Tuesday, August 25, 2020

Apartheid Era Pass Laws of South Africa

Politically-sanctioned racial segregation Era Pass Laws of South Africa As a framework, politically-sanctioned racial segregation concentrated on isolating South African Indian, Colored, and African residents as indicated by their race. This was done to advance the prevalence of Whites and over build up the minority White system. Administrative laws were passed to achieve this, including the Land Act of 1913, the Mixed Marriages Act of 1949, and the Immorality Amendment Act of 1950-which were all made to isolate the races. Under politically-sanctioned racial segregation, pass laws were intended to control the development of Africans and they are viewed as one of the most shocking strategies that the South African government used to help politically-sanctioned racial segregation. The subsequent enactment (explicitly Abolition of Passes and Co-appointment of Documents Act No. 67 of 1952) presented in South Africa required dark Africans to convey character reports as a kind of perspective book when outside a lot of stores (later known as countries or bantustans). Pass laws developed from guidelines that the Dutch and British established during the eighteenth and nineteenth century slave economy of the Cape Colony. In the nineteenth century, new pass laws were authorized to guarantee a consistent flexibly of modest African work for the precious stone and gold mines. In 1952, the administration passed a considerably increasingly tough law that necessary every single African man age of 16 and over to convey a reference book (supplanting the past passbook) which held their own and business data. (Endeavors to constrain ladies to convey pass books in 1910, and again during the 1950s, caused solid fights.) Pass Book Contents The pass book was like a visa in that it contained insights regarding the individual, including a photo, unique mark, address, the name of his manager, to what extent the individual had been utilized, and other recognizing data. Bosses frequently entered an assessment of the pass holders conduct. As characterized by law, a business must be a White individual. The pass likewise archived when authorization was mentioned to be in a specific locale and for what reason, and whether that solicitation was denied or allowed. Under law, any administrative worker could expel these passages, basically evacuating consent to remain in the zone. In the event that a pass book didnt have a legitimate section, authorities could capture its proprietor and put him in jail. Casually, passes were known as the dompas, which actually implied the imbecilic pass. These passes turned into the most despised and detestable images of politically-sanctioned racial segregation. Damaging Pass Laws Africans regularly damaged the pass laws so as to look for some kind of employment and bolster their families and in this manner lived under consistent danger of fines, badgering, and captures. Dissent against the stifling laws drove the counter politically-sanctioned racial segregation battle incorporating the Defiance Campaign in the mid 50s and the tremendous womens fight in Pretoria in 1956. In 1960, Africans consumed their goes at the police headquarters in Sharpeville and 69 dissidents were executed. During the 70s and 80s, numerous Africans who damaged pass laws lost their citizenship and were expelled to devastated rustic countries. When the pass laws were canceled in 1986, 17 million individuals had been captured.

Saturday, August 22, 2020

Overview of The American Academy

Outline of The American Academy The American Academy offers more than 230 online courses for secondary school understudies. Understudies joined up with The American Academy can finish singular courses or work towards a certify certificate. Courses are self-managed and have a liberal half year consummation cutoff time, giving understudies the adaptability to set their own calendars. Accreditation The American Academy is licensed by Northwest Association of Accredited Schools, a local certifying office. Degrees and Programs The American Academy offers online courses and secondary school confirmation projects to understudies of all ages. Notwithstanding customary confirmations, they give the Dropout Recovery Program intended to enable previous understudies to finish a secondary school certificate from their nearby school locale. Self-teach understudies can likewise take individually courses, join up with a math/science pack, or work towards a confirmation. Confirmations The American Academy offers open enlistment to all understudies. Classes start on Monday consistently. Regularly, each credit requires roughly 120 hours of work. Understudies can choose flows through a shopping basket framework, making it simple to tailor the educational program to singular needs. Fascinating Fact Understudies took a crack at The American Academy get 50 minutes of one-on-one coaching time from authorized experts. Extra coaching time might be bought. Contact Information Website:Â www.theamericanacademy.comPhone: 866-689-1932Address: 175 S. Principle, Suite 1130Salt Lake City, UT 84111

Tuesday, August 4, 2020

Climb Every Mountain a Guest Blog Post by Davie R. 12

Climb Every Mountain a Guest Blog Post by Davie R. ‘12 Midnight. We switched off the generator and the glaring light died. A flurry of moths, freed from the beacon that had attracted them, flew off into the darkness. Three thousand feet below us, fireworks were going off with a faint, delayed crackle. Most nights, this summit was shrouded in mist, but evidently the clouds had taken New Year’s Eve off. Despite the view, we were alone. The only people crazy enough to camp on the mountaintop were those who would travel to Brazil to study insects.. First, an explanation of who I am and why I’m posting on Anna’s blog. I’m an alum of French House. I graduated in 2012 with a double major in Math (combinatorics) and Music (opera singing). I then spent a year in Berlin, Germany, and now am back at MIT to start a Ph.D. in Applied Mathematics. Hi! Most children grow up thinking bugs are cool; I never stopped. It started with butterflies and dragonflies, but eventually I fell in love with moths. Turns out that one in ten species on Earth (including bacteria and plants) is a moth. Many are large and colorful. Some are rare and exciting. Most are beautiful if you stop to look.     Moths of Vermont: Chocolate prominent and maple callus borer moth. I live in the middle of the woods in Vermont (yes, I wear flannel and do square dancing), and I started photographing the moths at my home. By the end of high school, I’d found over five hundred species. Then MIT happened and I happily forgot about insects for four years in a wealth of friends, classes, and math. During my senior year, I realized that I would have a whole summer free after graduation, and I remembered my early childhood dream of finding insects in the rainforest. Surely, that couldn’t happen, but there was nothing to lose in trying. Lesson 1. Google is awesome. I searched for “moths brazil” and this was the first hit. Look, here was an organization that actually needed help identifying and photographing moths in the rainforest! Unfortunately, I also had to get there, and tickets to Brazil are expensive. Lesson 2. If you’re passionate and determined about your project, sometimes people will support you. I first tried to get funding through a public service program. I failed, and almost decided to give up. My application had been rejected; that must mean that my idea was silly. As a last hope, I went to see MISTI. This program helps MIT students find foreign internships. I wasn’t looking for a standard internship, but I had nothing to lose. Half an hour later I was told I had a plane ticket. MIT-Brazil was a new program without much money, but they would be delighted to support me if I worked hard in the interests of conservation. A CD arrived in the mail from the Reserva Ecológica de Guapiaçu (REGUA). On it were over a thousand photographs of unidentified moths. Could I please identify them all? *gulp* Well, this was what I’d asked for Dawn over the Atlantic rainforest. REGUA is part of the Atlantic rainforest. Most of this ecosystem has been destroyed: it’s much more endangered than the Amazon. About half the species are found nowhere else in the world, and naturalists are racing to identify and protect what’s there before it vanishes forever. Almost nobody is studying the moths. There are just too many of them! Certainly, there’s no field guide or anything like that. To identify a species, you have to search through museum collections or hope that there’s a photo on the web. Can you tell that these moths are the same?      Two photographs of the moth Epia Muscosa (left photo by Alan Martin). After reading about moths and malaria and What To Do If You Meet A Jaguar, I arrived in another world. The rainforest is a solid block of plants. There are trees and ferns and tree ferns (ferns the size of trees). There are bamboos, palms, vines, and spiny plants that you meet unexpectedly. There are wild oranges, which are green, and wild limes, which are orange. There are bromeliads living bowls of water where the treefrogs lay their eggs. All of these plants occur right in front of you, piled on top of each other. Jackfruit, the largest (and tastiest!) fruit in the world. Ficus trees are so charismatic that they’ve run for Congress. There are also animals, but they are harder to see. Colorful birds flash past you and disappear in the leaves, and if you find a fruit tree you may meet some monkeys. You will definitely meet some mosquitoes. There is a constant hum of insects at any time of the day or night, so perpetual that you don’t notice it. Every so often, a screaming flock of parrots dashes across the sky and vanishes in the distance.      Butterflies are cute when they sleep. Moths are very considerate animals; they will come to you if you ask nicely. All you have to do is set up a very bright light â€" too bright to look at. As night falls, moths flutter in from the surrounding forest and flap around the light with determined fascination. They land on the bulb, on the ground, in your hair. Some are tiny, no bigger than flies. Others are the size of bats. Many are experts at camouflage, rolling up their wings to look like twigs, dropping to the grass as leaves, or blending in with the bark of the trees. So many moths! So little time to photograph them! And they are all moving at once in a blur of patterns and colors. You stay up all night, sleep the next day, then do it all over again. Rothschildia silkmoth just chillin’ on my pants. This giant leopard moth is warming up its wings for takeoff. Adelowalkeria moths are furry and sit on your finger like tiny teddy bears. Automeris silkmoth covered in morning dewdrops. Moth lights attract other visitors too, like this leafhopper.  It’s about the size of a grain of rice. This harlequin beetle was too big to fit on my hand. After three weeks in Paradise, I returned to Boston laden with gigabytes of photos, which I slowly identified over the course of a year. REGUA has started a moth database to be used by entomologists around the world. There’s a lot more out there, but it’s a start. With the help of MISTI, I flew back this year during IAP. January is the wet season in Brazil, and it rains a lot. Next to every building is a deep groove in the concrete caused by water falling off the roof. Moths like to go out in the heaviest downpours. I don’t. But anything in the interests of science, right? Together with Sue Loose, a dragonfly expert, I spent a week in the mountains, where the most exotic moths are to be found. On New Year’s Eve, we visited a peak called Caledonia, about 6,500 feet high. That’s taller than any mountain in the eastern US, but at the Equator it could still be warm and vibrant with life. Even in the rainforest, of course, you don’t get to spend all your time watching fireworks from a mountain. There are afternoons lugging heavy equipment along a trail. Hours on a patchy wifi network, pleading with Google to tell you what your species is. You learn to deal with unforeseen calamities, the vicissitudes of an environment where you really aren’t in control. Confusion when you discover a bat in your bathroom. Frustration when a gigantic yellow moth appears and is eaten by owls before you can get a photo of it. IT ATE OUR MOTH. (Photo by Sue Loose.) Sue says that the red-eye function simply doesn’t work on owls. Despair when you drop your special moth light and it shatters into tiny pieces. Pain â€" when you discover you are standing in a swarm of army ants. Panic when you have set up camp outside a school in a remote valley and manage to set off the burglar alarm in the middle of the night. Will you be able to convince the police that you were just looking for moths? But if I’ve learned one lesson, it’s this: If you truly care about something and persist in working towards it, sometimes it magically happens. Remember your dreams, because they may not be as far off as you think.

