Wednesday, July 31, 2019

Critical Thinking Assignment: Buddhism

1. The question of Origin- Those who follow Buddhism have faith that the universe and god are one and the same. (Weider & Gutierrez, 201, 56) Buddhist turn to the teachings of Siddhartha Gautama also known as Buddha to live correct and at death escape the course of karma. After death, they trust they will become one with the universe. 2. The question of identity- The question of identity in Buddhism is answered in their belief that all living things are equal. They believe you must live according to the teachings of Buddha in order to escape karma and reincarnation after death. . The question of meaning/purpose- For Buddhist the primary goal is to reach Nirvana and end all personal suffering. In order to end suffering one must eliminate all fleshly desires and follow the teachings of Buddha which consists of the â€Å"Four Noble Truths† and the â€Å"Noble Eightfold Path†. 4. The question of morality- Because Buddhist believe everything is sacred they follow the † Ethical Code† instructed in the â€Å"Eightfold Path† which entails refrain from all forms of evil. The major points in the â€Å"ethical code† are; one must keep from taking a person’s life, stealing, immoral sexual behavior, lying and intoxication. 5. The question of destiny- Buddha rejected the idea Hindus hold about karma, which states that a person will continue to be reincarnated throughout time. He believed that one could escape through the denial of personal desires which lead to dissatisfaction because nothing in this world lasts. Buddha taught that everyone could reach Nirvana as long as they lived right. Once they reach Nirvana believers will live in a state where one feel neither hate nor love. Part 2: Compare and Contrast 1. The question of origin- Christians believe God is the creator of the universe and everything in it. Buddhist believers follow the idea that the universe and everything in it are one and the same. To the Buddhist everything has always existed unlike for Christians who believe there was a beginning which is explained in the book of Genesis. 2. The question of Identity-In Genesis 1:27 the bible states that we are created in the image of God. Just as we inherit traits from our parents we inherit traits from God. Buddhist believe humans and animals are one with the universe and both are equal in importance. 3. The question of meaning and purpose- For Christian’s the meaning and purpose of humans is found in John 17:3. John tells us that we are to know God through his Son Jesus Christ. We are to have a close intimate relationship with God. As ambassadors of Christ we are to go and communicate to the world what we know about Jesus, who makes this relationship with God possible. Buddhist do not believe in a personal God. They believe god is distant and does not become involved personally involved in people’s lives. The Buddhist believe their main purpose in to escape the karma and reach Nirvana where they will live without any desire. 4. The question of morality- Without God we are unable to determine what actions are right and wrong (Weider & Gutierrez, 2011, p 61) Christian believers follow the word of God as a guide to live their live. The bible calls believers to love God and to love their neighbor as they love themselves. These two commandments keeps believers from sinning against their neighbor. Buddhist believer in Buddha’s â€Å"Four Noble Truths† and the â€Å"Eight Noble Truths†. Their â€Å"Ethical Conduct† section says a person should conduct himself with â€Å"right speech, right action, and right livelihood. † These codes will liberate a person from the cycle of karma. Unlike Christians Buddhist do not believe in forgiveness the way Jesus offers it. However both beliefs agree that respect is inevitable to live in peace. 5. The question of destiny- Christians believe in heaven and hell. The difference in where a person will go depends on their acceptance in Jesus as Lord and Savior of their lives. Repentance of sin is followed by the forgiveness of Christ. A Christian will live for eternity in heaven if they accept the forgiveness offered by Jesus Christ. Buddhist believe â€Å"salvation† must be worked out. According to the teachings of Buddha anyone can reach Nirvana as long as the person works to behave â€Å"right† during their lifetime.

Australia’s Foreign Relations to 1945

Introduction Australia’s presence and participation in global affairs have been commendable over decades now. Australia officially referred to as commonwealth of Australia is in the southern hemisphere. Australia comprises of the mainland of Australian continent, Tasmania Island and other smaller islands in the pacific and Indian oceans. Like other countries, Australia has undergone numerous milestones over the past centuries which have influenced its present developments. Australian foreign relations with other countries including the US, UK and other Asian countries are of great importance are.Having interacted with these countries at different times of history, Australia has been able to share common policies and interests with these nations. Firstly, the UK which colonized Australia since the 18th century had great influence on its current foreign policy. The trade relations between Australia and America as well as the joint participation in WW II influenced its foreign po licy and relations. These interactions are also evident with other Asian countries like New Zealand, Japan and China which have shared common experiences in war as well as trade.This essay will discuss the importance of Britain, Asia, and the US in shaping Australian foreign policy since the 1788 settlement to WW II (1945). Australia has a rich and appealing foreign policy which makes it a trusted ally to many nations across the globe. The foreign policy of Australia includes various separated but inter-related policies in the fields of trade, security, defence, foreign aid and international commitments. Being a signatory to different treaties in the UN, Australia has been steadfast in attending to issues of global interest.In regards to trade and foreign aid, Australia is always in the forefront in fostering the spirit of globalisation. It is however notable that the foreign policies and relations of Australia are fast in upholding and promoting the interests of Australia. As far a s security and defence is concerned, Australia is always vigilant in addressing any threat to national security. The development of the current and past foreign policies specifically between 1788 and 1945 was greatly influenced by the UK, US and Asia .The UK which was the first to arrive in Australia in the 18th century greatly influenced Australian foreign policy from settlement (1788) to the WW II. It is worth noting that Australia was a victim of tyranny of distance as well as a colony of Britain. Till 1942, Australia showed little or no independence in foreign policy. This is because it was under Britain influence. Despite that Australia was a dominion of Britain and that it had right to determine its foreign policy, it never showed independence. The issues of culture, military, economics and politics were greatly influenced by Britain.It is hereby notable that Britain had great importance in forging Australian foreign policy on the issues of politics, security, defence and econ omics. Since the settlement in 1788 to 1930s, Australia had no international embassies apart from London. The main concern for Australia was on trade and economics. Britain hereby played a key role in modelling Australian foreign policy on trade, culture and economics which helped in meeting the interests of the Australian citizens . US played a key role in building Australian foreign policy since 1788 to 1945.Based on the strong trade relations, Australian extended these relations from trade to security. The fears of Japan invasion in 1930s was a real problem to Australia. Despite this problem, Britain was unable to defend Australia thus seeking the support of US. Based on this phenomenon, it is evident that the fear of Japan invasion influenced Australian foreign policy between 1918 and 1945. Australia extended its trade ties with US to security and defence relations. This is one of the foreign policy of Australia whereby it sought to ensure strategic relations with other countrie s .The foreign policies adopted by Australia on security and defence before 1945 were influenced by the US. This can be attributed to the continued threat of Japanese threat and hostility to Australia. As a result of the open hostility between Australia and Japan during the Paris Pease Conference in 1919, Australia depended on US from defence. During this period, Australian defence planning borrowed from US. In the 1920s, Australian demonstrated an open stereotype and prejudice which was influenced by the US.There was a growing negative stereotype of Japanese by Australia is a potential threat to national security. In response to this scenario, Australia developed and implemented foreign policies which were aimed at enhancing its security and countering Japanese invasion. The foreign policy on security was also allied to the US as a potential strategic partner. The Japanese invasion in China in 1933 had a significant impact on Australian’s attention. In this regard, Australia moved fast to ensure it had strong ties with US, hence strengthening its defence. In light ith this phenomenon, it can be established that Australian foreign policy between 1918 and 1945 was influenced by US due to the threat of Japanese invasion hence prompting it to enter into strategic alliance with the US . The stay of British settlers in Australia since 1788 had great influence and importance to Australia’s foreign policy since 1788 to 1945. The models of Australia’s legal and political systems as well as policies on trade and security were influenced by Britain. The foreign policy on immigration adopted by Australia till 1945 was influenced by Britain.It is important noting that Britons dominated the culture, language and the entire make-up of Australian society. Due to the domination of Australia by Britain, its national identity was relatively indistinct from that of Britain. This made the two nations to share same philosophies and practices as far as foreign policy and relations were concerned. The immigration policies adopted by Australia favoured Irish and Britain. This manifests the strong influence of Britain to Australia’s foreign policies before 1945.The establishment of the Immigration Restriction Act was a major manifestation of Britain’s influence to Australian foreign policy. In this policy, Australia effectively banned Asia migration into the country for the next 50 years. There was also preceding legislations which prohibited the employment of contract labourers as well as the deportation of those already in the country. These developments had great influence on Australian foreign relations till 1945 . Asia has played a critical role in influencing the foreign policies of Australia from 1788 to 1945.The relationships between Australia and other Asian countries of; Malaysia, Singapore, New-Zealand, Japan, Indonesia, and China was of importance in modelling its foreign policy. The quest for peace and regional sta bility was a major issue which influenced Australia’s foreign policy. This can be evident in the 1944 agreement with New Zealand which dealt with welfare, security and advancement of people in the different independent territories. The need for peace and security for its people can be viewed as the major concern for Australia which influenced its foreign policy during this time.Alongside the security concerns, Australia was also focused on boosting its economic prospects. In order to ensure prosperity and sustainability in national development, Australia was keen to ensure regional cooperation with other Asian countries. This was aimed at enhancing the economic prospects of the country . The importance of US in the foreign policy of Australia is very evident through the continued cooperation between the two countries. In the periods before 1945, the US was regarded as Australia’s key ally in WW II.The entire foreign and defence policies of Australia directly depended o n US support. He strong ties between US and Australia influenced its foreign policy on the Southeast Asia. Despite that at times Australia acted independently on foreign policies, it always pursued policies which impressed the US. It is important noting that Australia was ever submissive and subservient to US wishes. Nevertheless, at times Australia pursued different foreign policies which contradicted those of US as in the case of Malaya and West New Guinea.The fear of Australia from foreign invasion had a role in the dependency of Australia’s foreign policy on US . Conclusion It is apparent that the foreign policy and relations of Australia to 1945 was influenced by Asia, Britain and America. The interactions of these countries with Australia played a key role in shaping its foreign policy from 1788 to 1945. The key issues of concern were defence, security, trade, and migration. As observed in the discussion, the US was very influential on the foreign policies of Australia on defence and security.This was also the case of Asia which influenced Australian foreign policy on regional cooperation and security. These insights demonstrate the significance of Britain, Asia and US in modelling Australian foreign policy between 1788 and 1945. Bibliography Dunn, Michael. Australia and the Empire: From 1788 to the Present (Sydney: Fontana/Collins, 1984), 75-154. Esthus, Raymond. From Enmity to Alliance: US-Australian Relations, 1931-1941 (Melbourne: Melbourne University Press, 1964), 83- 132. Grey, Jeffrey. A Military History of Australia (Cambridge: Cambridge University Press, 1999), 45-98.

