Friday, January 31, 2020

Comparing poems Nothings changed Essay Example for Free

Comparing poems Nothings changed Essay The Poem nothings changed is based on Tatamkhulu Afrika himself who spent many years in South Africa and his autobiographical poem which describes most of what him and others had experienced and his own feelings expressed during the policy of Apartheid, introduced by the government in his country. This forced many popular attractions such as beaches, buses and even towns to be changed to white areas only. For some this meant leaving the country forever all just because of the colour of there skin. The poem itself is set out in six stanzas, each including eight fairly short but important lines. This kind of layout and structure in the poem creates a sense of control, showing how the poet is extremely clear about what he is saying and feeling in his head with no sudden actions leading to rage. Within the pattern of the poem the line lengths do also vary from a whole entire stanza to just two little words. For example: District Six. No board says it is: but my feet know, and my hands, and the skin about my bones, and the soft labouring of my lungs,and the hot, white, inwards turning. This shows how the structure of the strong poem changes in the stanzas, gradually getting bigger sentences as the stanza speaks on, giving a feeling of confidence in the poet proving he knows what he is talking about with all the information gathering. The whole poem is written in the present tense, although always recalling past experience he had the poet is constantly reliving the experience as he writes every word. This makes this poem in particular stand out from what were they like? due to the fact it is easy to identify what is going on. The poet also clearly states how he is feeling and what he is exactly doing as he writes, describing every little detail by putting us in his shoes. The poem overall describes how he returns to the wasteland that was once his home and relives the anger he felt when the area was first destroyed. With him seeing the restaurant Which consists of being expensive, stylish, exclusive with a guard at the gatepost it makes him think about the poverty around it especially the working mans cafi across from it were people live without eating from plates and on a plastic table top. This makes him reflect that despite the changing political situation, there are still huge inequalities between blacks and whites. Even though South Africa is supposed to have changed, he knows the new restaurant is really whites only. He feels that nothing has really changed overall. The deep anger he feels makes him want to destroy the restaurant completely to smash the glass with a stone, or a bomb. Secondly the poem what were they like written by Denise Levertov who wrote poems that opposed American fighting in Vietnam in the 1960s. This particular poem is against the typical American ignorance of the Vietnam war. She published the poem to show her true feelings about what the American army themselves had done to the people and the way of life of Vietnam. The structure of the poem is like an interview, having the interviewer or questioner ask all the questions together and then the speaker answer each question after one another. Altogether there are six questions followed by six very surprising answers. Also at the end of the poem the answers are followed by a rhetorical question who can say? This makes the reader think in there head about the answer and shows the unusual treatment Vietnam received by the American army. In the poem itself she compares two different periods, before and after the war had ended showing the interesting experiences people were put in and what she wants answered for. The tone in the first section of the poem includes a thought on curiosity and full of wonder and also could be considered as being questions which are asked quickly and impatiently as when reading them you want to get to the answers straight away. Also the tone of the questioner may seem to be angry and a state of foolishness and insensitivity, yet still having a sense of sadness because of the loss of such an innocent country and the people who lived there during this hectic time. The questioner themselves represent the uninformed Americans and the response being Denise Levertov giving the impression that the questioner should have known more about Vietnam. The responses to the questions seem rather bitter and brutal to the suffering people as when read seem honest and quickly spoken in your head which is what the poet is trying to get at to show the emotion of which happened during the war itself. Overall both poems include some similar qualities, both being completely true and poets experiencing the lives lived out there. Yet nothings changed is describing the life long change of the country since introducing the law of Apartheid in the 1960s and how the country is still living with it, and overcoming the stress and changes the country had to make to change the lives of black and white people which is something of anger and hatred. This is shown by a personal experience form living in the country and visiting local areas and recording the atmosphere of the place. This anger can also be shown in what were they like although this particular poet may have had experience from Vietnam she was not there to see it and includes in her poem questions referring to the fact she wants answers to what has happened in the past war against America. This shows the poems are different one including life experience on unfair laws made and the other just wanted answers on what she believes what happened in the Vietnam war is completely wrong.