Saturday, May 23, 2020

Essay on Personal Ethical System - 1356 Words

Personal ethical system We human beings live in a society. The society or the social world we live in is based on human cooperation. In other words, the individuals in a society do not live in an isolated self-centered world. The human interactive system presupposes ethical and moral standpoint from which we operate. My personal ethical system is based on â€Å"service before self† and â€Å"love your neighbors as yourself†. The question that I wish to address in context of these two principles of my personal ethical system is whether my ethical system is capable of being universally applied and followed. Can we think of a possible situation when this system will break down so that it becomes indefensible? In other words, for an†¦show more content†¦What is meant by going beyond the individual bio-organic needs is that only human beings are capable of achieving self-fulfillment or what Maslow calls self-actualization that comes not from meeting one’s personal needs of food , thirst, security etc but going beyond them in the service of others. The driving force behind men going beyond their personal and immediate needs to those of the others first is the unique quality characterizing every human called â€Å"love†. That is why, in my opinion, love for others so that one may adopt â€Å"service before self† and â€Å"love thy neighbors as thyself† as their guiding ethical principle is what may be understood as the ultimate human goodness. This ethical system is different from both the Utilitarian of Mill and the Categorical Imperative of Kant. The principle of utilitarianism holds the belief in the greatest happiness of the greatest number. Mill equates happiness with pleasure, while pleasures are of higher and lower value. Pleasures of mind are higher than the pleasures of body. For instance, pleasure of learning is more valuable than pleasures of eating and drinking. The decision on value of pleasure rests on the consensus of expe rienced observers. The moral foundation of utilitarianism rests on the principle of â€Å"greatest happiness of the greatest number† where happiness of every sentient being counts equally. The ethical system as proposed in this paper draws from the unique human capacity of loveShow MoreRelatedPersonal And Professional Ethical System1134 Words   |  5 Pagesmoney for shareholders of the bank. In this paper, I will try to take a look at this situation from accounting perspective and point of view of professional ethics. Personal and Professional Ethical System First of all, let me introduce my own personal ethical system. I believe in duty-driven ethical system because my personal opinion is no matter whatever I do, I have to have an ability to identify what is right or what is wrong pretty clearly. Otherwise, it is not nearly possible to work, especiallyRead MorePersonal and Ethical Belief System Essay3474 Words   |  14 PagesPersonal Ethical Belief System and Professional Ethics Cherissa Boyd BSHS - 332 University of Phoenix August 15, 2011 David Elkins Personal Ethical Belief System and Professional Ethics In the profession of human services, every professional will at some point, include his or her personal ethical standards into his or her work with clients. My personal ethics are a huge part of who I am today, and these beliefs affect every decision I make whether it is personal or professional. I believeRead MorePersonal, Professional, and Ethical Belief System Essay2920 Words   |  12 PagesPersonal and Professional Ethical Belief System Farah Nail University of Phoenix In the human services field, personal ethical belief systems combined with professional ethics work in partnership to guide human service professionals in unraveling ethical dilemmas. An increasing number of professionals and clients seek out to define the fundamental policies of the human services field. Humans develop an integration of values, standards, and beliefs from birth throughout life. The values, standardsRead MoreEthical Systems : Ethics And Ethics Essay1219 Words   |  5 Pages Ethical System Reflection The Ethics in Justice course has outlined various ethical systems. This was done using the course textbook: Ethical Dilemmas and Decisions in Criminal Justice HUM 3350 Custom Edition by Lethbridge College, and peer presentations on each of the ethical systems outlined in the text. Ethical systems provide a foundation, in a variety of areas, for individuals in determining, morals, and actions within their lives (Pollock, 2015). Individuals may fit various characteristicsRead MorePersonal Ethics Development Paper871 Words   |  4 Pagesparticular way. In addition, this made me a have a particular ethical system that influences the way I work and act as an individual. At the corporation level, ethics is important because they set the rules and regulations. In this paper, I will explain the developmental aspects of my ethics as well as my ethical system, the effects of my ethics at my workplace, and importance of ethics in an organization to achieve its goals. My ethical system was shaped since I was a child. Growing up with a catholicRead MorePersonal Philosophy : An Organization Level Leader1734 Words   |  7 Pagesvarious understandings of how to relate to situations and dilemmas through their personal life experiences based on inputs from parents, family, experiences and organizations. To define my moral philosophy as an organizational level leader, I will first explain how my personal moral philosophy was shaped, explain and examine my personal moral philosophy and then I will juxtapose my moral philosophy to the E100 ethical concepts by explaining the strengths and weakness in relation to my moral philosophyRead MoreOrganizational Goals And Actions Can Affect The Outlook Of Personnel At Various Companies975 Words   |  4 Pagesship or military command system there is most of the time a bartering network established, especially at underway times, to increase morale and individuals’ personal resources. This can lead to rais e privileges, increased hours of operation, and access to unapproved sites or programs in return for services such as better quality or quantity of food, front of line laundry or haircut privileges, after-hours access to ship stores, and other various perks. To increase ethical behavior a training programRead MorePersonal Vs. Professional Ethics Essay1549 Words   |  7 PagesIntroduction to Research Methods - Assignment 1 Personal v/s Professional Ethics The Oxford (Dictionary) defines ethic as a set of moral principles, forming a system. (Durant 1961) defines ethic as ‘the ideal conduct’. But none of them mention who creates these moral principles, who decides what is immoral, how does one state what ideal conduct is, and whether these definitions change from person to person, time to time and in different situations. (Jindal-Snape and Hannah 2014) describe three formsRead MoreEthical System Reflection1019 Words   |  5 PagesEthical System Reflection Two ethical systems that I feel hold true to my beliefs and decision-making processes are relativism and ethics of care. When having to make difficult decisions in life I often find myself applying key concepts from each ethical system to find a resolution. Both systems reflect aspects of my personal beliefs and are beneficial now and in the future as a justice professional. By applying these ethical systems, it creates a road to success, positive interaction and strongRead MoreThe Moral Code : Utilitarianism And Rule Utilitarianism994 Words   |  4 Pagessociety is the ability to make ethical decisions. Although most humans have similar ethical beliefs there are still many differences between each person. These differences can be influenced and affected by a person s upbringing, religion, and overall social interactions. When analyzing a person s ethical beliefs, we can see a combination of different ethical systems working in tandem to make up one complete ethical code. We can de fine this mix of different systems as a person s satisfactory moral

