Friday, December 27, 2019
Working At A Team Takes Patience And Determination
Working in a team takes patience and determination. Initially during our class, I was able to enjoy the aspect of creativity which came while working in groups of 2 or 3 people. After the initial two weeks of team building, I felt that I was getting to know my classmates better. It was at this time when the idea of a large group project became an assignment. The article by Garvin and Roberto summarizes it well by pointing out that breaking into subgroups allows people to feel more comfortable. What was interesting and fun now became work and a challenge. My small group of two was now a large crowd of six. Strategic planning started off well. Each member was given a topic to research in reference to our land project. The initial ideaâ⬠¦show more contentâ⬠¦In my opinion because we allowed each person to research such large buckets we were all over the place. There was a moment when we were all talking at one time, truly having a rigorous debate. Shakema was becoming more frustrated as Rob, Seema and myself battled for the floor to voice what we thought were great ideas. At one point I stopped talking because it was impossible to get a word into the conversation. During my silence Roshni made eye contact with me and decided to calm the group. Wilson summarized it well in the 2005 article The Study of Small Group Interaction, ââ¬Å"The motives of belonging that a person brings to a group affects the developmental potential and direction of the group.â⬠We quickly realized that we were going nowhere and began to work as a team. The reflective mindset played a large role in our groupââ¬â¢s success. We were able to manage the relationships with each other as we came to the table with different ideas. In reflecting back on this situation, I realized that I learned how to listen which was the easy part. Being willing to have my mind changed however was challenging. I think when a person feels that their idea is a good one, it is often hard to compromise. However it suddenly became clear that conflict and critical thinking can be productive if used constructively. ââ¬Å"It takes a village to raise a child.â⬠This quote demonstrates the fact that
Thursday, December 19, 2019
The Events Of The World War II - 1537 Words
Michigan Technological University Operation Barbarossa U.S. Military History ââ¬â SS3505 Nick Alessandroni 11/8/2014 Despite varying opinions on what actual triggered the start of World War II, Hitler ordering the invasion of Poland on September 1st, 1939 is believed to be the true mark of the beginning of the Second World War. Germany had been pondering war with Poland since the 1920s and recovering lost territory was considered the main objective (Radzilowski J., 2004). However, the initial reason for the German invasion of Poland was ââ¬Å"Hitlerââ¬â¢s drive for Lebensraum (living space) in the east (Beevor A., 2012).â⬠Hitlerââ¬â¢s so called ââ¬Å"drive for living spaceâ⬠resulted in the consequence of the single most deadly war in world history to date. As a result of the invasion, since Poland was in alliance with Britain and France, Poland received support from both countries. About a week prior to the German invasion of Poland the Molotov-Ribbentrop Pact was signed on August 23rd, 1939 and marked peace and non-aggression between Nazi Germany and the Soviet Union and also asserted that either of the two parties could not assist an enemy of the other. The pact was of interest to Stalin because it ââ¬Å"would allow Stalinââ¬â¢s Soviet Union to seize the Baltic states and Bessarabia and to say nothing of eastern Poland in the event of a German invasion from the west (Beevor A., 2012)â⬠because the terms of the agreement wouldnââ¬â¢t allow for Soviet intervention. Since Stalin knew that HitlerShow MoreRelatedThe Events Of World War II1285 Words à |à 6 PagesThe Tenthââ¬â¢s triumphs in Italy were demonstrative of the value of specialized forces. Their success both was very influential in the events of World War II and in proving the value of specialized forces. Once the government saw how effective the focused training of this division was, th ey realized that a new era had begun. The Tenth Mountain Division started the period of special forces. The men in the division used their mountain climbing skills to formulate a brilliant plot to capture Riva RidgeRead MoreThe Events Of World War II Essay1284 Words à |à 6 PagesA ââ¬Å"watershedâ⬠event could best be described as one such an event that marked a turning point in a course of actions or affairs. Some would argue that the second World War was nowhere close to being a watershed event and more closely aligned with being a devastating period for American history. Funnily enough, most would critically disagree with such a statement. World War II sent the United States through a frenzy of change ââ¬â change that would extend even over to todayââ¬â¢s time! So in retrospect ofRead MoreThe Events Of World War II1233 Words à |à 5 PagesAt about 11 o clock on the morning of June 28, 1914, the archduke Franz Ferdinand of Austria was assassinated in Sarajevo; Event that is known as the trigger of the Great War, World War I; Which lasted little more than 4 years, un til November 11, 1918 when Germany signed the Armistice of Compià ¨gne. On September 1, 1939; 25 years later, World War II began with the invasion of Germany into Poland, and culminated 6 years later, on September 2, 1945. When we think of these times, many things come toRead MoreThe Events Of World War II1293 Words à |à 6 PagesIt is difficult, if not impossible put the events of World War II in context without a discussion about World War I. Known at first as the Great War, the occurrences that lead up to this conflict and its happenings caused a series of events that many see led up to the start of the second World War. Although the two wars are usually seen as separate events, it is important to see the connections linking the two together. The Great War ending was one that saw Germany placed the position of sole guiltRead MoreThe Events Of The World War II986 Words à |à 4 PagesWhat steps led to American participation in World War II? (Chapter 22) After World War I legacy the Great Depression brought isolationism. The best work produced by President Roosevelt was the Four Freedoms; freedom of speech, freedom of worship, freedom from want, and freedom from fear. President Roosevelt was the leader of the Allies, he used this statement as part of his Allies aim. The Soviet Union joined the Allies after being invaded by Germany. Millions of art were sold and reprinted asRead MoreEvents of World War II466 Words à |à 2 PagesWorld War2, many events took place in history. In World War2,these events had most been written about the holocaust, ration books, Green Police, and the famous concentration and death camp of that time. In 1939, people started and needed to use ration books. German submarines attacked British and American ships, so many supplies had to be cut short. During this time, the Nazi created an organization of soldiers called ââ¬Å"Gestapoâ⬠or ââ¬Å"Green Policeâ⬠. Later on, in 1945, Auschwitz was creat ed and becameRead MoreWorld War II : A Watershed Event1690 Words à |à 7 PagesWorld War II was considered to be a watershed event in history by many historians. A watershed event is commonly referred to as an ââ¬Å"event or period marking a turning point in a course of action or state of affairsâ⬠. World War II was an event that changed history and the aftermath wrecked most ideas of the future before the war. After the war every party wanted to not repeat this war, so instead of peace, the world rearmed with new technologies and humanitarian ideologies to prevent any form of theRead MoreEvents that Triggered World War II1193 Words à |à 5 Pageseffects of World War 1. In the meantime Adolf Hitler granted to be ruler of Germany, in return he would take revenge on the people causing their defeat in World War 1, most specifically Jews. Russia: Russia was part of the Soviet Union. The Soviet Union was the main enemy of Germany. Most of Germanys resources went to fight the Soviets not the western allies. The bloodiest fighting of WW2 occurred on the Russian Front. The Soviet Union is directly responsible for Germanys declaration of war on theRead MoreHorrific Events from World War II778 Words à |à 3 PagesTwo most horrific events in world history occurred in World War Two. They are known as the holocaust and the Japanese war crimes. The question is, which was worse? And who actually recalls anything named Japanese War crimes? Both were unmerciful acts, but the criminals of the Japanese were never brought to justice. The Japense war crimes was worse, because they were killed, discriminated, and American soldiers cut their body parts alive or dead as souvenirs, this was known as American mutilationRead MoreEssay on The Awful Events of The World War II526 Words à |à 3 PagesWorld War II was the most unhaumane event in time of American history or even world history. Hitler was in charge of the mass destruction in Europe. His plan was callled the final solution, him and his right hand man Himmler a had created. The plan was to kill everyone w ho wasnt an undesirable such as jews. The Arain race was the perfect form of people that Hitler wanted to create and only have, this racd consisted of blue eyes, blonde hair, muscualr/fit, and tall. In 1933 Hitler became the chancellor
Wednesday, December 11, 2019
Fusion of western musical elements with african traditional free essay sample
Fell Ampoule Cut was born on October 1 5,1938 to the family of Reverend Israel Ransoms Cut at Absolute In Gun State, Nigeria. At an early age, he was already exposed to music by playing the Plano even from the written score.He was a well educated musician and an activist. He studied music at the Truly College of Music London. Upon his return from abroad, he was exposed to highlight and Jazz and later on developed forbear music. He died in Some of the foreign and indigenous musical elements in forbear music of Fell Nikolas Kit are: JAZZ: This is a combination of elements of western music and characteristics traceable back to the music of west Africa. The fundamental in distinguishing features of jazz is based on simple melodies and complex cross-rhythms mixed with verbal slurs, vibrato and constant syncopation.Jazz music adopts much of the use of improvisation and syncopation. One of Fells reasons for his adoption of Jazz style into his music was because jazz music had a lot of cultural information that enriched his mind. We will write a custom essay sample on Fusion of western musical elements with african traditional or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This he said in an interview with Walrus(1989). Some examples of Fells songs that have some elements of jazz styles are: water, follow follow, way amongst others. BLUES: This emerged from spirituals, work songs, field hollers, shouts and chants, and rhymed simple ballads in United States of America in the 20th century. It later became the roots of jazz, rock and roll, hip hop and other popular music forms.The structural pattern of the blues is a basic twelve-bar lyric framework which is reflected by a standard harmonic progression of twelve bars, in 4/4 time. Slow blues are often played in 12/8 (beats per measure with 3 subdivisions per beat). In the harmony of blues, the use of harmonic seventh interval popularly called blues seven Is a major characteristic. Another feature of the blues Is the artistic Imitation of Instrumental sounds with their voices and to replicate aspects of the human voice with their Instruments. Some examples of fells songs that have elements of blues are: Paella, you no go die amongst others.
