Wednesday, January 22, 2020

Gatsby and the American Dream Essays -- The Great Gatsby F. Scott Fitz

The American Dream is what we all aspire to achieve. The idea of starting off with nothing and to become something has caused millions of people from all corners of the world to immigrate to this country for over 300 years. However, what exactly is the American Dream? F Scott Fitzgerald answers this question within his novel The Great Gatsby. Through the eyes of Nick Carraway, Fitzgerald analyses the high class of the 1920s and reveals that the American Dream has been distorted from a pure ideal of security into a convoluted scheme of materialistic power. Fitzgerald incorporates the aspects of both the Ã’old dreamÓ & the Ã’new dreamÓ in his tragic story to depicts how the inflexible dream has been corrupted and lost forever.   Ã‚  Ã‚  Ã‚  Ã‚  Fitzgerald illustrates in The Great Gatsby that the qualities of the original dream are perseverance and hope. The most glorified of these characteristics is that of success against all odd. The ethic of hard work can be found in the life of the young James Gatz. His focus on becoming a great man is thoroughly depicted in his Ã’Hopalong CassidyÓ journal. When Mr. Gatsby showed the tattered book to Nick, Mr. Gatsby said, Ã’Jimmy was bound to get ahead. He always has some resolves like this or something. Do you notice what heÕs got about improving his mind? He was always great for thatÓ. The Ã’Hopalong CassidyÓ symbolizes the continual struggle for self-improvement, which has been the basis of America a land of opportunity. Social Classes have always been apparent in civilization and America in the 1920s is no exception. Often those who rank in the lower classes usually feel that their problems will be resolved if they gain enough wealth to reach the upper class. This then offers a false connotation that the American Dream is this passage into to high social status and upon reaching that level, you are then able to abandon all economic worries. However, the American Dream involves more than acquiring wealth and a high social status. The dream involves attaining a balance between the spiritual strength and the physical strength of an individual. In the end of this book Jay GatsbyÕs ultimate goal to have Daisy love him never comes to fruition solely because he chooses to pursue his dream by engaging in a lifestyle of high class. The product of hard work is the longing Jay Gatsby, who contains the purest chara... ...umanityÓ: Ã’So we beat on, boats against the current, borne back ceaselessly into the pastÓ. The dream is now completely gone without a possibility of being resurrected. Through unfolding events of a doomed romance, F Scott Fitzgerald also depicts the inevitable doom of the American Dream. Gatsby had no balance to the extremes of his material and spiritual sides of himself. His dream of winning over DaisyÕs love is masked by the desire to become rich. Fitzgerald created Gatsby to show the failure of the individual who believes the American Dream requires money. It is well documented America was to be a land of endless opportunity and wealth, however a nation needs more depth than itÕs promise of materialism. The true composition of a nation is the unity of its peopleÕs minds in order to achieve a universal acceptance. Fitzgerald uses Gatsby and the other characters to convey his message- The American Dream, once a pure and noble concept is now dead and buried into the ground by a dehumanized void which revolves around money. Perhaps the book is not a tribute to a man named Jay Gatsby, rather, a tribute of an a noble aspiration of realistic success which is now and forever gone.

Tuesday, January 14, 2020

M11Cde Skills-Based Assessment

School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submissi on will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5.If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note:As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicati ng that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted.Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each s ubnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN.Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 16 8. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses.The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 |Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4.Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee).From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer – it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |192. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 1 68. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-half of the IP address numbers of the subnet assigned for the L AN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97——–192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104——–192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65——–192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72——–192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1)IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords r espectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS – Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs correct but not applied to correct interface or direction [7 – 9] 3. ACLs attempted but some errors or wrong placement [4 – 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0]ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are p ermitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANsThis step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 â €“ 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get started! Router>enable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password ciscoEDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH>en Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-rout er)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# EDINBURGH>show host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN – unknown, EX – expired, OK – OK, – revalidate temp – temporary, perm – permanent NA – Not Applicable None – Not definedHost Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17 . 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH> [pic] [pic] [pic] EDINBURGH#show r Building configuration†¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip address shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172 . 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! endEDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if )#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by consoleEDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password ciscoEDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password c isco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config tEnter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK ]EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode accessEDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)

Sunday, January 5, 2020

Effective Leadership Ellen Degeneres Principles Of...

