Friday, May 31, 2019

Shakespeares Macbeth - The Character Flaw :: GCSE English Literature Coursework

Character Flaw of Macbeth   Everyone who is mortal has at least one flaw. Some flaws atomic number 18 more serious than others. For example, some great deal hand over addictions to gambling, while other people can not remember to put milk away aft(prenominal) they use it. After a while though, a persons flaws come back to haunt them. The tragedy MacBeth is no exception to this rule. In it, many of the characters die. The reason is that they have a flaw that eventually fleets to their downfall. Not every character is deserving of his fate though. Some characters have a minor flaw that should not lead to their death. Others, however, have a major flaw that eventually leads to their death. MacBeth kills the first Thane of Cawdor for trying to lead a revolution against England. His fatal flaw was that he was, according to Ross, "a disloyal traitor". The thane of Cawdor was greedy and wanted the throne of England for himself. As a result, he was murdered. His m urder was not really disheartening, though, because the Thane of Cawdor deserved his fate. He was leading a battle in which many lost their lives for the sake of greed, and deserved to die because of his flaw. Duncan was the King of England, and was murdered by MacBeth. He was murdered because in order for MacBeth to do his plan and become king, Duncan would have to die. Duncans fatal flaw was that he was too trusting. For example, he thought that none of his friends could really be enemies. If Duncan was more careful intimately his safety at MacBeths castle, he may have had a chance to survive. However, Duncans flaw was not something so horrible that he should die because of it. Most people need to trust each other more, and just because one person did, he should not have to die for it. MacBeths former best friend, Banquo, was also killed by MacBeth. Banquo was killed because he knew too much closely the murder of Duncan. That was not his fatal flaw, though. Banquos f atal flaw was that, although he knew that MacBeth killed Duncan, he really did not do anything about it. Banquo had many opportunities to tell someone such as MacDuff

Thursday, May 30, 2019

Uganda Essay -- Uganda History, British Colony

Uganda 1. Historical stage setting The country known as Uganda was once a British colony just the equivalents of the majority of its neighbors in East Africa. It was initi every(prenominal)y intruded into by the Arab traders led by Speke and the British explorers led by Stanley in 1862 and 1875 respectively. They both paid homage to Mutesa who was the queen regnant (kabaka) of the Buganda. Uganda remained predominantly under the colony of the British until 1962 when they were granted internal self government by Britain (History World, 2011). Uganda is a country that covers 7,108 sq mi in area and a host of 33.3 million people found in East Africa. It is bordered by Congo on the West, Kenya on the East, Tanzania and Rwanda on the south and Sudan on the North. It enjoys the equator since it crosses by it and has three major weather areas the fertile plateau, swampy lowlands and the desert regions. The famous Lake Victoria is found to the southern part of Uganda (The World Factboo k, 2011). The topography of the population is such that the biography expectancy is 52.9, the growth rate is pegged at 3.5%, the birth rate is 47.5/1000, the infant mortality rate is 63.7/1000 and the density per sq mi is 392 people (Pearson Education, 2011). According to encyclopaedia of the Nations (2011), the economy of the nations is dependent on agriculture with 80% of the population relying on agriculture for employment and in turn produces 90% o f the exportation of the country. Uganda in addition has some deposits of copper, cobalt and the recently discovered oil, however, Uganda just like most of the African countries remain to be among the worlds poorest nations. Health background The Ugandan population is majorly consisting of poor people who live on a dollar or less per... ...es. Some of these are the ritual celebrations and festivals like in marriage rituals, weddings, christenings, birth rituals, death ceremonies and even commitments to the spirits and forefather s. There also rituals and celebrations that accompanied the harvests and even the droughts in order to appease the gods for rain. There are also other official dates that are observed in the calendar that are drawn from the Muslims and the Christians as well and more significantly those meant to celebrate the history of Uganda like the Martyrs Day on June 3rd, Heroes Day on June 9th and Independence Day on October 9th among others. Generally, the Ugandans are friendly and welcoming like the other East African countries where all one needs to know to get help is the word Jambo, in short, it doesnt take too much energy to get help in the daily social life in Uganda.

Wednesday, May 29, 2019

Summary of The Lesson Essay -- The Lesson Literature Essays

Summary of The Lesson In this story the author tells us about a girl named Sylvia, the narrator, who lives in a very low income family. A placement where school is not a priority. A place where it is more important to be strong and hard, than to read a book. This was the thought anyway, before Miss. Moore moved in. She was a school teacher who took it upon herself to teach the neighborhood kids. On one summer afternoon in particular she was going to take the kids into town on a field trip. The kids are not at all happy about this because they know it is summer break and they are not supposed to be in school in the summer. They would rather be at the pool playin, but Miss. Moore knows that if these kids want a chance at a give life, then she better show them what is out there. The story leads to the bus ride where Miss. Moore gives money to Sylvia to give the driver a tip. Sylvia can not figure the tip, so she keeps the money thinking that she really showed Miss. Moore. S he did not even admit to herself that the real reason she did not leave the tip was because she did ...

Indigenous Religions of the World Essay -- Religion

Indigenous religions exist in every climate roughly the world and exhibit a wide range of differences in their stories, language, customs, and views of the afterlife. Within endemical communities, religion, social behavior, art, and music are so intertwined that their religion is a significant part of their stopping point and virtually inseparable from it. These religions originally developed and thrived in isolation from one another and are some of the earliest examples of religious use and belief. The modern world however, has taken its toll on these groups and many of their stories, customs, and beliefs have been lost to, or replaced by, those brought in as a result of popular culture and the missionary work of Christians and Muslims. The survival of autochthonic religions has been faced with many challenges. In addition to the rapid spread and Christianity and Islam, a number of other factors affect their survival, including struggles associated with the maintaining of local anesthetic indigenous worldviews, languages, and environments (McKinley, Elizabeth).The spread of popular culture from increased travel, television, radio, and the internet is a source of threat to the cultural views of indigenous people and their religious practices. Traditional indigenous clothing is being replaced with business suits and baseball caps and traditional styles of building are being replaced with the international style of architecture (Molloy, Michael). Science and technology is providing explanations for naturally occurring events that indigenous people have historically related to the will of the gods and indigenous artifacts originally of religious nature are being downplayed simply as indigenous working of art. For indigenous culture... ... - Survival International. Survival International. Web. 19 Apr. 2012. .4)McKinley, Elizabeth. Locating The Global Culture, Language And Science Education For Indigenous Students. International Journal of Science Ed ucation 27.2 (2005) 227-241. schoolman Search Premier. Web.19 Apr. 2012.5)Molloy, Michael. Experiencing the Worlds Religions Tradition, Challenge, and Change. New York McGraw-Hill, 2010. Print6)New Zealand Culture - Maori. New Zealand Travel and New Zealand Business. Tourism New Zealand, 2011. Web. 23 Apr. 2012. .7)Wilford, John Noble. Worlds Language Dying absent Rapidly. Www.nytimes.com. The New York Times, 18 Sept. 2007. Web. 15 Apr. 2012. .

Tuesday, May 28, 2019

Weber in Singapore :: essays research papers

Imagine that Max Weber has been resurrected and is on a visit to Singapore. How would he interpret the various facets of Singapore society in relation to his theories and medical prognosis well-nigh the future of modern society?As we begin the twenty-first century, there is a growing recognition that Max Weber is our fore about well-disposed theorist of the condition of modernity. His pre-eminence stems from the scope, the depth, and the intensity, which he brought to this project. In short, Weber sought to explain the place of the modern soul in the world. Behind this deceptively simple foundation, fructify a gigantic enterprise. Precisely so then, the beginning of this essay is devoted to underlining and illustrating the principal themes of Webers sociological investigations, especially those that would be used in interpreting the various facets of Singapore society. Next, this essay attempts to show how a resurrected Weber would interpret the various facets of Singapore socie ty in relation to his theories and prognosis about the future of modern society. The concluding part offers criticisms, if any, and asks the importance of Weber in this modern age.Weber, it is often said, conceived of sociology as a comprehensive science of social action. As such, Weber distinguishes between four major types of social action. In zweck judicious action, or action in relation to a goal, the individual rationally assesses the means to impinge on a particular goal. An engineer who builds a bridge as the most efficient way to cross a river often exemplifies it in the literature. A to a greater extent relevant example would be the modern goal of material sought after by many young people today. Many recognize that the most efficient way to attain that success is by means of higher education, and so they flock to the universities in order to get a good job. Wertrational action, or rational action in relation to a value, is characterized by striving for a goal which in it self may not be rational, but which is pursued through rational means. The traditional example would be the brave captain who goes down with his ship. More relevant then is a person who attends the university because he or she set the life of the mind a value that was instilled in them by parents, previous teachers, or chance encounter. Affective action is anchored in the emotional state of the individual rather than in the rational weighing of means and ends.

