Saturday, August 31, 2019

Theory of Data Communication

Btec National Unit 8 – Communications Technologies |Hand-in date |Return date | |Assessment No: 8. | | | |Assessment Title: The theory of data communications | | | |This assessment has been internally verified by: Edexcel | | | |Hand out date: 21/10/10 Hand in date: 21/11/10 | | | |On going assignment used as a delivery tool | | | This assessment provides the opportunity to meet the grading criteria for the unit as indicated in the grid below. Student Name: Learner Authentication Statement If you copy from someone else or allow another candidate to copy from you, or if you cheat in any way you may be disqualified from at least the assignment concerned. Any help or information you have received from people other than your subject teacher must be clearly identified in the work itselfAny books, information leaflets or other material (eg videos, software packages or information from the internet) which you have used to help you complete this work must be clearly acknowledged in th e work itself. To present material copied from books or other sources without acknowledgement will be regarded as deliberate deception. Declaration by learner I have read and understood the above statements. I have produced the work without help except for help from my subject lecturer and the help which I have declared in the work itself. I have acknowledged all source material in the work itself.Write suitable materials for Chapter 1, section 1 which explains the purpose and workings of basic communication devices and the principles of signal theory. Task 1b M1 Explain techniques that can be used to reduce errors in transmissions Add a section 2 to your guide (entitled ‘Error detection and correction’) which explains the techniques that can be used to reduce data transmission errors. Task 2 and grading criteria covered TASK 2 P3Describe communication protocols used and explain why they are important D1Critically compare the OSI seven layer model and the TCP/IP model W rite section 3 (entitled ‘Communication protocols’), which should include a description of the communication protocols in common use and explain why protocols are important.Write a detailed comparison of the OSI seven layer model and the TCP/IP model, commenting on the approach taken and the suitability of each of the models. Guidance notes THIS ASSIGNMENT IS VERY MUCH ABOUT EXPLAINING THE BASIC THEORY THAT LIES BEHIND COMMUNICATION TECHNOLOGY. THERE ARE LOTS OF SOURCES FOR THIS INFORMATION IN BOOKS AND ON THE INTERNET, BUT REMEMBER WHAT YOU WRITE MUST BE IN YOUR OWN WORDS; YOU CANNOT COPY MATERIAL DIRECTLY FROM THESE SOURCES.For Task 1a you will need to list the various types of communication devices and explain how they are used. Note that the unit content makes a distinction between ‘general’ communication devices, network components (servers, workstations, NICs, etc. and interconnection devices (hubs, routers, switches, etc. ). For this task (covering P 1) you should be describing general communication devices, not specific components which are covered in Assignment 3. In practice, it might be quite difficult to make this distinction, but don’t spend too much time describing network components in this assignment. In terms of communication devices, the unit content mentions wired devices, such as DTE devices (e. g. , a computer) and DCE devices (such as a modem), and wireless devices (such as mobile phones, PDAs and laptops, etc. ). You need to explain in outline the way these devices can be connected to a network.To cover P2 an explanation of digital signal theory is required. Refer again to the unit content to see the issues you must cover. For Task 1b you need to write an explanation of the techniques used for error reduction. The only technique mentioned in the unit content is checksums, but other simple techniques such as parity might also be covered. For Task 2 an explanation of what protocols are, why they are importan t and examples of ones in common use are required. To achieve D1 you will need to write a detailed comparison of the OSI and the TCP/IP models. This will need to point out the similarities and differences between the two models. LEARNER INSTRUCTIO The theory of data communications | |By Olateju Famuyiwa | | This book gives details of the basics of communication devices and methods of communication used within networking and the | |internet environment. | Table of Content Data Circuit-terminating Equipment (DCE)4 Wireless Devices4 The principles of signal theory5 Data5 Denary to Binary5 Data Packets5 Asynchronous and Synchronous Transmissions6 Bandwidth (Analogue)6 Bandwidth (Digital)6 Section2 Error detection and correction6 Parity (Odd and Even)6 Cyclic Redundancy Check (CRC)7 Chapter 27Section3 Communications Protocols7 Hyper Text Transfer Protocol (HTTP)7 Transmission Control Protocol/Internet Protocol (TCP/IP)7 File Transfer Protocol (FTP)8 Open Systems Interconnection (OSI)8 OS I Seven Layer Model9 TCP/IP Four Layer Model10 Critical Comparison10 The Session Layer (OSI)10 The Presentation Layer (OSI)10 The Application Layer (OSI)10 How OSI builds up applications10 How TCP/IP builds up applications11 Transport Layer (OSI)11 Transport Layer (TCP/IP)11 Comparing Transport for both Models11 Network Vs. Internet. 11 Data Link/Physical Vs. Subnet11 Assignment 8. : The theory of data communications I recently just got a job as a junior technician at NetCo; NetCo is a company that manufactures networking hardware such as switches, routers, etc†¦ They’re planning to start up a networking academy (rather like the Cisco Network Academy) and create related qualifications. The project manager has approached me so as to prepare some learning materials for ‘Chapter 1’ of the online course. Chapter 1 is entitled ‘The Theory of Data Communications’. The chapter will be subdivided into a number of sections. And I’ve decided that t he materials shall be produced in the form of a Word document. Chapter 1 Section1Identify and explain types of communication devices There are different types of communication devices; Communication devices are electronic hardware that interacts (communicates) with each other to perform specific tasks. The technologies that are used to communicate are data terminal equipment (DTE) and data circuit-terminating equipment (DCE). Another type of communication devices would be Wireless devices. I plan to explain all the above in detail. Data Terminal Equipment (DTE) DTE is a form of expression for a device that is at the end of the line. Examples of this could be a modem, network interface card (NIC), mobile phone or Bluetooth.DTEs differ depending on its purpose, for example, with Bluetooth, size and range are an important feature and with mobile phones, the quality and bandwidth are more important. Network cards and modems exist in a range of formats that are designed for a wide range of speeds i. e. bandwidth depending on the type of network being used. Data Circuit-terminating Equipment (DCE) DCE and DTE work together by the DTE connecting to the Internet or network service offered by the DCE. This is network equipment which controls the communication. Some examples of these are: †¢ A Bluetooth dongle in a PC, which is used to synchronise a mobile phone or PDA. †¢ A switch in a communications/server room at school, college or work, which will connect all the computers to the Local Area Network (LAN) and the InternetWireless Devices Wireless devices are devices which transmit their data over the air. Types of mobile communication devices would be third (3G) and (2G) group of mobile phones, wireless laptops and wireless PDAs. Wireless networks use the 802. 11x standard. This is the IEEE standard (Institute of Electrical and Electronics Engineers) which defines the speed of the network and its range. The mobile phone network is a large connection of stat ions throughout the nation and internationally which allows subscribers to the service to communicate through low bandwidth voice system. The principles of signal theory Data The smallest portion of data is a bit.The word bit comes from Binary Digit which is either a 0 or 1. 0 or 1 means Off or On. This controls hardware within communication devices to perform operations. When bits are grouped together the can become more useful. For example, 8 bits of data will form 1 Byte. Denary to Binary Denary means 10 numbers. In our standard number system we have 10 numbers. These are: 0,1,2,3,4,5,6,7,8,9. Now to convert Denary to Binary, you must know the base 2 rules. These are similar to units, tens, hundreds that primary school children are taught. So for example say†¦ I want to convert the denary number 37 into binary. I would do this by taking the number and dividing it by 2 each time: Divide by 2 |37 |Remainder | |Divide by 2 |18 |1 | |Divide by 2 |9 |0 | |Divide by 2 |4 |1 | |Div ide by 2 |2 |0 | |Divide by 2 |1 |0 | | |0 |1 | Now what I do is take the remainders from the bottom of the table going up: 100101. With this I will now do 2 to the power of X, X being 0,1,2,3,4,5,6 etc. 25 24 23 22 21 20 – This is the 2x 1 0 0 1 0 1 – This is the binary for 37 32 16 8 4 2 1 – This is the base 2 ruleNow to check that the binary is correct I will take the base 2 numbers where the binary is a 1 and add them together. I should get the denary number: 32+4+1=37 This is how denary is converted to binary. Data Packets In networking, data must be formed in a package to be able to be transported over a network. Package formats vary for different types of networks. However the term data packet is always used to describe a package. A packet will contain a minimum of the foundation address, the destination address, data and error control. The foundation address is sent so the destination knows who sent the data. The destination address is used to find the r ight destination.Data is the actual information being sent. Error control is sent to help identify problems with the data once it has arrived at its destination (see chapter 1b for error detection techniques). Asynchronous and Synchronous Transmissions Asynchronous transmission means that the receiving device must accept the receipt of data before the source device will send more data. In synchronous transmission, both devices will synchronise with each other before any data is sent. Bandwidth (Analogue) Analogue signals are sine waves which look like the waveform in image 1. Sine waves are known as analogue signals is because they are an analogy of sound waves which travel in the same way.Analogue bandwidth is the number is cycles that occurs with the sine wave over a period of time, for example in image 1, the wave is 1Hz and occurred within 20ms so the bandwidth is 1Hzpms (1 Hertz per millisecond). So, finally, the bandwidth of an analogue signal is the difference in frequency be tween the highest and lowest frequencies contained in the signal. Bandwidth (Digital) Digital bandwidth is different to analogue bandwidth because digital signals are either 0 (off) or 1 (on) and look like squares (see image 1. 2). Digital bandwidth is the quantity of data that can be sent through a transmission over a specified period of time. These are generally measured in Bits per second (bps), Kilobits per second (kbps), Megabits per second (mbps) and Giga bits per second (gbps).Section2 Error detection and correction Parity (Odd and Even) Even  Ã¢â‚¬â€œ Parity checking is usually used for Bytes of data. A parity bit is added to every Byte of data transmitted, whether the ninth bit is ‘0’ or ‘1’ depends on the combination of the other eight bits. If there is an uneven number of ‘1’s then the parity bit will be a ‘1’, if there is an even number of ‘1’s the parity bit will be a ‘0’. There should alway s be an even number of ‘1’s in the data. For example: 1011001 Parity bit = 0 Odd  Ã¢â‚¬â€œ This works the same way as even parity checking, however, instead of the ‘1’s equalling an even number, they should equal an odd number.For example: 1011001 Parity bit = 1 Parity checking is easy to apply and can detect errors, however, it cannot correct errors, therefore, if an error is detected the data would need to be transmitted again. This method does not always work, this is because only an odd number of bits in error can be detected, if there is an even number of bits but there is still an error, this will not be detected. For example: 1011001 could be transmitted as 1100011. This is not the way that the data should have been transmitted but the error would not be detected because the data has an even number of bits in error. Cyclic Redundancy Check (CRC) Cyclic Redundancy Check is an error-detecting system. It performs a long division equation where the ans wer is thrown away and the remainder becomes the result.The data is then transferred and the same equation is done at the other end, if the remainder of the equation isn’t the same as the receipt, the data is corrupt and therefore rejected. Chapter 2 Section3 Communications Protocols Hyper Text Transfer Protocol (HTTP) Hyper Text Transfer Protocol is a set of rules that order the distribution of information over the internet. Its use to retrieve hypertext documents, which are interlinked text documents, led to the development of the World Wide Web. HTTP is a request and response made by the client and server, the client being the end user and the server being the web site. A client that makes a HTTP request using a web browser is known as a User Agent.The server, which stores resources such as HTML files or images, is called the Origin Server. Between the User Agent and the Origin Server may be intermediaries i. e. a negotiator who acts as a link between parties and examples are proxies, tunnels and gateways. HTTP is not controlled by the TCP/IP model and is the most popular application on the internet. Transmission Control Protocol/Internet Protocol (TCP/IP) The Internet Protocol Suite (or TCP/IP) is a set of protocols for communication used for the internet and similar networks. Its name derives from the two most important protocols in it, Transmission Control Protocol (TCP) and Internet Protocol (IP), which are the first protocols in the Internet Protocol Suite standard.The Internet Protocol Suite may be viewed as a set of layers that work together in the transportation of data from one place to another. The TCP/IP model consists of four layers, from lowest to highest they are the: †¢ Link Layer †¢ Internet Layer †¢ Transport Layer †¢ Application Layer File Transfer Protocol (FTP) File Transfer Protocol is a protocol that is used to transfer data from one computer to another computer or device. FTP is a protocol for file transfer which allows the transfer and change of files over a TCP network. A FTP client connects to an FTP server and the client can then make changes, add or delete files on the FTP server. An example of an FTP client would be the webpage upload feature on Microsoft FrontPage.FTP has been designed so files can be transferred to any FTP server regardless of operating system type or version. Open Systems Interconnection (OSI) The Open Systems Interconnections Basic Reference Model (OSI Reference Model or OSI Model) is a description for layered communications and network protocol design. This was developed as part of the Open Systems Interconnection intelligence. Basically, network architecture has been divided into seven layers. From top to bottom, these layers are: †¢ Application †¢ Presentation †¢ Session †¢ Transport †¢ Network †¢ Data Link †¢ Physical This is known as the OSI Seven Layer Model. Each layer is characterized by their formation. These provid e services to the layer above and receive services from the layer below it.An example of this would be a layer that can provide error free communications across a network provides the path needed by applications above it. It then calls the next layer below it to send and receive packets that make up the contents. Comparison between the OSI seven layer model and TCP/IP model OSI Seven Layer Model The OSI Seven Layer Model is a model for data transfer through layered communications allowing data from one PC to be able to be read by another PC anywhere in the world. This model packets the data into many layers, an example would be the layers of an onion, so it then transfers itself to another computer where it goes through the same seven layers but in the opposite direction to unwrap those layers.See image 6 for the structure of an OSI Seven Layer Model. These layers don’t communicate across to their ‘doppelganger’ layer on the other computer. If they wish to commun icate, they have to go through all the other layers that stand between them and their ‘doppelganger’ layer. This table to the right is basically explaining what each layer’s job is. (Table obtained from www. humanreffence. com under the download section) TCP/IP Four Layer Model The TCP/IP model captures data to provide idea of protocols and services. Data is captured in the same way as data is within the OSI Seven Layer Model, so data has to be captured on each level in the same way.The OSI Seven Layer model and the TCP/IP model are both similar in that they both use layers to perform tasks. They also have 2 layers that are very similar, the Transport and Network layers. The TCP/IP internet protocol suite has a wide range of protocols working at each layer of the OSI and TCP/IP models. Critical Comparison OSI and TCP/IP are both similar in a few ways, these being that they both work with layers to communicate, they are both a set of rules and they were also devel oped alongside. The Session Layer (OSI) In the OSI model, the Session layer allows two devices to hold on going communications called a session across a network. This is not found in TCP/IP.In TCP/IP, these characteristics are found in the Transport layer. The Presentation Layer (OSI) In the OSI model, the Presentation layer handles data format information for communications across a network. This is done by converting the information into a common format that both sides can understand. This is provided by the Application layer in the TCP/IP model. The Application Layer (OSI) In the OSI model, the Application layer is the top most layer of the model. It provides a set of interfaces for applications to gain access to services within a network as well as access to network services that support applications directly e. g: OSI – FTAM, VT, MHS, DS, CMIP TCP/IP – FTP, SMTP, DNS, SNMPAlthough the idea of an application process is common within both, their approach to the task of constructing application entities is very different. How OSI builds up applications OSI demands that distributed applications operate over a strict hierarchy of layers and are constructed from a tool kit of standardised application service elements, making them compatible. How TCP/IP builds up applications In TCP/IP, each application is created on whatever set of functions it needs beyond end to end transport to support a distributed communications service. Most of these processes build upon what it needs and assumes that only an underlying transport method (such as a datagram or connection) will be provided. Transport Layer (OSI)In OSI, the Transport layer takes the data that is going to be sent and breaks it down into individual packets that are sent and then reassembled by the Transport layer at the destination. It also provides a signalling service which tells the sender that the destination had received the data has been successfully received. Transport Layer (TCP/IP) In TC P/IP, the Transport layer introduces two transport protocols, TCP and UDP. TCP implements reliable transportation of data whereas UDP doesn’t. The reason this is, is because TCP required acknowledgement to ensure that data is sent correctly and successfully. If an error is detected, the packet can be resent. UDP just broadcasts the data without any need for a reply from the destination therefore data transportation will be faster but will be less reliable as errors can occur.Comparing Transport for both Models Transport for both models is very similar as they both contain transfer protocols that required acknowledgement that data has been received by the destination. While this would be slower, this is more effective as data will always end up being sent correctly. Network Vs. Internet. Both OSI and TCP/IP support a connectionless network service. OSI’s CLNP is practically identical to the Internet’s IP. Both are best-effort-delivery protocols. They are virtuall y identical but the one major difference that sets them apart is that CLNP supports variable length addresses whereas IP supports fixed, 32-bit addresses.