Tuesday, July 30, 2019

Knowledge Brings Sorrow

Knowledge Brings Sorrow; Fate vs. Free Will The themes of â€Å"fate versus free will† and â€Å"knowledge brings sorrow† are present throughout the play Oedipus Rex, by Sophocles. Fate and free will are antitheses of each other, just as knowledge and sorrow are. Many years before Oedipus began his journey to Thebes, his father, King Laius, heard a prophecy saying that his son would kill him (65). In order to prevent this from happening, Laius had the baby abandoned, and had his feet bound together with a nail for extra precaution. Since prophecies usually turned out to be true, this is an example of how Laius tried to escape his fate. However, he didn’t know that Oedipus survived. On his way to Thebes, Oedipus ran into Laius on the road, not knowing he was his father. He ended up killing him, just as the prophecy said. The prophecy also said that Oedipus would marry his mother. You can infer that fate yet again fulfills its role, and the prophecy becomes true after Oedipus kills his father and continues to Thebes. Just as Oedipus didn’t know that Laius was his father, he didn’t know that Jocasta was his mother. He became the new king of Thebes because he married Jocasta (65). Throughout the play, Oedipus believes that all of his actions are based on free will, not fate. He doesn’t find out that he killed his father and married his mother until awhile after it happened. Everything that happens to Oedipus is really his fate. Once Jocasta and Oedipus Strineka 2 realize they are mother and son, Jocasta kills herself. Here, fate plays another role. Free will really isn’t present in this play. Everything that happens is due to fate. As Amit Sodha said, â€Å"All events are fated in some way. † This is also where â€Å"knowledge brings sorrow† comes into play. Because Jocasta and Oedipus found out that they were mother and son, Jocasta kills herself and Oedipus gouges out his eyes. They do not want to accept the fact that they were mother and son and married. Sodha also said â€Å"The trouble with fate is that it can leave you with a feeling of helplessness. † It’s obvious that Oedipus and Jocasta definitely felt helpless in their situation. Although the prophecy said nothing about Oedipus killing himself, it said hat he would kill his parents. He didn’t kill Jocasta himself, but the reason she killed herself in the first place was because of Oedipus and their marriage. This is a good example of how some things are better off left unknown. In this situation, knowing everything was obviously not such a good idea. People wouldn’t want to know every single detail if things w ere said clearly, and not in such an ambiguous manner. When things are said so that they could possibly have multiple meanings, people become curious to figure out what is actually meant. The outcome of figuring out meanings could be good or bad. Just like the saying â€Å"curiosity killed the cat,† curiosity killed Laius, Jocasta, and Oedipus, and placed a curse on their whole family. In the play, fate triumphs over free will, and knowledge definitely brings sorrow. It’s ironic that fate triumphs over free will and knowledge brings sorrow because most people do things without thinking that it’s part of their fate, and you would think that knowing more would enlighten you rather than bringing you grief and sorrow. In reality, people who are generally â€Å"smarter† and have more knowledge are usually the ones who are most successful in life, and being successful is usually associated with having a good life and being happy. Strineka 3 However, it makes more sense that people who are more aware of life and their surroundings are the ones who feel sorrow and grief. They’re the ones who know what life is really like. They see the flaws of the world and how careless and ignorant people can be. It is possible for knowledge to limit the lives of people, because those who know what is going on often try to change things so the outcome will hopefully be different. For example, if someone had a serious illness but didn’t know about it, they would go on living their life normally without any worry. But if this person knew about the illness, they would probably live their life worrying about what’s going to happen to them. In Oedipus, Laius worries about whether or not the prophecy that his son would kill him will come true. He takes ridiculous actions just to prevent it from happening, but he ends up being killed by his son anyways due to his fate.

Monday, July 29, 2019

Marbury vs. Madison Case Essay Example | Topics and Well Written Essays - 500 words

Marbury vs. Madison Case - Essay Example Some legal scholars have accepted the legitimate reasoning of Marshall while others remain to challenge the decision he made toward the Marbury vs. Madison case. Alexander Bickel question John Marshall ruling, Bickel argued that Marshall Verdict in advocated justice for Marbury vs. Madison case was unconvincing and power-driven interpretation of jurisprudence. Marshall recommended that the Supreme Court had an outright obligation to strike-down every rule it discovers violated the constitution. â€Å"It is emphatically the province and duty of the Judicial Department to say what the law is" Bickel foresees that consenting the constitution to mean whatever the Supreme Court perceives to be right might turn the constitution into a mere document in the hands of the judges. Consequently, judges may twist and shape the constitution into any form that delights them rather than giving the legal decision that will facilitate court attaining decision that depict legitimate, fair and just rul ing. Alexander Mordecai Bickel puts evidently that the aim of John Marshall was using federalist tactic to craft a strong central government over the opposition of Jeffersonian who was alacritous to have a resilient state government. Therefore, John Marshal used the case to establish the Supreme Court as center of power, proficient at overruling the legislature, the president, and the state. Bickel believed that allowing Supreme Court to dictate the constitution might turn it susceptible as judges may desire to shape and twist the constitution towards their lusts, personal gains and egotistical interests2. It is important that Alexander Bickel’s notion is taken into consideration to circumvent future judges from using their positions for personal interest. Conversely, Supreme Court remained to be a vital constitutional independent branch, but it has to incorporate other institution such as congress, and the state interest thus fashioning a holistic relationship for sustainabl e governance of the country.

Sunday, July 28, 2019

English Essay Example | Topics and Well Written Essays - 1000 words - 33

English - Essay Example This included food chemical flavoring, working conditions of beef industry and production of chicken and cattle. This section also takes a look on the dangers of meat consumption and the global interest of fast food in America as a cultural export (Schlosser 12). The assignment requires selection of one topic in the book explained above and its examination. In addition to that, the paper will craft an argument that will convince the readers to change the way they think, do things, or behavior as explained in the selected topic. In order to accomplish the requirements of the assignment, the paper is based on one topic â€Å"what we eat†. Fast food in America has become one of the most factors that drive the economy. At least over the last three decades, the American has been infiltrated by fast food. The fast food industry first began with the small quantity of fast food in the State of California. The influence of the industry has spread to every part of America and to a bigger extent all over the world. The industry is fulfilling the wants of its customers by processing a wide range of food stuffs with a purpose of reaching its market. The industry has taken a good distributing strategy where the food is being distributed in cafeterias, in school, bus stages and restaurants. The nation is known to spend more on fast food than what is spent in a combination of magazines, videos, newspapers, books and movies. According to Schlosser (2001), the fast food industry has a hygiene issue. One may find a person in the construction work just taking the packet of fast food without even washing their hands. People take the exercise of buying fast food as routine without any issue. However, fast food has a revolutionary force in the United States. The food is booth metaphor and a commodity to drive the economy of America. The influence of what people eat or do not is due to

Saturday, July 27, 2019

ABOUT CULTURE( ANTROPOLOGY) Essay Example | Topics and Well Written Essays - 750 words

ABOUT CULTURE( ANTROPOLOGY) - Essay Example Gender-roles were defined as expectations regarding the proper behaviour, attitudes and activities of males and females. The application of traditional gender roles leads to many differentiation between men and women. Both sexes are physically capable of leaning to cook and sew, yet most western societies determine that these tasks should be performed by women. Both men and women are capable of learning to weld metal and fly airplanes but these functions are generally assigned to males. All of us can describe the traditional gender-role patterns which have been influential in the socialization of children and the United States. Male babies get blue blankets while females get pink one. Boys are expected to play with trucks, blocks and toy soldiers; girls are given dolls and kitchen goods. Boys must be masculine – active, aggressive, tough, daring and dominant – whereas girls must be feminine – soft, emotional, sweet and submissive. Boys are socialized to think that they are invulnerable, fearless, decisive and even emotionless in some situations. These are difficult standards to meet; yet, for boys who does not â€Å"measure up† life can be trying. This is especially true for boys who show an interest in activities thought of as feminine such as cooking or for those who do not enjoy traditional masculine activities such as competitive sports. Women are portrayed to be more religious and spiritual. They are the ones who continuously ask for divine guidance when the family experiences suffering or hardships. Aside from this, women are also depicted to be very keen in keeping up with the traditions or rituals required of their religion. In any society, gender socialization and stratification requires not only individual socialization into traditional gender roles within the family, but also the promotion and support of these traditional roles by other social institutions such as religion and education. Moreover, even with all the major