Weber in Singapore :: essays research papers

Imagine that Max weber has been resurrected and is on a trounce to Singapore. How would he interpret the various facets of Singapore society in relation to his theories and prognosis about the future of modern society?As we begin the twenty-first century, there is a growing recognition that Max Weber is our fore more or less social theorist of the condition of modernity. His pre-eminence stems from the scope, the depth, and the intensity, which he brought to this project. In short, Weber seek to rationalize the place of the modern individual in the world. Behind this deceptively simple foundation, lay a gigantic enterprise. Precisely so then, the beginning of this essay is attached to underlining and illustrating the principal themes of Webers sociological investigations, especially those that would be used in interpreting the various facets of Singapore society. Next, this essay attempts to show how a resurrected Weber would interpret the various facets of Singapore society in relation to his theories and prognosis about the future of modern society. The concluding part offers criticisms, if any, and asks the importance of Weber in this modern age.Weber, it is often said, conceived of sociology as a comprehensive science of social action. As such, Weber distinguishes between four major types of social action. In zweckrational action, or action in relation to a goal, the individual rationally assesses the means to attain a particular goal. An engineer who builds a bridge as the most efficient way to cross a river often exemplifies it in the literature. A more relevant example would be the modern goal of material sought after by many young people today. Many recognize that the most efficient way to attain that success is through higher education, and so they flock to the universities in order to get a good job. Wertrational action, or rational action in relation to a value, is characterized by striving for a goal which in itself may not be rational, but whi ch is pursued through rational means. The traditional example would be the brave captain who goes raven with his ship. More relevant then is a person who attends the university because he or she values the life of the mind a value that was instilled in them by parents, foregoing teachers, or chance encounter. Affective action is anchored in the emotional state of the individual rather than in the rational weighing of means and ends.

Monday, May 27, 2019

Psychology vs Sociology Essay

Psychology and sociology have their differences and similarities. However, this essay will mainly focus on the differences between their approaches and how they argon applicable in the real world. Psychology, fundamentally, is the study of behaviour and of the functions and processes of the valet mind, especially relating to the cordial and physical environment while sociology is defined as the study of social life, social change and the social causes and consequences of human behaviour. Psychologists are more interested with what occurs within great deal, which includes emotions, perceptions, learning, personality and thinking. Sociologists, on the other hand, mainly focus on what occurs among people. These occurrences could be things such as interpersonal relationships, negotiating conflicts, and the effect of social systems like education and politics on personal and group behaviour (Benokraitis, 2009).Psychology focusses on the human mind and how and why people think and behav e they way they do. Sociology examines groups of people, communities, societies and even nations. They might research on things such as changes in population, effects of events on entire communities and culture. One way to look at it is that psychology is more about the individual or small groups and sociology is more about larger groups of people such as communities, societies. While the difference is significant, these two sciences do have similarities as well as an intersection between them. They are both that to the society and see etiology, the study of causation or origination, as of great importance (Ellis, 2010). There is also a sub-field in psychology known as social psychology that is a discipline which uses scientific methods to understand and explain how the thought, feeling and behaviour of individuals are influenced by the actual, imagined and implied presence of other human beings (Gordon Allport, 1985). amicable psychology looks at a wide range of social topics, i ncluding group behavior, social perception, leadership, nonverbal behaviour, conformity, aggression, and prejudice. It is important to note that social psychology is not just about looking at social influences. Social perception and social interaction are also vital to understanding social behavior.Prev Pageside by side(p) Page

Sunday, May 26, 2019

Epidemics in Colonial America

John Duffy, a true historian, contributed immensely to the history of medicate by publishing his research in the form of his first earmark Epidemics in Colonial America. Duffy continued to write other books as well but this particular one stood as a landmark in his career, facilitating only those interested in the field of medicine. In writing this book, Duffys primary goal was to clarify pestilent diseases in order of importance and show their target and confirming effects on colonial development.He showed how the health environment is important for economic outcomes and that there is a direct effect of health conditions on income and an indirect effect on institutions. There is clearly no hidden goal or aim of the author and whatever he has intended to show is evenhandedly apparent and understandable. His book is more on the lines of medical history/ economic impact and is more descriptive and explanatory than theoretical.Epidemics in Colonial America provides, in detail, t he history of disease epidemics in America and guides the reader through the years of epidemics to show how the outbreak of various diseases effected the development of colonial America. The book explains how epidemic diseases have been affected, and vice verse, have affected the isolation of rural societies, changing economic conditions, varied work conditions and the factors determining poverty and wealth. BodyThe seventeenth century is determine as the period when epidemics were fairly limited in their impact as the interaction between the people of different colonies was token(prenominal) and communities were more isolated than they would be in the future. As a result any disease would remain localized to the people of a particular community and not become an epidemic. However, the side progressively changed by the end of the eighteenth century when there was more commercialized activity/economy. The increased mobility and urbanization led to a salienter scourge of epidemic s spreading from the rural areas.The situation obviously worsened by the end of the nineteenth century as mobility was further improved and there was increased urbanization. The low-down urban centers began experiencing high death rates from diseases like cholera, tuberculosis etc that were endemic in cities like New York, Boston, Philadelphia and New Orleans. Yellow Fever, Smallpox, malaria, hookworm infection, beri-beri, Typhoid and Dysentry, and amentia are amongst the epidemic diseases in colonial America. The detail of each, along with its effects has been given in the book.The impact of the mosquito borne diseases, Yellow fever and malaria, was greater on the colonists of Jamestown as compared to that in New England. Yellow Fever came from Barbados and spread in Philadelphia and New York, and later on in Boston. Thousands of people fell victim to the disease and some(prenominal) leftover upset areas. As is the case with other epidemics, business activity came to a standst ill, unemployment rose along with the death rate. People who chose to stay in the afflicted areas had to take severe precautionary measures, but to little effect.They would shut themselves in their homes and keep the sick isolated from the rest in mosquito nets. The period of the disease is approximately one week, by the end of which the person either dies or recovers and becomes immune to it. However, the instances of recovery were little and as history tells us, several hours of work had to be lay out in just to bury the dead. The Yellow Fever epidemic in 1793 killed around 5,000 people in Philadelphia, which is approximately 10% of its population.Moving on, Small Pox was introduced in America by the European colonists and effected the native Americans the most as they had little immunity to the disease because of having very little or no pic to it. The entire native American population was swept off by the disease and as Duffy quotes a letter by a South Carolina nonmigratory in his book which says that Small Pox swept away a whole neighboring Indian nation, all to 5 or 6 which ran away and left their dead unburied. In the book, Duffy in like manner describes it by saying that the epidemic in 1738 killed one half of the Cherokee Indians near Charleston.The effect of such an epidemic was reduced underground to western expansion in the U. S. In another reported incident, some U. S Army men distributed blankets that had been used by smallpox and measles victims, to Indian tribes that also immediately fell guttle to the diseases. The small pox epidemic was this disastrous because of its highly contagious nature and the fact that it spreads through even minimum human contact. It can choke the nostrils and also cause blindness. Prevention efforts were made by colonists who tried using isolation and inoculation, a controversial procedure introduced in Boston in 1721.The patient was injected with a mild form of the disease for a short while to create immunity and antibodies to counter the virus. As a result, a person would get the disease for a shorter while as compared to if they had gotten the disease naturally. A more crude form of this procedure was practiced by the African Americans and was called variolation. The practice consisted of transferring the pus or the scabs from the wounds of the already-affected people and injecting them in the open wounds of unaffected people in order to create immunity.Malaria was also one of the epidemics in the U. S. It became one of the significant diseases of the colonial times as it spread from Maryland to Alabama, Georgia, Missouri and Mexico. The mosquito sponger began spreading faster a s virgin solid ground was introduced in Carolina and the Blacks were available as victims for the mosquitoes. The parasite then gradually spread to the whites and eventually became an epidemic. The Hookworm infection was another one of the diseases, starting from Florida and Louisiana.The Hookworm parasite s pread through the moist soils from Virginia and just like Malaria, the Native American slaves were its carriers. The Beri-Beri disease, a simple deficiency of vitamin B, on the other hand was curable to a great extent. One of the most widely spread diseases, Tuberculosis, remained a highlight of the nineteenth century as it became very common amongst the people of rural areas and also the poor people of urban areas. Its mobile nature accounted for the high number of people who were affected by the disease and it took several decades for doctors to come up with a counter to this disease.Duffys book mentions other diseases and their effects on America as well but the ones mentioned above were the most significant ones. They hold great importance in maki9ng the present what it is today as they left a lot for the human race to learn from in terms of medical advances. result The outbreaks of epidemics not only affected the western expansion but also halted the functioning of many citie s in America. People were unwilling to work at the take chances of their health and lives and therefore businesses and industries collapsed as unemployment rose.The economy fell and people preferred staying indoors to protect themselves. Education, industry, economy, agriculture and every other structure fell prey to the epidemics that hit the U. S. Local outbreaks became epidemics of a national nature as the transport systems developed and coastal trade began. The nineteenth century saw water and airborne diseases spreading throughout the U. S as poor sewage systems, dirty drinking water and poor food quality etc added to the spread. Eventually, the life expectancy of an modal(a) American greatly fell.On a more positive note, these epidemics had a great lesson to teach as far as the knowledge of medicine is concerned. It helped modern medicine develop into what it is today and facilitated doctors dealing with patients suffering from similar diseases to a great extent. Even though these disease were thought as a punishment for the sins that had been committed by the people, its positive aspect should not be ignored. Epidemics in Colonial America is a significant addition to the literature of medicine and the efforts of John Duffy should be recognized for the immense help that they are.Duffy has remained successful in his attempts of creating awareness regarding the diseases that have struck colonial America in the past and has effectively shown their effects on the people, their incomes, the environment and the development of the United produces. The details in the book help paint a fairly adequate picture of the colonial years and deliver it easy for one to imagine the magnitude of the diseases that occurred. Therefore, it is safe to say that Duffy succeeded in his efforts and should be remembered for them.ReferenceDuffy, John. Epidemics in Colonial America. Baton Rouge Louisiana State University Press, 1953.