Tuesday, December 3, 2019
Volunteering in My Hometown Essay Example For Students
Volunteering in My Hometown Essay Born in a civilian family, I did not have so many toys in my childhood. I kept complaining about my childhood to my friends until I met a special group of people. Last summer, after my heavy study, I took part in a volunteer activity organized by Young Mens Christian Association in my hometown. Our main project was to help students in a Hope Primary School. Students in this school had totally different fate from us. They were all orphans and fostered by their grandparents because of their miserable families. Situated in suburbs, the Hope Primary School left me the first impression of hope. We will write a custom essay on Volunteering in My Hometown specifically for you for only $16.38 $13.9/page Order now Although they had the simplest and crudest classrooms and facilities that I have ever seen, students there were all pleased about our arrivals and greeted us with smiles. From the talk with the only teacher here, I knew that all items here were donated by Philanthropists. Every student only got one clothes for this coming winter. Compared to my life, we were all human beings, why they were treated unjustly by their fate. This was the first lesson that I learned here. In this society, we still had a large group of people needed our help. We should try our best to provide these unfortunate students a relatively even place. When I first had a study session with these students, I realized an eccentric student sitting in a corner with his hat on. From the talk with other student, I was told that his parents were both dead and he was fostered by his grandmother. He got infantile autism after that and barely talked to people. I was trying to approach him; however, I was worried about touching his wound again because of my impertinent words. I tried to say hello to him. He even did not glance at me. He kept doing his work and totally ignored me. I sit back to my seat sadly. In the following five days, I tried to make friends with him sincerely. I told him a lot of interesting stories happened in the world and gave him confidence to go out and see the wider world. When we finished our helping plan and ready to leave, the boy smiled at all of us with hope. This was one of the most precious smiles that I have ever seen. He also told me that he was lucky because there were still a few students like him did not even have chances to go to school. When I went back home, I felt that only my contribution was too slender to help this large group of people. I hope University of Pittsburg will be interested in this organization that can help this group of people. We can go to their schools frequently, live with them and bring them some necessities. We will find that there is still a large group of people lead such tough lives. They do not only need education, but also our love. We try our best to provide a warm family and get a better understanding of our lives. Because of our love, their future will become brighter.
Wednesday, November 27, 2019
70+ Academic Honors Examples for Your College Application
70+ Academic Honors Examples for Your College Application SAT / ACT Prep Online Guides and Tips College applications are all about showing off to the admissions committee, and what better way to do so than to lead with your most impressive academic awards.What are the best academic honors and awards to put on a college application? In this guide, we give you 70+ academic honors examples to give you an idea of what types of achievements colleges like to see most on applications.In addition, we explain what counts as an academic honor or award, go over different impressive academic honors and awards examples you can get, and give you useful tips for effectively talking about awards on your application. What Is an Academic Honor or Award? First things first, what counts as an academic honor or award? Generally speaking, an academic honor or award is any major achievement youââ¬â¢ve made and been recognized for in some way.The form of recognition can range from an actual object, such as a trophy or plaque, to prize money, a title, or verbal recognition. Typically, an academic honor will fall into one of the following categories: Distinction, honor, or honorable mentionfor which you wonââ¬â¢t usually receive a physical object or award- just the title A diploma or certificate indicating the completion of a program or recognizing an accomplishment in a program or other activity Prize or award won from a contest, competition, or tournament Scholarship given in recognition of an outstanding (academic) accomplishment Membership in a highly selective and competitive group or society If youââ¬â¢ve won any awards for specific activities such as a sport you play or a club youââ¬â¢re part of, itââ¬â¢s better to list these in the extracurricular activities section of your application instead of in a separate awards section. So what are some honors and awards to put on a college application? Up next, we'll take a look at more than 70 academic honors examples. Academic Honors and Awards Examples Here, we give you a list of 70+ academic honors and awards examples you could include on your own college application, from prizes won in national and international contests to school-based distinctions and awards. All the academic honors examples below are grouped by category and listed alphabetically. Note that this is not an exhaustive list of all academic honors and awards you could possibly have, so if you have an achievement that doesnââ¬â¢t exactly match one of the examples below, donââ¬â¢t worry- you can still put it on your college application! Advanced Placement (AP) Awards AP International Diploma (APID) AP Scholar AP Scholar with Distinction AP Scholar with Honor DoDEA AP Scholar International AP Scholar National AP Scholar State AP Scholar IB Awards IB Diploma IB Middle Years Programme (MYP) Certificate National Awards Governorââ¬â¢s Volunteer Award National Student Volunteer Award Presidentââ¬â¢s Award for Educational Achievement Presidentââ¬â¢s Award for Educational Excellence Presidentââ¬â¢s National Service Award PSAT Awards National Hispanic Scholar National Merit Commended Student National Merit Finalist National Merit Scholar National Merit Semifinalist School-based National Merit Scholarship winner School-Based Awards Foreign language award High class rank (e.g., top 10%) Honor roll/GPA award National Honor Society membership Perfect Attendance Award School-specific award School subject-specific award Student of the Month/Term/Year Subject-specific Honor Society membership (e.g., Science Honor Society) Competitions and Contests Award for high placement (1st, 2nd, 3rd, or 4th) or participation in any major (academic) contest, such as the following: AAN Neuroscience Research Prize Academic Decathlon Academic Triathlon American Regions Mathematics League (ARML) B.E.S.T. Robotics Design contest Conrad Spirit of Innovation Challenge Davidson Fellows Scholarship Doodle 4 Google Google Science Fair Intel International Science and Engineering Fair (ISEF) International BioGENEius Challenge International Chemistry Olympiad International Mathematical Olympiad International Photography Awards (IPA) Kids Philosophy Slam LifeSmarts Microsoft Imagine Cup MIT INSPIRE MIT THINK Scholars Program Model UN National Academic League National Academic Quiz Tournament National Economics Challenge by CEE National Geographic Bee National Geographic Student Photo Contest National High School Mock Trial Championship National Science Bowl National Science Olympiad PhysicsBowl Quiz Bowl Regeneron Science Talent Search (STS) Regional/National Junior Science and Humanities Symposium Scholastic Art Writing Awards Toshiba/NSTA ExploraVision Awards University Interscholastic League (UIL) Miscellaneous Awards Boy Scouts/Eagle Scouts awards Employee of the Month Girl Scouts awards Merit scholarships for college Musical performance award National Novel Writing Month (NaNoWriMo) winner National Poetry Writing Month (NaPoWriMo) winner Publications (such as short stories, art pieces, essays, etc.) Volunteer award Work award or promotion The Best Honors and Awards to Put on a College Application Of the dozens of academic honors examples above, which ones will look the most impressive on a college application?Here, we explain the top four qualities a truly impressive academic honor will have. Note that an honor doesnââ¬â¢t need to have allthese qualities, though if it does, then it is definitely an excellent one to put on your application! #1: Itââ¬â¢s Highly Selective One quality you want to highlight on your application is the selectivity of the award or honor youââ¬â¢ve won.In other words, the academic award will be one that a lot of students try to win, making it difficult to achieve. For example, because national and international contests and competitions draw so many student competitors, winning an award like these would certainly impress the admissions committee. The more selective an academic honor or award is, the more impressive itââ¬â¢ll look on your college application. Academic Honors Examples of Highly Selective Awards National Merit Scholar Google Science Fair winner National Student Volunteer Award #2: Itââ¬â¢s Unique Admissions committees see a lot of honor roll and National Society honors on college applications (not that these are bad- theyââ¬â¢re just fairly common). So if you've won a particularly unique or rare award, definitely include it on your application, as this willhelp you stand out from the crowd. A unique award can be highly selective; it can also be one that is less well known or that highlights something creative, surprising, or impressive about you. For instance, maybe you won the Most Innovative Employee award at your part-time job after you pitched the idea to create and manage a social media page for the company. Academic Honors Examples of Unique Awards Specific school-based awards (e.g., Most Confident Speaker in Chinese Class) Local or community-based awards #3: Itââ¬â¢s Relevant to Your Academic Interests and Strengths Another academic award or honor that'sgreat to include on your college application is one thatââ¬â¢s relevant to your academic interests and strengths.These are typically subject- or field-specific awards, such as English or writing awards, math awards, etc. For example, if youââ¬â¢re planning to major in engineering, you'd want to detail any awards you might have won in science, math, or engineering contests. Relevant awards indicate to the admissions committee not only that youââ¬â¢re truly committed to the field you want to study, but also that youââ¬â¢re one of the most promising students in your field. Academic Honors Examples of Relevant Awards AP award Writing award or publication (if youââ¬â¢re an English or creative writing major, for example) STEM award (if youââ¬â¢re a STEM major) Model UN (if youââ¬â¢re a political science or IR major, for example) #4: It Highlights Your Leadership Potential An impressive academic honor or award will also emphasize your leadership potential.These are typicallyawards that involve group or collaborative work.So if you ever led others to success- as a captain or president, for instance- this kind of honor would look great to potential colleges. Just make sure that you explain on your application what kind of role you had and how your leadership specifically led your team to success. Academic Honors Examples of Leadership/Group Awards Volunteer awards Girl Scouts or Eagle Scouts awards How to Talk About Honors on Your College Application: 4 Tips Since you likely wonââ¬â¢t have a lot of room to write about academic honors and awards on your application, it's important thatyou present your academic achievements in an effective, impressive way.Here are some tips on how to talk about the awards you've won. Tip 1: Open With Your Most Impressive Awards Admissions officers donââ¬â¢t usually spend a lot of time with each application they get, so you want to make sure that youââ¬â¢re catching their eyes right away by starting with your most impressive honors and awards.These will generally be awards that are highly competitive and required a lot of work and commitment on your end. Tip 2: Focus on Your Spike A "spike" is a particular academic passion you have.For example, if youââ¬â¢re a science buff who plans to major in chemistry, you'd want to emphasize your spike on your application by focusing primarily on your chemistry- and science-related activities and awards. Having a spike will ultimately help you stand out from other applicants.To learn more about how you can develop a spike, check out our guide on how to get into Harvard and the Ivy League. Spikes: good for hedgehogs and college applications. Tip 3: Describe Awards That Are Vague or Unclear Not all academic awards and honors are well known or obvious, especially if theyââ¬â¢re unique to your school or area. Therefore, make sure that youââ¬â¢re using the space you have in the awards section of your application to describe any academic honors that the admissions committee is probably unfamiliar with. The last thing you want an award to do is confuse admissions officers, so be clear about what it is, how you won it, and what makes it impressive. Tip 4: Explain the Competitiveness of the Award For each academic award or honor youââ¬â¢ve won, you want to clarify its level of competitiveness by explaining the scope of the competition.For example, was the science tournament you won a national one? A local one? A school-based one? Note that if the award has the word "national" or "international" in it, you shouldnââ¬â¢t have to add much explanation to its description since it'll be obvious that the award is fairly selective. The overall point here is to show off! Recap: Honors and Awards to Put on a College Application As you can see, there's a huge variety in the types of academic honors and awards examples you can put on your college application. The 70+ academic honors examples listed above are just some of the possible honors you could include. In general, the best academic honors to include on your application will have some or all of the following qualities: Theyââ¬â¢re highly selective/competitive Theyââ¬â¢re unique They highlight your academic interests and strengths (your "spike," that is) They emphasize your leadership skills/potential You wonââ¬â¢t have a ton of space on your application to explain the academic awards youââ¬â¢ve won, so itââ¬â¢s important to use the room you have wisely. To reiterate, here are our four best tips for how to talk about your academic awards and honors on your application: Open with your most impressive awards and honors Focus on your spike- i.e.,your biggest academic passion and commitment Describe any vague, unclear, or lesser-known awards/honors you've received Explain the competitiveness of the award Now get out there and win some awards! Whatââ¬â¢s Next? Lots of colleges use the Common App. If you're going to be using this platform to apply to college, make sure you know what to expect with the Common App honors section. Planning to take AP tests in the spring? If you're hoping to snag a distinguished AP award, read our guide to get tips on how you can do this. Honors can prove that you're a serious and ambitious college applicant.Check out our expert guide to learn what high school honors is and how you can achieve honors status at your own high school. Want to build the best possible college application? We can help. PrepScholar Admissions is the world's best admissions consulting service. We combine world-class admissions counselors with our data-driven, proprietary admissions strategies. We've overseen thousands of students get into their top choice schools, from state colleges to the Ivy League. We know what kinds of students colleges want to admit. We want to get you admitted to your dream schools. Learn more about PrepScholar Admissions to maximize your chance of getting in.
