Saturday, November 30, 2019

The Nuremberg Trials Essays (2078 words) - Nazism,

The Nuremberg Trials The Nuremberg Trials The Nuremberg trial was built up to be the trial of the century. In the words of Norman Birkett, who served as a British alternate judge: it was the greatest trial in history . The four most intriguing characters of this trial were of vast contradiction to each other; there was Herman Georing the relentless leader, Joachim von Ribbentrop the guilty and indecisive follower of Hitler, Hjalmar Schacth the arrogant financial wizard of the Rich and Albert Speer the remorseful head of armament and munitions. Three of the four allies wanted the Nazi leaders to be executed without a trial Winston Churchill said, They should be rounded up and shot like dogs but the Americans persuaded the other allies that a trial would be most beneficial from a public relations standpoint, so now with the allies agreed the stage for Nuremberg was set. The four most fascinating leaders of the Nazi party that were put on trial were Georing, von Ribbentrop, Schacth and Speer, not so much individually but together. Georing was presumably the most famous and high ranking of all the defendants tried at Nuremberg. He had joined the Nazi party in 1922 and ascended to the post of president of the Reichstag in essence Hitlers number two man. He like many of the others tried was very intelligent, but seemed to be much too aware of it. He defend himself and Hitler vigorously saying the victor will always be the judge and the vanquished the accused. Von Ribbentrop was the German foreign minister in theory, but in reality he was just a messenger of Hitlers will with no real power. He was said by all Nazi leaders to be very week and indecisive to the point of asking prison barbers and guards for advice for his defense. The once powerful man who made foreign policy decisions that cost millions there lives could not even decide if he felt remorse or if he was correct in his actions. Schacth the German in charge of finances and the Reichsbank considered himself to be innocent in the absolute. He stated that he did help rearm Germany but that was hardly a crime because the allied military inspectors watched as we broke the treaty of Versailles. He said his proof of being innocent was that he served time in a German concentration camp for disagreeing with Hitler. The most repentant of all the Nazi higher ups was Albert Speer. He wanted to take responsibility for actions, and wanted the others to do the same. Speer was in charge of munitions and armament. The defendants all pleading not guilty, they were now left with the task of waiting for there fate. With the defendants all in custody the next step of the trial would be for the allies to organize their prosecution and manufacture the charges agents the defendants. The allies indicted the Nazis under four counts with each allied country dealing with one count. Committee (1) Conspiracy to commit crimes alleged in other counts (United States) Committee (2) Crimes agents peace (England) Committee (3) War Crimes (France) Committee (4) Crimes agents humanity (Russia) The United States alleged that the Nazi party as a whole committed conspiracy to start an aggressive war, to commit crimes agents humanity (slave labor and the stealing of resources) and to cleanse the world of various ethnic groups. After the Nazi party acquired governmental control over Germany they conspired to:(a compressed version of the indictment as a whole by all four countries) Conspiracy to Commit Crimes Agents the peace -Re-arm and reoccupy the Rhineland in violation of the treaty of Versailles (World War II surrender terms, limitations on Army, Air Force and Navy) -On 5/21/1935 the Germans falsely announced to the world that they would fallow the Versailles and Locarno Pacts (Territorial and weapons treaty) -Aggressive action agents Austria and Czechoslovakia. -As of 1937 plans were made for the conquest of Austria and Czechoslovakia contrary to what Hitler said Germany neither intends, nor wishes to interfere in the internal affairs of Austria -The planning to start war with Denmark, Norway, Belgium, the Netherlands, Luxembourg, Yugoslavia, Greece, England and Russia. Conspiracy to Commit War Crimes and Crimes Agents Humanity. -The Nazi party conspired to commit ethnic cleansing. -The Nazi

Tuesday, November 26, 2019

Laptop vs. Freewrite An Infographic - Freewrite Store

Laptop vs. Freewrite An Infographic - Freewrite Store I want to run a quick experiment with you. Grab your laptop, open up a new Word document, and see how long you can write before you get interrupted by some sort of notification on your phone or computer. How long did you make it? I got through a whole 2 minutes before I saw the 'new email' notification pop up on my computer. Naturally, I figured that this email was of grave importance, so I stopped what I was writing mid-sentence and checked it. It turned out to be an advertisement for car insurance. That made me curious about what I was currently paying for car insurance, so I logged into my account to check my policy. Long story short, I ended up going down a crazy internet rabbit hole, and after about 20 minutes, I somehow found myself reading an article about what type of lizard the GEICO lizard is. By the time I finally got back to my document, my train of thought had long since departed.  Ã‚   While technology has made amazing strides in global connectivity and communication, it also has costs. Modern devices like laptops and smartphones are designed to be ‘jack-of-all-trades’ tools that can be used to do almost anything you want - but as we just saw, the simple task of writing uninterrupted for more than 5 minutes straight is a struggle. We've designed the perfect solution to counter this problem: The Freewrite Smart Typewriter. Unlike laptops or phones, we've specifically designed the Freewrite to be exceptional at one thing, and one thing only: writing. Check out how laptops stack up to Freewrite in a head to head match up:

