Saturday, May 23, 2020

Excessive of Self-restraint in Saint Augustine’s Confessions

Excessive of Self-restraint in Saint Augustine’s Confessions When it comes to renunciation, no pain, no gain is what Ive slowly, reluctantly, inexorably come to believe. And when Pete opted for scholarly monkhood, I think he was just trying to outsmart his pain. . . . Hed calculated that by considering the physical world illusory and burying his nose in metaphysical texts he could go on doing something comfortable--while his ignorance and sufferings and hometown and troublesome family just fell away like so much excess poundage. Obviously l question his calculations: to slough off half a self in hopes of finding a whole one is not my idea of good math. --David Duncan,The Brothers K In his Confessions, Saint Augustine†¦show more content†¦But Aristotle writes, There is also a type who feels less joy than he should at the things of the body and, therefore, does not abide by the dictates of reason. . . . For a morally weak person does not abide by the dictates of reason, because he feels more joy than he should in bodily things, but the man under discussion feels less joy than he should. (NE22)[2] Aristotle does not give a name to this type of person, so we shall call him the moral martyr. Moral martyrs abandon worldly pleasures such as friendship, food, and entertainment for the apparent benefits of self-restraint. Therefore, they are deficient in their enjoyment of worldly pleasures and excessive in their use of self-restraint. Saint Augustine has clearly taken the path of moral martyrdom. He writes, The eye is attracted to beautiful objects, by gold and silver and all such things. There is great pleasure, too, in feeling something agreeable to the touch, and material things have various qualities to please each of the other senses . . . . But our ambition to obtain all these things must not lead us astray (Conf., 48). In claiming this much, he is in agreement with Aristotle--a man who pursues every pleasurable thing in life is succumbing to moral weakness. But instead of merely advising restraint, Saint Augustine encourages the complete avoidance of worldly pleasures. For example, he writes, I admit that I still find some enjoyment in the music of hymns . . . . I confess

Monday, May 18, 2020

Simon Bolivar and the Battle of Boyaca

On August 7, 1819, Simà ³n Bolà ­var engaged Spanish General Josà © Marà ­a Barreiro in battle near the Boyaca River in present-day Colombia. The Spanish force was spread out and divided, and Bolà ­var was able to kill or capture almost all of the enemy combatants. It was the decisive battle for the liberation of New Granada (now Colombia). Bolivar and the Independence Stalemate in Venezuela In early 1819, Venezuela was at war: Spanish and Patriot generals and warlords were fighting each other all over the region. New Granada was a different story: there was an uneasy peace, as the populace was ruled with an iron fist by Spanish Viceroy Juan Josà © de Sà ¡mano from Bogota. Simon Bolivar, greatest of the rebel generals, was in Venezuela, dueling with Spanish General Pablo Morillo, but he knew that if he could just get to New Granada, Bogota was practically undefended. Bolivar Crosses the Andes Venezuela and Colombia are divided by a high arm of the Andes Mountains: parts of it are practically impassible. From May to July of 1819, however, Bolivar led his army over the pass of Pà ¡ramo de Pisba. At 13,000 feet (4,000 meters), the pass was extremely treacherous: deadly winds chilled the bones, snow and ice made footing difficult, and ravines claimed pack animals and men to falls. Bolivar lost a third of his army in the crossing, but made it to the western side of the Andes in early July, 1819: the Spanish at first had no idea he was there. Battle of Vargas Swamp Bolivar quickly regrouped and recruited more soldiers from the eager population of New Granada. His men engaged the forces of young Spanish general Josà © Marà ­a Barreiro at the battle of Vargas Swamp on July 25: it ended in a draw, but showed the Spanish that Bolà ­var had arrived in force and was headed for Bogota. Bolivar moved quickly to the town of Tunja, finding supplies and weapons meant for Barreiro. Royalist Forces at the Battle of Boyaca Barreiro was a skilled general who had a trained, veteran army. Many of the soldiers, however, had been conscripted from New Granada and doubtless there were some whose sympathies were with the rebels. Barreiro moved to intercept Bolivar before he could reach Bogota. In the vanguard, he had some 850 men in the elite Numancia battalion and 160 skilled cavalry known as dragoons. In the main body of the army, he had about 1,800 soldiers and three cannons. The Battle of Boyaca Begins On August 7, Barreiro was moving his army, trying to get into position to keep Bolivar out of Bogota long enough for reinforcements to arrive. By the afternoon, the vanguard had gone ahead and crossed the river at a bridge. There they rested, waiting for the main army to catch up. Bolà ­var, who was much closer than Barreiro suspected, struck. He ordered General Francisco de Paula Santander to keep the elite vanguard forces occupied while he hammered away at the main force. A Stunning Victory It worked out even better than Bolivar had planned. Santander kept the Numancia Battalion and Dragoons pinned down, while Bolivar and General Anzoà ¡tegui attacked the shocked, spread-out main Spanish army. Bolà ­var quickly surrounded the Spanish host. Surrounded and cut off from the best soldiers in his army, Barreiro quickly surrendered. All told, the royalists lost more than 200 killed and 1,600 captured. The patriot forces lost 13 killed and about 50 wounded. It was a total victory for Bolà ­var. On to Bogotà ¡ With Barreiro’s army crushed, Bolà ­var quickly made for the city of Santa fà © de Bogotà ¡, where Viceroy Juan Josà © de Sà ¡mano was the ranking Spanish official in Northern South America. The Spanish and royalists in the capital panicked and fled in the night, carrying all they could and leaving their homes and in some cases family members behind. Viceroy Sà ¡mano himself was a cruel man who feared the retribution of the patriots, so he, too quickly departed, dressed as a peasant. Newly-converted â€Å"patriots† looted the homes of their former neighbors until Bolà ­var took the city unopposed on August 10, 1819, and restored order. Legacy of the Battle of Boyaca The Battle of Boyacà ¡ and capture of Bogotà ¡ resulted in a stunning checkmate for Bolà ­var against his enemies. In fact, the Viceroy had left in such haste that he even left money in the treasury. Back in Venezuela, the ranking royalist officer was General Pablo Morillo. When he learned of the battle and the fall of Bogotà ¡, he knew the royalist cause was lost. Bolà ­var, with the funds from the royal treasury, thousands of possible recruits in New Granada and undeniable momentum, would soon sweep back into Venezuela and crush any royalists still there. Morillo wrote to the King, desperately begging for more troops. 20,000 soldiers were recruited and were to be sent, but events in Spain prevented the force from ever departing. Instead, King Ferdinand sent Morillo a letter authorizing him to negotiate with the rebels, offering them some minor concessions in a new, more liberal constitution. Morillo knew the rebels had the upper hand and would never agree, but tried anyway. Bolà ­var, sensing the royalist desperation, agreed to a temporary armistice but pressed the attack. Less than two years later, the royalists would once again be defeated by Bolà ­var, this time at the Battle of Carabobo. This battle marked the last gasp of organized Spanish resistance in northern South America. The Battle of Boyacà ¡ has gone down in history as one of the greatest of Bolà ­vars many triumphs. The stunning, complete victory broke the stalemate and gave Bolà ­var an advantage he never lost.

