Wednesday, July 31, 2019

Minimising Disruption Essay

Strategies for Minimising Disruption Through Inappropriate Behaviour Different behaviours require different levels of intervention, it is more effective to manage inappropriate behaviour when it is first noticed or at its lowest level and the type of intervention used should be determined by the intensity, frequency and duration of the behaviour displayed. It is important not to try to befriend students or gain their approval as this will make behaviour management very difficult as they will think you are trying to win them over. You should establish ground rules and boundaries as soon as possible, these should be stuck to, students need to know where they stand. Do not make empty threats as this threatens the security of students, therefore encouraging inappropriate behaviour. It is important to talk to students and distraction often works to bring them back on to the task in hand, a warning about what will happen if they continue with the behaviour, if appropriate a reminder of the rewards for positive behaviour will stop the inappropriate actions straight away. How do These Strategies Relate to the School’s Policy? In the school’s behaviour policy we use the rule of ‘3 strikes then out’, this rule is not exhaustive and it depends on the extremity of the behaviour displayed. A student may be moved seats and asked to step outside the classroom before they are removed from the room and sent to the sanctions room. Our policy is displayed in each classroom and inside each student’s planner so that they are all clear about what is expected from them with regards to inappropriate behaviour.

Tuesday, July 30, 2019

An Introduction to the Im Profession and Ethics Paper

De La Salle University – Manila An Introduction to the IM Profession and Ethics Paper Presented to The Faculty of the College of Computer Studies De La University – Manila In Partial Fulfillment Of the Requirements for the Degree of Bachelor of Science of Information Systems By: Changcoco, Amos Dimla, Ysabel Nicole Ramchand, Pavan Tanchuling, Bianca Denise Tibayan, Jan Michael 1. 0 COMPUTER AND INTERNET CRIME 1. 1 Types of Exploits 1. 1. 1Virus It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files.The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikac hu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region.The virus was an email titled, â€Å"Pikachu Pokemon† with the message, â€Å"Pikachu is your friend. † The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokemon, with the message, â€Å"Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND. † The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser.The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1. 1. 2Worm A worm is a malicious code that is used for bringing down the computer system. A worm do es not infect files, however, it monopolies the computer’s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer.It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable.The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the cre ator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects. 1. 1. 3Trojan HorseNamed after the Trojan horse from Troy which was used to infiltrate the enemy’s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the victim’s software.Trojan horses are also used to create a ‘back door’ in the operating system so that the hackers can access the system. However, the Trojan horse cannot duplicate itself nor it can self-replicate. It would need the user to spread to other computers. An example of a Trojan horse would be from the pirated version of Apple’s suite of software, iWork. iServices was the Trojan horse part of the pirated version of iWork, which would signal the hackers that the Mac is infected and the hacker has access to the system.This is an ethical dilemma because the people who buy pirated software such as the iWork do not know that there is a Trojan horse in the software. It was unethical of the sellers to place a Trojan horse in the software without the consent of their customers’ because deontology theory states that it was not the duty of the vendors to hack into the systems of their customers in th e first place. Another reason why it was unethical because of the theory of altruism because the interest of others was not thought about since many people will suffer due to the actions of the vendors.This is another reason why it is unethical, because of the utilitarianism, which is consequences-based. Lastly, the social contract theory states that the actions of the vendors were unethical because it is against the law to hack and infiltrate private property. Logic bomb is a type of Trojan horse that is triggered only by a series of specific events such as a specific sequence of keystrokes or a change in a file. 1. 1. 4Botnets A botnet is a network of infected computers that are controlled by bots.Named after the word ‘robot’, a bot is a type of malware that allows an attacker to take control of an affected computer. Criminal can take over the controlled computer such as sending out spam, spread viruses, attack computer and can even cause crime and fraud, without the owner knowing it. Bots are also called computer zombie because the computer has no control over its actions since hackers are in charge of its actions. 1. 1. 5Distributed Denial-Of-Service Attacks (DDoS Attacks) A Distributed Denial-of-Service Attack is when a malicious hacker controls computers through the Internet.It is an attempt in preventing the computer owner to use network resource or machine. It is composed of one or more people trying to disenable a certain host from being connected to the Internet. 1. 1. 6Rootkits The name rootkit comes from the two words ‘root’, which pertains to the point it attacks, which would be the administrator or the source or the root, and ‘kit’ because of the set of programs. A rootkit is a set of programs that enables its user to gain administrator level access to a computer without the user’s consent or knowledge.The owner of the rootkit is capable of executing files and changing system configurations on the tar get machine, as well as accessing log files or monitoring activity to covertly spy on the user's computer usage. It is hard to detect if a computer system has a rootkit malware. 1. 1. 7Spam E-mail spam is when e-mail systems send unsolicited e-mail to large numbers of people. Spam mostly comes off as cheap advertisements of strange products such as pornography, ‘get-rich-quick’ schemes and the like. Spam can also be used to deliver harmful worms or other malware. . 1. 8Phishing Phishing is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site. 1. 2Types of Perpetrators 1. 2. 1Hackers and Crackers Hackers are people who test the limits of the system, find the â€Å"holes†, and check which data they could access. The knowledge that they get is actually obtainable in various media, usually the internet. They are not usually considered bad; but due to many of them who used such knowledge to cause harm to syst ems, the term became negative.A more appropriate term for these kinds of people is actually called crackers. 1. 2. 2 Malicious Insiders Malicious insiders are people who obtain goods, services, or property through deception or trickery, also known as fraud. In other words they lie to gain. 1. 2. 3 Industrial Spies Industrial spies are people who illegally obtain information from competitors for the benefit of their sponsor. The act is called industrial espionage and the opposite which is to obtain information legally is called competitive intelligence.In 1993, Opel accused the rival Volkswagen of industrial espionage after the former’s chief of production and seven executives moved to the latter company due to missing documents. (Julian, 2011) 1. 2. 4 Cybercriminals These perpetrators hack to the company’s system and will do anything with the information just to gain money. One of the most famous hackers of the world is Albert Gonzalez, who used hacking to steal and re sell millions of card and ATM numbers in a span of three years. He did this by attacking many systems which would eventually give him the information needed to steal the card numbers. Verini, 2010) Albert Gonzalez is in ethical dilemma because he used his skills to steal the information for money. Based on the deontological theory, it’s unethical because it is not the duty of hackers to steal information. Based on hedonism under the utilitarian theory, it is ethical because he found pleasure from the act. Social contract theory, however, makes this act unethical, and so does virtue theory. 1. 2. 5 Hacktivists and Cyberterrorists Hacktivists, combining the words â€Å"hacking† and â€Å"activist†, are people who hack to promote political ideology.Cyberterrorists attack to get the attention of the government as part of their political objectives. Anonymous is one of the most famous hacktivist groups due to their appearance on various media in which members appear wearing the Guy Fawkes mask. Their advocacy is to oppose the Internet censorship and surveillance, government corruption and homophobia. This is why they attacked several government sites. (Katich, 2013) The ethical dilemma the group faces is that they use hacking skills to infiltrate the systems yet they belong to the side of the people as their objective is to make the government hear their voice.This is ethical based on deontology because it is their duty to make the government listen to them their voice. This is also ethical based on the altruistic approach as more will benefit from their act. However, social contract theory states that it is unethical since this act has violated the law. 1. 3Laws for Prosecuting Computer Attacks 1. 3. 1Electronic Commerce Act of 2000 (RA 8792) 1. 3. 1. 1E-Commerce in Society The process of buying and selling goods electronically by consumers and from company to company through computerized business transactions.This act has the purpose of prote cting those who pursue business in electronic means through multiple communication networks through the Internet. 1. 3. 1. 2 Elements in the Law Electronic data messages – these are generally the information that is in every transaction of the business. Electronic document – these are the type of information specified with text, symbols, or other modes of written expression yet similar in nature with the electronic data messages. Electronic Signature – these are any distinctive marks that approve a transaction which are done by a person or an entity using electronic means. . 3. 1. 3Relation to other Laws Such laws that are affected with this are the Intellectual Property Rights, Copyrights Protection. These laws give protection to the parties involved in any business activities through electronic means. Fraud is also related as the government can charge you when you make accept payment illegally by disguising your site as a reliable option for payment. 1. 3. 1. 4 CASE in E-Commerce Censorship is very an essential tool to distinguish the moralities of websites and the cooperation of companies to acknowledge said moralities.In China, Google's operations created a storm of criticism when the company agreed to comply with the government's wishes and censor pro-democracy and other websites. In 2010, Google relocated its Chinese operations to Hong Kong, putting it outside China's censorship regime. Supporters of the decision say Google shouldn't cooperate with China's repressive policies, while critics say Google's withdrawal cut off millions of Chinese citizens from the company's services and weakens its presence in one of the world's largest markets. This case has very evident ethical issues including the move of Google to relocate its operations to Hong Kong.This made the jurisdiction of China’s censorship policy not reachable so that they can use their assets more freely. These however made the citizens of China that is inside the jur isdiction of the censorship policy long for their beneficial search engine. If seen in Google’s benefits this is a rather good trade for them to maximize the use of their services in a commercial area such as Hong Kong yet they could’ve served the citizens so they can keep up their reputation of improving life in the world and be consistent of the famous line â€Å"Don’t be evil†.I generally disagree with their decision to relocate as they could’ve followed the updated utilitarianism and give their services to those who would need them the most. Still they acted the ethical egoism to censor pro – democracy sites which are morally good to their perspective. 1. 3. 1. 5Another Example Including Google Google gathers incredible amounts of data on people who use its search engine. As of 2011, the company's website states that although it stores records of your searches as a tool to improve corporate efficiency, it renders them anonymous after nin e months and deletes cookies used to track visitors after two years.Governments could use Google's information to investigate individuals visiting particular websites, however, and Google Earth's photo collection also has raised privacy questions: In 2008, a couple sued on the grounds the online photos of their home violated their privacy, but a judge threw out the lawsuit the next year. This case is provides insight to how Google can be of every use to our society as they can help the government catch fugitives, suspects and criminals with their records of the searches of the every person using their search engines yet this leaves them to violate certain privacy issues when they abuse that kind of power.The lawsuit of the couple may be dismissed by a judge but their lawsuit are supported by ethical theories namely the rights – based theories which states that there are social contracts that should be acknowledged and that includes their right for privacy. They may be legal t o store records such as the photo from their Google Earth but they should have to limit their power to exercise their duty as they are also supported by the duty – based theories due to their daily or continual task of improving corporate efficiency as well as giving us access to unlimited knowledge. 