Monday, May 11, 2020

Are Social Media Sites Keeping our Information Safe - Free Essay Example

Sample details Pages: 15 Words: 4437 Downloads: 7 Date added: 2019/04/10 Category Society Essay Level High school Tags: Social Media Essay Did you like this example? Introduction Technological advancements have greatly benefited our society. An example of a technological advancement that has benefited many people around the world was the creation of the Internet. The Internet makes it easier to search and look for information. Don’t waste time! Our writers will create an original "Are Social Media Sites Keeping our Information Safe?" essay for you Create order It has also allowed for it become easier for people to become interconnected with one another around the world. Social media websites or applications are created to allow users to create and share content or participate in social networking. These websites allow for users to make new people or become reacquainted with family or friends they have not seen in a long time. As great as the internet is there are some negative effects that social media websites have on their users, an example is that being that there are users who catfish other users which means that they create false identities to trick other users. Catsfishers arent not the only group of people that social media users should be concerned with rather there are other things on social media sites that should be more concerning to all users. One group of people they should be concerned with is hackers they are people who use computers to attempt to gain unauthorized access to data, which include social media websites. Users should be concerned with how safe are the social media websites they visit secure, if they are able to adequately protect their information. It will be interesting to find out the different kinds of security methods they use to ensure that their users are safely protected. Finding out whether or not social media websites use differing or similar security methods to keep users safe. If any of these websites prioritize keeping information safe for all the users and what they do if they notice any suspicious activity on their sites. If they offer any information that informs users on the dangers they can possibly face while using their websites. How they report any suspicious user activity and what they can do to make sure that they use the website safely. Keeping users information safe is not only the r esponsibility of the websites but as well as the responsibility of the user and knowing what they could be to make sure they arent vulnerable to any attacks. Users should be aware that there are certain activities that may pop on their screen that they should be precautious and shouldnt click on everything they see. They should be able to detect any form of phishing website links that may pop up on their page. It is imperative that users know what phishing attacks are. They should know where they have to report any suspicious behavior they see on their screen. They should know how to make sure that they can keep their personal information private. In order to understand how and why these social media websites get attacked the user should become aware of the different ways they can get harmed. Users should be aware that there are cybercrimes that are punishable with the law. All users should have a basic knowledge in what phishing attacks are and how they can become victims. The things they should keep an eye from to avoid becoming victims. If they do become victims the users should also be aware of how malware may affect their computer device. There was a moment in time when cybercrimes were committed and authorities could not punish these individuals because there werent any laws that punished cybercrimes. Although it takes time laws have been created in order to punish these different offenses and they are frequently amended to keep up with technological changes. Who uses Social Media? In order to see which groups of people are most vulnerable to cybernetic attacks on these websites we have to found out who uses these sites and why they use it. Finding out this information makes it easier to assess who the targets are and what can be done to protect them. Social media is used by different groups of people some who use it as a means to meet new people, voice their opinion are different subject, staying connected with friends and family or are looking to establish relationship with other users. Social media has the benefit that many people around the world can connect with one another. The invention of the smartphone has given people around the world easier access to the Internet. Which also means that it is easier for them to join social media websites and apps. Currently the major social media websites are Facebook, Twitter and Instagram. Of course there are many more social media websites but the ones mentioned above are currently the most popular. Social media we bsites or apps are built with the intention that they are easy to use so different types of people can use it. Demographics on social media websites vary on the sites they are subscribed to as well as the age group. Duggan and Brenner conducted research in 2012 on the demographics of social media users. Their research concluded that Facebook in that time was the most popular social media site usually used women ages 18-29. Their research also focused on the gender, race, education as well as ethnicity to see what sites are popular for each group. Their research sample included people of differing age, gender, education as well as being conducted in English and Spanish. It is also important to point out that their research was published in 2013 and it is obvious that their findings could possibly be outdated. Of course compared to 2012 more people presently own smartphones or have access to a computer that allows them to use the Internet. It is highly likely that more people use social media sites and the percentage for each website is higher than the numbers given by Duggan and Brenners 2012 research. But their research is helpful in the sense that it can be used as an estimate for the amount of people that use social media sites. These are groups of people who may be exposed to vulnerabilities that different websites may or may not have. Benefits of Social Media As stated previously a benefit of using social media is that ability to reconnect with family or friends that live far or near the user. There are people who firmly believe that social media is responsible for causing people to be less communicative with one another. Many believe that they are so focused in checking the phones constantly that they have become less concerned with people who are physically with them at the moment. Social media has caused many positive outcomes like the ability to communicate and discuss various topics with people around the world. It permits the user to see the opinions of others and it allows them to see why they think they way they do. People can see how different users around the world are influenced to think the way the do based on where they live. Social media sites allows for its young users to be able to voice their concerns through their websites. They are able to create awareness on a subject matter that many people didnt know existed. Through the use of a social media site a person can also be aware of the news that occurs near them or any place around the world. But a problem with this is the possibility that there may be fake news circulating through these websites and how can a user know whether or not what they are reading is factual or not. Its fantastic that have social media means that there is an easy instant way to communicate with people. Social media can be a great tool if a person has started a new business. It allows for them to promote their business online and depending the website they use it possibly may be free. They are able to find a larger range of consumers who did not know they existed. Not only can they do free self-promoting their business but allows them to see whether or not they are able to pro vide adequate services or goods for their consumers based on comments they may post. If they have satisfied customers it is highly likely that they will post their delight about the business on their social media accounts. These websites can also be used as a means of relaxation and enjoyment because some people think that they are fun to use. Using social media can allow the individual to take a break from work. It allows you to be able to see what the users friends are up to without needing to actually communicate with them. Perhaps the user may find it enjoyable to see when their friends comments on their posts.   Disadvantages of Social Media There are people that firmly believe that social media has caused more harm than any good for users. As stated previously people believe that social media can be attributed to people becoming less communicative with one another. People have become so addicted and attached to their cell phones they have become less aware what is going on physically around them. There are users who are focused on their online interaction with other users that they have forgotten the importance of making sure they also interact with people. It has become more difficult to interact people because they are focused on their smartphones and are frequently checking it out. Another con of using social media websites is that there is a high probability that the user will have more than one profile on different sites. Its not uncommon for one person to have a Facebook, Instagram or Twitter account. The problem arises when an individual may become overwhelmed with all the accounts they have to check on. They hav e to check messages on each social media site. It might be overwhelming for users to try to keep up with everything going on with their pages. Using social media can also been seen as a distraction and why people tend to procrastinate. People have the need to constantly check their smartphones to see look at their social apps and text messages they receive. People arent fully given their attention to a person or to the tasks they need to do. Using these apps can be used to as an excuse to prolong having to fulfill their responsibilities or tasks. Not only does it disrupt a persons daily routine it can also harm their sleep routine. People have spent hours at a time on these apps. It can also cause a person to be situated in one spot for hours at a time without moving at all. Humans have the basic need to fit in with their peers so they may be pressured to follow the social trends. They think that it is important for them to have a social media website because they everyone else they know has one. Teens and adults have been seen to do whatever they can to fit in with their peers. A negative consequence of this is that we hav e seen the increase of cyber bullying; which is when people use electronics to a bully a person by sending them threatening or intimidating messages. They also may create posts about an individual where multiple people can start commenting attacking the person. Of course person who is the victim of cyber bullying is high likely to develop stress, anxiety, or depression. In extreme cases there have been people who have been victims of bullying who have committed suicide. All these previously mentioned disadvantages of using social media are important to be aware of but one other issue that stands out the most would be the privacy issues that come with using social media apps or websites. People should be aware of the possible consequences of using any site. It is possible a person can become a potential victim if they post their geographic location on their social media website. Another case would be if a person decides to post something about their job this can be brought to the attention of their employers and a person can become at risk for getting fired. Sharing personal information on these sites can become a problem when there are people who can use this information against the user. A possible problem a person may face because of over sharing would be they think could inadvertently offend someone or a group of people. Once something is posted it will always stay on the Internet. It should be common knowledge that cybernetic attacks are becomin g frequently used by different groups of people around the world. They commit these crimes because it is easy to do. One benefit is that they do not have to leave the comforts of their home to do so. People have become more susceptible to these attacks because they are not aware they should be cautious of what they post. People dont realize that they expose themselves to become a victim when they carelessly post personal things about themselves on these websites. Without even realizing it people through the use of their social media pages have become victims of cybernetic crimes. As time progresses and the uses of the Internet increase there has been a dramatic increase of cybernetic crimes committed by people around the world. Cybernetic Crimes Cybernetic crime is also known as computer crime that refers to any crime that involves a computer and a network. It is an attack on information about individuals, corporations, or governments. Wadha and Arora article A Review on Cyber Crime: Major threats and Solution(2017) goes into detail that there is a broad spectrum on the different types of crimes that can be committed through the use of a computer. On one end of the spectrum of cybernetic crimes people are actively looking for digital information to steal to use against a person or who their own advantage such as stealing someones identity. On the other end of the spectrum there are individuals who are actively attempting to disrupt people from using the Internet by creating malware, viruses, or shutting down websites. A Review on Cyber Crime; Major threats and Solution(2017) state that people that are motivated to commit these crimes are computer nerds wanting to have bragging rights that they were able to hack a website. Th ere also business that rely on these methods to illegally search what their competitors are doing with their companies. Criminals are also searching for individuals personal information to sell the information on the black market. They made a valid point that countries now have to worry about terrorists using the Internet to commit cyber strikes. They could possibly hack the governments top-secret information to use against them. One of the problems that occur with cyber crimes is the lack of reporting by the victim. Often times these crimes are not reported because the individual hasnt realized that they have become a victim of a crime. Its extremely difficult to realize that an individuals private information has been stolen. Hackers have become resourceful in their methods to steal information without the users finding out. If they do find out they have been a victim to cybercrime sometimes people are unaware where they should report their crime too. Cybercrimes are not like regular crimes the perpetrator can be far or anywhere else around the world. Businesses are targeted not only by their competitors but also by hackers who are trying to steal their customers information. Hackers want customers personal information and their credit card information. Business sometimes decided not to report these crimes because it is bad for their business of course they dont want to lose their customers. Their security systems come into scrutiny because one of their main concerns is to make sure that their clients information is stored and safely protected. Failure to report these crimes becomes detrimental because no one knows the accurate numbers of these crimes. If the actually number is higher then the reported how are people supposed to combat these crimes? Criminal justice agencies may not be aware that they should have more personnel looking into these cybercrimes. Reporting crimes can lead to connecting whether or not the same person or groups of people are committing these crimes. It may lead to there apprehension. Laws on Cybernetic Crimes Technology is constantly and rapidly changing. Every year people have witnessed how technology changes and helps improve society as a whole. Like everything nothing can or should be considered to exist without any flaws or some kind of disadvantage. In the case of rapid technological change one of the major downsides of these constant changes is whether or not it is possible for the law to keep up these changes. In order for a law to be created it take to be created and to be passed at a legislation level. So it is possible that by the time the law is created it has become outdated. Questions whether or not itll ever be possible for laws to keep up with all the changes. The Department of Justice created a template based on their current knowledge of cybernetic crimes that are committed and their possible punishment for committing these crimes. Computer crimes started to become a problem within the nation in the early 1980s so in order to combat the rise of the crimes they created the Computer Fraud and Abuse Act (CFAA). It was also created so the federal government and states could be able to create laws to punish cybercriminals. The CFAA has been revised on multiple occasions in attempts to keep up with the constant change in technology. Eliminating and making sure to expand the statues in hopes to appropriate punish individuals for their crimes. Before then they had no idea on how to deal with the crimes or how they should be prosecuted so there were individuals that went unpunished for their crimes before these laws were created. Like regular crimes that are committed cybercrimes are also divided into felonies and misdemeanors. The more severe the crime the harsher the punishment they may face. The criminal may be forced to pay a fine and or spend time in prison. Cybercrimes can be committed anywhere it imperative to know that if the cybercriminal is another nation depending on the crime they committed they could possibly be extradited to the United States. An example would be if a criminal outside the US decides to use a computer and it affects the United States foreign commerce or communication, if there location is known the US could extradite them. More than often cyber criminals are usually individuals who are tech savvy so they make sure that they are able to hide their tracks. Sometimes these criminals are so good it is nearly impossible to know where their location is. The chart below was a table taken out of Prosecuting Computer Crimes(2015) is the list of possible punishment a person may face for co mmitting any cyber crime. The article was created 3 years ago meaning that it is possible that some of the information is outdated and more crimes can and should be added to the chart. The federal government uses the table below so they know how to prosecute computer crimes; it is important to note that conspiracy to commit and attempts of these crimes are also punishable. This serves as guideline for states to be able to create their own laws. It should be considered important to all social media users that there are cybernetic crimes that can be punishable. They should know that it is imperative if they are a victim of a cybercrime they report crimes that are committed against them to the proper authorities. Its important to do so because those criminals should be punished as well as it stopping them from targeting other people. This information can also be useful to the social media sites so they can find out how they can make sure their websites are safer for their users. They should be aware that anyone who attempts to illegally obtain their passwords to their accounts can and should be punished. One reason a criminal hacks into social media users accounts is in order to search for their personal information on their page. Another reason would be to access the information on their personal computers. One way the attempt to access personal account information is through the use of phishing attacks. Phishing Phishing attacks are defined as a kind of social engineering attacks that is used in order to steal a users data. Which also includes stealing login information from websites and the users credit card numbers. Originally phishing attacks were primarily done thru the use of emails but that gradually changed as more sites were created and the Internet was expanded. These criminals try to obtain information from people by impersonating as a trusted entity. However, nowadays, phishing attacks are increasingly sophisticated. Beyond email, phishing attacks spread via twitter direct messages, games on social networks, voice over IP phones and more; thus, blocking the phishing attacks from the source becomes increasingly difficult. (Gang, 2012). If the user unknowingly clicks on malicious link it may lead to installing malware on their computer or device. Examples of devastating consequences of clicking on fraudulent links are the possibility of unauthorized purchases, having the users funds stolen or suffering from identity theft. Hackers have become more resourceful in finding ways to trick users to clicking on their malicious links. Besides the examples previously provided hackers are also able to create fraudulent ads on social media pages. There have been cases where people believe that they are logging on to their social media accounts without realizing theyre putting their information on fake sites. When logging on to fake sites its almost nearly impossible to tell the difference between the actually site and their site because they are able to do a decent job at replicating the sites. People see the companys logo and assume theyre on the right websites without thinking to check on the links they clicked on. If users are paying close attention to what they are clicking theyll be able to tell that the URL they are clicking from another website. An example of fraudulent websites is like picture below the URL spells amazon incorrectly with two-letter Ns instead of one. In order to combat phishing attacks there are websites that make sure that they leave copyright information on the bottom of the page. Whenever a user is unsure whether or not theyre not the right webpage it would be a great idea if the scrolled to the bottom of the page to check for the company right information. This method isnt always isnt foolproof because these criminals also tend to create replicas copyright information on the bottom of the webpage. According to Jensens article, Training to Mitigate Phishing Attacks Using Mindfulness Techniques(2017) in order to combat phishing attacks company do three things  ¦automated removal or quarantine of phishing messages and corresponding websites; (2) automated warning mechanisms that notify individuals when they encounter a suspicious message or website; and (3) behavioral training during which individuals are taught to identify and report attacks. Companies are responsible in making sure they secure their websites but all users sh ould be aware of the risk they face by not making sure they are in authentic websites. In social media sites phishing occur more frequently than users tend to notice and realize they do. Getting Phished on Social Media (2017) article focused on explaining two kinds of phishing scams that people may incur on social media sites. According to Vishwanath (2017) article, one form of attack is that criminals create fake profiles on social media sites and attempt to befriend people. Usually these fake profiles have hundreds of friends that is why some users accept their friend request thinking that they are legitimate users. The second way they may attack a person is to directly extract an individuals information by sending them direct messages. In his article he states that it is frequently more difficult on social media sites to tell if the user exposes themselves to a phishing scam due to the fact that there are users who are not aware that such attacks can take place on social media sites. The picture above is from a random Facebook account, it is an example on fraudulent ad on someones home page. If a person pays close attention and reads the ad theyll notice that the URL says www.walmart100.com, clearly a spoof link. On the bottom of the picture it also says its a click bait scam in order to get personal information from someone. All social media users should be aware and cautious of possibly being a victim of a phishing attack. As mentioned before being contacted by the scammers is one to become a victim. Another possible way to become a victim on a social media page is that scammers are able to create fraudulent links on their home pages. Not only that but they are able to create fake advertisements; people on their accounts homepage are able to see and click on the links. In some cases it may be clearly to anyone that the ads on the page are suspicious and it is not a good idea to click on them. These scammers have become more creative in creating different kinds of phishing attacks and all users should be aware of who and what the click on they are on their accounts. If they are unsure they should report the suspicious link to the website page or block the random person who has request to be their friend. People are unaware that the link on they clicked on is apart of phishing attack that may introduce a malware on to the device or computer the person is using. Malware Malware is defined as any piece of software that was created with the intention to harm data, devices or to people. Some examples of malware are viruses, Trojans or spyware. When a computer or device is infected with a virus it can attach themselves with clean files and infect other clean files in order to delete or corrupt files. Trojans is a dangerous malware that was created to appear as legitimate software. The goal of this particular malware is to create backdoors in the devices security to let other malware in. Obviously spyware was created to steal information on an individuals computer or device. It hides within the computer system since the user is unaware that the spyware is keeping track to the different passwords the user has for different accounts.