Friday, August 30, 2019

Maslow Case Study

Maslow Case Study 15 1) Cindy’s first year of life was a very trying one, and according to Maslow, the primary needs on her hierarchy were not being sufficiently met. The first need is to have physiological needs satisfied for sheer survival purposes, such as receiving adequate food, water, elimination and sleep. Maslow explained that for a person not receiving these things, their idea of a perfect place would be one where there is plenty of food and water and they can sleep and eliminate whenever they want; if they had all of these things they would believe that they would be perfectly content and happy. For many, these needs are easily satisfied, but for Cindy this was not the case. The physician who performed Cindy’s checkups noted that she was not developing at the rate of normal infants her age, so she immediately suspected neglect, which would include not giving Cindy adequate nutrition. Since everyone of her checkups were late and infrequent, the physician began to question the amount of formula Cindy was receiving and learned that it was nowhere near enough for a child her age. Cindy had also developed a sever diaper rash accompanied by a yeast infect by the third check up which the physician was also very concerned about. The need to be physically well would also fall under the physiological needs. Although Cindy’s physiological needs were not fully satisfied, degrees of satisfaction would allow Cindy to have the needs of other stages working at the same time. Safety needs, or the need to feel a sense of structure, order, security and predictability, are next on Maslow’s hierarchy. Cindy’s mother was said to be a 40 year old drug addict who live in a relatively poor neighborhood that housed African Americans and Latinos, mostly. The mother had no home of her own and did not know who the father was, she would move from house to house where her friends would put her up for a little while. The mother would also stay with the grandmother from time to time. This constant moving, with no home of her own, inadequate nutrition, no love or affection shown and no predictability from day to day would definitely show that Cindy’s safety needs were not satisfied. The third need, the need for belongingness and love, was obviously also not satisfied. Her mother neglected her so much that on one occasion Cindy was dehydrated to the point of medical danger. Once she was finally fostered, her initial foster family was able to provide her with sufficient physiological and safety needs, however, they still did not provide belongingness and love. They showed her little affection and rarely held her or talked to her. By the end of Cindy’s first year, she looked as if she were only 6 months old developmentally. Also, when the family moved to another state they had no desire to adopt her, which also showed how little they cared for her emotionally. The outcome of Cindy’s first trying year of life was severe underdevelopment in which she could barley crawl at one year, an aversion to affection where Cindy would cringe at someone’s touch, and a sense of uncertainty and shyness to her. ) During Cindy’s second year of life, she was placed with a much better foster family would not only fulfilled her needs for survival and safety, they were also very loving. The family had two other daughters, who were trilled to have a baby sister to take care of, the mother stayed at home with the kids during the day and the father was there in the evenings when the mother was working four nights a week inside the home. Cindy had a clean, quiet environment where she was exposed to other chi ldren. She was also shown a lot of affection, which at first she resisted, but eventually she began to become accustom to it and even began seeking it out and developed more rapidly. By the time she was living with this family for six months, she had caught up to the development of children her age. Once Cindy’s biological mother overdosed and died, the option for adoption was there and the new family happily accepted Cindy into there life permanently. The outcome of all of this was that Cindy became a happy, confident child on the same level as other children her age. ) According to Maslow, if Cindy were to actualize, the type of values she would have to embrace would include an acceptance of herself, others and of nature in general, which would allow her not to feel a sense of anxiety, shame or guilt due to her situation as a child. Also, autonomy, appreciation for life events, creativity from an openness to experience and spontaneity, an unhostile sense of humor and a strong ethic al sense would all be values Cindy would have to embrace to be a self-actualizer. There are other characteristics that Maslow listed as belonging to these types o people, but these have a more immediate relationship to Cindy and her upbringing. Her early childhood would defiantly not give Cindy the predisposition to have these values, however, her fortunate situation in which she was later adopted by a loving and providing family would be able to give her the other needs she craves to reach self-actualization.