Effective Leadership-Ellen DeGeneres Shari Kjos BUS 119-Principles of Personal Organizational Leadership Instructor: Chris Crites November 12, 2016 As human beings the vast majority of us wish we could change the world, whether that be helping humans, animals, the environment, it is helping those that cannot help themselves. However, we also realize to help with these causes it takes money and for the most part a great deal of it. But, some people are fortunate enough and can help change the lives of many. That is what Ellen DeGeneres has done with her leadership skills, guidance, celebrity status and wealth. Through her kind heart and passion for the social good she does everything she can to make the world a better place. It is true that money can certainly help in spanning social good, however, multiple pennies can also impact those in need. Social good is something that anyone can do. It is not about celebrity status or being a millionaire. Social good is about feeling good about helping others when they are in need. It is about creating a sense of connectedness to humanity and being humble all the while influencing those th at follow you. This is what Ellen DeGeneres is all about. This paper will discuss, Ellen s foundations and charities, how these reflect her personal values and leadership integrity, how her giving enhances her celebrity image and whether her integrity is compatible with her image. Ellen DeGeneres is not only anShow MoreRelatedOptimizing Millennials Communication Styles8016 Words   |  33 Pageseffectiveness. Developing style-typing and style-flexing skills can serve as building blocks for millennials’ subsequent interpersonal skill development in key areas such as audience analysis, active listening, conflict management and negotiation, and effective team building. An in-class exercise highlighting communication style-typing and style-flexing is included. Keywords:â€Æ' millennials; communication skills; style-flexing MILLENNIALS, THOSE INDIVIDUALS born between 1980 and 2000, compose the largestRead MoreUnderstanding Marketing Management16709 Words   |  67 Pagesbreadth and depth as they want about practically anything. They can access online encyclopedias, dictionaries, medical information, movie ratings, consumer reports, newspapers, and other information sources in many languages from anywhere in the world. Personal connections and user-generated content thrive on social media such as Facebook, Flickr (photos), Del.icio.us (links), Digg (news stories), Wikipedia (encyclopedia articles), and YouTube (video).23 Social networking sites—such as Dogster for dog lovers