Wednesday, May 6, 2020

Gothic Art and Architecture Free Essays

Gothic art and architecture played a very important role in the appearance of medieval times. The approximate time frame of the Gothic stage began in 1125, preceding the Romanesque period. Gothic art was first considered very ugly and was believed that barbarians were only capable of making such pieces. We will write a custom essay sample on Gothic Art and Architecture or any similar topic only for you Order Now So, the name gothic meaning ghost was given to this time period. Now in the 20th century people think Gothic art is beautiful and admire it greatly. The First Methodist church in Notate by Red Barrel is a Gothic church. While looking at the church you take note of the pointed arches. This is a feature that began in the Gothic time period, and replaced rounded arches of the Romanesque period. Pointed arches are on every window and on the frame of the door. Inside you can see a simple barrel vaulting system. Another feature of Gothic art that The First Methodist Church has is the wonderful stain glass windows. They were very long and told a religious story. The stain glass allows the walls to be thinner and let a nice color filled light in. This light fills the church, and back then would be one of the only systems of light. The most dominant feature of Gothic architecture is the size, or height of the church. They believed that the higher the church the better, because they were closer to heaven. Some even contained towers so they could be closer to heaven. The one in Notate is very tall and has a very high ceiling. The ground plan for the church is in a cross, Just like medieval times. Inside the church is very complex along with the high ceilings. There are no painting, but the columns are highly decorated and complex. The First Methodist Church in Notate has many Gothic features, but is missing some characteristics. It does not have flying buttresses, or a rose window, which were strong Gothic traits. Also there were no windows on the east end where the sun rises. Alters were mainly put on the eat end, so when the sun rose it would fill the alter with light. Gothic architecture is very beautiful, and the town of Notate is very lucky to have such a marvelous Gothic church in its town. How to cite Gothic Art and Architecture, Papers

Thursday, April 30, 2020

The Death Penalty (575 words) Essay Example For Students

The Death Penalty (575 words) Essay The Death Penalty In the eighteenth century, England would punish by death forpickpocketing and petty theft.Ever since the 1650s colonist could beput to death for denying the true god or cursing their parents advocates. Capital Punishment have clashed almost continuously in the forum of publicopinion in state legislatures and most recently in courts. In 1972,thecase of furman vs.Georgia reached the supreme court. The court decidedthat punishment by death did indeed violate the eighth amendment tocontaining that excessive fines imposed,nor cruel and unusual punishmentinflicted. By this decision death sentences all over the country were setaside. The three most common death penalties are the gas chamber,lethalinjection,and the electric chair. Capital punishment has become anincreasingly controversial issue over many decades. The problem liesbetween, is the death penalty being accepted in murder cases or ruled outcompletely. While some people feel that Capital Punishment will notdiscourage crime, Capital punishment should be legalized in all states,because it is morally just and it will deter crime. We will write a custom essay on The Death Penalty (575 words) specifically for you for only $16.38 $13.9/page Order now The many opponents of capital punishment who are against it feel thatthe death penalty is not a deterrent and that it is barbariaertic of thepast. It has no place in a civilized society today. One of the biggestarguments against capital punishment is people feel that it violates theeighth amendment which forbids cruel and unusual punishment. Peopleagainst Capital Punishment believe the death penalty is absurd and is inun-christian practice. Further more, they feel society should notencourage sentiments of vengenance cater to morbid interest in ritualexecution. Criminologists also built a strong case that the threat ofdeath failed to deter murder, anymore effectively than prison. Therefore,to inflict harm to one,it is simply useless. However, the punishment fits the crime therefore, it is morally just. Capital punishment is an expression of societys moral outrage atoffensive conduct. This may be appealing to many but it is essential in anordered society. It asks our citizens to rely on legal procedures ratherthan to self-help their wrongs doings. It is morally right to sentence aperson to the death penalty who has commited a serious crime as murder. Ifsomeone has murdered a person it is unethical to let the murderer live whenyou have an innocent person who is dead. Capital Punishment has to bebased entirely on consideration of justice and morality. Finally, the death penalty is a deterrent against crimes. Statisticsshow that the crime rate is reduced in all states that hold the deathpenalty. The point given to these people is that they are less likely tocommit a crime knowing they will receive the ultimate punishment to kill. No other punishment deters men so effectively from committing crimes asthe punishment of death. Still, Capital Punishment is supported by manyAmericans. They usually rely on deterrence as their main reason to deterpeople from committing serious crimes. Hopefully Capital Punishment willbe legalized in many states to eliminate violence from american life. Many people feel Capital Punishment will not discourage crime . Itpromotes murder rather than deter it. A desire for suicide is what leadssome murders to their criminal acts. Capital Punishment should remainlegalized in all states. The two main reasons are it is morally just andit will deter crime. The way our society is today we need to continue onwith the death penalty. It deters other murders and it protects oursociety from them. Clearly, the usage of the death penalty will force crimeto be unacceptable in our world and protect our citizens.

