Wednesday, November 27, 2019

Assassination Of JFK Essays (3220 words) - Watergate Seven

Assassination of JFK annon On Friday, November 22nd 1963 at 12:30 P.M. the 35th president of the United States of America, John Fitzgerald Kennedy assassinated while he rode in an open limousine though the streets of Dallas. This event, which abruptly and severely altered the course of history, it has created more controversy than any other single event. Some haunting questions still remain. Who did it? Why did they do it? How was it done? Was there a cover up The official answers complied by the Warren Commission have never satisfied the majority of the world's population. In this following essay I will try to show who was responsible for the assassination of John F. Kennedy. I believe the only way to prove that there was a cover up, is to firstly prove that Lee Harvey Oswald is not the killer. The Warren Commission consisting of various outstanding citizens was created to ascertain, evaluate and report upon the facts relating to the assassination ... and the subsequent violent death of the man charged with the assassination Lee Harvey Oswald. The purpose of the Commission was to examine the evidence developed by the Federal Bureau of Investigation and any additional evidence that may hereafter come to light ... to make such further investigation, as the Commission finds desirable. In less than one week they found that a 'lone nut' killed JKF. At no time did the Warren Commission seem to consider the basic legal rights of Oswald - innocence until proven guilty, the right to legal representation, or the right to cross-examine witnesses and evidence against him. There is no way that Lee Harvey Oswald was the lone assassin. Firstly the paraffin test of Oswald's hands and his right cheek conducted on November 23, 1963, has been positive for his hands but negative for his cheek. Generally, this is evidence in Oswald's favor, but the Commission asserted that the test is completely unreliable in determining either whether a person has recently fired a weapon or whether he has not. Nobody saw Oswald on the 6th floor window after 11:55 on November 22nd. 90 seconds after the assassination, Roy Truly and Police officer M. L. Baker saw Oswald on the second floor. Oswald had to take the stairs down. But he had just 90 seconds to hide the rifle in the opposite corner of the sixth floor, run downstairs 4 floors passing Victoria Adams who never saw him and reach the second floor where he was encountered to be calm and collected. The Warren Commission claimed that Oswald fired three shots in 5.6 seconds from the sixth floor of the Texas Schoolbook Depository. The first shot was the 'magic bullet' which made a total of seven wounds on JFK and Connally . Which appeared later in the Parkland Memorial Hospital - you can see - in an almost pristine condition. The second shot missed JFK and hit a bystander in the cheek and the third was the fatal head. The Warren Commission said the third shot hit JFK from behind, however his head was pushed backwards and to the left. This means the bullet must of come from the grassy Knoll. Also many witness thought they heard shots from there. (See graph) Oswald rifle's had poor capability (experts tried to do the same what Oswald was claimed to have done, but only one was able to do that! because he got not familiar with the rifle and the inaccurate attached scope of the rifle. It was near impossible for him to make the shot in 5.6 seconds If I had to pick one man in the whole United States to shoot me, I'd pick Oswald. I saw that man shoot and there's no way he could have ever learned to shoot well enough to do what they accused him of. I'm one of the best shots around, and I couldn't have done it. --Sherman Cooley (US Marine, served with Oswald) If Oswald was not the killer then who would have wanted to see President Kennedy dead? Lyndon Johnson (LBJ) The CIA J. Edgar Hoover The Mafia Anti-Castro Cubans Richard Nixon I am convinced Lyndon Johnson may very well have been involved in the plot to murder President Kennedy. I believe Johnson probably knew about the plot ahead of time and either sanctioned it or actively took part in it. Another possibility, in my view, is that Johnson realized soon after the shooting that Kennedy had been killed by a conspiracy, and that Johnson had an idea as to whom had been behind it. In any case, Johnson was a driving force behind

Sunday, November 24, 2019

Achilles Armour

Achilles Armour Achilles’s armor is considered as one of the best and the most powerful, that is why it is not a surprise that Ajax and Odysseus wanted to have it after Achilles’s death. However, to make sure that the Achilles’s armor is given to the most deserving of them, Ajax and Odysseus were offered to prepare speeches to convince the meeting that particularly he deserves attention and should be give Achilles’s armor.Advertising We will write a custom essay sample on Achilles Armour specifically for you for only $16.05 $11/page Learn More Therefore, each of the parties presented many arguments. Ajax and Odysseus presented their personal consideration about why Achilles’s armor should belong to one of them. Ajax has provided many arguments, however these three are considered as the most powerful and convincing. First, Ajax pointed that he saved the Greek ships from Hectors torches and he was the one who threw a boulder at Hector. Secon d, Ajax saved Odysseus in battle and he considered it as the stress on Odysseus’s helplessness. Finally, Ajaxs shield is full of holes which were made during the previous battling, that is why he needs a new shield, while Odysseus’s one is new. Odysseus’s arguments were much stronger that is why the Achilles’s armor was given to him. Thus, Odysseus claimed that it was he who brought Achilles out of hiding on Scyros to join the Greeks. That is why this action may be considered as his indirect slew of Hector. Next. Odysseus killed Dolon the Trojan spy and got many wounds in the fight that tells about his bravery while Ajax was never wounded. Finally, Ajax does not deserve to have the Achilles’s armor as he was about to leave Troy and Odysseus did all possible to convince Agamemnon not to stop fighting and to return Ajax at the field of battle, otherwise, he could leave and never return. Odysseus’s speech is believed to be more compelling as ha ving presented just several arguments in this paper, his speech was full of objective and argumentative reasons based on the Odysseus’s achievements during the war, while Odysseus’s arguments mostly looked like the desire of a child to convince others to give him the armor just because he is good and long. It was inadmissible to point at the family relationships with Achilles as the reason to give the armor to him. Moreover, all Odysseus’s reasons are based on the battle destinations, the intentions to help and his participation in the events which impacted the war outcomes.Advertising Looking for essay on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More Reading the debate speeches of each men, it is possible to create an opinion about each of them. The speech of Odysseus characterizes him as a powerful man, a wise leader and a person who got used to prove in action that he deserves respect . Listening to all his arguments, it is possible to notice that he fairly accesses his place in the fight. He does not exaggerate his achievements and offers only the facts which are useful in considering the case. Ajax’s speech is absolutely different as being a person who had done absolutely nothing, he tries to exaggerate his achievements by means of the achievements of others. Having nothing to present about the war achievements, Ajax begins to point at the features which have nothing is common with the subject (like the family relationships with Achilles and the absence of the new shield). It characterizes Ajax as a weak, powerless and ambitionless person without any principles and objective and fair thinking.

