Wednesday, May 6, 2020

Essay on The Homeless Are NOT Bums - 770 Words

Just because one homeless person has committed a crime or used the money he has collected on things such as alcohol or drugs does not mean that every homeless person is going to be like that. Many homeless people are Vietnam veterans, have a mental illness, or cannot survive in this economy which we are in. I have had a few experiences with homeless people but there is one which is unforgettable. It is much like when Nathaniel Ayres begins yelling at Mr. Lopez then proceeds to apologize later on (Lopez, 258). Most homeless people do not receive aid from the government or do not receive enough aid which is why they resort to panhandling. Seeing these many homeless people shows us how well our government is doing in protecting its people.†¦show more content†¦Rather then come back to continue what the man had started, he instead had come to apologize for his actions. He began explaining how he had an illness which he could not control at times. He also explained to us how he w as a Vietnam veteran and the amount of money he was getting from the government was nowhere near what he needed in order to get through his everyday life. He then offered to work to pay off whatever his actions had cost the store, and then asked if there was any type of job opening for him. Although this mans actions were frightening, they were also quit interesting. Many homeless people sit around lazily asking for money to buy drugs, while others try to find ways to make money to hopefully be given the chance to start a new life for themselves. Everyday no matter where it is that u live, whether u live around the downtown area or if u live in a richer, more nicer area, you will see a homeless person asking for money. Many people have no problem with pan handlers because they do not interfere with our lives in any way. Most people do not like carrying change around and hearing all those coins in their pocket smashing into each other with every step they take. When they see a homele ss person asking for spare change most people are almost more then welcome to help them out. Not all people just give their money to homeless people though; this is because mostShow MoreRelatedThe Issue of Homelessness Essays2064 Words   |  9 Pagesthree weeks, I have observed five regular and several wandering homeless people solely on State Street and East Liberty Street. However, homelessness is not a one-sided issue based only on affected individuals, it is also influenced by notions of the homeless from the non-homeless. There is an overwhelmingly negative connotation, a stigma, of homelessness due to misrepresentation. In effect, public perceptions affect how homeless are treated by other institutions and ultimately affect how efficientlyRead MoreThe Social Impact of Drug Abuse24406 Words   |  98 Pagescigarettes; one in five smokes marijuana. (In contrast, substance abuse is nearly absent among the market children.) Thus, inhalants are the most commonly abused substan ces among abandoned street children in Honduras, as opposed to alcohol and crack among homeless teens in the United States, but the overall rate of substance abuse turns out to be about the same in both contexts. Glue is a popular intoxicant among street children throughout the nations of the developing world because it is very cheap, diminishes

