Monday, September 30, 2019

Safeguarding Adults And Promoting Independence

In this assignment I will be explaining how, the residential care home, of which I carried out my first placement; promotes independence and reduces the risk of abuse and neglect. I will do this by explaining and discussing: approaches, strategies, principles and will then evaluate the role of multi-agency working in reducing the risk of abuse. Although the residential care homes occupants, are all unable to fully look after themselves, primarily due to age and related health problems.Each service user had a different set of needs that needed to be met, to provide adequate care and in order to reduce the risk of neglect or abuse. When taking into account a service user’s needs and independence, confidentiality, rights and overall care. The main requirements; employees, organisations and other care providers involved in the care of the residents of the care home are: To improve the service user’s way of life, provide choice; inform the service user and family of their tr eatment, recovery, and care plan and to protect. This is also known as the core principles of care/ care value base.The principles and value that will follow, are the set standards expected to be followed by the care assistants and nurses. And for the service users of the home to receive. The principles the care home follows are; To support and encourage equality, diversity and to maintain confidentiality of the service users information and that the employees and employer deliver; respect, dignity, fairness, privacy and equality. The overall aim of the principles and standards is to improve the service users quality of life by making sure that each individual gets the care that is individually needed.A person-centred approach is an assessment analysis and Judgment, plan, implement and evaluate is an ongoing plan assessing an individual’s Needs. Effective communication between service users and employee to employee’s and practitioner to external professionals should be paramount. Anti-discriminatory practice must be practiced and maintained by the service providers and personal opinions and or dislikes should not be brought into the working environment in order to stay professional.The service provider should aim to provide a safe secure and encouraging environment for adults they have a duty of care. The practitioners should focuses on the individual’s personal needs, wants, desires and goals so that they become central to the care process. Principles of person centred care 1. Getting to know the patient or client as a person: This focuses on building a relationship between the clinician and the patient/client and carers. Health professionals need to get to know the person beyond their diagnosis. 2.Sharing of power and responsibility: This focuses on respecting preferences. It includes treating patients / clients as partners when setting goals, planning care and making decisions about care, treatment or outcomes. 3. Accessibility and flex ibility: This focuses on meeting patients and clients individual needs by being sensitive to values, preference and expressed needs. It also focuses on giving the patient / client choice by giving timely, complete and accurate information in a manner they can understand so they can make choices about their care.

Sunday, September 29, 2019

European History Essay

During the time period of the late sixteenth century to the late eighteenth century the concept of what nobility is and what it was conceived to be varied greatly as more modern thoughts developed and desperation of monarchs grew to meet such demand. The arguments related to nobility differed greatly, but these were the most crucial; the difference between the sword and the robe and the right to even hold such a position at all. The nobles from military decent (the sword) have an extensive lineage that allows them to perform certain tasks as described by Jean de La Taille in the poem â€Å"The Retired Courtier,† the words speak of the need to be a noble, to be a pure noble, to hold the position of a courtier [Doc 1]. King Louis XIII has proclaimed in the Declaration of Duels and Affairs of Honor that nobles bought into the nobility are wasting time fighting with the nobles of military decent should rather have spent that energy defending the country that gives them such authority in the first place [Doc 6]. King Louis XIII only wants the political emancipation from such a minor distraction as this controversy caused such a up roar of the masses. Gilles Andre de La Roque said, â€Å"You can’t just earn the title of nobility because you lack the family necessary for it† [Doc 9]. On that note, note everyone had the exact same idea as to what makes a noble, a noble. Marc-Antoine Millotet supported the rights of being a robe nobleman being that it was acquired by law, so as to make it just [Doc 7]. This belief was most likely due to the fact that he was a Judge thus, influencing the idea of law. Moliere created the scene in â€Å"Dom Juan† that nobility is not earned through birth, but by the actions of ced person [Doc 8]. He could have possibly thought that this because of his non-nobility status and his role thespianism, meaning only nobles would watch plays anyways. King Louis XVI changed the way the monarchy viewed the rights to nobility by stating you don’t have to fight in war to gain noble recognition any nobility involvement will do [Doc 10]. Although, people feuded about which noble was the right noble some didn’t even believe it should exist. Pierre de La Primaudaye thought nobility needed self-worth before such nobility were to even be inherited; he said you need to contribute to the family name [Doc 2]. Villagers of Mondeville in a testimony to the Parlement that nobility isn’t a perfect breed they shouldn’t hold such prestige over other people, saying that Pierre Morin believed his noble status gives him the right to mistreat anyone who is not royal or noble [Doc 3]. Henry, Prince of Conde spoke about the current nobility buying their way into offices, saying that there is no reward for virtue or tradition of family since all power now belongs to favors, alliances, kinship, and money [Doc 4]. Henry perhaps felt a need to say what was on his mind as he saw the immediate nobility change in the court around him causing much stress and indifference. Over the period of the late sixteenth century to the late eighteenth century nobility changed its influences on the public and the royal court this led to arguments such as the difference of the sword and robe nobles to the idea of not having nobles at all. This controversy will continue as the struggle for power continues in the higher classes in European governments or when the idea of monarchy ends entirely.

