College common application essay
Writing On Black Paper
Tuesday, October 29, 2019
Rigths and Obligations Research Paper Example | Topics and Well Written Essays - 1000 words
Rigths and Obligations - Research Paper Example In addition, defective products could cause direct or indirect harm to consumers. In such a case, product manufacture may fall under the legal requirement of explaining the reason for a sub-standard product in their market segments. In this regard, product defects should be taken seriously by a manufacturer in order to avoid possible legal sanctions by relevant authorities and concerned consumer protection agencies. As an employee of the company, it would be professional to notify high level managers about the product defect. According to Oââ¬â¢Reilly (2007), this can only be done through a systematic and procedural manner in order to avoid raising unnecessary tensions within the board of directors and the chief executive officerââ¬â¢s team. In this context, lack of significant knowledge on the companyââ¬â¢s ethical standards requires approach of the product defect issue from a technical perspective. As an employee of the company, I will categorically and explicitly present my concerns about a defective product within the consumer market. Managers will have to acknowledge the fact that the defective product signifies technical hitches within production and distribution lines. Thorough evaluation of production designs, packaging practices and even product transportation could feature as the main cause of the problem under consideration. In this case, I would take the opportunity given in the meeting to postulate about existence of technical shortfalls within the companyââ¬â¢s production lines, which needs immediate attention to avoid unprecedented challenges. Oââ¬â¢Reilly (2007) says that presence of practical evidence in form of actual product with defects would facilitate conveyance of the message to the managers and their new chief executive. Standard operation procedures within a sound business environment emphasize that organizations should strictly follow specific safety guidelines in product manufacturing. In an event that production depart ment makes defective products, the manufacturing company becomes solely responsible for any risk and harm involved when such products reach innocent consumers in the market. Sernaker (2010) states that in this case a company should immediately notify customers about the product defect to prevent any potential risk and injury to customers. The company can only notify customers once an objective testing and product analysis substantiates that the product is unsafe for use. With respect to my company, the process of notifying consumers begins with locating exact defective products within the market. Managers can achieve location of products through records on distribution channels and major retail outlets. Upon identifying exact locations of products, management should device mechanisms meant to reach individual customers via information contained in their sales records. Once customers are aware of the defects, the company may opt to temporarily stop production of the product in order to avoid further sales to consumers. According to Oââ¬â¢Reilly (2007), continued production and distribution will hold the company even more responsible for neglect of safety programs towards the public consumer market. Product recall succeeds notification of customers. Oââ¬â¢Reilly (2007) agrees that recalled products can be destroyed or repaired, and
Sunday, October 27, 2019
Ethical Issues In Information Systems Privacy
Ethical Issues In Information Systems Privacy This essay aims to identify the ethical, social, professional and legal issues relevant to social media. It is a literature review that will present some of the key issues in both privacy and security subject matters. It is divided into several parts and to begin, it will present what social media is as well as mention some of the issues that users have had regarding the use of social media. It will then explain the ethical, social professional and legal issues related to the use social media. The essay will mainly be focusing on social networking and will present a balanced overview of some of the opposing perspectives of the issues presented. To conclude, the essay will reflect critically on these various perspectives, assess some of the key issues that have been presented and propose some appropriate solutions or courses of action from the perspective of an ethical IT professional. Social Media covers many aspects such as, blogs, videos, podcasts, discussion forums and social networking and the key stakeholders of social media include: programmers, developers and anyone who has access to a computer and a network. The particular aspect that will be covered is social networking. Social media may have several advantages such as keeping in touch with friends, families and coworkers enabling open communication which can lead to improved information discovery and distribution. For businesses, it can improve business reputation and can even gain a large target market with minimal use of advertising. An interesting quote from Klepic (2010), a blogger, journalist and social media innovator who uses a reasonable approach to convey how social media impacts our daily lives, states that what happens in Vegas stays in Vegas, what happens on twitter stays on Google forever. This shows that this social media user or stakeholder has used social media and has been affected by it. Nowadays, websites that no longer exist have articles taken from them and are being used by other websites to show to the public. In the case of social media, privacy is obsolete as users and stakeholders of social networking websites and blogs, no longer have any sort of confidentiality when they post pictures, videos and posts of themselves on the internet in general. Another interesting quote from a social media user called Christian Hollingsworth (2011) stated that Years ago, before Gravatars even existed, I would inflate my blog comments. What Id do is use a few of my different email addresses, and post comme nts on blog posts with pen (fake) names. I thought I was rather tricky. A few months ago I was looking through old blog