entire building with all the exhibits and computers which could terminate the continuation of the business continuity. Other physical attacks like flooding and fire may harm the business but it could be prevented or stopped once proper implementation of fire extinguishers and proper storage of computer system and art exhibits a secured. The difference is a natural disaster is sometime unpredictable. The loss of vital information pertaining to the catalogue with the owner details of art, and information could eventually result in physical theft of art items in the gallery. Some items in the art gallery may be priceless and belongs to persons all over the world; therefore loosing these items would endure the gallery into a financial disorder. Art Gallerys integrity and reputation could blemish as it would turn into a public scandal embarrassing they security measures and all private and confidential information exposed. Permissions User accounts are the best way of ensuring only the curator and assistant curators have write, edit and delete permissions in the proposed catalogue. Every user account is associated with a username and password, the users contact information, account restrictions allowing access to the database at only certain hours of the day and account status allowing the administrator to temporarily disable an account. The curator would be the administrator of the database allowing him access to any and everything he desires which may include the maintaining the art list, maintaining owners list, maintaining the location of art items etc. These functions would allow the curator have all CRUD functions in the database. Being the administrator no one can delete the account because the system depends on an administrator to function and administrator status could be granted to any a supervisor of the 6 assistant curators. The assistant curators would be granted general access to the database but granted certain permissions. The supervisor of the assistant curators may have write, edit and delete functions, whereas the other users may have write and edit functions. Reasons being a delete function is one of power and this permission should only be granted to persons of stature in an organization. This is also part of security reasons. Bibliography Publications Database Design Know it all by: S. Buxton; L. Fryman; R. Guting; T. Halpin; J. Harrington; W. Inmon; S. Lightstone; J. Melton; T. Morgan; T. Nadeau; B. ONeil; E. ONeil; P. ONeil; M. Schneider; G. Simsion; T. Teorey; G. Witt. Published by Morgan Kaufmann 2009 (1st Edition) A Student Guide to Object-Oriented Development by: C. Britton; J. Doake. Published by Elsevier Butterworth-Heinemann 2005 (1st Edition) Database Solutions A step-by-step guide to building databases by: T. Connolly; C. Begg. Published by Pearson Education Limited 2004 (2nd Edition) Networking All-in-One Desk Reference for Dummies by: D. Lowe. Published by Wiley Publishing Inc. 2008 (3rd Edition) Use Case Driven Object Modeling with UML Theory Practice by: D. Rosenberg; M. Stephens. Published by: Springer-Verlag New York Inc 2007 (1st Edition) Using UML Software Engineering with Objects Components by: P. Stevens; R. Pooley. Published by Addision-Wesley, Pearson Education Limited 2006 (2nd Edition) ICR, OCR, OMR Published by NCS Pearson, Inc www.PearsonNCS.com 2004 Workshop on Consistency Problems in UML-based Software Development by: J. Bodaveix; T. Millan; C. Percebois; C. Le Camus; P. Bazex; L. Feraud; R. Sobex. Blekinge Institue of Technology 2002 Workshop on Consistency Problems in UML-based Software Development by: J. Derrick; D. Akehurst; E. Boiten. Blekinge Institute of Technology 2002 Websites http://www.computer-realm.net/omr-technology/ http://www.drs.co.uk/census_methods.html. http://search.pearson.com/compare/icr-ocr-omr.pdf www.flatworldsolutions.com/articles/advantages-disadvantages-outsourcing.php http://www.scribd.com/doc/8663036/Normalization www.cert.org/archive/pdf/inside cross051105.pdf http://www.omg.org/technology/uml/index.htm,