Tuesday, May 12, 2020

Essay on Walt Whitmans Song of Myself - 3631 Words

Walt Whitmans Song of Myself This paper deals with Walt Whitmans Song of Myself in relation to Julia Kristevas theories of abjection--my paper does not point to abjection in the text, but rather the significance of the abscence of abjection. This abscence, looming and revolting, arises from Whitmans attemt to refigure a conception of sublimity which delimits the material which can trigger the sublime moment. Whitmans democracy of the sublime is inclusive of those figures on the American landscape, their lives and voices, which are functionalized into his world. This paper employs the theories of George Lukacs and Julia Kristeva allow the unearthing of the archeological layers of Whitmans text. The most literal adjective†¦show more content†¦It lies there, quite close, but it cannot be assimilated. It beseeches, worries, and fascinates desire, which, nevertheless, does not let itself be seduced.[1] The strange elegance of this specter looms in the relief, in the archaic layers of Song of Myself. It is beyond the foregrounded inversive space--at times utopic and sublime, the space is permeated with universal brotherhood, happiness, the compelled-sentimental-- that I attempt to delve into, that source from which generates the repulsive, hidden quivering of a text which, though cast out and forced into absence, looms in the shadowed relief. The edification of his text and of his readership is attempted through the construction of an inversive space which refigures the sublime: the apex of the cultured. I have chosen those moments in the text in which the poet nears the threshold of bordering abject in order to construct his sublime utopian vision. It is here, this marked refigurement where ecstasy occurs, where material which triggers the sublime is the signal of another text; a repulsive reading looms from the absence of abjection An invocation of the self begins Song of Myself, positioning the text as an edification of the American readership: I celebrate myself, and sing myself, And what assume you shall assume, For every atom belonging to me as god belongs to you (lines 1-3). Thus Whitmans work joins with theShow MoreRelatedIdentity In Walt Whitmans A Song Of Myself869 Words   |  4 PagesIdentity: A Common Theme Walt Whitman (1819-1892) wrote a poem titles â€Å"A Song of Myself.† He wrote this piece in order to celebrate his identity, what makes him unique. Chinua Achebe (1930-2013) writes of a little boy struggling with identity in a quickly changing world. Jamaica Kincaid (1949-), writes of a young girl who is learning her identity as a mother, wife and daughter. By examining each piece of literature, one can trace the common theme of identity by comparing and contrasting theRead MoreTranscendentalism In Walt Whitmans A Song Of Myself1073 Words   |  5 PagesThe school of thought that is transcendentalism is best explained as the idea that everything is connected. America, as a country, represents the philosophy of Transcendentalism. This is best exemplified in the writing of Walt Whitman. In his poem, â€Å"A Song of Myself†, Whitman truly heralded a new brand of American exceptionalism. He championed the individual and created a work that exemplified the common man as the pillar of the American dream. Yet he also explained that Americans are what make upRead More Walt Whitmans Song of Myself Essay716 Words   |  3 Pages In one of the sections from the poem, â€Å"Song of Myself† Walt Whitman starts out with a child asking a question, â€Å"What is the grass?† Grass is a symbol of life. God, who created both the heavens and the earth also gave birth to life. When Whitman refers to grass as a â€Å"handkerchief of the Lord† (7), as a gift. When people look at the grass, they do not think of it as a creation but rather just a plant. Whitman refers to the grass as â€Å"a child, the produced babe of vegetation† (11, 12). Here, the grassRead More References to Homosexuality in Walt Whitmans Song of Myself1210 Words   |  5 PagesHomosexuality in Walt Whitmans Song of Myself WHITMAN WAS MORE MAN THAN YOULL EVER BE, said a student of Louisiana State University. When asked questions of your sexual preference or thoughts on the issue of sex, I would venture to say it makes most people uncomfortable. This is an age-old topic that people know about, yet do not want to talk about. He was particularly reticent about his issues regarding sex and his particular sexual preference. In fact, of Whitmans struggles theRead More An Analysis of Walt Whitmans Song of Myself Essay778 Words   |  4 PagesAn Analysis of Walt Whitmans Song of Myself `Whitman was always asking questions. He believed that lifes goal or cause was a mystery. He was surrounded by people who were drawing distinct lines between right and wrong, rejecting the things in the universe that were not a direct ticket to holiness. Whitman, unlike his contemporaries, embraced the beauty of everything. His mystical perception of the world ushered in the idea that God was to be found in every thing, and that He couldRead MoreEssay about Walt Whitmans Song of Myself1779 Words   |  8 PagesWalt Whitmans Song of Myself Walt Whitmans Song of Myself is, on the most basic descriptive level, a really long poem. Whitman is clearly a poet with a lot to say, or at least with a lot of different ways to say it. He meanders from the micro to the macro, from atoms to the whole earth. There are obviously myriad ways to explain what the poem is about, and myriad keys to its true meaning. In what became Section 6 of the final edition (lines 90-121 of the 1855 edition ) Whitman himselfRead More Defining the Soul in Walt Whitmans Song of Myself Essay721 Words   |  3 Pages Every sentence in Walt Whitmans Song of Myself tends to either repeat or contradict. He even says of himself, I contradict myself (Lauter, p. 2793). This can make Whitmans poetry a little confusing to some. In his many stanzas, definition of the soul is ambiguous and somewhat contradictory. Whitman says, Clear and sweet is my soul....and clear and sweet is all that is not my soul (Lauter, p. 2745). What I believe Whitman is saying here is that his soul and everything elseRead MoreEssay Choosing Sides in Walt Whitmans Song of Myself1095 Words   |  5 Pagesâ€Å"Song of Myself† is an attempt by Walt Whitman to become the â€Å"American poet† as described by Ralph Waldo Emerson; he attempts to be â€Å"[T]he sayer, the namer, and [representative] of beauty† (Emerson 1182). Whitman wants to speak to and for America. Whitman does not explicitly choose sides on the slavery debate that was raging at the time of his writing, but he does express the equality of all people, regardless of gender and race in â€Å"Song of Myself†. While Whitman’s writing can be read as neutralRead MoreIndividuality And Free Verse in Walt Whitmans Song of Myself1524 Words   |  7 Pages2.5 kids, 2 cars, a dog and a satisfying job), the spirit of innovati on, individuality and progress remains unchanged. The father of free verse, and perhaps the American perspective of poetry, Walt Whitman embodies these values in his life and work. First published in 1855 in Leaves of Grass, Song of Myself is a vision of a symbolic I enraptured by the senses, vicariously embracing all people and places from the Atlantic to the Pacific oceans. Sections 1 and 2, like the entirety of the piece,Read More An Annotation of Section 24 of Walt Whitmans Song of Myself1354 Words   |  6 PagesSection 24 of Walt Whitmans Song of Myself Walt Whitmans Song of Myself is a vision of the American spirit, a vision of Whitman himself. It is his cry for democracy, giving each of us a voice through his poetry. Each of us has a voice and desires, and this is Whitmans representation of our voices, the voice of America. America, the great melting pot, was founded for freedom and democracy, and this poem is his way of re-instilling these lost American ideals. In this passage from Song of Myself