Sunday, November 24, 2019
Education Of Gifted Essays - Intelligence, Anthropology, Free Essays
Education Of Gifted Essays - Intelligence, Anthropology, Free Essays Education Of Gifted Running head: GIFTED EDUCATION/CIVIL RIGHTS Education of Gifted Students A Civil Rights Issue? Article Critique Education of Gifted Students A Civil Rights Issue? This paper seeks to answer the question: Is the differential representation of the sexes and of racial and ethnic groups in educational programs for gifted students a civil rights problem? The author does a more than adequate job of presenting the arguments on both sides of the issue and drawing logical inferences. The article seeks to identify the actual dilemma and proposes possible approaches for resolution. Much of the school system today has been shaped by the civil rights laws of the past. The writer notes that the link these rights have to education is the pledge of an equal opportunity for all children to learn and be educated in this country. Schools must accomplish this without regard to race, creed or gender. The author notes that there have been references to the gifted programs being just another subtle form of segregation by the white upper-middle-class. These concerns arise from the fact that the representation of the sexes and of ethnic groups within the gifted classes reflects just such a phenomenon. The unjustified beliefs of genetic inferiority of some races have long since been denounced. These unfounded beliefs have been replaced by research which indicates that the genetic component of intelligence is augmented by the nurturing environment (or lack thereof) of a child. The paper sites twin studies, which give creedence to the genetic component of intelligence, and notes these differences apply within the different ethnic and racial groups. The author attributes an almost equal role to the environment of the child referring to nurturing as the crystallization of native abilities. Noting the differences between the sexes in math and verbal skills, the author seeks to validate this conception. The author sees the cultural values of society as an unavoidable encroachment upon the genders resulting in these differences. I beg to differ, as molecular and developmental studies have shown that there are structural and biological differences in the brains of males and females (Zhang, 1995; Palego, 2000). As a molecular biologist I would be more inclined to attribute differences to the biochemical aspects of development. The writer next addresses the inequities of intelligence tests and accurately identifies them as mere predictors of future academic performance. We are unable to measure native ability with these instruments but these devices do allow for a comparison of the developmental level of a child in the areas of core knowledge, reasoning and conceptual association. It is through these measures that predictions of future performance are made. The author now brings Gardner's theory of multiple intelligences into the debate. He uses the theory to propose expanding the definition of giftedness. Although I do agree in principle with Gardner's theory, the already limited
Thursday, November 21, 2019
Multivariate Techniques Paper Research Example | Topics and Well Written Essays - 1500 words
Multivariate Techniques - Research Paper Example In view of the possible incoherence due to the management restructuring at Company W, retraining of Company Wââ¬â¢s top management in key departments such as sales, marketing, and production is vital. In addition, the top management at WidgeCorp needs statistically verifiable conclusions on issues and recommendations resulting from broad management restructuring agenda. The purpose of this paper is to discuss the use of factor analysis as a statistical data analysis technique, highlight some of its real life applications, and demonstrate its applicability to company W. Keywords: Exploratory factor analysis (EFA), Confirmatory factor analysis (CFA) Factor Analysis Introduction Acquisition is a corporate strategy in wide use by organizations that seek to increase their market presence, lower operation costs, or retain profitability in unfavorable economic conditions. One of the major challenges facing mergers and acquisitions, which accounts for many failures associated with the pro cess, is lack of coherence and incompatibility in the management teams of the corporate entities involved. A disconcerting 50% of merger and acquisition deals fail due to a number of factors, one of which is the inability to reconcile the management cultures of the companies involved (Monahan, 2000). Therefore, a successful acquisition does not end with the formalization of the acquisition process, but with retraining and restructuring to ensure retention of harmony in the management structures of the two companies. The integration process is delicate, and needs careful deliberation and planning by the top management so that it does not defeat the purpose of the acquisition. This summary seeks to explain the effects of implementation of factor analysis in Company W. Admittedly, subjective judgment and experience present glaring limitations as decision-making techniques (Monahan, 2000). Despite the proven effectiveness of multivariate statistical analysis techniques such as factor an alysis techniques, WidgeCorp should not undermine the possible benefits that traditional methods used at Company W might offer the new corporate conglomerate. The management should aim to bring the best practices from either side of the management landscape to benefit from the synergies appropriately (Monahan, 2000). The transition to a common management approach should be as smoothly as possible, and should aim to win the cooperation of the employees the changes will affect the most. What is Factor Analysis? Factor analysis is a statistical analysis technique that explains the variation and correlation of variables with the use of uncorrelated, unobserved variables known as factors (DeCoster, 1998). Statistical researchers hail Charles Spearman, a psychologist, as the pioneer in the practical application of factor analysis. Factor analysis is highly applicable to social sciences and in business in areas such as marketing, production, and sales (DeCoster, 1998). The technique is hig hly effective in areas that involve the processing of very large quantities of data. The overriding premise of factor analysis is that factors that have high correlation share the same driving factors and vice versa. Factor analysis assumes two forms: exploratory factor analysis (EFA), and confirmatory factor analy
Wednesday, November 20, 2019
Water conservation strategies according to green seal requirements Case Study
Water conservation strategies according to green seal requirements - Case Study Example This paper deals with the concept of water recycling and waste water management according to the principles enshrined in Green Seal recommended practices. Water recycling processes can adopt many strategies that strives to conserve water as well as reuse them after separating harmful pollutants and organic matter from it. The strategies also involve practices that encourage the effective use of water and reduction of waste water. Waste water management is not a discipline that merely consists of scientific jargon. It is attainable and sustainable provided one takes the pains to implement it aptly.With the increasing destruction of environmental resources, the need for conservation has significantly increased in the modern world. This is specifically so in the case of resources such as water. Statistics available indicate that sources of potable water will not remain as such if the level of exploitation is to continue at the current rate in the world. In addition to the pressures of p opulation increase and pollution, industrial pressures on potable water are also decreasing the availability of fresh water and there is an urgent need to control water wastage. It is in this context that the need to control water wastage through water recycling gains importance. Wastewater management is an emerging field of science that helps to tackle issues related to water pollution and contamination in the industrial world.The need for waste water management has many ramifications, which is both social as well as economical. As far as the society is concerned waste water management helps to recycle the much needed elixir of life back into the water sources as potable water. Otherwise, water that is recycled can be used to sustain green cover over an area thereby providing for the optimum use of this precious natural resource. On the economic front it may be said that conserving water amounts to saving money in many ways and the initial costs that may be involved can soon be rec ouped in terms of both tangible and intangible benefits for the company. World wide statistics indicate that water, which is a fundamental need for the existence of life on earth, is limited in terms of its availability. Humans have access to less than 0.08% of all the water that is available in earth. To add to the woes it is believed the need for water will increase by about 40% in the next two decades. This perhaps indicates to the immense responsibility that humans have towards conserving water. In the year 1999, the United Nations Environment Programme identified water shortage as one of the two most worrying problems for the millennium. The fact that the other problem, global warming, is also related to water shortage adds gravity to the situation. It is believed that one person in five across the world has no access to safe drinking water. Similarly, one in two lacks safe sanitation [United Nations Industrial Development Organization. 1996] In terms of social ramifications, a reliable supply of water is the basic need for any form of development. The availability and quality of water is essential factor in the nation's ability to protect public health, preserve ecological integrity, ensure sufficient agricultural production, and meet commercial needs. Therefore issues affecting the nation's atmospheric water, surface water and groundwater need to be addressed with priority. Certain facts that point towards the gravity of a water crisis are: About 1.1 billion people, or 18 percent of the world's population, lack access to safe drinking water. In addition, 2.5 billion are without proper sanitation. Even though the freshwater supplies are sufficient for the world's population, water scarcity exists due to poor management and distribution of water resources. Unsafe drinking water is the cause of death of more than five million people each year.