Thursday, August 29, 2019

Compiler

ALLAMA IQBAL OPEN UNIVERSITY, ISLAMABAD (Department of Computer Science) WARNING 1. PLAGIARISM OR HIRING OF GHOST WRITER(S) FOR SOLVING THE ASSIGNMENT(S) WILL DEBAR THE STUDENT FROM AWARD OF DEGREE/CERTIFICATE, IF FOUND AT ANY STAGE. 2. SUBMITTING ASSIGNMENT(S) BORROWED OR STOLEN FROM OTHER(S) AS ONE’S OWN WILL BE PENALIZED AS DEFINED IN â€Å"AIOU PLAGIARISM POLICY†. Course: Compiler Construction (3468)Semester: Autumn, 2012 Level: BS (CS)Total Marks: 100 ASSIGNMENT No. 1 Note: All questions carry equal marks. Q. 1(a)Define Compiler, using a diagram describes the three phases of analysis of source program. (b)Explain all the phases of Compiler. c)Consider the following grammar. S ? > XaYb X ? > bXc | b Y ? > dYa | d Find the first sets for each non-terminal of the given grammar. Q. 2(a)Explain the error detection and reporting mechanisms. (b)Write the intermediate representation code of the following position: = initial + rate * 60 Q. 3(a)Convert the following NFA into equivalent DFA using subset construction Algorithm. [pic] Note:Show all necessary steps that are involved in subset construction algorithm. (b) Convert the Following regular expression into NFA using Thompson’s construction. a ((b|b*c)d)* |d*a Q. 4(a)Given the following grammar. G > EE > T + E | T T > F * T | F F > a i) Is this grammar ambiguous? Explain! ii) Draw all parse trees for sentence â€Å"a+a*a+a†. (b) Consider the following grammar. S> A A> A+A | B++ B > y Draw parse tree for the input â€Å"y+++y++† Q. 5(a)Explain the role of the Lexical Analyzer and Parser in detail. (b)Differentiate between Top-down parsing and Bottom-up parsing. ASSIGNMENT No. 2 Total Marks: 100 Note: All questions carry equal marks. Q. 1(a)Rewrite the following SDT: A A {a} B | A B {b} | 0 B -> B {c} A | B A {d} | 1 so that the underlying grammar becomes non-left-recursive. Here, a, 6, c, and d are actions, and 0 and 1 are terminals. b)This grammar generates binary numbers with a â€Å"decimal† point: S-* L . L | L L-+LBB B -> 0 | 1 Design an L-attributed SDD to compute S. val, the decimal-number value of an input string. For example, the translation of string 101. 101 should be the decimal number 5. 625. Q. 2(a)Translate the following expressions using the goto-avoiding translation scheme. i)if (a==b kk c==d |I e==f) x == 1; ii)if (a==b II c==d || e==f) x == 1; iii)if (a==b && c==d kk e==f) x == 1; (b)Construct the DAG and identify the value numbers for the sub expressions of the following expressions, assuming + associates from the left. ) a + b+ (a + b). ii) a + b + a + b. iii) a + a + ((fl + a + a + (a + a + a + a )). Q. 3(a)Explain the following i)Back Patching ii)Procedure Calls (b)Generate code for the following three-address statements, assuming all variables are stored in memory locations. i) x = 1 ii) x = a iii) x = a + 1 iv) x = a + b v) The two statements x = b * c y = a + x Q. 4(a)The programming language C does not have a Boolean type. Show how a C compiler might translate if-statement into three-address code. (b)Construct the DAG for the basic block d = b * c e = a + b b = b * c a = e – d Q. (a)Generate code for the following three-address statements assuming a and b are arrays whose elements are 4-byte values. i)The four-statement sequence x = a [ i] y = b [ j] a [ i ] = y b [ j ] = x ii) The three-statement sequence x = a [ i] y = b [ i] z = x * y iii) The three-statement sequence x = a [ i] y = b[x] a [ i ] = y (b)Suppose a basic block is formed from the C assignment statements x = a + b + c + d + e + f; y = a + c + e; i) Give the three-address statements (only one addition per statement) for this block. ii) Use the associative and commutative laws to modify the block to use the fewest possible number of 468 Compiler ConstructionCredit Hours: 3(3, 0) Recommended Book: Compliers; Principles, Techniques, and Tools by Alfred V. Aho, Ravi Sethi, Jerrey D. Ullman Course Outlines: Unit No. 1 Introduction to Compiling Compliers, analysis of the source program, the phases of a complier, cousins of the compiler, the grouping of phases, complier-construction tools Unit No. 2 A Simple One-pass Compiler Overview, syntax definition, syntax-directed translation, parsing, a translator for simple expressions, lexical analysis, incorporating a symbol table, abstract stack machines, putting the techniques together Unit No. Lexical and Syntax Analysis Lexical analysis (the role of the lexical analyzer, input buffering, specification of tokens, recognition of tokens, a language for specifying lexical analyzers, finite automata, from a regular expression to an NFA, design of a lexical analyzer generator, optimization of DFA-based pattern matchers), syntax analysis (the role of the parser, context-free grammars, writing a grammar, top-down parsing, bottom-up parsing, operator-precedence parsing, LR parsers, using ambiguous grammars, parser generators) Unit No. 4 Syntax-Directed TranslationSyntax-direc ted definitions, construction of syntax trees, bottom-up evaluation of s-attributed definitions, l-attributed definitions, top-down translation, bottom-up evaluation of inherited attributes, recursive evaluators, space for attribute values at compile time, assigning space at complier-construction time, analysis of syntax-directed definitions Unit No. 5 Type Checking Type systems, Specification of a simple type checker, Equivalence of type expressions, Type conversions, Overloading of functions and operators, Polymorphic functions, an algorithm for unification Unit No. Intermediate Code Generation Intermediate Languages, Declarations, Assignment statements, Boolean expressions, Case statements, Back Patching, Procedure calls Unit No. 7 Code Generations Issues in the design of a code generator, The target machine, Run-time storage management, Basic blocks and flow graphs, Next-use information, A simple code generator, Register allocation and assignment, The dag representation of basic blocks, Peephole optimization, Generating code from dags, Dynamic programming code-generation algorithm, Code-generator generators Unit No. Code Optimization Introduction, The principal sources of optimization, Optimization of basic blocks, Loops in flow graphs, Introduction to global data-flow analysis, Iterative solution of data-flow equations, Code-improving transformations, Dealing with aliases, Data-flow analysis of structured flow graphs, Efficient data-flow algorithms, A tool for data-flow analysis, Estimation of types, Symbolic debugging of optimized code Unit No. Writing a Complier Planning a compiler, Approaches to compiler development, The compiler-development environment, Testing and maintenance, A Look at Some Compilers, EQN, a preprocessor for typesetting mathematics, Compilers for Pascal, The C compilers, The Fortran H compilers, The Bliss/11 compiler, Modula-2 optimizing compiler

Direct advertising Dissertation Example | Topics and Well Written Essays - 3000 words