Saturday, December 28, 2019

Beloved Analysis - 7215 Words

From the beginning, Beloved focuses on the import of memory and history. Sethe struggles daily with the haunting legacy of slavery, in the form of her threatening memories and also in the form of her daughter s aggressive ghost. For Sethe, the present is mostly a struggle to beat back the past, because the memories of her daughter s death and the experiences at Sweet Home are too painful for her to recall consciously. But Sethe s repression is problematic, because the absence of history and memory inhibits the construction of a stable identity. Even Sethe s hard-won freedom is threatened by her inability to confront her prior life. Paul D s arrival gives Sethe the opportunity and the impetus to finally come to terms with her painful†¦show more content†¦In this first chapter, Morrison plants the seeds of the major events that will unfurl over the course of the novel: Sethe s encounter with schoolteacher and his nephews; the slaves escape from Sweet Home; the story of Amy De nver; and the mystery of Sethe s baby s murder. These past events are told in a nonlinear manner, fading and resurfacing cyclically as the characters memories reveal more and more to the reader and to the characters themselves. Analysis: Chapters 2Ââ€"3 Chapter 2 begins with Paul D gazing at Sethe s back and it ends with her gazing at his. These images symbolize what is taking place thematically in the chapter: the characters charting of their respective memories, of what lies behind them, at their backs. Sethe s back also contains the visible scars of her whipping. The narration alternates between two time periodsÂâ€"the present in Cincinnati and the Sweet Home past. The Sweet Home past is presented from both Paul D s and Sethe s perspectives, as the narrator s focus shifts between the two characters. The novel maps out the points of proximity and distance between them. Both characters, for example, are disappointed after having sex, and they simultaneously begin thinking about Sethe and Halle s encounter in the cornfield twenty-five years ago. On the other hand, Paul D sShow MoreRelatedAnalysis Of Toni Morrison s Beloved1458 Words   |  6 Pagesthere have been multiple instances of inequality between races, classes, and gender s. Toni Morrison’s novel Beloved is a story that truly shows how oppressive slavery was during the setting of the book. Similarly to the inequality faced during the time of slavery, while Morrison was writing the her novel the issue of women’s equality was present, and being fought for. Morrison, through Beloved, is able to show the world her views on inequality, and how it is still present in life today. MorrisonRead MoreAnalysis Of Toni Morrison s Beloved1615 Words   |  7 PagesIn her novel Beloved, Toni Morrison utilizes a circular narrative to emphasize the similarities, or lack thereof, between her characters. In Philip Page’s article, â€Å"Circularity in Toni Morrison’s Beloved,† he writes, â€Å"The plot is developed through repetition and variation of one or more core-images in overlapping waves... And it is developed through... the spiraling reiteration of larger, mythical acts such as birth, death, rebirth, quest-journeys, and the formation and disintegration of families†Read MoreAnalysis Of Toni Morrison s Beloved 702 Words   |  3 PagesMr. Williams 2 period Book by: Toni Morrison Book Titled: Beloved Beloved is about a lady they call Sethe who lives in Bluestone with her daughter Denver and her mother in law Baby Suggs. Fifteen years before the story starts, Sethe kills her baby because she was trying to keep her kids from being brought into slavery. The community knew about her killing her baby and judges her. Her sons Buglar and Howard left fifth teen years before the book started. After Baby Sugg s died, Denver and SetheRead MoreToni Morrisons Beloved Essays1058 Words   |  5 