posts on some old blogs, and found that those comments now had Gravatar images attached. And behold, they were all images of me! Due to my Gravatar account now linking to those email addresses. This social media user or blogger was harmlessly posting comments on other blogs using fake names for privacy reasons and was later found that due to an online social media application, an image of him was posted next to all his previous blog posts. The application or website did not mention that his old posts were going to have images of himself posted right next to his comments and therefor his right to privacy has been violated. Most of the public are using social media such as twitter and Facebook and have no knowledge on where or how their personal information is being shared. Legal Issues This section covers any questions that have any concerns on the protection that laws and regulations provide regarding social media. The rules and legislations that we will be looking at is the United Kingdom Laws (UK Laws) that help protect an individuals privacy and security rights and support ideas and concepts on privacy and security. In the Data Protection Act (1998) under Section 55 it states that it is an offence to knowingly or recklessly obtain, disclose or procure the disclosure of personal information without the consent of the data controller. This means that an individual is not allowed to obtain another persons personal information, which includes information such as name, home address and age, and expose it without the consent of that person. This applies to the use of social media as this principle is at stake. An individual can access another persons private information through blogs, for instance, and obtain his or her name or home address and expose it to others wi thout the consent of that person. The Data Protection Act (1998) states that if organizations were to collect or share an individuals information, they must use it fairly and the person has the right to know whether an organization has collected information about them and to whom they shared it with. This includes any information that has been obtained from social media websites which is stated in The Information Commissioners Office (ICO) which is the UKs independent authority. Facebook, the social networking website, was sued due to sharing personal information of individuals, such as their names, to third-party application makers without their consent or permission in late 2012 (Essers, 2012). The third-party applications, which were running through Facebooks Application Center, accessed chat logs of several users on Facebook and gained their personal information without the consent of the users. The first hearing takes place in the summer of 2013. The Data Protection Act (1998) is threatened as the social networking website gains personal information from their users and shares them to third-party application makers without the users consents. Due to wrongfully sharing personal information, users have sued Facebook. The Computer Misuse Act (1990) under Section 1: Unauthorized Access to Computer Material, Section 2: Unauthorized Access with Intent to Commit or Facilitate Commission of Further Offences, and Section 3: Unauthorized Modifications of Computer Materials, the principles are threatened. These sections of the Computer Misuse Act (1990) all deal with the offence of hacking with or without the intent to commit serious crime such as fraud. In the case of social media, it is an offence to use an individuals username and password to gain unauthorized access to social networking sites and computers to gain, share and change private information. Social networking websites can even be hacked and used to hack into computers to gain private information such as credit card information just by looking at the purchases a person has made in Facebook for instance. Another principle similar to The Computer Misuse Act (1990) is stated in the Federal Decree-Law no. 5 (2012), which was first issued in the United Arab Emirates, under Article 10 regarding hacking. The article states that there is a penalty for whoever willfully and without authorization runs a software on the computer network or an electronic information system or any information technology means, and caused them to stop functioning or being impaired, or resulted in crashing, deletion, omission, destruction of the program, system, website, data or information. This means that there is a consequence for an individual to hack into another persons computer application or systems (ex. Facebook or Forums) and change or delete any information that belongs to that person. This standard is threatened as people can gain access to website applications and alter or delete any system or information located on the network. This must not be done as there is a large penalty for undertaking such im moral conducts. Another principle that could be at stake is the Computer, Designs and Patents Act (1998). This principle or act illustrates the penalties of wrongfully sharing or transferring copyrighted information to other people. It is illegal to share information such as music, which does not belong to an individual, without the consent or permission of the owner. Social media can be easily used to share and transfer data and information, often copyrighted information, such as music, video and even images. Napster, a free music sharing network, had to be shut down due to copyright in 2001. Peer-to-peer programs and applications can be considered part of Social Media as individuals can communicate between each other through their personal computers. Napster was sued due to sharing music freely without the permission of the owners and due to the lawsuit it was shutdown (McGuinn, 2000). Ethical Issues The ethical issues that come to mind when social media is present is that social media can be used to spread distasteful information such as racism, hatred, violence and even sexual material. Organizations can send junk or chain letters that most individuals do not want. This can be related to the Human Rights Act (1998) under Section 8 where it states that everyone has the right to respect for his or her private and family life, home and correspondence. To put it simply, this means that everyone