Wednesday, July 31, 2019

Love hula, love Hawaii Essay

Mele Kalikimaka is the thing to say on a bright Hawaiian Christmas Day That’s the island greeting that we send to you from the land where palm trees sway Here we know that Christmas will be green and bright The sun to shine by day and all the stars at night Mele Kalikimaka is Hawaii’s way to say Merry Christmas to you [1] (Robert Alex Anderson) If ask people a question that which place has the most beautiful beach, sunshine and full of enthusiasm, I think most people will have the same answer, Hawaii. As we all know, Hawaii is the most famous holiday resort in the world, people who are from all over the world come here to enjoy the beautiful scenery, watch the hula dance and eat delicious food. However, people should also know the culture, which are the symbols of Hawaii, such as hula, chant and mele. If you’ve ever been to Hawaii or see some shows about it, you have undoubtedly enjoyed the exotic, hip-swaying dance called â€Å"hula.† Beautiful island women and men â€Å"act out† the music through dance steps to tell stories, particularly their graceful arm movements. Hula was developed in the Hawaiian Islands by the Polynesians who originally settled there. When Captain Cook arrived in Hawaii in 1779, the Hawaiian people had been dancing hula for centuries. Hula was danced as part of a religious program in the old days. Then, when the missionaries arrived in the 1830’s, they convinced Queen Kaahumanu to prohibit hula because they thought hula was erotic. â€Å"It was described like this – â€Å"The natives would practice in the hot sun for days on end. Drums pounded, gourds rattled, singers chanted, and hundreds of dancers wearing garlands of green leaves and flowers and dog-tooth anklets moved endlessly to and fro in lines, their brown skin glistening with sweat, with no sign of boredom or tiredness,† (Daws, 1968)†[2] And hula was popular after King Kalakaua made it opened in the 1870’s. Today Hawaiian dance has an added political dimension in that knowledge and understanding of this cultural form are valued as an ingredient of ethnic identity (Adrienne Kaeppler 1993:234). â€Å"Dance as part of a political construction, can be an aural and visual statement of distinctiveness – and in some cases divisiveness –and need not be associated with cultural understanding. More ethnic Hawaiians are beginning to appreciate and champion the importance of their heritage. More and more Hawaiians – male and female – are studying hula in order to become part of the ethnic movement.†[3] As I know, native Hawaiians know the importance of hula and treat it as their pride. The government also pays attention on hula and advertises the culture of hula. Mele is perhaps the most important cultural symbol of the Hawaiians. â€Å"It is the way ancient Hawaiians prayed and passed on legends and lore, linking their prehistory with their present life.†[4] I still remember when I first heard the melody of Hawaii song; I can felt the enthusiasm of this island immediately. For example, â€Å"Mele Kalikimaka† is a Hawaiian themed Christmas song written in 1949 by Robert Alex Anderson, when I hear the lively music, I would be relaxed. â€Å"Everything because hula is the unique dance of the Hawaiian people. Everything because despite the homogenizing influence of hula competition, which has brought only a limited range of the vast hula repertoire to the public’s attention over the past thirty-five years, hula encompasses many different styles and types of dances. But it says nothing because hula simply cannot be reduced to Hawaiian folk dance. It carries forward the social and natural history, the religious beliefs, the philosophy, the literature, and the scientific knowledge of the Hawaiian people.† [5] I think hula carries a lot of things, such as the religious beliefs, the social and natural history of Hawaii, the literature and philosophy, and Hawaiians and hula are inextricably fused. In conclusion, hula is an indispensable part of Hawaii and also treated as an important culture of the world. For me, Hawaii is the place I will go someday, I am sure I will love Hawaii and it’s culture while enjoy the beautiful scenery and ebullient show. References: 1. The lyrics of â€Å"Mele Kalikimaka† by Robert Alex Anderson 2. A brief history of hula. Retrieved from http://library.thinkquest.org/J0110077/hulahistory.htm 3. Torgersen, E. H. (June 2010). The social meanings of hula. University of Bergen. Retrieved from http://pacific.uib.no/people/Torgersen/The Social meanings of hula.pdf 4. Fellezs, K. (Spring 2007). Performing hawaiian. New York: Brooklyn College of the City University. Retrieved from http://depthome.brooklyn.cuny.edu/isam/NewsletS07/Fellezs.htm 5. Rowe, S. M. (2008). We dance for knowledge. Cambridge University Press. Retrieved from http://muse.jhu.edu/journals/drj/summary/v040/40.1.rowe.html

Tuesday, July 30, 2019

Naturalistic Observation Essay

Using the Naturalistic Observation my hypothesis was simply is the children’s choice a naturally driven behavior in an active aggressive or active passive ways. By watching a group of 7 year old boys and girls in a daycare setting over a few days, I was able to see the different behaviors. I thought I would discover that girls are just as aggressive as boys but that is not necessarily so. Ethically speaking, I was able to ask the parents if I may observe the children (not using their names or the location of the daycare) for the class assignment and showed them the assignment. Informed consent is a process in which a participant consents to participate in a research project after being informed of its procedures; risks, beneï ¬ ts, and dignity are all protected. Yes, 7 year old boys seem to be hard-wired for more active and aggressive pursuits than 7 year old girls. Boys are more physically active than girls, in infancy and throughout childhood. They kick, swing their arms and race around the house noticeably more than girls do, as many exhausted parents can testify. Girls are quite content to sit there and play with their dolls where the boys like trucks and wrestling around. Given a choice of Power Rangers, Tonka, and a Barbie beauty set, the 7 year olds, boys and girls, actually prefer the gender appropriate choices. In fact, children’s gendered toy choice is one of the largest sex differences in behavior.

Monday, July 29, 2019

Arizona State Museum building located in the University of Arizona Essay

Arizona State Museum building located in the University of Arizona - Essay Example This will take into consideration of the context, audience and the visual impact. I hope to comprehend and convey to the reader how this type of building is designed and the type of collections of the building employ the use ethos, pathos, and ethos. Audience : My audience will be the teacher of my English class. He has in depth comprehension of rhetorical appeals, in this regard I must present my argument using the accurate knowledge of rhetoric. I am obliged to avoid advocating and generalizing. Context: My paper will be one of the papers that my teacher will read this assignment, so I have to be insightful and creative in my analysis. I have to make arguments in order to grab his attention. Outline Introduction: I plan on using my introduction to establish my own ethos as well as describe the the structure and design of the building that is being analyzed. I will describe my experience in and outside of the Arizona State Museum building which will help the reader to understand tha t I had the opportunity to analyze the building at is significance in the University of Arizona. ... Introduction When we think about teaching rhetoric and critiquing rhetorical acts, we base out thoughts on text and artifacts that are primarily oral or written. Nonetheless, our day to day experiences are saturated with the rhetorical invocation that move beyond the written word to visual. The objective of this essay is to explore the multi – modality of the rhetoric and illustrates how we think about the rhetoric on a wider perspective. The arguments regarding architecture particularly invoke this focus that deals with the nature objects, spaces and artifacts (Rosteck 45). This case study looks at one specific building known as Arizona State Museum building in order to show how this type of rhetoric takes place. Despite the distinct content of the building, the visual, textual and experimental are all used mimetically. This means that multi- model rhetoric on this site imitates the form a function of a natural history museum in order to persuade its visitors of its legitimac y. The Arizona State Museum building is the oldest and the largest anthropology museum located in the southwest region of the campus was established in 1893 by the Arizona Territorial Legislature. This building is the state’s official permitting agency for archeology and paleontologist projects. This is one of the oldest research units at the University of Arizona. It is known for hosting numerous researchers around the world and allow them to use the collection to expand their frontier of their knowledge in enthology, ethnohistory and archeology. The museum resides among several buildings. Most of these buildings look similar as they are made of stone colored concrete slabs and reflective

Sunday, July 28, 2019

Outline a plan to stop a planned terrorist incident conducted by Research Paper

Outline a plan to stop a planned terrorist incident conducted by Hezbollah - Research Paper Example Additionally, the paper discusses the mitigating and responsive factors that are paramount in order to avoid the loss of lives as occurred during the 9/11 attacks. Furthermore, the discourse delves into the fundamental preventive measures such as the application of the Patriot Act that uses intelligence and surveillance to stop terrorism suspects from perpetrating their acts. There are different hazards that the terrorist group, Hezbollah is capable in terms of its militant activities. This ranges from shooting down planes carrying high profile personalities and planting bombs in influential buildings. Similarly, this Jihad-guided organization has power to hijack planes and ram into buildings the way Al Qaeda did in the 9/11 attacks in America that resulted to several loss of lives. However, it is noteworthy to observe that Hezbollah initially was not a jihadist group but a form of movement that played a fundamental in Lebanon’s independence (Bullock, Haddow & Coppola, 2009). On that aspect, this group has developed a deep hatred for the Christian Maronite and the Sunni. This has hardened the group into the most dreaded global terrorist organization that executes its missions through suicide bombings. For example, there were more than thirty incidents of suicide bombings in Lebanon in the early 80s though the group does not acknowledge their acts. This deadly tactic was also used in 1983 when a suicide bomber riding vehicle packed explosive materials drove near USA barracks and killed more than two hundred and forty one US marines (Uda, 2009). Apart from the use of suicide bombings, this militant organization also uses extortion as a technique of communicating their message to their enemies that include Israel and the US. This has been apparent in cases where members of either states or their sympathizers have been caught by the group. Moreover, the extortion always

Registered Nursing Essay Example | Topics and Well Written Essays - 500 words

Registered Nursing - Essay Example Since ill patients depend on nurses, I am interested to venture in this since it is my dream to touch and provide comfort to people who are not well. To be qualified though, I have to be registered to make sure I deliver quality health care. This is for me to meet the educational requirement. Although, educational requirement depends on the country you are to be registered, nevertheless, in most part of the globe, the completion of a bachelor’s degree or associate’s degree is the foremost requirement. A student may graduate with an earned diploma. The bachelor’s degree last for four years and is more comprehensive because it includes both theory and practicum to sharpen nursing skills learned in the four walls of the classroom. Practicum is done in the hospital and in the community settings. Associate program on the other hand, is taken for only two years with both theory and clinical exposure just the same but not as comprehensive as the bachelor’s degree . This makes most registered nurses to go back to pursue bachelor’s degree to meet the prerequisites and be selected for nurse’s NCLEX examination (Baker, 2008). Attached to the white uniform of nurses, I do understand that they have varied tasks since they comprise the biggest group within the health care system.

