Saturday, November 30, 2019

Paul walker essay free essay sample

Paul Walker born in California in 1973, he made his bigscreen debut in the 1986 horror spoof â€Å"Monster in Your Closet. † After appearing in several television shows in the 1990s, including Charles in Charge, Whos the Boss? and The Young and the Restless, Walker gained attention with a role in the 1999 film Varsity Blues, and his TV days were officially behind him. After working in teen movies such as Shes All That and The Skulls. Walker got his breakthrough role in 2001 with The Fast and the Furious, which would become his star vehicle and keep him busy through four sequels and a short prequel. The Fast and the Furious which established Walker as an action-film actor, and he went on to appear in several films in the genre, including Takers, Hours and Vehicle 19. Walker died in a car accident on November 30, 2013, at age 40. In 2001, Walkers career hit overdrive when he landed a leading role alongside up-and-comer Vin Diesel in The Fast and the Furious. We will write a custom essay sample on Paul walker essay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A film that paid homage to road films of the 1970s, The Fast and the Furious brought Walker to new heights of fame on the way to box-office receipts of more than $200 million. With this money he donated most of it to various charities and third world countires that were in need of the extra help. In 2012, Walker signed on to film The Fast and the Furious 6, keeping the series going. While not filming, Walker was active in Reach Out Worldwide, a nonprofit organization he formed in 2010 to bring aid to regions devastated by natural disasters. Paul Walkers death in a car crash is a tragedy, but the good deeds he did for others will live on. Walkers generosity in a random act of kindness recently came to light. In 2004, the actor stopped by jewelry store Bailey Banks Biddle in Santa Barbara, CA, and encountered a military couple browsing the engagement rings. Kyle Upham, a soldier who was about to be deployed on his second tour of duty in Iraq, was in the store with his wife, Kristen. He wanted to upgrade her ring to something nicer. One engagement set caught Kristens eye, but it was $9,000 way out of their budget. I noticed there was someone else in there, but didnt give it much thought, Kristen recalled to CBS in Los Angeles. We started looking at rings and whatnot and he kept saying, Go bigger and I kept saying, No, look at the prices. The newlyweds struck up a conversation with Walker and soon realized they were speaking to the star of The Fast and the Furious actor. Walker seemed even more impressed with Kyles line of work. After there conversation the couple left the store without purchasing anything. While heading out the salesperson ran out of the store calling the couple back stating that the 9000$ ring is freee of charge. The salesperson didnt reveal to the couple who purchased the ring for them, but decided to come public with the truth after Walkers death, thinking it would be a nice story to share with the world. He called the manager and he said, Um, the ring that those people are looking at put it on my tab,' she said. Soon after that, he just left. To do something like that to a perfect stranger is just unbelievable, King adds. The couple, who is still happily married, plans to hand the ring down to the next generations in their family. Kristen said, Its still to this day the most generous thing anyone has ever done for me. This was just one of the remarkable things that Walker did out of the kindness of his heart. Paul Walker created charities and organizations to help others in need of help due to natural disasters. Paul Walker founded the organization, which works with local experts to provide disaster relief, in January 2010, after Haiti was devastated by an earthquake. On the day of his death, Walker was attending a holiday toy drive for the organization. Even after his death his fellow actors of â€Å"Fast and Furious† and also family continues to donate and encourages people to donate to Paul Walkers organization. With the passing of Paul, the world has lost a man who spent a great deal of his life in service to others, stated the chairman of Universal Pictures, Donna Langley. His organizations reaches worldwide and collects proceeds everywhere. Paul Walker dedicated himself to helping those blighted by natural disasters across the world. He is seen in Haiti and Chile working for the charity he set up, â€Å"Reach Out Worldwide† (his organization), most recently secretly plowing money into the tornado-struck Philippines. â€Å"We lost one of the good ones, but he’s left a lasting legacy,† stated the charity’s operation manager. Over the last three years, Paul was on the ground in destroyed villages of Haiti, Chile and Alabama and set up hospitals to areas destroyed by tsunamis and tornadoes, much to the amazement of local people and too many of his fans. Paul saw what was happening in some poorer countries and wasn’t content to donate to the Red Cross, but got ROW started. He would literally get on the phone and kick down the doors to get doctors, nurses, specialists, and put together a team to get out to disasters. Haiti was the first one. After the earthquake hit Haiti in January 2010, Paul and a team went straight out there to help save lives. The things that Paul Walker did were very remarkable! Paul Walker random acts of kindness were what really made him amazing and nice hearted. While not filming, Walker was active in Reach Out Worldwide, a nonprofit organization he formed in 2010 to bring aid to regions devastated by natural disasters. Walker died in a car accident on November 30, 2013 at the age of 40. Walker was in Santa Clarita, California to attend a charity event for Reach Out Worldwide to benefit victims of Typhoon Haiyan in the Philippines. He was reportedly in the passenger seat of a Porsche when his friend who was driving lost control, crashing the vehicle into a tree. The car was engulfed in flames and both individuals were pronounced dead at the scene of the accident. Even in his death he was still trying to help others and a country that needed help. Paul walker will surely be remembered for his generosity and giving natures, alive and even after his death.