The Filipino Culture And Health Care - 1193 Words

Introduction A disparity can be defined as a difference, an inequality, a discrepancy, a gap, or an inconsistency. Within individual cultures, there are health disparities, or specific differences of a population in the existence of health outcomes, disease, health care access, and value of health care services existing across ethnic and racial groups. Disparities can stand for ineffectiveness within the system of health care and thus accounting for unnecessary costs. (Douglas and Paquiao, 2010) The Filipino culture has numerous factors leading to insufficient access to care and reduced quality of care, some of them being cultural habits concerning diet, language, and screening rates, as well as behavioral and mental health. Every culture has its own traditional beliefs and values amongst which can be shared transculturally to better international health whereas there are also those that are influenced by the Filipino culture that can be seen as non beneficial to future generations. Diet and Exercise People with more education have better health status, make better salaries, and are more likely to have children who become educated. (Douglas and Paquiao, 2010) Despite Filipino’s having higher rates of education, leading to better salaries, and having children who are educated, various health disparities exist. The root of the Filipino culture’s health disparities lies within their dietary intake. The Filipino culture is world renown for the exotic, intense flavors of theirShow MoreRelatedCulture And Health Challenges For Nurses And Providers998 Words   |  4 Pagesproviders that may decrease the quality of care for patients. It becomes more challenging when a culture’s health beliefs and practices contradict with the nurse’s own beliefs and practices. It is an integral role of a nurse to assess and identify a patient’s culture and health-related beliefs and concerns to provide maximum care of that particular patient. Filipino culture consists of health practices, perceptions, and beliefs that are not similar to U.S. culture. Serafica (2011) discusses on his articleRead MoreFilipino Mental Health Culture Paper1396 Words   |  6 PagesIntroduction â€Å"Culture comprises of shared beliefs values, and practices that guide a group’s members in patterned ways of thinking and acting. Culture can also be viewed as a blueprint for guiding actions that impact care, health, and well-being† (Leininger McFarland, 2006). â€Å"Culture is more than ethnicity and social norms; it includes religious, geographic, socio-economic, occupational, ability-or disability-related, and sexual orientation-related beliefs and behaviors. Each group has culturalRead MoreCultural Comparisons Between Three Cultures : South Indian, Filipino, And Polish- American1401 Words   |  6 Pagesthe cultural comparisons between three cultures: South Indian, Filipino, and Polish- American. The heritage assessment is significant in the field of medicine and an essential tool for healthcare providers and their patients. The heritage assessment tool is used as an aid that fosters a deeper understanding of the families that are studied, thereby assisting in forming a framework to approach and deal with a patient’s mental, physical, and spiritual health beliefs. Thus, it is an indispensable elementRead MoreCultural Influences Of The Filipino Culture1375 Words   |  6 PagesCulture The Filipino culture has a variety of cultural influences. Most of their cultural influneces come from past colonizations of Ameirca and Spain.In spite of all the influences, the older Asian culture of the Filipinos has been kept and is clearly seen in their way of life. The Filipino culture has become very evident and has largely been appreciated in many parts of the world. Filipinos are very passionate of their music. They use a variety of materials to create sound. They also enjoyRead MoreThe Theory Of Nursing And The Clinical Skills940 Words   |  4 Pagesnurse’s journey is to become culturally competent care provider. A nurse must understand the cultural differences that each individual uphold and practices. Lack of understanding and awareness of these differences can create conflict and misunderstanding when optimal care is being provided. Filipinos are diverse group of people whose attitudes, values, traditions, practices and beliefs can affect their decisions especially when it comes to making a health decision. These variables can all become a barrierRead MoreHeritage Assessment968 Words   |  4 Pagesknowledge of patient’s culture and beliefs prior to initiating care. (Spector, 2000). There are many different cultures in this country, brining different beliefs in health, illness, recovery, death, and life. The heritage asses sment tool is an important measure towards better understanding of cultural competency, or recognition of diversity. A person’s culture, beliefs, heritage, and language have a substantial impact both as a patient and a health care provider within the health care system. (SpectorRead MoreMy Experience At The Annual Filipino Harvest Dinner On The Eastern Side Of Washington State Essay1727 Words   |  7 Pagesis a melting pot of cultures. A misconception about the eastern side of Washington is said to not having a multitude of cultures but from working with the public, I have fortunately had the opportunity to work with many different cultures. I grew up in Toppenish, Washington which is 7-minute drive from where my cultural experience took place. In the fall, there are fewer events that take place around the valley and I have been to many events for other cultures. The culture in which I thought IRead MoreNontraditional Beliefs And Practices Regarding Health Care Practices 976 Words   |  4 PagesNontraditional Health Care Practices Cultural competence requires the health care provider to have awareness and knowledge of the wide variety of belief systems that exist in the United States (U.S) and worldwide. Purnell (2013), asserts that cultural competence may be one the most importance health initiatives with the U.S. as understanding the beliefs and practices regarding health and wellness are equally as important to the knowledge a provider has regarding physiologic and scientific responsesRead MoreCultural Identity In The Philippines1334 Words   |  6 PagesCHAPTER 1 Introduction Philippines is a heterogenous country. Many Filipino were confused about the real culture or native culture of the Philippines because of much foreign or alien culture that invaded the Philippines right now. But as a matter of fact Filipino is also the reason on having a confusing cultural identity as a nation. The Philippines is a country that has been colonized too many times. From the Spaniards, then we were sold off to the USA, and then we were invaded by the Japanese-Read MoreCardiovascular Diseases And Strokes And The Filipino Community1268 Words   |  6 PagesStrokes in the Filipino Community The American culture is not easily defined. The greatest thing about the American culture is that it consists of multicultural beliefs and accepted norms. One culture that has made a great impact on the American cultural is the Filipino-American culture. As we all may know, some of the major factors that play a critical role in a culture’s identification is food and medicinal practices. Unlike the American practices, persons of the Filipino culture are more drawn

