Monday, September 30, 2019
Psychological Anaylsis of the Virgin Suicides
Novels have more to them than meet the eye. Past the cover and the first read, there is yet an extra element involved in superb books. Jeffery Eugenides clearly had an understanding of this. Written in 1991, The Virgin Suicides is not just a story. â⬠Bizarre, abnormal, and tragicâ⬠is how Jeruen Dery describes the book in his review of it. As more than pages in a cover, The Virgin Suicides has some magic to uncover. To fully understand a novel, one must recognize a precritical response to key element that amount to a written work of art. The setting of the novel is one that is familiar to many Americans.In essence, it is a modern suburbia, complete with youth, adults, and the elderly, along with the old, and the new. This directly contributes to the plot, which involves a man versus society struggle with more than one set of characters. Two main sets of characters are prevalent and neither group show purely protagonist or antagonist characteristics. Both the Lisbon girls a nd the neighborhood boys share the two roles throughout the duration of the novel. When reacting to the structure of the novel, one notices the straightforwardness of the piece.After a glance at the end events, the rest of the book goes through the progression of a year in chronological order while also following a typical rising action-climax-falling action format. The style of the book keeps a continuous flow throughout the piece. The words are sophisticated, as well as the general structure of the sentences and the way they flow together. The words and sentence structure contribute to the atmosphere of the work as a whole. In his review of the piece, Dery says, ââ¬Å"Every aspect of the novel is just dark, and contributes to the overall macabre mood of the piece. The general theme of the novel seems to be how suicide doesnââ¬â¢t only affect those who are directly involved, such as family, teachers, and close friends. It shows how suicide affects the entire community. While re ading the novel, a particular set of characters caught my eye. The narrators have what would be a textbook definition of obsession with the Lisbon girls. They are more than just teenage boys being obsessed with teenage girls. In their case, this is not just a normal obsession like society thinks of today, but something much more psychological than that. This obsession is more of a disorder.By the words of Alex Lickerman obsession is ââ¬Å"a giant tidal wave that crashes through our minds and washes away all other concerns. â⬠In an article from Psych Central symptoms of an obsession disorder include preoccupations with organization, lists, or rules, unable to discard old or worn out items, and has a consciousness of specific details. The neighborhood boys display all of these things. Their preoccupations with organization are clear throughout the novel when looking at how they kept track of the girlsââ¬â¢ things through a numbering system similar to that of police evidence. They are also seemingly unable to discard the things they collected from the girls. A third symptom appears through the entire work as a whole, because the boys are speaking as though all of these events took place many years ago, yet they seem to remember almost every detail of the year of the suicides. Just through these symptoms, it is clear that the boys have an obsession with the Lisbon girls, even into their adulthoods. The American Psychiatric Association characterizes obsessions as,â⬠irrational thoughts which keep reoccurring. In the conclusion of the book, the boys are going over a summary of the year and they admit to this kind of behavior. They even kind of blame the behavior on the girls by saying, ââ¬Å"They made us participate in their own madness, because we couldnââ¬â¢t help but retrace their steps, rethink their thoughts, and see that none of them lead to us,â⬠(Eugenides 248). This statement shows an obvious obsession with the Lisbon girls. Therefore, one can see that the neighbor hood boys have an obsession that goes further than just a stereotypical teenage obsession. The other set of characters also have a psychological disorder of sorts.With the exception of Cecilia, the other four Lisbon girls appear to have Post Traumatic Stress Disorder (PTSD). People acquire PTSD by living through a traumatic event in their life. In the case of Lux, Mary, Bonnie, and Therese, the event that sparked the disorder was not a single event, but two with one common source. The first being Ceciliaââ¬â¢s wrist cutting and hospital stay. The second is the actual event of her death. Characteristics of PTSD include staying away from places and things that remind one of what happened, feeling alone, and outbursts of acts which are normally out of character.The girls all displayed these in the time between Ceciliaââ¬â¢s death and theirs. The narrators have told us through a number of different ways that the girls felt alone as a group. They are pictured as being alone together, meaning that the four of them feel as though they are the only ones that understand themselves. The girls also engage in activities that seem out of character compared to who the rest of the community thought they were. In Luxââ¬â¢s case this is the high amount of sexual activity. For the group as a whole, it is clinging together, not having other friends, and staying in the house and complying with their parents.For the most part the girls seem so uninterested in the activities of their peers it seems as though they died with Cecilia. Another characteristic of PTSD is having suicidal tendencies according to the National Center for PTSD. In conclusion, one can see how the Lisbon girls developed Post Traumatic Stress Disorder after the death of Cecilia. When looking at the evidence presented, it is clear that the two main groups of characters have psychological disorders. In the case of the neighborhood boys, their obsession with the Lisbon girls goes further than just being interested.This becomes apparent when one compares the boys with textbook symptoms of obsession disorders. Lux, Mary, Bonnie, and Therese also have a psychological disorder. In their case it is PTSD. This can be proven when examining the year leading up to their death under a lens filtered with the characteristics of PTSD. Because of these facts we are able to see how The Virgin Suicides is more than just a story about five girlsââ¬â¢ deaths told by the boys they grew up with. As one can see, the novel is more than meets the eye. Works Cited American Psychiatric Association. ââ¬Å"Anxiety Disorders. â⬠à Www. Psychiatry. rg. American Psychiatric Association, 2012. Web. 30 Mar. 2013. Dery, Jeruen. ââ¬Å"Book Review: The Virgin Suicides by Jeffrey Eugenides. â⬠à ââ¬â Blogcritics Books. Technorati Inc. , 11 Oct. 2011. Web. 30 Mar. 2013. Eugenides, Jeffrey. The Virgin Suicides. New York: Farrar Straus Giroux, 1993. Print. Lickerman, Ale x, M. D. ââ¬Å"Obsession. â⬠à Www. psychologytoday. com. Sussex Publishers, LLC, 26 Apr. 2010. Web. 30 May 2013. PsychCentral Staff. ââ¬Å"Obsessive-Compulsive Personality Disorder ââ¬â PsychCentral. â⬠à Obsessive-Compulsive Personality Disorder ââ¬â PsychCentral. PyschCentral, 1 June 2010. Web. 30 Mar. 2013. Suicide and PTSD. â⬠à ââ¬â NATIONAL CENTER for PTSD. United States Department of Veteran Affairs, 1 Jan. 2007. Web. 30 Mar. 2013. The National Institute of Mental Health, and National Institutes of Health. ââ¬Å"Post-Traumatic Stress Disorder (Easy-to-Read). â⬠à NIMH RSS. National Institutes of Health, 15 June 2012. Web. 30 Mar. 2013. U. S. National Library of Medicine, U. S. Department of Health and Human Services, and National Institutes of Health. ââ¬Å"Post-Traumatic Stress Disorder: MedlinePlus. â⬠à U. S National Library of Medicine. U. S. National Library of Medicine, 28 Mar. 2013. Web. 30 Mar. 2013.
Sunday, September 29, 2019
Beyond the Black Board
ââ¬Å"Beyond the Blackboardâ⬠Context The part of the movie that struck me the most was when Stacy Bess break down moments. The moments when she cried because she felt quitting in teaching in the shelter and when she loosed her temper that made her raise her voice on Danny. Experience I can relate to this experience because in times of wrong things come in your way you get the idea of giving up.You become more fragile, confused and loses energy when the least things you expected hits you with the face of reality. When we donââ¬â¢t want to fail the people who believed in us and when we get our strength back we sometimes lose the reason for doing things. I failed my parents with giving them an F mark in my finals. They are my source of strength to do well in school because this is for them but I was a disappointment to them. I felt really down and lost.As I try to get back on track of my studies I told myself to deal with and learn from it. Reflection I could see is that Stacy was eager not to fail and quit on her students and the people around her. She made great efforts of changing those events with a wide range of great works and effort for her students to learn. Action If I will encounter this kind of situation, I would reflect well by going back to the reason Iââ¬â¢m doing this and that is because I want to teach.In Stacyââ¬â¢s case, she loves teaching. Be inspired all over again by doing more than you did before and change everything for the best and the benefit of the many. Evaluation I think my actions may lead me to be a more persistent and striving person. I will not easily give up nor break. And from those mistakes I made in the past, I should look up to them as teaching life has given to me to be a better individual and teacher.
Saturday, September 28, 2019
Zero Tolerance Policy
The zero tolerance policy strives to reduce violence in schools and make schools a safer place for students. Anne Atkinson, a member of the Virginia Board of Education defines zero tolerance as a ââ¬Å"policy that mandates predetermined consequences or punishments for specified offenses. â⬠The policy first became effective in 1989, but grew most rapidly in 1994 when the Gun- Free Schools Act was passed (1). There are many controversies about the zero tolerance policy including whether or not the policy is effective in reducing violence in schools, whether or not schools are trying to handle disciplinary actions in a fair manner, and whether or not all students are treated equally when punishments are determined. While many supporters, such as school administration, believe that the zero tolerance policy is necessary in schools, those who oppose the policy, such as parents, believe that the policy is unfair and ineffective in schools. Those who support the zero tolerance policy believe that the policy is effective in reducing violence in school. Atkinson argues that ââ¬Å"strict policies are needed to send a clear message and are designed to protect studentsâ⬠(2). Agreeing with Atkinson, Richard Curwin and Allen Mendler, scholars on the zero tolerance policy, believe that by using the zero tolerance policies, it is evident to students that aggressive behavior is unacceptable. By allowing the students to realize that misbehavior will not be tolerated, students become more likely to obey the rules and cooperate with schools (1). According to the National Center for Children Exposed to Violence (NCCEV), 17. 1% of students carried weapons at school and 71% of elementary and secondary schools have experienced at least one violent crime by a student. A nationwide survey suggested that 15% of students have been involved in a physical fight on school grounds. By using the zero tolerance policy, those students who are violent in school are expelled or suspended, resulting in schools becoming a safer environment for students and teachers (3). Although defenders of the zero tolerance policy agree that they policies are effective, those who oppose the policy do not believe that the policies are effective in reducing school violence. People who are against the zero tolerance policy agree that the policy is ineffective in reducing school violence. Members of the American Psychological Association (APA), the largest scientific and professional organization representing psychology in the United States, agree that schools are no safer and more effective in teaching discipline that before the zero tolerance policy in the 1980s. They also agree that school violence is not out of control, so zero tolerance policies are not necessary (1). Russell Skiba, chairman of the Indiana Education Policy Center and Reece Peterson, a scholar on the zero tolerance policy, conducted statistics that show ââ¬Å"violent crimes occurred at an annual rate of fifty-three per one hundred thousand students. Because evidence shows that violence rates are not out of control, critics argue that there are many other alternatives that can be used to promote a safer environment for students and teachers (2). According to the National Association of School Psychologists (NASP), some alternatives that reduce violence in schools include a prevention curriculum, help from school workers, counselors, and psychologists, and parental/family involvement (3). Whether the policy is effective or ineffective is only one aspect of the controversy; there are many other controversies that occur within the policy. Whether schools are handling disciplinary action in a fair manner is a main controversy when discussing the zero tolerance policy. Russell Skiba believes that the way in which schools punish students is fair. He thinks that rash punishments improve overall student behavior and discipline. Skiba acknowledges the fact that harsh disciplinary actions are determined by the degree of the studentââ¬â¢s violent actions (29). While some people agree that schools are just when using the zero tolerance policy, others disagree and believe that schools are extremely unfair. Those who oppose the zero tolerance policy believe that the way in which schools use the zero tolerance policy to punish students is very rash and unfair. Those against the zero tolerance policy, such as Skiba, believe that rash suspensions and expulsions, rather than improving student behavior, forces students to misbehave more frequently. He also believes that rash suspensions and expulsions lead to an increased number of school dropouts and failure to graduate on time (28). A personal example of zero tolerance proves schools to be rash and unfair when punishing students. My ten-year-old cousin went to a public school where he was a part of the minority group. He found a pocketknife at home and thought it was the coolest thing he had ever seen. Being an immature, unknowing child, my cousin brought the pocketknife to school to show his friends, not intending on using it in any dangerous way possible. As he took the knife out of his pocket to show is closest friends, a teacher spotted him and immediately jerked him away from his friends and into the principalââ¬â¢s office. The principal, being the one to decide punishment, automatically expelled my ten-year-old cousin for bringing a pocketknife to school, even though he did not harming anyone or anything with the knife. Because my cousin was expelled from school, he is no longer in school this year and now has to repeat the grade. This is a perfect example of how the zero tolerance policy leads to school dropout and failure to graduate on time. Not only is the process of punishment a controversy, but whether or not racism is used to punish is also an issue concerning the zero tolerance policy. An important controversy when debating on the zero tolerance policy is whether or not racism is involved when schools are punishing students. Russell Skiba and Allen Mendler argue that schools are completely just and equal when determining punishments for violence in schools. They agree that no matter race, ethnicity, language, or abilities, if you portray a violent action, rash punishments will result (1). Although supporters agree that the policy treats all people equal, those who oppose the policy agree that racism occurs when punishing students using the zero tolerance policy. According to those that oppose the policy, zero tolerance is an unjust policy that does not treat all students equally. The American Psychological Association (APA) agrees that the disproportionate discipline of students of color is and continues to be a concern when discussing the zero tolerance policy. They believe that most expulsions and suspensions are punishments that result from African Americans or Latinos that are violent in schools. Another target group of schools that use the zero tolerance policy are those people with disabilities, especially with emotional and behavioral disorders (2). There are many important controversies dealing with the zero tolerance policy, and many people either support the controversy or are opposed to the controversy. Zero tolerance attempts to prevent violence in schools and create a safer environment for the school community. It is viewed as a policy that that tries to teach students wrong from right, and gives students a sense of discipline. Although some believe that the policy has good intentions, there are many controversies that aroused, causing many debates that challenge the effectiveness of the policy. While many people who believe that the policy creates a safer environment for students and teachers support the zero tolerance policy, there are many who oppose the zero tolerance policy, arguing that it is unfair and ineffective in reducing violence in schools.