Friday, July 26, 2019

Review of the movie The shape of things Essay Example | Topics and Well Written Essays - 1250 words

Review of the movie The shape of things - Essay Example Adam (Paul Rudd) is a nerdy, unimposing English Major who works part - time as a museum guard. The stage for the rather one - sided battle of the sexes is set when he meets Evelyn (Rachel Weisz), a sexy, edgy art student. The names Adam and Eve (Lyn) are a not so subtle reminder of the original sin that paved the way for a state of eternal hostility between the sexes and emphasizes the sometimes biblical nature of the film. Evelyn has come to strip away the pretense and false modesty which symbolizes a huge statue that has its privates hidden by a leaf out of respect for the delicate sensibility of the public. Her purpose is to spray - paint a penis on the offending leaf. Shy, uncertain Adam intervenes and she disarms him with her ready charm and gives him her phone number. She then proceeds to deface the statue as she had originally intended. This random incident sets in motion the events that will bring about a drastic and gut - wrenching change in Adam's hitherto placid, uneventfu l existence. Not much of a ladies man, Adam is flattered by Evelyn's attentions and he can hardly believe she is attracted to him; therefore he clings to her with a desperate need that is at once pathetic and touching. Soon he is putty in her hands, literally. Initially she is merely a controlling girlfriend and she badgers him into losing weight, getting a more becoming haircut, losing his glasses and wearing decent clothes. She even convinces him to alter his rather large nose with the help of surgical intervention! But soon her influence over him takes a sinister turn, as he is intoxicated by her smoldering sexuality and overpowering personality and becomes nothing more than clay in her hands to be molded as she sees fit. He comes completely under her sway as she rules over him with an iron fist gradually alienating him from his friends, Philip (Frederick Waller) and Jenny (Gretchen Mol). Adam's transformation ends with a startling twist, a shattering revelation in the climax of the film. Compelling though the film is it is marred by a number of flaws. The transition from the stage to the big screen calls for certain modifications, particularly with regard to the characters and settings that are lacking in this film. This is particularly evident in the characters, who come across as rather wooden, one - dimensional and theatrical. Weisz's twisted and frightening Evelyn is a callous, notorious schemer and her motives are transparent to the viewer from the onset. Furthermore she lacks the redeeming quality of likeability which would have served to flesh out and breathe life into her character, while taking away much of its annoying plasticity. The clever twist at the end of the plot would have had more of a sting and been more forceful if the audience had not already become inured to her brand of cold, calculating cruelty. At the beginning of the film Adam says to her, "You stepped over the line, Miss" and that is exactly what she does throughout the movie, once too of ten as it turns out. Adam's chronic naivet tends to be unconvincing at times. Rudd as Adam is alternatively endearing and exasperating. He is a little too gullible to be true. For instance he fails to exhibit even a token curiosity towards her art project, her background, friends, interests etc. However, the interesting thing about his character

CyberSecuirty Threats Essay Example | Topics and Well Written Essays - 500 words

CyberSecuirty Threats - Essay Example This compromise may include a covert computer terminal is connected to the same line through the telephone switching equipment and is then used when the legitimate user is not using the terminal. The computer cannot differentiate between the two terminals; it senses only one terminal and one authorized user (Peter & Allan, 20). A user may also improperly sign off when leaving a terminal session. Here, the intruder will find the terminal session in active state and access the user’s files as the computer believes the user is still active. The perpetrator may also use another form of piggybacking where they forward the call of the victim’s calls to the perpetrator’s phone (Peter & Allan, 120). Passwords are the other form of security verification methods implemented in computer networks and devices. With passwords, the user is required to enter secret digits or letters or both to provide access to a system or files in a system (Lynch, 401). Passwords have been in existence since long ago and are applicable in many fields such as in automated teller machines, mobile phones and computer operating systems (Peter & Allan, 70). However, passwords have been known to be cracked and as such very in strength where alphanumeric patterns of passwords offer the strongest passwords while simple letters or digits offer weak and vulnerable passwords (Peter & Allan, 80). Phishing in internet security is a form of crime that occurs in the internet. Here, deception is used to acquire someone’s or a company’s sensitive information such as their bank account details, credit card number, usernames and passwords. The culprit masquerades as a trustworthy party such as a bank or popular site (Lynch, 410). They in turn send emails or instant messages that are infected with malware and harm the unsuspecting victim. Once the message or email is opened the malware retrieves the user’s

Thursday, July 25, 2019

Strategic Assessment of Wal-Mart for an ITM class Essay

Strategic Assessment of Wal-Mart for an ITM class - Essay Example Many others are of the view that the current problems were because of Wal-Mart’s failure to incorporate state-of-the-art IS/IT technologies in its operations. Being a business technology consultant hired by Wal-Mart, I do believe that Wal-Mart is in trouble mainly because of its failure to incorporate suitable IS/IT technologies in its activities. Offline businesses are currently giving way for online businesses or e-commerce. It is important for Wal-Mart to give more attention to online businesses. â€Å"Wal-Mart has assembled a team of 70 developers, computer engineers and researchers — dubbed @WalmartLabs — in an aggressive attempt to position itself at the forefront of social and mobile commerce† (Wal-Mart: The Next Tech Giant?). However, its e-commerce platform still needs more fine tuning to attract more visitors. Just like Amazon and Google, it is better for Wal-Mart to enter into the search engine business so that it can expand its business portfolios as well as enhance its retail business. Shopperception is a new IT related technology evolved out in recent times to check the consumer behaviours and buying habits. â€Å"Shopperception recognizes the customers when they check-in and it remembers previous buying habits and can predict what the customer is likely to want on this visit† (Israel). Wal-Mart should use this technology extensively in its retail outlets to help the consumers. â€Å"The Wal-Mart network, connecting more than 2,400 stores and 100 distribution centers worldwide. At Wal-Mart, we dont implement technology for its own sake," says David Flanagin, Director of Network Engineering† (The Wal-Mart Story, p.1). From the words of David, it is evident that Wal-Mart is not much keen in using technologies to improve the efficiency of its global activities. It should be noted that efficient working of a supply chain is necessary for Wal-Mart to

Wednesday, July 24, 2019

Culture and Religion - Shrine Pilgrimage in Turkmenistan Essay - 1

Culture and Religion - Shrine Pilgrimage in Turkmenistan - Essay Example These groups find their linkage with four caliphs of Islam. Owlat people are given special respect by tribes of Turkmenistan and their property is inviolable in Turkmenistan. This status of inviolable property has strengthened the Owlat people by ensuring economic stability. Pilgrimage of shrines is the activity that kept people of Turkmenistan on the path of Islam. Despite all the banes of soviet rule on pilgrimage activities, people kept visiting the holy sites because of their emotional and spiritual attachments. After getting the independence from soviet rule, the pilgrimage activities once again flourished in Turkmenistan. Importance of holy activities and their impact on human life and on culture is discussed in detail in paragraphs to follow: Pilgrimage culture prevailed by early tribal settlement in Turkmenistan and this culture and trends were brought by â€Å"Oghuz Khan†. Turkmen follow â€Å"holy groups† known as â€Å"Owlat†. Six Owlet groups are respected according to level of their spiritual powers. These groups find their linkage with four caliphs of Islam and ultimately with Prophet (peace be upon him). Turk people started considering Owlat people for different festivals of life like, marriage, life cycle, cultivation of crops and religious guidance etc. Every important work of human life used to get started with the hands of an Owlat, for the reasons of good end. â€Å"Gonambashi† is the term used for head of a cemetery in Turkmenistan. Gonambashi is the first man buried and around him, other people of community are buried. Gonambashi was respected for its spiritual powers to help people coming to his grave. â€Å"Keramatlier† is another word used during shrine activity that means â€Å"place of miracles†. According to soviet specialists, Muslims of 20th century called themselves â€Å"half Muslims†, because of not following real teachings of Islam. Soviet rule aimed at anti religious

Tuesday, July 23, 2019

14th Amendment Research Paper Example | Topics and Well Written Essays - 2000 words

14th Amendment - Research Paper Example The 13th Amendment raises some critical questions for the lawmakers, and the 14th Amendment was drafted in order to answer these questions of law. The first question to be dealt was the citizenship of the freed slave; associated to this was whether they have the right to own property like the white. Second critical problem that needed an answer was the treatment of freed slaves by law courts of law. Other problems included treatment of rebels; the loans that were borrowed by the rebellions during the civil war, and the right of rebels to be elected for Congress. The 14th Amendment comprises of 5 sections, they deal with the citizenship, equal protection of law, due process, debt, and power of the Congress to enforce. A brief commentary of the clauses presented in the 14th Amendment along with original is provided as follows. Citizenship by place of birth was not a new law. It has bases in the centuries old English Common Law, and it followed the simple doctrine of jus soli. Until the infamous case of Dred Scott when the Supreme Court abrogated the doctrine, jus soli was a part of American Jurisprudence(Stein & Bauer, 1995). The question of jurisdiction has long been debated especially in the cases of illegal immigrants. The critics have vocalized their concern on the legitimacy of citizenship of the child born to illegal immigrants in America. Another case is of the aliens residing within America, who stay for longer period, and give birth to children in America.

