Saturday, November 30, 2019

Muslim Empires free essay sample

The Ottoman Turks consisted of Turkic-speaking nomadic people who had spread westward from Central Asia in the ninth, tenth, and eleventh centuries. They were located in the northwestern corner of the peninsula, which allowed them to expand westward and eventually take over empires between the Mediterranean and the Black Seas. The sultan was the supreme authority in both a political and a military sense. Administrative and military power were centralized under the bey, who was only a tribal leader, tribal law was before Muslim law. The Ottoman authorities were Sunni Muslims. The sultan assigned duties to a supreme religious authority, who then maintained a system of schools to educate Muslims. There were some who believed in Sufism or other doctrines, but the government allowed it as long as they were still loyal to the empire. Non-Muslims had to pay a head tax since they were exempt from military service. The Ottoman Empire was divided into four main occupational groups: peasants, artisans, merchants, and pastoral people. We will write a custom essay sample on Muslim Empires or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Shah Ismail founded the Safavid Dynasty. The Safavids was a mixed society like the Ottoman Empire; majority of the population were Iranian. They used the Shi’ite faith, and Shi’ism was declared the state religion. Like the Ottoman’s sultan, the Safavids had their shahs who would check up on their people. This empire was not as wealthy as the Ottomans and the Mughals. Their greatest area of productivity was in textiles. The founder of the Mughal Dynasty is known as Babur. Ruling of the dynasty was passed down from Babur to his son, Humayun, and then to his grandson, Akbar. As emperor, Akbar didn’t just focus on the views of Muslim but also gave Christian views a chance. He later formed a new type of worship called the Divine Faith, which combined characteristics of different religions. He believed in having a harmonious society, which meant each individual and group would play their assigned role and contribute their part to society. This dynasty was the last of the great traditional Indian dynasties. All three of the empires were Muslim, and they all displayed an impressive capacity to create and run a large empire. The Muslim World was protected by the military and political abilities of these empires. Unlike their European counterparts, these empires continued to thrive.

Tuesday, November 26, 2019

Free Essays on Dates Are Awkward

Most dates are awkward at best, so try to imagine a date ten times more uncomfortable than those. If you can’t I suggest trying a blind date! They all come in different shapes, sizes, and circumstances, none of which are predictable. Blind dates can be either a night mare or a daydream depending on how you go about them and how you get them. The oldest and most revered â€Å"blind date† is an arranged marriage. As modern as romance is today, it is hard to fathom someone giving their parents the decision of whom they will spend their life and mate with. Silly you may say, but arranged marriages are still held to this day and statistically last longer than marriages made by free will. Some even marry sight unseen. Can you imagine spending a life with someone you have never laid eyes upon? I won’t give my father a chance to set up a meeting much less a life partner! The â€Å"set up† is a little more western than an arranged marriage. Friends team with other friends or partners in an attempt to conjure up a more perfect union between people they know. For some reason or the other, I usually fall for the â€Å"favor†that ends up in an uncomfortable double date. I have , at times, questioned my friends’ opinions of me due to the wide array of men they have set me up with. These types of blind dates are typically accompanied by the matchmakers. Every move or sound made is then studied by your friends to ensure that this brainchild will blossom into a fabulous relationship, upon which they will receive high praises for their insight. I personally advise anyone accepting one of these dates to remain neutral in the event of a disagreement between any party members. Your opinion may lead to the disastrous break up of a friendship, relationship, or even both. Newspapers have carried classified ads for as long as I can remember. In my experience, â€Å"blind† isn’t even the word for this type of blind date. In this f... Free Essays on Dates Are Awkward Free Essays on Dates Are Awkward Most dates are awkward at best, so try to imagine a date ten times more uncomfortable than those. If you can’t I suggest trying a blind date! They all come in different shapes, sizes, and circumstances, none of which are predictable. Blind dates can be either a night mare or a daydream depending on how you go about them and how you get them. The oldest and most revered â€Å"blind date† is an arranged marriage. As modern as romance is today, it is hard to fathom someone giving their parents the decision of whom they will spend their life and mate with. Silly you may say, but arranged marriages are still held to this day and statistically last longer than marriages made by free will. Some even marry sight unseen. Can you imagine spending a life with someone you have never laid eyes upon? I won’t give my father a chance to set up a meeting much less a life partner! The â€Å"set up† is a little more western than an arranged marriage. Friends team with other friends or partners in an attempt to conjure up a more perfect union between people they know. For some reason or the other, I usually fall for the â€Å"favor†that ends up in an uncomfortable double date. I have , at times, questioned my friends’ opinions of me due to the wide array of men they have set me up with. These types of blind dates are typically accompanied by the matchmakers. Every move or sound made is then studied by your friends to ensure that this brainchild will blossom into a fabulous relationship, upon which they will receive high praises for their insight. I personally advise anyone accepting one of these dates to remain neutral in the event of a disagreement between any party members. Your opinion may lead to the disastrous break up of a friendship, relationship, or even both. Newspapers have carried classified ads for as long as I can remember. In my experience, â€Å"blind† isn’t even the word for this type of blind date. In this f...