Tuesday, November 26, 2019

Investigating a Sequence of Numbers Essay Example

Investigating a Sequence of Numbers Essay Example Investigating a Sequence of Numbers Essay Investigating a Sequence of Numbers Essay In this Mathematics Portfolio, I am going to investigate a sequence of numbers by mathematical methods which I have learnt in the I.B. Mathematics HL course. Throughout the investigation, I will include all my workings in order to let examiners know exactly how I come up with the answers. A sequence is a set of numbers with a definite order. A series is a sum of a sequence. The sequence of numbers {an}?n =1 is: 1 x 1!, 2 x 2!, 3 x 3!, The two signs outside the bracket of an represent the range of the sequence. The bottom one is where the sequence begins and the one above is where it should end. Since it is stated the sequence starts from n = 1, therefore the first term, a1 = 1 x 1!, the second term, a2 = 2 x 2! and the third term, a3 = 3 x 3! The ! sign after the numbers is called a factorial notation. The notation basically means the product of all the numbers from 1 to the number with the notation. For example: 3! = 1 x 2 x 3 = 6 5! = 1 x 2 x 3 x 4 x 5 = 120 ? n! = 1 x 2 x 3 x 4 x x n 2! x 3 = 1 x 2 x 3 = 3! = 6 ? n! x (n + 1) = (n + 1)! Going back to the investigation, to find the nth term of the sequence, the steps are shown below: a1 = 1 x 1! = 1 a2 = 2 x 2! = 2 x 1 x 2 = 4 a3 = 3 x 3! = 3 x 1 x 2 x 3 = 18 a4 = 4 x 4! = 4 x 1 x 2 x 3 x 4= 96 . . . ? an = n x n! This is because looking at the sequence, I noticed that there is a similarity in each term. For an, when n = 1, the calculation will be 1 x 1!; when n = 2, the calculation will be 2 x 2!. Therefore from this pattern, the formula to find the nth term is: an = n x n! Let Sn = a1 + a2 + a3 + a4 + + an The term Sn means the summation of all the numbers in the sequence from the first term to the nth term. The mathematical explanation is shown above. For example, a sequence of numbers is 1,2,3,4,5,6,. S1 = 1 S2 = 1 + 2 = 3 S6 = 1 + 2 + 3 + 4 + 5 + 6 = 21 In the sequence that I am investigating, I am told to find Sn for different values of n: S1 = a1 = 1 x 1! = 1 S2 = a1 + a2 = 1 x 1! + 2 x 2! = 1 + 4 = 5 S3 = a1 + a2 + a3 = 1 x 1! + 2 x 2! + 3 x 3! = 1 + 4 + 18 = 23 S4 = a1 + a2 + a3 + a4 = 1 x 1! + 2 x 2! + 3 x 3! + 4 x 4! = 1 + 4 + 18 + 96 = 119 S7 = a1 + a2 + a3 + a4 + a5 + a6 + a7 = 1 x 1! + 2 x 2! + 3 x 3! + 4 x 4! + 5 x 5! + 6 x 6! + 7 x 7! = 1 + 4 + 18 + 96 + 600 + 4320 + 35280 = 40319 By using the information above, I will try to conjecture an expression for Sn. I am going to put all the datas on a table to see if there is any significant discovery. n 1 2 3 4 5 6 an 1 4 18 96 600 4320 Sn 1 5 23 119 719 5039 n! 1 2 6 24 120 720 From the table, I noticed that an is always the difference between n! and (n + 1)! The mathematical expression is: an = (n + 1)! n! Since (n + 1)! seems useful for the investigation, I did another table too: n 1 2 3 4 5 6 (n + 1)! 2 6 24 120 720 5040 Sn 1 5 23 119 719 5039 Looking at the row of (n + 1)! and Sn, there is a constant difference of 1 between them. Therefore I added the row of Sn to the second table (in black). When n = 1, (n + 1)! = 2 ; Sn = 1 n = 2, (n + 1)! = 6 ; Sn = 5 . . . n = 6, (n + 1)! = 5040; Sn = 5039 According to what I have discovered, Sn can be express mathematically in this way: Sn = 1 x 1! + 2 x 2! + 3 x 3! + + n x n! = (n + 1)! 1 To prove that my expression is right, I am using mathematical induction to verify the given result: Pn : 1 x 1! + 2 x 2! + 3 x 3! + + n x n! = (n + 1)! 1 Pk : 1 x 1! + 2 x 2! + 3 x 3! + + k x k! = (k + 1)! 1 If Pk+1 is true the result should be (k + 1 + 1)! 1 = (k + 2)! 1 Pk+1 : 1 x 1! + 2 x 2! + 3 x 3! + + k x k! + (k + 1) x (k + 1)! = (k + 1)! 1 + (k + 1) x (k + 1)! = (k + 1)! [(k + 1) + 1] 1 = (k + 1)! (k + 2) 1 = (k + 2)! 1 ? Pk+1 is true. P1 : LHS = 1 x 1! = 1 RHS = (1 + 1)! 1 = 1 ? P1 is true. ? Pn is true for all positive integers n. Already I have derived the formula an = (n + 1)! n! from the first table. But there is still another way to derive it just from the original formula: an = n x n! = (n + 1 1) x n! = (n + 1) x n! n! = (n + 1)! n! Sn = a1 + a2 + a3 + a4 + a5 + + an = (1 + 1)! 1! + (2 + 1)! 2! + (3 + 1)! 3! + (4 + 1)! 4! + (5 + 1)! 5! + + (n + 1)! n! = 2! 1! + 3! 2! + 4! 3! + 5! 4! + 6! 5! + + (n + 1)! n! At this step, I can see that many numbers cancel out each other except (-1) and (n + 1)! as it goes on to the last term: = -1! + (n + 1)! = (n + 1)! 1 Alternatively, I have used another method to prove of my conjecture for Sn: Sn = 1 x 1! + 2 x 2! + 3 x 3! + + n x n! = (n + 1)! 1 Let cn = an + an+1 According to what I have done before, an = (n + 1)! n! ? cn = (n + 1)! n! + (n + 1 + 1)! (n + 1)! = (n + 1)! n! + (n + 2)! (n + 1)! = (n + 2)! n! To simplify it: cn = (n + 2)! n! = (n + 2) (n + 1) (n!) n! = n! [(n + 2) (n + 1) 1] = n! (n2 + 2n + n + 2 1) = n! (n2 + 3n + 1) Tn = c1 + c2 + c3 + c4 + c5 + + cn To investigate Tn for different values of n, a table is drawn below showing all the values contribute to Tn: n 1 2 3 4 5 6 an : n x n! 1 4 18 96 600 4320 an+1 : (n + 1) x (n + 1)! 4 18 96 600 4320 35280 (n + 1)! 2 6 24 120 720 5040 (n + 2)! 6 24 120 720 5040 40320 n! 1 2 6 24 120 720 cn : (n + 2)! n! 5 22 114 696 4920 39600 T1 = c1 = 1 T2 = c1 + c2 = 5 + 22 = 27 T3 = c1 + c2 + c3 = 5 + 22 + 114 = 141 T4 = c1 + c2 + c3 + c4 = 5 + 22 + 114 + 696 = 837 T5 = c1 + c2 + c3 + c4 + c5 = 5 + 22 + 114 + 696 + 4920 = 5757 T6 = c1 + c2 + c3 + c4 + c5 + c6 = 5 + 22 + 114 + 696 + 4920 + 39600 = 45357 Tn 5 27 141 837 5757 45357 Looking at the column of (n + 1)!, (n + 2)! and Tn, when I add (n + 1)! to (n + 2)!, there is a constant difference of 3 between the sum and Tn. According to what I have found out, Tn can be express mathematically like this: Tn = (1 + 2)! 1! + (2 + 2)! 2! + (3 + 2)! 3! + (n + 2)! n! = (n + 1)! + (n + 2)! 3 Tn = c1 + c2 + c3 + c4 + c5 + + cn-1 + cn ? cn = (n + 2)! n! Tn = (1 + 2)! 1! + (2 + 2)! 2! + (3 + 2)! 3! + (4 + 2)! 4! + (5 + 2)! 5! + + (n 1 + 2)! (n 1)! + (n + 2)! n! = 3! 1! + 4! 2! + 5! 3! + 6! 4! + 7! 5! + + (n + 1)! (n 1)! + (n + 2)! n! At this step, I can see that many numbers cancel out each other except (-1!), (-2!), [(n + 1)!] and [(n + 2)!] as it goes on to the last term: = (n + 1)! + (n + 2)! 1! 2! ? Tn = (1 + 2)! 1! + (2 + 2)! 2! + (3 + 2)! 3! + (n + 2)! n! = (n + 1)! + (n + 2)! 3 In conclusion, throughout the investigation, I have used different methods to find out patterns of the sequences and successfully conjecture expressions for different sequences. Moreover, to prove the conjecture, I used not only by mathematical induciton, but also another method which I carried out for the last part. The 2 main conjectures I have made is: Sn = (n + 1)! 1 Tn = (n + 1)! + (n + 2)! 3 And both of the expressions are true for all positive integers n.

