Thursday, November 28, 2019

Power Of People Essays - Medical Ethics, Euthanasia, Nonviolence

Power of People There are times throughout the history of the United States when it's citizens have felt the need to revolt against the government. One way they might revolt against the government is to disregard the law peacefully. There was such a case during the time of Dr. Martin Luther King Jr., when there was unfair discrimination against the African American community. They used peaceful protests to eventually get legislation passed to stop the injustice brought against them. Another name for this is called civil disobedience. A more recent case of civil disobedience involves Dr. Jack Kevorkian who is an activist for the right to die. Dr. Kevorkian believes that a person should not have to go through the pain of being kept alive by machines. There are times when a person can no longer handle such things as terminal illness. Dr. Kevorkian breaks the law openly for what he believes in knowing fully of the consequences. In an article out of a May 9th, 1996 edition of The Sacramento Bee reads that "Kevorkian attends another suicide", tells about Dr. Jack Kevorkian attending another assisted death during a recess in his current trial. Austin Bastable, a Canadian right-to-die activist who had multiple sclerosis killed himself May 6th with the help of Dr. Kevorkian who reportedly gave Bastable the mask and carbon monoxide canister. Bastable felt that his death was for the fight of freedom to have the right to die under such conditions as his. In the article it tells us that hours early that same day he testified in his assisted-suicide trial in the deaths of two women in 1991. Michael Modelski, a former prosecutor said "It's an in-your-face kind of thing", He also goes on to say "It's par to the course. He's a loose cannon". Modelski feels Dr. Kevorkian shows no respect for the law. This is the 28th assisted-suicide Dr. Kevorkian has attended since 1990. He is currently on trial for the two assisted-suicides of two women in 1991. The article also reads that some assisted-suicide supporters were taken back by his actions. State Senator Jim Berryman said he finds Dr. Kevorkian's methods offensive. He also said "He really continues to flaunt this in the face of the Legislature". Berryman feels that the focus is more on Dr. Kevorkian rather than the cause of death with dignity. The Judge of the case has ordered the jury in Dr. Kevorkian's trial not to read or listen to news accounts of the case. If there are any jurors indicating that they have heard any of the latest new they would be removed because of the influence it might have on them. There are four alternate jurors and the article reads if the count falls below the 12 members there could be a mistrial. If the jurors get a hold of the news it could influence them by giving them the feeling tha! t Dr. Kevorkian has no respect for the law. It also might be seen as a man with strong beliefs who does the right no matter what the law. In Henry David Thoreau's "On the Duty of Civil Disobedience", he tells us that he refused to pay poll taxes and he was once sent to jail for not paying his taxes. He believed strongly that he should not have to pay these taxes and would rather end up in jail then go against his will. A certain passage shows how strong he felt when he said "Your money our you life," why should I haste to give it my money? (Thoreau). Thoreau's strong beliefs are seen in what he did and Dr. Kevorkian's case is very similar to what Thoreau does in breaking the law. Dr. Martin Luther King used peaceful sit-ins and rallies to unite the black community. This was a very effective way of showing that they would not stand for the unjust discrimination. They used methods such as banning the busses and instead walked. The busses could not afford to go without their business and this hurt them enormously. Such protests as these caused the passing of legislation that gave equal rights to all. King protested without breaking the law such as Dr. Kevorkian does. Dr. Kevorkian breaks the