Wednesday, May 6, 2020

The Ethics Of Human Cloning - 890 Words

The ethics of cloning Early in 1997, Scottish scientist Dr. Ian Wilmot revealed to the world that he had successfully cloned an adult sheep, Dolly. With this invention, the world made a aggregate astonishment at the realization that cloning was no longer an aspect of a Science Fiction movie. Since then, human cloning has become one of the most expressing divergent topics in the world, discussions began regarding the ethic consequence of human cloning. In several recent opponents argue that it s unethical and that it won t benefit humans in anyway but cause harm. At variance, I believe that human cloning can have many benefits for the human race in terms of helping infertile couples and people with genetic problems. As well as being†¦show more content†¦Then, â€Å"the cell is manipulated into believing that it has been fertilized and is then implanted into the womb of the mother, just as is done in the process of in-vitro fertilization. Afterwards, the embryo develops into a fetus and is born after nine months, just like any other baby† (Shapiro, H. 1997. pp.14-17). What this means is that the cloned baby is only different from other babies is that they share the same exact DNA with another person, just like identical twins, only the clone is much younger than its twin. The child will grow up to be no more like their twin than natural identical twins are alike. Therefore, some people s’ beliefs that human cloning is a complicated process, which involves techniques that seem unrealistic. Some of the most commonly cited ethical and concern principles of right and wrong behavior arguments against human cloning seem to come from people with religious perspectives. These religious arguments are made by people from all over the world, including scientists. Many religious people believe the study of fundamental knowledge teaches that human life is unique, and should be created, determined and controlled only by their god(s). Many religions believe in the existence of, and in the individuality of, a human soul. And the only person who can create a soul is God. Richard McCormick, for Christian Century, believes that â€Å"human cloning is an