1. 3. 2 Cybercrime Prevention Act of 2012 (RA 10175) 1. . 3. 1 Preliminary Provisions 1. 3. 3. 2. 1. 1 Brief History of RA 10175 Cybercrime Prevention Act of 2012 or also known as Republic Act No. 10175 was approved on September 12, 2012. This is first law in the Philippines which specifically criminalizes computer-related crimes. The Cybercrime Prevention Act in its current form is the product of House Bill No. 5808, authored by Representative Susan Tap-Sulit of the second district of Tarlac and 36 other co-authors. The final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012. 1. 3. 2. 1. 1 Declaration of PolicyThe main objective o f this Act is to protect the people from cybercrimes and also from the harmful effects associated with it. The state also aims to recognize the vital roles of information and communications industries in the country. The state also recognizes the need to protect and safeguard the citizens of the state, and also to protect the integrity of computers and its users. The state also wants to recognize the importance of providing an environment conducive to the development acceleration, and rational application and exploitation of information and communications technology. . 3. 3. 2. 1 General Provisions 1. 3. 3. 2. 2. 2. 1 Punishable Acts In this Act, there are 10 punishable acts indicated in the bill, and those punishable acts each have penalties that are associated. In the next sentences, the punishable acts will be discussed briefly. Offenses against the confidentiality, integrity, and availability of computer data and systems: A. Illegal Access – accessing a computer or a part of a computer without any right B.Illegal Interception – the interception made by the use of any technical device without any right of non-public transmission of datum to or from any computer system including electromagnetic emissions from a computer system carrying such data C. Data Interference – the intentional or any reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without any right including the transmission or transferring viruses into a system. One example is the ILOVEYOU message transmitted through electronic mail way back in the year 2000.D. System Interference – the intentional or any reckless hindering or interference with a functioning computer system, or a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering, or supressing computer data or computer program without any right or authority in doing so. E. Misuse of Devices – the use of any material without any right of it. Acts like producing, manufacturing, selling, and distribution. F. Cyber-squatting – the simplest way is identity theft, using another individual’s identity to gain profit or scam other people in the internet.G. Computer-related Forgery – the illegal use of a computer into copying one’s work, and gaining illegal access to a computer to copy the content of a system or database. H. Computer-related Fraud – the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system. I. Computer-related Identity Theft – the intentional acquisition, use, transfer, or possession of any identifying information belonging to another person, whether natural of juridical. Under these are Cybersex and Child Pornography. J.Libel –    defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any acts, omission , condition, status or circumstance tending to discredit or cause the dishonour or contempt of a natural or juridical person committed through a computer system or any other similar means which may be devised in the future. The above stated are the punishable acts by the law enforced and written in the bill, and these acts have corresponding penalties if have been proven to the court. The penalties include: imprisonment or a fine of at least two hundred thousand pesos (Php. 00,000. 00) up to a maximum amount commensurate to the damage incurred or both. Prison mayor is equivalent to imprisonment from 6 years and one day to twelve years. 1. 3. 3 Ethical/ Moral Dilemmas 1. 3. 4. 2 Situation A 16-year old male named â€Å"Josh Evans† was registered on the account used for bullying messages to a girl named Megan Mier. Lori Drew, the mother of Sarah, a former friend Mier, later admitted creating the MySpace account. She was aided by Sarah and Ashley Grills, an 18-year-old employee of the elder Drew.The senior Drew and several others ran the fake account, with an aim to get information about Megan and use that information against her and also for her to be humiliated. This caused spreading gossips about Megan, and thus creating a traumatic experience not only for her but also to her family. 1. 3. 4. 3 Analysing using the Four Major Ethical Theories A. Duty-based Theory According to the Duty-based theory, an act is considered ethical if it has good intentions. Given the situation, I can clearly state that it is not an ethical thing to do. Creating or spreading false rumours is not even close to be called as a good intention.Also, gathering information about a certain person is not ethical if it will be used against or be held against to a person. Using the Duty-Based Theory, I can clearly state that the situation of gathering information of Megan is not ethical because it does not serve a good intention. B. Utilitarianism According to the Utilitarianism Theory an act is only to be considered ethical if it produces desirable consequences or outcomes. The outcome of the situation stated earlier is that the experience Megan was traumatic not only for herself, but it also affected her family.Just by looking at this outcome, we can say that it is not also considered ethical in this theory, because of the outcomes that the actions of the group had caused not only their target but also the relationship of other people to Megan. C. Social Contract Theory According to the social contract theory an act is considered ethical if the act does not violate any rules or laws; according to the Civil Code of the Philippines: Persons and Family Relations, under Chapter 2 which is Human Relations the Articles 19, 20 and 21 discusses the different rights a person possesses and how a person should exercise his or her rights.Chapter 2 Article 19 presents the basic principles that are to be observed for the rightful relationship between human beings and the stab ility of the social order. Chapter 2 Article 20 presents that you are liable for any damage that you have caused to another person, whether wilfully or negligently. Chapter 2 Article 26 presents that right must never abused, the moment that it is abused, the moment rights are abused they ceased to right. D. Virtue According to the Virtue theory, the action that is considered to be ethical is when the action is came from a good moral principle.Looking to the situation, it is not an ethical thing to do because it does only harm the person involved but also the moral principles of the suspect is to be questioned. 1. 3 Trustworthy Computing 1. 4. 1 Microsoft’s 4 Pillars of trustworthy Computing The 4 Pillars of trustworthy computing help identify the key elements in computing especially in an organization with numerous employees to manage. Guidance is a key to help implement a good and stable system such as how the pillars guide not just Microsoft employees but users alike. 1. 4. . 1 Security Creation of a trust worthy environment for a safe computing environment 1. 4. 2. 2 Privacy The protection and confidentiality of design, development and testing in any organization is essential as to be part of the competitive market today. 1. 4. 2. 3 Reliability Working as expected or promised by the developers and their entity 1. 4. 2. 4 Business Integrity Being responsible and transparent in you duties and expectation as part of a work force that strives to be excellent a mistake is bound to happen.Admitting a mistake is the 1st step to a growing process of learning new things to come. 1. 4. 2 Risk Assessment It is the process of assessing security related risks to an organization’s computers and networks from both internal and external (Reynolds, 2011) A risk assessment is a process to identify potential hazards and analyse what could happen if a hazard occurs. (Federal Emergency Management Agency, 2013) The assessment would assure the IT security team that they will be ready when an attack comes because of the determined risk assessment they perform. 1. 4. 1 General Security Risk Assessment ProcessStep 1: Identify IT assets and prioritize ones that are of most importance Step 2: Identify the threats/risks that could occur Step 3: Assess the likelihood of threats Step 4: Determine the impact of each threat, how large to small is the impact if affected Step 5: Determine how each threat can be prevented/blocked Step 6: Which is the most effective prevention method Step 7: Perform cost benefit analysis before taking any action Step 8: Make the decision to implement or not to implement the decided risk prevention found through thorough research and development 1. 4. 3 Establishing a security policyDefines an organization’s security requirements, as well as controls and sanctions needed to meet those requirements. (Reynolds, 2011) A good security policy can possibly improve and provide a smooth flow of operations within an organizati on. NIST (National Institute of Standards and Technology) is a non-regulatory federal agency within the US department of commerce. The computer security division creates security standards for organizations to implement in their own system. 1. 4. 4 Educating the Employees, Contractor and Part-Time Workers Surveys show that most security problems come from negligence and unawareness of the security policies.Teaching good security practices like not giving out your passwords, making sure you do not meddle in different departments. Knowing the Dos and DONTs of everyday computing will help guide any workplace and direct them to the good ways of being a good user. 1. 4. 5 Threat Prevention The key to a threat prevention system are layers of security systems that challenge the perpetrator to hack into the system. Firewall – stands guard between an organization’s internal network and the internet Intrusion Prevention Systems – prevents an attack by blocking viruses, ma lformed packets and other threats from getting into a protected network.Antivirus software – should be installed on each user’s personal computer to scan a computer’s disk drives and memory regularly for viruses. User accounts that remain active after employees leave cause an uncertain threat to the company, IT staff must promptly delete and make sure to wipe out all the privileges of the former employee. The US-CERT (United States Computer Emergency Network Team) and SANS(SysAdmin, Audit, Network,System) Institute – regularly update a summary of the most frequent and high impact threats to a computer system specifically viruses and worms. . 4. 6 Security Audit An important prevention tool that evaluates whether an organization has a good security policy and if it is being followed. An example would be a requirement to change passwords every week or month with this in place a security for companies are much more protected compared to others without this r equirement. Basically to test, check and review the system’s security and look for loop holes and easy targets. 1. 4. 7 Detection The preventive measures made for a computer system is not always enough to protect important data.Intrusion detection system – is a software/hardware that monitors system and network resources, notifies a system admin when an intrusion occurs Knowledge based intrusion system – contains information about attacks and system vulnerabilities, then trigger an alarm (ex. Repeated login, repeated data events) Behaviour based intrusion system – compares users system behaviour with an admin created model that detects when a user is not following the required model, this would trigger an alarm. (Example: Unusual activity with an account in the HR department accessing the IT department’s data. 1. 4. 8 ResponseAn organization should be prepared for the worst, like a system attack that stops all operations and steals data from the co mpany. The top priority during an attack is not to catch the perpetrator but to regain control and save what is left. Who needs to be informed? And who not to notify? Reputation and credibility is at stake in any security breach. A company should document all details of a security breach and be able to review it after to assess and further study. Eradication of the damaged/breached information is essential but before everything a log is required to keep track 1. . 9 Ethical Moral Dilemmas You are a member of a large IT security support group of a large manufacturing company. You have been awakened late at night and informed that someone has defaced your organization’s website and also attempted to gain access to computer files containing a new product under development. What are your next steps? How much time would you spend tracking down the hacker? -Deontological 1. 5 References * (1999, 10). Electronic Commerce. StudyMode. com. Retrieved 10, 1999, from http://www. studymod e. com/essays/Electronic-Commerce-731. tml * THE ELECTRONIC COMMERCE ACT (R. A. 8792) AN OVERVIEW OF IT? S (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). ‘www. ustlawreview. com/pdf/vol. L/Articles/The_Electronic_Commerce_Act_RA_8792. pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? – Cisco Systems. (n. d. ). Cisco Systems, Inc. Retrieved from http://www. cisco. com/web/about/security/intelligence/virus-worm-diffs. html * What Is A Rootkit? (n. d. ). Internet / Network Security – Tips, Advice and Tutorials About Internet Security and Network Security.Retrieved from http://netsecurity. about. com/od/frequentlyaskedquestions/f/faq_rootkit. htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www. businesspundit. com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive. wordpress. com/2013/02/25/anonymous-annie- katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www. nytimes. com/2010/11/14/magazine/14Hacker-t. html/