has the right to privacy. Privacy is an ethical principle that is at stake when it comes to the use of social media as social networking websites can be used to invade the privacy of others. Privacy has several meanings depending on a persons beliefs, culture and even religion and therefore different perspectives plays a huge role. However, most laws and regulations define privacy as the condition or quality of being completely free from being witnessed or seen. It is also the state of being free from information distributed from other people, whether its co-workers, friends or even family. We as individuals value the need of space and privacy and therefore it is an important aspect in our daily lives. Joseph (2007: 109) states that in the information age, the value of privacy has been eroded. We can no longer guarantee our privacy. Our right to privacy is violated when using social media. In the case of the use of social media, the Human Rights Act (1998) is threatened due to the fact that an individuals right to privacy can be vulnerable as people can obtain other peoples information and spread distasteful material about them to other people or organizations. In fact, spreading distasteful information is mainly done through social networking websites. It is an offence to publish news, pictures or comments relating to the secrets of a persons private or family life or to use another persons secret for your own, or someone elses, advantage without the consent of the person to whom the secret relates, (Garrod Smith 2011). An ethical principle very much like The Human Rights Act (1998), in the United Arab Emirates individuals have their right to privacy and there is a penalty for publishing distasteful or personal information on a person to the public. The principle of integrity can also be violated as the security of a person can be threatened. Security can be defined as the state of being completely safe from any sort of danger. As individuals we value the need of security especially when it comes to using the internet as there are many dangers of using social networks or blogs such as hacking. A persons security maybe threatened when using social media due to the fact that his or her personal information such as credit card information may be stolen. Information technology plays a huge role on several types of security which may include: Computer Security, Data Security, Application Security, Information Security and Network Security and all of these can be threatened by Malware/Adware, Viruses, Spam and Information Theft. These threats to security and information technology can be used to secretly access a computer system without the owners informed consent to perform hostile, intrusive or annoying actions. Another ethical issue of social media is false reports and acquisitions. In June of 2009 when the pop star Michael Jackson died there have been unsubstantiated reports stating that the actor Jeff Goldblum had also died and the report spread onto many people and thats when the ethics of social media were tested. According to Dodson (2009) most people thought it was a harmless rumor but in Australia, Channel 9 news spent almost two minutes in its show spreading this information to the public, saying that it was a tragedy. This entire story was a hoax and was first posted via two social media websites; Facebook and Twitter. To put it in the perspective of others, some people would have though this as a joke while others would have taken this seriously and think it was real. This means that no everything online is true. To understand Social Media and the ethical issues that arise on individuals it is important to look at the two ethical theories (Consequentialist and Deontological) and their opposing perspectives on a certain situation, an example being a users activity on YouTube. This persons activity can be viewed by other YouTube users as well as non-YouTube users, including comments posted, videos watched and videos posted. The consequentialist theorist would argue that it is acceptable for other people to see his activities while the deontological theorist would argue that his right to privacy is violated and it is wrong for people to see his activities. It is important to understand whether privacy may or may not be violated depending on the individuals theories or perspectives behind social media. Social Issues Social issues are any behaviors or conditions a person may find undesirable. Social media can have several negative effects on a person including social isolation; some people would rather browse the internet playing video games and chatting online than having an actual social life outside the internet world. According to Goldsmith (2013), witnessing friends vacations, love lives and work successes on Facebook can cause envy and trigger feelings of misery and loneliness. In social networking, most individuals only care about how many likes they have obtained on their photos or posts as opposed to what really matters which is who liked their photos or posts. Another issue according, to Yao (2012), is that stalking becomes easy. In order to search for someone, all a person needs to do is search for their name online. Loneliness is another issue as people comment on their friends pages and not yours. From the point of view of a social network user, people only contact you if they need s ome sort of assistance such as when they only want you to like their posts or images rather than having a normal friendly conversation. A person can feel lonely when they see that their friends have been invited to a large gathering that they had no idea about. From the perspective of a non-social network user, a person can feel that he or she does not exist to certain old people due to the fact that nowadays the main way of communication is through social networking websites such as Facebook or MySpace. Another issue is that some social networking users will talk to other users depending on how many friends they have. The more friends an individual has the more popular they become and therefor social interaction is at an all-time high. Another issue can be the confusion of defining a friend. A study by Weiner (2009) has shown that the traditional notion of friendship is trust, support as well