Saturday, July 27, 2019

International Business (CH2, CH3, and Movie 'GUNG HO) Review

International Business (CH2, CH3, and 'GUNG HO) - Movie Review Example The second implication is that informal institutional frameworks provide some structure to an organization where formal institutions are not visible or where the formal institutions have failed. Managers should constantly be aware of both formal and informal institutional frameworks that influence their employees. This will allow the managers to manage to the framework and adjust with fluid plans if the frameworks break down. It will also allow the managers to better predict the behaviors and actions of their teams. Section 2: (40 Points) For this assignment you will be required to locate and watch the movie Gung Ho and then apply the concepts that were discussed in Chapter 3 of the textbook by answering the questions outlined below. The movie is about a small town that has always relied on manufacturing for its livelihood. The two factories have closed down, the service businesses are moving out of the town, and the majority of adults are unemployed. Hunt Stevenson solicits a Japanese company to reopen the factory. The movie tells the story of the challenges the Japanese executives, employees, and townspeople encountered during and after the reopening. This is relevant to the concepts of global business today because advancements in technology, travel, and collaboration blur the lines that separate countries. Global interactions are a frequent, everyday occurrence for many businesses. Understanding the different cultures with which one will be working is critical to maintain relationships and smooth production. b. Outline the cultural differences that exist between the Japanese management team and their US Workers? Specifically address each of the following differences by describing examples from the movie. (16 Points) Collectivism focuses all members of the team on a single purpose as a single unit. This was apparent from the first day of the factory

Friday, July 26, 2019

Internet Tools as Dirt Bikes Essay Example | Topics and Well Written Essays - 1500 words

Internet Tools as Dirt Bikes - Essay Example This information is very instrumental in strategizing the business operations and products. Internet tools are one powerful way of achieving a good level of communication in an organization. How Dirt Bikes could benefit from intranets for sales and marketing, human resources, and manufacturing and production Callaghan (2002) defines intranets as private networks created by organisations using the web technology and the internet networking standards. They create networked applications that are able to run on several types of computers in the organisation including wireless devices that can have remote access and handheld computers. In this way, intranets can be said to provide access to data across an organisation. An intranet can be utilised by the employees of an organisation like Dirt Bikes for human resources, sales and marketing, and production and marketing. Sales and marketing Intranets can help to improve the level of communication between an organisation and its authorised distributors or clients or customers. This can be achieved by linking the computers of customers who have a web browser to the company’s network. This encourages authorised customers of a company to make orders or inquiries about the products of the company. This is because intranets enable the employees of a company to access information from any part of the organisation and hence respond immediately and accurately to the inquiries or needs of their customers (Laudon and Laudon. 2009). This is unlike following long procedures of written requests or face-to-face inquiries. With improved links and access to the company website, these buyers will be able to get timely information regarding the company’s new products, their features and costs. It also eases the process in which the company communicates about its new products to the authorised buyers or distributors. Improved sales can be attained if a company is able to provide customised services to its customers. By utilising the improved communication afforded by the intranet, the employees of Dirt Bikes will be able to respond immediately to product preferences of its various customers. For example, a customer may want an exchange of the brand of motor cycle delivered to them or those found in the distributor stalls. This makes business with the company a memorable one. Superior customer experience encourages repeated business with the company (Laudon and Laudon. 2009). Human resources Intranet increases the level of human resource management and utilisation in a company. Increased human resource management can be achieved by posting benefits information and employee manual on the intranet. This reduces the time spend by the human resource managers of the Dirt Bikes in answering employee questions. It also increases response to employee concerns. Callaghan (2002) explains that intranet facilitates teleconferencing and enables the workers of a company to work together. For example, the human resource manager is able to discuss employee or corporate issues with company employees through the intranet. Employees are also able to communicate with one another with an aim of seeking help or clarifications from each other concerning production. Due to uniformity in information received by all employees, a company is able to cultivate and foster a corporate culture among all its employees. The intranet will also increase the level to which Dirt Bikes utilises its human

Thursday, July 25, 2019

Investigate a given organisation to analyse its current position, Essay

Investigate a given organisation to analyse its current position, evaluate the strategic options available, and recommend the strategic route - Essay Example Besides the technology advancement, competition is rapidly increasing in almost every industry, and this could send some businesses into oblivion. In line with that, this paper seeks to analyse the current position, evaluate the strategic options and recommend the most appropriate strategic route for the Dyson Company. Founded in 1993 by James Dyson, Dyson Company is a UK-based firm, which specialises in the designing and subsequent manufacturing of heaters, bladeless fans, dryers and vacuum cleaners. Though based in the UK, the company extends it services to 80 other countries around the globe, and as of December 2013 the firm’s profit stood at a staggering  £800,000,000. It currently provides employment to over 5,000 people around the world 1.Innovation has been the key driver of this company as evidenced by the creation of Ballbarrow, an alternative wheel for wheelbarrows that James Dyson invented after finding it hard to use the then ordinary wheelbarrow. A business current position is judged through its various parameters including its values, unique selling point (USP) and market share. A business has to remain distinct among other competitors in order to remain not just afloat, but also ensure it achieves its goals. By offering a unique product, a firm sets itself above others; with values that correspond to the needs of people a firm attracts a list of clientele 2. Identifying the market where a firm belongs helps it in focusing on the same to ensure the clients are served properly. In the case of Dyson, the current position is that it is well positioned despite the presence of other players in the market. The above assertions are informed by the recent statistics, which show the firm’s growth increasing each year. For instance, in 2011 the firm’s profits increased by 8% followed by 30% in 2012 and there has no announcement of loss in the last two years either 1. Besides the profits increasing annually, the firm’s market share

Wednesday, July 24, 2019

Multiculturalism Essay Example | Topics and Well Written Essays - 1250 words - 1

Multiculturalism - Essay Example We have to get rid of the stereotypes and learn to embrace the strengths that everyone brings to the table. Instead of ridiculing someone because they are different we are to seek the commonalities so that everyone is included in whatever we are doing. When you are in a classroom it is very important to take into consideration the diversity of cultures that are represented. In many school districts Americans struggle with the idea that they have to teach English as a second language to those children who come from Mexico. It is important to make sure that all children are included in the classroom by encouraging them to explore their differences. Some teachers bring in readings about different cultures and create activities around them. Children today do not only have racial differences because of the extended families that raise them. Today a teacher my have children who are disabled, who come from single parent homes and those who come from gay or lesbian homes. These are all a part of the multicultural arena in the class room and all should be made to feel comfortable in their learning. Gender bias in the classroom is not new. There have been several studies done to show that boys and girls receive different educations in most classrooms. In elementary schools many girls are looked over when they raise their hand to answer a question in favor of a boy to answer. In other classrooms it is the boys who are getting the lower grades and who are being referred to special education classrooms. Sometimes this bias comes because of the way the teacher perceives the individual learners in each category. Some teachers seem to socialize young girls towards what they expect a feminine individual to do. They also pressure the boys to accept the role that someone masculine would assume. Chapman (2008) suggests that education teaches girls that they are not equal to boys and there are behaviors that

Tuesday, July 23, 2019

Economic Analysis Essay Example | Topics and Well Written Essays - 2000 words

Economic Analysis - Essay Example It is expressed as a percentage change in the quantity of a product demanded as a result of a small change in price. In reality, the price elasticity for demand is affected by many other factors other than just the price of commodity. When making calculations, it is normally assumed that all the other factors which could affect PED remain constant. High price elasticity means that the demand for the product is extremely sensitive to changes in commodity price. A zero measure shows that the demand is inelastic and thus will not be affected by changes in pricing. When the value is one, it shows that the demand is perfectly elastic and thus a pricing change will result to an equal change in demand. When the elastic is more than one, it implies that the demand is elastic and when the pricing is changed, it will automatically result in change in the demand from the item as wrong as all the another factors are kept constant. The cross-price elasticity measures the responsiveness of a product demand to changes in price of another commodity. It is measured as a percentage of change observed in the demand for a product as a result of price change of a completely different commodity. It can be used to determine the type of relationship existing between two products (Mankiw 2012). It allows economists to make a distinction between complementary and substitute commodities. Products can be defined as compliments of each other when the calculation of the cross elasticity for demand yields a negative result. When the measure gives a positive value, it is an indication that the products are substitutes of each other. When the calculations yield a zero measure, then there is no relationship between the products (Wetzstein 2013). When a competitor reduces prices of its prices, rival organization will have to consider the calculation of cross-price elasticity of demand in estimating the impact of this price change o n the demand for its products. This in turn makes the

