Wednesday, July 31, 2019

Blood Brothers – Development Task

For our coursework, we created several scenes and performed scripted pieces from the play ‘Blood Brothers' by Willy Russell. I shall discuss some of the main scenes we created/performed and what mediums and elements we used to improve them. The first scene I'll discuss is where Mrs Johnstone and Mrs Lyons are arguing over who'll keep the twin. We used various mediums and elements of drama to help us put the scenes from page to stage. I have listed how we implemented elements of drama and what effects they gave below: Content- We produced this scene directly from page to stage, except we added thought tracking to it- two extra character characters that spoke their thoughts. We used the stage directions to produce movement and facial expressions which were the main content of the scene, including the dialog. Actions- We used various different actions both from the script and improvised. These ranged from Mrs Johnstone cleaning at the start, to Mrs Lyons waving her arms in argument. We did this to give the effect of emphasising Mrs Lyons' frustration and madness and to add more visual interest for the audience. It proved very effective as it made the scene more dramatic and evocative. Climax- The climax in our piece was near the end where Mrs Johnstone swears on the Bible to give a twin to Mrs Lyons. We built up tension which lead to this by increasing volume and the tone of frustration in our voices. Reece whom played Mrs Lyons used a more pleading tone whereas I used a more frustrated tone. We did this because we wanted to engage the audience throughout the scene with the build-up of tension and emotion. Contrasts- We created a clear contrast between the characters Mrs Lyons and Mrs Johnstone as shown on the script. These contrasts where presented in social class, which we portrayed through our differently accented voices. Also the dialog of the script suggested their contrast as Mrs Lyons had more authorative lines. In order to develop the contrast in characters further, we also had different postures to connote the contrast of status. I had a more relaxed posture and Reece had a more formal withdrawn posture. We did this to create an interesting conflict in the scene for the audience. Symbols- The only symbolism we used in this scene was the Bible prop. In the script, Mrs Johnstone swears on the Bible. This symbolises a binding contract, especially for her character as she is very superstitious. We used lighting to mark the moment of this symbolism. Willy Russell may have used symbolism in this scene to add tension and interest for the audience as this reveals that an event is going to happen later on in the play. We could have added more symbols to the scene to create more tension. Now I shall explore what mediums of drama we used in this scene to take it from page to stage and develop it further: Costume- We didn't use a particular costume as it was easier to change to different scenes and characters. We maybe should have used costumes that represented their class to show a visual contrast between the two characters. Sound/Music- We didn't use any music in our scene as there wasn't any scripted, however we used a heart-beat sound effect to mark the moment of madness when Mrs Lyons was pleading. We could have used music when Mrs Lyons pleads for the twin to mark the moment and add emphasis on her character's madness more effectively. Space & Levels- We kept spread out on the stage to use space effectively, and we incorporated the use of levels to show a visual contrast in status of the two characters. Mrs Johnstone was generally lower than Mrs Lyons throughout the scene to connote her lower status. Voice- Our voice intonation of anger and frustration built up throughout the scene to add more interest and contrasting moods from the beginning of the scene to the end. This use of voice gave the effect of showing the emotions of our characters clearly for the audience. We rehearsed this scene by initially reading through the script as our characters and using voice intonation to add emotion to the lines as we read them out. We used the explorative strategy of thought-tracking to explore the inner-characters that weren't shown in the script. Then we used the stage directions to take it from page to stage and add movement and gestures. We then added our own improvised actions etc. to develop the scene further. We made the decision of having two additional characters that represent Mrs Johnstone and Mrs Lyons' thoughts to reveal them more effectively to the audience. We also decided to use a heart-beat sound when Mrs Lyons pleaded to show the audience the madness of her character and signify it. I think that the performance of this scene went well as our characters came across as we and the playwright intended. We made our emotions clear for the audience as we portrayed them through our gestures, use of voice etcetera. However, to improve this we could have used music at specific points such as when Mrs Johnstone swears on the Bible so as to mark the moment and add even more emotion to it. We demonstrated that Mrs Lyons and Mrs Johnstone had a good relationship initially, and how it deteriorated throughout the scene by using more infuriated expressions and vocal tones.

Tuesday, July 30, 2019

African American Male Stereotype Essay

Question: Discuss the origins and meaning of any one stereotype of black men (The Brute, Sambo, Uncle Tom, the Coon, the Thug, the Gladiator). Include in your answer, the impact this image has had on either the treatment or identity development of black men. In United States lots of races are stereotyped against but African Americans are one of the most frequent racial groups stereotyped against. One of the most common and damaging stereotype against African American is that all black males are brutes. The brute stereotype portrays black men as dangerous criminals. This is a problem we have been facing in America for over a century and there are no signs that this issue is getting better. The media still keeps on portraying this false image that all black males are violent dangerous criminals and nowadays there are even video games that are about black males going around killing and robbing people. This stereotype has a major impact on how black men view themselves and more importantly how the rest of society views and treat them. To get a better understanding of why United States views black males as brutes we would have to look at its origin. At first blacks were not seen as brutes, during slavery African Americans was viewed as docile and virtuously harmless. It was not until the Radical Reconstructive period when slavery was abolished that black were seen as brutes. White’s southerners argued that without slavery blacks would revert to â€Å"criminal savagery†. Writer Thomas Nelson said that the â€Å"good old darkies† have been replace with blacks born after slavery who he described as dishonest, disrespectful and drunks. Nelson also published Red Rock a novel about Moses a black man who tries to rape white women he is then executed for his â€Å"terrible crime†. At this anti-black propaganda was flooding the streets in local newspaper, books, scientific journals all labeling blacks as brutes. There were even movies made called The Birth of Nation that depicts African Americans â€Å"rapist beast†. This is the how the stereotype that blacks are brutes originated. Due to this stereotype that labeled African Americans as brutes they were severely mistreated. According to the o Tuskegee Institute data 3,437 blacks were lynched in United States from 1882 to 1951 90 percent of them took place in the south. Lynching involves amputation, burning, shooting and hanging done by a white mob. Southerners knew lynching was evil but believed that black brutes were more evil. Many whites argued that lynching was necessary in preserving the purity of the white race. However 25.3 percent  of black that was charged with rape was not guilty. An example would be when 14 year old Emmett Till was visiting his relatives in Mississippi was beaten and tortured to death because he supposedly called a white women â€Å"baby†. Although things are not as bad as the use to be African Americans are still being treated different because of the false stereotype that say all black males are violent criminals. In the article The War on Drugs through The Wire the autho r states that the war on drugs was not about drugs but about who was using them. Independent studies show that both blacks and whites use and sell drugs at similar rates, it’s the response that’s different about 37 percent of African Americans who dropped out of high school was incarcerated in 2008. This shows the disparity in our criminal justice system they even call this mass incarceration of African Americans the new Jim Crow law, this is a consequence of the â€Å"war on drugs†. Not only does this negative stereotype cause the mistreatment for blacks it affects the way black male view themselves. Due to the stereotype that all black males are dangerous criminals it has led African American in a vicious never ending cycle one black male gets locked up and that another child growing up without proper guidance so he himself might follow the same footsteps as his father and end up in prison. This stereotype also causes others who are not black to fear African Americans. In Byron Hurt documentary Gail Dines said the scariest thing to a white person is an African American. An example would be when that unidentified man said when he was walking to his mother car a white lady grabbed her purse went to the opposite sidewalk just so she could grab a quarter for the meter. However there are some black males who are embracing this brute stereotype and benefiting. Mike Tyson is a prime example he has a reputation for being the world’s most ruthless man and he even bit the ear off an opponent. Tyson is quoted saying â€Å"I am an animal. I am a convicted rapist, a hell-raiser, a loving father, a semi-good husband.† Also I believe the whole hip-hop industry embraces this stereotype most of all rap songs talk about drugs, violence and sex reinforcing the negative sterotype that all blacks are brutes. Bibliography Pilgrims, D. (2000). The brute caricature Balboni, J. The war on drugs through the wire looking glass. (pp. 189-203). Durham, Carolina Academic Press Hurt, B. (Producer) (2002). The black man in america [DVD].