Direct advertising - Dissertation Example Literature Review Direct Advertising There is a clear need for highly targeted marketing activities within the Internet environment. The Internet is a collection of smaller submarkets where developing and maintaining relationships with online customers generates sales, regenerates sales and subsequently profits (Norwood et al. n.d). However, applying this kind of marketing approach is not as simple as it looks. The online marketers may understand that marketing online only includes one-to-one promotion. The difficulty may be that the statistical data of the online consumers do not favour relationship building: 88 percent own a home computer and 67 percent of Internet newcomers are male, 39 percent have a college degree and 17 percent live in householders with only incomes of $ 80,000 or more (Norwood et al. n.d). Moreover, the reports suggest that the online consumers could be identified as impatient, having no particular allegiance to any particular websites. And more specifically, the on line users can be described as ‘switchers’, empowered to choose which site they want to visit so that when encountered with a barrage of on-line advertising, they simply switch to another website. This could subsequently be said that the on-line consumer may not prefer to enter into a relationship. In addition to that, there is a strong perception that a considerable number of online users and consumers believe that they the promotions through direct advertising cannot be relied as the frequency of fraud cases have enhanced to a dangerous level. Given these circumstances, the task of constructing and maintaining long term on line relationships has become a biggest challenge ever faced by the marketers. The key is to secure customer loyalty which would... This "Direct advertising" essay outlines the usefulness of this type of ad for companies and its effectiveness. Applying this kind of marketing approach is not as simple as it looks. The online marketers may understand that marketing online only includes one-to-one promotion. The difficulty may be that the statistical data of the online consumers do not favour relationship building: 88 percent own a home computer and 67 percent of Internet newcomers are male, 39 percent have a college degree and 17 percent live in householders with only incomes of $ 80,000 or more. The reports suggest that the online consumers could be identified as impatient, having no particular allegiance to any particular websites. And more specifically, the online users can be described as ‘switchers’, empowered to choose which site they want to visit so that when encountered with a barrage of on-line advertising, they simply switch to another website. This could subsequently be said that the on-lin e consumer may not prefer to enter into a relationship. In addition to that, there is a strong perception that a considerable number of online users and consumers believe that they the promotions through direct advertising cannot be relied as the frequency of fraud cases have enhanced to a dangerous level. Given these circumstances, the task of constructing and maintaining long term on line relationships has become a biggest challenge ever faced by the marketers. The key is to secure customer loyalty which would bring increased shareholder value and asset efficiency.

Wednesday, August 28, 2019

American firm opening branch in Japan Essay Example | Topics and Well Written Essays - 1750 words

American firm opening branch in Japan - Essay Example During the Nara and Heian periods (710-1185) the emperors began to practice Buddhism, believing its teachings would protect the state. The Muromachi era (1333 to 1568) brought disintegration of the central government, firearms were introduced by the shipwrecked Portuguese soldiers, and Christianity was introduced by Francis Xavier. (Background, 2005, p. 3). Finally in the Edo period (1600-1868) Japan enters into an age of â€Å"peace and national isolation.† (Background, 2005, p.4). The United States wants to use the Japanese ports as supply bases for its commercial fleet, and, in a surprise move, Japan accepts the US demands and opens its doors for the first time in two centuries. In the Meiji period (1868-1912), the emperor was restored, and Japan made its transition to nation-state. The Showa period (1926-1989) brought many more changes for Japan, including World War II and its aftermath, including the necessary economic recovery. In 1941 Pearl Harbor brought the US into war in the Pacific and in August of 1945 â€Å"the first atomic bomb was dropped on Hiroshima, the second on Nagasaki; the emperor airs by radio a statement of unconditional surrender.† (Background, 2005, p. 5). The years of 1945-1952 brought allied occupation of Japan, with women gaining legal equality as well as the right to vote. Japan’s poli tical life was changed to a parliamentary state, and with the peace treaty signed in 1951, Japan regained independence. The â€Å"High Growth Age† in Japan occurred from the late 1950’s to the early 1970’s and Japan was rewarded with a booming economy. (Background, 2005, p. 5). Japan is made up of five islands; however there are some thirty-six hundred islands in the entire group, and dozens that are actually inhabited. Japan has twenty-nine thousand kilometers of coastline, and the total land area is 142,000 square miles which makes Japan one-twenty-fifth the size of the United States, or roughly the size of

Tuesday, August 27, 2019

Professional and Strategic Communications Essay

Professional and Strategic Communications - Essay Example It therefore fuses the pushing and the delivering through the communication of the best message through the right channels as measured against a well-considered communication-specific and organizational goals. Strategic communication always involves different professional disciplines that may include management, technical communication, advertising and media relations amongst other relevant disciplines. Successful strategic communication must endeavour to communicate in order to influence a target audience or group of individuals and must be rational and authentic. Therefore, strategic communication concerns itself with planning for the future, implementation of specific tactics and taking into consideration the dynamism of the environment. This paper explores both professional and strategic communication through the exploration of the important role that behaviour change plays in successful communication and the challenges in the management of communication. For effective profession al and tactful communication, it is important that the person or the organization observes certain factors. The person communicating must be able to determine his objective before embarking on the communication in that you should understand the message before expressing it to others as establishing the goal will make the communication is concise and appropriate. It is important to consider your relationship to the audience or the persons to whom the communication is intended to by keeping and adhering to your professional status in mind as you communicate to the audience in anticipation of their reaction to the message being conveyed. The person communicating must use the appropriate terminology to demonstrate his professionalism and competence in passing the message across. Professional communication dictate that the person stays in control of his body language as the audience normally evaluates the message and its intention based on the posturing and the choice or words as even th e most tactful message can repel an audience. Azjen’s Theory of Planned Behaviour (TPB) The Theory of Planned Behaviour (TPB) as espoused by Icek Ajzen is important as it helps us in the understanding the transformation in behaviour of a person as it predicts deliberate behaviour or that behaviour that has been planned. It was developed after the discovery of the fact that behaviour is not always fully voluntary and under control which was later taken as perceived behavioural control. Therefore, the Theory of Planned Behaviour (TPB) states that the actions by human beings are guided by three considerations which include the behavioural beliefs which are those that are due to the consequences of behaviour and normative beliefs that are those beliefs about the normative expectations of others. Another consideration is the control beliefs that are the belief about the presence of factors that may expedite or impede the performance of behaviour. These considerations argued by Ajz en are important in the changing of the behaviour of human beings. It is important

Monday, August 26, 2019

Chronic Eczema Essay Example | Topics and Well Written Essays - 250 words

Chronic Eczema - Essay Example For instance, the methods of treating Chronic Eczema may change, hence rendering the previous routines useless. For example, a new method of diagnosing Chronic Eczema may be discovered, and hence taking of picture of the affected part by the patient and sending it to the Dermatologist becomes less useful. The technologies available to different patients are varied. The knowledge to make proper use of the technologies available to the patient are also not guaranteed. For instance, relying on the photos taken by the patient may not give a clear picture of the intensity of the infection, especially if the focus of the photos is not good. For this reason, relying on the patient’s technologies may impair the process of offering equitable health services. For equitability in health service delivery, practices such as diagnosis should be uniform across the patients. The virtual support hinders the patient from accessing quality services, which would be offered in the event of the patient visiting the GP and hospitals. It is likely that if the patient gets virtual support, he/ she doesn’t enjoy some of the services, which are difficult to implement in the online support

Sunday, August 25, 2019

Civil management is an important aspect in the success of organization Essay

Civil management is an important aspect in the success of organization - Essay Example It is in this regard that this paper is written. Management of organization is becoming an increasingly daunting task in the contemporary times, this is due to the ever advancing business world and business technology leading to ambiguity, uncertainty and complexities of organization. Effective internal management of an organization demands that people and facilities in the organization are managed well. This introduces the concept of organizational behavior which involves how people within the organization react to changes, decisions and practices of management by managers. It is also important to have human skills in order to incorporate the views of other people and manage them well; this will also ensure that the people work towards a common goal within the organization (Pitsis, Clegg & Kornberger, 2011, p 29). Therefore, critical management is determined to harmonize the workplace, through ensuring that the employees and facilities are managed well and working conditions improve d. In order to ascertain this, managers need to rely on management theory and practice in order to deal with the uncertainties of organizations. These management theories and practices deal with construction of models based on observations, to try and manage business activities (Carr, 2000, pp. 210). In addition, the practices of management also deals real life experiences of the manager within an organization. This paper therefore seeks to critically evaluate the impact of uncertainty on how the organization is managed through culture leadership, structure, control, and empowerment. Additionally, the paper will demonstrate a critical understanding of management practice and theory, ability to identify and evaluate vital assumptions in the ideology of management, and analyze and evaluate organization and management theory and appraise the application of management theory in organizational contemporary contexts. Uncertainties of organization Organizations are faced majorly by uncerta inty challenges; this impact on their production and performance levels. Uncertainty as an element in managing organizations involves risks and unpredictability of the organization’s future events. This may include surprises in employee performance which could either lead to losses or profits within the organization (Renn, Klinke & Asselt, 2011, pp. 3). As a newly recruited manager assigned the duty of dealing with uncertainty, ambiguity, and complexity situations, one is expected to identify and evaluate the key assumptions of management ideology and apply the management and organization theory in handling the concerns in the contemporary context. A junior manager is expected to use the â€Å"box paradox†, in order to come up with new management strategies that will ensure organizational growth and retain the identity and founding values of the organization (Clampitt & Williams 1999, p 6). The junior manager will have to â€Å"think outside the box† and acknowl edge the constraints of the â€Å"organizational box† in order to achieve growth and development of the organization and handle the complexity, ambiguity and uncertainty prevailing in the organizatio

Saturday, August 24, 2019

Victim Blaming and Victim Defending Essay Example | Topics and Well Written Essays - 750 words