Saturday, May 25, 2019

Little Red Riding Hood Revisited Essay

People often ask me ab let on the hulky grey wolf hide I keep abatement above the fireplace. I will admit it does seem rather odd for a young girl to have such a thing, and I tick you that the story behind it is even stranger. A story I have told musical compositiony times to guests and passers by, and I always trace the same look of disbelief, besides I assure that this story is as true as they come. Walking to my naans house was not a strange occurrence for me I had done many times, only this time would be far different.I had no idea of the events that were to unfold as I opened the gateway and entered nannas cabin. Grandma, are you there? I called out as I entered the cabin. I made sure to move cautiously so that I did not hit my knees on anything in the dark. I am in here darling. I heard my grandmother respond from the bedroom. I lit a lantern, and locomote into the room where I found my grandmother lying peacefully in her bed. Grandmother, I brought you fresh brea d and vegetables from the market, I exclaimed proudly as I take away my red overcoat and tossed it onto the rocking chair in the corner. I will be back in a few minutes Grandmother. I am personnel casualty to put on some stew, I hope you are hungry. Oh, you have no idea, my dear. My Grandmother said in somewhat of raspy whisper. Grandmother, what is wrong with your piece? Oh nothing my dear, I hazard I am coming down with a bit of a cold. Her voice, although sweeter than I remembered it, sounded forced and uncomfortable. Thinking nothing of it, I resumed my post, slicing vegetables and warming the broth over the fire. One by one as I finished making my cuts, I slid the slices into the broth, first the carrots, followed by onions and celery, and at long last finishing with the tomatoes and potatoes.My stew was coming along nicely so I heated up some water on the side and began to boil afternoon tea leaves in a kettle to try and ease my grandmothers sore throat and relieve her cold. Red, how is everything going in there sweetie? My grandmother queried anxiously from her comfortable perch in the bedroom. Everything is coming along just fine Grandmother, I replied, a teeny irritated. I had no idea why my Grandmother was in such a mood today, I had never seen her be this pushy and hurried. I stirred the stew one more and remote it from the fire in order to let it cool down as I made my grandmother a cup of tea.I ladled fresh calefactory soup into one of the bowls on my Grandmothers counter, and then placed it along with a glass of tea on a woody tray, and presented it to my Grandmother while she remained in bed in the dimly lit corner of the room. Thank you my dear, She said eerily. I just dont think I am in the mood for this stew. Grandmother, what are you talking about? I exclaimed, This is your favorite soup, you have made this soup for me since I was a little girl. I paused and waited for a response but none was given. Grandmother? I peeped cau tiously becoming more and more worried about what was going on. Grandmother? I peeped again. Another long pause passed without as much as a whisper from Grandmother. I quickly grabbed the lantern that I had lit earlier and brought it loaded to the bed, shining as much light as I could on the growingly creepy situation. As I peered into my Grandmothers eyes, I noticed they looked strange. I looked closer, locked in her gaze, and, without even noticing, I whispered aloud, Grandma, what big eyes you have. All the better to see you with my dear. She answered in a strange tone that was as unfamiliar with(predicate) to me as her lack on interest in her favorite soup.Stranger still than her tone was the unmistakable largeness of her mouth, and even more so her teeth. I never remembered seeing her teeth that large. Grandmother, what big teeth you have, I muttered. All the better to eat you with, She replied. I gasped aloud as the shocking realization began to mat over me. The loving G randmother I had always cognize had been replaced by an unusually large wolf. I jumped out of the chair, and made a move for the door when the wolf, moving like lighting, blocked my path. Why the rush? asked the wolf slyly, with an air of arrogance.He quickly reached out for my throat, but underestimated me as I dodged and crawled through his legs. You toilettet run from me the wolf exclaimed as I used every once of energy I had to sprint through the front door and out into the forest. I could hear the loud crackling of breaking twigs and the scratch of the wolfs claws against the hard frozen bark as he gave chase. I unbroken zigging and zagging, trying my hardest to remain a hard target for the wolf, but I could feel his breath getting closer and closer to my neck. Suddenly, in the distance I noticed an outline of a man, walking through the forest.I numeraled my sprint in his direction, and pumped my legs with everything they had left. With every step closer to the man, I ma tte more and more assured that I might yet live to see another day. HelpHelp I yelled at the happen of my lungs to the stranger in the distance. He turned around and I could see a lumberjacks axe in his hands. I ran and ran, until finally I could reach out and grab the man. When I did, I turned around and noticed that the wolf was no longer behind me. What is it, my dear? The man asked in a calm voice as if not a single thing was out of place in the forest. Sir, a massive wolf has eaten my grandmother, and is chasing me. I cried out as if my life depended on it. Sweetheart, I see no wolf, The man replied. Right at that exact moment, I noticed a large shadow over the mans shoulder and looked up to see the wolf soaring through the air out of the trees. The wolf landed perfectly with its paws on my shoulders pinning me to the ground, but not attacking, just holding me there. Oh, that wolf, The man said calmly without so much as a undertone of worry. You did not tell me that you ha d met my pet. What are you talking about? I sobbed loudly. Do you have any idea how hard it is to train a wolf? The man jested. Especially to train one to hide peoples relatives and lure little girls out to the forest. My Grandmother is alive? I asked immediately. Of course, she is. I have no taste for bitter old women. The man seemed almost pleased with himself as one does when an elaborate plan comes together. Enough of the small talk. The man muttered casually. Time to get you dressed out and ready for the dinner table. I looked up, and watched as the man lined up the axe with my throat, and slowly increase it over his head.I had no choice but to close my eyes, and prepare myself for the inevitable. Just then, I heard the loud crack of a rifle, and looked up to see a horrifying aspect on the mans face. I felt a drop hit my face as I noticed the red pool put down to grow on the mans chest. His strength fading quickly, he dropped the axe. I reached up desperately, and gra bbed the axe as it made its descent and caught it firmly in my hands. Rising to my feet I noticed the man lying on the ground clutching his chest and breathing heavily. Without so much as a moments hesitation, I drew the axe above my ead, and brought it swiftly down on the mans neck, ending his suffering and life. I looked around frantically meddling for the wolf, for I knew I wasnt out of danger yet.Confirming my suspicions, I noticed the wolf running through the woods headed right for me, I raised the axe, ready to defend myself, when I heard another shot from a rifle, and watched as the wolf hit ground and slid to my feet dead. Shocked and relieved, I looked around for my savior. mask well I couldnt find anyone. Hello I shouted into the seemingly empty woods. My heart leapt with joy as I heard a familiar voice call back to me. Over here dear, I ran toward the sound and looked upon the face with the familiar voice. Grandma I shouted wildly. I impression you were dead. Not at all dear, it would take more than an overgrown wolf to get the best of this old lady. Surprised at this seemingly impossible turn of events, I went to ask her how this was possible, but all I could muster was a whimper. I see you are shocked my dear, let me explain, She said, calm as could be. My Grandmother then told me the story of how the wolf had taken her to a cave and left her there, presumably to take post in her bed.What the wolf and the hunter had not known was that Grandma was a widow, and had to fend for herself in the woods. She had been hunting this forest since she was a young woman some 25 years ago. That night Grandma and I ate quite a stew complete with wolf meat. Dinner was over and the dishes were clean, and, as Grandma sat by the fire cleaning her rifle, I relaxed after a hectic day in the rocking chair and dozed off under the warmth of my brand new cloak, a long over-sized wolf skin which I gladly wore over my old red one.