Monday, July 22, 2019

Healthy foods vs. not healthy foods Essay Example for Free

Healthy foods vs. not healthy foods Essay Eating is something that we all have to do to stay alive and we do it at least three times a day. We live in a world where there are so many choices and no one but ourselves are responsible for the foods we eat. In this essay I will compare and contrast the differences between eating healthy foods instead of not so healthy foods. First I’m going to discuss the healthy foods. The two areas of healthy food I’m going to talk about are the benefits and taste. The Benefits of eating healthy foods are that our bodies stay healthy, keeps you full and satisfied longer during the day, giving you more energy through out the day and in the long run keeping us out of the doctor’s office. If you’re trying to lose weight consuming healthy foods is a start to lose weight. The taste of healthy foods is fresher and if you prepare it well the taste will satifa you but it can sometimes lack good taste if you don’t know how to prepare it. Second I’m going to discuss the benefits and taste of the not healthy foods. There is no benefit of eating food that isn’t healthy for you. When we consume foods that have no benefits we end up with all types of health problems like diabetes, heart conditions and being overweight Which all can lead to high medical bills. The taste of these kinds of food might tastes better at the moment due to all the ingredients that are in them and might cost cheaper so it becomes easier for us to consume. In the long run we are responsible for what we eat and the choices of food we buy but we should all consider the benefits it will make or not make.

Sunday, July 21, 2019

Mortuary And Anatomical Pathology Health And Social Care Essay

Mortuary And Anatomical Pathology Health And Social Care Essay The Mortuary and Anatomic Pathology unit forms part of the Pathology Department. It is linked to the Mater Dei Hospital complex via an underground service corridor through which bodies will be transported in a more dignified manner. It is also situated in an isolated part of the Mater Dei complex in order to allow for a more dignified preparation of our dear departed in the quieter part of the Hospital. The mortuary offers various other services which include: Receiving bodies from the Hospital and other institutions and sources such as the community. Preparing bodies for their funeral rites. In the mortuary, besides there being a room for preparation of bodies of people who believed in the Roman Catholic faith, there is also a room saved for preparation of bodies for people who believed in other religions and have different religious rites with regard to preparation of the dead The mortuary offers an autopsy service for the various Hospitals that require a post mortem examination. The mortuary at Mater Dei is also equipped to cater for forensic post mortem studies. In order to provide these services, the mortuary contains many facilities and machines. These facilities and machines include a cold storage, body fridges, a post mortem area and a laboratory, an embalming room and a body preparation room. Viewing rooms are also present to enable relatives and friends to pay their last respects to the departed in a more private atmosphere. There is also a Mortuary Chapel where relatives and friends can find time for moments of silence and reflection and participate in the final prayers recited just before the body is transferred to an awaiting hearse for its last voyage to the cemetery. Duties of the Scientist at the Mortuary The main duties of the scientist at the mortuary and anatomic pathology unit are the administration and management of assets and procedures available at the mortuary. These duties include: Administration: This role incorporates the logistical and scientific aspects relevant to a modern Mortuary and Anatomic pathology unit. This role also includes rendering a service to clients so it is imperative that good customer service is offered. All release forms, death certificates, general morgue forms and client information has to be documented and filed properly by the administrative staff. Post mortem examinations, which can be ordered either by the Consultant within the state Hospitals in what is known as a hospital post mortem or by the Magistrate on duty if the person died under suspicious circumstances. In this case a forensic post mortem is used. The autopsy is also essential in determining the cause of death of investigated individuals. Histology. The samples obtained from the body during the autopsy must be subjected to histopathological investigation. The samples obtained from the body during the autopsy receive the same treatment as those obtained from a living patient in an operating theatre. Other procedures such as Health and safety, procurement of specimens, chain of custody, documentation and many more procedures. The Relevance of a Post Mortem Examination. A post mortem examination is a careful examination of the departed individual. It can offer valuable clues as to how the person died as well as information regarding the illness and its effects on the body. It may also give a more precise indication with regard to how the individual died. Sometimes, even the best and most detailed post mortem examinations may not uncover the cause of death and may also leave certain questions unanswered. These investigations are usually carried out by a pathologist. A pathologist is a person who specialises in the laboratory study of disease and of diseased tissue. The pathologist is assisted by a scientist with specialist training in this particular field. Post mortems are carried out in special facilities located in the Hospital Mortuary. Post mortem examinations are a benefit to the medical profession as they provide information regarding health and illness that would not be discovered anywhere else. These examinations paved the way for both anatomical discoveries and new information regarding illnesses. Post mortem examinations help identify the cause of death of an individual, confirm the nature of the illness and also the extent of the disease and are capable of identifying other undiagnosed conditions. Another use of post mortem examinations is to assess the effects of treatments and drugs and help identify complications or side effects. A post mortem is a valuable tool for loved ones as it helps them understand why the individual died. Families can occasionally ask questions that can only be answered by information acquired from a post mortem. Some of the information obtained from a post mortem examination can benefit future children in the family and patients who suffer from similar illnesses. (Post mortem exam ination à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ information for relatives, 2007). Steps Taken to Maintain Health and Safety Standards in the Mortuary The Mortuary presents a number of health and safety risks for personnel. These risks include both health related, accidents due to working conditions and risks specific to working with human remains. These remains are a serious biohazard and are host to various pathogens and hazardous residues such as bacteria, infectious spores, infectious soft tissue and residues of military and industrial chemicals. These pathogens can be transmitted either by hand to mouth contact, contact with mucus membranes, or via the air in the autopsy room or body fluids such as blood. Additional risks to transmission of pathogens include the handling of heavy bodies and using unsanitary and unsafe equipment. The Mortuary in the Mater Dei Hospital is split into two main areas, a clean area and a dirty area. These areas are separated by a transitional zone. The dirty areas include body stores at a temperature of 4 °C. It has easy to clean, non-porous surfaces and a system of containment for any body fluids. On the other hand, the clean area consists of the viewing rooms, the chapel, offices and reception areas. It also has proper ambient climate controls to remove odours and vapours and is mainly where clean equipment is stored. Bodies, equipment and people working in these separate areas must never come into contact with one another whilst working. Also, a body should never go into the dry area before it has been properly cleaned and any soft tissue found is removed. Once the soft tissue is removed it is placed in a freezer. The rest of the human remains are then stored in a separate freezing area. It is essential that all employees working at the Mater Dei Hospital mortuary wear personal protective equipment (PPE), which is designed to help protect the scientist from serious health and safety dangers. This equipment is found in the clean transitional area located in front of the autopsy room, to enable scientists to change into their safety equipment before entering. PPE worn by a scientist in the autopsy room of the mortuary include: Overalls/scrubs (washable or disposable). It is imperative that this particular equipment be worn every day to protect the skin from any debris and body fluid which may cause infection. Latex/nitrile gloves. Nitrile gloves are used by scientists who are allergic to latex and must be worn when handling bodies or body fluids. Double gloving is the procedure Facemask. It is usually found as a visor. This is worn when cleaning bodies, clothing and artefacts and has to be regularly cleaned by the scientist using it. It prevents infection by protecting the face from splash back of body fluids. Safety goggles/glasses. These are worn to prevent any debris from coming into contact with the eye, which could lead to a potentially serious injury and possibly infection. Mortuary shoes/wellington boots. These are non-slip boots similar to those used in surgeries. They are waterproof and prevent entry of fluids. Aprons. All surgical equipment used must be sanitised and autoclaved properly after every use and has to be stored in a safe and secure cupboard when it is not being utilized. The most dangerous tool, the autopsy saw, can only be used by experienced personnel. Hands and exposed skin must be washed after the autopsy to remove any debris or body fluids of the dead individual as these may cause infections. It is also important not to touch bare skin while wearing gloves. The scientist working in the autopsy room must not touch his or her eyes, mouth or nose to prevent spread of any blood borne infections. Beyond the changing area there is also a shower which scientists can use after handling body samples. The autopsy and dissection tables are made up of stainless steel and are connected to a supply of low pressure water. This water is treated with chlorine to remove any infectious agents and is then discharged into the normal sewage system. A High Energy Particulate Air (HEPA) filter can also b e found in the autopsy room to trap any viruses or airborne bacteria from exiting the facilities and circulating into the outside air. It is essential that outside clothing not be worn in the mortuary. Extra PPE should be worn in specific areas such as the biohazard room for extra protection and when samples are being taken for deoxyribonucleic acid (DNA) analysis. Finally, the mortuary is cleaned thoroughly and disinfected every night. Working in the mortuary poses a serious health risk to scientists. Some of these potential risks include working in too hot or too cold conditions, bacterial related sickness, body fluid or tissue related sickness, lifting injuries and stress related sickness. That is why it is ensured that vaccinations for certain diseases such as tetanus, Hepatitis A and Hepatitis B ,Tuberculosis, Typhoid, Diphtheria and Rabies be accounted for in every scientist working in the autopsy room. It is essential that every new employee undergoes a health and safety briefing and that risk assessments be carried out every time a new body arrives. The mortuary staff must be briefed on the new risks found. A first aid kit has to be present along with someone who knows how to give first aid. Anyone entering the mortuary has to follow general health and safety practices. Fragmentary bone may be sharp and bodies can be heavy, therefore the staff must undergo manual handling training.