Diploma in Business Management Production Supplies

Question: Discuss about theDiploma in Business Managementfor Production Supplies. Answer: Examples of Pricing Variables There are number variable costs that are associated with the businesses such as cost of direct materials, production supplies, piece rate labor, billable staff wages, commission, credit card fees, freight out and others (Kaplan and Atkinson 2015). Need for Pricing Variables It is important to review the pricing policy of an organization. It helps the company to determine the marketing strategy, formulate marketing mix decisions, and estimate the demand curve, calculation of fixed as well as variable costs, understanding the environmental factors and others (Kaplan and Atkinson 2015). It is an important part of the financial planning of the organization. Identification of Customer Needs It is important for the organizations to understand the needs as well as preferences of the customers. This would make the company to formulate products as well as services which would meet its requirements. There are various ways which can help the company determine the needs as well as requirements of the customer. The company must try to think from the customer point of view and observe the preferences of the customers. A data should be used for the purpose of understanding customer needs such as customer relationship management (CRM) (Neslin 2014). It provides customer analytics regarding their needs. A market research helps the company to understand the needs of customers. Effect of Customer Behavior on the Marketing Mix There are several factors that influence the consumer buying behavior such as cultural, social, psychological and personal. The four elements of marketing such as product, price, place and the promotion are being affected by the behavior of the customers. The consumer behavior determines the quality of the products and the related product attributes. The income of the customers determines the price of the products of the brand (Anselmsson et al. 2014). The accessibility of the customers determines the distribution pattern of the customers. The promotion tool involves the selection of various tools which should be based on the level of exposure of the customers. Statistical Tools There are various statistical tools that are utilized by the company to gather market intelligence data such as click stream data, corporate websites, data mining, data warehousing, dashboards, search engines, trade shows, suppliers and others (Segarra et al. 2016). Use of Statistical Data The statistical data is used by the company to assess the consumer attitude as well as consumer behavior. The channels of distribution can be identified based on type, availability and the effectiveness of the medium. The company would be able to decide the technological advancements that can be utilized and the concerned trade partners. The company can also help to identify the location of the target audience and specific geographic locations that are lucrative for the company. References Anselmsson, J., Vestman Bondesson, N. and Johansson, U., 2014. Brand image and customers' willingness to pay a price premium for food brands.Journal of Product Brand Management,23(2), pp.90-102. Kaplan, R.S. and Atkinson, A.A., 2015.Advanced management accounting. PHI Learning. Neslin, S.A., 2014. Customer Relationship Management (CRM). InThe History of Marketing Science(pp. 289-317). Segarra, L.L., Almalki, H., Elabd, J., Gonzalez, J., Marczewski, M., Alrasheed, M. and Rabelo, L., 2016. A Framework for Boosting Revenue Incorporating Big Data.Journal of Innovation Management,4(1), pp.39-68.