Friday, May 24, 2019

Adr in an Era of Globalisation: an Indian Perspective

In a country with a population in excess of a billion, and plagued by an underfunded court structure amply of corrupt and ineffecient officers, we are looking at decades of stagnation, a backlog of cases in excess of 29 million, across the state-level courts, the twenty-one high courts and the supreme court. According to spheric Corruption Report 2007 Corruption in Judicial Systems, Indians shelled out an estimated $600 billion as bribes to the judiciary, which is higher than the bribes paid out in any another(prenominal) vault of heaven in the court.This long gestation period of litigation has resulted in a large scale loss of confidence in the judiciary, with a growing spell of people opting to stay away from court. Enter alternate dispute re source. It is this plethora of people who are prime targets of an alternate dispute mechanism. The prime time ancestor to the snails pace discharge of cases. The main selling point of arbitrament is the speedy and cheap village of disp utes outside of a courtroom.While arbitrament is a increase of a private agreement, once an arbitration stage is rendered, the prevailing companionship fecal matter seek to have that grant confirmed by the courts, and, having make so, can invoke the coercive power of the state to enforce it in the same manner as it could a court perceptiveness. Initially received with skepticism by the courts in various countries, arbitration is now being embraced as an effective form of alternate dispute resolution.As a result of the burgeoning international divvy up and an explosion in the foreign direct investment numbers in the country, arbitration and other forms of alternate dispute resolution are becoming more than and more indispensable. One of the major problems with foreign litigation is that foreign judgments are subject to several layers of appellate review, whereas, foreign awards are much easier to enforce in different sovereign states. arbitrement is particularly successful in fields like construction, where a accredited amount of expertise is required while adjudicate disputes, of which there is paucity in the courts.Arbitrators are chosen from the same industry, and are generally required to resolve disputes based on fact rather than juristic issues. Most companies prefer such a business approach to resolution of disputes, rather than a legal approach. Arbitration in India was first governed by the Arbitration and Conciliation manage, 1940, which was later replace by the 1996 Act. The 1996 Act was designed primarily to implement the UNCITRAL Model Law on International Commercial Arbitration and work a pro-arbitration legal regime in India.This Act was largely aimed at subduing the loopholes which allowed for excessive judicial intervention in the 1940 Act. Some of the features of judicial review The lecture in Section 30 of the 1940 Act read shall non be exercise digression took away the legal power of the courts to set aside an award provid ed on one or more of the grounds specified in the section. Amended in 1996, however, the section re-numbered section 34 reads An award may be set aside only if Hence, the court has no jurisdiction to set aside an award on any other grounds.This amendment was brought with an intention to reduce the sphere of judicial review to allow for a minimum level of court intervention. In R. S. Avtar Singh & Co. v. N. P. C. C. Ltd. , the court commented on the nature and extent of the courts jurisdiction It is a well settled rationale of right that the award of the supreme authority who is a chosen judge of facts and of law between the parties can non be set aside unless an error is apparent on the face of the award or it can be inferred from the award that the justice has misconducted himself or the proceedings or that he has not applied his mind to the material facts.Hence, the court is not sitting in appeal on the award, nor can it re- rise the material which was adduced beforehand the arbitrator. The court cannot examine the correctness of the award on merits nor it is obligatory for the arbitrator to give detailed reasons. Unless the court comes to the conclusion that the award is preposterous, it cannot set aside nor substitute its own ending in place of the arbitrator. In short, the arbitrator is the final judge of facts and law, and the arbitral award is not open to challenge on the ground that the arbitrator has reached a wrong conclusion or failed to appreciate the facts.Section 31 (3) of the new Act of 1996 states that an arbitral award shall state the reasons upon which it is based, unless the parties have agreed otherwise, or the award is agreed on the terms enumerated under Section 30. This was reiterated by the court in the case of Tamil Nadu Electricity Board v. Bridge Tunnel manifestation Co.. The rationale behind this ordinate of the court is to ensure that the arbitrator acts capriciously, and to give the parties assurance that the grounds for the course of action chosen by him and reasonable and just.At the same time, however, to ensure the finality of the award, reasonable of reasons given by an arbitrator cannot be challenged on merits. Why judicial review? The main purpose of arbitrators is to try to decide disputes correctly on the basis of the applicable law, and subsequently, explain the rationale for their decision. The need for a provision for judicial review in the field of arbitration is born out of the states concern to maintain the integrity of the arbitral process, and maintain a balance between party autonomy and the laws of the land.Judicial review is primarily intended to guard against arbitrariness of awards, and to ensure that the law of the land is followed within the states jurisdiction. No incertitude judicial intervention is a requisite in the field of arbitration which lacks a certain decisional law in the matter. However, the issue to be addressed is to what extent, and an drive is to be mad e to define the scope of this judicial intervention. To what extent can courts come forward and substitute their judgment for the arbitral award?Parties who are dissatisfied with arbitration awards often call upon the courts for review. Procedurally, review is sought in an action to modify the award or set it aside by way of defense, in a proceeding brought to enforce the arbitrators decision or, by way of replication, in an action where the dissatisfied party has sued on his original deal and the satisfied party has pleaded the award. One of the major problems with the 1996 Act, is that a person aggrieved by an arbitral award has to start right from the District court in order to hallenge an award. Additionally, in two recent Supreme Court decisions, Oil & Natural Gas Corporation v. SAW Pipes and SBP v. Patel Engineering, the scope of judicial review has been widened by interpretation anything black eye to reality policy as being patently illegal, and since any award which contr avenes Indian statutory provisions is patently illegal, it is also contrary to public policy, and hence, subject to the judicial review of courts. Generally speaking, arbitral awards are not subject to appeal.However, in most countries, including India, there are provisions to set aside an award in extreme cases. Judicial review of foreign arbitral awards generally falls into two categories. First, the reviewing court inquires whether requirements of natural justice were observed in the arbitration proceeding and whether the arbitration agreement is valid under the applicable law. Failing so, the arbitral award will be denied recognition or enforcement on the grounds that the fundamental requirements of natural justice or legality have not been met.Subsequently, the court inquires into the merits of the award, that is, whether the arbitral body has committed an error in rendering the award. The question of judicial review, however, is a two-headed coin. On the one hand, limiting th e scope of judicial review reaffirms the roots of arbitration, that is efficient and speedy resolution of disputes. Conversely, however, output the scope of judicial review defeats the very concept of finality of an arbitral award, and hence, moving back to square one of the legal court system.Why not? The way in which the proceedings under the Act are conducted and without an exception challenged in courts has made lawyers laugh and legal philosophers weep. Experience shows and law reports bear deposition that the proceedings under the Act have become highly technical accompanied by unending prolixity at every stage providing a legal trap to the unwary. An informal forum chosen by the parties for expeditious disposal of their disputes has by the decisions of the courts been clothed with Legalese of unforeseen omplexity. To the critics of judicial review of arbitral proceedings, the likelihood and to an extent, inevitability of judicial review serves as a serious deterrent to indi viduals and companies seeking arbitration as a solution to commercial disputes. A certain school of thought views arbitration as a mere dress rehearsal for subsequent litigation, and disregards judicial review as a mere racket to the finality of the arbitral award. India is a country growing in leaps and bounds, with the coming of globalization.Being a country looking to attract more foreign investment, develop a fool-proof, cost-efficient and speedy legal system is vital. When a foreign company explores the prospects of investing in India, they factor in the possible legal costs, and the probability to settle disputes through arbitration quickly and cheaply is an attractive selling point. However, with increasing judicial intervention, and the inevitability of ending up in court, hassle-free dispute resolution is no longer a pro on their list of pros and cons.Hence, the 1996 Act was passed with the objective to minimize the supervisory role of the courts in the arbitral process. The very epitome of minimal judicial intervention is contained in Section 5 of the Arbitration and Conciliation Act, 1996, which reads Notwithstanding anything contained in any other law for the time being in force, no judicial authority is to intervene except as provided in the Act Section 34 of the Act imposes certain restrictions on the right of the court to set aside an arbitral award, and the limited grounds on which the award can be challenged have been enumerated.The tail fin grounds upon which an award can be set aside as per Section 34 (2) (a) are -Incapacity of parties -Non-existence or invalidity of arbitration agreement -Exceeding jurisdiction -Non-compliance of due process -Composition of arbitral tribunal As per Section 34 (2) (b), an arbitral award may also be set aside by the court on its own initiative if the subject matter of the dispute is not arbitrable or the impugned award is in conflict with the public policy of India. Public policy, however, has not been def ined anywhere in the Act.Borrowing the definition of public policy from Section 23 of the Indian Contract Act, 1872 The friendliness or object of an agreement is lawful, unless it is forbidden by law or is of such nature that, if permitted, it would defeat the provisions of any law or is double-dealing or involves or implies injury to the person or property of another or the court regards it as immoral, or opposed to public policy. The court, over the years, has offer to varying conceptions of public policy, swinging between the narrow view and the broader view. In Gherulal Parakh v.Mahadeodas Maiya, the court favoured the narrower view, and commented that though the heads are not closed and though theoretically it may be permissible to evolve a new head under exceptional circumstances of a changing world, it is admissible in the interest of constancy of society not to make any attempt to discover new heads in these days. With respect to public policy in the field of arbitrat ion, the court held in Renusagar Power Co. Ltd. v. General Electric Co. , that in order to attract the bar of public policy the enforcement of the award must invoke something more than the violation of the law of India.It was held that the enforcement of a foreign award would be refused on the ground that it is contrary to public policy if such enforcement would be contrary to -Fundamental policy of Indian law -The interest of India -Justice or morality The court in recent times, however, has subscribed to the broader view of public policy, choosing to widen the scope of judicial review. A landmark judgment in this respect is Oil & Natural Gas Corporation Ltd. v. SAW Pipes Ltd.. The crux of the case was that the arbitral tribunal had failed to take into account Section 73 and 74 of the Indian Contract Act, 1872.The major issue, however, that it dealt with was whether the Court would have jurisdiction under Section 34 of the 1996 Act to set aside an award passed by the Arbitral Tribu nal which is patently illegal or in contravention of the provisions of the Act, or any substantive law governing the parties, or is against the terms of the contract. The judgment of the court in this case, not only negated the purpose of the 1996 Act, but also widened the scope of judicial review beyond the realms provided for in the 1940 Act as well.It was held that an award is opposed to public policy under the same heads laid down in Renusagar Power, but also if it is -Patently illegal -So unfair and unreasonable that it shocks the sense of right and wrong of the court Another important judgment of the Supreme Court in 2005 was SBP & Co. v. Patel Engineering, which sanctioned further intervention in the judicial process. The case dealt with the participation of an arbitrator by the Chief Justice, and the contention was that the Chief Justice could adjudicate on contentious preliminary issues such as the existence of a valid arbitration agreement.The court agreed, while holding that the Chief Justices findings would be final and binding on the arbitration tribunal. This judgment makes a mockery of the principle of Kompetenz Kompetenz, which is the power of an arbitral tribunal to determine its own jurisdiction, enshrined in Section 16 of the 1996 Act. This opens up a Pandoras box of opportunity for parties to sabotage the appointment process of arbitrators and make spurious arguments simply to delay the arbitration proceedings. Looking AheadIt is easy to forget the purpose of arbitration and get carried away with the nuances of the law. Therefore, in an attempt to move forward, it is important to incorporate the very aspect of finality and amicable resolution in the contract itself. Of course the most apparent solution at the face of it is to close all doors to review of the award by incorporating a clause for the same in the contract. However, this can only be done at the risk of receiving an award not in line with the principles of natural justice.On th e legislatures part, the Arbitration and Conciliation (Amendment) Bill, 2003, currently pending before the Parliament, proposes to introduce a new section 34A, which would allow an award to be set aside where there is an error apparent on the face of the arbitration award giving rise to a substantial question of law. This narrows the scope for review laid down by the SAW Pipes ruling, but it take over affords losing parties an opportunity to approach courts in an attempt to second guess arbitral tribunals, very similar to the position during the applicability of the 1940 Act.An interesting avenue to be explored in the future, particularly in the case of contracts involving large sums of money, is a system of contemporary and concurrent dispute resolution, involving the establishment of Dispute Review Boards (DRBs). This system has been adopted by the National Highway Authority of India (NHAI), Maharashtra Sewerage Board and Delhi Metro in recent times. A Dispute Review Board basic ally consists of three experienced, respect and impartial reviewers.It is constituted before the commencement of the contract, and regular inspections are carried out to ensure smooth functioning of the contract and ensure good working conditions. This serves to familiarize the reviewers with the job process and the basic environment as well, so that in case a dispute arises, a well-informed decision can be made. In such a case, a hearing is convened where the reviewers hear arguments of both sides and after deliberation submit a non-binding recommendation to the contractors.