Sunday, November 17, 2019
Network operating systems Essay Example | Topics and Well Written Essays - 750 words
Network operating systems - Essay Example Novell was licensing Novell Directory Services to all comers, the idea being to seed the market and make NDS a de facto standard that will increase demand for Novell's directory-enabled applications. While these licensing deals didn't expected to produce much revenue at this point, that might change down the road if third parties start including NDS in products instead of building their own directories. As Robert Harbison says, "That's where Microsoft is really great. Microsoft shipped NT 4.0 with a sampler CD full of third-party applications from its ISVs. Novell has to do a lot more to help promote NDS applications." Distinguishing feature of Novell's approach to network operating systems is understanding of importance of middleware technologies, for example NDS' unparalleled cross-platform support is particularly appealing to Tivoli. "Microsoft has traditionally misunderstood the importance of certain middleware technologies and how important it is for them to be cross-platform in nature," says Tom Bishop. "Active Directory is fine for pure NT shops, but Novell's NDS strategy has some real appeal in the more heterogeneous environments that we target." It is mentioned by Breidenbach that NDS is now available on Hewlett-Packard's HP-UX, IBM's AIX, Caldera's Linux and The Santa Cruz Operation's Unix, Sun Solaris and IBM's S/390. NT is already supported by NDS, but only in environments with at least one NetWare server. A version of NDS that runs directly on NT without NetWare was due out in summer of 1999; it would enable users to build pure NT networks but still employ NDS. This approach of Novell differs a lot from Microsoft's Active Directory Technology that is available only for Windows platform. As a result, Novell's NDS can be implemented on various operating systems but do not help to promote Novell's operating system Novell Netware, while software products of Microsoft run only in Microsoft Windows environment. Another distinguishing feature of Novell's approach to network operating systems is collaboration with switch vendors. As Breidenbach writes, part of Novell's strategy for boosting NDS' role in enterprise nets is getting switch vendors on board. The company has been scoring big with the likes of Lucent, Nortel Networks and Cisco announcing varying degrees of support for NDS. At the same time Microsoft do not work with switch vendors so close. 2 Given all this good technical stuff, why is Novell close to bankruptcy and Microsoft Networks are taking over the planet I think that the main reason of Novell's difficult financial situation is thoughtless marketing strategy. It was a mistake trying to enter desktop operating systems market. Failure in this attempt had caused loss of trust of many potential customers. Breidenbach writes about this in the article. "Novell was on top and got dethroned," says high-tech marketing guru Geoffrey Moore. "When that happens, the market is extremely reluctant to reenfranchise such a company, even if it has the best product." "And the number of ISVs is meaningless," Moore adds. "The issue is what the power players are doing. Cisco and Microsoft have the strongest positions, so a solution that doesn't have their endorsement isn't likely to get very
Friday, November 15, 2019
Security Metrics Maturity Model for Operational Security
Security Metrics Maturity Model for Operational Security CHAPTER ONE: Introduction In this chapter, the key concepts and definitions by well known security authorities on security metrics is introduced and discussed. Then the issues and motivation that brings about this research topic is explained. Thereafter, the end result which is the objectives is put forth. To achieve these objectives, the goals are briefly outlined. There is also a section that explains the scope of the research and limitations for this work. Finally, the research flow on the chapters is explained. 1.1 Introduction Information Technology (IT) is continuously evolving at faster rate and enterprises are always trying to keep pace with the changes. So does the threats. As the complexity of IT increase, the unprecedented threat environment and security challenges also have increased multi fold over the years. Security Managers and CSOs with the blessings of top management keep investing and on security solutions to protect from ever increasing adversaries. But getting the blessings is not always an easy task for them as management normally does not see the direct benefit. Convincing on security investment is also part of challenges for Security Managers and CSOs. As part of the convincing process, the Security Metrics (SM) plays a vital role in any organization. It helps the management to have a close to comprehensive view of their organizational security posture. SM provides some measurement on how secure the organization is. However, how accurate is the information provided by the SM? Can the management take the SM as a final view of their respective organizational security posture? Can SM ensure the investment made for security is worth? A good SM should be able to answer accurately or provide some qualified response for the questions that management have. SM receiving many attention lately as IT Security is no more an option. With multitude of attacks from adversaries and many regulatory requirements, organizations are spending on security investment to ensure they are protected and stay competitive in markets. The greatest push factors for the metrics awareness are the recent amplified regulatory requirement, greater demand for transparency and accountability. Additionally there are many internal factors that driving organization to justify security investments, security and business objectives alignment and finally to fine-tune effectiveness and efficiency of organizational security programs. Much has been written and researched on SM on various aspects from data collection, analysis to measurement method etc. A considerable number of research efforts have been emerging in best practices, methodologies, framework, tool and techniques are being recommended and adopted to mature the security metrics. However, relatively little has been reported and proven on quality and matured metrics one has to follow and put in practice. Moreover security cannot be measured as a universal concept due to the complexity, uncertainty, non-stationary, limited observability of operational systems, and malice of attackers [VERENDEL V, 2010]. More has to be researched in the area of security metrics. Many interpretations and meanings of Security Metrics have been found on the Internet. Some examples taken from well know publications and researchers are as follows: According to the National Institute of Standards and Technology (NIST), ââ¬Å"Metrics are tools designed to facilitate decision-making and improve performance and accountability through collection, analysis and reporting of relevant performance-related dataâ⬠[NIST-SP, 2001]. Whereas SANS in its ââ¬Å"A Guide to Security Metrics, SANS Security Essentials GSEC Practical Assignmentâ⬠, Shirley C. Payne says that ââ¬Å"Measurements provide single point-in-time views of specific, discrete factors, while metrics are derived by comparing to a predetermined baseline two or more measurements taken over time. Measurements are generated by counting: metrics are generated from analysis. In other words, measurements are objective raw data and metrics are either objective or subjective human interpretations of those dataâ⬠. [SHIRLEY C. PAYNE, 2006] She also further describes what would be considered a ââ¬Å"usefulâ⬠metric: ââ¬Å"Truly useful metrics indicate the degree to which security goals, such as data confidentiality, are being met and they drive actions taken to improve an organizationââ¬â¢s overall security program.â⬠Yet another one practical definition by Andrew Jaquith, states that ââ¬Å"Metrics is a term used to denote a measure based on a reference and involves at least two points, the measure and the reference. Security in its most basic meaning is the protection from or absences of danger. Literally, security metrics should tell us about the state or degree of safety relative to a reference point and what to do to avoid dangerâ⬠. [JAQUITH (1), 2007] [M. SWANSON, 2003] highlights some of the key uses of security metrics in an organization. They are (not limited to):- Enabling organizations to verify compliance level against internal and external institutions. (e.g. laws, regulations, standards, contractual obligations) and internal ones (e.g. organizational policies and procedures Provide visibility and increasing transparency on accountability with regards to specific security controls and facilitating detection. Provide effectiveness and efficiency of security management by providing better visibility on security posture at high and granular level, helping in security strategies and display trends. Helping management to decide better on security investments in terms of allocating resources, product and services. Having a right security metrics is a paramount in gauging a security posture of an organization. Most of the SM concerns coins from the correctness and effectiveness. Correctness denotes assurance that the security-enforcing mechanisms have been rightly implemented (i.e. they do exactly what they intended to do, such as performing some calculation). Effectiveness denotes assurance that the security-enforcing mechanisms of the systems meet the stated security objectives (i.e. they do not do anything other than what is intended for them to do, while satisfying expectation or resiliency).[BARABANOV et al, 2011] Organizations faced with many security metrics options to be used. The security managers and CSOs bombarded with large set of related, unrelated, heterogeneous security metrics by different source or assets within the organization. How will they make these metrics to be more meaningful and eventually reduce risks and support strategic security decisions? Therefore, the decision makers should be furnished a proper security metrics guidelines that encompass the right type of measurement / data to choose, correct way of analyzing and interpreting and any other recommendations. This research, therefore will explore further on the existing security metrics recommendations currently in practice. In order to improve the current security metrics, more research efforts are needed and focused in the area of good estimators, human element reduction, obtaining more systematic and speedy means to obtain meaningful measurements and better understanding of composition of security mechanisms. [LUNDHOLM et al, 2011] Therefore, this research will explore the identification of quality security elements to determine matured security metrics as there are many areas within IT security that contributes to an organizational security posture. This mainly involves providing weight-age for each and every element. Thereafter the elements are then prioritized and finally sum up to provide a final security posture of an organization. Some of the key domains within security are cryptography, operational security, physical security, application security, telecommunication security and many more. The research will identify elements within these domains that play a vital role in an organization to produce a security metrics report for management. These elements are further scrutinized and qualified to be part of the security metrics. The scrutinization and qualification is done through various researches done by previous researchers. The systematic techniques will provide a guided recommendation for near optimal security metrics for an organization. The key questions for this research will be what is acceptable security metrics element or measurement for a domain? How accurately these parameters are obtained? How effective are they? As a whole how matured are the metrics? How these various elements and parameters can be used to provide an accurate and convincing security posture report for an organization in a practical manner? To go further explaining this research, imagine this scenario: A key security personnel of an organization presenting a finding of the companyââ¬â¢s security posture. She/he talking about how good the security in place, how good is the security fortress, how impenetrable the security perimeter and so on. To support his claims he throws some PowerPoint slides with security metrics. The management was like awed and feeling comfortable with the presentation and they felt secure doing their business. But then there are few questions from the floor on the accuracy, quality, completeness and maturity of the metrics. How confidence is the security metrics presented? Hence a proper model that supports the claim is needed. The model will substantiate the claims of the security personnel on her/ his findings. Therefore this research will look into the ways of substantiating by proposing a maturity model. The end result of this research will be guiding principles that leads Security Managers to produce a convincing and close to accurate report for C Level management of an organization. This research will look into various studies done on existing measurements and security elements for Security Metrics and produce a method that will portray the maturity of security metrics used in an organization. 1.2 Problem Statement The lack of clear guidance on security measurements that represent a security posture of an organization has been always a problem despite many researches done in the area. Despite many methods and definition in the area of security metrics were introduced, nothing is strikingly clear that enable organization to adopt and implement in their respective organization particularly in operational security. There are many theoretical and more to academia texts available in this area [JAQUITH, 2007, M. SWANSON, 2003, CIS-SECMET, 2012]. Organizations still lack of precise knowledge of practicable and effective security metrics in the operational security settings. 1.3 Motivation There is an obvious need in guiding organization to the right direction in implementing their respective organizational security program. There is paucity exist in the mode of guiding process for organization to implement security program with the right metrics to monitor their operational activities. The main incentive behind proposing a matured security metrics for operational security is a workable solution and guide for matured security metrics for any organization. Organizations need a model to look into the type of metrics used in their security program and a model to chart their metrics improvement program. Hence the solution will be an asset for organizations in implementing reliable and practical security metrics. This paper will answer question like ââ¬Å"Are incidents declining and improving security over time? If yes or no, how reliable are the answers?â⬠Is my metrics are correct and reliable if not how can I improve it? Further, the paper will provide some practic al top down approach in approaching security metrics in an operational environment. Another motivation for this paper is the findings from the [PONEMON, 2010], who claims many researches lack of guidance, impractical in operational environment and purely formal treatment as no empirical support as a whole. In the end, through some findings of this paper, organizations will be able to gauge the return on investment on security investments. They should be able to measure successes and failures of past and current security investments and well informed on future investments. 1.4 Objectives The problem statement and motivations bring the objective for this work. The objectives for this project will be: a. To provide security metric quality taxonomy for operational security b. To devise methods for matured security metrics for operational security To achieve these objectives, the methodology and goals used for this work would be: Conduct a literature review on existing research works and state of the art Identify the key operational areas based industry expert inputs Develop a taxonomy based on the key operational areas Identify the key criteria or parameters that make a good quality metrics Identify on how to categorize or rank the metrics to represent the maturity of a metric Develop a method to guide for a quality security metrics Develop a metric score card to represent maturity level Develop a Security Metrics Maturity Index (SM-Mi) 1.5 Scope of Work For the purpose of this research only a certain area of operational security is identified. Also to be more focused, to give a better view and example, we will choose few important and popular metrics among security practitioners. The research is aim to provide a very practical approach in operational security metrics for an organization, but is not meant to be treated as an exhaustive guide or resource. Metrics prioritization is out of the scope of this research as organizations have various different business objectives and goals. These decide and dictate the type of metrics to be used and emphasized as such metrics will not be discussed [BARABANOV, 2011]. 1.7 Thesis Layout The research consists of 6 chapters; the first chapter will describe some security concepts and motivation for this topic. The second chapter will delve into the related works done in this area. This chapter will identify some key research findings and what is lacking in them and how some of the information will help for this thesis. As for the research methodology and proposed framework, chapter 3 will explain this. Chapter 4 will identify and explain in detail the formulation of proposed metrics and taxonomy for operational security in the form of techniques. Meanwhile Chapter 5 will discuss a case study based on the solution proposed. Chapter 6 will be a brief chapter that summarize the research and will discuss on future direction of this research.