Friday, September 27, 2019
Creating Academic and Professional Success Essay - 3
Creating Academic and Professional Success - Essay Example This determination has made strong in life and helped me in taking decisions which I have not regretted. Choosing the path of success in my professional life has become an aim for me because of this very strong determination and I think if I utilize it in the correct manner Iââ¬â¢ll be able to achieve what I aim to. But as said by Christopher Moore "Nobodys perfect. Well, there was this one guy, but we killed him....". It clearly depicts that I personally have my own weaknesses in achieving my goals. All over these years I have realized that learning something is not easy for me. It takes time for me to learn things which others learn in a while. But this weakness can easily be overcome if I give all of my attention to my goals. This attention helps me to not only learn and understand things but also to excel in these things. The main problems which I face with my life are regarding the division of time. Because I have my own wife to take care of it is quite difficult for me to divide my time when it comes to my work and household. But here again I have realized every problem has a solution to it and thus I have several opportunities to cope up. I can make my wife understand my problems and divide my time accordingly. It would help me to give more attention to my goals and aims which would then be easily
Thursday, September 26, 2019
Tobacco Horror Show Essay Example | Topics and Well Written Essays - 1250 words
Tobacco Horror Show - Essay Example Throughout the article, an attempt has been made to conclude which of the means, literal or visual, is most effective when it comes to delivering ââ¬Ëthe rightââ¬â¢ information. The question is, what is more important, the tobacco companies business that will be affected or public health that is always put on the line due to their tobacco production and products? The answer is simple and in my opinion, a smoker needs to be conveyed a message, in a way, that it actually delivers neutralized related aspects such as bad lungs, cancerous cause, short breath, addiction and eventually a shorter span of life. Moreover, a literal message might not have the same effect as compared to the one that is visually displayed as it can be adequate for the smoker to develop the right understanding. The motive should be to educate smokers and to help them overcome the smoking practice or addiction. Displaying images that depict the internal and overall destruction of a human body will make a smok er think twice. Works cited Fish, Stanley. "The Tobacco Horror Show."à New York Times. 14 Nov. 2011. Web. 13 Dec. 2011. . The Age of the Superfluous Worker Americaââ¬â¢s survival in the global economy today is questioned as the unemployment ratio has consistently climbed, as observed. As the situation worsens the estimated jobless ratio has now hiked to almost 15% of the overall work force. These statistics include the type that has now given up their search for work, the superfluous workers. These issues, when combined, severely contribute to the ever-increasing surplus pool. If present-day capitalism continues to eliminate a greater number of jobs as compared to what it creates, soon, along with the addition to surplus labor, majority of workers will eventually turn into superfluous workers. If a considerable proportion is continued to be expelled from within the American work force, soon America will transform into a disturbed society. This age has rightly been named ââ¬Ë the age of the superfluous workerââ¬â¢. Where there are less job opportunities for every American citizen, most of them transform into superfluous workers. According to my point of view, government needs to focus more on creating jobs and providing earning opportunities to its own people. If unemployment continues to climb heights, the youth is estimated to reach the ââ¬Ësurplus stateââ¬â¢ at an early age. If out-sourcing offices to lower waged countries continues, an ongoing addition to superfluous workers is never likely to halt. Other than the government concentrating more on creating jobs, employers also need to play a considerable role. They need to understand the fact that if they continue to outsource businesses, soon a time will come when the nationââ¬â¢s youth will be mentally challenged. Works cited Fish, Stanley. "The Age of the Superfluous Worker."à The New York Times. 14 Nov. 2011. Web. 13 Dec. 2011. . Moving Beyond Civil Rights Initially, civil rights mad e America a united and fair nation yet in the present, civil rights have failed to bring about any changes in the lives of many minorities, women and the unemployed. Due to the initial successful implementation of civil rights laws, Americans perceive every issue of social injustice
Research and Analysis Business Problems Paper Example | Topics and Well Written Essays - 3500 words
And Analysis Business Problems - Research Paper Example JC Penneyââ¬â¢s accomplishment is seen to be less in comparison with its competitors. At present, JCP is functioning to discard this previous image and is trying to concentrate instead on reasonable pricing, attractive marketing and highlighting the exclusive brands that are offered. By analyzing the stimulating plans revealed by JCP, it is found that there are enduring areas the company has not concentrated on. These gaps may cause problems in the long run and have a negative effect on innovation that the company is trying to accomplish. To sufficiently address and recognize the possible issues still prevailing within the new strategy for JCP, it is very important to understand the current position of the company. So as to recognize the newly projected changes and how they will really impact the company, it is important to acknowledge from where the company started, where it is at present and also where it is going. The analysis will connect jointly both periods of JCP and depict the four major environments (PEST) of the company. By analyzing the strategies of the company, any gaps within the plan are assessed and solutions are presented from an outside point of view. Going back to the original format of the department store is one of the recommendations, which would provide JCP with an opportunity of formulating a store separately. The area needs to consider properly before going ahead with this recommendation. Discussions must be done with suppliers to decide the sensibleness of introducing new store areas. Moreover, the company must consider performing a wide market study to scan if consumers are attracted in a central point ground one stop shop or not. It is also recommended to create partnerships between JC Penney and other trendy or customer preferred brands within the new areas of market. This is a modest risk recommendation as it engages integrating a second company into the variety mix for merely an imperfect time period. The retailer has proven th ey can provide good value and pricing, but they have also ignored the more obvious problems of poor merchandise mix and styles.à While JC Penny can compete on traditional and formal clothing, an understanding of newer styles seems to escape the companyââ¬â¢s fashion buyers (Lee par 6). The companyââ¬â¢s current triumphant partnership with Sephora, a cosmetic chain, has paved way for JCP to partner with stylish and popular brands. It challenges the ability to assign and stock products within the suitable time as well as budget that have already been set. It is also recommended to focus on implementing new product changes to fit into the existing image that JCP has shaped. This alteration to choose merchandise and separating merchandise could result in creating various challenges for JCP. à ââ¬Å"It is also found that low inventory levels can adversely affect the fulfillment of customer demand and diminish sales and brand loyaltyâ⬠(Item 1A. Risk Factors pg 5). Positi on: JC Penney Company, Inc. (JCP) is one of the main top department store retailers in America. James Cash Penney started the first JC Penney department store in 1902, initially named ââ¬ËThe Golden Rule.ââ¬â¢ Ever since, with ââ¬Å"1033 JC Penney department stores in 49 states and Puerto Ricoâ⬠(JC Penny 2006 web Pages and Annual Report par 3), it has turned out to be one of the leading retailers in the discount segment and department of the retail
Wednesday, September 25, 2019
Management Information Systems Essay Example | Topics and Well Written Essays - 4000 words
Management Information Systems - Essay Example The essay "Management Information Systems" talks about the development of a new system for the ABC Company. This company is computer hardware manufacturer that carry out product for larger scale orders. The overall management and handling of such huge orders are difficult through the manual order processing approach.This information system will be used as an information management system of the overall organizational data. This system will conduct an online transaction and store the dealing and transaction data on the companyââ¬â¢s central database. After that this data will be used to access the overall sales analysis. We will derive monthly or periodic report for the analysis of the overall business position. This system will facilitate in managing the overall products sales and deals regarding the corporate online transactions. Here we will be able to access and retrieve the overall quality of the stock and its current level because in any online transaction the stock status is really necessary for the handling of dealing. This product and stock information will provide a great facility for stock management. Here we will assign a product code to each project and through that code, we will easily retrieve the product information for the better management of the stack. This system will be an online system. We will create an organizational management module. This module will facilitate only to organizational executives to view, manage and handle online products, stock, sales and other organizational information.
