Saturday, October 5, 2019

Nigerian Politics as a Basis of the Case Study on African Politics Research Paper

Nigerian Politics as a Basis of the Case Study on African Politics - Research Paper Example This paper endeavors to help understand the nuances of Nigerian politics. To be able to achieve this it is important to dwell briefly on its colonial days. By 1914 the British had control over almost all of Nigeria except for Kamerun, which went through various sporadic invasions by the Germans and other. Prior to that Nigeria had already established itself as a prime producer of Palm oil and enjoyed elitist status among other countries in the continent having abolished the slave trade much before the rest of Africa. The prominent kingdoms in Nigeria at that time â€Å"were the Northeastern kingdom of Borno, the Hausa city-state/kingdoms of Katsina, Kano, Zaria, and Gobir in northern-central Nigeria, the Yoruba city-states/kingdoms of Ife, Oyo, and Ijebu in southwestern Nigeria, the southern kingdom of Benin, and the Igbo communities of eastern Nigeria.† (iss.co). With the abolition of slave trade they were now able to expand their trade routes and traded all the way across th e Sahara. When Britain took over a Nigerian legislative council was formed with minimum African representation. The Northern and Southern territories were merged into one and native leaders still continued their rule under the supervision of the colonial leaders. This however brought about several ethnic and religious conflicts and finally in order to curb the strife a new constitution under the United Kingdom divided Nigeria into Eastern, Western and Northern regions. This was done mainly to accommodate the powerful ethnic tribes of Igbo in the east; Yoruba in the west and the Hausa and Fulani ethnic groups in the north. The rise of independent freedom fighter groups was inevitable and a federal government established in 1954 and Nigeria evolved into a self-governing federation. The political system of Nigeria at that time was that of a Federal government which governed the various autonomous regions. This was until Nigeria attained Independence in 1960. Nigeria Post- Independence Nigeria Post Independence experimented with various political systems in an attempt to maintain political stability while giving freedom for its various and diverse ethnic groups to express and exercise their rights freely. Post Colonial rule there began a struggle for power by the regions which were non-centralized or issued stateless by the British. The centralized regions had established a formal rule and because of the power of indirect rule given by the British to their native leaders, there was no conflict between the ruled and the rulers. The demarcation thus established was based on power, social and economic status. The non-centralized regions however were divided in their various political ideologies and religious and cultural practices. These regions

Friday, October 4, 2019

Investing in Gold and Silver Essay Example | Topics and Well Written Essays - 1000 words

Investing in Gold and Silver - Essay Example By depositing the gold and silver into the respective banks of nations, it was replaced with paper money based on the value of the gold and silver they deposited (Dunwiddle, 2008). The problem started to arise when the World War closed in and the countries required huge amounts of resources to fund the wars. Prior to the World War, the gold standard was in place in most of the countries. Gold Standard, as explained above is when people could convert their gold into paper money. Hence, the government is restricted in the amount of paper money it could print. The advantage of this gold standard upholds is that the inflation is kept under check, as the supply of money is limited (Haynes, 2005). To fund the war the United Kingdom and the United States both abandoned the Gold Standard, in 1920s and 1933 respectively. This was replaced by the Gold Exchange Standard, through which countries did no longer hold reserves in actual gold, but in dollars and pounds. Thus putting these currencies in a strong position in the world, while the other countries kept on piling up foreign currency thinking they were good as gold. In 1974 to further cut the ties between gold and currency, US government of Nixon abolished the link. Due to the need of yet more funds for the Vietnam War, the government abolished this link. The effects of this final blow, led to high inflation further helping the government and big businesses. Leslie Snyder in her book, â€Å"Why Gold? The One Sure Cure for Inflation and Economic Tyranny† named inflation as a vicious form of taxation on the common people, while the big corporations and government are the beneficiaries (Snyder, 1974). The importance and relevance of this historical background of Gold and Silver, is to understand how valuable gold and silver is even today. One thing to keep in mind is that even though the abolishment led to high inflation and budget deficits during the 1970s, the prices of gold and silver also increased with it. He nce the investment in silver and more importantly gold is always a safe bet. When inflation was at the highest in the United States during 1979 and 1980 the return on the gold was 130.4% on an average. It is a great hedge against high inflation; this holds true for the current market situation as well (BERU). Currently, the central banks are planning to announce unlimited liquidity to the financial sector. This would further fuel inflation and move it a step closer towards hyperinflation and top of the exhaustion of the savings and diminishing purchasing power, the metals such as Gold and Silver will emerge as winners. This is due to fact that the governments and central banks continue to print more and more money. According to William Bancroft, the gold is undervalued today in terms of the money being published. Considering this scenario the investors in the mining sector will be rewarded handsomely in the future. The opposite side of inflation is deflation. According to Bancroft, not only will a high inflation have a positive impact on gold, but a deflation will result in a desirable outcome. Due to the economics of deflation, it would put high pressures on the banks. Resulting in bank failures, depositors will find other means to safeguard their money. As history has shown, there is no safer investment than gold and silver. Due to the nature and high performance of these metals, gold and silver in tough times i.e., especially in times of hyperinflation is why most advisors encourage