Tuesday, November 12, 2019
The Trolley Dodgers
In 1890, the Brooklyn Trolley Dodgers professionalsââ¬â¢ baseball team joined the National League. Over the following years, the Dodgers would have considerable difficulty competing with the other baseball themes in the New York City area. Those teams, principal among them the New York Yankees, were much better financed and generally stocked with players of higher caliber. In 1958, after nearly seven decades of mostly frustration on and off the baseball field, the Dodgers shocked the sports world by moving to Los Angeles. Walter Oââ¬â¢Malley, the flamboyant owner of the Dodgers, saw an opportunity to introduce professional baseball to the rapidly growing population of the West Coast. More important, Oââ¬â¢Malley saw an opportunity to make his team more profitable. As an in document to the Dodgers, Los Angeles Country purchased a goat farm located in Chavez Ravine, an area two miles northwest of downtown Los Angeles, and gave the property to Oââ¬â¢Malley for the site of his new baseball stadium. Since moving to Los Angeles, the Dodgers have been the envy of the baseball world: ââ¬Å"In everything from profit to stadium maintenanceâ⬠¦the Dodgers are the prototype of how a franchise should be run. â⬠? During the 1980s and 1990s, the Dodgers reigned as the most profitable franchise in baseball with a pretax profit margin approaching 25 percent in many years. In late 1997, Peter Oââ¬â¢Malley, Walter Oââ¬â¢Malleyââ¬â¢s son and the Dodgers principal owner, sold the franchise for $350 million to media mogul Rupert Murdoch. A spokesman for Murdoch complimented the Oââ¬â¢Malley family for the longstanding success of the Dodgers organization. ââ¬Å"The Oââ¬â¢Malleyââ¬â¢s have set a gold standard for franchise ownershipâ⬠. ? During an interview before he sold the Dodgers, was seemingly a perfect example of one of those experts he had retained in all functional areas: ââ¬Å"I donââ¬â¢t have to be an expert on taxes, split-fingered fastballs, or labor relations with our ushers. That talent is available. â⬠? Edward Campos, a longtime accountant for the Dodgers, was seemingly a perfect example of one of those experts in the organization. Campos accepted an entry-level position with the Dodgers as a young man. By 1986, after almost two decades with the club, he had worked his way up the employment hierarchy to become the operations payroll chief. After taking charge of the Dodgersââ¬â¢ payroll department, Campos designed and implemented a new payroll system, a system that reportedly only he fully understood. In fact, Campos controlled the system so completely that he personally filled out the weekly payroll cards for each of the four hundred employees of the Dodgers. Campos was known not only for his work ethic but also for his loyalty to the club and its owners: ââ¬Å"The Dodgers trusted him, and when he was on vacation, he even came back and did the payroll. â⬠? Unfortunately, the Dodgersââ¬â¢ trust in Campos was misplaced. Over a period of several years, Campos embezzled several hundred thousand dollars from his employer. According to court records, Campos padded the Dodgersââ¬â¢ payroll by adding fictitious employees to various departments in the organizations. In addition, Campos routinely inflated the number of hours worked by several employees and then split the resulting overpayments fifty-fifty with those individuals. The fraudulent scheme came unraveled when appendicitis struck down Campos, forcing the Dodgersââ¬â¢ controller to temporarily assume his responsibilities. While completing the payroll one week, the controller noticed that several employees, including ushers, security guards, and ticket salespeople, were being paid unusually large amounts. In some cases, employees earning $7 an hour received weekly paychecks approaching $2,000. Following a criminal investigation and the filing of charges against Campos and his cohorts, all the individuals involved in the payroll fraud confessed. A stale court sentenced Campos to eight years in prison and required him to make restitution of approximately $132,000 to the Dodgers. Another of the conspirators also received a prison sentence. The remaining individuals involved in the payroll scheme made restitution and were placed on probation. QUESTIONS AND ANSWERS 1. Identify the key audit objectives for a clientââ¬â¢s payroll function. Comment on both objectives related to tests of controls and those related to substantive audit procedures. Ans: The key audit objectives for a clientââ¬â¢s payroll function are occurrence, completeness, accuracy, pasting and summarization, classification and timing. On the occurrence objective the related test of control could be examining the time cards, personnel files, reviewing organization chart to see if the payroll payments are for exiting work and for existing employee and the substantive test for the occurrence objective is to see if the right amount of payroll is paid to the right employee and were recorded properly. On the completeness objective the test of control could be to see if the existing payroll were recorded and the substantive test is to compare the book and the payroll bank statement and look for the unmatched amount. For the accuracy objective, the test of control is to examine if the right hours and rate are recorded, tax withholding is correct while the substantive test is to test for exact amount by recalculating gross pay and net pay, comparing pay rate with the industry also. For posting and summarization objective, the test of control could be comparing the master files total with general ledgers total and while the substantive test is by footing the payroll journal and tracing postings to the journal ledger and the payroll master file. The test of control for the classification objective is to review charts of accounts while the substantive test is to review the time cards and job ticket. Lastly, for the timing objective, the test of control is to examine procedures and observe if recording is taking place while the substantive test is to compare date on checks. . What internal control weaknesses were evident in the Dodgersââ¬â¢ payroll system? Ans: The internal control weaknesses in the Dodgerââ¬â¢s payroll system is that Campos, who is happen to be the operations payroll chief, is the one who designed and also implemented a new payroll system that only him that could fully understand. Also other weaknesses is that there is no independent check a nd performance, there is also no separation of duties, and Dodgers work environment would be a weakness because Campos and others have low work ethic. 3. Identify audit procedures that might have led to the discovery of the fraudulent scheme masterminded by Campos. Ans: Audit procedures that might discover the fraud is by understanding Dodgerââ¬â¢s payroll chart because auditors would see if there are no independent check and performance and no separation of duties. Another thing is that to interview employees in the payroll department. Test for nonexistent employee, reconciling the total hours paid in payroll records with that in an independent record of the hours worked and observing employee time in.
Sunday, November 10, 2019
Caged Bird by Maya Angelou Essay
Question: Explore the ways in which the poets in the following poems use imagery to vivid effect. Use examples from both the poems. Caged Bird by Maya Angelou Before the Sun by Charles Mungoshi The poem, Caged Bird by Maya Angelou, dramatizes the discrimination between the blacks and the whites. As this issue relates to the life of the poet, she expresses her way of thinking through this poem. The poet speaks about two birds, one which is free, expressing the freedom which the blacks desire, and another a caged bird, articulating their actual standing. The poet puts across her thoughts in order to evoke an emotion of sympathy towards the Afro-Americans, from the readers. To give a more vivid and an effective outcome, the poet has used various imageries to convey an array of feeling. The poet talks about the liberty of the free bird by saying, ââ¬Å"dips his wing in the orange suns rays and dares to claim the skyâ⬠1. This sentence gives us the impression of how the free bird opens its wings and flies around in the blue sky, without any obstructions by anyone. This is a desire which the Afro-Americans in the society had, as they were always under restrictions by the whites. In the next stanza, we see that, Maya speaks of a caged bird that can, ââ¬Å"seldom see through his bars of rage his wings are clipped and his feet are tied so he opens his throat to singâ⬠2. This image of the condition of the caged bird gives us the knowledge that it cannot fly or even walk, on top of it, the bars of the cage makes him furious. The Afro-Americans of the world were in the same position, where the limitations were raising their temper, however they could not demand and fight for their justice. There was a terror in the voice of the caged bird as the poet says that it ââ¬Å"sings with a fearful trillâ⬠3. Being restrained from many matters of life, a dread of panic had entered the Afro-Americans. They were terrified of each and every move of the whites, although they longed for a day when they will gain freedom. ââ¬Å"caged bird sings of freedomâ⬠4, through this sentence, the poet compares the caged bird and the Afro-Americans of the society, as both hopes for free will. A very strong imagery of the horror of the Afro-Americans is being given in the fifth stanza of the poem. Maya uses the words, ââ¬Å"stands on the grave of dreamsâ⬠5, to show how the hardships and frustrations of living in a segregated Afro-American community has forced the Afro-Americans to think that their wishes and demands have come to an end, as they are dominated by the rules of white people. An image of a grave tells us that the surrounding is dark, lonely and gloomy; therefore we get an impression about the kinds of thoughts which go across in the Afro-American group of peopleââ¬â¢s minds. They face so much of annoyance and dissatisfaction that, just a nightmare can make even their shadows scream of terror. The last stanza of the poem again repeats the lines in the third stanza, emphasizing on the yearning of freedom by the Afro-Americans, though having a dread in them. Therefore, we saw how Maya Angelou has used