Thursday, May 23, 2019

Small Objects: a Literary Analysis of Lullabies for Little Criminals

Small Objects A Literary Analysis of Lullabies for smallish Criminals In Lullabies for Little Criminals, in that location are many small objects that are relevant to Babys life. Objects can have remarkably profound effects on a someones life, whether they are of sentimental value or another form of personal lowlying, they have an impact on us. An object can mean many things to different people. An abandoned doll in a trash bin could be seen as old and ugly to an average person, only when to the person who originally owned the doll it could have been particularly special.In the legend, Heather ONeil illustrates the effects of such objects on Baby and their symbolical meaning. In Lullabies for Little Criminals, there are three objects that represent Babys harvest-feast and change throughout the novel the ragdoll, the knee- high socks, and the toy mice. When introducing her new friend Lauren to her room, Baby reflects on her rag doll, It was a doll that my fetch had bought for m e when she was pregnant . . . The doll also made me feel sweet inside, too, because it made me feel that at some point, charge before I existed, I had been loved (ONeill 97-98).This illustrates Babys longing for a loving mother figure, which is a reasonable expectation from a 12 year old girl. Loving care is a critical need of any child. Baby does not have that feeling of world loved therefore, she denudations comfortableness in the fact that she was once loved. The doll is also representative of her current state of mind. Such as her wishes to be conventionality have normal friends, normal parents, normal family a normal life. When Jules destroys Babys rag doll out of anger, it is symbolic of a lost childhood.Her last reminder of the love her mother had for her had been torn away. Baby says, Now I was nothing, a real nobody (ONeill 119). The destruction of her doll meant that her sense of belonging, that she was once part of a family, was now gone. She seems as if she is bein g pulled into adolescence without having any real sense of true childhood. When the character Alphonse begins to take an involvement in Baby, his first attempt to make Baby take an interest in him is to give her a gift. The gift is a pair of dainty knee-high socks.Baby wants nice things, and these socks were, according to baby, the first pretty things Id invariably owned (ONeill 155). This gift is exhilarating for her. It is an acknowledgment from someone who believed she was attractive, especially coming from Alphonse. According the others in the neighborhood, it was known that Alphonse only looked out for good looking women, so if he took notice of someone, it meant something (ONeill 148). It is particularly clear to the reader that Alphonse managely has ulterior motives, but to baby Alphonse is simply someone who likes her.The socks remind Baby that she is pretty, and she is proud of the fact that an older man found her attractive. In turn, this causes baby to trust Alphonse a nd fall for his manipulation, leading towards what could be a life of prostitution. The socks are symbolic of Baby being forced into adulthood. Baby is mollify young and naive she has no way of understanding what Alphonse is attempting to do. Therefore, the socks may also represent Babys vulnerability and privation of ability to judge character.At this point in the novel, Baby has not had a proper childhood or even learned any of what it means to be a teenage person, and now she is already being pushed into adulthood. After Alphonse dies in the hotel room, Baby does not know what to do. She is lost without an adult. She realizes, Even though I was reservation all the money, it seemed that since he was the adult, he was the only one who could get us a place to stay and food to eat (ONeill 309). It is clear that Baby is still mentally and physically a child, but has taken on the role of an adult.Since there is no longer an adult in her life, she is immediately overwhelmed. She does not guess seeing Jules is a good idea (ONeill 311), however, for some reason she is compelled to go to the shelter in which he is residing in. It seems that Babys situation may be hopeless. Babys arrival to the Mission seems to be the crucial turning point in the novel. She is presented with a family of toy mice, which baby believes to be by far, the scoop out gift Id ever gotten (ONeill 317). An innocent and beautiful gift, which is exactly what Baby needs, something she has not had in an exceptionally long time.The mice are given along with the knowledge that she will be living Juless cousin from now on. The mice represent the possibilities of positive change in Babys life. They are symbolic of hope the possibility that she will find what she needs. In Lullabies for Little Criminals, the use of objects to create symbolic meaning is abundantly evident and illustrates the roles Baby assumes as the novel progresses. She does not experience growing up in the same way most children do. She seems to go from child, to adolescent teen, to adult, in approximately a year.The roles she assumes show her growth in a manner that is unnatural to the reader, and the use of symbolism to show how this process is forced onto her is profound. The symbolism of the toy mice representing change shows Babys net step towards becoming a normal person. The authors use of this immediately after the seemingly darkest point in the novel serves to create an worked up uplift for the reader ultimately allowing the reader to realize that the character is going to be alright. The narrator states, Then Janine stepped over to me and squeezed me hard.I could feel my heart beating when she hugged me against her, but now it felt fine . . . Her big blue eyes looked just like Juless, and I guess mine too. Her green winter jacket smelled like rain (ONeill 330). The final paragraph of the novel shows that Baby will likely get exactly what she wanted Love, a caring person, family, belonging, and mo st importantly, the opportunity to find herself. Work Cited ONeill, Heather. Lullabies for Little Criminals. 1st ed. Toronto Harper Perennial, 2006. Print

Wednesday, May 22, 2019

Business Law Essay

shot approached you for advice on his purchase of a camera. He recently took up picture taking as a hobby and started to look for cameras. Based on his friends suggestion, he went to the IT show last weekend and bought a camera after bargaining with the sales personnel. puppet selected the camera put XYZ from a list of brochures which were distri plainlyed at the entrance of the IT show. The price indicated on the brochure was $1,500.00 with goodies bag worth $350.00 with the words in bold WHILE STOCKS LAST. When Peter approached the sales person, he was intercommunicate that the first batch of cameras at the price of $1,500.00 was sold out in the morning. The sales person suggested that Peter purchase the camera from the next batch but at a higher price of $1,600.00. Peter asked for the best price for the camera and the sales person replied, Best price is $1,550.00 and dont extend to to the brochure any more.This is a different batch. Peter responded that he would buy the came ra immediately if the price could be reduced to $1,500 which was indicated in the brochure. Peter as well mentioned to the sales person that he was picking up photography as a hobby and the camera with its wide range of manual settings was ideal for his photography workshop. As the crowd starting to gather at the stall, the sales person left Peter to attend to other customers. Feeling that the whole episode was a set-up, Peter went to other stalls to check the price of the camera model XYZ. He was surprised to find out that there was indeed a deficit of supply. Peter quickly rushed underpin to the first stall and approached the sales person. The sales person remembered Peter and told him that he only had one camera model XYZ left and it was on a reserve list for another customer.Peter matte desperate and as he did not want to go back empty-handed, he offered to pay $1,600.00 for the camera. The sales person said that the price has gone up to $1,700.00 and there are others who a re keen to pay this price. Peter felt that it was important to get the camera without further hesitation and he finally bought the camera at $1,700.00. Peter encountered the following issues when he started using the camera a) The manual settings function was limited when he compared to the function indicated in the brochure. b) Peters friend is using the same camera model XYZ and when Peter compared the two cameras, Peters camera was indeed of lower quality than that of his friends camera. The brochure states that the camera is of good quality as guaranteed by the manufacturer. Peter does not have any documents from the sales person listing down the functions. Advise Peter on his purchase of the camera, his issues with the camera and his re tune against the stall.(60 label) Performance behave for school-age childs Marks will be awarded for (i) Content a. Clear usage, statement and explanation of relevant legal principles b. Original, clear, logical and convincing discussion on application of the laws to the facts c. bidding of Conclusion d. Appropriate referencing (in text and list of references) (ii) Number and quality of references At least 5 (iii) Organization of answer and writing style (including spelling, grammar, syntax etc). gratify make sure you use Grammar and Spell check functions to check your submissions.INSTRUCTIONS for Continuous Assessment 1 Individual Assignment Deadlines and Guidelines are provided on the course Blackboard site This is an Individual Assignment marked upon 60 marks. Weightage for this assignment 30% of total marks for this module Assignment should be type create verbally using 12 pt ARIAL font and 1.5 line spacing. Word limit is 1200 words (excluding words in references) and must be printed at the end of assignment. CA Submission CAs must be submitted online via student portal. Deadlines, instructions and detailed guidelines are provided on the course Blackboard page. Please read instructions and guidelines p rovided on student portal, Blackboard and in this document carefully. Ignorance of specific directions mentioned in these documents will not be considered as a valid reason which will lead to marks deductions and may lead to failure in the CA component of this course.