Wednesday, January 22, 2020

Essay --

There is no question that obesity is a national epidemic. Statistics from the Centers for Disease Control and Prevention indicate nearly 36% of U.S. adults more than 20 years of age were considered obese in 2009 through 2010, with 18.4% of adolescents following closely behind (Krieter). However, while obesity is a growing problem, labeling it as a disease is a formidable approach to what is considered a lifestyle choice for many American citizens. Scientists have made great advances in understanding significant environmental causes of obesity as well as identifying several genetic factors that may be implicated. Many efforts are now directed toward evaluating the interactions between these factors and understanding how this relationship interplays into major roles of the problem. Obesity is an end result of human response to biology and the environment. Recent hypotheses made by scientists suggest that the current obesity problem is largely due to environmental factors, such as fast food consumption, television watching, and large portion sizes (Brantley). Americans live in the era of eating unhealthy fast food, and the notorious ‘supersizing.’ Television, radio, and print advertising bombard the population with enticements to eat food high in calories and fat (Gunderman). Furthermore, the physical and mental demands of today’s societies are relentlessly changing, resulting in unbalanced energy intake and consumption. A study, published in the journal, Pediatrics, emphasize on specific environmental aspects on children and teen lives that contribute to their unhealthy, fat-filled lifestyles (Haelle). Researchers found that the link between increased television time and obesity rates among adolescents has grown stronger in the p... ...rtant contributors to obesity. Gain in body weight can be achieved through accumulative positive energy balances; these could form through adjustments in energy expenditure or fuel utilization and the types of the food that the consumer eats. The interaction between the two factors leads to a positive energy balance, eventually turning into body fat and weight gain. However, while previous investigations have found a clear association between high fat intake and risk of obesity the relationship does not establish a biological certitude. Further research must be done to form a more clear and reliable explanation for the affiliation between the genetic and environmental aspects of the epidemic. While the biological basis of the interaction is uncertain, cultural changes in society and the genetic makeup of the human body are clearly significant causes of obesity.

Tuesday, January 14, 2020

Informational Interview Essay

Owner of Nutra-Planet, Sam Hong, is a respected, hardworking man that gave me advice that will be very useful in the future. Nutra-Planet is an online supplement store that has been growingly rapidly the past few years. I met with Mr. Hong for about twenty minutes, and discussed things such as: the education needed to work in his business, his job setting, required skills, and many other things. I chose Mr. Hong because I have been a customer with his business for a few years, and his warehouse/office is in my home town. He was a very polite man, and he said that he always enjoys the chance to share his knowledge with people. I interviewed him at his main office and I dressed business casual. I really learned an abundance about owning your own business, and it gave me an idea of what I needed to do if I decided to own my own store. Education Needed The first question to Mr. Hong was the type of education needed, not just to work there, but to actually have an opportunity to advance. He told me that he is interested in someone who knows both the business aspect and the supplement knowledge aspect of running the business. In order to pursue this path, I would be more successful finding a major supplement chain like his that has opportunities for advancement. My major now is marketing, and he said that will definitely help me in the future. I need to know the business aspects if I want to run day to day operations. Job Setting My next question for Mr. Hong was the type of job setting that his business offered. He said that his main goal was to make his customers’ experience a pleasurable one, and that the environment was a major factor in making that successful. From the casual, friendly atmosphere to the layout of the online store and warehouse, all things need to come together to make the customer want to come back, and tell all their friends about it also. This requires a knowledgeable staff that is helpful to everyone, and a friendly personality is as important to him as the experience an employer brings with him. Required Skills When I asked Mr. Hong about the skills that were required to be hired in an upper-level position in this business, he told me there were two different avenues to advance through; the business aspect or the customer relations aspects. He said that it is crucial for his employees to work well with other employees, and be able to take criticism and advice. Although I am majoring in business, I would still love to work hands on with customers. Aside from the obvious skills of knowing about supplements, Jay said the single most important skill he looks for is â€Å"people† skills. The personality to interact with others and assure them that you know what you are talking about when it comes to supplements. Conclusion The interview with Mr. Hong went very well, and he was said that he was happy that he could answer my questions. He emphasized that it is very important to stay in school and make sure that I graduate, because if I ever need any loans or anything it will help out tremendously if I have a good background and a degree. I will make sure that I interview more people in the future because I believe that it is a huge help to talk to someone face to face instead of reading stuff online.