Friday, November 22, 2019

Bitwise Operations in VB.NET

Bitwise Operations in VB.NET VB.NET doesnt support bit level operations directly. Framework 1.1 (VB.NET 2003) introduced bit shift operators ( and ), but no general purpose way to manipulate individual bits is available. Bit operations can be very useful. For example, your program might have to interface with another system that requires bit manipulation. But in addition, there are a lot of tricks that can be done using individual bits. This article surveys what can be done with bit manipulation using VB.NET. You need to understand bitwise operators before anything else. In VB.NET, these are: And Or Xor Not Bitwise simply means that the operations can be performed on two binary numbers bit by bit. Microsoft uses truth tables to document bitwise operations. The truth table for And is: 1st Bit  Ã‚  Ã‚  2nd Bit  Ã‚  Ã‚  Result  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  0  Ã‚  Ã‚  Ã‚  0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  0  Ã‚  Ã‚  Ã‚  0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  0 In my school, they taught Karnaugh maps instead. The Karnaugh map for all four operations are shown in the illustration below. Click Here to display the illustrationClick the Back button on your browser to return Heres a simple example using the And operation with two, four bit binary numbers: The result of 1100 And 1010 is 1000. Thats because 1 And 1 is 1 (the first bit) and the rest are 0. To begin with, lets take a look at the bit operations that are directly supported in VB.NET: bit shifting. Although both left shift and right shift are available, they work the same way so only left shift will be discussed. Bit shifting is most often used in cryptography, image processing and communications. VB.NETs bit shifting operations ... Only work with the four types of integers: Byte, Short, Integer, and Long Are arithmetic shifting operations. That means that bits shifted past the end of the result are thrown away, and the bit positions opened up on the other end are set to zero. The alternative is called circular bit shifting and the bits shifted past one end are simply added to the other. VB.NET doesnt support circular bit shifting directly. If you need it, youll have to code it the old fashioned way: multiplying or dividing by 2. Never generate an overflow exception. VB.NET takes care of any possible problems and Ill show you what that means. As noted, you can code your own bit shifting by multiplying or dividing by 2, but if you use the code your own approach, you have to test for overflow exceptions that can cause your program to crash. A standard bit shifting operation would look something like this: Dim StartingValue As Integer 14913080Dim ValueAfterShifting As IntegerValueAfterShifting StartingValue 50 In words, this operation takes the binary value 0000 0000 1110 0011 1000 1110 0011 1000 (14913080 is the equivalent decimal value - notice that its just a series of 3 0s and 3 1s repeated a few times) and shifts it 50 places left. But since an Integer is only 32 bits long, shifting it 50 places is meaningless. VB.NET solves this problem by masking the shift count with a standard value that matches the data type being used. In this case, ValueAfterShifting is an Integer so the maximum that can be shifted is 32 bits. The standard mask value that works is 31 decimal or 11111. Masking means that the value, in this case 50, is Anded with the mask. This gives the maximum number of bits that can actually be shifted for that data type. In decimal: 50 And 31 is 18 - The maximum number of bits that can be shifted It actually makes more sense in binary. The high order bits that cant be used for the shifting operation are simply stripped away. 110010 And 11111 is 10010 When the code snippet is executed, the result is 954204160 or, in binary, 0011 1000 1110 0000 0000 0000 0000 0000. The 18 bits on the left side of the first binary number are shifted off and the 14 bits on the right side are shifted left. The other big problem with shifting bits is what happens when the number of places to shift is a negative number. Lets use -50 as the number of bits to shift and see what happens. ValueAfterShifting StartingValue -50 When this code snippet is executed, we get -477233152 or 1110 0011 1000 1110 0000 0000 0000 0000 in binary. The number has been shifted 14 places left. Why 14? VB.NET assumes that the number of places is an unsigned integer and does an And operation with the same mask (31 for Integers). 1111 1111 1111 1111 1111 1111 1100 11100000 0000 0000 0000 0000 0000 0001 1111(And)0000 0000 0000 0000 0000 0000 0000 1110 1110 in binary is 14 decimal. Notice that this is the reverse of shifting a positive 50 places. On the next page, we move on to some other bit operations, starting with Xor Encryption! I mentioned that one use of bit operations is encryption. Xor encryption is a popular and simple way to encrypt a file. In my article, Very Simple Encryption using VB.NET, I show you a better way using string manipulation instead. But Xor encryption is so common that it deserves to at least be explained. Encrypting a text string means translating it into another text string that doesnt have an obvious relationship to the first one. You also need a way to decrypt it again. Xor encryption translates the binary ASCII code for each character in the string into another character using the Xor operation. In order to do this translation, you need another number to use in the Xor. This second number is called the key. Xor encryption is called a symmetric algorithm. This means that we can use the encryption key as the decryption key too. Lets use A as the key and encrypt the word Basic. The ASCII code for A is: 0100 0001 (decimal 65) The ASCII code for Basic is: B - 0100 0010a - 0110 0001s - 0111 0011i - 0110 1001c - 0110 0011 The Xor of each of these is: 0000 0011 - decimal 30010 0000 - decimal 320011 0010 - decimal 500010 1000 - decimal 400010 0010 - decimal 34 This little routine does the trick: Xor Encryption Dim i As ShortResultString.Text Dim