Thursday, November 21, 2019

Humanness of Caring in Nursing (Concept Analysis Paper) Essay

Humanness of Caring in Nursing (Concept Analysis Paper) - Essay Example Recently the profession of health care has undergone amazing changes and the development of science and technology has given the nurses varied tools in the service of mankind. However, without an attitude of loving and humane care giving, all the efforts of the nurses will only be exercises in futility. The paper sets forth to analyze the historical origins of nursing as a profession of loving and humane caring and the need to revitalize those aspects in a world of reckless competition, consumerism and anonymity of the human person. Historians point out that the early nurses were women and the motivating factor to serve as nurse is deeply entrenched in the maternal instinct of woman. Therefore, from time immemorial the nursing care has been loving care. The maternal instinct provided that strong impulse or motive necessary to care for those who were suffering or helpless. Women, because of their maternal instinct, were considered "born nurses." (Donahue, 1996, p. 5) It was only gradually that nursing started developing as a profession. In the early days, nursing was regarded as a calling for those who had given up the world. The intense religious motive that translates ones love of God towards fellow human beings in loving care is marked by self-sacrifice (Donahue, 1996). This other-centeredness of nursing resulted always in the uncanny knack to perform ones service in an attitude of humane care. Ancient nursing caregivers were somewhat ill equipped to render professional service but their enthusiasm and commitment alleviated the helpless condition of the patient. This attitude of loving care sprang from the realization of the other as God’ child. In the passage of time, this attitude has dimmed and there is apprehension that nurses will not care completely unless and until they care in a spirit of humane and loving care. In the past care,

Wednesday, November 20, 2019

Intensive Design Project of Fast Computer File System Essay

Intensive Design Project of Fast Computer File System - Essay Example The proposed file system has to cater to the needs of both these types that would allow for the storage and retrieval of any type of file. Secondly, the proposed file system will be incorporated with or will function under the simple commands of read (), write (), open (), store () that is similar to the calls under UNIX. The proposed file system will implement the concept of directories with a unique feature. As the total disk size given for the assignment is 120GB, storage and retrieval will take a lot of time is the entire disk space were to be considered as a single entity. Also the amount of information that would have to be maintained by the table in the main memory for the purpose of caching would be enormous and would occupy a lot of space. Therefore, in order to reduce the sizes of the tables and in order to improve the speed of accessing, the entire disk space will be partitioned into a series of virtual drives that will be considered as independent entities on logical terms. Thus, any file system will revolve around these virtual drives. Each virtual drive will have a size of 8GB each. Each of 8GB virtual drives will be made up of blocks of size 8kB each. Thus, in order to access any particular file, the file system can initially switch over to the particular drive by looking up at just 4 bits (24 =16), as the number of such virtual drives is 15. Thus, such an indexing will enable the search for a particular location simple and fast. VIRTUAL DRIVES As has been previously mentioned, the file system will support directories, but the unique features of the directories is that they can span over different virtual drives in case there is not enough space for an existing directory to accommodate more files. There will be two primary types of files that will be maintained by the file system, which will be known as the GB_dir table and the KB_fil table. As the names suggest, the former will be used to index the directories while the latter one will be used for files. The KB_fil table will have the following fields: Blocknum: This will be the number of the block that is already held by some file information. Filname: as the name suggests, this denotes the name of the file that occupies the block. Seq-nr: this field holds significance if the size of the file is more than that of a block (>8KB). Size: This filed is used to specify the actual size of the file. Endaddress: this will be localized to the block and will hold the last address of the memory location within the block, which is actually

Sunday, November 17, 2019

Power is Critical to Understanding the Difficulties Managers Confront Essay

Power is Critical to Understanding the Difficulties Managers Confront when Seeking to Manage Change - Essay Example Authority in a traditional organisation may be alternated for power but when organisational aims are not stipulated unanimously by those who matter in the organisational set up and adhered to by the lower ranks create power situations. Such situations may present dicey legal cover with given means of control as the response of juniors in the hierarchy may not be taken rightly when power is used. It could be planned involvement or distractive involvement. Buckley has provided a provisional definition of power as: â€Å"Control or influence over the actions of others to promote one's goals without their consent, against their will or without their knowledge or understanding (see Grimes 1978, p. 727). An important feature of power is the stress on private aim orientation in stead of together-goal orientation. Power, according to Gamson, is â€Å"potential partisans†, which can be defined as, â€Å"that set of actors who for a given decision are affected by the outcome in a â₠¬Ëœsignificant’ way, (See Grimes 1978, p. 727). The impact of partisans and the counter-impact of authority are normally named as power. Partisans attempt to impress upon the authority their side of the issue and its resolution. The notion of change is basic and concurrent in the thinking of management scholars on organisations. The literature on strategic change stresses on the need to adjust to the changing risks and opportunities of the new business environments. They also point out that such change is not recurrent in the occurred extent or direction required. Organisations need to develop this capacity for change to promote learning. There has been vast study on transformational leadership particularly and leadership generally that shows the seriousness of the topic for management purpose. The issue of change is more relevant also for practitioners, which is evident from the volume of books published on change management. Even then it is argued that both scholars and pra ctitioners do not possess enough knowledge of and theoretical mechanism for change. To an extent, this failure to propound a theory may be because of various established perspectives or mechanisms (Ford and Ford, 1994). Change agents play a critical role in an organisation by helping in transformation process. Change agents need to be on the right path to steer an organisation on the road to positive change. Some of the crucial inputs of change are depicted in the chart below (Evans, 2010). Power is the most critical ingredient of effective change. These leaders of change can be seen throughout the organisational ladder. These leading change leaders can be holding any position or power variable to become an instrument of change (Evans, 2010). Organisational change management problems are often not given due attention or ignored totally. In reality, people issues are responsible majorly for project failures. Causes of Project Failure The survey undertaken by KPMG analysed the causes of failed projects. The finding closely associated project failures with behaviours and expertise of the respondents, mostly related to the capabilities, behaviour and attitudes of participants (EPM Book, 2007). Discussion Mintzberg (1984) discuses the power perspective in relation to organisation life cycle in three strides: first by analysing relationships of power dissemination internally in an organisation, with that covering a classification of six assemblies of