Saturday, September 28, 2019

Cloud Computing Technology Essay

INTRODUCTION Cloud computing is Internet (â€Å"cloud†) based on development and use of computer technology (â€Å"computing†).It is a style of computing in which dynamically scalable and often virtualised resources are provided as a service over the internet.Users need not have knowledge of, expertise in, or control over the technology infrastructure â€Å"in the cloud† that supports them. The concept incorporates infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) as well as Web 2.0 and other recent (ca. 2007-2009) technology trends which have the common theme of reliance on the Internet for satisfying the computing needs of the users. Examples of SaaS vendors include Salesforce.com and Google Apps which provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. A cloud is a pool of virtualized computer resources. A cloud can: 1.Host a variety of different workloads, including batch-style back-end jobs and interactive, user- facing applications. 2.Allow workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or physical machines. 3.Support redundant, self-recovering,highly scalable programming models that allow workloads to recover from many unavoidable hardware/software failures. 4.Monitor resource use in real time to enable rebalancing of allocations when needed. Fig 1.1: Overview of cloud computing HISTORY The underlying concept dates back to 1960 when John McCarthy opined that â€Å"computation may someday be organized as a public utility†; indeed it shares characteristics with service bureaus which date back to the 1960s.The term cloud had already come into commercial use in the early 1990s to refer to large ATM networks.By the turn of the 21st century,the term â€Å"cloud computing† had started to appear, although most of the focus at this time was on Software as a service (SaaS). In 1999, Salesforce.com was established by Marc Benioff, Parker Harris,and his fellows.They applied many technologies of consumer web sites like Google and Yahoo! to business applications. IBM extended these concepts in 2001,as detailed in the Autonomic Computing Manifesto-which described advanced automation techniques such as self-monitoring, self-healing, self-configuring, and self-optimizing in the management of complex IT systems with heterogeneous storage, servers, applications, networks, security mechanisms, and other system elements that can be virtualized across an enterprise. Amazon.com played a key role in the development of cloud computing by modernizing their data centres after the dot-com bubble and, having found that the new cloud architecture resulted in significant internal efficiency improvements,providing access to their systems by way of Amazon Web Services in 2002 on a utility computing basis. 2007 saw increased activity,with Google,IBM and a number of universities embarking on a large scale cloud computing research project, around the time the term started gaining popularity in the mainstream press. WORKING OF CLOUD COMPUTING Fig 1.2: Working of cloud computing In cloud computing you only need to load one application.This application would allow workers to log into a Web-based service which hosts all the programs the user would need for his or her job. Remote machines owned by another company would run everything from e-mail to word processing to complex data analysis programs.It’s called cloud computing, and it could change the entire computer industry. In a cloud computing system, there’s a significant workload shift.Local computers no longer have to do all the heavy lifting when it comes to running applications.The network of computers that make up the cloud handles them instead. Hardware and software demands on the user’s side decrease.The only thing the user’s computer needs to be able to run is the cloud computing system’s interface software, which can be as simple as a Web browser, and the cloud’s network takes care of the rest. CLOUD ARCHITECTURE Cloud architecture,the systems architecture of the software systems involved in the delivery of cloud computing, comprises hardware and software designed by a cloud architect who typically works for a cloud integrator. It typically involves multiple cloud components communicating with each other over application programming interfaces, usually web services. Cloud architecture extends to the client, where web browsers and/or software applications access cloud applications. Cloud storage architecture is loosely coupled, where metadata operations are centralized enabling the data nodes to scale into the hundreds, each independently delivering data to applications or users. Fig 1.3: Cloud architecture COMPONENTS 1. APPLICATION A cloud application leverages the Cloud in software architecture,often eliminating the need to install and run the application on the customer’s own computer,thus alleviating the burden of software maintenance, ongoing operation, and support. 2. CLOUD CLIENTS A cloud client consists of computer hardware and/or computer software which relies on the cloud for application delivery, or which is specifically designed for delivery of cloud services and which, in either case, is essentially useless without it. For example:Mobile ,Thin client ,Thick client / Web browser . 3. CLOUD INFRASTRUCTURE Cloud infrastructure,such as Infrastructure as a service,is the delivery of computer infrastructure, typically a platform virtualization environment,as a service.For example:grid computing ,Management , Compute ,Platform. 4. CLOUD PLATFORMS A cloud platform,such as Paas, the delivery of a computing platform,and/or solution saas,facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. 5. CLOUD SERVICES A cloud service includes â€Å"products, services and solutions that are delivered and consumed in real-time over the Internet†.For example Web Services (â€Å"software system[s] designed to support interoperable machine-to-machine interaction over a network†) which may be accessed by other cloud computing components, software, e.g., Software plus services, or end users directly. 6. CLOUD STORAGE Cloud storage involves the delivery of data storage as a service, including database-like services, often billed on a utility computing basis, e.g., per gigabyte per month. For example Database ,Network attached storage ,Web service . TYPES OF CLOUDS 1. PUBLIC CLOUD Public cloud or external cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who shares resources and bills on a fine-grained utility computing basis. 2. HYBRID CLOUD A hybrid cloud environment consisting of multiple internal and/or external providers â€Å"will be typical for most enterprises†. 