KeyChar As IntegerKeyChar Asc(EncryptionKey.Text)For i 1 To Len(InputString.Text)  Ã‚  Ã‚  ResultString.Text _  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Chr(KeyChar Xor _  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Asc(Mid(InputString.Text, i, 1)))Next The result can be seen in this illustration: Click Here to display the illustrationClick the Back button on your browser to return To reverse the encryption, just copy and paste the string from the Result TextBox back into the String TextBox and click the button again. Another example of something you can do with bitwise operators is to swap two Integers without declaring a third variable for temporary storage. This is the kind of thing they used to do in assembly language programs years ago. Its not too useful now, but you might win a bet someday if you can find someone who doesnt believe you can do it. In any case, if you still have questions about how Xor works, working through this should put them to rest. Heres the code: Dim FirstInt As IntegerDim SecondInt As IntegerFirstInt CInt(FirstIntBox.Text)SecondInt CInt(SecondIntBox.Text)FirstInt FirstInt Xor SecondIntSecondInt FirstInt Xor SecondIntFirstInt FirstInt Xor SecondIntResultBox.Text First Integer: _  Ã‚  Ã‚  FirstInt.ToString - _  Ã‚  Ã‚  Second Integer: _  Ã‚  Ã‚  SecondInt.ToString And heres the code in action: Click Here to display the illustrationClick the Back button on your browser to return Figuring out exactly why this works will be left as as an exercise for the student. On the next page, we reach the goal: General Bit Manipulation Although these tricks are fun and educational, theyre still no substitute for general bit manipulation. If you really get down to the level of bits, what you want is a way to examine individual bits, set them, or change them. Thats the real code that is missing from .NET. Perhaps the reason its missing is that its not that hard to write subroutines that accomplish the same thing. A typical reason you might want to do this is to maintain what is sometimes called a flag byte. Some applications, especially those written in low level languages like assembler, will maintain eight boolean flags in a single byte. For example, a 6502 processor chips status register holds this information in a single 8 bit byte: Bit 7. Negative flagBit 6. Overflow flagBit 5. UnusedBit 4. Break flagBit 3. Decimal flagBit 2. Interrupt-disable flagBit 1. Zero flagBit 0. Carry flag (from Wikipedia) If your code has to work with this kind of data, you need general purpose bit manipulation code. This code will do the job! The ClearBit Sub clears the 1 based, nth bit (MyBit) of an integer (MyByte).Sub ClearBit(ByRef MyByte, ByVal MyBit)  Ã‚  Ã‚  Dim BitMask As Int16  Ã‚  Ã‚   Create a bitmask with the 2 to the nth power bit set:  Ã‚  Ã‚  BitMask 2 ^ (MyBit - 1)  Ã‚  Ã‚   Clear the nth Bit:  Ã‚  Ã‚  MyByte MyByte And Not BitMaskEnd Sub The ExamineBit function will return True or False depending on the value of the 1 based, nth bit (MyBit) of an integer (MyByte).Function ExamineBit(ByVal MyByte, ByVal MyBit) As Boolean  Ã‚  Ã‚  Dim BitMask As Int16  Ã‚  Ã‚  BitMask 2 ^ (MyBit - 1)  Ã‚  Ã‚  ExamineBit ((MyByte And BitMask) 0)End Function The SetBit Sub will set the 1 based, nth bit (MyBit) of an integer (MyByte).Sub SetBit(ByRef MyByte, ByVal MyBit)  Ã‚  Ã‚  Dim BitMask As Int16  Ã‚  Ã‚  BitMask 2 ^ (MyBit - 1)  Ã‚  Ã‚  MyByte MyByte Or BitMaskEnd Sub The ToggleBit Sub will change the state of the 1 based, nth bit (MyBit) of an integer (MyByte).Sub ToggleBit(ByRef MyByte, ByV al MyBit)  Ã‚  Ã‚  Dim BitMask As Int16  Ã‚  Ã‚  BitMask 2 ^ (MyBit - 1)  Ã‚  Ã‚  MyByte MyByte Xor BitMaskEnd Sub To demonstrate the code, this routine calls it (parameters not coded on Click Sub): Private Sub ExBitCode_Click( ...  Ã‚  Ã‚  Dim Byte1, Byte2 As Byte  Ã‚  Ã‚  Dim MyByte, MyBit  Ã‚  Ã‚  Dim StatusOfBit As Boolean  Ã‚  Ã‚  Dim SelectedRB As String  Ã‚  Ã‚  StatusLine.Text   Ã‚  Ã‚  SelectedRB GetCheckedRadioButton(Me).Name  Ã‚  Ã‚  Byte1 ByteNum.Text Number to be converted into Bit Flags  Ã‚  Ã‚  Byte2 BitNum.Text Bit to be toggled  Ã‚  Ã‚   The following clears the high-order byte returns only the  Ã‚  Ã‚   low order byte:  Ã‚  Ã‚  MyByte Byte1 And HFF  Ã‚  Ã‚  MyBit Byte2  Ã‚  Ã‚  Select Case SelectedRB  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Case ClearBitButton  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  ClearBit(MyByte, MyBit)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  StatusLine.Text New Byte: MyByte  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Case ExamineBitButton  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  StatusOfBit ExamineBit(MyByte, MyBit)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  StatusLine.Text Bit MyBit _  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   is StatusOfBit  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Case SetBitButton  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  SetBit(MyByte, MyBit)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  StatusLine.Text New Byte: MyByte  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Case ToggleBitButton  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  ToggleBit(MyByte, MyBit)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  StatusLine.Text New Byte: MyByte  Ã‚  Ã‚  End SelectEnd SubPrivate Function GetCheckedRadioButton( _  Ã‚  Ã‚  ByVal Parent As Control) _  Ã‚  Ã‚  As RadioButton  Ã‚  Ã‚  Dim FormControl As Control  Ã‚  Ã‚  Dim RB As RadioButton  Ã‚  Ã‚  For Each FormControl In Parent.Controls  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  If FormControl.GetType() Is GetType(RadioButton) Then  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  RB DirectCast(FormControl, RadioButton)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  If RB.Checked Then Return RB  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  End If  Ã‚  Ã‚  Next  Ã‚  Ã‚  Return NothingEnd Function The code in action looks like this: Click Here to display the illustrationClick the Back button on your browser to return