A Response Paper On Christopher Steiner’s

Christopher Steiner’s article entitled ‘Authenticity, Repetition, and the Aesthetics of Seriality’ talks about the ‘mechanical reproduction of art’ at the height of technological improvement and technical production nowadays.He discusses Walter Benjamin’s essay entitled ‘The Work of Art in the Age of Mechanical Reproduction’ in the issue that: first, mechanical reproduction is not just a new form of technical production but engenders â€Å"an entirely new philosophy of production in which the work of art is emancipated† (Steiner 88); and second, that the mechanical reproduction and consumption of art makes the object more accessible to wider population (88).His argument, therefore, is that â€Å"to justify the authenticity of tourist art one must begin from an entirely different starting point† (89), since tourist art should be viewed as a culturally valid, authentic art.   He argues that mass-produced art carries a n authenticity, which it shares with other mass-produced objects in the industry.What I argue, however, is that mechanical reproduction of art does not carry anymore the authenticity and validity of what a true art should be—that it should be an expression of views, beliefs, and culture of an individual or a number of individuals.   Objects that undergo mass production are merely ‘reproductions’ of the original item.   The true ‘art’ is in its originality.This means that, although the reproduced object is an exact image of the original object, it is merely a mimic and is not an expression of the self.   When it comes to being culturally valid, however, I agree that objects that undergo mass production are, indeed, culturally valid, since it reveals a certain aspect of culture that, though reproduced again and again, still holds the originality and the individuality that the culture and the people reflect.Art is like what a human being is: it is a reflection of culture and society, yet it cannot be an exact replication of the other—for there is none like it.   Mass-produced objects of art contain authenticity and validity in terms of culture art, but not as an individual art.Works CitedSteiner, Christopher.   â€Å"Authenticity, Repetition, and the Aesthetics of Seriality: The Work of Tourist Art in the Age of Mechanical Reproduction.†Ã‚   [name of book].   Ed. [name of editor].   Place: publisher, year.   87-103.

Monday, July 29, 2019

Chapter 1 2 3 4 and 5 Assignment Example | Topics and Well Written Essays - 500 words

Chapter 1 2 3 4 and 5 - Assignment Example ted increasing and this brought about their freedom and the beginning of the end of the marginalization status and also beginning of equality between men and women (Chafe, 2009). The end of civil war had ended slave trade and the African- American wanted to establish themselves fully in America as an independent group. This period therefore saw them starting their own churches and moving from the Christianity worshipped by most white people. Churches like the Methodist Episcopal were established for the African –America population as they moved away from the Presbyterian Church and others. This period wanted to seek order in different areas and especially concerning relationship between women and men, whites and the blacks and the poor and those who were rich. Order was required because there was widespread discrimination among these groups of people and it brought about chaos among them. With the freedom from slavery and the establishment of industries, African-American started interacting more freely with the whites and hence ending their chaos and differences. Women started working in cotton factories and farms with the establishment of industries and hence secured their independence and ended marginalization from the men. Those considered poor in the society also got work in the industries and unions started advocating for their rights in terms of increase in wages and good working conditions and this ended the chaos with the rich who owned the industries (Chafe, 2009). The concept of â€Å"the system† was an economic plan that was formulated by several leaders of congress that was meant to protect the American population and especially the entrepreneurs and other business people from economic loss. It also contained parts about rebuilding the country’s transportation system that was not that well organized before the industrial revolution and after the civil war. Goods from Europe were cheaper than those produced by industries in America and â€Å"the

Sunday, July 28, 2019

'French argues that 'An awareness of the impact of (national) culture Essay

'French argues that 'An awareness of the impact of (national) culture on people in work organisations' is important in tod - Essay Example Furthermore, to compete in this globalized market, companies with cross border operation, commonly known as the MNCs are required to develop an ability that will help them to manage knowledge. Knowledge is imperative in international business principally because of the fact that it can reduce the managerial anxiety and uncertainty to a great extent. Along with that, new opportunities can also be identified with this approach. Levitt (1983) have stated that the importance of gaining knowledge about the subject of concern in more important if a company is operating in overseas locations. This knowledge can be in any form such as knowledge about the culture of the host country, consumer behaviour or it can be about the external environmental situation. In this project, the national culture of the country will be analysed and its impact on the business will be analysed. Furthermore, the study will also shed light on the significance of awareness of the impact of (national) culture of peo ple in work organizations in today’s world. ... Holden (2001) argues that a company planning to operate in the overseas location should frame a flexible business model that has the ability to change in accordance with the local lawsuits and the situation of the market. Thus, it is evident that standardization versus adaptation approach is extremely vital in the international business process as it drives an MNC’s ability to minimize the cost and respond to the demands of the local market. Bhagat, et al. (2002) in this respect have highlighted that national culture of a country has a strong influence on the decision of standardization versus adaptation for the management of knowledge. A number of research works carried out by Hofstede (1993) have shown that national culture influences the operations of a multinational corporation. For example, the areas which are mostly affected are marketing and communication practices and the human resource policy. In the similar way studies carried out by Bhagat, et al. (2002) have shown that the national culture of a country determines the organization’s activity pertaining to the management of knowledge, research and development activities, transfer of technology as well as the process of training. However, there is another set of authors who believe that the national culture of a country might also impact the knowledge management of an organization and therefore has a direct impact on the functioning of an organization. Takeuchi (2001) deems that with regards to the knowledge management convergence of approaches are evident among the companies. However, contradicting this point several researchers made it evident in their research papers that have not found any evidences pertaining to the differences in the

Saturday, July 27, 2019

Googling Out of Control Case Study Essay Example | Topics and Well Written Essays - 2250 words

Googling Out of Control Case Study - Essay Example In the modern day context, culture has a major role to play supporting different business organisations to fulfil their respective predetermined business targets. The significant concern of organisational culture is regarded as a valuable aspect that includes norms, rules, values as well as working systems of the organisations. The behaviour of employees is considered to be the other vital aspect that is included in the culture of an organisation. It has been apparently observed that every organisation has its own approach towards building an effective workplace culture. Organisation culture is directly responsible for enhancing the overall performances of the organisations by a greater level. In this regard, the example of Google Inc. will depict a clear picture based on the above mentioned facts. It has been viewed in this similar background that Google possess a working culture in its workplace that gives maximum liberty to its employees concerning dress, eat and behave as well as to perform in accordance with what they desire. This can be regarded as one of the vital and the major reasons for the effective performance of the company throughout the globe. With this concern, this paper intends to elaborate and critically analyse the organisational culture and â€Å"Googley way of working†. Brief Overview of the Company (Google) Google Inc. is popularly known as one of the most widely used search engines of the world. It was established in the year 1998 as a global technology company which mainly focuses on improving the approach through which people acquire relevant information about any subject matter or topic. In the year 201, the company shifts its area of focus on search and advertising through which the company succeeded to attain substantial revenues. It has been learnt that the company was founded by the duo of Sergey Brin and Larry Page who were students in Stanford College. The prime motto of the company is to organize and provide all the information and make accessible to all people throughout the entire globe. The company has its official headquarter in California and operates in almost different corners of the globe. It has gained the reputation to be called as the leading search engine of the world (Google, 2013). Critical Analysis of the Organizational Culture of Google and its Way of Working Organisational culture is regarded to be one of the vital aspects that directly impose significant impact upon the overall performance of the companies by a considerable level. The notion i.e. organisational culture is typically regarded as the collective behaviour of the people belonging to any particular organisation. It has been viewed that cultures of any organisation encompasses values, norms, beliefs and working system among others. An organisation is identified from its culture which needs to be effectively organised. Organisational culture may be defined as shared value that preserve by members of any organisation so that it can present itself differently from other organisations. Different organisations possess dissimilar sorts of organisational culture. There pertain numerous characteristics that can be observed to be involved in the formation of an effective organisational culture. In this similar context, innovation and risk taking approach of the employees is amid the v ital characteristics of an organisation’s culture. Detailed analysis of a particular task is another feature of organisational culture. The degree to which the employees of any organisation give attention in every detail is also a part of organisation culture. Furthermore it has also been noted that working in teams and delivering desired results are

Friday, July 26, 2019

Adolescents Research Paper Example | Topics and Well Written Essays - 250 words

Adolescents - Research Paper Example ABC model of crisis intervention is one of the patterns recommended. The overall tragedy is a two step process. Once is that of the initial phases how it shocks the parents. The second is the aftermath and how the parents react to it, and how they live with it. Handling the trauma and coping with the surrounding environments is one of the core challenges faced. Engaging oneself in healthy activities also amount to the preventive and counter measures that the parents may undertake. Kristi Kanel has discussed the ABC model of crisis intervention (Kanel, 2014, 21). This particular model allows for overcoming the challenges faced in the form of therapy processes and other counseling guides. This allows facing the challenges bravely and overcoming them through confidence. The model is time tested one and large number f psychologists recommend it for therapy function in the wake of losses suffered by