3. PRIVATE CLOUD Private cloud and internal cloud are neologisms that some vendors have recently used to describe offerings that emulate cloud computing on private networks.These (typically virtualisation automation) products claim to â€Å"deliver some benefits of cloud computing without the pitfalls†, capitalising on data security, corporate governance, and reliability concerns. They have been criticised on the basis that users â€Å"still have to buy, build, and manage them† and as such do not benefit from lower up-front capital costs and less hands-on management ,essentially â€Å"[lacking] the economic model that makes cloud computing such an intriguing concept†.While an analyst predicted in 2008 that private cloud networks would be the future of corporate IT, there is some contention as to whether they are a reality even within the same firm. ROLES PLAYED IN CLOUD COMPUTING 1. CLOUD COMPUTING PROVIDERS A cloud computing provider or cloud computing service provider owns and operates live cloud computing systems to deliver service to third parties.Usually this requires significant resources and expertise in building and managing next-generation data centers.Some organisations realise a subset of the benefits of cloud computing by becoming â€Å"internal† cloud providers and servicing themselves, although they do not benefit from the same economies of scale and still have to engineer for peak loads. The barrier to entry is also significantly higher with capital expenditure required and billing and management creates some overhead.Nonetheless, significant operational efficiency and agility advantages can be realised, even by small organisations, and server consolidation and virtualization rollouts are already well underway.Amazon.com was the first such provider,modernising its data centers which,like most computer networks, were using as little as 10% of its capacity at any one time just to leave room for occasional spikes. This allowed small, fast-moving groups to add new features faster and easier, and they went on to open it up to outsiders as Amazon Web Services in 2002 on a utility computing basis. Players in the cloud computing service provision game include the likes of Amazon, Google, Hewlett Packard, IBM, Intel, Microsoft, Salesforce, SAP and Yahoo! 2. USER A user is a consumer of cloud computing.The privacy of users in cloud computing has become of increasing concern.The rights of users are also an issue, which is being addressed via a community effort to create a bill of rights. 3. VENDOR A vendor sells products and services that facilitate the delivery, adoption and use of cloud computing.For example:Computer hardware,Storage,infrastructure,Computer software,Operating systems ,Platform virtualization. APPLICATIONS OF CLOUD COMPUTING 1.EASY ACCESS TO DATA Clients would be able to access their applications and data from anywhere at any time.They could access the cloud computing system using any computer linked to the internet. 2. REDUCTION OF COSTS It could bring hardware costs down.Cloud computing systems would reduce the need for advanced hardware on the client side.You wouldn’t need to buy the fastest computer with the most memory, because the cloud system would take care of those needs for you. Instead, you could buy an inexpensive computer terminal, enough processing power to run the middleware necessary to connect to the cloud system. 3. CONVENIENCE Corporations that rely on computers have to make sure they have the right software in place to achieve goals. Cloud computing systems give these organizations company-wide access to computer applications.Instead, the company could pay a metered fee to a cloud computing company. 4. EASY STORAGE Servers and digital storage devices take up space. Some companies rent physical space to store servers and databases because they don’t have it available on site. Cloud computing gives these companies the option of storing data on someone else’s hardware, removing the need for physical space on the front end. 5. NO TECHNICAL SUPPORT RECQUIRED Corporations might save money on IT support. Streamlined hardware would, in theory, have fewer problems than a network of heterogeneous machines and operating systems. 6. SOLUTION TO COMPLEX PROBLEMS If the cloud computing system’s back end is a grid computing system, then the client could take advantage of the entire network’s processing power. CLOUD COMPUTING SERVICES 1. AMAZON WEB SERVICES The Amazon development model involves building Zen virtual machine images that are run in the cloud by EC2. That means you build your own Linux/Unix or Windows operating system image and upload it to be run in EC2. AWS has many pre-configured images that you can start with and customize to your needs. There are web service APIs (via WSDL) for the additional support services like S3, SimpleDB, and SQS. Because you are building self-contained OS images, you are responsible for your own development and deployment tools. AWS is the most mature of the CC options. Applications that require the processing of huge amounts of data can make effective you of the AWS on-demand EC2 instances which are managed by Hadoop. 2. GOOGLE AppEngine GAE allows you to run Python/Django web applications in the cloud.Google provides a set of development tools for this purpose. i.e. You can develop your application within the GAE run-time environment on our local system and deploy it after it’s been debugged and working the way you want it. Google provides entity-based SQL-like (GQL) back-end data storage on their scalable infrastructure (BigTable) that will support very large data sets. Integration with Google Accounts allows for simplified user authentication. 3. MICROSOFT WINDOWS AZURE Azure is essentially a Windows OS running in the cloud.You are effectively uploading and running your ASP.NET (IIS7) or .NET (3.5) application. Microsoft provides tight integration of Azure development directly into Visual Studio 2008. For enterprise Microsoft developers the .NET Services and SQL Data Services (SDS) will make Azure a very attractive option. The Live Framework provides a resource model that includes access to the Microsoft Live Mesh services. CHARACTERSTICS 1.COST Pricing is based on usage-based options and minimal or no IT skills are required for implementation. 2.DEVICE AND LOCATION INDEPENDENCE It enable users to access systems using a web browser regardless of their location or what device they are using, e.g. PC, mobile 3.MULTI-TENANCY This enables sharing of resources and costs among a large pool of users. 4.RELIABILITY This is suitable for business continuity and disaster recovery. 5.SCALABILITY Dynamic (â€Å"on-demand†) provisioning of resources without users having to engineer for peak loads 6.SECURITY It improves due to centralization of data,increased security-focused resources. 7.SUSTANIBILITY This comes through improved resource utilisation, more efficient systems. ADVANTAGES OF CLOUD COMPUTING 1. Ability to scale to meet changing user demands quickly 2. Pay by use. 3. Task oriented 4. Virtually no maintainence due to dynamic infrastructure software. 5. Application and operating system independent. 6. Easy to develop your own web-based applications that run in the cloud. 7. Location of infrastructure in areas with lower costs of real estate and electricity. 8. Sharing of peak-load capacity among a large pool of users ,improving overall utilization. 9. Separation of application code from physical resources. 10. Not having to purchase assets for one time or infrequent computing tasks. 11. Ability to use external assets to handle peak loads. DRAWBACKS OF CLOUD COMPUTING 1. Often limited or no technical support available. 2. Canned solutions such may not be full-featured or too task oriented. 3. When there are technical issues,you may lose access to your data or application. 4. No control. 5. You must have an internet connection. 6. If the company hosting the application goes out of business,you may lose access to your data or application permanently. REFERENCES 1. http://en.wikipedia.org/wiki/Cloud_computing 2. http://communication.howstuffworks.com/cloud-computing1.htm 3. http://communication.howstuffworks.com/cloud-computing2.htm 4. http://en.wikipedia.org/wiki/Cloud_computing_user 5. http://communication.howstuffworks.com/cloud-computing.htm 6. http://communication.howstuffworks.com/cloud-computing.htm/printable 7. http://cloudcadet.com/what-is-cloud-computing/ 8. http://askville.amazon.com/advantages-disadvantages-Web-based-Cloud-Computing- Wave/AnswerViewer.do?requestId=16202235