Difference Between Memory And Data Storage Computer Science Essay

Difference Between Memory And Data Storage Computer Science Essay The terms memory and data storage are often confused. Both memory and data storage are means by which a computer keeps data used to perform tasks. Both of them are measured in bytes. The term memory refers to the amount of Random Access Memory (RAM) but also includes Read-Only Memory (ROM) installed in the computer, whereas the term storage refers to the capacity of the computers hard disk. Figure 12: Difference between Memory and Data Storage For example, in figure 12, the file cabinet represents the computers hard disk, which provides storage for all the files and information we need in your office. When we come in to work, we take out the files we need from storage and put them on our desk for easy access while we work on them. The desk is like memory in the computer. It holds the information and data we need to have handy while youre working. The main difference between memory and data storage is their function. Storage is used to hold all the computers information. Data stored in the hard disk is permanent and it is not lost when the computer is turned off. When we delete a file, only the access to that file is removed, not the information itself. To permanently delete a file, the hard disk must be formatted or overwritten. It is even possible that even though a disk has been formatted, an expert can still view the information. Memory and data storage can work together. When the computer does not have enough RAM to support its processes, it converts a portion of the hard disk into virtual memory. Virtual memory acts the same way RAM does. However, since it is a part of the hard disk, using virtual memory slows the computer down. 2.2 Internal Memory and External Memory Computer internal memory is used to store data that is used by the system at startup and to run various types of programs such as the operating system. Typically, internal memory is contained on small microchips that are either attached or connected to the computers motherboard. Computer memory can range from a couple of megabytes to several gigabytes. SRAM, DRAM, and ROM are the example of internal memory. External computer memory is technically any storage device that we can connect to our computer to record data. Flash drives, HDD with USB cable, any SD card are the example of external memory. 2.3 Hierarchy of Storage Generally, the lower a storage is in the hierarchy, the lesser its bandwidth and the greater its access latency is from the CPU. This traditional division of storage to primary, secondary, tertiary and off-line storage is also guided by cost per bit. Historically, memory has been called core, main memory, real storage or internal memory while storage devices have been referred to as secondary storage, external memory or peripheral storage. 2.3.1 Primary Storage In computer memory the term primary storage or primary memory is used for the information in physical systems which function at high-speed as a difference from secondary storage. Primary storage often referred to simply as memory, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Main memory is directly or indirectly connected to the central processing unit via a memory bus. It is actually two buses, an address bus and a data bus. The CPU firstly sends a number through an address bus, a number called memory address that indicates the desired location of data. Then it reads or writes the data itself using the data bus. Additionally, a memory management unit (MMU) is a small device between CPU and RAM recalculating the actual memory address, for example to provide an abstraction of virtual memory or other tasks. 2.3.2 Secondary Storage Secondary storage or secondary memory is physical devices for program and data storage which are slow to access but offer higher memory capacity. It differs from primary storage in that it is not directly accessible by the CPU. The computer usually uses its input/output channels to access secondary storage and transfers the desired data using intermediate area in primary storage. Secondary storage does not lose the data when the device is powered down because it is non-volatile. In modern computers, hard disk drives are usually used as secondary storage and it is typically about a million times slower than memory. Some other examples of secondary storage technologies are USB flash drives, floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives. 2.3.3 Tertiary storage Tertiary storage or tertiary memory provides a third level of storage. Typically it involves a robotic mechanism which will mount and dismount removable mass storage media into a storage device according to the systems demands, these data are often copied to secondary storage before use. It is much slower than secondary storage. This is primarily useful for extraordinarily large data stores, accessed without human operators. When a computer needs to read information from the tertiary storage, it will first consult a catalog database to determine which tape or disc contains the information and then the computer will instruct a robotic arm to fetch the medium and place it in a drive. When the computer has finished reading the information, the robotic arm will return the medium to its place in the library. 2.3.4 Off-line storage Off-line storage is computer data storage on a medium or a device that is not under the control of a processing unit. The medium is recorded, usually in a secondary or tertiary storage device and then physically removed or disconnected. It must be inserted or connected by a human operator before a computer can access it again. Unlike tertiary storage, it cannot be accessed without human interaction. Off-line storage is used to transfer information. Additionally, in case a disaster like a fire destroys the original data, a medium in a remote location will probably be unaffected, enabling disaster recovery. In modern personal computers, most secondary and tertiary storage media are also used for off-line storage. Optical discs and flash memory devices are most popular, and to much lesser extent removable hard disk drives. In enterprise uses, magnetic tape is predominant. Older examples are floppy disks, Zip disks, or punched cards. 2.4 Characteristics of Storage 2.4.1 Volatility Volatile memory is computer memory that requires power to maintain the stored information and non-volatile memory is computer memory that can retain the stored information even when not powered. That is why the contents of RAM are erased when the power of the computer is turned off but ROM holds its data indefinitely. The fastest memory technologies of today are volatile ones. Non-volatile memory is suitable for long-term storage of information. 2.4.2 Mutability Read/write storage or mutable storage allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage. Read only storage retains the information stored at the time of manufacture, and allows the information to be written only once at some point after manufacture. These are called immutable storage. Immutable storage is used for tertiary and off-line storage. Examples include CD-ROM and CD-R. Slow write, fast read storage is the read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and flash memory. 2.4.3 Accessibility In random access, any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access. In sequential access, the accessing of pieces of information will be in a serial order, one after the other, therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage. 2.4.4 Addressability In modern computers, location-addressable storage usually limits to primary storage. Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, secondary, tertiary and off-line storage use files addressable systems. Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. Content-addressable storage can be implemented using software or hardware, hardware being faster but more expensive option. Each individually accessible unit of information is selected based on the basis of the contents stored there. 2.4.5 Capacity The total amount of stored information that a storage device or medium can hold is raw capacity. Memory storage density is a measure of the quantity of information bits that can be stored on a given length of track, area of surface, or in a given volume of a computer storage medium. Generally, higher density is more desirable, for it allows greater volumes of data to be stored in the same physical space. Density therefore has a direct relationship to storage capacity of a given medium. 2.4.6 Performance Latency is a measure of time delay experienced in a system, the precise definition of which depends on the system and the time being measured. The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency, and in case of sequential access storage, minimum, maximum and average latency. In communication networks, such as Ethernet or packet radio, throughput or network throughput is the average rate of successful message delivery over a communication channel. In computer data storage, throughput is usually expressed in terms of megabytes per second, though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput. 2.5 Fundamental Storage Technologies The most commonly used data storage technologies are semiconductor, magnetic, and optical, while paper still sees some limited usage. Some other fundamental storage technologies have also been used in the past or are proposed for development. 2.5.1 Semiconductor Semiconductor memory is an electronic data storage device, often used as computer memory, implemented on a semiconductor-based integrated circuit. A semiconductor memory chip may contain millions of tiny transistors or capacitors. It is made in many different types and technologies. Semiconductor memory has the property of random access, which means that it takes the same amount of time to access any memory location. Semiconductor memory also has much faster access times than other types of data storage. A byte of data can be written to or read from semiconductor memory within a few nanoseconds, while access time for rotating storage such as hard disks is in the range of milliseconds. For these reasons it is used for main computer memory or primary storage, to hold data the computer is currently working on, among other uses. 2.5.2 Magnetic Magnetic storage uses different patterns of magnetization on a magnetically coated surface to store information. Magnetic storage is non-volatile. The information is accessed using one or more read/write heads which may contain one or more recording transducers. A read/write head only covers a part of the surface so that the head or medium or both must be moved relative to another in order to access data. 2.5.3 Optical Optical storage is a term from engineering referring to the Storage of data on an optically readable medium. Data is recorded by making marks in a pattern that can be read back with the aid of light, usually a beam of laser light precisely focused on a spinning disc. An older example, that does not require the use of computers, is microform. 2.5.4 Paper Paper data storage refers to the use of paper as a data storage device. This includes writing, illustrating, and the use of data that can be interpreted by a machine or is the result of the functioning of a machine. Paper data storage, typically in the form of paper tape or punched cards, has long been used to store information for automatic processing, particularly before general-purpose computers existed. Information was recorded by punching holes into the paper or cardboard medium and was read mechanically to determine whether a particular location on the medium was solid or contained a hole Apr 14 2 Computer Organization and Architecture Facebook Twitter Google Tumblr Computer Memory Chapter 1: Introduction to Computer Memory Figure 1: An Imaginary Computer Memory To know about the detail of computer memory, first of all we should know what is memory? and then what is computer memory?. As we know the memory is a power to remember things. In psychology, memory is the process by which information is encoded, stored, and retrieved. But in computing, memory refers to the physical devices used to store programs or data on a temporary or permanent basis for use in a computer or other digital electronic device. Computer data storage, often called storage or memory. It is a core function and fundamental component of computers. A computers memory can be said as a list of cells into which numbers can be placed or read. Each cell has a numbered address and can store a single number. In almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits. A bit is the basic unit of information in computing and telecommunications. A bit can have only two values, either 1 or 0. Eight bits form a byte. Each byte is able to represent 256 different numbers either from 0 to 255 or à ¢Ã‹â€ Ã¢â‚¬â„¢128 to +127. To store larger numbers several consecutive bytes typically two, four or eight may be used. When negative numbers are required they are usually stored in tows complement notation which is a mathematical operation on binary numbers. A computer can store any kind of information in memory if it can be represented numerically. The information stored in memory may represent practically anything. Letters, numbers, even computer instructions can be placed into memory with equal ease. A computer consists of at least one processing element, typically a central processing unit (CPU) and some form of memory. Since the CPU does not differentiate between different types of data, it is the softwares responsibility to give significance to what the memory sees as nothing but a series of numbers. Modern computers have billions or even trillions of bytes of memory. In computer architecture, the CPU contains a special set of memory cells which is called registers. A processor register can be read and written too much faster than the main memory area. Registers are used for the most frequently needed data items to avoid having to access main memory every time data is needed. 1.1 First Computer Memory The first computers were often very large, usually as big as a desk or even a room and had minimal processing capability. These early computers were built to work on specific problems or solve certain types of equations and not much more. The first computers used punch cards for input and had very limited memory for processing. The average memory in the first computers was between three and forty five kilo-bits Memory was used to store data in the processing of linear equations, and the results were then printed in binary. When compared to the computers available today, the first computers do not seem very technologically advanced, but at the time they were created these first computers were engineering masterpieces. Many of the concepts created when building early computers are still in use in modern computing technology. The Atanasoff Berry Computer (ABC) credited with being the very first computer. The ABC had a whopping 3000 bits of memory which allowed it to process sixty items at one time. Other early computers had more memory. Some has high as forty five kilobits, which allowed them to process several more words of data in a shorter amount of time increasing the overall processing speed of the system. Without the first computers and their ability to make simple calculations, the technology we use today might not be as advanced as it has become. 