Friday, November 15, 2019

Dangers of the Internet | Essay

Dangers of the Internet | Essay Abstract This essay presents a critical debate on whether the Internet is as dangerous as the physical world. First, the unique dangers posed by the Internet are outlined. This is followed by an examination of some of the major threats to safety that are present in the physical world but not in the virtual world. In the conclusion, the report also looks into how the virtual world might shape in the future. Is the World of Networked Computing as Dangerous as the Physical World? Introduction In cyberspace, no one hears your screams. (Merkow and Breithaupt, 2000) Modern society depends on the technology of networked computing more than ever. Whether it is the Internet, the World Wide Web (WWW), or other less well-known networks, people around the world depend on it for multifarious reasons from work and entertainment to essentials of life such as life support in medicine. Networked computing offers easy access, a large degree of anonymity and while this presents us with unique opportunities, it also presents us with unique dangers. In light of the increasing use and even dependence on networked computing, it is pertinent to examine the social, physical and ethical dangers presented by it. This essay critically debates the issue of whether the world of networked computing is as dangerous as the physical world. The Dangers on the Internet Preying by Paedophiles One of the most disturbing crimes on the Internet today is ‘grooming’. Child grooming is an act where a paedophile will befriend a child, or form an intimate relationship in order to lower a child’s sexual inhibitions. Grooming will initiate from chat rooms designed for children and teenagers and sometimes through emails, where an adult will pose as a teenager, but will often move into using instant messaging services so that the paedophile can talk the victim into sending images and even using a webcam. Research conducted by the Cyberspace Research Unit at the University of Central Lancashire states â€Å"another of the frequent topics concerned on-line grooming and in particular, ways in which to avoid detection† (O’Connell, 2003). While this statement gives concern that paedophiles may be able to escape without notice, the report goes on to say, â€Å"Throughout each of the stages there are clear and easily identifiable differences in the pattern s of behaviour of the individuals.† The stages that are talked about here are known as ‘Friendship forming state’ where the paedophile will just spend time getting to know the child, ‘Relationship forming state’ where the paedophile will start to ask questions about things such as school and home life, ‘Risk assessment stage’ where the paedophile will ask the child questions like who else uses the computer, ‘Exclusivity stage’ where the victim is encouraged to trust the paedophile, and ‘Sexual stage’ where the paedophile will ask the child about previous intimate experiences. Bullying and Other Negative Electronic Relationships The virtual world is home to some serious negative and destructive electronic relationships. Cyber bullying, one of the more common ones, is mainly targeted at school pupils in addition to actual physical and verbal bullying. Carnell (2007) points out to evidence that many pupils are being targeted in their own homes, by phone texts, silent calls, on instant messenger, and by abusive websites and forums, some set up with the specific intention of causing humiliation and embarrassment. This shows the severity of cyber bullying in society today. Griffiths, M.D. (1998) offers the following explanation. The Internet is easy to access from home or work. It is becoming quite affordable and has always offered anonymity. For some people it offers an emotional and mental escape from real life, and this is especially true for individuals who are shy or feel trapped in unhappy relationships. It is also true for individuals who work long hours and have little opportunity for social life. Electronic (or internet) relationships started off when chatrooms were introduced and really boomed since the creation of Instant Messaging. A person can enter a chatroom, use an alias, and can talk to other members without revealing their true identity. However, this raises an important question. If you can do all that without revealing your true identity can you really trust the person you are talking to? Can you be certain that they are being honest with you? Some say that it’s not real and therefore they don’t really worry about it, while others suggest that Internet relationships have a way of tapping into deep feelings and it’s easier to get hurt. Katz and Rice (2002, p286) suggest, â€Å"students are meeting and â€Å"dating† on the internet†¦they even have monogamous relationships this way, telling others who might ask that they will not go out with them because they are â€Å"dating† someone.† Various researches suggest that it is more common for young people to meet and date people using the Internet and it is becoming more widely accepted as a social meeting point. This however causes concerns about why people are choosing to use the Internet for this reason. Many people feel more comfortable talking about feelings over instant messaging, and this is especially true of shy people or people that feel trapped in an offline relationship. Addictions The Internet also has the notoriety of helping to create unhealthy addictions. The majority of UK bookmakers now run online websites in which people can make exactly the same bets they would in the betting shop, but from the comfort of their own home. The rate at which the online gambling industry is commercialised today is astronomical. From 2005 to 2006 the sector has become the fifth largest advertiser online, jumping to 2.5 billion from 911 million ads in the last year (Schepp, 2002). And this is without the likes of TV ads, magazine ads, and adverts on the radio. This means that the majority of people in society now see online gambling as more acceptable than in recent years. Besides the increased risk of fraud on the Internet, the online gambling also poses the serious problem of an easier way to get addicted. This is because it is relatively easier to sit in front of a computer and gamble than to walk to the nearest betting shop in the cold winter to make a bet. Gambling is ho wever, just one of the addictions people are vulnerable to online. Mitchell (2000) uses the term Internet addiction to indicate the spectrum of additions that one is susceptible to on the Internet. He states that although there is some disagreement about whether Internet addiction is a real diagnosis, compulsive Internet use has psychological dangers, and reports such behaviour can result in the users having withdrawal symptoms, depression, social phobia, impulse control disorder, attention deficit disorder, etc. Viruses and Hacking In 2000, the number of worldwide email mailboxes was put at 505 million, and this was expected to increase to 1.2 billion in 2005 (Interactive Data Corporation, 2001). Schofield (2001) points out that more than 100 million people use instant messaging (IM) programs on the net, and a growing number among them also use it to transfer files. This number is obviously growing, but this example shows that online communication is becoming a much widely used