Thursday, October 3, 2019

Is3440 Project Part 1 Essay Example for Free

Is3440 Project Part 1 Essay First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure. Some examples of open source software that we might use are: Web Server Apache Web Filtering DansGuardian Network Firewall Turtle Firewall VPN Endian Firewall Community IDS/IPS Suricata Database MySQL File Server Samba SMTP Server hMailServer I would recommend that we use a Defense in Depth strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a de-militarized zone (DMZ). We need to have a network firewall between our DMZ and our internal network, bet ween the outside world and our internal network, and between our DMZ and the outside world. There should also be a local firewall enabled on each local machine. Also, since our physical servers will be hosted at a third party location, we must have VPN access to these servers to manage them. All private data will need to be encrypted, as well as all data transitions. To go along with the previously mentioned physical and software based security measures, we will also apply multiple policies to maintain this security. Acceptable Use  Policy This policy will describe how the companies IT assets should and can be used. As well as what is not acceptable to do on company assets. Password Policy This policy will explain what parameters a password must meet to be accepted. For example; a password must be at least 15 characters long have at least on capital letter, have at least one lower case letter, have at least one number, and have at least on symbol. Privacy Policy This policy describes what information must remain confidential. Training employees on the proper way to use (and how NOT to use) company assets is a major key to ensuring the CIA triad remains intact and our network secure. In this part of the executive summary, I am going to be explaining, and making recommendations on what the best options are for the open source software that is needed for the management of the First World Savings and Loan financial institutes various web and application servers. For each of the servers, I recomm end using the Red Hat Enterprise Linux operating system for a number of reasons. The main ones being that it is one of the most secure, Its backed by years of technical support, Its supported by a vast number of different hardware, and It is one of the most, if not the most, popular and used server OSs that one can get today. I would rather go with software that has been vigorously tested to its breaking point and still remains at the top tier of server software options thats readily available today, than one that has just come out with all of the bells and whistles. So on that note, lets get started on what I recommend to be the best of the best in terms of specific software and service needs. There are numerous great open source software solutions for database servers, like, H2, HyperSQL, MySQL, mysql, Oracle, and PostgreSQL, just to name a few. They all offer topnotch functionality, performance, scalability, and security. As far as which one is the best, I recommend PostgreSQL. PostgreSQL is an object-relational Database software solution that offers some of t he most feature rich options as compared to the bigger commercial manufacturers like Oracle, IBM, Sybase and Informix, and the best part of it, its free. Its also one of the first database software that was released, and it has a proven track record with over 23 years of active development. It was created back in 1989. The only other DB software that came out before it is Oracle, which was created back in 1979. Now PostgreSQL might not be the fastest, but It more than makes up for it with its functionality. It allows the use of two  different types of interfaces, a GUI (for those who like the point-click style) and a SQL. It works on most OSs like windows, Linux, Mac, Unix, etc. It has a vast array of services and tools that is included to streamline the administration of the Database. Here are just some examples; Full ACID (Atomicity, Consistency, Isolation, Durability) compliancy, commercial noncommercial support, triggers support, user defined data type support, stored procedure support, online backup, multiple index type input support, embedded access controls, encryption, etc. Here is a comparison of the top DB software available I got from the unbiased, data-driven comparison website; www.findthebest.com/database-management-sytems: - Specifications Product | MySQL | Oracle | PostgreSQL | Architecture | Relational Model | Relational Model | Object-relational Model | Software License | * GPL * PostgreSQL * Proprietary | * GPL * PostgreSQL * Proprietary | * GPL * PostgreSQL * Proprietary | Operating System | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | Demo? | | | | Interface | * GUI * SQL | * GUI * SQL | * GUI * SQL | Website | MySQL (mysql.com) | Oracle (oracle.com) | PostgreSQL (postgresql.org) | First Public Release Year | 1995 | 1979 | 1989 | Lastest Stable Version | 5.5.19 | 11g Release 2 | 9.1.3 | - -Price Price | $0 | $180 | $0 | Purchase Page | MySQL (https) | Oracle (https) | | - -General Features Features | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | Indexes | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | Database Capabilities | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | Partitioning | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | Access Control | * Audit * Brute-force Protection * Enterprise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | * Audit * Brute-force Protection * Enterprise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | * Audit * Brute-force Protection * Enterpr ise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | Tables and Views | * Materialized Views * Temporary Table | * Materialized Views * Temporary Table | * Materialized Views * Temporary Table | Other Objects | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | Support Features | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | - -Product Description Product Description | MySQL is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. MySQL is officially pronounced /maÉ ªÃ‹Å'É›skjuË Ã‹Ë†Ã‰â€ºl/ (My S-Q-L), but is often also pronounced /maÉ ªÃ‹Ë†siË kwÉ™l/ (My Sequel). It is named for original developer Michael Wideniuss daughter My. | Oracle Database 11g Release 2 provides the foundation for IT to successfully deliver more information with higher quality of service, reduce the risk of change within IT, and make more efficient use of their IT budgets. By deploying Oracle Database 11g Release 2 as their data management foundation, organizations can utilize the full power of the worlds leading database to:ï‚ · Reduce server costs by a factor of 5ï‚ · Reduce storage requirements by a factor of 12ï‚ · Improve mission critical systems performance by a factor of 10ï‚ · Increase DBA productivity by a factor of 2ï‚ · Eliminate idle redundancy i n the data center, andï‚ · Simplify their overall IT software portfolio. | PostgreSQL is a powerful, open source object-relational database system. It has more than 15 years of active development and a proven architecture that has earned it a strong reputation for reliability, data integrity, and correctness. It runs on all major operating systems, including Linux, UNIX (AIX, BSD, HP-UX, SGI IRIX, Mac OS X, Solaris, Tru64), and Windows. It is fully ACID compliant, has full support for foreign keys, joins, views, triggers, and stored procedures (in multiple languages). It includes most SQL:2008 data types, including INTEGER, NUMERIC, BOOLEAN, CHAR, VARCHAR, DATE, INTERVAL, and TIMESTAMP. It also supports storage of binary large objects, including pictures, sounds, or video. It has native programming interfaces for C/C++, Java, .Net, Perl, Python, Ruby, Tcl, ODBC, among others, and exceptional documentation. | - -Contact Information Contact Link | MySQL (mysql.com) | Oracle (oracle.com) | PostgreSQL (postgresql.org) | Phone | 1 (866) 221-0634 | 1 (800) 392-2999 | | - -Limits Max Blob/Clob Size | 4 GB | Unlimited | 1 GB (text, bytea) stored inline or 2 GB (stored in pg_largeobject) | Max CHAR Size | 64 KB (text) | 4000 B | 1 GB | Max Column Name Size | 64 | 30 | 63 | Max Columns per Row | 4096 | 1000 | 250-1600 depending on type | Max DATE Value | 9999 | 9999 | 5874897 | Max DB Size | Unlimited | Unlimited | Unlimited | Max NUMBER Size | 64 bits | 126 bits | Unlimited | Max Row Size | 64 KB | 8KB | 1.6 TB | Max Table Size | MyISAM storage limits: 256TB; Innodb storage limits: 64TB | 4 GB | 32 TB | Min DATE Value | 1000 | -4712 | -4713 | - -Data Types Type System | * Dynamic * Static | * Dynamic * Static | * Dynamic * Static | Integer | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | Floating Point | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | Decimal | * DECIMAL * NUMERIC | * DECIMAL * NUMERIC | * DECIMAL * NUMERIC | String | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | Binary | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLO B * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLOB * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLOB * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | Date/Time | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | Boolean | * BOOLEAN * Unknown | * BOOLEAN * Unknown | * BOOLEAN * Unknown | Other | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | I think its pretty obvious that the data speaks for itself. You cant get any better option unless you want to pay big money for these specific services. When it comes to deciding on which open source web server software to utilize, there are a lot of different options, such as, Apache, LightTPD, NGiNX, Boa, Cherokee, etc. The one that stands out the most is Apache. Apache is the most popular web server to date. It is the leading web server that is used most over all others including open source and non-open source options, such as, Microsofts IIS, Googles proprietary custom servers, NGiNX, AOL, IBM, etc. according to the website www.makeuseof.com. Here is a graph table I found (its a little dated) to give you an idea: Apache is the leader because of its functionality, performance, price (its free), stability, and security. It has top notch cross-plat forming capabilities so it can be used on numerous operating systems like, Microsofts Windows platform, Linux and UNIX based platforms, Macintosh platforms, BSD platforms, IBM platforms, HP platforms, etc. It can basically run on just about all OS platforms. This is ideal in todays ever evolving business needs and requirements. Some of the best features that an Apache web server offers are as follows: Basic access authentication digest access authentication, SSL/TLS HTTPS, virtual hosting, CGI, FCGI, SCGI, Java, SSI, ISAPI, runs in user space versus kernel space, Administration console, and IPv4 IPv6 addressing. Now these are just some of the feature sets that Apache uses. It helps that most, if not all, of these