as sharing similar values whereas on a social network a friend is someone whos link an individual has clicked on. In a childs perspective and in some cases adults, they can be very competitive as they talk about how many friends they have whereas most of these alleged social networking friends are not actual people that share some sort of trust or sha re similar values. Of course form the point of the view of managers, researchers as well as participants, these issues are ignored as their jobs are to solely market their products or conduct research and find new information, for example, and dont bother with the social side of their life when using social networking websites. Professional Issues Organizations need to watch what employees publicly comment about their own organizations and employers. An example would be that an employee working at an organization wrote on his profile on a social networking stating that his job was tedious and unexciting. This person can be dismissed from the organization. Another example is that what if an unhappy employee decides to complain about a company and the products they make using social networking. Consumers might think twice before buying any of that companys products. There are also legal penalties if employees view and click on offensive content on social networking websites as employers could be held liable for failing to protect workers from viewing such distasteful material. The penalties, legal costs and damages to the companys reputation can be extensive. In the BCS Code of Conduct (2011) under Article 3 of the Duty to Relevant Authority it states that a person may NOT disclose or authorize to be disclosed, or use for personal gain or to benefit a third party, confidential information except with the permission of your Relevant Authority, or as required by Legislation and may NOT misrepresent or withhold information on the performance of products, systems or services (unless lawfully bound by a duty of confidentiality not to disclose such information), or take advantage of the lack of relevant knowledge or inexperience of others. This is a direct correlation to what employees must not do to misrepresent their organization. This means that employees must not misrepresent their organizations in anyway. Social networking websites can be easily used to do misrepresent an organization to the public as the information is being passed on to other people quickly. This is also stated in the social networking website Facebook under their Facebo ok Terms of Service (2012) under Article 5; Protecting Other Peoples Rights, where it explains that an individual cannot violate a person, including companies, right to privacy and must not misrepresent said person in anyway. In Facebooks Privacy Policy under section 3: Information you share with Third Parties, it states that certain types of communications that you send to other users cannot be removed, such as messages. From the perspective of a manager or owner of an organization, this can be a threat to the company as employees can post distasteful information about the company to certain people and cannot remove or delete that information which can be a problem as that information is always there for the public to see therefore giving the organization a bad reputation. From the perspective and point of view of a professional individual or a manager as well as a social network provider, the use of social networking websites should be encouraged to employees as it is a good way to market the organization and its products as well as communicate with business partners; however the employees should not misrepresent their company to the public when using social networking. Another minor professional issue, that may be taken seriously, is an organizations bandwidth usage. Software updates from social networking websites such as Facebook or Twitter may not take up large amounts of bandwidth; however video links that are posted on these sites may create difficulties for information technology administrators in a company as there is a cost to pay, especially in terms of bandwidth-hungry applications, when browsing on the internet. Recommendations Codes and principles are necessary for the practice of social media. If every person did not play fairly and have any respect, honesty or decency, then there would be more laws and principles that would be much stricter than the current laws as social media would be chaotic. For businesses, social media is a dilemma as they need to adopt and change the way they communicate, however they realize that social media can be a threat as employee can misrepresent or express distasteful information about the organizations to the public. Every minute spent on social media websites can expose and cause a threat to the security of an organization. Organizations need to set limits and restrictions with certain monitoring systems, as to not offend an employee, to help reduce the release of any unpleasant information to the public. An optimal solution, yet not recommended (to not indicate a lack of trust from the organizations to the employees), is banning any access to social media websites. For security reasons and as a basic safeguard, organizations must have an anti-virus software setup on each computer. Social media users must ensure that they do not, under any circumstances, publish any personal or private information on social media websites. For their security, they must ensure that they have the latest version of anti-virus software installed on to their computers. Conclusion Though people are aware of their privacy and security threats, sometimes they choose to ignore them. Social media websites heavily encourage individuals to reveal information about them regardless of what the information is about. Sometimes even the brightest of intellectuals give out information that they should not have. Today, almost the full population of the world has a profile account on Facebook or Twitter and they enjoy the idea of communicating with their friends, families and coworkers online. Individuals must not forget that because they have their own profile page they can only gain access to, they must know that whatever information is written on the internet, will most likely stay there forever.