Thursday, November 21, 2019

Should the U.S. Stop Buying Some Imported Foods Essay

Should the U.S. Stop Buying Some Imported Foods - Essay Example This research will begin with the statement that in recent years there has been increasing consumer demand for imported food within the U.S., with a desire for numerous varieties of exotic food and out-of-season foods, fueling the controversy over whether allowing so much imported food into the U.S. is in our collective best interest. Legislation has been passed to improve inspection of imported food, but it would be too expensive to inspect all of it. My position is that the U.S. should stop buying food imported from some countries because it puts our public health at risk, undermines the U.S. economy, and puts the U.S. at increased risk for bioterrorism. Imported food increasingly puts our public health at a greater risk   One reason for this is that the Food and Drug Administration (FDA) safety testing has been cut in half since 2003 and the number of FDA employees involved in food testing has dropped 12 percent.   Only 1.3 percent of imported food was inspected in 2006. This has been enough to erase the gains made in inspections following 9-11 when concern about the safety of imported food was the highest. Imported food faces the same health risks as food grown locally, which in recent times has caused E. coli and Salmonella food poisoning illnesses. But it would be much more expensive for FDA inspectors to inspect the farms and other sources of tainted food when it is overseas if they were even given the authority. These problems make limiting imported food appears to be a wise choice, in order to avoid outbreaks of disease.

Tuesday, November 19, 2019

Kidneys for Sale Essay Example | Topics and Well Written Essays - 750 words

Kidneys for Sale - Essay Example They further affirm that such a business sector could be controlled in a viable manner and that kidney sellers would gain advantage from the money related windfalls. However, these cases are not very much substantiated and may to some degree prove unsubstantial. Nonetheless, the proponents fail to figure out the likely numerous other conceivable impacts of permitting people to sell such organs (Taylor, 2005). Some people may argue that a very much controlled legitimate market for kidneys would not have any of these issues. They further argue that this could guarantee that benefactors are remunerated reasonably. Most specialists suggest that approximately $50,000 would be well (Cherry, 2005). Just the legislature or a particular charitable organization would be permitted to buy the kidneys, and they would apportion them on the premise of need as opposed to riches, in a similar manner that the posthumous kidneys are being distributed. The kidneys would be paid for by anyone covering th e patient if that is their Medicare or insurance agency. Preferably, a large number of kidney donors would be willing to donate that no patient would be left on the waiting list to die eventually. At last, paying for organs could actually spare the administration or governments some cash; citizens presently take care of all charges for dialysis for some patients through Medicare, and the examination has demonstrated that transplants save more than $100,000 per patient, with respect to dialysis (Cherry, 2005).

Saturday, November 16, 2019

Star Appliance Company Essay Example for Free

Star Appliance Company Essay The methods that could be used to determine the cost of capital of Star Appliance Company would be to calculate the cost of equity of the company and then using that in finding another discount (hurdle) rate. Being that the currently used discount rate of 10 percent has been used since the company’s first years before the depression it should be recalculated in order to get a more appropriate discount rate in the time of the decision of for the dishwasher, trash compacter, or the food disposal. After increasing the discount rate to a more appropriate percent for the current time, you would then want to reevaluate the net present value of the three proposed investments in order to determine which of the three should be chosen. Now that these values have been recalculated with the newer discount rate, it can be determined that both the dishwasher and the trash compactor would be the best investment decisions for Star Appliance Company. This is because at the higher discount rate, these both still have positive net present values along with a higher internal rate of return than the new discount rate. These would prove best for the company’s investments where as the food disposal would be more costly to the firm. In the second half of the Star Appliance case (B), the given strategies would be in calculating dividend discount model, earnings/price model, and CAPM. Each of these models come about calculating things that are similar but different characteristics of the company can be represented by each different calculation. The current cost of capital that I calculated came to 11. 58%. The investment opportunities are now different than previous years for Star because now they are opening the chance for debt financing where as before they were 100 percent equity financed. It is because of this that they must calculate there newer cost of capital as compared to the original of 10 percent. Also, the investments made in the stock market are different than that of the company because the different betas used will result in different calculations for the stock market and for the company, as well as the various amount of different internal investing opportunities that Star could decide to do would also make for different investments. After going over the different circumstances the projects that Star should except would be the new grain dryer product. Although this project has more risk, the return on the project would be much greater than that of the refrigerator. This is also due to the different cost of capital from the years previous for Star as the more current at the time of the case. With newer investments in long-term debt, it amounts in different costs of capitals to the previous 0 debt 100 percent equity investments.