Thursday, July 25, 2019

Literature by U.S. Women of Color Research Paper

Literature by U.S. Women of Color - Research Paper Example It is based on these stories that this research will focus on the difficulties women of color experience in different territories and how they respond to such challenges (Wang 12). Particular emphasis is placed on women faculty of color within a classroom environment dominated by white students. The paper majorly focuses on oppression among women faculty of color in institutions of higher learning such as universities and colleges. Information on the research is based on a comprehensive interview with women faculty of color in a large research institution that is dominated by whites (Aguirre 100). The study identifies how male students challenge the authority of female colored professors during classroom interactions. Research studies indicate that an oppressive environment in a classroom has the negative effect of impairing learning and academic performance. This is especially widespread among students who suffer from oppressed identities. Such research studies only reveal whether a n oppressive environment affects learning effectiveness but tends to ignore the faculty perceptions of their classrooms. A lot of literature material points out that women faculty of color spend different time periods teaching. However, the material does not concentrate much on the classroom experiences of the colored women. Sociologists provide adequate knowledge to students on how to examine racial disparities in different areas of society such as health care and religion. They offer real world examples that are used to illustrate the cultural and interpersonal social oppression that exists in the world that we are living. There has been a widespread use of the oppressive classroom environment in demonstrating different forms of racial disparities. Research studies indicate that fostering faculty diversity and effectiveness can be achieved through the support of faculty who are women of color rather than being hostile towards. This means that it is important that we understand and appreciate the perception of the classroom environment in retaining a diverse faculty (Bonilla-Silva 200). This research applies an intersectional oppression framework in exploring faculty perceptions towards colored women teachers. Oppression can be defined to as the obstacles and actions that maintain the privileges of a dominant group. Research studies indicate that there is widespread and cumulative oppression among women faculty of color. This is evidenced by the small number of recruitment or promotion of women of color in institutions of higher education. Racism based on gender is a unique kind of oppression that women of color experience (Morrison 120). This experience is based on their position in at the intersection of race and gender matrix of domination. On the basis of the above mentioned insight, this research study examines the perception of classroom experiences among women of color at the intersection of racial and gendered oppression. In this research study, the w omen of color have adequate knowledge that their experiences in the classroom are influenced by gendered racism, and that white male students have the tendency of undermining their authority because of their color. I will majorly concentrate on how structural inequality is evidenced during interpersonal interactions. This is because teaching is a major part of the lives of faculty women of color and that it is import

Wednesday, July 24, 2019

International Law & Humanitarian Issues Assignment

International Law & Humanitarian Issues - Assignment Example Some of the laws like the Antarctic treaty have so far been abided to by different nations. But the biggest challenge has been turning these international agreements, protocols into legally bidding laws has been difficult (Doyle,  2004). The reason behind the lukewarm reception of these laws if because invasive state of these agreements and approach towards a respectable common heritage. Issues like environmental protection through laws have been approached by conventions or declarations. These conventions have not been effective since they deal with establishment of framework on dealing with many of these pertinent issues. Conventions are not aimed coming up with substantive goals. Therefore, they have not been able to come up with results that could lead to formation of legal agreements. As a result, some countries have been hesitant in agreeing to the convention and protocols (Dunoff,  2010). Question 2 It is a known fact that the world belongs to mankind and it is this reason that the people argue that international laws interfere with. However, it is not right for international law to trump all property claims all over the world. This is because each nation is recognized in International laws on their sovereignty. The UN charter which forms the basis for all international laws respects peace and human rights. Therefore, the right to ownership of property forms part of the human rights. Moreover, the recognition of sovereignty of any state by the UN charter affirms the right to ownership of property by any person (Westra, 2007). It is only in rare cases that the UN charter and international laws trump up ownership of property by individuals or states. Conflicts over ownership of land, islands or territorial boundaries in the sea are resolved by use of international laws. These laws are supposed to protect and restore human rights and therefore these laws should not trump up ownership of land. For instance, the conflict over ownership of Abyei region in Sudan or the Mindanao Islands between Japan and China are being solved using international laws (Martin, 2006). Question 3 The regime of innocent passage tends to benefit countries which use the routes through shallows regions like straits. In most cases it is the coastal nation that tends to benefit from the regime of innocent passage. This is because this state or nation has the right to decide on the issue of regime of innocent passage. While on the other hand nations or people with interests in different sections tend to be harmed from the regime of safe passage (Dunoff,  2010). For instance, the long standing conflict over the Gibraltar islands as clearly shown the benefit of regime of passage to nations where their internal waters are also locations for passage. Nations with commercial or political interests can be harmed by the law of regime passage. For instance, trading or war vessels with intentions of conducting work in regions where other nations determine passage are usually harmed. The UN article 2(4) does apply in the case of regime of passage especially in regions like straits where other nations have jurisdiction other than passage (Westra, 2007). This is because unlike the high seas where sovereignty cannot be applied as is the case of regime of passage. Question 4 The question of who should be vested with governance due to the conflicts and problem facing the world is quite difficult. However, in my view I think that political leaders are best suited for making decisions in consultations with experts. Political

Child care Essay Example | Topics and Well Written Essays - 750 words - 2

Child care - Essay Example Michelle does not notice, her attention glued to the show while narrating to Michelle what is happening to the bear. She gets surprised when the baby shrieks and begins to cry. Yes. Betsy could have focused more on the baby she was caring for by really finding out why she suddenly made sounds when she was quiet all along. Observing her non-verbal behavior like following her gaze will help her understand what the baby is trying to communicate. Baby Michelle was trying to tell her caregiver that she needed her ball back. The fact that she was helpless in getting it, being unable to stand up on her own, much more go over her playpen and pick up the toy herself means she needed someone else to do it for her. Her caregiver misunderstood her cues, thinking the baby reacted to an adorable television character, thereby making the sounds. Baby got frustrated when her caregiver was not able to read her cues so she began to cry. Incident 2: Eleven month old Baby Troy heard some children laughing and playing outside his window. When he looked, he saw them playing ball. When his caregiver, Cynthia, walked near, Baby Troy said â€Å"Boh†, and started lifting up his arms while shifting his gaze from Cynthia to the children outside. Cynthia says, â€Å"Oh, you want a ball? Here you go!† Cynthia gives Troy his favorite red ball, but Troy shoved it away and continued to raise his arms to Cynthia. Cynthia picked up the ball and when she stood up, Baby Troy was upset as he began to cry. Observing Troy’s behavior more closely before he said â€Å"Boh† would have helped Cynthia understand his cues better. She failed to see Troy’s shifting gaze and his cue to be carried outside and automatically interpreted his verbalization to mean he wanted his ball. When Troy shoved the ball away and continued to raise his arms to her, Cynthia could have tried another response by picking him up and searching for more cues, abandoning the idea that Troy wanted his

Tuesday, July 23, 2019

The Complete Maus by Spiegelman Essay Example | Topics and Well Written Essays - 750 words

The Complete Maus by Spiegelman - Essay Example The quote mentioned above does not identify Vladek as heartless but defines the painful incidents that forced him to believe this way. Closely analyzing the life of Vladek before the holocaust, one can discover the continuous betrayal and deception at the hands of those most trusted and loved by him. People close to his heart - Anja and Mala - made him believe that no one could ever deserve the trust he had. The war itself ripped his heart and the sufferings, miseries sent him down the lane of mistrust because he had absolutely no one he could trust. Vladek always honored and respected the bond he had with the people he loved. The simple kind attitude is showed towards Kapa whom he taught English for his own benefit. The purity of his love can be proved by the suicide of Anja. He did not love Anja for the money she had or he did not leave her when she accused him of loving her for the money. Vladek was capable of loving and helping others without any benefit or personal gain. It was the depth of his love and care that turned him so cold after he lost everything. Vladek inability to spend money is another misunderstood trait. The recollections of the past where he reached a point of having not enough money to support himself and his family derived him to save money. Although he had enough money saved up with him, but the flashes of his past stopped him from spending money (Hall, 2003). Mala annoyance at Vladek for not spending money even on important things is prominent at some points but the sufferings made him realize the value of money and he would never want to make his family go through any hard times at any cost due to which spending money was committing like a sin to him. Mala and Art had hard time with Vladek when it came to cleanliness. His obsession with keeping everything around him neat and clean was considered as a very difficult trait to cope with by Mala and Art, who were constantly pushed to keep things clean if they created a mess (Koehler, 2009 ). Having analyzed the life he had at the war camps, one can easily register the root cause. The obsession of cleanliness was just the fear that was developed in him during the war days. The fear of being punished for not keeping everything clean ran so deep in his mind that even after surviving the holocaust and all the pains it had to offer, Vladek could not let go of the habit of cleanliness. Unconsciously, Vladek also kept him busy doing something or the other all the time and insisted others around him as well. This was again due to the chores he had to perform all day at the camps during holocaust. The habits that he formed during the war were inhibited into his personality and forced him to be the changed person he was (Hall, 2003). The traits of not trusting friends, saving money without spending it, and always doing something (cleaning or working) are unreasonable and difficult. But when studied in the light of Vladek’s tragedies of losing a son during war, the flash backs of the suicide of Anja and the painful of past related to the time spent during holocaust, explains the behaviors and attitude of Vladek (Koehler, 2009). An individual who has suffered in various areas at so many points in life usually can never let go of the recollections and always lives in that pain and misery. The fear prevents a person to think rationally or to get back to normal. Each trait can be linked to an incident that