Friday, November 22, 2019

Meaning and Uses of Decompilation

Meaning and Uses of Decompilation Simply speaking, decompilation is the inverse of compilation: translating an executable file into a higher level language. Suppose you lose your Delphi projects source and you only have the executable file: reverse engineering (decompilation) is useful if the original sources are not available. Hm, sources not available, does this mean that we can decompile other peoples Delphi projects? Well, yes and no... Is True Decompilation Possible? No, of course not. Fully automated decompilation is not possible - no decompiler could exactly reproduce the original source code. When a Delphi project is compiled and linked to produce a standalone executable file, most of the names used in the program are converted to addresses. This loss of names means that a decompiler would have to create unique names for all the constants, variables, functions, and procedures. Even if a certain degree of success is achieved, the generated source code lacks meaningful variable and function names.Obviously, source language syntax no longer exists in the executable. It would be very difficult for a decompiler to interpret the series of machine language instructions (ASM) that exist in an executable file and decide what the original source instruction was. Why and When to Use Decompilation Reverse engineering can be used for a several reasons, some of which are: Recovery of lost source codeMigration of applications to a new hardware platformDetermination of the existence of viruses or malicious code in the programError correction when the owner of the application is not available to make the correction.Recovery of someone elses source code (to determine an algorithm for example). Is This Legal? Reverse engineering is NOT cracking, although it is sometimes difficult to draw the fine line between those two. Computer programs are protected by copyright and trademark laws. Different countries have different exceptions to the copyright owners rights. The most common ones state that it is ok to decompile: for the purposes of interpretability where the interface specification has not been made available, for the purposes of error correction where the owner of the copyright is not available to make the correction, to determine parts of the program that are not protected by copyright. Of course you should be very careful / contact your lawyer if you are in doubt whether you are permitted to disassemble some programs exe file. Note: if you are looking for Delphi cracks, key generators or just serial numbers: you are on the wrong site. Please bear in mind that everything you find here is written/presented for exploration / educational purposes only. For the moment, Borland does not offer any product capable of decompiling an executable (.exe) file or the Delphi compiled unit (.dcu) back to the original source code (.pas). Delphi Compiled Unit (DCU) When a Delphi project is compiled or run a compiled unit (.pas) file is created. By default the compiled version of each unit is stored in a separate binary-format file with the same name as the unit file, but with the extension .DCU. For example unit1.dcu contains the code and data declared in the unit1.pas file. This means that if you have someones, for example, component compiled source all you have to do is to reverse it and get the code. Wrong. The DCU file format is undocumented (proprietary format) and may change from version to version. After the Compiler: Delphi Reverse Engineering If you would like to try to decompile a Delphi executable file, these are some of the things you should know: Delphi programs source files are usually stored in two file types: ASCII code files (.pas, .dpr), and resource files (.res, .rc, .dfm, .dcr). Dfm files contain the details (properties) of the objects contained in a form. When creating an exe, Delphi copies information in .dfm files into the finished .exe code file. Form files describe each component in your form, including the values of all persistent properties. Every time we change a forms position, a buttons caption or assign an event procedure to a component, Delphi writes those modifications in a DFM file (not the code of the event procedure - this is stored in the pas/dcu file). In order to get the dfm from the executable file we need to understand what type of resources are stored inside a Win32 executable. All programs compiled by Delphi have the following sections : CODE, DATA, BSS, .idata, tls, .rdata, .rsrc. The most important from decompiling point of view are the CODE and .rsrc sections. In the Adding functionality to a Delphi program article some interesting facts about Delphi executables format, class info and DFM resources are shown: how to reassign events to be handled by other event handlers defined in the same form. Even more: how to add your own event handler, adding the code to the executable, that will change the caption of a button. Among many types of resources that are stored in an exe file, the RT_RCDATA or the Application-defined resource (raw data) holds the information that were in the DFM file before the compilation. In order to extract the DFM data from an exe file we can call the EnumResourceNames API function... For more information on extracting DFM from an executable go see: Coding a Delphi DFM explorer article. The art of reverse engineering has traditionally been the land of technical wizards, familiar with assembly language and debuggers. Several Delphi decompilers have appeared that allow anybody, even with limited technical knowledge, to reverse engineer most Delphi executable files. If you are interested in reverse engineering Delphi programs I suggest you to take a look at the following few decompilers: IDR (Interactive Delphi Reconstructor) A decompiler of executable files (EXE) and dynamic libraries (DLL), written in Delphi and executed in Windows32 environment. Final project goal is development of the program capable to restore the most part of initial Delphi source codes from the compiled file but IDR, as well as others Delphi decompilers, cannot do it yet. Nevertheless, IDR is in a status considerably to facilitate such process. In comparison with other well known Delphi decompilers the result of IDR analysis has the greatest completeness and reliability. Revendepro Revendepro finds almost all structures (classes, types, procedures, etc) in the program, and generates the pascal representation, procedures will be written in assembler. Due to some limitation in assembler the generated output can not be recompiled. The source to this decompiler is freely available. Unfortunately this is the only one decompiler I was not able to use - it prompts with an exception when you try to decompile some Delphi executable file. EMS Source Rescuer EMS Source Rescuer is an easy-to-use wizard application which can help you to restore your lost source code. If you lose your Delphi or CBuilder project sources, but have an executable file, then this tool can rescue part of lost sources. Rescuer produces all project forms and data modules with all assigned properties and events. Produced event procedures dont have a body (it is not a decompiler), but have an address of code in executable file. In most cases Rescuer saves 50-90% of your time to project restoration. DeDe DeDe is a very fast program that can analyze executables compiled with Delphi. After decompilation DeDe gives you the following: All dfm files of the target. You will be able to open and edit them with Delphi.All published methods in well commented ASM code with references to strings, imported function calls, classes methods calls, components in the unit, Try-Except and Try-Finally blocks. By default DeDe retrieves only the published methods sources, but you may also process another procedure in a executable if you know the RVA offset using the Tools|Disassemble Proc menu.A lot of additional information.You can create a Delphi project folder with all dfm, pas, dpr files. Note: pas files contains the mentioned above well commented ASM code. They can not be recompiled!