Friday, September 27, 2019

Kanzas City Essay Example | Topics and Well Written Essays - 250 words

Kanzas City - Essay Example t the OPC overstates compensation expenses by expensing bonuses in the year in which they are paid and states that bonuses are part of compensation package and should be divided equally throughout the player’s contract period for accounting purposes. However, the OPC is right in using the above manner because the deferred compensation should only be expensed when players earn it, that is, it is an expected expense for the OPC (Palepu, Healy, & Bernard, 2007). The OPC is right to because bonus depreciation is a legal process available to all businesses and it allows firms to deduct an extra depreciation expense for the qualifying item, which is taken right away in the year that the item in question is put in use (IRS, 2013). It is a method of accelerated depreciation used on new items only. Nonetheless, the process creates a loophole in valuation by helping businesses to make tax losses thus raises concern for the PBPA. The above expense is associated with the salaries paid to players who no longer provide services to the team but whose contracts with the team have not expired. The OPC is right to expense the whole amount in one year because the affected players do not contribute to the team’s current revenues. Corporate financial reporting uses accrual as opposed to cash accounting where expected cash outflows from economic transactions are recognized as expenses when computing the net income (Palepu & Healy, 2012). Accrual accounting fills the gap left by cash accounting when closing accounting books since the latter does not report full economic repercussions of transactions undertaken in a certain period and gives incomplete information about a firm’s periodic performance. Since the stadium’s owners are also shareholders in Zephyrs, then it is possible that the rent could be overcharged given that managers can use disclosure policies that make it difficult for external users to discover the firm’s true economic picture and such overlapping revenues

Thursday, September 26, 2019

The influence of sensory marketing on customer's behaviour Essay

The influence of sensory marketing on customer's behaviour - Essay Example Inside the shops, promotional videos and videos related to the products and environment of the firm is a concrete example in the recent evolution of visual marketing. The videos can explain how the products work and their utilities. The use of music in stores is not recent. The sound enforces the identity of a brand and aimed to be in harmony with the customers. A recent study ( Les ractions des acheteurs aux modalits de la musique d'ambiance : cas de la notorit et du style - Revue franaise du marketing, septembre 2003 ) shows that classical music has more effects than variety music and a well known song has more impact on amount of money spent and unscheduled purchase than an unknown song. It is a new step in sensory marketing which defines that a human can distinguish 4 000 different perfumes according to an article published in Marketing Magazine. It is the sense that drives the most emotional value. A young child is capable of perceiving smells before perceiving sounds, colors and textures. Several experiences have proved the decisive influence of smells on the customer's behavior. Some studies have proved that a good smell could have biased time perception of consumers and could have modified the visual or gustative perception. It directly relates to the intrinsic attributes of the products : organoleptic properties for the foodstuffs. The taste is an effective tool for differentiation. The laboratories of the companies devote important means to better including/understanding the mechanism of the taste. The stake of this research is that of information as regards quality required to the consumer. A French meat brand like Charal has imposed its meats thanks to a founded marketing step on the fact to be tender and the taste. The company thus created for itself an image of quality such as criteria of traceability and standards. Tactile marketing: The touch creates familiarity with the store or the product. A company can use for example a soft red carpet which takes part in the well-being of consumers. A comfortable ground encourages more with the dawdling. In the restaurant, the weight of the handled forks and spoons, the thickness of touched glasses, the texture of the towels, the comfort of a chair can take part largely in the pleasures of the meal. The car manufacturers make important research on the touch of the gear shift wheel and lever so that those get feelings of well being and solidity. It can be trying for a distributor to use the techniques of sensory marketing with an aim of handling the consumer. Thus the presentation of the bread in an environment of traditional bakery inside a great surface whereas this one is manufactured in an industrial way, or the diffusion of a leather odor to promote settees in leather imitation