Monday, July 22, 2019

The Pollution Caused by Cruise Ships Essay Example for Free

The Pollution Caused by Cruise Ships Essay Cruise ships and the industry as a whole are vital to the economic stability of the local port cities in which they dock at daily. These ships carry up to 3,000 passengers who spend enormous amounts of money at tourist locations around the world. It is estimated that millions of dollars are generated and placed into the tourism markets annually. This is great news for local communities that depend on the cruise ship industry in order to survive, however it is bad news when it comes to the environment. Cruise ships create a massive amount of waste which ends up polluting our water ways and sending vast levels of pollutants into the air as well. These large ships typically produce around 170,000 gallons of waste water, 21,000 gallons of sewage, 6,400 gallons of bilge water, and 1 ton of solid waste per day ((Brooks Dunn, 2012). Unfortunately, these waste products are dumped into our oceans, seas, rivers, and lakes. There are numerous laws, regulations, and guidelines to prevent such things from happening but most of the cruise ship operations have found a way to work around them. They understand that states such as Alaska and Washington prohibit dumping of waste materials in their waters. The cruise ship corporations have taken advantage of the relaxed laws of places like British Columbia (B.C.) which for the most part allows them to release their waste products into their water areas. This presents a dilemma for the cruise ship industry because they ultimately have to decide between making a profit and being environmentally sound. Corporations such as the cruise ship industry have an ethical responsibility to meet all environmental regulations and laws regardless of where they are sailing. Corporations have an obligation to the general public and that includes making sure they are meeting standards set forth by the government. Environmental groups have a major influence on the general public and can create enough pressure where the reputation of a company is tarnished and sales start to decrease. It would be to a corporation’s advantage to show the general public that it is going above and beyond meeting environmental needs regardless of the rules in a particular country, state, etc. When sailing in international waters cruise ships should go by the strictest of all guidelines. Ethically, a corporation should set the standard for all others to follow. They can’t allow relaxed rules to be an excuse for creating environmental damage. The general public would feel betrayed to learn that a company built on having good, â€Å"clean†, vacation fun is in fact dirtying up the water ways. CEOs of such corporations should exercise due care and professional skepticism. They should ask how my actions will affect the water ways in the future. In addition, executives should question the rules of other countries and do everything in their power not to take advantage of weak laws. Port cities depend on tourism to generate revenue within their communities. It is of the most importance to balance the needs of tourism against the needs of maintaining an environmentally safe society. Compromise is essential in the effort to reduce as much waste going into our waters as possible. These tourist destinations should always work with the U.S. Environmental Protection Agency to develop reasonable plans that can be accomplished slowly in order to prevent pollution now and in the future. It is understood that cruise ships will always have waste products to get rid of so decisions should be based on what is good for the environment not solely on tourism. The responsibility to maintain a clean and healthy environment is up to everyone. Corporations have a major responsibility as well because they can influence the thoughts, ideas, and beliefs of the average citizen. If a major corporation promotes the idea of improving air and water quality then it can influence the actions of other corporations. The cruise ship industry is in the position to set the standards for all to follow. They have the ability to show others that no matter the location or circumstances that a standard set of rules should always be followed. They should not let profit get in the way of doing the right thing. In the long run doing what is expected is more important than profit. The general public would accept a rise in ticket prices for a cruise if they were informed that it is because of the environmental rules they are trying to follow. Profit is the main goal of any organization, but it should not come at the expense of people’s health and well being. If the proper research is conducted and coordination between countries is established then it should be no reason why environmental needs should not be met. The general public is the first priority of corporations and every effort of compromise should be attempted. References Brooks, L. J., Dunn, P. (2012). Business professional ethics for directors, executives accountants. (6th ed., p. 530). mason, oh: cengage.

Sunday, July 21, 2019

Shakespeares Sonnet 150 Explication English Language Essay

Shakespeares Sonnet 150 Explication English Language Essay Shakespeares Sonnet 150 explores the power of love over hate. The sonnet begins with the speaker pondering and questioning his current emotional state. The speakers loved one holds a certain power over him that effectively causes him to be unfaithful to himself as well as lie (3) to his true sight (3). The speaker strives for his heart to sway (2) towards hating his loved one and he has many reasons to do so, but the power that beholds him causes him to look past all of her atrocious habits and imperfections. Her deeds are carried out with such strength and warrantise of skill (7) that it makes all of the desirable she does seem so small that it is often overlooked by not only him, but others as well. The speaker was warned by others with the actuality that his loved one was unworthy of his love. He denied the obvious and truthful advice from his companions and remained in love. This caused the speaker to gain hate on his state (12) from not only them, but his loved one in particular . Throughout all of the mistreating the speakers loved one portrayed towards him, he remained loyal to his oath and loved her just as much as he initially did. The sonnet ends with the speaker left in a sense of shock and disapproval. Even though he remained worthy to his partner and forgivingly overlooked all of her imperfections, she did not love him as much as he deserved to be loved. In the first quatrain of the poem, the speaker is questioning his loved ones ability, and pondering on how she is able to make him love her. The word O (1) in the first line of the poem establishes the tone of the poem. It is used as a direct address to the speakers distressing emotional state, which makes the whole sonnet have a more gloomy and depressing tone. By using this type of tone, Shakespeare gives the reader a whole new insight on the speakers emotions. Shaping the loved ones effective influence over the speaker, Shakespeare uses many potent words -power, powerful, might (1) to emphasize the strong amount of authority she held in his emotions. The word powerful in the first line of the poem adds an extra syllable to the traditional iambic pentameter, putting a very powerful focus on the loved ones ability. In the next line, most of the syllables ore used on the word insufficiency (2) which expresses a sense of inability in the speaker. Adding to this sense of insufficiency in the speaker, Shakespeare chose conflicting words like lie (3) followed immediately by the word true (3) and swear (4) add to articulate the reader into feeling the speakers feelings. The first three lines of the quatrain end in a comma while the last line ends in a question mark. By using a question mark, Shakespeare is complicating the tone. He is adding a spark of sarcasm to the sonnet because by the speaker questioning his emotions, he is second guessing himself and asking himself if he is really doing what he should not be. In the second quatrain of the poem, the speaker considers all of his loved ones behaviors and asks himself why he is still in love with her after all the wrong she does to him. In the first line of the second quatrain, the word Whence (5), or where, is used which initiates another question. The word where is a time word that simply means from what place, source, or cause. Adding to this sense of timeliness, the word becoming (5) is used which illustrate a starting point, which is then followed by the word ill (5). The word ill, in this case meaning intended or caused by an evil intent, places negativity on the phrase. In the next lines, the writer uses more potent words to express just how powerful the loved one in the sonnet is. The punctuation in the second quatrain follows the pattern of the first quatrain. This shows that the speakers internal conflict has yet to be settled and he still has doubts on his relationship. In the third quatrain, the speaker questions who taught his loved one to make him love her as well as he considers the amount of love his loved one really feels towards him. Also, the third quatrain does not follow the pattern of quatrains one and two. It is broken up into two different sections, the first being a question and the second being a statement. Starting off the first section of the third quatrain, another time word is used. The word who (10) in this line is used to introduce a relative cause. A second time word, how (10), follows the word who. The word how is used to complete the cause because it identifies to what degree or extent the speakers loved one gained her power. Complicating the rhyme scheme, internal rhyme is used in line nine. The words thee, me, and thee (9) are used to put more of a focus on the speakers loved one rather than himself. Adding to the tone, the word O (11) is used once again in line eleven. By using this word, the speaker is once again returnin g to the drearier mood and exiting the sarcastic mood. It also shows the reader that the realization made by the speaker is one of disappointment. The words others and abhor (11-12) are used repetitively in this section as well. By doing this, Shakespeare is turning the focus away from the speaker and his emotions and onto others, the loved one in particular, and that hatred feeling they feel towards his state. In the last couplet of the sonnet, the speaker reaches the point of realization in the poem. He followed a strategic plan to help him reach this point in the sonnet. He first questioned her authority, secondly pondered on the options and possibilities, and finally came to the point of realizing he was no longer loved by her. The word If (13) is an introduction word, used in this case to introduce the conclusion of the poem. In lines thirteen and fourteen, a very important comparison is made comparing the love of the speaker to that of his loved one. By using the word unworthiness (13) to describe the speakers loved one, followed in the next line by the word worthy (14) describing the speaker, Shakespeare is showing the conflicting views of love in a relationship. More (14) is used immediately before the word worthy (14) to show the quantity of how much greater he should be loved by his loved one. Pairing this group of words also gives the reader an insight into the speakers loved one s emotions. Since love had to be raised (13) in him, it shows she was not deserving of his love, but also More worthy (14) in the following line shows that love was raised less in her and more in the speaker when really, he was more worthy to be beloved. Throughout the entire sonnet, alliteration is heavily used. Words with soft consonants are used to s low the reader down and express the gloomy tone to its greatest extent. By choosing to strategically sequence the poem by the speaker questioning, thinking, and realizing his destiny, Shakespeare puts a more reality type view to this sonnet. These problem solving strategies are used in any situation to sort through problems and make important decisions which give the reader a better grasp to the meaning as well as tone because everything does not always happen as planned or hoped for. Without using this alliteration or diction Shakespeare chose throughout the sonnet, the general feeling of shock and disappointment regarding the speakers love compared to that of his loved one would not be nearly as clear or dramatic.