features are security based; which is most important when dealing with IT in any aspect of todays business world and society itself. There are a lot of different options when it comes to file servers. Some examples are, FileZilla, Samba,  HFS, TurnKey, Cerberus, VSFTPD, etc. As far as whats the best file server software options it boils down to the companys needs. I recommend using Samba or FileZilla for a number of reasons. Samba has over 20 years of development and FileZilla has over 10 years of development, They both offer amazing cross-plat forming capabilities on several different operating systems, They are both pretty easy to setup and administer, they both offer great security, and best of all they are free. This is extremely important for a modern business. Also the fact that they are free helps in cutting down company costs and drives up financial gains throughout the en tire company. Plus, Samba speaks natively with Microsoft Windows machines and these are typically what most end users use for their operating systems. Now for the open source SMTP server software I recommend using iRedMail. iRedMail offers two different options, iRedMail (which is free) iRedMailPro (which is a paid version for $299 per server per year) with amazing fully fledged features. The feature include: blazing fast deployment (less than 1 minute), easy to use, security and stability, mind-blowing productivity (uses a very little resources to run), top notch support, absolute control over data (all personal data is stored on companys hard disk versus some third party storage medium), supports virtualization and non-virtualization software (VMware, Xen, VirtualBox, KVM, OpenVZ, etc. with i386 and x86/x64/ amd64 compatibility), low maintenance, unlimited accounts, stores mail in openLDAP, MySQL, and PostgreSQL, Service and access restrictions, throttling, Anti-Spam Anti-Virus by default, Web mail, backup support, and security (forced password change policy for every 90 days, uses SSL/TLS connections for sending and receiving mail, etc.). The support offered for iRedMail is among the best and in the business world, this is a must. The LDAP server I recommend is Red Hat Directory Server because it offers some of the best features to date. Its also has some of the best support in the business. It has an amazing reputation as well. Here is a list of the features that it offers: cost-savings, tremendous scalability (Allows 4-way multimaster replication of data across the entire enterprise while providing centralized, consistent data, and allows extranet applications), enhanced security (provides centralized, fine-grained access controls, and utilizes strong certificate-based authentication encryption.), and amazing productivity (centralizes user identity and  applications for ease of access for administration), you can’t go wrong with using software from a national ly known and reputable company like Red Hat Linux. Each user will be put into groups; this will be done to control access to the file system. Each user on the network will have to meet the standards below. Having each user in groups will help manage them, and what they have access and are allowed to do on the server. Each user will have their own partitioned /home directory to reduce impact of the file system. No user should be without a group, any users without groups will only have access to only their home directory. The following is the password policy they will be using: User account Standard users: Restrict reuse of passwords to once per 18 months Set min day for password expire Set max day for password expire every 30 days Set password complexity to require 1 capital letter, 1 lower case letter, 1 number, 1 symbol and must be at least 15 characters long Enforce password policies Ensure all users do not have access to sudo, or su rights  Create groups for all users, and give them allow sups or admins to maintain rights to those groups, and allow them specific path use on sudo (only if needed). This will allow users to access the data they need to complete their jobs. Also with this password system in place, it will ensure they do not use simple passwords or recycle passwords too often. Super users: Rights to manage groups Specific path use of sudo Restrict reuse of passwords Set min day for password expire Set max day for password expire Set password complexity Enforce password policies These will help super users to manage groups and have access to the tools that they need. This also prevents the users from having too much access to the systems. This helps the admin manage groups by allowing them to move users into the correct group or give them access to specific files that they may need access to. Su will only be used by top level admins, and only if something is truly not working. Lower level admins will have sudo access to files they need to have access to. Users will only have read/write access to the files they need access to; the rest will be read only access. Kernel will be locked down and will need admin permission to access. Passwd file will not be accessible by anyone other than top level admins Firewall and iptables will only be accessible by top level admins and super users. Configuring our network in this manner and applying these user access control permissions will cost less money and add a greater level of security. Using this Defense in Depth strategy, we will have multiple layers of security that an attacker will have to penetrate to break the CIA triad.