Friday, September 20, 2019

God and Sin in Joseph Conrads Heart of Darkness :: Heart Darkness essays

God and Sin in Heart of Darkness A long debated issue that has plagued human beings since the fall of man is what leads people to commit evil actions and whether evil is inherent in all people. In the literary work of Joseph Conrad's Heart of Darkness, Marlow grapples with those two similar issues. They way in which Charlie Marlow, the protagonist and skipper, goes about determining the answers are by observing his and other people's goals and motivations throughout his voyage of discovery and self-enlightenment in the Congo of Africa. In the novel Heart of Darkness Joseph Conrad seems to be suggesting that the environment pushes people to their extremes, so they commit evil actions. I agree with this idea because in the Bible it says; "1 Corinthians 15:33, ...bad company corrupts good character." Anybody can look around and see that the world is evil. You may see people like politicians doing good for the community on the news, but you know that they are truly looking out for their own self-benefit, more money and publicity. Or even in the novel where it tells about Kurtz having the most successful ivory station in Africa, the way in which he achieved this is by raiding other tribes of their possessions. The Bible states that in "1 John 2:16, For the world offers only the lust for physical pleasure, the lust for everything we see, and pride in our possessions. These are not from the Father. They are from this evil world." There are several cases of people having mental breakdowns because of stress from the world's imperfectness. This mental collapse sometimes results in them attempting to, or actually murdering others, or even committing suicide. In "Jeremiah 17:9, The Heart is more deceitful that all else and is desperately sick; Who can understand it?" This verse gives proof that our hearts are sick from the evil in them, which corrupts good judgment and self-restraint. For another example the character Kurtz, the owner of the inner station, which is the most successful station, turned his back on his European roots. Kurtz became a god to the natives, and killed people who displeased him. Evidently, one has to admit, whether or not they believe in God, that the world is evil, corrupt, and man is prone to react abnormally to a difference of environment.

Thursday, September 19, 2019

Essay --

There are different types of eating disorders including anorexia nervosa, bulimia nervosa, and binge eating. Anorexia nervosa, commonly known as anorexia, is an eating disorder in which a person starves himself or herself and often over exercises therefore depriving their vital organs of essential nutrients needed to survive (Berger, 2010). Bulimia nervosa, commonly known as bulimia, is an eating disorder characterized by binge eating followed by purging (Berger, 2010). Binge eating is a disorder in which a person loses control of their eating habits and does not compensate for the amount of food he/she eats (NEDA, 2001). Although there are some popular beliefs that these eating disorders can be the result of low-self esteem, poor family and peer support, and media influence new research has found that only some of these reasons are completely true. Although it is commonly assumed that social networking may lower a person’s self image due to online bullying and self comparison to other users, a recent Facebook study has found that viewing oneself online can actually improve self-esteem. In 2011, Dr. Amy Gonzales and Professor Jeffery Hancock from Cornell University researched the effects on self-esteem using 63 participants including 16 males and 47 females. Gonzales and Hancock split the large group into three smaller groups in which the conditions were as follows: â€Å"exposure to a mirror, exposure to one’s own Facebook site, and a control condition in which participants used the same room without any treatment† (Gonzales & Hancock, 2011, pg 81). The participants would then get surveyed concerning their own self-esteem and graded using the â€Å"Rosenberg Self-Esteem Scale† (Rosenberg, 1965). The study concluded that those who were expo... ...edia does not have effect on eating disorders. Levine and Murnen (2009) concluded that if eating disorders are a psychiatric illness that begin in childhood, and all environmental factors should contribute to the development of an eating disorder, then the possibility for a child to binge eat is greater than a child developing anorexia or bulimia. The idea that mass media is responsible for anorexia and bulimia is irrelevant when considering that children will notice media concerning fatty foods more than they will notice media with visuals of thin women or bulky men. Mass media seems to be more relevant in the event of binge eating or obesity because children are more attracted to donuts then they are skinny models. A child is more likely to grow up eating the foods they see on television rather than starving themselves to look like a model they see on television.