Friday, November 22, 2019

Stream of Consciousness Writing

Stream of Consciousness Writing Stream of consciousness is a  narrative technique that gives the impression of a mind at work, jumping from one observation, sensation, or reflection to the next seamlessly and often without conventional  transitions. Although stream of consciousness is commonly associated with the work of novelists including James Joyce, Virginia Woolf, and William Faulkner, the method has also been used effectively by writers of creative nonfiction  and is often referred to as freewriting. The metaphor of the stream of consciousness was coined by American philosopher and psychologist William James in The Principles of Psychology in 1890 and has been perpetuated to this day in the modern literature and psychology fields. Urgency and Presence in Stream of Consciousness Often used by creative writing teachers as a means to get the creative juices flowing for their students at the beginning of classes, a stream of consciousness writing exercises often ground writers in the presentness, the importance of a given subject or discourse. In creative fiction, a stream of consciousness may be used by a narrator to convey the thoughts or feelings going on in the head of a character, a writers trick to convince the audience of the authenticity of thoughts he or she is attempting to write into the story. These internal monologues of sorts read and transfer thought more organically to the audience, providing a direct look into the inner workings of a characters mental landscape. The characteristic lack of punctuation and transitions only furthers this idea of a free-flowing prose wherein the reader and speaker alike jump from one topic to the next, much like a person would when daydreaming about a given topic- one might start with talking about fantasy films but end up discussing the finer points of medieval costuming, for instance, seamlessly and without transition. A Notable Examplein Tom Wolfes Nonfiction Work Stream of consciousness writing isnt only for fictional works- Tom Wolfes memoir Electric  Kool-Aid Acid Test is packed full of beautiful, eloquent stream of consciousness which provides insight into the protagonists journey and story. Take this excerpt for example:   - Kesey has Cornel Wilde Running Jacket ready hanging on the wall, a jungle-jim corduroy jacket stashed with fishing line, a knife, money, DDT, tablet, ball-points, flashlight, and grass. Has it timed by test runs that he can be out the window, down through a hole in the roof below, down a drain pipe, over a wall and into thickest jungle in 45 seconds- well, only 35 seconds left, but head start is all that’s needed, with the element of surprise. Besides, its so fascinating to be here in subastral projection with the cool rushing dex, synched into  their  minds and his own, in all its surges and tributaries and convolutions, turning it this way and that and rationalizing the situation for the 100th time in split seconds, such as: If they have that many men already here, the phony telephone men, the cops in the tan car, the cops in the Volkswagen, what are they waiting for? why havent they crashed right in through the rotten doors of this Rat building In The Mythopoeic Reality: The Postwar American Nonfiction Novel, Masud Zavarzadeh explains Wolfes above use of stream of consciousness as the dominating narrative choice for this section of the nonfiction novel, saying the technical rationale for the use of such narrational devices in the nonfiction novel is the treatment of the subjectivity of the situation or person portrayed, as distinguished from the projected subjectivity (empathy) of the fictive novelist.

Thursday, November 21, 2019

Dante and The Inferno Essay Example | Topics and Well Written Essays - 500 words

Dante and The Inferno - Essay Example hat have the most masterful and creative way in attributing symbolic retribution for the sins are found in the second which is the sin of lust, seventh is the sin of violence and the ninth and last circle which is the sin of treachery. Dante and his friend Virgil found in the second circle people who were __ with lust when they were still alive. To their surprise, they found famous people in history who is wallowing in the second circle of hell. The famous people from history whom they found in the second layer of hell were the adulterers during their lifetime such as Helen of Troy and Cleopatra. They suffered together with the other people in the circle with a strong wind that refuses to abate giving them eternal trouble and without rest. This strong wind is symbolic of the restless sin of lust that made them commit sin during their lifetime and now haunts them as a retribution in afterlife When Dante reached the seventh circle, he found that this pit was filled with people who were violent when they were style alive. Again, he found mythological figures in history in the seventh circle of hell. There he found Dionysius I of Syracuse, Centaurus and others. This circle of hell however differed from the earlier circles because this hell has three sections – outer ring for the killers, middle ring for the suicidal and the inner right for the blasphemers. The retribution to those who are in the outer right is being dipped for all eternity in the river of boiling blood and fire. The retribution for the suicidal are being turned into food to harpies. Those who are in the inner rings are subjected to burning rain while being in a desert. As expected, Dante’s vortex of hell has the most colorful retribution. There he found Judas who betrayed Jesus with a kiss and other biblical figures such as Cain who murdered his son Abel. Again this is divided into Caina, Antenora, Tolomea and Giudecca where the retributions were being immersed in ice as they look