Friday, October 25, 2019
Toni Morrison Essay examples -- essays research papers
Toni Morrison The issue of abandonment and the will that it takes to survive the hardship of it is a reoccurring theme in Toni Morrisonââ¬â¢s writing. Tar Baby, Sula and Paradise all deal with the issue of abandonment and how it relates to the characters in her stories. ââ¬Å"Through her fiction, Toni Morrison intends to present problems, not their answersâ⬠(Moon). Her stated aim is to show "how to survive whole in a world where we are all of us, in some measure, victims of something." (Morrison) Morrison's broad vision extends beyond the individual to one that explores self-discovery in relation to a "shared history." In order to dramatize the destructive effects of this kind of dependency, she intentionally exaggerates to find the limits. In a film interview, Morrison has stated, "I suppose that in many of my novels I tend to discuss one's dependency on the world for identification, self-value, feelings of worth. The abandonment that it takes for one to gain th ese qualities is prominent in my writing.â⬠Toni Morrison has been consistently insightful and helpful critic of her work. With regard to her novels, she has indicated that her plan was to take love and the effects of its scarcity in the world as her major themes, concentrating on the interior lives of her characters, especially those of an enclosed community. Born Chloe Anthony Wofford, on February 18, 1931, in Lorain, Ohio. The daughter of George Wofford, a shipyard welder, and his wife Ramah, Morrison was schooled by her parents in the richness of her African-American heritage and the joys of great literature. When she entered first grade, she was the only black student in her class and also the only child who had already learned to read. Since many people couldn't pronounce her first name correctly, she changed it to Toni, a shortened writing". version of her middle name. She joined a repertory company, the Howard University Players, with whom she made several tours of the South. She saw firsthand the life of the blacks there, the life her parents had escaped by moving north. After graduating, Toni was offered a job at Texas Southern University in Houston, where she taught introductory English. Unlike Howard University, where black culture was neglected or minimized, at Texas Southern they celebrated black heritage with Negro hist ory week and introduced to her the idea of b... ... of her birth, to marry, to raise a family, to become a pillar of the tightly knit black community. The other, Sula Peace, rejects all that Nel has accepted. She escapes to college, submerges herself in city life, and when she returns to her roots, it is as a rebel, a mocker, a wanton sexual seductress.â⬠(Back Cover) The relationship between the young women throughout a certain portion of their lives was put on hold due to the distance between them. Sula chose to move away from Ohio when she was young and therefore somewhat abandoned the life that the two girls had in previous years. When reunited with Sula, Nel expresses her thoughts on the abandonment of herself by her friend: ââ¬Å"[Sula] said doing anything forever and ever was hell. Nel didn't understand it then, but now in the bathroom, trying to feel, she thought . . . "Sula was wrong. Hell ain't things lasting forever. Hell is change." Not only did men leave and children grow up and die, but even that misery didn't last. One day she wouldn't even have that. This very grief that had twisted her into a curve on the floor and flayed her would be gone. She would lose that tooâ⬠. (Morrsion, 108)
Thursday, October 24, 2019
Asking for Less Homework
ASKING FOR LESS HOMEWORK There are many important things in life but one of the most important things is education. Although education is really helpful, getting extra things to do like excessive homework makes it boring. Specific studies show that excessive homework makes students and parents hate school. People say that having more homework is good for students as it helps them get higher marks and be more responsible. They also say that more homework will make students revise a lot, so you remember explanations better.They prove that by doing more homework the parents would be able to get involved more with the student's educational life and be able to help them. Elders think that by giving students extra homework they will be able to be independent thinkers and know that they can learn things outside of school. However, I found that all these above findings are untrue. More homework won't make you revise more or get good marks, it will make you tired, sleepy and exhausted and lea ve no time to revise for quizzes or tests you have on the next day.Students don't want to be responsible now, in their future life they will be responsible. Parents would make it worse if they try to help their children to understand something as they might explain it in a different way and get the child confused. Students should have less homework. They need time to be with their family. They want to have a life for themselves and want to be active e. g going to the cinema to meet friends and play sports. We would enjoy simple things like having more sleep so we can go to school fresh the next day. Read alsoà Homework Solutions ââ¬â Chapter 3Researchers have found that students finish their homework and stay up late at night so they can have some free time. In fact some teachers have found that more homework makes the student hate the subject. The student becomes pale and bored as he has been studying his whole life. Well, teachers should ask themselves if they want us to be active and do homework together, it will never work. Ask yourself : ââ¬Å"Do you want your child to be constantly pale, sleepy and tired? ââ¬Å",â⬠Do you want to see your child so fat as he eats and eats and doesnââ¬â¢t have time to exercise? . Think of all the questions related to this and you will find the answer to none of them. In conclusion, I would like the school to think about students rights and having less homework is one of them. All principals should remember that teens and kids want to have fun, they donââ¬â¢t want to be responsible now and do hard work. They will be responsi ble later and will have to do extra study to get good marks but when they want not by forcing them and punishing them if they donââ¬â¢t do it. Think carefully and you will eventually agree with my beliefs.