1.2 History of Computer Memory In 1940s memory technology mostly permitted few bytes capacity. The first electronic programmable digital computer the ENIAC (ElectronicNumericalIntegratorandComputer) using thousands of octal base radio vacuum tubes. In electronics, a vacuumtube is a device controlling electric current through a vacuum in a sealed container. The ENIAC could perform simple calculations involving 20 numbers of ten decimal digits which were held in the vacuum tube accumulators. The next significant advance in computer memory delaylinememory. It was a form of computer memory used on some of the earliest digital computers. Like many modern forms of electronic computer memory, delay line memory was a refreshable memory but it was opposed to modern random access memory. Delay line memory was sequential access. Delay lines could store bits of information within a quartz and transfer it through sound waves propagating through mercury. Delay line memory would be limited to a capacity of up to a few hundred thousand bits to remain efficient. In 1946 two alternatives to the delay line, the Williams tube and Selectron tube, both using electron beams in glass tubes for storage. The Williams tube would prove more capacious than the Selectron tube because the Selectron was limited to 256 bits, while the Williams tube could store thousands. It was also less expensive than Selectron tube. To find non-volatile memory Jay Forrester, Jan A. Rajchman and An Wang developed magnetic core memory in the late 1940s. It was allowed for recall of memory after power loss. Magnetic core memory would become the dominant form of memory until the development of transistor-based memory in the late 1960s. 1.2. 1 Historical Development of Computer Memory Computer memory is much more than DRAM or Flash. It has come a long way up until the origins of todays omnipresent memory technologies. If we take it more than 160 years back in time and revisit the milestones of computer memory technology then products we may have never heard of. 1.2.1.1 Punch Cards Figure 2: Punch Cards Apunched card is a piece ofstiff paper that contains digital information represented by the presence or absence of holes in predefined positions. Earlydigital computers used punched cards as the primary medium for input of bothcomputer programs anddata. In 1837 Charles Babbage first purposed the Analytical Engine, which was the first computer to use punch cards as memory and a way to program the computer. Punch cards also known as Hollerith cardsand IBM cardsare paper cards containing several punched holes that where originally punched by hand and later by computers that represent data. Hollerithspunchcardsused in the 1890 census had round holes, 12 rows and 24 columns. The IBMpunchedcard designed in 1928, had rectangular holes, 80 columns with 12 punch locations and each one character to each column. So 80 x 12 = 960, this gives us a maximum capacity of 960 bits or 125 bytes of data. The use of punch cards predates computers. They were used as early as 1725 in the textile industry f or controlling mechanized textile looms. From the 1900s, into the 1950s, punched cards were the primary medium for data entry,data storage, and processing in institutional computing. As of 2012, some voting machinesstill utilize punched cards to input data. During the 1960s, the punched card was gradually replaced by magnetic tape. 1.2.1.2 Drum Memory Figure 3: DrumMemory Drummemory is an obsolete magnetic data storage device. A drum is a large metal cylinder that is coated on the outside surface with a ferromagnetic recording material. It could be considered the precursor to the hard disk platter, but in the form of a drum rather than a flat disk. In most cases a row of fixed read-write heads runs along the long axis of the drum, one for each track. The drums of the Atanasoff-Berry Computer stored information using regenerative capacitor memory. Regenerativecapacitormemory is a type of computer memory that uses the electrical property of capacitance to store the bits of data. A difference between most drums and a modern hard disk drive is that on a drum there was a track per head so that the heads do not have to move to the track to access data. Head per track disks were used mostly for paging. Particularly while drums were used as main working memory, programmers often took to positioning code onto the drum in such a way as to reduce the amount of t ime needed to find the next instruction. In 1932 Austrian IT engineer Gustav Tauschek invented the first widely used computer memory, called drum memory. In 1942 John Atanasoff successfully tests the Atanasoff-Berry Computer (ABC) which was the first computer to use regenerative capacitor drum memory. It was widely used in the 1950s and 60s as the main working memory of computers. Tauscheks original drum memory had a capacity of about 500,000 bits or 62.5 kilobytes. One of the early mass-produced computers, IBM 650, had about 8.5 kilobytes of drum memory, which in a later model was doubled to about 17 kilobytes. Some drum memories were also used as secondary storage. Drums were later replaced as the main working memory by memory such as core memory. 1.2.1.3 Williams Tube Figure 4: Williams Tube Freddie Williams applies for a patent on his cathode-ray tube (CRT) storing device in 1946. The device that later became known as the Williams tube or Williams- Kilburn tube. It was used as a computer memory to electronically store binary data. It was the first random-access digital storage device. The Williams tube depends on an effect called secondary emission. When a dot is drawn on a cathode ray tube, the area of the dot becomes slightly positively charged and the area immediately around it becomes slightly negatively charged, creating a charge well which is unable to convert to another type of energy. The charge well remains on the surface of the tube for a fraction of a second, allowing the device to act as a computer memory. The charge well lifetime depends on the electrical resistance of the inside of the tube. By drawing a second dot immediately next to the first one the dot can be erased. Information is read from the tube by means of a metal pickup plate that covers the face of the tube. Each time a dot is created or erased, the change in electrical charge induces a voltage pulse in the pickup plate. There is no practical restriction in the order of positions so it is called à ¢Ã¢â€š ¬Ã‚ ³random-accessà ¢Ã¢â€š ¬Ã‚ ³ nature of the lookup. Reading a memory location creates a new charge well, destroying the original contents of that location, and so any read has to be followed by a write to reinstate the original data. Since the charge gradually leaked away, it was necessary to scan the tube periodically and rewrite every dot. Some Williams tubes were made from radar-type cathode ray tubes with a phosphor coating that made the data visible. Each Williams tube could store about 512-1024 bits of data. 1.2.1.4 Selectron Tube Figure 5: Selectron Tube Between 1946 and 1953 Jan Rajchman begins his work on developing the Selectron tube. The original 4096-bit Selectron was a large, 5 inch by 3 inch vacuum tube with a cathode running up the middle, surrounded by two separate sets of wires forming a cylindrical grid, a dielectric material outside of the grid, and finally a cylinder of metal conductor outside the dielectric, called the signal plate. The smaller capacity 256-bit system was constructed similarly, but built in a planar fashion rather than cylindrical,resulting in an even larger vacuum tube. The device used an indirectly heated cathode running up the middle, surrounded by two separate sets of wires and offered a storage capacity of 4096 bits to 256 in the proposed production device. The Williams tube was an example of a general class of cathode ray tube (CRT) devices known as storage tubes. The primary function of a conventional CRT is to display an image by lighting phosphor using a beam of electrons fired at it from an el ectron gun at the back of the tube. Like the Williams Kilburn tube, the Selectron was also a random access storage device. Because of the popularity of magnetic core memory at the time, the Selectron tube was never put into mass production. 1.2.1.5 Magnetic-core Memory Figure 6: Magnetic-core Memory Second major milestone in modern computer memory technology was magnetic core memory which was widely adopted. Core memory or magnetic core memory became a widespread form of random-access memory, relying on an array of magnetized rings and was invented in 1947 and developed up until the mid-1970s. It is said to be non-volatile and will not lose its contents when the power is removed. The term core comes from conventional transformers whose windings surround a magnetic core. The basic principle of core memory was using a core as a ring of ferrite that could be magnetized in one of two directions. As a result, the memory was able to store digital information either a 1 or 0. In core memory the wires pass once through any given core, they are single turn devices. The core can take two states, encoding one bit, which can be read when selected by a sense wire. When the core is read, it is reset to a zero which is known as destructive readout. Circuits in the computer memory system then r estore the information in an immediate re-write cycle. Magnetic core memory was initially very expensive to fabricate but prices dropped as the market developed. It was the standard form of memory system until displaced by solid-state memory in integrated circuits, starting in the early 1970s. 1.2.1.6 Random access Memory Figure 7: Random access Memory Random-access memory (RAM) is a form of computer data storage. A random-access device allows stored data to be accessed directly in any random order. Today, random-access memory takes the form of integrated circuits which is a set of electronic circuits on one small plate or chip of semiconductor material, normally silicon. One distinguishing characteristic of RAM is that it is possible both to read data from the memory and to write new data into the memory easily and rapidly. Both the reading and writing are accomplished the use of electrical signals. The other distinguishing characteristic of RAM is that it is volatile. A RAM must be provided with a constant power supply. If the power is interrupted, then the data are lost. Thus, RAM can be used only as temporary storage. The three main forms of modern RAM are static RAM (SRAM), dynamic RAM (DRAM) and phase-change memory (PRAM). In SRAM, a bit of data is stored using the state of a flip-flop. This form of RAM is more expensive to produce but is generally faster and requires less power than DRAM. In modern computers, it is often used as cache memory for the CPU. DRAM stores a bit of data using a transistor and capacitor pair which together comprise a memory cell. The capacitor holds a high or low (0 or 1) charge and the transistor acts as a switch that lets the control circuitry on the chip read the capacitors state of charge or change it. Phase-change memory is also known as PRAM, is a type of non-volatile random-access memory. PRAM can offer much higher performance in applications where writing quickly is important, both because the memory element can be switched more quickly and also because single bits may be changed to either 1 or 0 without needing to first erase an entire block of cells. PRAMs high performance, thousands of times faster than conventional hard drives, makes it particularly interesting in nonvolatile memory roles that are currently performance-limited by memory access timing. ECC memory, which can be either SRAM or DRAM, includes special circuitry to detect or correct random faults or memory errors in the stored data, using parity bits or error correction code. A parity bit or check bit is a bit added to the end of a string of binary code that indicates whether the number of bits in the string with the value one is even or odd. Parity bits are used as the simplest form of error detecting code. In information theory and coding theory with applications in computer science and telecommunication, error detection and correction or error control are techniques that enable reliable delivery of digital data over unreliable communication channels. Many computer systems have a memory hierarchy consisting of CPU registers, on-die SRAM caches, external caches, DRAM, paging systems and virtual memory or swap space on a hard drive. This entire pool of memory may be referred to as RAM by many developers. 1.2.1.7 Read Only Memory Figure 8: Read Only Memory Read-only memory (ROM) is a class of storage medium used in computers. Data stored in ROM cannot be modified, or can be modified only slowly or with difficulty. It is really only suitable for storing data which is not expected to need modification for the life of the device. When only a small number of ROMs with particular memory content is needed, a less expensive alternative is the programmable ROM (PROM). Like the ROM, the PROM is nonvolatile and may be written into only once. For the PROM, the writing process is performed electrically and may be performed by a supplier or customer at a time later than the original chip fabrication. Special equipment is required for the writing or programming process. Another variation on read only memory is the read mostly memory, which is useful for applications in which read operations far more frequent than write operation but for which nonvolatile storage is required. There are three common forms of read mostly memory, they are EPROM, EEPROM and flash memory. The optically erasable programmable read only memory (EPROM) is read and written electrically, as with PROM. However, before a write operation, all the storage cells must be erased to the same initial state by exposure of the packaged chip to ultraviolet radiation. Erasure is performed by shining an intense ultraviolet light through a window that is designed into the memory chip. This erasure process can be performed repeatedly. It has the advantage of the multiple update capability. A more attractive form of read mostly memory is electrically erasable programmable read only memory (EEPROM). This is a read mostly memory that can be written into at any time without erasing prior contents, only the byte or bytes addressed are update. The write operation takes considerably longer than the read operation, on the other of several hundred microseconds per byte. The EEPROM combines the advantage of nonvolatility with the flexibility of being updatable in place, using ordinary bus control, address, and data lines. It is suppor