Monday, November 25, 2019

Noras Transformation (From child to woman) essays

Nora's Transformation (From child to woman) essays The play entitled A Dolls House, by Henrik Ibsen, deals with the issue of a womans role in society. More specifically, the subordinate role women play in comparison to that of their husbands. Women, at that time, were mainly given the impression that one should support her husband through whatever decisions he chooses to make. As well, women should be sympathetic, comforting, and obedient towards their husbands. During act one, the main character, Nora Helmer, possesses theses qualities as a woman, a wife, a mother, and a companion. She later opens her eyes to the world; seeing her life in a completely different light and becomes curious, as she sets goals for herself, trying to seek purpose in life. In a sense, Nora goes from being an oblivious, innocent child, transformed into a curious woman. She comes to the realization that she needs to experience and learn things for herself and can no longer depend on others (namely men) to spoon feed her whatever information they see is neede d to know by a woman. The concept of Nora having a rather childlike air about her at the beginning of the play is supported through her acts of disobedience and indecisiveness. Like a child, Nora is told by her husband that she is forbidden to eat macaroons. After commenting on how Nora looks rather uneasy today, he then demands for her to look him straight in the face and proceeds to badger her into responding as to whether or not she has been going against his rules and had eaten a macaroon. Hasnt Miss Sweet Tooth been breaking rules in town today?(4) What could have shown signs of a strong and independent woman, would have been if she had been completely honest with Torvald, her husband, and admitted to having eaten a sweet. But rather, not only is she disobedient, Nora also lies to her husband, attempting to cover up the bad thing she has done. Just as a child would do i...

Thursday, November 21, 2019

Why US should keep sugar quotas Essay Example | Topics and Well Written Essays - 500 words

Why US should keep sugar quotas - Essay Example This agreement came to benefit most countries, as they could readily export their sugar to the US where sugar price was higher than in the world market. When sugar from other countries flooded the US market, the availability was higher than the demand and the result was a drastic fall in the prices of sugar. To redress the situation, the government had to intervene to reduce the quotas to be imported from each country. Taking such a measure was to protect the sugar industry as well as the farmers and producers of sugar. The government also ensured that if sugar falls below a set price per pound, it would by the sugar so that farmers are guaranteed a minimum price. With the NAFTA agreement reached in 19942, there have been a number of analyses to show that if care is not taking, then the US would witness dumping in the sugar market. Particularly worrying about this is issue is Mexico. It has been shown that as trade barriers fell with the creation of the NAFTA, U.S. exports of high-fructose corn syrup would flow into Mexico, and soft-drink makers in Mexico would start using high-fructose corn syrup as a sweetener instead of sugar.

Wednesday, November 20, 2019

Leadership Essay Example | Topics and Well Written Essays - 1500 words - 6

Leadership - Essay Example Motivation is another crucial aspect of a good leader because a motivated worker displays more enthusiasm to work along with superior performance and excellence. A motivated worker is more involved with the task (Mayer, 2008). A good leader must possess ideal character. It is significant that a leader is reliable for leading the employees to the right path. True leadership ability comes from esteem for the good personality and honesty of the individual who leads others (White, 2011). A good leader is passionate about the task and the part as a leader. People can only react frankly to an individual who has passion and enthusiasm. It is an essential characteristic of good leaders as they are regarded to be the basis of encouragement and be motivators toward the necessary achievement or cause (White, 2011). A good leader is always positive about his work and his position as a leader. In order to guide and set course, confidence is vital for a good leader. A confident person can motivate other subordinates and draws out the faith and greatest efforts from the team to perform any job well. A leader who successfully expresses confidence towards the planned objectives inspires the team members to put absolute effort for completing a task (White, 2011). A good leader always thinks logically by keeping the main organisational objectives in mind. He/she views a condition as a whole, but also is competent to split it down into sub-elements for faster assessment. Leader divides the controllable measures and steps forward towards the organisational goals (White, 2011). A good leader is committed to excellence. He /she not only uphold high standards, but also are positive in elevating the bar for accomplishing excellence in every field. A leader requires acting in a logical and focused way in situations of ambiguity. Subordinates always search for guidance of leader throughout the period of doubt and unfamiliarity and find encouragement and safety when the

Monday, November 18, 2019

In what way does the Aeneid fulfill its aim to provide the Romans with Essay

In what way does the Aeneid fulfill its aim to provide the Romans with a national epic - Essay Example It shall be argued that, far from being a strictly literary work, Aeneid was an integral part of Augustan project of rebuilding Roman national identity, with apparent focus going from Republican virtues to the notion of divine predestination of Romans to rule the world and to the idea of divine mission of Julian dynasty as heirs to Aeneas. In this work, I will use three main sources. The first one, Epic and empire: Politics and generic form from Virgil to Milton, is a book by Quint (1993) that examines the influences of epic poems on state ideologies. Focusing on Aeneid, in particular, Quint (1993) observes that it was used to enshrine the autocratic rule of Julio-Claudian emperors, starting from Caesar Augustus himself, and that the political character of Aeneid signified the final politicization of heroic epics that began with Alexander’s appropriation of image of Achilles (Quint, 1993, p. 8). The second source, Virgil's gaze: Nation and poetry in the Aeneid, authored by Ree d (2007), explores Aeneid from the standpoint of its character as a form of Roman foundational myth, itself appropriated from Hellenistic culture.