The Impact Of Computers In Our Daily Lives Computer Science Essay

The Impact Of Computers In Our Daily Lives Computer Science Essay Computers are commonly used items in many fields in our present world as will be in the future. Since the ages of the fathers of computers like Blaise Pascal and Charles Babbage. These machines have proven to be very essential or important and significant especially for people who run large organizations and industries, but also to the individuals themselves. Computers have affected our lives in a great deal in that almost every thing now is either run by or made by computers. For instance, in large industries, cars and space exploration devices and machines are designed by the use of computers, in hospitals where medical billings, patient admittance and other medical equipments are run and made by computers; traffic lights that run the city traffic are run by computers. One of the major impacts of computer is communication. The level of communication has gone higher through computer as now you can be connected with friends and family around the world, many business deals and conference is now made through the help of computer. Nevertheless the entertainment world would not have been as successful as it is if it weren`t for computers, because movies these days require a lot of animations and use of graphics to create effects. So basically the whole universe is a computerized universe as it is right now. Even back in the late years of 1600 to 1800, the people saw that life was becoming complex and so they needed to create something that would help them solve the complex problems and mathematics so they wouldn`t have to solve them manually. And so they came up with calculators which could only add and subtract mathematical problems. And the more the technology grew the more computers became important in their daily lives to the present. Computers have changed man a lot. It has helped man to step in to the future. Though computers have been said to take away man power, still computers have managed to make the impossible possible. In the upcoming paragraphs I will be talking about how computers have impacted on different fields.C:Program FilesMicrosoft OfficeMEDIACAGCAT10j0315447.jpg C:UsersRahatAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5Q0IF2038MC900357275[1].wmfC:Program FilesMicrosoft OfficeMEDIACAGCAT10j0233018.wmfC:UsersRahatAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5LVY57DLOMP900315661[1].jpgC:UsersRahatAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5E5WK0490MC900090300[1].wmf IN BUSINESS FIELD In today`s life computers have impacted many fields such as the business fields. Many business organizations need computer to keep track of accounts, money and other stuff that they need. It has been noticed that business people use computers a lot both at their homes and at their working places. One may see that these people make pie charts and graphs that they use for presentations during business meetings where most of these charts were made by the help of computers. The business field uses computers a lot in their activities. C:Program FilesMicrosoft OfficeMEDIACAGCAT10j0233018.wmf Nevertheless, business organization now a dayà ¢Ã¢â€š ¬Ã¢â€ž ¢s use online marketing to advertise and contact with their consumers from different parts of the world without direct contact. For instance in www.amazon.com, this is an efficient way of business since it does not limit the area of supplies and consumers. It is through the use of computers that they are able to perform these activities. IN ENTERTAINMENT FIELD Another area that computers have impacted is the entertainment area. It has been seen that most of the people love science fiction