Spyware on Children’s Computers; Regorian Rhetoric Free Essays

string(169) " of undergraduate students in the United States showed that â€Å"64% indicated they strongly disagreed with the statement that ‘spyware is more beneficial than harmful\." Parents as Undercover Cops Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the internet, spyware is programming that is put in someone’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. In this case, the ‘other interested parties’ are parents. We will write a custom essay sample on Spyware on Children’s Computers; Regorian Rhetoric or any similar topic only for you Order Now Parents are becoming more and more protective of their kids. Many are now becoming open to the idea of putting spyware on their children’s computers when previously that was unthought-of. No matter what ones particular outlook on this subject is, there are pros and cons of each side, and most seem to lean largely on one side or the other, as opposed to being more in the middle. There are many harmful traps on the internet, but does that justify tracking children’s every keystroke on their computer? Harlan Coben believes spyware is more than justified. In Coben’s article, â€Å"The Undercover Parent,† Coben states that parents are overprotective of their kids in many other aspects, such as knowing their passwords to their phones, supervising them at all events, and so on. So why give them their independence when it comes to the internet? I understand what he means and even agree with his reasoning in some ways. Coben says that the ones doing the surveillance are not some government officials; they are loving parents trying to protect their offspring. This argument is valid because it shows that the parents who choose to put the software in computers are really just trying to keep their kids best interest in mind, and those who compare it to being surveyed by a government agency or something of the like is ludicrous. Some children are at risk of being harmed through the internet, and do require that surveillance. The children that are unknowingly communicating with a pedophile, or the â€Å"43% of teens [that] have been victims of cyber bullying in the last year,† could have had a possibility of being helped if their parents had spyware software downloaded onto their computer. (Stop Cyber Bullying Before it Start’s) Of course, ‘what-if’s’ are always going to be asked, and there is no way that spyware can solve these problems fully. Pedophilia and cyber bullying are both serious issues and need to be stopped. Yes, spyware could help the problem. Yes, spyware could alert or notify a parent if one of these two activities is going on, which could be extremely beneficial. I agree that spyware should be used in these very specific situations. Coben also believes that having this program reinforces to children the fact that the internet is not a haven of privacy. In an academic journal article regarding Facebook, a website that many children and teens are using, it is written that â€Å"We need to teach them that NOTHING IS PRIVATE online, especially their social networks† (Fodeman). All children need to understand and acknowledge that the internet is not private, but even more so those who use social networking, because once something is typed and sent, uploaded, or anything, it can never be taken back or deleted. Sure you can remove certain things, but somewhere it is still out there, and it can be retrieved if deemed necessary. Everyone has access to posts online, and if the reason they are not misusing the internet is because of their fear of the spyware, then so be it. There is a fine line between being responsibly protective and irresponsibly nosy, Coben argues. If a parent is going to have spyware on their children’s computer, they need to be doing so for the correct reasons. Doing so because there is a harmful behavior being engaged without another way to stop it is sufficient enough of reasoning. However, trying to be filled in on the latest gossip and happenings in the child’s life is not going to cut it. Parents are supposed to be responsible and looking out for harmful and negative behaviors. They should not be abusing their powers or the tools given to them to help ensure their loved child’s online safety and protection. I do tend to agree with the various arguments that Coben uses to validate his claims, yet I have two different opinions on the use of spyware technololgy. If ones child is dishonest, engaging in suspicious or risky behavior, install the spyware. If a parent has real evidence that their child is harming him or herself, then the parent has a responsibility to help and protect the child even though their child may not want the watchful eye. It is more than fair for parents whose children have engaged in some kind of dangerous behavior, to tell them â€Å"If you don’t meet your responsibilities to take care of yourself and to stay safe, then I’m going to take whatever steps necessary. If that means looking in your room, looking in your drawers and looking on your computer, that’s exactly what I’m prepared to do† (Lehman). That way the child will know there is a possibility of a spyware being put on their computer and are not caught off guard if something from the spywares report were to be brought up in the future. The safety of one’s children should be number one on the parents list and they need to be able to do what is deemed necessary in order to protect. Reading emails, having the knowledge of what they search for online, and seeing all of their communications may be necessary for certain situations. The situations where spyware should be put on children’s computers are only in extreme cases of dishonesty, incriminating behavior, or suspicious activities. Spyware may not be the most effective way to protect children, but in such cases the spyware could definitely help the situation. Besides extreme cases, ultimately parents having spyware on their children’s electronic devices without their knowledge are more harmful than beneficial. A survey conducted of undergraduate students in the United States showed that â€Å"64% indicated they strongly disagreed with the statement that ‘spyware is more beneficial than harmful. You read "Spyware on Children’s Computers; Regorian Rhetoric" in category "Papers" ’†(Freeman) The main reason putting spyware on a child’s computer that has done nothing wrong is harmful, is because the relationship between parent and child will most likely be impacted negatively when the child figures out there is spyware on their computer. If parents have children that meet their curfew, take care of their responsibilities, and the like, there is