Analysis of Land Consumption Rates

Analysis of Land Consumption Rates CHAPTER ONE INTRODUCTION 1.1 Background to the Study Studies have shown that there remains only few landscapes on the Earth that are still in there natural state. Due to anthropogenic activities, the Earth surface is being significantly altered in some manner and mans presence on the Earth and his use of land has had a profound effect upon the natural environment thus resulting into an observable pattern in the land use/land cover over time. The land use/land cover pattern of a region is an outcome of natural and socio economic factors and their utilization by man in time and space. Land is becoming a scarce resource due to immense agricultural and demographic pressure. Hence, information on land use / land cover and possibilities for their optimal use is essential for the selection, planning and implementation of land use schemes to meet the increasing demands for basic human needs and welfare. This information also assists in monitoring the dynamics of land use resulting out of changing demands of increasing population. Land use and land cover change has become a central component in current strategies for managing natural resources and monitoring environmental changes. The advancement in the concept of vegetation mapping has greatly increased research on land use land cover change thus providing an accurate evaluation of the spread and health of the worlds forest, grassland, and agricultural resources has become an important priority. Viewing the Earth from space is now crucial to the understanding of the influence of mans activities on his natural resource base over time. In situations of rapid and often unrecorded land use change, observations of the earth from space provide objective information of human utilization of the landscape. Over the past years, data from Earth sensing satellites has become vital in mapping the Earths features and infrastructures, managing natural resources and studying environmental change. Remote Sensing (RS) and Geographic Information System (GIS) are now providing new tools for advanced ecosystem management. The collection of remotely sensed data facilitates the synoptic analyses of Earth system function, patterning, and change at local, regional and global scales over time; such data also provide an important link between intensive, localized ecological research and regional, national and international conservation and management of biological diversity (Wilkie and Finn, 1996). Therefore, attempt will be made in this study to map out the status of land use land cover of Ilorin between 1972 and 2001 with a view to detecting the land consumption rate and the changes that has taken place in this status particularly in the built-up land so as to predict possible changes that might take place in this status in the next 14 years using both Geographic Information System and Remote Sensing data. 1.2 Statement of the Problem Ilorin, the Kwara State, capital has witnessed remarkable expansion, growth and developmental activities such as building, road construction, deforestation and many other anthropogenic activities since its inception in 1967 just like many other state capitals in Nigeria. This has therefore resulted in increased land consumption and a modification and alterations in the status of her land use land cover over time without any detailed and comprehensive attempt (as provided by a Remote Sensing data and GIS) to evaluate this status as it changes over time with a view to detecting the land consumption rate and also make attempt to predict same and the possible changes that may occur in this status so that planners can have a basic tool for planning. It is therefore necessary for a study such as this to be carried out if Ilorin will avoid the associated problems of a growing and expanding city like many others in the world. 1.3 Justification for the Study Attempt has been made to document the growth of Ilorin in the past but that from an aerial photography (Olorunfemi, 1983). In recent times, the dynamics of Land use Land cover and particularly settlement expansion in the area requires a more powerful and sophisticated system such as GIS and Remote Sensing data which provides a general extensive synoptic coverage of large areas than area photography 1.4 Aim and Objectives 1.4.1 Aim The aim of this study is to produce a land use land cover map of Ilorin at different epochs in order to detect the changes that have taken place particularly in the built-up land and subsequently predict likely changes that might take place in the same over a given period. 1.4.2 Objectives The following specific objectives will be pursued in order to achieve the aim above. To create a land use land cover classification scheme To determine the trend, nature, rate, location and magnitude of land use land cover change. To forecast the future pattern of land use land cover in the area. To generate data on land consumption rate and land absorption coefficient  since more emphasis is placed on built-up land. To evaluate the socio economic implications of predicted change. 1.5 The Study Area The study area (Ilorin) is the capital of Kwara State. It is located on latitude 80 31 N and 40 35 E with an Area of about 100km square (Kwara State Diary1997). Being situated in the transitional zone; between the forest and the savanna region of Nigeria i.e. the North and the West coastal region, it therefore serves as a melting point between the northern and southern culture.(Oyebanji, 1993). Her geology consists of pre-Cambrian basement complex with an elevation which ranges between 273m to 333m in the West and 200m to 364m in the East. The landscape of the region (Ilorin) is relatively flat, this means it is located on a plain and is crested by two large rivers, the river Asa and Oyun which flows in North South direction divides the plain into two; Western and Eastern part (Oyebanji, 1993). The climate is humid tropical type and is characterized by wet and dry seasons (Ilorin Atlas 1981). The wet season begins towards the end of March and ends in October. A dry season in the town begins with the onset of tropical continental air mass commonly referred to as harmattan. This wind is usually predominant between the months of November and February (Olaniran 2002). The temperature is uniformly high throughout the year. The mean monthly temperature of the town for the period of 1991 2000 varies between 250 C and 29.50 C with the month of March having about 300C. Ilorin falls into the southern savanna zone. This zone is a transition between the high forest in the southern part of the country and the far North with woodland properties. (Osoba, 1980). Her vegetation is characterized by scattered tall tree shrubs of between the height of ten and twelve feet. Oyegun in 1993 described the vegetation to be predominantly covered by derived savannah found in East and West and are noted for their dry lowland rainforest vegetal cover. As noted by Oyegun in 1983, Ilorin is one of the fastest growing urban centers in Nigeria. Her rate of population growth is much higher than for other cities in the country (Oyegun, 1983). Ilorin city has grown in both population and areal extent at a fast pace since 1967 (Oyegun, 1983). The Enplan group (1977) puts the population at 400,000 which made it then the sixth largest town in Nigeria. The town had a population of 40, 990 in 1952 and 208, 546 in 1963 and was estimated as 474, 835 in 1982 (Oyegun, 1983). In 1984, the population was 480, 000 (Oyegun, 1985). This trend in population growth rate shows a rapid growth in population. The growth rate between 1952 and 1963 according to Oyebanji, 1983 is put at 16.0 which is higher than other cities in the country. The population as estimated by the 1991 population census was put at 570,000. 1.6 Definition of Terms (i) Remote sensing: Can be defined as any process whereby information is gathered about an object, area or phenomenon without being in contact with it. Given this rather general definition, the term has come to be associated more specifically with the gauging of interactions between earth surface materials and electromagnetic energy. (Idrisi 32 guide to GIS and Image processing, volume 1). (ii) Geographic Information system: A computer assisted system for the acquisition, storage, analysis and display of geographic data (Idrisi 32 guide to GIS and Image processing, volume 1). (iii) Land use: This is the manner in which human beings employ the land and its resources. (iv) Land cover: Implies the physical or natural state of the Eaths surface. CHAPTER TWO 2.1 LITERATURE REVIEW According to Meyer, 1999 every parcel of land on the Earths surface is unique in the cover it possesses. Land use and land cover are distinct yet closely linked characteristics of the Earths surface. The use to which we put land could be grazing, agriculture, urban development, logging, and mining among many others. While land cover categories could be cropland, forest, wetland, pasture, roads, urban areas among others. The term land cover originally referred to the kind and state of vegetation, such as forest or grass cover but it has broadened in subsequent usage to include other things such as human structures, soil type, biodiversity, surface and ground water (Meyer, 1995). Land use affects land cover and changes in land cover affect land use. A change in either however is not necessarily the product of the other. Changes in land cover by land use do not necessarily imply degradation of the land. However, many shifting land use patterns driven by a variety of social causes, result in land cover changes that affects biodiversity, water and radiation budgets, trace gas emissions and other processes that come together to affect climate and biosphere (Riebsame, Meyer, and Turner, 1994). Land cover can be altered by forces other than anthropogenic. Natural events such as weather, flooding, fire, climate fluctuations, and ecosystem dynamics may also initiate modifications upon land cover. Globally, land cover today is altered principally by direct human use: by agriculture and livestock raising, forest harvesting and management and urban and suburban construction and development. There are also incidental impacts on land cover from other human activities such as forest and lakes damaged by acid rain from fossil fuel combustion and crops near cities damaged by tropospheric ozone resulting from automobile exhaust (Meyer, 1995). Hence, in order to use land optimally, it is not only necessary to have the information on existing land use land cover but also the capability to monitor the dynamics of land use resulting out of both changing demands of increasing population and forces of nature acting to shape the landscape. Conventional ground methods of land use mapping are labor intensive, time consuming and are done relatively infrequently. These maps soon become outdated with the passage of time, particularly in a rapid changing environment. In fact according to Olorunfemi (1983), monitoring changes and time series analysis is quite difficult with traditional method of surveying. In recent years, satellite remote sensing techniques have been developed, which have proved to be of immense value for preparing accurate land use land cover maps and monitoring changes at regular intervals of time. In case of inaccessible region, this technique is perhaps the only method of obtaining the required data on a cost and time effective basis. A remote sensing device records response which is based on many characteristics of the land surface, including natural and artificial cover. An interpreter uses the element of tone, texture, pattern, shape, size, shadow, site and association to derive information about land cover. The generation of remotely sensed data/images by various types of sensor flown aboard different platforms at varying heights above the terrain and at different times of the day and the year does not lead to a simple classification system. It is often believed that no single classification could be used with all types of imagery and all scales. To date, the most successful attempt in developing a general purpose classification scheme compatible with remote sensing data has been by Anderson et al which is also referred to as USGS classification scheme. Other classification schemes available for use with remotely sensed data are basically modification of the above classification scheme. Ever since the launch of the first remote sensing satellite (Landsat-1) in 1972, land use land cover studies were carried out on different scales for different users. For instance, waste land mapping of India was carried out on 1:1 million scales by NRSA using 1980 82 landsat multi spectral scanner data. About 16.2% of waste lands were estimated based on the study. Xiaomei Y, and Rong Qing L.Q.Y in 1999 noted that information about change is necessary for updating land cover maps and the management of natural resources. The information may be obtained by visiting sites on the ground and or extracting it from remotely sensed data. Change detection is the process of identifying differences in the state of an object or phenomenon by observing it at different times (Singh, 1989). Change detection is an important process in monitoring and managing natural resources and urban development because it provides quantitative analysis of the spatial distribution of the population of interest. Macleod and Congation (1998) list four aspects of change detection which are important when monitoring natural resources: i. Detecting the changes that have occurred ii. Identifying the nature of the change iii. Measuring the area extent of the change iv. Assessing the spatial pattern of the change The basis of using remote sensing data for change detection is that changes in land cover result in changes in radiance values which can be remotely sensed. Techniques to perform change detection with satellite imagery have become numerous as a result of increasing versatility in manipulating digital data and increasing computer power. A wide variety of digital change detection techniques have been developed over the last two decades. Singh (1989) and Coppin Bauer (1996) summarize eleven different change detection algorithms that were found to be documented in the literature by 1995. These include: 1. Mono-temporal change delineation. 