Monday, July 22, 2019

Rule Utilitarianism Essay Example for Free

Rule Utilitarianism Essay Mills Utilitarianism brings an extended concept of Benthams philosophy and a response to Kants deontological philosophy. The basic concept of utilitarianism is to act in such a way as to create the most pleasure or the least pain. This is the guideline because, as Mill states, we desire happiness; happiness is maximizing pleasure and minimizing pain. However, is utilitarianism viable? There are many arguments for it, but just as many against. First, utilitarianism allows for the good of all. Mills wrote, Actions are right in proportion as they tend to promote happiness, wrong as they tend to produce the reverse of happiness. Because morality is based on the greatest pleasure the more people who benefit from an act, the more moral it is. This prevents a single person from only acting for his own benefit by requiring the consideration of his acts on others. It also allows difficult moral decisions to be made on a governmental level by considering the needs of the many. For example, it is policy in a hostage situation to refuse to give in to the captors. This is morally justified even if it endangers the lives of the hostages because the greater pain lies in encouraging future hostage situations by yielding to the captors. Another positive aspect of utilitarianism is that there is a purpose to the morality. One acts morally because it causes pleasure and happiness, or prevents as much pain as possible. In fact pleasure and freedom from pain are the only ends desirable in and of themselves. This differs from the deontological concept of philosophy, where an act is not good because it causes pleasure, but only when it is done out of duty from universal maxims. This also creates problems of motivation that are avoided by Mills Utilitarianism. According to Kant, saving a mans life for a reward or other personal gain is immoral because of the motivation, however Mill would find that this act is indeed moral because saving a life, no matter the intention, prevents the most pain and causes the most pleasure. Not only is there a purpose behind utilitarian morality, but there is also an inherent flexibility within utilitarianism. Because each act is examined for its moral worth, there is not the rigidity that is found within Kants universal maxims. With Kants deontological philosophy creates moral dilemmas when an act that would seem to be moral goes against a universal maxim. For example, a universal maxim of Do not kill would need to be broken in a situation of self-defense. While Kant provides for this with a universalization rule, utilitarianisms individual examination of each act allows morality to be more specific and adaptable. While a murder would almost always be immoral, killing in defense of self would almost always be moral. A negative to utilitarianism is that, though adding to flexibility, the individual evaluation of an act takes time. To do this mental weighing of pleasure and pain before every act, or even every major act, is not only time consuming but many times self-defeating. Situations that require an immediate action cannot wait while everyone ponders the morality of their potential actions. In fact, it could be posited that a person must ponder the morality of stopping to ponder the morality of the original action. That path leads to turtles all the way down. Mill does have a response to this however: the state of passive sensibility, and though originally an offshoot from it, may in time take root and detach itself from the parent stock; so much so, that in the case of an habitual purpose, instead of willing the thing because we desire it, we often desire it only because we will it. Or simply, habit will allow us to make decisions without always having to ponder the consequences. However as many people are not typically faced with emergency situations, they wont be able to develop a habit for the very situations that require the most immediate attention. Perhaps a more serious problem with utilitarianism is that it can be used to justify acts that society would consider unjust. A common example is slavery: if 95% of the population can be made happy when the other 5% is enslaved is slavery not the greatest good? Utilitarianism allows society to sacrifice the individual, or even the minority for the majority. If by speaking one lie, a person could save 4 lives than that lie would be a moral act; but if by killing one man, that same person could save 4 lives wouldnt utilitarianism find this too to be a moral act? Fortunately Mill has a response to the idea of removing an individuals rights for the good of the whole. . In chapter V of his essay he writes, To have a right, then, is, I conceive, to have something which society ought to defend me in the possession of. The reason for this, Mill states, is general utility. It is generally better to protect the rights of every man, because this will lead to the most happiness. However, it seems there is still a way to put society before the individual. Because the reason for protecting individual rights is general utility, if violating those rights will cause the least pain, as compared to pain for the whole society, it would be general utility to violate these rights. But perhaps it is sometimes necessary to sacrifice one for the good of all. Utilitarianism has some strong arguments both for and against. And it also has another out because there is a distinction between two different types of utilitarianism. Act utilitarianism examines each action for its moral worth, but rule utilitarianism creates general values of moral worth. Does rule utilitarianism help answer some of the negatives of utilitarianism? It definitely solves the issue of time. With rule utilitarianism a person no longer must consider his every single move. There are general guidelines that cover the everyday situations. That downside is that there cant be good guidelines for extraordinary situations, so the issue of time being required when there is the least time to spare is still present. Rule utilitarianism also protects the rights of the individual. Taking into account general utility allows a general rule to be made guarding every persons rights. This isnt to say the rule couldnt be broken, but it would require extraordinary circumstances that made the general utility violate the rule. Overall, utilitarianism is a viable option as a system of morality. http://www. utilitarianism. com/mill1. htm- online text of Mills Utilitarianism.

An Analysis of Psychology in Art Essay Example for Free

An Analysis of Psychology in Art Essay Kahlo’s painting Self Portrait with Cropped Hair (1940) and Lichtenstein’s Drowning Girl (1963) both use emotive techniques in order to convey more subtle feelings. While Lichtenstein employed a more bold look to his female subject, Kahlo uses a formal stance in her self-portrait, but both give the viewer the idea of sorrow being the center subject behind these female figures. Kahlo’s self portrait shows a woman on a chair (presumably Kahlo) with the cut pieces of her hair scattered all about her. This use of the hair being all around the main figure gives the viewer the impression of a battle – that Kahlo lost. Hair is a metaphor in the painting – a metaphor of peace or strength. In the bible the symbol of hair can be found in the story of Samson and Delilah in which Samson got his strength from his hair, and the prostitute Delilah cut it all off thereby rendering the hero useless. If then, Kahlo’s hair is her strength it is almost as though the viewer is peering on to a death sentence of the woman. The death sentence in Lichtenstein’s work is much more blatant as the drowning girl states in her bubble â€Å"I’d rather sink than call Brad for help† which coordinates this theme of desperation and sorrow. The stance of either female in their respected representations are opposite: Lichtenstein gives his subject a subdued and hopeless stance being already almost entirely submerged in the water and thereby closer to death while in Kahlo’s painting, although nearly all of her hair is spread about her in a form of defeat, the figure stands in erect position rather in a stance of having lost the battle. There is distinctly more depth present in Kahlo’s painting, with the cut hair scattered on the ground and the angles of the chair making the viewer fell as though they are peering into this event. In Lichtenstein’s work the viewer is given a close up of the woman who doesn’t allow for much depth to be viewed – but in classic Lichtenstein technique, his use of flat planes further develop this loss of field of depth. This is perhaps a metaphoric sense of depth since Kahlo’s portrait is subtle and the viewer has to read into the subject and the subtler emotions involved in the work while in Lichtenstein’s work the viewer merely has to read what the girl says in order to understand everything about the painting in one glance. With a second glance at the figure in Kahlo’s work (and with the history of her recent divorce from her unfaithful husband Diego Rivera) the viewer may guess that this cutting of the hair is symbolic of Kahlo’s state of emotions. Perhaps she is shedding the part of herself that Diego had claimed as Kahlo has said of her art, I do not know if my paintings are Surrealist or not, but I do know that they are the most frank expression of myself. (Kahlo). Thus, in cutting of her hair (presumably he loved long haired women) she is making a claim of self identity away from her cheating husband and thereby the painting becomes transformed into a woman losing hair, into a woman gaining her identity. The top of Kahlo’s painting even states as much in saying, â€Å"Look, if I loved you it was because of your hair. Now that you are without hair, I dont love you anymore. † Lichtenstein’s portrait of a woman who is also in the bad end of love also has a small bit of this identity. She states that she would rather die than have Brad come and help her, but the viewer wonders, why doesn’t the woman try and save herself? The depth that is lacking in the field of vision with Lichtenstein’s work is replaced by a depth into personality of the woman. A psychologist might argue that the woman has an Ophelia complex (from Hamlet) in which she would rather die than live without her lover. In either instance, it is clear that both artists are trying to depict an emotional state in which love is the cause of the effects. Lichtenstein’s work is predominately innovated through DC comics (a panel of which inspired The Drowning Girl). His use of Benday dots emphasize a stylistic approach. Kahlo’s art is more surreal in nature and symbolic in style as is evident in Self Portrait with Cropped Hair. In surrealistic style, Kahlo allows the interchange of gender to play a dominate role in the painting. The figure, Kahlo herself, is dressed in men’s slacks and a shirt, thus allowing the short hair to almost define her in a masculine capacity. In Lichtenstein’s work the gender of the painting is quite clear with the woman showing attributes a helpless woman drowning in the water as well as in love. This woman relinquishes her control over her fate in a rather docile component of femininity (the viewer is reminded of the big bosomed females in horror movies who run from the monster in drastic steps only to fall in their high heels and be destroyed by their pursuer). In Kahlo’s painting, perhaps because of this gender bending idea, the woman becomes like a man, that is, able to survive, or, in comparison, she becomes the pursuer and thereby strong. In opposition to the bible story then, Kahlo does not in fact become weak in losing her hair, but rather the painting is meant to suggest that she becomes strong in this shedding of hair, and husband. In either painting it is clear that both artists are interested in the psychology of their subject. In the DC comic world by which Lichtenstein gained inspiration, women were somewhat helpless creatures in the 1960’s only gaining a feminine stance in the 1980’s or so. His vision of women through his portrait gives the viewer the idea that without love, a woman does not have an identity, and thus, death is a logical substitute to not having a ‘Brad’. In Kahlo’s painting the same may be deciphered; she allows her femininity to surround her on the ground in the form of her hair, and her transformation into a man makes her stronger. It is then interesting to note the decades which lie between either painting – it may be said that Kahlo was progressive with her painting style and her representation of women (perhaps taking note of Kate Chopin’s The Awakening in which the protagonist cannot live in a man’s world and thus drowns herself in an act of freedom). It is clear that in both artworks there are strong emotions which propel the subjects into the places they stand before the viewer. The emotional journey has come to an end in either painting or the female figures either claim their identities (in the case of Kahlo) or they become submerged in a world where they cannot live without love (in the case of Lichtenstein). The psychology of the main characters becomes evident through the artists’ rendering through the use of space, script, and symbolism. Works Cited Alloway, Lawrence, Roy Lichtenstein, N. Y. : Abbeville, 1983 759. 1 L701A Claudia Bauer, Frida Kahlo, Munich: Prestel Verlag, 2005. Frida Kahlo, ed. Elizabeth Carpenter, exh. cat. , Minneapolis: Walker Art Center, 2007 759. 972 K12FR Gannit Ankori, Imagining Her Selves: Frida Kahlo’s Poetics of Identity and Fragmentation, Westport, Conn. : Greenwood Press, 2002. Hayden Herrer, Frida Kahlo: The Paintings, N. Y. : Harper Collins, 1991. 759. 072 K12H Lobel, Michael, Image Duplicator: Roy Lichtenstein and the Emergence of Pop Art, New Haven: Yale University Press, 2002. Pop Art: A Critical History, Steven H. Madoff, ed. , Berkeley: Univ. of California Press, 1997 709. 73 P8242 Waldmann, Diane, Roy Lichtenstein, exh. cat.. , N. Y. : Guggenheim Museum, 1993. 759. 1 L701WAL Whiting, Cecile, A Taste for Pop: Pop Art, Gender and Consumer Culture, Cambridge: Cambridge University Press.