Thursday, November 21, 2019

Was Hitler's rise to power due to his own strengths or to the Essay

Was Hitler's rise to power due to his own strengths or to the situation in Germany - Essay Example Political power sometimes is achieved out of situational advantage.The greatest racist in history Adolph Hitler did exactly that His views as a racist seeped into the general German mass that ultimately helped him to perform the notorious genocide killing 5 million Jews.The greatest racist in history Adolph Hitler did exactly thatHe incorporated racism within the cross section of the German mass against the Jews though various methods like using media to his benefit and through overwhelming oratory. The idea of racial discrimination through methodical racial institutionalization of education, employment and health was put into the ultimate practice with fearful results. For example the speech presented at Munich on the date April 12, 1922 presents the insight of the conceptualization and formulation of raciest ideas and making it the instrument of gaining power at the Reichstag. The situation and the groundwork were favorable for Hitler. Germany was passing through a phase of humilia tion and unemployment with economic downfall after the defeat of First World War.The Weimar republic was in power during the post First World War period starting from 1919. The Weimer government was completely unsuccessful with their political and financial policies and unemployment was on a high. As it is the country's defeat in the First World War resulted in economic instability that further incorporated fascist and Spartacist coups, like that of Hermann Ehrhardt's Freikorps, with wide spread political extremism and overall lawlessness. Constitution formed after abdication of Kaiser Wilhelm II was inappropriate and weak and soon it lost popularity. The economy was badly hurt as a result of WWI defeat and treaty of Versailles claiming 20,000 billion gold marks as war reparations. This result in the currency to be unstable with 469,000 million marks national debt. Furthermore the economic coal fields of Rurh were occupied by the French government. To add more problem the 1929 stock market crisis made matter more severe. All these conditions ultimately led into hyperinflation that summed up to 663 billion marks. There are also enough evidences that Hitler political power was based upon brute force with his incorporation of brutal political murders with included murder of communist leaders. Additionally, he blamed the Jews for all economic and political crisis of Germany and motivated the population to become anti-Semitic. Once the population became Anti-Semitic it was helpful to gain popularity and thus gain political power as the Germans regarded Hitler to be their savior. However, election results show that there is a gradual rise of popularity of the Nazi party from 1928-1932 but the main problem remained that there was no specific party individually strong enough to rule. This was a situation of an example of political instability in Germany that Hitler took complete advantage. (Rise of Nazism, 14-15) An evaluation of the sources Hitler, Adolph; Hitler Speaks in Munich; SPEECH OF April 12, 1922; NBT; 1999 The Rise of Nazism; pp-14-15 This book published in 1999 was recovered from Russian Achieves and presents a wide range of speeches by Hitler. These speeches show the methods by which Hitler uses to motivate the audience with fact at the beginning and fallacy to back his intentions. In his speech Hitler started off with the right note by pointing towards the defeat of the First World War as this would be the best possible mode of attracting the audiences' attention as logically enough that would be the most concerned element of the mass during the 1922 Germany. He promptly indicates that there was a "debt of some 7 or 8 millions of marks and beyond that was faced with the debts of the rest of the world" (Hitler, 1, 1). This the best possible manner by which he could effectively guide his intentions towards a well formulated methodical approach that would enable him to take the audience by his side