Threats Attack by Injection of Malwareâ€Free Samples for Students

Questions: How Cloud Platform is creating issue for Data Breaching? How the data breaching issue can be solved? According to the countermeasures stated, which one of the countermeasure is best? Why attack by injection malware is dangerous? Answers: Introduction Cloud computing is playing a significant role in the life of human being now a days. It helps in delivering the applications as well as spaces for storage as a part of their service through Internet for a very little cost. Cloud computation also been implemented in the businesses where company pays rent for the services to the providers of cloud computing. Cloud computing helps in reducing the cost of operation and helps in improving the flow of cash. For instance HR locker a software company takes the rent of services from Windows Azure for their software service of human resources. The convenience as well as nominal cost of cloud computing has changed the daily lives of human being. However, after being bliss to the life of human being Cloud computing has several issues of security. Cloud computing is very much vulnerable towards the cybercrime. The hackers are implementing various techniques for gaining access to the clouds. They do not have any legal authorization as well as disr upt services to the provider of cloud service. The hackers implement various tricks on cloud for making their illegal activities as valid and therefore by the help of this trick they can gain unauthorized access for the information which is stored in the cloud (Armbrust et al., 2012). Cloud Security Threats Attack by Injection of Malware The attack by injecting the malware includes scripting of cross site, failure of session management, injection flaws, improper handling of error, broken authentication and leakage of information. It helps in restricting the access of URL, malicious execution of file, improper validation of data and insecure communications. It is considered to be one kind of attack based on web where the hackers are capable of exploiting the web applications vulnerability (Watson et al., 2016). Hackers also embed codes, which are malicious in the machine and turns the course into normal execution. Similarly to web based applications system of cloud are vulnerable to the attacks done by injecting malware. A malicious application or program is been designed by hackers and are been injected to the cloud platform. After the completion of injecting, the execution of malicious code is been done like a valid program running on cloud platform and then the hackers can perform data theft and other illegal activ ities over there. SQL injection attack as well as cross site scripting attack are the dangerous malware injected data. SQL injections fundamentally targets servers of SQL which run on vulnerable database application (Ahmed et al., 2017). These vulnerabilities are been exploited by hackers and a malicious code is been injected for gaining bypass login to unauthorised access of backend databases. Wrapping Attack During the requests of service from the end of clients on the web server by the help of web browser the interaction of service is been done by utilizing messages from Simple Object Access Protocol which are been transmitted by HTTP protocol (Kumar, Mani Akunuru, 2016). This is been done by using the format of Extensible Markup Languages also known as XML. For ensuring confidentiality and integrity of data of messages from SOAP is done to provide security. The transit among clients and servers is a mechanism of security. Web Service security is been applied for the service of web. It utilizes digital signatures for getting the signed messages as well as use technique of encryption for encrypting the messages contents. Wrapping attacks utilizes wrapping of XML signatures for exploiting weakness at the time when web servers used to validate the signed requests (Chou, 2013). The attack is conducted at the time of translating SOAP messages in between authorized user and web server. Dupli cation of login credentials of user is done at the time of login where hackers incorporates a structural message known as wrapper and switch all the original messages under wrapper. Then the hacker replaces the original message content by malicious code. The hacker then sends messages to server. Therefore, hackers gain full unauthorized access to the secured resources. Counter Measures The infrastructure of cloud computing incorporates a service providers of cloud that helps in providing the resources of computing to the end users of cloud. The cloud computing technology in order to provide the best quality of services should enhance the mode of security. Security enhancement could be done by applying policies for security. Some of the security policies are been discussed below: Security Policy Enhancement: Any individual having a credit card with validity are eligible for registering to the service providers of clouds for utilizing their resources. Hackers therefore take the benefits of the excellent power of computing of clouds for conducting malicious activities. Such abusive behaviour can be mitigated with the help of strong registration system, monitoring fraud regarding credit card as well as blocking general blacklist (Li et al., 2013). Implementing security policies helps in reducing risk of the abusive use of power for cloud computing. Mirage Image System: Security as well as integrity for images of VM helps in foundation of security for cloud. This system identifies issue that are having relation with secure management and addresses them. Images of virtual machines are been encapsulated by each cloud application (Fan et al., 2013). This system of managing security for clouds comprises of components like Access Control, Image maintenance, running filters for transforming images and Provenance Tracking. If filter technique is been used for the injection attacks of SQL then it sanitize the input of user and check the attack from SQL injection. Architecture having proxy base can be implemented for getting secured from this type of attack. Denial of Service Attacks: Intrusion Detection System is been used as one of the most popular method for providing the defence against this type of threats. Defence federation is been used to safeguard the information from those attacks (Zhang et al., 2016). IDS have been loaded separately for each of the cloud. The main working principle of IDS is based on exchange of information. If attack is been conducted on a specific cloud IDS give alerts to the whole cloud system. Data Protection: Breaching of data is caused by insiders of organisation accidentally or intentionally. As it is difficult in identifying the behaviours of insiders therefore, an accurate security tool must be implemented for resisting threats from insiders. Tools like prevention system of data loss, detection tools for anomalous pattern of