Saturday, July 20, 2019

Cold War Essay -- essays research papers

After World War II, Stalin did not remove his troops from Eastern Europe as he pledged he would in the Yalta Agreement. Instead, he setup â€Å"puppet governments† which did exactly as Mother Russia stated. To protect it’s interests for national security, the American Dream, and the belief that all people should have the right to a democratic life, complete with liberty, equality, and a representative government. Also playing a large part in Cold War tensions was the US interest in protecting its profitable foreign markets. The spread of communism challenged every one of these US aim’s, and therefore the US became convinced it had to stop this spread. The deliberate opposition to the spread of communism to capital countries is known as containment, which the US adopted in the late 1940’s. The US believed it must do everything in its power to uphold containment and save it’s peoples way of life. Another theory that soon surfaced that was related to t he containment theory was the domino theory, which stated that as one small country fell to communism, surrounding small countries would also fall to communism rapidly.   Ã‚  Ã‚  Ã‚  Ã‚  In the spirit of containment, strongly supported by President Harry Truman, was the main driving force behind the Korean War. Along with containment as a force was American Pride. After World War II and after Japanese occupation, Soviet troops moved in to North Korea, and the US moved in to South Korea. Each setup and supported its own go...

Friday, July 19, 2019

Vaccine Essay -- Medicine, Autism

This research paper consists of varying information coming from four published articles found on the internet related to whether the MMR vaccine causes Autism in children or not. According to the article MMR Vaccine (2010) in Black's Medical Dictionary, 42nd Edition there have been several studies and experiments performed and until this day, there is no direct link between the MMR Vaccine and Autism. Other researchers such as Robert M. Youngson (2004, 2005), who wrote in the Collins Dictionary of Medicine that: â€Å"No association has been demonstrated between autism and the use of the MMR vaccine.† (Youngson, 2004) An editorial by Stephen I. Pelton, published on March 15, 2010, in the Family Practice News Magazine stated he was happy that THE LANCET took back the paper written by Dr. Andrew J. Wakefield in 1998, which explained a relationship between the MMR vaccine and autism. According to Michelle Meadows writer of an IOM report titled â€Å"No Link Between Vaccines and Autism† the evidence did not show an association between the MMR vaccine and autism. (Meadows, 2004) Word Bank: MMR: Measles Mump Rubella Dr: Doctor IOM: Institute of Medicine Controversy between MMR Vaccination and It’s Possibility of Causing Autism in Children. Many authors have conducted research and experiments to prove the point that there is no direct link between the MMR vaccine and Autism. Newspapers, magazines, books, encyclopedias, and dictionaries all have articles written by authors who suggest that there are links and relationships between the MMR vaccine and Autism and then there are many who say there is no link. In order for one to fully understand the meaning of the vaccine, the uses, ... ... such as Robert M. Youngson (2004, 2005) who wrote in the Collins Dictionary of Medicine that: â€Å"No association has been demonstrated between autism and the use of the MMR vaccine.† (Youngson, 2004) An editorial by Stephen I. Pelton, published on March 15, 2010, in the Family Practice News Magazine stated he was happy that ‘THE LANCET’ took back the paper written by Dr. Andrew J. Wakefield in 1998, which explained a relationship between the MMR vaccine and autism. According to Michelle Meadows writer of an IOM report titled â€Å"No Link Between Vaccines and Autism† the evidence did not show an association between the MMR vaccine and autism. (Meadows, 2004) To sum it all up, PARENTS do not feel misinformed. The Measles, Mumps, and Rubella vaccination combination does not cause autism nor does the thimerosal additive for preservation cause autism.

Importance of Memory Color Essay -- Color Sight Vision Neuropsychology

Importance of Memory Color One of the most influential aspects on the quality of our lives is color. We use our perception of color every day. Without color we could not see traffic signals or enjoy sunsets, and learning techniques would be much more difficult. Color is an important function that signals and helps facilitate perceptual organization. Memory color is a phenomenon in which an object's characteristic color influences our perception of its color. The study of what colors will maximize memorization skills is important for many reasons. Human beings rely on color to keep order in our lives. Traffic signals, warning signs, and many other signals require perception of color in order to be effective. Without the use of color our world would become chaotic. Finding the colors that are most effective on memorization would increase safety and order in our lives. Also, finding the colors that best stimulate memorization could increase study skills in students, especially those with learning disabilities. Th e use of memory color could also be used in areas of business such as retail to optimize sales by using colors that are most familiar to people, and will therefore grab their attention. Furthering the study of the effect of color on memory would be beneficial in many areas. Our lives are kept in order by numerous signs, signals, and devices that provide instruction and precautions. We are constantly adapting these devices in ways that will increase our awareness of their function. Naor (2001) found that color knowledge interacts with object representation in many levels, depending upon the access level that is triggered by the stimulus. Therefore, using colors in signs and signals that are more familiar to people w... ...9 Goolsby, B. A., & Suzuki, S. (2001). Understanding priming of color-singleton search: Roles of attention at encoding and retrieval. Perception and Psychophysics Vol. 63(6), 929-944 Johnson, B. D., Altmaier, E. M.; & Richman, L.C. (1999). Attention Deficits and Reading Disabilities: Are Immedeate Memory Defects Additive? Developmental Neuropsychology, Vol 15(2), 213-227 Kido, M. (2000). Bio-psychological effects of color. Journal of International Society of Life Info. Science, Vol 18(1), 254-262 Naor Raz, G. (2001). Understanding the role of color object representation; Evidence for multiple levels of interaction. Robinson, G., & Cipolotti, L. (2001). The selective preservation of colour naming in semantic dementia. Neurocase Special Issue: Vol 7(1), 65-75 Tavussoli, N. T. (2001). Color memory and evaluations for alphebetical and logographic brand Importance of Memory Color Essay -- Color Sight Vision Neuropsychology Importance of Memory Color One of the most influential aspects on the quality of our lives is color. We use our perception of color every day. Without color we could not see traffic signals or enjoy sunsets, and learning techniques would be much more difficult. Color is an important function that signals and helps facilitate perceptual organization. Memory color is a phenomenon in which an object's characteristic color influences our perception of its color. The study of what colors will maximize memorization skills is important for many reasons. Human beings rely on color to keep order in our lives. Traffic signals, warning signs, and many other signals require perception of color in order to be effective. Without the use of color our world would become chaotic. Finding the colors that are most effective on memorization would increase safety and order in our lives. Also, finding the colors that best stimulate memorization could increase study skills in students, especially those with learning disabilities. Th e use of memory color could also be used in areas of business such as retail to optimize sales by using colors that are most familiar to people, and will therefore grab their attention. Furthering the study of the effect of color on memory would be beneficial in many areas. Our lives are kept in order by numerous signs, signals, and devices that provide instruction and precautions. We are constantly adapting these devices in ways that will increase our awareness of their function. Naor (2001) found that color knowledge interacts with object representation in many levels, depending upon the access level that is triggered by the stimulus. Therefore, using colors in signs and signals that are more familiar to people w... ...9 Goolsby, B. A., & Suzuki, S. (2001). Understanding priming of color-singleton search: Roles of attention at encoding and retrieval. Perception and Psychophysics Vol. 63(6), 929-944 Johnson, B. D., Altmaier, E. M.; & Richman, L.C. (1999). Attention Deficits and Reading Disabilities: Are Immedeate Memory Defects Additive? Developmental Neuropsychology, Vol 15(2), 213-227 Kido, M. (2000). Bio-psychological effects of color. Journal of International Society of Life Info. Science, Vol 18(1), 254-262 Naor Raz, G. (2001). Understanding the role of color object representation; Evidence for multiple levels of interaction. Robinson, G., & Cipolotti, L. (2001). The selective preservation of colour naming in semantic dementia. Neurocase Special Issue: Vol 7(1), 65-75 Tavussoli, N. T. (2001). Color memory and evaluations for alphebetical and logographic brand