Burns

The skin, an important organ that acts as a natural cover and holds our many underlying components together, important in multiple functions, yet it can be so easily marred. Burns, one of the reasons for skin damage, are the destruction of the different layers within the skin by exposure to excessive heat; heat that is greater than 120 degrees Fahrenheit, or by friction, electricity or chemical substances. The heat from the exposure cannot be distributed fast enough in the rest of the body, resulting in a breakdown of tissues exposed to heat.Unlike other tissue damages, burns can cover a wider range of surface area. The causes may come from a variety of events such as boiling liquid, exposure to harmful chemicals, or electrical shock. Signs that indicate a burn may be swelling, redness of the area of damage, and pain. Burns are categorized by degree based on the duration, size and severity of injury; the least severe being first degree burns, second degree burns and the worst, third degree burns. Not only are there the regular, common burns that would first come to mind, but there are also chemical burns and electrical burns.Chemical burns occur when the skin is exposed to a corrosive substance that consists of either a strong base or acid. Electrical burns are cause by contact with electric conducting objects that are live. Types of treatment are determined by the severity and also determine the place to which the person should receive the treatment. Regeneration of the damaged tissue will differ accordingly to the type of burn. First degree burn, it refers to the superficial damage to the skin and causes only local inflammation.The inflammation consists of pain, a small amount of swelling, dryness and redness. Peeling, of the area affected, may be seen. This type of burn will only have an effect on the epidermis. Examples of first degree burns include sunburns, flash burns or any other burn that derives from a brief exposure to severe heat. Treatment for this type of burn depends on the location, cause, extent of the burn and may include cold compresses, skin soothing ointments or pain relieving aspirin. The skin usually heals within a time span of a few days without permanent tissue damage.Second degree burns affect the epidermis and the superficial dermis layer of the skin. The burn is often characterized by moist blisters, skin lesions, and bits of shredded epidermis. Also, the injury is often displayed as white. The area of damage is prone to high risks of infection and victim experiences intense pain around the area. In a lot of cases, second degree burns are the consequences of exposure to flames, scald inducing events and contact with chemicals, electricity or hot objects.The treatments for second degree burns depend of the same characteristic of first degree burns. Second degree burns include the addition of extra care to prevent infections. The skin heals within about 3 weeks and 6 weeks if the wound is superficial or deep, as the skin re-epithelializes. At the end of healing, there is minimal scarring to no scarring at all although discoloration of the area may be present. A third degree burn, also referred to as a full thickness burn, destroys the epidermis, the entire dermis beneath it, injures the subcutaneous tissue, and may spread to the muscles.Accessory structures are destroyed. The area of the wound may appear white and leathery due to the damages done to the blood vessels and nerves. The affected skin may also appear black, yellow, or even brown and is painless due to the impairment of vessels and nerves. The skin loses its elasticity, becomes dry and produces the appearance of being charred. Some of the causes of third degree burns may include scalding liquids, flames, chemical substances, over-exposure to excess heat or even electricity.If not taken into serious account with medical attention, the damaged skin will heal poorly and slowly. Since the epidermis and hair follicles are eliminated, new skin will not form. Treatments for these burns consist of procedures such as attentive care and cleaning, skin grafting, anti-biotic mediation and as such. The smaller areas will take fewer months to heal than the larger areas since those require grafting, which is the replacement of the previous damaged skin with transplant skin through surgery. ttp://www. webmd. com/skin-problems-and-treatments/third-degree-burn-full-thickness-burn http://www. medicinenet. com/burns/page2. htm http://faculty. stcc. edu/AandP/AP/AP1pages/Units1to4/skin/repairof. htm http://www. urmc. rochester. edu/encyclopedia/content. aspx? ContentTypeID=90&ContentID=P01760 http://www. chw. org/display/PPF/DocID/21911/router. asp http://www. metrohealth. org/body. cfm? id=1014&oTopID=1007 http://www. rayur. com/skin-burn-anatomy-definition-causes-symptoms-and-treatment. html Burns The skin, an important organ that acts as a natural cover and holds our many underlying components together, important in multiple functions, yet it can be so easily marred. Burns, one of the reasons for skin damage, are the destruction of the different layers within the skin by exposure to excessive heat; heat that is greater than 120 degrees Fahrenheit, or by friction, electricity or chemical substances. The heat from the exposure cannot be distributed fast enough in the rest of the body, resulting in a breakdown of tissues exposed to heat.Unlike other tissue damages, burns can cover a wider range of surface area. The causes may come from a variety of events such as boiling liquid, exposure to harmful chemicals, or electrical shock. Signs that indicate a burn may be swelling, redness of the area of damage, and pain. Burns are categorized by degree based on the duration, size and severity of injury; the least severe being first degree burns, second degree burns and the worst, third degree burns. Not only are there the regular, common burns that would first come to mind, but there are also chemical burns and electrical burns.Chemical burns occur when the skin is exposed to a corrosive substance that consists of either a strong base or acid. Electrical burns are cause by contact with electric conducting objects that are live. Types of treatment are determined by the severity and also determine the place to which the person should receive the treatment. Regeneration of the damaged tissue will differ accordingly to the type of burn. First degree burn, it refers to the superficial damage to the skin and causes only local inflammation.The inflammation consists of pain, a small amount of swelling, dryness and redness. Peeling, of the area affected, may be seen. This type of burn will only have an effect on the epidermis. Examples of first degree burns include sunburns, flash burns or any other burn that derives from a brief exposure to severe heat. Treatment for this type of burn depends on the location, cause, extent of the burn and may include cold compresses, skin soothing ointments or pain relieving aspirin. The skin usually heals within a time span of a few days without permanent tissue damage.Second degree burns affect the epidermis and the superficial dermis layer of the skin. The burn is often characterized by moist blisters, skin lesions, and bits of shredded epidermis. Also, the injury is often displayed as white. The area of damage is prone to high risks of infection and victim experiences intense pain around the area. In a lot of cases, second degree burns are the consequences of exposure to flames, scald inducing events and contact with chemicals, electricity or hot objects.The treatments for second degree burns depend of the same characteristic of first degree burns. Second degree burns include the addition of extra care to prevent infections. The skin heals within about 3 weeks and 6 weeks if the wound is superficial or deep, as the skin re-epithelializes. At the end of healing, there is minimal scarring to no scarring at all although discoloration of the area may be present. A third degree burn, also referred to as a full thickness burn, destroys the epidermis, the entire dermis beneath it, injures the subcutaneous tissue, and may spread to the muscles.Accessory structures are destroyed. The area of the wound may appear white and leathery due to the damages done to the blood vessels and nerves. The affected skin may also appear black, yellow, or even brown and is painless due to the impairment of vessels and nerves. The skin loses its elasticity, becomes dry and produces the appearance of being charred. Some of the causes of third degree burns may include scalding liquids, flames, chemical substances, over-exposure to excess heat or even electricity.If not taken into serious account with medical attention, the damaged skin will heal poorly and slowly. Since the epidermis and hair follicles are eliminated, new skin will not form. Treatments for these burns consist of procedures such as attentive care and cleaning, skin grafting, anti-biotic mediation and as such. The smaller areas will take fewer months to heal than the larger areas since those require grafting, which is the replacement of the previous damaged skin with transplant skin through surgery. ttp://www. webmd. com/skin-problems-and-treatments/third-degree-burn-full-thickness-burn http://www. medicinenet. com/burns/page2. htm http://faculty. stcc. edu/AandP/AP/AP1pages/Units1to4/skin/repairof. htm http://www. urmc. rochester. edu/encyclopedia/content. aspx? ContentTypeID=90&ContentID=P01760 http://www. chw. org/display/PPF/DocID/21911/router. asp http://www. metrohealth. org/body. cfm? id=1014&oTopID=1007 http://www. rayur. com/skin-burn-anatomy-definition-causes-symptoms-and-treatment. html

Monday, July 29, 2019

Any topic you think is good for my paper Essay Example | Topics and Well Written Essays - 250 words

Any topic you think is good for my paper - Essay Example I posit that natural-supernatural distinction exists in all cultures. All religions including Christians, Muslims, and Buddhists among others believe in a supreme being, which they call God. It is simple to see that cultures attach more power in supernatural. They believe that the natural comes and is influenced by the supernatural. Therefore, they have a clear distinction between natural and supernatural. In addition, all cultures around the world have their own supernatural beliefs. It is hard to find a culture that does not have cultural beliefs, which are based on supernatural beings. However, it is important to note that different cultures have different ways in which they express their supernatural beliefs. In my opinion, natural-supernatural distinction exists in all cultures. The only difference is that different cultures have different ways in which they relate with natural and the supernatural. In addition, natural-supernatural distinction is relative. This is because what may appear as supernatural to one culture may not be supernatural to another culture. However, natural-supernatural distinction does indeed exist in all

Sunday, July 28, 2019

Infrastructure Issues in India Term Paper Example | Topics and Well Written Essays - 1250 words

Infrastructure Issues in India - Term Paper Example This paper attempts to evaluate existing infrastructural issues in India and how they affect the country’s overall economic prospects. India’s poor infrastructure is a huge obstacle towards the country’s overall economic growth prospects. In essence, India is among the fastest growing economies in Asia and the world in general though its huge growth projects have been hindered by the extremely poor infrastructure found in the subcontinent. The paper further examines the relevant frailties in India’s infrastructure evaluating the available options for improvement and better performance. To underscore the infrastructural issues of India and its needs, the paper will conduct a comparative analysis between India and China as regards infrastructure. Conceivably Indian infrastructural planning has been below the standards resulting into substandard infrastructures. Economic growth requires adequate and quality infrastructure, which serves as a huge aid towards d evelopment and economic activity. Poor infrastructure, on the other hand, hinders basic economic activities and dilutes government’s attention on crucial economic matters. For better economic performance, it is essential to have an infrastructure that can support the economy and its business activities. Therefore, it is of great importance that India elevates its infrastructure to an advanced level that can support its economic and growth perspectives. In essence, India needs to consider the investment in power, energy, healthcare, water/waste management and address policies supporting the development of infrastructure. Such an approach will go along way in boosting the country’s infrastructural levels providing it with the necessary impetus to pursue its ambitious economic endeavors. Statistically, more than half of India’s shipment and 80 percent of traveler traffic moves on the freeway network, which largely comprises two-lane roads. The country has 700 kilom eters of thruways, mostly reserved for cars, buses and trucks. Most of the expressways with four lanes run through Ahmedabad and Vadodara as well as between Pune and Mumbai. China, on the other hand, has 74,000 kilometers of superhighways up from 147 kilometers in 1989 (Huang 3). Therefore, is far much behind China in the road network and though India’s has ambitious infrastructural projects it will take a long time for the subcontinent to catch up with China. In August 2009, Indian Prime Minister Manmohan Singh developed a goal of constructing 20 kilometers of new highways a day as a fraction of efforts to advance infrastructure graded below Kazakhstan’s and Guatemala’s, according to the World Economic Forum. The daily standard was 4.5 kilometers in 2011, according to PricewaterhouseCoopers LLP. India endeavors to expend as much as $1 trillion in five years on power plants, roads, and ports (Sundaram 1). India may use $5.3 billion tripling the span of its expre ssway network to reduce traffic jams that are slowing commerce, wasting fuel, in addition to sapping economic growth. The country proposes to add approximately 1,600 kilometers (1,000 miles) of highways with at least six lanes. In an interview, Raghav Chandra -who is the joint secretary at the Ministry of Road Transport and Highways- confirmed that India has great plans to refurbish its road network so as to create an enabling environment for trade and overall economic