Tuesday, September 24, 2019
Nike (Discuss in essay format Nikes organisational structure and how
Nike (Discuss in format Nikes organisational structure and how Nike has affected and been affected by the external environment.) - Essay Example Nikeââ¬â¢s organizational structure is characterized by both vertical and horizontal functional levels that are basically democratic in nature though its administrative apparatus has some elements of bureaucracy too. With the appointment of Mark Parker as the Chief Executive Officer (CEO) of Nike, the organization has yet again proved to the rest of the world how much the top command of Nike places emphasis on its modern innovative approach to business growth and corporate success. While its current functional level structure is less vertically integrated there is a broader horizontal level integration of both managerial functions and subordinatesââ¬â¢ tasks to achieve a broader level of integration within the defined hierarchy. Vertically the organizational structure of Nike tends to be more or less paternalistic and bureaucratic with the founder/president still having control over much of the operational structures of the organization while horizontally itââ¬â¢s much more democratic thus facilitating communication, delegation of power and responsibility to subordinates and above all well coordinated Human Resource Management (HRM) practices at the international level across its many production facilities in the world. Organizational structure consists of differentiation and integration within the organization hierarchy. Differentiation in turn consists of vertical and horizontal distribution of functions and tasks. Vertical differentiation basically refers to the distribution of decision making functions within the organization while horizontal differentiation refers to the distribution individual tasks such as non-decision making duties of employees (Wokutch, 2001). Nike has a flatter horizontal hierarchical distribution of functions thus effectively facilitating the democratic decision making process within the organization. Integration refers to coordination among a number
Monday, September 23, 2019
International Finance and Financial Crisis Case Study
International Finance and Financial Crisis - Case Study Example They should oversee if the sources of funds have an undisrupted flow and if they are able to pay their creditors. Having a clear understanding, the company should try to maximise the cash positions. In 2008, Woolworths had net cash flow of 39.2 millions in comparison to 27.1 millions in 2007. In due contrast to it, the company had 2.2 millions of net cash flow in 2003. So, it can be said Woolworths took required measures to have the increased cash flow during the time of crisis. Identify and aggressively minimise operational risks - The companies, amidst financial crisis, should try to identify and reduce all sorts of avoidable day-to-day risks. During crisis, it is desirable that the companies follow the basics. The operations generated over 61.7 millions in 2008, a drastic increase over the previous year. Conduct rigorous scenario planning - During crisis the companies should also take a proper stock of the economic scenario. They should strategise on the basis of the GDP growth, currency depreciations, etc. Woolworths Group scrapped the idea of paying interim dividend in 2008 considering the net loss it has incurred and the global meltdown. Review business performance and prepare for divestitures - The c... They should strategise on the basis of the GDP growth, currency depreciations, etc. Woolworths Group scrapped the idea of paying interim dividend in 2008 considering the net loss it has incurred and the global meltdown. Review business performance and prepare for divestitures - The company, to sustain and survive the crisis, should continuously review its performance and take necessary steps, as and when required. Also, the company should prepare itself for necessary divestments to increase the cash inflow. As the cash inflow was great for Woolworths, so we can say that the company took regular assessments of its business performance. Maintain the confidence of key stakeholders - Any company that wants to stay floated for long term, knows the value of its stakeholders. Relationship with shareholders, suppliers and customers if once lost can not be regained. The revenue has increased in 2008 compared to 2007 for Woolworths Plc and also there are no bank overdrafts in the year. Dividend Policies, Capital Structure and the Shareholders' Wealth Share-holders are the true owners of any company. And the dividend is the earning of the owner because of his stock holding on the basis of the company's profit. Apart from the capital yield (which a share-holder might earn, if he sale away the share), earning of dividend is the reason of purchasing shares by the shareholder. If a company earns profit from its professional and operational activities, the management can either retain the profit or future investments (called retained profit or retained earning) under the head of 'reserve and surplus' in the balance sheet or the management of the company can distribute the profit among its
Sunday, September 22, 2019
The Lottery Essay Example for Free
The Lottery Essay The Lottery The specific details Jackson describes in the beginning of ââ¬Å"The Lotteryâ⬠set us up for the shocking conclusion. In the first paragraph, Jackson provides specific details about the day on which the lottery takes place. She tells us the date (June 27), time (about 10 A.M.), and temperature (warm). She describes the scene exactly: there are flowers and green grass, and the town square, where everyone gathers, is between the bank and post office. She provides specifics about the town, including how many people live there and how long the lottery takes, as well as about neighboring towns, which have more people and must start the lottery earlier. In the paragraphs that follow this introduction, Jackson gives us charactersââ¬â¢ full namesââ¬âBobby Martin, Harry Jones, and Dickie Delacroix, among othersââ¬âand even tells us how to pronounce ââ¬Å"Delacroix.â⬠Far from being superfluous or irrelevant, these initial specific details ground the story in reality. Because she sets the story firmly in a specific place and time, Jackson seems to suggest that the story will be a chronicle of sorts, describing the tradition of the lottery. The specifics continue throughout the story, from the numerous rules Mr. Summers follows to the names of the people who are called up to the box. In a way, there is safety in these detailsââ¬âthe world Jackson creates seems much like the one we know. And then the stoning begins, turning reality on its head. Because Jackson is so meticulous in grounding us in realistic, specific details, they sharpen the violence and make the ending so incredibly surprising. Themes The Danger of Blindly Following Tradition The village lottery culminates in a violent murder each year, a bizarre ritual that suggests how dangerous tradition can be when people follow it blindly. Before we know what kind of lottery theyââ¬â¢re conducting, the villagers and their preparations seem harmless, even quaint: theyââ¬â¢ve appointed a rather pathetic man to lead the lottery, and children run about gathering stones in the town square. Everyone is seems preoccupied with a funny-looking black box, and the lottery consists of little more than handmade slips of paper. Tradition is endemic to small towns, a way to linkà families and generations. Jackson, however, pokes holes in the reverence that people have for tradition. She writes that the villagers donââ¬â¢t really know much about the lotteryââ¬â¢s origin but try to preserve the tradition nevertheless. The villagersââ¬â¢ blind acceptance of the lottery has allowed ritual murder to become part of their town fabric. As they have demonstrated, they feel powerless to changeââ¬âor even try to changeââ¬âanything, although there is no one forcing them to keep things the same. Old Man Warner is so faithful to the tradition that he fears the villagers will return to primitive times if they stop holding the lottery. These ordinary people, who have just come from work or from their homes and will soon return home for lunch, easily kill someone when they are told to. And they donââ¬â¢t have a reason for doing it other than the fact that theyââ¬â¢ve always held a lottery to kill someone. If the villagers stopped to question it, they would be forced to ask themselves why they are committing a murderââ¬âbut no one stops to question. For them, the fact that this is tradition is reason enough and gives them all the justification they need. The Randomness of Persecution Villagers persecute individuals at random, and the victim is guilty of no transgression other than having drawn the wrong slip of paper from a box. The elaborate ritual of the lottery is designed so that all villagers have the same chance of becoming the victimââ¬âeven children are at risk. Each year, someone new is chosen and killed, and no family is safe. What makes ââ¬Å"The Lotteryâ⬠so chilling is the swiftness with which the villagers turn against the victim. The instant that Tessie Hutchinson chooses the marked slip of paper, she loses her identity as a popular housewife. Her friends and family participate in the killing with as much enthusiasm as everyone else. Tessie essentially becomes invisible to them in the fervor of persecution. Although she has done nothing ââ¬Å"wrong,â⬠her innocence doesnââ¬â¢t matter. She has drawn the marked paperââ¬âshe has herself become markedââ¬âand according to the logic of the lottery, she therefore must die. Tessieââ¬â¢s death is an extreme example of how societies can persecute innocent people for absurd reasons. Present-day parallels are easy to draw, because all prejudices, whether they are based on race, sex, appearance, religion, economic class, geographical region, family background, or sexual orientation, are essentially random. Those whoà are persecuted become ââ¬Å"markedâ⬠because of a trait or characteristic that is out of their controlââ¬âfor example, they are the ââ¬Å"wrongâ⬠sex or from the ââ¬Å"wrongâ⬠part of the country. Just as the villagers in ââ¬Å"The Lotteryâ⬠blindly follow tradition and kill Tessie because that is what they are expected to do, people in real life often persecute others without questioning why. As Jackson suggests, any such persecution is essentially random, which is why Tessieââ¬â¢s bizarre death is so universal. Motifs Family Family bonds are a significant part of the lottery, but the emphasis on family only heightens the killingââ¬â¢s cruelty because family members so easily turn against one another. Family ties form the lotteryââ¬â¢s basic structure and execution. In the town square, families stand together in groups, and every family member must be present. Elaborate lists of heads of families, heads of households within those families, and household members are created, and these lists determine which member draws from the box. Family relationships are essential to how the actions of the lottery are carried out, but these relationships mean nothing the moment itââ¬â¢s time to stone the unlucky victim. As soon as itââ¬â¢s clear that Tessie has drawn the marked paper, for example, her husband and children turn on her just as the other villagers do. Although family relationships determine almost everything about the lottery, they do not guarantee loyalty or love once the lottery is over. Rule s The lottery is rife with rules that are arbitrarily followed or disregarded. The intricate rules the villagers follow suggest that the lottery is an efficient, logical ritual and that there is an important purpose behind it, whereas the rules that have lapsed, however, reveal the essential randomness of the lotteryââ¬â¢s dark conclusion. Mr. Summers follows an elaborate system of rules for creating the slips of paper and making up the lists of families. When the lottery begins, he lays out a series of specific rules for the villagers, including who should draw slips of paper from the black box and when to open those papers. When someone is unable to draw, the lottery rules determine who should be next in line. At the same time, there are ghosts of rules that have been long forgotten or willfully abandoned altogether, such as those for salutes and songs that accompany Mr. Summerââ¬â¢s induction as theà chairman of the lottery. The fact that some rules have remained while others have disappeared underscores the disturbing randomness of the murder at the end of the lottery. Symbols The Black Box The shabby black box represents both the tradition of the lottery and the illogic of the villagersââ¬â¢ loyalty to it. The black box is nearly falling apart, hardly even black anymore after years of use and storage, but the villagers are unwilling to replace it. They base their attachment on nothing more than a story that claims that this black box was made from pieces of another, older black box. The lottery is filled with similar relics from the past that have supposedly been passed down from earlier days, such as the creation of family lists and use of stones. These are part of the tradition, from which no one wants to deviateââ¬âthe lottery must take place in just this way because this is how itââ¬â¢s always been done. However, other lottery traditions have been changed or forgotten. The villagers use slips of paper instead of wood chips, for example. There is no reason why the villagers should be loyal to the black box yet disloyal to other relics and traditions, just as there is no logical reason why the villagers should continue holding the lottery at all. The Lottery The lottery represents any action, behavior, or idea that is passed down from one generation to the next thatââ¬â¢s accepted and followed unquestioningly, no matter how illogical, bizarre, or cruel. The lottery has been taking place in the village for as long as anyone can remember. It is a tradition, an annual ritual that no one has thought to question. It is so much a part of the townââ¬â¢s culture, in fact, that it is even accompanied by an old adage: ââ¬Å"Lottery in June, corn be heavy soon.â⬠The villagers are fully loyal to it, or, at least, they tell themselves that they are, despite the fact that many parts of the lottery have changed or faded away over the years. Nevertheless, the lottery continues, simply because there has always been a lottery. The result of this tradition is that everyone becomes party to murder on an annual basis. The lottery is an extreme example of what can happen when traditions are not questioned or addressed critically by new generation s. Foreshadowing and Suspense Many of the seemingly innocuous details throughout ââ¬Å"The Lotteryâ⬠foreshadow the violent conclusion. In the second paragraph, children put stones in their pockets and make piles of stones in the town square, which seems like innocent play until the stonesââ¬â¢ true purpose becomes clear at the end of the story. Tessieââ¬â¢s late arrival at the lottery instantly sets her apart from the crowd, and the observation Mr. Summers makesââ¬âââ¬Å"Thought we were going to have to get on without youâ⬠ââ¬âis eerily prescient about Tessieââ¬â¢s fate. When Mr. Summers asks whether the Watson boy will draw for him and his mother, no reason is given for why Mr. Watson wouldnââ¬â¢t draw as all the other husbands and fathers do, which suggests that Mr. Watson may have been last yearââ¬â¢s victim. Jackson builds suspense in ââ¬Å"The Lotteryâ⬠by relentlessly withholding explanation and does not reveal the true nature of the lottery until the first stone hi ts Tessieââ¬â¢s head. We learn a lot about the lottery, including the elements of the tradition that have survived or been lost. We learn how important the lottery is to the villagers, particularly Old Man Warner. We go through the entire ritual, hearing names and watching the men approach the box to select their papers. But Jackson never tells us what the lottery is about, or mentions any kind of prize or purpose. She begins to reveal that something is awry when the lottery begins and the crowd grows nervous, and she intensifies the feeling when Tessie hysterically protests Billââ¬â¢s ââ¬Å"winningâ⬠selection. And she gives a slight clue when she says that the villagers ââ¬Å"still remembered to use stones.