Sunday, July 21, 2019

Cisa Questionnaire The Is Audit Process Information Technology Essay

Cisa Questionnaire The Is Audit Process Information Technology Essay This is sampling example of compliance, as it states whether controls are functional as per the policy. This will include taking samples of new user account creation forms and match it to ensure process is being followed. Variable sampling is used to determine numerical value. Substantive sampling tests the integrity of process such as credit / debit values, balances on financial statements. Stop or go sampling technique prohibits excessive sampling of an attribute. The Stop and go statistical sampling technique in a scenario where it is believed or perceived that relatively few errors will be exposed, so there is point in wasting over sampling of an attribute. Use of statistical sample for tape library inventory is an example of ____ type of sampling technique. Variable Substantive Compliance Stop or go Ans. B Explanation This is an example of substantive sampling which confirms the integrity of a process. This test will determine whether tape library records are stated in a correct manner. What is the major benefit of risk based audit planning approach? Planning scheduling in advance over months Staff exposure to varied technologies Resources allocation to areas of top concern Budget requirements are met by audit staff Ans. C Explanation The objective of risk based audit approach is focus on areas where risk is high. Various scheduling methods are used to prepare audit schedules and it does not come under risk based approach. It also does not relate to budget requirements met by staff and number of audits performed in a given year. Examples of substantive sampling technique include: Review of password history reports Approval for configuration parameters changes Tape library inventory Verifying list of exception reports Ans. C Explanation Tape library inventory is an example of substantive sampling as it confirms the integrity of a process associated with determining whether tape records are stated in a correct manner. All others are example of compliance sampling as they determine whether the process in practice is inline with the established policies and procedures. The characteristic of an audit charter is: Is dynamic is nature and keeps changing frequently as the technology changes It contains the objectives of audit, maintenance and review of internal records by delegated authority Detailed audit procedures Overall scope, ownership and responsibility of audit function Ans. D Explanation Audit charter states management objectives, scope, ownership and delegation of responsibility of audit function. It should not change frequently and approved by higher management. Also it does not contain detail audit procedures. The auditor actions and decisions impact the ___ type of risk in a major manner. Inherent Detection Control Business Ans. B Explanation Auditor selection / decisions during the audit process have direct impact on detection risks, such as enough number of samples not taken into consideration etc. Company actions manage the control risks and business and inherent risks are also not impacted by auditor. Particular threat to overall business risk can be articulated in terms of: Likelihood and magnitude of impact , where threat successfully exploited a vulnerability Magnitude of impact, where source of threat successfully exploited a vulnerability Probability of a given source of threat exploiting a vulnerability Risk assessment team group decision Ans. A Explanation The choice A addresses both likelihood and magnitude of impact and measures risk to an asset in best manner. Choice B doesnt consider the magnitude of possible damage to an asset. Choice C dont consider the possibility of damage due to source threat exploiting a vulnerability and choice D is an arbitrary method of determining risk and it is not a scientific risk management approach. Risk management approach over baseline approach in information security management gives a major advantage in terms of: Overprotection of information assets Base level protection to all assets irrespective of asset value Adequate protection applied to all information assets Equal level of protection for all information assets Ans. C Explanation Baseline approach applies a standard set of protection to all information assets whereas the risk management based approach determines the level of protection to be applied depending on a given level of risk. This saves the costs incurred on overprotection of an information asset. In baseline approach equal level of protection is applied for all information assets irrespective of asset value so as a result some assets could be under protective and some could be overprotective. Which testing method is most effective when doing the compliance testing? Attribute sampling Variable sampling Stratified mean per unit Difference estimation Ans. A Explanation Choice A is appropriate in this scenario. As attribute sampling model estimate the rate of occurrence of a specific quality in a population to confirm whether quality is present in compliance testing. The other means of sampling are used in substantive testing where details and quantity testing is done. Why email is considered a useful source of evidence in litigation in IS audit process? Wide use of email systems in enterprises as medium of communication Access control mechanisms to establish email communication accountability Backup and archiving of information flowing through email systems Data classification guidelines dictating information flow via email systems Ans. C Explanation Option C is most appropriate as archived/ backed up email files, may contain documents which have been deleted and could be recovered. Access controls only establish accountability but dont give evidence of the email. Data classification standardizes what to be communicated by email but dont provide information needed for litigation process. A post implementation review of an application is scheduled by IS auditor. What could be the possible situation which can hamper the independent assessment of IS auditor. Involved in the development of specific application and implemented specific functionality / control Integrated an embedded audit module in the application for auditing purpose Was member of application system project team but not involved at operational level Given advice on considering best practices while system was in development stage Ans. A Explanation Choice A is most appropriate in this scenario because the auditor independence is impaired in case he was involved actively during the development, acquisition and implementation of the new application. Choice B and C dont hamper auditor independence. And Choice D is not correct as auditor independence is not hampered by given advice on best known practices. What is the benefit of continuous audit approach: Collection of evidence is not required on system reliability during the processing stage Review and follow up on all information collected Improvement in overall security in time sharing environment where large number of transactions processed No dependency on complexity of organizations systems Ans. C Explanation Choice C is most appropriate w.r.t to continuous audit process major benefit as overall security is improved in time sharing environments where large number of transactions is processed but leaving insufficient trail of papers. Choice A is not correct as auditor need to collect evidence while processing is ON. Choice B is also not correct in this case as auditor does review and follows up on errors and material deficiency. Choice D is also incorrect as complexity of organization systems determines the use of continuous audit process technique. The objective of enabling audit trail is: Better response time for users Institute Accountability of processed transactions Improving operational efficiency of systems Better tracking of transactions to give useful information to auditors Ans. B Explanation Choice B is most appropriate in this scenario as accountability and responsibility can be established for processed transactions and tracing could be done end to end. Enabling audit trail dont improve user experience as it might involve additional processing which may impact user response time in other way. Choice D could also be considered valid but it is not the main reason for the purpose of enabling audit trails. In a risk based audit strategy, risk assessment is done by IS auditor to ensure: Risk mitigation controls are in place Threats and vulnerabilities are identified Risks related to audit are taken into consideration Gap analysis is done as per the need Ans. B Explanation Choice B is most appropriate in this scenario. Identification of threats and vulnerabilities is crucial in determining the scope of audit. Effect of an audit would be to develop controls to mitigate risks. Audit risks are not relevant to risk analysis of environment. Gap analysis compares the actual state to expected or desired state. A gap could be result of a risk not being correctly addressed or missed out. In order to achieve best value to organization in terms of audit resources we should : Do audit scheduling and measure the time spent on audits Training of audit staff on latest audit technologies Chalk out detailed plan based on risk assessment Progress monitoring of audits and have cost control measures in place Ans. C Explanation Choice C is most appropriate in this scenario. This will deliver value to organization in terms of dedicating resources on higher risk areas. Choice A, B and D will improve the staff productivity only. An IS audit charter includes: Plan for IS audit engagements Scope and objective of audit engagement Training plan for audit staff IS audit function role Ans. D Explanation Choice D is applicable in this scenario. Choice A is responsibility of audit management. Scope and objective is agreed on engagement letter and training of staff is again responsibility of audit management based on audit plan. In the evaluation of risk assessment of Information system. The IS auditor will first review: Controls in place Effectiveness of implemented controls Monitoring mechanism for risks related to assets Threats/ vulnerabilities impacting assets Ans. D Explanation Risks associated with using assets need to be evaluated first so choice D is most appropriate in this scenario. Controls effectiveness is part of risk mitigation stage and risk monitoring is part of risk monitoring function after risk assessment phase. During an audit plan, the most critical step is: High risk areas identification Skill set identification of audit team Identification of test steps in audit Identification of time allotted to audit Ans. A Explanation The choice A is appropriate in this scenario. The identification of high risk areas is most critical step as that will determine the areas to be focused during the audit. Skill set is determined before audit to begin. Test steps and time for audit is determined on the basis of areas to be audited. How much data to be collected during audit process will be determined on the basis of: Ease of obtaining the information records Familiarity with the environment to be audited Ease of obtaining the evidence Scope and purpose of audit Ans. D Explanation Scope and purpose will determine the amount of sample data to be collected during the audit. All other choices are irrelevant in this scenario as audit process is not hampered by ease of obtaining records or evidences or familiarity with the environment. During the audit plan, assessment of risk should provide: An assurance that audit will cover material items Material items would be covered definitely during the audit work Reasonable assurance that All items will be covered by audit work Assurance to suffice that all items will be covered during the audit work Ans. A Explanation Choice A. ISACA audit guideline G15 clearly states that An assessment of risk should be made to provide reasonable assurance that material items will be adequately covered during the audit work. Definite assurance clause in choice B is impractical, option C is also not correct as it states all items. Statistical sampling should be used by IS auditor and not judgmental sampling in the scenario: Objective quantification of error probability Avoidance of sampling risk by auditor General use audit software is available Unable to determine the tolerable error rate Ans. A Explanation With an expected error rate and confidence level, objective method of sampling is statistical in nature as it helps auditor to determine size of sample and quantify error probability or likelihood. Choice B is not correct because sampling risk is risk of sample. Choice C is also incorrect as statistical sampling doesnt need general software. Choice D is also incorrect because tolerable error rate is predetermined in statistical and judgmental sampling. The primary goal of an auditor during the IS audit planning stage is: Address audit objectives Sufficient evidence collection Mention appropriate tests Use less audit resources Ans. A Explanation As per ISACA guidelines auditor plan must address audit objectives. Choice B is not correct because evidence is not collected at planning stage. Choice C and D are also incorrect because they are not initial goals of audit plan. During an audit procedure selection, auditor will have to use professional judgment to ascertain: Sufficient evidence collection Identification of significant deficiencies and there correction in reasonable time period Material weakness identified Maintain minimal level of audit costs Ans. A Explanation Professional judgment during the course of an audit process involves subjective and qualitative evaluation of conditions. It is based more on past experience of auditor and auditor past experience plays a key role in this. Identification of material weaknesses is result of experience and planning thoroughness and also it does not deal with financial aspects of audit as stated in choice D. While evaluating logical access controls an auditor first: Documentation of controls applied to all possible access paths to system Testing of controls to access paths to determine they are functional Evaluation of security environment w.r.t. policies and procedures laid down Obtaining an understanding of security risks to information processing facilities Ans. D Explanation Choice D is most appropriate in this scenario. The first step is to gather security risks to information processing facilities, by studying documentation, inquiries and doing risk assessment. Documentation and evaluation is next step. Third step is to test access paths to ensure controls functionality. The last is auditor evaluation of security environment. The objective of forensic audit is to: Participation in investigations related to corporate fraud Evidence collection on systematic basis after system irregularity Assessment of correctness of organizations financial statements Determine if there was any criminal activity Ans. B Explanation Choice B is correct as evidence collection is used for juridical process. They are not only for corporate frauds. Financial statements correctness determination is not purpose of forensic audit. And criminal activity could be part of legal process but it is not the objective of forensic audit. An auditor is reviewing a backup log report of remote server backup. One of the entries in the backup log indicates failure to login to remote server for backup and there is no entry in log which confirms that backup was restarted. What IS auditor should do? Issue audit finding Explanation required from IS management Issue a non compliance Increase sample of logs to be reviewed Ans. D Explanation Choice D is appropriate in this case. Before issue audit finding or seeking explanation, or issue of non compliance auditor needs to gather additional evidence to properly evaluate the situation. For the purpose of auditing critical servers audit trail, auditor wants to use _______ tool to determine the potential irregularity in the user or system. CASE tools Embedded data collection tool Heuristics scanning tool Trend/variance detection tools Ans. D Explanation Trend/variance detection tools are used for determining the potential irregularity in the user or system. CASE tools are used in software development and embedded data collection tool is used for sample collection and Heuristics scanning tool used to detect virus infections. What could be the possible cause of great concern for an auditor while evaluating a corporate network for possible penetration from employees? Number of external modems connected to network Users have right to install software on there desktops Limited network monitoring or no monitoring at all User ids with identical passwords Ans. D Explanation Choice D is most appropriate in this scenario. It is the greatest threat. Choice A threat is there but depends on use of valid user id. In choice b likelihood is not high due to technical knowledge needed for penetration. Network monitoring is a means for detection. What is the major benefit of using computer forensic softwares in investigations? Preservation of electronic evidence Saving time and costs More efficient and effective Efficient search for violation of Intellectual property rights Ans. A Explanation The main purpose of forensic software is to preserve the chain of electronic evidence for investigation purpose. Others choice B and C are concerns to identify good / poor forensic software. Choice D is example of using forensic software. Data is imported from client database by auditor, now the next step is to confirm imported data is complete, what step need to be followed to verify the same. Match control total of imported data with original data Sort data to confirm data is in same order as the original data Review first 100 records of imported data with first 100 records of original data Category wise filtering of data and matching them to original data Ans. A Explanation The logical step in this scenario would be option A. this will confirm the completeness of process. Sorting may not be applicable in this scenario because original data may not be sorted order. Reviewing partial data does not suffice the purpose either. Filtering data would also need control totals to be established to ensure completeness of data. An audit is to be conducted to identify payroll overpayments in last year. Which audit technique would be best appropriate in this scenario? Data testing Use of general audit software Integrated test facility Embedded audit module Ans. B Explanation General auditing softwares include mathematical calculations, stratification, statistical analysis, sequence and duplicate checks and re-computations. So auditor can use appropriate tests to re-compute payroll data. Test data would not detect the anomalies and overpayments. Integrated test facility and embedded edit modules cannot detect previous errors. During an audit process, auditor finds out that security procedures are not documented what he should do? Auditor create procedure document Stop audit Do compliance testing Evaluate and identify exiting practices being followed Ans. D Explanation The purpose of audit is to identify risks, so the most appropriate approach would be identify and evaluate current practices being followed. Auditors dont create documentation, compliance testing cannot be done as no document is there and stopping audit will jeopardize the objective of audit i.e. risks identification. Threats and their potential impacts are identified during the course of an risk analysis stage what should be next most appropriate step? Identification and assessment of risk assessment approach of management Identification of all information assets and systems Disclosure of threats and impacts to management Identification and evaluation of existing controls Ans. D Explanation The next step would be choice D. once the threats and impacts are identified. Next step is to share them with management. Out of the following which one is the most significant concern for an auditor? Non reporting of network attack Notification failure to police of an attempted intrusion Periodic review of access rights not present No notification of intrusion to public Ans. A Explanation Failure to report a network attack is major cause of concern. Reporting to public is organization choice and notification to police is also matter of choice. Periodic examination of access rights could be causing of concern but not as big as option A. Which is the most dependable evidence for an auditor out of the following: Letter from 3rd party on compliance Line management assurance that application is performing as per design Information obtained from www Reports supplied by organization management to auditor Ans. A Explanation The most reliable evidence is the one given by external party. Choice B, C and D are not considered reliable. While evaluating a process on the basis of preventive, detective and corrective controls, an IS auditor should know? The point at which controls used as data flow through system Preventive and detectives controls are only relevant ones Corrective controls are only relevant Classification is required to determine which controls are absent Ans. A Explanation Choice A is most appropriate. Choice B and C are incorrect as all controls are important. Choice D is also not correct because functioning of controls is important and not its classification. The best evidence of duties segregation is identified by using ____ audit technique? Discussions with management Organization chart review Interviews and observations User access rights testing Ans. C Explanation Based on choice C an auditor can evaluate the duties segregation. Management may not be aware of detailed functioning, organization chart only depicts hierarchy of reporting, and testing will only tell user rights but will not give any details on function being performed by users. While reviewing a customer master file, auditor discovers that many customer names are appearing in duplicate causing variation in customer first names. How auditor will determine the amount of duplication in this scenario? Testing data to validate input Testing data to check sorting capabilities Use general audit software to detect address field duplications Use general audit software to detect account field duplications Ans. C Explanation As names are not same, so we need to use some other field to determine duplication such as address field. Test data will not help in this case and searching on account number may not yield desired result because customers could have different account numbers for each entry. While testing for program changes what is the best population to choose sample from? Library listings testing Listing of source programs Change request programs Listing of production library Ans. D Explanation The best source to draw sample or test system is automated system. Choice B would be time consuming. Program change request are initial documents to initiate changes; test libraries dont present approved and authorized executables. An integrated test facility is an efficient tool for audit: Audit of application control in a cost effective manner Integrating audit tests for financial and IS auditors Comparison of processing output with independently calculated data Tool to analyze large range of information Ans. C Explanation It is a useful audit tool because it uses similar program to compare processing with independently calculated data. This involves setting up dummy entities and processing test/production data. IS auditors use data flow diagrams to: Hierarchical ordering of data Highlighting high level data definitions Summarize data paths and storage in graphical manner Step by step details of data generation portrait Ans. C Explanation Data flow diagrams are used to chart flow of data and storage. They dont order data in hierarchical manner. Data flow not necessarily match hierarchy or order of data generation. Review of organization chart is done by auditor to: Understand workflows Identify all communication channels Responsibility and authority of individuals Network diagram connected to different employees Ans. C Explanation Organization chart always depicts the responsibility and authority of individuals in an organization. This is required to understand the segregation of functions. While performing an audit of network operating system, an auditor should review the following user feature? Network document availability online Support for terminal access to remote systems File transfer handling between users and hosts Audit, control and performance management Ans. A Explanation Network operating system user features comprise online availability of network documentation. Choice B, C and D are some examples of network OS functions. In order to ascertain that access to program documentation is only restricted to authorize users, an auditor should check: Evaluation of retention plan for off site storage Procedures being followed by programmers Comparison of utilization records to operational schedule Review data access records Ans. B Explanation Interview of programmers to understand procedures being followed is the best way to ascertain the access to program documentation is only with authorized personnel. Off site storage, utilization records and review of data access records will not address security of program documentation. Auditor is evaluating an application which does computation of payments. During the audit it is reveled that 50% of calculation is not matching with the set total. What should be the next step auditor need to follow as part of audit practice? Do further test on calculations having error Identification of variables that generated inaccurate test results Testify some more test cases to reconfirm the anomaly Documentation of results, findings, conclusions and recommendations Ans. C Explanation Auditor needs to examine some more test cases where incorrect calculations happened and then confirm with the final outcome. Once calculations are complete further tests can be performed and then report to be made only after confirmation and not before that. In order to prove the correctness of system tax calculation the best practice to be followed is: In depth review and analysis of source code Using general auditing software to recreate program logic for monthly totals calculation Simulate transactions for results comparison In depth analysis and flow chart preparation of the source code Ans. C Explanation The best way to prove accuracy of tax calculation is simulation of transactions. Detailed review, flow chart and analysis of source code will not be effective and monthly total will not confirm the correctness of tax calculations at individual level. In Applications control review , auditor must analyze : Application efficiency in meeting business processes Exposures impact Business processes performed by application Optimization of application Ans. B Explanation Application control review requires analysis of application automated controls and analysis of exposures due to controls weaknesses. The other options could be objective of audit but not specifically meant to analyze application controls. What is the most accurate evidence to prove that purchase orders are legitimate while auditing an inventory application? Application parameters can be modified by unauthorized personnel Purchase order tracing Comparison of receiving reports to purchase order details Application documentation review Ans. A Explanation Access control testing is the best way to determine purchase orders legitimacy and is the best evidence. Choice B and C are part of further actions and choice D will not serve the purpose as application documentation process and actual process could vary. Irregularities at an early stage can be detected in the best manner by using ______ online auditing technique. Embedded audit module Integrated test facility Snapshots Audit books Ans. D Explanation The audit book technique also involves embedding code in applications to reveal early detection of irregularity. Embedded audit module is used for monitoring application systems on select