Saturday, July 27, 2019

Human Morals Essay Example | Topics and Well Written Essays - 5500 words

Human Morals - Essay Example The paper tells that people have moral values – this is a universal maxim. However, philosopher, thinkers and scholars differ in their opinion on the history and origin of human morals. While some like Karl Marx believe that morality is a product of capitalism, Stankov contends that man’s nature acquired a moral sense in pre-historic times. Debates and discussions continue with the proponents and opponents presenting their arguments. Different religious groups also have their own stand on the origins of human morals. For instance, Christianity believes that morality has been endowed by God in the form of Ten Commandments. Even though morals are natural and spontaneous, with time and as situations changed, certain modifications have been made based on the religious and cultural affiliations, to help people cope with the changed environment. However, human morals are basically innate and universal because if they were not innate they would not be spontaneous, and some mor als would not be universally accepted by every society, culture and religion. Morals are the values that are concerned with the principles or rules of right conduct or the distinction between right and wrong. Morals are concerned with the judgment of the goodness or badness of human character and action. This implies that virtuous deeds are those that conform to standards of what is right or just in behavior. Moral behavior is defined as the action of a person who sympathetically takes into account the impact of his action on others. (Ayala, 2010). Moral beliefs are the beliefs that one has about how to live life when one takes a sympathetic view of how the person’s life and decisions impact others. However, moral beliefs and values, the moral standards or morality have changed with time. It also depends upon individual environment, individual experience, upon religions and upon the cultural environment that one grows up in. Morals are natural and morality is the expression o f man’s innermost character (Johnston, 1916). Morals are spontaneous, honest and straightforward; they are traditional and universal. Humans and morals Human conduct involves not just consciousness but self-consciousness. Human are the only moral beings endowed with the mind and reasons, endowed with consciousness and self-consciousness, with personality, free-will and conscience (Stankov, n.d.). This implies that all humans possess moral strength – they are thinkers, workers and creators, responsible for the harmony of the world. Stankov states that since the formation of the homo sapiens in prehistoric times, man’s nature acquired a moral sense. No other creature is responsible for all its deeds and humans are held responsible because they have been endowed with the moral sense. Marxism treats consciousness as a derivative of the material process. However, attributes such as hatred, selfishness and violence on the one hand and loving, caring and fellow-feeling on the other, constitute the moral sphere and these are independent of the material process (Patnaik, 1995). The material sphere is also important for the human existence but it has no connection with the spiritual reality. Marx believes that the moral history of humankind has no parameters but is a derivative of the material history. The human species possesses moral as well as physical structures both of which are essential to satisfy its needs. The psychic structure is the starting point of the moral evolution. Nietzsche believes that are no absolute morals and there are no moral systems that humans need to abide by. This implies that he does not believe in any moral system and the strong can overpower the weak by any system. He states in the Genealogy of Morals that there are no moral codes of conduct; there are no values or actions that are moral (Nietzsche, 2009). People interpret them as good or bad, moral or immoral. This view implies that human morals are not internal and that they do not drive or guide an individual from performing or not performing any act. It also

Friday, July 26, 2019

Mycenaean Civilization Term Paper Example | Topics and Well Written Essays - 1750 words

Mycenaean Civilization - Term Paper Example This work talks about the Mycenaeans, who were known as a â€Å"warrior culture†. Although the Mycenaean civilization began in 1550 BC, the occupation of Achaeans or Mycenaeans of many areas of the Greek peninsula, especially the coastal areas, started in 2000 BC. The Mycenaean civilization was the Late Helladic civilization in 1550 BC, but after the volcanic eruption at Thera in 1500 BC, the Mycenaean civilization at Knossos began in 1450 BC. This was followed by the destruction of Knossos in 1380 BC but a revival, development and perfection of Mycenaean architecture in 1350 until 1250 BC. During the revival of architecture, the Mycenaeans became â€Å"wealthy and powerful† and became â€Å"the most powerful group in the Aegean world† . It was also around this time that the Mycenaeans invaded the Minoan civilization and conquered Troy. However, the fall of Mycenaean civilization occurred in 1200 BC and was marked by the destruction of several Mycenaean sites and was finally concluded in 1184 BC by the destruction of Troy. The paper also talks about the decline of the Mycenaean civilization. There were several theories as to the cause of its fall. The most probable explanation, however, was the invasion of another nation known as the â€Å"Dorians,† and such invasion caused the Mycenaean civilization to fall into the â€Å"dark age†. This was, however, opposed by other historians who said that the destruction of the Mycenaean civilization did not happen until 100 years after the Dorian invasion.

Thursday, July 25, 2019

Hair. William Faulkner Essay Example | Topics and Well Written Essays - 1000 words

Hair. William Faulkner - Essay Example His detachment from the events narrated allows him to be a compassionate and sensitive commentator, whose views we feel we can trust, even though Faulkner misleads us at the end. He seems to understand Hawkshaw's attachment to the girl, and even treats her premature sexual adventures with sympathy rather than disgust: "nature don't pay any attention to systems, let alone women paying any attention to them I say she couldn't help herself. It wasn't her fault" (133-4). The story is in three parts, the second explaining the first by retreating in time, and the third bringing about the dnouement. Hawkshaw is presented as an isolated figure in a community, which the critic Joseph Reed identifies as being a key motif in Faulkner stories. "Faulkner without a group is without a point of reference essential for his most effective narrative" (Reed, 20). The group varies from story to story; it can be a family, or a particular social grouping, or, as in Hair, a whole town. Hawkshaw is quietly kind to the girl, and is so self-effacing that when he insists that "I'll tend to her", Maxey tells the narrator "that was the first time he ever heard him speak positive about anything" (132). The girls' growth is captured with fine economy. She walks "fast like little girls do", then makes friends at school and passes "not looking toward the window at all" (132), so that Hawkshaw's devotion to her is already under threat. Soon "she got grown fast" (133) and she is h itching up "the regular simple gingham and such dresses that a thirteen-year-old child ought to wear" (134). Hawkshaw has given her presents, including the doll which he "never told" anyone about (133), but it seems to be clear to everyone that his interest in her is not unhealthy. It is appreciated that there is a genuine love in his attitude, which is respected by the others. When the men talk of how she has gone to the bad, "it was while Hawkshaw was not there" (134), and when Maxey does voice his crude suspicions - "Any old man that will fool with a young girl, he's pretty bad" - Matt's comment is a reprimand: the reason is a moral one, "he thinks she is too young to receive jewelry from anybody that aint kin to her" (136). Part II fills in Hawkshaw's past, and lets us a little way into his true thinking, showing that his interest in the girl must be serious, heartfelt and deeply human. He had married the Starnes daughter, showing a real devotion to her and her welfare, learning barbering and going off to work in Birmingham, "Rode part of the way in wagons and walked the rest, coming back each summer to see the girl" (138). He spent all his savings on her father's funeral, and then started saving again for the marriage. He acted out of mature devotion. The narrator cannot convey Hawkshaw's grief when she dies. We only have the immensely touching detail of the picture and the lock of hair, which "both got lost, the hair and the picture, in the mail somehow" (139). He devotes himself then to serving her memory in the only way he can, by paying off the mortgage on the parents' house and returning every April, as on a pilgrimage, to clean it The April "vacation" is utterly essential to him, like a religious observance. At previous employers' he had given up his job

Wednesday, July 24, 2019

What is the purpose of government in the United States Essay

What is the purpose of government in the United States - Essay Example Seeking to explore the purpose of the US government with respect to the roles that it plays in the modern 21st century, the following will argue that there are many roles for the government of the United States. These include the promotion and continuation of democratic governance, economic development, the provision of social services, promoting justice and securing the nation from outside threat. All of the functions are inherent to the purpose of the United States. We now turn to an exploration of the government of the United States of America and its role as the torchbearer of democracy (Almond et al, 101-102). . One of the most important functions of the government of the United States is the promotion of liberal democracy. In a liberal democratic society, power rests with the people. Liberal democracy can be characterized by free and fair elections, universal suffrage and a plural society in which power is transferred through peaceful political means. Accordingly, stability in much of the world is defined as the establishment of both democracy and democratic rules of governance. By giving everyone a voice at the ballot, the argument follows that the political regime which gains power will be perceived as being legitimate and the result will be political stability. Accordingly, the role of the United States government is to ensure that political power is transferred through peaceful means and that political contiguity is maintained through the democratic system. As an entrenched cultural value of the United States, the promotion of liberal democracy is an important task for the government o f the United States. The promotion of economic development is another responsibility for the government of the United States. As a society with a capitalist economic system, the government of the United manages the economic system while understanding the importance of free

Paper 1 about Chinese media industry Essay Example | Topics and Well Written Essays - 1250 words

Paper 1 about Chinese media industry - Essay Example As markets in Western and Eastern economies opened up, various countries in Asia, including Taiwan, South Korea, Singapore, and Hong Kong took advantage of expanding export markets to strengthen their economies. It was in this context that the Chinese state Under Deng Xiaoping decided to institute market reforms, specifically to make their socialist policies more competitive in an increasingly global economy (Harvey, 2005). Neo-liberal influences were mostly driven by economic stagnation and unemployment in Western countries, which necessitated a new system that diverged from the state interventionist policies introduced under the American New Deal of the 1930s. Under the neo-liberal theories that came to dominate global economics thinking in the 70s and 80s, state intervention in markets was greatly discouraged with the expectations that self-regulating markets were the best way to tackle economic stagnation (Selden, 1993). It was within this context of a neo-liberal revolution in Western economies that Chinese market and media reforms began. Increasingly, China’s integration with the global economy, which was based on neo-liberal theories, supported by free market Western economies, necessitated reforms in the allocation market economy supported by China under the previous Mao regime. When China finally opened up its markets to the global economy, there was a dramatic inflow of FDI and the sta te began to openly support moves towards market freedom (Selden, 1993). This meant that China started to experience similar effects to its economy as the neo-liberalized global economy, which increased the capitalization of China’s elites in comparison to its ordinary citizens (Zhao, 1998). The historical context within which media and market reforms took place in China mainly had to do with the Communism vs. Capitalism debate, which characterized relations between Western economies and Eastern economies. Media reforms also took place within this