Thursday, July 18, 2019

Assess the usefulness of Marxist approach to an understanding of crime and deviance’ Essay

There are numerous Marxist theories that help us to understand crime and deviance in different ways, however they are all based around the same ideas. They believe capitalism causes crime in three different ways including, selective law enforcement, criminogenic capitalism and ideological nature of the law. Traditional Marxists believe that crime is inevitable in all societies because capitalism is criminogenic suggesting that it is societies very nature that causes crime. According to traditional Marxists society causes capitalism in different ways. One of which is due to poverty. The lack of social mobility means that people find it difficult to move up the social classes . And therefore those in poverty that cannot afford necessities such as food result in utilitarian crimes (crimes with a purpose) for example theft In order to survive. Another way that capitalism causes crime is due to capitalism advertising products encouraging the false need and desire for consumer goods. A false need makes an individual believe that they need a product when in reality they don’t, for example cars, phones etc. They can achieve this through the media for example TV advertisements and billboards, because people believe this is what they need if they cannot afford it legitimately then they may turn to crime. Thirdly capitalism can cause crime through alienation (individuals feeling isolated from the rest of society) as a lack of control of their lives may lead to crimes of violence and other non utilitarian crimes without a purpose for example domestic violence etc. This could occur whereby a partner feels frustrated with his social position and therefore takes it out on members of the family etc. Finally capitalism encourages a dog-eat-dog world therefore regardless of social class people always want more. This leads to crimes from all different classes. The wealthy commit crimes such as fraud and tax invasion, statistics just don’t show this as much. David Gordon 1976 explained this as he said crime is a rational response to the capitalist system and is found in all social classes, even though statistics make it look as though it is concentrated amongst the working class. Here David Gordon is explaining that crime is just a response to the way society is run, that it is the capitalist structure of society that creates these crimes, and that even though statistics represent more working class as the criminals, in reality all classes are guilty of crime. Traditional Marxists also proposed the theory that law making and law enforcement can have an effect on crime in society as law making and enforcement serves the interests of the capitalist class. The ruling class have the power to change laws, prevent laws and enforce laws. An example of when we have seen how quickly laws can be enforced by the ruling class was during the summer riots in 2011 when laws were quickly passed through parliament to give police powers to force individuals to remove headwear. This shows that it is the ruling class that have power and therefore laws are based on the ruling class views not considering the working class opinions. As well as this Marxists also argue that certain types of crime are likely to be dealt with more rigorously than others. For example street crimes such as assault and theft are more likely to be pursued by the police than white collar crimes such as fraud. The English government have only made some attempts to deal with white collar crimes however the USA targets the offence more seriously. As well as this certain groups are more likely to be on the receiving end of law enforcement. For example in inner city areas the police patrol more therefore working class are more likely to get caught because working class are more likely to live in the city. David Gordon argues that the selective enforcement of the law benefits capitalism in three main ways. By punishing the working class which protects the capitalist system which is responsible for the crime. As well as defining individuals as ‘social failures’ directing the blame away from the system. And thirdly defining criminals as ‘animals’ and ‘sick’ for example, justifying putting them in prison. Keeping these individuals out of the public eye allows us to forget why the crime occurred needed to help us solve the problems. Traditional Marxists also explore the ideological nature of the law; this function is valuable in allowing the ruling class to maintain their position of wealth. This process is what Althusser named the ideological state apparatus. This includes the school and the variety of forms of media, and it is through these that the ruling class is able to socialise individuals into accepting ruling class ideology. ISAs are responsible for promoting ruling class values of self interest and competition and as a result create a society in which basic values support the capitalist political and economic system. Marxists also believe that crime and the law can perform an ideological function by essentially brain washing individuals. For example some laws may appear to benefit the working class for example the health and safety laws at work, but these, according to a Marxist FrankPearce are only there to benefit the capitalists by ensuring a fit and healthy work force. In addition to this by prosecuting a large proportion of the working class it makes it look like the capitalists are caring for its citizens, it also helps divide the working class so many blame each other for crime rather than capitalism. There are many positives and negatives of traditional Marxist theory in helping us to understand crime and deviance. A large strength is that the theory successfully explains how crime cuts across all social class lines, as it shows evidence of all classes committing crimes. Therefore it is a macro-theory and can be applied to the whole of society making it generalisable. Another strength is that there is a lot of evidence to show the presence of law enforcement, for example it was illustrated through news showing law making over night during the summer riots. However weaknesses of the theory include the fact that the Marxism view underestimates the free will of a criminal by blaming the system, it is too deterministic by over predicting the amount of crime present especially in the working class. Not all those in poverty are committing crime and would never turn to committing crime. Marxism does not explore this factor efficiently. Another weakness is that it largely ignores the relationship between crime and important non class based inequalities for example gender and ethnicity. Neo-Marxists who are considered new Marxists support some traditional Marxists views however some views vary and It is important to explore these different views in order to understand crime and deviance. Neo Marxists focus on ideology. So where by traditional Marxist Althusser believed in brain washing. A Neo-Marxist Antonio Gramsi came along and put forward the ideas that people do realise they’re being exploited. He presented us with the term relative autonomy of the state (self power and self control) and put forward the ideas that people do realise they’re being exploited. Another New-Marxist theorist Taylor et all challenged the Marxist theory by stating that workers are not driven to crime through economic necessity. They believe that this theory was too deterministic and doesn’t question an individual’s free will. They also go against the interactionist theory and state that young males do not commit crime because they have been labelled. As well as challenging the sub cultural theory by arguing that young males do not commit crime because they are part of a subculture. Instead Taylor suggested his own theory as to why people are lead to committing crimes. He states that people commit crime often because they are angry at capitalism. They express their anger through crime rather than politics. This suggests that individuals are committing crimes on the basis of being frustrated with the structure of society that they live in and express this frustration through committing crimes, maybe because they don’t feel they will ever be heard through politics etc due to the ruling class having power? Taylor put forward the new criminology theory: a fully social theory of deviance. This includes six main parts. Firstly, the wider origins of the deviant crime. This is in the unequal distribution of wealth and power in capitalist society. A strength of this is that it doesn’t look at a micro situation, it looks at the whole of society. Secondly, the immediate origins of the deviant crime, this is the particular context in which the individual decides to commit the act. For example in the summer riots people looting due to the immediate origins being anger due to recession, cuts in public benefits of society being closed down for example youth clubs and libraries. Thirdly the act itself and its meaning for the individual e.g. rebellion against capitalism. Fourthly, the immediate origins of social reaction, so the reactions of those around the deviant, for example the police and the family and their reactions to discovering deviance. Next are the wider origins of social reaction in the structure of capitalist society, questioning who has the power to define actions as deviant? And lastly the effects of labelling on the deviants future actions, for example getting a job. A strength of the Neo-Marxism theory is that critical criminology has forced sociologists to look at the wider social, economic and political factors and it has offered a new approach to how crime is shaped by the individual’s actions within an unfair criminal justice system. However a weakness of the theory is that it is too general to explain crime and to idealistic to be useful in tackling crime. There are numerous similarities and differences between traditional Marxists and neo-Marxists which are useful in helping us to understand crime and deviance. Similarities include the fact they see capitalist society based on inequalities between the social classes and this is a key to understanding crime. They both agree that the state makes laws and enforce laws in the interests of the capitalist class which is important when considering how classes are represented within decisions of the law and how these decisions can have a different effect on both classes. And they both believe that to prevent crime capitalism should be replaced by a classless society. However differences between the theories are that neo-Marxists believe that criminals are not passive puppets who’s behaviour is shaped by capitalism this is important in assessing how valuable the Marxist theory is as it puts forward the idea that although a criminogenic capitalist society does effect crime and deviance there are other factors as well. Another difference is that Neo-Marxists use interactionist ideas to see how the behaviour of the victim, offender, media and criminal justice system all interact to influence how the situation developed. Therefore this too exploring other possibilities as to why the crime was committed. Overall the Marxist theory as whole is valuable in explaining why crime is committed as it looks at the problems in society as to why individuals within our society commit crime. It explores how the very nature of our society can cause these crimes by looking at all different perspectives for example through the criminal justice system, poverty, media and advertising etc. It also has explanations for both utilitarian and non utilitarian crimes and can be applied to the whole of society as it also explores white collar crime and not just crimes committed by the working class. Therefore the fact that it is a macro-theory makes it very useful as it is easily generalised. Overall the theory as a whole is very strong in helping our understanding as why crime exists.