Tuesday, November 19, 2019

Dimensions of organisation structure & Technology Research Paper

Dimensions of organisation structure & Technology - Research Paper Example Nonetheless, Toyota experiences considerable difficulties with delegating its power to national plant branch representatives and managers. As a result, the effectiveness of change management and organizational processes within Toyota has little to do with technologies per se but implies the need to restructure the company’s organizational culture and values from the bottom. Toyota Motor Corporation is rightly considered as a gold standard of the automotive industry and a role model for other car manufacturers to follow (Bauer & Erdogan 2009). Organizational structure is believed to be one of the key factors of Toyota’s sustained commercial success. Even as its competitors were losing billions because of the recession, Toyota still managed to retain its position of a leader in the global car making industry. Recent advances in technologies contribute to Toyota’s organizational achievements and success. The organizational structure of Toyota is that of innovation, technologies, and change (Leonard 1997). With an emphasis made on just-in-time manufacturing, teamwork, and complex enterprise architectures, Toyota relies â€Å"on a series of interrelated and internally consistent choices that reflect the priorities and trade-offs in its competitive situation and strategy† (Hayes & Pisano 1994, p.18). Technologies predetermine the organiz ational structure and development pathways in Toyota; nonetheless, they do not secure the company from organizational and structural failures. That technologies are at the heart of the company’s organizational structure cannot be denied. Everything within the Toyota Corporation is built on the principles of just-in-time production (JIT). The latter is closely aligned with complex information systems and, simultaneously, guarantees that all elements of the company’s organizational structure operate to deliver raw materials and supplies at the time they are needed and used (Bauer & Erdogan 2009). JIT

Saturday, November 16, 2019

Information security Essay Example for Free

Information security Essay Most organizations today are adopting and integrating technologies in their production with an aim of improving production, efficiency, profitability and the competitive advantage in the market. This has been accelerated by the increasing globalization and innovation of new technologies which pose a major competitive threat to many organizations. Also, formulation of environmental standards as well as increased expectation on the standards and quality of goods and services by both the government and customers has also necessitated adoption of new technologies to ensure this is met. New technologies in use today like the web 2. 0 and also the new internet as well as wireless technologies have led to increased efficiencies as well as increased productivity for most organizations. However, despite the advantages which accrue from introduction and use of new technologies in organizations, they pose major security threats to an organization. Data hijack by criminals as well as terrorism threats are some of the challenges that organizations are facing during new technology implementation processes (Bazelon, Choi Canady, 2006). Security issues in regard to new technologies implementation in an organization Security is a top concern for most business since it may lead to destruction of a company’s reputation thus affecting the competitiveness of an entity. With increased globalization and increased terrorist threats, security risks have increased posing a major threat to most organizations. One of the major threats that companies face while implementing information technologies are the risk of losing or protecting sensitive data. Information technologies especially via internet and other wireless technologies are accessible globally which poses a major threat to an organization. Organizations hold private and sensitive information regarding their employees, production processes and also marketing strategies which are vital for competitive advantage. However, with technology implementation, and the dynamism in technology, such data may be accessed by unauthorized individuals causing a business great harm in terms of profitability. This also exposes the employees as well as an organization’s customers’ at risk of fraudulent activities via technologies. Information security experts insist that just like information networks operate or cross borders with no regard for the provincial and national boundaries, also security vulnerabilities and threats pass in the same way thus necessitating greater and stern security measures to ensure that the threats are minimized (Hinojosa, 2005). Another threat that organizations are facing is terrorist attacks and threats. Currently, there are many terrorist groups which operate globally and they employ high technologies to carry out their tasks and to harass businesses and employees as well as the customers. An increase in global terrorist organizations in the world that are connected via the new technologies poses a major security threats to most organizations in the world. Terrorists may not only be interested with soliciting the financial and production processes of an organization, but also the structural and day to days activities of an organization with an aim of identifying weak areas or points which could be used to attack an organization. This is made possible by new technologies which enable then to tamper the security measures taken by an organization to ensure that it is protected (Sussman, 2008). Phishing and data mining is also another information security risk that is faced by organizations during implementation of technologies in an organization. Phishing refers to the unauthorized use of personal information of another person which is obtained through networks. It also involves alteration of an individual’s computer software with an aim of obtaining the computer owner’s personal information by scrupulous individuals and for the purposes of defrauding the person or harming their reputation or career. With implementation of new technologies in an organization, the entity is enabled to sell its goods and services online and all the transactions are carried without having to meet the customer or the client. While making the payments, a client gives his private financial data depending on the mode of payment which he or she uses. Computer criminals have a way of tampering with or gaining access of such information which they can manipulate to make purchases while pretending to be the clients. The business thus faces a risk of being sued by a client on such grounds and for lack of adequate protection measures. This has increased the cost of implementing technology especially with different cases of security breach being reported today. Organizations are supposed to ensure that the private information of their clients and employees are well protected and that their privacy is upheld despite the cost this may involve (Ena, 2008). Risk of loss of important documents by an organization has also been a major security issue while implementing information technology. Apart from the risk of terrorist threats and phishing, an organization also faces the risk of losing vital information through dangerous programs such as the viruses which are transmitted via the internet and other networks. If such programs find their way to the computers and other technologies in a company, a company may risks losing most of its vital information as these programs corrupts the whole network system in an area. This could be dangerous for and organization as it may lead of reduced productivity, increased costs and reduced earnings (Blankespoor, 2005). With increased awareness of information security threats increasing in the world, the attackers have changed their tactics posing even a major threat to an organization. Most of the attackers are usually professional information technologists who invent new methods of accessing data from an organization despite the security measures taken. As mentioned earlier, technology is changing at a very high speed and so are the security threats to an organization. The dynamism of technology is a risk which cost organizations heavily as they try to keep pace with it. While implementing new technologies, organizations are also faced with the problem of testing the validity of the technology. Most of the cases involving security breach end up being the problem in an organization. IT companies exonerate themselves by arguing that lack of adequate security policies in an organization are the major causes of any cost that an organization may incur (Wallace, Lusthaus. Kim, 2005). Conclusion Information technology is a major strategy that has enabled most of the businesses to perform well in terms of growth and expansion. New technologies have been on high demand in the recent past especially as most organizations go global which necessitates networking. Technology improves the efficiency, effectiveness and the overall productivity of an entity. However, it poses major threats to the privacy of a company as well as its clients and employees. Stern security measures should be taken to ensure that technology implantation in an organization does not turn out to be more costly. This can be done though formulation of technology security policies and procedures to ensure privacy is upheld.