Monday, January 6, 2020

The Comprehensive Security Policy In The Trojan War

Comprehensive Security Policy Introduction A company that experiences a social engineering attack to create or reevaluate its security plan in respect to its email, acceptable use, physical security and incident response plan. Social engineering attacks have been around forever across many different cultures and platforms. The first major social engineering attack happened during the mythological Trojan War. The Greek after a ten-year unsuccessful siege of Troy appeared to leave, and leave behind a huge wooden statue of a horse as a parting gift. The Trojans wheeled in the horse through the gates and proceeded to celebrate their victory not aware that the horse contained Greek soldiers. The soldiers late at night crept out of the†¦show more content†¦Water holing is an attack using malware which allows the attacker to observe websites often visited by a victim and infects those sites with malware. Attacks using whaling the goal of whaling is to trick someone into disclosing organizational or personal information through social engineering, email spoofing and content spoofing efforts. Whaling is typically directed towards the powerful, wealthy and prominent individuals. Pretexting is an attack that the attacker presents their self as someone else in order to obtain private information or data. Attacks using pretexting try to manipulate victims into performing an action that allows an attacker to discover and exploit a weakness inside an organization. Finally, attackers use baiting which is a technique to exploits the victim’s natural curiosity. Baiting relies on the curiosity or greed of the victim and is very similar to phishing attacks. Prevention and Detection The keys to prevention and detection of social engineering attacks should be included in the organizations security policy. Social engineering attacks require the same approach and security posture as another type of attacks on an organizations information and data. The organization must identify its assets, turn up span mail features, clarify the line between work and personal, develop effective access management, and conduct training and awareness ofShow MoreRelatedSecurity Challenges1439 Words   |  6 PagesIn the future of violence, law and security experts detailed the myriad possibilities, challenges, and risks present in the modern world. Consequently, governments, companies, and citizens must rethink their security efforts to protect lives and liberty. Maintaining security in this world where anyone can attack anyone will also mean taking a global perspective, with more multinational forces and greater action to protect weaker states that do not yet have the capability to police their own peopleRead MoreComputer Security and Page Ref6114 Words   |  25 PagesManagement Information Systems, 12e (Laudon) Chapter 8 Securing Information Systems 1) In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks. Answer: TRUE Diff: 1 Page Ref: 294 AACSB: Use of IT CASE: Comprehension Objective: 8.1 2) Computers using cable modems to connect to the Internet are more open to penetration than those connecting via dial-up. Answer: TRUE Diff: 2 Page Ref: 294 AACSB: Use of IT CASE:Read MoreThe Assassination Of The Syrian Civil War1877 Words   |  8 Pageswere promptly arrested, beaten, and interrogated for their message of rebellion. Relatives, neighbors, and hundreds of other discontented citizens took the streets in protest in which al-Assad’s security forces responded to by opening fire, killing several. Thus marking the beginning of the Syrian civil war. As news spread hundreds of thousands more started taking the street in protest. Al-Assad responded with an iron fist, using force to hinder the protesting. The brutal and uncompromising responseRead MoreThe Darfur Crisis Essay3078 Words   |  13 Pagesroots in the philosophy of â€Å"Human Security†. Human Security can be defined as focusing on the individual human being as the referent object of security as distinct from the nation-state. R2P and Human Security have gathered impetus in the international community both in academic and policy spheres with a view to these concepts be ing justifiers for humanitarian intervention. Taking realism as the security argument that deals directly with state security, it is accepted that nation statesRead MoreLinux Security3394 Words   |  14 PagesSecuring Linux Platforms and Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperativeRead MoreCybercrime and Its Impact in Bangladesh7186 Words   |  29 Pagesact, there is a chance to become safe side after committing crimes. So, considering these facts a comprehensive Cybercrime Protection Act should be imposed. This report incorporates the impacts of cybercrime in Bangladesh especially focuses on the area of Personal life, Workplace as well as Policy making Bodies or thinkers. We believe the report would help all relevant concerns and especially policy makers. iii Abbreviation and Acronyms Read MoreHuman Rights And The United Nations2206 Words   |  9 Pagesof October 1945 after World War II in order to prevent another such conflict. At its founding, the UN had 51 member states; there are now 193. The headquarters of the United Nations is in Manhattan, New York City, and experiences extraterritoriality. Further main offices are situated in Geneva, Nairobi and Vienna. The organization is financed by assessed and voluntary contributions from its member states. Its objectives include maintaining international peace and security, promoting human rights, fosteringRead MoreInternet Security Overview9605 Words   |  39 PagesOverview of Internet Security As of 1996, the Internet connected an estimated 13 million computers in 195 countries on every continent, even Antarctica (1). The Internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts in a variety of ways, including gateways, routers, dial-up connections, and Internet service providers. The Internet is easily accessible to anyone with a computer and a network connection. IndividualsRead MoreCissp Dictionary8729 Words   |  35 Pagescontrol list): Lists the specific rights and permissions assigned to a subject for a given object. Address space: Specifies where memory is located in a computer system. Administrative controls: The policies and procedures that an organization implements as part of its overall information security strategy. Administrative (or regulatory) laws: Define standards of performance and conduct for major industries (such as banking, energy, and healthcare), organizations, and officials. Adware: LegitimateRead MoreCyber Espionage3573 Words   |  15 Pagesindividuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of  cracking  techniques and  malicious software  including  Trojan horses  and  spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional  spies  and  moles  or in other cases may be the  criminal  handiwork