Wednesday, September 18, 2019

Gender :: essays research papers

â€Å"The Men’s Right Movement: ‘Male’ is Not a Four-Letter Word†   Ã‚  Ã‚  Ã‚  Ã‚  Jack Kammer’s article seeks to point out that negative aspects have stemmed from the growing women’s liberation movement. This article does a good job bringing to light the anti-male feelings that are sometimes associated with the word â€Å"feminism.† However, it does not really have a concrete basis that supports this author’s opinions. Kammer’s article does share one concept common among some of the other critiques I have read on this man vs. women phenomenon. That is, without a factual base they tend to sound like simple complaints. I feel that articles such as these tend to take attention off of real problems that are embedded in our society. They also lead other reader to perceive the whole subject as a joke rather than a social science seeking solutions to real problems. Kammer does take the time to include some statistics on the many ways a man’s life is worse than that of a women, but these can be quickly thrown o ut. For example, women have typically not been allowed to work in â€Å"death professions.† I am sure that as our society grows everyone will have an equal chance at these wonderful jobs. I found it appalling that he even objected to differential treatment of children in hostage situations. I have shared some of the same feelings that Kramer describes, but I tend to ignore those as just differences of opinion or an ignorant person speaking to quickly. His use of the media portraying men as â€Å"secret admirer and blood brother to the gang rapist† is useless. The media will do anything to sell their product. That is something we can all agree on. We as a society are the police force that must control the media. Refuse to buy their product and they will change. I agree with Krammer in that many feminists tend to focus on men’s shortcomings as a way to further their cause. He does go a little far in using comics as an example of zapping our culture’s male e nergy. This is a large problem that is detrimental to a lot of arguments present today. (Look at the elections.) Rather than seeking a solution that will bring one side up to meet the other these people hope to bash the other side down.

Tuesday, September 17, 2019

Heart and Stone Therapy

322 Apply stone therapy massage 322 Apply stone therapy massage By Lucy Barnett By Lucy Barnett Task 1a * The importance of carrying out a detailed body analysis & relevant tests is so that you can pick up on any posture faults, avoid any areas which may be contra indicated and you are able to give them information on ways to improve their posture. It is important to carry out relevant tests such as cold or hot and sharp and blunt so that you are sure the client can feel the difference.This also prevents you from harming your client if they can feel something within the treatment which feels painful. * The importance of positioning the client correctly so they are as comfortable as possible and you aren’t causing them any pain or injury. It is important to be positioned correctly as a therapist so you prevent yourself from pain or injury if you consistently and positioned correctly this can result in repetitive strain injury. It is important to use the correct products, tools, equipment and technique because so the client can feel the best benefit from their treatment and it will not harm the client. * It is important to complete treatment records correctly so that you have on record if the client has any contra-indications which may prevent or restrict a treatment. You will also have on record anything the client may be allergic to. * It is important to complete the treatment to the satisfaction of the client so they go away feeling happy and return to you again in the future. Task 1bHistorical and culture background of stone therapy: The stones originated from Native Americans but they did not use them in massage. Stone therapy has been around for a long time but has been modernised through the years and now we use naturally shaped basalt pebbles and marble pebbles that have been cut to shape to deliver hot and cold temperatures. Four types of stones: Basalt stones: Hot stone, made from volcanic rock used all over the body. Should be recharged once a m onth in either; a bowl of salt water, in direct sunlight/ moonlight or burying in the earth overnight.Marble stones: cold stone, made from limestone should be recharged by leaving in sunlight/moonlight or burying in the earth overnight Marine stones: cold stone, made from sedimentary rock should be recharged by leaving in sunlight/moonlight or burying in the earth overnight. Semi-precious stones: can be used hot or cold, gem stones, usually used for shakra placing. Should be recharged; with reiki energy, leaving in sunlight/moonlight and cleansing in a bowl with other crystals. Physical and physiological effects of hot and cold stones: Effects of hot stones 1 Vaso-dilation – the blood vessels widen, bringing blood to areas of the body ie skin * Increased circulation – more oxygenated blood circulating * Increased metabolism – speeds up the rate of nutrients being utilised * Increased pulse rate – helps the heart pump efficiently * Increased cell metabolis m – speeds up the process of manufacturing new cells * Increased lymph function – speeds up the removal of toxins and waste * Relaxes the muscles – enables the therapist to work on the muscles without causing discomfort to the client * Reduces muscle tension Relaxes the mind * Different emotions may cause some clients to feel upset. Effects of cold stones 1 * Vaso-constriction – the blood vessels narrow, taking blood away from areas of the body, ie skin * Analgesic effect – natural pain relief released in the body * Reduces inflammation – excess blood is taken away from the area * Reduces histamine – reduces this irritant often present in stressed muscles, causing the muscles to relax. * Body pumped to the core organs, ie heart, lungs * Relaxes the mind * Reduces headaches Task 1cOne Fungal infection that would prevent the treatment: Ringworm One Bacterial infection that would prevent the treatment: Impetigo One viral infection that w ould prevent the treatment: Shingles One severe skin condition: Severe eczema Ten contra-indications that would restrict the treatment: 1. Diabetes 2. Epilepsy 3. High/low blood pressure 4. Piercings 5. Anxiety 6. Cuts 7. Abrasions 8. Bruises 9. Metal plates or pins 10. Recent dermabrasion Bibliography Task 1a – core unit’s book Task 1b – lastone therapy book Task 1c – notes taken in class