PagesIf ignorance is bliss, then why is it human nature to uncover the truth? In Toni Morrison’s Beloved, the character Denver uses knowledge to feed her craving in hopes that it will fill the void her mother unsuccessfully tried to satisfy with the blood of the past and too little milk. To understand these truths one must accept that Beloved is a physical representation of the past, Sethe embodies the present, and Denver exemplifies the future. Throughout the novel these three characters interact onRead More‘Spring Offensive’ of Wilfred Owen1400 Words   |  6 Pagesor they are exposed to the bullets or shells of the enemy’s for no great reason. Analysis of Lord Tennyson’s Tithonus : immortality consumes Tennyson’s Tithonus relates to the old Greek myth of Tithonus, a very handsome youth and the son of Laomendon, the king of Troy. The legend tells that Tithonus was loved by the dawn goddess, Eos, who bore him a son, the hero Memnon, king of Ethiopia. As his beloved was beloved was immortal, he requested her for the gift of immortality, Eos requested Zeus,Read More Exploring Personal Choices in Toni Morrisons Beloved Essay1466 Words   |  6 PagesExploring Personal Choices in Toni Morrisons Beloved At the climax of her book Beloved, Toni Morrison uses strong imagery to examine the mind of a woman who is thinking of killing her own children. She writes, Because the truth was simple, not a long-drawn-out record of flowered shifts, tree cages, selfishness, ankle ropes and wells. Simple: she was squatting in the garden and when she saw them coming and recognized schoolteachers hat, she heard wings. Little hummingbirds stuck their needleRead MoreBeloved: Passage Analysis1335 Words   |  6 PagesHalle, his brothers, Sethe, Mister, the taste of iron, the sight of butter, the smell of hickory, notebook paper, one by one, into the tobacco tin lodged in his chest. By the time he got to 124 nothing in this world could pry it open. Beloved Passage Analysis Syntax: Emphasizing the Tone Toni Morrison’s unique syntax manifested in this passage reinforces the overall content. Sentence fragments without a subject such as sentences number five and six focuses on Paul D’s observations. At thisRead MoreThe Style of Toni Morrisons Beloved1118 Words   |  5 Pages Style Analysis of Belovednbsp;nbsp; In the 500 word passage reprinted below, from the fictional novel Beloved, Toni Morrison explains the pent-up anger and aggression of a man who is forced to keep a steady stance when in the presence of his white masters.nbsp; She uses simple language to convey her message, yet it is forcefully projected.nbsp; The tone is plaintively matter-of-fact; there is no dodging the issue or obscure allusions.nbsp; Because of this, her work has an intensity unparalleledRead MoreCharacter Analysis Of Beloved1342 Words   |  6 Pagescharacter in novel Beloved by Toni Morrison. Denver is the most dynamic character in the novel. Denver is a young girl who spends hours alone. As a child, Denver’s dependence on others is an opposing force that she must realize and overcome and she must begin to rely on herself so that she can reach her fullest potential. As the relationship between Sethe and Beloved grows stronger, Denver has opportunities to break free and realize the danger of relying on o thers, such and Sethe and Beloved. Denver’s dependenceRead MoreBeloved Character Analysis1122 Words   |  5 PagesIn the book Beloved, Toni Morrison gives the audience, many choices to think about what is really happening in each section to get the point of what’s going on. The audience has to ponder on each character. Let’s take Sethe for example, as a character to mainly focus on. In Beloved,Sethe is a mother to four children and a wife to Halle. Sethe has been through so much ever since the very beginning. She had to make a rough choice about whether she would kill her oldest daughter, Beloved. Sethe ended