Thursday, November 14, 2019

Working at The Bindery Essays -- Expository Process Essays

Working at The Bindery I have a dream. I have a dream about getting a doctorate degree in music. Well, to get that far, I know I must get through undergraduate school first, let alone graduate school, and so on. Last year I realized that I needed a job that paid much more than minimum wage if I was going to afford to go to college. I then heard about The Bindery from a friend in the same situation as I was. I filled out an application, went to the orientation a few weeks later, and then discovered that working there would be no ordinary job. I will now briefly explain how the factory works and then show you the "ropes" of working in my department.   Ã‚  Ã‚  Ã‚  Ã‚   There are two major departments at The Bindery: the press and the bindery. The press cuts large rolls of paper into smaller ones. The rolls of paper are trimmed down to size for books, and all words and graphics are printed here. The paper is then folded by machinery into forms (groups of pages in books). Bundles of forms are held together with a piece of wood at each end and tied with plastic string. The bundles are then loaded onto skids. After the skids are prepared, the bundles are shipped to the work-in-progress area (where you are) by fork trucks. The skids of bundles are placed in front of each pocket, where forms are placed to feed into the machine that binds the paper into books. Pockets are parts of machinery about 12-15 feet long and are at waist or stomach height. The machine takes one form from each pocket and groups them all together to make a book. It runs very quickly, and it can make thousands of books in minutes. Five lines are in th e bindery department, therefore, five books can be made at the same time.   Ã‚  Ã‚  Ã‚  Ã‚   First, I will e... ...r workstation so it will be clean for the next shift. When the journey persons say it is timeto go, grab your belongings and punch out. Get some sleep for the next day. Working at The Bindery has taught me and is still teaching me much responsibility. I have learned to manage my time well. Working afternoons is tough because I don't get home until midnight every night. Life isn't fun and games every night anymore. I also have learned to work very hard for my money to pay for my college tuition. Being there just for the summers was a taste of real life for me; not everyone gets the opportunity to live wealthy like we see in the movies. It has given me more motivation to stay in school to avoid a life-long job like this, for I don't want to labor for the rest of my life. I want to continue to live out my dream of getting my doctorate degree in music.

Monday, November 11, 2019

Christian beliefs about marriage and divorce Essay

How might Christian beliefs about marriage and divorce be applied to a Christian living. In your answer consider one or more situation in which Christian belief would â€Å"make a difference†. Consider whether all Christian couples would respond in the same way. Christian beliefs are to be applied to everyday life. The teaching affects couples and guides them to a content marriage. Every couple should strive to live up to their vows to successfully live-out their vocation. It’s a full time vocation and for the marriage to work, there needs to be constant effort and work. Overtime people mature and develop; this may lead to the couple becoming closer or further apart. Action and alteration then needs to be applied and the marriage should grow and change accordingly. Christians have to truly commit to their vows and have to promise love and fidelity and apply it to their daily lives. Some Christians may ignore God’s intentions for them by dismissing the Christian beliefs. By disregarding these beliefs, couples will not only gradually disconnect from eachother, they will disconnect from God as they’re rejecting his vocation for them. Some may say that the Christian beliefs are not being applied to life as much anymore, which is proven by the increase in divorce rate. However, The religious beliefs are lived out by the vast majority of couples. Those who do not fully apply the beliefs to their marriage but realise the beliefs importance, have something to aspire to and the beliefs can guide them to a successful Christian marriage with God. This is why the beliefs of permanence and exclusiveness of marriage are important and people still try to live to values outlined in the Gospel. I can only aspire to living in a joyful, stable marriage. I’ve been brought up in a fortunate atmosphere as my parents have been married for 30 years and hopefully will grow old blissfully together. They’ve followed the Christian beliefs closely, except for a few dents to the relationship but managed to pass through them, which can only inspire me to follow in their guidance. I’ve seen how beliefs are still present in their marriage and how the church teaching is certainly not out of date. As outlined in AO1, the beliefs of the life-giving potential of marriage are central and when couples enter marriage they must realise the affects their behaviour has on children. As I’ve been brought up in a successful co-operative marriage, I’m inspired to do the same as I realise the importance of Christian beliefs, so if one is brought-up in a unstable marriage this can affect the relations the children subsequently have. The grace given in the sacrament gives couples strength which can furnish couples concentration towards the Christian beliefs. Someone who takes their faith seriously is more likely to live up to the vows more rather than one who just simply goes through the marital service as tradition, without really regarding the ceremony for it’s deep meaning. These Christian beliefs taught to them can then encourage them to leave divorce as a last resort rather than take the easiest way out. Catechism teaches that â€Å"The remarriage of persons divorced from a living, lawful spouse contravenes the plan and law of God as taught by Christ. They are not separated from the Church, but they cannot receive Eucharistic communion. They will lead Christian lives especially by educating their children in the faith – Catechism 1665† Although they will not accept divorce; the Roman Catholic Church will accept an annulment which is a way of saying that the marriage was void Different Christians approach marital breakdown and divorce in different ways. A Roman Catholic would have immense difficulties if their marriage broke down and ended in divorce, yet they are unable to get an annulment from the Church They feel that they have disowned the church by divorcing. Also, if that person remarries, in the eyes of the Roman Catholic Church it would be classed as adultery. This situation may involve them being asked to refrain from taking the Eucharist. This can result in real hurt and a feeling of isolation from the Church as the Eucharist is at the very heart of Catholic belief.. Whereas, someone belonging to the free church in the same position would have no such problem with remarriage in their church. Other Catholics may choose not to remarry and live life alone because their first marriage did not work and they do not want to go against their beliefs. Although some marriages conclude in divorce, marital help services such as Marriage Care and Relate offer support to couples so they understand the full responsibility they’re undertaking. Couples who haven’t got the deeper understanding of marriage may break the exclusive aspect of marriage and not consider preventing adultery as much as a couple who follow the Christian beliefs. Different Christians have various responses to contraception. Catholic teaching does not permit the use of artificial contraception. Pope Paul VI’s encyclical letter Humanae Vitae (1968) expressed it this way; â€Å"It is absolutely required that any use whatsoever of marriage must retain its natural potential to procreate human life.† This means that sex in marriage should be natural and always open to the possibility of creating new human life. All artificial chemical and physical methods of contraception are rejected by the teaching authority of the Catholic Church. In conclusion, I think the church does have a positive role in supporting couples through the sacrament; it blesses the couple with married life. With Christian belief and practice, the couple gain strength, while guiding the couple through the sacrament of marriage.