method of communication. Online communication such as email and instant messaging does not come without problems. Hindocha (2003) states that instant messengers can transfer viruses and other malicious software as they provide the ability to transfer text as well as files. Viruses and malicious software can be transferred to the recipients computer without the knowledge of the user. This makes them very dangerous. As the use of online communications becomes more widespread, it is seen as an opportunity for people to gain access to the fi les on a computer. Hindocha (2003) gives the example of hackers using instant messaging to gain unauthorised access to computers, bypassing desktop and perimeter firewall implementations. This is a real concern for most users, especially as the instant messaging and email client software are trusted software; for a home user, their personal information stored on the computer, such as internet banking security details, identifying information that could be used in identity theft, etc. are the risks. However, online communication software such as these are also often used in businesses also, and in this case, extensive records of financial information are vulnerable. Hindocha (2003) goes on to say about instant messaging systems, â€Å"finding victims doesn’t require scanning unknown IP addresses, but rather simply selecting from an updated directory of buddy lists.† This throws up serious concerns. Theft and Fraud Electronic commerce faces the major threats of theft and fraud. Online theft commonly occurs in the form of identity theft, and less commonly, outright theft, for example by unauthorised access to bank accounts. Camp (2000) points out that while it may seem a big leap to exchange a bill of paper money for machine readable data streams, the value bound to the paper abstraction of wealth is simply a reflection of trust in the method of abstraction that is widely shared and built over centuries. Money on the Internet is simply a different abstraction of wealth, and has similar issues with trust and risk as traditional money, together with the additional dangers posed by the virtual nature of the environment. Because all communication on the Internet is vulnerable to unauthorised access, this means that it is relatively easy to commit fraud. Where legislation is not a deterrent, technology is almost none. Credit card fraud and theft, electronic banking theft, etc. are some of the more co mmon crimes committed online involving money. What Makes It Safer Than The Physical World? Safe from Immediate Physical Harm Perhaps the only upper hand the virtual world has is that its inhabitants are immune to the immediate threat of physical violence; one cannot be randomly mugged online. However, vulnerable people are still susceptible to physical violence and harm, perhaps more to self-harm; there are many websites that promote anorexia, suicide and self-harm, and this can leave a big impact on impressionable minds. Presence of Strong Safeguards The main safeguards on the Internet are policing with the accompanying legislation, and technology itself. There are organisations in place to deal with the abusive websites and forums, appropriate legislation to prevent child pornography, paedophilia, theft, fraud and a variety of other online crime. There is also a vast array of technology that can help keep adults and children safe online, from parental control software that can restrict the websites viewed by children, to anti-virus and cryptography software and firewalls that help prevent hacking and viruses and keep data safe. Conclusion Staying safe online It is commonly accepted that the Internet provides us with opportunities that have been hitherto unavailable. Many sing the praises of this so-called information superhighway; however, it is prudent not to be lulled into a false sense of security by the promising opportunities. People should be made aware of the dangers lurking in the Internet, and be given the education and means to take steps to stay safe online. Just as children are taught not to speak to strangers in the real world, they should be taught not to speak to strangers online as well. Education in schools should include education about how to stay safe online; just as children are taught that eating fruit and vegetables are healthy, they should also be taught that excessive online activities can lead to addiction, with various negative consequences. This is because the virtual world is not very different from the physical world in terms of people waiting to take advantage of the weak and vulnerable, and also with respe ct to dangers such as addiction. The future of the virtual world In many ways, the virtual world is a reflection of the real world. After all, the people who inhabit the real world are the same people that also inhabit the virtual world. It follows therefore, that what people do and want to do in the real world, they would try to do in the virtual world too. Where the physical constraints of the virtual world restrict them, they would try to find ways to get around it. The rapid development of technology also gives rise to new means by which people can do things, beneficial or harmful. The development of virtual reality may mean that one day, people in the virtual world may not be immune to immediate physical harm either. However, the technology by itself is neither good nor bad; it is the way the technology is put to use that creates positive and negative consequences for human beings. In the end, it can be said that virtual world is perhaps just as dangerous as the physical world. References Camp, L. J.(2000) Trust and Risk in Internet Commerce Publication: Cambridge, Mass MIT Press. Carnell, L. (2007) Pupils Internet Safety Online. Bullying Online [online]. Available at: http://www.bullying.co.ukpupils/internet_safety.php (last accessed Aug 2007) Griffiths, M.D. (2002) The Social Impact of Internet Gambling Social Science Computer Review, Vol. 20, No. 3, 312-320 (2002) SAGE Publications Griffiths, M. (1998) Does Internet and computer â€Å"addiction† exist? Some case study evidence International Conference: 25-27 March 1998, Bristol, UK IRISS 98: Conference Papers (Available online at http://www.intute.ac.uk/socialsciences/archive/iriss/papers/paper47.htm last accessed Aug 2007) Griffiths, M.D. (2000) Cyber Affairs. Psychology Review, 7, p28. Hindocha, N. (2003) Threats to Instant Messaging. Symantec Security Response, p3. Interactive Data Corporation (2001) Email mailboxes to increase to 1.2 billion worldwide by 2005 CNN.com (Available online at http://archives.cnn.com/2001/TECH/internet/09/19/email.usage.idg/ last accessed Aug 2007) Katz, J.E. and Rice, R.E. (2002) Social Consequences of Internet Use. Massachusetts Institute of Technology. p286. Merkow, M. S. and Breithaupt, J. (2000) The Complete Guide to Internet Security New York AMACOM Books Mitchell, P. (2000) Internet addiction: genuine diagnosis or not? The Lancet,Volume 355,Issue 9204,Pages 632-632 O’Connell, R. (n.d.) A Typology of Child Cyber Sexploitation and Online Grooming Practices. Cyberspace Research Unit UCLAN, p7-9. Schepp, D. (2002) Internet Gambling Hots Up BBC Online (Available online at http://news.bbc.co.uk/2/hi/business/1834545.stm last accessed Aug 2007) Smith, J. and Machin, A.M. (2004) Youth Culture and New Technologies. New Media Technologies, QUT.