Tuesday, November 19, 2019

Attachments theory as it affects adolescants Essay

Attachments theory as it affects adolescants - Essay Example According to attachment theory, primary caregivers become increasingly differentiated from other people in the minds of infants during their first year of life. During childhood, adolescence, and adulthood, many individuals encounter difficulties in their relationships with parents and spouses that shake their confidence in the availability of these attachment figures. Such difficulties may fundamentally disrupt attachment bonds and dramatically reduce an individual's capacity to adapt to challenges outside the family. In the second volume of Attachment and Loss, Bowlby (1973) refined his definition of the set goal of the attachment system. In considering the effects of separations on children, he moved toward the notion that security derives from a child's appraisal of an attachment figure's availability (Bowlby, 1973). The child needs to experience a parent who is not only accessible but also responsive. This aspect of security incorporated Ainsworth's findings that it is the quality of day-to-day interactions, not just major separations, that influences infants' attachment expectations. In contrast, various nonresponsive or insensitive f orms of care can undermine the infant's confidence or even lead to expectations for rejection or inconsistent response. Separation distress results from the appraisal that a parent is inaccessible (Ainsworth et al., 1978). This perceived threat to a parent's accessibility activates the attachment system and motivates a child to reestablish contact. Emotional reactions accompanying the appraisal of threat include fear and anger. Fear activates the attachment system and signals the child's distress. Anger results from frustrations that the child encounters in trying to regain access, and it mobilizes efforts to reestablish contact. Adolescents The adolescent, by contrast, may act out her conflict about separating through fights with her mother and open defiance. Her upheaval may be more visibly apparent in her relationship with her mother, more provocative and dramatic. Girls may direct their acting out toward their bodies and engage in behaviors that are outside of the domain of parental control. They are at increased risk for eating disorders, reckless or promiscuous sexual activity, and self-cutting or other forms of mutilation. Adolescents may also use drugs and alcohol to rebel, explore, and escape painful feelings. Self-defeating or destructive behavior may provide an illusion of independence while also serving to defend against regressive longings. The thrill and power of reckless acting out can reduce their sense of vulnerability and distract from feelings of loss associated with the transition from childhood dependence. The attachment to a therapist can take pressure off the mother-daughter dyad, as some dependenc e needs are being met in a relationship outside the family. However, the stage is then set for the adolescent to recreate with the therapist elements of her struggle with her mother. Her dependence on the therapist can trigger resistance to treatment. Like the defiance at home, acting out within therapy may serve both to rebel against therapeutic influence and to pull for protective intervention (Cassidy et al., 2003). Similar patterns of maladaptation have been identified in adolescents and adults who are classified as

Saturday, November 16, 2019

All Souls Essay Essay Example for Free

All Souls Essay Essay All Souls Essay In the memoir All Souls, by Michael Patrick MacDonald, one significant event that takes place were the busing movements, along with the riots that followed. During the 70s, when Michael was very young and in grade school, the Boston busing crisis began. The Boston government began busing kids to schools in different neighborhoods, in an attempt to desegregate schools. This caused mass outrage in many areas, especially Southie. Outside of Southie and the projects, society expected people accept these changes and to accept the desegregation. But in Michael’s community, everybody was against this, and took violent actions against it. By both his family and his community, Michael was expected to be against the busing movements. As it would turn out, Michael was also against it. He went as far as to throw rocks at the buses coming into his town. He described it as shameful if you did not partake at least a little bit in the violent acts. This example of the busing is a great example of how one’s mind is influenced by others. Here, Michael can be influenced by one of two sides; larger â€Å"outside† society telling him to accept the busing, or his family and small community telling him to deny it. I feel as if no matter who or what, one is much more influenced by the ones closest to them, whether it be a close family or a close community. Michael describes in the book that at many points, it feels like it’s Southie vs. the World. And no matter what, as another member of the Southie community, Michael will side with his home.