Saturday, November 9, 2019

Driving Age Should Be Raised

Should homework be banned. Yes, I feel it should be banned because you don't get any time for yourself, pointless. Because you already get work at school, seriously, home too? It kills trees, waste of time, boring, some parents don't even get it, it completely stresses you out. Not only you, but the teachers because all they do is grade tests, homework, classwork, and projects. I'm pretty sure they're tired of doing it too. I don't feel homework necessary. Homework should be banned because it just isn't useful and wastes time.Homework is pointless because kids do enough work in school and they don't need more. When they come home they want to chill out, hang out with friends, or do something. Kids are in school for 8 hours a day doing work, other than lunch and recess. Homework is not relevant for kids. I did a survey at school at resource, and a majority of kids say that homework should be banned in school because it is stressful and they procrastinate until the last second. There i s no point in homework.It takes away from spending time with family. According to the text with research ‘Homework Should be Banned,' â€Å"Schools has increased from 9 to 3 with 1 ? hour of recess and lunch to 8:40 to 3:15 with only 30 minutes of lunch and recess. † This quote shows that too much is just too much homework. Also, another reason is that, according to research, some of the smartest countries like Finland and Japan don’t have homework. We can be just as smart as them without homework.Compare and Contrast Driving in the Winter and Driving in the SummerThis shows that homework has no academic benefits for grades. Stress on kids. I’m definitely not the only student who agrees with this topic. Students all over the world have their lives controlled by homework, because not only is it boring but it takes up so much time and effort and after 8 hours of school, it feels absolutely useless. Firstly a 12-13 year old should be getting at least 8-10 hou rs of sleep but it can be hard when you have homework to finish and worries about it

Thursday, November 7, 2019

On Philip Larkins This Be The Verse Essays - Philip Larkin

On Philip Larkin's This Be The Verse Essays - Philip Larkin On Philip Larkin's This Be The Verse This Be the Verse by Philip Larkin They *censored* you up, your mum and dad. They may not mean to, but they do. They fill you with the faults they had And add some extra, just for you. But they were *censored*ed up in their turn By fools in old-style hats and coats, Who half the time were sloppy-stern And half at one another's throats. Man hands on misery to man. It deepens like a coastal shelf. Get out as early as you can, And don't have any kids yourself. Lately, I have read a good deal of poems by Philip Larkin, and one unifying factor that I have noticed is that Larkin never seems to use a filler. Every word in every one of his poems seems to be carefully crafted and placed, to the point where the flow and rhythm of the poem seem almost an accident. One poem I read that really stayed with me is the above poem, This be the Verse. I will now show you how this poem, which at first glance seems to be written only to amuse, really has a much deeper meaning. I will examine the poem in several parts. First, I would like to examine the use of curse words in the poem, or why other words that would be considered more acceptable to the general public were not used. Then, I will discuss the three stanzas of the poem and what they were meant to do for the audience. Lastly, I will explore why Larkin would write such a poem, and what he was trying to get across to his audience by writing it. The second line in this poem contains the word *censored*, a word that is usually not considered acceptable for the general public. Yet Larkin incorporates it almost immediately into his poem. I can think of four possible reasons why. Firstly, words such as *censored* quickly and easily grab the audiences attention. This is similar to yelling sex in a crowded marketplace, everyone wants to know what is being discussed. Also, words like *censored* prepare the audience for a humorous bit of poetry, and this perks the audience's attention, and lets them know off the bat that this will not be another long and boring verse. Secondly, words such as *censored* produce an atmosphere for adults, or mature people. One term that is used quite extensively lately is adult language. This term branches off of the common idea that children should and would not use such words until they are older and have a more concrete knowledge of what they are really saying. Thus, by using a word such as *censored*, Larkin creates a poem that will most likely not be read to children. Also, such a poem would not be read at certain social gatherings (i.e. church meetings) where such words are considered unacceptable, further narrowing the audience for this poem. That brings me to my third point: that the people who read such a poem know, whether consciously or not, that they are in a distinct group, and that this poem was written for them. This allows Larkin to establish a closeness with his readers, now that they know that he is writing for them. This also implies to the reader that Larkin is one of them, that he knows the reader well, because he is in the same social class. To sum it up, by using a word considered to be socially incorrect, Larkin has managed to establish more credibility with the reader, which inherently forces the reader listen up, and pay attention to what Larkin has to say. Lately, modern art and poetry are showing more and more unacceptable words. This is because such words have become synonymous with truth. In other words, the general public seems to feel that if an artist is using curse words, then he must be telling it like it is. Thus, using such words helps Larkin's credibility as a man who has seen and will now tell. Larkin's poem is divided into three stanzas, each with it's own meaning and objectives. The first stanza is the introduction. As discussed above, the first stanza singles out a select group of people and builds Larkin's credibility with them. But