â⬠But not until the moment when a rock actually hits Tessie does Jackson show her hand completely. By withholding information until the last possible second, she builds the storyââ¬â¢s suspense and creates a shocking, powerful conclusion. Quotations 1. Mr. Summers spoke frequently to the villagers about making a new box, but no one liked to upset even as much tradition as was represented by the black box. This quotation, from the fifth paragraph of the story, reveals how firmly entrenched the villagers are in the lotteryââ¬â¢s tradition and how threatening they find the idea of change. The villagers have no good reason for wanting to keep the black box aside from a vague story about the boxââ¬â¢s origins, and the box itself is falling apart. Beyond shabby, it barely resembles a box now, but the villagers, who seem to take such pride in theà ritual of the lottery, do not seem to care about the boxââ¬â¢s appearance. They just want the box to stay the same. Their strident belief that the box must not change suggests that they fear change itself, as though one change might lead to other changes. Already, some towns have stopped holding lotteries, but these villagers do not seem to be headed in that direction. Instead, the y hold firm to the parts of the tradition that remain, afraid to alter even this seemingly insignificant part of it for fear of starting down a slippery slope. 2. Although Mr. Summers and everyone else in the village knew the answer perfectly well, it was the business of the official of the lottery to ask such questions formally. This quotation appears about halfway through the story, just before the drawing of names begins. Mr. Summers has asked Mrs. Dunbar whether her son, Horace, will be drawing for the family in Mr. Dunbarââ¬â¢s absence, even though everyone knows Horace is still too young. There is no purpose to the question, other than that the question is part of the tradition, and so Mr. Summers adheres to the rule despite the fact that it seems absurd. Even though other parts of the ritual have changed or been discarded over the years, this rule holds firm for absolutely no logical reason. Large things, such as songs and salutes, have slipped away, and wood chips have been replaced with slips of paper. Yet this silly, pointless questioning continues. The villagers seem strident in their adherence to the tradition. Old Man Warner, in particular, is adamant that tradition must be upheld and the lottery must continue. But the reality is that there is no consistency among what rules are followed and which are discarded. This lack of logic makes the villagersââ¬â¢ blind observance of the ritual even more problematic because the tradition they claim to be upholding is actually flimsy and haphazard. 3. Although the villagers had forgotten the ritual and lost the original black box, they still remembered to use stones. This quotation, which appears near the end of the story, distills the lottery down to its essence: murder. The villagers may talk of tradition, ritual, and history, but the truthââ¬âas this quotation makes clearââ¬âis that the traditional parts of it have long been discarded. The original ritual and box may indeed have borne along a tradition, violent and bizarre as it may be, but now, without the original trappings, songs, and procedures, all that remains is the violence. Theà haphazard ritual, the bits and pieces that have been slapped together into some semblance of the original, have led to this essential moment of killing. The villagers are all too eager to embrace what remains, eagerly picking up the stones and carrying on the ââ¬Å"traditionâ⬠for another year. Character Analysis Tessie Hutchinson When Tessie Hutchinson arrives late to the lottery, admitting that she forgot what day it was, she immediately stands out from the other villagers as someone different and perhaps even threatening. Whereas the other women arrive at the square calmly, chatting with one another and then standing placidly by their husbands, Tessie arrives flustered and out of breath. The crowd must part for her to reach her family, and she and her husband endure good-natured teasing as she makes her way to them. On a day when the villagersââ¬â¢ single focus is the lottery, this breach of propriety seems inappropriate, even unforgivable; everyone comes to the lottery, and everyone comes on time. The only person absent is a man whose leg is broken. Although Tessie quickly settles into the crowd and joins the lottery like everyone else, Jackson has set her apart as a kind of free spirit who was able to forget about the lottery entirely as she performed her chores. Perhaps because she is a free spirit, Tessie is the only villager to protest against the lottery. When the Hutchinson family draws the marked paper, she exclaims, ââ¬Å"It wasnââ¬â¢t fair!â⬠This refrain continues as she is selected and subsequently stoned to death, but instead of listening to her, the villagers ignore her. Even Bill tells her to be quiet. We donââ¬â¢t know whether Tessie would have protested the fairness of the lottery if her family had not been selected, but this is a moot point. Whatever her motivation is for speaking out, she is effectively silenced. Old Man Warner Old Man Warner, the oldest man in town, has participated in seventy-seven lotteries and is a staunch advocate for keeping things exactly the way they are. He dismisses the towns and young people who have stopped having lotteries as ââ¬Å"crazy fools,â⬠and he is threatened by the idea of change. He believes, illogically, that the people who want to stop holding lotteriesà will soon want to live in caves, as though only the lottery keeps society stable. He also holds fast to what seems to be an old wivesââ¬â¢ taleââ¬âââ¬Å"Lottery in June, corn be heavy soonâ⬠ââ¬âand fears that if the lottery stops, the villagers will be forced to eat ââ¬Å"chickweed and acorns.â⬠Again, this idea suggests that stopping the lottery will lead to a return to a much earlier era, when people hunted and gathered for their food. These illogical, irrational fears reveal that Old Man Warner harbors a strong belief in superstition. He easily accepts the way things are because thi s is how theyââ¬â¢ve always been, and he believes any change to the status quo will lead to disaster. This way of thinking shows how dangerous it is to follow tradition blindly, never questioning beliefs that are passed down from one generation to the next. Mr. Summers Despite his breezy, light-hearted name, Mr. Summers wields a frightening amount of power in the village, power that seems to have been assigned to him arbitrarily. A married, childless business owner, Mr. Summers is ââ¬Å"jovialâ⬠and pitied by the townspeople for having a nagging wife. No one seems to question his leadership of the lottery, and it seems to have never been challenged. Perhaps he took on the role himself, or perhaps someone offered it to him. Whatever the case, he now has complete control. Mr. Summers not only draws the names on the day of the lottery, but he also makes up the slips of paper that go into the black box. Itââ¬â¢s up to him to make the black circle that ultimately condemns someone to death. Jackson never explains why the villagers put such pure faith in Mr. Summers, and the assumption that he will continue to conduct the lottery is just one more inexplicable but universally accepted part of the ritual.
Saturday, September 21, 2019
The Welfare Needs Of The Elderly Social Work Essay
The Welfare Needs Of The Elderly Social Work Essay Introduction Nowadays, Malaysians are living longer, they are on an average of 74 years for men and 78 years for women. In others words, their life expectancy has increase. With the advances in medical care and better nutrition, older people are living longer, they are more visible, more active and more independent than ever before and they are in better health. Therefore there is a growing concern regarding the global phenomenon of aging. A decline in the birth as well as death rates has resulted in an increase in the elderly population. As a result, the demographers are now paying more attention to the issues of aging. Total Population 26.75 m 28.96 m 65 and above 1.15 m 4.3% 1.36 m 4.7 % This table shows that the total population and the aged of 65 years or above in Malaysia in the year of 2005 and 2010. In 2005, the total population of Malaysia was 26.75 million, and which 1.15 million or 4.3% was aged 65 years and above. Moreover, in 2010, Malaysia currently has a population of approximately 29 million, and aged 65 years and above has increased to 1.36 million or 4.7%. With the projected population growth of 2% annually, it expected that the total population in 2020 will rise to 34 million, of which 3.2 million or 9.5% will be the age of 65 years and above. In the year 2035, the country is expected to have a total population of about 46 million of which 6.9 million or 15% will be the aged 65 years and above. This is evident that Malaysias demographic ageing pattern is emerging. Based on the figure showed in this table, the real numbers of older person have increased lately, which also means that the number of elderly will continue to grow over the coming year. As t he populations of older Malaysian grows, so there has a hidden problem of elder abuse. Further, the number of elderly with chronic illness is likely to increase. This can pose an increased burden on their caregivers such as family members, and it could lead to a higher risk of elderly abuse. Elder abuse is a single or repeated act or lack of appropriate action occurring within any relationship where there is an expectation of trust which causes harm or distress to an older person (Action on Elder Abuse 1995). The willful infliction of injury, unreasonable confinement, intimidation or cruel punishment with resulting physical harm or pain or mental anguish, or the willful deprivation by a caretaker of goods or services which are necessary to avoid physical harm, mental anguish or mental illness. (1985 Elder Abuse Prevention, Identification Treatment Act). According to the Swanson(1999), elder abuse refers to the mistreatment of older people by those in a position of trust, power or responsibility for their care. This is a global problem that is likely to intensify in view of the increasing number of older people and the changing socio-economic and environmental conditions worldwide (Randel et al. 1999). Further, Hazzard (1995) described elder abuse as cruel and inhumane t reatment of the elderly. Kapur (1997) defines it as a kind of harassment or an injustice done to the elderly by the family members themselves. In fact, there is too many definition of elder abuse but despite this, most would agree with this definition an action or inaction by someone in a position of trust; often a family member or unrelated caregiver. Normally, more than 2/3rds of the abusers are their family members and are typically giving their basic needs or care support such as food, shelter, personal care or transportation. In others word, someone who commits elder abuse usually has control or influence over the older person. The older persons often know and trust the abusers. Some victims of elder abuse depend on the people who hurt them, sometimes for food, shelter, personal care, or transportation. Therefore, the abusers could be their family members, friend, someone the older people relies on for basic needs or staff in group residential settings such as care homes or in long term health care facilities. The Prevalence of Elderly Abuse in Five Developed Countries Country Prevalence (%) USA 3.2 Canada 4.0 Finland 5.4 Netherlands 5.6 United Kingdom 5.0 This table shows the prevalence of the elderly abuse in five developed countries, which are USA, Canada, Finland, Netherlands and United Kingdom. The prevalence of the elderly abuse in USA with percentage is 3.2%, in Canada is 4.0%, in Finland is 5.4%, in Netherlands is 5.6% and United Kingdom is 5.0%. But in Malaysia, the information and data of elderly abuse is scarce. Although this epidemic is virtually unheard of in Malaysia, we are challenged to be aware of the many faces of elder abuse in our own society. So far in Malaysia, there are no reported cases of elder abuse to the Department of Social Welfare as well as no agency keeps proper records of the incidence of elder abuse in this country. The actual and prevalence of elder abuse is unknown and difficult to measure. Elderly abuse exists in our society but it is hardly reported. This problem often remains undetected because of poor public awareness and lack of knowledge among health care personnel. This is because it can cause some adverse effects on the health and quality of life of the elderly. Due to their mental capacity, they are unaware of the help available to them. Therefore, elder abuse is seldom reported. In most situations, elderly are unlikely to report that they are being abused because they are fear of embarrassment and fear of losing care support. They are mostly completely under the control of the abuser and depend on the abusers for food, shelter, clothing and health care. Furthermore, they also fear of harm by the abuser. Some of them are lack of awareness, they are only suspect but uncertain that is abuse, therefore, the cases of elder abuse is hardly to report and also seldom reported. As the aging population continue grows, they are need more care and attention. The care and attention may help them remain free of abuse and it can be from their family members, relatives, friends and neighbours. Further, some of them also can be from their caregivers such as from the care home, or nursing home personnel. Other than that, older also can get their care and attention or in form of the fairness from the government by law. This may prevent the occurrence of the elder abuse. Conclusion Elder abuse should be a growing concern issue in our society but it is preventable. Each of us, as individuals, family members, in the community, as a society, government or nongovernmental agencies, must play our role, hand in hand to curb this problem. Understanding the magnitude of the problem, knowing and acting against its root causes will help to provide a healthier and safer society in this country and all over the world. In short, we must continue to create awareness, concern our loved ones care and protect them from becoming one of the victims. Further, if we find any problem, moved our loved one immediately and report them to the police. For so many to live to be old is one of the most remarkable achievements of the twentieth century. To be old and live in dignity free from all forms of abuse must be a common goal for all societies of the twenty-first century. Elderly have rights and deserved to be loved and respected. Certainly elder abuse will increase with an ageing population worldwide, especially if adequate caregiver support programmes and services are not developed in tandem.