behaviour, authorisation technologies, encryption tools and decoy technology could be implemented (Chandramohan et al., 2013). They help in providing functions like detecting in real time on traffic monitoring and trapping of malicious activity. Access Management: The data stored in end user within the cloud is sensitive. The mechanism of access control should be applied for ensuring that access of data is been done by authorised users. Besides monitoring the system of physical computing the data access should be limited by applying security techniques. IDS as well as firewall are the general tools that are been implemented for restricting access coming from various untrusted sources (Peng et al., 2014). Moreover, Security Assertion Makeup Languages as well as Extensible Access Control Markup Languages are been used for controlling access for application of cloud. SAML concentrates for authentication transferring and XACML concentrates on the mechanism of arriving decisions of authorisation. Conclusion The continual advancement of cloud computing for making all the services available to the customers and therefore cloud computing has achieved a high level in the sector of Information technology. While individuals appreciate advantages of cloud computing brings, security within cloud is a key significant challenge. Much powerlessness within cloud exists and hackers keep on exploiting these security openings. With a specific end goal to give better nature of administration to cloud clients, security imperfections must be distinguished. In this report, we inspected the security vulnerabilities in cloud computing from three points of view, included related certifiable adventures, and acquainted countermeasures with those security breaks. Later on, we will keep on contributing to the endeavours in examining cloud security dangers and the countermeasures to cloud security breaks. There are three models of cloud services that helps in providing the services to the clients as well as these platforms also discloses the information that causes security risk and issue for the service. The hackers at first abuses the capability of computing that are been provided by cloud computing services with the help of conducting unauthorized activities (Hasizume et al., 2013). The three platforms of cloud computing services are SaaS, PaaS and IaaS. IaaS is situated in bottom layer and provides the powerful functionality of the entire cloud directly. It also helps in maximize the extensibility of the users for customizing real environment. Hackers also has the capability of taking a virtual machine by rent and then analyse the configuration then finding the vulnerabilities of the system and then attack the system of the customer who are present within the same platform of cloud. Secondly losing of data is significant issues of cloud platform. In SaaS platform companies and ent erprises uses the application of cloud computing for processing and storing the data regarding business (Avram, 2014). In PaaS platform developers utilises the data for testing the integrity of software at the time of system development life cycle. In case of IaaS new drives are been created by users on the virtual machines and the data are been stored in those drives. In all the three platforms of cloud model data can be accessed both by internal employees as well as external hackers. Thirdly traditional strategies of attacking of networks are been applied on the platform of cloud. For instance attacks on the web browser exploit authentication, accounting vulnerabilities as well as authorisation of cloud network. All the countermeasures have their own significance, but according to me Access management is the best counter measure. The mechanism of access control should be applied for ensuring that access of data is been done by authorised users. Besides monitoring the system of physical computing the data access should be limited by applying security techniques. IDS as well as firewall are the general tools that are been implemented for restricting access coming from various untrusted sources. Moreover, Security Assertion Makeup Languages as well as Extensible Access Control Markup Languages are been used for controlling access for application of cloud. SAML concentrates for authentication transferring and XACML concentrates on the mechanism of arriving decisions of authorisation. This make access management the best countermeasure. A malicious application or program is been designed by hackers and are been injected to the cloud platform. After the completion of injecting, the execution of malicious code is been done like a valid program running on cloud platform and then the hackers can perform data theft and other illegal activities over there. SQL injection attack as well as cross site scripting attack are the dangerous malware injected data. SQL injections fundamentally targets servers of SQL which run on vulnerable database application. These vulnerabilities are been exploited by hackers and a malicious code is been injected for gaining bypass login to unauthorised access of backend databases. These make SQL injection dangerous. Reference List Ahmed, H. A. S., Ali, M. H., Kadhum, L. M., Zolkipli, M. F., Alsariera, Y. A. (2017). A Review of Challenges and Security Risks of Cloud Computing.Journal of Telecommunication, Electronic and Computer Engineering (JTEC),9(1-2), 87-91. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2012). A view of cloud computing.Communications of the ACM,53(4), 50-58. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Chandramohan, D., Vengattaraman, T., Rajaguru, D., Baskaran, R., Dhavachelvan, P. (2013, March). A novel framework to prevent privacy breach in cloud data storage area service. InGreen High Performance Computing (ICGHPC), 2013 IEEE International Conference on(pp. 1-4). IEEE. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Fan, K., Mao, D., Lu, Z., Wu, J. (2013, June). Ops: Offline patching scheme for the images management in a secure cloud environment. InServices Computing (SCC), 2013 IEEE International Conference on(pp. 587-594). IEEE. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Kumar, B., Mani, J., Akunuru, P. C. (2016). A review of wireless hacking techniques that affect the security of cloud systems.Journal of Computations Modelling,6(3), 87-103. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Peng, M., Li, Y., Jiang, J., Li, J., Wang, C. (2014). Heterogeneous cloud radio access networks: A new perspective for enhancing spectral and energy efficiencies.IEEE Wireless Communications,21(6), 126-135. Watson, M. R., Marnerides, A. K., Mauthe, A., Hutchison, D. (2016). Malware detection in cloud computing infrastructures.IEEE Transactions on Dependable and Secure Computing,13(2), 192-205. Zhang, H., Cheng, P., Shi, L., Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system.IEEE Transactions on Control Systems Technology,24(3), 843-852