Saturday, November 16, 2019

Advantages and Disadvantages of Ethernet

Advantages and Disadvantages of Ethernet A 10Base2, or thin Ethernet, network uses thin 3/16-inch coaxial cable (with 50-ohm) impedance for the network backbone. Thin coaxial cable is much easier to prepare and install than thick Ethernet cable which means transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5: 10Base5 uses thick coaxial cable. This version is the original Ethernet. It can operate at up to 10 Mbps and support cable segments of up to 500 meters which uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. It is also known as thick Ethernet or ThickNet. 10Base-T: 10BaseT is a baseband 802.3-based Ethernet network that uses unshielded twisted-pair (UTP) cable and a star topology. This version can operate at up to 10 Mbps which uses baseband signaling and twisted pair cabling. It is also known as twisted-pair Ethernet or UTP Ethernet. Features: 10BASE-T uses Manchester-encoding over two unshielded twisted-pair cables. The early implementations of 10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today. 10 Mbps Ethernet is considered to be classic Ethernet and uses a physical star topology. Ethernet 10BASE-T links could be up to 100 meters in length before requiring a hub or repeater. 10BASE-T uses two pairs of a four-pair cable and is terminated at each end with an 8-pin RJ-45 connector. The pair connected to pins 1 and 2 are used for transmitting and the pair connected to pins 3 and 6 are used for receiving. The figure shows the RJ45 pin out used with 10BASE-T Ethernet. 10BASE-T is generally not chosen for new LAN installations. However, there are still many 10BASE-T Ethernet networks in existence today. The replacement of hubs with switches in 10BASE-T networks has greatly increased the throughput available to these networks and has given Legacy Ethernet greater longevity. The 10BASE-T links connected to a switch can support either half-duplex or full-duplex operation. Advantages: Since each node on a 10 Base-T network has its own cable connecting it to a central hub, it is far less likely that any node can cause the entire network to fail. The hub also has a partitioning function built into it which allows it to detect a problem on any of its ports. If a problem is found, the node is disconnected from the rest of the network. This isolates the problem until the node can be troubleshot and repaired. Because of the partitioning function built in to the hubs and the star-wired topology, it is generally easy to troubleshoot a 10 Base-T network. In a worst-case scenario, one can be troubleshot by simply disconnecting nodes from the hub one at a time until the network recovers. Usually, the hub will give an indication as to which node is causing a problem, allowing the technician to troubleshoot that node as opposed to spending many hours finding where the problem is. Disadvantages: 10 Base-T only allows distances from the hub to the node of 100 meters. In some installations, this can be a major problem if nodes need to be located farther away. The nature of UTP cable makes it considerably more sensitive to electrical noise than coaxial cable. Generally, this rules 10 Base-T out as an option for installations on factory floor environments or other locations with a high ambient noise level. What are the different types of networking / internetworking devices? Explain the basic features of these devices. Following are the networking / internetworking devices with their basic features. Network Router: A network device, typically connected to a range of LAN and WAN interfaces, that forwards packets based on their destination IP address. Routers receives an incoming frame, discards the data-link header and trailer, makes a forwarding decision based on the destination IP address, adds a new data-link header and trailer based on the outgoing interface, and forwards the new frame out the outgoing interface. Network Repeater: A repeater is a physical layer device. It receives, amplifies (regenerates) and retransmits signals in both directions. As far as the software is concerned, a series of cable segments connected by repeaters is not different from a single cable (except by some delay introduced by repeaters). A system may contain multiple cable segments and multiple repeaters. But no two transceivers may be more than 2.5 km apart and no path between any two transceivers may be traverse more than four repeaters. Bridge: A bridge is a data link layer device which is used to connect multiple LANs. It examines the data link layer addresses to do routing. Since they are not supposed to examine the payload field of the frames they route, they can transport IPV4, IPV6, Apple Talk, ATM, OSI or any other kinds of packets. Gateway: A gateway can translate information between different network data formats or network architectures. Suppose a computer using the connection-oriented TCP/IP protocol needs to talk to a computer using the connection-oriented ATM transport protocol. The gateway can copy the packets from one connection to the other, reformatting them as need be. Switches: Switches are similar to bridges in that both route on frame addresses. In fact, many