Wednesday, October 23, 2019
Gavin Menzies’ Voyages
Gavin Menzies Essay Gavin Menzies was a royal navy submarine captain that worked for the British government and now is trying to let the world know his opinion on the discovery of the Americas: did the Chinese discover the Americas before Columbus? Menzies takes on a voyage where he tries to find evidence to support his thesis and comes up with several different theories; his first stop: Calicut. Menzies claims that the Ming dynasty's famous navigator Zheng He managed to reach the cape of good hope and from there he should have reached the Americas too.Gavin also claims that a famous Italian writer of the time, Nicolo ââ¬Ë Di Conti, might have made contact with Zheng ââ¬Ës fleet in Calicut and might have also left with them for the New World; Unfortunately for Menzies this idea was quickly discarded for there are historical records that suggest that Di Conti immediately returned back to Italy after his trip to Calicut ( he might have also carried some Chinese maps of their voya ges with him).Menzies then pulls out some more evidence that a map found was possibly a Chinese map that led to the islands of the Antilles, but according to a few historians and cartographers, the maps were confusing inaccurate and the islands were displaced in random places. The possibility of a slipway on one of the tropical islands was rejected by many geologists that state that those rocks where there for no peculiar reason.Still not giving up on his quest, Gavin Menzies slightly alters his theory: he affirms that an Italian, Verazzano, went on a voyage with the Chinese and stating that he saw ââ¬Å"people running like Chineseâ⬠; but as we already know, even Columbus, thought that the people he thought were Chinese but they were just the Native American tribes that lived on the coastline.It was also verified that Indigenous people were descendants of other Asian tribes that might have reached the Americas by crossing an icy passage in North America. There is no concrete i nformation or evidence that the Chinese ever got to America, because if that were so than the Chinese would have set up outposts, settled or maybe started trading the tropical goods with Europe and probably could have made a fortune!Lastly, Menzies tries convincing the people when he claims that an old Chinese report states that the Ming fleet arrived at the shore of about 3000 different countries(the only way to do this was by reaching the Americas too)! The Chinese historian that owned the archives rejects this last of Gavin's theories because of a simple calligraphy misunderstanding: the Chinese character â⬠â⬠means 30 and â⬠â⬠means 3000 so the record can be misunderstood because the record actually just meant 30 different countriesâ⬠¦Any claims concerning history, especially when it has been firmly accepted by historians and other professionals on that certain topic, should have reliable and plausible evidence along with clarifications and explanations to be supported; That is how history has been built up so far and it's how it will continue to be built. When an argument concerning history that relies on inaccurate evidence and unsupported theories, such as that found in Menzies' show. The argument does not deserve to be reconsidered.