Tuesday, November 12, 2019

Beer’s Law Lab Essay

Objective: The purpose of this lab is to demonstrate that there is a linear relationship between the number of molecules that can absorb light present in a solution and the amount of light absorbed by a solution. This lab should prove that Beer’s law and the equation A=a x b x c, is a linear relationship. Procedure: The only deviations in the lab procedure was that the stock solution was made before arrival to the lab with 0.570 g of KMnO4 in 0.500 L. The diluted solutions and the Spec 20 were used as directed in the lab manual. The same cuvette was used each time to eliminate error. Cuvettes are all made differently and have a difference in how they measure. If a new cuvette was used each time, the data would be slightly off due to the possibility of each cuvette having different characteristics which affect the measurements in the Spec 20. Data Calculations: To find the molarity of the stock solution: *Note: Molarity is moles/ Liters so in the equation below the first half is finding the number of moles of KMnO4 and the second half is dividing the moles by the liters of the solution. Grams of KMnO4 x (1 mole / molar mass (158.04g)) / Liters of stock solution = molarity of Stock Solution 0.570g KMnO4 x (1 mole / 158.04g) / 0.500 Liters = 0.00721 M To find the molarity of solution #1: *Note: To find the molarity of the first solution, use the molarity found for the stock solution. Since 5.00 mL of the stock solution was used to make solution 1, multiply the molarity of the stock solution by 5.00 mL to get the moles of solution 1. Once the moles of solution 1 have been found, divide that by the liters of water that were added to solution 1. The 0.10000 L comes from the 100 mL volumetric flask the solution was made in. mL of stock solution x (moles of stock solution / liter) / total liters of solution 1 (volumetric flask) = M of solution 1 5.00 mL stock solution x (0.00721 moles / 1000mL ) / 0.10000 L = 0.000361 M To find the molarity of solution 2: *Note: To find the molarity of solution 2, follow the same steps for solution 1 except use 2.00 mL instead of 5.00 mL. The same steps are used due to solution 2 being diluted from the stock solution. mL of stock solution x (moles of stock solution / liter) / total Liters in solution 2(Volumetric flask) = M of solution 2 2.00 mL stock solution x (0.00721 moles / 1000 mL) / 0.10000L = 0.000144 M To find the molarity of solution 3: *Note: To find the molarity of the third solution the same procedure is followed as finding the molarity of the first solution, except you will be using the molarity of the first solution since solution three was made using the first solution. mL of solution 1 x ( moles of solution 1 / 1 L) /total liters in solution 3( volumetric flask) =M of solution 3 50.00mL solution 1 x (0.00721 moles / 1000 mL) / 0.10000 = 0.000181 M To find the molarity of solution 4: *Note: to find the molarity of the fourth solution follow the steps for finding the molarity of the third solution except use the molarity of solution 2 since solution 4 was made with 50.00 ml of solution 2. mL of solution 2 x ( moles of solution 2 / 1 L) /total liters in solution 4 (volumetric flask) = M of solution 4 50.00 mL solution 2 x (0.000144 moles / 1000 mL ) / 0.10000 L = 0.000072 M Table 1. The molar concentration, absorbance values, percent transmittance, average absorbance and transmittance values are shown in the table below. Solution # Molar Concentration Trial Absorbance % T Average Absorbance Average % T 1 0.00003605 M 1 0.821 15.1 0.814 15.3 2 0.811 15.4 3 0.811 15.5 2 0.0001442 M 1 0.324 47.4 0.325 47.3 2 0.326 47.2 3 0.324 47.4 3 0.0001805 M 1 0.388 40.9 0.402 39.6 2 0.406 39.2 3 0.413 38.7 4 0.000072 M 1 0.208 62 0.209 61.8 2 0.208 61.9 3 0.211 61.5 Figure 1. The figure below shows the absorbance vs. the molar concentration of KMnO4. To find the extinction coefficient: The extinction coefficient is found by A/bc = a. A/c is the slope of the line from figure 1. 3139.9/(mol/L) x 1.00 cm =a a= 3139.9 L * mol-1 * cm-1 Discussion and Conclusion: In this lab the equation of Beer’s law was proven to have a linear  relationship. The purpose was to show that molar concentration and absorbance are proportional to each other. This was proved through diluting solutions and using a spec 20 to determine the absorbance values. The solutions were diluted to give different molar concentrations and each concentration was placed in the spec 20. After creating a scatter plot it was obvious to see as the molar concentration increases the absorbance increases. This is because there are more particles present at higher molar concentrations and therefore more light will be absorbed by the particles present. There were many possible sources of error in this experiment. First, if one solution was diluted incorrectly all of the following solutions were diluted incorrectly since they came from the first incorrectly diluted solution. One of the solutions in the experiment could have been diluted wrong, causing all of the solutions to have incorrect dilutions and the calculated values, especially the extinction coefficient, to have incorrect values. Another source of error is that when diluting the solutions not all of the solution transfers were done exactly due to some of the solution being transferred was often left in the pipet. The drops left in the pipet after the transfer could make a difference in the actual molar concentration of each solution. The last source of error occurs from not placing the cuvette in the spec 20 at the same orientation. Although the same cuvette was used each trial, some carelessness may have resulted in the cuvette not being placed in the same orientation each time. Because the sides of the cuvette may be different the readings from the spec 20 may be off. The conclusion of the lab is that Beer’s Law equation is indeed linear, and the absorbance is proportional to the molar concentration. If this lab were preformed again the stock solution should be placed in the spec 20 machine and the absorbance should also be found. The measurements from the stock solution could have provided even more evidence to the conclusion. Overall though the lab was very successful in determining the relationship of the equation in Beer’s Law. Questions: 2. A larger cuvette diameter will produce a higher absorbance value. The diameter of the cuvette is the path length, or b, in the equation A = a x b x c. The larger the path length, the higher the absorbance will be because  you are multiplying a and c by a higher value. Also there is more particles present in a larger path length to absorb light. 3. To find the extinction coefficient the equation A/cb= a is used. A larger cuvette diameter, or path length, would result in a smaller extinction coefficient. The larger the number is on the bottom the smaller the value of the extinction coefficient. 4. Solution 4 probably has the greatest error because it was the last solution to be diluted. Any errors made in diluting a solution will carry through to the last solution diluted because the first solutions are used to dilute the latter solutions. For example if solution 1 is incorrectly diluted then solution 3 will be incorrectly diluted and then solution 4 will be incorrectly diluted.