Friday, December 20, 2019

Islam And Islam Islam, Terrorism, And War Essay

Islamic authority’ because becoming ‘scholars or Ulama of Islam’ via western secular academia is relatively a new phenomenon for majority of Muslims (Moosa 2015). Since the horrific events of 9/11, Islam and Muslims especially has been the crux of much censure and debated in the media. Muslims have been widely discussed by themes of ‘migration’, ‘terrorism’, and ‘war’. In the meta-analyses on the representation of Muslims and Islam in the media between 2000-2015, there is the rise of Orientalist discourses in many mainstream media channels. The relationship between Western nations and Muslims has been reinterpreted as divided societies. Thus, the ‘clash of civilizations’ proposition has gained acceptance in intellectual debates and media coverages. There is also a dominant antagonistic view about Islam and Muslims in many western countries (Ahmed and Matthes 2016). The meta-study and recent many researches show that Muslims and Islam tend to be negatively framed, which consequently led to the domination of the mass media via displays of fear and anger as well as anti-Muslim sentiments (Bail 2 015). In this context, Muslim intellectuals have faced fierce criticism from various journalists and academics. For instance, prominent Muslims intellectuals Tariq Ramadan has been criticized by doublespeak for general western society and internal Muslims communities (Fourest 2008) and Khaled Abou El Fadl has been blamed by being a stealth Islamist due to his works on Islam and politicsShow MoreRelatedThe Islamic View On Self Harm And Suicide Attacks1298 Words   |  6 Pages There is no issue in this contemporary world that is more misinterpreted than that of Islam and its views on terrorism and violence. If suicide and self harm are forbidden in Islam, why do Islamic terrorists conduct and take part in suicide bombings? Fighting in a war in a way is suicide because the fighter knows that he or she may be killed. If suicide and self harm are sins in Islam, why are jihad and war not sins? There are many approaches that can be taken to clarify these misinterpretationsRead MoreTerror ism, I Am A Muslim And I Am Against It1461 Words   |  6 Pageswill receive their recompense from their Lord. They have nothing to fear, nor will they grieve† This is how Islam inculcates Muslims not to judge others, because obviously it’s the Lord who does that. Despite this verse and many other verses in Quran which promote for peace and love among humans, still people combine Islam with terror. I have seen many false allegations about Islam in the media. All that made me wonder, did I understand my religion wrong? What really interests me is wheneverRead MoreRhetorical Analysis Of Donald Trump s Speech1187 Words   |  5 Pages Donald Trump recently gave a speech discussing rising Radical Islamic Terrorism, immigration from the Middle East, and a need for a rise in national security while Manchester, New Hampshire on June 13th 2016. He centers his whole speech around discussing how bad a President his opponent, Hillary Clinton, would be in difficult time s. Trump graduated from the Wharton School of Finance in 1968 with a bachelor s degree in economics, and has become a very successful businessman. He’s the RepublicanRead MoreIslam Religion Of Peace Or War Essay1445 Words   |  6 PagesIslam a Religion of Peace or War Introduction: After the crisis of 9/11, the religion of Islam has raised a number of controversies. More specifically, the issue of Islam as a harmonious religion or not. In the last fifteen years, after 9/11, there has been multiple disputes among those believing Islam as a religion of peace, and those who believe otherwise. With any debate, numerous questions spring up to force the majority to believe their beliefs are the truth. Some of the questions orRead MoreThe War On Terrorism And Terrorism1614 Words   |  7 Pagesbring out the truth behind each of these geopolitical events. The point is that Islam has been consistently portrayed by global media as a violent-prone religion that is diametrically opposed to the West. Since then so-called â€Å"War on Terrorism, â€Å"against a vague and undefined enemy, rages on in from Iraq to Syria. Since September 11, 2001, the United States has initiated a number of wars in Muslim countries. These wars, which would be more correctly called massacres, have resulted in the deaths ofRead MoreEssay on The Terrorists Attack on the World Trade Centre in New York1205 Words   |  5 Pageswestern concept about Islam and Muslims. Moreover, Islamic concept â€Å"Jihad† is criticized and it is questioned among Non-Muslims. 9/11 attack not only effects non-Muslims but also the Muslims who have no connections with the terrorist groups. As well as they do not support these terrorism. These Muslims face the hatred of the non-western people. They feel guilty about the Sin, they neither commit nor support. After 9/11, The Muslims all over the world called as terrorist and Islam is considered as religionRead Moreâ€Å"Clash of Civilizations† Essay examples 980 Words   |  4 Pagesillustration that exhibits the power of ideas that has vastly influenced both foreign policies of countries, but also the discipline of International Relations. Samuel Huntingtons â€Å"the clash of civilizations,† is based on the hypothesis: â€Å"In the post-Cold War world the most important distinctions among people are not ideological, political, or economic. They are cultural†. (Huntington, 1996, p. 21) Huntington recognizes the significance of the realist approach that the nation states will stay as the mostRead MoreAmerican Neo Orientalism And The Justification For The War On Terror 1426 Words   |  6 Pages2016 Ex Oriente Lux: American neo-Orientalism and the Justification for the ‘War on Terror’ The September 11, 2001, attacks on the World Trade Centre and the Pentagon fundamentally changed the dynamic of American identity threatening it’s hegemony and creating a space of insecurity thus necessitating a reassertion of state authority. In particular, the 9/11 post-traumatic space required US participation in an ambiguous ‘War on Terror’ that institutionalized racially charged violence through the demonizationRead MoreIslam and Jihad Essay1185 Words   |  5 Pagesholy struggle. It is not holy war. War is war. No war can be holy. The blood of humans is holy and sacred. The Quran says unjust killing of one man means the killing of the whole mankind. What is just killing and what is unjust killing. When some body kills a man without any reason or justification it is unjust killing. When the judge gives the capital punishment to this murderer and issues the order of his death, it is a just killing. Similarly, when a war is thrust upon you and you bec omeRead MoreThe Positive and Negative Impact of the Portrayal of Religion1108 Words   |  4 Pagesportrayal of religion has had both a negative and positive impact. When people hear about religion, they either cringe at the fact of following outdated rules and norms, or issues that deal with politics and the media. The two most popular religions, Islam and Christianity, must be analysed to identify what religion is. While further examining these closely, a finite argument can be made that religion is unfavourable for the modern society. Our society holds the key main ingredients to the era of modernity