Thursday, November 14, 2019

An Analysis of Herman Melville and Moby Dick :: Moby Dick Essays

An Analysis of Herman Melville and Moby Dick      Ã‚  Ã‚  Ã‚   "Moby Dick is biographic of Melville in the sense that it discloses every nook and cranny of his imagination." (Humford 41) This paper is a psychological study of Moby Dick.   Moby Dick was written out of Melville's personal experiences.      Ã‚  Ã‚  Ã‚  Ã‚   Moby Dick is a story of the adventures a person named Ishmael.   Ishmael is a lonely, alienated individual who wants to see the "watery part of the world."   Moby Dick begins with the main character, Ishmael, introducing himself with the line "Call Me Ishmael." (Melville 1)   Ishmael tells the reader about his background and creates a depressed mood for the reader. Call me Ishmael. "Some years ago-nevermind how long precisely- having little or no money in my purse, and nothing particular to interest me on shore, I thought I would sail about a little and see the watery part of the world." (Melville 1)   Ishmael tells the reader about his journeys through various towns such as New Bedford, Nankantuket.   Eventually while in Nankantuket, Ishmael signed up for a whaling voyage on the Pequod.   The Pequod was the whaling boat Ishmael sailed on where such characters as Queequeq, Starbuck, and the captain of the ship, Ahab, all journeyed together.      Ã‚  Ã‚  Ã‚  Ã‚   Not long once at sea, the captain of the ship, Ahab reveals his plan to hunt down a white whale named Moby Dick. Ahab was veteran sailor, a man that had a heart of stone.   Ahab had a personal grudge against Moby Dick.   Moby Dick was responsible for taking off Ahab's leg in a previous voyage. Ahab's plan was essentially an unauthorized takeover, what the whaling company had not in mind. Ahab was very irrational and ludicrous; his plan seals the fate for himself and the crew of the Pequod.   In the tragic ending of Moby Dick, all of the characters die except for Ishmael. Ishmael survived Moby Dick's attack of the ship with the help of a coffin that his close friend Queequeq built.   Ishmael of Moby Dick   was a special character because he closely relates to the author's own life.   There are many symbolism's between Ishmael of Moby Dick and Herman Melville's own life.   The name Ishmael can be traced back to the Bible.

Monday, November 11, 2019

Ms †Mahathir Foreign Policy Essay

Subsequence to the persistence, a resolution has been taken in the 38th session of the United Nations where the General-Secretary of United Nations must make a thorough study on Antarctica issues which included the distribution of natural resource which available and the ‘Antarctica Treaty System’. Malaysia was able to get a United Nations resolution to involve issue of distribution of Antarctic natural resources in the upcoming United Nations agenda in November 1984. However, Malaysia failed to obtain a resolution for the establishment of the United Nations committee to replace the ‘Antarctica Treaty system’ as there were strong protests from the countries of ‘Antarctica Treat System’ which were United State of America and Russia. Malaysia assumes that the continent of Antarctica as important in the terms of its influence on ‘Ecology’ and the surrounding world and the world’s climate. For example, 90% of the world’s fresh water which consist in the form of ice and snow were available in Antarctica. Besides, it also contains a potential supply of foodstuffs and raw materials such as iron minerals, coal, chromium, uranium, cobalt, nickel, copper, lead, zinc, gold, silver, platinum, oil and gas. Furthermore, there are also plants and animals that only consist in Antarctica and there are some which are rare in other places. Based on these facts, Malaysia demands the continent in Antarctica to become common heritage for common benefits for the whole world. In December 1959, issues which involve the affairs of Antarctica was managed by the representatives of the countries which are the members of the ‘Antarctica Treaty System’. Then, Malaysia has a view that the system only benefits the minor group of members of the ‘Antarctica Treaty System’. The system is not fair as the membership structure in the form of two levels (two-tier) because the decision can only be made by 16 countries which are the former members of the treaty, though there are another 12 countries which are also the members of the treaty. These 12 countries are only allowed to conduct research without having the power to vote or making decision. This is against to the objectives of the former agreement in the ‘Antarctica Treaty’ where Antarctica should be managed by international committee for the benefits of all mankind. Moreover, 160 countries were in the United Nations currently which most of them are composed of developing countries. Therefore, their rights and their views should be taken into consideration by the international committee of Antarctica. The privilege in the management system based on the Antarctica was not been satisfied. The former member countries held several closed-door meeting without the knowledge of the other members. These closed-door meeting was held in order to establish a mineral regime for the purpose of mining mineral substances in their area. With the advent of Sea-Bed Convention on the Law of the Sea and the suggestion of formation of International Sea-Bed Authority, the mineral regime which proposed by members of the Antarctic Treaty is extremely against to most other countries. Mineral regime is another attempt by the former members of the agreement to enhance their power in the opinion of Malaysia. Nevertheless, the activities of mining mineral substances can cause massive destruction to the system ecology in Antarctica. The objectives of this policy are to share the minerals in Antarctica for the benefits of all human beings. Next, it is to preserve the ecology and environment of the world. Besides, Antarctica is use to encourage the concept of ‘disarmament, ‘denuclearisation’ and ‘demilitarisation’ It is hoped that the suggestions as well as Malaysia’s proposal to make Antarctica as the common heritage for the common benefit of the entire world will be take into the consideration of the organizations of the United Nations. THE CONCEPT OF ZONE OF PEACE, FREEDOM AND NEUTRALITY (ZOPFAN) IN SOUTHEAST ASIA As the block that can be regarded as non-communist Southeast Asia, ASEAN in reality stick to neutrality. Malaysia’s proposal for the creation of zone of peace, freedom and neutrality or ZOPFAN was accepted as the ASEAN stance. The concept and this policy was announced in Kuala Lumpur by our 4th prime minister who was Tun Dr. Mahathir Mohamad on the 27th November 1971. There are some important factors and events that occurred in Southeast Asia which thrust rise to the concept of the Zone of peace,Freedom and Neutrality. These factors and events are the position of Southeast Asia is quite strategic to the great powers in the context of East-West political tensions; political upheaval in Vietnam as well as the results of withdrawal of British troops from Southeast Asia and the United States from Vietnam in the early 70s. These developments had created anxiety among the ASEAN countries, as it may affect regional stability. Next, the wars in Korea and Vietnam ASEAN convinced that intervention and support military superpowers conflict smaller countries of Southeast Asia are often threatened the stability of this region. Furthermore, at the time there was a spirit of ‘regionalisma’ which created ASEAN regional economic cooperation that can be used as a catalyst to achieve ZOPFAN. The objective of Zone of peace, Freedom and Neutrality is to make Southeast Asia a region of peace, freedom and neutrality of political bickering major powers particularly the United States, Russia and People’s Republic of China. Among the key strategies that have been formulated and implemented to achieve these objectives are by getting the great powers approval, recognition and guarantee about the objective and efforts to realise the concept. Next, it is to protract foreign military troops from Southeast Asia in the long run. Moreover, it makes Southeast Asia as a region free of nuclear weapon. In conclusion, the willingness of great powers to recognize and guarantee Zone of Peace, Freedom and Neutrality is essential for the creation of ZOPFAN. In addition, support from all members of the ASEAN countries is also needed. However, ASEAN’s determination to continue to pursue the concept ZOPFAN is reflected by the ASEAN’s efforts to finda political solution in Cambodia based on the resolution of the United nations Organisation and the declaration of Internatonal Conference on Kampuchea 1981.