Sunday, November 10, 2019

Literature Paper Essay

Sophocles two plays, namely the AD 6717-658 Oedipus the King as well as the 658-693 Antigone, are dominated by elements of conflict – both external and internal. The external conflict involves two persons with opposing viewpoints being engaged in a physical or philosophical confrontation. On the other hand, the internal cases of conflict occur when certain individuals in the 2 plays encounter dilemmas regarding doing things that their consciences counsel against. Further, the playwright describes various characters handling the conflicting situations in a variety of ways. For example, some characters just choose to give in, become complicit, and do the things that their consciences advise against. A notable example of this phenomenon in Oedipus the King is Queen Jocasta’s action of bowing to King Laius’ (her husband’s) pressure and thus giving away the young Oedipus to be disposed off. Likewise, in Antigone, Ismene depicts the same behavior of allowing outside pressure to adversely influence her conscience-led aspirations. To this end, Ismene refuses to join efforts with Antigone – her defiant sister – in burying Polyneices – the 2 sisters’ departed brother. Conversely, the 2 plays contain cases whereby physical person-to-person conflicts arise. For instance, in Antigone, Creon – Thebe’s ruler – holds viewpoints that conflict with those of Haemon – Creon’s son. To illustrate, when Creon detains and intends to murder Antigone – Haemon’s fiance – son and father are at loggerheads. The situation deteriorates to the extent of father and son insulting one another. Haemon angrily leaves, promising that he will never come back. Similarly, in Oedipus the King, King Oedipus becomes conflicted with prophet Tiresias because Tiresias is experiencing an internal sort of conflict. The prophet is aware that telling King Oedipus the truth about who killed King Laius would yield no good results. On the other hand, King Oedipus is very intent on ascertaining the true identity of Lauis’ killer, not knowing that Oedipus himself killed Laius. The conflict between the 2 personalities pushes them to exchange harsh words. This conflict is resolved when Tiresias utters the definitive paradox that Laius was indeed killed by his (Laius’) son. All in all, through the two plays – Antigone and Oedipus the King, playwright Sophocles describes both external and external cases of conflict, with the conflicts being resolved to the detriment of a certain individual. To begin with, Queen Jocasta’s conflict regarding either disposing off or saving the life of Oedipus – her son – ends with the infant son being disadvantaged when he is disposed off. The hopeless Oedipus passes from the hands of Jocasta, to a servant, to a lowly shepherd and eventually to a King’s palace. Through such transition, the baby encounters various hardships. Firstly, he risks being killed and then spends some time out in the open fields where he is exposed to the elements. Further, it is notable that the shepherd who eventually passes Oedipus on to King Polybus has no means of keeping and raising the condemned child. Jocasta’s indecisiveness when she faces the internal conflict of either saving or killing Oedipus thus causes the son immense problems. In this case, Sophocles describes a conflict being resolved to the detriment of a particular personality – Oedipus. In a similar version, in Antigone, Sophocles describes Antigone’s conflict as resulting in a string of misfortunes. After Creon the King unjustly orders that Polyneices should be ignored regarding proper burial, with Eteocles being accorded a fitting send-off, Antigone – Polyneices’ sister – becomes mentally conflicted. Antigone immediately detects Creon’s partiality in ordering for this obviously discriminative treatment. She thus cannot demonstrate complicity by adhering to Creon’s unjust edict. The determined girl therefore opts to secretly accord Polyneices a proper burial. By doing this, Antigone risks being put to death as indicated by Creon’s directive. She however gallantly carries on with her plan and even boldly defending her decisions before the King. Related to Antigone’s mental conflict is Ismene’s dilemma whereby she has to choose to either stand by Antigone or obey Creon’s controversial decree. By adhering to the directives that Creon has issued, Ismene will in effect be betraying Polyneices – her brother. Conversely, by deciding to join Antigone in properly burying Polyneices, Ismene will be showing sisterly responsibility to her departed brother as well as to Antigone. In addition, Ismene risks being put to death as per Creon’s orders should she go by Antigone’s bold decision. Eventually, Ismene shies away and avoids going by Antigone’s plans. On her part, Antigone boldly accords Polyneices a proper send-off, thus attracting Creon’s wrath. Ultimately, the 2 sisters find themselves behind bars, with Ismene being a sort of martyr since she did not participate in Antigone’s defiant actions. It is at this point that Antigone faces another conflict when Ismene offers to suffer the consequences of Antigone’s actions. Antigone is aware that it would be unjust to allow Ismene suffer the same fate as Antigone. Although outside pressure eventually forces Creon to let the 2 girls walk free, the conflict that Ismene and Antigone face is resolved with disastrous results. Further, the decision that Antigone makes because of being mentally conflicted serves to make Creon’s son – Haemon – to also become conflicted. To illustrate, after Creon puts Antigone in prison, intending to kill the girl, Haemon intervenes, trying to persuade Creon to let the girl walk away. Haemon does this because he is an intimate friend to Antigone. He thus cannot allow his father to kill Antigone owing to the love that Haemon has for Antigone. It is worth noting that Haemon is in a tight spot when he approaches Creon, persuading the King to let Antigone go away. This is because Haemon risks being branded a traitor or someone who demonstrates insubordination towards the King. On the other hand, should Haemon decide to keep quiet, allowing the King to do as he wills with Antigone, Haemon will demonstrate lack of commitment towards Antigone. Son and father thus confront each other because they hold varying viewpoints about the incarceration of Antigone. Again, Sophocles describes a person-to-person conflict being resolved in a negative way. After Haemon and Creon hurl insults at each other, Haemon walks away, promising that he will never come back. True to his words, Haemon commits suicide. Likewise, through the Oedipus the King play, Sophocles describes the shepherd who witnessed King Laius’ murder as well as Oedipus as being conflicted both externally and internally. For instance, King Oedipus desires to know every detail of his (Oedipus’) childhood. On the other hand, the shepherd is aware that should he become aware of his past, Oedipus will only experience pain. The shepherd thus only gives certain details of Oedipus childhood after which he begs to be allowed to stop the narration. By doing this, the shepherd seeks to shield Oedipus from the pain that will inevitably result when the King learns of his (the King’s) past. Such good intentions are however misunderstood by Oedipus as the shepherd’s demonstration of insubordination. Consequently, Oedipus threatens the shepherd with death should he hold back any information from the King. The shepherd is thus deeply conflicted. He is very sure that when Oedipus learns the truth about Oedipus’ lineage, the King will surely be gravely hurt. Out of fear for his life, the shepherd finally explains all the details about Oedipus life. Consequently, the King becomes distraught. Further, the Queen commits suicide, after which Oedipus gorges out both his eyes and goes into self-imposed exile. Once more, Sophocles describes the conflict between the shepherd and King Oedipus as being resolved in a bad manner as it results in the deaths of Queen Jocasta and the self-imposed exile of King Oedipus. In conclusion, though his 2 plays – Oedipus the King and Antigone – playwright Sophocles describes numerous instances whereby various characters are conflicted either externally or internally. One notable case of mental conflict in Antigone is the instance when Antigone has to choose to either remain loyal to Polyneices – her brother – or obey Creon’s dictatorial decree. Conversely, the instance when Creon and Haemon exchange bitter words denotes external conflict. On the other hand, in Oedipus the King, Jocasta’s indecision regarding whether to dispose off or save Oedipus represents internal conflict. The shepherd and Oedipus’ confrontation demonstrates external conflict. Further, all the conflicts that are presented in both Oedipus the King as well as in Antigone are resolved in ways that harm certain characters.