Tuesday, November 5, 2019

Frigate USS Chesapeake in the War of 1812

Frigate USS Chesapeake in the War of 1812 USS Chesapeake was one of the original six frigates constructed for the U.S. Navy. Entering service in 1800, the ship carried 38 guns and saw service during the with Quasi-War with France and the campaign against the Barbary pirates. In 1807, Chesapeake was attacked by HMS Leopard (50 guns) over the practice of impressment of sailors in what became known as the Chesapeake-Leopard Affair. Active in the War of 1812, Chesapeake was defeated and captured by HMS Shannon (38) on June 1, 1813. The ship served as HMS Chesapeake until 1819. Background With the United States separation from Great Britain after the American Revolution, the American merchant marine no longer enjoyed the security provided by the Royal Navy when at sea. As a result, its ships made easy targets for pirates and other raiders such as the Barbary corsairs. Aware that a permanent navy would need to be created, Secretary of War Henry Knox requested American shipbuilders submit plans for six frigates in late 1792. Worried about cost, debate raged in Congress for over a year until funding was finally obtained through the Naval Act of 1794. Calling for the building of four 44-gun and two 36-gun frigates, the act was put into effect and construction assigned to various cities. The designs selected by Knox were those of renowned naval architect Joshua Humphreys. Aware that the United States could not hope to build a navy of equal strength to Britain or France, Humphreys created large frigates that could best any similar vessel, but were fast enough to escape enemy ships-of-the-line. The resulting vessels were long, with wider than usual beams and possessed diagonal riders in their framing to increase strength and prevent hogging. Construction Originally intended to be a 44-gun frigate, Chesapeake was laid down at Gosport, VA in December 1795. Construction was overseen by Josiah Fox and superintended by Flamborough Head veteran Captain Richard Dale. Progress on the frigate was slow and in early 1796 construction was halted when a peace accord was reached with Algiers. For the next two years, Chesapeake remained on the blocks at Gosport. With the beginning of the Quasi-War with France in 1798, Congress authorized work to resume. Returning to work, Fox found that a shortage of timber existed as much of Gosports supply had been shipped to Baltimore for the completion of USS Constellation (38). Aware of Secretary of the Navy Benjamin Stodderts desire to have the vessel completed quickly and never a supporter of Humphreys design, Fox radically redesigned the ship. The result was a frigate that was the smallest of the original six. USS Chesapeake. US Navy As Foxs new plans reduced the overall cost of the vessel, they were approved by Stoddert on August 17, 1798. The new plans for Chesapeake saw the frigates armament reduced from 44 guns to 36. Considered an oddity due to its differences relative to its sisters, Chesapeake was deemed an unfortunate ship by many. Launched on December 2, 1799, an additional six months were required to complete it. Commissioned on May 22, 1800, with Captain Samuel Barron in command, Chesapeake put to sea and transported currency from Charleston, SC to Philadelphia, PA. USS Chesapeake (1799) OverviewNation: United StatesBuilder: Gosport Navy YardAuthorized: March 27, 1794Launched: December 2, 1799Commissioned: May 22, 1800Fate: Captured by HMS Shannon, June 1, 1813SpecificationsShip Type: FrigateDisplacement: 1,244 tonsLength: 152.6 ft.Beam: 41.3 ft.Draft: 20 ft.Complement: 340Armament (War of 1812)29 x 18 pdr18 x 32 pdr2 x 12 pdr1 x 12 pdr carronade Early Service After serving with an American squadron off the southern coast and in the Caribbean, Chesapeake captured its first prize, the French privateer La Jeune Creole (16), on January 1, 1801, after a 50-hour chase. With the end of the conflict with France, Chesapeake was decommissioned on February 26 and placed in ordinary. This reserve status proved brief as a resumption of hostilities with the Barbary States led to the frigate being reactivated in early 1802. Made the flagship of an American squadron, led by Commodore Richard Morris, Chesapeake sailed for the Mediterranean in April and arrived at Gibraltar on May 25. Remaining abroad until early April 1803, the frigate took part in American operations against the Barbary pirates but was plagued by issues such as a rotted mast and bowsprit. Chesapeake-Leopard Affair Laid up at the Washington Navy Yard in June 1803, Chesapeake remained idle for nearly four years. In January 1807, Master Commandant Charles Gordon was tasked with preparing the frigate for use as Commodore James Barrons flagship in the Mediterranean. As work progressed on Chesapeake, Lieutenant Arthur Sinclair was sent ashore to recruit a crew. Among those who signed on were three sailors who had deserted from HMS Melampus (36). Though alerted to the status of these men by the British ambassador, Barron refused to return them as they had been forcibly impressed into the Royal Navy. Dropping down to Norfolk in June, Barron began provisioning Chesapeake for its voyage. On June 22, Barron departed Norfolk. Loaded with supplies, Chesapeake was not in fighting trim as the new crew was still stowing equipment and preparing the vessel for active operations. Leaving port, Chesapeake passed a British squadron which was blockading two French ships at Norfolk. HMS Leopard fires on USS Chesapeake. US Naval History and Heritage Command A few hours later, the American frigate was chased down by HMS Leopard (50), commanded by Captain Salusbury Humphreys. Hailing Barron, Humphreys requested Chesapeake carry dispatches to Britain. A normal request, Barron agreed and one of Leopards lieutenants rowed across to the American ship. Coming aboard, he presented Barron with orders from Vice Admiral George Berkeley which stated he was to search Chesapeake for deserters. Barron promptly refused this request and the lieutenant departed. A short time later, Leopard hailed Chesapeake. Barron was unable to understand Humphreys message and moments later Leopard fired a shot across Chesapeakes bow before delivering a full broadside into the frigate. Barron ordered the ship to general quarters, but the cluttered nature of the decks made this difficult. As Chesapeake struggled to prepare for battle, the larger Leopard continued to pound the American ship. After enduring fifteen minutes of British fire, during which Chesapeake responded with only one shot, Barron struck his colors. Coming aboard, the British removed four sailors from Chesapeake before departing. In the incident, three Americans were killed and eighteen, including Barron, were wounded. Badly battered, Chesapeake limped back to Norfolk. For his part in the affair, Barron was court-martialed and suspended from the US Navy for five years. A national humiliation, the Chesapeake-Leopard Affair led to a diplomatic crisis and President Thomas Jefferson banned all British warships from American ports. The affair also led to the Embargo Act of 1807 which devastated the American economy. War of 1812 Repaired, Chesapeake later saw patrol duty enforcing the embargo with Captain Stephen Decatur in command. With the beginning of the War of 1812, the frigate was fitting out at Boston in preparation to sail as part of squadron consisting of USS United States (44) and USS Argus (18). Delayed, Chesapeake remained behind when the other ships sailed and did not leave port until mid-December. Commanded by Captain Samuel Evans, the frigate conducted a sweep of the Atlantic and captured six prizes before arriving back at Boston on April 9, 1813. In poor health, Evans left the ship the following month and was replaced by Captain James Lawrence. Captain James Lawrence, USN. US Naval History and Heritage Command Battle with HMS Shannon Taking command, Lawrence found the ship in poor condition and the crews morale low as enlistments were expiring and their prize money was tied up in court. Working to appease the remaining sailors, he also began recruiting to fill out the crew. As Lawrence worked to ready his ship, HMS Shannon (38), commanded by Captain Philip Broke, began blockading Boston. In command of the frigate since 1806, Broke had built Shannon into a crack ship with an elite crew. On May 31, after learning that Shannon had moved closer to the harbor, Lawrence decided to sail out and battle the British frigate. Putting to sea the next day, Chesapeake, now mounting 50 guns, emerged from the harbor. This corresponded to a challenge sent by Broke that morning, though Lawrence never received the letter. Though Chesapeake possessed a larger armament, Lawrences crew was green and many had yet to train on the ships guns. HMS Shannon leads the captured USS Chesapeake into Halifx harbor, June 1813. Library and Archives Canada (Public Domain) Flying a large banner proclaiming Free Trade and Sailors Rights, Chesapeake met the enemy around 5:30 p.m. approximately twenty miles east of Boston. Nearing, the two ships exchanged broadsides and soon after became entangled. As Shannons guns began sweeping Chesapeakes decks, both captains gave the order to board. Shortly after issuing this order, Lawrence was mortally wounded. His loss and Chesapeakes bugler failing to sound the call led the Americans to hesitate. Surging aboard, the Shannons sailors succeeded in overwhelming Chesapeakes crew after bitter fighting. In the battle, Chesapeake lost 48 killed and 99 wounded while Shannon suffered 23 killed and 56 wounded. Repaired at Halifax, the captured ship served in the Royal Navy as HMS Chesapeake until 1815. Sold four years later, many of its timbers were used in the Chesapeake Mill in Wickham, England.