Saturday, March 21, 2020

Cultural Awareness, Understanding, and Acceptance

Cultural Awareness, Understanding, and Acceptance Introduction California is one of the populated USA states inhabited by large number of different minority groups which for centuries have defined and characterized the state’s social, cultural, economic, political, and religious environments. At the same time, the state appears to be increasing in the number of minority groups. By 2010, California had an estimated population of 37,253,956 people (USA Census Bureau, 2011).Advertising We will write a custom coursework sample on Cultural Awareness, Understanding, and Acceptance specifically for you for only $16.05 $11/page Learn More This constituted a 10% increase, as compared to 2000 population of 33,871,648 people (USA Census Bureau, 2011). Out of this population, Hispanic population (Latinos) make up 37.6% compared to 40.1% of non-Hispanic white population and the rest represent other minority groups in the state (USA Census Bureau, 2011). Hispanic Americans or popularly known as Latino constitute t he fastest growing minority group in the state. By 2020, it has been estimated that the ethnic group will be dominant in California (USA Census Bureau, 2011). Although the Latinos form the largest and growing minority group in the state, the ethnic group is composed of various sub-cultures. Some of the notable sub-cultures of the group include Mexican Americans, Cuban Americans, Central Americans, Puerto Ricans, etc. On a wider scale, the Latinos may exhibit similar socio-cultural and economic aspects. Therefore, it is likely to find some differences among the sub-cultures that may be associated with the diverse geographical and political backgrounds. It is also necessary to undertake more apt studies that identify similarities and differences between the various sub-cultures of Latinos that may be appropriate for action-based cultural programs and understanding. As a result, the study will focus on two sub-cultures – Mexican Americans and Puerto Ricans Americans. Specific em phasis will be placed on the analysis of such common themes as holidays and traditions, education and family structure, and religion to define the basic differences and similarities between Mexican Americans and Puerto Rican Americans. Hence, holidays and traditions play an important role among members of Hispanic group, so do family structure because they influence social interaction. Second, language has also a major impact on other cultures these two groups interact. Finally, religion introduces an important component to cultural development of both Mexican Americans and Puerto Americans.Advertising Looking for coursework on cultural studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Results Section Brief Overview of Mexican Americans The Mexican American culture is constantly changing because of the impact of other cultures. Especial attention is given to the cultural exchange between Mexican and American cultures through flow of traditions and ideas. At this point, â€Å"Mexican Americans hold very strong bond to their language, people, traditions, and homeland† (Bravo, 2005, p. 157). In this respect, such dedication to cultural issues has a potent impact on the native population. Holidays and Traditions Despite the merger of American and Mexican cultures, the Mexican Americans have a strong sense of cultural identity and, as a result, they strive to sustain their original roots and traditions (Mexican Americans in the Columbia Basin, n. d.). Moreover, they have always strived to reinforce their cultural traditions and sustain cultural renaissance (Garcia, 2002). In this respect, cultural revival can be traced through celebrating different holidays and keeping loyalty to different important rituals, such as wedding, funeral, or anniversaries. Because the percentage of Mexican Americans is significant in the United States, particularly in California, Texas, and Arizona, Native Americans consid er it quite easy to observe cultural traditions and sustain close cultural ties with different Mexican communities through different cultural celebrations, such as Cinco de Mayo, which is also known as the day of Mexican Independence (Bravo, 2005, p. 158). With regard to food preferences, Chicanos largely eat traditional foods that reflect Mexican-American diet rich in variety of foods and dishes (Ohio State University, 2010a). The diet is normally a blend of pre-Columbian, indigenous India, Spanish, and French varieties. Moreover, Chicanos consume in large number; local fruits, vegetables, grains, dairy products and protein sources (Ohio State University, 2010a). One of the most famous components of the Mexican cuisine is tortilla that is traditionally made of corn, which is the basic ingredient for Mexican dishes.Advertising We will write a custom coursework sample on Cultural Awareness, Understanding, and Acceptance specifically for you for only $16.05 $11/page Learn More It should also be stressed that Mexican Americans are committed to sustaining different sub-cultures. In this respect, Mequel Mendez is one the acknowledged Mexican American writers revealing the essentials of Chicano culture. This is specifically revealed in his best known story called Pilgrims in Aztlan, revealing the main peculiarities of Mexican traditions within the American context (Mendez, 1992). Language and Family Structure Though the Spanish language is the main language of the Mexican people, younger generations living in the United States are more likely to blend the Spanish language with English. Aside from language issues, Mexican-Americans try to defend their system of education and prove that their teaching approaches are also effective (Association of Mexican-American Educators, et al., v. The State of California and the California Commission on Teacher Credentialing, 1996). Family is an important aspect that Mexican Americans (Chicanos) practice (Williams, 1990). Chicanos practice effective strategies for child development throughout one’s life cycle. Mothers are the ones who stay with infants for a long time whereas men are supposed to work outside to earn money for their families. Women are supposed to perform all household chores including childrearing (Williams, 1990). As a result, mothers become the perfect agents of socialization for the children. Moreover, Chicanos families are largely extended in nature with many members. Despite significant differences between the American and Mexican cultures, Mexican American families are often referred as to the American type of extended families. Religion Religion remains an important aspect in the lives of Mexican Americans. In fact, Mexican Americans associate the happenings in the world to religious beliefs and practices they have held for a long time. The predominant religion majority of Mexican Americans have associated with is the Roman Catholicism (Williams, 1990) . Religion is seen to be the expression of entity that stresses sacredness and human existence among Mexican Americans.Advertising Looking for coursework on cultural studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Brief Overview of Puerto Rican Americans Holidays and Traditions Traditions of Puerto Rican Americans are largely influenced by Afro-Spanish history because many customs are mixed with the Catholic religion of Spaniards and religious orientation of the West African slaves brought to the island in the early sixteenth century (Countries and Their Cultures, 2012). There are many other celebrations that typical of the Puerto-Rican culture, such as El Dia De las Canelarias, (â€Å"candlemas†), when people dance around a huge bonfire (Countries and Their Cultures, 2012). There are also holidays that are also celebrated by the Americans, such as New Year’s Day and Christmas. Great influence of American culture can be observed in the poems by Martin Espada, particularly by the poem Coca-Cola and Coca Frio (2010-2012). In this poem, one can notice a negative impact of the American mass culture on health of Mexican children. Specific emphasis is placed on the problem of obesity and overweight. Aside from cultural traditions and customs, Puerto Rican Americans have become much more concerned with global issues and, therefore, they have increased cultural awareness (Rosello, n. d.). Economic stability and awareness of social problems is brightly presented by Soto (1995) who provides his outlook on the problem of employment in the Untied States. A famous painter, Ramon Frade also dedicated his painting to depicting real of Puerto Americans. His picture called El Pan Nuestro de Cada Dia (n. d.) mirrors the poverty and daily routine of the people. Puerto Rican America diet resembles that of Mexican Americans although it is not spicy as that of Mexican Americans (Ohio State University, 2010b). The cuisine largely prepared by Puerto Rico Americans involves diet rich in complex carbohydrates such as bread, cereals, soda crackers, rice, and corn meal. In addition, the diet is likely to have calcium elements and milk (Ohio State University, 2010b). Meat also forms p art of the diet and favorite dishes include chicken, pork sausage, turkey, beef, spare ribs, and small quantities of fish. Language and Family Structure Puerto Americans attach great importance to the institution of family and every member is supposed to respect and uphold the family traditions (Bryan, 2004). Children are taught and socialized to respect their elders and women in the community (Taus-Bolstad, 2004). Family is considered the first and foremost vital aspect where members are supposed to show commitments to extended family that include uncles, aunts and cousins (Bryan, 2004). There are many stereotypes and misconceptions related to the language because there is no a Puerto Rican language, but Castilian Spanish originated from ancient Latin. Spanish spoken Puerto Rican Americans have a different pronunciation than that spoken by the Spanish (Countries and Their Cultures, 2012). Despite the fact that English is usually taught by Puerto Rican children in public schools, th e Spanish language remains the main one. Influence of Puerto Ricans to the American people is also tangible in terms of language, which led to the emergence of the so-called â€Å"Spanglish† language (Countries and Their Cultures, 2012). Judging from these exchanges, Puerto Rican Americans have a potent influence on the language development in the United States. Religion Religion is another feature that is important among the Puerto Rican Americans. Many Puerto Americans have demonstrated diversity and freedom of worship but on closer look and analysis, the Catholicism values and teachings dominates the population and their religious beliefs (Bryan, 2004). Catholicism is combined with other beliefs, which have become predominant among the Puerto Rican Americans. For instance, some of the dominant beliefs in this community include ‘Santeria’ and ‘Espiritismo’ (Bryan, 2004). Santeria constitute a mixture of Catholic beliefs and rituals from the Yoruba tribes (Bryan, 2004). Yoruba found their way to Puerto Rico as slave immigrants. On the other hand, Espiritismo constitute a belief in spirits that date back to the native Taino tribes and has become one of the dominating beliefs among the Puerto Americans (Bryan, 2004). Discussion and Conclusion Similarities in Cultures Because both sub-cultures refer to similar national group (Hispanic, or Latino), it is logical that they have much in common with each other in terms of traditions, social structures, cuisine, and religion. To begin with, both cultures attain much importance to family structures, as far as greater affiliation to older generations and cultural roots is concerned. Family structure also influences the roles and responsibilities that each member of the family takes in life. Both Mexican-American and Puerto Rican American value family as the basis for building social communities and reinforcing cultural identity and traditions. In this respect, many traditions are closel y connected with family celebrations, such as wedding, funeral, etc. Specific attention should also be given to the traditional roles of males and females since both cultures introduce make dominance whereas the role of women is confined to housekeeping and looking after children. Therefore, women are usually less engaged in career building. However, living in the United States, more and more females are ambitious about receiving education and promoting their career. Close resemblance of cuisines is also observed because both the Mexican and the Puerto Rican make use of beans and corns as the major ingredients in preparing traditional dishes, although there is certain divergence in the cooking process. Finally, there is a great similarity between the cultural communities in terms of religion and religious beliefs. Specifically, both cultures are connected to Romanic Catholicism. Moreover, both Mexican American and Puerto Rican Americans believe that religion play a pivotal role in o ther social spheres, including education, traditions, and family issues. Differences in Cultures Despite a great number of similarities between the two Hispanic groups under analysis, there are explicit differences between those that should be taken into the deepest consideration. Specifically, Mexican Americans have deep sense of cultural identity, as well as richness of culture, which is based on very old traditions originated from the Maya culture (Bravo, 2005). Despite that, they have quickly assimilated among the Native Americans and have become the largest minority group in the United States. In contrast, Puerto Rican Americans are more affiliated to their roots and, therefore, they rarely call themselves as American. Being proud of their culture, this people is more oriented on preserving their original root. As a result, the process of assimilation is quite difficult. Though Hispanic cuisine is quite similar, certain discrepancies between Mexican and Puerto Rican cuisine can be found. Hence, the Mexican diet takes roots from Spanish, Indian, and French influences whereas Puerto Rican is more based on West African flavors, such as increased popularity of coffee and cocoa beans. Regarding language, Puerto Rican speck Castilian Spanish whereas Mexican Americans a â€Å"pure† Spanish language. Despite the differences, both languages have quickly assimilated among the American speakers and, as a result, a great number of new words and accents have emerged. Three Approaches to Using Information in Classrooms Regarding the above-presented analysis and synthesis of primary and secondary resources, it can be stated that both sub-cultural are rich in traditions, cultures, and celebrations, which should be learned to the meet the global requirements. First, living in the era of internationalization, cultural diversity issues have acquired great importance. Therefore, the found information can be used in such lessons dedicated to the conflict management, gl obalization, communication and mass media. For instance, learning more about family structures of both Puerto Rican Americans and Mexican Americans is significant because it allows to learn more about how to favor a socially appropriate environment for such people. Second, learning cultural differences can provide a better understanding of cultural exchange between American and Hispanic culture. In this respect, the found information can be used while studying different traditions of Hispanic people and how they affect American culture. For instance, how Mexican celebrations, such as the Day of Mexican independence, influence American customs. Cultural distinctions can be also viewed by studying the peculiarities of the Castilian Spanish language. spoken by Puerto Rican Americans, as well as how it influence the English language. Finally, the given study can provide a better understanding of the problems of discrimination and gender because these issues of higher importance of the c ultures in question. Issues of racial and gender discrimination can be applied to such disciplines as political science, sociology, and legal issues. Analyzing legal case studies presented above can provides students with a better picture that Hispanic groups experience while living in the United States. Personal and Professional Relevance Brief Overview of Methods While searching for the primary information, the following methods have been used: Introducing the keywords â€Å"Hispanic groups† , â€Å"Cultural awareness†, â€Å"Mexican American†, â€Å"Puerto American† to the search engine; Analysis of information with regard to the established topics; Using Internet, I have managed to find out Google images displaying traditional cuisine; Once the information have been gathered, it has been studies to find out common thematic nodes, that have presented above; Introducing common themes have been through analysis of differences and similarities. Primary and secondary data gathered have provides a full overview of all concepts necessary for meeting the demands of the research topic. Non-internet sources were found in the library achieves. Specific focus was made to the books revealing culture and history of the development of Hispanic groups. Importance of Sources The poetry represented by Soto and Espada are of paramount importance because they represent modern tendencies and influences in Mexican and Puerto Rican culture, as well as how these cultures are influenced by the American society. In particular, there primary documents are dedicated to discussing the urgent global problems and the way they affected cultural minority groups, including the spread of mass culture, childhood obesity, and protection of human rights and freedoms. Other resources, such as pictures, and governmental documents, reflect how Hispanic culture can influence the American one. Analysis and Synthesis of the Information While gathering primary and second ary information, secondary resources have been gathered first to get a general idea of the main peculiarities of both cultures. As soon as the basic features of each culture have carefully been considered, a shift has been made to searching for primary resources related to Mexican and Puerto Rican culture. It has been found that all the materials found reveal increased cultural awareness and aspiration to maintain cultural identity. Once all sources have been gathered, I have highlighted the part that referred particular to the themes being investigated – language, family structure and traditions, and religion. Once I have looked through the primary sources, I found evidence in secondary sources displaying similar topics. I used notes and underlined the parts that related specifically to the topics. Importance of the Report for Teaching From a personal perspective, learning more about different cultures is important because it provides a wider insight into a better understand ing about what influence it would have for your culture. Besides, knowledge of host cultures can provide you with information of how to act in a conflict situation in case cultural discrepancies come to the forth. From a professional perspective, learning techniques largely depend on the way teacher can provide students from different cultural backgrounds with knowledge. In particular, cultural differences, including family background, religion, and language peculiarities should be taken into consideration because it will significantly enrich teachers’ experience while presenting materials for such linguistic and historical disciplines. Learning more about Hispanic culture is paramount because it will contribute to a more successful communication at a global level. Alternatively, ignorance of minority cultures can lead to conflict and misunderstanding, which prevents the American society from achieving social and economic welfare. Hence, the study of peculiarities of social a nd family roles performed by the representatives from different cultures is indispensible for establishing effective communication and cooperation between ethnic groups. References Primary Sources â€Å"El Pan Nuestro de Cada Dia† [image] (n. d.). Retrieved from https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiunmZ3VxO37d-icX21WXIMw86e7rwx0UU_XtH4dsPkzLksI-E_60A6asKvObpSEd0ltbIUv6nOjfrFWlSVt7YLFWfSzcMxVpVn02aCLw8R7mpBu81ZJEzu_mx8JqhcqdOXPEwmkqML-XIU/s1600/Picture+037+-+FINAL.jpg Association of Mexican-American Educators, et al., v. The State of California and the California Commission on Teacher Credentialing (1996). United Stated Courts of Appeals for the Ninth Circuit. Retrieved from: justice.gov/crt/about/app/briefs/amae.pdf Espada, M. (2010-2012). Coca-Cola and Coco Frio. MartinEspada.net. Retrieved from martinespada.net/Coca-Cola_and_Coco_Fr_o.html Mendez, M. (1992). Pilgrims in Aztlan. US: Bilingual Press. Rosello, P. (n. d.) Commonwealth Puerto Rico Findings Letter. The United States Department of Justice. Retrieved from justice.gov/crt/about/spl/documents/prjuvfind.php Soto, G. (199 5, August). Getting Ahead. Poetry Foundation. p. 268. Retrieved from: poetryfoundation.org/poetrymagazine/browse/166/5#20604520 Secondary Sources Bravo, A. (2005). Mexican-Americans: A Culture of Struggle, Dignity, and Survival. CS P, 3(2), 157-163. Bryan, N. (2004). Puerto Rican Americans. NY: ABDO Publishers. Countries and Their Cultures (2012). Puerto Rican Americans. Retrieved from everyculture.com/multi/Pa-Sp/Puerto-Rican-Americans.html Garcia, A. M. (2002). The Mexican Americans. CT: Greenwood Publishing Group. Mexican Americans in the Columbia Basin (n. d.). Historical Overview. Retrieved from http://archive.vancouver.wsu.edu/crbeha/ma/ma.htm Ohio State University. (2010a). Cultural Diversity: Eating in America, Mexican-American. Family and Consumer Sciences. Retrieved from https://docs.google.com/viewer?a=vq=cache:FACB6Wc07JgJ:ohioline.osu.edu/hyg-fact/5000/pdf/5255.pdf+cultural+diversity+eating+in+america+mexican-americanhl=engl=kepid=blsrcid=ADGEESimMq_flZDh9iEWzWpeK8iIea jzaGu8klVaesjgW5TuMRwWJ8asHSP1jm1UO1FNjM0CuiO6Ml0LvzfGi8TMDNeKjumlx2lYrHgkzbEUuXhqgPbWBGDJmbHralgaCIH7Oos_iZ4Bsig=AHIEtbS1-mCjiry9caMgHd9p-VR3H43YhA Ohio State University. (2010b). Cultural Diversity: Eating in America, Puerto-Rico Americans. Family and Consumer Sciences. Retrieved from Taus-Bolstad. (2004). Puerto Ricans in America. NY: Lerner Publications. USA Census Bureau. (2011). State and County quick facts. Retrieved from census.gov/aboutus/contacts.html Williams, N. (1990). The Mexican American family: tradition and change. CA: Rowman Littlefield. Retrieved from https://books.google.com/books?id=Vfomj3aqBT8Cpg=PA15lpg=PA15dq=Mexican+American+family+arrangementsource=blots=pX0jza3yjdsig=xf0RNOgliX-VkNb2FTFfax1Gr44hl=enei=SxXmTrypH5LN4QShzMWrBQsa=Xoi=book_resultct=resultresnum=1ved=0CCIQ6AEwAA#v=onepageq=Mexican%20American%20family%20arrangementf=false