Friday, September 20, 2019
MPLS-Traffic Engineering
MPLS-Traffic Engineering I. Webserver We will be using apache web server in our project. The Apache HTTP Server Project is a synergistic programming improvement exertion went for making a hearty, business grade, featureful, and unreservedly accessible source code execution of a HTTP (Web) server. The undertaking is together overseen by a gathering of volunteers placed as far and wide as possible, utilizing the Internet and the Web to convey, arrange, and add to the server and its connected documentation. This undertaking is a piece of the Apache Software Foundation. Likewise, several clients have contributed thoughts, code, and documentation to the venture. This record is expected to quickly portray the historical backdrop of the Apache HTTP Server and perceive the numerous donors. Figure 1. Apache General Structure. In Figure 1 we can see the general diagram of apache webserver that how it will work and how it is connected in our scenario. II. File Server We will be using Turnkey as a file server in our project. A simple to utilize file server that joins Windows-good system file offering to a propelled online file chief and incorporates help for SMB, SFTP and rsync file exchange protocols. The server is designed to permit server clients to oversee files in private or open stockpiling. In view of Samba and AjaXplorer. This machine incorporates all the standard gimmicks in TurnKey Core, and on top of that: 1. SSL backing out of the case. 2. Webmin module for arranging Samba. 3. Incorporates mainstream squeezing help (zip, rar, bz2). 4. Incorporates flip to change over content file endings in the middle of UNIX and DOS groups. 5. Preconfigured wordgroup: WORKGROUP 6. Preconfigured netbios name: FILESERVER 7. Configured Samba and UNIX clients/bunches synchronization (CLI and Webmin). 8. Configured root as managerial samba client. In Figure 2 we will show you that how file server is working in our project. Figure.2 Internal connectivity of file server III. Proxy server There are many proxy server to choose but we have chosen Squid linex proxy server because itââ¬â¢s fast and secure. The Squid Web Proxy Cache is a completely offered Internet storing server that handles a wide range of web demands for a client. At the point when a client asks for a web asset (website page, motion picture cut, realistic, etc..), their solicitation is sent to the storing server which then advances the appeal to the genuine web server for their sake. At the point when the asked for asset is come back to the reserving server, it stores a duplicate of the asset in its cache and after that advances the solicitation again to the first client. Whenever somebody asks for a duplicate of the cached asset, it is conveyed straightforwardly from the nearby proxy server and not from the inaccessible web server (contingent upon time of asset etc). Utilizing a proxy server can enormously diminish web scanning velocity if every now and again went by locales and assets are put away provincially in the cache. There are additionally monetary investment funds to be picked up in case youre a substantial association with numerous Internet clients or even a little home client that has a portion remittance for downloads. There are numerous ways a proxy can be advantageous to all systems. The squid proxy has such a large number of peculiarities, access controls and other configurable things, that it is difficult to cover the majority of the settings here. This section will give some fundamental setup settings (which is all thatââ¬â¢s needed) to empower the server, and give access controls to keep unapproved clients from getting access to the Internet through your proxy. The design file has been archived greatly well by the designers and ought to give enough data to help your set up, however in the event that you dont realize what a setting does, dont touch it. Since you have effectively arranged your Squid proxy server, you will need to arrange the majority of your workstations on your inward system to have the capacity to utilize it; this may appear like a long errand relying upon how enormous your inner system is. It likewise implies that you will need to physically arrange the greater part of your applications that unite with remote web servers for data/ information trade, this incorporates all web programs, infection redesign applications and other such utilities. Hmm, this could take a while. One incredible gimmick of Squid is that is can be utilized as a HTTPD quickening agent, and when arranged in conjunction with an iptables sidetrack guideline, it will get to be straightforward to your system. Why? since we will no more need to setup the greater part of our applications on our workstations to utilize the proxy, now we can divert all HTTP asks for as they get through our firewall to utilize our straightforward proxy rather; less demanding organization. A critical point before undertaking, straightforward intermediaries CAN NOT be utilized for HTTPS associations over SSL (Port 443). This would break the server to customer SSL association dependant upon your security and classifiedness of the protocol, it could likewise permit a man in the center assault due to caught (proxied) parcels. Figure.3 Proxy server connectivity. IV. DNS Server At its most fundamental level, the DNS gives a dispersed database of name-to-address mappings spread over a progression Of nameservers. The namespace is apportioned into a chain of command of areas and subdomains with every area managed freely By a legitimate nameserver. Nameservers store the mapping of names to addresses in asset records, each having a related TTL field that decides to what extent the section can be stored by different nameservers in the framework. A vast TTL worth diminishes the heap on the nameserver however confines the recurrence of redesign engendering through the framework. Figure 4. Basic DNS operation Nameservers can actualize iterative or recursive questions. In an iterative inquiry, the nameserver returns either a response to the Inquiry from its neighborhood database (maybe stored information), or a referral to an alternate nameserver that may have the capacity to answer the question. In taking care of a recursive inquiry, the nameserver gives back a last reply, questioning some other nameservers important to intention the name. Most nameservers inside the chain of importance are arranged to send and acknowledge just iterative inquiries. Nearby nameservers, on the other hand, commonly acknowledge recursive inquiries from customers (i.e., endhosts). Figure 4 delineates how a customer commonly discovers the location of an administration utilizing DNS. The customer application utilizes a resolver, typically actualized as a set of working framework library schedules, to make a recursive inquiry to its nearby nameserver. The nearby nameserver may be designed statically (e.g., in a framework document), or rapidly utilizing conventions like DHCP or PPP. After making the solicitation, the customer holds up as the neighborhood nameserver iteratively tries to determination the name (www.service.com in this case). The neighborhood nameserver first sends an iterative inquiry to the root to determination the name (steps 1 and 2), however since the subdomain service.com has been assigned, the root server reacts with the location of the legitimate nameserver for the sub-area, i.e., ns.service.com (step 3)1. The customers nameserver then questions ns.service.com and gets the IP location of www.service.com (steps 4 and 5). At long last The nameserver furnishes a proportional payback to the customer (step 6) and the customer has the capacity interface with the server (step 7). V. VPN and Firewall We are using 2 types of VPN here.The first one is. 1. Site-to-site VPN A site-to-site VPN permits multiple business locales in altered areas to make secure associations with each Other over an open system, for example, the Internet. It additionally gives extensibility to assets by making them accessible to Workers at different areas. 2. Access VPN A remote-access VPN permits singular clients to build secure associations with a remote PC system. These clients can get to the safe assets on that system as though they were specifically connected to the systems servers. Gimmicks in VPN à ¯Ã¢â¬Å¡Ã · Provide broadened associations crosswise over multiple geographic areas without utilizing a rented line. à ¯Ã¢â¬Å¡Ã · Improved security instrument for information by utilizing encryption strategies. à ¯Ã¢â¬Å¡Ã · Provides adaptability for remote work places and workers to utilize the business intranet over a current Internet Association as though theyre specifically joined with the system à ¯Ã¢â¬Å¡Ã · Saves time and cost for representatives who drive from virtual working environments à ¯Ã¢â¬Å¡Ã · VPN is favored over rented line since leases are extravagant, and as the separation between business locales builds, the Expense of rented line increment. à ¯Ã¢â¬Å¡Ã · IPsec VPN and SSL VPN are two arrangements of VPN which are broadly utilized as a part of WLAN. Figure 5. VPN connectivity with our router. As a firewall we are using IPtables. Iptables/Netfilter is the most prevalent order line based firewall. It is the first line of safeguard of a Linux server security. Numerous framework managers use it for calibrating of their servers. It channels the parcels in the system stack inside the bit itself. You can discover a nittier gritty diagram of Iptables here. Peculiarities of IPtables 1. It records the substance of the parcel channel ruleset. 2. itââ¬â¢s exceptionally quick on the grounds that it assesses just the parcel headers. 3. You can Add/Remove/Modify tenets as per your needs in the bundle channel rulesets. 4. Posting/focusing every standard counters of the parcel channel rulesets. 5. Helps Backup and reclamation with documents. X. Conclusion In this project there was so much stuff to learn about we have seen so many different kind of servers and it was difficult to decide what which server we should use Microsoft or Linux but we have seen in most of the cases Linux server were free and also very secure so we thought we will be using Linux server and In this project we have designed a perfect network design which is flawless. In figure 6 we have shown our whole network design. Figure 6. Complete Network Design. . Acknowledgment We are really grateful to complete our project with the time given by our professor Dr Hassan Raza. This project cannot be completed without the efforts and contribution of my group partner. We also thank our professor Dr Hassan Raza for his guidance. References [1] P. Mockapetris, ââ¬Å"Domain names ââ¬â concepts and facilities,â⬠Internet Request for Comments (RFC 1034), November 1987. [2] Paul Albitz and Cricket Liu, DNS and BIND, Oââ¬â¢Reilly and Associates, 1998 [3] Weili Huang and Fanzheng Kong. The research of VPN over WLAN. [4] CarIton Rà ¯Ã ¼Ã
½Davisà ¯Ã ¼Ã
½The security implementation of IPSec VPN [M] à ¯Ã ¼Ã
½ [5] Baohong He, Tianhui. Technology of IPSec VPN [M]. Beijing: Posts Telecom press, 2008, 7. [6] NetGear VPN Basics (www.documentation.netgear.com/reference/esp/vpn/ VPNBasics-3-05.html)
Thursday, September 19, 2019
The Effects of Racism on Hally in Master Harold and the Boys by Athol F