2. Delta or post classification comparisons. 3. Multidimensional temporal feature space analysis. 4. Composite analysis. 5. Image differencing. 6. Multitemporal linear data transformation. 7. Change vector analysis. 8. Image regression. 9. Multitemporal biomass index 10. Background subtraction. 11. Image ratioing In some instances, land use land cover change may result in environmental, social and economic impacts of greater damage than benefit to the area (Moshen A, 1999). Therefore data on land use change are of great importance to planners in monitoring the consequences of land use change on the area. Such data are of value to resources management and agencies that plan and assess land use patterns and in modeling and predicting future changes. Shosheng and Kutiel (1994) investigated the advantages of remote sensing techniques in relation to field surveys in providing a regional description of vegetation cover. The results of their research were used to produce four vegetation cover maps that provided new information on spatial and temporal distributions of vegetation in this area and allowed regional quantitative assessment of the vegetation cover. Arvind C. Pandy and M. S. Nathawat (2006) carried out a study on land use land cover mapping of Panchkula, Ambala and Yamunanger districts, Hangana State in India. They observed that the heterogeneous climate and physiographic conditions in these districts has resulted in the development of different land use land cover in these districts, an evaluation by digital analysis of satellite data indicates that majority of areas in these districts are used for agricultural purpose. The hilly regions exhibit fair development of reserved forests. It is inferred that land use land cover pattern in the area are generally controlled by agro climatic conditions, ground water potential and a host of other factors. It has been noted over time through series of studies that Landsat Thematic Mapper is adequate for general extensive synoptic coverage of large areas. As a result, this reduces the need for expensive and time consuming ground surveys conducted for validation of data. Generally, satellite imagery is able to provide more frequent data collection on a regular basis unlike aerial photographs which although may provide more geometrically accurate maps, is limited in respect to its extent of coverage and expensive; which means, it is not often used. In 1985, the U.S Geological Survey carried out a research program to produce 1:250,000 scale land cover maps for Alaska using Landsat MSS data (Fitz Patrick et al, 1987).The State of Maryland Health Resources Planning Commission also used Landsat TM data to create a land cover data set for inclusion in their Maryland Geographic Information (MAGI) database. All seven TM bands were used to produce a 21 class land cover map (EOSAT 1992). Also, in 1992, the Georgia Department of Natural Resources completed mapping the entire State of Georgia to identify and quantify wetlands and other land cover types using Landsat Thematic Mapper â„ ¢ data (ERDAS, 1992). The State of southern Carolina Lands Resources Conservation Commission developed a detailed land cover map composed of 19 classes from TM data (EOSAT, 1994). This mapping effort employed multi-temporal imagery as well as multi-spectral data during classification. An analysis of land use and land cover changes using the combination of MSS Landsat and land use map of Indonesia (Dimyati, 1995) reveals that land use land cover change were evaluated by using remote sensing to calculate the index of changes which was done by the superimposition of land use land cover images of 1972, 1984 and land use maps of 1990. This was done to analyze the pattern of change in the area, which was rather difficult with the traditional method of surveying as noted by Olorunfemi in 1983 when he was using aerial photographic approach to monitor urban land use in developing countries with Ilorin in Nigeria as the case study. Daniel et al, 2002 in their comparison of land use land cover change detection methods, made use of 5 methods viz; traditional post classification cross tabulation, cross correlation analysis, neural networks, knowledge based expert systems, and image segmentation and object oriented classification. A combination of direct T1 and T2 change detection as well as post classification analysis was employed. Nine land use land cover classes were selected for analysis. They observed that there are merits to each of the five methods examined, and that, at the point of their research, no single approach can solve the land use change detection problem. Also, Adeniyi and Omojola, (1999) in their land use land cover change evaluation in Sokoto Rima Basin of North Western Nigeria based on Archival Remote Sensing and GIS techniques, used aerial photographs, Landsat MSS, SPOT XS/Panchromatic image Transparency and Topographic map sheets to study changes in the two dams (Sokoto and Guronyo) between 1962 and 1986. The work revealed that land use land cover of both areas was unchanged before the construction while settlement alone covered most part of the area. However, during the post dam era, land use /land cover classes changed but with settlement still remaining the largest. CHAPTER THREE RESEARCH METHODOLOGY 3.1 Introduction The procedure adopted in this research work forms the basis for deriving statistics of land use dynamics and subsequently in the overall, the findings. 3.2 Data Acquired and Source For the study, Landsat satellite images of Kwara State were acquired for three Epochs; 1972, 1986 and 2001. Both 1972 and 1986 were obtained from Global Land Cover Facility (GLCF) an Earth Science Data Interface, while that of 2001 was obtained from National Space Research and Development Agency in Abuja (NASRDA). 0n both 2001 and 1986 images, a notable feature can be observed which is the Asa dam which was not yet constructed as of 1972. It is also important to state that Ilorin and its environs which were carved out using the local government boundary map and Nigerian Administrative map was also obtained from NASRDA. These were brought to Universal Transverse Marcator projection in zone 31. Table 3.1 Data Source 3.2.1 Geo-referencing Properties of the Images The geo-referencing properties of both 1986 2001 are the same while image thinning was applied to the 1972 imagery which has a resolution of 80m using a factor of two to modify its properties and resolution to conform to the other two has given below; Data type: rgb8 File type: binary Columns: 535 Rows: 552 Referencing system: utm-31 Reference units: m Unit distance: 1 Minimum X: 657046.848948 Maximum X: 687541.848948 Minimum Y: 921714.403281 Maximum Y: 953178.403281 Min Value: 0 Max Value: 215 Display Minimum: 0 Display Maximum: 215 Image thinning was carried out through contract; contract generalizes an image by reducing the number of rows and columns while simultaneously decreasing the cell resolution. Contraction may take place by pixel thinning or pixel aggregation with the contracting factors in X and Y being independently defined. With pixel thinning, every nth pixel is kept while the remaining is thrown away. 3.3 Software Used Basically, five software were used for this project viz; (a) ArcView 3.2a this was used for displaying and subsequent processing and enhancement of the image. It was also used for the carving out of Ilorin region from the whole Kwara State imagery using both the admin and local government maps. (b) ArcGIS This was also used to compliment the display and processing of the data (c) Idrisi32 This was used for the development of land use land cover classes and subsequently for change detection analysis of the study area. (d) Microsoft word was used basically for the presentation of the research. (e) Microsoft Excel was used in producing the bar graph. 3.4 Development of a Classification Scheme Based on the priori knowledge of the study area for over 20 years and a brief reconnaissance survey with additional information from previous research in the study area, a classification scheme was developed for the study area after Anderson et al (1967). The classification scheme developed gives a rather broad classification where the land use land cover was identified by a single digit. Table 3.2 Land use land cover classification scheme The classification scheme given in table 3.2 is a modification of Andersons in 1967 The definition of waste land as used in this research work denotes land without scrub, sandy areas, dry grasses, rocky areas and other human induced barren lands. 3.5 Limitation(s) in the Study There was a major limitation as a result of resolution difference. Landsat image of 1972 was acquired with the multi spectral scanner (MSS) which has a spatial resolution of 80 meters, whilst the images of 1986 and 2001 were acquired with Thematic Mapper â„ ¢ and Enhanced Thematic Mapper (ETM) respectively. These both have a spatial resolution of 30 meters. Although this limitation was corrected for through image thinning of the 1972, it still prevented its use for projecting into the future so as to have a consistent result. Apart from this, it produced an arbitrary classification of water body for the 1972 classification. 3.6 Methods of Data Analysis Six main methods of data analysis were adopted in this study. (i) Calculation of the Area in hectares of the resulting land use/land cover types for each study year and subsequently comparing the results. (ii) Markov Chain and Cellular Automata Analysis for predicting change (iii) Overlay Operations (iv) Image thinning (v) Maximum Likelihood Classification (vi) Land Consumption Rate and Absorption Coefficient The fist three methods above were used for identifying change in the land use types. Therefore, they have been combined in this study. The comparison of the land use land cover statistics assisted in identifying the percentage change, trend and rate of change between 1972 and 2001. In achieving this, the first task was to develop a table showing the area in hectares and the percentage change for each year (1972, 1986 and 2001) measured against each land use land cover type. Percentage change to determine the trend of change can then be calculated by dividing observed change by sum of changes multiplied by 100 (trend) percentage change = observed change * 100 Sum of change In obtaining annual rate of change, the percentage change is divided by 100 and multiplied by the number of study year 1972 1986 (14years) 1986 2001 (15years) Going by the second method (Markov Chain Analysis and Cellular Automata Analysis), Markov Chain Analysis is a convenient tool for modeling land use change when changes and processes in the landscape are difficult to describe. A Markovian process is one in which the future state of a system can be modeled purely on the basis of the immediately preceding state. Markovian chain analysis will describe land use change from one period to another and use this as the basis to project future changes. This is achieved by developing a transition probability matrix of land use change from time one to time two, which shows the nature of change while still serving as the basis for projecting to a later time period .The transition probability may be accurate on a per category basis, but there is no knowledge of the spatial distribution of occurrences within each land use category. Hence, Cellular Automata (CA) was used to add spatial character to the model. CA_Markov uses the output from the Markov Chain Analysis particularly Transition Area file to apply a contiguity filter to grow out land use from time two to a later time period. In essence, the CA will develop a spatially explicit weighting more heavily areas that proximate to existing land uses. This will ensure that land use change occurs proximate to existing like land use classes, and not wholly random. Overlay operations which is the last method of the three, identifies the actual location and magnitude of change although this was limited to the built-up land. Boolean logic was applied to the result through the reclass module of idrisi32 which assisted in mapping out separately areas of change for which magnitude was later calculated for. The Land consumption rate and absorption coefficient formula are give below; L.C.R = A P A = areal extent of the city in hectares P = population L.A.C = A2 A1 P2 P1 A1 and A2 are the areal extents (in hectares) for the early and later years, and P1 and P2 are population figure for the early and later years respectively (Yeates and Garner, 1976) L.C.R = A measure of compactness which indicates a progressive spatial expansion of a city. L.A.C = A measure of change in consumption of new urban land by each unit increase in urban population Both the 2001 and 2015 population figures were estimated from the 1991 and the estimated 2001 population figures of Ilorin respectively using the recommended National Population Commission (NPC) 2.1% growth rate as obtained from the 1963/1991 censuses. The first task to estimating the population figures was to multiply the growth rate by the census figures of Ilorin in both years (1991, 2001) while subsequently dividing same by 100. The result was then multiplied by the number of years being projected for, the result of which was then added to the base year population (1991, 2001). This is represented in the formula below; n = r/100 * Po (1) Pn = Po + (n * t) (2) Pn = estimated population (2001, 2015) Po = base year population (1991 2001 population figure) r = growth rate (2.1%) n = annual population growth t = number of years projecting for *The formula given for the population estimate was developed by the researcher In evaluating the socio economic implications of change, the effect of observed changes in the land use and land cover between 1972 and 2001 were used as major criteria. CHAPTER FOUR DATA ANALYSIS 4.0 Introduction The objective of this study forms the basis of all the analysis carried out in this chapter. The results are presented inform of maps, charts and statistical tables. They include the static, change and projected land use land cover of each class. 4.1 Land Use Land Cover Distribution The static land use land cover distribution for each study year as derived from the maps are presented in the table below LANDUSE/LAND COVER CATEGORIES 1972 1986 2001 AREA (Ha.) AREA (%)