Monday, September 16, 2019

Squealer in Animal Farm

What makes Squealer such a significant character in Animal Farm? Throughout the novella, Orwell uses the character Squealer, a silver tongued pig, to manipulate language to convince other animals on the farm. Orwell uses   Squealer  to mainly show how some governments and politicians  use   propaganda to brainwash the minds of their fellow people. Squealer is very much Napoleon’s propaganda machine. His manipulation of language is key to grasping the trust of animals under their leader Napoleon’s reign.Squealer is a very convincing actor to the animals and his persuasion used to justify Napoleon’s actions overcomes their doubts, â€Å"he could turn black into white†. He makes the animals turn against their trusted Snowball when Squealer deceitfully tells them â€Å"Squealer was in a league with Snowball†. Squealer himself does not voice much of his own opinion, he merely regurgitates orders from Napoleon as he knows he’s arguing from a certain position of knowledge that he thinks can be trusted.He manipulates the animals’ fear of Jones in order to increase Napoleon’s power. He gives the animal’s meaningless and often false statistics to convince them that life is better than it used to be, for example when he ‘proved’ to the animals in detail that they had more food not than before the Rebellion. In specific language terms, Squealer uses a lot of rhetorical questions limiting the animals from thinking for themselves and so forcing them to submit to his authority, ‘’Surely Comrades you don’t want Jones back? ’’.Squealer cleverly complicates the language he uses and practises jargon that the animals do not know the meaning of so that they will think he must be an intelligent individual and they must follow his orders. By complicating language, â€Å"A bird’s wing†¦ is an organ of propulsion and not of manipulation†, he confuses the other animals. He also causes them to have a sense of hopelessness; the other animals feel they can never understand the truth without the pigs’ intervention and guidance. Combining the animals’ ignorance of the changing of history to suit the pig’s needs, Squealer changes the commandments to make the pigs â€Å"more equal. Furthermore, by radically simplifying language instead, like when he teaches the sheep to bleat â€Å"Four legs good, two legs better! † he limits the terms of debate. Additionally, Squealer's name fits him well: squealing, of course, refers to a pig's typical form of vocalization, and Squealer's speech defines him. At the same time, to squeal also means to betray and so this fittingly evokes Squealer’s behaviour to the other animals. Overall, Squealer is remarkably good at playing on the animals’ ignorance and gullibility. He redefines his words to prevent the animals from having a mind of their own.