Examine the main determinants of Foreign Direct Investment location Essay

Examine the main determinants of Foreign Direct Investment location and strategies employed by Transnational Corporations to maximise the net advantages of the - Essay Example Globalisation is also considered as a primary contributor to the methods used to develop foreign direct investments. In addition, the continuous change in technology also pushed for firms penetrating other markets. For most trans-national corporations (TNCs), the schemes associated with maximising foreign direct investment (FDI) are intricate. These processes are developed through time considering the environmental changes and other circumstantial elements. Logically, the methods in which FDI is maximised by TNCs can be attributed to their nature and existence. Holistically, focusing on TNCs in discussing FDI requires the profound understanding of the two concepts. It is imperative to establish relationships and determine useful trends regarding the subjects. In this process, the extraction of empirical evidence is a necessity and has to be manifested with high level of credibility. Moreover, in-depth analysis will be provided to ensure that the desired outcomes will be realised. The most qualifying description of a firm to consider as a trans-national is its operations. Accordingly, corporations that function in two or more countries are defined as TNCs. Moreover, the general view of TNC is divided into three subgroups. First, horizontally integrated TNCs administer production in different locations to manufacture similar products. Second, vertically integrated TNCs use other countries as inputs for their production. Finally, diversified TNCs operate in different firms that manage production in a manner neither explained by the previous two sub-groups. McLean and McMillan (2003) stated that TNCs became popular in the 1890s. Usually, TNCs are based in highly industrialised countries and expand in different economies. It is being contended that TNCs are influential in the policy making of host countries. This is because TNCs have the capacity to boost an economy and move capital from locations to the other. In addition, some firms control

Wednesday, September 25, 2019

Why was Ulysses S. Grant so successful in finally ending the Civil War Research Paper

Why was Ulysses S. Grant so successful in finally ending the Civil War - Research Paper Example Some of them argued that the major issues of the conflict are related with the rights of the States, and others underlined the fact that quandary of slavery had paved the way of American Civil War. However, by the end of 1860s, one can find Ulysess S Grant making a personal mark in the history of American civil war, blowing a series of battles, conquering a Confederate army and earning the status of an antagonistic military general. Grant’s stubbornness and self reliance contributed stability in success and that helped him to mark his name in the history of American Civil War and the ultimate success is coined with Grant’s army. Grant’s idea of total war helped him to maintain consistency in the battlefield. It is a part of common knowledge is that a war place is filled with turmoil and sufferings. The haunting sounds of guns and the frustrated whispering of officials characterize the battlefield. A military general has the duty to stand lonely in the middle of t hese commotions with fear, anxiety, suspicion, and official responsibility. As an experienced military general who witnessed in the American Civil War at close quarters Ulysses S. Grant was better equipped to triumph over the barriers of the battlefield through his war policies and brilliant administrative tactics. Grant succeeded to gain the support from the President Lincoln, leaders of Republican Party, the Media and a significant number of common people in the United States. Grant’s efforts to use the federal army or legislation to preserve the rights of blacks paved the way for White’s aggression and opposition. However, political and material backgrounds during the time of 1860s paved the way for the success of Grant’s army. Thus, one can note that Grant’s domestic political transactions, foreign and domestic policies, professional tactics and his innate abilities were instrumental in his success in American Civil War. American civil war which is

Tuesday, September 24, 2019

Counseling (Exisential Therapy) Essay Example | Topics and Well Written Essays - 750 words

Counseling (Exisential Therapy) - Essay Example In the spiritual approach, a transcendent answer to the four themes is believed to exist. In the atheistic approach, it is believed that there is no answer to the four major questions. One thing that is for certain for a human being is death. There is no denying it. But one cannot move forward in life if the person if afraid of death. The awareness of a person's life being limited by death can cause anxiety. But ignoring the presence of death in a person's lives will not help either. One will have to use the knowledge of the limitation of life to the best advantage for succeeding in life. Dr. Hoffman states that a person who finds the balance between the awareness of death and finding strength not to get overcome by it will have better chance of leading a fulfilling life (Existential Therapy, http://www.existential-therapy.com/General_Overview.htm). Freedom and Responsibility always come together. When people try to enjoy their freedom while ignoring their responsibilities, chances are that psychological consequences like depression, anger and anxiety starts to occur. Every person is free to choose their path in life, but at the same time he or she should take full responsibility of the outcome. One should never blame another human being for anything that happens in life. This also means that one should never let any belief or organization take charge of their lives. Also one should have the awareness that he or she is not powerless in any situation, either natural calamities, or diseases, or oppression, that he or she is responsible for themselves and the predicament there are currently in. Isolation Throughout one's life, a person is involved in different relations with all the people around him. In doing that the person might try to have a hold in the other person's life. But one needs to realize that human beings are essentially alone in this world. One needs to find validation from within, not from others. This awareness will make one live life more to the fullest than live thoughtlessly (Existential Therapy, http://en.wikipedia.org/wiki/Existential_therapy). Meaninglessness The human life can be described as a journey to find the meaning of life or a journey to create a meaning for life. When one thinks about the human life in terms of the isolation it faces, it might appear meaningless to stay alive. It is now that the urgency of creating one's own values and find or create own meanings for life becomes apparent. This will give the person a feeling of significance and will make the person strong enough to uphold the newly found meaning through life. The Therapy Existential Therapy when applied to real life situation can be viewed from four different angle, they are; the view of man, the goals of therapy, the role of the therapist and the role of the client. The view of man Man being a social animal longs to connect with others and might try to find