people use the terms interchangeably. The main difference is that a switch is most often used to connect individual computers. As a consequence, when a computer wants to send a frame to another the bridge gets the frame but just discards it. But the switch must actively forward the frame to other because there is no other way for the frame to get there. What is the range of addresses in the classes of internet addresses? Evaluate each class of logical addresses. There are five IP address classes, following table show each class and the range of addresses. Class Beginning Address Ending Address A 0.0.0.0 127.255.255.255 B 128.0.0.0 191.255.255.255 C 192.0.0.0 223.255.255.255 D 224.0.0.0 239.255.255.255 E 240.0.0.0 255.255.255.255 In Class A through Class E. each is used with a different type of network. The address classes reflect the size of the network, and whether the packet is unicast or multicast. In the unicast method of transmission, one copy of each packet is sent to each target destination. If there are eight workstations designated to receive a packet, such as a portion of a video clip, then it is transmitted eight times. In the multicast method, the recipients are placed in a group, such a group of all eight workstations. Only one packet is sent to the group, via a router or switch, which then packet to each group members. Class A is used for the largest networks composed of up to 16,777,216 nodes. Class A networks are identified by a value between 1 and 126 in the first position of the dotted decimal address. The network ID is the first 8 bits and the host ID is the last 24 bits. Class B is for medium-sized network composed of up to 65,536 nodes and it is identified by the first octet of bits ranging from decimal 128 to 191. The first two octets are the network ID, and the last two are the host ID. Class C addresses are used for network communication on small networks of 256 nodes or less. The first octet translates to a decimal value in the range of 192 to 223 and the network ID is contained in first 24 bits, while the host ID is contained in the last 8 bits. Class D addresses do not reflect the network size, only that the communication is a multicast. Unlike Classes A through C, the four octets are used to specify a group of nodes to receive the multicast, which consists of those nodes that are multicast subscription members. Class E is used for experimentation and address range from 240 to 239.255.255.255 in the first octet. Task 2 What is Bandwidth? Explain the other factors for network communications. Network bandwidth is the measure of the data carrying capacity of the network. When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability. The obvious fix for this situation is to increase the amount of available bandwidth. But, because of the previously stated constraints, this is not always possible. In most cases, when the volume of packets is greater than what can be transported across the network, devices queue the packets in memory until resources become available to transmit them. Queuing packets causes delay. If the number of packets to be queued continues to increase, the memory queues fill up and packets are dropped. The characteristics of the information being communicated also affect its management. For example, the delivery of a movie uses a relatively large amount of network resources when it is delivered continuously without interruption. Other types of service e-mail, for example are not nearly as demanding on the network. In one company, an administrator might decide to allocate the greatest share of the network resources to the movie, believing that this is the priority for his customers. This administrator may decide that the impact will be minimal if e-mail users have to wait a few additional seconds for their e-mail to arrive. In another company, the quality of a video stream is not as important as critical process control information that operates the manufacturing machinery. What is Physical address and what is the difference between Physical address and Logical address? Explain it in detail. The Physical address is specific on the local network and it represents the address of the end device on the physical media. In an Ethernet using LAN, this address is also called as Media Access Control address. On the local Ethernet network, when two end devices communicate, the frames that are exchanged between them contain the destination and source Media Access Control (MAC) addresses. It is in hexadecimal notation assigned by manufacturer. This address is much like postal address because it enables communication to be sent to specific destination. Physical address is 48-bit address burned into the ROM of the NIC card which is a Layer 1 device of the OSI model. This is divided into 24-bit vendor code and 24-bit serial address. This is unique for each system and cannot be changed. While the logical address is a 32- bit address assigned to each system in a network. This works in Layer3 of OSI Model which is generally called IP address. What is the difference between Layer 1, Layer 2 and Layer 3 devices? Describe it according to the Layers features. OSI model have 7 layers which perform many different