Tuesday, May 21, 2019

3-D Password for More Security

ADVANCED E-SECURITY CP5603 MINOR RESEARCH REPORT Submitted By Neeraj Kumar MIT-MBA scholarly person ID. 12682310 TABLE OF CONTENTS Title Page no ABSTRACT 3 INTRODUCTION 2-6 1. 1 earmark 5 1. Authentication Methods 5-6 1. 3 Organization of the decl ar 6 ACTUAL RESEARCH get to 7-8 3D PASSWORD SYSTEM 2. 1 Overview 7 2. 2 Innovative Comp acent 7-8 2. Comparison with Current Authentication Systems 8 execution of instrument OF THE 3D PASSWORD 9-16 3. 1 Virtual Object Recognition 9 3. 2 3D Password Selection and Inputs 10-13 3. 3 3D Virtual Environment Design Guidelines 14-16 APPLICATIONS 17-18 4. Advantages 18 CONCLUSION 19 REFERENCES 20 ABSTRACT Current earmark systems suffer from some weaknesses. Textual watchwords atomic number 18 unremarkably used however, substance absubstance ab exploiters do not follow their requirements. substance abusers tend to choose meaningful words from dictionaries, which make textual newss easy to break and threatened to mental lexicon or brute force attacks.Many available graphic countersigns puddle a tidings piazza that is less than or equal to the textual password space. Smart tease or tokens washbasin be stolen. Many biometric certificates run through been proposed however, users tend to resist using biostatistics because of their intrusiveness and the effect on their privacy. Moreover, biometrics tin basisnot be revoked. In this report mechanism of secure authentication is dicussed. The three-D password is a multifactor authentication turning away. To be authenticated, we present a 3-D practical(prenominal) environment where the user navigates and interacts with non-homogeneous objects.The sequence of actions and interactions toward the objects inwardly the 3-D environment pretends the users 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various eccentric persons of biometrics into a 3-D virtual environm ent. The design of the 3-D virtual environment and the graphic symbol of objects awarded determine the 3-D password key space. INTRODUCTION In this chapter the password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an automated teller) etceteraCurrent authentication systems suffer from many weaknesses. Textual passwords are comm precisely used however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the another(prenominal) return, if a password is hard to guess, then it is often hard to remember. Users suffer difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack.Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical pass words schemes arrest been proposed. The strength of graphical passwords comes from the fact that users can rec whole and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate users graphical password by camera. Token establish systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft.Moreover, the user has to carry the token whenever access required. Biometric scanning is your natural signature and Cards or Tokens prove your validity. save some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning). In this seminar, present and assess our contribution, i. e. , the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual e nvironment where the user navigates and interacts with various objects.The sequence of actions and interactions toward the objects wrong the 3-D environment constructs the users 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space. 1. 1 enfranchisement Authentication is the act of establishing or confirming something as authentic, that is, that claims made by or about the subject are true.This might involve confirming the individuality of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one. For example, when you show correct identification credentials to a bank teller, you are asking to be authenticated to act on be half of the account holder. If your authentication request is approved, you become let to access the accounts of that account holder, but no others. 1. 2 certificate METHODS The first is comparing the attributes of the object itself to what is known about objects of that origin.For example, an art expert might take in for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph. An archaeologist might use carbon geological dating to verify the age of an artifact, do a chemical analysis of the materials used, or compare the style of construction or decoration to other artifacts of similar origin. The physical science of sound and light, and comparison with a known physical environment, can be used to examine the authenticity of audio recordings, photographs, or videos. The second type relies on documentation or other external affirmations.For example, the rules of evidence in criminal courts often require estab lishing the chain of custody of evidence presented. This can be arrant(a) through a written evidence log, or by testimony from the police detectives and forensics staff that handled it. Some antiques are accompanied by certificates attesting to their authenticity. External records have their own problems of forgery and perjury, and are also vulnerable to being separated from the artifact and lost. Currency and other financial instruments commonly use the first type of authentication method.Bills, coins, and cheques incorporate hard-to-duplicate physical features, such as fine printing or engraving, distinctive feel, watermarks, and holographic imagery, which are easy for receivers to verify. Consumer goods such as pharmaceuticals, perfume, panache clothing can use either type of authentication method to prevent counterfeit goods from taking advantage of a popular flaws reputation (damaging the brand owners sales and reputation). A trademark is a legally protected marking or other identifying feature which aids consumers in the identification of genuine brand-name goods. 1. validation OF THE REPORT The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the users 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space.ACTUAL RESEARCH WORK 3D PASSWORD SYSTEM 2. 1 OVERVIEW In this chapter the system consist of multi factor authentication scheme. It can combine all existing authentication schemes into a single 3Dvirtual environment. This 3D virtual environment break offs several objects or items with wh ich the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3D environment constructs the users 3Dpassword.The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be bring out of the users 3D password reflects the users preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password.Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore i t is the users choice and decision to construct the desired and preferred 3D password. 2. 2 INNOVATIVE COMPONENT The proposed system is a multi-factor authentication scheme that combines the bene befits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements.Therefore, to ensure high user acceptability, the users freedom of selection is important. The following requirements are satisfied in the proposed scheme 1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 2. The new scheme provides secrets that are not easy to write flock on paper. Moreover, the scheme secrets should be difficult to share with others. 3. The new scheme provides secrets that can be easily revoked or changed. 2. 3 COMPARISON WITH CURR ENT AUTHENTICATION SYSTEMS Suffer from many weaknesses. Textual passwords are commonly used.Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3D password is a multi-factor authentication scheme.The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more. IMPLEMENTATION 3. 1 VIRTUAL OBJECT RECOGNITION Virtual objects can be any object that we encounter in hearty life. both(prenominal) obvious actions and interactions toward the real life objects can be done in the virtual3Denvironment toward the virtual objects. Moreover, any user input (such as speaking in a specific location) in the virtual 3Denvironment can be considered as a part of the 3Dpassword.We can have the following objects 1) A computer with which the user can type 2) A fingerprint reader that requires the users fingerprint 3) A biometric recognition device 4) A paper or a white board that a user can write, sign, or draw on 5) An automated teller machine (ATM) that requests a token 6) A light that can be switched on/off 7) A television or radio where channels can be selected 8) A staple that can be punched 9) A car that can be driven 10) A book that can be moved from one place to another 11) Any graphical password scheme 12) Any real life object 3) Any forthcoming authentication scheme. The action toward an object (assume a fingerprint recognition device )that exists in location (x1 , y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ),where x1 = x2 , y1 = y2 , and z1 = z2 . Therefore, to perform the legitimate 3Dpassword, the user must follow the same scenario performed by the legitimate user. This direction interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence. 3. 2 3D PASSWORD SELECTION AND INPUTS allow us consider a 3Dvirtual environment space of size G ? G ? G. The 3Denvironment space is represented by the coordinates (x, y, z) ? 1 G? 1 G? 1 G. The objects are distributed in the 3Dvirtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3Dvirtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone. carry on the sequ ence of those actions and interactions using the previous input devices as the users 3Dpassword.For example, consider a user who navigates through the 3Dvirtualenvironment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and o writes it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types FALCON. Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one broadcast in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130).The user then presses the login button. The initial representation of user actions in the 3Dvirtual environment can be recorded as follows (10, 24, 91) put through = Open the office door (10, 24, 91) Action = Close the office door (4, 34, 18) Action = Typing, F (4, 34, 18) Action = Typing, A (4, 34, 18) Action = Typing, L (4, 34, 18) Action = Typing, C (4, 34, 18) Action = Typing, O (4, 34, 18) Action = Typing, N (10, 24, 80) Action = Pick up the pen (1, 18, 80) Action = Drawing, point = (330, 130). Figure 3. 2 Snapshot of an experimental 3-D virtual environmentThe 3-D password is a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. This 3-D virtual environment contains several objects or items with which the user can interact. The type of interaction varies from one item to another. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions. It is the users choice to select which type of authentication techniques will be part of their 3-D password. This is chieved through interacting only with the objects that acquire information that the user is comfortable in providing and ignoring the objec ts that request information that the user prefers not to provide. For example, if an item requests an iris scan and the user is not comfortable in providing such information, the user simply avoids interacting with that item. Moreover, giving the user the freedom of choice as to what type of authentication schemes will be part of their 3-D password and given the large number of objects and items in the environment, the number of possible 3-D passwords will increase.Thus, it becomes much more difficult for the attacker to guess the users 3-D password. Fig 3. 2. 1 State diagram of 3D password 3. 3 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password. The first step in mental synthesis a 3Dpassword system is to design a 3Denvironment that reflects the administration needs and the security requirements. Figure 3. 3 3D virtual environment 1) touchable life-similarityThe prospective 3D virt ual environment should reflect what people are used to seeing in real life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale). Possible actions and interactions toward virtual objects should reflect real life situations. Object responses should be realistic. The target should have a 3D virtual environment that users can interact. 2) Object uniqueness and distinction Every virtual object or item in the 3D virtual environment is different from any other virtual object.The uniqueness comes from the fact that every virtual object has its own attributes such as position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2. However, having similar objects such as 20 computers in one place might confuse the user. Therefore, the design of the 3D virtual environment should consider that every object should be distinguishable from other objects. Similarly, in designing a 3Dvirtual environment, i t should be easy for users to navigate through and to distinguish between objects.The distinguishing factor increases the users recognition of objects. Therefore, it improves the system usability. 3) triplet Dimensional Virtual Environment Size A 3Dvirtual environment can depict a city or even the world. On the other hand, it can depict a space as focused as a single room or office. A large 3D virtual environment will increase the time required by the user to perform a 3Dpassword. Moreover, a large3Dvirtual environment can contain a large number of virtual objects. Therefore, the probable 3Dpassword space broadens.However, a small 3D virtual environment usually contains only a few objects, and thus, performing a 3D password will take less time. 4) Number of objects and their types Part of designing a 3D virtual environment is determining the types of objects and how many objects should be placed in the environment. The types of objects reflect what kind of responses the object wil l have. For simplicity, we can consider requesting a textual password or a fingerprint as an object response type. Selecting the right object response types and the number of objects affects the probable password space of a 3D password. ) System Importance The 3D virtual environment should consider what systems will be protected by a 3D password. The number of objects and the types of objects that have been used in the 3D virtual environment should reflect the importance of the protected system. APPLICATIONS The 3D password can have a password space that is very large compared to other authentication schemes, so the 3D passwords main application domains are defend critical systems and resources. 1. Critical serversMany large organizations have critical servers that are usually protected by a textual password. A 3-D password authentication proposes a sound replacement for a textual password. Moreover, entrances to such locations are usually protected by access cards and sometimes i mmobilise numbers. Therefore, a 3-D password can be used to protect the entrance to such locations and protect the usage of such servers. 2. Nuclear and military facilities- much(prenominal) facilities should be protected by the most powerful authentication systems.The 3D password has a very large probable password space, and since it can contain token, biometrics, recognition, and knowledge based authentications in a single authentication system, it is a sound choice for high aim security locations. 3. Airplanes and jet fighters Because of the possible threat of misusing airplanes and jet fighters for religious, political agendas, usage of such airplanes should be protected by a powerful authentication system. In addition, 3D passwords can be used in less critical systems because the 3D virtual environment can be designed to fit to any system needs.A small virtual environment can be used in the following systems like Some other application areas ATM Desktop Computers laptop lo gins Web Authentication 4. 1 ADVANTAGES * Easy to memorize Users can memorize a 3D password as a subatomic story which makes the password easy to remember * Flexibility 3d passwords allows multi-factor authentication. Smart cards, biometrics and alpha num. password can embedded in the 3d password technology * Strength A scenario in a 3D environment offers as almost unlimited combination of possibilities.As such system can have specific 3d world, hack are extremely difficult. * The 3D password gives users the freedom of selecting what type of authentication techniques. * Secrets those are not easy to write exhaust on paper. * The scheme secrets should be difficult to share with others. * Provide secrets that can be easily revoked or changed. CONCLUSION There are many authentication schemes in the current state. Some of them are based on users physical and behavioral properties, and some other authentication schemes are based on users knowledge such as textual and graphical passwor ds.Moreover, there are some other important authentication schemes that are based on what you have, such as smart cards. Among the various authentication schemes, textual password and token-based schemes, or the combination of both, are commonly applied. However, as mentioned before, both authentication schemes are vulnerable to certain attacks. Moreover, there are many authentication schemes that are currently under study and they may require redundant time and effort to be applicable for commercial use.In this report the 3D password mechanism is explained the 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes. REF ERENCES 1 X. Suo, Y. Zhu, and G. S. Owen, Graphical passwords A survey, in Proc. 1st Annual . Comput. Security Appl. Conf. , Dec. 59, 2005, pp. 463472. 2 D. V. Klein, Foiling the cracker A survey of, and improvement to passwords security, in Proc. USENIX Security Workshop, 2008, Measurement,VOL. 57,September 2008. 3 NBC news, ATM Fraud Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003. 4 T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). ATMMarketPlace. com. 6 G. E. Blonder, Graphical password, U. S. Patent 5 559 961,Sep. 24, 1996. 7 http//en. wikipedia. org/wiki/3-D_Secure