Tuesday, July 23, 2019

Describe key financial statements, including balance sheets and cash Essay

Describe key financial statements, including balance sheets and cash flow statements - Essay Example The income statement is usually valid for a period that is specific. This may be a month or a year. Nonetheless, income statements are indispensable. This is because they permit the owners of a business to evaluate the business results over a period and to know the outcomes of other businesses for a similar period (Longenecker, Petty, Palich & Hoy, 2012). A cash flow statement illustrates the flow of money out and in a business. The cash flow statement depicts both the accompanying alterations and the current results of operation in the balance sheet. A cash flow statement is helpful in ascertaining the viability of a business that is short-term, most importantly, its capacity to pay costs. Moreover, a cash flow statement highlights the true cash flow paid and received by the business. A cash flow statement highlights the flows of cash from operations, that is, the staff and suppliers’ payments, and money received from clients (Longenecker, Petty, Palich & Hoy, 2012). Also, it shows cash flows from investing activities and financing activities. Cash equivalents are assets that can be willingly converted to money, for example, commercial papers, treasury bills, money market, or marketable securities. Moreover, cash equivalents have an existence that is short-term. Cash equivalents mature within a period of 3 months. A cash equivalent investment should have a change in value that has insignificant risk (Graham, Zweig, & Buffett, 2003). Accounts receivable is cash owed to a business by customers and the balance sheet depicts it as an asset. It deals with the billing of a client for services and goods ordered by the client. In addition, accounts receivable epitomizes cash owed by persons to the business on services or products sales on credit (Graham, Zweig, & Buffett, 2003). An inventory is a list of materials and goods that are stocked by the business. Inventories are mainly materials and goods

Monday, July 22, 2019

Poverty in India Essay Example for Free

Poverty in India Essay Poverty is the deprivation of food, shelter, money and clothing that occurs when people cannot satisfy their basic needs. Poverty can be understood simply as a lack of money, or more broadly in terms of barriers to everyday life. It refers to a situation where a person is unable meet the basic necessities of life. Absolute poverty or destitution refers to the state of severe deprivation of basic human needs, which commonly includes food, water, sanitation, clothing, shelter, health care, education and information. The amount of income a person or family needs to purchase an absolute amount of the basic necessities of life. These basic necessities are identified in terms of calories of food, BTUs of energy, square feet of living space, etc. The problem with the absolute poverty level is that there really are no absolutes when in comes to consuming goods. Relative poverty views poverty as socially defined and dependent on social context, hence relative poverty is a measure of income inequality. Usually, relative poverty is measured as the percentage of population with income less than some fixed proportion of median income. There are several other different income inequality metrics, for example the Gini coefficient or the Theil Index. Relative poverty measures are used as official poverty rates in several developed countries. As such these poverty statistics measure inequality rather than material deprivation or hardship. The measurements are usually based on a persons yearly income and frequently take no account of total wealth. Definitions United Nations: Fundamentally, poverty is a denial of choices and opportunities, a violation of human dignity. It means lack of basic capacity to participate effectively in society. It means not having enough to food and clothing a family, not having a school or clinic to go to, not having the land on which to grow one’s food or a job to earn one’s living, not having access to credit. It means insecurity, powerlessness and exclusion of individuals, households and communities. It means susceptibility to violence, and it often implies living in marginal or fragile environments, without access to clean water or sanitation. World Bank: Poverty is pronounced deprivation in well-being, and comprises many dimensions. It includes low incomes and the inability to acquire the basic goods and services necessary for survival with dignity. Poverty also encompasses low  levels of health and education, poor access to clean water and sanitation, inadequate physical security, lack of voice, and insufficient capacity and opportunity to better one’s life. Copenhagen Declaration: Absolute poverty is a condition characterized by severe deprivation of basic human needs, including food, safe drinking water, sanitation facilities, health, shelter, education and information. It depends not only on income but also on access to social services. The term absolute poverty is sometimes synonymously referred to as extreme poverty. World Health Organisation: Poverty is associated with the undermining of a range of key human attributes, including health. The poor are exposed to greater personal and environmental health risks, are less well nourished, have less information and are less able to access health care; they thus have a higher risk of illness and disability. Conversely, illness can reduce household savings, lower learning ability, reduce productivity, and lead to a diminished quality of life, thereby perpetuating or even increasing poverty. Poverty line is the minimum level of income deemed adequate in a given country. In practice, like the definition of poverty, the official or common understanding of the poverty line is significantly higher in developed countries than in developing countries. The common international poverty line has in the past been roughly $1 a day. In 2008, the World Bank came out with a revised figure of $1.25 at 2005 purchasing-power parity (PPP). Determining the poverty line is usually done by finding the total cost of all the essential resources that an average human adult consumes in one year. Individual factors are often used to account for various circumstances, such as whether one is a parent, elderly, a child, married, etc. The poverty threshold may be adjusted annually. Below Poverty Line is an economic benchmark and poverty threshold used by the government of India to indicate economic disadvantage and to identify individuals and households in need of government assistance and aid. It is determined using various parameters which vary from state to state and within states. The present criteria are based on a survey conducted in 2002. Going into a survey due for a decade, Indias central government is undecided on criteria to identify families below poverty line. Poverty in India The problem of poverty and unemployment is considered as the biggest  challenge to development planning in India. High poverty levels are synonymous with poor quality of life, deprivation, malnutrition, illiteracy and low human resource development. The slogan of poverty eradication has been adopted by all political parties in one form or another and there is a national agreement for the goal of poverty alleviation. The national consensus on poverty alleviation provided the necessary condition for launching various schemes and programmes aimed at achieving this objective. But the persistence of poverty during all these years suggests that the national consensus on objectives did not and could not provide sufficient conditions for poverty alleviation. The starting point for estimating the number of households below the poverty line is a nutritional requirement per person per day at some base point. There is a debate on the minimum calorie requirement, and whether it should be the same for all parts of the country. Most acceptable figures are 2,400 calories per person per day in rural areas, and 2,200 calories per person per day in urban areas. The next step is to translate the nutrient requirement into monetary terms. The expenditure level of households which are able to spend the requisite amount to obtain the desired calories serves as the cut-off point, or the poverty line. To adjust the poverty line over a period of time, price variations have to be considered and an appropriate price deflator has to be selected. The problem arises in deciding upon such a deflator. Thus, the following elements mainly affect the magnitude of the poverty ratio: (i) the nutrition norm (translated into monetary terms); (ii) price deflator used to update the poverty line; and (iii) pro rata adjustment in the number of households in different expenditure classes to determine the number of households below and above the poverty line. Different assumptions and methods are used for these three purposes, which accounts for the different estimates provided by scholars. The Planning Commission has been estimating the incidence of poverty at the national and state level using the methodology contained in the report of the Expert Group on Estimation of Proportion and Number of Poor (Lakdawala Committee) and applying it to consumption expenditure data from the large sample surveys on consumer expenditure conducted by the NSSO (National Sample Survey Organisation) at an interval of approximately five years. Estimates of Poverty (Per cent) Year All India Rural Urban All India Poverty Ratio Rural Poverty Ratio Urban Poverty Ratio Number (per cent) Number (per cent) Number (per cent) (Million) (Million) (Million) 1973-74 321 54.9 261 56.4 60 49.0 1977-78 329 51.3 264 53.1 65 45.2 1983 323 44.5 252 45.7 71 40.8 1987-88 307 38.9 232 39.1 75 38.2 1993-94 320 36.0 244 37.3 76 32.4 1999-2000 260 26.1 193 27.1 67 23.6 2004-05 239 21.8 170 21.8 68 21.7 Problems caused due to poverty Human poverty measures suggest even worse outcomes than for income poverty in India. India has never been a good performer in human development terms, despite the much better indicators in some states, particularly Kerala. Overall, both health and education indicators have lagged well below those in other countries at similar levels of development and with similar per capita income. But food poverty has been of particular concern. Recent studies have shown alarming levels of hunger, especially in certain states of India. Studies by IFPRI and ISHI quoted in Banerjee (2008) suggest that most states in India rank somewhere among the poor Sub-Saharan countries:  Punjab, Kerala, Andhra Pradesh and Assam have a „serious‟ level of hunger; Madhya Pradesh fares worst in the „extremely alarming‟ cohort of hunger. All the other states record an „alarming‟ level of hunger, which is also the general ranking for the whole country. More appallingly, the situation appears to have worsened in the recent period of rapid economic growth. National Sample Surveys shows declining per capita calorie consumption, not only among the entire population, but also among the bottom quartiles, for which consumption was already very inadequate by international standards. Other indicators of both nutrition and health are also extreme. The latest National Family Health Survey for 2005–06 shows that the proportion of underweight children below the age of five years was 45.6 per cent in rural India and 32.7 per cent in urban India, indicating hardly any change from the previous survey undertaken eight years previously. More than one-third of the rural population was also underweight. Anaemia often a good indicator of nutritional deprivation was also widespread: 79.2 per cent of children aged 12–23 months and 56.2 per cent of ever-married women between 15 and 59 years were found to be anaemic. Conclusion Poverty Alleviation Programmes The poverty alleviation programme have been broadly classified into self-employment programmes, wage employment programmes, food safety programme and social security programmes. The focus is on the central government schemes only. It is not possible to map the special programmes of all the states. It must be noted here that some of the progressive states have added additional components or given further subsidy to enhance the benefits of the central schemes. For example, in the highly subsidized public distribution system of Andhra Pradesh, the BPL card holders were provided rice at Rs. 2 per kg. Self-employment programmes: This programme was started in 1970s in rural areas of the country in the name of Integrated Rural Development Programme (IRDP) to increase the source of income of small farmers and landless labourers. The beneficiaries were given subsidized credit, training, and infrastructure, so that they could find new sources of  earning. In this scheme, agricultural labourers and small farmers received new skills to involve in vocations other than cultivating land. They included fishery, animal husbandry, and forestry. In the 1980s, this scheme was extended to schedule castes and tribes, women and rural artisans. Wage employment programmes: The main purpose of the wage employment programmes is to provide a livelihood during the lean agricultural season as well as during drought and floods. Under these programmes, villagers worked to improve the village infrastructure such as deepening the village ponds, constructing village schools and improving the rural roads. Thus the programmes not only provided employment to the villagers but also improved village infrastructure and created village public assets. A positive fall out of this programme is that it created higher demand for village labour, thereby pushing up the wage of the labourer in the villages. Food security programmes: Meeting the very basic need of access to food is a major challenge to the government in the post-economic reform era. Those who are below poverty line are faced with the problem of meeting this very basic need. Starvation and hunger have been reported in different parts of the country, even in economically advanced states like Maharashtra. There is malnutrition in all age groups, especially among children. Problem of low birth weight due to under nutrition of mother during pregnancy and underweight of children are rampant in the country. The purchasing power of certain section of the society is so low that they cannot access food at the market price. They need the safety net of food subsidy. In this context, public distribution system or PDS assumes importance. Social security programmes: Social security programmes are meant for those who are at the bottom of the BPL facing destitution and desertion. The central government has launched the National Social Assistance Programme or NSAP in August 1995. Under NSAP, there are three schemes. The first one is the National Old Age Pension Scheme or NOAPS. A pension amount of Rs. 75 per month is given to those who are above the age of 65 years and are destitute without any regular source of income or support from any family members or relatives. Though it is a very useful scheme for the elderly destitute, the coverage of the programme was not satisfactory. In the year 1999-2000, 8.71 million eligible elderly were identified, but the scheme could reach out to only 5 million beneficiaries. It was found that the benefits really reached the  poor and the leakage rate was found to be low.