and action movies and those that have neat effects like Matrix or Harry Potter. Well the graphics and animations used in those movies were done by computers themselves. Most of the movies today use these graphics to make movie effects look realistic. For instance in Harry Potter where Harry has to fight dragons and big snakes, all those effects look real but they are not realistic and some movies where we see aliens, space ships, monsters or flying men. Some movies are even made by computers from top to bottom like toy story and wall E. Not only movies but also game consoles use computer animations like the Play Station, PC and Nintendo. And it has been seen that games made by 3D graphics have been big breakthrough in gaming. All thanks to the awesome computer graphics. Even the music industry has been impacted in its way. Since music editing and video making all require computers to create effects or edit videos. Thus computers have a great deal of effect in the entertainment industry today. IN EDUCATIONAL FIELD Educational field has been impacted by computers as well in its own way. Like in universities computers help students a lot with their assignments and presentations. For instance a student had to do a project on World Religions; he would use the encyclopedia to search for information. Even when presenting their works like for presentations one would use Microsoft power point and writing of essays would require Microsoft word. Even teachers themselves use computers as well. They use computers to keep track of grades or prepare notes and presentations for their students. Through servers/networks educational institutes can share and control resources, by connecting computer devices together which saves a lot of time and money. For lecturers it becomes easy when a lecturer is giving a lecture then students can just take note rather than printing out pages and pages of notes. Nevertheless e-learning is also a product of computer`s development. Thus computers have a great deal of importance in the educational field. IN THE MEDICAL FIELD This is one important field that computer have impacted. Computers help in hospitals and even in small pharmacies. Doctors and nurses use computers to make records on medication of patients and in what amount so they wouldn`t lose track. But in big hospitals computers are also used to keep records of every patient. They also keep records on medical bills and equipments. Nevertheless scientists need computers so they could find cures to different diseases that keep erupting every day. If it wasn`t for computers these cures wouldn`t have been found. Therefore computers are important since they help us maintain our health.C:Program FilesMicrosoft OfficeMEDIACAGCAT10j0315447.jpg IN SPACE EXPLORATION Computers have had a great deal of impact in this area. Computers help in designing the right kinds of equipments and ships that are used now a days for most exploration. For instance a large organization like NASA needs these kinds of machines for space exploration. In space, small errors or miscalculations can create serious problems that cannot be easily corrected. Computers provide faster and more accurate handling of data, both in planning a mission and in analyzing parameters during a mission. Without them, effective space exploration would be nearly impossible. This has proven to be successful since everyday huge deal of inventions and discoveries from these explorations, like life in mars. And now scientists are trying to find if there is another life form on other planets. Computers also help them to solve complex mathematics such as from which degree/angle should the rocket be launched, which would be quite difficult for humans to calculate.