Thursday, November 14, 2019

Personal Narrative On Being Teased and Accepting Yourself :: essays research papers

I had always been comfortable in myself, it never really bothered me how I looked, nor did it seem to bother others, the people who I called friends. As I walked through the door somehow it was as if, overnight I was expected to wear clothes that I felt awkward in (but still looked cute), shoes that hurt my feet, and makeup that clogged my already full pores. I was met with grins and giggles from others. I caught tidbits of what they were saying. ?Look at her shoes! Why is she wearing those? They have holes and don?t even match what she has on.? said anonymous person number 1. I looked down, sure my Chucks were a little faded (okay a lot faded), but they were comfortable and isn?t that what mattered I thought. ?God does she even wash her face anymore, its like erupted, I can?t even see a smooth patch of skin? chimed in anonymous person number two. Its genetic, who are these people, and why are they making me feel bad about myself, I thought. Okay, now as I think back, I will admit that it being the first day of middle school I should have put a little effort in my appearance but, who did I have to impress? Weren?t we coming here to learn? If I was going to sit in a classroom for 8 hours a day I needed to be comfortable. By now I?m sure you have already gathered I was a tomboy. The kind of girl who would rather play with the boys than sit on the sidelines and talk about how ?oh so cute they looked when they caught the football?. Now I think my mother is to blame for this, she never really did give into that girly stereotype that most mothers did. Where I was only going to do cheerleading ?because I?m a delicate flower and all that yadda yadda yadda ya?. She always let me make my own choices and never forced things upon me. Boy did she really mess me up, I mean being so understanding and all. And so my morning went, being verbally assaulted by people who I didn?t even know, scrutinizing every aspect of my wardrobe, being so blunt and uncaring to the fact that I could hear them, I was on the verge of tears. Somewhere in between hearing them trying to figure out why ?

Monday, November 11, 2019

Scarlet Letter Pearl

Scarlet Letter- pearl Through out the story Pearl was said to be a curse of Hester's adultery but personally I believe she was somewhat of a blessing and a curse. For a child Pearl had amazing intelligence and was able to imagine a multitude of different personas but being as intelligent as she is, is not always a good thing for she knew that she was an outcast and even the imaginary personas she created were not her friends but enemies.The ways in which Pearl was a blessing were for fact that other than Mr. Dimmesdale she was her mother's only companion throughout all the years and the other than Mr. Dimmesdale she could be there all the time not just when they can meet in the forest. Pearl was thought by Hester to be her redemption even if it was too late for herself she wanted the best life for pearl so she would try to do everything for her to Hester, Pearl was the greatest blessing she could have asked for and maybe even more so. he was also a blessing because when Hester and Di mmesdale meet up in the woods she would not acknowledge Hester without the letter on her chest and would not accept a kiss from Dimmesdale because she did not want them hiding in secret any longer and wanted them to come fourth and for them to be a family by asking if they were all going to walk back into town together holding hands. Although Pearl was a blessing she was sort of a curse in more ways than one. She was always hard for Hester to manage throughout the years because she was a very difficult child to manage being her mother's daughter she was strong willed and very hard headed.Also she was look upon as a curse for even after the letter is removed Pearl will be looked upon as the one remaining emblem to remind every one of the sin of how she was created. she is also looked as a curse for her outbreaks of anger when children would lash out with their tongues she would burst into an outrage scaring off her cruel taunters then she would return to normal and be just as happy a s can be. Pearl was believed to be a curse by most because she was the product of sin and often showed signs of which she was of evil origin.Pearl was not purely evil or a curse because what she wanted was pure even if sometimes she went about it wrong, all she really wanted was for Dimmesdale to admit that he is her father and for them to be a happy family. Pearl is drawn to the scarlet letter on Hester's chest because she believes it is not a sign of sin or crime but one to show that it was her love and not to be ashamed of it that Pearl was not a product of sin but a product of love and affection and wear it proudly till she can show all of them that she and Dimmesdale love each other.Pearl was a blessed curse one in which was made on a sin of act but turned to help both Dimmesdale and Hester realize what it was that they wanted. if you look at one of my favorite quotes â€Å"I see now that the circumstances of one's birth are irrelevant; it is what you do   with the gift of l ife that determines who you are. â€Å"-Mew-two from Pokemon: the first movie it relates highly to Pearl because does it really matter how she came in to this world she did something no other could do by bringing out both the truth of who the father was and helped them realize they all wanted to be together as a family, that is why Pearl was a blessed curse.