Monday, September 23, 2019

Technology at work Essay Example | Topics and Well Written Essays - 500 words

Technology at work - Essay Example 8). One of the major challenges before a second language teacher is to motivate the students and make the learning process interesting and appealing to the learners; teachers who are competent and creative enough to design instructional packages with the aid of technological devices are better equipped to take up this challenge. Laborda & Royo reviewing Dudeney & Hockly’s book How to teach English with Technology show the immense â€Å"possibilities of teachers who work with a variety of types of software and hardware (or even who actually do not approach language teaching with technology) to integrate the contents into their daily teaching plans† (Laborda & Royo 2007). Similarly, Sotillo stresses on the effectiveness of computer-mediated discussions and instructional activities in transacting English to second language learners (Sotillo). However, it is significant that the selected learning activities are in tune with the proficiency level of students. Smith, D. G & Baber, E. (2005). Teaching English with information technology: how to use the internet and IT when teaching - for the professional English language teacher. Illustrated Edition: Modern English Publishing. Laborda, J. G., & Royo, T. M. (2007). Book review: How to teach English with Technology (Gavin Dudeney & Nicky Hockly). Educational Technology & Society, 10 (3), 320-324. Retrieved 21 Nov. 09 from: http://www.ifets.info/journals/10_3/22.pdf Sotillo, Susana M. (1997, Dec). English-as-a-Second-Language Learning and Collaboration in Cyberspace. Retrieved 22 Nov. 09 from The Technology Source Archives website:

Sunday, September 22, 2019

Oedipus Trilogy Essay Example for Free

Oedipus Trilogy Essay It was Sophocles who wrote the Oedipus Trilogy. Although Oedipus Rex has always been a common oral story to the Greeks, Sophocles added different dimensions in his rendition of the tragic story of Oedipus. Antigone was the epilogue of the trilogy and the last part of the story but it was the first play to be produced. Oedipus the King was the beginning of the trilogy, where the fate of Oedipus was prophesied, and the rise and fall of Oedipus was chronicled. And Oedipus at Colonus is the middle of the trilogy where Oedipus dies and his sons murder each other thus continuing the eventuality of the prophecy. In Antigone, the final pieces of the tragedy unraveled, thus completing the prophecy of the oracle to Oedipus. In Antigone, the play focuses more on the battle between opposing primary views and concerns. Actually, it was more on opposing pride. Antigone was determined to give his brother an honorable burial despite the fact that the current king blatantly forbids it. She maintains that love is above law and hegemony. Creon, on the other hand, although Polynices is his nephew, forbids the burial on the grounds that it is the law to refuse honorable funerals to traitors. Although the central characters have opposing views, their attributes are very much similar to each other. Both are blinded by their own pride in their decisions. Antigone, when confronted by Creon, refuses to back down despite the fact that Creon threatened her that her sister will be penalized together with her. Antigone, sees her action as a form of â€Å"martydom†. In a way she sees glory in what she had done by â€Å"sacrificing† herself for the sake of his brother, which somewhat preposterous because of the fact that his brother is already dead. Creon, likewise, refuses to change his decision despite his son’s threat of suicide if he condemns Antigone. Although he perceives that his son’s words were not empty threats, he still refused to change his decision. This is because he distinguishes his action as strength of leadership. He mistakes pride for decisive command. Antigone represents moral ascendancy over political law. Creon, on the other hand, symbolizes the primacy of the rule of law above all else. The play attempts to stir the audience to struggle on which side should prevail. Athens, during the time of Sophocles was in its golden age. Democracy has been the highest point of the era. However, there are certain rules of law that exist to govern the democratic state. The play seeks to arouse questions from among the audience. Whether certain personal morals and filial duty should take over the rule of law when the situation calls for it. Or whether the rule of law should always prevail to maintain order in the society. However, Sophocles drives home the point that there are no extreme grounds. Moral ascendancy and the rule of law are invariably intertwined and should be taken into consideration in making a decision. In the play it was the comical messenger that best manifested the careful weighing of consequences of his actions when he pondered to and fro on what to tell Creon. It was him that provided a middle ground. His action was the very reflection of the thoughts of the audience. Towards the end of the play, both Creon and Antigone became so blind of their pride in their decision that they were no longer fighting for what they believe is right. Antigone sees her suicide as a form of sacrilegious immolation as if she was giving herself up for the good of her brother. Likewise, Creon perceives his decision to condemn Antigone as strength of leadership. He thinks that if he pardons Antigone, then he had let Antigone â€Å"win†, that Antigone will emerge to be â€Å"the man† in the battle. Creon’s and Antigone’s greatest folly is their tendency to