Wednesday, October 2, 2019

Einleitung :: essays research papers

Einleitung Unser Zeitalter ist das eigentliche Zeitalter der Kritik, der sich alles unterwerfen muss. Religion, durch ihre Heiligkeit und Gesetzgebung durch ihre Majestà ¤t, wollen sich gemeiniglich derselben entziehen. Aber alsdann erregen sie gerechten Verdacht wider sich und kà ¶nnen auf unverstellte Achtung nicht Einspruch machen, die die Vernunft nur demjenigen bewillt, was ihre freie und à ¶ffentliche Prà ¼fung hat halten mà ¼ssen.â€Å" (Hermes, S. 12). Diese Worte Kants fallen in eine Zeit in der die evangelisch-lutherische Kirche und der absolutistische Staat durch das Landeskirchentum ein enges Bà ¼ndnis geschlossen hatten und so nur schwer angreifbar waren. Das musste auch Gotthold Ephraim Lessing feststellen. Er wurde am 22.1. 1729 im Kamenz geboren und wuchs in der christlichen Tradition des và ¤terlichen evangelisch- lutherischen Pfarrhauses und der Fà ¼rstenschule St. Afra in Meißen auf. Obwohl er das vom Vater gewà ¼nschte Theologiestudium schon nach einem Jahr abbr ach, durchziehen theologische Fragen doch große Teile seines Werkes, was besonders im letzen Jahrzehnt seines Lebens sichtbar wurde: Er fà ¼hrte nicht nur erbitterte theologische Diskussionen, er verà ¶ffentlichte auch „Nathan den Weisenâ€Å", „Die Freimaurerâ€Å" und die Erziehung des Menschengeschlechtsâ€Å". Auf eben erwà ¤hnte theologische Diskussion, auch Fragmentenstreit gennant, bei der Lessing die Macht der anfangs genannten theologisch-staatlichen Allianz zu spà ¼ren bekommt, und auf den darauffolgenden „Nathanâ€Å" mà ¶chte ich in dieser Arbeit eingehen. Da mein Augenmerk dabei speziell auf dem Thema „Entstehungsgeschichte des Nathanâ€Å" liegt, werde ich allgemein beleuchten, was Lessing zum Nathan inspiriert hat, und das war eben nicht nur der Fragmentenstreit, sondern auch andere literarische, historische und biographische Quellen. Nathan als 12 Anti-Goetze 1767- 69 arbeitet Lessing am hamburgischen Nationaltheater als Dramaturg. Zu dieser Zeit ist Johann Albert Hinrich nicht nur sein Arzt, er darf auch seine Bibliothek benà ¼tzen, außerdem ist er mit Hinrichs Schwester Elise Reimarus gut befreundet. Durch diese beiden Geschwister gelangt Lessing an die „Apologie oder Schutzschrift fà ¼r die vernà ¼nftigen Verehrer Gottesâ€Å", die deren Vater Herman Samuel Reimarus geschrieben hat. Reimarus ist ein angesehener hamburger Bà ¼rger, der eine Professur fà ¼r hebrà ¤isch und orientalisch am Akademischen Gymnasium bekleidet. In seiner Apologie à ¼bte der Deist Reimarus eine radikale Bibel-und Dogmenkritik, er ging dabei soweit die Offenbarungslehren zu bezweifeln. Seiner Meinung nach enthalte die reine Lehre Christi „eine vernà ¼nftige praktische Religionâ€Å". Nur durch die Apostel, die Wundergeschichten in ihre Berichte eingefà ¼hrt hà ¤tten, sei diese Lehre zu dem gemacht worden was sie heute ist, nà ¤mlich e ine Religion die sich mit der Vernunft nicht vereinbaren là ¤sst. Z.B. behauptet er anhand von Widersprà ¼chen in der Auferstehungsgeschichte schlussfolgern zu dà ¼rfen, dass die Jesu Jà ¼nger die Leiche des gekreuzigten Jesu selbst haben verschwinden lassen, um durch die Osterpredigt Anhà ¤nger zu gewinnen und sich somit selbst zu Aposteln aufwerten zu kà ¶nnen.