Sunday, September 15, 2019

Genetically Modified Foods: Helpful or Harmful? Essay

Genetically modified (GM) foods have been around for thousands of years. In the 1990s, they started being sold commercially in the United States, which was the start of this controversy: Are GM foods good or bad for us? Do the pros outweigh the cons? In my opinion, genetically modified foods are nothing to worry about. GM foods are produced from genetic engineering. Scientists take a certain gene from an organism that is desired and put it into another organism. For example, scientists might take a drought resistant gene from a plant and insert it into a crop, so that crop will not die during a period of low rainfall. There are various ways to add in these desired genes, such as crossbreeding, which has been used since the beginning of agriculture, bacterial transfer of DNA into a cell, and a newer method of shooting DNA particles into a cell with particle gun, developed by Cornell University (Freedman, 83). There are numerous advantages of genetically modified foods. Crops can become impervious to insects. According to Whitman, â€Å"Consumers do not wish to eat food that has been treated with pesticides because of potential health hazards, and run-off of agricultural wastes from excessive use of pesticides and fertilizers can poison the water supply and cause harm to the environment. † Making the crops pest resistant makes more people want to buy them and is safer on the environment. Since farmers can use less pesticide, the cost of the food decreases and less people go hungry. â€Å"It has raised the output of corn, cotton and soy by 20 to 30 percent, allowing some people to survive who would not have without it (Freedman, 82). † Another advantage is adding vitamins and minerals to foods that lack them. Foods become more nutritious. For example, â€Å"Malnutrition is common in third world countries where impoverished peoples rely on a single crop such as rice for the main staple of their diet. However, rice does not contain adequate amounts of all necessary nutrients to prevent malnutrition. If rice could be genetically engineered to contain additional vitamins and minerals, nutrient deficiencies could be alleviated (Whitman). † LaPensee also agrees: â€Å"Genetic manipulation could increase agricultural yields in developing countries with the development of more sustainable crops. For example, disease- and pest-resistant fruits and vegetables with higher nutritional value (e. g. , more iron, vitamin A, and protein) could improve the health of people in developing regions where the imbalanced indigenous diet is overly dependent on grains such as rice and corn. † This can decrease hunger and sickness world-wide. On the contrary, GM foods do have some disadvantages. When you modify plants and animals genetically, biodiversity decreases. â€Å"Homogeneity may make crops more susceptible to disease. Thus, the present uncertainty about the cumulative effects in ecosystems or the food chain is making consumers wary (Hoyle and Lerner). † With a decrease in biodiversity, all crops that are genetically similar are more susceptible to die during a natural disaster. Also, scientists do not know all of the effects of these GM foods on our health. â€Å"For a variety of reasons, not all scientifically based, some people argue that transgenic food is a consumer safety issue because not all of the effects of transgenic foods have been fully explored (Transgenics). † GM foods should definitely be labeled. People have a right to know whether or not their foods have been genetically modified. Businesses argue that it would cost more for the consumer if their was a label, but â€Å"the demand for transparency is unlikely to go away so, for crying out loud, just label it (O’Brian). † Genetically engineered foods are very helpful. They can be more nutritious and better for the environment. These modifications help people all over the world, especially people dependent on certain crops. There are some criticisms, but the good outweighs the bad. GM foods should all be labelled, because people need to know what is in their food. Biblography Freedman, David H.. â€Å"Are Engineered Foods Evil?. † Scientific American 1 Sept. 2013: 80-85. Print. Hoyle, Brian, and K. Lee Lerner. â€Å"Genetically Modified Foods and Organisms. † The Gale Encyclopedia of Science. Ed. K. Lee Lerner and Brenda Wilmoth Lerner. 4th ed. Vol. 3. Detroit: Gale, 2008. 1900-1902. Gale Virtual Reference Library. Web. 11 May 2014. LaPensee, Kenneth T. â€Å"Biotechnology and the Manipulation of Genes. † Scientific Thought: In Context. Ed. K. Lee Lerner and Brenda Wilmoth Lerner. Vol. 1. Detroit: Gale, 2009. 532-536. In Context Series. Gale Virtual Reference Library. Web. 11 May 2014. O’Brian, Mark R.. â€Å"Don’t fear GMOs: Genetically modified food is just the latest chapter in 10,000 years of high-tech agriculture. † The Buffalo News 6 Apr. 2014: 1. Print. â€Å"Transgenics. † The Gale Encyclopedia of Science. Ed. K. Lee Lerner and Brenda Wilmoth Lerner. 4th ed. Vol. 6. Detroit: Gale, 2008. 4414-4416. Gale Virtual Reference Library. Web. 11 May 2014. Whitman, Deborah B.. â€Å"Genetically Modified Foods: Harmful or Helpful?. † . N. p. , 1 Apr. 2000. Web. 11 May 2014.