functions. Every layer has its own unique features and function and a device which help the layers to work properly. Layer 1 is called Physical layer which consists of hardware, developed by engineers, in the form of electronic circuitry, media, and connectors. Therefore, it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations. By comparison, the protocols and operations of the upper OSI layers are performed by software and are designed by software engineers and computer scientists. As we saw in a previous chapter, the services and protocols in the TCP/IP suite are defined by the Internet Engineering Task Force (IETF) in RFCs. Hardware components such as network adapters (NICs), interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the Physical layer. Layer 2 is called Data Link layer and its services and specifications are defined by multiple standards based on a variety of technologies and media to which the protocols are applied. Some of these standards integrate both Layer 2 and Layer 1 services. A hub is an example of a layer 2 device. Switches are generally considered layer 2 devices, but many are capable of operating at layers 3, 4 or higher. Router is the Layer 3 device. The role of the router is to select paths for and direct packets toward their destination. This process is known as routing. During the routing through an internetwork, the packet may traverse many intermediary devices. Each route that a packet takes to reach the next device is called a hop. As the packet is forwarded, its contents (the Transport layer PDU), remain intact until the destination host is reached. Task 3 Explain 7 OSI layers briefly and define Router, Switch, and Bridge. Explain about encryption decryption. OSI Layers: The Open Systems Interconnection (OSI) model was initially designed by the International Organization for Standardization (ISO) that provides a framework on which to build a suite of open systems protocols. The objective was that this set of protocols would be used to develop an independent international network that would not be dependent on proprietary systems. Unfortunately, due to the rate at which it expanded, and the speed at which the TCP/IP based Internet was adopted, the OSI Protocol Suite development and acceptance lagged behind. Although few of the protocols, which are in widespread use today, are developed by using the OSI specifications, the major contribution has been made by the seven-layer OSI model in the development of other products and protocols for all types of new networks. The OSI model provides an extensive list of functions and services as a reference model that can occur at each layer. It also depicts the interaction of each layer with the directly above and below layers. No. Layer Name Description 7 Application Performs services for the applications used by the end users. 6 Presentation Perform data format information to the application. For example, the presentation layer tells the application layer whether there is encryption or whether it is s .jgp picture. 5 Session Manages sessions between users. For example, the session layer will synchronize multiple web sessions and voice and video data in web conferences. 4 Transport Defines data segments and numbers them at the source, transfers the data and reasonable the data at the destination. 3 Network Creates and addresses packets for end-to-end delivery through intermediary devices in other networks. 2 Data Link Creates and addresses frames for host-to-host delivery on the local LANs and between WAN devices. 1 Physical Transmits binary data over media between devices. Physical layer protocols define media specifications. Router: A network device, connected to a range of WAN and LAN interfaces that sends packets according to their destination IP address. Routers acquires an incoming frame, puts away the data-link header and trailer, makes a forwarding decision based on the destination IP address, adds a new data-link header and trailer based on the outgoing interface, and forwards the new frame out the outgoing interface. Switch: Switches are similar to bridges in that both route on frame addresses. In fact, many people use the terms interchangeably. The main dissimilarity is that a switch is commonly used to connect one-on-one computers. As a consequence, when a computer wants to send a frame to another the bridge gets the frame but just discards it. But the switch must actively forward the frame to other because there is no other way for the frame to get there. Bridge: A bridge is a data link layer device which is used to connect multiple LANs. It examines the data link layer addresses to do routing. Since they are not supposed to examine the payload field of the frames they route, they can transport IPV4, IPV6, Apple Talk, ATM, OSI or any other kinds of packets. Encryption: The process of obscuring information to make to unreadable without special knowledge, sometimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number (called an encryption key). The resulting value, which is called an encryption packet, is sent through a network. Decryption: It is the process of decoding data the back to its original form by giving that encryption key.