Tuesday, October 1, 2019

Effective Use of Sound Techniques in Fritz Lang’s Film, M Essay

Effective Use of Sound Techniques in Fritz Lang’s Film, M M was directed by Fritz Lang and was released in Germany in 1931. M follows the story of a strand of child murders in a German city. In a hunt for the murderer the police as well as the organized criminal underground of this German city search rapidly for the killer of these innocent children. The specific elements that Fritz Lang uses to express his view of what the sound should be are, how particular sound techniques shape the film, and how the sound affects the story. In a shot by shot analysis of a series scenes that uses diegetic sound the audience can understand what Lang's intentions for sound was for this film. Initially the audience is witness to how particular sound techniques shape this film. For instance, one of the main details that the audience hears is the song that the murderer whistles. Due to the marvel of sound the audience can pick out that the whistling is related to the murderer. Along with the blind man who figured this mystery out, the audience could only put these two together with this sound technique. The director shows the audience how such a simple part of every day sound can be so important to solving such a terrible crime. An additional sound technique that the director uses is during the beginning of the film with the clock on the wall of Elsie Beckmann's family's apartment. The director uses this clock as a suspense builder to show more and more time is passing without her mother hearing something from her daughter. Attributable to the novelty of sound, the ding dongs and coo-coos on the clock are louder than in reality. This could be another way in which the director wanted to pull the audience into the element of what the clock ... ... understands how important time is being portrayed for Elsie's mother. In brief, the audience can see how this 1931 sound film could be shaped by sound in a number of ways. Considering that sound at this time was a new phenomenon it is understood why mostly diegetic sound was used over nondiegetic sound. This director also showed the audience how the story could be affected by sound with examples like the clock becoming a character and storyline of its own and also the murderer being identified with his whistling. With the lack of sound and the collage of images during specific times, the director was able to create a mood without music or sound. Apparently this was a technique that was learned throughout his many years of silent films. These details were what brought the story together and would not have been done so precisely without the technique of sound.

Why I Deserve a Scholarship

I believe that I deserve a Big33 Scholarship for several reasons. My high attendance, academic achievement, determination, time management, financial need, motivation for college and to achieve better are all reasons I will discuss of why I believe I deserve a scholarship. The first reason is because I am very diligent in my studies and attend my classes every day. In my entire schooling career I missed very minimal amounts of school. I have obtained perfect attendance in grades 9th, 11th, and am working on 12th grade. In my 10th grade year I only missed one day of school. I have also had high honor roll every year in high school and plan to continue it throughout college. Another reason is I am very determined when it comes to both work and school. I take both of these aspects very seriously and when I’m given an assignment or task, I feel very obligated to not only complete it, but do so both correctly and in a timely manner. Also I am very good at managing many things at one time. For example, in my sophomore and junior year in high school I managed school, homework, church volunteer work, practicing the piano and attending my lessons and performances, babysitting (about 40 hours per week on the weekends, overnight) family and church activities and spending time with my friends, family and boyfriend. In my senior year I am managing school, homework, work, college and scholarship applications, practicing the piano and attending my lessons and performances, babysitting my nephew about one night per week, family activities, church events, student government events, and spending as much time as I can find with my friends, family, and boyfriend. Also, with just working a minimum wage job, I do not have enough money to go to college on my own funds. I am putting away a little bit of money from each pay check since I started my job but this, though it does add up and will help greatly is not going to be enough to cover my total of six years of schooling that is required to reach the position that I desire. My main motivation for going to college is to get ahead of the society. I want to make something of myself instead of being like so many Americans today and not having enough education to stay employed in the jobs that are bombing and have a high potential for growth. Nursing greatly interested me because I enjoy working with people and like to make their day better in any way I can. I absolutely love infants and that is why I want to continue my education until I reach a level of a Neonatal nurse. I want to obtain a job that I love to go to everyday. The quote by Confucius â€Å"Choose a job you love and you’ll never have to work a day in your life† is a huge motivation to me. That is why I chose nursing as my major, so I would get to work with infants, my favorite thing to do. These are a few reasons of why I believe that I deserve a scholarship from Big33 so that I can continue my education from high school and attend college.