Thursday, December 12, 2019

Security And Privacy Issues Cloud Computing â€Myassignmenthelp.Com

Question: Discuss About The Security And Privacy Issues Cloud Computing? Answer: Introduction This is the age of digitalization and disruption where new technology is constantly retiring and replacing the old technology as well as new emerging business and delivery models are replacing the traditional models. These new models are much more elastic, scalable as well as cost efficient. Cloud computing is also one such promising delivery model where data and programs will be stored on a remote machine and will be accessed using internet while traditionally organization has to buy and maintain the entire infrastructure in-house and maintain data as well as programs in-house. As a result, there are many benefits in terms of cost savings as the organization is not maintaining the infrastructure however there are challenges and benefits also in adopting the cloud computing. This is the reason that although Cloud has been there since more than a decade, it is still far from mainstream adoption due to various security and privacy and other open ended issues. Also, most of the big companies and technological giants like Google, Amazon, IBM, Microsoft, Oracle, EMC and many other players like Salesforce.com are counting heavily on this technology and bringing most of the products developed on cloud. The purpose of this report is to deeply analyze the security and privacy issues that are delaying the widespread adoption of the Cloud computing. This will also discusses various service models and deployment models associated with the cloud very briefly however it will not talk about the benefits of cloud computing as there is already large number of reports on the same. It is expected that cloud computing would continue to be a key technology trend that would shape the use of Information Technology for large and small organizations. Cloud Computing service Models and Deployment Models There are different service and deployment models for cloud installation. The widely used service and deployment models for cloud computing can be discussed as: Service Deployment Models There are three service models in Cloud computing based on the level abstraction and resourced vendor provide. They are as follows: 2.1.2 IAAS (Infrastructure-as-a-Service) - In this service model, Cloud Service Provider (CSP) will provide the network, storage and processing capability to the customers. Customer can select their own applications and middleware, operating systems and can deploy them on IAAS. 2.1.2 PAAS (Platform-as-a-Service) In this service model, CSP will provide the middleware, programming languages, operating systems needed to build the applications. Also, customers do not have the choice for using separate storage. It should be what is supported by the PAAS. However, customers have full liberty to deploy and run whatever application and software they want to run (Puthal Sahoo, 2015). 2.1.3 SAAS (Software-as-a-Service) In this service model, CSP will provide the application to the customer. Salesforce.com is a very popular example of this. Apart from it, Microsoft outlook, Gmail are also examples of SAAS. In this vendor will manage the underlying systems like IAAS and PAAS and customers can access the application using the Internet. It is an alternative to local application. Across the industry, there are various vendors that provide cloud services. Below are the popular vendors or Cloud Service Providers. IAAS Vendors PAAS Vendors SAAS Vendors Amazon IBM Google Rackspace Cloud Google Microsoft Salesforce.com Oracle Google Apps Salesforce.com Security and privacy issues in Cloud computing There are various advantages of cloud computing. However, there are various issues and challenges that must be addresses. In fact, the complete benefits of cloud computing can be achieved only when organizations can overcome the issues and challenges. The common issues and challenges with cloud computing can be discussed as: Data Privacy: Privacy is the single biggest issue that is preventing the widespread adoption of cloud computing. In this age of big data analytics, data is very critical and important function for every organization. Now, the issue arises when the top vendors of the cloud like Google and Amazon are in the business where data is very important. For example, Google main business is from advertisements. It has products like Google AdSense and Google AdWords where these giants shows the appropriate advertisements to the people based on their profile using principles of digital marketing (Takabi, Joshi, Ahn, 2010) Amazon also is one of the E-commerce giant that uses data for showing targeted marketing and increasing its businesses. In such scenarios, if any customers are using the services of these vendors, there is a conflict of interest and there can be a risk to confidential customer data. Data compliance issue: There are numerous issues related to compliance using cloud computing. Each nation has their own laws, rules and policies related to how the organizations can store the data. For example, there is a government rule of European Union (EU) Data Privacy Directive that prevents that data of the country members to be stored outside the country. Now, in cloud computing, there are various copies maintains at various locations of the world and thus this type of compliance will make it impossible for the organization to use cloud computing (Amorsy, Grunday, Muller, 2016). Cloud vendors needs to be more transparent and must tell the customers where they are storing the data and how many copies they are maintaining. Data deletion risks: Data