Tuesday, October 22, 2019
The First Stanza of The Song Of Roland Essays
The First Stanza of The Song Of Roland Essays The First Stanza of The Song Of Roland Essay The First Stanza of The Song Of Roland Essay Charlemagne, the king of France, has waged war in Spain against the Saracens for seven years. He has conquered the entire Spain and there isnt any city left to invade but only Saragossa, which is located upon a mountain. It is the city of pagan King Marsile. He has no love for God for he is a follower of Muhammad and besides, he prays to Apollo. No matter what he does, he will be unable to prevent his ruin. There is no place where we are told about these seven years except for thefirst stanza, for the rest of the poem tells about specifically the seventh year of Charlemagnes war in Spain. This stanza is definitely a brief summary of background of the whole poem, and the poet gives the course of the story immediately at the beginning. So with this opening, audiences have the basic idea of the story, which will be developed in the rest of the poem that is built upon the same basic idea. Thefirst line of this stanza begins with the name, Charles, who is the king of Franks and it is ent irely reserved for Charlemagne and his attributes. Thefirst attribute referring to Charles is ;the king; which could be simply taken as his title. But, just after that, the poet assigns another attribute, ;our great emperor;, to Charles. Although this second one seems to be very same as thefirst one atfirst glance, it means more than a title. At this point we have come to realize that the poet is also a Frank. Furthermore, here the tone is extremely emotional, for the poet expresses Franks; engagement and admiration to their king by these words. And this is developed in the rest of the poem as the concept of a good vassal. Beginning with the second line, we are introduced to the action part of the story. And we learn that the King of France is on a successful campaign in Spain. On the next line, the poet refers Spain as the ;proud land;, which is ;as far as the sea;. We cannot k
Monday, October 21, 2019
Free Essays on Themes From Lord Of The Flies
There are several themes in Lord of the Flies that can be related to everyday government. Everyone is fighting. There is a particular group that opposes otherââ¬â¢s beliefs. This group feels that their way is the best way to get things accomplished. Some things that are brought to attention in this film are unity, democracy, liberty and freedom, and individualism. The boys in the film thought that they had to work together as one in order to get off the island. Others did not care if they got off the island and back to their families. First, the group tried working together by gathering food, building shelters to sleep under, and keeping a fire aflame at all times so that maybe they would be spotted by someone flying over or passing by. Some form of government had to be established to keep everyone unified. The group decided they needed a leader. Some thought that Jack should be the leader since he was the oldest in the group. Others thought that Ralph should be the leader since he was already the colonel. Ralph was elected leader since he was the leader at the military school where they were all enrolled. Jack believed that everyone should have the liberty to do what he or she wanted without being reprimanded for it. He decided to be a rebel against what Ralph stood and what he was trying to accomplish. Jack started up what he called ââ¬Å"his gangâ⬠and he had several people following him. This is very much like todayââ¬â¢s government. There is a leader and followers. Others got tired of Ralph and all of his rules and decided to join Jackââ¬â¢s gang. Piggy was the only one who remained loyal to Ralph and all of his ideas. They shared the same morals and beliefs. They all had their own ideas on how things should be done. Some were too shy to voice their opinions. Jack voiced his feeling and followed up on it by doing whatever he wanted. Ralph let his opinion be known as well. The others just took sides with w... Free Essays on Themes From Lord Of The Flies Free Essays on Themes From Lord Of The Flies There are several themes in Lord of the Flies that can be related to everyday government. Everyone is fighting. There is a particular group that opposes otherââ¬â¢s beliefs. This group feels that their way is the best way to get things accomplished. Some things that are brought to attention in this film are unity, democracy, liberty and freedom, and individualism. The boys in the film thought that they had to work together as one in order to get off the island. Others did not care if they got off the island and back to their families. First, the group tried working together by gathering food, building shelters to sleep under, and keeping a fire aflame at all times so that maybe they would be spotted by someone flying over or passing by. Some form of government had to be established to keep everyone unified. The group decided they needed a leader. Some thought that Jack should be the leader since he was the oldest in the group. Others thought that Ralph should be the leader since he was already the colonel. Ralph was elected leader since he was the leader at the military school where they were all enrolled. Jack believed that everyone should have the liberty to do what he or she wanted without being reprimanded for it. He decided to be a rebel against what Ralph stood and what he was trying to accomplish. Jack started up what he called ââ¬Å"his gangâ⬠and he had several people following him. This is very much like todayââ¬â¢s government. There is a leader and followers. Others got tired of Ralph and all of his rules and decided to join Jackââ¬â¢s gang. Piggy was the only one who remained loyal to Ralph and all of his ideas. They shared the same morals and beliefs. They all had their own ideas on how things should be done. Some were too shy to voice their opinions. Jack voiced his feeling and followed up on it by doing whatever he wanted. Ralph let his opinion be known as well. The others just took sides with w...
Subscribe to:
Comments (Atom)