Sunday, July 21, 2019

Role of Social Media in Developing Awareness

Role of Social Media in Developing Awareness Part A: Use of social media Social media plays an important role in awareness creation. It provides the best mode of communication to many organizations in the present world. It involves the use of social networks such as Televisions, face book, websites among other broadcasting techniques. Social media build an idea environment for interaction where people can meet and share their idea. Communication in the social media covers a wide area since many people are accessible to the information, for instance, many people can access information posted to a Facebook page. Information posted can be spread to many people over a short period of time. Advancement in technology has played an important role in improving social media communication. People who are a distant apart can communicate to each other as if they are close to each other. Many organizations have utilized the social media to communicate their agenda to the mass. This text will focus on Acorns Childrens Hospice, one of the social care organizations by an alysing how the organization utilizes social media to create its awareness (Firth, Luff, Oliviere, 2005, 58). Acorn children hospice trust is one of the registered charity organizations that offers network of care and support to the life-threatened and life-limited children and their families across the entire central England. The organization constitutes a well community team that offers support to families in their homes. Aware creation is important since it helps the family to mobilize resources and seek for support from various organizations in order to support the charity work. Social media enhances the acknowledgement of the organization and its activities globally and therefore, anybody willing to support the organization can do it from wherever they are (Firth, Luff, Oliviere, 2005, 56). The organization uses various social media to communicate on their values. These include advertisement through the television. This provides an ideal method of awareness creation since most people are accessible to television in the present world. The advertisements are made at a given interval period of time repeatedly so that many people can acquire the information communicated on the advertisement. For example, the North West hospice club jointly came together to launch a joint TV advertisement. The main aim of the advertisement was to raise funds and creation of awareness about their existence They also use Face book to advertise their services and terms of operation. For more emphasis, they upload the group photo of the children supported by the organization and post it on face book. Through these, anybody who accesses their page will see their existence. Face book forms one of the most used social media today. Studies show that most youth today are addicted to Face-book, approximately more than half the youth population in the world access Face book every day. They access Face book through chatting with friend and in the process they can come across the adverts made via the Face book. They have form their Face book link and twitter link that people can follow to access their information They also have a website where they post their activities and news. Anybody can access the information posted on the website when he or she visits the website. They have a well-organized website where they description. They have pages and links on the website that people can follow in order to partner with them in their activities. One can reach their site by clicking www.acorns.org.uk. Websites are not very popular compared to the Facebook and twitters. The advantage in the website is that they provide a deep description of the activities of the company and therefore, one can get full details about the company from their website. Advertisement on the website is conducive for the current digital world, the advertisement can be read by any person in the world. The only disadvantage with this kind of advertisement is that the analogue people may not get the information and therefore they may not get accessed to the information. This mode of awareness creation only favours literate peop le and this that the information is limited to the learned people who can access the internet (Brown Warr, 2007, 35). The organization also uses social interaction and engagement in social activities to advertise their existence. This provides one of the best way of awareness creation, however, it is only limited to the region where the firm is located. The children home is the official charity of Aston Villa. They have the acorn’s day where they engage in so many activities. Since people like football, the association of the organization with football enhance the knowledge of people about the organization (Tuten, 2008, 68). Internet is used by people of all ages and therefore it forms one of the major medium of communication and is used to replace the TV advertisement, magazine and newspaper advertisement because of their limited coverage and lack of standardization. Online advertisement does not limit the volume of information that can be posted on the net and therefore, it allows the organization to give a full description of their activities. The organization can improve their awareness creation campaign using the social media by forming a link that link that can allow people to access the information using the phones via the text message. The information presented in this manner will reach the biggest percentage of people in the whole world including people who are not accessed to network. Communications on the social media are usually communicated in English which is a common language of the social network. This limits people who cannot understand English from acquiring the information. The information can be structured in that it is communicated in various language that at least many people if not all can understand. The information posted should give a detail of their programs, their ambitions and visions as an organization rather than just communicating their existence. People will get attracted to the company and be willing to visit their social websites and social Face book accounts after learning of the organizational visions and operational strategy. Evaluation according to appendix 3 Does your agency use social media? (since when, in what ways) Yes, the urgency uses social has been using social media since the period when it was formed. The group uses TV, and social networks such as Facebook to create awareness. How successful do you think it is? The use of social network has helped the organization to get donors who support the program. How many of your staff have social media skills? About a half of the staff members have some skills in social media Do you use social media in direct service delivery? Yes How might your agency/organisation use social media in the future? The organization can advance in its use of social media establishing a data base that will be used to update the organization’s program to the interested people. Is there anything else you would like to say on the use of social media in social care? Social media plays an important role in awareness creation about the social care organizations. Part B: Reflective Summery Effective communication is fundamental factors in an individual’s life. It is the key interpersonal skill and learning how an individual can improve communication skills is an important value in life. Communication involves the sending of the message and receiving of the message. Engagement in activities in these modules has enhanced my communication and interpersonal relations in various ways. Proper communication and interpersonal understanding enhances the individual’s relationship in the social area (Donnelly, Neville, 2008, 37). It helps in avoiding misunderstanding and possible conflicts that may arise between two individuals. People conflict over issues because of misunderstanding that arises from poor communication skills. Eloquent speech shows maturity and organization in an individual’s thinking. Through the module, my way of information presentation has improved in that I can now present information in a way that it can be understood easily. One of the important aspects in communication that I learnt is the art of listening. Listening is a critical element in a communication that involves more than one person. It mostly affects the verbal communication. Poor listening leads to misunderstanding in the communication and this may result to disagreement between the parties involved in communication (Donnelly, Neville, 2008, 39). There is need of using clarification and reflections in order to understand the meaning and the intention of the communication from the other party to avoid confusion. Interpersonal skills help us to communicate effectively and interact with people in our daily activities. People with strong interpersonal skills are usually successful in both the personal and professional life. Good interpersonal skills bring out the perception of calm, optimistic charismatic and confident in and individual and these qualities are usually appealing to others. Through the module I have acquired confident to relate positively with every person I interact with unlike in the past where I could segregate myself and chose people to communicate with. Effective communication is a communication that is bias free and does not tolerate prejudice. Some of the interpersonal skills learned in the module include verbal communication, non-verbal communication, negotiation, listening, problem solving, decision making and assertiveness. I can now express my ideas in an organized manner and in a scenario where there is need of negotiation; I know the approach to take. The study about communication skills and interpersonal skills is an important study that should be encouraged in any learning institution. Many people lack proper communication and interpersonal skills and therefore, they cannot address matters affecting them in the best way. This is the reason why there is a lot of wars and conflict in many parts of the world today. These skills are also important in the development and success of any business organization (Koprowska, 2010, 128). Building good communication skills help in reducing stress. Proper communication builds friendship and strong social support to an individual. One can easily vent out issues affecting them to the people they trust. On the other hand, interpersonal skills enable an individual to make appropriate decision on matters affecting him or her (Whitcomb, Whitcomb, 2013, 190). People usually face problems and challenges in the daily life and the major problem comes when an individual has to make a decision on a given matter at hand. This is the point where many people fail and because they don’t know the decision making skills, they end up making poor and informed decision that causes a lot of problems in their life. The module enhanced my decision making skills in that now I can take time, analyze the problem and eventually come out with an appropriate decision. Proper communication needs experimentation and practice. The skills are learned through experience and they improve along the course of life. Communication requires application of ethics and etiquette. In communication, I have learned to be honest and never to criticize anybody during the conversation. Communication involves allowing oneself to be challenged by other people’s idea. One should focus on the conversation during the communication process and avoid any form of interruption that may deter effective communication. Some of the ways in which an individual can improve the interpersonal and communication skills are as follows. An individual may seek an opportunity to lead in order to improve on the communication and interpersonal skills. Leadership provides a god ground for training individuals on their interaction with other people within the organization. To improve on the interpersonal skills, one ought to take up proactive initiative in any position they are. For instance, in a business setting, one may bring up fellow co-workers together to solve a problem within the institution or develop a concept that will help improve the performance of the business organization (West, Turner, 2011, 25). Through such activities, one learns how to effectively communicate with other people and at the same time he or she develops the interpersonal skills. Interpersonal skills are also perfected through practice. For example, people may learn to express themselves by engaging in writing activities since through it, it train it help a person to think before speaking out. Writing requires control and therefore, it helps people to communicate to themselves. Internal communication precedes the interpersonal communication; consistent writing can help a person improve on the interpersonal and communication skills. On the other side, practice can also be conducted by rehearsing communication skills by recording tool. Learners can record can record themselves and later on listen or watch themselves speaking. In the analysis, the person analyses the effective use of body language, language command, and tone of voice and the level of confidence. Acting is an art that offers a good opportunity to relate with various groups of people. It can enable a person to build on language command and confidence. Through acting, a person gets a chance to communicate on the stage in a manner that the audience can understand and appreciate. Through this, a person is able to build on his or her communication and interpersonal skills. There are several leaders in many spheres of life who expresses good communication and interpersonal skills. Taking time to watch and listen from speeches made by such leaders may also guide an individual to enhance the interpersonal skills. Communication and interpersonal skills determines how far an individual may go in terms of social related activities. This means that it also dictates personal success, poor communication and interpersonal skills result into failure in life (West, Turner, 2011, 23). SMART action plan Learning Objective How will objective be achieved? Action Plan How will objective be evaluated? To enhance the interpersonal and communication skills Form discussion forums and social interactions that will help people develop courage and confidence Analyse the ability of an individual to communicate in a group of people To enhance proper relations and ability to express ones idea Practice a lot of writing art Determine an individual’s ability to respond to situation and interact with various people. Enhance decision making skills Identify a problem and try to formulate a solution to the problem Analyze the effectiveness of an individual to handle a problem.