portability and data deletion has been one of the main challenges of cloud computing which is quite under researched. There are no solutions and workarounds to handle this and as a result of this vendors are not quite transparent about (Rittinghouse, Ransome, 2016). For instance, consider a scenario where 1 customer is maintaining their data with one of the cloud service provide. Now, due to some issue or requirement, customer decided to use the in-house application or switch to a different Cloud service provider, it is difficult to ensure that the cloud vendor has removed all customer data from the cloud. It is because usually the cloud stores data in a complex mesh of interrelated data and also maintain numerous copies in form of backups that are located across the world (Theoharidou etal., 2013). As long as it is private cloud, Vendor can reset or flush the complete data but how it will be handled in case of a community cloud. Also, if customers want to delete some data, how it will ensure that it is permanently removed from all the clouds. No Common Cloud Standards: Currently, there is poor interoperability between clouds maintained by different vendors due to lack of common standards. This lack of interoperability has makes the migration from 1 cloud to another cloud very difficult and depending on the single cloud vendor will simple increases the risk for the customers (Latif, et al., 2014). Customers will prefer to distribute their data over the clouds managed by various provides in order to minimize the risk but this is not possible. Apart from this, there is another issue of compatibility. Amazon and Microsoft are mainly the IAAS providers which provides the storage and computing services however the reason most of the organization are looking for cloud is the SAAS (software-as-a-service). Now, if you run the software on the IAAS owned by the amazon and there are some issues, you will be permanently lost in what is creating the issue and also integrations will also be needed. Amazon is quite good for those cases w here client is planning to build and deploy their own custom applications but not well in a situation where customers wants to use 3rd party software. Oracle and Salesforce.com are two such vendors that own and provides entire cloud stack that is IAAS, PAAS and SAAS (Ali Khan, 2015). However, other vendors also need to work in this space. Data Segregation: software multitenancy is the major feature of the cloud computing where a single instance of software will be used to serves the multiple tenants. Thus, data of various users will be storing at the same location, which makes the intrusion of a data of 1 user by another user possible. This is the single biggest risk and thus SAAS should define and maintain clear boundary for the data belonging to each user and thus boundary must be protected at physical as well as application level (Toosi Calheiros, 2014). Data breaches: Clouds have the data from multiple people belonging to multiple countries. Now, if any of the person or users of the cloud has been attacked by malware, there is a risk of malware entering into a complete cloud and can impact the data of all the other organizations. In such cases, organization are arguing that they are giving training to their users not to click on any phishing mail but what if someone who do not belong to their organization has clicked on such emails and the impact is compromise of their data (Mouratidis, et al., 2014). Network security: In a community cloud, there are large number of organizations that will interact with their own partners, customer and suppliers. As a result, there will be flow of sensitive data over network and thus it needs to be protected to avoid the seepage of confidential data and sensitive information. This involves the use of strong encryption techniques like SSL for security purposes (Sanaei Abolfazli, 2014). Conclusion No doubt cloud is a flavor of today as it provides lot of financial benefits to the organization however there are still many open issues and questions that must be answered before it will be adopted widespread. With Globalization, as the organizations are increasing beyond their boundaries, maintain on premise IT systems for every site will be quite expensive for them and cloud scalability is perfect solution for them but security, audit, compliance related issues of cloud computing has delayed the speed of its adoption. This report discusses about the key privacy and compliance issues that are associated with the cloud computing. And as most of the technological giants like IBM, Microsoft, Oracle, Amazon, Google are working in this area, the open items will probably be solved in coming times leading to a cloud revolution. References Ali, M., Khan, S. U., Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information Sciences,305, 357-383. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Latif, R., Abbas, H., Assar, S., Ali, Q. (2014). Cloud computing risk assessment: a systematic literature review. InFuture Information Technology(pp. 285-295). Springer, Berlin, Heidelberg. Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements.Journal of Systems and Software,86(9), 2276-2293. Puthal, D., Sahoo, B. P. S., Mishra, S., Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments.IEEE Security Privacy,8(6), 24-31. Theoharidou, M., Papanikolaou, N., Pearson, S., Gritzalis, D. (2013, December). Privacy risk, security, accountability in the cloud. InCloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on(Vol. 1, pp. 177-184). IEEE. Toosi, A. N., Calheiros, R. N., Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey.ACM Computing Surveys (CSUR),47(1), 7.