Saturday, July 20, 2019

Gun Control: Do NOT Believe What Liberal Politicans Tell You :: Argumentative Example Essays

The book titled "Guns in America" written by Helen Strahinich defines gun control as any las that restricts the ownership or sale of firearms(Strahinich 2). The history of the gun control debate can be traced back to colonial times when guns were being outlawed to keep them out of the hands of the poor. Today, the subject still remains so controversial that many politicians fear touching the subject. Will banning guns eliminate crime? Will criminals still be albe to obtain firearms? These are two of the most controversial questions that fuel the fire in the debaate spotlight. tThese following two examples best illistrate how easily one can put forth arguments either for or aginst gun control.In 1995, a gang of four masked theives armed with Tec-9 semiautomatic pistols brok into Marsha Bealty's home in Fort Wayne, Indiana. The thieves were supprised when they were confronted by Marsha and her roomate armed with 9mm pistols. The immediately fled when threatened by the two women.(Black man) The two sides of this argument are the pro and anti gun groups. The anti-gun groups main goals range from more stringent gun control laws to a total ban on handguns. The political supporters of this group are susally liberal democrats and a few other small independedt groups such as Handgun Control Inc. Their main arguments are questionin gth eoriginal intent of the framers of the constituion adn the way of life in the time it was written, and also the purpose of guns in modern siciety. For thte most part, their claims are mainly emotional and use popular incidences adn the high number of people killed annually from firearms and, gun saftey in households. On the other side of the fence is the pro-gun grouuups who lobby to support law abiding citizens' second amendment rights to keep and bear arms. Their suporters tend to be conservative republicans and pro-gun groups. The most popular of these groups is the NRA(National Rifle Association) which is a strong political group consisting of over three million members. Theses groups tend to use statistics and sases wehre lives have been saved by the use of firearms while strongly stressing gun saftey and training programs. They favor strict interpretation of the Bill of Rights. INthsi paper I am taking a stand against gun control. I feel that law abiding citizens should be entitled to their second ammendment rights to keep and bear arms for the purposes of protection of home, property, and person.

Educating Americans About Islam Essay -- Terrorism Islam Islamic Essay

Educating Americans About Islam The events of September 11th 2001 created dramatic changes in the lives of peoples all across the globe. The devastating aftermath of the attacks of that day is never ending in the lives of most people – especially those who were personally affected by the horrific acts of terrorism. Muslims, in particular, have had to experience the backlashes of the September 11th events. An already misunderstood and misrepresented group of people have, in addition, had to deal with incredible biases, bigotry, misdirected hate, and religious intolerance. Many Americans who, unjustly, attack the religion of Islam and its faithful followers are, in reality, very ignorant on the subject of Islam and the beliefs of the religion. Their ignorance, fear, and need to find blame after such a traumatic event blind them from their own false stereotypes and generalizations, and they justify their own prejudice. This paper will first describe misconceptions of Islam that existed prior to the Septe mber 11th attacks and will then go on to describe how those negative stereotypes, along with the need to find blame, have caused many Muslims-Americans to experience incredible bias and discrimination, solely based on their religious beliefs. Americans, for many years, have misunderstood the nature and beliefs of Islam and the practices of its followers. The democratic values and ideals that are held sacred in the United States often skew the American peoples’ perceptions of foreign cultures and customs. In trying to understand the practices of Islam, Americans are often times unable to view Islamic traditions without being influenced by their own Western biases. Preconceived notions and stereotypes are continually ... ... http://usinfo.state.gov/topical/pol/terror/02030810.htm, March 5, 2002. 6. â€Å"Southern Baptist Leadership Chose to Spew Hate,† http://www.islam101.com/terror/sbaptists.htm, June 24, 2002. 7. Vicki Silverman, â€Å"Muslim Americans Support Anti-Terrorism Campaign,† http://usinfo.state.gov/topical/pol/terror/01101003.htm, October 8, 2001. 8. Susan Domowitz, â€Å"American Muslim Leaders Condemn Terrorism, Defend Muslims’ Civil Rights,† http://usinfo.state.gov/topical/pol/terror/01091907.htm, September 18, 2001. 9. â€Å"Poll: Majority of U.S. Muslims Suffered Post-9/11 Bias,† http://www.interfaitheducationinitiative.org/images/content/CAIROnBiasAndKindness. pdf, August 21, 2002. 10. â€Å"CAIR Report: American Muslims One Year after 9/11,† http://www.islam101.com/terror/cairReport911.htm, September 2, 2002.

Friday, July 19, 2019

Essay --

Efficient communication between cells is crucial in governing cellular activities. Cytokines are a key element of the cell signaling process and mediate communication among cells. Cytokines are a type of small proteins released by cells that have an effect on the behavior of other cells. There are several different types of cytokines including interleukins, interferons, and tumour necrosis factor. Many different types of cells can produce cytokines, such as immune cells like macrophages, mast cells, and B lymphoctyes. Cytokines are especially important in the immune system because they help coordinate that balance between the cell-based immune response and the humoral immune response. There are several different factors that go into play in the function of cytokines and their effect. There are many different types of cytokines, and each cytokines has a matching cell-surface receptor. Cytokines bind to specific receptors on target cells with high affinity. Cascades of intercellular signaling following then have an effect on the function of cells. Depending on what type of cytokines,...