The Effects of Racism on Hally in Master Harold and the Boys by Athol Fugard In the play Master Harold and the Boys, Hally demonstrates, through repeated acts and expressions, the sentiment of the entire African society at the time the play takes place. In 1950, the policy of apartheid was beginning to be practiced in South Africa. The Population Registration Act was passed, which divided the population into four racial groups (Post 112). The Group Area Act of 1950 controlled ownership of property by different races. The 1950 amendment to the Immorality Act prohibited sexual contact between different races. These are the attitudes of the time. Yet, in the beginning of the play, the reader does not sense the separation of Hally and the two black men that later is blatantly portrayed. In fact, we come to learn that Sam and Hally are so close that Hally would actually spend a lot of his time as a child in Sam?s room, where they and Willie would play and talk often. So, for part of the play, Sam and Hally reminisce of the old days. For example, there was one time when Sam built a kite out of brown paper and tomato-box wood pasted together with flour and water and with a tail of Hally?s mother?s old stockings. Hally loved the kite once it was in the air and had a lot of fun with it. Hally almost wishes that he could return to those times because that was a time when ?life felt the right size?. (Fugard 379) Unfortunately, Hally?s mood changes drastically throughout the play. When his mother calls from the hospital with news that his father may coming home, Hally quickly becomes very sharp with the two black men. For example, he says to Sam ?Tell me something I don?t know, Sam. What the hell do you think I was saying to my... ...e end of the day feels no better about himself than he did before. Sam?s inaction did not have the effect on Hally he might have hoped for. But Sam loved the boy, and wanted to teach him the right attitude to have. Unfortunately, the effect society had on Hally?s character was too deep. So Hally is just a product of his circumstances, and nothing more. Works Cited Allison, Kimberly J., ed. The Harcourt Brace Casebook Series in Literature: ?Master Harold? ?and the boys. Fort Worth: Harcourt, 1997. Durbach, Errol. Master Harold? ?and the boys: Athol Fugard and the Psychopathology of Apartheid.? Allison 68-77 Fugard, Athol. ?Master Harold? ?and the boys. Allison 20-63 Post, Robert M. ?Racism in Athol Fugard?s ?Master Harold? ?and the boys?. Allison 111-117 Vandenbroucke, Russell. ?Fathers and Son: ?Master Harold? ?and the boys?. Allison, 77-88
Wednesday, September 18, 2019
Gunslinger: Battle Between Good and Evil :: essays research papers
The dilemma between good and evil began long before our time, and itââ¬â¢s been chronicled since man could write. Stephen King, one of the controversial writers of our time, brings his characters to life by giving them peculiar attributes, individual and bold attitudes, and places them in unusual predicaments. The Gunslinger series by Stephen King is a sequence of books that show the internal struggle between good and evil. His character are presented with obstacles, and readers observe how each one responds to the challenges presented to them, waiting to see how far they will go to achieve what they believe is the greater good. King realistically conveys to his readers that although his characters put forth their best efforts to do what they feel is upright, their actions are not always in their best interests. The author clearly shows readers that no amount of good a person does can prevent them from getting hurt. In books one, two, and four King puts his characters through cer tain situations to create certain outcomes. King makes an effort to show readers how people arrive at the right, or wrong choice, in different situations. This is, of course, the classic struggle between good and evil. à à à à à King introduces Roland, the protagonist, in ââ¬Å"Gunslingerâ⬠. Roland is crucial in Kingââ¬â¢s endeavor to present to his readers how people make the choice between good and evil. In ââ¬Å"Gunslingerâ⬠, Roland is presented with an option; he can either save a boyââ¬â¢s life, or he can let the boy plunge to his death and not deviate from his plan. Roland loves the boy, Jake, and is torn between saving him and pursuing his target, the man in black. Roland decides to sacrifice his friendââ¬â¢s life in order to hound the man in black. Rolandââ¬â¢s goal is to reach the Dark Tower, and he feels that he must make sacrifices and forgo the sentimental, in order to achieve his goal. His ultimate goal is what he believes is the greater good, and he will go to any length to reach it. Society has sacrificed of innocence to achieve their definitive purpose, history is proof of this. King simply brings this to light. Roland has love for the boy; however, in not saving his life he saves more lives in the end. Saving Jakeââ¬â¢s life might be in Jakeââ¬â¢s best interest, but in doing so Roland will be affected negatively.
Tuesday, September 17, 2019
The Micromax Mobile Phone
[pic] X560 User Manual INTRODUCTION Thank you for purchasing this Micromax mobile phone. To obtain the best performance of your phone, please read this user manual carefully. Table of Contents 1Safety4 1. 1 Safety Precautions4 2Introduction5 2. 1Phone and Accessories5 2. 2To Lock/Unlock6 2. 3Your Phone6 2. 4About your phone6 2. 5About SIM Card and the Battery6 2. 6To switch ON and OFF7 3Phonebook7 3. 1To Add a contact7 3. 2To View a contact7 3. 3To Call a contact7 3. 4To Edit a contact7 3. 5To Delete a contact8 3. 6To Copy a contact to phone memory8 3. 7To Move a contact8 3. 8Send a contact8 . 9Add to Blacklist8 3. 10Caller groups8 3. 11Phonebook settings8 4Calling9 4. 1Call waiting9 4. 2Call Barring9 4. 3Call divert9 5Call Logs10 5. 1Missed calls/dialed calls/received calls/blocked calls10 6Messages10 6. 1Write SMS10 6. 2SMS Inbox10 6. 3SMS Draftbox11 6. 4SMS Outbox11 6. 5Sent items11 6. 6Archive12 6. 7Delete Messages12 6. 8Templates12 6. 9Message settings12 6. 10EMAIL12 6. 11Broadc ast Message13 7Phone & Call Settings14 7. 1Customized General Settings/Phone Settings/ Connection Settings14 8User Profiles15 8. 1User Profile Setup15 9Entertainment16 9. 1Camera16 9. 2Image Viewer16 . 3Video Recorder16 9. 4Video Player17 9. 5Music Player17 9. 6Photo editor17 9. 7Sound Recorder18 9. 8Slide show18 9. 9FM Radio18 10Fun & Games18 10. 1Games18 11Bluetooth18 11. 1To Activate/Deactivate Bluetooth Connectivity19 11. 2To Search/Inquire Audio Device19 11. 3To Search My (new) device19 11. 4Active Device19 11. 5Settings19 12Organizer19 13File Manager20 14WAP & JAVA Services21 14. 1WAP Browser21 14. 2WAP Setup21 14. 3Java21 15STK22 15. 1STK Services22 16Inputting Text22 17Phone Suite22 18Maintenance23 19Taking Care of your Device24 20After Services25 Safety 1. 1 Safety Precautions Please read through the following briefings carefully, and act in accordance with these rules, so as to prevent causing any danger or violating any law. Safe driving 1) Do not use the phone while driving. When you have to use the phone, please use the personal hands-free kit. 2) Please put the phone safely in the phone stand. Do not put it onto any passenger seat or any place from which it may fall down in case of vehicular collision or emergency braking. Turn off during a flight: Flight is influenced by interference caused by the phone. It is illegal to use a phone on the airplane. Please turn off your phone during a flight. Turn off the phone when within an area where blasting takes place: Be sure to strictly observe the related laws and statutes by turning off the phone when you are within, or in the vicinity of, an area where blasting takes place. Turn off the phone when any dangerous goods are in vicinity: Please turn off your phone when you are close to a gas station or in the vicinity of any place where fuel and chemical preparations, or any other dangerous goods are stored. In hospital: Please obey the related rules or bylaws of the hospital when using your phone in a hospital. Be sure to turn off your phone when near any medical equipment. Your use of any wireless transmission equipment, inclusive of the phone, will interfere with any medical equipment that is not protected fully, and other electronic equipment items, too. Should you have any question in this regard, please consult a related physician or medical equipment supplier. Interference: Each and every phoneââ¬â¢s performance may be affected due to radio interference. Professional service: The phone must be installed or repaired by no other personnel than professionals. You are likely to suffer a huge risk when you install or repair this phone by yourself, which also goes against the warranty rules. Fittings and battery: You shall use the fittings and battery acknowledged by the phone manufacturer only. Using unauthorized accessories may tamper the warranty of the device. Emergency call: You may enter a telephone number (112, etc. ) to ask for emergency help after making sure that the phone has been turned on and is in the service status. Press the Send Key to call out. Disclaimer: Micromax will not bear any responsibility for any incompliance with the above mentioned guidelines or improper usage of the mobile phone. Micromax keeps the right to make modifications to any of the content here in this user guide without public announcement in advance. The content of this manual may vary from the actual content displayed in the mobile phone. In such a case, the latter shall govern. Introduction 1 Phone and Accessories Open the packing box of the phone and check that you have the Phone, Standard Charger, Standard Battery, USB cable, Earphone, Service Guide, Software CD, Leather pouch and Warranty Card. 2 To Lock/Unlock To unlock your phone (if auto keypad is enabled), press the small button on the top side of the phone. Or to unlock the phone slide up on the message displayed on the screen. 4 Your Phone [pic][pic] 5 About your phone Micromax X560 is a complete Touch phone. The main display of your phone is divided into 2 screens, slide your finger across the phone to change to the other screen to view more features. You can also change wallpapers by simply sliding your finger across the screen and choose from a wide range of interesting wallpapers. 6 About SIM Card and the Battery Please store the cards out of childrenââ¬â¢s reach. The card and the contacts are vulnerable to damage due to scratching or bending. Therefore, be careful when using, inserting or removing the cards. Be sure to switch off the phone before you insert or remove the battery or the card, otherwise, the phone may be damaged. Tips: The battery icon [pic] displayed on the screen indicates that the battery power is low. Please charge the battery. Please charge the battery before you use the newly purchased phone. We suggest you charge the battery for 4 hours continuously for the first time. Charging when the phone is in the ON mode will not influence the normal dialing and answering, but this needs to consume power, thus the time of charging will increase. We suggest you recharge the battery when the power is used up so as to prolong the life of the battery. 7 To switch ON and OFF To switch ON: Long press End key when the phone is in the OFF mode. If the phone lock has been activated, you need to enter the 4-digit password to unlock. (The preset unlock code is 0000. ) If the SIM card has been inserted in the phone, and the related PIN code protection is activated, you need to enter the 4-8 digit password to unlock. Warning: If you enter three wrong PIN codes in a row, the SIM card will be locked and you need to enter the PUK code to unlock. Both the PIN code and PUK code are provided by the network operator. To switch OFF: In the standby mode, press the key on the top side of the phone to power on and off. Phonebook You can store names and phone numbers in the memory of the phone or SIM card. Menu > Phonebook 1 To Add a contact Menu>Phonebook>Options>New Or in idle, tap on the calling icon to enter phone numbers and save a contact. 2 To View a contact Menu>Phonebook>Options>View In the contact list of the Phonebook, select to view the required name card 3 To Call a contact Menu>Phonebook>Options>Call View the contact number to make calls 4 To Edit a contact Menu>Phonebook>Options>edit Allows you to edit a contact 5 To Delete a contact Menu>Phonebook>Options>Delete Allows you to delete a contact 6 To Copy a contact to phone memory Menu>Phonebook>Options>Copy Copy the contact to the phone memory 7 To Move a contact Menu>Phonebook>Options>Move Move a contact from the phone to the SIM memory or vice-versa 8 Send a contact Menu>Phonebook>Options>Send contact Allows you to send a contact via message, MMS, email or Bluetooth 9 Add to Blacklist Menu>Phonebook>Options>Add to blacklist Add the contact to the blacklist 10 Caller groups Menu > Phonebook > Options>Caller groups To view the ââ¬Ëcaller groupsââ¬â¢ folder tap on the fourth key above- to select the group to be set in the preset groups mentioned in the phone. Like- Friends, family, colleagues, others and more. 11 Phonebook settings Menu > Phonebook > Options>Phonebook settings â⬠¢ Choose phonebook view- Choose a location to save your contacts in â⬠¢ Speed dial- Choose numbers from your contact list and put them under the speed dial list â⬠¢ My number- View your number vCard version- View the vCard version â⬠¢ Extra numbers- View SIM1, SIM2 or SOS numbers â⬠¢ Phonebook backup- Allows you to import & export contacts to and from the phonebook. â⬠¢ Memory status-View the used and available phone & SIM memory â⬠¢ Copy contacts- Allows you to copy a contact from the phone to SIM memory and vice-versa â⬠¢ Move contacts- Allows you to mo ve a contact from the phone to SIM memory and vice-versa â⬠¢ Delete all contacts- Delete all the contacts from SIM or phone memory Calling Note: Once you attend a call your phone will display a series of functions from you to choose from. For example- Mute, Send message, Hold call and more. Choose anyone feature to carry out the desired functions. 