Cryptography: Theories, Functions and Strategies

Cryptography: Theories, Functions and Strategies Abstract Digital signing is a mechanism for certifying the origin and the integrity of electronically transmitted information. In the process of digitally signing, additional information called a digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document. The mathematical base of the digital signing of documents is public key cryptography. This work presents the theory behind digital signatures, signature schemes and attacks on signatures and provides a survey of application areas of the digital signing technology. Moreover, there are lab exercises developed in Mathlab, to reinforce the understanding of this technology. 1. Introduction The Concise Oxford Dictionary (2006) defines cryptography as the art of writing or solving codes, however modern cryptography does not met this definition. Therefore, this work starts with a literature review defining some key concepts, like what cryptography and cryptographic system are and the different types of cryptographic system are presented. The other interesting and preliminary concept is the notion of cryptosystem functions which are also discussed in the introductory section. Furthermore, it is stated that public-key encryption represents a revolution in the field of cryptography, and this work poses some basic definitions on this topic trying to explain the theory behind. The rest of the literature review is concentrated on public key cryptography and it focuses on the theory behind digital signatures, signature schemes and attacks on signatures. And finally, the literature review presents a survey of application areas on digital signatures. One part of the contribution of this work, is an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. The main part though, is the implementation of AES and RSA by utilizing Mathlab. The code of all these implementations is thoroughly discussed and explained in this work. Moreover, a comparison is also presented subsequently. 2. Cryptography The Greek words â€Å"krypt ´os† standing for â€Å"hidden† and the word â€Å"l ´ogos† that means â€Å"word†, are in essence the base from where the word cryptology was derived. As these words denote, cryptology can be best explained by the meaning â€Å"hidden word†. In this context, the original purpose behind cryptology is hiding the meaning of some specific combination of words which in turn would insure secrecy and confidentiality. This is a very limited viewpoint in today’s perspective and a wide range of security applications and issues now come under the term of cryptology (rest of the portion of this section will clarify this point of view). As field of mathematical science, Cryptology includes the study of both cryptanalysis as well as cryptography. On one hand, cryptography is a very broad term and represents any process used for data protection. On the other hand, the study of security related issues and the probabilities of breaking the cryptographic systems and a technique is known as cryptanalysis. By making reference to (Shirey, 2000), the field cryptanalysis can be best described as the â€Å"mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide.† In simple words, cryptanalyst can be regarded as the opponent of the cryptographer i.e. he/she has to get around the security which cryptographer devised on his/her part. (Buchmann, 2004) claims that a cryptographic system (or in short a cryptosystem) describes â€Å"a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.† This is a diverse explanation that includes all sorts of cryptographic algorithms as well as protocols. However, hidden parameters like cryptographic keys may or may not be used by a cryptographic system (Delfs, 2007). Similarly, participants of the undergoing communication may or may not share those secret parameters. Thus, cryptographic can be classified into following three types: a cryptographic system in which no secret parameters are employed (called an un-keyed cryptosystem); a cryptosystem which makes use of secret parameters and at the same time shares the parameters between the participants (known as a secret key cryptographic system); and a system that utilizes the secret parameters, but not sharing them with the participants (call ed a public key cryptographic system) (Shirey, 2000; Buchmann, 2004). Cryptography aims at designing and implementing cryptographic systems and utilizing such systems which are secure effectively. The first a formal definition about the term cryptography dates from relatively past time. Back then, the approach known by the name â€Å"security through obscurity† was being used (Dent, 2004). There are a lot of examples based on this approach by which security of the system was improved by keeping internal working and design secret. Majority of those systems do not serve the purpose and security may well be violated. The Kerckhoffs’ principle is a very famous cryptographic principle which states that (Kerckhoffs, 1883): â€Å"Except for parameters clearly defined to be secret, like the cryptographic keys, a cryptosystem must be designed in such a way as to be secure even with the case that the antagonist knows all details about the system†. However, it might be noted that one important aspect is that a cryptosystem is perfectly securing theoretically grounds, but it may not remain the same when implemented practically. Different possibilities of generating attacks on security of such systems can arise while having the practical implementation (Anderson, 1994). Attacks which make use of exploitation of side channel information are the examples of such attacks. If a cryptosystem is executed, it can result in the retrieval of side channel information with unspecified inputs and outputs (Anderson, 1994). In encryption systems, the input is plaintext message plus the key, while the specific output is the cipher text. Thus, there are chances on information leakage. Power consumption, timing characteristics along with the radiation of all types are some examples in this regard. On the other hand, side channel attacks are the types of network attacks which extract side channel information. Since the mid 1990s there were many di fferent possibilities have been found by the researchers in order to build up side channel attacks. A few examples in this regard are the differential power analysis (Bonehl, 1997), and fault analysis (Biham, 1997; Kocher, 1999) as well as the timing attacks (Kocher, 1996). It is a very practical statement that any computation performed on real computer systems represents some physical phenomena which can be examined and analyzed to provide information regarding the keying material being employed. Cryptography does not help to cope with this situation because of the inherent nature of this problem. 2.1 Cryptosystem functions Other than the usual random bit generators as well as the hash functions, there are no secret parameters that are used in cryptosystem functions. These are the junketed functions that characterize the cryptographic system functions. In cryptographic functions, the elements used are usually one-way and it is difficult or almost impossible to invert them. This follows that it is easy to compute a cryptographic function whereas it is hard to invert the functions and also to compute the results of the relationships (Kerckhoffs, 1883). It is difficult to apply any mathematical method for inverting the cryptographic system functions in a way that will be coherent and meaningful. For example, a cryptographic system functions such as F: X → Y is easy to comfortably use mathematical knowledge to compute while it is hard to use the same to invert (Buchmann, 2004; Shirey, 2000). There are many examples of one-way functions that we can use to demonstrate the meaning of the cryptosystems. In a situation where one has stored numbers on the cell phone, computation of the same is possible and easy due to the fact that the names are stored in an alphabetical manner (Garrett, 2001). If one inverts the relationship of these functions, it will be impossible to compute because the numbers are not arranged numerically in the storage phonebook. It is notable that a lot of other things that we do in daily life are comparable to cryptosystem function in the sense that you cannot invert or undo them. For example, if one breaks a glass, the process is one way because it is not possible for these pieces to be restored together again (Goldreich, 2004). Similarly, when one drops something into water, it is not practically possible to reverse the action of dropping this item (Mao, 2003). The English corresponding action would be to un-drop the item as opposed to picking it. Cry ptosystem functions cannot be demonstrated as purely one-way and this is the branching point between cryptosystem functions and the real world of things and circumstances. The only one-way functions in mathematics can be exemplified by discrete exponentiation, modular power and modular square functions. Public key cryptography uses these functions in its operations but it has not been well documented whether they are really one-way or not. There has been debate in practice whether one-way functions really exist in the first place or not (Garrett, 2001). In the recent day cryptographic discussions a lot of care should be applied when referring to the one-way functions so as not to interfere or make false claims to the functional attributes of these parameters. There is a need to look for extra information and knowledge concerning one-way functions so that efficient and meaningful inversions are possible and mathematically coherent. Therefore, functions such as F: X → Y is considered to be a one-way function (Koblitz, 1994; Schneier, 1996). This follows that if F can successfully and coherently inverted, the need for extra information is needed. This will hence bring the notion of the meaning of the other parameters in relation to F. Computer science uses the hash functions in its operations. This is because these functions are computable and generates output dependent on the input that was used (Katz, 2007; Koblitz, 1994). 3. Digital signatures The public-key encryption presents a revolution in the field of cryptography and until its invention the cryptographers had relied completely on common, secret keys in order to achieve confidential communication (Smart, 2003). On the contrary, the public-key techniques, allow for the parties to communicate privately without the requirement to decide on a secret key in advance. While the concept of private-key cryptography is presented as two parties agree on a secret keyk which can be used (by either party) for both encryption and decryption; public-key encryption is asymmetric in both these respects (Stinson, 2005). Namely, in public-key encryption: One party (the receiver) generates a pair of keys (pk, sk), where pk is called the public key and ps is the private key, The public key is used by a sender to encrypt a message for the receiver, and The receiver uses the private key to decrypt that message. There three parts of information form part of public key certificate: Some naming information A Public key Digital signatures (this can be one or more) Encryptions and digital signatures were introduced to make the web transactions secure and manageable. The use of cryptographic techniques was applied to enhance and provide security layer such that the encrypted information and files would remain secure and confidential. Very frequently, a digital signature is mistaken with the inverse of a public-key encryption, but this is not entirely true. In the history, a digital signature could be obtained by reversing, but today in the majority of the situations this process would be impossible to be performed. Basically, a digital signature is a form of a mathematical scheme for signifying the genuineness of a digital message. A valid digital signature would provide a proof to the person that receives the message or the document that these information is indeed created by a specified sender. Moreover, it would prove that message or the document was not altered during the transportation. Digital signatures are usually used for software distribution or mainly money transactions, where it is very important to detect the possibility of forgery. As a part of the field in asymmetric cryptography, it might be noted that a digital signature is somehow equivalent of the traditional handwritten signatures. On the other hand, in order to be effective, a digital signature should be correctly implemented. Another very important concept is the notion of non-repudiation. This means that if somebody signs a document by using a digital signature, they can not say that it was not signed by them, even though their private key remains as a secret. On the other hand, there is a time stamp, so that even if the private key of a sender is compromised in future, the digital signature will remain valid. Examples of such messages are: electronic mail contracts messages sent via some cryptographic protocol A digital signature usually is comprised of: An algorithm for producing a key. This algorithm would find a private key by chance from all the possible private keys available. Then it will output that private key with a matching public key. A signing algorithm that, given a message and a private key, produces a signature. A signature authenticating algorithm that, given a message, public key and a signature, it will accept or reject the message. Primary, a signature produced from a fixed message and a private key verifies that the genuineness of that message is ok, by means of the matching public key. Then, it has to be computationally infeasible to make an appropriate signature for a party that doesn’t have the private key 4. Algorithms 4.1. Introduction to SHS This section provides an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. SHA-1 is used for computing a compressed version of a message or a data file. If that data has a length smaller than 264 buts, then the output will be 160-bit and is called a message digest. The message digest used for an input to the Digital Signature Algorithm (DSA). This algorithm will verify the signature for the message. Signing the message digest instead of the originall message itself, might advance the effectiveness of the procedure. This is since the message digest is usually much slighter in size than the original message. Very important is that the same hash algorithm should be used by both the verifier and the digital signature creator. The usage of the SHA-1 with the DSA can be presented as follows: Interesting for SHA-1 is that it is computationally impossible to discover a message which matchs to a given digest. Moreover, it is also impossible to find two dissimilar messages which create an identical message digest. 