Thursday, July 18, 2019

Review of Related Literature Essay

As clubbing became more interactive, technologies became more fashionable and innovative. There are many new installations were built to sustain the needs of interactive clubs. In these present times, latest equipments for sounds, designs, and lights are the most popular accessories in different interactive bars. According to Emmanuelle Waeckerle (2004), VINST is a video installation and interactive sound performance enabling real-time control of both sonic and visual representation of my voice – thus creating an extraordinary fusion of human body sound and video. This equipment is different because it is a sensitive vocal instrument to the reaction of the body. The sensitivity of this equipment will base on the movement of the body. If VINST is touched in a light manner, the sound are pure tones and when you touch VINST more, you tend to laugh and tickle but when you touch it harder, it will generate pain, but are also pleasurable sounds it creates while having this kind of feeling. LCI also offers interactive technologies for interactive clubs. One of their products is the Interactive Video that can be used in different parts of the clubs such as walls and floors. These interactive video were designed with different themes to match the ambiance, lights, and designs of the club. In this sense, interactive videos designed by LCI bring more life and fun to the clubs and to the customers as well. Human locator would also be a big impact to attract customers. According to the Freeset, the designer of this human locator, when a certain person or people passes through the human locator, it will track the movement of the person and while it locates the movement, the locator will act as a wave and move like the movement of the person. There are also different kinds of tables that can be use to attract more customers that will match their personality. These tables were invented to make the customers comfortable and enjoy while staying at the club. One of these tables is the table called reactable – a table that has tangible electronic musical instruments that would let people releases their love of music. According to TODO, the curators and organizers of 2007 BIP, â€Å"technology shower creates and designs. † Through this statement, they like to say that technology brings life and enjoyment to the consumers and the producers. In this article of TODO where electro wave was featured, the biggest free music festival in Italy, shares their knowledge and talent towards interactive installations for clubs that would help the clubs and its customers enjoy the time they spent there and make it more memorable and comfortable place to set the party. Some of its featured installations are Face2Face2Face, Oneword, and Are You Here? These installation were mobile all installations to locate different people and different places that have interactive clubbing. These kinds of interactive equipments brought life to interactive clubbing. Articles coming from different interactive installation professional, we can see that interactive clubbing continue to rise due to its demands. Customers would prefer interactive clubs than ordinary clubs to make their nightlife more innovative and creative. Facilities, equipments, and installations for interactive clubs will bring profit for the owners and enjoyment to the customers. Methodology Since this research involves an evolution of a particular existent activity which is clubbing, it is important to conduct a research and background study of the research conducted before regarding such topic. The methodologies involved in this paper also constituted an analysis of the existing club spots regarding the nature of these clubs, the equipments being used and the concepts that served as their foundation for success. Interviews are essential in this research in order to gather necessary information regarding the other existing traditional and interactive clubs. The interviewees include managers from different traditional and contemporary clubs and existent interactive club. The questions that were distributed to the managers comprised of the following? 1. When did the club found? 2. How long has it been active? 3. What were the major equipments being used in the club? 4. What are the most requested or most frequent activities by costumers? 5. Who are the most frequent costumers? 6. If there are any, what were the common suggestions of the costumers for the club? 7. How do you keep your costumers? 8. What were the technological enhancements that the club had undergone? 9. What were the installations that the club recently had? 10. What other enhancement would you want to install in your club? The total number of respondents is 50 managers for the United Kingdom clubs. Most of the respondents are managers of clubs that had operated and remained successful for at least six to ten years. They were also managers in such clubs for three to four years. The common answers were that the must in a club are the lively DJ’s high –tech audio gadgets which include woofer and loud bang speakers, surround digital sound , audio generated strobe and disco lights, light retractors, sound proof walls, cozy steel or wooden bar set, and a wide dance floor. The most frequently requested by costumers are the new disco or techno mixes in music and a DJ that keeps the night going. The drinks, the food and the services are also important to consider in ensuring costumer satisfaction. Another set of questions were given to frequent club goers in order to find out what they are looking for in a club and what is their knowledge about interactive clubbing. The questions include the following: 1. How often do you go clubbing? 2. Why do you go clubbing? 3. What kind of clubs do you go to, and where? 4. Why do you choose such clubs? 5. What are the technological installations in those clubs that you like best? 6. Do you know what interactive clubbing is? 7. Have you gone into an interactive club? (If no, Do you like the idea? If yes, How was your experience? ) 8. Which do you prefer, a traditional clubbing or interactive clubbing? 9. What would you like in a club? 10. What would fully satisfy you as a club goer? The total number of respondents is 50 club goers fro the United Kingdom. Most of the respondents are frequent club goers ranging from ages eighteen to thirty-eight years of age. Based from the result of the survey, most of the club goers go clubbing as a form of relaxation and socialization with other people. The clubs that are frequently visited are the clubs playing the latest music and audio mixes. It was also found that the audio speakers and the woofers of these clubs are the latest technological breakthroughs. Most of the respondents have heard and learned about interactive clubbing but only half of the total number of interviewees has actually gone into interactive clubs in the United Kingdom. The experiences were almost the same that was an astonishment of the new technology brought about by the combination of audio and visual effects of media translation. The same respondents voted in favor of interactive clubbing as against traditional clubbing. Their answer to the questions pertaining to costumer satisfaction can be summarized into relaxation and an energetic environment with the Jockey and good quality of sounds and more that the club can offer as other forms of entertainment. Most of the respondents are looking for something more than what has already been offered. The level of the costumer satisfaction is also increasing as the technology introduces innovative gadgets and ideas. Body Different technology installations were invented to make clubbing interactive. Interactive clubbing is known for the clubs’ latest equipments and facilities that would attract customers. Clubs today were built to attract bar hoppers in an interactive manner. Club owners bought different kinds of latest gadgets, equipments and facilities to sustain the demand of the present generation. Some of the examples of latest gadgets, facilities, and/or equipments that were built in different clubs are cameras, interactive videos, interactive tables, computers, sounds, lights, designs, and themes. Interaction with different clubs in different parts of the world can be done through cameras. For example, there would be an installation of interactive cameras showing different clubs in the world. These different clubs are part of the connection of interactive clubs for they will have their cameras inside their clubs to show the clubbers the situations in different clubs. Aside from the setting of other clubs, sounds and music can be heard through these cameras. In this sense, all the participating interactive clubs would have the same music played, which brings interaction and intimacy to all the participating interactive clubs. Cameras installed in these interactive clubs will also show the themes of different clubs in different countries. Therefore, themes and cultures in different countries will be shown through the interactive cameras. Computers will be installed for more interaction between clubbers in different clubs. Computers will help clubbers to communicate with people in different clubs that have the same interactive facilities if they want to. Sounds and music are the most important factors for clubs because these are what the clubbers wanted. In this case, sounds and music must be the primary attraction for clubbers that is why newly invented musical instruments and facilities are produced to make the musical atmosphere of the clubs became more attractive. One of the musical equipment used for clubs is the Pioneer’s DVJ-X1. This equipment brings more life and strength to the sounds and music of the clubs. Aside from this, it has different parts that can be used to make the sounds clearer, audible, and creative. Lights, designs, and themes are also the factors of bringing clubbers into the clubs. Clubbers would love seeing different kinds of lights and designs inside the club. Lightspace is one of the innovators of light displays to different clubs. According to them, they transform everyday surfaces into engaging, entertaining and interactive exercise, display, gaming and learning surfaces that are capable of stimulating and responding to human touch. Through this kind of evolutionary displays, clubbers would really enjoy going to clubs that has lighter colors and lively designs because it brings life and enjoyment to them. The clubs’ themes are also important to show the clubbers the atmosphere of the place. The theme of the club will determine its clubbers, facilities, equipments, and workers. That is why it is also an important factor for the clubbers. In addition to this, as its equipments, facilities, and displays are important, the task of the DJs or the VJs are also important because they bring life to the club. They are the one who will manipulate the whole night of dancing and singing. Fast-learners, professionals, creative, and imaginative DJs or VJs must be the controller of the sounds to make the nightlife comfortable and conducive. In these present times, many people who wanted to enjoy their nightlife. In the previous years, clubs were built to make people enjoy through listening to sounds and drinking with friends – this is the traditional lifestyle of ordinary clubs. Ordinary clubs can give only few things to its customers – listening to the sounds, dancing on the dance floor and become drunk. People during those times are not aware with the atmosphere of the clubs because these factors are the most important things that were set in their minds. As time goes on, people wanted more of it. Because technology became more in demand, inventors and owners became partners in making the clubs livelier and interactive, that is why interactive clubbing emerged. Comparing and contrasting ordinary clubbing to interactive clubbing would bring opposite directions of two interrelated elements. Ordinary clubbing caters few enjoyment and contentment while interactive clubbing brings more life and great atmosphere to the whole club because listening to the music and dancing on the dance floor would not the only thing to do. Through interactive clubbing, clubbers can do many things like chatting, watching the video walls, interacting with different clubbers in different clubs from different parts of the world, and playing with the designs, lights and themes of the clubs. In this case, interactive clubbing brings more freedom to the clubbers in whatever they want to do while clubbing. However, these kinds of interactive clubbing need to have more money, more knowledge, and more power. Having this kind of interactive clubs are not the same as having an ordinary club because it needs to have more people, more time, and more effort to make a certain club interactive. An interactive club can be said as creative and imaginative but it is an ideal – ideal in a sense that it is perfect, perfect in the eyes of every clubber. According to Wegner (2005), nightclubs enjoy a commercial advantage over domestic sound and light systems. However, the club advantage begins to diminish when consumer technology enables a car’s sound system or a home theater to provide a superior experience. Because of technology, the demands for these kinds of places are easily declining due to the competition of different technology innovators and innovations. Nevertheless, technology in interactive clubbing is more Conclusion While it is considered a fact that music video has ever been present in the world of clubbing, the evolution of technology has influenced greatly its player-performing end and the display-presentation end. Interactive Clubbing indeed open a new experience for club goers. The technological installations of wide digital surround sounds, and the LCD generated effects provided an environment of which only the future can offer. This research proposal therefore provided an assumptive conclusion on the probability of the status of an interactive clubbing. There is definitely a positive response of science and technology to the demands of interactive clubbing as proven in the proper combination of technological application of new installations. There are already experimental methods to place cameras at various clubs throughout the world which recreated a specific ambiance a traditional club. This makes it possible for DJ’s to perform live at different places at the same time. There also a great deal of possibility of advanced digital 3d dancers that enables the presence of another person in the form of an avatar that interacts with genuine clubbers through the internet provider. These innovations will definitely set the new standard for clubbing in the not too distant future. Therefore it is concluded that Interactive clubbing is the present application of the future of clubbing experience. References: Bennett, A. (2000). â€Å"Dance Music, Local Identity and Urban Space. † In Popular Music and Youth Culture: Music, Identity and Place, edited by (Bennett, Andy). New York: St. Martin’s Press, 73-102. Bidder, S. (2001). Pump Up The Volume: A History of House. London: Channel 4 Books. Birgy, P. (2003). â€Å"French Electronic Music: The Invention of a Tradition. † In Popular Music in France from Chanson to Techno: Culture, Identity and Society, edited by HughDauncey and Steve Cannon. Aldershot: Ashgate, 225-242.. Brewster, B. and Broughton, F. (1999) Last Night A DJ Saved My Life: The History of the Disc Jockey. Grove Press. Butler, M. (2005). â€Å"‘Everybody Needs a 303, Everybody Loves a Filter’: Electronic Dance Music and the Aesthetics of Obsolescence. † In Digital Media: Transformations in Human Communication, edited by Paul Messaris and Lee Humphreys. New York: Peter Lang, 111-18. Byrom, H. (1998) The Future of Clubbing. Find Articles. Carrington, Ben and Brian Wilson. 2004. â€Å"Dance Nation: Rethinking Youth Subcultural Theory. † In After Subculture: Critical Studies of Contemporary Youth Culture, edited by Andy Bennett and Keith Kahn-Harris. New York: Palgrave, 65-78. Erenberg, Lewis A. Steppin’ Out: New York Nightlife and the Transformation of American Culture, 1890–1930. Westport, Conn. : Greenwood Press, 1981. Freeset. (n. d. ) Human Locator. Human Locator: a Freeset Technology. Hesmondhalgh, David. 1997. â€Å"The Cultural Politics of Dance Music. † Soundings 5, 167- 178. LCI. (2005). Interactive. http://www. lci-uk. com/filter. php? filter[]=interactive _________. (n. d. ) Lightspace. Lightspace Corporation: Unique Interactive Installations. http://www. lightspacecorp. com/ Merriam-Webster. Interactive. Merriam-Webster Online Dictionary. Off-Corso, R. (2006). The Critical Mass. http://www. enviu. org/cm/cm_index_site. html Regine Zylberberg. Queen of the Night. Aug. 2006. Retrieved on May 14, 2007. http://www. jahsonic. com/Regine. html Waeckerle, E. (2004). VINST2. Current. .(2007). The Dawn of Interactive Clubbing. 365MAG International Music Magazine. . (2002). Responsive Environments>keywords. Future Physical. http://www. futurephysical. org/pages/content/resp_env/i_clubbing. html __________. (2007). Interactive Installations for Clubbing. We Make Money not Art. http://www. we-make-money-not-art. com/archives/009473. php __________. (2003). Tangible Musical Interfaces – Music Tables. Reactables related. http://www. iua. upf. es/mtg/reacTable/? related.