Saturday, July 20, 2019

Romeo and Juliet: Fate or Free Will? Essay -- Romeo and Juliet

Romeo and Juliet: Fate or Free Will? The play Romeo and Juliet was one of the most famous love tragedies ever written. This love story unfortunately had a fatal ending. Many people argue over why the lovers had died, was it over Free Will or Fate? The death of Romeo and Juliet was partially because of free will. The fact that Romeo and Juliet got married knowing that there was a bitter feud between their families, the Montague and Capulet’s. This feud brought on many problems, such as the murder of Tybalt by Romeo. Juliet knew that this might be a problem for Her and Romeo. Juliet had said: â€Å"What’s in a name†? Which explains her ill fate of being a Capulet and Romeo being a Montague. When Romeo tells his servant â€Å" Ay, mine own fortune in my misery†. This illustrates that he does not...

Friday, July 19, 2019

Freezing Point Of Naphthalene :: essays research papers

Freezing Point of Naphthalene I.  Ã‚  Ã‚  Ã‚  Ã‚  Purpose   Ã‚  Ã‚  Ã‚  Ã‚  To determine the freezing point of a known substance, naphthalene II.  Ã‚  Ã‚  Ã‚  Ã‚  Materials   Ã‚  Ã‚  Ã‚  Ã‚  ringstand  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  gas source   Ã‚  Ã‚  Ã‚  Ã‚  test tube  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  test tube clamps thermometer naphthalene Bunsen burner goggles   Ã‚  Ã‚  Ã‚  Ã‚  hose  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  stopwatch III.  Ã‚  Ã‚  Ã‚  Ã‚  Procedure   Ã‚  Ã‚  Ã‚  Ã‚  1.  Ã‚  Ã‚  Ã‚  Ã‚  Assemble the Bunsen burner, attaching one end of the hose to the burner and the   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  other to a gas source.   Ã‚  Ã‚  Ã‚  Ã‚  2.  Ã‚  Ã‚  Ã‚  Ã‚  Assemble the ring stand so that a ring clamp is attached to the stand holding the   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  test tube that will be used in the experiment.   Ã‚  Ã‚  Ã‚  Ã‚  3.  Ã‚  Ã‚  Ã‚  Ã‚  Fill the test tube to approximately 1/8 capacity with naphthalene crystals.   Ã‚  Ã‚  Ã‚  Ã‚  4.   Ã‚  Ã‚  Ã‚  Ã‚  Place the thermometer in the crystals so that it is surrounded by the naphthalene   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  powder but not touching the sides or bottom of the test tube. Use a clamp to hold   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  the thermometer in place.   Ã‚  Ã‚  Ã‚  Ã‚  5.   Ã‚  Ã‚  Ã‚  Ã‚  Ignite the Bunsen burner and using direct heat melt the naphthalene powder until   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  it completely turns to a liquid. When the temperature reaches approximately 90o   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Celsius, stop heating.   Ã‚  Ã‚  Ã‚  Ã‚  6.  Ã‚  Ã‚  Ã‚  Ã‚  Observe the change in temperature from 90o to 70o Celsius, recording the   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  temperature at regular intervals, preferably 15 seconds. This data will be used to   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  make a chart later.   Ã‚  Ã‚  Ã‚  Ã‚  7.  Ã‚  Ã‚  Ã‚  Ã‚  Once the temperature has fallen to 70o, melt the naphthalene which is now   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  frozen   Ã‚  Ã‚  Ã‚  Ã‚  to remove the thermometer. Properly dispose of the naphthalene liquid as   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  instructed by the teacher. IV.  Ã‚  Ã‚  Ã‚  Ã‚  Data   Ã‚  Ã‚  Ã‚  Ã‚  Time Elapsed  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Temperature of Naphthalene  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Time   Ã‚  Ã‚  Ã‚  Ã‚  Temperature   Ã‚  Ã‚  Ã‚  Ã‚  Initial (0:00)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  100oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  7:00   Ã‚  Ã‚  Ã‚  Ã‚  78.5oC   Ã‚  Ã‚  Ã‚  Ã‚  0:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  97.5oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  7:15   Ã‚  Ã‚  Ã‚  Ã‚  78.3oC   Ã‚  Ã‚  Ã‚  Ã‚  1:00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  93.0oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  7:30   Ã‚  Ã‚  Ã‚  Ã‚  78.3oC   Ã‚  Ã‚  Ã‚  Ã‚  1:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  89.5oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  7:45   Ã‚  Ã‚  Ã‚  Ã‚  79.0oC   Ã‚  Ã‚  Ã‚  Ã‚  2:00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  86.1oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  8:00   Ã‚  Ã‚  Ã‚  Ã‚  79.0oC   Ã‚  Ã‚  Ã‚  Ã‚  2:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  84.6oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  8:15   Ã‚  Ã‚  Ã‚  Ã‚  79.0oC   Ã‚  Ã‚  Ã‚  Ã‚  2:45  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  82.3oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  8:30   Ã‚  Ã‚  Ã‚  Ã‚  79.0oC   Ã‚  Ã‚  Ã‚  Ã‚  3:00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  81.2oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  8:45   Ã‚  Ã‚  Ã‚  Ã‚  79.0oC   Ã‚  Ã‚  Ã‚  Ã‚  3:15  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  81.0oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9:00   Ã‚  Ã‚  Ã‚  Ã‚  79.0oC   Ã‚  Ã‚  Ã‚  Ã‚  3:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  80.5oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9:15   Ã‚  Ã‚  Ã‚  Ã‚  78.5oC   Ã‚  Ã‚  Ã‚  Ã‚  3:45  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  80.2oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9:30   Ã‚  Ã‚  Ã‚  Ã‚  78.1oC   Ã‚  Ã‚  Ã‚  Ã‚  4:00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  80.0oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  9:45   Ã‚  Ã‚  Ã‚  Ã‚  78.0oC   Ã‚  Ã‚  Ã‚  Ã‚  4:15  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  79.9oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10:00   Ã‚  Ã‚  Ã‚  Ã‚  78.0oC   Ã‚  Ã‚  Ã‚  Ã‚  4:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  79.8oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10:15   Ã‚  Ã‚  Ã‚  Ã‚  77.5oC   Ã‚  Ã‚  Ã‚  Ã‚  4:45  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  79.4oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10:30   Ã‚  Ã‚  Ã‚  Ã‚  77.0oC   Ã‚  Ã‚  Ã‚  Ã‚  5:00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  79.1oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  10:45   Ã‚  Ã‚  Ã‚  Ã‚  76.5oC   Ã‚  Ã‚  Ã‚  Ã‚  5:15  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  79.1oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  11:00   Ã‚  Ã‚  Ã‚  Ã‚  76.0oC   Ã‚  Ã‚  Ã‚  Ã‚  5:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  79.0oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  11:15   Ã‚  Ã‚  Ã‚  Ã‚  75.2oC   Ã‚  Ã‚  Ã‚  Ã‚  5:45  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  78.9oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  11:30   Ã‚  Ã‚  Ã‚  Ã‚  73.8oC   Ã‚  Ã‚  Ã‚  Ã‚  6:00  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  78.8oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  11:45   Ã‚  Ã‚  Ã‚  Ã‚  73.0oC   Ã‚  Ã‚  Ã‚  Ã‚  6:25  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  78.8oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12:00   Ã‚  Ã‚  Ã‚  Ã‚  72.1oC   Ã‚  Ã‚  Ã‚  Ã‚  6:30  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  78.7oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12:15   Ã‚  Ã‚  Ã‚  Ã‚  71.1oC   Ã‚  Ã‚  Ã‚  Ã‚  6:45  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  78.6oC  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  12:30   Ã‚  Ã‚  Ã‚  Ã‚  70.3oC V.  Ã‚  Ã‚  Ã‚  Ã‚  Graph   Ã‚  Ã‚  Ã‚  Ã‚  (See following pages) VI.  Ã‚  Ã‚  Ã‚  Ã‚  Calculations   Ã‚  Ã‚  Ã‚  Ã‚  Using 80.1 oC as the theoretical value for the freezing point of naphthalene, we can now   Ã‚  Ã‚  Ã‚  Ã‚  determine percent error.   Ã‚  Ã‚  Ã‚  Ã‚  Percent Error = ((Theoretical - Experimental) / Theoretical) x 100   Ã‚  Ã‚  Ã‚  Ã‚  Percent Error = ((80.1 oC - 79.0 oC) / 80.1oC) x 100   Ã‚  Ã‚  Ã‚  Ã‚  Percent Error = 1.4% VII.  Ã‚  Ã‚  Ã‚  Ã‚  Conclusions   Ã‚  Ã‚  Ã‚  Ã‚  In this lab, we heated the known substance naphthalene in a test tube to approximately 100oC and observed its temperature while it cooled to approximately 70oC. Over a time period of 12 minutes and 30 seconds, we recorded the temperature at regular 15 second intervals, and, with this data, constructed a chart showing the general curve. Upon inspection of the graph and our data chart, we found the experimental freezing point of naphthalene to be around 79oC.