Saturday, November 9, 2019

Computer architecture Essay

Describe how analogue data can be converted and stored in computer systems Analogue data needs to be sampled in order to be processed by a computer. As computers deal in One’s and Zero’s it can only record specific intervals. For example, when recording a sound that gradually gets louder over a minute, a digital recording could record the level of sound every second, but would lose the information between seconds. If the sound was sampled every half second, there would be half as much information lost from the original source, but file size would be doubled. This is the trade off that has to be made between file size and quality. Bit depth is the number of bits of information recorded per second . The higher the bit depth means, the higher the sample rate and this results in higher quality sound file. A good example of bit depth is in CD quality audio which has a bit depth of 16 bits and a sample rate of 44. 1 kHz. Task 3 (P5) Describe the key components of a computer architecture and how they interact 1. Data Buffer – this is a region of memory used to temporarily hold data while it is being moved from one place to another. 2. Accumulator A – An 8 bit CPU has 1 register called the accumulator, this holds temporary data e. g. the carry-out when you do addition. 3. Arithmetic Logic Unit (ALU) – this is the workhorse of the CPU because it carries out all the calculations. 4. Data Buses – the mechanism that moves information around a computer. 5. Address Buffer – this holds the address part of the instruction register, 6. Program Counter – this contains the location of the next instruction to be executed and, therefore, keeps track of where the computer is up to in a program. 7. Instruction Register (IR) – this divides the information it receives into two fields. One field in the IR contains the operation code that tells the CPU what operation is to be carried out. The other field, called the operand field, contains the address of the data to be used by the instruction. 8. Condition Code Register (CCR) – this takes a snapshot of the state of the ALU after each instruction has been executed and records the state of the carry, negative, zero, and overflow flag-bits. In the above diagram the flag-bits are H, I, N, Z, V & C. Task 4 (P6) Describe the features of a processor Multi-tasking. Multi-tasking is a method where multiple processes are dealt with at once sharing common processing recourses such as a CPU. It involves the CPU assigning which instructions to be carried out first but it only focuses on one instruction at a time. Pipelining Pipelining is a method in which the Processor begins to execute a second instruction before the first has finished. Every pipeline is divided into segments and each segment can be ran along side each other. When each segment completes its task it moves on to the next. Cache (Level 1 and Level 2) Cache is a portion of memory made of high-speed static RAM (SRAM). As a result Cache memory is much more efficient than the main memory (RAM) which is dynamic RAM (DRAM) that runs slower but also cheaper. The cache is a smaller, faster memory which stores copies of the data from the most frequently used main memory locations. DRAM is dynamic in that, unlike SRAM, it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds. SRAM does not need refreshing because it operates on the principle of moving current that is switched in one of two directions rather than a storage cell that holds a charge in place. If the computer processor can find the data it needs for its next operation in cache memory, it will save time compared to having to get it from random access memory. Level 1 cache is normally built on to the processor chip. It is extensively used for all sorts of purposes such as data fetching, data shifting and data loops, storing only small amounts of data. Level 2 cache is normally located on the motherboard. L2 cache stores much more data, coming usually from the L1 cache. L2 cache can be up to sixteen times the size of L1 cache; this also means that it takes up much more room so it has to be located on the motherboard. Clock Rate The clock rate is the speed at which a processor clock oscillates constantly from a one to a zero, this is measured in hertz. The clock rates speed is determined by an oscillator crystal and amplifier circuit inside a clock generator circuit. The limiting factor of the clock rate is the time it takes for the signal line to settle down from its on state to off state. The Clock rate is also as fast as L2 cache. Task 5 (P7) Describe the operation of logic gates using truth tables NOT   AND (2 inputs) OR (2 inputs) Consider how these three main gates can be combined. NOR (2 inputs) NOT Logic Gate also known as (Inverter) The output is â€Å"true† when only one input is â€Å"false. † Otherwise, the output is â€Å"false†. A Not gate is a logic gate which reverses the state of the input. AND Logic Gate The output is â€Å"true† when both inputs are â€Å"true. † Otherwise, the output is â€Å"false. † OR Logic Gate The output is â€Å"true† if either one or both of the inputs are â€Å"true. † If both inputs are