oversimplify the situation. Antigone reduced the circumstance to moral ascendancy and Creon to the rule of law. Their pride made them blind that their decision will lead to conflict and deliberation. Like all characters of the play, Oedipus’ tragic flaw is his pride. In Oedipus the King, the rise and fall of Oedipus was accounted to his pride. His killing of his father was brought about by his pride, his desire to seek the truth of his identity was driven by pride, his edict of severe punishment to the murderer of Laius was brought about by pride and even is in his lowest moment when he eventually discovered the truth he still clung to the last pieces of his trappings as king. However, there is a great difference in Oedipus’ pride and that of Creon’s and Antigone’s. Antigone claims that it was for her love of her brother that she disobeyed Creon but in reality she puts herself in a pedestal with greater morals than Creon could understand. She masked her pride with proclamations of sacrifice and martyrdom for filial love. Creon, on the other hand, asserts that his actions are but mere implementation of law. However, in truth, Creon revels at the power that he holds upon the kingdom. This is evident even in the play Oedipus the King when Creon demonstrated his newfound power by curtly cutting off Oedipus while he was still mourning his fate. Oedipus pride, however, was disguised as his earnestness. This was exposed when he declared that he would seek all means to end the plague in his nation. He was so earnest in his demonstrations to the people of his intentions to save his kingdom that he himself cemented his doom. Furthermore, in seeking the murderer of Laius, in his earnestness to punish the criminal, he unknowingly condemned himself. More over, when the truth of his identity was slowly untangling, he was so earnest in wanting to discover the whole truth that he made a way for his ruination. In truth, Oedipus was earnest because he wanted to set himself apart from the rest. He wanted to be a great leader in his nation. His exaggerated demonstrations of his intentions to save his nation were masked pride. He clearly wanted to be the â€Å"savior† of his kingdom. He celebrates at the power that he holds upon the people. This is obvious that he dares insult the oracle when he came to his presence. Moreover, being royals, Jocasta and Oedipus had the tendency to invalidate the fate the gods have in store for them. They have countless times declared that the oracle is false. This is clearly a sign of their pride that they could not fathom that there are any other being that is above them. At the end of the play, Oedipus took responsibility of his actions. But even in his broken state he was still proud. It was him who commanded Creon to bury Jocasta as he sees fit and to banish him from his nation. Although he no longer has any real power, he still managed to hold on to his last bits of power as a former king. Oedipus the King ended with Oedipus as a broken man banished from his kingdom and disgraced from the society. In Oedipus at Colonus, we find just that, a broken man. However, his brokenness should not be interpreted as newfound humility. Contrariwise, his decent into brokenness left him embittered. In the play, he again questions his fate. He even questions his sons’ decision in remaining adamant in his exile. The initial scene of the play rightly sets the tone for the story. Antigone was describing their trespass on holy ground that must be corrected with prayers and libation. It is ironing that Oedipus and Antigone, with full knowledge of the wrongness of their action still proceed to commit the deed then proceed to rectify the iniquitous. This is the theme all throughout the play, the characters all seemingly commit an action that they are fully aware that is not correct but still proceed to do so nonetheless. Again all of which is because of pride. When Creon abducts Oedipus’ daughters, Theseus proceeds to rescue them. He pretends that he did so because of honor and duty. However, in reality, Theseus’ primary objective is to save his own kingdom. In this play, most of the characters have hidden agenda. In the first two plays that Sophocles wrote, the characters were forthright with their motives. Antigone and Creon were so brash and obvious in their thoughts and beliefs in Antigone. In Oedipus the King, Oedipus lack of blunt motives led to his destruction. But in the third installment, the characters were more masked in their intentions. Even Oedipus, when he refused to go back to his city, he maintained that it was on the basis of his newfound holiness but in truth it was his pride that kept him from coming back. Why would come back to a city that shunned him? Or to the people that eschewed themselves from him? Moreover, in a confrontation with Polynices, he begins to questions his sons actions on why they were apathetic of his exile. He failed to realize that it was him who commanded Creon to exile him in the first place. Just as he was physically blind, he was also blind from the truth. Even in his deprivation he still was not able to fully see the extent of his mistakes and his pride. In the end, Oedipus’ death was inconsequential. For a character such as him, it is but ironic that his death was portrayed as merely peripheral with only Theseus as witness. Even the lamentations of Ismene and Antigone were not impassionate enough. Sophocles merely pointed out that no matter how great Oedipus was in his former glory, like everyone else, his end is just merely death – a fate that no great man can escape from.