Victim Blaming and Victim Defending - Essay Example In most cases, people who are exceptionally familiar with victimology do not view the victim as the one responsible for the misdemeanor. However, knowledge about the prior rapport between the fatality and perpetrator maximizes the perceptions of victim blame for cases such as wife battery. In addition, most of the psychologists argue that the victim is not necessarily fallacious. Roy Baumeister; a personality and social psychologist, argues that showing the victim’s responsibility can be shrewd, contrary to typical clarification of meanness and aggression (Said & Hitchens, 2001). Furthermore, in these two concepts there are factors such as secondary victimization, just-world hypothesis, rape shield laws, sexual purity and family honor which are of crucial importance (Ryan, 1976). These terminologies are quite common in association to victim blaming and victim defending. In relation to this case, secondary victimization can be identified as the retraumatization of the abuse victim through the response of the community in general. For example in the case of battered women, the women might be blamed. For instance, they might be accused of not acting as to the stipulated guidelines set by the husband or even cheating on the husband. These are some of the most common acts that may trigger the husband to beat his wife. Hence, this phenomenon is identified as secondary victimization. Rape shield laws have also become common according to most jurisdictions. These laws are liable for protecting the alleged victim with respect to certain phenomena. Another common factor related to the issue of victim blaming and defending is sexual purity and family honor. This prevalent factor involves social relationships in which women are mostly blamed for their indiscriminate acts. Lastly, there is the just-world hypothesis issue which is also prevalent in issues related to victim blaming and defending. This aspect describes the phenomenon that people believe

Friday, August 23, 2019

Methodology and Analysis Essay Example | Topics and Well Written Essays - 3500 words

Methodology and Analysis - Essay Example In effect, the researcher employed the use of comprehensive literature review to serve the purpose of qualitative data collection. For the quantitative method, the researcher made use of primary data collection, which required the collection of first hand data from an identified research setting. The research setting comprised the IT systems development environment where the researcher made use of IT students, IT engineers, IT employees, and other IT experts. The primary data collection took place by designing a questionnaire, which contained questions on various thematic areas, relating to the purpose of the study. There were two major components of the questionnaire. The first sought to collect general background data or information on the respondents. Examples of these had to do with their nationality, years of experience in the field of IT and their role in software system. The second part contained questions on the actual hypotheses that the researcher was testing. ... This means that when repeated with the same variables, the research must produce the same results within different locations or settings. Now, with the combination of questionnaire and literature review, the researcher was offered the opportunity of testing the results gathered through primary data collection with data from secondary sources. In effect, it was possible to internally check for consistency of responses and how they conformed to universally accepted standards. With the questionnaire as an independent data collection tool, the advantage that it offered the researcher was that it made quantitative data analysis very easy. This is because almost all the questions posed were closed ended questions, requiring the respondents to select their answers from given options (Kimberly, 2009). This way, it was possible to easily quantify the answers into mathematical indexes. What is more, the literature review was very useful in collecting highly authenticated data because options o f researchers were compared and contrasted with each other before making personalized conclusions to suit the research problem. 3.3 Shortfalls of other available Research Methods Apart from the use of literature review and questionnaire, there are other research methodologies that the researcher could employ in the data collection process. However, these were not selected because they do not pose merits and advantages that surpassed the ones that the questionnaire and literature review offered. Two of these research methodologies that the researcher could fall on are interview and field observation. An interview is a question and answer session that a

Thursday, August 22, 2019

Security Risks Associated With VoIP Implementation Research Paper

Security Risks Associated With VoIP Implementation - Research Paper Example Part 2 gives detailed descriptions of the testing or test cases. Part 3 discusses groups that will be affected by the tests. Part 4 discusses those who will be involved with testing. Part 5 discusses how results will be assessed. Part 6 gives the changes that will be made as a result of the testing. Part 7 discusses how to test the security risks in the 250K company. Chapter 4 gives the summary, findings, conclusions and recommendations. Many businesses internationally have applied Voice over Internet Protocol (VoIP) as a substitute for the traditional Plain Old Telephone System (POTS) as stated by Ransome and Rittinghouse (2005, pp. 278-302). The improvement of VoIP offers a wide range of advantages ranging from saving of cost, efficiency in staff operations to offering improved shopping encounter for customers. These benefits go a long way in enhancing a business' competence and offers market leadership and dominance. Business management may be able to expand its competitive advantage by making use of the benefits that VoIP offers while considering some risks that should be dealt with by giving remedies and avoiding them altogether. The management of these risks is in the end the onus of the company management. These risks may range from compromising of high quality delivery, controlling of expenses that are security related to call hijacking among others. It is important to appreciate here that these risks offer huge drawbacks to business performance and their mitigation is a key factor that requires a great deal of management's attention. The paper is aimed at providing management with insight into what the risks of VoIP are. 1.2 Situational analysis In business, it is the task of the management to deploy, coordinate, allocate and combine inputs or resources in such a way that the goals of the organization are achieved as effectively as possible (Wallingford, 2005, pp. 245-263). In a business these resources are categorized into information, physical, human and financial resources. The former is quickly becoming one of the most important of the resources. The information resource consists of organized or processed data. The value of the information resource can also play a role in providing a business with a significant competitive advantage. Businesses are currently operating in the information era, wherein quality of information can establish the difference between successful and unsuccessful ventures. The factors that contribute to the quality of information have consequently become increasingly important. Completeness, timeliness, relevance and accuracy are, among other things, attributes of good quality information. Good qua lity information is communicated to the appropriate users before it is regarded as useful or valuable. Communication is the manner in which information is made accessible to other users, whereas telecommunications is the digital transmission of data or information from one terminal to another in terms of function and sophistication (Wallingford, 2005, pp. 245-263). Basic ways of communication include the use of telephones and fax. According to Wallingford (2005, pp. 245-263) the machines used in communication vary, whereby more technologically advanced and newer methods of communication

Mass Media Influence on the Society Proposal Essay Example for Free

Mass Media Influence on the Society Proposal Essay In the last 50 years, the influence of the media on the society has grown exponentially with the advance of technology. Mass media is a major force in modern culture, particularly in America. All lot of times they refer to this as a mediated culture where media reflects and creates the culture. If you look in the past, first there was the post offices and telegram, and then they build the radio, newspaper and magazines, later television and now internet. Mass media is all about communication whether spoken, written or broadcast that reaches a large audience. This includes movies, magazines, radio, television, advertising, the internet and so forth. But how is mass media influencing our society. This question is what drives me to writing this proposal. To do this research I will be using Internet, e-books and other researches done on this topic to really understand this subject and based on the result of my analysis I will present my findings and conclusion on the questions. Read more:Â  Essay About Media Influences on Society Research Question How is mass media influencing our society? Sub Questions: 1. How does mass media influence work? 2. What are the effects of media? 3. What kind of impact does mass media have on our youth? Introduction If you ask around most of the people will tell you that media is really influencing people. But how is mass media really influencing our way of living. Before discussing the influence of mass media on society it is important to point out the 3 basic functions of mass media. The basic function of media is to provide entertainment, education and news/ information. The most important function of media is to provide news and information to the masses. That is why the present era is known as the information age. People need news or information for different reasons, on one hand it can be used to socialize and on the other to make decisions and formulate opinions. Entertainment would be the other function where it is mostly used to amuse in present day hectic environment. Educating the masses about their rights, moral, social and religious obligations is another important function of mass media. Due to globalization a huge number of people depend on communication and information to stay connected to the world and their daily activities like education, work, health care, socialization and travel. If you look at a common person he or she wakes up each morning and checks newspaper or television news which he or she uses for basing their decisions.