4.2. Implementation of SHA-1 The following functions were implemented for the SHA-1 algorithm: Name of source file: secure_hash_algorithm.m. Function in the source file: secure_hash_algorithm (message). This function takes an input a string of characters. Example: Hello, How are you? How is it going on? Output is the message digest, the hash value of the message. Thus, the hash value of the above message is F418F52AE6DC208599F91191E6C40FA876F33754. Name of source file: arithematic_shift_operations.m. Function in the source file: arithematic_shift_operations (number, position, op). The inputs are: number: it is a hexadecimal large number of any size. The number is represented in base 16 and is stored as a string. Ex: ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’ position: the number of positions to be shifted by. It is a decimal number in base 10. Op: it is the type of operation done. Inputs are ‘SRA’ -> shift right arithematic and ‘SLA’ -> shift left arithematic. For example, the function: arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SRA’) would return ‘1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, and arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SLA’) would return ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8’. Name of source file: bi2hex.m. Function in the source file: bi2hex (number). The input to this function is a vector of ones and zeros and the result is a hexadecimal output represented in string. For example, for the input â€Å"Number = [1 1 1 1]† bi2hex (Number) returns ‘F’ and for â€Å"Number = [1 1 1 1 0 0 0 1 ]† bi2hex (Number) returns ‘F1’. Name of source file: hex2bi.m. Function in the source file: hex2bi (number). The input to this function is a number stored in form of a string in base 16 and the result is a vector containing the binary representation of input string. For example, for the input â€Å"Number = ‘F’ †, hex2bi (Number) returns â€Å"[1 1 1 1]† and for â€Å"Number = ‘F1’ â€Å", bi2hex (Number) returns â€Å"[1 1 1 1 0 0 0 1]†. Name of source file: hexadecimal_big_number_adder.m. Function in the source file: hexadecimal_big_number_adder (number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and carry, a decimal number. After using this function, it has to be checked if the carry is generated, Incase if it is generated then the carry has to be appended in the beginning to the result. For example: Number_one = ‘FFFFFFFF’ Number_two = ‘EEEEEEEE’ [result, carry] = hexadecimal_big_number_adder (Number_one, Number_two) Result = ‘EEEEEEED’ , carry = 1; Hence the real sum is Result = strcat(dec2hex(0), Result); this results to ‘1EEEEEEED’ Name of source file: hexadecimal_big_number_subtractor.m. Function in the source file: hexadecimal_big_number_subtractor(number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and sign, a decimal number. If sign is -1, then the result generated is a negative number else is a positive number. . For example: Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’ [result, sign] = hexadecimal_big_number_subtractor(Number_one, Number_two) Result = ‘11111111’ Sign = -1. Name of source file: hexadecimal_big_number_multiprecision_multiplication.m. Function in the source file: hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier). The input is a multiplicand stored in string format is a hexadecimal number. And so is multiplier. The output is a result and is stored in form of a string. For example: multiplicand= ‘EEEEEEEE’ multiplier= ‘FFFFFFFF’ hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier) result is ‘EEEEEEED11111112’ Name of source file: comparision_of.m. Function in the source file: comparision_of(number_one, number_two, index). This function compares two numbers in hexadecimal format stored in form of strings. Always input index as decimal 1. Therefore, it: Returns 1 if Number_one > Number_two, Returns 0 if Number_one = Number_two, and Returns -1 if Number_one For example, if Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’, the result would be: comparision_of(Number_one, Number_two, 1) returns -1. Name of source file: hexadecimal_big_number_modular_exponentiation.m. Function in the source file: hexadecimal_big_number_modular_exponentiation (base, exponent, modulus). This function calculates (power(base, exponent) % modulus). Here the input base, exponent and modulus are hexadecimal strings of any size. For example: Base = ‘FFF’ Exponent = ‘EEE’ Modulus = ‘AAAA’ hexadecimal_big_number_modular_exponentiation (Base, Exponent, Modulus) returns ‘8BAB’ Name of source file: hexadecimal_big_number_multiplicative_inverse.m. Function in the source file: Z = hexadecimal_big_number_multiplicative_inverse(number_one, number_two). This function returns multiplicative inverse of number_two modulo number_one. If az = 1 (mod m) then z is the multiplicative inverse of a mod m. Here â€Å"number_one = m†, â€Å"number_two = a†, â€Å"number_one = ‘FFFF’ †, â€Å"number_two = ‘1235’ â€Å" andresult is ‘634D’, which in turn is the multiplicative inverse of number_two.Hence : (result * number_two) mod number_one = 1 Name of source file: hexadecimal_big_number_test_for_primality.m. Function in the source file: hexadecimal_big_number_test_for_primality(number). The input to this function is an ODD number stored in hexadecimal format as a string. This function returns 1 if the input is a prime and returns -1 if input is composite. Name of source file: power_of_two_conversion_to_hexadecimal.m. Function in the source file: power_of_two_conversion_to_hexadecimal(power). The input is the number, the power to which two has to be raised to. It is a decimal number and the output is a hexadecimal number in form of string. For example, power_of_two_conversion_to_hexadecimal(4) returns ‘10’ i.e 16 in decimal system. Name of source file: hexadecimal_big_number_division.m. Function in the source file: hexadecimal_big_number_division (dividend, divisor). This function returns quotient and remainder both in hexadecimal string format. The inputs to this function are strings of hexadecimal format. This function uses other two functions in turn which are defined in source file Get_multiplier.m, multiplication_by_single_digit_multiplier.m. Name of source file: remove_leading_zeros.m. Function in the source file: remove_leading_zeros (number). This function takes number in hexadecimal string format as input and removes the leading zeros in the string and returns it. For example, if â€Å"Number = ‘000000012345’ â€Å", then the function returns ‘12345’. Some of the most prominent functions are presented in Appendix A. 4.3. Introduction to MD5 The MD5 Message-Digest Algorithm is a extensively utilised in cryptographic hash functions. Basically this is the case for cryptographic hash functions with a 128-bit (16-byte) hash value. MD5 is used in many security applications, and in addition it is frequently used to check data integrity. An MD5 hash is typically expressed as a 32-digit hexadecimal number. The following figure represents a schematic view of the MD5 Message-Digest Algorithm. 4.4. Implementation of MD5 This algorithm would compute MD5 hash function for files. For example, if as input is given the d = md5(FileName), then the function md5() will computes the MD5 hash function of the file specified in the string FileName. This function will returns it as a 64-character array dwhere d is the digest. The following methodology that the MD5 algorithm was implemented: Initially, the function Digestis called. This function would read the whole file, and will make it uint32 vector FileName = C:\md5InputFile.txt [Message,nBits] = readmessagefromfile(FileName); Then, it would append a bit in the last one that was read from that file: BytesInLastInt = mod(nBits,32)/8; if BytesInLastInt Message(end) = bitset(Message(end),BytesInLastInt*8+8); else Message = [Message; uint32(128)]; end Consequetly, it will append the zeros: nZeros = 16 mod(numel(Message)+2,16); Message = [Message; zeros(nZeros,1,uint32)]; And a bit length of the original message as uint64, such as the lower significant uint32 first: Lower32 = uint32(nBits); Upper32 = uint32(bitshift(uint64(nBits),-32)); Message = [Message; Lower32; Upper32]; The 64-element transformation array is: T = uint32(fix(4294967296*abs(sin(1:64)))); The 64-element array of number of bits for circular left shift: S = repmat([7 12 17 22; 5 9 14 20; 4 11 16 23; 6 10 15 21].,4,1); S = S(:).; Finally, the 64-element array of indices into X can be presented as: idxX = [0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 6 11 0 5 10 15 4 9 14 3 8 13 2 7 12 5 8 11 14 1 4 7 10 13 0 3 6 9 12 15 2 0 7 14 5 12 3 10 1 8 15 6 13 4 11 2 9] + 1; The initial state of the buffer is consisting of A, B, C and D. such as: A = uint32(hex2dec(67452301)); B = uint32(hex2dec(efcdab89)); C = uint32(hex2dec(98badcfe)); D = uint32(hex2dec(10325476)); The message is reshaped, such as: Message = reshape(Message,16,[]); The look between the blocks, such that X is an extraction of the next block: for iBlock = 1:size(Message,2) X = Message(:,iBlock); The buffer states are stored as: AA = A; BB = B; CC = C; DD = D; The buffer is transformed by utilizing the X block from above, and the parameters from S, T and idxX k = 0; for iRound = 1:4 for q = 1:4 A = Fun(iRound,A,B,C,D,X(idxX(k+1)),S(k+1),T(k+1)); D = Fun(iRound,D,A,B,C,X(idxX(k+2)),S(k+2),T(k+2)); C = Fun(iRound,C,D,A,B,X(idxX(k+3)),S(k+3),T(k+3)); B = Fun(iRound,B,C,D,A,X(idxX(k+4)),S(k+4),T(k+4)); k = k + 4; end end The old buffer state is also being added: A = bitadd32(A,AA); B = bitadd32(B,BB); C = bitadd32(C,CC); D = bitadd32(D,DD); end The message digest is being formed the following way: Str = lower(dec2hex([A;B;C;D])); Str = Str(:,[7 8 5 6 3 4 1 2]).; Digest = Str(:).; The subsequent functionality is performed by the following operations: function y = Fun(iRound,a,b,c,d,x,s,t) switch iRound case 1 q = bitor(bitand(b,c),bitand(bitcmp(b),d)); case 2 q = bitor(bitand(b,d),bitand(c,bitcmp(d))); case 3 q = bitxor(bitxor(b,c),d); case 4 q = bitxor(c,bitor(b,bitcmp(d))); end y = bitadd32(b,rotateleft32(bitadd32(a,q,x,t),s)); And the bits are rotated such as: function y = rotateleft32(x,s) y = bitor(bitshift(x,s),bitshift(x,s-32)); The sum function is presented as: function sum = bitadd32(varargin) sum = varargin{1}; for k = 2:nargin add = varargin{k}; carry = bitand(sum,add); sum = bitxor(sum,add); for q = 1:32 shift = bitshift(carry,1); carry = bitand(shift,sum); sum = bitxor(shift,sum); end end A message is being read frm a file, such as: function [Message,nBits] = readmessagefromfile(FileName) [hFile,ErrMsg] = fopen(FileName,r); error(ErrMsg); Message = fread(hFile,inf,ubit32=>uint32); fclose(hFile); d = dir(FileName); nBits = d.bytes*8; Lastly, the auto test function is the following: function md5autotest disp(Running md5 autotest); Messages{1} = ; Messages{2} = a; Messages{3} = abc; Messages{4} = message digest; Messages{5} = abcdefghijklmnopqrstuvwxyz; Messages{6} = ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789; Messages{7} = char(128:255); CorrectDigests{1} = d41d8cd98f00b204e9800998ecf8427e; CorrectDigests{2} = 0cc175b9c0f1b6a831c399e269772661; CorrectDigests{3} = 900150983cd24fb0d6963f7d28e17f72; CorrectDigests{4} = f96b697d7cb7938d525a2f31aaf161d0; CorrectDigests{5} = c3fcd3d76192e4007dfb496cca67e13b; CorrectDigests{6} = d174ab98d277d9f5a5611c2c9f419d9f; CorrectDigests{7} = 16f404156c0500ac48efa2d3abc5fbcf; TmpFile = tempname; for k=1:numel(Messages) [h,ErrMsg] = fopen(TmpFile,w); error(ErrMsg); fwrite(h,Messages{k},char); fclose(h); Digest = md5(TmpFile); fprintf(%d: %sn,k,Digest); if ~strcmp(Digest,CorrectDigests{k}) error(md5 autotest failed on the following string: %s,Messages{k}); end end delete(TmpFile); disp(md5 autotest passed!); 4.4.1 Results This algorithm is tested with the input: university of Portsmouth department of electronic and computer engineering. This was written on the file: â€Å"C://md5InputFile.txt†. The outpus results are as in the following fugures: Textual description of the output results follows: OUTPUT FileName = C:\md5InputFile.txt Running md5 autotest FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 1: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 2: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 3: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 4: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 5: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 6: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 7: 3129b41fa9e7159c2a03ad8c161a7424 md5 autotest passed! 4.5. Introduction to Caesar cipher The Caesar cipher in cryptography, is in essence a shift cipher. It represents as one of the simplest and most widely known encryption methodologies. The Caesar cipher is a kind of substitution cipher. It means that each letter in a given plaintext is replaced by another letter. This is done due shifting by some fixed number of positions down the alphabet. Julius Caesar was the first to use this ci