Saturday, September 14, 2019

Different Propaganda Means in World War II Essay

1. Introduction a) General Background We know that propaganda used in war had effects on the outcome of the war from GCSE Modern World History second edition that propaganda means used in war had contributed to the war efforts which directly affected the outcome of the war. Many propaganda means such as movies and songs flourished during this era and even until today. b) Rationale of Research Our paper aims to show how the propaganda means helped to contribute to the war effort by â€Å"blinding† the civilians from facts, so that they would continue to support the government in their war efforts and not lose poise in the war. The sources that we have selected were produced and used at the period of war and thus are eligible as a primary source. c) Research Questions * How does propaganda affect the outcome of war? * How effectual is each different mean of propaganda? d) Scope of Research We will only be looking at the 4 different means of propaganda stated: o Chaplin’s (1940) movie- â€Å"The Great Dictator† o Almanac Singer’s (1942) song- â€Å"Round and Round Hitler’s Grave† o Clampett’s (1942) cartoon- â€Å"Any Bonds Today† o Smith’s (1942) propaganda poster about war bonds We will also bring in historical knowledge that we obtained from the books and websites indicated in the bibliographical section. e) Limitations of Research Our paper will only discuss how propaganda is effective in the primary sources that we will be using. We will only mention how effective each of these sources are, bringing in historical background to support our view. Our paper will only be discussing on these specific sources mentioned and not propaganda as a whole broad topic. 2. Literature Review Chaplin’s and Clampett’s movies plus Almanac Singers’ song criticised the Axis Powers. They were anti-Nazi Propaganda and were efficient in spreading propaganda. Clampett’s cartoons and Smith’s poster appealed to the Americans to support the war through buying war bonds. Chaplin’s movie shows that Hitler is uncivilized, as seen in a cake fight whilst discussing war issues with Italy-an ally. Clampett’s cartoon shows that the Axis Powers were uncooperative when they stepped on the ‘Dove of Peace’. Almanac Singer’s song lyrics (Appendix 2) was insulting, â€Å"Wished I had old Hitler /with a rope around his neck† and continues about dancing round Hitler’s grave. The first movie was produced to ridicule Hitler with very little purpose except for a speech (Appendix 3) because America was still a neutral country during 1940, but in Europe war had commenced. All resources made use of either audio or visual. It was the era whereby poems were no longer effectual and popular means of expression. Hence, propaganda was conveyed in posters, songs aired on radio and movies in theatres worldwide. Audio and visual aids provided a lucid picture of happenings and task definition enabling the government to easily persuade the people to do their biddings. The movies were directed by famous people (such as Warner Brothers, Charles Chaplin), whom civilians thought were trust-worthy and thus easily swayed. Moreover, most propaganda accentuates the importance of war bonds in the War. Bugs Bunny in â€Å"Any Bonds Today† (Appendix 6) was saying that without the bonds, we ‘can’t make tomorrow’s plan’, which is to win the war. Even in this song there is a propaganda poster (Appendix 5) on war, patriotism and to procure war bonds (Appendix 4). Smith’s poster was specifically on war bonds but just in a different form. The poster illustrates the repercussions without war bonds and shows a Nazi shadow cast over children. Therefore, buying bonds will safeguard them from the Axis. Patriotism resulted in exceedingly successful recruitment and maintenance of peace in the country. Patriotism prevented war at home while combating enemies. It was evoked through a poster signifying victory (Appendix 5), shown as the backdrop of