no reason to snoop on them. Good behavior should be rewarded, and telling your child that the lack of interference in her personal space is a direct result of her good behavior reinforces the trust given to that child. Spyware does not aide in creating independence or individuation. A goal of parenting should be to raise a young adult who can make independent decisions and who can have a life of their own. Teenagers are always trying to be individuals and want more independence. Part of having a life of their own is having a space of their own. When parents spy on their responsible child, the message they are sending is that even though the child has not done anything wrong, the child still needs to be watched and is not trustworthy. Also, children and teenagers usually know an awful lot more about computers and technology than adults do. Because of the difference in generations, most teens and children know how to check for spyware, how to disable it, and how to get around it, more often than not without the parent knowing what has happened. It is impossible for a parent to keep tabs and know absolutely everything their child does, which they should not, and sometimes it is better this way. Even if a child does not find a way around the spyware, are parents really prepared to know their child’s secrets that are not harmful to themselves, such as sexual activity, although can be harmful in some cases, or sexual orientation? Sometimes it is best to be ignorant. Parents should not go looking for things that if they knew would cause issues in the family tearing them apart. What is the worst that children can get into on the internet? Parents have to understand that their kids are human, and in turn let them be human. They are going to want to try new things, and exploring the internet is probably going to be one of those things. What is so bad about that anyway? It will not corrupt them; nothing â€Å"corrupts† people but other people. It is not the internet doing the corrupting, it is those behind what is being shown and put out there, those that are typing in chat rooms and writing their blogs. It is easy to view kids as possessions, like pets that have to be pampered and hidden from the world, but they are people just the same, and they have to make their own decisions even if they aren’t â€Å"good† ones. A teenager deserves their privacy just as much as anyone, including their parents. I believe that if parents have taught their children well, with morals and the ups and downs of life and the internet, they need to trust that their child has been taught well enough to not misuse the internet and all of its capabilities. Joe Kelly, founder of a national advocacy group called Dads and Daughters, states that â€Å"Markets play on this fear that something horrific is going to happen to your child, when the odds of that are minuscule. It might happen, but to have their whole childhood predicated on this remote possibility is, in the aggregate, even more damaging. â€Å"(Crary) Spyware really undermines all of the trust that the parent and child have with one another. In a survey of 1,006 AOL users, â€Å"74. 2% said they perceived spyware to be a personal threat. (Poston) Spyware is seen as a personal threat to so many citizens because of its demoralizing and disrespectful nature. I would not want it done to me, my parents would not want it done to them, and I do not think teaching children that it is okay to have a spyware on someone else is healthy or just. The choice between installing spyware on a child’s computer or not too, can relate to one another and meet in the middle. In some extreme cases where there is no longer an ounce of trust, spyware should be put on children’s computers to protect them from themselves and others. Although in most cases, spyware is not acceptable because of the harm it does to the relationship between parent and child, and the toll it takes on trust, individualism, and privacy. Parents should have some type of control over their child’s internet usage. Blocking some sites, such as porn or self-harm/suicide related sites, is beneficial and sufficient. Having the computers in the house being put in open areas, such as an office or living room, can also control what children do on the computer because of the fact that they are aware that anybody can walk by and see what is on the screen. There are also parental controls that make it so the internet is only available at the times set up by the parents. Parents that are still uncomfortable with these alternatives could also have a password set up that one would need to log onto the computer, and only the parent would know that password. That way, if a child wants to use the computer, the parent will always know if they are on it. You should also talk to your children about the dangers of the internet so that they recognize suspicious behavior or activity. In order to teach more about internet safety instead of simply trying to avoid it, parents need to â€Å"Discuss the risks of sharing certain types of information (e. g. , they they’re home alone) and the benefits to only communicating and sharing information with people they know. † (Householder) All of these alternative suggestions, used solely or by incorporating them all, is a much more useful tool in monitoring computer and internet usage rather than using a spyware. The alternative to spyware does not damage trust, lets the child have needed amounts of privacy, and yet still lets the reins be in the parent’s hands. Works Cited Coben, Harlan. â€Å"The Undercover Parent. †Ã‚  New York Times  16 Mar. 2008: n. pag. Print. Crary, David. â€Å"USA TODAY. †Ã‚  USATODAY. COM. N. p. , 05 Sept. 20122. Web. 17 Mar. 2013. Fodeman, Doug, and Marje Monroe. â€Å"The Impact Of Facebook On Our Students. †Ã‚  Teacher Librarian  36. 5 (2009): 36-40. Academic Search Premier. Web. 21 Mar. 2013. Freeman, Lee A. , and Andrew Urbaczewski. â€Å"Why Do People Hate Spyware? †Ã‚  Communications Of The ACM  48. 8 (2005): 50-53. Academic Search Premier. Web. 21 Mar. 2013. Householder, Allen, and Mindi McDowell. Security Tip (ST05-002). † Keeping Children Safe Online. US Department of Homeland Security, 16 Feb. 2013. Web. 20 Mar. 2013   Lehman, James. â€Å"Newsletter Signup. †Ã‚  Empowering Parents. N. p. , n. d. Web. 21 Mar. 2013. Poston, Robin, Thomas F. Stafford, and Amy Hennington. â€Å"Software: A View From The (Online) Street. †Ã‚  Communications Of The ACM  48. 8 (2005): 96-99. Academic Search Premier. Web. 21 Mar. 2013. â€Å"Stop Cyber bullying Before It Starts. †Ã‚  NCPC. com. National Crime Prevention Council, n. d. Web. 17 Mar. 2013. How to cite Spyware on Children’s Computers; Regorian Rhetoric, Papers