Saturday, November 2, 2019

The harmful effects of smoking Essay Example | Topics and Well Written Essays - 2250 words

The harmful effects of smoking - Essay Example The shift is caused by a global tobacco industry marketing strategy that targets young people and adults in developing countries' (WHO (Holmes, J.), '10 Facts on the Tobacco Epidemic and Global Tobacco Control'. http://www.who.int). Although in the last years people are more informed on tobacco risks, smoking is still a very common habit. Policies for reducing tobacco smoke in public areas have been introduced in developed countries and advertisements are becoming more and more aggressive, but people keep on smoking. This happens, mainly, because of the nicotine and other cigarettes' additives, which are addictive. But, as a result of this collective effort, more and more people are trying to quit smoking or have already achieved it. Today, people are more aware of the risks of smoking and they are more sensible with their own health. Nowadays, people are aware of the harmful effects of smoking, but it was not always that way. The 'Counterblaste to Tobacco', written by King James I in 1604, is one of the first documents warning about the effects of tobacco. In this document we can find quotes like this one: for the Nose being the proper Organ and convoy of the sense of smelling to the braines, [] whether that Odour which we smell, be healthfull or hurtfull to the braine (King James I, 'Counterblaste to Tobacco'.1604 (reprinted version from 1905). http://www.laits.utexas.edu). So, as early as 1604, he realized that smoking tobacco was damaging to the nose and for the brain. Smoking became a very common habit at the end of the nineteenth century and especially during the World War I and II. In 1912, Doctor Isaac A. Adler was the first who established a link between cancer lung and smoking and then, in 1929, Doctor Fritz Linking published a statistical study supporting this theory. Later studies confirmed it, specia lly the 'British Doctor Studies' from 1954, which final conclusions were published in 2004. The main conclusion of the study was that 'a substantial progressive decrease in the mortality rates among non-smokers over the past half century (due to prevention and improved treatment of disease) has been wholly outweighed, among cigarette smokers, by a progressive increase in the smoker nu non-smoker death rate ratio due to earlier and more intensive use of cigarettes' (Doll, R., Peto, R. 'Mortality in relation to smoking: 50 years' observation on male British doctors'. 2004. NCBI, Pub Med. http://www.ncbi.nlm.nih.gov/pubmed). What is inside cigarettes 'Tobacco smoke contains over 4,000 different chemicals. At least 43 are known carcinogens' (Health Education Authority (UK), 'Harmful Chemicals in Cigarettes & Tobacco Smoke'. http://www.quit-smoking-stop.com). Some of these chemicals are: Benzene (petrol additive). Formaldehyde (embalming fluid). Ammonia (commonly used as a cleaner and in the fertilizers). Acetone (commonly used as nail polish remover). Tar (which condenses and sticks to the lungs). Nicotine (addictive drug). Carbon monoxide (a toxic gas produced when lightning and smoking cigarettes). Arsenic (commonly used in rat poison). Hydrogen Cyanide (gas chamber poison). All smoking products are harmful; not only cigarettes, but also cigars, menthol cigarettes, light cigarettes (although they are usually advertised as having less nicotine and