Wednesday, April 22, 2020

Socio Cultural Dimensions of Learning free essay sample

Lev Vygotsky’s theory focuses on Socio-Cultural dimensions of Learning and development, emphasizing that individual cognitive processes are continuously embedded on a social and cultural context. It is referred to as â€Å"social constructivist theory†. In order to understand the influence of Lev Vygotsky’s work addressing socio-cultural dimensions of learning and development, it is important to understand the three central concepts of his theory which all have direct implications for the classroom. These are the concepts of the zone of proximal development, scaffolding and the socio-cultural context of learning. Zone of Proximal Development. Vygotsky stated that a child follows an adults example and gradually develops the ability to do certain tasks without help or assistance. Vygotskys often-quoted definition of zone of proximal development presents it as the distance between the actual developmental level as determined by independent problem solving and the level of potential development as determined through problem solving under adult guidance, or in collaboration with more capable peers. We will write a custom essay sample on Socio Cultural Dimensions of Learning or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Vygotsky among other educational professionals believes the role of education to be to provide children with experiences which are in their ZPD, thereby encouraging and advancing their individual learning. Scaffolding. For Vygotsky, scaffolding is the process of providing a child or adolescent with a good deal of support during the time he is learning something. To successfully apply it in a classroom, it is important to know not only where a child is functioning now and where that child will be tomorrow, but also how best to assist that child in mastering more advanced skills and concepts. This is where scaffolding comes in. Although not used by Vygotsky himself, the concept of scaffolding helps us understand how aiming instruction within a child’s ZPD can promote the child’s learning and development. Socio-cultural context of knowledge. Vygotsky emphasizes the important role of culture in influencing how individuals learn and think. His thinking has had a significant impact on research demonstrating that cognition is â€Å"situated† – occurs in content. Social Processes in Learning Situated Learning (Situated learning is related to Vygotsky’s notion of learning through social development. Situated learning is a general theory of knowledge acquisition. It has been applied in the context of technology-based learning activities that focus on problem-solving skills. Lave (1988) argues that learning as it normally occurs is a function of the activity, context and culture in which it occurs. This contrasts with traditional classroom learning activities which involve knowledge which is often presented in an abstract form and out of context. Social Interaction is a critical component of situated learning – learners become involved in a ‘community practice’ which embodies certain beliefs and behaviours to be acquired. Learning becomes a Social Process dependent upon transactions with others placed within a context that resembles as closely as possible the practice environment. Principles: 1. Knowledge needs to be presented in an authentic context, i. e. , settings and applications that would normally involve that knowledge. 2. Learning requires social interaction and collaboration. The two approaches to learning: decontextualized (classroom) versus contextualized (situated) learning. General Idea of situate learning: â€Å"If you put a learner in a real world situation (authentic context) and interact with other people then learning occurs. † Situated learning as well can be applied in technology based learning activities focused on problem solving skills. In this type of learning and participative methods can be used extensively by the teacher so that students will learn more effectively. Communication Patterns in Learning Sociolinguistics Is the study of language in society. Sociolinguistics is the study of the linguistic indicators of culture and power. Sociolinguistics is the study of the effect of any and all aspects of society, including cultural norms, expectations, and the way language is used. It studies how dialects differ between groups separated by certain social variables, e. g. , ethnicity, religion, status, gender, level of education, age, etc,. and how creation and adherence to these rules is used to categorize individuals in social class or socio-economic classes. Sociolinguists also study the grammar, phonetics, vocabulary, and other aspects of this sociolect much as dialectologists would study the same for a regional dialect. Sociolinguistics is the effect of the society on the language, while the latter’s focus is on the language’s effect on the society Fundamental concepts in sociolinguistics Speech community: describes a more or less discrete group of people who use language in a unique and mutually accepted way among themselves. High prestige and low prestige varieties; certain speech habits are assigned a positive or a negative value which is then applied to the speaker. Social network is another way of describing a particular speech community in terms of relations between individual members in a community. A social network may apply to the macro level of a country or a city, but also to the intrapersonal level of neighborhoods or a single family Recently, social networks have been formed by the intern. et, through chat rooms, online dating services. Types of Classroom Interaction To avoid overemphasizing the theory and memorization of the material presented in class, teachers employ classroom interaction to give students the ability to think critically, focus on specific details and practice what they have learned. Teachers have access to many methods of creating an interactive classroom. Common methods include classroom conversation, question-and-answer, reading aloud and role-playing. Reading Aloud Reading aloud is a classroom activity in which one person is reading while others listen. Reading aloud may be performed by the teacher or student. Reading aloud may be performed by a single person or by a group taking turns. This form of highly structured classroom interaction allows all students to be focused at exactly the same point in a reading. This allows students to easily focus on vocabulary and pronunciation. Conversation Classroom conversation is a form of classroom interaction in which students in the class discuss a given topic. The conversation may be held across the whole class or in smaller groups. Conversation is an important form of classroom interaction because it helps students develop their language skills. In a conversation, students may apply the skills and knowledge they have acquired in the class, making classroom conversation a practical form of interaction. Role-Play Role-playing is an activity in which students take on given or chosen roles and act out a scene with others. This form of interaction lends itself to almost any situation, and the only restriction is a students imagination. Role-playing allows students to demonstrate their creativity and knowledge about their roles, and it allows students to think outside of the constraints of the classroom and consider how they might apply the learned material to the real world. This form of interaction can integrate different subjects into one activity. Question-and-Answer Question-and-answer is a traditional form of classroom interaction in which a teacher or student explains and poses a question for the other. Questions asked by the teacher are usually for the purpose of assessment, while questions asked by the students are usually for obtaining new information. The Socratic method is also a form of question-and-answer interaction. The Socratic method is a form of asking questions with the intent of leading students to discover the answer themselves. Question-and-answer as a form of interactive learning allows students to have a large influence on the agenda of the classroom, because it allows them to freely express their thoughts and feelings.