Introduction to Management Science free essay sample

When formulating a linear programming problem constraint, strict inequality signs (i. e. , less than lt; or, greater than gt;) are not allowed. Answer: TRUE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation 2) When formulating a linear programming model on a spreadsheet, the measure of performance is located in the target cell. Answer: TRUE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: spreadsheet solution ) The standard form for the computer solution of a linear programming problem requires all variables to be to the right and all numerical values to be to the left of the inequality or equality sign Answer: FALSE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation, standard form 4) The standard form for the computer solution of a linear programming problem requires all variables to be on the left side, and all numerical values to be on the right side of the inequality or equality sign. Answer: TRUE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation, standard form 5) Fractional relationships between variables are not permitted in the standard form of a linear program. Answer: TRUE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation, standard form 6) A constraint for a linear programming problem can never have a zero as its right-hand-side value. Answer: FALSE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation, standard form 7) The right hand side of constraints cannot be negative. Answer: FALSE Diff: 2Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation 8) A systematic approach to model formulation is to first define decision variables. Answer: TRUE Diff: 1Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation 9) A systematic approach to model formulation is to first construct the objective function before determining the decision variables. Answer: FALSE Diff: 1Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation 10) In a linear programming model, a resource constraint is a problem onstraint with a greater-than-or-equal-to (? ) sign. Answer: FALSE Diff: 1Page Ref: Ch 2 review Main Heading: Formulation and Computer Solution Key words: formulation 11) Determining the production quantities of different products manufactured by a company based on resource constraints is a product mix linear programming problem. Answer: TRUE Diff: 2Page Ref: 111-116 Main Heading: A Product Mix Example Key w ords: formulation, product mix problem 12) Product mix problems cannot have greater than or equal to (? ) constraints. Answer: FALSE Diff: 2Page Ref: 111-116 Main Heading: A Product Mix Example Key words: product mix 13) When using a linear programming model to solve the diet problem, the objective is generally to maximize profit. Answer: FALSE Diff: 2Page Ref: 116-119 Main Heading: A Diet Example Key words: objective function 14) When using a linear programming model to solve the diet problem, the objective is generally to maximize nutritional content. Answer: FALSE Diff: 2Page Ref: 116-119 Main Heading: A Diet Example Key words: objective function 15) In formulating a typical diet problem using a linear programming model, we would expect most of the constraints to be related to calories. Answer: FALSE Diff: 2Page Ref: 116-119 Main Heading: A Diet Example Key words: formulation, diet example 16) Solutions to diet problems in linear programming are always realistic. Answer: FALSE Diff: 2Page Ref: 116-119 Main Heading: A Diet Example Key words: diet example 17) Diet problems usually maximize nutritional value. Answer: FALSE Diff: 2Page Ref: 116-119 Main Heading: A Diet Example Key words: diet example 18) In most media selection decisions, the objective of the decision maker is to minimize cost. Answer: FALSE Diff: 2Page Ref: 124-127 Main Heading: Marketing Example Key words: marketing problem, media selection 19) In a media selection problem, instead of having an objective of maximizing profit or minimizing cost, generally the objective is to maximize the audience exposure. Answer: TRUE Diff: 2Page Ref: 124-127 Main Heading: Marketing Example Key words: marketing problem, media selection 20) Linear programming model of a media selection problem is used to determine the relative value of each advertising media. Answer: FALSE Diff: 3Page Ref: 124-127 Main Heading: Marketing Example Key words: marketing problem, media selection 1) In a media selection problem, maximization of audience exposure may not result in maximization of total profit. Answer: TRUE Diff: 2Page Ref: 124-127 Main Heading: Marketing Example Key words: marketing problem, media selection 22) In a balanced transportation model, supply equals demand such that all constraints can be treated as equalities. Answer: TRUE Diff: 2Page Ref: 127-131 Main Heading: A Transportation Example K ey words: transportation problem, formulation 23) In an unbalanced transportation model, supply does not equal demand and supply constraints have ? igns. Answer: TRUE Diff: 2Page Ref: 127-131 Main Heading: A Transportation Example Key words: transportation problem, formulation 24) Transportation problems can have solution values that are non-integer and must be rounded. Answer: FALSE Diff: 3Page Ref: 127-131 Main Heading: A Transportation Example Key words: transportation problem, solution 25) In a transportation problem, the supply constraint represents the maximum amount of product available for shipment or distribution at a given source (plant, warehouse, mill). Answer: TRUE Diff: 1Page Ref: 127-131 Main Heading: A Transportation Example Key words: transportation problem, formulation 26) In a transportation problem, a supply constraint (the maximum amount of product available for shipment or distribution at a given source) is a greater-than-or equal-to constraint (? ). Answer: FALSE Diff: 2Page Ref: 127-131 Main Heading: A Transportation Example Key words: transportation problem, formulation 27) In a transportation problem, a demand constraint for a specific destination represents the amount of product demanded by a given destination (customer, retail outlet, store).