1 Call waiting Menu > Settings > Call settings>Call Waiting This function allows you to put the current call on hold and then answer a second one. If, during a call, a new call comes in, you will hear a special alert sound and the screen will display the number of the new incoming call, which indicates that a third-party call is coming in and waiting for to answer. 2 Call Barring Menu > Settings > Call settings >Call Barring The function is a GSM network service and can restrict outgoing and incoming calls selectively. If you need to change the settings of Restrict Calls, please contact your network operator to obtain the password for opening this service. 3 Call divert Menu > Settings > Call settings> Call divert With the Call Divert function (needs network support), you may divert incoming calls to another mobile phone or a direct line telephone, but not to any extensions of a fixed telephone. Call Logs 1 Missed calls/dialed calls/received calls/blocked calls Press the keys displayed on top of the screen to view> All calls/Dialed calls / Received calls/ Missed calls You may select View: View the desired entry Call: Call the desired entry Save to Phonebook: to save the number to the Phonebook Edit: to edit the number to dial or save to the phonebook. Send message: To write SMS/MMS to send to the number. Delete: To delete the entry. Delete All: Delete all the registered entry in one go. Call timer: View the call timers for the last/received/dialed calls or reset Call cost: View the call costs Messages 1 Write SMS Menu > Messages > Write SMS/MMS Write the content of the SMS Send to: Add contact number Input Method: select Smart abc/Numeric etc Add picture: Add a desired picture in the message you want to send as an MMS Add sound: Add a desired sound in the message you want to send as an MMS Add video: Add a desired video in the message you want to send as an MMS Add subject: Add a desired subject in the MMS message Slide Options: Allows you to add a slide ââ¬Ëbefore/after in the current mms. Swtich to MMS: Allows you to switch from SMS to MMS, manually. Advanced: Insert text template/Insert attachment/contact number/insert contact name (embellish the characters of text)/ Insert bookmark. Save: Save the mms/sms Details: View the details of the MMS/SMS 2 SMS Inbox Menu > Messages > Inbox To read a message, move to the entry and press OK When reading a SMS, you can select Options > View: Allows you to view the SMS received. Reply: Reply to the message received. Call sender: Call on the number from which the SMS was received. Forward: Forward the entry to others. Delete: Delete the message. Delete all: Delete all the messages from the Inbox. Save to Phonebook: Allows you to save the number from which the sms was received to the phonebook. Mark as read: Mark the received SMS as ââ¬Ëreadââ¬â¢ ? Advanced: Copy to phone/SIM: Copy the SMS stored in SIM/phone to the phone/SIM. ? Move to phone/SIM: Move the SMS stored in SIM/phone to the phone/SIM. ? Copy all: Copy all the messages stored in SIM to the phone memory, or copy all the messages stored in the phone memory to SIM. ? Move all: Move all the messages stored in SIM to the phone memory, or move all the messages stored in the phone memory to SIM. SMS Draftbox Menu > Messages > Drafts View: Allows you to view the SMS received. Send: Send the message saved in drafts Edit: Allows you to edit the SMS received. Delete: Delete the message. Delete all: Delete all the messages from the Inbox. Advanced ? Copy to phone/SIM: Copy the SMS stored in SIM/phone to the phone/SIM. ? Move to phone/SIM: Move the SMS stored in SIM/phone to the phone/SIM. ? Copy all: Copy all the message s stored in SIM to the phone memory, or copy all the messages stored in the phone memory to SIM. Move all: Move all the messages stored in SIM to the phone memory, or move all the messages stored in the phone memory to SIM. 4 SMS Outbox SMS that have been sent and saved are stored in Outbox. Menu > Messages > Outbox SMS that have been sent and saved are stored in Outbox. To read a message, move to the entry and press OK When reading an SMS, you can select Options > View: View the message saved in outbox Resend: Select how to send. Edit: Edit the message. Delete: Delete the message. Delete all: Delete all the messages from the Inbox. Advanced Copy to phone/SIM: Copy the SMS stored in SIM/phone to the phone/SIM. ? Move to phone/SIM: Move the SMS stored in SIM/phone to the phone/SIM. ? Copy all: Copy all the messages stored in SIM to the phone memory, or copy all the messages stored in the phone memory to SIM. ? Move all: Move all the messages stored in SIM to the phone memory, or move all the messages stored in the phone memory to SIM. 5 Sent items Menu>Messages>Sent items View the messages sent by you to other numbers Menu > Messages > Sent messages View: View sent messages. Forward: Forward the sent messages Delete: Delete a message in the sent items folder Delete All: Delete all messages in the sent items folder Advanced ? Copy to phone/SIM: Copy the SMS stored in SIM/phone to the phone/SIM. ? Move to phone/SIM: Move the SMS stored in SIM/phone to the phone/SIM. ? Copy all: Copy all the messages stored in SIM to the phone memory, or copy all the messages stored in the phone memory to SIM. ? Move all: Move all the messages stored in SIM to the phone memory, or move all the messages stored in the phone memory to SIM. 6 Archive Menu>Messages>Archive Allows you to save messages received in your inbox into this archive folder. 7 Delete Messages Menu>Messages>Delete messages Delete messages from the following folders: Inbox, Drafts, Outbox, Sent messages, Archive, All messages 8 Templates Menu>Messages>Templates>SMS Templates/MMS Templates The phone has preset frequently used phrases which may be selected and added to the text when you are editing SMS. Preset phrases may be modified. 9 Message settings Menu>Messages>Messages settings SMS Settings Menu>Messages>Message settings>SMS settings Profile settings- â⬠¢ Voicemail server â⬠¢ Common settings- Set to receive Delivery reports, Reply path, Save Sent message. â⬠¢ Memory status â⬠¢ Preferred storage MMS Settings Menu>Messages>Message settings>MMS settings â⬠¢ Profiles- Select a profile from the available network profiles. â⬠¢ Common setting- Select to compose, send, retrieve or view the memory status. 10 EMAIL E-Mail Before use, you need to set the e-mail i n the ââ¬Å"E-mail accountsâ⬠menu. Via this menu, you can receive and send e-mail. à ¦ Send and Receive: You can send/receive the e-mail from the specified mailbox. Write Email: You can edit e-mails. à ¦ Inbox: You can see the received e-mails. à ¦ Outbox: You can see the sent e-mails. à ¦ Sent: You can view send e-mails. à ¦ Drafts: You can see the drafts in the specified mailbox. à ¦ Clear mailbox: You can clear the e-mails in the specified mailbox, including inbox, outbox, sent e-mail backup and drafts, or clear all e-mails. à ¦ Delete marked emails: You can change the status of all e-mails to deleting status. à ¦ Email accounts: You can set up you new account. à ¦ Templates: you can pre-edit some common phrases, which is convenient for quick editing. Incoming Server: You can set the server parameters for the received e-mails, including Incoming server, Incoming port, user name and password etc. o Signature: You can set it On or Off and edit the signature. The fir st step in using email on your mobile phone is to define your email accountââ¬â¢s settings so that your mobile phone knows which server to contact and to login using the correct credentials. TO CONFIGURE A NEW EMAIL ACCOUNT: Go to: â⬠¢ Email >Email accounts> Options >New Account> Start to create account >Email address >Options >Next > Select email protocol (ââ¬ËPOP3ââ¬â¢ or ââ¬ËIMAP- as per the account settings). Next >Select Data account (as per the SIM connection) > Incoming Server (edit email incoming server as per the account standard settings). â⬠¢ Next > Outgoing Server (edit email outgoing server as per the account standard settings) >User Name > Password > Account Name > Options > Done (email account is created) â⬠¢ Go to- Created email account >Options > Edit (user can edit email account settings if required) â⬠¢ Advance Settings > Outgoing Sever > Outgoing Port (Input correct outgoing port according to the email configuration). Advance Settings > Incoming Server > Incoming Port (Input correct incoming port according to the email configuration) â⬠¢ Go to- Configured email account > Options > Activate Your email account is now created! 11 Broadcast Message Menu > Messages > Broadcast Message The phone supports Broadcast Message. It is supported by GSM network. Broadcast messages are single-way messages sent to the users of the network operators by the message service center. For the contents and channel setup of broadcast messages, consult your network operator. Phone & Call Settings Customized General Settings/Phone Settings/ Connection Settings |Functions |Description | |Set time and date |Menu > Settings > Phone settings > Time and date | |Schedule power on/off |Menu > Settings > Phone settings > Schedule power on/off | | |To disable and enable status; to activate/deactivate, switch on/off, and time in turn. |Select language |Menu > Settings > Phone settings > Language | |Set Display setup |Menu > Settings > Phone se ttings gt; Display Setup > Wallpaper/Screen saver/Show date and | | |time/LCD backlight/ Show owner number | |Set Greeting text |Menu > Settings > Phone settings > Greeting Text | |Auto update of date and time On/Off |Menu > Settings > Phone settings > Auto update of date and time | |Set Caller ID |Menu > Settings > Call settings > SIM1/2 call settings>Caller ID | |Set Call waiting |Menu > Settings > Call settings > SIM1-2 call settings>Callà waiting | |Set call Divert |Menu > Settings > Call settings > SIM1-2 call settings> Call Divert Tip: You can select | | |Cancel all divert to cancel all the divert settings. | |Set Call Barring |Menu > Settings > Call settings > SIM1-2 call settings> Call Barring. Restrict Calls is | | |a GSM network service. Please contact your network operator to obtain the password for | | |opening this service. |Set the Blacklist |Menu > Settings > Call settings > Advance settings>Blacklist | |Reject by SMS |Menu > Settings > Call settings > Advance sett ings>Reject by SMS | | |Reject a call by SMS | |Select network |Menu > Settings > Network settings >SIM 1-2 network settings | | |New Search: The phone will select a new network automatically. | | |Select Network: The phone will search and display the list of known networks for you to | | |select the desired one, after which, the phone will try to log in the selected network. | | |If the selected network is registered successfully, it will prompt so. | |Set information of GPRS Connection |Menu > Connectivity> Data account>GPRS/GSM Data | |WIFI Menu>WIFI | | |Enable the WiFi connection in your phone to gain access to internet at any WiFi enabled | | |location | |Restore factory default |Menu > Settings > Restore factory settings | | |Tip: You need to enter the phone password when you want to restore factory default. The | | |preset phone password is 0000. Please bear your password in mind. Incase you forget it, | | |contact the local dealer or an authorized service center. | User Profiles 1 User Profile Setup Functions |Description | |Activate the profile mode |Menu > Settings> User profiles > Desired mode>Options > Activate | |Set the ringtone for incoming calls |Menu > Settings > User profiles > Customize> Tone setup> SIM1-2 Incoming call | |Set the ringtone for messages |Menu > Settings > User profiles > Customize> Tone setup> SIM1-2 message tone | |Set the ringtone for key pad tone |Menu > Settings > User profiles > Customize> Tone setup> Keypad tone | |Adjust the volume of Ring Tone / Key |Menu > Settings > User profiles >Customize> Volume | |Tone | | |Set Alert Type of ringing |Menu> Settings > User profiles> Customize >Alert type | |Set the ring type |Menu > Settings > User profiles > Customize> Ring type | |Set the Extra Tone |Menu > Settings > User profiles > Customize> Extra tone | |Set the answer mode |Menu > Settings > User profiles > Customize> Answer mode | Entertainment 1 Camera Menu > Camera Tap on the screen to view various functions. From Settings choose from a list of functions below to carry out the desired task Photos: View the images clicked. Camera settings: Set EV, Banding, delay timer, shutter sound, contrast and cont. shot, Image settings: Set the size and quality of photos. White balance: Set White Balance. Scene mode: Set scene mode. Effect settings: Set the special effects of photos, such as Grayscale, Sepia, Sepia Green and Colour Invert. Storage: Select phone or memory card. Restore default: Restore default settings. 