Thursday, April 16, 2020

Sample Compare and Contrast Essay on Racism

Sample Compare and Contrast Essay on RacismA sample compare and contrast essay on racism is a good thing to have in your student's essay library. It is a small easy to download lesson plan that can help you ease students' way into the world of politics and knowledge. In fact, it is even more necessary as it can provide you with a good basis of analyzing the big picture of racism.The main aim of this essay is to get your students to discuss the matter as best as they can and to answer what really is racism. Therefore, it should be clear for you as the teacher to know what kind of questions will have students on the edge of their seats. Even though the different types of racism can be quite different in terms of meaning, we will always consider the most common kinds as racist.We are going to start the article by telling you how difficult stuff can be to understand, so let us first get some basics about racism and then we will move on to examples and situations. When analyzing some of t he situations and events that are truly difficult to understand, one of the main things that can help you is a sample compare and contrast essay on racism.These types of essays have been around since the beginning of the 20th century and they are still used today in real time situations. These have helped many teachers in teaching their students some basic facts that can make them understand these topics and that is why the introduction of a sample compare and contrast essay on racism can help you teach better. Of course, the lessons must be brief and it must give enough information to be understood in just ten minutes or less.Sample essays such as these are designed to be easy to read and to understand. This is a great advantage because they will keep your students from being stressed out and distracted while they are reading the lesson plans. With these essays, students will be able to understand the concepts and learn important things while reading the essay.There are many people who want to know exactly what racism is, especially from all the important and famous news outlets such as the BBC. They want to know everything there is to know about this different form of prejudice and discrimination and this is where these sample essays come into play. These samples can help you answer this question.Think about it, most of these groups (based on race) cannot talk to each other as if they were human beings. These groups are in a way biologically different, but somehow, they can all talk to each other. They can all think, but they also can't agree on what actually is racism.Explain to your students that racism is the act of treating others differently from yourself based on race. It is not limited to racial, ethnic or religious grounds. It is simply racism in any other sense.