Friday, November 8, 2019

Eve of american revolution essays

Eve of american revolution essays Prior to the beginning of the Revolution the Americans started to develop a sense of their own individualism and unity. They went through a huge extent by overpowering Britain during this period. We see how the Americans developed themselves by events such as Edmund Durkes notes for speech in parliament, Richard Henrys letter to Arthur Lee, Mather Byles note and Hector St. John Crevecoeur letter. The Americans were going from a stage of Empire to Independence. On February 3rd 1766, Edmund Burke had stated in Notes for Speech in Parliament that America should be more governed towards the way Britain is governed. During this time the Americans were underpowered to Britain. This lead to an identity problem that the Americans were facing. It played an enormous role in the colonists battle for independence, and paved the road to revolution. However through a grate amount of hardships the American colonist were able to move across the ocean into the woods and deserts of America the images of the British constitution, according to Edmund Burke. Richard Henry Lee wrote a letter to Arthur Lee on February 24th, 1774. America did not have any desire at first to separate from Britain. However the colonists wanted the independence that they had had while England was bust fighting in the Indian War. As Richard Henry Lee stated in the letter written to Arthur Lee, North America is now most dimly united and as firmly resolved to defend their liberties ad infinitum against every power on Earth that may attempt to take it away. Eventually the American colonies were able to brake free and received the independence they truly wanted. During 1707-1788 the Famous Mather Byles: The Noted Boston Troy Preacher, Poet and Wit. A part of the letter that Mather Byles wrote to the Nathaniel Emmons was, which is better, to be ruled by one tyrant 3000 miles away, or 3000 tyrants one mile a...

Wednesday, November 6, 2019

Orwells Writing Rules Are Made to Be Broken

Orwells Writing Rules Are Made to Be Broken Orwell’s Writing Rules Are Made to Be Broken Orwell’s Writing Rules Are Made to Be Broken By Mark Nichol George Orwell, author of Nineteen Eighty-Four and Animal Farm, has been celebrated far and wide (including on this site) for his essay â€Å"Politics and the English Language.† The moral force of his argument is undeniable: Orwell, a socialist, witnessed the, well, Orwellian, tyranny of the Soviet Union and feared the power of propaganda and the insidiousness of authoritarian obfuscation, hence his passion for clear, simple writing. Toward the end of this justifiably influential tract, Orwell exhorted readers to adhere to six commandments about writing. However, as he himself wrote in a subsequent paragraph, â€Å"I have not here been considering the literary use of language, but merely language as an instrument for expressing and not for concealing or preventing thought.† Beyond that caution, though, literal adherence to his dicta is inadvisable, and to some extent I disagree with each of them. 1. Never use a metaphor, simile, or other figure of speech which you are used to seeing in print. Certainly, many figures of speech such as â€Å"bite the bullet,† â€Å"push the envelope,† and â€Å"go the extra mile† should be sent to the metaphor retirement home, and I’ve warned about buzzwords, but not every common figure of speech has worn out its welcome. They can be especially catchy when used in punny contexts: A government agency turns over a new leaf about deforestation, a rock band plays musical chairs with its lineup, a pharmaceutical company’s setback is a bitter pill to swallow. 2. Never us a long word where a short one will do. Utilization of sesquipedalian vocabulary unquestionably mitigates comprehension, but never is dishearteningly uncompromising. Better to advise minimizing multisyllabism. But must I always write do in place of accomplish? Spread instead of disseminate? Try in favor of endeavor? That’s an oddly totalitarian rule, coming from Orwell. 3. If it is possible to cut a word out, always cut it out. Um, is always really necessary in that sentence? And â€Å"Omit a word† is more concise than â€Å"cut a word out.† But omit has more letters than cut. Do you see where this is going? The answer is, too far. Striving to attain Hemingwayesque conciseness is appropriate for assembly instructions, and journalistic writing should be as transparent as possible, but Bill Bryson never met an adjective or an adverb he didn’t like, and if anyone’s complained about that, I haven’t read the grievance. In moderation (or, in Bryson’s case, in excess), modification is merited. 4. Never use the passive where you can use the active. The case for active language is often strong. But passive constructions are acceptable when the actor in a sentence (in the following sentence’s case, the â€Å"seer†) is not significant: â€Å"Punk music can be seen as a reaction to the overblown theatricality of disco and arena rock.† And sometimes the object is more important than the subject. Yes, favor active voice, but don’t categorically prohibit occasional passive structure. 5. Never use a foreign phrase, a scientific word, or a jargon word if you can think of an everyday English equivalent. Am I prohibited from referring to an eminence grise, in favor of â€Å"power behind the throne† or â€Å"puppet master†? The French phrase for â€Å"gray eminence,† or â€Å"gray man,† is admittedly somewhat pretentious, but it’s also a rich metaphor and if you don’t know what it means, after you look it up, your word-hoard is in turn enriched. Likewise, scientific terminology and topic-specific jargon can become tiresome, but it’s often appropriate in moderation. 6. Break any of these rules sooner than say anything outright barbarous. I disagree with this rule as well. Better, I say, to break any of these rules you like, but only after you acknowledge that each has its justifications and if you remain alert, in your writing, to abuses of the English language they caution against. But â€Å"Orwell, or else† is a policy that smacks of rigidity. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Writing Basics category, check our popular posts, or choose a related post below:What Is Irony? (With Examples)Ten Yiddish Expressions You Should KnowDouble Possessive