2 Image Viewer Menu > Image viewer On the Image viewer list screen, open the image and select Options> View: View the highlighted photo. Edit: Edit the image Browse style: Select the style of viewing. Send: Send the photo by MMS or Bluetooth, Email Use as: Set the highlighted photo as wallpaper, screen saver, or the photo caller ID of a Phonebook entry. Rename: Rename the highlighted file. Delete: Delete the highlighted file. Delete all files: Delete all the files from the list. Sort by: Sort the files in the list. Storage: Select phone or memory card. 3 Video Recorder Menu>Video Recorder Choose from a list of functions below to carry out the desired task- Camcorder settings: set White Balance, EV, Night Mode and Banding. Video settings: Set video settings as per your requirement White balance: Set white balance Video settings: Set the Video Quality, File size limit, Rec time limit, and record audio. Effect settings: Set the special effects, such as Grayscale, Sepia, and Sepia Green etc. Restore default: Restore default settings. 4 Video Player Menu > Video player On the video player list screen, select Options > Send: Send the video by MMS or Bluetooth. Rename: Rename the highlighted file. Delete: Delete the highlighted file. Delete all files: Delete all the files from the list. Sort by: Sort the files in the list. Streaming URL: Allows you to browse sites like Youtube, Google. This feature is a network dependant service. Profile: Choose and activae a desired profile. Storage: Select phone or memory card. YouTube You can now watch videos on your phone on the popular YouTube site. Menu>Video Player>Streaming URL>Predefined>YouTube Note: This service is network dependant. Please get in touch with your network operator for the desired settings. 5 Music Player Menu > Music To add songs in your phone either add them from the phone memory or select the memory card by going to ââ¬â Music player>Settings>Player settings> Pre playlist (Phone/Memory card) Playlists: Allows you to make a playlist and add songs in it either from the phone memory or the memory card. All tracks: Allows you to view all the tracks Recently played: View a list of the recently played songs Most played: View the most played songs. Recently added: View the list of recently added songs Artists: Add the artist name Albums: Add the album name Genres: Add a genre/type to your songs Refresh list: Refresh the playlist Nxp Equalizer: Add sound effects to your songs. Choose from a number of exciting effects like: bassbooster, Classical, Dance, Flat, Folk, Heavymetal, Hiphop, Jazz, Piano, Pop, Rock, Spokenworkd, Symphony, Theater, Treblebooster, Latin, Vocalbooster, Bassreducer, Treblereduces & Normal. Settings: â⬠¢ Player settings â⬠¢ Display settings â⬠¢ Sound effects 6 Photo editor Menu> Photo editor Allows you to resize the images stored in your phone 7 Sound Recorder Menu > Sound recorder On the Sound Recorder list screen, you can select: Play: Play the recorded sound Append: Add a sound Rename: Rename the highlighted recording. Delete: Delete the highlighted recording. Delete all files: Delete all the recordings from the list. Use as: Send the highlighted record to the ringtone list for profiles. Send: Send the highlighted record by MMS, Bluetooth or Email. 8 Slide show Menu> Slide show Allows you to view images as a slide show. 9 FM Radio Menu > FM radio To search channels- Options> >Auto search To save the channel list- Select one or all channels and add them to the channel list. To change channels- Long press on the ââ¬Ë>ââ¬â¢ key to change to the next channel Fun & Games 1 Games Menu > Games Your phone has many preloaded exciting games in it. Choose the game you wish to play and cross various levels to set the ultimate highest score. Bluetooth You can connect wirelessly to other compatible device with Bluetooth technology. Compatible devices may include computers, mobile phones. You can use Bluetooth connectivity to send images, music and sound clips, video clips, and notes. Since devices with Bluetooth wireless technology communicate using radio waves, your device and the other devices need to be within a range of 10 meters from each other, but the connection may be subject to interference or could face obstruction from stuff such as wall or from other electronic devices. Use the wireless technology of Bluetooth to be able to consume battery quantity of electric charge. If you are restricted by something when using Bluetooth technology, consult your local Micromax support/service station. 1 To Activate/Deactivate Bluetooth Connectivity Menu > Connectivity>Bluetooth > Power(On/Off) 2 To Search/Inquire Audio Device Menu > Connectivity> Bluetooth > Inquiry audio device Tip: Please activate the Bluetooth first. To Search My (new) device Menu > Connectivity> Bluetooth > My device > Inquiry new device Tip: Please activate the Bluetooth first. 4 Active Device Menu > Connectivity> Bluetooth > Active Device Tip: Please activate the Bluetooth first. 5 Settings Me nu > Connectivity>Bluetooth > Settings View the following options to change/edit the Bluetooth settings- Visibility- Switch ON/OFF to display your Bluetooth device visbility Device name- Edit your Bluetooth device display name Receive folder- View items received via Bluetooth in the phone/SIM memory Device information- View details about your Bluetooth device. Organizer Functions |Description | |View the calendar |Menu > Calendar | |Notes |Menu > Notes | |Tasks |Menu > Tasks | |Set the alarm |Menu > Alarm > Edit | |World clock |Menu > Applications>World clock | |Calculator |Menu > Calculator | |Unit converter |Menu > Applications>Currency converter | |Text reader |Menu > Applications>Text reader | File Manager When a USB cable is connected, you can use the phone as a USB mass storage. |Functions |Description | |View folders |Menu > File manager> Options > Open> View folders in phone or SIM memory | |Format |Menu > File manager > Options > Format | WAP & JAVA Services 1 WAP Browser Menu > Connectivity > WAP You need to make the relevant settings in WAP Setup before you use the WAP browser to surf the web. When the WAP browser is activated, if a homepage is set in WAP Setup, the phone will link the website indicated by the homepage; otherwise, you may enter a website and the phone will connect to it. When surfing the web, select Options > Refresh: To refresh the web page. Homepage: To link the homepage. Input URL: input a website address. Add Bookmark: Add to bookmark. Set Homepage: set the URL as homepage. Forward/Backward: To turn to the next /previous page. Advance: Show URL info, Bookmark, Save item. Exit: To exit the browser. 2 WAP Setup WAP settings are required for surfing the web with WAP. Follow the steps below to set up a WAP account: â⬠¢ Connectivity > Data Account > GPRS > Add account > Add account name/ APN/ Username & password > Save. Then go to: Menu >Connectivity > WAP >Settings > Profiles > Add new > Account Name/ Homepage/ Data Account (select the previously created data account) > Select connection type (HTTP/WAP- Indise HTTP & WAP ener the correct proxy address & port > Done > Save the account >Go to the created account & activate. Menu > Connectivity> WAP> Settings>Profile You can set the following: Account: To select from the GPRS connection list. Connection type: To set WAP or HTTP connection mode. Home page: To set the address of the homepage. The phone has a default and you can modify it. 3 Java Menu > Applications>Java You can install Java applications to enhance the multimedia function. It also allows you to connect to Snaptu, Nimbuzz and Operamini as well. Java settings Menu > Connectivity>JAVA settings STK 1 STK Services If your SIM card supports STK, you may use the corresponding value-added services. Inputting Text You can enter text in English and digit. Phone Suite Connect your phone and PC via the USB cable> Select COM Port PhoneSuite provides various functionalities for users to manage the documents in their mobile phone easily on a PC. It will communicate with mobile phone via serial communication or Bluetooth. â⬠¢ Phonebook is used to manage the contacts information between the mobile phone and the PC folder. In addition to adding, editing and deleting contacts, users can get a backup of the phonebook database on the PC folder â⬠¢ Message helps users to read, edit nd send SMS/EMS messages directly from PC. Besides, you can create personal folders to categorize all messages on the PC side. â⬠¢ Settings: contains the system-related settings and message default settings. Users also can set whether they want to import contact list from other software or not here. â⬠¢ Images: is us ed to draw images of various file types, and transport the images between the PC and mobile phone. It also provides clip, mirror and rotate functions to reach user's expectation. â⬠¢ Melody: provides a easier way to compose your own melody through the staff graphic interface. It also provides the functions to transport the melodies between PC and mobile phone. MMS Message: helps users to read, edit MMS messages directly from PC. Users also can transport MMS messages between PC and mobile phone. â⬠¢ File Manager provides a friendly interface for users to manage their files between the PC and the mobile phone. Functionalities of ââ¬Å"copyâ⬠, ââ¬Å"pasteâ⬠, ââ¬Å"deleteâ⬠, ââ¬Å"renameâ⬠and ââ¬Å"new folderâ⬠are provided in the out tool. Besides, File Manager also supports local java installation from PC side. Maintenance Use a dry soft cloth to wipe general dirt. Do not use a hard cloth, benzene or thinner to wipe the phone, otherwise, the surf ace of the phone will be scratched or could even result in the fading of color. Taking Care of your Device Your device is a product of superior design and craftsmanship and should be handled with care: The following suggestions will help you protect your phone: â⬠¢ Always keep the small parts of the phone away from children. â⬠¢ Keep the device dry. Precipitation, humidity, and all types of liquids or moisture can contain minerals that will rust electronic circuits. If your device does get wet, remove the battery, and allow the device to dry completely before replacing it. â⬠¢ Do not use or store the device in dusty, dirty areas. Its moving parts and electronic components can be damaged. â⬠¢ Do not store the device in high or cold temperature. High temperatures can shorten the life of electronic devices and damage batteries. Do not attempt to open the device other than as instructed in this guide. â⬠¢ Do not drop, knock, or shake the device. Rough handling can br eak internal circuit boards and fine mechanics. â⬠¢ Do not use harsh chemicals, cleaning solvents, or strong detergents to clean the device. Only use a soft, clean, dry cloth to clean the surface of the device. â⬠¢ Do not paint the device. Paint can clog the moving parts and prevent proper operation. â⬠¢ Use chargers indoors After Services For details, see the After Service Guide supplied with the phone. [pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic][pic]
Subscribe to:
Posts (Atom)