â€Å"false,† then the output is â€Å"false. † These three main logic gates can be used to make other possible combinations of logic gates such as a NOR gate. NOR Logic Gate. The NOR gate is a combination of an OR gate followed by an inverter. The output is â€Å"true† if both inputs are â€Å"false. † Otherwise, the output is â€Å"false. † Task 6 (M1) Explain using examples how data travels around the processor Task 7 (M2) Create logic circuits using simple logic gates and provide truth tables This is a circuit that shows binary addition. Here are a few examples of the circuit being carried out. The Red circle/circles show input and Green circle/circles show output data This can be shown in the truth tables below. Task 8 (M4) Provide a description of both astable and bistable flip- flops. A flip-flop is an electrical circuit that can be in one of two states. Astable flip flop Astable flip flop is an oscillator which regularly switches states all the time. It has one 1 input and 1 Output. It can be used as a clock. Bistable flip flop Bistable flip flop is a memory device/gate which keeps one state indefinitely while it has power it also has 2 inputs and 2 outputs. The difference between An Astable and Bistable flip flops. A bistable flip-flop is a multivibrator with two stable states and can be put into either of its two states and it will stay like that. An example of this could be: A simple light switch; turn it on, it stays on, turn it off, it stays off. Task 9 (D1) Create complex logic circuits made up of arrays of simple logic circuits. To produce an addition of two numbers each of four bit’s in length we must first. You can add two numbers together each four bit in length by extending the first full adder’s carry out to another full adder and so on. Until you get 4 full adder’s each following on from the last carry out. The way a full adder works: The circuit adds two bits Input A and Input B, taking into account the previous carry in, to give the Sum, and the carry out. Now we know how a full adder works we can now relate this to the idea of 4 full adders joined together by the last carry out and the diagram below illustrates this. Diagram 1 These diagrams (below) will show you how you can add two four bit binary numbers together using a logic circuit. Example 1 Binary 1111+ 1111 ______ 11110 These binary numbers with value of 1 stand for both switches (The inputs i. e. the two four bit numbers added together) and the sum which in this case are shown by the flashing of LED lights (The sum is the output). 0 means no switch or light is active. The first line of inputs for this study will always be A4,A3,A2,A1 The second line of inputs for this study will always be B4,B3,B2,B1 these two numbers will be added together Then it is a long underscore followed by Carrys C3,C2,C1 directly underneath And then finally the output sum shown as O Task 10 (D2) Compare and contrast two different processors I will compare the AMD Opteron quad core and the Intel core 2 quad processor q9650. AMD Opteron quad core 64-bit Computing Yes L2 cache 512kb x4 L3 cache 2mb Clock Speed 2. 1Ghz Special Features Rapid Virtualization Indexing AMD Smart Fetch Technology Front Side Bus (FSB) Speed 2000Mhz Watts 45 Price i 165 new Intel core 2 quad processor q9650 64-bit Computing Yes L2 cache 12mb Clock Speed 3Ghz Special Features Intel Virtualization Technology Enhanced Intel SpeedStep Technology Front Side Bus (FSB) Speed 1533Mhz. Watts 65 Price i 223 new Key components: Front Side Bus – The Front Side Bus allows the components to send and receive data from the CPU to the North Bridge and vise versa. The faster a computer’s bus speed, the faster it will operate, but a fast bus speed can’t make up for a slow Clock Speed. Clock Speed – The Clock Speed is the speed at which a microprocessor executes instructions these clock cycles per second are measured in hertz. Special Features: Virtualization -Virtualization also known as a virtual machine makes it possible to run multiple operating systems on one computer. SpeedStep Technology – SpeedStep Technology is built into some new Intel processors this can be used to change the clock speed by using a piece of software. Speed Step Technology allows the processor to keep up with performed operations. It greatly reduces power consumption and heat loss. Smart Fetch Technology – Smart Fetch Technology allows the processor core to enter a â€Å"halt† state and draw less power, which reduces CPU power consumption. Recommendation: Both processors have Quad-Core technology and 64 bit computing, however the difference is in the Clock speed, Cache memory and the extra features. Both processors have similar special features such as the AMD Rapid Virtualization Indexing and the Intel Virtualization Technology. Although the Intel core 2 quad processor q9650 has no L3 cache I think that the higher clock speed and L2 cache more than makes up for not having any L3 cache. Not to mention the Intel core 2 quad processor q9650 has Speed Step Technology which makes for a much greater performance. The Intel core 2 quad processor q9650 is more expensive but it is a price worth paying for such a greater performance.