Saturday, November 9, 2019

Billing system Essay

The Information Flow Model (IFM) is used to understand the sources and destination of information flow, which is required to execute the business process as shown in Figure 3.5. In IFM, information or data generators and processors are brought together to explain the flow. This could be documents, e-mail, or voicemail. The contents of the flow could be text, images, or diagrams. The purpose of the flow is to take the process further to its logical conclusion. For example, a customer order is to be processed for delivery or to be rejected, and necessary data or information input has to be provided progressively in the process. IFM is generally a high-level model showing main flows, internal flows of information from sources, such as product catalogs, and manufacturing schedules. Customer profiles and accounting information are not shown. These are presumed to be present. In an information flow model, each processing stage is described as one of the following stage classes: 1. Data Supply Ââ€" where data suppliers forward information into the system. 2. Data Acquisition Ââ€" the stage that accepts data from external suppliers and injects it into the system. 3. Data Creation Ââ€" internal to the system, data may be generated and then forwarded to another processing stage. 4. Data Processing Ââ€" any stage that accepts input and generates output (as well as generating side effects). 5. Data Packaging Ââ€" any point at which information is collated, aggregated and summarized for reporting purposes. 6. Decision Making Ââ€" the point where human interaction is required. 7. Decision Implementation Ââ€" the stage where the decision made at a decision-making stage is executed, which may affect other processing stages or a data delivery stage. 8. Data Delivery Ââ€" the point where packaged information is delivered to a known data consumer. 9. Data Consumption Ââ€" as the data consumer is the ultimate user of processed information, the consumption stage is the exit stage of the system. Data moves between stages through directed information channels Ââ€" pipelines indicating the flow of information from one processing stage to another and the direction in which data flows. An information flow model is represented by the combination of the processing stages connected by directed information channels. Once the flow model has been constructed, names are assigned to each of the stages and channels. An information flow model can be used to identify the source of a data quality problem. The effects of a data quality problem might manifest themselves at different stages within an information flow, perhaps at different data consumption stages. However, what may appear to be multiple problems may all be related to a single point of failure that takes place earlier in the processing. By identifying a set of data-quality expectations and creating validation rules that can be imposed at the entry and exit of each processing stage, we can trace through the information flow model to the stage at which the data quality problem occurred. Fixing the problem at the source will have a beneficial effect across the board, as all subsequent manifestations should be eliminated!