Wednesday, December 4, 2019

DRUNK DRIVING Essay Example For Students

DRUNK DRIVING Essay News came, informing me of Katie Platts death. I was distraught and in disbelief at what I just heard. She was in a car accident. she was injured very badly, and now she was dead. Kate was one of my best friends. Above all she was only fifteen years old. Her life was taken too soon, out of carelessness that could have been prevented. Kate was at a club that night with her sister Melina and a friend the three of them had been drinking the entire night. when it was time to leave, Melinas judgement was impared, and instead of calling a friend she choose to drive under the influence. While driving Melina hit a utility pole, flipping her Jeep Cherokee three times. kate was in the back seat, not wearing her seatbelt. ( DWI Dilema, Internet source) However, I disagree. We need to send the message that it is not acceptable, nor is it constitutional to drive under any influence of alcohol, weather it be .08 or .20. Drunken driving was once treated much as car accidentsa regrettable but unavoidable part of life on the roads. But a vocal grass-roots movement led my MADD (Mothers Against Drunk Driving) persuaded much of the country, over two decades, to view it as a type of criminal negligence. Public patience with drunk drivers quickly grew thin as well-publicized death tolls mounted. ( Mishra, Internet source) What exactly is drunk driving? This is a question that has yet to be answered. To determine the concentration of alcohol in the body at any given time, it is necessary to establish the blood alcohol concentration (BAC), which measures the percentage of alcohol in the blood. When a person consumes more alcohol than his or her body can immediately eliminate, alcohol accumulates in the bloodstream and the BAC rises.(Henderson, 23) In Connecticut the BAC level is .08, this means that the blood alcohol level needed to be arrested for drunken driving has to be . 08 or higher. One can also be convicted of drunk driving without the results of a blood alcohol test or if your blood alcohol test result is lower than the statutory amount. A conviction can be based on evidence that your breath, conduct, language, and motor movements showed that you were drunk and unable to drive safely. (Driving While Intoxicated, Internet source) Alcohols effects are progressively more noticeable as the blood alcohol concentration increases. At a BAC of .02 to . 05 percent the effects are almost entirely pleasurable. The drinker feels relaxed and sociable. There may also be some modest impairment of reasoning or memory and general reduction in caution. A BAC of .05 to .07 produces a state of excitement. The drinker begins to suffer from what may be a slight but nonetheless noticeable impairment of balance, speech, vision, reaction time, and hearing. Judgement and self-control are also effected. The drivers behavior is apt to become more aggressive. In general, the drinker feels stimulated and highly capable. In reality his or her ability to safely perform tasks such as driving that require quick reactions, concentration, and good judgement has been significantly reduced. A drinkers ability to function deteriorates quickly at BACs of . 08. to .15 percent, the drinker enters a state of confusion. At this stage, the level of impairment becomes obvious, if it is has not already. Speech becomes slurred; the drinkers sense of balance, vision, reaction time, and reasoning ability are distinctly and obviously impaired. With a BAC this high the drinker cannot safely perform tasks that require sound judgement or motor coordination. Martin Luther King Jr. Essay Also, every year more then 10,000 Americans, ages 16- 24 die in alcohol related car crashes. There is so much unnecessary tragedy associated with driving under the influence. Maybe if there were tougher laws against it, more people would choose a different solution. Perhaps if you got caught driving drunk, you would be sent to prison for putting other peoples lives in danger. I see it as attempted murder, many innocent people die as a result of being hit by a drunk driver. We need to .