Wednesday, August 21, 2019

The Julius Caesar Essay History Essay

The Julius Caesar Essay History Essay Power is a goal that most people strive for in their lives. When someone takes power for granted they can manipulate their friends and cause serious trouble. In terms of ancient history, specifically regarding ancient Rome, having too much power can lead to negative outcomes.  When someone mentions the name Julius Caesar, it triggers an image of Romes greatest leader in history. July 13, 100 B.C., was the beginning of a new era in Roman society. This marked the birth of Romes greatest political figure, Gaius Julius Caesar. Julius Caesars rise through Romes political ranks of Rome came quickly and it was believed by many individuals in the Senate that Julius Caesar was becoming too powerful for his own good. They also believed that he was becoming a threat of the Republican government.(CITE 7) After establishing himself as the dictator of Rome, the Senate believed that he had dreams of kingship and ultimate power. This led to Senatorial conspiracy and eventually to his assassination . His assassination was a result of his dramatic rise to power, which posed a threat to the senates. Ultimately his sudden death was a result of various personal factors that offended the senators and created animosity between them and Caesar, deeming his death inevitable. His death leads to a domino effect, which happens to lead to the inevitable collapse of the Roman Empire. On March 15 44 BC, Gaius Julius Caesar was murdered by men in his own Senate; which is known as the Ides of March. Julius Caesar had many men that were coming up with a plot against him to assassinate him. Among the 60 men plotting to murder him, many were senators, which included Gaius Cassius Longinus, Marcus Junius Brutus, and Decimus Brutus Albinus (CITE 6). Fearing that fact if Caesar added Parthia to his conquests he would undeniably become king. Knowing that in four days Caesar was going on campaign against Parthia that time was pressing, so they had to make their move very soon (CITE 3)On the day of Caesars murder, the Senate held a meeting in a hall adjacent to Pompeys statue. At the beginning of the meeting, a man by the name of Cimber first knelt in front of Caesar to plead to him and recall his brother from banishment. When Caesar refused, Cimber yanked Julius toga down from his neck and stabbed him in the upright shoulder, since he was nervous and missed his neck. (CITE 2). The other conspirators followed suit and began to stab Caesar. When they were done the stabbing, Caesar lay dead with 35 wounds on his body.(CITE 3) Julius Caesars rise to power came in an amazingly short period of time, faster than many before him. Caesar gained authority through the use of his public image as a Populares because he was born into the ideal social class, as a Patrician. He came from an old and established family line that made it only natural for him to go into the involvement of politics and government. Due to his family background, he had ties to the populares who were well known Roman political leaders on the side of the people. Caesar was a popular politician representing the masses of the people. His charisma and military victories  over the Germanic tribes in Gaul and his victories in Egypt, enabled him to quickly advance up the political ranks. One of the most critical political moves he made that contributed to his unbelievable success was an important 3-way partnership. Caesar proposed this 3-way partnership known as the 1st triumvirate. This strategic alliance was made between Gnaeus Pompeius Magnus, Marcus Licinius Crassus and Gaius Julius Caesar. It proposed by Caesar because there was increasing hostility between Pompey and Crassus. They divided up the Roman provinces between each other and the relationship between Pompey and Caesar was cemented by Pompeys marriage to Caesars daughter, Julia. However, the degeneration of the Triumvirate came with quickly with the death of Caesars daughter Julia, which broke the personal bond that Caesar and Pompey shared. This was followed by death of Crassus due to an attack by the Parthian army, which ended the Triumvirate. At the time of the First Triumvirate, the commonly known Republican form of government in Rome  was already well on its way to turning into a monarchy.   The first critical error Caesar made in his rise to power was when he was in Gaul. Caesar was accused of treason by some members of the senate because he had both tribunes on his side. Since they were on his side the tribunes both imposed their vetoes on the treason claim. The majority of the senate decided to ignore the vetoes and they ordered Caesar, who was now charged with treason to return back to Rome, without his army. Caesar did return to Rome but he did so with his army. As soon as he crossed the Rubicon River, he had in fact legally, committed treason. He was committing imperium, as he was exercising imperium when forbidden by the law. Waiting for Caesar was Pompey with his army, and the battle of Pharsalus took place in 48 BC. Caesar won the battle and Pompey was forced to flee to Egypt. Due to Caesars political innovation techniques, he was able to make political alliances that helped him rise in power, and that left him as the leader of the Roman world. Once Caesar returned to Rome he ruled alone where he began a platform of reform for Rome. He decided to make himself dictator for life and he appointed his own personal senators. Many citizens were hoping that, after the Civil War had ended, Caesar would restore the constitution and make the laws and the courts function again.(CITE 5) As he conquered more and more enemies, he became increasingly popular with the people of Rome. His military victories are what gave him ultimate political popularity and furthered his claim as true leader of Rome. His military prominence is what helped Rome flourish into arguably the greatest ancient civilizations in history. His outstanding military campaigns are what helped Rome prosper in both size and power. He increased the size of the Senate from about 600 members to 900, bringing in new men into the ranks of office holders. (CITE 5). He gave the poor new jobs and they became faithful supporters, furthermore increasing his popularity with the peop le. He also assisted the poor citizens by regularly checking the spread of money throughout Rome to make sure that no one was living too poorly (CITE 5). In addition, he rewarded thousands of Veterans with pieces of land and cash bonuses. (CITE 5). This was another smart strategy that Caesar implemented which made his soldiers fight better, because they had a cause to fight for, which was their land, family, and leader. With this act Caesar made Rome a more wealthy, open, and safe place to live. With Caesars quick increasing popularity the Senate tried to prevent Caesar obtaining the position of the consulate, which was a very important position because it was the position that was in charge of Romes defence forces. The Senate felt that Caesar wanted to take on the position of king of Rome. The divine honours that he accepted, the temple, the priest, the name divus Julius, and the festivals that marked the rule of the hellenistic monarchs, all point in that direction. It was thought by many in the Senate that Julius Caesar was becoming too powerful, and that he had dreams of kingship and ultimate power.(CITE 5) To the Senate this was a major threat towards the stability of the Roman Empire and this would have drastically reduced the power of the Senators. They feared that Caesar would turn the Roman Republic into a tyrannical monarchy (CITE 6). Caesar said that the republic was but a name without substance or form.(CITE 5) He called many assemblies to have them vote on laws that were constructed by him and to and to elect the candidates he had personally chosen. His disrespect of the constitution of Rome was on full display by an event in the year 45 BC, which was two and a half months before his death. Word came to Caesar that a consul in his office had suddenly died. Caesar quickly called an assembly and had it elect a new man to take over the position. This made the Senate extremely angry with Caesar and thus, the idea of eventually getting rid of Caesar by murder, was starting to evolve. The motive for the Senates killing of Caesar was ultimately out of personal hatred. They had personal animosity towards Caesar for his actions towards them. The friends of Caesar were infuriated to see him promote former enemies to positions of equality with themselves. Many of these former enemies, instead of feeling gratitude toward Caesar for their lives and for the benefits they had received, continued to feel resentment because they had lost so much to Caesar. (CITE 6). Many blamed Caesar personally for the setbacks that they or their families suffered. No Roman in history had ever exerted so much control over the lives of his fellow aristocrats more than Caesar. According to (CITE 6) the motive for the murder of Caesar was established when he sat in his golden chair before the new temple of Venus, the mother of his house, Caesar failed to rise to thank the fathers. This contributed to personal hatred on Caesar by the Senate. There were more than 60 senators associated with the plot. Many of them were Caesars former close friends. They had their own reasons for joining in on the organization, but majority were at a personal level. Many felt Caesar personally insulted them or their families. Therefore, Brutus and Cassius became the leaders in a plot to slay the Caesar, along with 60 other men, mainly pardoned by Caesar who were determined to carry out the deed of murdering him. (CITE 5). There were two key men who had an extreme personal hatred for Caesar and were the leaders in creating the perfect plot to murder him. Their names were Gaius Cassius, and Decimus Brutus, who was a special friend of Caesar. They both wanted personal revenge on Caesar with all the suffering they went through in the civil war Caesar created. Gaius Cassius Longinus was the first leader of this conspiracy who also had deep resentment for Caesar. The first thing Caesar did to infuriate Cassius was when he bypassed Cassius for the prestigious urban praetorship, consulting the office on Brutus instead. Cassius was also offended by Caesars unwillingness to award him the consulship until 41 BCE. (CITE 6). In addition, Caesar was very hesitant trust Cassius, even though he was one of the most experienced and able military commanders of his day. (CITE 4) He never rewarded Cassius with a major command position which suggests a lingering distrust, which is confirmed by Caesar light hearted remark t o his friends, that he suspected Cassius because of his paleness (CITE 5). On the other hand, Marcus Junius Brutus is the other best known figure in the conspiracy and he had a strong personal reason for his resentment of Caesar. Brutus was a very close friend of Caesar and Caesar trusted Brutus above all others in his administration. There was an apparent rumour which suggested that Caesar had an affair with Brutus mother, Servilia and it had provoked the idea that he was Caesars natural son. There were more rumours suggesting the she offered Caesar her daughter Tertia who was Brutus half-sister. (CITE 6) With all of these events, Brutus must have been deeply embarrassed by the matter, and his mothers conduct is one possible explanation for his personal motivation to kill Caesar. The sum of the evidence suggested that the personal motives Cassius and Brutus might have had for participating in the conspiracy to kill Caesar, also led them to hate Caesar for impeding their careers at several vital stages. Ultimately, Julius Caesar was a man of great care and charisma who also desired power, but above all, wanted to witness the citizens of Rome thrive under his authority. When he defeated Pompeys army and gained control of all of Rome, he began to establish reforms intended to make the people of Rome happier and more prosperous at all levels of society. He quickly became beloved by his citizens and gained incredible popularity among the Roman people. His increasing popularity and power became a grave threat to a group of Senates who were worried they would lose all of their power. The conspirators who feared the Caesar, created a plot to murder Romes greatest political figure. Led by Marcus Brutus and Gaius Cassius, the group of conspirators butchered Caesar until his death on the footsteps of the statue of Pompey. The motive clearly influencing these two men to kill Caesar was undeniably at the personal level. Their personal hatred towards Caesar is what led to the fall of Rome some f ive hundred years later. Julius Caesar made many key contribution to make Rome as successful and as powerful as it was. The chaos that ensued after his death, and the ultimate collapse of Rome, proves that his assassination was indeed a tragedy.

Tuesday, August 20, 2019

Examining Moral Philosophies’ Functions in Business Essay -- values, e

The Moral Philosophies’ Functions in Business Usually the conversation about philosophy in society is centered on the universal structure of values as part of their lives. Conversely moral philosophy relates to certain ideologies or statutes which are used by societies in determining right or wrong. It is imperative to comprehend there is a difference between â€Å"moral philosophies† and â€Å"business ethics†. The â€Å"moral philosophies† pertain to individual’s values, whereas â€Å"business ethics† is centered on groups’ decisions or relate to meeting a business objective. As espoused by Ferrell, et.al, (2013) the moral philosophy is what a person hold as their ethics and beliefs. However, when viewing ethics in the framework of business, ethics are based on what the group considers to be the best or worse approach for the business operation and its objectives. Therefore, it is the responsibility of a company or its managers to create, and instruct, employees on the conformity of ethical in business practices within their organizations. Managers also should understand that their personal moral philosophies can be influential as a guide to other employee. Moreover, it should be understood that moral philosophies offer standards for controlling how conflicts are settled in reference to people life’s concerns. Additionally moral philosophies influence how corporation devise business strategies and resolve specific ethical issues (Ferrell, et al., 2013, p. 153). With that said it should be noted that not one specific moral philosophy is accepted universally. This fact is proven by viewing how moral philosophies is used to are used to endorse certain economic system and the conduct of people in those systems. For the purpose of this paper... ...., Fraedrich, J. & Ferrell, L. (2013), Business ethics & social responsibility. [OMM640 Custom edition] Mason, OH: Cengage Learning Forsyth, D. R. (1992). Judging the morality of business practices: The influence of personal moral philosophies. Journal of Business Ethics, 11(5), 461. Retrieved from http://search.proquest.com/docview/198100721?accountid=32521 Robertson, C. J., & Crittenden, W. F. (2003).Mapping moral philosophies: Strategic implications for multinational firms. Strategic Management Journal, 24(4), 385-392. Retrieved from http://search.proquest.com/docview/225010000?accountid=32521 Singh, J., Vitell, S., Al-Khatib, J., & Clark, I. (2007). The Role of Moral Intensity and Personal Moral Philosophies in the Ethical Decision Making of Marketers: A Cross-Cultural Comparison of China and the United States. Journal of International Marketing, 15(2), 86-112.