various effective imageries in conveying the sentiments and emotions of the Afro-Americans. The poem, Before the Sun by Charles Mungoshi, sensationalizes the emotions of a child who is in his childhood, but on the verge of becoming an adult. The boy is on the threshold of maturity. The poet speaks about a child, who is in his adolescence and who is very close to nature. Therefore, the poet uses vivid imageries of nature to convey the thoughts of the boy. The boy communes with nature and the universe. We read the poem through the boyââ¬â¢s voice. In the first stanza itself, we get the hint that the boy is close to the nature. We can see that, the child is waiting for the sun to come up as he says, ââ¬Å"Intense blue morning promising early heatâ⬠6, so that he can have a new start of the day. The figurative meaning of this would be that, he is waiting for his manhood to come. His childhood is the night, which is innocent of the activities going on in the world, and the sun for which he is waiting is his adulthood, which will bring a new day in his life. This day is revealing, which results in a loss of innocence of the night, i.e. the boyââ¬â¢s childhood, as he will gain experience. The second stanza is an image, where we visualize the boy cutting a wood with an axe. This is a very effective image, as we actually have the vision of cutting of a tree and, the chips flying away. This is shown as Mungoshi says in this stanza, ââ¬Å"The bright chips fly from the sharp axeâ⬠7. The word, ââ¬Å"arcâ⬠, is very effective, as it has both, visual and an audible image, of the short span of time when the axe is whacked on the tree, and the chip of the wood, flies and settles down n the grass, making the shape of an arc in the air. The third stanza has an imagery of a, ââ¬Å"big logâ⬠8, of wood being wanted by the boy to cut. A sense of achievement is being shown by Mungoshi, which the boy desires, as he is in his teenage years. The fifth stanza has again a very strong and an effectual imagery of the wood being cut, and dust coming out of the wood. The phrase, ââ¬Å"It sends up a thin spiral of smoke which later straightens and flutes out to the distant sky: a signal- of some sort, or a sacrificial prayer.â⬠9 This is a visual image, where the boy tells the readers, that how, when the wood is being cut, the smoke makes a spiral shape and moves up. The words, ââ¬Ëflutes outââ¬â¢, tells us that the smoke makes a sound while going up, which is very similar to the sound of a flute. The boy considers moving away towards his adulthood by sacrificing his childhood, as a result he says, that the smoke which is going is, ââ¬Å"a sacrificial prayerâ⬠. ââ¬Å"The wood hisses, The sparks flyâ⬠10, is an imagery of log of woods burning in the fire, and the sparks makes a kind of sound. This fire can be the image of a sacrificial fire, as he imagines of sacrificing childhood. The last stanza of the poem has an imagery of the process of eating, as the boy says, ââ¬Å"taking big alternate bites: one for the sun, one for meâ⬠11. The last line, ââ¬Å"two little skeletons in the sunâ⬠, tells us that the two skeletons are two cobs of maize which the boy was eating, although, this image can be the remains of his childhood, which he sacrificed. Therefore, we see how Charles Mungoshi has used vivid and effective visions and sounds to portray the feelings of the boy in moving towards maturity and adulthood. In the end, it is seen that both the poems have one major theme in common, i.e. the desire of freedom. The Afro-Americans symbolized by the caged bird wants the freedom of rights and speech, and on the other hand the adolescent boy wants to enjoy the same lack of restrictions enjoyed by the adults. Both of them are impatiently waiting for their freedom. 1 Caged Bird, by Maya Angelou Stanza 1, l-3 2 Caged Bird, by Maya Angelou Stanza 2, ll-5-6 3 Caged Bird, by Maya Angelou Stanza 3 l-7 4 Caged Bird, by Maya Angelou Stanza 3 l-10 5 Caged Bird, by Maya Angelou Stanza 5 l-14 6 Before the Sun, by Charles Mungoshi Stanza 1 ll-1-2 7 Before the Sun, by Charles Mungoshi Stanza 2 ll- 5-6 8 Before the Sun, by Charles Mungoshi Stanza 3 l-12 9 Before the Sun, by Charles Mungoshi Stanza 5 ll- 20-25 10 Before the Sun, by Charles Mungoshi Stanza 6 ll- 26-27 11 Before the Sun, by Charles Mungoshi Stanza 8 ll- 38-41
Friday, November 8, 2019
Maria Full of Grace Essay Example
Maria Full of Grace Essay Example Maria Full of Grace Paper Maria Full of Grace Paper Muted group theory illustrates how a group can acquire power and use it to it to dominate culture. It specifically refers to the gender roles created by society and can also be used to examine cross-cultural case studies. Its name describes how a group in power can manipulate language and communication practices specific to its culture in order to silence the members not included in the dominant group. Maria Full of Grace is an exposi of the complexities surrounding womens involvement in drug trafficking and becoming a woman in a male dominated society. In the movie there are many examples of communication that are impeded because of womens current role in society. The movie opens with its title character, Maria Alvarez , a 17-year-old Colombian, making out her boyfriend, Juan. Juan is completely involved in the moment and hinting that he wants to further accelerate the situation, and he even doesnt notice her indifference to his affection. He attempts to get her to agree to let them go back to her house, but she wants to climb on top of the roof. She emasculates Juan by teasing him and he gets irritated and walks away. Instead of complying with Juans wish to go back to her house, Maria responded by taking control of the situation (especially notable because of its sexual nature) and said, See how you treat me? Youre a drag. Because she attempts to step outside of the expectation that she will fulfill the needs of her lover, she is punished by him walking off and leaving her on the roof by herself. In the next scene, Maria is being mistreated by her male supervisor. He refuses to let her go to the restroom even though she feels nauseated, and then proceeds to demand she clean the mess off the roses after she vomits on them. It is implied Maria takes this kind of abuse on a regular basis. When she next sees her mother and sister, at the local pharmacy, she informs them she quit her job at the factory. They are alarmed and ask when and why this happened. This is sparked by argument over money. It is cultural practice for a Colombian family to all chip in and help out with money, even if it is not equally contributed to. Marias nephew, Pacho, is sick and needs medicine. Diana and her mother tell her she is selfish and should be able to deal with her employment issues for the benefit of the family. They ask her to go back, but Maria refuses, saying she will find other work. This is an example of a socially constructed expectation that works in opposition of womens rights. Maria is being harassed by her employer; this should be handled immediately by reporting him to a company employee in charge of human resources. Instead, she sees the only way to stop it is to quit. Because her word would most likely not be taken seriously, she takes the blame instead of demanding action. This form of oppression is a form of muting an individual because of her gender. Not only does she give up her job, but she is chastised by her own family for not thinking of them first. It is conventional for Hispanic families to function together, even at the expense of a womans happiness. Maria is working to take care of her nephew who has no father in sight. Actually, there are no males besides Pacho in the household that are ever mentioned; this leaves only Maria to provide income. Later in the movie, Maria tells Juan she is pregnant, but she does not want to get married. He contends he must live with her, because society wont accept a guy living in his girlfriends house. Again, Maria departs from the norm by rejecting the necessity of marriage because of a pregnancy. She even goes further to reject the notion of marriage without love. Maria is comfortable with her independence, even as a single mother-a concept foreign to most women in her position. Muted group theory is also applicable in this film because it deals with cultural issues. Women often jeopardize their freedom and lives by agreeing to serve as drug mules or couriers to smuggle illegal drugs into another country. Maria is in desperate need of a job because she is obligated to care for her mother, sister, and nephew. She meets Franklin, who at first seemed very innocent, and he mentions a way she could make money if she would take the chance. Franklin delivers her to Javier, the head of this particular drug cartel in Bogat. He explains the arrangements, but not without offering a charitable donation so she could get her affairs in order. The direction and quality of her life is no longer in her hands; it is in those of the men in authority positions in her life. Even when she is in the United States, her fate is determined by Don Fernando (the Colombian travel agent who offers help to her and Blanca) and the male drug dealers who hold Maria, Blanca, and Lucy captive. Don Fernando chose not to turn them into the police, but he did betray the women by telling Carla about Lucys death and its surrounding circumstances. The drug dealers killed Lucy for the heroin in her body; they had no regard for the life that possessed it. If Maria would have fallen ill, she would have suffered the same outcome. Even after her and Bianca escaped, the men had the ability to harm their families in Colombia. Once they returned to give the dealers their pellets, their own lives were once again endangered. They were fortunate to not be killed, much less receive their payment, but it was not without verbal and physical abuse. Each of the trials Maria faces is caused by a social norm that demands womens subordination to men in different areas of her life. Every aspect of her life was affected by this form of inequality: her sexual relations, her relationship with her boyfriend and family, her employment, her welfare, and her basic right to life. Maria Full of Grace is a paradigm for feature films that illuminate the delicate issues that instigate womens involvement in such reprehensible a exploit as drug trafficking.