Saturday, September 21, 2019

Advantages And Disadvantages Of Using A Pointer Computer Science Essay

Advantages And Disadvantages Of Using A Pointer Computer Science Essay Write advantages and disadvantages of using pointer. How the concept of pointers is useful in the implementation of data structures? A pointer allows a function or a program to access a variable outside the preview function or a program ,using pointer program can access any memory location in the computers memory. 2)since using return statement a function can only pass back a single value to the calling function, pointers allows a function to pass back more than one value by writing them into memory locations that are accessible to calling function. 3)Use of pointer increases makes the program execution faster 4)using pointers, arrays and structures can be handled in more efficient way. 5) without pointers it will be impossible to create complex data structures such as linked list , trees, and graphs. Disadvantages of pointers:- 1)we can access the restricted memory area. 2) Pointers require one additional dereference, meaning that the final code must read the variables pointer from memory, then read the variable from the pointed-to memory. This is slower than reading the value directly from memory. 3). If sufficient memory is not available during runtime for the storage of pointers, the program may crash When setting up  data ststructures  like  lists,  queues  and trees, it is necessary to have pointers to help manage how the structure is implemented and controlled.Pointers and Structures can be used to build data structures that expand and shrink during execution examples stack queues,trees etc.While pointer has been used to store the address of a variable,it more properly applies to data structures whose interface explicitly allows the pointer to be manipulated as a memory address.Because pointers allow largely unprotected access to memory addresses. 2). Elaborate the concept of Fixed block storage allocation and Buddy system in dynamic memory management. Sol. Fixed block storage allocation:- This is the simplest storage maintenance method. Here each block is of the same size. The size is determined by the system manager. Here the memory manager maintain a pointer AVAIL which points a list of non contiguous memory blocks. A user program communicate with the memory manager by means of two function GETNODE(NODE) and RETURNNODE(PTR).The procedure GETNODE is to get a memory block to store data of type NODE. This procedure when invoked by a program returns a pointer to first block in the pool of restorage. The AVAIL then points to the next block.If avail=NULL it indicates no more memory is available for allocation. Similarly whenever a memory block is no more required it can be returned to the memory bank through a procedure RETURN NODE(). Buddy system:- It is the another storage management system which restricts the size of blocks to some fixed set of sizes. These blocks of restricted sizes are maintained in a linked list. Whenever a request for a block of size N comes, the number M the smallest of the fixed sizes but equal to or largest than N, is determined and a block of size M is allocated if available on the list. If not available then a larger block if available is split into two sub-blocks known a s buddies. Each of them are also of fixed sizes and the process is repeated until a block of size M is produced. for example , if k=1 and Fo=8, then the block sizes are 8,16,32,64,128,à ¢Ã¢â€š ¬Ã‚ ¦. THAT is ,the block sizes are successive powers of 2; and the buddy system based on such fixed sizes is called binary buddy system. 3.)Differentiate between static memory allocation and dynamic memory allocation. Illustrate various memory management functions Sol. In case of static storage management scheme , the net amount of memory required for various data for a program is allocated before the starting of the execution of a program once memory is allocated, it neither can be extended nor can be returned to the memory bank for the use of other programs at the same time. On the other hand dynamic storage management schemes allows user to allocate and deallocate as per necessity during the execution of programs. The static storage allocation is easy to implement and efficient from execution point of view .Here all variables those are required for a program is allocated during compile time this is why static storage allocation is a compile time phenomena. In this each subprogram/subroutine of a program is compiled separately and the space required for them is reserved till the execution of the program. On the other hand dynamic memory allocation , space for memory variables is allocated dynamically that is as per the current demand during the execution. When a subprogram is invoked space for it is allocated and space is returned when the subprogram completes its execution. Thus , the space required to run a program is not fixed as in static allocation, rather it varies as program execute. Various memory management functions:- 1)malloc():-The malloc function dynamically allocates memory from heap.The prototype for malloc() function is Void *malloc(size_t size); 2)calloc():- The calloc() function dynamically allocates memory automatically initializes the memory to zeroes. The prototype for calloc() function is Void *calloc(size_t nitems , size_t size); It takes two arguments . The first argument is the number of elements and the second argument is the size of each element. 3) realloc():- The realloc() function changes the size of previously dynamically allocated memory with malloc(), calloc(), realloc() functions.The prototype for realloc() function is Void *realloc(void *block, size_t size); It takes two argument . the first argument is the pointer to the original object and the second argument is the new size of the object. 4.)Write different ways to manage records in memory Sol.) Since records may contain non homogeneous data, the elements of a record cannot be stored in an array . Some programming languages such as PASCAL and COBOL do have record structures built into the language. Suppose a programming language does not have available the hierarchical structures that are available in PASCAL and COBOL . Assuming the record contains non homogeneous data , the record may have to be stored in individual variables , one for each of its elementary data items. On the other hand one wants to store an entire file of records, such a file may be stored in memory as a collection of arrays that is, where elements in different arrays with the same subscript belonging to the same record. Part-B 1.)Illustrate the use of array of pointers and pointers to an array Sol.) An array of pointers is that for eg if we have array of 10 int pointers ie int *a[10] then each element that which is stored in array are pointed by pointers. here we will have ten pointers. In pointer to an array for eg int(*a)[10] here all the elements that is all the ten elements are pointed by a single pointer. int *a[10]:-array of pointers. consider one array int b[10]={1,2,3,4,5,6,7,8,9,0};so elements will be stored in addresses .now this address are stored in array of pointers.thats int *a[10]={b+0,b+1,b+2,b+3,b+4,b+5,b+6,b+7,b+8,b+9};means a+0=address of value 1 is the first element of int *a[](first element of int b[10])and so on. while int(*a)[10]:-here a is an pointer to an array containing 10 integers. suppose int b[10]; then a=b[10]; this will give element of int b[10] array thats b[0];and so on but in case of two dimensional array first we have to allocate base address of respective one dimensional array and base address of element of one dimensional array then only we can use pointer to an array. Give example to show the use of far pointer and dangling pointer problems Sol.) A far pointer uses both the segment and the offset address to point to a location in memory   The far pointer can point to any location in memory. . Far pointers have a size of 4 bytes . They store both the segment and the offset of the address the pointer is referencing. A far pointer has an address range of 0 1M bytes. A far pointer can be incremented and or decremented Only the offset of the pointer is actually incremented or decremented. The segment is never incremented by the arithmetic operators.On the other hand Dangling pointers are the pointers that do not point tao a valid object of the appropriate type. These pointers arise when an object is deleted or deallocated,without modifting the value of the pointer so that pointer stll points to the memory location of deallocated memory .As the system may reallocate the previously freed memory to another process ,if the original program then derefrences the dangling pointer,results in bugs or errors as the memory may contain com pletely different data.   Consider the following example { char *cp = NULL; { char c; cp = &c; }    /* cp is now a dangling pointer */ } Solution to dangling pointer: char *cp = malloc ( A_CONST ); free ( cp ); /* cp now becomes a dangling pointer */ cp = NULL; /* cp is no longer dangling */ Differentiate between linked list and arrays in terms of representations, traversal and searching. Sol.) 1)In case of array traversing is used visiting all elements in an array while to traverse a single linked list we mean to visit every node in the list starting from first node to last node. 2).Searching operation in an array is applied to search an element interest in an array.It is a process of finding the location of given element in an array.The search is said to be successful if the given element is found.there are two types of search operation : Linear search Binary search If the array elements are in random order then one have to use linear search technique and if the array elements are sorted then it is preferable to choose binary search technique.While in case of linked list only linear searching is possible.This is one of the limitation of linked lists as there is no way to find the location of the middle element of the list. can we perform binary search in linked list ,if no then illustrate the reason. Sol.) No, we cannot perform binary search in linked list because there is no way Of indexing the middle element in the list. With a sorted linear array we can apply a binary search whose running time is proportional to log2n. On the other hand a binary search algorithm cannot be applied to a sorted linked list, since there is no way of indexing the middle element in the list. This property is one of the main drawbacks in using a linked list as a data structure.