Thursday, March 5, 2020

Marilyn Monroe Sings Happy Birthday to JFK

Marilyn Monroe Sings Happy Birthday to JFK On May 19, 1962, actress Marilyn Monroe sang â€Å"Happy Birthday† to U.S. President John F. Kennedy during an event celebrating JFK’s 45th birthday at the Madison Square Garden in New York City. Monroe, wearing a skin-tight dress covered in rhinestones, sang the ordinary birthday song in such a sultry, provocative manner that it made headlines and became an iconic moment of the 20th century. Marilyn Monroe Is â€Å"Late† Marilyn Monroe had been working on the movie Something’s Got to Give in Hollywood when she took a plane to New York to participate in President John F. Kennedy’s birthday celebration at Madison Square Garden in New York City. Things had not been going well on the set, mostly because Monroe had been frequently absent. Despite her recent illnesses and trouble with alcohol, Monroe was determined to make a grand performance for JFK. The birthday event was a Democratic Party fundraiser and included many famous names of the time, including Ella Fitzgerald, Jack Benny, and Peggy Lee. Rat Pack member (and JFK’s brother in law) Peter Lawford was the master of ceremonies and he made Monroe’s famous lateness a running joke throughout the event. Several times, Lawford would introduce Monroe and the spotlight would search the back of the stage for her, but Monroe would not step out. This had been planned, for Monroe was to be the finale. Finally, the end of the show was near and still, Lawford was making jokes about Monroe not appearing on time. Lawford stated, â€Å"On the occasion of your birthday, the lovely lady who is not only pulchritudinous [breathtakingly beautiful] but punctual. Mr. President, Marilyn Monroe!† Still no Monroe. Lawford pretended to stall, continuing, â€Å"Ahem. A woman about whom, it truly may be said, she needs no introduction. Let me just say†¦here she is!† Again, no Monroe. This time, Lawford offered what seemed to be an impromptu introduction, â€Å"But I’ll give her an introduction anyway. Mr. President, because in the history of show business, perhaps there has been no one female who has meant so much, who has done more†¦Ã¢â‚¬  Mid-introduction, the spotlight had found Monroe at the back of the stage, walking up some steps. The audience cheered and Lawford turned around. In her skin-tight dress, it was hard for Monroe to walk, so she scampered across the stage on her tiptoes. When she reaches the podium, she rearranges her white mink jacket, pulling it close to her chest. Lawford put his arm around her and offered one last joke, â€Å"Mr. President, the late Marilyn Monroe.† Monroe Sings â€Å"Happy Birthday† Before exiting the stage, Lawford helped Monroe remove her jacket and the audience was given their first full glimpse of Monroe in her nude-colored, skin-tight, sparkly dress. The huge crowd, stunned but excited, cheered loudly. Monroe waited for the cheering to die down, then placed one hand on the microphone stand and started singing. Happy birthday to youHappy birthday to youHappy birthday, Mr. PresidentHappy birthday to you By all accounts, the usually somewhat boring â€Å"Happy Birthday† song had been sung in a very provocative way. The whole rendition seemed even more intimate because there had been rumors that Monroe and JFK had been having an affair. Plus the fact that Jackie Kennedy was not present at the event made the song seem even more suggestive. Then She Sang Another Song What many people don’t realize is that Monroe then continued with another song. She sang, Thanks, Mr. PresidentFor all the things you’ve done,The battles that you’ve wonThe way you deal with U.S. SteelAnd our problems by the tonWe thank you so much Then she threw her arms open and yelled, â€Å"Everybody! Happy birthday!† Monroe then jumped up and down, the orchestra began playing the â€Å"Happy Birthday† song, and a huge, lighted cake was brought out from the back, carried on poles by two men. President Kennedy then came up onto the stage and stood behind the podium. He waited for the massive cheering to die down and then began his remarks with, â€Å"I can now retire from politics after having had ‘Happy Birthday’ sung to me in such a sweet, wholesome way.† (Watch the full video on YouTube.) The whole event had been memorable and proved to be one of the last public appearances of Marilyn Monroe – she died of an apparent overdose less than three months later. The movie she had been working on would never be finished. JFK would be shot and killed 18 months later. The Dress Marilyn Monroe’s dress that night has become nearly as famous as her rendition of â€Å"Happy Birthday.† Monroe had wanted a very special dress for this occasion and so had asked one of the finest costume designers of Hollywood, Jean Louis, to make her a dress. Louis designed something so glamorous and so suggestive that people are still talking about it. Costing $12,000, the dress was made of a thin, flesh-colored souffle gauze and covered in 2,500 rhinestones. The dress was so tight that it had to be literally sewn onto Monroe’s naked body. In 1999, this iconic dress went up for auction and sold for a shocking $1.26 million. As of this writing (2015), it remains the most expensive piece of clothing ever sold at auction.

Monday, February 17, 2020

The History Of Christopher Columbus Essay Example | Topics and Well Written Essays - 750 words

The History Of Christopher Columbus - Essay Example Prior to hardcore revelations made by Bigelow regarding the extraordinarily respectful public hero Columbus, the American nation strongly believed that Columbus was the courageous navigator who took great pains to travel around the world and discover the land of America, where he found the local people to be extremely co-operative, friendly, and understanding. The fresh and riveting information introduced by Bigelow in his revisionist history based on the voyage made by Columbus in 1492 has turned many persons’ heads and rustled up hot debates regarding which version of the voyage made by Columbus is weighty and credible, the old traditional one or the new not-so-pretty version. Comparing the conventional and modern versions regarding Columbus’s historical journey, one remains dumbfounded as to what to believe and what to reject as a fake piece of information. If on one hand, the conventional historical version presents an extremely noble, well-mannered, compassionate, and heroic version of Columbus, then on other hand, the modern version introduced by Bigelow is enough to fervently shake one’s beliefs about various actions made by Columbus to the point that one starts seeing oneself as a submissive fool, who readily took what was taught in the schools at mere face value. Traditional historical version is so designed as to overlook all the deficiencies in Columbus’s character and present him as a man of larger-than-life vision who was dedicated to the native residents of America and treated them with remarkable dignity, while taking great care to give them their space so that they could live their lives the way they were prior to the di scovery and arrival of Columbus and his men. Bigelow claims that first of all, the word discovery is in itself a laughably loaded word that does not relate in any way to Columbus, who was just travelling for personal gain and certainly ambitious to search for riches and gold that could be enjoyed by him and his heirs. It was just a mater of co-incidence that he came across the land which was to be named America later. Columbus’s main intention never remained traveling for the sake of discovery, rather he travelled in an order to search for ways that could make him powerful. T hunger for power and money is just proved by the way Columbus and his men treated the native residents of America. Columbus forced the native people to choose him as their governor and unjustifiably demanded 10% share in everything that was shipped to Spain. It was Columbus who actually initiated the slave trade and like a brutal tyrant that he was, demanded large amounts of gold from the native people. The conventional and modern historical versions differ so hugely that one finds oneself entrapped between the two utterly opposite schools of thought. Speaking of Columbus, (Bigelow) says that â€Å"he also deserves credit for initiating the trans-Atlantic slave trade, albeit in the opposite direction than we’re used to thinking of it.† In an attempt to get more and more students acquainted with the modern version of Columbus’s history, Bigelow lays stress on the fact that taking any piece of information at its face value is a highly detestable attitude which should be despised by every student. Bigelow encourages students to explore and contemplate at length nearly every widely accepted belief because only in this way, fresh and crisp facts can be exposed before the public. He deliberately chose the historical issue of Columbus and his actual intentions because he knew this would prove to be the most interesting way to get hold of the

Monday, February 3, 2020

Midterm exam Essay Example | Topics and Well Written Essays - 500 words

Midterm exam - Essay Example were primarily formed to support the rebuilding processes of the nations and provide a world forum that can provide mediation. The central banks play critical role and national political and economic agenda main revolved around low interest rates, regulation of industries, labor unions to strengthen the business environment with the countries. Neo-liberalism, on the other hand, can broadly be defined in terms of emerging new economic paradigms in the changing socio-political scenario across the world that favors opening of domestic market for global business powers. But 1975 onwards, the world economy has increasingly become more market driven and trade across geographical regions has become more attractive to developed and developing countries. In the new-liberalism era, the economic conditions had drastically changed through de-regulation of industries, privatization and curb on union power. America came into the forefront of global political and economic front. With Ronal Reagan, as President of America in 1980, the demise of old economic order became a certainty. The role of central bank was significantly curbed and privatization became the major propellant of new economic order. The strong economy and advanced stature of United States, subsequently, made sure the success of US Dollars as Global Currency. This system greatly facilitated international trade and investment but restricted the capital movement so as to maintain certain extent of control by few dominant countries (Harvey, 2005). The advent of neo-liberalism primarily relied on economic liberalization. It promoted more capitalistic approach that favored the rich and made the poor nations as the scapegoat for getting exploited by the developed countries and multi-nationals. The monopoly of American influence in all the leading international financial institutes like World Bank and IMF, have followed the American