Wednesday, November 6, 2019
Text types matrix Essays
Text types matrix Essays Text types matrix Essay Text types matrix Essay Text Type Context Purpose Audience Relationship Experts to learners Give out detailed information about a particular topic Interested people Information Nons Encyclopedia Dictionary References Leaflets/Brochures Those wishing to be informed Explanation Instruction Exposition Narrative Explains a process or procedure; how and why something works, or how a procedure is carried out designed to give information on how something should be done. Oral or written text in which someone takes a position on an issue and argues the case or presents a point of view Generally everyone Explains a process Gives a detailed step by step procedure on how to do something Expresses point of view; or persuades the listener or reader Written or spoken narration of an event that happened in the past. Three main kinds: factual, personal, and imaginative To relate in chronological order a sequence of past events Oral or written literary texts such as short stories, poems, novels. May also include songs. UT chiefly for entertainment purposes
Sunday, November 3, 2019
Movie Analysis Essay Example | Topics and Well Written Essays - 500 words
Movie Analysis - Essay Example Each of these characters have exhibited different ways of leading their fellow team members or the students as well as their colleagues in various ways. While Coach Boone, as the main coach has motivated the team and also provided the impetus to enjoy and win every game forgetting all forms of individual limitations and racial differences, Bill Yoast exhibited leadership quality by motivating players and taking adequate initiatives to assist Coach Boone to excel other teams in all divisions of team game. Gerry Bertier, being captain of the team has successfully guided his teammates to victory forefront, established instance that racial differences should not affect their performance as a team in the field by establishing a close friendship, both in and off the field with Julius Campbell and also made strong decisions to ensure high level of performance of the team by removing his white friend Ray, who attempted to impact the teamââ¬â¢s performance by due to his personal disliking against African-Americans. Ronnie Bass, has also exhibited his leadership capacity by developing a cozy relationship with all team members, irrespective of all racial differences and identifying his capacity to lead, Coach Boone has also referred him as ââ¬Å"the colonelâ⬠(Remember the Titians 2000). However, carefully pondering over each of the characterââ¬â¢s contribution in the entire performance of the team it can be said that except Coach Boone, each of the other three were prescribed with specific duties to lead different departments of the team but Coach Boone was actually responsible for the entire situation and he has emerged as the leader in the film. Apart from the formal assignment to lead the team to win, he encountered the greatest challenges, namely to ingrate the team going beyond the scope of racial differences and to fight against all
Friday, November 1, 2019
ISLAM. Shi'i and Sunni Muslims Research Paper Example | Topics and Well Written Essays - 1000 words
ISLAM. Shi'i and Sunni Muslims - Research Paper Example Islam is articulated by the divine book, Holy Quran, and is a monotheistic religion. Quran is the text, which is regarded as the perfect word of God by its Muslim followers and by the teachings of Holy Prophet (PBUH). Muhammad (PBUH) is the last Prophet of Allah and the seal on all the prophets and marks the finality of the prophethood. An adherent, or a follower, of Islam is known as the Muslim. The Muslims, without doubt, believe that there is only One and Incomparable God and the purpose of the existence of entire humanity is to serve and love the Almighty Power. They are also of the firm belief that Islam is a full universal adaptation of the primitive faith which was sent at various places and times through Moses, Abraham, and Jesus, who were the prophets of God before the arrival of Holy Prophet (PBUH) (Raana, 2010). Majority of the Muslims in Islam are the Sunni followers these days. According to the etymology of the word Sunni, it is a very broad terms which has been derived from the word Sunnah, which means a ââ¬Ënormal practiceââ¬â¢ or ââ¬Ëhabitââ¬â¢. Sunnis exist from the time of the Holy Prophet (PBUH), and are generally considered as the orthodox, or conventional, form of the religion. They are considered to be the followers of one of the four schools of thoughts: Hanafi, Maliki, Shafii, and Hanbali. These schools differ from each other in the methodologies of interpreting and practicing the Islamic laws (Marranci, 2007). The formation of Sunni sect was the outcome of the election of Abu Bakar as the first successor of the Holy Prophet (PBUH). Ali had already got the candidature for the caliph but when the community chose the closest companion of Holy Prophet, the entire community got divided into two sects over this dispute. Those, who accepted and respected the legality and authority of Abu Bakarââ¬â¢s caliphate composed the majority of Muslims, were later called as ââ¬Å"Sunni,â⬠which means the ââ¬Å"followers of [the Prophetââ¬â¢s] customs [sunna].â⬠The
Wednesday, October 30, 2019
The Policies of Alexander Hamilton and Andrew Jackson Essay
The Policies of Alexander Hamilton and Andrew Jackson - Essay Example He also has a high regard towards the upper-class and educated men as the fittest to become the countryââ¬â¢s leaders. Opposing the political views of Hamilton is Jacksonââ¬â¢s democratic-republicanism. He stressed out the ordinary peopleââ¬â¢s right to vote and the first president to represent all Americans, regardless of their social standing (ââ¬Å"The Presidencyâ⬠). He is known to be Hamiltonââ¬â¢s critic who contradicts federalism ideals. He regarded Hamiltonââ¬â¢s views as elitist and idealistic. Relationship to Modern America Today, the American Federal government is a combination of two political views. It takes Hamiltonââ¬â¢s view on the independence of government branches and Jacksonââ¬â¢s idealism on suffrage. States also are given freedom provided that they also follow the national law. In other words, todayââ¬â¢s politics resemble both political views. First, the elitist perspective of Hamilton is still surviving, although discouraged by mod ern thought. Many of the politicians today are with high educational background and came from influential families. Second, Jeffersonââ¬â¢s state independence is practiced. State leaders are given the freedom to revise existing laws or to make laws not found with the rest of the states (e.g. legal drinking age). Economic Views By the end of the American Revolution, the country has to face a tremendous economic problem. There is an estimated $54 million debt of the United States while it only has barely half of the amount as their asset (ââ¬Å"Alexander Hamiltonââ¬â¢sâ⬠). Clearly, there is a huge deficit in the countryââ¬â¢s economic budget. To address this problem, Alexander Hamilton was given the task to regulate all forms of economic activities until it stabilizes. As young as he was at that time, he regarded taxation and debt management as a two-way street to economic stability. He proposed that all states should be imposed by appropriate taxes for debt payment. Al though states that are already debt-free at that time resisted against this proposal, it is still pursued and became successful. The next move by Hamilton was to establish the Bank of the United States as ââ¬Å"modeled from the Bank of Englandâ⬠(ââ¬Å"Alexander Hamiltonââ¬â¢sâ⬠) to take care of the collected taxes. While concerned with the nationââ¬â¢s debt payment, unlike Hamilton, Jackson disagrees with imposing taxes on states and became an advocate of the Laissez-Faire economy. This means to say that states are free to make international economic relations and other local economic activities without the imposition of taxes or the intervention of the national government (Ambrose and Martin 33). Despite the success of Hamilton's implementation of taxes and debt management, Jackson believes that an economy is better off without the presence of both. Since his younger years, Jackson hated debt in general, more so with national debt (Smith).
Monday, October 28, 2019
Demetrius Griggs Essay Example for Free
Demetrius Griggs Essay Krak! had many symbols presented throughout the book. The symbol that held the most meaning to me while reading this book is, The Sea. The book starts at sea, with the story ââ¬ËChildren of the Seaââ¬â¢, and the Sea proves to be very important to the people of Haiti in their struggle to escape a difficult situation. The sea is how the Haitian immigrants will travel in their attempt to escape a corrupted government. The sea becomes life and death, survival. In the story of ââ¬Å"Children of the Seaâ⬠the sea holds lots of meaning, and the meaning is very different for each person who is out at sea. For the young man escaping after police raid his radio station, he sees the sea as opportunity. The opportunity to escape a corrupt country and continue his life, but the sea also provides heartache, as this is what separates him from the love of his life. Being at sea also gives the young man hope that one day he can make a better life for himself, as most immigrants flee to America in the hope to live a more promising life. The only way he is able to have some peace with his time at sea, is the notebook he has, where he writes to his love back at home. He tells her of the women on the boat who tell stories and sing, in an attempt to control the seasickness most of them are experiencing. He describes being at sea as lost time, stating in one of his many letters, ââ¬Å"sometimes it feels like we have been at sea longer than the many years that I have been on this earthâ⬠(14). He is only aware that a day has passed by the raising and setting of the sun. I have always thought of the sea as something beautiful, mysterious even. The sea to me has always provided me with opportunity, the opportunity to experience something new, to explore. But this does not prove to be the same for the people on the tiny boat who are struggling to stay alive. It never occurred to me that the sea, is not always beautiful to everyone, it holds despair, fear and represents death in some cases. The scared passengers on the boats do not know what will happen until they reach land, nor do they know what will happen once they reach their destination. The fear of, how they will provide for themselves, what will they do for food, where they will live, sets in. I cannot imagine going day by day not knowing what will happen or if I will even survive to see another. I remember being so excited to come to New York for the summer before I would officially start school in the fall. It wasnââ¬â¢t until I was in the airport in New York that I realized I was officially on my own in a brand new city. Not knowing what the next day would hold or what I would get to experience had me a bit nervous. It was a good feeling to know I was getting to live a new life, but the uncertainty of that new life was shell shocking. However, I did have a place to stay, I knew where my food would come from, and I had the means to speak to my family whenever. These are things that I once took for granted. Knowing what was going to happen next. Along with providing opportunity for some of the passengers on the boat, the sea also symbolizes death. The sea holds the bodies of many refugees of Haiti who were not able to survive the difficult conditions of the boat. The young man is a witness of a live birth and death. Celianne is a young pregnant girl on the boat who was raped by the police of Haiti at 15 years old. As it seems she is having the worse time on the boat, not bringing any of her own food, she barely eats. The baby that she gives birth to does not survive. Having to throw her baby overboard was too much for Celianne, as she too follows her baby into the sea. ââ¬Å" There was no question of it. The sea in that spot is like the sharks that live there. It has no mercyâ⬠(26). In ââ¬Å"Nineteen Thirty-Seven,â⬠the symbol of water and death is represented again. This time however a river stands in the way of life. The Massacre River is the river that separates Haiti from the Dominican Republic, a place where all Haitians living there were ordered to death. The young girl that writes the boy tells the story of going on a pilgrimage to the Massacre River with her mother and other women. She learns that her life was almost taken there, as her mother was pregnant with her. ââ¬Å"We were saved from the tomb of this river when she was still in my wombâ⬠(40) Trying to escape the Dominican Republic to return to Haiti, many women lost there lives in that river to the El Generalissimoââ¬â¢s soldiers. Each year they would visit that River, dressed in white dresses to pay respect to the family members who were killed in that river, and also o remember how lucky they were to make it through the river and back to their terrifying country. The wearing of the white dress when the women would visit the Massacre River, reminds me of my family when we visit my grandfathers at their burial site. We would each wear something in memory of my grandfathers. Whether it is something he gave us, or a hat that we use to wear while watching our favorite basketball team play, we each had our own little tribute to them. The white dresses where their tribute to their lost relativities who did not make it across that river. Danticat did a great job incorporating symbols into these stories. Showing how everyday things we pay no attention too, hold so much more meaning then just what they are meant for. As Americans we see the sea and ocean as beautiful and relaxing, soothing. It is a place for us to escape our lives for a week long vacation, to have fun and forget about what is going on back home. I have never stopped to think that this does not prove to be the same for immigrants. The escape they are seeking is very different then the escape of an American on vacation. To them it is more a matter of life or death.
Saturday, October 26, 2019
Historical Truth Essay -- essays papers
Historical Truth Historical Truth? As a child sits through history class in the first grade, he or she learns of the relationship between Christopher Columbus and the Indians. This history lesson tells the children of the dependence each group had on each other. But as the children mature, the relations between the two groups began to change with their age. So the story that the teenagers are told is a gruesome one of savage killings and lying. When the teenagers learn of this, they themselves might want to do research on this subject to find out the truth. But as one searches, one finds the inconsistency between the research books. So the question is, who is telling the truth? Mary Louise Pratt and Jane Tompkins probe these difficulties of the reading and writing of history, specifically at the problems of bias and contemplative historical accounts. In ââ¬Å"Art of the Contact Zone,â⬠Pratt explores the issue of whose version of history gets favored and whose gets limited by analyzing the circumstances surrounding Guaman Pomaââ¬â¢s and de la Vegaââ¬â¢s letter to the King of Spain . In ââ¬Å"ââ¬ËIndiansââ¬â¢: Textualism, Morality, and the Problem of History,â⬠Tompkins investigates how history is shaped in accordance to personal biases and cultural conditions of historians by questioning different writings about Native Americans. Each author comes to the conclusion between history and subjectivity, meaning that history is problematic. The historical accounts pondered by Pratt and Tompkins through historical text allows them to realize that every account that a historian calls a fact is really a perspective. Prattââ¬â¢s concepts of ââ¬Å"contact zone,â⬠ââ¬Å"autoethnography,â⬠and ââ¬Å"ethnographyâ⬠are supported by the historical ideas in Tompkins essay. The c... ...from reading both essays one would find this to be true. For example, the historical documents encountered by both authors found some conflicting ideas. Comparing the two authors strategies to read history, Pratt does a complete job. A complete job means reading primary sources from both the inferior and superior cultures. This way she could get the full picture of the actual accounts of the ââ¬Å"contact zone.â⬠On the other hand, Tompkins does not read both types of texts, only ââ¬Å"ethnographic textsâ⬠and comes to her conclusion. But the basis of Prattââ¬â¢s and Tompkinsââ¬â¢ essay is of the essays they read. Therefore each author is biased in their own nature. There biases come from their culture, which affects the way one sees or understands, and writes history. So whose view is right? It is oneself who ultimately decides on which historical point is true based on ones biases.