Wednesday, July 17, 2019

A History of Melody Essay

The fiddle emerged from a primitive musical deflect, ordinarily an arched stick with a get let on stretched taut mingled with the two ends (Hughes, cc8). The imbibe is divided by a cringle or a bridge (Thinkquest, 1999). The premier bridge was utilise to add to the peckers rapport when the pull was vibrated, and strings were attached cross behaviors suitable receptacles (Hughes, 2008). These resonance enhancers took many forms-tortoise shells, coconut, calabash, woody boxes and even pig bladders (Thinkquest, 1999), thrust tightly between the strings and the bow (Thinkquest, 1999). as well to enhance the resonance of the bow, the prick was held beforehand the mouth (Thinkquest, 1999). The fiddle wish wellly came to europium around the 9th blow, mostly originating from Asia (Thinkquest, 1999). It took the developingary coer of the violin about 450 years to lead the violin to its present form. This only shows the ache years of experience needed by the maker s of the stringed operator (Thinkquest, 1999). The drug abuse of a bow to draw across the strings followed, in whole likelihood imported into Europe from Asia by Arab travellers (Hughes, 2008).The evolution of the violin was slow. It took until the middle Ages for a pas seul of the zither, a beginular and older instrumental role, to uprise into the vielle, which saw the instrument being held against the shoulder. This place it from the zither, as the latter was held across the knees (Hughes, 2008). As time went on, the original one string grew to four, and for a time, five strings (Hughes, 2008). modernistic until the 16th century, the vielle was changed with the small wooden ribs used in similar wooden pick off instruments replaced by the tailpiece and bridge (Hughes, 2008).fiddle 2 By the time of the Renaissance, the viol (a bowleg stringed instrument chiefly of the 16th and seventeenth centuries make in treble, alto, tenor, and bass sizes and distinguished from con stituents of the violin family especially in having a ambiguous body, a flat back, sloping shoulders, ordinarily six strings, a fretted fingerboard, and a low-arched bridge (Merriam-Webster, 2008), was being used, the first having a hole adding resonance and tone to the instrument (Hughes, 2008).It was a short time that the viol evolved into the genus Viola da gamba (a bass member of the viol family having a range approximating the cello (Merriam-Webster, 2008), which was dawdleed between the knees of the musician, and the viola de braccio held against the shoulder. The modern shape of the violin was evolved from the second version of the instrument (Hughes, 2008). The violin evolved form many different instruments, including the Rebob, the Rebec, lira da Braccio and the Renaissance fiddle. The violin now, the crude violin was not used until 1630 in Italy (Berkeley, 2008).The evolution of the modern violin appears to go been completed in Italy with the most live onn violin maker Andrea Amati at Cremona, providing 24 violins, six violas and eight cellos for the French world power Charles IX in 1560 (Hughes, 2008). Another historied violin maker, Antonio Stradivarius, joined the Amati check in the latter half of the 6th century (Hughes, 2008). The violins re attractivery As stated earlier in the paper, that apart from the Arab travellers influence had an on the violin, there is no certain fact on who invented the violin or a stringed instrument that is played with a bow (Hughes, 2008). any(prenominal) of the theories place the invention of the violin at around 1520 A. D. wherein the violin is included in the Gaudenzio Ferrari painting The Madonna of the Orange Trees (cited in Berkeley, 2008). violin 3 solely the violin emerged in Italy in the earlier 1500s and seems to begin actual from two medieval bowed instruments-the fiddle, in like manner called the viele or fiedel, and the rebec-and from the Renaissance lira de braccio (a violin-like instr ument with off the finger garget strings (Rosenblum, 2007). Also related to the violin, hardly not direct ancestors, is the six-string fretted viol.The viol appe atomic number 18d in Europe before the violin and existed with it cheek by side for about 200 hundred years (Rosenblum, 2007). In the early 1600s, however, the violin gained prestige through its use in operas such(prenominal) as Orfeo(1607) by Italian composer Claudio Monteverdi, and through the French queen Louis XIII band of musicians, the 24 violons de roi (the major powers 24 violins, formed in 1626). This growth in stature go on throughout the Baroque period (1600-1750) in the works of many notable composer- bring to passers.Among them were the Italians Ar tingelo Corelli, Antonio Vivaldi and Giuseppe Tartini and the Germanys Heinrich Biber, Georg Philipp Teleman and Johann Sebastian Bach (Rosenblum, 2007). The Craftsmen The earliest important violin makers were from Northern Italy, Gasparo da Salo (1540-1609) and Giovanni Maggini (1579-1630) from Brescia and Andrea Amati (1525-1611) from Cremona. The craft of violin ma poove reached its height in the 17th and 18th centuries in the workshops of the Italians Antonio Stradivarius (1644-1737) and Giuseppe Guarneri (1698-1744) from Cremona and the Austrian Jacob Stainer (1617-1638) (Rosenblum, 2007).Violin 4 Gasparo da Salo (1542-1609) The founder of the Brescian school of violin makers, Gasparo Bertlotti, or Gasparo da Salo, was a dedicated craftsman and instrument maker. He was formerly credited with the claim of having developed the violin in the shape we know today. Although his claims bring forth been disproved, his instruments are nevertheless look up to and venerated (Smithsonian, 2008). Gasparos violas are considered finer than his violins and probably were more numerous (Smithsonian, 2008).His viola da gambas were converted to violincellos and are a lot esteemed, and virtually of his six-stringed bass viols draw been remounted as threesome and four stringed double basses. Twenty instruments have been recorded (Smithsonian, 2008). Giovanni Paolo Maggini (1579-1630) An apprentice of Gasparo da Salo, he acquired a thorough knowledge of the timberland available to him (Smithsonian, 2008). Maggini do his own place and as a master, his own techniques of craftsmanship. He frequently experimented to improve tone grapheme for his pieces and perfect his construction methods (Smithsonian, 2008).Many of the instruments made by Maggini at the twilight of his line of achievement are considered his finest work. These works are know for the feel of the woods and unusually enlarged undecomposed holes as well as for their unusually mellow tones (Smithsonian, 2008). Andrea Amati (1525-1611) The founder of the outstanding Cremona school of violin making, Amati focused on violins and was making viols and rebecs. Instruments dated after 1584 are said to be the works of his sons Antonio and Hieronymus (Smithsonian, 2008). Violin 5It is claimed that he made 24 violins, 6 violas and 8 cellos for the French king Charles IX for use at the approach at Versailles (Smithsonian, 2008). A few of these instruments know to this day (Smithsonian, 2008). Antonio Stradivarius (1644-1734) Stradivarius interpretation of geometry and design served as a conceptual model for violin makers for more than 200 years (Smithsonian, 2008). Stradivarius also made harps, guitars, violas and cellos- more than 1,100 instruments by sure estimate (Smithsonian, 2008).About 650 of these instruments survive today (Smithsonian, 2008). Bartolomeo Giuseppe Guarneri (1698-1744) Guarneri is considered the most illustrious member of this violin making family. The fifth and last member of the family, he is known more as Joseph Guarnerius del Gesu. Guarnerius is the Latin form of the family name and Joseph the Hebraic form of Giuseppe (Smithsonian, 2008). The estimate of his total take is not more than 250 violins no essay suggests that he made more (Smithsonian, 2008). But at least one cello and some violas are attri entirelyed to him.The outline of his violins, with fragile modifications, is founded on instruments of Stradivarius (Smithsonian, 2008). Stradivarius and Guarnerius are ranked as among the greatest violin makers, but fine violinists prefer Guarnerius over Stradivarius (Smithsonian, 2008). Whatever the archives or whoever the maker of the violin, we all moldiness appreciate the efforts of these individuals who in one way or another contributed to the making of the violin. altogether these men have given much by way of continuously honing the instrument as it is known and have sexed today by scores of people.Violin 6 personal Reflection The violin represents probably on of the more versatile, elegant and mysterious of the instruments that we have today. The seeming smallness of the instrument fairly does not tell of the long and conscientious process that went into its refinement and development. The reason that I centred the paper on this instrument is sound for those following reasons. The instrument for me seems to just now drift its notes and sounds over the listeners ears at just the rectify moments.They are, I believe, different from the wind pieces such as the trumpet and the saxophone. These pieces produce these sibilant notes that sometimes tend to be techy if you are not an admirer for the winning of music. But the violin just seems to play its notes in a mellow and flat sound. It sometimes will want to simmer down to sleep at times. Im a fan of the violin. For me, there is just no instrument just like it in sound and depth and quality of sound. Yes, there are many pieces out there that seem to sound alike, but cant seem to pay heed the position of the violin.I cant imagine an orchestra without a violin in the strings section. It would be incomplete without it. The sound would be really different than the violins in it. And the violin can cross over to d ifferent genres of music, from classical to country to pop to jazz and to others, without a tad of difficulty. Thats another thing I like about this instrument, its very versatile. It can just blend in with the conglomerate styles of music that you put it with and it will perform handsomely, a trait not all instruments can boast of.What we can do now is just relax at every playing of the violin, just to enjoy the elegant sound of the instrument as the musician begins to play and begins to once again weave its magic over its listeners. characterBerkeley. (2008). The origins and history of the violin. Retrieved February 11, 2008, from Berkeley website. http//www-atdp. berkeley. edu/2030/jmoriuchi/violin-title. html Hughes, A. (2008). Where did the violin resurrect? Retrieved February 11, 2008, from Answer Bank database http//www. theanswerbank. co. uk/Article1910. html Merriam-Webster. (2008). Viola.Retrieved February 11, 2008, from Merriam-Webster website http//www. merriam-webster . com/ dictionary/viol Rosenblum, M. (2007). Violin. Retrieved February 11, 2008, from Microsoft Encarta encyclopaedia database. http//encarta. msn. com/encyclopedia_761576364/Violin. html Smithsonian Institution. (2008). Violin makers. Retrieved February 11, 2008, from cyclopaedia Smithsonian website. http//www. si. edu/Encyclopedia_SI/nmah/violdasa. htm ThinkQuest. (1999). The violin. Retrieved February 11, 2008, from Oracle Education Foundation database. http//library. thinkquest. org/27178/en/section/1/index. html