Sunday, January 26, 2020

Use of Irony in Young Goodman Brown

Use of Irony in Young Goodman Brown In the short stories Rip Van Winkle, Young Goodman Brown and The Cask of Amontillado, the authors made use of irony which indicated mockery of something or someone in different ways. Washington Irving used so much irony in his short story Rip Van Winkle. The title character is a youthful married Dutch American who has a kind and generous nature. The main character is located in Catskill Mountains of New York way before the American Revolution. Reluctant to profitable labor, the character prefers rambles within the mountains, sitting under the shade gossiping with his buddies moreover, playing with the community children (Irving 105). Washington develops the thesis of the story by use of irony. After meandering with his gun together with Wolf, his close companion, Rip trails himself into the higher parts of the mountains. Soon afterwards, Rip stumbles upon a stranger who was moving what looked like a barrel of liquor. Consequently, with the aid of the Hollands, moreover a whole day of mountain climbing, Rip falls into a solemn, deep slumber. Nevertheless when he wakes up, Rip does not know how long he has been sleeping or where both of his friends have gone off too. He woke up twenty years later, as an aged man and strolls back to his village; he is amazed by the transformations that have occurred. After some commotion, he is joined with his grown-up daughter and her children. The irony is further noticed in Rips coldness to Dame Van Winkle. He was bossed and chided, but he was satisfied. The owner of the bar, Nicholas Vedder dominated the conversations and views of the junto symbolize the colonial governors selected by the Crown. Even as he rarely spoke, his authority was constantly present. This reflects the inactive position the governors accommodated political affairs, as well as the colonists substantial respect for them. (Irving 109) Another irony to reflect on is the ways wherein Irving anticipates lots of of Thoreaus thoughts. Long prior to the retreat to Walden Pond, Washington introduces Rip Van Winkle as a happy mortal, of idiotic, well-oiled characters, who take the humanity easy, eat brown bread or white, any that can be got without difficulty, and would rather go hungry on a penny than labor for a pound which is very ironic. Nathaniel Hawthornes story Young Goodman Brown is saturated, with irony. At the beginning of the narrative a youthful Puritan husband leaves at sunset from his youthful Puritan wife. Faith, like the wife was suitably named, pushes her own appealing head into the street, allowing the wind to play with the pink ribbons which were on her cap, whereas she called to Goodman Brown. Nathaniel Hawthorne says that Faith is appropriately named, an ironic declaration since she later on in the evening, is being acknowledged into the congregation of devil-worshippers as a fresh convert to the evil cluster. The description of faith as pretty as well as her putting on pink ribbons, as a sign of cheerful outlook on life and youthful innocence is also ironic (Hawthorne 405). There is more irony in the Goodman Browns dialogue with the old man. He at first clings to his apparent purity of lineage furthermore claims that his father and grandfather had not deviated from the Puritanical lineage. The old man discovers that not only were his relatives acquainted with the abnormal path but well familiar the devil on an individual level. The irony inside this passage is seen when the devil assists Goodman Browns ancestors during the persecution of Indians and Quakers. There is definitely irony in the fact that it is the majority of the pious church people who emerge at the evil gathering inside the forest. The aged woman who bypasses Young Goodman Brown as well as the devil on the trail is recognized by Brown as the woman who taught her catechism. There is a remarkable irony to this vow because when Goodman Brown came back at dawn; he cannot look at his wife with the identical faith he had before. After Goodman Brown lastly met with the Devil, he asserts that the cause of his lateness was because Faith kept him back awhile. This proclamation has a double implication because his wife actually prevented him from being punctual for his meeting as well as his faith to God expressively delayed his gathering with the devil as well (Hawthorne 409). All through The Cask Of Amontillado, Poe uses dramatic and verbal irony to construct suspense, foreshadow the ending, and moreover add a touch of ghoulish humor. For instance the title cask meaning wine barrel is resulting from the same root statement used to structure casket, which means coffin. Accordingly, the cask symbolically represents Fortunatos casket. Secondly, Fortunatos name which is Italian implies good fortune, luck. Nevertheless, Fortunato is so unfortunate because he was heading to his death. Another element of irony is Fortunatos Costume. He dresses as a court clown. His celebratory outfit contrasts with the terrible fate that awaits him. Moreover, occasionally, the bell on top of his cone-shaped hat tinkles a nice comic feeling from Poe. Another aspect of irony is when Fortunato asks Montresor if he is a mason, signifying a member of the fraternal array of Freemasonry. It is ironic that Montresor says he is certainly a mason. Nevertheless, he is using the expression to mean a craftsman who constructs buildings using (Cecil 41). Poe also uses irony repeatedly in the dialogue. For instance, when Montresor meets Fortunato, he tells him that he is lucky they met. Later on, when Montresor pretends to be worried about Fortunatos scything cough as they go down into the tombs, he tells him that they have to go back because his health is precious. Fortunato tells him not to worry because the cough will not kill him. Montresor quickly agrees that the cough will not kill him; the audience can nearly see a devilish gleam within Montresors eyes, because he surely knew that Fortunato will die. He later opens a bottle of wine furthermore toasts Fortunato to his long life. In all the three short stories the authors used dramatic, verbal and situational irony to convey message to the audience which came out amazingly. Irony is an essential way in which authors can develop deeper stages of meaning in a text. Furthermore it also is a very efficient way of involving and engaging a reader in a text.

Saturday, January 18, 2020

Curleys wife presented and developed Essay

John Steinbeck, in his novella ‘Of Mice and Men’, deliberately presents Curley’s wife as a character with no appellation, this pushes away the relationship between her and the reader. The fact that she has no appellation indicates to us that she is a generalised woman; a typecast of women in the 1930’s America, in which women were expected to stay at home to fulfil their housewife ‘duties’. Her appellation also indicates to us that she is the property of Curley, this dehumanizes her, she is thought of as an object. Steinbeck first presents Curley’s wife as a flirtatious ‘tart’, and then develops her as a dangerous, vulnerable, and fragile character. Steinbeck ensures that the reader feels unsympathetic towards her in the inception, and throughout the novella, and then allows the reader to feel slightly sympathetic just afore her death, as we find out she is just a lonely woman full of dreams that are shattered. This is deliberately done once it is too late, her death is inevitable. This means that the audience’s sympathy will always lie with Lennie, not Curley’s wife. In chapter 2, Candy introduces George and Lennie to the ranch, after Curley has his moment with George and Lennie, Candy states â€Å"wait’ll you see Curley’s wife†¦She got the eye†, immediately Candy’s description of her reveals (before the reader even meets her) that she is flirtatious and interested in men although she has a husband, and therefore she is a ‘tart’. This is dangerous since she is married to the boss’s son, who is always looking for an altercation. Candy also reveals that Curley has a â€Å"Glove fulla Vaseline†, this immediately portrays Curley’s wife as a sexual object. Indeterminately, she is first presented as a flirtatious ‘tart’, and a sexual object; these could potentially equal disaster in the future. Steinbeck has purposely introduced her in this way as he desires us to hate and possess no sympathy for her†¦ except for Lennie. In this novella, Curley’s wife is referred to as a ‘tart’ because of her flirtatious behaviour, and also, she is described as a ‘girl’ as she is immature and vulnerable. However, the reader does not think of her as a ‘girl’, as she has â€Å"full, roughed lips†, â€Å"eyes, heavily made up†, and ‘red’ fingernails. The reader thinks of her as a woman, from the way her presence is described, and also the way she acts. Curley’s wife is at times, a viciously unpleasant woman. In chapter 4, she enters Crooks Bunk house, after she is confronted by the three grown men, Lennie, Candy, and Crooks, she reduces Lennie and Candy to ‘toneless†¦nothing’. Then refers to Crooks as a ‘Nigger’. This is extremely shocking, particularly to a modern audience whereas in the 1930’s the audience would find it conventional. Curley’s wife has deliberately picked on Crooks, as he’s complexion is described as black, and therefore socially weaker. Indeterminately, she has more power than him. This exposure of weakness ultimately concludes with Curley’s wife threatening to have Crooks ‘strung up’. The fact that she is threatening to lie, and cry rape, to have an innocent man killed for no appropriate reason, paints her in a profoundly negative light. After this, it makes Curley’s wife highly unpredictable throughout the rest of the novella as Steinbeck has instantly developed her from being a flirtatious ‘tart’, to being an evil woman, the reader cannot predict what she will be like further into the novella. After chapter 4, it emphasises how cruel Curley’s wife can be and turns the reader against her even more. In chapter 5, Curley’s wife seeks ‘attention’ (as she usually does) as she goes into the barn, she encounters Lennie. Her reaction after finding the ‘dead’ puppy is very serene, she isn’t shocked since she states â€Å"just a dead pup†; this makes her abnormal because a normal woman would not look at this situation from a neutral point of view. Further in chapter 5, the reader deduces that Curley’s wife is lonely as she states â€Å"I get awful lonely†; this makes the audience understand her even more because she is always seeking ‘attention’. After Curley’s wife convinces Lennie into speaking with her, she then talks about how she could have been a â€Å"Hollywood movie star† but had her letter stolen, and therefore her opportunity was taken. The reader realises that her that her dreams were destroyed; This links to the women in the 1930’s, as they also has aspirations that were not accepted. Curley’s wife believes that her mother stole her letter, as she states â€Å"I think my old lady stole it†; the word ‘think’ immediately tells the reader that she has no genuine evidence to prove this is true. Curley’s wife ultimately leads to her own necrosis as she tells Lennie to touch her hair; the word ‘touch’ immediately reminds the reader about the incident in Weed. After touching Curley’s wife’s hair, Lennie then starts to stroke her hair in amazement, Curley’s wife suddenly starts panicking whens she feels Lennie’s strength, and in grabbing her, Lennie breaks her neck by accident, causing instant death. After Curley’s wife death, the reader feels sympathetic towards her, as the reader recently finds out that she was just a lonely woman full of shattered dreams. As soon as Candy walks into the scene, the readers sympathy for the dead woman disappears as the reader realises that Lennie, George, and Cady’s American dream ‘have it all in one month’ is now no longer in reach, it has been destroyed. Curley’s wife has represented the death of dreams as she is the reason for this. Unlike Lennie, Curley’s wife had no excuse of being ‘mentally slow’ so should have controlled her herself and therefore it is her fault, the reader regrets having sympathy for her. Curley’s wife is a very unique character; she is not a typical 1930’s woman, as she is always outside of her house making her unable to carry out her ‘duties’, whereas a typical 1930’s woman would always stay at home fulfilling their housewife ‘duties’. Curley’s wife should have been interpreted as a typical 1930’s woman.