Monday, March 16, 2020

Battle of Salamis in the Persian Wars

Battle of Salamis in the Persian Wars The Battle of Salamis was fought in September 480 BC during the Persian Wars (499-449 BC). One of the great naval battles in history, Salamis saw the out-numbered Greeks best a larger Persian fleet. The campaign had witnessed the Greeks pushed south and Athens captured. Regrouping, the Greeks were able to lure the Persian fleet into the narrow waters around Salamis which negated their numerical advantage. In the resulting battle, the Greeks badly defeated the enemy and forced them to flee. Unable to supply their army by sea, the Persians were forced to retreat north. Persian Invasion Invading Greece in the summer of 480 BC, Persian troops led by Xerxes I were opposed by an alliance of Greek city-states. Pushing south into Greece, the Persians were supported offshore by a large fleet. In August, the Persian army met Greek troops at the pass of Thermopylae while their ships encountered the allied fleet in the Straits of Artemisium. Despite a heroic stand, the Greeks were defeated at the Battle of Thermopylae forcing the fleet to retreat south to aid in the evacuation of Athens. Assisting in this effort, the fleet then moved to ports on Salamis. Athens Falls Advancing through Boeotia and Attica, Xerxes attacked and burned those cities that offered resistance before occupying Athens. In an effort to continue resistance, the Greek army established a new fortified position on the Isthmus of Corinth with the goal of defending the Peloponnesus. While a strong position, it could be easily outflanked if the Persians embarked their troops and crossed the waters of the Saronic Gulf. To prevent this, some of the allied leaders argued in favor of moving the fleet to the isthmus. Despite this threat, the Athenian leader Themistocles argued for remaining at Salamis. Frustrations at Salamis Offensively-minded, Themistocles understood that the smaller Greek fleet could negate the Persian advantage in numbers by fighting in the confined waters around the island. As the Athenian navy formed the larger component of the allied fleet, he was able to successfully lobby for remaining. Needing to deal with the Greek fleet before pressing on, Xerxes initially sought to avoid fighting in the narrow waters around the island. A Greek Trick Aware of discord among the Greeks, Xerxes began moving troops towards the isthmus with the hope that the Peloponnesian contingents would desert Themistocles in order to defend their homelands. This too failed and the Greek fleet remained in place. To promote the belief that the allies were fragmenting, Themistocles began a ruse by sending a servant to Xerxes claiming that Athenians had been wronged and wished to switch sides. He also stated that the Peloponnesians intended to depart that night. Believing this information, Xerxes directed his fleet to block the Straits of Salamis and those of Megara to the west. Moving to Battle While an Egyptian force moved to cover the Megara channel, the bulk of the Persian fleet took up stations near the Straits of Salamis. In addition, a small infantry force was moved to the island of Psyttaleia. Placing his throne on the slopes of Mount Aigaleos, Xerxes prepared to watch the coming battle. While the night passed without incident, the following morning a group of Corinthian triremes was spotted moving northwest away from the straits. Fleets Commanders Greeks ThemistoclesEurybiades366-378 ships Persians XerxesArtemisiaAriabignes600-800 ships Fighting Begins Believing that the allied fleet was breaking up, the Persians began moving towards the straits with the Phoenicians on the right, the Ionian Greeks on the left, and other forces in the center. Formed in three ranks, the Persian fleets formation began to disintegrate as it entered the confined waters of the straits. Opposing them, the allied fleet was deployed with the Athenians on the left, the Spartans on the right, and other allied ships in the center. As the Persians approached, the Greeks slowly backed their triremes, luring the enemy into the tight waters and buying time until the morning wind and tide (Map). Greeks Victorious Turning, the Greeks quickly moved to the attack. Driven back, the first line of Persian triremes was pushed into the second and third lines causing them to foul and for the organization to further break down. In addition, the beginning of a rising swell led the top-heavy Persian ships to have difficulty maneuvering. On the Greek left, the Persian admiral Ariabignes was killed early in the fighting leaving the Phoenicians largely leaderless. As the fighting raged, the Phoenicians were the first to break and flee. Exploiting this gap, the Athenians turned the Persian flank. In the center, a group of Greek ships managed to push through the Persian lines cutting their fleet in two. The situation for the Persians worsened through the day with the Ionian Greeks being the last to flee. Badly beaten, the Persian fleet retreated towards Phalerum with the Greeks in pursuit. In the retreat, Queen Artemisia of Halicarnassus rammed a friendly ship in an effort to escape. Watching from afar, Xerxes believed that she had sunk a Greek vessel and allegedly commented, My men have become women, and my women men. Aftermath Losses for the Battle of Salamis are not known with certainty, however, it is estimated that the Greeks lost around 40 ships while the Persians lost around 200. With the naval battle won, Greek marines crossed and eliminated the Persian troops on Psyttaleia. His fleet largely shattered, Xerxes ordered it north to guard the Hellespont. As the fleet was necessary for the supply of his army, the Persian leader also was forced to retreat with the bulk of his forces. Intending to finish the conquest of Greece the following year, he left a sizable army in the region under the command of Mardonius. A key turning point of the Persian Wars, the triumph of Salamis was built upon the following year when the Greeks defeated Mardonius at the Battle of Plataea.