Clampett’s movie and also through criticising and making Axis Powers look inferior. Hence, Allies gain confidence. Not all movies were totally censored by the government and thus contained more truths. However, animated cartoons were still successful. The audience were predominantly children and upon listening to the catchy tunes and vivid pictures, persuade their parents into buying bonds for their well-being. The success of war propaganda for bonds reaped 185 billion dollars – enabling the vast expansion of arms. Chaplin’s speech gave Germany hope that ‘when dictators die, liberty will return to the people’; this helped alleviate tension in Europe. The song (Appendix 2) was performed by a band formed by the government for propaganda purposes. Their songs were highly popular at that era and helped stir patriotism in the Americans. All the propaganda, even if not asking to acquire war bonds, was useful in convincing the people that the Axis were inferior to the Allies. 3. Research Methodology We have evaluated the germane resources that we can access and selected four sources that we will be using in our paper. These sources are primary sources as they were produced and released during World War II. After the selection of the resources, we analysed each of the sources individually to detect the characteristics of each source. We also accessed the impact they had at that time derived from historical knowledge. We then look at critics’ standpoint of these sources and found out that reviews and critics on these sources were scarce and extraneous to our paper and we decided to prohibit these critics, as most did not have any relevance to our paper. Subsequently, we look at all the sources and list down their similarities and differences from the examination of each source. 4. Results & Analysis All the sources that we have used proved to be valuable in showing us the influence these propaganda tools may even have on us. These sources were used by the Allies to convince the civilians that the Axis Powers are the â€Å"unscrupulous guys† and they are to remove these threats. Chaplin’s â€Å"The Great Dictator† and Almanac Singers’ â€Å"Round and Round Hitler’s Grave† were aimed at Hitler and the purpose of the movie was to destroy Hitler’s reputation. These sources ridicule Hitler and persuaded the people to despise and condemn him. Clampett’s cartoons and Smith’s poster applied more to the persuasion of the civilians to buy war bonds to help to lighten the burden the economy have to take. These sources use patriotism to persuade the civilians to help to buy war bonds. 5. Conclusion a. Has our research proved our hypothesis correct / wrong? Our research has proven our hypothesis correct. Our research had shown that propaganda helped to collect the necessary resources needed for war, which is money and manpower. In World War II, propaganda means had evolved into sophisticated structure where many factors are included. Propaganda became an essential tool that would be necessary in war, as it would help the government to haul support from the civilians in order to get enough resources for war. b. Questions for further research 1) Why did poems lose popularity as a form of propaganda means in World War 2? 2) How did movies gain popularity as propaganda means in the war? 3) Why were Audio Aids more effective than Audio-Visual Aids in the war as a propaganda tool? 6. Bibliography a) Books: Lowe, Norman (1997) Mastering Modern World History third edition. New York: Palgrave Publishers Ltd Tate, Nicholas (1999) A History of the Modern World 1917-1952 fifth edition. Singapore: Federal Publications Pte Ltd Walsh, Ben (2002) GCSE Modern World History second edition. London: John Murray Publisher’s Ltd b) Websites: http://www.graham.day.dsl.pipex.com/ww2001.htm http://www.apcpapercollect.com/propaganda.htm http://www.hitler.org/speeches/ http://www.hitler.org/writings/programme/ http://www.earthstation1.com/Tokyo_Rose.html http://www.playwinningpoker.com/articles/mz/war1.html