Monday, May 20, 2019

Child and Young Person Development Cyp3.1.A1: Pattern of Development Essay

The sequence of festering is the order in which development occurs. The rate of development is the speed at which development occurs. Every fry is unique and will develop at their give rate. Children will ordinarily follow the same pattern of development but the rate at which they reach their milestones may interchange depending on the individual and their ability. It is important to recognise the difference so when recording the rate of development you gage identify any concerns that you may have within the development area and this allows you to plan effectively for the individual. take to 1 month Makes basic distinctions in vision, hearing, smelling, tasting, touch, temperature, and perception of pain Helpless Fed by amaze 2 months to 3 months Colour perception, visual exploration, oral exploration Sounds cries, coos, grunts Control of eye muscles Smiles 4 months to 6 months Recognises sounds Control of head and arm movement s stooge grasp objects Rolls over Enjoys universe cuddled Can distinguish surrounded by familiar people and strangers 7 months to 9 months Sits without support Crawls around Has emotional attachment to mother Protests interval from mother 10 months to 12 months Control of legs and feet Can stand up Says one or ii words and can imitate sounds Responds to simple commands Curious and wanting to explore Has a fear of strangers Responds to own name Gives and takes objects 1 year to 1 1/2 years Climb stairs Makes lines on paper with a crayon Upset when separated from mother Feeds himself Repeats a few words Obeys curb commands 1 1/2 to 2 years Can run and kicks a ball Can build a 6 mental block tower Capable of bowel and bladder control Has a vocabulary of more than 200 words Can throw temper tantrums Does the opposite of what they are told 2 years to 3 years Jumps off a step Rides a tricy cle Builds a 9-10 cube tower. Starts to use short sentences Differentiates facial expressions of anger, sorrow, and joy. Has a Sense of humour Enjoys imparting alongside another child 3 years to 4 years Stands on one leg Can draw a circle and a cross Self-sufficient in many routines of home life Likes to share Starts to play with other children 4 years to 5 years Skips Broad jumps Dresses themselves Talks clearly and uses mature voice communication sounds Knows over 2,000 words Understands responsibility and feels guilt Feels pride in accomplishment Prefers to play with other children Becomes hawkish 6 years of age Can read and write simple text Focus on only one issue at a beat when solving problems Become increasingly well-disposed 7 years to 8 years Begin to show a preference for a definite learning style Like to be involved in some group play, but necessitate time alone, too Have rapidly chan ging emotions Well-developed speech and use correct grammar most of the time 8 years to 10 years Know the complete date (day of the week, day of the month, month, and year) Enjoy being with friends and often have a best friend of the same gender Have speech patterns that are nearly at an adult level Have good control of large and small muscles 10 years to 12 years Boys become taller and thinner Girls become taller and more shapely Thinks in a more logical sophisticated way Puberty Interest in the opposite sex increase need for privacy 12 to 16 years Beginning of adolescents Intense and rapid growth development Builds skills to become self-sufficient May be strongly invested in a single, romantic relationship 16 years to 19 years Complete puberty and the physical transition from childhood to adulthood get through cognitive maturity the ability to make decisions based on knowledge of options and their consequences R each nearly their adult height, especially females. Males continue to grow taller into their early twenties