Saturday, May 2, 2020

Improvement In Development Of The Software â€Myassignmenthelp.Com

Question: Discuss About The Improvement In Development Of The Software? Answer: Introduction Web design should follow all software development methodologies as requirement from good practices of software development. In website development, responsiveness is an aspect which has to be met in order to produce quality product. In this regard, this report will focus on evaluating the quality of the makezine.com website. This will be done by determining which good practices has been met, violated and how they have been met of violated. Further, this evaluation and assessment will have to determine how violated software good practices can be solved and possible areas of improvement in the development of the software. The main goal of the report will be focusing on user interface interaction and functionality of the software (MARCOTTE 2014, p. 59). To have an effective website, developer has to focus mainly on functionality of the system because failing to achieve the core function of the system means inability to develop quality software. System functionality should be met since f ailing to achieve website functionality is a total failure and waste of resources. Finally, system user interface has nowadays been an important aspect in system design and development. Interface which gives a point of interaction between user and the system has to adhere to various software development principles. Website Overview The website evaluation in this case would be makezine.com. It is registered as Make and Maker Faire under Make and Media Inc. Trademark. The website main goal is to encourage all young and growing innovators present their ideas to be assessed and where possible be developed to actual product. It targets exposing young and upcoming developers to expose their ideas to the entire world. This website has been built with very attractive idea of exposing upcoming generation but it does not meet some of good practices required in software development. Its interface is very congested with content and images making it difficult to work on. Good website development practices anticipates to have simple and clear website to use so that users do not strain when making use of it (FRAIN 2012, p. 97). A close observation of Makezine.com website shows that, links are clustered all over the webpage with so many pictures. Though it is very attractive website by the look, on its usability to customers, it might be very challenging due to its poor arrangement. Placing of images on the entire webpage might seem to make website attractive but according to good practices of system development, this makes system very congested and difficult for users to operate. It would be good idea if Makezine.com developer had collected all images on a gallery section where interested users would use a certain link to access. According to PETERSON (2014, p. 119), this would one of the organized way to make website more appealing and professional. Though the developer of the website might imagine of working with young innovators to present their ideas, it would be good to factor how they would make use of the system to post their ideas. Main features of the website ROSE (2015, p. 21) stipulates that, main features of any software are realized through its functionality. To make any system features clearly in the market, it should present its functionality is a clear and cohesive manner. In this case, Makezine.com has managed to give out its functionality through projects being undertaken. Under the project section, users are able to view which project is under development and which one has been presented for assessment by experts. This should serve as the main goal of the entire website because without either the upcoming projects or accomplished projects, makezine.com would not have achieved the mission of developing the project (PATEL 2014, p. 225). The website acts as a collection point of young ideas which need to be developed and be exposed in to the market for use. It aims on every idea since there is no specification of which ideas are being collected. Some of the projects which are available from project section include; science, crafts and design, drone making and Technology. Similarly, on the latest section of design, all projects that has been presented for considerations are available to help users be able to view ideas of the presented projects. Consequently, according to SIMMONS (2013, p. 15), website developers need to established guide section where any needed help can be obtained. This section helps users of the system to get help on how some of the featured items are used by creating demos to guide them. Every item that has been created and developed in partnership with makezine.com has been supported by an operation guide to help all interested parties. Available guides are; drone, 3D printer guide, systems board guide and gift making guide. Moreover, there is a shop section where materials available can be obtained from. It is only through this section that, all interested buyers can get subject product. By clicking an item, all materials under that section gets displayed with relative prices and shipping cost. Lastly, get involved feature is provide by the system to help users who are able and willing to take part in any of the events be part of it. All sections including camp feature for training are available to he lp participants get some training on how to be part of the community (CALLAHAN 2012, p. 56). Positive and negative aspects of the website Ideally, all systems have their strengths and weakness which makes it stand a particular position in the market. According to Karimov, Brengman Van Hove (2011, p. 272), some of the positive aspects of Makezine.com are; well layout of the menu bar which presents very attractive pop ups. Next, the color used on systems interface is very attractive to the eyes of the user. First onsite to the system presents very appealing as it gives user zeal to know the purpose of the system. Background color is user friendly because it does not make users eye strain while working on the website (Atuahene?Gima, Slater Olson 2005, p. 468). Background color aspect is very important because it determines time the users of the system are going to take on the system. If background is not user friendly by having very bright color, users will tend to leave the website without even accomplishing their mission of visiting the software (Burd et al 2012, p. 55). Additionally, website links should be well pres ented at the top of the system to make website navigation from one webpage to the other easy. Despite all these advantages, there are some negative aspects which are observable from makezine.com. First, the website spans to several pages which is not being advocate in nowadays software development. Kim Lennon (2013, p. 34) argues that, current website development procedures and methodologies are emphasizing on one page website which is complemented by modal pop ups. Next, placing so many of images on a webpage might seem to make system attractive but it is not a good practice in system development procedures. The entire makezine.com system is full of images and content which makes it look unprofessional as described from good practices of software development. Further, it is not easy to trace the name of the software because it has not been presented at the top of the webpage. Name used on a website should closely depict the functionality of the website by having first glance on it (Ding et al 2010, p. 99-101). Lastly, Makezine.com does not have a homepage which can be used to introduce user to the system. Additional participants review Evaluation of website is quite challenging and an individual opinion may be biased due to some aspects. In this regard, it is most preferred to have some additional people who have various backgrounds on system use for comparison purpose (Koo Ju 2010, 377-378). In my evaluation, I was lucky enough to get my brother who is a system developer to help in evaluating the system. Smith is 29 years and an independent software developer working with various companies. Mostly, Smith deals with embedded software but that did not limit him on evaluating makezine.com website and give his views. According to Smith, makezine.com developer had good intention of developing the website which are clearly captured on website functionality. Having captured all system functionality very well, Smith says makezine.com developer did little to make website interface user friendly in terms of use and arrangements of menu. Smith view on system interface design correlates highly with my opinion that, it does n ot look so professional. Similarly, I had my friend Christine, 35 years who is just a novice system user. Christine has been working as a call center support and receptionist. Christine has been working on various system and this makes Christine a best choice in my evaluation. Christine knowledge and skills was of great help in my analysis because novice users were well represented. Christine has been working with various systems for over 10 years and this gives me confidence in type of response provided. Christine response on system functionality is that, the purpose of the website well met but its interface was not in accordance with principles of good system design (Wang, Hernandez Minor 2010, p. 940). From analysis of the system, both Smith