Thursday, November 7, 2019

Critique of Philadelphia (the movie) essays

Critique of Philadelphia (the movie) essays They are your friends, your sibling, your guardian and your significant other. They are your minister, your teacher, your bank-teller, your doctor, your mail-carrier, your roommate and your congressional representative (Mohr 1). They are everywhere, even in your workplace. Mohr, the author of A More Perfect Union, was referring to homosexuals. Gays and lesbians have become a contemporary social issue. For six years now, the homosexual issue has been dramatized in the media. The issue quickly carried over into the workplace. Although the workplace is becoming the new frontier in the battle for gay rights and equality (Winfeld 39), gays are subject to widespread discrimination in employment. In one such case, a man like Andrew Beckett was fired from a prestigious law firm because he was gay and had AIDS. Imagine, if you can, working for a law firm and just being promoted. You are a qualified, experienced, efficient worker. But, you are also gay and have AIDS. Since you are being plagued by legions, and no makeup can conceal your illness, you have no choice but to work at home or late-night at the office. Someone unknown to you discovers your illness and sexual orientation and decides to sabotage you. You have recently been working on the firms most important case. You leave a copy of the case on a disk on your desk. The following day, it is nowhere to be found. A day later, the disk is found and you are fired. You feel you were set to appear irresponsible and incompetent, but you were really fired because you have AIDS and are gay. This scenario is taken from the box-office hit Philadelphia. This 1993 drama became the first movie to openly discuss AIDS, thus...

Tuesday, November 5, 2019

F-100 Super Sabre in the Vietnam War

F-100 Super Sabre in the Vietnam War The North American F-100 Super Sabre was an American fighter aircraft that was introduced in 1954. Capable of supersonic speeds, the F-100 was North Americans successor to the earlier F-86 Sabre which had seen great success during the Korean War. Though plagued by early performance and handling issues, the definitive version of the aircraft, the F-100D, saw extensive use during the Vietnam War both as a fighter and in a ground-support role. The type was phased out of Southeast Asia by 1971 as newer aircraft became available. The F-100 Super Sabre was also utilized by several NATO air forces. Design Development With the success of the F-86 Sabre during the Korean War, North American Aviation sought to refine and improve the aircraft.  In January 1951, the company approached the U.S. Air Force with an unsolicited proposal for a supersonic day fighter that it had dubbed Sabre 45.  This name derived from the fact that the new aircrafts wings possessed a 45-degree sweep.   Mocked up that July, the design was heavily modified before the USAF ordered two prototypes on January 3, 1952.  Hopeful about the design, this was followed by a request for 250 airframes once development was complete.  Designated the YF-100A, the first prototype flew on May 25, 1953.  Using a Pratt Whitney XJ57-P-7 engine, this aircraft achieved a speed of Mach 1.05.   The first production aircraft, a F-100A, flew that October and though the USAF was pleased with its performance, it suffered from several crippling handling issues.  Among these was poor directional stability which could lead to a sudden and unrecoverable yaw and roll.  Explored during the Project Hot Rod testing, this issue led to the death of North Americans chief test pilot, George Welsh, on October 12, 1954.   YF-100A Super Sabre prototype in flight. US Air Force   Another problem, nicknamed the Sabre Dance, emerged as the swept wings had a tendency lose lift in certain circumstances and pitch up the aircrafts nose.  As North American sought remedies for these problems, difficulties with the development of the Republic F-84F Thunderstreak compelled the USAF to move the F-100A Super Sabre into active service.  Receiving the new aircraft, the Tactical Air Command requested that future variants be developed as fighter-bombers capable of delivering nuclear weapons. North American F-100D Super Sabre GeneralLength:  50  ft.Wingspan:  38  ft., 9  in.Height:  16  ft., 2.75  in.Wing Area:  400 sq. ft.Empty Weight:  21,000  lbs.Max Takeoff Weight:  34,832  lbs.Crew:  1PerformanceMaximum Speed:  864  mph (Mach 1.3)Range:  1,995  milesService Ceiling:  50,000  ft.Power Plant:  Ã‚  1 Ãâ€"  Pratt Whitney J57-P-21/21A  turbojetArmamentGuns:  4Ãâ€"  20 mm  Pontiac M39A1  cannonMissiles:  4  Ãƒâ€"  AIM-9 Sidewinder  or  2Ãâ€"  AGM-12 Bullpup  or  2 Ãâ€" or 4 Ãâ€"  LAU-3/A  2.75 unguided rocket dispenserBombs:  7,040 lb.  of weapons Variants The F-100A Super Sabre entered service on September 17, 1954, and continued to be plagued by the issues that arose during development.  After suffering six major accidents in its first two months of operation, the type was grounded until February 1955.  Problems with the F-100A persisted and the USAF phased out the variant in 1958.   In response to TACs desire for a fighter-bomber version of the Super Sabre, North American developed the F-100C which incorporated an improved J57-P-21 engine, mid-air refueling capability, as well as a variety of hardpoints on the wings.  Though early models suffered from many of the F-100As performance issues, these were later reduced through the addition of yaw and pitch dampers.   Continuing to evolve the type, North American brought forward the definitive F-100D in 1956.  A ground attack aircraft with fighter capability, the F-100D saw the inclusion of improved avionics, an autopilot, and the ability to utilize the majority of the USAFs non-nuclear weapons.  To further improve the aircrafts flight characteristics, the wings were lengthened by 26 inches and the tail area enlarged.   While an improvement over the preceding variants, the F-100D suffered from a variety of niggling problems which were often resolved with non-standardized, post-production fixes.  As a result, programs such as 1965s High Wire modifications were required to standardize capabilities across the F-100D fleet.   RF-100 Super Sabre in flight.   US Air Force Parallel to the development of combat variants of the F-100 was the alteration of six Super Sabres into RF-100 photo reconnaissance aircraft.  Dubbed Project Slick Chick, these aircraft had their armaments removed and replaced with photographic equipment.  Deployed to Europe, they conducted overflights of Eastern Bloc countries between 1955 and 1956.  The RF-100A was soon replaced in this role by the new Lockheed U-2 which could more safely conduct deep penetration reconnaissance missions.  Additionally, a two-seat F-100F variant was developed to serve as a trainer. Operational History  Ã‚  Ã‚   Debuting with the 479th Fighter Wing at George Air Force Base in 1954, variants of the F-100 were employed in a variety of peacetime roles.  Over the next seventeen years, it suffered from a high accident rate due to the issues with its flight characteristics.  The type moved closer to combat in April 1961 when six Super Sabres were shifted from the Philippines to Don Muang Airfield in Thailand to provide air defense.   With the expansion of the U.S. role in the Vietnam War, F-100s flew escort for Republic F-105 Thunderchiefs during a raid against the Thanh Hoa Bridge on April 4, 1965.  Attacked by North Vietnamese MiG-17s, the Super Sabres engaged in the USAFs first jet-to-jet combat of the conflict.  A short time later, the F-100 was replaced in the escort and MiG combat air patrol role by the McDonnell Douglas F-4 Phantom II.   Later that year, four F-100Fs were equipped with APR-25 vector radars for service in suppression of enemy air defense (Wild Weasel) missions.  This fleet was expanded in early 1966 and ultimately employed the AGM-45 Shrike anti-radiation missile to destroy North Vietnamese surface-to-air missile sites.  Other F-100Fs were adapted to act as fast forward air controllers under the name Misty.  While some F-100s were employed in these specialty missions, the bulk saw service providing accurate and timely air support to American forces on the ground.   A USAF F-100F of the 352d TFS at Phu Cat Air Base, South Vietnam, 1971. United States Air Force Historical Research Agency As the conflict progressed, the USAFs F-100 force was augmented by squadrons from the Air National Guard (ANG).  These proved highly effective and were among the best F-100 squadrons in Vietnam.  During the later years of the war, the F-100 was slowly replaced by the F-105, F-4, and LTV A-7 Corsair II.   The last Super Sabre left Vietnam in July 1971 with the type having logged 360,283 combat sorties.  In the course of the conflict, 242 F-100s were lost with 186 falling to North Vietnamese anti-aircraft defenses.  Known to its pilots as The Hun, no F-100s were lost to enemy aircraft.  In 1972, the last F-100s were transferred to ANG squadrons which used the aircraft until retiring it in 1980. Other Users The F-100 Super Sabre also saw service in the air forces of Taiwan, Denmark, France, and Turkey.  Taiwan was the only foreign air force to fly the F-100A.  These were later updated to close to the F-100D standard.  The French Armee de lAir received 100 aircraft in 1958 and used them for combat missions over Algeria.  Turkish F-100s, received from both the U.S. and Denmark, flew sorties in support of the 1974 invasion of Cyprus.