Thursday, November 7, 2019

Bullying My Proposed Solution Essays

Bullying My Proposed Solution Essays Bullying My Proposed Solution Essay Bullying My Proposed Solution Essay Of all the trials and tribulations of parenthood, possibly one of the hardest things to deal with is knowing that your child has become the victim of a bully and deciding how to deal with this. Bullying in schools can be very hard to spot and put an end to it. Recent evidence suggests that bullying is very common in British schools. A survey by the childrens charity Kidscape found 69 percent of children aged 5 to 16 had been bullied at sometime, more than half of them repeatedly or seriously. When occasional teasing turns into serious physical or verbal harassment, the parents often think it is their time to step in. But there is usually little they can do. Any direct involvement by parents or teachers may backfire. Bullies can become infuriated when other people get involved and try to intervene. When the victims go to a teacher or adult it usually results in the bullies treating them worse for getting them into trouble. This can put children off getting any sort of help about any problems they are having because it would make them even more scared and insecure. When a victim of bullying has been harassed for a long period of time it can leave them feeling self-doubting, timid, depressed and possibly emotionally scarred. Continual bullying can influence the victims to take their stress out on other things or people. The victims may eventually begin taking out their anger on younger and smaller children, or in other ways such as self-harm, stealing, anorexia or, in serious cases, suicide. A person who is being bullied will feel unable to stop it happening. It may be carried out by a group of people or simply by one person. This bullying could involve physical abuse, threats, name-calling, or in less obvious ways such as ignoring or excluding someone. Bullying is very similar to harassment and other forms of abuse such as racism. Contrary to some belief both sexes bully and are bullied. The reason for the bully taking their anger out on younger or more vulnerable children could be problems at home or school, or possibly as a result of being abused or bullied by other people. Bullies usually seek attention and affection and it can sometimes be very hard to reason with them, as they may be stubborn and unwilling to cooperate.  The bullying should be stopped as quickly as possible as it may be harder to control if it goes further and gets more serious. Victims of bullying are usually small for their age, quiet and sensitive, the type of child who wouldnt fight back. The victim is seldom very popular or loud. As a result of this, other children are less likely to help them or come to their defence. School classes can be very large and it is not uncommon for bullying to occur in the classroom when teachers are present. This classroom bullying can surprisingly be very difficult to spot, whether it is verbal or physical. Teachers can be put in an awkward position when having to make a quick decision on how to confront the bully and this is the problem that is facing them at present.  In different schools across the country there are various methods in which bullying is dealt with, some more successful than others. Some of which include encouraging victims to tell a teacher or parent, punishing the bully, telling the victim to fight back or even holding a bully court run by fellow pupils. In my opinion bullying in schools should be tackled in the following way. One or more older, sensible members of the school should be elected as counsellors, which children can visit, in their spare time, to share any troubles and problems they are having with bullies. This confidential system enables the children to speak privately to an older and wiser member of the school and then get advice on what to do without going to a higher authority such as a teacher. The counsellors should be advised on how to recommend what to do in the victims situation. This method of confronting bullying has already been put to use in a minority of schools around England. I feel that this process would be very successful and help many victims of bullying out in dealing with their problem. How the counsellors deal with the cases that come up is either up to them or could be discussed in a large group of other counsellors or even teachers and, in serious cases, victims should perhaps be recommended to go to a higher authority if unquestionably necessary. Bibliography When the Bullies are in your court, www.antibullying.net.

Tuesday, November 5, 2019

English Role Play Practice - A Business Presentation

English Role Play Practice - A Business Presentation This dialogue focuses on asking questions about a business presentation with the present perfect and past simple tenses. Make sure you understand  the differences between these two tenses, practice the dialogue and then have your own conversations about work. Ask questions about what he or she has done, and use the past simple to ask specific questions on details. Teachers can use this guide to teaching the present perfect to further practice this form. On a Business Trip: A Presentation Betsy: Hi Brian, this is Betsy. How are you doing?Brian: Ive just returned from the Head Office. The weather is great! Boston is a great city!Betsy: Have you met Frank yet?Brian: No, I havent seen him yet. We have a meeting at 10 oclock tomorrow morning. We are going to meet then.Betsy: Have you made your presentation yet?​Brian:  Yes, I made the presentation yesterday afternoon. I was very nervous, but everything went well.​​Betsy: Has management given you any feedback yet?Brian: Yes, Ive already met with the sales director. We met immediately after the meeting and he was impressed with our work.Betsy: Thats great Brian. Congratulations! Have you visited any museums yet?Brian: No, Im afraid I havent had any time yet. I hope to take a tour around town tomorrow.Betsy: Well, Im happy to hear that everything is going well. Ill talk to you soon.Brian: Thanks for calling Betsy. Bye.Betsy: Bye.

Saturday, November 2, 2019

Q. Explain how high risk investments can end up contaminating fixed Essay

Q. Explain how high risk investments can end up contaminating fixed income securities - Essay Example This essay tries to answer how the high-risk investments contaminate fixed income securities. Although fixed income securities are safe to invest in, their earnings are relatively low thus it is wiser for an investor to invest in high-risk investments in the short run since the chances of earning more are high. The anticipated higher returns as stated above have led to the contamination of fixed income securities since an investor who aims to generate more income tends to invest in high-risk investments (International Monetary Fund, 2004). Liquidity is another factor of contaminating fixed income securities since the high-risk investments are easily convertible to cash in comparison to the fixed income securities (The Wall Street journal, 2010). This means that fixed income securities demand is low in the open market thus in case of inflation; an investor will lose more due to the depreciation of his principle amount. In high-risk investment, the market is always open thus one can sell his stock when he anticipates that its value will reduce incase of anticipated inflation. The risk of missing opportunity also contributes to high-risk investments contaminating fixed income securities (Moodys manual of investments, American and foreign, 1998). If the investor does not invest in a risky investment and the high returns are realized, he will curse why he did not take the risk. This makes it more possible for an investor to take the opportunity in high-risks investment more than in in the fixed income