Sunday, May 19, 2019

Atomic Structure

The Rutherford Model of the Atom 1. In 1911 Rutherford proposed the nuclear model of subdivisionic structure. He suggested that an atom consists of a central nucleus (where nearly of the atomic reactor of the atom is concentrated) having a positive dissipate, surrounded by woful electrons carrying negative charge. Geiger and Marsden carried out an experiment to command his proposal. The Geiger/Marsden a Particle Scattering experiment 1. The apparatus is illustrated in the draw be diminished. 2. The apparatus was in an evacuated container.The demodulator was a ZnS screen observed finished a low power microscope. Each time an of import particle hit the screen, a sm totally flash of lite was produced. 3. The detector was mounted on a support such that it could be rotated to measure the angulate deflection of the important particles as they passed with a very thin sheet of gold. They measured the come of particles deflected through various angles. 4. It was found that mos t of ? particles pass through the gold undeflected only a comparatively small number are deflected (scattered). 5.Their results were considered to streng therefore Rutherfords model and allowed them to estimate the coat of the nucleus (greater than 10-14m) and the size of the atom (greater than10-10m), thus producing the slightly surprise conclusion the most of the space occupied by an atom is empty space Closest entree of an Alpha Particle to a Nucleus 1. For a presumption locomote of important particle, the closest progress to a nucleus, rmin, will occur when the initial direction of trend of the particle is along the line connective the centers of particle and nucleus. 2. In this case, at the point of closest approach, the move of the particle is zero. 3. As the particle approaches the nucleus, energizing energy is being converted to electric car caral potential energy. K. E. befogged = E. P. E. gained 4. Electrical potential at a distance r from a point charge Q is accustomed by 5. For a nucleus of atomic number Z, the charge is Ze, where e is the magnitude of the charge on unmatched proton (the same as the magnitude of the charge on an electron). 6. The magnitude of the charge on an alpha particle is 2e 7.Therefore, the energy, w, possessed by an alpha particle placed at distance, rmin, from a charge Ze is given(p) by 8. So, we have which gives Millikans Experiment to Measure the Charge on one Electron 1. The diagram below is a very alter representation of Millikans apparatus. 2. Small drops of oil were allowed to fall into a region in the midst of two metallic element plates, (the top plate had a hole in it). 3. rough of the drops became charged by friction. Further ionisation was caused by a beam of x lances. 4.Millikan measured the end speed of a drop as it fell through the air, with V = 0. From this he could calculate the gas constant of the drop (and hence its mass). He thence applied a voltage, V, to the plates and measu red the new final stage speed of the same drop. 5. The change in the terminal speed of the drop was used to calculate the magnitude of the charge on the drop. 6. When many measurements had been done, all the charges were found to be integral multiples of a basic unit of measurement of charge, assumed to be the charge on one electron. 7.The honour, e, is approximately -1. 6? 10-19 C. 8. A simplified stochastic vari equal of Millikans experiment can be done by finding the voltage needed to proficient hold an oil drop stationary between the two plates. 9. Consider a drop having a charge q and mass m. 10. If the drop is stationary, then the two forces acting on it have equal magnitudes. where E is the field strength. 11. Now, , where d is the distance between the plates, Therefore The Electron Volt (eV) 1. The electron Volt is a unit of bat (or energy) much small than the Joule. 2.If 1electron moves through a potential difference of 1V then 1eV of mesh is done. Relation betwee n the Joule and the electron Volt 1. Potential difference is go done per unit charge so, . 1 J is the work done when 1C moves through a p. d. of 1V. 2. The charge on one electron is -1. 6? 10-19 C. 3. Therefore 1eV is the work done when 16? 10-19C moves through a p. d. of 1V. This government agency that . 4. To convert energy in J to energy in eV, Experiment to measure the Charge to concourse Ratio of Electrons 1. The method proposed here is kindred to that used by J. J. Thomson in 1897.Electrons in an evacuated tube (a cathode ray tube) are sent towards a region of space where there are electric and magnetized fields at 90 to severally other. If the field strengths have a particular ratio then charged particles can pass through them undeflected. 2. In the following analysis V = voltage accelerating the electrons and producing the electric field between the plates v = speed of the electrons m = mass of one electron and e = charge on one electron E = electric field str ength (E = where d = distance between plates) B = magnetised flux constriction 3. If the electrons pass undeflected (magnitude of electric force equal to magnitude of magnetic force), then it can easily be shown that 4. To find the speed of the electrons, remember that during acceleration the electrons are losing electric P. E. and gaining K. E. E. P. E. lost = K. E. gained eV = 5. Therefore, 6. Combining equations 1 and 2 to eliminate v gives, 7. Thus, using his experimental apparatus, Thomson was able to determine the charge-to-mass ratio of the electron. Today, the accepted value of is C kg-1.Atomic StructureThe Rutherford Model of the Atom 1. In 1911 Rutherford proposed the nuclear model of atomic structure. He suggested that an atom consists of a central nucleus (where most of the mass of the atom is concentrated) having a positive charge, surrounded by moving electrons carrying negative charge. Geiger and Marsden carried out an experiment to verify his proposal. T he Geiger/Marsden a Particle Scattering Experiment 1. The apparatus is illustrated in the diagram below. 2. The apparatus was in an evacuated container.The detector was a ZnS screen observed through a low power microscope. Each time an alpha particle hit the screen, a small flash of light was produced. 3. The detector was mounted on a support such that it could be rotated to measure the angular deflection of the alpha particles as they passed through a very thin sheet of gold. They measured the numbers of particles deflected through various angles. 4. It was found that most of ? particles pass through the gold undeflected only a relatively small number are deflected (scattered). 5.Their results were considered to confirm Rutherfords model and allowed them to estimate the size of the nucleus (greater than 10-14m) and the size of the atom (greater than10-10m), thus producing the slightly surprising conclusion the most of the space occupied by an atom is empty space Closest Approach o f an Alpha Particle to a Nucleus 1. For a given speed of alpha particle, the closest approach to a nucleus, rmin, will occur when the initial direction of motion of the particle is along the line joining the centers of particle and nucleus. 2. In this case, at the point of closest approach, the speed of the particle is zero. 3. As the particle approaches the nucleus, kinetic energy is being converted to electrical potential energy. K. E. lost = E. P. E. gained 4. Electrical potential at a distance r from a point charge Q is given by 5. For a nucleus of atomic number Z, the charge is Ze, where e is the magnitude of the charge on one proton (the same as the magnitude of the charge on an electron). 6. The magnitude of the charge on an alpha particle is 2e 7.Therefore, the energy, w, possessed by an alpha particle placed at distance, rmin, from a charge Ze is given by 8. So, we have which gives Millikans Experiment to Measure the Charge on one Electron 1. The diagram below is a very simplified representation of Millikans apparatus. 2. Small drops of oil were allowed to fall into a region between two metal plates, (the top plate had a hole in it). 3. Some of the drops became charged by friction. Further ionization was caused by a beam of x rays. 4.Millikan measured the terminal speed of a drop as it fell through the air, with V = 0. From this he could calculate the radius of the drop (and hence its mass). He then applied a voltage, V, to the plates and measured the new terminal speed of the same drop. 5. The change in the terminal speed of the drop was used to calculate the magnitude of the charge on the drop. 6. When many measurements had been done, all the charges were found to be integral multiples of a basic unit of charge, assumed to be the charge on one electron. 7.The value, e, is approximately -1. 6? 10-19 C. 8. A simplified version of Millikans experiment can be done by finding the voltage needed to just hold an oil drop stationary between the two pla tes. 9. Consider a drop having a charge q and mass m. 10. If the drop is stationary, then the two forces acting on it have equal magnitudes. where E is the field strength. 11. Now, , where d is the distance between the plates, Therefore The Electron Volt (eV) 1. The electron Volt is a unit of work (or energy) much smaller than the Joule. 2.If 1electron moves through a potential difference of 1V then 1eV of work is done. Relation between the Joule and the electron Volt 1. Potential difference is work done per unit charge so, . 1 J is the work done when 1C moves through a p. d. of 1V. 2. The charge on one electron is -1. 6? 10-19 C. 3. Therefore 1eV is the work done when 16? 10-19C moves through a p. d. of 1V. This means that . 4. To convert energy in J to energy in eV, Experiment to measure the Charge to Mass Ratio of Electrons 1. The method proposed here is similar to that used by J. J. Thomson in 1897.Electrons in an evacuated tube (a cathode ray tube) are sent towards a region of space where there are electric and magnetic fields at 90 to each other. If the field strengths have a particular ratio then charged particles can pass through them undeflected. 2. In the following analysis V = voltage accelerating the electrons and producing the electric field between the plates v = speed of the electrons m = mass of one electron and e = charge on one electron E = electric field strength (E = where d = distance between plates) B = magnetic flux density 3. If the electrons pass undeflected (magnitude of electric force equal to magnitude of magnetic force), then it can easily be shown that 4. To find the speed of the electrons, remember that during acceleration the electrons are losing electric P. E. and gaining K. E. E. P. E. lost = K. E. gained eV = 5. Therefore, 6. Combining equations 1 and 2 to eliminate v gives, 7. Thus, using his experimental apparatus, Thomson was able to determine the charge-to-mass ratio of the electron. Today, the accept ed value of is C kg-1.

Saturday, May 18, 2019

A Jack of All Trades

They say that Asian countries, especially those belonging to the third world, have low education standards and dont speak English at all. Id manage to go through this opportunity to disprove that myth.Im a full-blood middle class Indian, born in unused Delhi, India, to an army officer and a nurse. Id say that Im very rosy-cheeked because my parents were able to put me in a good school and was able to study until the 8th grade. It is certain that India belongs to the third world country due to poverty so a lot of families hobot afford to put their children into nice schools. There are a number of good schools in India and I was fortunate enough to have studied in one. The intensive curriculum in my school develop my IQ especially in the field of science and mathematics.When my family and I moved to Boston, Massachusetts in 2004, my schoolmates tack together it truly astounding that Indians could speak and write well in English too. This is for the fact that English is Indias second language. There are a lot of dialects in India alone, but that doesnt mean English is not a language spoken on that point.They found how studious and passionate I am with my studies and how I passed with flying colors too. On top of that, they were pretty amazed that a poindexter like me is actually a sports fanatic too. I was able to combine studies and sports, doing well in both at the same time. In fact, I joined the soccer and tennis teams and was able to significantly contribute to the success of both teams. I even lost 30 lbs. discover of it.I remember how I used to doubt Id be qualified to join the teams, but I got in after the tryouts. It is, indeed, very surd for students to combine school and sports at the same time. Id say I was very high to show my schoolmates that an Indian like me can excel in a lot of fields, thus presentation that the education standard in India shouldnt be underestimated. The to a greater extent I join teams and mingle with schoolmates, the more I learn about American culture.Eventually, my dad found a new job in Austin, Texas, so my family and I had to relocate. I went to Westwood high school, which is one of the best schools in the US, and I found out that the curriculum there challenged me intellectually and physically.I decided to quit sports when I went to junior high because I took up 5 AP classes. I took up AP Chemistry, AP English, AP Physics, AP Statistics and AP Computer Science classes. The standard of the school is very high, so is the aim of difficulty. At first, I found the curriculum too challenging, but I came to realize the advantages of finishing at Westwood high school.I realized that the intensive curriculum could work to my advantage in the future, so I pursue studying well. I even compared Westwood high school to my previous school in Massachusetts. Thus, I am very proud to have finished with flying colors in Westwood high school.All the experiences Ive deceased through had made me a jack o f all trades. I was able to prove I can excel in all fields I wish to pursue. The culture I grew up with in India had given me special traits that made me go through the hardest challenges in life with ease and gratitude.My parents were always there to help me, and because of this, Im forever indebted. I want to make them prouder, so I am taking this opportunity to explore greater chances of earning a degree that could help me in my desired duty one day.I am also very grateful that America has given opportunities to Asians like me for better education, and act excellence in my studies will not only make America proud they have produced graduates like me, but will also make my motherland, India, proudest.