Saturday, November 2, 2019

Flash Cards Spelling Game Coursework Example | Topics and Well Written Essays - 1500 words

Flash Cards Spelling Game - Coursework Example Flash Cards spelling game The game is played by giving each student a flash card. Each student should read out the word in his/her flash card and pick a volunteer to spell the word. The student who spells the word correctly becomes the next person to present. The game continues and only stops when all students have presented their words and correct spellings are done on each word. The teacher should first arrange the students to sit in a circle. Second, the teacher will issue each student with a unique flash card, which should not be shared with the neighbor. Third, the teacher should explain the game to the student and make sure that they understand the game. To start the game, the teacher will pick one flash card with a word â€Å"cupboard,† read the word aloud, and invite volunteers to spell the word. The picked student is supposed to spell the word without making any mistake within 10 seconds. If the picked student makes a mistake, another student among the volunteers will be picked until the word is spelled correctly. The student who gets the spelling right becomes the next one to present their word. The next student reads out the word in his/her flash card and invites volunteers to spell the word. The student with the correct spelling becomes the next one to present. ... Each team has equal opportunities to spell the words apart from when one team fails and the word has to be spelled by the other team. Each team has 10 seconds to spell the word which when it lapses, the next team gets the opportunity to spell the word. Each correct spelling earns the team 5 points where the team with the highest points wins the game. The teacher will first divide the class into team A and team B to contest on the spelling of 14 words he/she will instruct. The words are children, parents, compound, car, kitten, puppies, carpet, television, bedroom, grandfather, grandmother, home, brother, and sister. Second, the teacher should give instructions on how the game is played by use of an example of a word like â€Å"uncle.† The teacher reads out a word and chooses a team to spell the word in 10 seconds. If the team fails, the second team gets the opportunity to spell the same word which becomes a plus for the team if they get the spelling right. Each team gets seven opportunities to spell a word, meaning the teacher will pick the teams in an alternating manner. The teacher starts the game by asking team A to spell the word â€Å"children.† If the team A spells the word correctly, the teacher reads the second one and asks team B to spell. The game continues and only stops when all words have been spelled correctly. The team with the highest scores becomes the winner of the game. To address sentence structure mistake, â€Å"Cut-up sentence Kabadi† and â€Å"Add a word† games will be used. In both activities, students will get a chance to interact with sentences while making corrections on them where necessary. Cut-up sentence Kabadi The game is played by having two teams