Sunday, November 3, 2019

Legal and Ethical Implications of Diversity and Inclusion Essay

Legal and Ethical Implications of Diversity and Inclusion - Essay Example that diversity and inclusion are valued by all parties in an organization especially during employment and the way they relate to one another in the workplace. Provision of excellent relationships in a workplace despite, the race, colour, age, culture brings about an all-inclusive working environment that in return improves the performance. I also help in reduction of harassments and abrasions of the workers (Ely, Meyerson & Davidson, 2006). Ensuring people of different ages are provided with similar opportunities, and promotion is done on merit and not age is the other manner of meeting diversity and inclusion needs at the workplace. A leader should understand the organization’s aspects of diversity and inclusion to explain to the employee or members of staff their importance and also describe the ethical and legal policies. By understanding and interpreting the organizational policies where the impacts, consequences and remedies of certain forms of actions at the workplace are treated brings some conscience to both staff and employees on the importance of observing such. Also as a leader, one should be able to understand different forms of acts that can be detrimental to diversity and inclusion process. Through this, a leader can be able to identify potential issues relating to diversity and inclusion and hence, define ways to prevent such from being practised in their firms. It also helps in determining of policies and procedures that describe legal and ethical requirements which needs to be followed by employees, business partners, third party suppliers and even customers (Tyler et al., 2008). Accepting diversity and inclusion usually take place after an introduction of a process or procedure is met with resistance or slow adoption of the policies that promote the acts. Embracing diversity and inclusion, on the other hand, refers to willingly accepting the policies relating to the same which were initially available at the organization. Accepting typically

Friday, November 1, 2019

The Fashion Industry Did Not Exploit Their Labour Base Essay

The Fashion Industry Did Not Exploit Their Labour Base - Essay Example The essay "The Fashion Industry Did Not Exploit Their Labour Base" concerns the fashion industry and the question of exploitation. At eleven for a child to be doing this instead of schooling is a most despicable thought; however we also need to look at this situation through young Mantheesh’s eyes, for her this work brings home Rs. 40 or 60p per day; much better than what she could’ve done in her native war torn Sri Lanka or in some refugee camp in India. These 60p are better than anything else that life has doled out to her so far, her only hope, and when the protest over the unfairness of child labour reaches this young child; neither does she understand the debate nor does she feel that its fair for people to take away from her the last modicum of hope that this job allows her. These are the questions that this essay will attempt to answer. Let’s start by peeping into the conditions of child labour. According to UNICEF, there are an estimated 250 million child ren aged 5 to 17 in child labour worldwide, excluding child domestic labour. In terms of geographical distribution, the Asia-Pacific region harbours the largest absolute number of working children between the ages of 5 and 14, with some 127 million, or 60 per cent of the world total. Sub-Saharan Africa is second with 48 million, or 23 per cent of the total, followed by Latin America and the Caribbean with 17.4 million, or 8 per cent, and the Middle East and North Africa with 13.4 million, or 6 per cen. Some of the countries are India.... In terms of geographical distribution, the Asia-Pacific region harbours the largest absolute number of working children between the ages of 5 and 14, with some 127 million, or 60 per cent of the world total. Sub-Saharan Africa is second with 48 million, or 23 per cent of the total, followed by Latin America and the Caribbean with 17.4 million, or 8 per cent, and the Middle East and North Africa with 13.4 million, or 6 per cent ( ILO, 5.1.2008). Some of the countries which are battling this issue are India, Bangladesh, Pakistan, Indonesia, Philippines, China, Nepal, Malawi, Kenya, Zimbabwe,( Andvig, J.C. 5.1.2009) ( IPEC, 5.1.2009) Tanzania, Ethiopia Morocco, Egypt, Brazil, Argentina. The fact that most of these countries are developing nations is where the similarity ends, on one hand we have a country like Ethiopia teetering on the brinks of a civil war and on the other we have a India touted to be the economic super power of the next generation; yet both countries haven't been able to curb the rampant flouting of child labour laws. So can we safely conclude that child labour is only a problem of developing countries Not really, even the United States has its own issue of child farm workers (AFT, 5.1.2009). In order to take a closer look at this problem, we need to first understand it. "Child labor" is, generally speaking, work for children that harms them or exploits them in some way (physically, mentally, morally, or by blocking access to education). BUT: There is no universally accepted definition of "child labor". Varying definitions of the term are used by international organizations, non-governmental organizations, trade unions and other interest groups. Writers and speakers don't always specify what definition they are using, and that often