Saturday, July 20, 2019

Iago Essay -- essays research papers

Iago, More than Just a Villain Iago, the evil villain of Shakespeare's Othello, is more than just a villain. In many ways he is the most intelligent and appealing character in the play. Iago shows superiority over the rest of the characters in the play. He has the ability to manipulate the characters in the play, therefore controlling the play with every sequence of events. His intelligence shines through his ability to deceive, his ability to strategize, and his ability to twist the truth. Iago is appealing to the characters of the pay because he gives them what they want. Iago is appealing to the reader as well. His character is totally unconflicted about being evil, making him known to some authors as the villain of all villains. Iago is, in many ways, the most intelligent and appealing character in the play. Iago has a sophisticated way of deceiving the characters of the play, making him a very intelligent person. Early in the play Othello introduces Iago to the Duke of Venice as, â€Å"My ancient / A man he is of honesty and trust† (!. iii. 284-85). This is but one of the times in the play that Iago is referred to as honest and true. Throughout the play Iago is considered to be honest, but is actuality the villain. In order to maintain this false image one has to have a beguiling character. After Othello and his lieutenant, Michael Cassio, return from the war against the Ottomans, there is a celebration. At this celebration Iago puts his manipulation to work. He knows that Othello and Desdemona’s love for each other is very true, but he tells Rodrigo that Desdemona had love for Cassio: â€Å"With as little a web as this will I ensnare as great a fly as Cassio. / Ay, smile upon her, do†¦Ã¢â‚¬  (II. I. 164-65). This quote shows that Iago deceives Roderigo into believi ng that Desdemona loves Cassio, when in Roderigo’s eyes it is virtually impossible. Iago basically controls Rodrigo because Iago deceives him into believing that he can have Desdemona, by both Cassio and Othello. Iago uses his strategically apt abilities to come up with a very intelligent system that will eventually destroy Othello. After Iago and Rodrigo find out about Othello and Desdemona’s marriage, Iago manipulates Rodrigo into making him angry, because Rodrigo has feelings for Desdemona. Iago and Roderigo go to Brabantio’s abode to enrage him by telling him about Othello and Desdemona: â€Å"Call up her ... ...sio is in fact in love with Desdemona, and that Cassio is in fact doing dishonesty to Othello. Othello does get discouraged by this advice given by Iago, and eventually does confront Desdemona. The quote specifically displays how Iago can make Cassio seem evil to Othello. Iago persuades Othello into believing him, which creates a way for Iago to work around the truth. Iago completely changes the appearance of Cassio, therefore making Iago extremely intelligent and far superior. Iago’s magnificent intelligence and superiority make him a very intriguing character. Iago is not just any villain that comes into a town, with a black cape and knife that scares everyone, he destroys and â€Å"kills† by using creative tactics that could only be thought of by someone who is brilliant. He deceives, strategizes, and twists the truth with amazing ease. Iago maintains his on point intelligence by staying completely unconflicted about being evil. Iago is completely committed as he states, â€Å"[He will] turn her virtue into pitch, / And†¦ make the net / That shall enmesh them all† (II. Ii. 366-368). Iago is considered a cross between God and the Devil, as shown in the, â€Å"Divinity of Hell!† (!!. ii. 356)