Thursday, October 24, 2019
Research Proposal on English Skills Improvement through the Use of iPad Technology Essay
Research Proposal on English Skills Improvement through the Use of iPad Technology Introduction à à à à à à à à à à à The application of technologies in schools at all levels has proven to yield positive results. There is a variety of technologies that are used in schools today and among them is the use of iPads in learning. In Saudi Arabia, a number of primary schools have adopted the use of iPads and this, as studies have shown, has contributed to improved skills in English. Below is a proposal on the impact of using iPads in the primary schools in Saudi Arabia, taking The 16th Girls Primary School in Zulfi as the case study. Thesis Statement à à à à à à à à à à à The use of normal computers and laptops have fairly well been established in schools and a considerable body of practical evidences support and confirm the impact and value on learning as at 2014. However, the integration of iPad devices in the schooling system is still at the start level. There are few established researches documenting the impact of these tools on teaching, learning and improvement on English skills. iPad applicationââ¬â¢s language has helped students in the 16th Primary School in Zulfi to improve the studentsââ¬â¢ English speaking, writing and listening. This proposal sets out to investigate, explore and demonstrate the innovative and beneficial practice of IPad applications on learning and improvement of English language skills among students (Cavanaugh, 2007). Literature Review à à à à à à à à à à à Over the past few decades, technology has turned out to be a prerequisite in countless schools at all levels. Its influence has seeped into all facades of life, with the inclusion of English language education. In contemporary age of teaching English language, media tools such as animation, DVDs, video conferencing, internet and iPads have lessened distance making the globe a small village, thus contributing to trouble-free learning of the subject. According to Brey (2006) ââ¬Å"the current generation has an entitlement to get equipped for substantial integration of technology in the learning process.â⬠This statement is supported by the outcomes of a research done on 1,050 pupils of North Essex School in London, aged between 11 to 16 years, which found out that the use of technologies in learning, such as the ipad, was warmly received and improvement on the performance of the pupilsââ¬â¢ learning and thinking, was immediately reg istered (Todorovic et al., 2011). The pupils are able to tackle their personal challenges in learning in ways that fit them best, with the use of technology. à à à à à à à à à à à According to research done by Jackson et al., (2006), it was proved that the pupils, who utilize the technology most, attain higher grades and better results. According to Todorovic et al (2011), English educators are obliged to come up with effective practices that are applicable in teaching the subject with the use of technology (Cavanaugh, 2007). The students perform different tasks through the use of technology and thus, their cognitive learning ability is enhanced (Brey, 2006). Owing to this statement, the focus should be on learning through the technology as opposed to learning about it. It is further proposed that, the constant use of hypermedia makes the use of multimedia painless in enhancing language learning and teaching (Jackson et al., 2006). A similar research on the effect of the use of technology in language learning asserted by Cavanaugh (2007) is that ââ¬Å"the equipments enhance the retention power of the student as wel l as the argumentative ability.â⬠à à à à à à à à à à à The most helpful broader term used in technology is CMC (Computer Mediated Communication), which permits the verbal communication learner to communicate with other learners through chats, discussion forums, conferencing, e-mails, and text messaging (Jackson et al., 2006). All these activities enhance the learnerââ¬â¢s skills in English language. It is, thus, critical that the program be implemented in all primary schools in Saudi Arabia. On the other hand, effective integration of this technology necessitates teachers to obtain familiarity on their use in teaching the substance, pedagogy and the connection of the entirety (Kubey, 2001). According to Ajab Al-Furaydi (2013), the use of these devices will facilitate the delivery of lessons to the learner in limited time and cost. This helps in managing, improving and sustaining the learning and teaching practice, thus assists in assessing and calculating the outcomes of the pupil. As Ahmad (2012) asserts, the use of these devices boost communication, enhances ability to acquire information, give better access to diverse resources of learning, and inspire students to increase challenge solving aptitudes and give support to deeper understanding (Ahmad, 2012). It is true that the technology has changed the language learning process and literacy acquisition and so is the dynamics of the settings of language teaching (Young and Kajder 2003). In latest years, teachers have been searching for techniques in which electronic learning can be engaged to make language learning extra efficient and inspiring for the students (Kubey, 2001). As the research has shown, the use of technology in language teaching and learning empowers the abilities of the students in becoming improved crisis solvers, speakers and communicators (Ajab Al-Furaydi, 2013). à à à à à à à à à à à The use of these devices in learning also enhances communicative and linguistic expertise by giving autonomy to the learner during the learning process (Young and Kajder 2003). This is so because the learner is given a chance to enhance the skills without duress or fear. Also, as Ahmad (2012) states, learning through the use of technology promote the sharing of personal experiences among students thus, they are able to learn from each otherââ¬â¢s experience. This enhances their perceptions on the learning of the subject at hand which leads to improved performance (Ahmad, 2012). à à à à à à à à à à à Owing to the discussion above, it is, therefore, likely that the use of iPads in the 16th Girls Primary School in Zulfi, Saudi Arabia will have a positive impact on the performance of the pupils in English language skills improvement. The impacts on the English language skills are all likely to turn out positive (Todorovic et al.2011).Significance of Research à à à à à à à à à à à The research will scrutinize the relationship between the applications of iPads on learning and the effects it has on English language skills. It draws attention on how the technology can be utilized to improve English language skills in primary schools (Young & Kajder, 2003).Statement of the Problem à à à à à à à à à à à In Saudi Arabia, most of the primary schools use the customary means of teaching, but currently with all the technological advancements, some primary schools have applied technologies in their education system, such as the use of iPads in learning. The application of this technology has its corresponding impacts on English language skills. It is on the basis of the impacts of the use of iPads on the English language skills that this investigation will be performed (Kubey, 2001). Research Questions à à à à à à à à à à à Based on the structure and statement of the problem, the research questions are created. A thorough investigation will be performed on the following questions in this study (Young & Kajder, 2003). RQ1: What is the teacherââ¬â¢s believe on the possible improvement of English language skills through the use of iPads? RQ2: How does the use of iPads in language learning impact on the English skills? RQ3: What factors contribute to dispositions of advocating the use of iPads in language learning in primary schools? Tools à à à à à à à à à à à The research will involve interviewing teachers of girls students aged between 6 and 12 years. In addition, the researcher will observe the students in their class for a period of one month. Through the use of interviews, the researcher will be able to answer the first and the third questions of the research after a comprehensive collection of views from the teachers interviewed. By observing the pupils for one month, the researcher will be able to answer the second question of the research after collecting qualitative data on their reactions on the use of iPads. Similarly, the researcher will be able to go through the past performance records before the application of the iPads and compare them to the recent ones to determine the impact of the technology on English performance (Kubey, 2001). Ethical Considerations à à à à à à à à à à à Some of the considerations which are ethical that the researcher will adhere to are; voluntary participation, non-maleficence, autonomy and confidentiality. The participants of this study will not be coerced to participate neither will they be given bribes to participate. On the other hand, the research will ensure that no harm is experienced by the participants either physically, spiritually or psychologically. They will be left the way they were met before their participation or even better than they were. Similarly, the researcher will uphold confidentiality requirements of the research. Whatever the information given by the respondent will not be shared with another respondent. On the same note, all the names of participants will not be disclosed. Instead, pseudo names will be used in place of their real names (Brey, 2006).Limitation of the Study à à à à à à à à à à à The researcher will limit the study to 16th Girls Primary School in Zulfi, Saudi Arabia. This is attributed to the resources available to conduct the research, such as time. The time for the study will be limited to one month. The sample size will include ten teachers for the interview, most of whom are English teachers, and several classes of pupils who the researcher will observe for one month (Brey, 2006). The sample size of the research may not reflect the whole sample of primary teachers and pupils in schools where the technology is applied, in Saudi Arabia. Each interview will be translated in English by the investigator. The investigator is not eligible as a translator; nevertheless, the scholar will work long hours with the universityââ¬â¢s writing center to build up and set down the interrogation as best as possible (Ajab Al-Furaydi, 2013). Expected Results à à à à à à à à à à à Based on the discussion in the literature review, it is likely that the use of iPads in the 16th Girls Primary School in Zulfi, Saudi Arabia will lead to improvement on pupilsââ¬â¢ English language skills. The impacts of iPads on the English language skills are all likely to turn out positive (Cavanaugh, 2007). References Ahmad, J. (2012). English Language Teaching (ELT) and Integration of Media Technology. Procedia ââ¬â Social And Behavioral Sciences, 47, 924-929. doi:10.1016/j.sbspro.2012.06.758 Ajab Al-Furaydi, A. (2013). Measuring E-Learning Readiness among EFL Teachers in Intermediate Public Schools in Saudi Arabia. English Language Teaching, 6(7). doi:10.5539/elt.v6n7p110 Brey, P. (2006). Social and ethical dimensions of computer-mediated education. Journal Of Information, Communication And Ethics In Society, 4(2), 91-101. doi:10.1108/14779960680000284 Cavanaugh, M. (2007). English Teachers: We Need to Hop on the Technology Train. Language Arts Journal Of Michigan, 23(1). doi:10.9707/2168-149x.1142 Jackson, L., von Eye, A., Biocca, F., Barbatsis, G., Zhao, Y., & Fitzgerald, H. (2006). Does home internet use influence the academic performance of low-income children?. Developmental Psychology, 42(3), 429-435. doi:10.1037/0012-1649.42.3.429 Kubey, R. (2001). Internet use and collegiate academic performance decrements: early findings. Journal Of Communication, 51(2), 366-382. doi:10.1093/joc/51.2.366 Todorovic, J., Stojiljkovic, S., Ristanic, S., & Djigic, G. (2011). Attitudes towards Inclusive Education and Dimensions of Teacherââ¬â¢s Personality. Procedia ââ¬â Social And Behavioral Sciences, 29, 426-432. doi:10.1016/j.sbspro.2011.11.259 Young, C., & Kajder, S. (2003). Research on Technology in English Education. Source document
Subscribe to:
Comments (Atom)