and Christine ideas about the functionality and user interface correlates with my opinion. Website improvements and recommendation An analysis of makezine.com website by all involved parties shows that there is need for change in design of website interface. Website interface need some improvements on arrangement of its menus (Tyagi, Solanki Wadhwa 2010, p. 19-21). Links need to be presented on a menu bar at the top of the homepage. This facilities easy transition from one page to another. Additionally, makezine.com does not have a home page where all connections can be referenced. Failure to have a homepage makes it difficult to navigate from other webpages. Consequently, According to Rocha (2012, p. 380), to make website more attractive appealing and professionally presented, images and content should be arranged well. Content and information has been scattered all over the webpages making it difficult to understand functionality of the website. Furthermore, website need a well presented and name which can be used to identify the system. Websites name has to explain clearly the functionality of the system. Fi nally, makezne.com website should be made to be a one page website. One page website makes it easy to use and looks more professional (Youngblood Mackiewicz 2012, p. 582). Chrome device simulator To evaluate makezine.com website, it was recommended to make use of Chrome device simulator as a basic tool. In the use of chrome simulator to review the website, it proved to be a convenient, simple and easy to use (Nebeling et al 2015, p. 24). It did not require so many configuration to be used. It can be used by even novice users of the system with just few steps to follow. It was quite accurate because it displays website very clearly with all content being visible for observation. To make use of this simulator, one does not need to buy simulator as it is readily available on all chrome applications. It would be difficult find it as it free from internet and can be downloaded any time. Similarly, Nagesh Caicedo (2012, p. 56) stipulates that, simulator can be used in various devices with different resolutions. This makes it very applicable in many devices for use by the same user. In my makezine.com analysis, chrome was available in both my laptop and mobile phone. Simulation usi ng these two devices helped in getting various scenarios to make conclusion from. Through use of chrome as a simulator, some of its advantages realized are; compatibility with many available devices. Chrome simulator can be installed in many devices including mobile phones, laptops and desktops (Madaudo Scandurra 2013, p. 25). Next, it is very simple use in various scenarios. Chrome simulator does not need users who are computer experts for it to be used (Walker Chapra 2014, p. 56). Additionally, to users with already installed chrome application, it is free of charge to use chrome simulator. Those who do not have chrome application on their system, it is very cheap to get one. Provided an individual has the right device, one need to buy some bundles get online and get application for free, then make use of available simulator (Luterbach Hubbell 2015, p. 65). Besides benefits, chrome simulator cannot be used by illiterate computer users. This means some computational skills are required in order to make use of chrome simulator. It would not be easy to have a novice system user without computational skills being able to use chrome simulator to test website responsiveness. Alternatively, instead of using chrome simulator to test for website responsiveness, website analyst can make use of internet explorer and Mozilla though with varying results (Bazard Bhardwaj 2011, p. 33). Important to note is that, using different simulators gives different results. Conclusion Using various analyst and system users helps in giving out varying view point in order to draw quality conclusion on usability and functionality of the system. The main features of makezine.com websites are; project section which explains various projects being assessed and which has been implemented and are already in market. The shop feature provides users with ability to purchase several items which has been developed and are ready for use in the market. Additionally, guide features helps system users to get necessary help after purchasing an item from the system. Some of the product available from the website include; robots, computers and their accessories such as motherboards, crafts and design products ranging from handcrafts to engineering products. Makezine.com has several advantages which makes it stand a market position. These are; system functionality which has been actualized effectively and efficiently, good background which is user friendly and use of relevant images o n webpages. Similarly, there are some disadvantages which has been observed from use of the makezine.com website. These include; lack of homepage to display links in form of menu bar, unprofessional mages and content display which has been placed all over the webpage. Finally, the website is not a one page as required in good practices of software development. From analysis, possible recommendation are; creating a single page website, introducing a homepage for the website, displaying images and contents professional and arranging links in a more presentable manner, mostly in a menu bar. Finally, chrome simulator has proved to be a best tool to use in analyzing of website due to its ability to work on different set of devices such as laptops and smartphones. Chrome simulator alternatives are; Mozilla, internet explorer and safari. References Atuahene?Gima, K., Slater, S.F. and Olson, E.M., 2005. The contingent value of responsive and proactive market orientations for new product program performance. Journal of product innovation management, 22(6), pp.464-482. Bazard, M. and Bhardwaj, S., 2011. Overview on AndroidThe New Mobile Operating System. International Journal of Science, 2(1), pp.25-34. Burd, B., Barros, J.P., Johnson, C., Kurkovsky, S., Rosenbloom, A. and Tillman, N. 2012. Educating for mobile computing: addressing the new challenges. In Proceedings of the final reports on Innovation and technology in computer science education 2012 working groups (pp. 51-63). ACM. CALLAHAN, B. 2012. Responsive design. Freiburg, Germany, Smashing Media GmbH. FIELDING, J. 2014. Beginning responsive web design with HTML5 and CSS3. FRAIN, B. 2012. Responsive web design with HTML5 and CSS3: learn responsive design using HTML5 and CSS3 to adapt websites to any browser or screen size. Birmingham, Packt Publishing Ltd. Karimov, F.P., Brengman, M. and Van Hove, L., 2011. The effect of website design dimensions on initial trust: a synthesis of the empirical literature. Journal of Electronic Commerce Research, 12(4), p.272. Kim, J. and Lennon, S.J., 2013. Effects of reputation and website quality on online consumers' emotion, perceived risk and purchase intention: Based on the stimulus-organism-response model. Journal of Research in Interactive Marketing, 7(1), pp.33-56. Koo, D.M. and Ju, S.H., 2010. The interactional effects of atmospherics and perceptual curiosity on emotions and online shopping intention. Computers in Human Behavior, 26(3), pp.377-388. Luterbach, K.J. and Hubbell, K.R., 2015. Capitalizing on App Development Tools and Technologies. TechTrends, 59(4), pp.62-70. Madaudo, R. and Scandurra, P., 2013. Native versus Cross-platform frameworks for mobile application development. In VIII Workshop of the Italian Eclipse Community MARCOTTE, E. 2014. Responsive web design. New York, A Book Apart. Nagesh, A. and Caicedo, C., 2012. Cross-platform mobile application development. In ITERA 2012 Conference, Indianapolis, in. Nebeling, M., Husmann, M., Zimmerli, C., Valente, G. and Norrie, M.C. 2015. XDSession: integrated development and testing of cross-device applications. In Proceedings of the 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (pp. 22-27). ACM. PATEL, S. K. 2014. Responsive web design with AngularJS: leverage the core functionalities of AngularJS to build responsive single page applications. Birmingham [England], Packt Publishing. PETERSON, C. 2014. Learning responsive web design: a beginner's guide. Sebastopol, CA, O'Reilly Media. Rocha, A, 2012. Framework for a global quality evaluation of a website. Online Information Review, 36(3), pp.374-382. ROSE, D. 2015. Responsive web design with Adobe Photoshop. SIMMONS, C. 2013. Instant Responsive Web Design. Packt Publishing. Tyagi, N.K., Solanki, A.K. and Wadhwa, M., 2010. Analysis of server log by web usage mining for website improvement. International Journal of Computer Science Issues, 7(4), pp.17-21. Walker, J.D. and Chapra, S.C., 2014. A client-side web application for interactive environmental simulation modeling. Environmental Modelling Software, 55, pp.49-60. Wang, Y.J., Hernandez, M.D. and Minor, M.S., 2010. Web aesthetics effects on perceived online service quality and satisfaction in an e-tail environment: The moderating role of purchase task. Journal of Business Research, 63(9), pp.935-942. Xin Ding, D., Hu, P.J.H., Verma, R. and Wardell, D.G., 2010. The impact of service system design and flow experience on customer satisfaction in online financial services. Journal of Service Research, 13(1), pp.96-110. Youngblood, N.E. and Mackiewicz, J., 2012. A usability analysis of municipal government website home pages in Alabama. Government Information Quarterly, 29(4), pp.582-588.