http://www.warfoto.com/entertain.htm http://lcweb.loc.gov/exhibits/bobhope/uso.html http://www.nauticom.net/www/harts/homefront.html http://www.a2zcds.com/cds/history/world_war_2.htm http://www.ingeb.org/WWII.html http://www.calvin.edu/academic/cas/gpa/ww2era.htm http://www.archives.ca/05/0534/053402_e.html http://www.pbs.org/wgbh/amex/presidents/32_f_roosevelt/psources/#a http://www.42explore.com/worldwar2.htm http://www.ac.wwu.edu/~hansenb2/materialsWW2.pdf http://www.historyguy.com/day_of_infamy.html http://journals2.iranscience.net:800/www.internet-magazine.com/tesla.liketelevision.com/default.htm http://members.home.nl/ww2propaganda/index.html http://www.virtualology.com/virtualwarmuseum.com/hallofworldwarii/ http://www.oldeagle.nu/post/ http://www.hitler.org/speeches/ http://www.hitler.org/writings/programme/ http://www.archives.gov/exhibit_hall/powers_of_persuasion/powers_of_persuasion_home.html http://home.nc.rr.com/tuco/looney/lists/war.html http://www.teacheroz.com/WWIIpropaganda.htm http://members.aol.com/FenixFlyte/chaplin.html http://propaganda.ww2.klup.info/ http://www.graham.day.dsl.pipex.com/ww2001.htm http://www.apcpapercollect.com/propaganda.htm http://www.hitler.org/speeches/ http://www.hitler.org/writings/programme/ http://www.earthstation1.com/Tokyo_Rose.html http://www.playwinningpoker.com/articles/mz/war1.html http://www.warfoto.com/entertain.htm http://lcweb.loc.gov/exhibits/bobhope/uso.html http://www.nauticom.net/www/harts/homefront.html http://www.a2zcds.com/cds/history/world_war_2.htm http://www.ingeb.org/WWII.html http://www.calvin.edu/academic/cas/gpa/ww2era.htm http://www.archives.ca/05/0534/053402_e.html http://www.pbs.org/wgbh/amex/presidents/32_f_roosevelt/psources/#a http://www.42explore.com/worldwar2.htm http://www.ac.wwu.edu/~hansenb2/materialsWW2.pdf http://www.historyguy.com/day_of_infamy.html http://journals2.iranscience.net:800/www.internet-magazine.com/tesla.liketelevision.com/default.htm http://members.home.nl/ww2propaganda/index.html http://www.virtualology.com/virtualwarmuseum.com/hallofworldwarii/ http://tesla.liketelevision.com/liketelevision/tuner.php?channel=608&format=tv&theme=guide http://tesla.liketelevision.com/liketelevision/vip/alacart.php?channel=687&p=5&theme=guide http://www.lib.berkeley.edu/MRC/FilmonVideoVid.html http://www.bcdb.com/bcdb/detailed.cgi?filmtml3&p=s http://looney.toonzone.net/miscelooneyous/tvtitles/tvtitles1.html http://www.kidscastle.si.edu/channels/history/articles/historyarticle22.html http://www.smithsonianmag.si.edu/smithsonian/issues02/feb02/war_bonds.html http://www.archives.gov/exhibit_hall/powers_of_persuasion/word_document/bugs_bunny_video_description.txt http://wso.williams.edu/~dgerstei/chaplin/nazi.html http://www.splicedonline.com/95andbefore/chaplin1_dvd.html http://www.aicgs.org/resources/daad/1995010.shtml c) Acknowledgements: Many thanks to our mentor Miss Foo Yang Yann for helping us out in many areas of our paper. d) References: Clown Ministry (2003). Text of Charlie Chaplin’s speech from The Great Dictator, aka â€Å"Look up, Hannah†. http://www.clown-ministry.com/Articles/Poetry/chaplin-great-dictator.html, last accessed 7 Aug 2003. Florit, Luis A. (2003). The Speech of The Great Dictator. http://w3.impa.br/~luis/chaplin.html, last accessed 7 Aug 2003. Geer, Goopy (2003). Goopy Geer’s Rare Cartoons Page – War Cartoons. http://members.fortunecity.com/goopygeer2/, last accessed 7 Aug 2003. Helfert, Manfred (2003). Round And Round Hitler’s Grave (Woody Guthrie/Millard Lampell/Pete Seeger). http://www.geocities.com/Nashville/3448/round.html, last accessed 7 Aug 2003. National Archives and Records Administration (2003). NARA | Exhibit Hall | Exhibit Hall Main Page. http://www.archives.gov/exhibit_hall/, last accessed 7 Aug 2003. Rotten Tomatoes (2003). The Great Dictator (1940): Charlie Chaplin, Paulette Goddard, Jack Oakie, Charlie Chaplin. http://www.rottentomatoes.com/m/TheGreatDictator-1008790/, last accessed 7 Aug 2003.