Monday, August 19, 2019

Impressions of My Antonia :: My Antonia Essays

Impressions of My Antonia My Antonia has been called nostalgic and elegiac because it celebrates the past. The inscription on the title page of My Antonia is a quotation from Virgil: "Optima dies... prima fugit." This sentence, meaning "the best days are first to flee", helps incorporate all the elements of the novel I would like to discuss. It not only makes clear that Willa Cather will deal with memories of a glorious past, but also allows suitable basis to show how nature can change and affect a relationship. It also hints at the Hellenic, to a large extent pastoral tone the novel will be set in. A pastoral work retreats to an ideal rural setting. Jim Burden not only goes back to the prairie, but more importantly, he retreats to the innocent days of his very first memories. While this reflects on the focus of the paper, I will use two characters, Jim and Antonia, to illustrate these issues, and show why they make this book such a delightful work of art. My Antonia is told from the point of view of Willa Cather's fictional friend, Jim Burden. He writes in the first person, and his use of the pronoun "I" makes you feel his personal involvement. The point of view is immediate and subjective. Looking back on his memories, he knows what is eventually going to happen to the characters. He persuades you to sympathize with all of them. His perception, being broad and persuasive, sets the tone for the whole book. What is the purpose of having the story told by Jim Burden thirty years later? From that perspective he can present with great clarity and tenderness the highlights of his memories. A man of the world, he is reinvestigating his values. Jim Burden sets down everything the name of Antonia brings back to him. Antonia represents to him the most fundamental, traditional way to lead one's life, including the virtues of hard work, charity, love, optimism, pride, and sympathy with nature. The prairie makes one think of the forces of nature--immense, cyclical, and unpredictable. When Jim Burden arrives on his grandparents' farms, he is awed by the sight of "nothing but land." His parents are both

Sunday, August 18, 2019

The Death of Socrates :: Ancient Greece Greek History

The Death of Socrates "Crito, you and other people who claimed to be friends to Socrates are all useless! How could you have been so cowardly, or lazy, or stingy, as to allow you 'friend' to die? Surely, with a little courage, energy, and money, you could have saved him." Those are strong accusations coming from someone who obviously did not know Socrates as well as his other students or me. Although, I expected that people would react this way to my actions, or lack of actions, regarding Socrates death. For Socrates, being executed was the only option available to him. Of course we, his friends, could have helped him to escape, but what would that prove? It would only go against everything that Socrates has taught us. It would also defy everything that Socrates stood for in life. Escaping punishment, would have been an unjust and cowardly act for him. Disobeying the law would set a bad example for his fellow citizens. In addition, it would ruin his reputation for being just and following the laws of the government. Socrates believed that, although he was wrongfully accused, he was given a fair trial through the eyes of the law. The fact that he was given a fair trial means that he was given a fair punishment. If this punishment is not carried out, justice will not be served. Escaping punishment would cause a conflict between his teachings and his actions. This would eradicate the moral reputation that Socrates had built for himself throughout his life. The question he would have asked himself would have been, "What kind of example would I be setting if I dishonored my own teachings?" He saw his punishment as a contract between he and the government, and he firmly believed that agreements should not be broken. This is the same government that allowed him to live life as he chose, so why harm an institution that benefited him? The Death of Socrates :: Ancient Greece Greek History The Death of Socrates "Crito, you and other people who claimed to be friends to Socrates are all useless! How could you have been so cowardly, or lazy, or stingy, as to allow you 'friend' to die? Surely, with a little courage, energy, and money, you could have saved him." Those are strong accusations coming from someone who obviously did not know Socrates as well as his other students or me. Although, I expected that people would react this way to my actions, or lack of actions, regarding Socrates death. For Socrates, being executed was the only option available to him. Of course we, his friends, could have helped him to escape, but what would that prove? It would only go against everything that Socrates has taught us. It would also defy everything that Socrates stood for in life. Escaping punishment, would have been an unjust and cowardly act for him. Disobeying the law would set a bad example for his fellow citizens. In addition, it would ruin his reputation for being just and following the laws of the government. Socrates believed that, although he was wrongfully accused, he was given a fair trial through the eyes of the law. The fact that he was given a fair trial means that he was given a fair punishment. If this punishment is not carried out, justice will not be served. Escaping punishment would cause a conflict between his teachings and his actions. This would eradicate the moral reputation that Socrates had built for himself throughout his life. The question he would have asked himself would have been, "What kind of example would I be setting if I dishonored my own teachings?" He saw his punishment as a contract between he and the government, and he firmly believed that agreements should not be broken. This is the same government that allowed him to live life as he chose, so why harm an institution that benefited him?

Saturday, August 17, 2019

Holistic Development Essay

Every child is unique, all children are different no child is the same so this means that all children will grow and develop at different speeds and different rates. Meggitt (2006 p1) states â€Å"developmental norms are sometimes called milestones – they describe the recognised pattern of development that children are expected to follow. Each child will develop in a unique way†. Holistic development sees a child as a whole person it sees all the child’s areas of development. Each area of development that children will develop in, are dependent on one another they interconnect. Even though there are different areas of development and people see them as different areas, they are interconnected to one another or a child would not develop. So when a child progresses in one area, this will indefinitely effect progress in another area so if something when wrong in one area of development, say physical this will have effect on all the other areas social, emotional, intellectual and language. There are also many things that will have influence on a child’s development, teachers, parents, observations and the environment I am now going to talk about these below. Role of the teacher A teacher has a major role of a child holistic development. They will help all the children in there care with all areas of there development. A teacher can help children with any part of their development weather this be physical social etc. I think that a teacher is a very important part of a child’s development, as ezinarticles (2010) says â€Å"We can say that parents and teachers play a very important role in shaping child’s future. † A teacher will help a child with their mental and physiological development, but not only do they help with this but they also help with children learning about table manners, unity, team work and sharing which a child needs to learn in their life and can be sometimes they can be the more important things in life to make the child a better and friendly person. To help children with their development teachers have the early years foundation stage to follow Direct Gov. say that the early years foundation stage is (direct. gov 2011) â€Å"Schools and early year’s providers have to follow a structure of learning, development and care for children from birth to five years old. This is called the Early Years Foundation Stage (EYFS) and it enables your child to learn through a range of activities† The foundation stage is split up in to four themes these themes are learning and development, positive relationships, enabling environment and unique child. The learning and development theme is split in to six sections language, communication and literacy, problem solving, reasoning and numeracy, creative, physical personal social and emotional knowledge and understanding of the world. The teachers will follow this to help them with planning activities to help a child development on a whole. The EYFS other themes are equally as important as learning and development. Positive relationships are about the teaching make good and professional relationships with both the children in their class and the children’s parents/guardians. By the teachers in the class showing good and respectful relationships with both them the staff in the class and their parents this will encourage the children to do the same. The unique child’s is also equally as important as the other areas of the EYFS. This theme is all about the children and caring for them as they need to be cared for at a young age, not to discriminate them on their race, age, disability culture, also to keep them as safe as possible in the class and in the school. It very important to also take in to consideration as child’s wellbeing and health. Enabling environments when a child comes in to school in the morning they want to feel comfortable and relaxed so by setting up an environment that will help this will help the child. Enabling environment is also about observations using observations to evaluate and form assessments for the children. Sometimes as an early years teacher when it comes to a child development they only want what is best for the child to help them with their development. One implication that a teacher could find could be with the parents, if the parents refuse for the teachers to help the children with their development as some parents think they always know what is best for the child, which they are there parents and know the children the best but not always there development, so it is very important that us as early years teachers keep the parents involved in their child’s development. We can do this in many ways some of these are observations, photos, work they have done, chats. A teacher will have a major influence on a child holistic development in all different ways. They will help with a child’s behaviour by setting examples of what behaviour is right and wrong in their classroom and showing praise for good behaviour and discipline for bad behaviour. A classroom environment can have also have an effect on a child’s holistic development, by the teacher knowing the children they will be able to set up and environment that the children will like and enjoy and feel welcome in the teachers can do this by asking the children what they would like in their classroom as using a few of the children ideas around the classroom, this will make the children feel a lot more welcome as they will feel that they have made a contribution to the classroom area. This will have an effect on a child’s development (National Strategies 2008) states â€Å"Create an indoor environment that is reassuring and comforting for all children, while providing interest through novelty from time to time†. By creating an enabling environment where children feel welcomed they are more likely to use it and develop within it. It’s not just the class room where teachers can create this, the outdoors is where children learn and develop and explore when there young so by bringing the children’s interests outside too it will help them develop a whole lot more. For example if the children were really in to dinosaurs you could adapt on this to make the children’s learning more fun, helping them with all areas of their development through dinosaurs, they can draw dinosaurs – creative development, count dinosaurs spots – cognitive development, see how dinosaurs lived – social and emotional development, dinosaurs role play area. Create and area outside with trees a dinosaurs habitat and let the children create it with the teacher, so they are fully involved there are loads of different games and learning opportunities that you can create from children’s interest. By doing this it mean that the children will be interested in learning and being involved therefore learning and developing a whole lot more. The role that teachers have with a child language development is important in an early years setting. The teachers will follow the letters and sounds frame which works along with the early years foundation stage. The letters and sounds documentation is used in many early years foundations stages to help the children learn their letters and sounds; it uses many different strategies like jolly phonics. Letters-and-sounds 2010) â€Å"It aims to build children’s speaking and listening skills in their own right as well as to prepare children for learning to read by developing their phonic knowledge and skills. † This piece of documentation that has come in recently to help children learn the letters and the sounds of the letters. It will help the children to read and write not only that but it will help with their social skills talking to other people getting the letter sounds right. Physical development has become more and more important in schools because of the growing rate of childhood obesity, so the role of the teacher in physical education has become more important than ever. Children learn through physical development as they like to look around and explore as the early years foundation stage states (EYFS 2008) â€Å"Babies and young children are born with a deep interest in people and with a drive to find out about their world. Their search for meaning is an active process as they seek to understand how people behave and communicate, how objects work and what can be done with them, and how space can be used† children are always active when in school whether this be using there fine motor skills by writing or using their gross motor skills outside playing on the bikes. Children have needs to be active and it is important for them to be active to have a healthy lifestyle. By children being active this is where they learn about their world as there are fascinated by it roaming around on a field looking for snails and slugs children need to do this to learn about the things in their environment. Furthermore outside physical development is just as important as young children love to run about so it is important for the teacher in their role to plan activities for the outside. It states in the document every child outdoors, (every child outdoors 2010) â€Å"Nature is a major motivating factor for exercise. There is very strong evidence that being outdoors is the most powerful correlate of physical activity, particularly in pre-school children† Social and emotional development are closely linked together so when teachers are developing children in these area the teacher will link these two together. Children will develop their social and emotional development by going to school and making friends. It is important for the teacher to build a child’s self-confidence and self-esteem. A child cognitive development is learned through all the other reas of development, as is their language development they will learn language through doing all different activities and will learn new vocabulary by learning new activities. Role of the parents Parents are probably the most important people in a child life meaning they are the ones who majorly help their children with their development. The parents are the ones who start children off with their development, from the day they are born they help them to hold their head up, walk and learn to talk etc. Parents help their children with all the areas of development more than others. â€Å"High levels of nurturance combined with moderate levels of control help adults be responsible child rearing agents for their children and help children become mature, competent members of society. † Parents will know the major mile stones in a child’s development like walking and talking but sometimes parents do not know the little bits of a child’s development, like there mental development, social skills, gaining knowledge and understanding of the world and this can sometimes be the most important. Then this is where a teacher parent relationship can be very important so that they can communicate with each other about their child’s development. It is important that the parents are involved in their child learning and development at school as well as at home for the child’s wellbeing. Parents will help their children to develop in all the different five areas of development which are language development, physical development, cognitive development and social and emotional development. Parents can also have an influence on their child’s development; some parents might find some areas of development more important than others and push their children to develop in these areas more. This could mean that there child may lack in other areas an example of this could be, some parents might think that a child’s cognitive development is more important than a child physical development. So the parents may make the child focus on developing in there cognitive development, and not so much in their physical development so this may mean that the child may not be developing as well in their physical development as they would be in there cognitive. Some parents worry about their children’s development when their children are not at a stage of development that there meant to be at. Any parent will worry about this especially when they are young. All children develop and grow at different rates and speeds as all children are different. The every parent matter documentation (every parent’s matters 2007) states â€Å"many parents are unsure about how they can help their child to learn. They really shouldn’t worry one of the best way to support a child’s development is to have fun with them. † That is what the most important thing is for a child is to have fun to help them to develop especially with their parents as they are the main influences on a child life specially a young child. It is important for a child to play and have fun because children learn through play and it is an important part of their life. When a child is outside hunting for worms or playing on the bikes they just think they are playing but as early year’s teachers we know that they are learning through doing this as will their parents. Roles of observations Observations are very, very important for a child’s holistic development they can play an important part of a child’s development and can potentially help them or can find something wrong with the child‘s development. They can do this by evaluating the observation and comparing it to the thing that they were observing the child for and see whether the child did or didn’t do what the observer was observing for. Observations will mainly be done by the teachers in schools as they have to do them as teachers but parents will also do observations of their children even if this is just watching their children at the park or playing with their toys. There are many different types of observations that a teacher will do some of these are photo observations, written, time sample, sociagram etc. Teachers do observations so that they can see where a child is with their development by doing this they will be able to see if there ahead, at the right level or behind with their development. They can then help the child to progress in a way that suits that child as every child is different and are at different stages of development. When you have done an observation you can then see how affective that observation has been to you and to the child. You will be able to see how affective the observation has been by looking at the results of the observation and again comparing them to what you were observing the child for. A teacher can then see what they can do to help the child; they can then make a judgement on what to do next for the child to help them if they need it in anyway. There are many implications when undertaking observations on a child because they behaviour of the child that day may be different to any other day because something has happened. Another reason could be that the child is tired there are many reasons that a child may behave different that day. This is why teachers with normally do two to three observations of a child on different days at different times to make sure something that have seen that day is nothing out of the ordinary for the child. Doing professional observations does take practice to do them properly. It is important that an early year’s teacher doesn’t just make assumptions from one observation unless they are perfectly sure that they are right from what they have seen. This is why it is important to do more than one observation on a child. Role of the environment The environment in the modern day is having greater effect on a child’s development, more than it ever has in the past. Times are changing and so are the children because of the changing in the environment. Children’s personalities and development can depend on the environment that a child lives in me now quote from associated content (associated content 2008) â€Å". The behaviour patterns children learn depend heavily on models to which they are exposed. The socio-cultural environment is the source of differences as well as similarities in personality development. † Children are not developing at the same rate they did 10 years ago because of the changing of the environment. Society nowadays the children prefer to sit in doors on computer games than play outside with their friends and family. Which is effecting all areas of a child’s development social, emotional, physical, language and especially there cognitive development. It is important for children to go out into the environment and explore, as young children do love to do this, children can learn a lot from the environment. According to recent research it is important for children to explore the environment as if they don’t it can really effect and stunt a child’s academic and development growth. Less and less children are not visiting the countryside to go on walks with parents or grandparents whereas their parents and grandparents would have done this a lot with their family or friends. Fewer children are climbing trees and playing on the park which is natural and humane thing for children to do. When children come home they look more forward to playing on the computer or Xbox than going down to the park or going to play football. By children not getting outside as much and sitting in doors they are growing rates of childhood obesity , which is causing major concerns for children’s development especially there physical development. Also by children playing on their games all day they concentrate less at school and are becoming less interested in school. It is important for children to get outside and explore the environment. Conclusion What a child’s development means to me? It means a lot it is important for a child to grow and to develop at their own rate, as I’ve said throughout this essay every child is different no child is the same. Of course it is important for a child to develop to the developmental norms for their age, to keep up with things and other children there age but some children will develop more rapidly and some children will develop more slowly. Holistic development is all about that, see the child as a whole developing as a whole putting the areas of development together interlinking them all. In conclusion to this I personally think that no area of development for a child is more important than the other, as it is important that a child develops in all there areas of development in their own way. Of course some children are going to develop better in some areas than others that is near enough proven with every child but I think that no area of development Is more important that the next. Some parents may think that cognitive development is the most important area of development, as they may think that children need to be clever/ intelligent to have a good life and a good future ahead of them, but this is not always the case as some children cannot do so well in school even hate school and not develop well in there cognitive development but be absolutely fantastic in other areas say physical and in their future they could become an athlete which is still a brilliant future for a child.

Friday, August 16, 2019

Greek Mythology and Medea Essay

Medea is a Greek tragedy which was written in 431 BC by the Greek philosopher Euripides. The story of Medea is one filled with anger, jealousy, and death. The main character, Medea, has to overcome the personal heartache of seeing her husband, Jason, marry another woman. The ensuing struggle she has with this notion is the focus of this play. In a very important scene, Medea hatches her plan to murder the princess, who is Jason’s new bride, as well as Jason himself. She says that first, she will pretend to beg for Jason’s forgiveness, and then she will have him bring the children back to the palace. At the palace, the children will present gifts to the princess from Medea. The gifts of a veil and bridal robe were covered with a poison that is designed to melt the skin from her body, as well as anyone who touched her. When the children give the gifts to the princess, she cannot resist putting them on immediately. After she put them on, the gifts begin to work as Medea had hoped. The skin begins to melt from her body and her hair begins to fall out. She also bursts into flames. Upon seeing this, a servant goes to fetch the king and Jason, and when he saw his daughter, King Creon collapses helplessly on the body, and as a result died from the same poisons. Jason returns to the place where Medea is staying and insists to see his children. But he is too late, as Medea has killed them as well. Her reasoning was that she hates Jason more than she loves her children. The sheer cruelty of this scene illustrates Euripides’ point that a clever woman with enough time to hatch a plan is a very dangerous woman indeed. It also proves that hell hat no fury like a woman scorned. Euripides was aiming to show, in my opinion, that when a woman is wronged in a manner such as this one, the man who has scorned her had better think twice about turning his back on the woman, especially if she is a clever one, as was Medea.